Performance Analysis of Spread Spectrum CDMA systems

Similar documents
Wireless Communication Technologies 16:332:559 (Advanced Topics in Communications) Lecture #17 and #18 (April 1, April 3, 2002)

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM

Multi User Detection I

OVER the past decades, CDMA systems have primarily

The Performance of Quaternary Amplitude Modulation with Quaternary Spreading in the Presence of Interfering Signals

Direct-Sequence Spread-Spectrum

Approximate Minimum Bit-Error Rate Multiuser Detection

Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur

ECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture)

Multiuser Detection. Summary for EECS Graduate Seminar in Communications. Benjamin Vigoda

Multiuser Capacity Analysis of WDM in Nonlinear Fiber Optics

ADAPTIVE DETECTION FOR A PERMUTATION-BASED MULTIPLE-ACCESS SYSTEM ON TIME-VARYING MULTIPATH CHANNELS WITH UNKNOWN DELAYS AND COEFFICIENTS

LPI AND BER PERFORMANCE OF A CHAOTIC CDMA SYSTEM USING DIFFERENT DETECTION STRUCTURES

TRANSMISSION OF VECTOR QUANTIZATION OVER A FREQUENCY-SELECTIVE RAYLEIGH FADING CDMA CHANNEL

Onamethodtoimprove correlation properties of orthogonal polyphase spreading sequences

SINR, Power Efficiency, and Theoretical System Capacity of Parallel Interference Cancellation

Performance of Coherent Binary Phase-Shift Keying (BPSK) with Costas-Loop Tracking in the Presence of Interference

EM Channel Estimation and Data Detection for MIMO-CDMA Systems over Slow-Fading Channels

Design of MMSE Multiuser Detectors using Random Matrix Techniques

EE4512 Analog and Digital Communications Chapter 4. Chapter 4 Receiver Design

Lecture 7: Wireless Channels and Diversity Advanced Digital Communications (EQ2410) 1

Square Root Raised Cosine Filter

Computation of Bit-Error Rate of Coherent and Non-Coherent Detection M-Ary PSK With Gray Code in BFWA Systems

Signal Design for Band-Limited Channels

CHAPTER 14. Based on the info about the scattering function we know that the multipath spread is T m =1ms, and the Doppler spread is B d =0.2 Hz.

Blind Successive Interference Cancellation for DS-CDMA Systems

Digital Band-pass Modulation PROF. MICHAEL TSAI 2011/11/10

SNR i = 2E b 6N 3. Where

Output MAI Distributions of Linear MMSE Multiuser Receivers in DS-CDMA Systems

Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers

Cell throughput analysis of the Proportional Fair scheduler in the single cell environment

Optimal Sequences and Sum Capacity of Synchronous CDMA Systems

that efficiently utilizes the total available channel bandwidth W.

Interactions of Information Theory and Estimation in Single- and Multi-user Communications

This examination consists of 11 pages. Please check that you have a complete copy. Time: 2.5 hrs INSTRUCTIONS

Linear and Nonlinear Iterative Multiuser Detection

A First Course in Digital Communications

Multistage Nonlinear Blind Interference Cancellation for DS-CDMA Systems

This examination consists of 10 pages. Please check that you have a complete copy. Time: 2.5 hrs INSTRUCTIONS

Optimum Signature Sequence Sets for. Asynchronous CDMA Systems. Abstract

Communication Theory Summary of Important Definitions and Results

EE456 Digital Communications

CHIRP spread spectrum (CSS) is a spread spectrum technique

Coding theory: Applications

ECE Information theory Final (Fall 2008)

Research Article An Iterative Soft Bit Error Rate Estimation of Any Digital Communication Systems Using a Nonparametric Probability Density Function

Decoupling of CDMA Multiuser Detection via the Replica Method

Modulation & Coding for the Gaussian Channel

A Systematic Description of Source Significance Information

Data Detection for Controlled ISI. h(nt) = 1 for n=0,1 and zero otherwise.

Chapter 2 Signal Processing at Receivers: Detection Theory

MODULATION AND CODING FOR QUANTIZED CHANNELS. Xiaoying Shao and Harm S. Cronie

Lecture 1: The Multiple Access Channel. Copyright G. Caire 12

Upper Bounds for the Average Error Probability of a Time-Hopping Wideband System

Interleave Division Multiple Access. Li Ping, Department of Electronic Engineering City University of Hong Kong

Effect of Multipath Propagation on the Noise Performance of Zero Crossing Digital Phase Locked Loop

A Matrix-Algebraic Approach to Linear Parallel Interference Cancellation in CDMA

Principles of Communications

Determining the Optimal Decision Delay Parameter for a Linear Equalizer

Information Theory for Wireless Communications, Part II:

UTA EE5362 PhD Diagnosis Exam (Spring 2011)

Bit Error Rate Estimation for a Joint Detection Receiver in the Downlink of UMTS/TDD

Bayesian Data Fusion for Asynchronous DS-CDMA Sensor Networks in Rayleigh Fading

Estimation of the Optimum Rotational Parameter for the Fractional Fourier Transform Using Domain Decomposition

BLIND CHIP-RATE EQUALISATION FOR DS-CDMA DOWNLINK RECEIVER

Iterative Equalization using Improved Block DFE for Synchronous CDMA Systems

Random Matrices and Wireless Communications

BASICS OF DETECTION AND ESTIMATION THEORY

Digital Transmission Methods S

Game Theoretic Approach to Power Control in Cellular CDMA

Genetic Algorithm Applied to Multipath Multiuser Channel Estimation in DS/CDMA Systems

Genetic Algorithm Assisted Multiuser Detection for Asynchronous Multicarrier CDMA Hua Wei and Lajos Hanzo 1

EE 574 Detection and Estimation Theory Lecture Presentation 8

Residual Versus Suppressed-Carrier Coherent Communications

Virtual Array Processing for Active Radar and Sonar Sensing

a) Find the compact (i.e. smallest) basis set required to ensure sufficient statistics.

EVALUATION OF PACKET ERROR RATE IN WIRELESS NETWORKS

ECE6604 PERSONAL & MOBILE COMMUNICATIONS. Week 3. Flat Fading Channels Envelope Distribution Autocorrelation of a Random Process

Constellation Shaping for Communication Channels with Quantized Outputs

Estimation of the Capacity of Multipath Infrared Channels

Cooperative Diversity in CDMA over Nakagami m Fading Channels

Efficient OOK/DS-CDMA Detection Threshold Selection

Es e j4φ +4N n. 16 KE s /N 0. σ 2ˆφ4 1 γ s. p(φ e )= exp 1 ( 2πσ φ b cos N 2 φ e 0

Parameter Estimation

Summary: SER formulation. Binary antipodal constellation. Generic binary constellation. Constellation gain. 2D constellations

Large Zero Autocorrelation Zone of Golay Sequences and 4 q -QAM Golay Complementary Sequences

ELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications

s o (t) = S(f)H(f; t)e j2πft df,

Non Orthogonal Multiple Access for 5G and beyond

Expectation propagation for signal detection in flat-fading channels

Research Article Multigroup Synchronization in 1D-Bernoulli Chaotic Collaborative CDMA

A Novel Blind Multiuser Detection Algorithm Based on Support Vector Machines

Performance of DS-CDMA Systems With Optimal Hard-Decision Parallel Interference Cancellation

Lecture 12. Block Diagram

Data-aided and blind synchronization

Binary De Bruijn sequences for DS-CDMA systems: analysis and results

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels

Approximate BER for OFDM Systems Impaired by a Gain Mismatch of a TI-ADC Realization

Electronics and Communication Exercise 1

Transcription:

1 Performance Analysis of Spread Spectrum CDMA systems 16:33:546 Wireless Communication Technologies Spring 5 Instructor: Dr. Narayan Mandayam Summary by Liang Xiao lxiao@winlab.rutgers.edu WINLAB, Department of Electrical Engineering, Rutgers University I. INTRODUCTION In this lecture, we present the mathematical analysis on the average bit error rate for multi-users in a single channel of the spread spectrum, Code Division Multiple Access (SS-CDMA) mobile radio system. We present expressions of BER performance of CDMA systems for a wide range of interference conditions for both synchronous case and asynchronous case, including Gaussian approximations (GA), Improved Gaussian Approximation (IGA), and Simple Improved Gaussian Approximation (SIGA). After the discussion for the single user detection, we discuss the key idea of the multiuser detection in the CDMA systems for high speed data transmission. The rest of the paper is organized as follows: In section II, we present the multiuser CDMA system model. In section III, we discuss the single user detection for the CDMA systems. In section IV, we present in detail the probability of error of the synchronous case with the single user detection for the CDMA systems. In section V, we discuss the probability of error of the asynchronous case with the single user detection for the CDMA systems, including GA, IGA and SIGA algorithms. Finally, in section VI, we discuss the multiuser detection for the CDMA systems. II. MULTIUSER CDMA SYSTEM MODEL In this report, we assume that the spread spectrum, Code Division Multiple Access (SS- CDMA) systems utilize BPSK modulation and the transmitted waveform from the -th user is

given by s (t) = P c (t)b (t) cos (ω c t + θ ), = 1,...K (1) where P is the transmission power of user, θ is the carrier phase offset of user relative to reference user, b (t) is the data sequence for user and c (t) is the spreading or chip sequence for user given by where c (n) and b (n) c (t) = Σ n= c (n) p Tc (t nt c ) () b (t) = Σ n= c (n) p T (t nt ) (3) are both { 1, +1}, T c is the chip period of the pseudo noise (PN) sequence c (n), T is bit period that satisfy T = NT c. We assume AWGN channel for the transmission of K users and the system model is shown in Fig. (1). We can get the expression of the received signal at the BS as r(t) = Σ K =1 P c (t τ )b (t τ ) cos (ω c t + φ ) + n(t) (4) where τ [, T ) is the delay of the -th user to user, and φ [, π) is the received carrier offset of user given by φ = θ ω c τ (5) s1() t s ( ) t s K (t)... r(t) + receiver n(t) Fig. 1. System Model in our Analysis

3 r(t) T z 1 c(t)cos( 1 t) c Fig.. MF receiver for single user detection b ( t) 1 () b 1 T b ( t) ( 1) b () b Fig. 3. For the asynchronous case. III. SINGLE USER DETECTION In this section, we study the single user detection and focus on user 1. Assume the receiver is synchronous to user 1, then without loss of generality, we can assume that τ 1 =,ρ 1 =. The structure of the matched filter (MF) receiver that is optimal for single user environment is illustrated as the figure below,

4 The output of the MF receiver z 1 shown in Fig. () is given by z 1 = = n 1 = T =1 T c 1 (t) cos(ω c t)r(t)dt T P / c 1 (t)c (t τ )b (t τ ) cos(φ )dt + n 1 (6) n(t)c 1 (t) cos(ω c t)dt (7) By introducing the continues time partial cross correlation functions, we can simplify the expression of z 1 as P1 z 1 = T P b() 1 + [b( 1) R,1 (τ ) + b () ˆR,1 (τ )] cos(φ ) + n 1 (8) where the continues time partial cross correlation functions are R,1 (τ) = ˆR,1 (τ) = τ T τ c (t τ)c 1 (t)dt, τ T (9) c (t τ)c 1 (t)dt, τ T (1) IV. SYNCHRONOUS CASE For the case of synchronous users, we get φ = and τ = for any. In this case, each interference contributes to only one term, i.e., P1 z 1 = T P b() 1 + b() R,1 (τ ) + n 1 (11) where R,1 = c T c 1 T N where n 1 N(, N T 4 ), c is the spreading code vector of length N for user, and c 1 is the spreading code vector for user 1. When users are orthogonal, i.e., c T c 1 = δ i, we obtain P1 z 1 = T b() 1 + n 1 (13) Thus the bit error rate in this case is given by Eb P b,1 = Q( ) (14) N (1)

5 We can see that it is the same as that of the single user case on AWGN channel. Because of the orthogonality restriction on c, it is possible only for K N. On the other hand, in the case where the orthogonality is not satisfied, say, users use random codes {c } K =1 that are random binary vectors, we can use the following two steps to calculate the probability of error, Step 1. : Fix codes and bits of other users, and then find conditioned probability of error P b,1 ({R,1 }, {b () }); Step. : Find the averaged probability of error P b,1 by averaging over {R,1 } and {b () }. In step 1, we have P b,1 ({R,1 }, {b () }) = P r(z 1 < b () 1 = 1) = Q( P 1 T + K Eb = Q( + N And in step, we get P b,1 = E [Q( Eb () {b }{R,1 + } N N T 4 P b() Eb, Eb, R,1 b () N b () N ) R,1 T ) (15) R,1 )] (16) T We can see that the expression above is not convenient for analysis, unless some approximation is introduced. A. Gaussian Approximation (GA) Now we use Gaussian approximation to analyze the BER performance of the synchronous case. We assume equal power for each user, i.e., P = P for all, and a very large K. Let I 1 present the interferences from all the other users, i.e., I 1 = K P b() R,1. The main idea of this approach is to approximate I 1 as Gaussian variable, with mean and variance as P E[I 1 ] = E[b() ]E[R,1 ] = (17) V ar[i 1 ] = P E[b () ] V ar[r,1 ] (18)

6 Consider R,1 = c T T c 1, we can easily obtain N We get a very useful approximation of P b,1 by when K is large. P b,1 = Q( Q( V ar[r,1 ] = ( T N ) N = T N (19) V ar[i 1 ] = P T (K 1) N () N T P T 4 + P T N (K 1) ) (1) P T ) = Q( P T (K 1) N N K 1 ) () V. ASYNCHRONOUS CASE For the case of asynchronous users, the output of the MF receiver of user 1 is given by P1 z 1 = T P b() 1 + T I,1(b, τ, φ ) + n 1 (3) where I,1 (b, τ, φ ) = 1 T [b( 1) R,1 (τ ) + b () R (τ )] cos(φ ) (4) Assume for any, P = P, then Eq.(3) can be simplified by b = [b ( 1) b () ] (5) where z 1 = I 1 (b, τ, φ) = P T [b() 1 + I 1 (b, τ, φ)] + n 1 (6) I 1, (b, τ, φ ) (7) b = (b, b 3,..., b K ) (8) τ = (τ,..., τ K ), φ = (φ,..., φ K ) (9)

7 b1, Tb = NTc User 1 C1,i C1,i+1 C1,i+ C1,i+N-1 k T k C User k Ck, 1 C k k, k Ck, left bit bk,-1 right bit bk, Fig. 4. Timing of PN sequence in the case of asynchronous 1, For fixed b, τ, φ, we can get the conditioned probability of error when user 1 transmits b () 1 = Otherwise, if user 1 transmits b () 1 = +1, P b, 1 = P r(z 1 > b () 1 = 1) P = P r{ T [ 1 + I 1(b, τ, φ)] + n 1 > } Eb = Q( (1 I 1 (b, τ, φ)) (3) N P b, 1 = E b,τ,φ [Q( Eb N (1 I 1 (b, τ, φ))] (31) P b,1 = P r(z 1 < b () 1 = +1) P = P r{ T [1 + I 1(b, τ, φ)] + n 1 > } Eb = Q( (1 + I 1 (b, τ, φ)) (3) N P b,1 = E b,τ,φ [Q( Eb N (1 + I 1 (b, τ, φ))] (33)

8 We can see that the error probability P b, 1 and P b,+1 are difficult to compute. However, there exists good bounds to approximate it. A. Gaussian Approximations (GA) In the Gaussian approximations, we model I 1 (b, τ, φ) as Gaussian variable. b (m) and b (n) i assumed to be independent for any i, m n. For any i l, we assume τ i and τ l are independent and uniformly distributed in [, T ). φ i and φ l are independent for any i l, and are distributed uniformly in [, π). Then we can get E[I 1 (b, τ, φ)] = (34) V ar[i 1 (b, τ, φ)] = are σ,1 (35) V ar[z 1 b () 1 = 1] = N T/4 + P T σ,1 (36) Thus, the probability of error is P/T P b,1 = Q( ) (37) (N T/4) + P T K σ,1 Eb 1 = Q( ( N 1 + E b K )) (38) N σ,1 Interference from user k to user 1, I k,1 = T The delay of user k to relative to user 1 as Pk b k (t τ k )c k (t τ k )c 1 (t) cos(ω c t + φ k ) cos(ω c t)dt (39) τ k = ν k T c + k, k T c (4) Pk I k,1 = T c cos(φ k){x k + (1 k )y k + (1 k )u k + k v k } (41) T c T c T c

9 x k,y k,u k and v k have distribution conditioned on A and B as follows, p xk (l) = A l+a p yk (l) = B l+b A, l = A, A +,..., A, A (4) B, l = B, B +,..., B, B (43) p uk (l) = 1/, l = 1, +1 (44) p vk (l) = 1/, l = 1, +1 (45) where A and B are defined as follows, A is the number of integers in [, N ] for which c 1,l+i c 1,l+i+1 = 1 (46) In another word, A measures for a given code the number of successive no transitions from +1 to 1 in the code c 1. Similarly, B is the number of integers in [, N ] for which c 1,l+i c 1,l+i+1 = 1 (47) In another word, A measures for a given code the number of successive transitions from +1 to 1 in the code c 1. A and B are disoint and span the set of total possible signature sequences of length N where there are a total of N 1 possible chip level transitions, that is to say, For random signature sequence, statistic of A + B = N 1 (48) σ,1 = 1 T E[cos (φ )]E[(b ( 1) R,1 (τ ) + b () ˆR,1 (τ )) ] (49) For random signature sequence, it is possible to model b ( 1) R,1 (τ ) + b () ˆR,1 (τ ) = N x l (5) l=1 Uniform ( T x l =, T ) w.p. 1 N N Bernoulli ( T, T, 1) w.p. 1 N N (51)

1 The mean and variance of x l are given by Then we can get E[x l ] = (5) V ar[x l ] = 1 3 ( T N ) + 1 ( T N ) = 3 ( T N ) (53) σ,1 = 1 3N Thus for the high SNR area, we get a good approximation of the probability as It is better than Q( N K 1 (54) Eb 1 K 1 P b,1 = Q( ( )) (55) N 1 + E b 3N N 3N Q( K 1 ) (56) )the synchronous case. Problems with analytical expressions derived here. When K is not large or users have disparate powers, the Gaussian approximation above is not appropriate. Fortunately, there are other methods to solve the question. B. Improved Gaussian Approximation (IGA) In the situation where the Gaussian Approximation is not appropriate, we can utilize a more in-depth analysis called improved Gaussian Approximation (IGA), which defines the interference terms I k conditioned on the particular operating condition of each user. Thus each I k becomes Gaussian for large K. Let ψ as the variance of the multiple access interference for a specific operating condition, ψ = V ar[i 1 (φ, τ, P, c 1,..., c K ) φ, τ, P, c 1,..., c K ] (57) = V ar[i 1 ( ) φ, { k }, {P k }, B] (58) P T P b,1 = E[Q( ψ )] P T = Q( ψ )f ψ(ψ)dψ (59)

11 It is possible to show that where ψ = = k= T c P k cos φ k ( N + (B + 1)[( k T c ) k T c ]) (6) z k (61) k= z k = T c P ku k v k (6) u k = (1 + cos(φ k )) (63) v k = N + (B + 1)(( k T c ) k T c ) (64) Using this method, we can approximate the probability of error for the case in which the power levels of the interfering users are constant but unequal and the case in which the power levels of the interfering users are independent and identically distributed random variables. C. Simple Improved Gaussian Approximation (SIGA) A simple improved Gaussian approximation (SIGA) method is based on the Taylor series for a continues function f(x) as f(x) = f(u) + (x u)f (u) + 1 (x u) f (u) +... (65) If x is a random variable and E[x] = u,, then If derivatives are expressed as difference f(x) = f(u) + (x u)[ If we neglect the higher order terms, E[f(x)] = f(u) + σ f (u) +... (66) f(u + h) f(u h) ] + 1 h (x f(u + h) f(u) + f(u h) u) ( ) +... h (67) E[f(x)] =. f(u) + σ + h) f(u) + f(u h) [f(u ] (68) h It was shown that h = 3σ is a good choice for generality of approximation, which yields, E[f(x)] = 3 f(u) + 1 6 f(u + 3σ) + 1 6 f(u 3σ) (69)

1 Therefore, we can get the average probability of error by P Tb P e = E[Q( )] (7) ψ P 3 Q( Tb ) + 1 µ ψ 6 Q( P Tb (µ ψ + 3σ ψ ) ) + 1 6 Q( P Tb (µ ψ 3σ ψ ) ) (71) The figures below illustrate the average bit error rates (BER) for single-cell CDMA systems using the different analytical algorithms discussed above. For the figure shown, the processing gain, N, is 31 chips per bit. In Fig. (5), K = [K/] users have power level P 1 /4, while K 1 = K K 1 have power level P 1. In Fig.(6), the interferer power levels obey a log-normal distribution with standard deviation of 5dB [7]. Fig. 5. BER for a desired user vs. K with fixed power levels for all K users. [7] Common like single user detection Gaussian Interference. We can see that single user detection cannot work very well under the high rate services, because N = W R T b T c decrease with R.

13 Fig. 6. BER vs. K with i.i.d power levels of the interference users. [7] VI. MULTIUSER DETECTION Interference signals in spread spectrum multiple access need not be treated as noise. If the spreading code of the interference signal is known, then that signal can be detected and subtracted out. Multiuser detection deals with the demodulation of mutually interfering digital signals, which exploits the structure of the multiaccess interference. This technique is applicable to multiaccess techniques such as asynchronous CDMA (where interuser interference occurs by design) and TDMA (where interuser interference occurs due to nonideal effects such as channel distortion and out-of-cell interference). Sergio Verdu s work in 198s [8] pioneered the receiver design technology of multiuser detection.

14 A. The Matched Filter in the CDMA Channel This section are focusing on the probability of error for synchronous uses. The received signal due to k users is y(t) = A k b k S k (t) + σn(t), (7) k=1 where S k (t) is the signature waveform assign to user k. Without loss of generality, S k (t) is normalized as S k = T S k(t)dt = 1. (73) A k is the received amplitude of the kth user and A k >. Note that A k is the energy of the received signal due to the normalized S k (t). b k { 1, 1} is the bit transmitted by the kth user with period T. n(t) is the white Gaussian noise with zero mean and unity power spectrum density. The output of the match filter for the kth user is y k = T where ρ,k = y(t)s k (t)dt (74) = A k b k + k A b ρ,k + n k (75) n k = σ T T S (t)s k (t)dt (76) n(t)s k (t)dt (77) Note that the noise component n k N(, σ ). If the signature are orthogonal, the cross correlation ρ,k = so that the probability of error for the kth user is ρ c k(σ) = Q where the superscript c denotes the probability of error when a conventional receiver is used. The probability of error is the same as the one in the single user case. If the signature are not orthogonal, the statistics are not Gaussian anymore. Consider k = users. Let ρ 1, = ρ and the received signal by the matched filter for user 1 is then y 1 = A 1 b 1 + A b ρ + n 1 (79) ( Ak σ ) (78)

15 The probability of error of user 1 is P c 1 (σ) = P { ˆb 1 b 1 } (8) = P [b 1 = +1]P [y 1 < b 1 = +1] + P [b 1 = 1]P [y 1 > b 1 = 1] (81) according to the decision rule for the conventional matched filter. Since y 1 is conditioned on b as well, it is not Gaussian. Hence, we have P [y 1 > b 1 = 1] = P [y 1 > b 1 = 1, b = +1]P [b = +1] (8) + P [y 1 > b 1 = 1, b = 1]P [b = 1] (83) = P [n 1 > A 1 A ρ]p [b = +1] + P [n 1 > A 1 + A ρ]p [b = 1] (84) = 1 ( ) Q A1 A ρ + 1 ( ) σ Q A1 + A ρ (85) σ = 1 ( ) Q A1 A ρ + 1 ( ) σ Q A1 + A ρ (86) σ The first equality follows from the fact that b 1 and b are independent. By symmetry, P [y 1 < b 1 = +1] = P [y 1 > b 1 = 1]. Therefore, the probability of error of user 1 is P1 c (σ) = 1 ( ) Q A1 A ρ + 1 ( ) σ Q A1 + A ρ σ Interchanging the roles of user 1 and, we have P c (σ) = 1 ( ) Q A A 1 ρ + 1 ( ) σ Q A + A 1 ρ σ Let us consider user 1. Since Q(x) is a monotonically decreasing function, ( ) P1 c A1 A ρ (σ) Q σ This bound is smaller than 1/ provided A /A 1 < 1/ ρ, i.e., the interferer is not dominant. Note as σ, (87) is dominated by the term with the smallest argument and hence the upper bound is an excellent approximation (for all but low SNRs). Therefore, BER of conventional ( ) receiver behaves like a single user system with a reduced SNR, A1 A ρ. However, if relative amplitude of interferer is stronger, i.e., A /A 1 > 1/ ρ, then the conventional receiver exhibits highly anomalous behavior, as known as the near-far problem. For σ (87) (88) (89)

16 example, BER is not monotonic in σ anymore, a property which is usually expected of any detector. For equation (87), since A 1 A ρ <, we have lim σ P c 1 (σ) = 1 and lim σ P c 1 (σ) = 1 which shows that BER is not monotonic. This anomalous behavior follows from the fact that the polarity of the output of the match filter for user 1 is governed by b other than by b 1. In fact, σ > is actually good in detection in the sense that P c 1 (σ) < 1/. (9) REFERENCES [1] N. Mandayam, Wireless Communication Technologies, Lecture notes, Spring 5, Rutgers University. [] M. Pursley, D. Sarwate, and W. Stark, Error probability for direct-sequence spread-spectrum multiple-access communications part I: upper and lower bounds, IEEE Trans. Comm., vol. 3, pp. 975-984, May 198. [3] E. Geraniotis, M. Pursley, Error probability for direct-sequence spread-spectrum multiple-access communications part II: approximations, IEEE Trans. Comm., vol. 3, pp. 985-995, May 198. [4] J. Lehnert, M. Pursley, Error probabilities for binary direct-sequence spread-spectrum multiple-access communications with random signature sequences, IEEE Trans. Comm., vol. 35, pp. 87-98, Jan. 1987. [5] R. Morrow, J. Lehnert, Bit-to-bit error dependence in slotted DS/SSMA packet systems with random signature sequences, IEEE Trans. Comm., vol. 37, pp. 15-161, Oct. 1989. [6] J. Holtzman, A simple, accurate method to calculate spread-spectrum multiple-access error probabilities, IEEE Trans. Comm., vol. 4, pp. 461-464, Mar. 199. [7] T. Rappaport, Wireless Communications: Principles & Practice, Prentice-Hall, NJ, 1996. [8] S. Verdú, Optimum Multi-User Signal Detection, Ph.D. Thesis, Dept. of Electrical and Computer Engineering, University of Illinois, Aug. 1984. [9] S. Verdú, Multiuser Detection, Cambridge University Press, NY, 1998.