CDMA Concept

Embed Size (px)

Citation preview

  • 8/8/2019 CDMA Concept

    1/38

    253

    Chapter 8

    Basic CDMA Concepts

    8.1 INTRODUCTION

    CDMA protocols constitute a class of protocols in which the multiple access property is

    primarily achieved by means of coding. Each user is assigned a unique code sequence

    used to encode the information-bearing signal. The receiver, knowing the code

    sequences of the user, decodes a received signal after reception and recovers the

    original data. Since the bandwidth of the code signal is chosen to be much larger than

    the bandwidth of the information-bearing signal, the encoding process enlarges

    (spreads) the spectrum of the signal and is therefore also known as spread-spectrum

    modulation. The resulting encoded signal is also called a spread-spectrum signal, and

    the CDMA protocols are often denoted as spread-spectrum multiple access (SSMA)

    protocols.

    It is the spectral spreading of the coded signal that gives the CDMA protocols

    their multiple access capability. It is therefore important to know the techniques to

    generate spread-spectrum signals and the properties of these signals.

    The precise origin of spread-spectrum communications may be difficult to pin-

    point because modern spread-spectrum communication is the outcome of developments

    in many directions, such as high-resolution radars, direction finding, guidance,

    correlation detection, matched filtering, interference rejection, jamming avoidance,

    information theory, and secured communications [110].

    The spread-spectrum modulation techniques were originally developed for use

    in military radar and communication systems because of their resistance against

    jamming signals and a low probability of detection. Only in recent years with new and

  • 8/8/2019 CDMA Concept

    2/38

    254

    cheap technologies emerging and a decreasing military market have the manufacturers

    of spread-spectrum equipment and researchers become interested in the civilapplications.

    To qualify as a spread-spectrum modulation technique, two criteria must be

    fulfilled [9]:

    1. The transmission bandwidth must be much larger than the information bandwidth;

    2. The resulting radio-frequency bandwidth is determined by a function other than the

    information being sent (so the bandwidth is independent of the information signal).

    This excludes modulation techniques like FM and pulse modulation (PM).

    Therefore, spread-spectrum modulation transforms an information-bearing

    signal into a transmission signal with a much larger bandwidth. This transformation is

    achieved by encoding the information signal with a code signal that is independent of

    the data and has a much larger spectral width than the data signal. This spreads the

    original signal power over a much broader bandwidth, resulting in a low(er) power

    density. The ratio of transmitted bandwidth to information bandwidth is called the

    processing gain PG of the spread-spectrum system,

    PGB

    B

    t

    i

    = (8.1)

    where Bt

    is the transmission bandwidth and Bi

    is the bandwidth of the information-

    bearing signal.

    The receiver correlates the received signal with a synchronously generated

    replica of the code signal to recover the original information-bearing signal. This

    implies that the receiver must know the code signal used to modulate the data.

    Because of the coding and the resulting enlarged bandwidth, spread-spectrum

    signals have a number of properties that differ from the properties of narrowband

    signals. The most interesting from a communication systems point of view are

    discussed below. Each property is briefly explained with the help of illustrations, if

    necessary, by applying direct-sequence spread-spectrum techniques.

    1. Multiple access capability. If multiple users transmit a spread-spectrum signal at thesame time, the receiver can still distinguish between the users, provided each user

    has a unique code that has a sufficiently low cross-correlation with the other codes.

    Correlating the received signal with a code signal from a certain user will then only

    despread the signal of this user, while the other spread-spectrum signals will remain

    spread over a large bandwidth. Thus, within the information bandwidth, the power

    of the desired user is much larger than the interfering power, provided there are not

    too many interferers, and the desired signal can be extracted. The multiple access

    capability is illustrated in Figure 8.1. In Figure 8.1(a), two users generate a spread-

    spectrum signal from their narrowband data signals. In Figure 8.1(b) both users

  • 8/8/2019 CDMA Concept

    3/38

    255

    transmit their spread-spectrum signals at the same time. At the receiver only the

    signal of user 1 is despread and the data recovered.

    1

    2

    1

    1

    2 2

    1&2

    (a) (b)

    Figure 8.1 Principle of spread-spectrum multiple access.

    2. Protection against multipath interference. In a radio channel there is not just one

    path between a transmitter and receiver. Due to reflections (and refractions), a

    signal is received from a number of different paths. The signals of the different

    paths are all copies of the transmitted signal but with different amplitudes and

    phases. Adding these signals at the receiver is constructive at some of thefrequencies and destructive at others. In the time domain, this results in a dispersed

    signal. Spread-spectrum modulation can combat this multipath interference;

    however, the way in which this is done depends very much on the type of

    modulation used. In the next section where CDMA protocols based on different

    modulation methods are discussed, we show for each protocol how multipath

    interference rejection is obtained.

    3. Privacy. The transmitted signal can only be despread and the data recovered if the

    code is known to the receiver.

    4. Interference rejection. Cross-correlating the code signal with a narrowband signal

    spreads the power of the narrowband signal, thereby reducing the interfering power

    in the information bandwidth. This is illustrated in Figure 8.2. The spread-spectrumsignal (s) receives a narrowband interference (i). At the receiver the spread-

    spectrum signal is despread while the interference signal spreads, making it appear

    as background noise compared with the despread signal.

    5. Anti-jamming capability, especially narrowband jamming. This is more or less the

    same as interference rejection except the interference is now willfully inflicted on

    the system. It is this property together with the next one that makes spread-spectrum

    modulation attractive for military applications.

    6. Low probability of interception (LPI) or covert operation. Because of its low power

    density, the spread-spectrum signal is difficult to detect.

  • 8/8/2019 CDMA Concept

    4/38

    256

    i

    s i

    s

    Figure 8.2 Interference rejection.

    There are a number of modulation techniques that generate spread-spectrum

    signals. We briefly discuss the most important ones:

    Direct-sequence (DS) spread-spectrum. The information-bearing signal is multiplied

    directly by a fast code signal.

    Frequency hopping (FH) spread-spectrum. The carrier frequency at which the

    information-bearing signal is transmitted is rapidly changed according to the code

    signal.

    Time-hopping (TH) spread-spectrum. The information-bearing signal is not transmitted

    continuously. Instead, the signal is transmitted in short bursts where the times of the

    bursts are decided by the code signal.

    Chirp modulation. This kind of spread-spectrum modulation is almost exclusively used

    in military radars. The radar continuously transmits a low-power signal whosefrequency is (linearly) varied (swept) over a wide range.

    Hybrid modulation. Two or more of the above-mentioned spread-spectrum modulation

    techniques can be used together to combine the advantages and, it is hoped, to combat

    their disadvantages.

    In Section 8.2, the above-mentioned modulation techniques are used to obtain

    the multiple access capability that we want for CDMA (SSMA) protocols. Section 8.3

    presents the code sequences and the properties of these sequences in detail.

    8.2 SPREAD-SPECTRUM MULTIPLE ACCESS

    We can classify the SSMA or CDMA protocols in two different ways: by concept or by

    modulation method. The first classification gives us two protocol groups, averaging

    systems and avoidance systems. The averaging systems reduce the interference by

    averaging the interference over a wide time interval. The avoidance systems reduce the

    interference by avoiding it for a large part of the time.

    Classifying by modulation gives us five protocols, direct-sequence (or pseudo-

    noise), frequency hopping, time-hopping, protocols based on chirp modulation, and

    hybrid methods. Of these, the first (DS) is an averaging spread-spectrum protocol,

  • 8/8/2019 CDMA Concept

    5/38

    257

    while the hybrid protocols can be averaging protocols depending on whether DS is used

    as part of the hybrid method. All the other protocols are of the avoidance type. Table8.1 summarizes both ways of classification.

    Table 8.1

    Classifying SSMA Protocols

    DS TH FH Chirp Hybrid

    Averaging x x

    Avoidance x x x x

    In the following sections, CDMA protocols are discussed where a division has

    been made that is based on the modulation technique.

    8.2.1 DS

    In the DS-CDMA protocols, the modulated information-bearing signal (the data signal)

    is directly modulated by a digital code signal. The data signal can be either an analog or

    digital signal. In most cases it will be a digital signal. What we often see in the case of a

    digital signal is that the data modulation is omitted and the data signal is directly

    multiplied by the code signal and the resulting signal modulates the wideband carrier. It

    is from this direct multiplication that the DS-CDMA protocol gets its name.

    Data

    modulator

    Carrier

    generator

    Code

    generator

    Data Wide-band

    modulationcode

    Figure 8.3 Block diagram of a DS-SSMA transmitter.

    In Figure 8.3, a block diagram of a DS-CDMA transmitter is given. The binary data

    signal modulates a radio frequency (RF) carrier. The modulated carrier is then

    modulated by the code signal. This code signal consists of a number of code bits or

    chips that can be either +1 or 1. To obtain the desired spreading of the signal, the

    chip rate of the code signal must be much higher than the chip rate of the information

    signal. For the code modulation various modulation techniques can be used but usually

    Wideband

    code

    modulation

    Data

    modulator

    Carrier

    generatorCode

    generator

    Data

  • 8/8/2019 CDMA Concept

    6/38

    258

    some form of PSK such as BPSK, differential BPSK (D-BPSK), quadrature PSK

    (QPSK), or MSK is employed.If we omit the data modulation and use BPSK for the code modulation, we get

    the block diagram given in Figure 8.4.

    Carrier

    generator

    Code

    generator

    XBinary data Wide-band

    modulator

    Figure 8.4 Modified block diagram of a DS-SS transmitter.

    time

    Data signal

    Code signal

    Data signal x code signal

    BPSK-modulated signal

    Figure 8.5 Generation of a BPSK-modulated spread-spectrum signal.

    The DS-SS signal resulting from this transmitter is shown in Figure 8.5. In this figure,

    ten code signals per information signal are transmitted (the code chip rate is 10 times

    the information chip rate), so the processing gain is equal to 10. In practice, the

    processing gain is much larger (in the order of 102

    to 103).

    After transmission of the signal, the receiver (seen in Figure 8.6) uses coherent

    demodulation to despread the spread-spectrum signal using a locally generated code

    sequence. To perform the despreading operation, the receiver must not only know the

    Wideband

    modulator

    Carrier

    generator

    Code

    generator

    Binary data

  • 8/8/2019 CDMA Concept

    7/38

    259

    code sequence used to spread the signal, but the codes of the received signal and the

    locally generated code must also be synchronized.This synchronization must be accomplished at the beginning of the reception

    and maintained until the whole signal is received. The synchronization/tracking block

    performs this operation. After despreading, a data-modulated signal results and after

    demodulation the original data are recovered.

    Code

    generator

    demodulator

    Carrier

    generator

    Data DataCode

    demodulator

    Codesynchr.

    /tracking

    Figure 8.6 Receiver of a DS-SS signal.

    In the previous section, a number of advantageous properties of spread-spectrum

    signals were mentioned. The most important of those properties from the viewpoint ofCDMA protocols is multiple access capability, multipath interference rejection,

    narrowband interference rejection, and, with respect to secure/private communication,

    LPI. We explain these four properties in relation to DS-CDMA.

    Multiple access. If multiple users use the channel at the same time, multiple DS

    signals will overlap in time and frequency. At the receiver, coherent demodulation

    is used to remove the code modulation. This operation concentrates the power of the

    desired user in the information bandwidth. If the cross-correlation between the code

    of the desired user and the code of the interfering user is small, coherent detection

    will only put a small part of the power of the interfering signals into the information

    bandwidth. Multipath interference. If the code sequence has an ideal autocorrelation function,

    the correlation function is zero outside the interval [ Tc,Tc] where Tc is the chip

    duration. This means that if the desired signal and a version that is delayed for more

    than 2Tc are received, coherent demodulation treats the delayed version as an

    interfering signal, putting only a small part of the power in the information

    bandwidth.

    Narrowband interference. The coherent detection at the receiver involves a

    multiplication of the received signal by a locally generated code sequence.

    Code

    synchr./

    tracking

    Code

    demodulator

    Data

    demodulator

    Code

    generatorCarrier

    generator

    Data

  • 8/8/2019 CDMA Concept

    8/38

    260

    However, as we saw at the transmitter, multiplying a narrowband signal with a

    wideband code sequence spreads the spectrum of the narrowband signal so that itspower in the information bandwidth decreases by a factor equal to the processing

    gain.

    LPI. Because the direct sequence signal uses the whole signal spectrum all the time,

    it has a very low transmitted power per hertz. This makes it very difficult to detect a

    DS signal.

    Apart from the above-mentioned properties, the DS-CDMA protocols have a

    number of other specific properties that we can divide into advantageous (+) and

    disadvantageous () behavior:

    + The generation of the coded signal is easy. It is done by simple multiplication.

    + Since only one carrier frequency has to be generated, the frequency synthesizer

    (carrier generator) is simple.

    + Coherent demodulation of the spread-spectrum signal is possible.

    + No synchronization among the users is necessary.

    It is difficult to acquire and maintain the synchronization of the locally generated

    code signal and the received signal. Synchronization has to take place within a

    fraction of the chip time.

    For correct reception, the locally generated code sequence and the received code

    sequence must be synchronized within a fraction of the chip time. This combined

    with the nonavailability of large contiguous frequency bands practically limits thespread bandwidth to 10 to 20 MHz.

    The power received from users close to the base station is much higher than that

    received from users further away. Since a user continuously transmits over the

    whole bandwidth, a user close to the base will constantly create a lot of interference

    for users far from the base station, making their reception impossible. This near-far

    effect is solved by applying a power control algorithm so that all users are received

    by the base station with the same average power. However, this control proves to be

    quite difficult.

    8.2.2 FH

    In FH-CDMA protocols, the carrier frequency of the modulated information signal is

    not constant but changes periodically. During time intervals T, the carrier frequency

    remains the same but after each time interval the carrier hops to another (or possibly the

    same) frequency. The hopping pattern is decided by the code signal. The set of

    available frequencies the carrier can attain is called the hop-set.

    The frequency occupation of an FH-spread-spectrum system differs

    considerably from a DS-spread-spectrum system. A DS system occupies the whole

    frequency band when it transmits, whereas an FH system uses only a small part of the

    bandwidth when it transmits but the location of this part differs in time.

  • 8/8/2019 CDMA Concept

    9/38

    261

    Suppose an FH system is transmitting in frequency band 2 during the first time

    period (see Figure 8.7). A DS system transmitting in the same time period spreads itssignal power over the whole frequency band so the power transmitted in frequency band

    1 will be much less than that of the FH system. However, the DS system transmits in

    frequency band 1 during all time periods, while the FH system only uses this band part

    of the time. On average both systems will transmit the same power in the frequency

    band.

    In a DS system, the narrowband interference is reduced by a factor of PG. In an

    FH system however, it is the (raw) chip error rate that is reduced by PG. For strong

    interference this can be a significant difference, where a single interferer may

    overload a DS receiver but only cause a single chip error now and then in an FH

    system (which the forward error control (FEC) scheme may easily handle).

    The difference between FH-spread-spectrum and DH-spread-spectrum

    frequency usage is illustrated in Figure 8.7.

    frequency

    time time

    frequency

    FH DS

    Figure 8.7 Time/frequency occupancy of FH and DS signals.

    The block diagram for an FH-CDMA system is given in Figure 8.8.

    Figure 8.8 shows the block diagram of an FH-CDMA transmitter and receiver.

    The data signal is baseband-modulated on a carrier. Several modulation techniques can

    be used for this but it does not really matter which one is used for the application offrequency hopping. Usually FM modulation is used for analog signals and frequency

    shift keying (FSK) modulation for digital signals. Using a fast-frequency synthesizer

    controlled by the code signal, the carrier frequency is converted up to the transmission

    frequency.

    The inverse process takes place at the receiver. Using a locally generated code

    sequence, the received signal is converted down to the baseband-modulated carrier. The

    data are recovered after (baseband) demodulation. The synchronization/tracking circuit

    ensures that the hopping of the locally generated carrier synchronizes to the hopping

    pattern of the received carrier so that correct despreading of the signal is possible.

    Frequency Frequency

    Time Time

  • 8/8/2019 CDMA Concept

    10/38

    262

    Code

    generatorCode

    generator

    demodulator

    Data DataData

    Frequency

    syntheziserFrequency

    syntheziser

    Baseband

    modulator

    Up

    converter

    Down

    converter

    Synchr.

    tracking

    Figure 8.8 Block diagram of an FH-CDMA transmitter and receiver.

    Within the FH-CDMA protocols, a distinction is made based on the hopping

    rate of the carrier. If the number of hops is (much) greater than the data rate, it is called

    fast-frequency-hopping (F-FH) CDMA protocol. In this case, the carrier frequency

    changes a number of times during the transmission of 1 bit, so that 1 bit is transmitted

    in different frequencies. If the number of hops is (much) smaller than the data rate, it is

    called slow-frequency-hopping (S-FH) CDMA protocol. In this case, multiple bits are

    transmitted at the same frequency.

    The occupied bandwidth of the signal on one of the hopping frequencies

    depends not only on the bandwidth of the information signal, but also on the shape of

    the hopping signal and the hopping frequency. If the hopping frequency is much smallerthan the information bandwidth (which is the case in S-FH), then the information

    bandwidth is the main factor that decides the occupied bandwidth. If however, the

    hopping frequency is much greater than the information bandwidth, the pulse shape of

    the hopping signal will decide the occupied bandwidth at one hopping frequency. If this

    pulse shape is very abrupt (resulting in very abrupt frequency changes), the frequency

    band will be very broad, limiting the number of hop frequencies. If we make sure that

    the frequency changes are smooth, the frequency band at each hopping frequency will

    be about 1/Th times the frequency bandwidth, where Th is equal to the hopping

    frequency. We can make the frequency changes smooth by decreasing the transmitted

    power before a frequency hop and increasing it again when the hopping frequency haschanged.

    As was done with the DS-CDMA protocols, we discuss the properties of FH-

    CDMA with respect to multiple access capability, multipath interference rejection,

    narrowband interference rejection, and probability of interception.

    Multiple access. It is quite easy to visualize how the F-FH and S-FH CDMA

    protocols obtain their multiple access capability. In the F-FH protocol, 1 bit is

    transmitted in different frequency bands. If the desired user is the only one to

  • 8/8/2019 CDMA Concept

    11/38

    263

    transmit in most of the frequency bands, the received power of the desired signal is

    much higher than the interfering power and the signal is received correctly.In the S-FH protocol, multiple bits are transmitted at one frequency. If the

    probability of other users transmitting in the same frequency band is low enough, the

    desired user is received correctly most of the time. For those times that interfering

    users transmit in the same frequency band, error-correcting codes are used to recover

    the data transmitted during that period.

    Multipath interference. In the F-FH CDMA protocol the carrier frequency changes a

    number of times during the transmission of 1 bit. Thus, a particular signal frequency

    is modulated and transmitted on a number of carrier frequencies. The multipath

    effect is different at the different carrier frequencies. As a result, signal frequencies

    that are amplified at one carrier frequency will be attenuated at another carrier

    frequency and vice versa. At the receiver, the responses at the different hopping

    frequencies are averaged, thus reducing the multipath interference. This is not as

    effective as the multipath interference rejection in a DS-CDMA system but it still

    gives quite an improvement.

    Narrowband interference. Suppose a narrowband signal is interfering on one of the

    hopping frequencies. If there are PG hopping frequencies (where PG is the

    processing gain), the desired user will (on the average) use the hopping frequency

    where the interferer is located 1/PG percent of the time. The interference is therefore

    reduced by a factor PG.

    LPI. The difficulty in intercepting an FH signal lies not in its low transmissionpower. During a transmission, it uses as much power per hertz as does a continuous

    transmission. But the frequency at which the signal is going to be transmitted is

    unknown and the duration of the transmission at a particular frequency is quite

    small. Therefore, although the signal is more readily intercepted than a DS signal, it

    is still a difficult task to perform.

    Apart from the above-mentioned properties, FH-CDMA protocols have a number of

    other specific properties that we can divide into advantageous (+) and

    disadvantageous () behavior:

    + Synchronization is much easier with FH-CDMA than with DS-CDMA. With FH-CDMA, synchronization has to be within a fraction of the hop time. Since spectral

    spreading is not obtained by using a very high hopping frequency but by using a

    large hop-set, the hop time will be much longer than the chip time of a DS-CDMA

    system. Thus, an FH-CDMA system allows a larger synchronization error.

    + The different frequency bands that an FH signal can occupy do not have to be

    contiguous, because we can make the frequency synthesizer easily skip over certain

    parts of the spectrum. Combined with the easier synchronization, this allows much

    higher spread-spectrum bandwidths.

  • 8/8/2019 CDMA Concept

    12/38

    264

    + Because FH-CDMA is an avoidance spread-spectrum system, the probability of

    multiple users transmitting in the same frequency band at the same time is small. Ifa user far from the base station transmits, it is received by the base station even if

    users close to the base station are transmitting, since those users are probably

    transmitting at other frequencies. Thus, the near-far performance is much better than

    that of DS.

    + Because of the larger possible bandwidth a FH system can employ, it offers a higher

    possible reduction of narrowband interference than a DS system.

    A highly sophisticated frequency synthesizer is necessary.

    An abrupt change of the signal when changing frequency bands lead to an increase

    in the frequency band occupied. To avoid this, the signal turned off and on when

    changing frequency. Coherent demodulation is difficult because of the problems in maintaining phase

    relationship during hopping.

    8.2.3 TH

    In the TH-CDMA protocols, the data signal is transmitted in rapid bursts at time

    intervals determined by the code assigned to the user.

    Data

    modulator

    Carrier

    generator generator

    demodulator

    Carrier

    Data DataSlow in

    fast out

    Data

    Buffer

    Code

    generator

    Code

    generator

    Fast in

    slow out

    Buffer

    Figure 8.9 Block diagram of a TH-CDMA transmitter and receiver.

    The time axis is divided into frames and each frame is divided into Mtime slots.During each frame the user will transmit in one of the M time slots. Which of the M

    time slots is transmitted depends on the code signal assigned to the user. Since a user

    transmits all of its data in 1, instead of M time slots, the frequency it needs for its

    transmission has increased by a factor M. A block diagram of a TH-CDMA system is

    given in Figure 8.9.

  • 8/8/2019 CDMA Concept

    13/38

    265

    Time

    Frequency

    Figure 8.10 Time-frequency plot of the TH-CDMA protocol.

    Figure 8.10 shows the time-frequency plot of the TH-CDMA systems.

    Comparing Figure 8.10 with Figure 8.7, we see that the TH-CDMA protocol uses the

    whole wideband spectrum for short periods instead of parts of the spectrum all of the

    time.

    Following the same procedure as for the previous CDMA protocols, we discuss

    the properties of TH-CDMA with respect to multiple access capability, multipath

    interference rejection, narrowband interference rejection, and probability ofinterception.

    Multiple access. The multiple access capability of TH-SS signals is acquired in the

    same manner as that of the FH-SS signals, namely by making the probability of

    users transmissions in the same frequency band at the same time small. In the case

    of time hopping, all transmissions are in the same frequency band so the

    probability of more than one transmission at the same time is small. This is again

    achieved by assigning different codes to different users. If multiple transmissions

    do occur, error-correcting codes ensure that the desired signal can still be

    recovered.

    If there is synchronization among the users, and the assigned codes are such that nomore than one user transmits at a particular slot, then the TH-CDMA protocol

    reduces to a TDMA protocol where the slot in which a user transmits is not fixed

    but changes from frame to frame.

    Multipath interference. In the TH-CDMA protocol, a signal is transmitted in

    reduced time. The signaling rate therefore increases and dispersion of the signal

    will lead to overlap of adjacent bits much sooner. Therefore, no advantage is

    gained with respect to multipath interference rejection.

    Narrowband interference. A TH-CDMA signal is transmitted in reduced time. This

    reduction is equal to 1/PG where PG is the processing gain. At the receiver we only

  • 8/8/2019 CDMA Concept

    14/38

    266

    receive an interfering signal during the reception of the desired signal. Thus, we

    only receive the interfering signal 1/PG percent of the time, reducing the interferingpower by a factor PG.

    LPI. With TH-CDMA, the frequency at which a user transmits is constant but the

    times at which a user transmits are unknown and the durations of the transmissions

    are very short. Particularly when multiple users are transmitting, this makes it

    difficult for an intercepting receiver to distinguish the beginning and end of a

    transmission and to decide which transmissions belong to which user.

    Apart from the above-mentioned properties, the TH-CDMA protocols have a

    number of other specific properties that we can divide into advantageous (+) and

    disadvantageous () behavior:

    + Implementation is simpler than that of FH-CDMA protocols.

    + It is a very useful method when the transmitter is average-power limited but not

    peak-power limited since the data are transmitted is short bursts at high power.

    + As with the FH-CDMA protocols, the near-far problem is much less of a problem

    since TH-CDMA is an avoidance system, so most of the time a terminal far from

    the base station transmits alone, and is not hindered by transmissions from stations

    close by.

    It takes a long time before the code is synchronized, and the time is short in which

    the receiver has to perform the synchronization.

    If multiple transmissions occur, a lot of data bits are lost so a good error-correctingcode and data interleaving are necessary.

    8.2.4 Chirp Spread Spectrum

    Although chirp spread spectrum is not yet adapted as a CDMA protocol, for the sake of

    completeness a short description is given here.

    f1

    f2

    t1 t2

    T

    B

    Figure 8.11 Chirp modulation.

    2

    1

    t1 t2

    B

    T

  • 8/8/2019 CDMA Concept

    15/38

    267

    A chirp spread-spectrum system spreads the bandwidth by linear frequency

    modulation of the carrier. This is shown in Figure 8.11.The processing gain PG is the product of the bandwidth B over which the

    frequency is varied and the duration Tof a given signal waveform:

    PG BT = (8.2)

    8.2.5 Hybrid Systems

    The hybrid CDMA systems include all CDMA systems that employ a combination of

    two or more of the above-mentioned spread-spectrum modulation techniques. If we

    limit ourselves to DS, FH, and TH modulations, we have four possible hybrid systems:DS/FH, DS/TH, FH/TH, and DS/FH/TH.

    The idea of the hybrid system is to combine the specific advantages of each of

    the modulation techniques. If we take, for example, the combined DS/FH system, we

    have the advantage of the antimultipath property of the DS system combined with the

    favorable near-far operation of the FH system. Of course, the disadvantage lies in the

    increased complexity of the transmitter and receiver. For illustration purposes, we give

    a block diagram of a combined DS/FH CDMA transmitter in Figure 8.12.

    Up

    converter

    Frequency

    synthesizer

    Code

    generator

    Code

    generator

    Code clock

    Data

    Figure 8.12 Hybrid DS-FH transmitter.

    Up converter

  • 8/8/2019 CDMA Concept

    16/38

    268

    The data signal is first spread using a DS code signal. The spread signal is then

    modulated on a carrier whose frequency hops according to another code sequence. Acode clock ensures a fixed relation between the two codes.

    8.3 DESIGN OF PSEUDONOISE SEQUENCES

    The objective of this section is to present an overview of the design and properties of

    code sequences for CDMA systems. The choice of the type of code sequence for

    CDMA systems is important with respect to the resistance against both multipath and

    multiuser interference.

    8.3.1 Basics

    To combat these types of interference, two properties are very important: (1) Each code

    sequence in the set must be easy to distinguish from a time-shifted version of itself, and

    (2) each code sequence in the set must be easy to distinguish from (a possibly tune-

    shifted version of) every other signal in the set.

    The first property is important with respect to multipath propagation effects that

    occur in mobile outdoor and indoor radio environments The second property plays an

    important role with respect to the multiple access capability of the communications

    system. In this chapter, we describe three types of code sequences: maximum length,

    Gold, and kasami.

    Before describing the construction of these code sequences and discussing the

    correlation properties with respect to the requirements mentioned above, we present in

    the next section some basic definitions of correlation functions and some information

    about shift register sequences. Finally, some numerical examples of the aforementioned

    code sequences are given.

    Correlation functions

    Primarily because system implementation is simpler, code sequences used for CDMA

    communications systems are required to be periodic. If T is the period of the code

    sequence denoted as X(t), then periodicity implies that X(t) = X(t+T) for all time

    instants t and for each code sequence X in the set. For the code symbols ofXwe use thenotation Xm. Furthermore, we assume that the code symbols are {1,1} The distinction

    between code sequences X(t) and Y(t) is measured in terms of the correlation function

    defined as

    r X t Y t dt X Y

    T

    , ( ) ( ) ( ) = +0

    (8.3)

    This expression is shown as the cross-correlation function if X Y and as theautocorrelation function if X = Y. Code sequence of interest are those consisting of a

    number of time-limited pulses called chips. Then, the signal X(t) is written as

  • 8/8/2019 CDMA Concept

    17/38

    269

    X t a t iT xi

    c

    i

    ( ) ( )= =

    (8.4)

    where axi is the ith code symbol user of x, (t) is the basic pulse wave form, and Tc is

    the time duration of the pulse, termed chip duration and

    ( ) ( )t iT t jT dt i jc c

    Tc

    = 00

    if (8.5)

    If the delay is taken as a multiple of the chip duration (= lTc), then (8.3) is written as

    r l a a X Y xi

    x

    i

    i

    N

    , ( ) =+

    =

    10

    1

    (8.6)

    where

    = 2

    0

    ( )t dt

    Tc

    (8.7)

    which equals Tc if(t) is a rectangle pulse duration Tc with amplitude.In a DS-CDMA system, each data bit is multiplied with a user-specific code

    sequence. For the current data bit and the previous data bit of a user with code sequence

    Y, we use the notation by0 and by

    -1 , respectively.

    Now consider the situation in a multipath radio environment where Xis the code

    sequence of the reference user and Y is the code sequence of a interfering user (or a

    delayed part of code sequence X). The length of a code sequence is denoted by Nc. In

    the receiver of the reference user a partial correlation operation is performed. This

    situation is shown in Figure 8.13

    Now we define the following two partial correlation functions

    R X t Y t dt XY ( ) ( ) ( )

    = 0 (8.8)

    R X t Y t dt XY

    N Tc c

    ( ) ( ) ( )

    = (8.9)

    by0

    by1

    Nc1 I1 0X

    YNc1 Nc1 00

  • 8/8/2019 CDMA Concept

    18/38

    270

    Figure 8.13 Cross-correlation of code sequence X of the reference user, and code sequence Ybeing the code sequence of an interfering user or a delayed version of the reference

    code sequence.

    Assuming that is a multiple of the chip duration Tc implying = lTc, these partialcorrelation functions are written as

    R l a a xy xi

    y

    i

    i

    l

    ( ) =

    =

    10

    1

    (8.10)

    R l a axy xl

    y

    l

    l

    Nc

    ( ) =

    =

    11

    1

    (8.11)

    IfX = Y, then (8.10) and (8.11) are the partial autocorrelation functions and in the case

    XY, (8.10) and (8.11) are the partial cross-correlation functions.With respect to the sign of by

    0and by

    1, there are two possibilities: either by

    0and

    by1 have the same sign or they have the opposite sign. For the first case we have the

    periodic correlation function:

    xy xy xy xl

    y

    l

    m

    N

    l R l R l a ac

    ( ) ( ) ( )= + =

    =

    1

    0

    1

    (8.12)

    Also, xy(l) satisfies

    x y c y x N l l, ,( ) ( ) = (8.13)

    which implies that xy

    (l) is an even function with respect to N.

    If by0 and by

    1 have the opposite sign, then we have an a-periodic correlation

    function

    xy xy xy x

    i

    y

    i

    x

    i

    y

    i

    n l

    N

    i

    l

    l R l R l a a a ac

    ( ) ( ) ( )= =

    =

    =

    1 11

    0

    1

    (8.14)

    which is odd with respect to Nc, that is,

    x y c y x N l l, ,( ) ( ) = (8.15)

  • 8/8/2019 CDMA Concept

    19/38

    271

    For analysis and comparison of code sequences it is convenient to define peakcorrelation functions. For a set of periodic sequences, the peak periodic cross-

    correlation magnitude c is defined as

    { } c xy cl l N x y x y= max ( ) : , , ,0 1 (8.16)

    The peak out-of-phase-periodic autocorrelation magnitude is defined as

    { } a x cl l N x= max ( ) : ,0 1 (8.17)

    Now the larger ofc and a is denoted by max.

    Analogously, we define the peak a-periodic cross-correlation magnitude

    c and

    the peak out-of-phase a-periodic autocorrelation magnitude

    a , respectively

    c xy cl l N x y x y=

    max ( ) : , , ,0 1 (8.18)

    and

    a x cl l N x=

    max ( ) : ,0 1 (8.19)

    The larger of

    c and

    a is denoted as

    max .

    The two requirements mentioned in the introduction are now equivalently

    reformulated: (1) For each sequence in the set, both the periodic out-of-phase

    autocorrelation function and the a-periodic out-of-phase autocorrelation function must

    be small for 1 l Nc1. (2) For each pair of sequences x and y, both the periodicautocorrelation and the a-periodic cross-correlation function must be small for all l.

    Linear Shift Registers

    Code sequences must have noiselike properties to meet the requirements mentioned in

    the preceding section. However, because of implementation problems, the code

    sequences are generated according to a periodic deterministic scheme. Periodic code

    sequences having noiselike properties are called PN sequences. A proper way to

    generate these code sequences is by using linear binary shift registers. An example for

    such a register is presented in Figure 8.14. In this configuration, an XOR operation is

    performed on the contents of register 2 and register 0 and the result is fed back to the

  • 8/8/2019 CDMA Concept

    20/38

    272

    input of register 4. The shift direction of the shift register is from left to right (4-3-2-1-

    0).The register in Figure 8.14 with five sections generates a code sequence with length

    Nc=251=31. We show in the next section that the feedback connections are chosen

    very carefully in order to generate a code sequence with satisfactory correlation

    properties. In general, the configuration of a linear binary shift register of n sections is

    described by a generator polynomial, which is a binary polynomial of degree n. The

    number n is the number of sections of the shift register:

    { }( )h x h x h x h x h hn n n n i( ) ... ,= + + + +

    0 1

    1

    10 1 (8.20)

    .

    h(x) = x5

    + x2

    + 1

    Figure 8.14 Two-tap linear binary shift register.

    We use the notation used by Sarwate and Pursley [11] where h0 = hn = 1 and hi = 1 for i

    0 and i n if there is a feedback connection from the ith cell. It is convenient and

    conventional to represent the polynomial h(x) by a binary vector h = (h0, h1, ..., hn) and

    to express this vector in octal notation. For example, the shift register in Figure 8.14 is

    represented by generator polynomial h(x) = x5 + x2 +1. The binary representation of this

    polynomial is 100101 and the octal representation is 45. If the sequence generated by

    h(x) is denoted as u, then a circular shifted version of u is denoted as Tu where i is the

    number of shifts. For instance, if u = 10011101 then Tu = l001110. Note that TNu =

    T0

    u = u.

    8.3.2 PN Codes

    Three basic classes of code sequences suitable for CDMA applications are discussed in

    this section:

    maximum length sequences;

    Gold sequences;

    Kasami sequences.

    +

    4 1 023

  • 8/8/2019 CDMA Concept

    21/38

    273

    Maximum length sequences

    Maximum length code sequences are generated by a single linear shift register. As thename suggests, maximum length code sequences are precisely the sequences of

    maximum possible period (Nc = 2"-1) from an n-stage binary shift register with linear

    feedback. To generate a maximum length code sequence, the generator polynomial

    must be a primitive polynomial of degree n. Before explaining the term primitive

    polynomial, first the following terms are defined:

    Irreducible polynomial

    This is a polynomial that can not be decomposed into other polynomials. Example: The

    polynomial x2

    + 2x +1 is not irreducible since x2

    + 2x +1 = (x + 1)(x +1). The

    polynomial x2

    + x +1 is irreducible.

    Exponent

    The smallest positive integer p for which the polynomial h(x) is a divisor of (1 xp) is

    called the exponent ofh(x).

    Primitive polynomial

    A primitive polynomial of degree n is an irreducible polynomial with exponent 2n

    1.

    It has been proven that the periodic autocorrelation for a maximum length

    sequence u is given by

    uc c

    c

    lN l N

    l N

    ( )mod

    mod=

    =

    0

    1 0(8.21)

    Thus, binary maximum length-sequence has a two-valued periodic autocorrelation

    function.

    Golomb [12] observed that if n 0 mod 4, there exists pairs of maximum length

    sequences with three-valued cross-correlation functions, where the three values are

    {1, t(n), t(n) 2}with

    t n n

    n

    n

    n( )

    ( )

    ( )= +

    +

    +

    +

    1 2

    1 2

    1

    2

    22

    odd

    even(8.22)

    A cross-correlation function taking on these values is called a preferred three-valued

    cross-correlation function and the corresponding pair of maximum length sequences

    (polynomials) is called a preferred pair of maximum length sequences. For this

    preferred pair of maximum length sequences we find

    a c t n= = ( ) (8.23)

  • 8/8/2019 CDMA Concept

    22/38

    274

    Figures 8.15 to 8.17 show preferred pairs of maximum length sequences for periods 31,63, and 127, respectively.

    Figure 8.15 Preferred pairs of maximum length sequences of period 31. The vertices of everytriangle form a maximal connected set.

    It is clear from these figures that only very small sets of maximum length

    sequences can have good periodic cross-correlation properties. For multiple access

    systems, it is desirable to obtain larger sets of sequences of period Nc = 2n

    1 which

    have the same bound t(n) on the peak periodic cross-correlation as do themaximal connected sets. Although there are no analytical results that give the values of

    the maximal a-periodic cross-correlation

    c for maximum length sequences generated

    by preferred pairs, Massey and Uhran [13] have obtained bounds on

    c . They state that

    if the maximum of the periodic cross-correlation and the periodic autocorrelation maxequals t(n), then the bound for the a-periodic cross-correlation is

    c

    n

    n

    n

    n

    n

    n

    =+ +

    + +

    2 2 1

    2 2 1

    1

    1

    2

    12

    even

    odd( )

    (8.24)

    We did not find a bound in the literature for out-of-phase a-periodic autocorrelation.

  • 8/8/2019 CDMA Concept

    23/38

    275

    Figure 8.16 Preferred pairs of maximum length sequences of period 63. Every pair of adjacentvertices is a maximal connected set.

    Gold Sequences

    One important class of periodic sequences that provides larger sets of sequences with

    good periodic cross-correlation is the class of Gold sequences. A set of Gold sequences

    of period N = 2n1 consists of (Nc + 2) sequences for which the maximum periodic

    cross-correlation c = t(n) with t(n) given by (8.22). A set of Gold sequences isconstructed from appropriately selected maximum length sequences. Suppose a shift

    register polynomial f(x) factors into h(x) h x

    ( ) where h(x) and h x

    ( ) have no factors in

    common. Then the set of all sequences generated by f(x) is just the set of all sequences

    of the form a b, where a is some sequence generated by h(x), b is some sequence

    generated by h x

    ( ) , and a and b are not necessarily nonzero sequences. Now suppose

    that h(x) and h x

    ( ) are two different primitive binary polynomials of degree n that

    generate the maximum length sequences u and v, respectively, of period Nc = 2n 1. Ify

    denotes a nonzero sequence generated by f(x) = h(x) h x

    ( ) , then either

  • 8/8/2019 CDMA Concept

    24/38

    276

    Figure 8.17 Preferred pairs of maximum length sequences of period 127. Every set of sixconsecutive vertices is a maximal connected set.

    y T ui= (8.25)

    or

    y T vj= (8.26)

    or

    y T u T vi j= (8.27)

    where 0 i, j Nc 1 and where, as before, Ti

    u Tjv denotes the sequence whose kth

    element is ui+k vj+k. From this it follows that y is some phase of some sequence in theset G(u,v) defined by

    { }G u v u v u v u Tv u T v u T vNc( , ) , , , , ,...,=

    2 1 (8.28)

    Note that G(u, v) contains Nc+ 2 = 2n

    + 1 sequences of period Nc.

    Figure 8.18 shows a possible configuration to generate a Gold sequence of

    length Nc = 63. The octal representation of the shift registers producing u and v are 141

    and 163, respectively (h(x) = 1+ x5

    + x6

    and h x

    ( ) = l + x + x4

    + x5

    + x6).

  • 8/8/2019 CDMA Concept

    25/38

  • 8/8/2019 CDMA Concept

    26/38

    278

    Furthermore, since h x

    ( ) is shown to be a polynomial of degree n/2, w is a maximumlength sequence of period 2

    n/21. Now consider the sequences generated by the

    polynomial h(x) h x

    ( ) of degree 3n/2. Clearly, any such sequence must be of one of the

    forms T iu, T jw or T iu Tjw, where 0 i 2n 1 and 0 j2n/2 1. Thus, any

    sequence y of period 2n

    1 generated by h(x) h x

    ( ) is one of the sequences in the set

    G(u,w) defined by

    { }G u w u w u w u Tw u T w u T wn( , ) , , , , ,...,=

    2 2 2 (8.31)

    This set of sequences is called the small set of Kasami sequences denoted by Ks(u) inhonor of Kasami, who discovered that the correlation functions for sequences belonging

    to Ks(u) take on the values in the set {1, s(n), s(n) 2} with s(n) given by (8.30).

    Consequently, for the set Ks(u),

    max ( )= = +s nn

    1 2 2 (8.32)

    Notice that max for the set Ks(u) is approximately one half of the value of max achievedby the sets discussed previously. On the other hand, Ks(u) contains only 2

    n/2 = (Nc+1)1/2

    sequences, while the sets of Gold code sequences contain Nc +2 sequences. An example

    for a shift register configuration that produces a small set of Kasami codes of length Nc= 63 is presented in Figure 8.19. The octal representation of the shift registers

    producing u and v are 103 and 15, respectively, h(x) = 1 + x + x6 = 1000011 and h x

    ( )

    = 1 + x2

    + x3

    = 1101.

    Besides the small sets of Kasami sequences, there are also large sets of Kasami

    sequences. Let n be even and let h(x) denote a primitive binary polynomial of degree n

    that generates the maximum length sequence u. Let w = u[s(n)] denote a maximum

    length sequence of period 2n/2

    1 generated by the primitive polynomial h (x) of degree

    n/2 and let h x

    ( ) denote the polynomial of degree n that generates u[t(n)].

    Then, the set of sequences of period Nc generated by h(x) h(x) h x

    ( ) , called thelarge set of Kasami sequences and denoted by KL(u), is as follows:

    1. If n = 2 mod 4, then

    { }K u G u v T w G u vL ii

    n

    ( ) ( , ) ( , )=

    =

    0

    2 22

    UU (8.33)

    where v = u[t(n)] and G(u,v) is defined in (8.28).

  • 8/8/2019 CDMA Concept

    27/38

    279

    h(x) = 1 + x + x6

    h x

    ( ) = 1 + x2

    + x3

    Figure 8.19 Shift register configuration for the small set of Kasami codes with length Nc = 63.

    2. If n = 0 mod 4 then

    { }K u H u T w H u L t n i t ni

    n

    ( ) ( ) ( )( ) ( )=

    =

    0

    2 22

    UU

    ( ){ }v T w j k j kn( ) : , < 0 2 0 2 113

    2U (8.34)

    where v(t) is the result of decimating T i(u) by t(n) and Ht(n)(u) is defined as

    H u

    u u v u Tv u T v

    u u v u Tv u T v

    u u v u Tv u T v

    t n

    Nc

    Nc

    Nc

    ( )

    ( ) ( ) ( )

    ( ) ( ) ( )

    ( ) ( ) ( )

    ( )

    , , , ...,

    , , , ...,

    , , , ...,=

    0 0 1 0

    1 1 1 1

    2 2 1 2

    3

    3

    3

    (8.35)

    In either case, the correlation functions for KL(u) take on the values in the set {1,t(n),

    t(n) 2, s(n), s(n) 2} and max = t(n). If n = 2 mod 4 then KL(u) contains 2n/2

    (2n

    + 1)

    sequences while ifn = 0 mod 4, KL(u) contains 2n/2(2n + 1) sequences.

    An example of a shift register configuration that produces a large set of Kasami

    codes of length Nc = 63 is presented in Figure 8.20. The octal representation of the shift

    +

    + +

    5 4 23 1 0

    2 1 0

  • 8/8/2019 CDMA Concept

    28/38

    280

    registers producing the sequences u, v, and w are 103, 15, and 147, respectively, (h(x) =

    1 + x + x6

    , h x

    ( ) = 1 + x2

    + x3, and h (x) = 1 + x + x

    2+ x

    5+ x

    6).

    h x

    ( ) = 1 + x + x6

    h(x) = 1 + x2

    + x3

    h (x) = 1 + x + x2

    + x5

    + x6

    Figure 8.20 Shift register configuration for the large set of Kasami codes with length Nc = 63.

    Numerical Examples

    Table 8.2 presents a number of examples of PN code sequences. Three types of

    sequences are considered. Gold sequences (G), small-set Kasami sequences (KS), and

    large-set Kasami sequences (KL). The first column denotes the code length Nc, the third

    column shows the maximum number of code sequences per set, and in the fourth

    column the values that periodic cross-correlation can take are given. The last three

    columns show the octal representation of the polynomials describing the linear binary

    shift registers used to generate the desired code sequence. Table 8.2 only shows some

    examples for pseudo-random code sequences.

    +

    +

    +

    + + +

    5 42 1

    03

    2 1 0

    5 4 3 2 1 0

  • 8/8/2019 CDMA Concept

    29/38

  • 8/8/2019 CDMA Concept

    30/38

    282

    Figure 8.21 (a) Periodic autocorrelation and (b) cross-correlation for Gold code with code lengthNc = 127. Generator polynomials 211 and 277 (octal).

    Figure 8.22 (a) a-Periodic autocorrelation and (b) cross-correlation for Gold code with codelength Nc = 127. Generator polynomials 211 and 277 (octal).

    Chip delay

    (a)

    Cross-correlation

    Chip delay

    (b)

    Cross-correlation

    Autocorrelation

    Cross-correlation

    Autocorrelation

    Autocorrelation

    Chip delay

    (b)Chip delay

    (a)

  • 8/8/2019 CDMA Concept

    31/38

    283

    Figure 8.23 (a) Periodic autocorrelation and (b) cross-correlation for Gold code with Nc = 255.Generator polynomials 717 and 765 (not preferred sequences).

    Figure 8.24 (a) Periodic autocorrelation and (b) cross-correlation functions for small-set Kasamicode with Nc=255. Generator polynomials 435 and 023.

    Code sequences with length Nc=255 that have better correlation properties arethe Kasami sequences. Figures 8.24(a) and 8.24(b) show the autocorrelation and cross-

    correlation of a small set of Kasami codes. Figures 8.25(a) and 8.25(b) show the

    autocorrelation and cross-correlation of a large set of Kasami codes.

    Cross-correlationAutocorrelation

    Chip delay

    (a)

    Chip delay

    (a)

    Chip delay

    (b)

    Chip delay

    (b)

  • 8/8/2019 CDMA Concept

    32/38

    284

    Figure 8.25 (a) Periodic autocorrelation and (b) cross-correlation functions for large Kasamicode with Nc = 255. Generator polynomials 435, 023, and 675.

    8.3.3 Random Wave Approximation

    In a multipath propagation environment such as the indoor radio environment, there is

    overlap between shifted data bits of the reference user and of other users. This situation

    is depicted in Figure 8.26.

    This implies that the receiver suffers from interference caused by both thedesired signal and by the signals from other users. The interference power is determined

    by the characteristics of the multipath channel (time delay, phase, and amplitude) and

    by the correlation properties of the code sequences used.

    b11

    t=T b10

    t=0 b1-1

    b11

    b10

    b1-1

    Figure 8.26 Overlap of bits (and code sequences) due to multipath interference.

    Path 1 < j, user 1

    Path 1 = j, user 1

  • 8/8/2019 CDMA Concept

    33/38

    285

    The ACF determines the amount of self-interference, while the cross-correlation

    between the desired code sequence and code sequences of other users determines theamount of multiuser interference. To simplify these performance calculations, an

    approximation of the code sequence characteristics is applied. The starting point for this

    approximation is the expression for the correlation variance defined as

    a E b R b R= +

    1

    1

    1

    0

    2

    ( ) ( )

    (8.36)

    It is worth mentioning here that the interference power is related to this variance. In

    (8.36), b11 and b1

    0 are, respectively, the previous and the next bit with values {1,1}

    having equal probability of occurrence. The functions R() and R

    ( ) are the partial

    correlation functions. If the delay is a multiple of the chip duration ( = pTc), then theexpressions for the discrete correlation functions are

    R pN

    a ac

    i

    k

    i p

    i

    p

    ( ) =

    =

    1

    10

    (8.37)

    R pN

    a ac

    i

    k

    i p

    i p

    Nc

    ( ) =

    = +

    1

    1

    1

    1

    (8.38)

    where aki

    is the ith code symbol of the sequence of user k and Nc is the length of the

    code sequence. To compute the variance in (8.36), we average over all possible time

    delays and over all possibilities for b11 and b1

    0. The time delays in a multipath

    environment are obviously not multiples of the code symbol duration. However, if we

    know the discrete correlation function, then the correlation for a non discrete time delay

    is very easy to calculate by considering that the correlation function is linear between

    two discrete time delays, as shown in Figure 8.27.

    To find an expression for the variance in (8.36), we approximate the Gold and

    Kasami sequences by a random code sequence consisting of Nc code symbols. For a

    random code sequence, the code symbols aki = 1 and aki = 1 occur with equal

    probability. Assuming that the data bits are 1 or 1 with equal probability, the variance

    in (8.36) is written as

    a E R R E R R= +

    +

    1

    2

    1

    2

    2 2

    ( ) ( ) ( ) ( )

    (8.39)

    To simplify this expression further, it is instructive to observe one chip of normalized

    duration overlapped by another chip with delay . This situation is depicted in Figure8.28.

  • 8/8/2019 CDMA Concept

    34/38

    286

    TC 2TC 3TC 4TC

    Figure 8.27 Part of a correlation function.

    Figure 8.28 Overlap of two chips, aki

    and aki-1

    .

    For the two chips aki and ak

    j1 there are two possibilities: either they have the same sign

    or they have opposite sign. Both situations occur with the same probability in case of a

    random sequence. The overlap area denoted here by AO determines the contribution ofchip ak

    i to the correlation function (normalized on the code length Nc). In the case of

    equal bits, the overlap area, normalized on the code length Nis 1/N, while in the case of

    unequal bits, the part between 0 and cancels the part between and 2, implying that

    the overlap area is (12)/Nc. In terms of the overlap area:

    AN

    if a ac

    k

    i

    k

    i

    0

    11= =

    (8.40)

    0 1

    aki

    akiaki-1

    2

  • 8/8/2019 CDMA Concept

    35/38

    287

    A N if a ack

    i

    k

    i

    0

    11 2

    =

    =

    Now, the expectation ofA02

    is calculated by averaging over all possible delays

    [ ]E AN N

    dNc c c

    0

    2

    2

    2

    2 2

    0

    11

    2

    1 1

    2

    1 2 2

    3= +

    =

    ( ) (8.41)

    Now, the final simplified expression for the variance in (8.35) is

    [ ]a cc

    N E A N= =2

    2

    3 (8.42)

    Before applying this approximation, we verify the approximation for a number of

    practical Gold sequences and Kasami sequences. Therefore, a large number of these

    code sequences has been generated, and for each combination of code sequences the

    expectation of the correlation variance has been calculated by averaging over all

    possible delays. The results are shown in Figures 8.29(a) to 8.29(e). To explain these

    figures, we use the Gold code of length 31 as an example. The plot shows a number of

    bars and a line. The line represents the approximated value for the correlation variance

    given by (8.42), and each bar represents the simulated correlation variance between

    two code sequences of the same length. Earlier, we found for example that it ispossible to generate 65 code sequences of length 63. For all figures, we only show 50

    bars for clarity of the plot. In each plot we first observe a large peak, which is actually

    the average correlation variance of the autocorrelation function. All the other bars

    present the average correlation variance of cross-correlations with other codes. By

    observing Figures 8.29(a) to 8.29(e), it is reasonable to conclude that the approximation

    of (8.36) is rather good. To strengthen this conclusion, quantitative results are shown in

    Table 8.3.Code correlation varianceCode correlation variance

    Code number

    (a)

    Code number

    (b)

  • 8/8/2019 CDMA Concept

    36/38

    288

    Figure 8.29 (a) Gold code (Nc = 31), (b) Kasami code (Nc = 31), (c) Gold code (Nc = 127), (d)

    Kasami code (Nc = 255), and (e) Gold code (Nc = 511).

    Table 8.3

    Quantitative Comparison of Simulation Results and Approximation

    for Correlation Variance for Several Practical Code Sequences

    Code correlation varianceCode correlation variance

    Code correlation variance

    Code number

    (c)Code number

    (d)

    Code number(e)

  • 8/8/2019 CDMA Concept

    37/38

    289

    .

    8.3.4 Conclusions

    In this section, a description was given of three types of pseudo-noise sequences

    suitable for DS-CDMA systems. Gold codes and Kasami code sequences are especially

    suitable, since it is possible to generate a relatively large number of code sequences

    with bounded periodic correlation functions. The basic properties of the code sequences

    were discussed and shift register configurations to generate the sequences were shown.

    The periodic correlation functions are important when the desired data bit overlaps with

    a previous or next data bit having the same sign. In the situation where the previous or

    next overlapping bit has the opposite sign, the so-called a-periodic correlation functionis very important. For this a-periodic correlation function, well-defined bounds are

    found in literature. However, by simulation, we saw that the peaks in the a-periodic

    correlation function can be much larger than the bounded periodic correlation function.

    Furthermore, it was shown that Gold code sequences and Kasami code

    sequences cannot be generated with arbitrary length. In the first place, the length of a

    code sequence can always be written as 2n l where n is an integer. This implies that

    we can generate sequences with lengths 31, 63, 127, 255, and so forth. Gold sequences

    cannot be generated for integer values n being a multiple of 4. This implies that we

    cannot generate Gold sequences with length Nc = 255 since this would imply n = 8,

    which is a multiple of 4. On the other hand, Kasami sequences cannot be generated for

    odd values of n. For example, Kasami code sequences with length Nc = 127 and Nc =

    511 are not possible. Code sequences with these lengths must be generated by a Gold

    shift register generation.

    PASCAL software was developed to generate Gold sequences and Kasami

    sequences. For simplification of performance calculations, an approximation of the

    correlation variance is desirable. A very simple expression for this correlation variance

    results if we approximate real code sequences of length Nc by random sequences of

    length Nc. This approximation has been verified by simulation and the results show that

    the approximation is quite good.

    Approximation

    acN

    =2

    3

    Sample Mean ms Sample Standard Deviation S

    Gold code

    Nc = 63

    0.010582 0.010406 0.002182

    Kasami code

    Nc = 63

    0.010582 0.0119 0.005654

    Gold code

    Nc = 127

    0.005249 0.005553 0.000722

    Kasami code

    Nc = 255

    0.002614 0.0025691 0.000289

  • 8/8/2019 CDMA Concept

    38/38

    290

    REFERENCES

    [1] R. Prasad, CDMA for Wireless Personal Communications, Norwood, MA:

    Artech House, 1996.

    [2] Special issue on spread-spectrum communication, IEEE Trans. Commun., Vol.

    COM-30, May 1982.

    [3] M.K. Simon, J.K. Omura, R.A. Scholtz, and B.K. Levitt, Spread-spectrum

    communications, Vol. I, II, III, Comp. Sci., 1985.

    [4] R.A. Scholtz, The spread-spectrum concept, IEEE Trans. Commun., Vol.

    COM-25, pp. 748755, August 1977.[5] D.J. Torrieri, Principles of Secure Communication Systems, Norwood, MA:

    Artech House, 1985.

    [6] G.R. Cooper and C.D. McGillem, Modern Communication and Spread-

    Spectrum, New York: McGraw-Hill Company, 1986.

    [7] S.G. Glisic and P.A. Leppanen (Eds.), Code Division Multiple Access

    Communications, Boston: Kluwer Academic Publishers, 1995.

    [8] A.J. Viterbi, CDMA Principles of Spread-Spectrum Communications, Reading,

    MA: Addison-Wesley Publishing Company, 1995.

    [9] R.C. Dixon, Spread-Spectrum Systems, New York: John Wiley & Sons, 1984.

    [10] A.M. Viterbi and A.J. Viterbi, Erlang capacity of a power controlled CDMA

    system, IEEE J. Selected Areas in Comm., Vol. 11, pp. 892899, August 1993.

    [11] D.P. Sarwate and M.B. Pursley, Crosscorrelation properties of pseudo-random

    and related sequences, Proc. IEEE, Vol. 68, No. 5, May 1980.

    [12] S.W. Golomb, Shift Register Sequences, San Francisco, CA: Holden-Day, 1967.

    [13] J.L. Massey and J.J. Uhran, Jr., Final report for multipath study, Contract

    NASS-10786, Univ. Notre Dame, IN, 1969.

    [14] R. Gold, Optimal binary sequences for spread spectrum multiplexing, IEEE

    Trans. Inf. Theory, Vol. IT-13, pp. 619621, October 1967.