1 Performance Analysis of Spread Spectrum CDMA systems 16:33:546 Wireless Communication Technologies Spring 5 Instructor: Dr. Narayan Mandayam Summary by Liang Xiao lxiao@winlab.rutgers.edu WINLAB, Department of Electrical Engineering, Rutgers University I. INTRODUCTION In this lecture, we present the mathematical analysis on the average bit error rate for multi-users in a single channel of the spread spectrum, Code Division Multiple Access (SS-CDMA) mobile radio system. We present expressions of BER performance of CDMA systems for a wide range of interference conditions for both synchronous case and asynchronous case, including Gaussian approximations (GA), Improved Gaussian Approximation (IGA), and Simple Improved Gaussian Approximation (SIGA). After the discussion for the single user detection, we discuss the key idea of the multiuser detection in the CDMA systems for high speed data transmission. The rest of the paper is organized as follows: In section II, we present the multiuser CDMA system model. In section III, we discuss the single user detection for the CDMA systems. In section IV, we present in detail the probability of error of the synchronous case with the single user detection for the CDMA systems. In section V, we discuss the probability of error of the asynchronous case with the single user detection for the CDMA systems, including GA, IGA and SIGA algorithms. Finally, in section VI, we discuss the multiuser detection for the CDMA systems. II. MULTIUSER CDMA SYSTEM MODEL In this report, we assume that the spread spectrum, Code Division Multiple Access (SS- CDMA) systems utilize BPSK modulation and the transmitted waveform from the -th user is
given by s (t) = P c (t)b (t) cos (ω c t + θ ), = 1,...K (1) where P is the transmission power of user, θ is the carrier phase offset of user relative to reference user, b (t) is the data sequence for user and c (t) is the spreading or chip sequence for user given by where c (n) and b (n) c (t) = Σ n= c (n) p Tc (t nt c ) () b (t) = Σ n= c (n) p T (t nt ) (3) are both { 1, +1}, T c is the chip period of the pseudo noise (PN) sequence c (n), T is bit period that satisfy T = NT c. We assume AWGN channel for the transmission of K users and the system model is shown in Fig. (1). We can get the expression of the received signal at the BS as r(t) = Σ K =1 P c (t τ )b (t τ ) cos (ω c t + φ ) + n(t) (4) where τ [, T ) is the delay of the -th user to user, and φ [, π) is the received carrier offset of user given by φ = θ ω c τ (5) s1() t s ( ) t s K (t)... r(t) + receiver n(t) Fig. 1. System Model in our Analysis
3 r(t) T z 1 c(t)cos( 1 t) c Fig.. MF receiver for single user detection b ( t) 1 () b 1 T b ( t) ( 1) b () b Fig. 3. For the asynchronous case. III. SINGLE USER DETECTION In this section, we study the single user detection and focus on user 1. Assume the receiver is synchronous to user 1, then without loss of generality, we can assume that τ 1 =,ρ 1 =. The structure of the matched filter (MF) receiver that is optimal for single user environment is illustrated as the figure below,
4 The output of the MF receiver z 1 shown in Fig. () is given by z 1 = = n 1 = T =1 T c 1 (t) cos(ω c t)r(t)dt T P / c 1 (t)c (t τ )b (t τ ) cos(φ )dt + n 1 (6) n(t)c 1 (t) cos(ω c t)dt (7) By introducing the continues time partial cross correlation functions, we can simplify the expression of z 1 as P1 z 1 = T P b() 1 + [b( 1) R,1 (τ ) + b () ˆR,1 (τ )] cos(φ ) + n 1 (8) where the continues time partial cross correlation functions are R,1 (τ) = ˆR,1 (τ) = τ T τ c (t τ)c 1 (t)dt, τ T (9) c (t τ)c 1 (t)dt, τ T (1) IV. SYNCHRONOUS CASE For the case of synchronous users, we get φ = and τ = for any. In this case, each interference contributes to only one term, i.e., P1 z 1 = T P b() 1 + b() R,1 (τ ) + n 1 (11) where R,1 = c T c 1 T N where n 1 N(, N T 4 ), c is the spreading code vector of length N for user, and c 1 is the spreading code vector for user 1. When users are orthogonal, i.e., c T c 1 = δ i, we obtain P1 z 1 = T b() 1 + n 1 (13) Thus the bit error rate in this case is given by Eb P b,1 = Q( ) (14) N (1)
5 We can see that it is the same as that of the single user case on AWGN channel. Because of the orthogonality restriction on c, it is possible only for K N. On the other hand, in the case where the orthogonality is not satisfied, say, users use random codes {c } K =1 that are random binary vectors, we can use the following two steps to calculate the probability of error, Step 1. : Fix codes and bits of other users, and then find conditioned probability of error P b,1 ({R,1 }, {b () }); Step. : Find the averaged probability of error P b,1 by averaging over {R,1 } and {b () }. In step 1, we have P b,1 ({R,1 }, {b () }) = P r(z 1 < b () 1 = 1) = Q( P 1 T + K Eb = Q( + N And in step, we get P b,1 = E [Q( Eb () {b }{R,1 + } N N T 4 P b() Eb, Eb, R,1 b () N b () N ) R,1 T ) (15) R,1 )] (16) T We can see that the expression above is not convenient for analysis, unless some approximation is introduced. A. Gaussian Approximation (GA) Now we use Gaussian approximation to analyze the BER performance of the synchronous case. We assume equal power for each user, i.e., P = P for all, and a very large K. Let I 1 present the interferences from all the other users, i.e., I 1 = K P b() R,1. The main idea of this approach is to approximate I 1 as Gaussian variable, with mean and variance as P E[I 1 ] = E[b() ]E[R,1 ] = (17) V ar[i 1 ] = P E[b () ] V ar[r,1 ] (18)
6 Consider R,1 = c T T c 1, we can easily obtain N We get a very useful approximation of P b,1 by when K is large. P b,1 = Q( Q( V ar[r,1 ] = ( T N ) N = T N (19) V ar[i 1 ] = P T (K 1) N () N T P T 4 + P T N (K 1) ) (1) P T ) = Q( P T (K 1) N N K 1 ) () V. ASYNCHRONOUS CASE For the case of asynchronous users, the output of the MF receiver of user 1 is given by P1 z 1 = T P b() 1 + T I,1(b, τ, φ ) + n 1 (3) where I,1 (b, τ, φ ) = 1 T [b( 1) R,1 (τ ) + b () R (τ )] cos(φ ) (4) Assume for any, P = P, then Eq.(3) can be simplified by b = [b ( 1) b () ] (5) where z 1 = I 1 (b, τ, φ) = P T [b() 1 + I 1 (b, τ, φ)] + n 1 (6) I 1, (b, τ, φ ) (7) b = (b, b 3,..., b K ) (8) τ = (τ,..., τ K ), φ = (φ,..., φ K ) (9)
7 b1, Tb = NTc User 1 C1,i C1,i+1 C1,i+ C1,i+N-1 k T k C User k Ck, 1 C k k, k Ck, left bit bk,-1 right bit bk, Fig. 4. Timing of PN sequence in the case of asynchronous 1, For fixed b, τ, φ, we can get the conditioned probability of error when user 1 transmits b () 1 = Otherwise, if user 1 transmits b () 1 = +1, P b, 1 = P r(z 1 > b () 1 = 1) P = P r{ T [ 1 + I 1(b, τ, φ)] + n 1 > } Eb = Q( (1 I 1 (b, τ, φ)) (3) N P b, 1 = E b,τ,φ [Q( Eb N (1 I 1 (b, τ, φ))] (31) P b,1 = P r(z 1 < b () 1 = +1) P = P r{ T [1 + I 1(b, τ, φ)] + n 1 > } Eb = Q( (1 + I 1 (b, τ, φ)) (3) N P b,1 = E b,τ,φ [Q( Eb N (1 + I 1 (b, τ, φ))] (33)
8 We can see that the error probability P b, 1 and P b,+1 are difficult to compute. However, there exists good bounds to approximate it. A. Gaussian Approximations (GA) In the Gaussian approximations, we model I 1 (b, τ, φ) as Gaussian variable. b (m) and b (n) i assumed to be independent for any i, m n. For any i l, we assume τ i and τ l are independent and uniformly distributed in [, T ). φ i and φ l are independent for any i l, and are distributed uniformly in [, π). Then we can get E[I 1 (b, τ, φ)] = (34) V ar[i 1 (b, τ, φ)] = are σ,1 (35) V ar[z 1 b () 1 = 1] = N T/4 + P T σ,1 (36) Thus, the probability of error is P/T P b,1 = Q( ) (37) (N T/4) + P T K σ,1 Eb 1 = Q( ( N 1 + E b K )) (38) N σ,1 Interference from user k to user 1, I k,1 = T The delay of user k to relative to user 1 as Pk b k (t τ k )c k (t τ k )c 1 (t) cos(ω c t + φ k ) cos(ω c t)dt (39) τ k = ν k T c + k, k T c (4) Pk I k,1 = T c cos(φ k){x k + (1 k )y k + (1 k )u k + k v k } (41) T c T c T c
9 x k,y k,u k and v k have distribution conditioned on A and B as follows, p xk (l) = A l+a p yk (l) = B l+b A, l = A, A +,..., A, A (4) B, l = B, B +,..., B, B (43) p uk (l) = 1/, l = 1, +1 (44) p vk (l) = 1/, l = 1, +1 (45) where A and B are defined as follows, A is the number of integers in [, N ] for which c 1,l+i c 1,l+i+1 = 1 (46) In another word, A measures for a given code the number of successive no transitions from +1 to 1 in the code c 1. Similarly, B is the number of integers in [, N ] for which c 1,l+i c 1,l+i+1 = 1 (47) In another word, A measures for a given code the number of successive transitions from +1 to 1 in the code c 1. A and B are disoint and span the set of total possible signature sequences of length N where there are a total of N 1 possible chip level transitions, that is to say, For random signature sequence, statistic of A + B = N 1 (48) σ,1 = 1 T E[cos (φ )]E[(b ( 1) R,1 (τ ) + b () ˆR,1 (τ )) ] (49) For random signature sequence, it is possible to model b ( 1) R,1 (τ ) + b () ˆR,1 (τ ) = N x l (5) l=1 Uniform ( T x l =, T ) w.p. 1 N N Bernoulli ( T, T, 1) w.p. 1 N N (51)
1 The mean and variance of x l are given by Then we can get E[x l ] = (5) V ar[x l ] = 1 3 ( T N ) + 1 ( T N ) = 3 ( T N ) (53) σ,1 = 1 3N Thus for the high SNR area, we get a good approximation of the probability as It is better than Q( N K 1 (54) Eb 1 K 1 P b,1 = Q( ( )) (55) N 1 + E b 3N N 3N Q( K 1 ) (56) )the synchronous case. Problems with analytical expressions derived here. When K is not large or users have disparate powers, the Gaussian approximation above is not appropriate. Fortunately, there are other methods to solve the question. B. Improved Gaussian Approximation (IGA) In the situation where the Gaussian Approximation is not appropriate, we can utilize a more in-depth analysis called improved Gaussian Approximation (IGA), which defines the interference terms I k conditioned on the particular operating condition of each user. Thus each I k becomes Gaussian for large K. Let ψ as the variance of the multiple access interference for a specific operating condition, ψ = V ar[i 1 (φ, τ, P, c 1,..., c K ) φ, τ, P, c 1,..., c K ] (57) = V ar[i 1 ( ) φ, { k }, {P k }, B] (58) P T P b,1 = E[Q( ψ )] P T = Q( ψ )f ψ(ψ)dψ (59)
11 It is possible to show that where ψ = = k= T c P k cos φ k ( N + (B + 1)[( k T c ) k T c ]) (6) z k (61) k= z k = T c P ku k v k (6) u k = (1 + cos(φ k )) (63) v k = N + (B + 1)(( k T c ) k T c ) (64) Using this method, we can approximate the probability of error for the case in which the power levels of the interfering users are constant but unequal and the case in which the power levels of the interfering users are independent and identically distributed random variables. C. Simple Improved Gaussian Approximation (SIGA) A simple improved Gaussian approximation (SIGA) method is based on the Taylor series for a continues function f(x) as f(x) = f(u) + (x u)f (u) + 1 (x u) f (u) +... (65) If x is a random variable and E[x] = u,, then If derivatives are expressed as difference f(x) = f(u) + (x u)[ If we neglect the higher order terms, E[f(x)] = f(u) + σ f (u) +... (66) f(u + h) f(u h) ] + 1 h (x f(u + h) f(u) + f(u h) u) ( ) +... h (67) E[f(x)] =. f(u) + σ + h) f(u) + f(u h) [f(u ] (68) h It was shown that h = 3σ is a good choice for generality of approximation, which yields, E[f(x)] = 3 f(u) + 1 6 f(u + 3σ) + 1 6 f(u 3σ) (69)
1 Therefore, we can get the average probability of error by P Tb P e = E[Q( )] (7) ψ P 3 Q( Tb ) + 1 µ ψ 6 Q( P Tb (µ ψ + 3σ ψ ) ) + 1 6 Q( P Tb (µ ψ 3σ ψ ) ) (71) The figures below illustrate the average bit error rates (BER) for single-cell CDMA systems using the different analytical algorithms discussed above. For the figure shown, the processing gain, N, is 31 chips per bit. In Fig. (5), K = [K/] users have power level P 1 /4, while K 1 = K K 1 have power level P 1. In Fig.(6), the interferer power levels obey a log-normal distribution with standard deviation of 5dB [7]. Fig. 5. BER for a desired user vs. K with fixed power levels for all K users. [7] Common like single user detection Gaussian Interference. We can see that single user detection cannot work very well under the high rate services, because N = W R T b T c decrease with R.
13 Fig. 6. BER vs. K with i.i.d power levels of the interference users. [7] VI. MULTIUSER DETECTION Interference signals in spread spectrum multiple access need not be treated as noise. If the spreading code of the interference signal is known, then that signal can be detected and subtracted out. Multiuser detection deals with the demodulation of mutually interfering digital signals, which exploits the structure of the multiaccess interference. This technique is applicable to multiaccess techniques such as asynchronous CDMA (where interuser interference occurs by design) and TDMA (where interuser interference occurs due to nonideal effects such as channel distortion and out-of-cell interference). Sergio Verdu s work in 198s [8] pioneered the receiver design technology of multiuser detection.
14 A. The Matched Filter in the CDMA Channel This section are focusing on the probability of error for synchronous uses. The received signal due to k users is y(t) = A k b k S k (t) + σn(t), (7) k=1 where S k (t) is the signature waveform assign to user k. Without loss of generality, S k (t) is normalized as S k = T S k(t)dt = 1. (73) A k is the received amplitude of the kth user and A k >. Note that A k is the energy of the received signal due to the normalized S k (t). b k { 1, 1} is the bit transmitted by the kth user with period T. n(t) is the white Gaussian noise with zero mean and unity power spectrum density. The output of the match filter for the kth user is y k = T where ρ,k = y(t)s k (t)dt (74) = A k b k + k A b ρ,k + n k (75) n k = σ T T S (t)s k (t)dt (76) n(t)s k (t)dt (77) Note that the noise component n k N(, σ ). If the signature are orthogonal, the cross correlation ρ,k = so that the probability of error for the kth user is ρ c k(σ) = Q where the superscript c denotes the probability of error when a conventional receiver is used. The probability of error is the same as the one in the single user case. If the signature are not orthogonal, the statistics are not Gaussian anymore. Consider k = users. Let ρ 1, = ρ and the received signal by the matched filter for user 1 is then y 1 = A 1 b 1 + A b ρ + n 1 (79) ( Ak σ ) (78)
15 The probability of error of user 1 is P c 1 (σ) = P { ˆb 1 b 1 } (8) = P [b 1 = +1]P [y 1 < b 1 = +1] + P [b 1 = 1]P [y 1 > b 1 = 1] (81) according to the decision rule for the conventional matched filter. Since y 1 is conditioned on b as well, it is not Gaussian. Hence, we have P [y 1 > b 1 = 1] = P [y 1 > b 1 = 1, b = +1]P [b = +1] (8) + P [y 1 > b 1 = 1, b = 1]P [b = 1] (83) = P [n 1 > A 1 A ρ]p [b = +1] + P [n 1 > A 1 + A ρ]p [b = 1] (84) = 1 ( ) Q A1 A ρ + 1 ( ) σ Q A1 + A ρ (85) σ = 1 ( ) Q A1 A ρ + 1 ( ) σ Q A1 + A ρ (86) σ The first equality follows from the fact that b 1 and b are independent. By symmetry, P [y 1 < b 1 = +1] = P [y 1 > b 1 = 1]. Therefore, the probability of error of user 1 is P1 c (σ) = 1 ( ) Q A1 A ρ + 1 ( ) σ Q A1 + A ρ σ Interchanging the roles of user 1 and, we have P c (σ) = 1 ( ) Q A A 1 ρ + 1 ( ) σ Q A + A 1 ρ σ Let us consider user 1. Since Q(x) is a monotonically decreasing function, ( ) P1 c A1 A ρ (σ) Q σ This bound is smaller than 1/ provided A /A 1 < 1/ ρ, i.e., the interferer is not dominant. Note as σ, (87) is dominated by the term with the smallest argument and hence the upper bound is an excellent approximation (for all but low SNRs). Therefore, BER of conventional ( ) receiver behaves like a single user system with a reduced SNR, A1 A ρ. However, if relative amplitude of interferer is stronger, i.e., A /A 1 > 1/ ρ, then the conventional receiver exhibits highly anomalous behavior, as known as the near-far problem. For σ (87) (88) (89)
16 example, BER is not monotonic in σ anymore, a property which is usually expected of any detector. For equation (87), since A 1 A ρ <, we have lim σ P c 1 (σ) = 1 and lim σ P c 1 (σ) = 1 which shows that BER is not monotonic. This anomalous behavior follows from the fact that the polarity of the output of the match filter for user 1 is governed by b other than by b 1. In fact, σ > is actually good in detection in the sense that P c 1 (σ) < 1/. (9) REFERENCES [1] N. Mandayam, Wireless Communication Technologies, Lecture notes, Spring 5, Rutgers University. [] M. Pursley, D. Sarwate, and W. Stark, Error probability for direct-sequence spread-spectrum multiple-access communications part I: upper and lower bounds, IEEE Trans. Comm., vol. 3, pp. 975-984, May 198. [3] E. Geraniotis, M. Pursley, Error probability for direct-sequence spread-spectrum multiple-access communications part II: approximations, IEEE Trans. Comm., vol. 3, pp. 985-995, May 198. [4] J. Lehnert, M. Pursley, Error probabilities for binary direct-sequence spread-spectrum multiple-access communications with random signature sequences, IEEE Trans. Comm., vol. 35, pp. 87-98, Jan. 1987. [5] R. Morrow, J. Lehnert, Bit-to-bit error dependence in slotted DS/SSMA packet systems with random signature sequences, IEEE Trans. Comm., vol. 37, pp. 15-161, Oct. 1989. [6] J. Holtzman, A simple, accurate method to calculate spread-spectrum multiple-access error probabilities, IEEE Trans. Comm., vol. 4, pp. 461-464, Mar. 199. [7] T. Rappaport, Wireless Communications: Principles & Practice, Prentice-Hall, NJ, 1996. [8] S. Verdú, Optimum Multi-User Signal Detection, Ph.D. Thesis, Dept. of Electrical and Computer Engineering, University of Illinois, Aug. 1984. [9] S. Verdú, Multiuser Detection, Cambridge University Press, NY, 1998.