
- •Contents
- •Preface
- •1 Spread spectrum signals and systems
- •1.1 Basic definition
- •1.2 Historical sketch
- •2 Classical reception problems and signal design
- •2.1 Gaussian channel, general reception problem and optimal decision rules
- •2.2 Binary data transmission (deterministic signals)
- •2.3 M-ary data transmission: deterministic signals
- •2.4 Complex envelope of a bandpass signal
- •2.5 M-ary data transmission: noncoherent signals
- •2.6 Trade-off between orthogonal-coding gain and bandwidth
- •2.7 Examples of orthogonal signal sets
- •2.7.1 Time-shift coding
- •2.7.2 Frequency-shift coding
- •2.7.3 Spread spectrum orthogonal coding
- •2.8 Signal parameter estimation
- •2.8.1 Problem statement and estimation rule
- •2.8.2 Estimation accuracy
- •2.9 Amplitude estimation
- •2.10 Phase estimation
- •2.11 Autocorrelation function and matched filter response
- •2.12 Estimation of the bandpass signal time delay
- •2.12.1 Estimation algorithm
- •2.12.2 Estimation accuracy
- •2.13 Estimation of carrier frequency
- •2.14 Simultaneous estimation of time delay and frequency
- •2.15 Signal resolution
- •2.16 Summary
- •Problems
- •Matlab-based problems
- •3 Merits of spread spectrum
- •3.1 Jamming immunity
- •3.1.1 Narrowband jammer
- •3.1.2 Barrage jammer
- •3.2 Low probability of detection
- •3.3 Signal structure secrecy
- •3.4 Electromagnetic compatibility
- •3.5 Propagation effects in wireless systems
- •3.5.1 Free-space propagation
- •3.5.2 Shadowing
- •3.5.3 Multipath fading
- •3.5.4 Performance analysis
- •3.6 Diversity
- •3.6.1 Combining modes
- •3.6.2 Arranging diversity branches
- •3.7 Multipath diversity and RAKE receiver
- •Problems
- •Matlab-based problems
- •4 Multiuser environment: code division multiple access
- •4.1 Multiuser systems and the multiple access problem
- •4.2 Frequency division multiple access
- •4.3 Time division multiple access
- •4.4 Synchronous code division multiple access
- •4.5 Asynchronous CDMA
- •4.6 Asynchronous CDMA in the cellular networks
- •4.6.1 The resource reuse problem and cellular systems
- •4.6.2 Number of users per cell in asynchronous CDMA
- •Problems
- •Matlab-based problems
- •5 Discrete spread spectrum signals
- •5.1 Spread spectrum modulation
- •5.2 General model and categorization of discrete signals
- •5.3 Correlation functions of APSK signals
- •5.4 Calculating correlation functions of code sequences
- •5.5 Correlation functions of FSK signals
- •5.6 Processing gain of discrete signals
- •Problems
- •Matlab-based problems
- •6 Spread spectrum signals for time measurement, synchronization and time-resolution
- •6.1 Demands on ACF: revisited
- •6.2 Signals with continuous frequency modulation
- •6.3 Criterion of good aperiodic ACF of APSK signals
- •6.4 Optimization of aperiodic PSK signals
- •6.5 Perfect periodic ACF: minimax binary sequences
- •6.6 Initial knowledge on finite fields and linear sequences
- •6.6.1 Definition of a finite field
- •6.6.2 Linear sequences over finite fields
- •6.6.3 m-sequences
- •6.7 Periodic ACF of m-sequences
- •6.8 More about finite fields
- •6.9 Legendre sequences
- •6.10 Binary codes with good aperiodic ACF: revisited
- •6.11 Sequences with perfect periodic ACF
- •6.11.1 Binary non-antipodal sequences
- •6.11.2 Polyphase codes
- •6.11.3 Ternary sequences
- •6.12 Suppression of sidelobes along the delay axis
- •6.12.1 Sidelobe suppression filter
- •6.12.2 SNR loss calculation
- •6.13 FSK signals with optimal aperiodic ACF
- •Problems
- •Matlab-based problems
- •7 Spread spectrum signature ensembles for CDMA applications
- •7.1 Data transmission via spread spectrum
- •7.1.1 Direct sequence spreading: BPSK data modulation and binary signatures
- •7.1.2 DS spreading: general case
- •7.1.3 Frequency hopping spreading
- •7.2 Designing signature ensembles for synchronous DS CDMA
- •7.2.1 Problem formulation
- •7.2.2 Optimizing signature sets in minimum distance
- •7.2.3 Welch-bound sequences
- •7.3 Approaches to designing signature ensembles for asynchronous DS CDMA
- •7.4 Time-offset signatures for asynchronous CDMA
- •7.5 Examples of minimax signature ensembles
- •7.5.1 Frequency-offset binary m-sequences
- •7.5.2 Gold sets
- •7.5.3 Kasami sets and their extensions
- •7.5.4 Kamaletdinov ensembles
- •Problems
- •Matlab-based problems
- •8 DS spread spectrum signal acquisition and tracking
- •8.1 Acquisition and tracking procedures
- •8.2 Serial search
- •8.2.1 Algorithm model
- •8.2.2 Probability of correct acquisition and average number of steps
- •8.2.3 Minimizing average acquisition time
- •8.3 Acquisition acceleration techniques
- •8.3.1 Problem statement
- •8.3.2 Sequential cell examining
- •8.3.3 Serial-parallel search
- •8.3.4 Rapid acquisition sequences
- •8.4 Code tracking
- •8.4.1 Delay estimation by tracking
- •8.4.2 Early–late DLL discriminators
- •8.4.3 DLL noise performance
- •Problems
- •Matlab-based problems
- •9 Channel coding in spread spectrum systems
- •9.1 Preliminary notes and terminology
- •9.2 Error-detecting block codes
- •9.2.1 Binary block codes and detection capability
- •9.2.2 Linear codes and their polynomial representation
- •9.2.3 Syndrome calculation and error detection
- •9.2.4 Choice of generator polynomials for CRC
- •9.3 Convolutional codes
- •9.3.1 Convolutional encoder
- •9.3.2 Trellis diagram, free distance and asymptotic coding gain
- •9.3.3 The Viterbi decoding algorithm
- •9.3.4 Applications
- •9.4 Turbo codes
- •9.4.1 Turbo encoders
- •9.4.2 Iterative decoding
- •9.4.3 Performance
- •9.4.4 Applications
- •9.5 Channel interleaving
- •Problems
- •Matlab-based problems
- •10 Some advancements in spread spectrum systems development
- •10.1 Multiuser reception and suppressing MAI
- •10.1.1 Optimal (ML) multiuser rule for synchronous CDMA
- •10.1.2 Decorrelating algorithm
- •10.1.3 Minimum mean-square error detection
- •10.1.4 Blind MMSE detector
- •10.1.5 Interference cancellation
- •10.1.6 Asynchronous multiuser detectors
- •10.2 Multicarrier modulation and OFDM
- •10.2.1 Multicarrier DS CDMA
- •10.2.2 Conventional MC transmission and OFDM
- •10.2.3 Multicarrier CDMA
- •10.2.4 Applications
- •10.3 Transmit diversity and space–time coding in CDMA systems
- •10.3.1 Transmit diversity and the space–time coding problem
- •10.3.2 Efficiency of transmit diversity
- •10.3.3 Time-switched space–time code
- •10.3.4 Alamouti space–time code
- •10.3.5 Transmit diversity in spread spectrum applications
- •Problems
- •Matlab-based problems
- •11 Examples of operational wireless spread spectrum systems
- •11.1 Preliminary remarks
- •11.2 Global positioning system
- •11.2.1 General system principles and architecture
- •11.2.2 GPS ranging signals
- •11.2.3 Signal processing
- •11.2.4 Accuracy
- •11.2.5 GLONASS and GNSS
- •11.2.6 Applications
- •11.3 Air interfaces cdmaOne (IS-95) and cdma2000
- •11.3.1 Introductory remarks
- •11.3.2 Spreading codes of IS-95
- •11.3.3 Forward link channels of IS-95
- •11.3.3.1 Pilot channel
- •11.3.3.2 Synchronization channel
- •11.3.3.3 Paging channels
- •11.3.3.4 Traffic channels
- •11.3.3.5 Forward link modulation
- •11.3.3.6 MS processing of forward link signal
- •11.3.4 Reverse link of IS-95
- •11.3.4.1 Reverse link traffic channel
- •11.3.4.2 Access channel
- •11.3.4.3 Reverse link modulation
- •11.3.5 Evolution of air interface cdmaOne to cdma2000
- •11.4 Air interface UMTS
- •11.4.1 Preliminaries
- •11.4.2 Types of UMTS channels
- •11.4.3 Dedicated physical uplink channels
- •11.4.4 Common physical uplink channels
- •11.4.5 Uplink channelization codes
- •11.4.6 Uplink scrambling
- •11.4.7 Mapping downlink transport channels to physical channels
- •11.4.8 Downlink physical channels format
- •11.4.9 Downlink channelization codes
- •11.4.10 Downlink scrambling codes
- •11.4.11 Synchronization channel
- •11.4.11.1 General structure
- •11.4.11.2 Primary synchronization code
- •11.4.11.3 Secondary synchronization code
- •References
- •Index

10
Some advancements in spread spectrum systems development
10.1 Multiuser reception and suppressing MAI
In Section 4.1 we met two options for making decisions on the data in a K-user CDMA system. One of them runs the optimal (ML) procedure realized by the so-called multiuser receiver, while the other involves a single-user or conventional procedure. The conventional receiver treats MAI as no more than an additional random noise, fully ignoring the deterministic nature of signatures and correlations between them. On the other hand, multiuser algorithms utilize a priori knowledge about signature codes or, at least, their ensemble correlation properties. In this section we are going to discuss briefly the ideas underlying multiuser reception, starting with the simplest case of synchronous CDMA.
10.1.1 Optimal (ML) multiuser rule for synchronous CDMA
In order to make the discussion free of secondary details let us consider the plainest, yet general enough, model of K-user DS CDMA involving real signatures and BPSK data transmission. The model covers, among others, any system with BPSK signature and data modulation. As in Section 7.2, within this subsection we consider a fully synchronous case when both chips and borders of data symbols (bits) of all users are strictly aligned in time. This, along with the assumption of the independence of consecutive data bits of any user, permits limiting the observation interval to a single bit duration: T ¼ Tb. Then the group signal of K users:
K
X
sðt;bÞ ¼ |
AkbkskðtÞ |
ð10:1Þ |
|
k¼1 |
|
Spread Spectrum and CDMA: Principles and Applications Valery P. Ipatov
2005 John Wiley & Sons, Ltd
308 |
Spread Spectrum and CDMA |
|
|
where, similarly to (4.1), Ak > 0 is the real |
amplitude of the kth user signal, |
b ¼ (b1, b2, . . . , bK ) is the vector of data bits of K users (bit pattern) and sk(t) is the kth user’s signature.
As was mentioned in Section 4.1, the globally optimal (ML) procedure involves
^ |
^ |
^ |
^ |
2data bits pattern b as the value |
searching the estimate b |
¼ (b1 |
, b2 |
, . . . , bK ) of the K user |
of b minimizing the Euclidean distance (or its square d (s, y)) between the observation y(t) and group signal (10.1). Calculating d2(s, y) in the same way as in (4.3) results in:
d2ðs; yÞ ¼ |
ZT ½ yðtÞ sðt; bÞ&2 dt ¼ kyk2 2 kK1 Akbkzk þ kK |
1 |
l K1 |
AkAlbkbl kl ð10:2Þ |
||
|
|
X |
X X |
|||
|
0 |
¼ |
¼ |
|
¼ |
|
where |
|
|
|
|
|
|
|
|
zk ¼ Z0T yðtÞskðtÞ dt |
|
|
|
ð10:3Þ |
is, as usual, correlation of the observation y(t) with the kth signature, kl is the correlation coefficient of the kth and lth signatures, and the presence of amplitudes Ak allows use of a convenient normalization of signatures:
ZT
Ek ¼ kskk2¼ s2kðtÞ dt ¼ 1; k ¼ 1; 2; . . . K
0
Let us introduce two matrices: G ¼ diag(A1, A2, . . . , AK ), a diagonal K K matrix of users’ amplitudes, and C ¼ [ kl], k, l ¼ 1, 2, . . . , K, the correlation matrix of signatures. With designation z ¼ (z1, z2, . . . , zK ) for the vector of correlations (10.3), the squared distance (10.2) becomes (superscript T symbolizing vector–matrix transpose):
d2ðs; yÞ ¼ kyk2 2bGzT þ bGCGbT |
ð10:4Þ |
The first term in the right-hand side of (10.4) is fixed with a current observation y(t) and
consequently the ML estimate |
^ |
may be found as the value of b |
maximizing the |
||||||||||||||
b |
|||||||||||||||||
difference of two other terms: |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
^ |
T |
^ |
|
^T |
¼ |
b ð |
|
T |
|
|
T |
Þ |
ð |
|
: |
|
Þ |
2bGz |
|
bGCGb |
2bGz |
|
bGCGb |
|
10 |
5 |
|||||||||
|
max |
|
|
|
|
|
|
|
When a CDMA system is not oversaturated (K N; see Section 7.2), all signatures are allowed to be orthogonal, so that kl ¼ kl and C ¼ IK , where IK is the Kth order identity
matrix. Then bGCGbT ¼ PK¼ A2 does not depend on the user’s bit pattern b. As was
k 1 k
noted in Section 4.1, multiuser detecting then degenerates into a conventional one, where
^
the sign of the correlation zk defines the estimate bk of the kth user’s bit bk. In the case of non-orthogonal signatures (e.g. oversaturated CDMA, K > N) the conventional receiver yields to the ML one, but the latter may appear prohibitively complex. Indeed, the data vector b is strictly restrained by the BPSK alphabet limitation bk ¼ 1, and no
Spread spectrum systems development |
309 |
|
|
procedure exists that is more computationally efficient than just trying all 2K possible bit patterns and comparing the results of their substitution to the right-hand side of (10.5). Therefore, ML multiuser detection according to (10.5) has exponential complexity versus the number of users (see numerical example in Section 4.1). On the other hand, the motivation to involve multiuser detection is often strongest when the number of users is so great that conventional detection fails due to the high level of MAI. This explains the interest in various quasi-optimal multiuser algorithms, some of which are surveyed in the rest of the section.
10.1.2 Decorrelating algorithm
Let us start with a conventional (i.e. correlation-based) receiver of user number one’s data. According to (10.1) the observation:
K
X
yðtÞ ¼ sðt; bÞ þ nðtÞ ¼ AkbkskðtÞ þ nðtÞ |
ð10:6Þ |
k¼1 |
|
This, after substitution to (10.3), where k ¼ 1, leads to: |
|
K |
|
X |
ð10:7Þ |
z1 ¼ A1b1 þ Akbk k1 þ n1 |
k¼2
where n1 ¼ R0T n(t)s1(t) dt is a noise sample at the first correlator output. The second term of (10.7) is MAI, and the question is whether it may be suppressed to zero by means of some linear transform of the input observation. Whatever this linear operation is, finally we should have some MAI-free substitute &1 of z1, i.e. the scalar, producing the decision on the first user’s current bit as:
^ |
¼ signð&1Þ |
ð10:8Þ |
b1 |
Any linear operation transforming y(t) into a scalar may be described as correlation:
ZT
&1 ¼ yðtÞuðtÞ dt ð10:9Þ
0
differing from (10.3) by only a reference signal u(t). Therefore, we are going to suppress MAI declining matched reference s1(t) in favour of mismatched one u(t), i.e. at the cost of loss in SNR with respect to a thermal noise. We have already resorted to this trick when seeking zero-forcing filters to remove autocorrelation sidelobes (see Section 6.12). Using (10.6) in (10.9) replaces (10.7) by:
K
X
&1 ¼ A1b1 1u þ Akbk ku þ n10 |
ð10:10Þ |
k¼2 |
|
310 |
Spread Spectrum and CDMA |
|
|
where ku is the correlation coefficient of the kth signature with u(t), normalization
of reference u(t) is the same as for signatures, and n01 ¼ RT n(t)u(t) dt is a noise contri-
0
bution in &1.
Let us put signatures and a reference signal u(t) in the form (2.50) typical of DS CDMA with real-valued signatures:
N 1 |
N 1 |
|
X |
X |
ð10:11Þ |
skðtÞ ¼ ak;is0ðt iDÞ; uðtÞ ¼ |
uis0ðt iDÞ |
|
i¼0 |
i¼0 |
|
where ui, i ¼ 0, 1, . . . , N 1 is a real code sequence of the reference u(t). Using the vector notation of code sequences ak ¼ (ak, 0, ak, 1, . . . , ak, N 1), u ¼ (u0, u1, . . . , uN 1) (see Section 7.2) and setting with no lost of generality chip energy E0 ¼ 1, we come to equationskl ¼ (ak, al) ¼ akaTl , ku ¼ (ak, u) ¼ akuT . To remove the MAI term in (10.10) independently of amplitudes and bits of interfering users we need to fulfil K 1 conditions:ku ¼ 0, k 2. In other words, the reference code u should be a solution of the linear equation set akuT ¼ uaTk ¼ 0, k ¼ 2, 3, . . . K. Preserving the non-zero useful effect 1u has to be non-zero, hence u is just a properly scaled solution v of the equation:
|
|
|
|
|
|
vA ¼ e1 |
ð10:12Þ |
where |
columns |
of the N |
|
K signature matrix |
A are signature code vectors: |
||
T |
T |
, . . . |
T |
|
|
||
A ¼ (a1 |
, a2 |
, aK ) and e1 |
is a K-dimensional vector of the view e1 ¼ (1, 0, 0, . . . , 0). |
When all signature vectors are linearly independent, the system (10.12) may have a set of solutions, but among all vectors v satisfying (10.12) we choose the one that is a linear combination of signatures, i.e. rows of AT : v ¼ xAT , where x is an unknown K-dimensional row vector. The reason for such a choice is that inclusion in v of any component orthogonal to the space of the signature vectors will only increase the norm of v, i.e. the noise component at the correlator output, with no increase of the useful first term in (10.10). With this substitution (10.12) becomes:
xAT A ¼ xC ¼ e1
Linear independence of signatures (columns of A) means rank K of the correlation
K K matrix C ¼ AT A, i.e. its invertibility and uniqueness of solution of the equation above: x ¼ e1C 1. Then:
v ¼ xAT ¼ e1C 1AT ¼ e1ðAT AÞ 1AT |
ð10:13Þ |
is a desired solution of (10.12), whose scaling u ¼ v/kvk results in the normalized decorrelation reference u, so that uaT1 ¼ 1u. This normalization is practically unnecessary, having no effect on the sign of &1 in the decision rule (10.8).
Physically the reference vector (10.13) is just orthogonal to all signatures but the first, entirely eliminating MAI at the output of a correlator tuned to the first user’s signal. We would find the reference signal for the kth user’s receiver in the same way, replacing e1 in (10.13) by ek, whose unique non-zero component is the kth one.
The main drawback of the described decorrelating receiver is its working capacity with only linearly independent signatures. If this demand is not observed, any attempt to