The Performance of Quaternary Amplitude Modulation with Quaternary Spreading in the Presence of Interfering Signals

Size: px
Start display at page:

Download "The Performance of Quaternary Amplitude Modulation with Quaternary Spreading in the Presence of Interfering Signals"

Transcription

1 Clemson University TigerPrints All Theses Theses The Performance of Quaternary Amplitude Modulation with Quaternary Spreading in the Presence of Interfering Signals Allison Manhard Clemson University, Follow this additional wors at: Part of the Electrical Computer Engineering Commons Recommended Citation Manhard, Allison, "The Performance of Quaternary Amplitude Modulation with Quaternary Spreading in the Presence of Interfering Signals" (015. All Theses This Thesis is brought to you for free open access by the Theses at TigerPrints. It has been accepted for inclusion in All Theses by an authorized administrator of TigerPrints. For more information, please contact

2 The Performance of Quaternary Amplitude Modulation with Quaternary Spreading in the Presence of Interfering Signals A Thesis Presented to the Graduate School of Clemson University In Partial Fulfillment of the Requirements for the Degree Master of Science Electrical Engineering by Allison Ann Manhard December 015 Accepted by: Dr. Daniel Noneaer, Committee Chair Dr. Harlan Russell Dr. Carl Baum

3 Abstract Multiple-access digital communications is considered with direct-sequence spread-spectrum (DS-SS quadrature amplitude modulation quaternary spreading in each transmission. Each transmitted signal undergoes attenuation a delay at a receiver in the additive white Gaussian noise channel. The receiver uses coherent demodulation with a correlation detector synchronized to the one of the K received signals so that the K 1 other transmissions act as interference. The average probability of error at the output of the detector is determined using Monte Carlo simulation compared with an approximation in which the interference component in each detection statistic is approximated by a Gaussian rom variable. Closed-form expressions are derived for the first second moments of the interference under several circumstances. The moments are used with the Gaussian approximation, the accuracy of the approximation is investigated for each of the circumstances. ii

4 Table of Contents Title Page i List of Figures iv 1 Introduction System Model Transmitter Channel Receiver Measures of Signal Quality System Performance Statistical Model of System Characterization of the Decision Statistics Interference with a Fixed Delay Phase Offset Symbol-Synchronous Interference Uniformly Distributed Interference Delays Performance Evaluation Approximation Closed-form expressions for the Gaussian Approximation QPSK with Symbol Synchronous Inference QPSK Interference with a Fixed Delay QPSK with a Rom Interference Delay M-QAM with Symbol Synchronous Inference M-QAM Interference with a Fixed Delay M-QAM with a Rom Interference Delay Conclusion Appendices A Conditional Joint Distribution of Key Auxiliary Rom Variables B Characterization of Multiple-Access Interference C Moments of Interference Terms With Rom Signature Sequences Bibliography iii

5 List of Figures.1 System model Bloc diagram of system Transmitter model Constellation diagram for QPSK Constellation diagram for 16-QAM Illustration of DS-SS modulation Channel model Receiver model Probability of error for QPSK with two users various values of N Probability of bit error for QPSK with various phases of interferer, K =, N = 8, an SIR of 0 db Probability of bit error for QPSK with K =, various interference delays, N = 8, an SIR of 0 db Probability of bit error for QPSK with rom interference delay, K =, N = 8, an SIR of 0 db Probability of error for 16-QAM, chip symbol synchronous, K = various values of N Probability of symbol error for 16-QAM with K =, various interference delays, an SIR of 0 db Probability of symbol error for 16-QAM with rom interference delay, K =, N = 3, an SIR of 0 db iv

6 Chapter 1 Introduction Direct-sequence spread-spectrum (DS-SS multiple-access communications [1 is a widely used modulation format for both commercial cellular communications military tactical radio communications. Among the advantages of DS-SS multiple-access communications is the ability to tolerate denser reuse of each portion of the frequency spectrum across a wide-area radio networ compared with time-division multiple-access or frequency-division multiple-access. It is achieved at the cost of vulnerability to power mismatches in the multiple transmitted signals at a given receiver, under normal operation, the performance is often limited by the effect of multipleaccess interference on the detection of the information contained in the transmission of interest to the receiver. Thus accounting for the effect of multiple-access interference is ey to an accurate analysis of the system s performance. Analysis of the performance of a lin in a DS-SS multiple-access communication system is complicated by the complexity of accounting precisely for the effect of multiple interferers on the desired signal at a receiver. Precise evaluation leads to complex analytical expressions which require computationally intensive evaluation, the alternative of Monte Carlo simulation of system performance similarly requires significant computation. The cost of this complexity is compounded if high-fidelity lin performance results are desired for use in the simulation of a large networ of radios. The computation required for lin performance modeling is reduced substantially if the system model is modified to approximate the effect of interfering signals on the desired signal by imposing an appropriately chosen Gaussian distribution on the component of the receiver s decision 1

7 statistic that represents the effect of the interferers. This Gaussian approximation [1 leads to a performance evaluation whose accuracy depends on the particular circumstances considered the assumptions used in the approximation. Numerous methods have been introduced to improve the tradeoff between the accuracy of the computational burden of the approximation (such as [ [3. Most have focused on a system in which each transmitter employs DS-SS binary phaseshift-eyed (BPSK modulation, DS-SS quaternary phase-shift-eyed (QPSK modulation, or DS-SS offset QPSK (OQPSK modulation. In this thesis, we consider the performance of a multiple-access communication system in which each transmitter uses DS-SS M-ary quadrature amplitude modulation (M-QAM with distinct spreading sequences in the inphase quadrature signals. Each transmitted signal uses the same modulation format signal parameters, each one undergoes an arbitrary channel attenuation, delay, carrier phase shift in propagating to the receiver of interest, the sum of the resulting signals are corrupted by additive white Gaussian noise at the receiver. The receiver uses coherent demodulation with inphase quadrature correlators synchronized to the inphase quadrature spreading signals of the desired signal, respectively. The K 1 other transmissions thus act as interference to the detection of the information in the desired signal. The receiver uses zero-threshold, matched-filter detection of each channel symbol in the inphase quadrature signals. The average probability of error in the detection of a data symbol or the probability of error in detecting a bit of information is determined using Monte Carlo simulation. The error probability is compared with an approximation in which the effect of the multiple-access interference on detection is approximated by the effect of a Gaussian rom variable with the same first second moments as the multiple-access interference. Closed-form expressions are derived for the first second moments of the interference under several circumstances for use with the Gaussian approximation, extending previous results for DS-SS BPSK modulation [4 DS-SS OQPSK modulation [5. The accuracy of the approximation is investigated for each of the circumstances. The model of the DS-SS M-QAM multiple-access system is defined in Chapter. Closedform expressions are derived in Chapter 3 the appendices for the first second moments of the terms in the decision statistics which are due to the presence of multiple-access interference at the receiver. Expression are developed for several circumstances of interest. The moments are used to determine Gaussian approximations to the interference terms in the decision statistics the resulting probability of symbol-detection error probability of bit error. The probability

8 of error under the Gaussian approximation is compared in Chapter 4 to the actual probability of error (obtained by Monte Carlo simulation for each circumstance of interest. The accuracy of the approximations is summarized in Chapter 5. 3

9 Chapter System Model The communication system considered in the thesis consists of K transmitted signals over an additive white Gaussian noise (AWGN channel, using quaternary data modulation quaternary direct-sequence spreading, as shown in Figures.1.. Each transmitted signal represents a different information source. The signal is attenuated delayed by the channel between the corresponding transmitter the receiver, the received signal consists of the sum of the attenuated, delayed signals corrupted by an AWGN rom process. The receiver converts the received signal into an inphase (I statistic quadrature (Q statistic for each transmitted data symbol in the desired signal. The two statistics are applied to a decision device that determines the corresponded detected data symbol. We consider one of the signals to be the signal of interest, the other K 1 signals are considered as interfering signals. The receiver is designed to detect the information represented by the signal of interest..1 Transmitter The transmitter for the th signal in the communication system is represented in Figure.3. Each transmitted signal has an inphase a quadrature component two bit streams that are spread by respective spreading sequences. The information source generates a sequence of information bits b which are mapped to data symbols, with the ith output of the mapper consists of the data symbol represented by the pair of real values (u,i, v,i. 4

10 Figure.1: System model..1.1 Data Signals The modulation format we consider is rectangular, symmetric M-ary quadrature amplitude { modulation(m-qam [6 in which each of u,i v,i is taen from the set ±1, ±3,..., ± } M 1 where M is the size of the symbol set. The ith pair of data symbols determines the polarities of inphase quadrature data signals over the time interval [it, (i + 1T, where T is the symbol duration. The data signals for transmitter are given by w I (t = i= u,i p T (t it (.1 w Q (t = i= v,i p T (t it. ( QPSK Data Signal We consider quadrature phase-shift eying (QPSK [6 as an example of M-QAM where M = 4 all symbols in the set have the same magnitude. The inphase quadrature symbols u,i v,i are chosen from the set {+1, 1}. We can represent the symbols in the constellation diagram shown in Figure.4. Since there are four symbols in the symbol set, each symbol represents two bits of information. The constellation shown in this figure uses Gray coding [6 as the mapping from information bits to data symbols, so that nearest-neighbor symbols differ by only one information bit. 5

11 Figure.: Bloc diagram of system QAM Data Signal Another example signal set we consider is 16-QAM, in which the inphase quadrature components are chosen from the set { 3, 1, +1, +3}. This is illustrated in the constellation diagram in Figure.5. For this symbol set, each symbol represents four bits of information, Gray coding is used for bit assignments..1. Direct-Sequence Spread-Spectrum Data Signals Spread-spectrum modulation increases the bwidth of a signal in a manner which can be exploited by the receiver to mitigate the effects of multipath propagation interference from other users of the channel. One form of spread spectrum is direct-sequence spread-spectrum (DS-SS modulation. DS-SS maes us of a pseudo-rom sequence of pulses that are much shorter than the symbol duration. The duration of each pulse is nown as the chip duration. This is illustrated in 6

12 Figure.3: Transmitter model. Figure.4: Constellation diagram for QPSK. Figure.6. The spreading signals in the inphase quadrature channels for transmitted signal are given by a Q (t = a I (t = j= a Q,j ψ c(t jt c (.3 a I,jψ c (t jt c, (.4 j= respectively, where a I,i, aq,i { 1, 1}, T c is the chip duration, ψ c (t is the chip waveform with an average power of one. I.e. 1 Tc T c 0 ψ c (tdt = 1. (.5 The spreading factor is given by N = T T c, where N is assumed to be an integer. The signature sequences of the th transmitted signal for the inphase quadrature channels, {a I,i } {aq,i }, respectively, are defined by a sequence of elements from the set { 1, +1}. The data signals defined in 7

13 Figure.5: Constellation diagram for 16-QAM. equations (.1 (. are multiplied with the spreading signal to form the inphase quadrature DS-SS data signals c I (t = a I (tw I (t (.6 c Q (t = aq (twq (t, (.7 respectively..1.3 Transmitted Signal The transmitted M-QAM signal is formed by modulation of inphase quadrature sinusoidal carriers by the inphase quadrature DS-SS data signals, respectively. The th transmitted signal is given by s (t = P c I (t cos (ω c t + θ + P c Q (t sin (ω ct + θ, 0 K 1, (.8 where ω c is the angular frequency, θ is the carrier phase, c I (t cq (t are as defined in equations (.6 (.7, respectively. The transmitted power in each of the inphase quadrature components of s (t during the ith symbol interval are given by P u,i (P v,i, respectively. 8

14 Figure.6: Illustration of DS-SS modulation. For the special case of QPSK modulation (M = 4, the transmitted power in each component is P regardless of the data symbol in the symbol interval. In comparison, offset QPSK (OQPSK modulation is considered in [5 in which the th transmitted signal is given by s (t = P c I ( t T c cos (ω c t + θ + P c Q (t sin (ω ct + θ, 0 K 1. (.9. Channel The channel over which the signal is transmitted is an AWGN channel with K 1 interfering signals, where n(t is an AWGN process with two-sided power spectral density N 0 /. The th transmitted signal is attenuated by the multiplicative factor A delayed by τ at the receiver. The channel is shown in Figure.7. The received signal thus is given by r(t = K 1 =0 K 1 A P c I (t τ cos (ω c t + Φ + =0 A P c Q (t τ sin (ω c t + Φ + n(t (.10 where Φ = Θ ω c τ is the accumulated carrier phase at the receiver for the th signal. 9

15 Figure.7: Channel model..3 Receiver A bloc diagram of the receiver is shown in Figure.8. Without loss of generality, we consider a receiver designed to detect the information from transmitter zero its detection of the data symbol transmitted over the symbol interval [0, T. Also, without loss of generality, we assume that τ 0 = 0 Φ 0 = 0. The receiver uses coherent demodulation with inphase quadrature correlators synchronized to the inphase quadrature spreading signals of the desired signal, respectively. It is assumed that the receiver has a local reference that is matched to the phase of the desired component of the received signal, it has a perfect estimate of the symbol timing of the desired component of the desired component of the received signal, for M > 4, it has a perfect estimate of the power in the desired component of the received signal for each data symbol in the signal constellation. The latter permits the receiver to set the thresholds for the decision regions of the decision device that yield maximum-lielihood symbol detection if the signal is corrupted by AWGN [6. The inphase decision statistic can be written as Z I = T 0 r(ta I 0(τ cos(ω c τdτ. (.11 The quadrature decision statistic can be similarly written as Z Q = T 0 r(ta Q 0 (τ sin(ω cτdτ. (.1 10

16 The decision statistics can be represented as K 1 Z I = S I + η I + I I = S I + N I (.13 =1 K 1 Z Q = S Q + η Q + I Q = SQ + N Q (.14 =1 where S I is the contribution from the desired signal, η I is the contribution from the noise, K 1 =1 II is the contribution from the interfering signals, I I is the interference component in the inphase subchannel from the th signal, 1 K 1. The components S Q, η Q, I Q, 1 K 1, are similarly defined for the quadrature subchannel. Figure.8: Receiver model..4 Measures of Signal Quality System Performance Three measures of the quality of the received signal are used in this thesis. The signal-tointerference-plus-noise ratio (SINR at the receiver accounts for the effect of both the thermal noise interfering signals on the detection of the desired signal. For a given set of data symbols, U = {u 1, 1, u 1,0,..., u K 1, 1, u K 1,0 } (.15 V = {v 1, 1, v 1,0,..., v K 1, 1, v K 1,0 } (.16 11

17 in the interfering signals, the SINR is given by Γ(U, V = A 0P 0 T Var (N I (U, V + Var (N Q (U, V. (.17 The signal-to-noise ratio (SNR can be expressed in terms of the average energy per data symbol at the receiver, E s, or the average energy per bit of information at the receiver. From equation (.17 [6, the former is given by Es N 0 = M 1 3 Γ(0, 0 the latter is given by E b = M 1 Γ(0, 0. (.18 N 0 3 log (M The average signal-to-interference ratio (SIR at the receiver is the ratio of the average power in the desired signal to the sum of the average power in the interfering signals. Since all transmissions use the same modulation format with equally liely data symbols, the SIR is given by Λ = A 0P 0 K 1 =1 A P. (.19 Two measures of system performance are considered in the thesis: the (average probability of symbol error, P s, the (average probability of bit error, P b. Since non-binary modulation is considered, P b P s. In general, the probability of bit error depends on the mapping of the information bits to code symbols used by the transmitter..5 Statistical Model of System All the analysis examples in subsequent chapters assume the same joint statistics for the rom variables that determine the transmitted signals. The data symbols, u,i v,i are { uniformly distributed over the set ±1, ±3,..., ± } M 1 where M is the size of the symbol set. The chip polarities, a I,i aq,i, have values in { 1, 1} with Pr(u,i = 1 = Pr(v,i = 1 = Pr(a I,i = 1 = Pr(a Q,i = 1 = 1 (.0 for 0 K 1 all i. The rom variables that determine the transmitted signals over the interval of interest are mutually independent. 1

18 Two scenarios are considered in subsequent chapters with respect to the effect of the channel on the interfering signals. In the first scenario, the delay of the th transmitted signal, τ, its accumulated phase at the receiver, Φ, are fixed for 1 K 1. In the second scenario, the delay is uniformly distributed on the interval [0, T the phase is uniformly distributed on the interval [0, π for 1 K 1. The (K 1 rom variables {τ, Φ }, 1 K 1 are mutually independent independent of the set of data-symbol chip polarity rom variables. The noise rom process n(t is independent of the rom variables that determine the transmitted signals. 13

19 Chapter 3 Characterization of the Decision Statistics In this chapter, we consider the decision statistics for the system in Chapter, we develop expressions for their first second moments for several conditions of interest. The development is modeled after the development in [5 (which in turn draws on results from [4. Binary PSK OQPSK DS-SS signals are considered in [4 [5, respectively. In this chapter, we adapt the approach of [5 to DS-SS QAM signals. The inphase correlator statistic for the desired signal s 0 (t is given in equations (.11 (.13, the quadrature correlator statistic is given in equations (.1 (.14. In all that follows, conditioning on u 0,0, v 0,0 the signature sequences of the desired signal is implicit. The respective expected values of the desired portion of the inphase quadrature components of the decision statistic are given as S I = u 0,0 A 0 T P0 (3.1 S Q = v 0,0 A 0 T P0. (3. The noise components of both the inphase decision statistic the quadrature decision statistic 14

20 have a mean of zero, their respective variances are given by σ η I 0 = σ η Q 0 = N 0T 4. (3.3 The component of the inphase decision statistic due to the th interfering signal can be written as I I = W I A P (3.4 where W I = U I cos(φ V I sin(φ, (3.5 U I = T 0 c I (t τ a I 0(tdt, (3.6 T V I = 0 c Q (t τ a I 0(tdt. (3.7 Similarly, for the quadrature decision statistic, I Q = W Q A P (3.8 where W Q = U Q cos(φ V Q sin(φ, (3.9 U Q T = c Q (t τ a Q 0 (tdt, ( V Q T = c I (t τ a Q 0 (tdt. ( The rom variables U I, V I, U Q V Q can be expressed in terms of the chip-pulse continuous partial autocorrelation functions the discrete cross-correlation functions of the spreading sequence of the desired signal the spreading sequence of the th interfering signal [5. The ran- 15

21 dom variable U I is exped as U I = N i=0 [ H,i I ˆRψc (S + a I 0,ia I 0,i+1R ψc (S + H,N 1 I ˆR ψc (S + H,N I R ψc (S, (3.1 where u, 1 a I,i γ a I 0,i, if 0 i γ 1 H,i I = u,0 a I,i γ a I 0,i, if γ i N 1 u, 1 a I, γ 1 ai 0,0, if i = N. (3.13 The chip-pulse continuous partial autocorrelation functions are given by R ψc (s = s 0 ψ c (tψ c (t + T c sdt (3.14 ˆR ψc = Tc s 0 ψ c (tψ c (t sdt, (3.15 the chip delay rom variable is given by S = τ γ T c, with γ = τ /T c. The subsequent development is conditioned on τ ( thus, γ except where otherwise noted. We assume 0 τ < T for 1 K 1, which is general for the distributions specified in Section.5. Similarly, the rom variable V I N V I = i=0 is exped as [ H,i I ˆRψc (S + a I 0,ia I 0,i+1R ψc (S + H,N 1 I ˆR ψc (S + H,N I R ψc (S, (3.16 where v, 1 a Q,i γ a I 0,i, if 0 i γ 1 H,i I = v,0 a Q,i γ a I 0,i, if γ i N 1 v, 1 a Q, γ 1 ai 0,0, if i = N. (3.17 For the quadrature decision statistic, the rom variable U Q is exped as U Q N = i=0 [ H Q,i ˆRψc (S + a Q 0,i aq 0,i+1 R ψ c (S + H Q ˆR,N 1 ψc (S + H Q,N R ψ c (S, (

22 where v, 1 a Q,i γ a Q 0,i, if 0 i γ 1 H Q,i = v,0 a Q,i γ a Q 0,i, if γ i N 1 v, 1 a Q, γ 1 aq 0,0, if i = N. (3.19 Similarly, the rom variable V Q is exped as V Q N = i=0 [ H Q,i ˆRψc (S + a Q 0,i ai 0,i+1R ψc (S + H,N 1 I ˆR ψc (S + H Q,N R ψ c (S, (3.0 where u, 1 a I,i γ a Q 0,i, if 0 i γ 1 H Q,i = u,0 a I,i γ a Q 0,i, if γ i N 1 u, 1 a I, γ 1 aq 0,0, if i = N. (3.1 In Appendix A, it is shown that the (K 1(N + 1 sets of four rom variables H,i = { H,i, I H,i, I H Q,i, H } Q,i, 0 i N, 1 K 1, (3. are conditionally mutually independent given M = K 1 =1 M, where M = { } u,0, u, 1, v,0, v, 1, 1 K 1, (3.3 that the conditioning for H,i, 0 i N can be reduced to M for each. The set of { rom variables H,i I, H,i I, HQ,i, H } Q,i are shown to be conditionally dependent given M, however, some pairs of the rom variables are conditionally correlated. The rom variables { } U I, V I, U Q, V Q are shown in Appendix B to have a conditional mean of zero given M. Their conditional second moments given M are also derived in Appendix B. Now consider the expectation of the multiple-access interference with respect to uniformly distributed signature sequences for the desired signal. In Appendix C, it is shown that under this expectation, E [ W I M = E [W Q M = 0, (3.4 17

23 E [ (W I [ M = γ u, 1 + (N γ u,0 ˆR ψc (S cos (Φ + [ (γ + 1 u, 1 + (N γ 1 u,0 Rψ c (S cos (Φ + [ γ v, 1 + (N γ v,0 ˆR ψc (S sin (Φ + [ (γ + 1 v, 1 + (N γ 1 v,0 Rψ c (S sin (Φ, (3.5 E [(W Q M = [ γ v, 1 + (N γ v,0 ˆR ψc (S cos (Φ + [ (γ + 1 v, 1 + (N γ 1 v,0 R ψ c (S cos (Φ + [ γ u, 1 + (N γ u,0 ˆR ψc (S sin (Φ + [ (γ + 1 u, 1 + (N γ 1 u,0 R ψ c (S sin (Φ, (3.6 [ E W I W Q M = 0. (3.7 For QPSK modulation, equations (3.5 (3.6 simplify to E [ (W I [ ( M = E (W Q M = N ˆR (S ψc + Rψ (S c. (3.8 Note that the conditional first second moments do not depend on Φ. { } It is also shown in Appendix C that the (K 1 sets W I, W Q are conditionally uncorrelated given M that conditioning for W I, W Q { } can be reduced to M under expectation with respect to the uniformly distributed signature sequences of the desired signal. It follows that the (K 1 sets {I I, IQ }, 1 K 1, are conditionally uncorrelated given M that conditioning for {I I, IQ } can be reduced to M. Furthermore, from equations (3.5, (3.8, (3.4 - (3.7, it follows that I I IQ are conditionally uncorrelated, zero-mean rom variables given M 18

24 that Var ( I M I A = P ( [γ u, 1 + (N γ u,0 ˆR (S ψc cos (Φ + [ (γ + 1 u, 1 + (N γ 1 u,0 R ψ c (S cos (Φ + [ γ v, 1 + (N γ v,0 ˆR ψc (S sin (Φ + [ (γ + 1 v, 1 + (N γ 1 v,0 Rψ c (S sin (Φ (3.9 ( Var I Q M = A P ( [γ v, 1 + (N γ v,0 ˆR (S ψc cos (Φ + [ (γ + 1 v, 1 + (N γ 1 v,0 R ψ c (S cos (Φ + [ γ u, 1 + (N γ u,0 ˆR ψc (S sin (Φ + [ (γ + 1 u, 1 + (N γ 1 u,0 Rψ c (S sin (Φ. (3.30 Finally, from equations (.13 (.14 the definition of the system in Chapter, the rom variables {η I, η Q } are independent of {M, I I, IQ } they are independent, zero-mean Gaussian rom variables with Var(η I = Var(η Q = N 0T 4. ( Interference with a Fixed Delay Phase Offset The variance of each interference term is given by equations (B.6 (B.13 above if the delay phase offset of each interferer is fixed. We consider the special case of QPSK modulation first, then the general case of M-QAM QPSK with Fixed Delay Phase Offset Interference For QPSK modulation, u,i = v,i = 1 for all i. In this section, two examples of chip waveforms are considered: the rectangular waveform the raised-cosine waveform. For the 19

25 rectangular waveform, the chip autocorrelation functions are given by R ψc (s = s (3.3 ˆR ψc (s = T c s. (3.33 Therefore the conditional variance of I can be written as Var ( I I M = Var (I Q M = A P ( N ˆR (S ψc + Rψ (S c = A P N (3.34 (3.35 ( (T c S + (S (3.36 = A P N ( Tc S T c + S (3.37 The energy per bit of information in the received signal is given by E b = A 0T P 0. From equations (.17, (3.1, (3., (3.37, (3.31, the SINR with a rectangular pulse waveform can be written as Γ(U, V = ( K 1 N 0 + E s =1 A P NA 0 P 0 ( 1 S T c + ( S T c 1, (3.38 for all {U, V }. A similar analysis can be performed for the raised-cosine waveform, which has a pulse shape given by ψ(t = /3[1 cos(πt/t c p Tc (t. (3.39 In [7, the autocorrelation functions for the raised-cosine waveform are shown to be R ψ (τ = 3 τ + 1 ( πτ 3 τ cos T ( c πτ T c π sin T c (3.40 ˆR ψ (τ = 3 (T c τ + 1 ( πτ 3 (T c τ cos T c + T c π sin ( πτ The SINR is found following the same procedure as for the rectangular waveform, T c. (3.41 ( K 1 N 0 A Γ(U, V = + P 1 E s NA =1 0 P 0 Tc 0 ( 1 ˆR ψ (S + Rψ(S (3.4

26 for all {U, V } where R ψ (S ˆR ψ (S are as defined in equations (3.40 (3.41 respectively. Note that Γ(U, V does not depend on the phase offsets regardless of the chip waveform M-QAM with Fixed Delay Interference Phase Offset Interference From equations (3.9 (3.30, it follows that Var(I I M + Var(I Q M = A P + A P + A P + A P [ γ u, 1 + (N γ u,0 ˆR ψc (S [ (γ + 1 u, 1 + (N γ 1 u,0 R ψ c (S [ γ v, 1 + (N γ v,0 ˆR ψc (S [ (γ + 1 v, 1 + (N γ 1 v,0 R ψ c (S. (3.43 From equation (.10, the average energy per channel symbol is given by E s = E [ u 0,0 + v 0,0 A 0P 0 T = (M 1 A 3 0P 0 T, (3.44 from equations (3.1 (3.. E [ (S I + E [ (S Q = M 1 A 3 0P T = E st. (3.45 Thus from equations (.17 (3.31, the SINR is given by Γ(U, V = ( K 1 M 1 N 0 A + P 1 ( 3 E s A =1 0 P 0 T E [ (W I [ 1 M + E (W Q M. (3.46 Note, from equations (3.5 (3.6, that equation (3.46 does not depend on the phase offsets of the interfering signals. 3. Symbol-Synchronous Interference In this section, a system is considered in which each of the interfering signals is symbol synchronous with the desired signal at the receiver. (That is, τ = 0, 1 K 1, therefore 1

27 S = 0, 1 K 1. Note that ˆR ψc (0 = T c R ψc (0 = QPSK with Symbol-Synchronous Interference From equation (3.37, Var(I M I = Var(I Q M = A P NTc (3.47 for all {U, V }. Therefore, Γ(U, V = ( K 1 N 0 + E s =1 A P NA 0 P 0 1 (3.48 for all {U, V }. 3.. M-QAM with Symbol-Synchronous Interference From equations (3.9 (3.30, Var ( I I M = A P [ N u,0 T c cos (Φ + N v,0 T c sin (Φ (3.49 ( Var I Q M = A P [ N v,0 Tc cos (Φ + N u,0 Tc sin (Φ. (3.50 The SINR is thus given as for all {U, V }. Γ(U, V = ( M 1 N E s K 1 =1 ( u,0 + v,0 A P NA 0 P 0 1. ( Uniformly Distributed Interference Delays In this section, we consider interfering signals for which each delay, τ, is uniformly distributed over [0, T so that S is uniformly distributed over [0, T c γ is uniformly distributed over {0, 1,..., N 1}.

28 3.3.1 QPSK with Uniform Interference Delays Let = 1 Tc Rψ T c (sds = 1 Tc c T c 0 0 ˆR ψ c (sds. (3.5 for either waveform under consideration. From equations (3.9 (3.30 for QPSK modulation Var ( I I M = A P [ N cos (Φ + N sin (Φ (3.53 = A P N (3.54 ( Var I Q M = A P N. (3.55 If the waveform is rectangular, = 1 3 T c, so the SINR is given by ( N 0 Γ(U, V = + K 1 1 A P (3.56 E s 3N A 0 P 0 =1 for each {U, V }. If the strength of all received signals is the same, a result from [5 is obtained Γ(U, V = ( N0 E s + 1 (K 1. (3.57 3N For the raised-cosine chip waveform, the same technique as in [5 can be used with the autocorrelation function found in [7. Using this method = ( 1 T c 576 π 3 30 cos 8 sin (4 πtc = T c ( πtc π T c + 18 sin ( πtc π T c 160 sin ( πtc T 3 c + (4 πtc T 3 c + 8 cos (4 πtc π T c + 96 π T c π π T c 5 sin ( π. (3.58 Thus the SINR is given by Γ(U, V = ( 1N 0 E b + ( K 1 48π N =1 A P A 0 P 0 1. (3.59 3

29 for all {U, V } M-QAM with Uniform Interference Delays From equation (3.9, since E[γ = N 1, (3.60 Var ( I I M = A P = A P [( N 1 + A P + A P + A P u, 1 + [( N + 1 [( N 1 [( N + 1 ( N + 1 u, 1 + v, 1 + v, 1 + u,0 cos (Φ ( N 1 ( N + 1 ( N 1 u,0 cos (Φ v,0 sin (Φ v,0 sin (Φ N [ u, 1 + u,0 cos (Φ + A P N [ v, 1 + v,0 sin (Φ. (3.61 Similarly, ( Var I Q M = A P The SINR is thus given by Γ(U, V = ( N [ v, 1 + v,0 cos (Φ + A P N [ u, 1 + u,0 sin (Φ. (3.6 K 1 M 1 N E s =1 for all {U, V }. If the waveform is rectangular, N [ u, 1 + u,0 + v, 1 + v,0 1 A P A 0 P T (3.63 Γ(U, V = ( M 1 N K 1 3 E s 6 =1 A P 1 [ NA 0 P u, 1 + u,0 + v, 1 + v,0 (3.64 If the waveform is the raised-cosine function Γ(U, V = ( M 1 N ( 1 3 E s K 1 48π =1 A P 1 [ NA 0 P u, 1 + u,0 + v, 1 + v,0. (3.65 4

30 Chapter 4 Performance Evaluation Approximation In this chapter, we consider the probability of error of the system in Chapter. In particular, we compare the exact probability of error (obtained from Monte Carlo simulations using Matlab with a Gaussian approximation to the probability of error. Given the channel symbols in the desired signal the interfering signals, the Gaussian approximation replaces the decision statistics in equations (.13 (.14 with independent Gaussian rom with mean variance determined by the mean variance of the rom variables they replace. 4.1 Closed-form expressions for the Gaussian Approximation In this section, we obtain closed-form expressions for a Gaussian approximation to the probability of symbol error the probability of bit error for the two modulations formats we use in the examples. Consider the condition that the channel symbol in the desired signal is {u 0, v 0 } the channel symbols in the interfering signals are given by U V in equations (.15 (.16. One approach to the Gaussian approximation employs the approximations ( S Pr(Z I I w < w Q σ NI (4.1 5

31 where ( S Pr(Z Q Q y < y Q, (4. x σ NQ Q(x = 1 exp ( u du. (4.3 π The expressions above account for a possible difference in the variance of N I the variance of N Q. Instead, we employ a simplified Gaussian approximation in which we average the two variances for each approximation so that Pr(Z I < w Q ( SI w σ (4.4 where σ = ( Pr(Z Q SQ y < y Q, (4.5 σ (σ NI + σ NQ /. Using this approximation, Pr ( Z I < S I A 0 T P 0 8 = Pr ( Z Q < S Q A 0 T P 0 8 ( = Q Γ(U, V (4.6 where Γ(U, V is given by equation ( Closed-Form Approximations to the Probability of Error The Gaussian approximation to the probability of error for QPSK modulation results in stard expressions for the probability of symbol error the probability of bit error under Gray coding. Specifically, ( ( P s = 1 1 Q Γ(U, V (4.7 ( P b = Q Γ(U, V. (4.8 The average probability of error is obtained by averaging over the distribution of (U, V. 6

32 The Gaussian approximation to the probability of error for M-QAM also results in stard expressions for the probability of symbol error the probability of bit error under Gray coding. The probability of symbol error for an interior point in the signal constellation is P s = 4 Q( ( Γ(U, V 1 Q( Γ(U, V. (4.9 The probability of symbol error for a corner point in the signal constellation is P s = Q( ( Γ(U, V Q( Γ(U, V. (4.10 The probability of symbol error for a exterior point in the signal constellation that is not a corner point is P s = Q( ( Γ(U, V 3 Q( Γ(U, V. (4.11 The probability of symbol error for each {U, V } is obtained by averaging these probabilities of error over the uniform distribution of the transmitted data symbols {u 0,0, v 0,0 }. The resulting average probability of symbol error given {U, V } is given by P s = 4 M Q( Γ(U, V ( Q( Γ(U, V + ( M 4 M Q( Γ(U, V (3 Q( Γ(U, V + 4(M/4 M Q( Γ(U, V (1 Q( Γ(U, V. (4.1 M For 16-QAM, this simplifies to ( ( P s = 3 Q Γ(U, V 1 ( Q Γ(U, V. (4.13 The relationship between the probability of symbol error the probability of bit error for Gray-coded M-QAM depends on the value of M. The general form of the relationship is derived in [8. For 16-QAM it is given by equation (9 of [8, which is expressed in our notation as. P b = 3 4 Q( Γ(U, V ( Q( Γ(U, V + 1 Q( 9Γ(U, V Q( 5Γ(U, V. (4.14 Since Gray coding is used, the bit mappings of nearest-neighbors in the signal constellation 7

33 differ by one bit. For sufficiently large values of Γ(U, V, the probability that more than one bit is in error in the detected data symbol is negligible. The probability of bit error for M=16 is thus approximated accurately by P b = 3 4 Q( Γ(U, V (4.15 for values of the SINR of practical interest. 4. QPSK with Symbol Synchronous Inference The performance of the system with QPSK modulation in the presence of symbol-synchronous interference is approximated using the Gaussian approximation the results of Section 3..1 with equation (3.48. The accuracy of the approximation is shown in Figure 4.1, which illustrates the performance for a single symbol-synchronous interferer, no phase offset in the interferer, various values of the spreading factor N. (The results do not depend on the chip waveform. The accuracy of the approximation is considered for four values of the SIR: 0 db, 3 db, 6 db, 10 db. Comparison of the simulation results with the Gaussian approximation shows that the approximation is quite accurate for large values of N, but there is a significant difference between the Gaussian approximation the actual probability of error if N is small. As the signal-to-noise ratio E b /N 0 increases, the probability of error approaches an error floor which is due to the interference. The error in the approximation is most noticeable as the performance approaches the error floor. The performance predicted by the Gaussian approximation does not depend on the phase offset of the interfering signals, as shown in the previous chapter. The actual system performance does depend on the phase offset slightly, however, as shown in Figure 4. for various phase offsets, a spreading factor of eight, equal-power received signals. (Once again, the results do not depend on the chip waveform. The result of the Gaussian approximation is also shown, once again it is seen that the accuracy of the approximation decreases as the signal-to-noise ratio is increased. 4.3 QPSK Interference with a Fixed Delay The performance of the system with QPSK modulation in the presence of interferers with arbitrary fixed delays is approximated using the Gaussian approximation the results of Section If the chip waveform of each transmission is rectangular, the value of Γ(U, V used in the 8

34 (a Probability of error for an SIR of 0 db (b Probability of error for an SIR of 3 db (c Probability of error foran SIR of 6 db (d Probability of error for an SIR of 10 db Figure 4.1: Probability of error for QPSK with two users various values of N. approximation is given by equation (3.38. Similarly, equation (3.4 is used if the chip waveform is the raised-cosine function. The accuracy of the approximation is shown in Figure 4.3, which illustrates the performance for a single interferer, a spreading factor of eight, equal-power received signals, various values of the delay in the interferer. For either the waveform any delay, the Gaussian approximation is accurate over the range of values of E b /N 0 that are shown, though the accuracy decreases for larger values of E b /N 0 (not shown in the figure. 4.4 QPSK with a Rom Interference Delay If a uniformly distributed rom delay is imposed on each interfering signal, two different methods of Gaussian approximation can be employed. The first methods employs the variance of the interference after averaging over the rom delay. The value of Γ(U, V is given by equations (3.64 (3.59 for rectangular raised-cosine chip waveforms, respectively, with the average probability of bit error approximated by equation (4.14. The results of the approximation are shown for both waveforms in Figure 4.4a for a system with a single interferer, a spreading factor of eight, equal-power received signals. The approximation is fairly accurate if the rectangular waveform is used, but it results in significant underestimation of the probability of error if the raised-cosine 9

35 Figure 4.: Probability of bit error for QPSK with various phases of interferer, K =, N = 8, an SIR of 0 db. waveform is used, especially if the signal-to-noise ratio is large. The second method of Gaussian approximation first uses the approximation conditioned on the delay of each interferer. That is, it employs equation (4.14 together with equations (3.38 (3.4 for the respective waveforms each value of delay. The resulting approximations are given by P b = 1 0 ( Q γsinr (s ds. (4.16 The accuracy of this approximation is shown in Figure 4.4b for the same system. The approximation using this method has similar accuracy to the first method if the rectangular waveform is used. It yields much greater accuracy than the first method if the raised-cosine waveform is used, however, especially if the signal-to-noise ratio is large. 4.5 M-QAM with Symbol Synchronous Inference The performance of the system with M-QAM in the presence of symbol-synchronous interference is approximated using the Gaussian approximation the results of Section 3.. with equation (3.51. The accuracy of the approximation is shown in Figure 4.5 for 16-QAM, which illus- 30

36 (a Rectangular chip waveform. (b Raised-cosine chip waveform. Figure 4.3: Probability of bit error for QPSK with K =, various interference delays, N = 8, an SIR of 0 db. (a First method of averaging over delay. (b Second method of averaging over delay. Figure 4.4: Probability of bit error for QPSK with rom interference delay, K =, N = 8, an SIR of 0 db. 31

37 (a Probability of error for γ SIR = 0 db (b Probability of error for γ SIR = 3 db (c Probability of error for γ SIR = 3 db Figure 4.5: Probability of error for 16-QAM, chip symbol synchronous, K = various values of N. trates the performance for a single symbol-synchronous interferer, no phase offset in the interferer, various values of the spreading factor N. (The results do not depend on the chip waveform. The accuracy of the approximation is considered for four values of the SIR: 3 db, 0 db, 3 db. Comparison of the simulation results with the Gaussian approximation shows that the approximation is quite accurate for large values of N, with a moderate difference between the Gaussian approximation the actual probability of error if N is small. As the signal-to-noise ratio E b /N 0 increases, the probability of error approaches an error floor which is due to the interference. The error in the approximation is most noticeable as the performance approaches the error floor. 4.6 M-QAM Interference with a Fixed Delay The performance of the system with M-QAM in the presence of interferers with arbitrary fixed delays is approximated using the Gaussian approximation the results of Section 3.1. with equation (4.13. If the chip waveform of each transmission is rectangular, the value of Γ(U, V used in the approximation is given by equation (3.38. Similarly, equation (3.4 is used if the chip 3

38 waveform is the raised-cosine function. The accuracy of the approximation is shown in Figure 4.6, which illustrates the performance for 16-QAM, a single interferer, a spreading factor of 3, equalpower received signals, various values of the delay in the interferer. Since each delay illustrated results in chip-synchronous interference, the results are the same for both waveforms. For each delay, the Gaussian approximation is accurate over the range of values of E S /N 0 that are shown, though the accuracy decreases for larger values of E S /N 0. Figure 4.6: Probability of symbol error for 16-QAM with K =, various interference delays, an SIR of 0 db. 4.7 M-QAM with a Rom Interference Delay The second of the two methods of Gaussian approximation in Section 4.4 is considered in this section to approximate the probability of symbol error for the system using 16-QAM. The accuracy of the approximation is shown in Figure 4.7. The performance is shown for both the rectangular waveform the raised-cosine waveform. The approximation using this method very high accuracy if the signal-to-noise ratio is small reasonable accuracy if the signal-to-noise ratio is large. 33

39 Figure 4.7: Probability of symbol error for 16-QAM with rom interference delay, K =, N = 3, an SIR of 0 db. 34

40 Chapter 5 Conclusion In this thesis, closed-form expressions are developed for the variance of the interference terms in the decision statistics of a DS-SS M-QAM communication system using coherent demodulation matched-filter detection from a signal that is corrupted by multiple-access interference thermal noise. The expressions are used in a Gaussian approximation to the probability of error at the receiver which results in a simple, closed-form expressions for the approximate probability of error. Two methods of Gaussian approximation are considered for the circumstance in which each interfering signal is subjected to a rom delay relative to the desired signal. Examples of the approximations are examined for systems using QPSK modulation 16-QAM is considered. The accuracy of the approximations is very good for the system with QPSK modulation if the signal-to-noise ratio is small, but it is less accurate if the signal-to-noise ratio is large, especially in the presence of strong interference. Of the two methods of approximation under rom delays, the method that averages over Gaussian approximations which are conditioned on the delays provides greater accuracy than the method that averages the interference variance over rom delays prior to applying the Gaussian approximation. This difference is greater if the raised-cosine chip waveform is used than if the rectangular chop waveform is used. The approximations are accurate for the system with 16-QAM fixed delays, the second method of approximation under rom delays is also accurate for the 16-QAM system. 35

41 Appendices 36

42 Appendix A Conditional Joint Distribution of Key Auxiliary Rom Variables In this appendix, we consider the conditional joint distribution of the 4(K 1(N +1 rom variables, H,i = {H,i I, H,i I, HQ,i, H Q,i }, 0 i N, = 1,..., K 1, defined in Chapter 3, given the magnitudes of the data symbols transmitted in the interval of interest. That is, conditioning is { } on the set of rom variables M = M = { u,0, u, 1, v,0, v, 1 } 1 K 1. As in Chapter 3, the signature sequences of the desired signal are given. Consider first the (K 1 sets of rom variables {H,i 0 i N}, for = 1, K 1. From the definitions of the rom variables the distributions specified in Section.5, it follows immediately that the K 1 sets are conditionally mutually independent given M that conditioning for the th set can be reduced to conditioning on M. The conditional mutual independence of the (N + 1 sets H,i, 0 i N, given M is established as follows. First condition on M = {sgn( u,0, sgn( u, 1, sgn( v,0, sgn( v, 1 }. (A.1 } Each set H,i is a function of {a I, a Q,i γ for 1 i N 1, H,i γ,n is a function of { } } a I,i γ 1, aq,i γ 1. The sets {a I, a Q,i γ, 0 i N, are conditionally mutually inde-,i γ pendent given M M. The sets H,i, 0 i N, are thus conditionally mutually independent given M M. The conditional joint distribution of H,i given M M is uniform on the support { ( u, 1, u, 1, a I 0,ia Q 0,i v, 1, a I 0,ia Q 0,i v, 1, ( u, 1, u, 1, a I 0,ia Q 0,i v, 1, a I 0,ia Q 0,i v, 1, ( u, 1, u, 1, a I 0,ia Q 0,i v, 1, a I 0,ia Q 0,i v, 1, } ( u, 1, u, 1, a I 0,ia Q 0,i v, 1, a I 0,ia Q 0,i v, 1 given M M for 0 i γ 1. Similar results in terms of u,0 u, 1 result for H,i, γ i N. In each case, the conditional joint distribution of H,i given M M does not depend 37

43 on M. The sets H,i, 0 i N, are thus conditionally mutually independent given M. Each rom variable in H,i has a conditional mean of zero given M, [ (H I [( E,i M = E HI,i M = u, 1, 0 i γ 1 u,0, γ i N 1 (A. u, 1, i = N [ ( [( E H Q,i M = E HQ,i M = v, 1, 0 i γ 1 v,0, γ i N 1 (A.3 v, 1, i = N. The four rom variables H,i = {H,i I, H,i I, HQ,i, H Q,i } are not conditionally mutually independent given M for 0 i N. This is seen by noting that the fourth moment [ E H,i I H Q,i M = u, 1 v, 1 0, 0 i γ 1, i = N u,0 v,0 0, γ N 1 (A.4 whereas, each of the four has a conditional mean of zero given M. From the conditional distributions noted above, H,i I H,i I are conditionally independent given M, as are each pair of rom { } { } { variables, H,i I HQ,i, HI,i HQ,i, H Q H } Q,i,i, for 0 i N. The remaining pairs of rom variables in H, i are conditionally correlated given M, however. For example, [ E H,i I H Q,i M = u, 1 v, 1 a I 0,i, aq 0,i, 0 i γ 1, u,0 v,0 a I 0,i, aq 0,i, 0, (A.5 u, 1 v, 1 a I 0,0a Q 0,0, i = N, (Recall that a I 0,i aq 0,i are given for each i. The same result follows for E [ HI,i H Q,i M. Note that the conditional correlation coefficient of the pair of rom variables given M has a magnitude of one in either case. 38

44 Appendix B Characterization of Multiple-Access Interference In this appendix, we consider the multiple-access interference terms in equations (.13 { } (.14 by considering the rom variables U I, V I, U Q, V Q, 1,, K 1, defined in equations (3.6, (3.7, (3.10 (3.11. As in Appendix A, conditioning is on M, the signature sequences of the desired signal are given. The development in this appendix is patterned after the analogous development in [5 for a system with OQPSK DS-SS modulation. Following [5, we can show that U I = λ I ˆR ψc (S + µ I R ψc (S (B.6 where λ I = X I + Y I + H I,N 1 (B.7 µ I = X I Y I + H I,N (B.8 The rom variables X I Y I are given by X I = i A I H I,i (B.9 where Y I = i B I H I,i A I = { i, 0 i N a I 0,ia I 0,i+1 = +1 } (B.10 (B.11 B I = { i, 0 i N a I 0,ia I 0,i+1 = 1 }. (B.1 In a similar manner, V I = λ I ˆR ψc (S + µ I R ψc (S (B.13 where λ I = X I + Ỹ I + H I,N 1 (B.14 39

45 µ I = X I Ỹ I + H I,N. (B.15 The rom variables X I Ỹ I are given by X I = i A I HI,i (B.16 Ỹ I = i B I HI,i. (B.17 Furthermore, U Q = λq ˆR ψc (S + µ Q R ψ c (S (B.18 where λ Q = XQ + Y Q + HQ,N 1 (B.19 µ Q = XQ Y Q + HQ,N (B.0 The rom variables X Q Y Q are given by X Q = i A Q H Q,i (B.1 where A Q B Q are define as Y Q = i B Q H Q,i (B. } A Q = {i, 0 i N a Q 0,i aq 0,i+1 = +1 (B.3 B Q = {i, 0 i N a Q 0,i aq 0,i+1 = 1 }. (B.4 Similarly, V Q = λ Q ˆR ψc (S + µ Q R ψ c (S (B.5 40

46 where λ Q = X Q + Ỹ Q + H Q,N 1 (B.6 µ Q = X Q Ỹ I + H Q,N. (B.7 The rom variables X Q Ỹ Q are given by X Q = i A Q HQ,i (B.8 Ỹ Q = i B Q HQ,i. (B.9 Since the signature sequences of the desired signal are given, so are A I, B I, A Q, B Q. Consequently, the (K 1 sets { X I, Y I, X I, Ỹ I, X Q, Y Q, X Q, Ỹ Q, H I,N 1, H I,N, H I,N 1, H I,N, H Q,N 1, HQ,N, H Q,N 1, H Q,N, }, 1 K 1 are conditionally mutually independent given M, from the results of Appendix A. { } Consequently, so are the (K 1 sets U I, V I, U Q, V Q, 1 K 1. Furthermore, for each, the conditioning can be reduced to conditioning on M. Equations (B.6, (B.13, (B.18, (B.5 can be exped as U I = X I f(s + Y I g(s + H I,N 1 ˆR ψc (S + H I,N R ψc (S, (B.30 V I = X I f(s + Ỹ I g(s + H I,N 1 ˆR ψc (S + H I,N R ψc (S, (B.31 U Q = XQ f(s + Y Q g(s + H Q,N 1 ˆR ψc (S + H Q,N R ψ c (S, (B.3 V Q = X Q f(s + Ỹ Q g(s + H Q,N 1 ˆR ψc (S + H Q,N R ψ c (S. (B.33 41

Direct-Sequence Spread-Spectrum

Direct-Sequence Spread-Spectrum Chapter 3 Direct-Sequence Spread-Spectrum In this chapter we consider direct-sequence spread-spectrum systems. Unlike frequency-hopping, a direct-sequence signal occupies the entire bandwidth continuously.

More information

Digital Band-pass Modulation PROF. MICHAEL TSAI 2011/11/10

Digital Band-pass Modulation PROF. MICHAEL TSAI 2011/11/10 Digital Band-pass Modulation PROF. MICHAEL TSAI 211/11/1 Band-pass Signal Representation a t g t General form: 2πf c t + φ t g t = a t cos 2πf c t + φ t Envelope Phase Envelope is always non-negative,

More information

Performance Analysis of Spread Spectrum CDMA systems

Performance Analysis of Spread Spectrum CDMA systems 1 Performance Analysis of Spread Spectrum CDMA systems 16:33:546 Wireless Communication Technologies Spring 5 Instructor: Dr. Narayan Mandayam Summary by Liang Xiao lxiao@winlab.rutgers.edu WINLAB, Department

More information

A First Course in Digital Communications

A First Course in Digital Communications A First Course in Digital Communications Ha H. Nguyen and E. Shwedyk February 9 A First Course in Digital Communications 1/46 Introduction There are benefits to be gained when M-ary (M = 4 signaling methods

More information

Digital Transmission Methods S

Digital Transmission Methods S Digital ransmission ethods S-7.5 Second Exercise Session Hypothesis esting Decision aking Gram-Schmidt method Detection.K.K. Communication Laboratory 5//6 Konstantinos.koufos@tkk.fi Exercise We assume

More information

Mapper & De-Mapper System Document

Mapper & De-Mapper System Document Mapper & De-Mapper System Document Mapper / De-Mapper Table of Contents. High Level System and Function Block. Mapper description 2. Demodulator Function block 2. Decoder block 2.. De-Mapper 2..2 Implementation

More information

Data Detection for Controlled ISI. h(nt) = 1 for n=0,1 and zero otherwise.

Data Detection for Controlled ISI. h(nt) = 1 for n=0,1 and zero otherwise. Data Detection for Controlled ISI *Symbol by symbol suboptimum detection For the duobinary signal pulse h(nt) = 1 for n=0,1 and zero otherwise. The samples at the output of the receiving filter(demodulator)

More information

Power Spectral Density of Digital Modulation Schemes

Power Spectral Density of Digital Modulation Schemes Digital Communication, Continuation Course Power Spectral Density of Digital Modulation Schemes Mikael Olofsson Emil Björnson Department of Electrical Engineering ISY) Linköping University, SE-581 83 Linköping,

More information

ECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture)

ECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture) ECE 564/645 - Digital Communications, Spring 018 Homework # Due: March 19 (In Lecture) 1. Consider a binary communication system over a 1-dimensional vector channel where message m 1 is sent by signaling

More information

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n Binary Codes for synchronous DS-CDMA Stefan Bruck, Ulrich Sorger Institute for Network- and Signal Theory Darmstadt University of Technology Merckstr. 25, 6428 Darmstadt, Germany Tel.: 49 65 629, Fax:

More information

8 PAM BER/SER Monte Carlo Simulation

8 PAM BER/SER Monte Carlo Simulation xercise.1 8 PAM BR/SR Monte Carlo Simulation - Simulate a 8 level PAM communication system and calculate bit and symbol error ratios (BR/SR). - Plot the calculated and simulated SR and BR curves. - Plot

More information

Wireless Communication Technologies 16:332:559 (Advanced Topics in Communications) Lecture #17 and #18 (April 1, April 3, 2002)

Wireless Communication Technologies 16:332:559 (Advanced Topics in Communications) Lecture #17 and #18 (April 1, April 3, 2002) Wireless Communication echnologies Lecture 7 & 8 Wireless Communication echnologies 6:33:559 (Advanced opics in Communications) Lecture #7 and #8 (April, April 3, ) Instructor rof. arayan Mandayam Summarized

More information

Analog Electronics 2 ICS905

Analog Electronics 2 ICS905 Analog Electronics 2 ICS905 G. Rodriguez-Guisantes Dépt. COMELEC http://perso.telecom-paristech.fr/ rodrigez/ens/cycle_master/ November 2016 2/ 67 Schedule Radio channel characteristics ; Analysis and

More information

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM ANAYSIS OF A PARTIA DECORREATOR IN A MUTI-CE DS/CDMA SYSTEM Mohammad Saquib ECE Department, SU Baton Rouge, A 70803-590 e-mail: saquib@winlab.rutgers.edu Roy Yates WINAB, Rutgers University Piscataway

More information

EE4512 Analog and Digital Communications Chapter 4. Chapter 4 Receiver Design

EE4512 Analog and Digital Communications Chapter 4. Chapter 4 Receiver Design Chapter 4 Receiver Design Chapter 4 Receiver Design Probability of Bit Error Pages 124-149 149 Probability of Bit Error The low pass filtered and sampled PAM signal results in an expression for the probability

More information

Communication Theory Summary of Important Definitions and Results

Communication Theory Summary of Important Definitions and Results Signal and system theory Convolution of signals x(t) h(t) = y(t): Fourier Transform: Communication Theory Summary of Important Definitions and Results X(ω) = X(ω) = y(t) = X(ω) = j x(t) e jωt dt, 0 Properties

More information

Consider a 2-D constellation, suppose that basis signals =cosine and sine. Each constellation symbol corresponds to a vector with two real components

Consider a 2-D constellation, suppose that basis signals =cosine and sine. Each constellation symbol corresponds to a vector with two real components TUTORIAL ON DIGITAL MODULATIONS Part 3: 4-PSK [2--26] Roberto Garello, Politecnico di Torino Free download (for personal use only) at: www.tlc.polito.it/garello Quadrature modulation Consider a 2-D constellation,

More information

Digital Modulation 1

Digital Modulation 1 Digital Modulation 1 Lecture Notes Ingmar Land and Bernard H. Fleury Navigation and Communications () Department of Electronic Systems Aalborg University, DK Version: February 5, 27 i Contents I Basic

More information

Computing Probability of Symbol Error

Computing Probability of Symbol Error Computing Probability of Symbol Error I When decision boundaries intersect at right angles, then it is possible to compute the error probability exactly in closed form. I The result will be in terms of

More information

EE6604 Personal & Mobile Communications. Week 13. Multi-antenna Techniques

EE6604 Personal & Mobile Communications. Week 13. Multi-antenna Techniques EE6604 Personal & Mobile Communications Week 13 Multi-antenna Techniques 1 Diversity Methods Diversity combats fading by providing the receiver with multiple uncorrelated replicas of the same information

More information

Square Root Raised Cosine Filter

Square Root Raised Cosine Filter Wireless Information Transmission System Lab. Square Root Raised Cosine Filter Institute of Communications Engineering National Sun Yat-sen University Introduction We consider the problem of signal design

More information

a) Find the compact (i.e. smallest) basis set required to ensure sufficient statistics.

a) Find the compact (i.e. smallest) basis set required to ensure sufficient statistics. Digital Modulation and Coding Tutorial-1 1. Consider the signal set shown below in Fig.1 a) Find the compact (i.e. smallest) basis set required to ensure sufficient statistics. b) What is the minimum Euclidean

More information

CHAPTER 14. Based on the info about the scattering function we know that the multipath spread is T m =1ms, and the Doppler spread is B d =0.2 Hz.

CHAPTER 14. Based on the info about the scattering function we know that the multipath spread is T m =1ms, and the Doppler spread is B d =0.2 Hz. CHAPTER 4 Problem 4. : Based on the info about the scattering function we know that the multipath spread is T m =ms, and the Doppler spread is B d =. Hz. (a) (i) T m = 3 sec (ii) B d =. Hz (iii) ( t) c

More information

This examination consists of 11 pages. Please check that you have a complete copy. Time: 2.5 hrs INSTRUCTIONS

This examination consists of 11 pages. Please check that you have a complete copy. Time: 2.5 hrs INSTRUCTIONS THE UNIVERSITY OF BRITISH COLUMBIA Department of Electrical and Computer Engineering EECE 564 Detection and Estimation of Signals in Noise Final Examination 6 December 2006 This examination consists of

More information

EE5713 : Advanced Digital Communications

EE5713 : Advanced Digital Communications EE5713 : Advanced Digital Communications Week 12, 13: Inter Symbol Interference (ISI) Nyquist Criteria for ISI Pulse Shaping and Raised-Cosine Filter Eye Pattern Equalization (On Board) 20-May-15 Muhammad

More information

Summary II: Modulation and Demodulation

Summary II: Modulation and Demodulation Summary II: Modulation and Demodulation Instructor : Jun Chen Department of Electrical and Computer Engineering, McMaster University Room: ITB A1, ext. 0163 Email: junchen@mail.ece.mcmaster.ca Website:

More information

EE456 Digital Communications

EE456 Digital Communications EE456 Digital Communications Professor Ha Nguyen September 5 EE456 Digital Communications Block Diagram of Binary Communication Systems m ( t { b k } b k = s( t b = s ( t k m ˆ ( t { bˆ } k r( t Bits in

More information

Copyright license. Exchanging Information with the Stars. The goal. Some challenges

Copyright license. Exchanging Information with the Stars. The goal. Some challenges Copyright license Exchanging Information with the Stars David G Messerschmitt Department of Electrical Engineering and Computer Sciences University of California at Berkeley messer@eecs.berkeley.edu Talk

More information

Design of MMSE Multiuser Detectors using Random Matrix Techniques

Design of MMSE Multiuser Detectors using Random Matrix Techniques Design of MMSE Multiuser Detectors using Random Matrix Techniques Linbo Li and Antonia M Tulino and Sergio Verdú Department of Electrical Engineering Princeton University Princeton, New Jersey 08544 Email:

More information

Signal Design for Band-Limited Channels

Signal Design for Band-Limited Channels Wireless Information Transmission System Lab. Signal Design for Band-Limited Channels Institute of Communications Engineering National Sun Yat-sen University Introduction We consider the problem of signal

More information

Coding theory: Applications

Coding theory: Applications INF 244 a) Textbook: Lin and Costello b) Lectures (Tu+Th 12.15-14) covering roughly Chapters 1,9-12, and 14-18 c) Weekly exercises: For your convenience d) Mandatory problem: Programming project (counts

More information

Lecture 2. Fading Channel

Lecture 2. Fading Channel 1 Lecture 2. Fading Channel Characteristics of Fading Channels Modeling of Fading Channels Discrete-time Input/Output Model 2 Radio Propagation in Free Space Speed: c = 299,792,458 m/s Isotropic Received

More information

Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur

Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur Lecture - 19 Multi-User CDMA Uplink and Asynchronous CDMA

More information

that efficiently utilizes the total available channel bandwidth W.

that efficiently utilizes the total available channel bandwidth W. Signal Design for Band-Limited Channels Wireless Information Transmission System Lab. Institute of Communications Engineering g National Sun Yat-sen University Introduction We consider the problem of signal

More information

This examination consists of 10 pages. Please check that you have a complete copy. Time: 2.5 hrs INSTRUCTIONS

This examination consists of 10 pages. Please check that you have a complete copy. Time: 2.5 hrs INSTRUCTIONS THE UNIVERSITY OF BRITISH COLUMBIA Department of Electrical and Computer Engineering EECE 564 Detection and Estimation of Signals in Noise Final Examination 08 December 2009 This examination consists of

More information

Tracking of Spread Spectrum Signals

Tracking of Spread Spectrum Signals Chapter 7 Tracking of Spread Spectrum Signals 7. Introduction As discussed in the last chapter, there are two parts to the synchronization process. The first stage is often termed acquisition and typically

More information

Bayesian Data Fusion for Asynchronous DS-CDMA Sensor Networks in Rayleigh Fading

Bayesian Data Fusion for Asynchronous DS-CDMA Sensor Networks in Rayleigh Fading Bayesian Data Fusion for Asynchronous DS-CDMA Sensor Networs in Rayleigh Fading Justin S. Dyer 1 Department of EECE Kansas State University Manhattan, KS 66506 E-mail: jdyer@su.edu Balasubramaniam Natarajan

More information

Data-aided and blind synchronization

Data-aided and blind synchronization PHYDYAS Review Meeting 2009-03-02 Data-aided and blind synchronization Mario Tanda Università di Napoli Federico II Dipartimento di Ingegneria Biomedica, Elettronicae delle Telecomunicazioni Via Claudio

More information

Modulation & Coding for the Gaussian Channel

Modulation & Coding for the Gaussian Channel Modulation & Coding for the Gaussian Channel Trivandrum School on Communication, Coding & Networking January 27 30, 2017 Lakshmi Prasad Natarajan Dept. of Electrical Engineering Indian Institute of Technology

More information

Digital Communications

Digital Communications Digital Communications Chapter 5 Carrier and Symbol Synchronization Po-Ning Chen, Professor Institute of Communications Engineering National Chiao-Tung University, Taiwan Digital Communications Ver 218.7.26

More information

ECE6604 PERSONAL & MOBILE COMMUNICATIONS. Week 3. Flat Fading Channels Envelope Distribution Autocorrelation of a Random Process

ECE6604 PERSONAL & MOBILE COMMUNICATIONS. Week 3. Flat Fading Channels Envelope Distribution Autocorrelation of a Random Process 1 ECE6604 PERSONAL & MOBILE COMMUNICATIONS Week 3 Flat Fading Channels Envelope Distribution Autocorrelation of a Random Process 2 Multipath-Fading Mechanism local scatterers mobile subscriber base station

More information

Computation of Bit-Error Rate of Coherent and Non-Coherent Detection M-Ary PSK With Gray Code in BFWA Systems

Computation of Bit-Error Rate of Coherent and Non-Coherent Detection M-Ary PSK With Gray Code in BFWA Systems Computation of Bit-Error Rate of Coherent and Non-Coherent Detection M-Ary PSK With Gray Code in BFWA Systems Department of Electrical Engineering, College of Engineering, Basrah University Basrah Iraq,

More information

E303: Communication Systems

E303: Communication Systems E303: Communication Systems Professor A. Manikas Chair of Communications and Array Processing Imperial College London An Overview of Fundamentals: PN-codes/signals & Spread Spectrum (Part B) Prof. A. Manikas

More information

EE6604 Personal & Mobile Communications. Week 15. OFDM on AWGN and ISI Channels

EE6604 Personal & Mobile Communications. Week 15. OFDM on AWGN and ISI Channels EE6604 Personal & Mobile Communications Week 15 OFDM on AWGN and ISI Channels 1 { x k } x 0 x 1 x x x N- 2 N- 1 IDFT X X X X 0 1 N- 2 N- 1 { X n } insert guard { g X n } g X I n { } D/A ~ si ( t) X g X

More information

ρ = sin(2π ft) 2π ft To find the minimum value of the correlation, we set the derivative of ρ with respect to f equal to zero.

ρ = sin(2π ft) 2π ft To find the minimum value of the correlation, we set the derivative of ρ with respect to f equal to zero. Problem 5.1 : The correlation of the two signals in binary FSK is: ρ = sin(π ft) π ft To find the minimum value of the correlation, we set the derivative of ρ with respect to f equal to zero. Thus: ϑρ

More information

GEORGIA INSTITUTE OF TECHNOLOGY SCHOOL OF ELECTRICAL AND COMPUTER ENGINEERING Final Examination - Fall 2015 EE 4601: Communication Systems

GEORGIA INSTITUTE OF TECHNOLOGY SCHOOL OF ELECTRICAL AND COMPUTER ENGINEERING Final Examination - Fall 2015 EE 4601: Communication Systems GEORGIA INSTITUTE OF TECHNOLOGY SCHOOL OF ELECTRICAL AND COMPUTER ENGINEERING Final Examination - Fall 2015 EE 4601: Communication Systems Aids Allowed: 2 8 1/2 X11 crib sheets, calculator DATE: Tuesday

More information

A Simple Example Binary Hypothesis Testing Optimal Receiver Frontend M-ary Signal Sets Message Sequences. possible signals has been transmitted.

A Simple Example Binary Hypothesis Testing Optimal Receiver Frontend M-ary Signal Sets Message Sequences. possible signals has been transmitted. Introduction I We have focused on the problem of deciding which of two possible signals has been transmitted. I Binary Signal Sets I We will generalize the design of optimum (MPE) receivers to signal sets

More information

Performance of Coherent Binary Phase-Shift Keying (BPSK) with Costas-Loop Tracking in the Presence of Interference

Performance of Coherent Binary Phase-Shift Keying (BPSK) with Costas-Loop Tracking in the Presence of Interference TMO Progress Report 4-139 November 15, 1999 Performance of Coherent Binary Phase-Shift Keying (BPSK) with Costas-Loop Tracking in the Presence of Interference M. K. Simon 1 The bit-error probability performance

More information

Es e j4φ +4N n. 16 KE s /N 0. σ 2ˆφ4 1 γ s. p(φ e )= exp 1 ( 2πσ φ b cos N 2 φ e 0

Es e j4φ +4N n. 16 KE s /N 0. σ 2ˆφ4 1 γ s. p(φ e )= exp 1 ( 2πσ φ b cos N 2 φ e 0 Problem 6.15 : he received signal-plus-noise vector at the output of the matched filter may be represented as (see (5-2-63) for example) : r n = E s e j(θn φ) + N n where θ n =0,π/2,π,3π/2 for QPSK, and

More information

Decision-Point Signal to Noise Ratio (SNR)

Decision-Point Signal to Noise Ratio (SNR) Decision-Point Signal to Noise Ratio (SNR) Receiver Decision ^ SNR E E e y z Matched Filter Bound error signal at input to decision device Performance upper-bound on ISI channels Achieved on memoryless

More information

Received Signal, Interference and Noise

Received Signal, Interference and Noise Optimum Combining Maximum ratio combining (MRC) maximizes the output signal-to-noise ratio (SNR) and is the optimal combining method in a maximum likelihood sense for channels where the additive impairment

More information

Carrier Synchronization

Carrier Synchronization Chapter 8 Carrier Synchronization Marvin K. Simon and Jon Hamkins Traditionally, carrier synchronization (sync) techniques have been developed assuming that the modulation format and signal constellation

More information

2016 Spring: The Final Exam of Digital Communications

2016 Spring: The Final Exam of Digital Communications 2016 Spring: The Final Exam of Digital Communications The total number of points is 131. 1. Image of Transmitter Transmitter L 1 θ v 1 As shown in the figure above, a car is receiving a signal from a remote

More information

Digital Baseband Systems. Reference: Digital Communications John G. Proakis

Digital Baseband Systems. Reference: Digital Communications John G. Proakis Digital Baseband Systems Reference: Digital Communications John G. Proais Baseband Pulse Transmission Baseband digital signals - signals whose spectrum extend down to or near zero frequency. Model of the

More information

One Lesson of Information Theory

One Lesson of Information Theory Institut für One Lesson of Information Theory Prof. Dr.-Ing. Volker Kühn Institute of Communications Engineering University of Rostock, Germany Email: volker.kuehn@uni-rostock.de http://www.int.uni-rostock.de/

More information

Example: Bipolar NRZ (non-return-to-zero) signaling

Example: Bipolar NRZ (non-return-to-zero) signaling Baseand Data Transmission Data are sent without using a carrier signal Example: Bipolar NRZ (non-return-to-zero signaling is represented y is represented y T A -A T : it duration is represented y BT. Passand

More information

OVER the past decades, CDMA systems have primarily

OVER the past decades, CDMA systems have primarily IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 56, NO., JANUARY 8 Closed-Form BER Results for Multiple-Chip-Rate CDMA Systems Based on the Simplified Improved Gaussian Approximation MinChul Ju, Hyung-Myung

More information

Electrical Engineering Written PhD Qualifier Exam Spring 2014

Electrical Engineering Written PhD Qualifier Exam Spring 2014 Electrical Engineering Written PhD Qualifier Exam Spring 2014 Friday, February 7 th 2014 Please do not write your name on this page or any other page you submit with your work. Instead use the student

More information

Carrier and Timing Synchronization in Digital Modems

Carrier and Timing Synchronization in Digital Modems Carrier and Timing Synchronization in Digital Modems Synchronization-3 Carrier Phase Lock fred harris 21-21 June, 218 Locking to Carrier of Modulated Signal with Suppressed Carrier 2 How Can One Lock to

More information

Carrier frequency estimation. ELEC-E5410 Signal processing for communications

Carrier frequency estimation. ELEC-E5410 Signal processing for communications Carrier frequency estimation ELEC-E54 Signal processing for communications Contents. Basic system assumptions. Data-aided DA: Maximum-lielihood ML estimation of carrier frequency 3. Data-aided: Practical

More information

SNR i = 2E b 6N 3. Where

SNR i = 2E b 6N 3. Where Correlation Properties Of Binary Sequences Generated By The Logistic Map-Application To DS-CDMA *ZOUHAIR BEN JEMAA, **SAFYA BELGHITH *EPFL DSC LANOS ELE 5, 05 LAUSANNE **LABORATOIRE SYSCOM ENIT, 002 TUNIS

More information

The interference-reduced energy loading for multi-code HSDPA systems

The interference-reduced energy loading for multi-code HSDPA systems Gurcan et al. EURASIP Journal on Wireless Communications and Networing 2012, 2012:127 RESEARC Open Access The interference-reduced energy loading for multi-code SDPA systems Mustafa K Gurcan *, Irina Ma

More information

Imperfect Sampling Moments and Average SINR

Imperfect Sampling Moments and Average SINR Engineering Notes Imperfect Sampling Moments and Average SINR Dragan Samardzija Wireless Research Laboratory, Bell Labs, Lucent Technologies, 791 Holmdel-Keyport Road, Holmdel, NJ 07733, USA dragan@lucent.com

More information

CHANNEL CAPACITY CALCULATIONS FOR M ARY N DIMENSIONAL SIGNAL SETS

CHANNEL CAPACITY CALCULATIONS FOR M ARY N DIMENSIONAL SIGNAL SETS THE UNIVERSITY OF SOUTH AUSTRALIA SCHOOL OF ELECTRONIC ENGINEERING CHANNEL CAPACITY CALCULATIONS FOR M ARY N DIMENSIONAL SIGNAL SETS Philip Edward McIllree, B.Eng. A thesis submitted in fulfilment of the

More information

PSK bit mappings with good minimax error probability

PSK bit mappings with good minimax error probability PSK bit mappings with good minimax error probability Erik Agrell Department of Signals and Systems Chalmers University of Technology 4196 Göteborg, Sweden Email: agrell@chalmers.se Erik G. Ström Department

More information

Multicarrier transmission DMT/OFDM

Multicarrier transmission DMT/OFDM W. Henkel, International University Bremen 1 Multicarrier transmission DMT/OFDM DMT: Discrete Multitone (wireline, baseband) OFDM: Orthogonal Frequency Division Multiplex (wireless, with carrier, passband)

More information

BASICS OF DETECTION AND ESTIMATION THEORY

BASICS OF DETECTION AND ESTIMATION THEORY BASICS OF DETECTION AND ESTIMATION THEORY 83050E/158 In this chapter we discuss how the transmitted symbols are detected optimally from a noisy received signal (observation). Based on these results, optimal

More information

A Systematic Description of Source Significance Information

A Systematic Description of Source Significance Information A Systematic Description of Source Significance Information Norbert Goertz Institute for Digital Communications School of Engineering and Electronics The University of Edinburgh Mayfield Rd., Edinburgh

More information

Analysis of Receiver Quantization in Wireless Communication Systems

Analysis of Receiver Quantization in Wireless Communication Systems Analysis of Receiver Quantization in Wireless Communication Systems Theory and Implementation Gareth B. Middleton Committee: Dr. Behnaam Aazhang Dr. Ashutosh Sabharwal Dr. Joseph Cavallaro 18 April 2007

More information

Maximum Likelihood Sequence Detection

Maximum Likelihood Sequence Detection 1 The Channel... 1.1 Delay Spread... 1. Channel Model... 1.3 Matched Filter as Receiver Front End... 4 Detection... 5.1 Terms... 5. Maximum Lielihood Detection of a Single Symbol... 6.3 Maximum Lielihood

More information

Parameter Estimation

Parameter Estimation 1 / 44 Parameter Estimation Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay October 25, 2012 Motivation System Model used to Derive

More information

ECE 564/645 - Digital Communications, Spring 2018 Midterm Exam #1 March 22nd, 7:00-9:00pm Marston 220

ECE 564/645 - Digital Communications, Spring 2018 Midterm Exam #1 March 22nd, 7:00-9:00pm Marston 220 ECE 564/645 - Digital Communications, Spring 08 Midterm Exam # March nd, 7:00-9:00pm Marston 0 Overview The exam consists of four problems for 0 points (ECE 564) or 5 points (ECE 645). The points for each

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/4/2015

CS6956: Wireless and Mobile Networks Lecture Notes: 2/4/2015 CS6956: Wireless and Mobile Networks Lecture Notes: 2/4/2015 [Most of the material for this lecture has been taken from the Wireless Communications & Networks book by Stallings (2 nd edition).] Effective

More information

UCSD ECE153 Handout #40 Prof. Young-Han Kim Thursday, May 29, Homework Set #8 Due: Thursday, June 5, 2011

UCSD ECE153 Handout #40 Prof. Young-Han Kim Thursday, May 29, Homework Set #8 Due: Thursday, June 5, 2011 UCSD ECE53 Handout #40 Prof. Young-Han Kim Thursday, May 9, 04 Homework Set #8 Due: Thursday, June 5, 0. Discrete-time Wiener process. Let Z n, n 0 be a discrete time white Gaussian noise (WGN) process,

More information

Estimation of the Capacity of Multipath Infrared Channels

Estimation of the Capacity of Multipath Infrared Channels Estimation of the Capacity of Multipath Infrared Channels Jeffrey B. Carruthers Department of Electrical and Computer Engineering Boston University jbc@bu.edu Sachin Padma Department of Electrical and

More information

Upper Bounds for the Average Error Probability of a Time-Hopping Wideband System

Upper Bounds for the Average Error Probability of a Time-Hopping Wideband System Upper Bounds for the Average Error Probability of a Time-Hopping Wideband System Aravind Kailas UMTS Systems Performance Team QUALCOMM Inc San Diego, CA 911 Email: akailas@qualcommcom John A Gubner Department

More information

Kevin Buckley a i. communication. information source. modulator. encoder. channel. encoder. information. demodulator decoder. C k.

Kevin Buckley a i. communication. information source. modulator. encoder. channel. encoder. information. demodulator decoder. C k. Kevin Buckley - -4 ECE877 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set Review of Digital Communications, Introduction to

More information

ADAPTIVE DETECTION FOR A PERMUTATION-BASED MULTIPLE-ACCESS SYSTEM ON TIME-VARYING MULTIPATH CHANNELS WITH UNKNOWN DELAYS AND COEFFICIENTS

ADAPTIVE DETECTION FOR A PERMUTATION-BASED MULTIPLE-ACCESS SYSTEM ON TIME-VARYING MULTIPATH CHANNELS WITH UNKNOWN DELAYS AND COEFFICIENTS ADAPTIVE DETECTION FOR A PERMUTATION-BASED MULTIPLE-ACCESS SYSTEM ON TIME-VARYING MULTIPATH CHANNELS WITH UNKNOWN DELAYS AND COEFFICIENTS Martial COULON and Daniel ROVIRAS University of Toulouse INP-ENSEEIHT

More information

Lecture 7: Wireless Channels and Diversity Advanced Digital Communications (EQ2410) 1

Lecture 7: Wireless Channels and Diversity Advanced Digital Communications (EQ2410) 1 Wireless : Wireless Advanced Digital Communications (EQ2410) 1 Thursday, Feb. 11, 2016 10:00-12:00, B24 1 Textbook: U. Madhow, Fundamentals of Digital Communications, 2008 1 / 15 Wireless Lecture 1-6 Equalization

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

392D: Coding for the AWGN Channel Wednesday, January 24, 2007 Stanford, Winter 2007 Handout #6. Problem Set 2 Solutions

392D: Coding for the AWGN Channel Wednesday, January 24, 2007 Stanford, Winter 2007 Handout #6. Problem Set 2 Solutions 392D: Coding for the AWGN Channel Wednesday, January 24, 2007 Stanford, Winter 2007 Handout #6 Problem Set 2 Solutions Problem 2.1 (Cartesian-product constellations) (a) Show that if A is a K-fold Cartesian

More information

AALTO UNIVERSITY School of Electrical Engineering. Sergio Damian Lembo MODELING BLER PERFORMANCE OF PUNCTURED TURBO CODES

AALTO UNIVERSITY School of Electrical Engineering. Sergio Damian Lembo MODELING BLER PERFORMANCE OF PUNCTURED TURBO CODES AALTO UNIVERSITY School of Electrical Engineering Sergio Damian Lembo MODELING BLER PERFORMANCE OF PUNCTURED TURBO CODES Thesis submitted for examination for the degree of Master of Science in Technology

More information

X b s t w t t dt b E ( ) t dt

X b s t w t t dt b E ( ) t dt Consider the following correlator receiver architecture: T dt X si () t S xt () * () t Wt () T dt X Suppose s (t) is sent, then * () t t T T T X s t w t t dt E t t dt w t dt E W t t T T T X s t w t t dt

More information

3.2 Complex Sinusoids and Frequency Response of LTI Systems

3.2 Complex Sinusoids and Frequency Response of LTI Systems 3. Introduction. A signal can be represented as a weighted superposition of complex sinusoids. x(t) or x[n]. LTI system: LTI System Output = A weighted superposition of the system response to each complex

More information

Projects in Wireless Communication Lecture 1

Projects in Wireless Communication Lecture 1 Projects in Wireless Communication Lecture 1 Fredrik Tufvesson/Fredrik Rusek Department of Electrical and Information Technology Lund University, Sweden Lund, Sept 2018 Outline Introduction to the course

More information

Expected Error Based MMSE Detection Ordering for Iterative Detection-Decoding MIMO Systems

Expected Error Based MMSE Detection Ordering for Iterative Detection-Decoding MIMO Systems Expected Error Based MMSE Detection Ordering for Iterative Detection-Decoding MIMO Systems Lei Zhang, Chunhui Zhou, Shidong Zhou, Xibin Xu National Laboratory for Information Science and Technology, Tsinghua

More information

EE 661: Modulation Theory Solutions to Homework 6

EE 661: Modulation Theory Solutions to Homework 6 EE 66: Modulation Theory Solutions to Homework 6. Solution to problem. a) Binary PAM: Since 2W = 4 KHz and β = 0.5, the minimum T is the solution to (+β)/(2t ) = W = 2 0 3 Hz. Thus, we have the maximum

More information

Burst Markers in EPoC Syed Rahman, Huawei Nicola Varanese, Qualcomm

Burst Markers in EPoC Syed Rahman, Huawei Nicola Varanese, Qualcomm Burst Markers in EPoC Syed Rahman, Huawei Nicola Varanese, Qualcomm Page 1 Introduction Burst markers are used to indicate the start and end of each burst in EPoC burst mode The same marker delimits the

More information

1. Band-pass modulations. 2. 2D signal set. 3. Basis signals p(t)cos(2πf 0 t) e p(t)sin(2πf 0 t) 4. Costellation = m signals, equidistant on a circle

1. Band-pass modulations. 2. 2D signal set. 3. Basis signals p(t)cos(2πf 0 t) e p(t)sin(2πf 0 t) 4. Costellation = m signals, equidistant on a circle TUTORIAL ON DIGITAL MODULATIONS Part 14: m-psk [last modified: 2010-11-25] Roerto Garello, Politecnico di Torino Free download at: www.tlc.polito.it/garello (personal use only) 1 m-psk modulations 1. Band-pass

More information

FREE Space Optical (FSO) communications has been

FREE Space Optical (FSO) communications has been 1 Joint Detection of Multiple Orbital Angular Momentum Optical Modes Mohammed Alfowzan, Member, IEEE, Jaime A Anguita, Member, IEEE and Bane Vasic, Fellow, IEEE, Abstract We address the problem of detection

More information

New theoretical framework for OFDM/CDMA systems with peak-limited nonlinearities

New theoretical framework for OFDM/CDMA systems with peak-limited nonlinearities Science in China Series F: Information Sciences 7 SCIENCE IN CHINA PRESS Springer New theoretical framewor for OFDM/CDMA systems with pea-limited nonlinearities WANG Jian, ZHANG Lin, SHAN XiuMing & REN

More information

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver Michael R. Souryal and Huiqing You National Institute of Standards and Technology Advanced Network Technologies Division Gaithersburg,

More information

Problem Set 7 Due March, 22

Problem Set 7 Due March, 22 EE16: Probability and Random Processes SP 07 Problem Set 7 Due March, Lecturer: Jean C. Walrand GSI: Daniel Preda, Assane Gueye Problem 7.1. Let u and v be independent, standard normal random variables

More information

PCM Reference Chapter 12.1, Communication Systems, Carlson. PCM.1

PCM Reference Chapter 12.1, Communication Systems, Carlson. PCM.1 PCM Reference Chapter 1.1, Communication Systems, Carlson. PCM.1 Pulse-code modulation (PCM) Pulse modulations use discrete time samples of analog signals the transmission is composed of analog information

More information

Multi User Detection I

Multi User Detection I January 12, 2005 Outline Overview Multiple Access Communication Motivation: What is MU Detection? Overview of DS/CDMA systems Concept and Codes used in CDMA CDMA Channels Models Synchronous and Asynchronous

More information

Principles of Communications Lecture 8: Baseband Communication Systems. Chih-Wei Liu 劉志尉 National Chiao Tung University

Principles of Communications Lecture 8: Baseband Communication Systems. Chih-Wei Liu 劉志尉 National Chiao Tung University Principles of Communications Lecture 8: Baseband Communication Systems Chih-Wei Liu 劉志尉 National Chiao Tung University cwliu@twins.ee.nctu.edu.tw Outlines Introduction Line codes Effects of filtering Pulse

More information

THE PROBLEM of digital blind feedforward symbol

THE PROBLEM of digital blind feedforward symbol IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO. 4, APRIL 2006 737 Unified Analysis of a Class of Blind Feedforward Symbol Timing Estimators Employing Second-Order Statistics Yi-Chung Wu and Erchin

More information

Modulation Classification and Parameter Estimation in Wireless Networks

Modulation Classification and Parameter Estimation in Wireless Networks Syracuse University SURFACE Electrical Engineering - Theses College of Engineering and Computer Science 6-202 Modulation Classification and Parameter Estimation in Wireless Networks Ruoyu Li Syracuse University,

More information

MATHEMATICAL TOOLS FOR DIGITAL TRANSMISSION ANALYSIS

MATHEMATICAL TOOLS FOR DIGITAL TRANSMISSION ANALYSIS ch03.qxd 1/9/03 09:14 AM Page 35 CHAPTER 3 MATHEMATICAL TOOLS FOR DIGITAL TRANSMISSION ANALYSIS 3.1 INTRODUCTION The study of digital wireless transmission is in large measure the study of (a) the conversion

More information

The E8 Lattice and Error Correction in Multi-Level Flash Memory

The E8 Lattice and Error Correction in Multi-Level Flash Memory The E8 Lattice and Error Correction in Multi-Level Flash Memory Brian M Kurkoski University of Electro-Communications Tokyo, Japan kurkoski@iceuecacjp Abstract A construction using the E8 lattice and Reed-Solomon

More information