Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Шумов задачи и учебник / [Valeri_P._Ipatov]_Spread_Spectrum_and_CDMA_Princ(Bookos.org).pdf
Скачиваний:
93
Добавлен:
15.04.2015
Размер:
3.46 Mб
Скачать

Spread spectrum signature ensembles

235

 

 

(see (7.40)) level of average power of MAI and multipath interference at the correlator output.

7.5 Examples of minimax signature ensembles

The signature ensembles considered in the previous section may be regarded as adequate only in situations where mutual time shifts of users’ signals are entirely controllable by the system and may be kept within the predicted range. If this is not the case, asynchronous CDMA based on shifted replicas of the same sequence risks collisions: the signal of one user may acquire delay, making it indistinguishable from the signal of some other user. This may be the reason for employing minimax signature ensembles, i.e. those whose correlation peaks achieve or approach bounds (7.45) or (7.46). Since the correlation peak of a minimax ensemble is maximized over the whole period, its small value (achievable at the cost of long enough length L) secures the proximity of ensemble correlation properties to the perfect ones (7.43), guaranteeing pseudorandomness of signatures.

A survey of all known minimax ensembles would take a lot of space, so we will confine ourselves to a brief discussion of those that either enjoy wider practical application or seem more indicative among others. Readers interested in learning more about them may consult [9,67,70].

7.5.1 Frequency-offset binary m-sequences

Take a binary f 1g m-sequence fa1, ig of period L ¼ 2n 1 and use it as a signature for the first user. The rest of the K 1 signatures are generated by a symbol-wise multiplication of fa1, ig with discrete harmonics of frequencies (k 1)/L, k ¼ 2, 3, . . . , K:

 

ak;i ¼ a1;i exp j

2 ðk 1Þi

; i ¼ . . . ; 1; 0; 1; . . . ; k ¼ 1; 2; . . . ; K:

ð7:48Þ

 

L

Thus the squared modulus of the periodic CCF of the kth and lth sequences is:

 

 

 

Rp;klðmÞ 2¼

L 1 ak;ial;i m 2¼

L 1 a1;ia1;i m exp

j

2 ðk lÞi

2

ð7:49Þ

 

 

 

L

 

 

 

 

 

 

 

i¼0

 

i¼0

 

 

 

 

 

 

 

 

 

 

 

 

X

 

X

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

2

¼

12.

Then, if k

l (7.49) gives

Consider first the case m ¼ 0 modL, i.e. a1, ia1, i m ¼ ja1, ij

2

. If k

¼

 

the mainlobe of the ACF of the kth signature, i.e. Rp, kk(0)

¼ L

6¼l, the sum in

(7.49) is the sum of all roots of unity of degree L and

equals

zero (see Section 6.11.2).

Now let

m

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

0 modL. Then according to the shift-and-add property (Section 6.11) of

the m-sequence, a1, ia1, i m ¼ a1, i t

for some t, and the squared CCF modulus:

 

Rp;klðmÞ

 

2¼ L 1 a1;i t exp

j

2 ðk lÞi

2

¼ L 1 a1;i

exp j

2 ðk lÞi

2

 

 

L

L

 

 

 

 

 

i¼0

 

 

 

i¼0

 

 

 

 

 

 

 

 

 

X

 

 

 

 

X

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

236 Spread Spectrum and CDMA

which is the (k l)th component of the DFT energy spectrum of the sequence fa1, ig. Since the energy spectrum of fa1, ig is the DFT of its periodic ACF, and the ACF equals1 everywhere except at the zero point, where it is equal to L, we have:

 

R

p;klð Þ

 

2

¼ m 0

p;11

ð

Þ

exp

 

ð

L

¼

L

þ

1

m 0

 

L

 

 

 

 

 

 

X

 

 

 

 

 

 

 

 

 

 

 

 

X

 

 

 

 

 

 

 

 

¼

 

 

 

 

 

 

 

 

 

 

 

 

¼

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

The last sum differs from zero and equals L only for k ¼ l, so that collecting all the results together and passing over to normalized correlations gives:

 

 

 

 

8

11; k ¼ l; m ¼ 0 modL

 

 

 

 

>

 

 

 

; k

¼

l; m

0 modL

 

 

 

2

> L

 

 

 

 

 

 

p;kl m

 

 

>

 

 

 

 

 

 

 

 

 

 

 

 

>

 

 

 

 

 

 

 

 

 

 

 

 

 

>

 

 

 

 

 

 

 

 

 

 

ð

Þ ¼

>

0; k

 

 

l; m

0 modL

 

>

 

 

 

 

 

 

>

 

 

 

 

 

 

 

 

 

 

 

 

 

<

 

 

 

 

¼

 

 

 

 

 

>

 

L

þ

1

; k

l; m 0 modL

 

 

 

 

>

 

 

 

 

 

 

 

 

 

 

>

 

L

2

 

 

 

 

 

 

>

 

 

 

 

 

 

 

 

>

 

 

 

 

 

 

 

 

 

 

 

 

 

>

 

 

 

 

 

 

 

 

 

 

 

 

 

>

 

 

 

 

 

 

 

 

 

 

 

 

 

>

 

 

 

 

 

 

 

 

 

 

 

 

 

:

 

 

 

 

 

 

 

 

 

It is seen now that the squared correlation peak of the ensemble (7.48):

2max ¼ LLþ2 1 L1

i.e. practically coincides with the Welch bound (7.45). Thus, the ensemble under scrutiny is a minimax one, realizing the optimal asynchronous CDMA mode.

The description of the above ensemble one may find, e.g. in [71], yet earlier and independently it was used in the global satellite-based navigation system GLONASS (see Section 11.2). One of the advantages of this signature set versus other polyphase ones is the possibility of generating signatures by a simple offset of carrier frequency. Indeed, incrementing the carrier frequency f0 by (k 1)/LD is equivalent to a linear phase progression between adjacent chips equalling 2 (k 1)/L, which is exactly what is prescribed by the rule (7.48).

Despite many other minimax polyphase ensembles being known, the binary f 1g ones are traditionally considered more attractive from a hardware point of view, and the rest of this section is dedicated to some important examples of binary signature sets.

7.5.2 Gold sets

The following properties of binary f 1g m-sequences may serve to explaining the set construction found by Gold:

1.If a binary f 1g m-sequence fuig of period L ¼ 2n 1 is decimated with the decimation index d, where d is co-prime to L, the resulting sequence fvig is again a binary m-sequence of the same period. To decimate means to pick out every dth symbol of fuig and write symbols thus obtained one by one, so that vi ¼ udi. We call the sequence fvig produced this way a decimation of fuig.

Spread spectrum signature ensembles

237

 

 

2.Let the memory n of a binary m-sequence fuig be odd and in the decimation index d ¼ 2s þ 1 s be co-prime to n. Then d is co-prime to the length L ¼ 2n 1 of fuig, the decimation fvig is an m-sequence of the same period L, and the non-normalized periodic CCF Rp, uv(m) of fuig, fvig takes only three values:

 

f p

nþ1

 

 

Rp;uvðmÞ 2

2ðL þ 1Þ 1; 1g ¼ f 2

2

1; 1g; m ¼ 0; 1; . . . ; L 1

ð7:50Þ

3.Let the memory n of a binary m-sequence fuig be even, but not a multiple of four, and in the decimation index d ¼ 2s þ 1 s be even and co-prime to n/2. Then d is co-prime to the length L ¼ 2n 1 of fuig, the decimation fvig is an m-sequence of the same period L, and the non-normalized periodic CCF Rp, uv(m) of fuig, fvig takes only three values:

 

2 1; 1g; m ¼ 0; 1; . . . ; L 1 ð7:51Þ

Rp;uvðmÞ 2 f 2pL þ 1 1; 1g ¼ f 22

Proof of these propositions is rather sophisticated and demands more insight into the algebra of extension finite fields. We leave it aside and refer the interested reader to the original paper by Gold [72] or other sources (e.g. [9,70]).

Now take a pair of m-sequences, fuig and its decimation fvig, satisfying the conditions of item 2 or 3 above and form the ensemble of K signatures by the rule:

ak;i ¼ uivi k; k ¼ 1; 2; . . .

; L

aLþ1;i ¼ ui

ð7:52Þ

aLþ2;i ¼ vi

 

where i ¼ . . . , 1, 0, 1, . . .. Expressing this in words, we build up L signatures multiplying symbol-wise fuig with cyclic replicas of fvig, and two more signatures are initial m-sequences themselves. In total, therefore, we may have up to K ¼ L þ 2 ¼ 2n þ 1 signatures. In practice, the f 1g m-sequence is traditionally generated as a binary {0,1} sequence, i.e. over GF(2) using an LFSR generator, with a subsequent mapping of elements of GF(2) onto the real pair f 1g (see Sections 6.6 and 6.7). Thus, to implement (7.52) two n-cell LFSRs may be used, generating {0,1} predecessors fu0ig and fv0ig of fuig and fvig. Instead of multiplication of fuig with fvi kg their predecessors may be added modulo 2 with a subsequent mapping of the result onto f 1g: uivi k ¼ ( 1)u0i þv0i k . Figure 7.18 illustrates the implementation of the Gold construction according to the above description.

LFSR

{u′}

 

 

 

 

Mapping

{aL + 1,i}

i

 

 

 

 

 

 

memory n

 

 

 

 

 

 

 

 

onto {±1}

{ak,i},1 ≤ k ≤ L

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Delay

 

+

 

 

Mapping

 

 

 

 

k clocks

 

 

 

onto {±1}

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

mod2

 

 

 

{aL + 2,i}

 

 

 

 

 

 

 

 

 

LFSR

 

 

 

 

 

 

 

 

Mapping

 

 

 

 

 

 

 

 

 

 

memory n

{vi′}

 

 

 

 

onto {±1}

 

 

Figure 7.18 Generating Gold sequences

238

Spread Spectrum and CDMA

 

 

Let us estimate the correlation peak of the Gold ensemble, beginning by calculating correlations of the first L sequences:

L 1

L 1

X

X

Rp;klðmÞ ¼

ak;ial;i m ¼ uiui mvi kvi l m

i¼0

i¼0

It is seen that since the case m ¼ 0 modL and k ¼ l corresponds to the mainlobe of the kth ACF, the situation should be analysed where these equalities are not fulfilled simultaneously. But then either both uiui m and vi kvi l m are just some other shifts of the initial sequences fuig, fvig, or only one of those products is a sequence consisting of only ones. In the first case we have the CCF of the initial m-sequences fuig, fvig taking on only the three values indicated by (7.50) or (7.51), while in the second we have the non-normalized ACF sidelobe of one of the sequences fuig, fvig, i.e. 1.

Consider now the CCF of fak, ig, k ¼ 1, 2, . . . , L and fal, ig, l ¼ L þ 1:

L 1

X

Rp;klðmÞ ¼ uiui mvi k i¼0

If m ¼ 0 modL, uiui m ¼ 1 and the CCF is simply a constant component of fvig, i.e. 1. Otherwise uiui m ¼ ui s for some s and we have the CCF of initial m-sequences obeying the restrictions (7.50) or (7.51). The same is true for the CCF of fak, ig, k ¼ 1, 2, . . . , L and fal, ig, l ¼ L þ 2.

Finally, the CCF of faLþ1, ig and faLþ2, ig is directly the CCF of the initial m-sequences, while their autocorrelation functions, like those of m-sequences, have non-normalized ACF sidelobes equalling 1. Collecting all of the results together, we see that the correlation peak (7.44) of the Gold set is determined by the maximal in modulus value of the original CCF (7.50) or (7.51). After normalizing it to the length L we come to the estimation:

 

 

8

 

ð

 

 

 

 

 

 

 

;

 

;

 

 

 

2

 

 

 

L2

 

 

 

 

2

 

8

L

7:53

max

 

>

p

 

 

 

n 0 mod2

 

2

; n 0 mod2

 

 

>

 

2 L þ 1Þ þ 1

 

 

>

 

 

¼

 

 

 

 

 

 

2

 

 

 

 

 

 

4

ð Þ

 

>

 

 

 

 

 

 

 

 

 

 

 

 

 

 

>

 

 

 

 

 

 

 

 

 

 

 

 

 

>

 

 

 

 

 

<

 

2pL

1

 

1

 

 

 

 

 

¼

 

 

<

 

 

 

 

 

>

 

 

 

 

 

 

 

 

 

>

 

 

 

 

 

>

 

 

þ2

þ

 

 

 

 

 

 

 

 

 

>

 

; n ¼ 2 mod4

 

 

 

>

 

 

 

 

 

 

 

 

 

 

 

:

 

 

 

 

>

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

L

with the last approximation corresponding to large length L 1. As is seen, for any odd memory n Gold signature ensembles asymptotically (L 1) attain the Sidelnikov lower bound (7.46), while for the case of even n not divisible by four their loss in max against this bound is about 3 dB.3

3 When n ¼ 0 mod4 a Gold ensemble also exists with the same correlation peak as in the case n ¼ 2 mod4, but with number of sequences smaller by one [67,70].