
- •Contents
- •Preface
- •1 Spread spectrum signals and systems
- •1.1 Basic definition
- •1.2 Historical sketch
- •2 Classical reception problems and signal design
- •2.1 Gaussian channel, general reception problem and optimal decision rules
- •2.2 Binary data transmission (deterministic signals)
- •2.3 M-ary data transmission: deterministic signals
- •2.4 Complex envelope of a bandpass signal
- •2.5 M-ary data transmission: noncoherent signals
- •2.6 Trade-off between orthogonal-coding gain and bandwidth
- •2.7 Examples of orthogonal signal sets
- •2.7.1 Time-shift coding
- •2.7.2 Frequency-shift coding
- •2.7.3 Spread spectrum orthogonal coding
- •2.8 Signal parameter estimation
- •2.8.1 Problem statement and estimation rule
- •2.8.2 Estimation accuracy
- •2.9 Amplitude estimation
- •2.10 Phase estimation
- •2.11 Autocorrelation function and matched filter response
- •2.12 Estimation of the bandpass signal time delay
- •2.12.1 Estimation algorithm
- •2.12.2 Estimation accuracy
- •2.13 Estimation of carrier frequency
- •2.14 Simultaneous estimation of time delay and frequency
- •2.15 Signal resolution
- •2.16 Summary
- •Problems
- •Matlab-based problems
- •3 Merits of spread spectrum
- •3.1 Jamming immunity
- •3.1.1 Narrowband jammer
- •3.1.2 Barrage jammer
- •3.2 Low probability of detection
- •3.3 Signal structure secrecy
- •3.4 Electromagnetic compatibility
- •3.5 Propagation effects in wireless systems
- •3.5.1 Free-space propagation
- •3.5.2 Shadowing
- •3.5.3 Multipath fading
- •3.5.4 Performance analysis
- •3.6 Diversity
- •3.6.1 Combining modes
- •3.6.2 Arranging diversity branches
- •3.7 Multipath diversity and RAKE receiver
- •Problems
- •Matlab-based problems
- •4 Multiuser environment: code division multiple access
- •4.1 Multiuser systems and the multiple access problem
- •4.2 Frequency division multiple access
- •4.3 Time division multiple access
- •4.4 Synchronous code division multiple access
- •4.5 Asynchronous CDMA
- •4.6 Asynchronous CDMA in the cellular networks
- •4.6.1 The resource reuse problem and cellular systems
- •4.6.2 Number of users per cell in asynchronous CDMA
- •Problems
- •Matlab-based problems
- •5 Discrete spread spectrum signals
- •5.1 Spread spectrum modulation
- •5.2 General model and categorization of discrete signals
- •5.3 Correlation functions of APSK signals
- •5.4 Calculating correlation functions of code sequences
- •5.5 Correlation functions of FSK signals
- •5.6 Processing gain of discrete signals
- •Problems
- •Matlab-based problems
- •6 Spread spectrum signals for time measurement, synchronization and time-resolution
- •6.1 Demands on ACF: revisited
- •6.2 Signals with continuous frequency modulation
- •6.3 Criterion of good aperiodic ACF of APSK signals
- •6.4 Optimization of aperiodic PSK signals
- •6.5 Perfect periodic ACF: minimax binary sequences
- •6.6 Initial knowledge on finite fields and linear sequences
- •6.6.1 Definition of a finite field
- •6.6.2 Linear sequences over finite fields
- •6.6.3 m-sequences
- •6.7 Periodic ACF of m-sequences
- •6.8 More about finite fields
- •6.9 Legendre sequences
- •6.10 Binary codes with good aperiodic ACF: revisited
- •6.11 Sequences with perfect periodic ACF
- •6.11.1 Binary non-antipodal sequences
- •6.11.2 Polyphase codes
- •6.11.3 Ternary sequences
- •6.12 Suppression of sidelobes along the delay axis
- •6.12.1 Sidelobe suppression filter
- •6.12.2 SNR loss calculation
- •6.13 FSK signals with optimal aperiodic ACF
- •Problems
- •Matlab-based problems
- •7 Spread spectrum signature ensembles for CDMA applications
- •7.1 Data transmission via spread spectrum
- •7.1.1 Direct sequence spreading: BPSK data modulation and binary signatures
- •7.1.2 DS spreading: general case
- •7.1.3 Frequency hopping spreading
- •7.2 Designing signature ensembles for synchronous DS CDMA
- •7.2.1 Problem formulation
- •7.2.2 Optimizing signature sets in minimum distance
- •7.2.3 Welch-bound sequences
- •7.3 Approaches to designing signature ensembles for asynchronous DS CDMA
- •7.4 Time-offset signatures for asynchronous CDMA
- •7.5 Examples of minimax signature ensembles
- •7.5.1 Frequency-offset binary m-sequences
- •7.5.2 Gold sets
- •7.5.3 Kasami sets and their extensions
- •7.5.4 Kamaletdinov ensembles
- •Problems
- •Matlab-based problems
- •8 DS spread spectrum signal acquisition and tracking
- •8.1 Acquisition and tracking procedures
- •8.2 Serial search
- •8.2.1 Algorithm model
- •8.2.2 Probability of correct acquisition and average number of steps
- •8.2.3 Minimizing average acquisition time
- •8.3 Acquisition acceleration techniques
- •8.3.1 Problem statement
- •8.3.2 Sequential cell examining
- •8.3.3 Serial-parallel search
- •8.3.4 Rapid acquisition sequences
- •8.4 Code tracking
- •8.4.1 Delay estimation by tracking
- •8.4.2 Early–late DLL discriminators
- •8.4.3 DLL noise performance
- •Problems
- •Matlab-based problems
- •9 Channel coding in spread spectrum systems
- •9.1 Preliminary notes and terminology
- •9.2 Error-detecting block codes
- •9.2.1 Binary block codes and detection capability
- •9.2.2 Linear codes and their polynomial representation
- •9.2.3 Syndrome calculation and error detection
- •9.2.4 Choice of generator polynomials for CRC
- •9.3 Convolutional codes
- •9.3.1 Convolutional encoder
- •9.3.2 Trellis diagram, free distance and asymptotic coding gain
- •9.3.3 The Viterbi decoding algorithm
- •9.3.4 Applications
- •9.4 Turbo codes
- •9.4.1 Turbo encoders
- •9.4.2 Iterative decoding
- •9.4.3 Performance
- •9.4.4 Applications
- •9.5 Channel interleaving
- •Problems
- •Matlab-based problems
- •10 Some advancements in spread spectrum systems development
- •10.1 Multiuser reception and suppressing MAI
- •10.1.1 Optimal (ML) multiuser rule for synchronous CDMA
- •10.1.2 Decorrelating algorithm
- •10.1.3 Minimum mean-square error detection
- •10.1.4 Blind MMSE detector
- •10.1.5 Interference cancellation
- •10.1.6 Asynchronous multiuser detectors
- •10.2 Multicarrier modulation and OFDM
- •10.2.1 Multicarrier DS CDMA
- •10.2.2 Conventional MC transmission and OFDM
- •10.2.3 Multicarrier CDMA
- •10.2.4 Applications
- •10.3 Transmit diversity and space–time coding in CDMA systems
- •10.3.1 Transmit diversity and the space–time coding problem
- •10.3.2 Efficiency of transmit diversity
- •10.3.3 Time-switched space–time code
- •10.3.4 Alamouti space–time code
- •10.3.5 Transmit diversity in spread spectrum applications
- •Problems
- •Matlab-based problems
- •11 Examples of operational wireless spread spectrum systems
- •11.1 Preliminary remarks
- •11.2 Global positioning system
- •11.2.1 General system principles and architecture
- •11.2.2 GPS ranging signals
- •11.2.3 Signal processing
- •11.2.4 Accuracy
- •11.2.5 GLONASS and GNSS
- •11.2.6 Applications
- •11.3 Air interfaces cdmaOne (IS-95) and cdma2000
- •11.3.1 Introductory remarks
- •11.3.2 Spreading codes of IS-95
- •11.3.3 Forward link channels of IS-95
- •11.3.3.1 Pilot channel
- •11.3.3.2 Synchronization channel
- •11.3.3.3 Paging channels
- •11.3.3.4 Traffic channels
- •11.3.3.5 Forward link modulation
- •11.3.3.6 MS processing of forward link signal
- •11.3.4 Reverse link of IS-95
- •11.3.4.1 Reverse link traffic channel
- •11.3.4.2 Access channel
- •11.3.4.3 Reverse link modulation
- •11.3.5 Evolution of air interface cdmaOne to cdma2000
- •11.4 Air interface UMTS
- •11.4.1 Preliminaries
- •11.4.2 Types of UMTS channels
- •11.4.3 Dedicated physical uplink channels
- •11.4.4 Common physical uplink channels
- •11.4.5 Uplink channelization codes
- •11.4.6 Uplink scrambling
- •11.4.7 Mapping downlink transport channels to physical channels
- •11.4.8 Downlink physical channels format
- •11.4.9 Downlink channelization codes
- •11.4.10 Downlink scrambling codes
- •11.4.11 Synchronization channel
- •11.4.11.1 General structure
- •11.4.11.2 Primary synchronization code
- •11.4.11.3 Secondary synchronization code
- •References
- •Index

Spread spectrum signature ensembles |
227 |
|
|
Example 7.2.2. Let us construct the binary Welch-bound ensemble of K ¼ 16 sequences of length N ¼ 14. For this we may make use of the matrix H16 of Example 7.2.1 and discard two arbitrary (e.g. the last two) rows. The matrix A obtained this way is exactly what is needed, and its 16 columns are Welch-bound signatures of length 14. TSC for the ensemble thus found equates accurately to its minimum value determined by (7.30):
TSC ¼ K 2 ¼ 256
N 14
The floor SIR estimated with respect to average MAI power per receiver is according to (7.33) qI2 ¼ N/(K N) ¼ 7.
If belonging to a PSK alphabet is the only restriction on the signature code sequences, then the algorithm for constructing Welch-bound sets described above works universally. For example, rows of the matrix A may always be taken as K cyclically shifted replicas of the Chu sequence of length K. As was shown in Section 6.11.2, Chu codes exist for any length and all their different cyclic replicas are orthogonal. On the other hand, when all signatures should be binary (ak, i ¼ 1) orthogonality of all N rows of the matrix A with N > 2 is possible only for K divisible by four (see Problem 7.14). This implies that for K 6¼0 mod4 binary signatures the Welch bound (7.30) is not tight, and more precise lower borders should exist. Derivations of them may be found in [64,65] (see also Problem 7.17).
7.3Approaches to designing signature ensembles for asynchronous DS CDMA
Let us extend the issue of signature design to the case of asynchronous DS CDMA, where time and phase shifts between individual user signals are random. On the assumption of employing a single-user receiver, the decision on the current symbol of the kth user is again done on the basis of correlation (7.25). Now, however, a tough alignment between the boundaries of data symbols and the chips of different users is not maintained due to arbitrary mutual time shifts of users’ signals. Suppose that the kth user data receiver is explored and l is the delay of the lth signal against the kth signal. In order to concentrate only on the issue of designing signature codes let us assume that chip boundaries of all K signatures are synchronized, i.e. mutual delays are multiples of D: l ¼ nlD, where nl is integer, 0 nl < N. Then the situation is well explained by Figure 7.15 (for k ¼ 1), stressing that in asynchronous CDMA, unlike synchronous (see Figure 7.13), data symbols of other users may change during the reception of the kth user’s current data symbol. Still the main factor making design of asynchronous signature sets harder is the necessity to distinguish every signature from all possible shifted replicas of the others, which is not necessary in synchronous CDMA.
Suppose first that no change of data symbols of all users happens during the received symbol of the kth user, i.e. bl, i 1 ¼ bl, l ¼ 2, 3, . . . , K. Then the situation is different from the synchronous one only in the mutual time-mismatch of signatures. Start with the assumption that the signature period L coincides with the processing gain N, which

228 |
|
|
|
|
|
|
|
|
|
Spread Spectrum and CDMA |
|||
b1,i – 1 |
|
|
|
b1,i |
|
|
|
|
|
b1,i + 1 |
|||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1st user |
|
a1,0 |
a1,1 |
a1,2 |
|
|
|
|
|
a1,N– 2 |
a1,N– 1 |
|
|
b2,i – 1 |
|
|
|
|
|
b2,i |
|
|
t |
||||
|
|
|
|
|
|
|
|
||||||
|
|
|
|
|
|
|
|
|
|
|
|
||
2nd user |
a2,– 2 |
a2,– 1 |
a2,0 |
a2,1 |
|
a2,2 |
|
|
|
|
|
||
|
|
|
τ2 |
|
|
|
|
|
|
|
|
|
t |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
bK,i – 1 |
|
|
|
|
|
|
|
bK,i |
|
|
|
||
|
|
|
|
|
|
|
|
|
|
|
|||
Kth user |
|
aK,– 2 |
aK,– 1 |
aK,0 |
|
aK,1 |
|
|
|
|
|
|
|
|
|
|
τK |
|
N∆ |
|
|
|
|
|
|
t |
|
|
|
|
|
|
|
|
|
|
|
|
|
Figure 7.15 Datastreams and signatures in asynchronous CDMA
is the number of chips per data symbol duration or, equivalently, of chips integrated in the correlator. If no restriction is imposed on the possible range of mutual delays, the lth signature may be presented by any of its N cyclically shifted replicas, so that there are N(K 1) different N-dimensional vectors, each of which is a potential source of MAI in the kth receiver. When a channel is subject to multipath effects every cyclic replica of the kth signal may also create interference at the kth receiver. Let us admit that up to N 1 such replicas may exist, i.e. the multipath delay spread ranges up to the period of the signature. Another reason to include the cyclic replicas in the explored vector set is a desire to have low autocorrelation sidelobes, which is important in the search problem (see Section 8.2). With such an extension we have a total of KN vectors, whose correlations should be as small as possible.
The Welch bound is again a good instrument to estimate the lower limit of the average
squared correlation 2 of those KN vectors. For that it is enough to replace K by KN in (7.31). Since KN > N for any K 2 this gives:
|
|
|
K 1 |
|
|
|
||
2 |
|
|
ð |
7:34 |
Þ |
|||
|
KN |
|
1 |
|
||||
|
|
|
|
|
|
|
|
This inequality shows the fundamental lower limit, which an average squared correlation between all cyclic replicas of all K signatures of length N (own replicas of each one included) can never fall below. When the number of users is about ten or more this version of the Welch bound becomes especially simple:
2 |
1 |
; K 1 |
ð7:35Þ |
N |
Suppose now that the signature period in the number of L chips covers several data symbols L > N and data of no user changes during the kth current data symbol, as

Spread spectrum signature ensembles |
229 |
|
|
before.1 Again, let the delays range up to the signature period. Since the number of chips per data symbol (integration interval) remains N, we, as previously, deal with N-dimensional vectors, but the number of vectors whose correlations are controlled is now KL instead of KN, so that the bound stems from (7.31):
|
|
|
KL N |
|
|
|
|
2 |
|
|
ð |
7:36 |
Þ |
||
NðKL 1Þ |
|||||||
|
|
which again turns into (7.35) with K 1. The last result makes it possible to demonstrate that data modulation can in no way lower the bounds obtained. Indeed, every data-modulated signature may be considered as a new sequence of some (possibly very big) period Lk. Then all modulated signatures will have a common period L, being a least common multiple of all Lk, and the average squared correlation will be bordered from below by (7.36), again meaning that (7.35) is valid for the case of many users.
The derivations just undertaken establish a criterion of asynchronous signature set design: the ensemble of many signatures may be considered appropriate if its average squared correlation is close to the bound (7.35). Let us demonstrate that ensembles of random signatures attain this bound. Let all signatures be composed independently of each other by a random independent choice of elements of each of them. The whole procedure is similar to drawing balls out of an urn. Set an M-ary PSK alphabet and treat it as an urn with different M balls (code symbols). Pick out one ball K times, each time noting the result and returning the ball to the urn. This gives the first symbols of K signatures. The next symbols of all the signatures are generated the same way. Since all M-ary symbols in this scheme are equiprobable, uniformly spaced on the plane (see Figure 2.6c) and independent of each other, we have the following expectations:
8 |
1; k ¼ l and i ¼ j |
|
||
> |
|
|
||
< |
|
ð7:37Þ |
||
|
a |
k;i ¼ 0; ak;ial;j ¼ |
¼ kl ij |
|
> |
0; otherwise |
|
||
: |
|
|
the second equation stemming from the fact that the expectation of the product of independent entities equals the product of their expectations. Let us use this in an estimation of the average squared correlation of signatures at the integration interval of N chips:
|
|
N 1 ak;ial;i m |
2 |
|
jzklðmÞj2 ¼ |
ð7:38Þ |
|||
|
|
i¼0 |
|
|
|
|
X |
|
|
|
|
|
|
|
|
|
|
|
|
Physically (7.38) is nothing but the expectation of MAI power (k 6¼l), or of multipath interference power (k ¼ l) created by the lth signature shifted by m chips at the kth
1 Saving symbol N for the processing gain, i.e. the number of chips per data symbol, we will from now on denote a signature period by L, whenever they may be different.

230 |
Spread Spectrum and CDMA |
|
|
correlator output. Squaring the modulus and interchanging the summation and averaging (expectation of sum equals sum of expectations) gives:
|
N 1 N 1 |
|
||
jzklðmÞj2 |
X X |
|
|
|
¼ |
ak;ial;i mak;jal;j m |
ð7:39Þ |
||
|
i¼0 |
j¼0 |
|
To estimate the MAI effect set k 6¼l ent random variables:
jzklðmÞj2 ¼
and split the summands into products of independ-
N 1 N 1
X X
ak;iak;j al;i mal;j m
i¼0 j¼0
Now applying (7.37) to this equation leaves only terms with i ¼ j in the right-hand side
sum, resulting in jzkl(m)j2 ¼ N. Estimating the effect of multipath interference let us put k ¼ l, m 6¼0, which brings (7.39) to the form:
|
N 1 N 1 |
||
jzkkðmÞj2 |
X X |
||
¼ |
|
ak;iak;i mak;jak;j m |
|
|
i¼0 |
j¼0 |
In terms here having different i and j ak, i is independent of both ak, i m (since m 6¼0) and ak, j (since i 6¼j). By the same reasoning, ak, j m is independent of both ak, j and ak, i m. Therefore:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ak;iak;j m ak;i mak;j ¼ |
ak;iak;j m |
ak;i mak;j; i 6¼j |
|
|
|
|||||||||||
Due to the independence |
of different |
symbols of the same sequence |
|
|
¼ |
||||||||||||||||
ak, iak, j m |
|||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||||||
|
|
|
|
¼ 0, whenever |
i 6¼j m, |
and ak, i mak, j ¼ ak, i m ak, j ¼ 0, whenever |
|||||||||||||||
ak, i |
ak, j m |
||||||||||||||||||||
i m 6¼j. Hence, addends |
of the double sum above with different i, j |
may appear |
non-zero only if both equations are true: i ¼ j m and i m ¼ j, which is impossible for any non-zero m. Consequently, only summands with equal i and j produce non-zero contribution, and:
jzkkðm 6¼0Þj2 ¼ |
N 1 |
ak;i |
2 |
|
ak;i m |
|
2 |
¼ N |
|
|
|
X |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
i¼0
The useful effect, i.e. the power, created by the non-shifted kth signature at the kth receiver output:
jzkkð0Þj2¼ |
N 1 |
ak;i |
|
2 |
¼ N2 |
|
X |
|
|
|
|
|
|
|
|
|
|
i¼0
Then the normalized unwanted effects created by either MAI or multipath interference (unwanted squared correlations):
jzklðmÞj2 |
1 |
; |
jzkkðm 6¼0Þj2 |
|
1 |
ð |
7:40 |
Þ |
|
jzkkð0Þj2 ¼ |
N |
jzkkð0Þj2 |
¼ |
N |
|||||
|
|

Spread spectrum signature ensembles |
231 |
|
|
It is clearly seen now that all unwanted squared correlations in the ensemble under consideration attain the lower bound (7.35), i.e. sets of random signatures are optimal when the number of users is around ten or more. It is extremely important to emphasize that the data modulation of random sequences meeting (7.37) (multiplying them by data symbols independent of them) does not destroy (7.37) (see Problem 7.20). Therefore, the presence or absence of modulation does not affect all of the derivations above, as well as the final result (7.40) and conclusion on the set optimality.
Equations (7.37) seem to give an unequivocal instruction for designing signature ensembles. In practice, however, signatures cannot be random, since the receiver should be a priori aware of the signature modulation law in order to generate the necessary correlator reference. To realize the randomness properties (7.37) by the deterministic coding rules, so-called pseudorandom sequences are necessary.
Take the deterministic PSK signature of period L and treat it as though it is one of several equiprobable realizations of a stationary ergodic random sequence fak, ig (random discrete-time process) [14,66]. The other realizations may be all cyclic shifts of the initial sequence. Then, due to the ergodicity property, each realization presents the whole random process exhaustively, and statistical averaging fak, ig over all realizations is equivalent to time averaging, i.e. evaluating the expectation ak, i and correlation moment ak, iak, i m via constant component and periodic ACF of the deterministic signature, respectively:
1 |
L 1 |
a~k;0 |
1 |
L 1 |
|
||||||
|
|
|
X |
|
|
|
|
|
X |
|
|
|
¼ |
|
i¼0 ak;i ¼ |
|
; |
ak;iak;i m ¼ |
|
i¼0 ak;iak;i m ¼ kkðmÞ |
ð7:41Þ |
||
ak;i |
|||||||||||
L |
L |
L |
In the same way, treating two deterministic signatures as realizations of two jointly ergodic random sequences fak, ig and fal, ig, we have equality between the correlation moments of two random sequences and CCF of two deterministic signatures:
1 |
L 1 |
|
||
|
|
|
X |
|
ak;ial;i m ¼ |
|
i¼0 ak;ial;i m ¼ klðmÞ |
ð7:42Þ |
|
L |
The comparison of (7.41) and (7.42) with (7.37) sets a criterion of pseudorandomness: to serve as signatures in asynchronous DS CDMA all the deterministic sequences of the ensemble should ideally have zero constant component, perfect periodic ACF and zero periodic CCF:
a~k;0 ¼ 0; kkðmÞ ¼ 0; m 6¼0 modL; klðmÞ ¼ 0; k; l ¼ 1; 2; . . . ; K |
ð7:43Þ |
In the case of unconstrained mutual time shifts (any m in the range 0, 1, . . . , L 1 are probable) the last demands obviously contradict each other, making ensembles of this sort hypothetical for any finite L. Indeed (see also Problem 7.21), the requirements for perfect ACF and zero CCF mean nothing but zero level of correlations between all cyclic shifts of K sequences of period L, i.e. zero value of the average of unwanted squared correlations 2. As (7.34) and (7.35) show, this is impossible with K 2, and in particular with many users 2 cannot fall smaller than 1/L.