
- •Contents
- •Preface
- •1 Spread spectrum signals and systems
- •1.1 Basic definition
- •1.2 Historical sketch
- •2 Classical reception problems and signal design
- •2.1 Gaussian channel, general reception problem and optimal decision rules
- •2.2 Binary data transmission (deterministic signals)
- •2.3 M-ary data transmission: deterministic signals
- •2.4 Complex envelope of a bandpass signal
- •2.5 M-ary data transmission: noncoherent signals
- •2.6 Trade-off between orthogonal-coding gain and bandwidth
- •2.7 Examples of orthogonal signal sets
- •2.7.1 Time-shift coding
- •2.7.2 Frequency-shift coding
- •2.7.3 Spread spectrum orthogonal coding
- •2.8 Signal parameter estimation
- •2.8.1 Problem statement and estimation rule
- •2.8.2 Estimation accuracy
- •2.9 Amplitude estimation
- •2.10 Phase estimation
- •2.11 Autocorrelation function and matched filter response
- •2.12 Estimation of the bandpass signal time delay
- •2.12.1 Estimation algorithm
- •2.12.2 Estimation accuracy
- •2.13 Estimation of carrier frequency
- •2.14 Simultaneous estimation of time delay and frequency
- •2.15 Signal resolution
- •2.16 Summary
- •Problems
- •Matlab-based problems
- •3 Merits of spread spectrum
- •3.1 Jamming immunity
- •3.1.1 Narrowband jammer
- •3.1.2 Barrage jammer
- •3.2 Low probability of detection
- •3.3 Signal structure secrecy
- •3.4 Electromagnetic compatibility
- •3.5 Propagation effects in wireless systems
- •3.5.1 Free-space propagation
- •3.5.2 Shadowing
- •3.5.3 Multipath fading
- •3.5.4 Performance analysis
- •3.6 Diversity
- •3.6.1 Combining modes
- •3.6.2 Arranging diversity branches
- •3.7 Multipath diversity and RAKE receiver
- •Problems
- •Matlab-based problems
- •4 Multiuser environment: code division multiple access
- •4.1 Multiuser systems and the multiple access problem
- •4.2 Frequency division multiple access
- •4.3 Time division multiple access
- •4.4 Synchronous code division multiple access
- •4.5 Asynchronous CDMA
- •4.6 Asynchronous CDMA in the cellular networks
- •4.6.1 The resource reuse problem and cellular systems
- •4.6.2 Number of users per cell in asynchronous CDMA
- •Problems
- •Matlab-based problems
- •5 Discrete spread spectrum signals
- •5.1 Spread spectrum modulation
- •5.2 General model and categorization of discrete signals
- •5.3 Correlation functions of APSK signals
- •5.4 Calculating correlation functions of code sequences
- •5.5 Correlation functions of FSK signals
- •5.6 Processing gain of discrete signals
- •Problems
- •Matlab-based problems
- •6 Spread spectrum signals for time measurement, synchronization and time-resolution
- •6.1 Demands on ACF: revisited
- •6.2 Signals with continuous frequency modulation
- •6.3 Criterion of good aperiodic ACF of APSK signals
- •6.4 Optimization of aperiodic PSK signals
- •6.5 Perfect periodic ACF: minimax binary sequences
- •6.6 Initial knowledge on finite fields and linear sequences
- •6.6.1 Definition of a finite field
- •6.6.2 Linear sequences over finite fields
- •6.6.3 m-sequences
- •6.7 Periodic ACF of m-sequences
- •6.8 More about finite fields
- •6.9 Legendre sequences
- •6.10 Binary codes with good aperiodic ACF: revisited
- •6.11 Sequences with perfect periodic ACF
- •6.11.1 Binary non-antipodal sequences
- •6.11.2 Polyphase codes
- •6.11.3 Ternary sequences
- •6.12 Suppression of sidelobes along the delay axis
- •6.12.1 Sidelobe suppression filter
- •6.12.2 SNR loss calculation
- •6.13 FSK signals with optimal aperiodic ACF
- •Problems
- •Matlab-based problems
- •7 Spread spectrum signature ensembles for CDMA applications
- •7.1 Data transmission via spread spectrum
- •7.1.1 Direct sequence spreading: BPSK data modulation and binary signatures
- •7.1.2 DS spreading: general case
- •7.1.3 Frequency hopping spreading
- •7.2 Designing signature ensembles for synchronous DS CDMA
- •7.2.1 Problem formulation
- •7.2.2 Optimizing signature sets in minimum distance
- •7.2.3 Welch-bound sequences
- •7.3 Approaches to designing signature ensembles for asynchronous DS CDMA
- •7.4 Time-offset signatures for asynchronous CDMA
- •7.5 Examples of minimax signature ensembles
- •7.5.1 Frequency-offset binary m-sequences
- •7.5.2 Gold sets
- •7.5.3 Kasami sets and their extensions
- •7.5.4 Kamaletdinov ensembles
- •Problems
- •Matlab-based problems
- •8 DS spread spectrum signal acquisition and tracking
- •8.1 Acquisition and tracking procedures
- •8.2 Serial search
- •8.2.1 Algorithm model
- •8.2.2 Probability of correct acquisition and average number of steps
- •8.2.3 Minimizing average acquisition time
- •8.3 Acquisition acceleration techniques
- •8.3.1 Problem statement
- •8.3.2 Sequential cell examining
- •8.3.3 Serial-parallel search
- •8.3.4 Rapid acquisition sequences
- •8.4 Code tracking
- •8.4.1 Delay estimation by tracking
- •8.4.2 Early–late DLL discriminators
- •8.4.3 DLL noise performance
- •Problems
- •Matlab-based problems
- •9 Channel coding in spread spectrum systems
- •9.1 Preliminary notes and terminology
- •9.2 Error-detecting block codes
- •9.2.1 Binary block codes and detection capability
- •9.2.2 Linear codes and their polynomial representation
- •9.2.3 Syndrome calculation and error detection
- •9.2.4 Choice of generator polynomials for CRC
- •9.3 Convolutional codes
- •9.3.1 Convolutional encoder
- •9.3.2 Trellis diagram, free distance and asymptotic coding gain
- •9.3.3 The Viterbi decoding algorithm
- •9.3.4 Applications
- •9.4 Turbo codes
- •9.4.1 Turbo encoders
- •9.4.2 Iterative decoding
- •9.4.3 Performance
- •9.4.4 Applications
- •9.5 Channel interleaving
- •Problems
- •Matlab-based problems
- •10 Some advancements in spread spectrum systems development
- •10.1 Multiuser reception and suppressing MAI
- •10.1.1 Optimal (ML) multiuser rule for synchronous CDMA
- •10.1.2 Decorrelating algorithm
- •10.1.3 Minimum mean-square error detection
- •10.1.4 Blind MMSE detector
- •10.1.5 Interference cancellation
- •10.1.6 Asynchronous multiuser detectors
- •10.2 Multicarrier modulation and OFDM
- •10.2.1 Multicarrier DS CDMA
- •10.2.2 Conventional MC transmission and OFDM
- •10.2.3 Multicarrier CDMA
- •10.2.4 Applications
- •10.3 Transmit diversity and space–time coding in CDMA systems
- •10.3.1 Transmit diversity and the space–time coding problem
- •10.3.2 Efficiency of transmit diversity
- •10.3.3 Time-switched space–time code
- •10.3.4 Alamouti space–time code
- •10.3.5 Transmit diversity in spread spectrum applications
- •Problems
- •Matlab-based problems
- •11 Examples of operational wireless spread spectrum systems
- •11.1 Preliminary remarks
- •11.2 Global positioning system
- •11.2.1 General system principles and architecture
- •11.2.2 GPS ranging signals
- •11.2.3 Signal processing
- •11.2.4 Accuracy
- •11.2.5 GLONASS and GNSS
- •11.2.6 Applications
- •11.3 Air interfaces cdmaOne (IS-95) and cdma2000
- •11.3.1 Introductory remarks
- •11.3.2 Spreading codes of IS-95
- •11.3.3 Forward link channels of IS-95
- •11.3.3.1 Pilot channel
- •11.3.3.2 Synchronization channel
- •11.3.3.3 Paging channels
- •11.3.3.4 Traffic channels
- •11.3.3.5 Forward link modulation
- •11.3.3.6 MS processing of forward link signal
- •11.3.4 Reverse link of IS-95
- •11.3.4.1 Reverse link traffic channel
- •11.3.4.2 Access channel
- •11.3.4.3 Reverse link modulation
- •11.3.5 Evolution of air interface cdmaOne to cdma2000
- •11.4 Air interface UMTS
- •11.4.1 Preliminaries
- •11.4.2 Types of UMTS channels
- •11.4.3 Dedicated physical uplink channels
- •11.4.4 Common physical uplink channels
- •11.4.5 Uplink channelization codes
- •11.4.6 Uplink scrambling
- •11.4.7 Mapping downlink transport channels to physical channels
- •11.4.8 Downlink physical channels format
- •11.4.9 Downlink channelization codes
- •11.4.10 Downlink scrambling codes
- •11.4.11 Synchronization channel
- •11.4.11.1 General structure
- •11.4.11.2 Primary synchronization code
- •11.4.11.3 Secondary synchronization code
- •References
- •Index

Spread spectrum systems development |
311 |
|
|
force MAI to zero will inevitably make a useful effect (the first term) in (10.10) vanish too. At the same time, linear independence means that K N, in which case the most adequate choice of signatures is an orthogonal set (see previous subsection) entailing optimality of a single-user receiver and automatically rejecting MAI with no SNR loss and no special decorrelation processing. In the case of oversaturation (K > N) linear independence of signatures is impossible and the decorrelating algorithm cannot be used.
10.1.3 Minimum mean-square error detection
Let us again exploit the idea of mismatched processing in a correlator tuned to the first user’s signal, but this time, instead of forcing MAI to zero, we will try to minimize the overall corrupting effect of MAI and noise. Coming back to (10.7), we may note that only the term A1b1 in it is a useful component, the other two presenting an overall interference (MAI plus noise). In this light it is natural to look for a linear operation (10.9), imitating a useful contribution with minimum mean-square error (MMSE). To formalize the problem we first rewrite (10.9) in a vector form, substituting u(t) from (10.11):
N 1
X
|
&1 ¼ |
uiyi ¼ u~yT |
ð10:14Þ |
|
|
i¼0 |
|
where |
y~ ¼ (y0, y1, . . . , yN 1) and yi ¼ 0T y(t)s0(t iD) dt, i ¼ 0, 1, . . . , N 1. |
Techni- |
|
cally yi |
may be obtained as a sample |
at the output of a chip matched filter taken at |
|
R |
|
the appropriate moment (see (2.68)), allowing to look at ~y as a vector of observations after the chip matched filtering. Our task now is to minimize mean square deviation "2 of &1 from A1b1 by an appropriate choice of a reference code vector u:
"2 ¼ jA1b1 &1j2 ¼ A1b1 u~yT 2 ¼ min u
Note that no a priori normalization of the reference u is necessary. After squaring and term-wise averaging, the mean-square error takes the form:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
"2 |
¼ ðA1b1Þ2 2A1u~yT b1 þ ðu~yT Þ2 ¼ ðA1b1Þ2 2A1u~yT b1 þ u~yT yu~ T |
ð10:15Þ |
where we use elementary matrix algebra (commutativity of multiplication by a scalar and associativity of vector–matrix multiplication, commutativity of a scalar product u~yT ¼ ~yuT ) and non-randomness of u. The ith component of ~y after substitution of (10.6) and then (10.11) becomes:
yi ¼ |
T yðtÞs0ðt iDÞ dt ¼ |
T " |
K |
AkbkskðtÞ þ nðtÞ#s0ðt iDÞ dt |
|
|||||
|
Z |
|
|
|
|
Z |
k |
1 |
|
|
|
|
|
|
|
|
|
X |
|
|
|
|
0 |
|
|
Nj 01 ak; j ZT s0 |
0 |
¼ |
|
¼ kK1 Akbkak;i þ |
i ð10:16Þ |
|
¼ kK |
1 |
Akbk |
ðt jDÞs0ðt iDÞ dt þ i |
|||||||
|
X |
X |
|
|
|
|
X |
|
||
|
¼ |
|
|
¼ |
0 |
|
|
|
¼ |
|

312 |
Spread Spectrum and CDMA |
|
|
and a |
R |
where |
i ¼ 0T n(t)s0(t iD) dt is the ith noise sample at the chip matched filter output |
|
natural assumption is used that the chips time-spaced by a non-zero integer number |
of repetition periods D are orthogonal (e.g. if chip duration is no longer than D, those chips do not overlap). Now we see that yib1 ¼ A1a1, i, because bits of different users are
|
|
|
|
|
|
|
|
|
|
|
|
independent of each other (bkbl ¼ kl) and of noise ( ibk ¼ |
i |
bk ¼ 0), and hence: |
|||||||||
|
|
|
|
|
|
|
|
|
|
||
|
|
|
~T |
|
2 T |
ð10:17Þ |
|||||
|
|
A1y |
b1 ¼ A1a1 |
In a similar manner we calculate the matrix ~yT ~y, whose elements are simply correlation moments yiyj of samples yi. Then, according to (10.16) and allowing for non-correlatedness of noise samples after the chip matched filter:
|
K |
K |
|
|
|
|
K |
|
X X |
|
|
|
|
X |
|
yiyj |
¼ |
l¼1 |
AkAl |
bkbl |
ak;ial;j þ |
i j |
¼ Ak2ak;iak;j þ 2 ij |
|
k¼1 |
|
|
|
|
k¼1 |
2 being the variance of a noise component of yi. Thus, the N N correlation matrix R of the observation vector ~y is:
|
~T |
|
|
|
2 T |
2 |
IN |
ð10:18Þ |
R ¼ y |
y ¼ ½yiyj& ¼ AG A |
þ |
where IN is the Nth order identity matrix. Substituting (10.17) in (10.15) after discarding the first term independent of u gives the following scalar function to minimize by adjusting u:
f ðuÞ ¼ uRuT 2A12a1uT |
ð10:19Þ |
At the point u of extremum of f (u) the gradient of f (u), i.e. vector, whose components are derivatives of f (u) with respect to every component of the vector u, should be a zero vector. The gradient of f (u) is readily found (see Problem 10.3) as 2(uR A21a1). Thus, with invertible matrix R the vector u delivering an extremum to f (u) is defined by the equation:
u ¼ A12a1R 1 |
ð10:20Þ |
where R is given by (10.18). The reader is challenged to check that the extremum just found is really a minimum of (10.19) (Problem 10.3).
Clearly, this algorithm does not rest on the invertibility of the signature correlation matrix C ¼ AT A; just the observation correlation matrix (10.18) should be invertible, which is practically always true. Hence, the solution (10.20), in contrast to (10.13), is universal regardless of the relation between K and N. At the same time, at least in one important particular case the solution (10.20) degenerates to the single-user algorithm. Let the signature set be a Welch-bound one, meaning that the rows of the signature matrix A are orthogonal (see Section 7.2.2), i.e. AAT ¼ IN . If all signals have the same intensity A, G2 ¼ A2IK , and the observation correlation matrix (10.18) becomes the simplest, R ¼ (A2 þ 2)IN , resulting in u ¼ [A2/(A2 þ 2)]a1, which reproduces a scaled first signature, i.e. the reference of a conventional receiver. Thus, no special MMSE processing exists for the Welch-bound signatures of equal power. This fact is rather trivial if K N, since then such signatures are orthogonal and a conventional receiver

Spread spectrum systems development |
313 |
|
|
eliminates MAI fully with best noise filtering, but for the oversaturation scenario (K > N) the statement is not that predictable.
In the literature the result (10.20) is often given in another form including explicitly the signature correlation matrix C ¼ AT A [99–101]. Deriving it is possible, for instance, through the matrix inversion lemma given here in the form fitted to the context:
R 1 |
¼ ðAG2AT þ 2IN Þ 1 |
¼ |
1 |
IN |
1 |
AðAT A þ 2G 2Þ 1AT |
ð10:21Þ |
|
|
||||||
2 |
2 |
Proof of this result consists in a direct check (Problem 10.4). Note that it works whenever the matrix G is invertible, which is observed automatically if all users’ amplitudes are nonzero. Making use of (10.21) and equation A21a1 ¼ e1G2AT in (10.20) results in:
u ¼ e1G2AT R 1 ¼ 12 e1G2hAT AT AðAT A þ 2G 2Þ 1AT i
¼ 12 e1G2hAT ðAT A þ 2G 2ÞðAT A þ 2G 2Þ 1AT i þ e1ðAT A þ 2G 2Þ 1AT
and eventually:
u ¼ e1ðC þ 2G 2Þ 1AT |
ð10:22Þ |
Returning back to (10.14), we write the final form of the decision rule on the first user’s bit as:
b1 ¼ signð&1Þ ¼ sign½e1ðC þ 2G 2Þ 1AT y~T & |
ð10:23Þ |
Spreading this rule to the receiver of the kth user’s data is again immediate: ek has to replace e1.
Emphasizing again that the rule under study is universal independently of signature correlation matrix invertibility, it is nevertheless noteworthy that if C is non-singular (K N is a necessary condition of it) and thermal noise diminishes, the MMSE detector converges asymptotically to the decorrelating one:
u ¼ e1ðC þ 2G 2Þ 1AT ! e1C 1AT :
2!0
To demonstrate the efficiency of MMSE it is appropriate to compare the signal- to-interference-plus-noise ratio (SINR) for the receiver effect &1 in cases of reference
(10.22) and that of a |
conventional receiver u |
¼ |
a |
. The contribution of the kth signal in |
|||||||||||||||||||||||||||||||||
|
|
T |
|
|
|
|
|
|
|
1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||
&1 as seen from (10.14) is Akuak |
, so that the useful power (created by the first useful |
||||||||||||||||||||||||||||||||||||
signal) is A2 |
(uaT )2 and MAI power is |
|
K |
A2(uaT )2 |
. Uncorrelatedness of noise samples |
||||||||||||||||||||||||||||||||
1 |
1 |
|
|
|
|
|
|
|
k¼2 |
|
k |
|
k |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
in |
||||||
|
|
|
|
|
|
that their powers are added after weighting by u |
|||||||||||||||||||||||||||||||
i after a chip matched filter means |
|
|
P |
|
|
|
|
|
|
|
|
|
|
|
is |
|
2 |
N |
|
1 |
u |
2 |
¼ |
2 |
k |
|
i |
k |
2 |
. |
|||||||
(10.14), so that the total power of the noise component of |
|
|
|
|
|
|
|
|
|
u |
|
||||||||||||||||||||||||||
Combining these results produces SINR: |
|
2 ¼ K |
|
T |
&1 |
|
|
|
|
Pi¼0 |
|
|
i |
|
|
|
|
|
|||||||||||||||||||
|
qI ¼ K |
2 |
T |
|
2 |
|
2 |
2 |
|
2 |
|
2 |
2 |
|
|
2 |
|
|
|
|
|
ð10:24Þ |
|||||||||||||||
|
2 |
|
|
A2 |
uaT |
|
|
|
|
|
|
|
q2 |
uaT |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||||
|
|
|
1 |
|
|
1 |
|
|
|
|
|
|
|
|
|
1b |
|
1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
P |
|
|
|
|
|
|
|
|
|
|
P |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||
|
|
|
k¼2 |
Ak uak þ kuk |
|
|
|
k¼2 |
qkb uak þkuk |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
where q2kb ¼ A2k/ 2 is power SNR per data bit for the kth user.

314 Spread Spectrum and CDMA
Example 10.1.1. Consider an oversaturated synchronous CDMA with Welch-bound signatures. Binary Welch-bound ensembles exist for any K > N allowing the existence of a K K Hadamard matrix. The signatures then are just K columns of this matrix after discarding any K N rows. In the light of the aforesaid, the case of equal powers will not
display any advantages |
of MMSE |
against |
conventional detection. |
For |
the values |
K ¼ 64, N ¼ 48 a random |
pattern of |
users’ |
amplitudes was taken as |
64 |
samples of |
Rayleigh variable to imitate the Rayleigh channel. Figure 10.1 presents the dependence of SINR (10.24) for MMSE and conventional detectors on bit SNR under some ‘benign’ (wellscattered) amplitude pattern. The curves show that the gain of MMSE sometimes appears significant (in Figure 10.1 up to about 10 dB). Still, it should be remembered that such a profit is just a matter of chance: for some amplitude patterns it may appear even bigger, but the more uniform the amplitude pattern, the smaller is the difference in SINR versus the conventional receiver. One more remark is that the MMSE detector has much better resistance to the scatter of users’ intensities (if signatures are non-orthogonal, of course) in comparison with the conventional receiver, making it especially attractive wherever the power control is not perfect.
|
15 |
|
|
|
|
|
|
|
10 |
|
|
|
|
MMSE |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Conv. |
|
|
5 |
|
|
|
|
K = 64, N = 48 |
|
SINR (dB) |
|
|
|
|
|
|
|
0 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
–5 |
|
|
|
|
|
|
–10 –5 |
0 |
5 |
10 |
15 |
20 |
25 |
1st user bit SNR (dB)
Figure 10.1 Example SINR curves for MMSE and single-user receivers
10.1.4 Blind MMSE detector
Although the computational complexity of the MMSE algorithm (as well as the decorrelating one) is not at all practically prohibitive there is still one implementation issue motivating further research. As (10.20) shows, the key operation of the MMSE algorithm is inversion of the observation correlation matrix R defined by (10.18). To perform it the receiver of the kth user should know, along with its own signature, also