ECS455 - 4-6 - All
ECS455 - 4-6 - All
Multiple Access
Office Hours:
BKD 3601-7
Monday 9:20-10:20
Dr.Prapun Suksompong Wednesday 9:20-10:20
1 prapun.com/ecs455
2
ECS455: Chapter 4
Multiple Access
4.1 TDD and FDD
Office Hours:
BKD 3601-7
Monday 9:20-10:20
Dr.Prapun Suksompong Wednesday 9:20-10:20
3 prapun.com/ecs455
Duplexing
Allow the subscriber to send “simultaneously” information to the
base station while receiving information from the base station.
Talk and listen simultaneously.
Definitions:
Forward channel or downlink (DL) is used for communication
from the infrastructure to the users/stations
Reverse channel or uplink (UL) is used for communication from
users/stations back to the infrastructure.
Two techniques
1. Frequency division duplexing (FDD)
2. Time division duplexing (TDD)
4 [Rappaport, 2002, Ch 9]
Frequency Division Duplexing (FDD)
Provide two distinct bands of frequencies (simplex
channels) for every user.
The forward band provides traffic from the base station to
the mobile.
The reverse band provides traffic from the mobile to the
base station.
Any duplex channel actually consists of two simplex channels (a
forward and reverse).
Most commercial cellular systems are based on FDD.
5
FDD Examples
GSM
UMTS
6
Time Division Duplexing (TDD)
The UL and DL data are transmitted on the same carrier
frequency at different times. (Taking turns)
Use time instead of frequency to provide both forward and
reverse links.
Each duplex channel has both a forward time slot and a
reverse time slot.
If the time separation between the forward and reverse time
slot is small, then the transmission and reception of data
appears simultaneous to the users at both the subscriber unit
and on the base station side.
Used in Bluetooth and Mobile WiMAX
7
Problems of FDD
Each transceiver simultaneously transmits and receives radio
signals
The signals transmitted and received can vary by more than 100
dB.
The signals in each direction need to occupy bands that are
separated far apart (tens of MHz)
A device called a duplexer is required to filter out any
interference between the two bands.
8
[Tse and Viswanath, 2005, Ch 4, p 121]
Advantages of FDD
TDD frames need to incorporate guard periods equal to
the max round trip propagation delay to avoid
interference between uplink and downlink under worst-case
conditions.
There is a time latency created by TDD due to the fact that
communications is not full duplex in the truest sense.
This latency creates inherent sensitivities to propagation delays
of individual users.
9
Advantages of TDD
Duplexer is not required.
Enable adjustment of the downlink/uplink ratio to efficiently
support asymmetric DL/UL traffic.
With FDD, DL and UL always have fixed and generally, equal DL and
UL bandwidths.
Assure channel reciprocity for better support of link adaptation,
MIMO and other closed loop advanced antenna technologies.
Ability to implement in nonpaired spectrum
FDD requires a pair of channels
TDD only requires a single channel for both DL and UL providing
greater flexibility for adaptation to varied global spectrum
allocations.
10
ECS455: Chapter 4
Multiple Access
4.2 Introduction to Multiple Access
11
12
Multiple Access Techniques
Allow many mobile users to share simultaneously a finite
amount of radio spectrum.
For high quality communications, this must be done without
severe degradation in the performance of the system.
Important access techniques
1. Frequency division multiple access (FDMA)
2. Time division multiple access (TDMA)
3. Spread spectrum multiple access (SSMA)
Frequency Hopped Multiple Access (FHMA)
Code division multiple access (CDMA)
4. Space division multiple access (SDMA)
5. Random access
ALOHA
13
Chapter 4
Multiple Access
4.3 FDMA and TDMA
14
Frequency division multiple access
(FDMA)
The oldest multiple access scheme for wireless
communications.
Used exclusively for multiple access in 1G down to
individual resource units or physical channels.
Assign individual channels to individual users.
Different carrier frequency is assigned to each user so that the
resulting spectra do not overlap.
During the period of the call, no other user can share the same
channel.
Band-pass filtering (or heterodyning) enables separate
demodulation of each channel.
15
FDMA (2)
If an FDMA channel is not in use, then it sits idle and cannot
be used by other users to increase or share capacity.
It is essentially a wasted resource.
In FDD systems, the users are assigned a channel as a pair of
frequencies.
17
FDMA vs. TDMA
18
Tradeoffs
TDMA transmissions are slotted
Require the receivers to be synchronized for each data burst.
Guard times are necessary to separate users. This results in larger
overheads.
FDMA allows completely uncoordinated transmission in the
time domain
No time synchronization among users is required.
The complexity of FDMA mobile systems is lower when
compared to TDMA systems, though this is changing as digital
signal processing methods improve for TDMA.
Since FDMA is a continuous transmission scheme, fewer bits are
needed for overhead purposes (such as synchronization and
framing bits) as compared to TDMA.
FDMA needs to use costly bandpass filters.
For TDMA, no filters are required to separate individual physical
channels.
19
Guard Band vs. Guard Time
FDMA TDMA
20
Example: GSM
FDMA
GSM FDMA/TDMA
with one active time
slot
[Figure 7.2, Heine, 1998]
22
[Figure 7.1, Heine, 1998]
Classifications of Medium Access
Control (MAC)
23
24
ECS455: Chapter 4
Multiple Access
4.4 DS/SS
Office Hours:
BKD 3601-7
Monday 9:20-10:20
Dr.Prapun Suksompong Wednesday 9:20-10:20
1 prapun.com/ecs455
Spread spectrum (SS)
Historically spread spectrum was developed for secure
communication and military uses.
Difficult to intercept for an unauthorized person.
Easily hidden. For an unauthorized person, it is difficult to even
detect their presence in many cases.
Resistant to jamming.
Provide a measure of immunity to distortion due to multipath
propagation.
In conjunction with a RAKE receiver, can provide coherent
combining of different multipath components.
Asynchronous multiple-access capability.
Wide bandwidth of spread spectrum signals is useful for location
and timing acquisition.
[R. Pickholtz, D. Schilling, L. Milstein, “Theory of Spread-Spectrum Communications - A Tutorial,” IEEE Trans. Commun., Vol. 30 , pp.
4
855-884, May 1982.]
Spread spectrum (2)
Increase the bandwidth of the message signal by a factor N, called
the processing gain (or bandwidth spreading factor).
In practice, N is on the order of 100-1000. [Goldsmith, 2005, p 379]
N = 128 for IS-95 [T&V]
Wasteful?
Although we use much higher BW for a spread spectrum signal,
Multiplexing: we can also multiplex large numbers of such signals
over the same band.
Multiple Access: many users can share the same spread spectrum
bandwidth without interfering with one another.
Achieved by assigning different code to each user.
Frequency bands can be reused without regard to the separation distance of
the users.
5
Spread Spectrum (3)
Two forms of spread spectrum (SS)
1. Frequency Hopping (FH)
Hop the modulated data signal over a wide BW by changing its
carrier frequency
BW is approximately equal to NB
N is the number of carrier frequencies
available for hopping
B is the bandwidth of the data signal.
The most celebrated invention of frequency hopping was that of
actress Hedy Lamarr
and composer George Antheil in 1942
2. Direct Sequence (DS)
6
7
For several years beginning in 1997, the boxes of
CorelDRAW's software suites were graced by a large Corel-
drawn image of Hedy Lamarr.
8
SSMA, CDMA, DS/SS
Single User Multi-access
SSMA
TDMA
FH/SS CDMA
FDMA
DS/SS
SDMA
9
Useful even for single user!
DS/SS System
𝑦 𝑡 =𝑚 𝑡 𝑐 𝑡 (Integrator)
y t c t m t c2 t m t
Code
generator Code 1
Synchronization/ Code
tracking generator
(Correlation)
Message signal
(data/information signal)
Pseudonoise (PN)
sequence. (Think of this as
a pseudorandom carrier).
Here, we refer to it as spreading code/sequence.
Tb
N
10 Tc
DS/SS System (Con’t)
Observe that…
To be able to perform the despreading operation, the
receiver must
know the code sequence c(t) used at the Tx to spread the
signal
synchronize the codes of the received signal and the locally
generated code.
The process of detection (despreading) is identical to the
process of spectral spreading.
Recall that for DSB-SC, we have a similar situation in that the
modulation and demodulation processes are identical (except
for the output filter).
11
Spread spectrum modem
1 1
Modulation: m t cos 2 f ct M f fc M f fc
2 2
14
DS/SS: Secure Communication
Secure communication
Signal can be detected only by authorized person(s) who know the
pseudorandom code used at the transmitter.
Signal spectrum is spread over a very wide band, the signal PSD is
very small, which makes it easier to hide the signal within the noise
floor
15
DS/SS: Jamming Resistance
y t i t c t m t c t i t c t m t i t c t
2
17
ECS455: Chapter 4
Multiple Access
4.5 m-sequence
Office Hours:
BKD 3601-7
Monday 9:20-10:20
Dr.Prapun Suksompong Wednesday 9:20-10:20
1 prapun.com/ecs455
Binary Random Sequences
While DSSS chip sequences must be generated
deterministically, properties of binary random sequences are
useful to gain insight into deterministic sequence design.
A random binary chip sequences consists of i.i.d. bit values
with probability one half for a one or a zero.
Also known as Bernoulli sequences/trials, “coin-flipping”
sequences
A random sequence of length N can be generated, for
example, by flipping a fair coin N times and then setting the
bit to a one for heads and a zero for tails.
2
Binary Random Sequence
X-4 X-3 X-2 X-1 X-0 X1 X2 X3 X4
Coin-flipping sequence H H T H H T H T T
Bernoulli trials/sequence 1 1 0 1 1 0 1 0 0
Binary (indp.) random sequence -1 -1 1 -1 -1 1 -1 1 1
4
Note: A run is a subsequence of identical symbols within the sequence.
7
(See Section 13.4.1 in [Lathi, 1998])
CLK
(Degree: r = 3 use 3 flip-flops)
1 0 x 1x 2 1x3
The gi’s are coefficients of a primitive polynomial.
9
(See Section 13.4.1 in [Lathi, 1998])
CLK
(Degree: r = 3)
1 0 x 1x 2 1x3
The gi’s are coefficients of a primitive polynomial.
11
Primitive Polynomial
Definition: A LFSR generates an m-sequence if and only
if (starting with any nonzero state,) it visits all possible
nonzero states (in one cycle).
One can define primitive polynomial using concepts from
finite field theory.
Fact: A polynomial generates m-sequence if and only if it is a
primitive polynomial.
We then use this fact to define primitive polynomial.
For us, a polynomial is primitive if the corresponding LFSR
circuit generates m-sequence.
12
Sample Exam Question
Draw the complete state diagrams for linear feedback shift
registers (LFSRs) using the following polynomials. Does either
LFSR generate an m-sequence?
1. x3 x 2 1
2. x3 x 2 x 1
13
Nonmaximal linear feedback shift
register
x3 x 2 x 1
14
m-Sequences: More properties
1. The contents of the shift register will cycle over all possible 2r-1 nonzero states
before repeating.
2. Contain one more 1 than 0 (Slightly unbalanced)
3. Shift-and-add property: Sum of two (cyclic-)shifted m-sequences is
another (cyclic-)shift of the same m-sequence
4. If a window of width r is slid along an m-sequence for N = 2r-1 shifts, each r-
tuple except the all-zeros r-tuple will appear exactly once
5. For any m-sequence, there are
One run of ones of length r
One run of zeros of length r-1
One run of ones and one run of zeroes of length r-2
Two runs of ones and two runs of zeros of length r-3
Four runs of ones and four runs of zeros of length r-4
…
2r-3 runs of ones and 2r-3 runs of zeros of length 1
00101110010111001011100101110010111001011100101110010111
16
Ex: Properties of m-sequence (con’t)
25-1 = 31-chip m-sequence
1010111011000111110011010010000
1010111011000111110011010010000
Runs:
11111 1
0000 1
111 1
000 1
11 2
00 2
1 4
0 4
There are 16 runs.
17
m-Sequences (con’t)
00101110010111001011100101110010111001011100101110010111
0010111
1001011
18
Autocorrelation and PSD
(Normalized) autocorrelations of maximal sequence and
random binary sequence.
20
ECS455: Chapter 4
Multiple Access
4.6 SSMA and CDMA
Office Hours:
Dr.Prapun Suksompong Library (Rangsit) Mon 16:20-16:50
www.prapun.com BKD 3601-7 Wed 9:20-11:20
1
DSSS and m-sequences
m-sequences
Excellent auto-correlation properties (for ISI rejection)
Highly suboptimal for exploiting the multiuser capabilities of
spread spectrum.
There are only a small number of maximal length codes of a
given length.
Moreover, maximal length codes generally have relatively poor
cross-correlation properties, at least for some sets of codes.
4
Qualcomm
Founders: Two of the most eminent engineers in the
world of mobile radio
Prof. Irwin Jacobs is the chairman and founder
Cornell (undergrad.: Hotel > EE)
MIT (grad.)
UCSD (Prof.)
Prof. Andrew J. Viterbi is the co-founder
MIT (BS, MS)
USC (PhD)
UCLA and UCSD (Prof.)
Same person that invented the Viterbi algorithm for
decoding convolutionally encoded data.
5
Video: Irwin Jacobs
Irwin Jacobs: Pioneer of the Wireless Future
6
http://www.youtube.com/watch?v=EGaG1S4-D6o
Code Division Multiple Access (CDMA)
1991: Qualcomm announced
that it had invented a new cellular system based on
CDMA
that the capacity of this system was 20 or so times
greater than any other cellular system in existence
However, not all of the world was particularly
pleased by this apparent breakthrough—in
particular, GSM manufacturers became concerned
that they would start to lose market share to this
new system.
The result was continual and vociferous argument
between Qualcomm and the GSM manufacturers.
7
CDMA
One way to achieve SSMA
May utilize Direct Sequence Spread Spectrum (DS/SS)
The narrowband message signal is multiplied (modulated) by the spreading
signal which has a very large bandwidth (orders of magnitudes greater than
the data rate of the message).
Direct sequence is not the only spread-spectrum signaling format suitable for
CDMA Not to be confused with
error-correcting codes
All users use the same carrier frequency and may transmit that add redundancy to
combat channel noise
simultaneously. and distortion
9
Orthogonality
Two signals are said to be orthogonal if their inner
product is zero.
The symbol is used to denote orthogonality.
* Example:
Vector: a1 b1 17
2t 3 and 5t 2 t on 1,1
n
a, b a b
*
ak bk* 0 9
k 1
a b
Time-domain: n n
a, b a t b *
t dt 0
Example (Fourier Series):
Frequency domain:
t t
sin 2 k1 and cos 2 k2 on 0, T
A, B A f B* f df 0 T T
j 2 n
t
10
e T
on 0, T
Important Properties
Parseval’s theorem
x, y x t y* t dt X f Y * f df X ,Y
If x t y t , then X f Y f .
11
CDMA
Orthogonal signaling no inter-channel interference
Special cases:
TDMA: The waveforms do not overlap in the time domain.
FDMA: The waveforms do not overlap in the frequency
domain.
Orthogonal signals may overlap both in time and in
frequency domain.
12
Example: Orthogonality
An example of four “mutually orthogonal” digital signals.
c1 t When i j,
ci t , c j t 0
c2 t
c3 t
c4 t
13
Orthogonality-Based MA
CDMA
1 1
s t Sk ck t
S f S k Ck f where ck1 ck2
k 0 k 0
TDMA
1 1
s t Sk c t kTs
S f C f S k e j 2 fkTs
k 0 k 0
where c(t) is time-limited to [0,T].
This is a special case of CDMA with ck t c t kTs
The ck are non-overlapping in time domain.
FDMA 1
S f Sk C f k f
k 0
where C(f) is frequency-limited to [0,f].
This is a special case of CDMA with Ck f C f k f
14 The Ck are non-overlapping in freq. domain.
Example 1
c1 t
|C1(f)|
1
A 0.8
0.6
t 0.4
T 0.2
0
-5 -4 -3 -2 -1 0 1 2 3 4 5
f [Hz]
|C2(f)|
c2 t
1
B 0.8
0.6
0.4
t 0.2
T 0
-5 -4 -3 -2 -1 0 1 2 3 4 5
f [Hz]
-B [CDMAEx.m]
The two waveforms above overlaps both in time domain and in frequency domian.
15
Example 1 (Con’t)
Here, we use A = B. It is easy to decode the original waveforms from the shape
of the sum.
c1 t
t
T
c2 t
t 11 01 10 11 11 00 00 10
T
16
Example 2: DS-CDMA
c1 t Digital version
c1 1 1 1 1
c2 t c 2 1 1 1 1
c3 1 1 1 1
c3 t c 4 1 1 1 1
1
c4 t s Sk c k
k 0
1
s t Sk ck t
17 k 0 MATLAB: ECS455_CDMAEx1.m
Block Matrix Multiplications
2 2 5 10 2 10 2 5
3 3 4 5 10 5 3 6
10 6 6 4 3
× 3 3 4 1 1 5 5 6
9 7 3 5 9
7 2 5 3 10 6 10 3
8 3 6 9 8 3 6 5
108 73 136 175 150 193 126 149
=
155 85 164 224 213 197 158 165
2 2 5 10 2 10 2 5
3 3 4 5 10 5 3 6
10 6 6 4 3
× 3 3 4 1 1 5 5 6
9 7 3 5 9
7 2 5 3 10 6 10 3
8 3 6 9 8 3 6 5
108 73 136 175 150 193 126 149
=
155 85 164 224 213 197 158 165
18
Block Matrix Multiplications
2
3 C23 5 10
4 5
2
10
D105 2
3
5
6
10 6
9 7
A B
6 4 3
3 5 9
× 3 3 4 1 1 5 5 6
7 E 2 5 3 10 F 6 10 3
8 3 6 9 8 3 6 5
108 73 136 175 150 193 126 149
=
155 85 164 224 213 197 158 165
AC+BE AD+BF
2 2 5 10 2 10 2 5
3 3 4 5 10 5 3 6
10 6 6 4 3
9 7 X3 5 9
× 3 3G 4 1 1 5 H 5 6
7 2 5 3 10 6 10 3
8 3 6 9 8 3 6 5
108 73 136 175 150 193 126 149
=
155 85 164 224 213 197 158 165
19 XG XH
Block Matrix Multiplications
c c2 cn x x1c1 x2c2 xncn where c j is m 1 and x is n 1 .
1
m n
r1
r1 x
r2 r x
x where r i is 1 m and x is m1 .
2
rn nm r n x
r1
r2
x x1 r1 x2 r 2 xn r n where r i is 1 m and x is 1 n .
rn nm
20
CDMA: DS/SS
The receiver performs a time correlation operation to detect
only the specific desired codeword.
All other codewords appear as noise due to decorrelation.
For detection of the message signal, the receiver needs to know
the codeword used by the transmitter.
Each user operates independently with no knowledge of
the other users.
Unlike TDMA or FDMA, CDMA has a soft capacity limit.
Increasing the number of users in a CDMA system raises the noise
floor in a linear manner.
There is no absolute limit on the number of users in CDMA. Rather,
the system performance gradually degrades for all users as the
number of users is increased and improves as the number of users is
decreased.
22
23
CDMA: Near-Far Problem
At first, CDMA did not appear to be suitable for mobile
communication systems because of this problem.
Occur when many mobile users share the same channel.
In an uplink, the signals received from each user at the receiver travel
through different channels.
Users that are close to the BS can cause a great deal of
interference to user’s farther away.
In general, the strongest received mobile signal will capture the
demodulator at a base station.
Stronger received signal levels raise the noise floor at the base station
demodulators for the weaker signals, thereby decreasing the probability
that weaker signals will be received.
Fast power control mechanisms solve this problem.
Regulate the transmit power of individual terminals in a manner that
received power levels are balanced at the BS.
24
How many orthogonal signals?
No signal can be both strictly time-limited and strictly band-
limited.
We adopt a softer definition of bandwidth and/or duration (e.g.,
the percentage of energy outside the band [-B, B] or outside the
time interval [0, T] not exceeding a given bound .
Q: How many mutually orthogonal signals with (approximate)
duration T and (approximate) bandwidth B can be constructed?
A: About 2TB
No explicit answer in terms of T, B, and is known.
Unless the product TB is small.
A K-user orthogonal CDMA system employing antipodal
modulation at the rate of R bits per second requires bandwidth
approximately equal to
1
B RK
2
25 [Verdu, 1998, Ch1, p 7]
ECS455: Chapter 4
Multiple Access
4.7 Synchronous CDMA
Office Hours:
Dr.Prapun Suksompong Library (Rangsit) Mon 16:20-16:50
www.prapun.com BKD 3601-7 Wed 9:20-11:20
1
Synchronous CDMA Model
Timing is important for orthogonality
It is not possible to obtain orthogonal codes for asynchronous
[Goldsmith, 2005, Sec. 13.4, p. 425]
users.
Bit epochs are aligned at the receiver [Verdu, 1998, p 21]
Require
Closed-loop timing control or
Providing the transmitters with access to a common clock (such
as the Global Positioning System) [Verdu, 1998, p 21]
2
Walsh Functions [Walsh, 1923]
Used in second- (2G) and
third-generation (3G) cellular
radio systems for providing
channelization
A set of Walsh functions can
be ordered according to the
number of zero crossing
(sign changes)
3
Walsh Functions (2)
Orthogonality
Application:
Once we know how to generate these Walsh functions of any order N, we can use them
in N-channel orthogonal multiplexing applications.
4
Walsh Sequences
The Walsh functions, expressed
in terms of {+1,-1} values,
form a group under the
multiplication operation
(multiplicative group).
The Walsh sequences, expressed
in terms of {0, 1} values, form
a group under modulo-2
addition (additive group).
Closure property:
𝑾𝒊 𝒕 ⋅ 𝑾𝒋 𝒕 = 𝑾𝒓 𝒕
5
𝑾𝒊 ⊕ 𝑾𝒋 = 𝑾𝒓
Abstract Algebra
A group is a set of objects G on which a binary operation “ ” has
been defined. " ": G G G (closure). The operation must also
satisfy
1. Associativity: a b c a b c
2. Identity: e G such that a G a e e a a a G
3. Inverse: a G a unique element a 1 G such that
a a 1 a 1 a e .
A group is said to be commutative (or abelian) if it also satisfies
commutativity:
a, b G , a b b a .
The group operation for a commutative group is usually represented
using the symbol “+”, and the group is sometimes said to be “additive.”
6
Walsh sequences of order 64
What’s wrong with this list?! [Lee and Miller, 1998, Table 5.2]
7
Walsh Function Generation
We can construct the Walsh functions by:
1. Using Rademacher functions
2. Using Hadamard matrices
3. Exploiting the symmetry properties of Walsh functions themselves
The Hadamard matrix is a square array of plus and minus ones,
{+1, -1}, whose rows and columns are mutually orthogonal.
If the first row and first column contain only plus ones, the matrix
is said to be in normal form.
We can replace “+1” with “0” and “-1” with “1” to express the
Hadamard matrix using the logic elements {0, 1}.
The 22 Hadamard matrix of order 2 is
1 1 0 0
𝐻2 = ≡
1 −1 0 1
8
(Named after the French mathematician Jacques Hadamard)
Kronecker Product
An operation on two matrices of arbitrary size
Named after German mathematician Leopold Kronecker.
If A is an m-by-n matrix and B is a p-by-q matrix, then the
Kronecker product AB is the mp-by-nq matrix
a11 B a1n B
AB .
am1 B amn B
Example 1·0 1·5 2·0 2·5 0 5 0 10
1·7 2·6 2·7 6 7 12 14
1 2 0 5 1·6 .
3 4 6 7 3·0 3·5 4·0 4·5 0 15 0 20
10
3·6 3·7 4·6 4·7 18 21 24 28
Hadamard matrix (2)
11
Hadamard matrix: Examples
In MATLAB, use
hadamard(k)
12
Two ways to get H8 from H2 and H4
H2 H4
H8 H 2 H 4 H8 H 4 H 2
13
Properties
Orthogonality:
Geometric interpretation: every two different rows represent two
perpendicular vectors
Combinatorial interpretation: every two different rows have matching
entries in exactly half of their elements and mismatched entries in the
remaining elements.
Symmetric
Closure property
The elements in the first column and the first row are all 1s. The
elements in all the other rows and columns are evenly divided
between 1 and -1.
Traceless property
14
Walsh–Hadamard Sequences
All the rows (or columns) of Hadamard matrices are Walsh
sequences if the order is N = 2t.
Rows of the Hadamard matrix are not indexed according to the
number of sign changes.
Used in synchronous CDMA
It is possible to synchronize users on the downlink, where all
signals originate from the same transmitter.
It is more challenging to synchronize users in the uplink, since
they are not co-located.
Asynchronous CDMA
15
Hadamard Matrix in MATLAB
We use the hadamard function in MATLAB to generate
Hadamard matrix.
N = 8; % Length of Walsh (Hadamard) functions
hadamardMatrix = hadamard(N)
hadamardMatrix =
1 1 1 1 1 1 1 1
1 -1 1 -1 1 -1 1 -1
1 1 -1 -1 1 1 -1 -1
1 -1 -1 1 1 -1 -1 1
1 1 1 1 -1 -1 -1 -1
1 -1 1 -1 -1 1 -1 1
1 1 -1 -1 -1 -1 1 1
1 -1 -1 1 -1 1 1 -1
Each column of the sequency index (in binary format) is given by the modulo-2 addition
of columns of the bit-reversed Hadamard index (in binary format).
binHadIdx = fliplr(dec2bin(HadIdx,M)); % Bit reversing of the binary index
binHadIdx = uint8(binHadIdx)-uint8('0'); % Convert from char to integer array
binSeqIdx = zeros(N,M-1,'uint8'); % Pre-allocate memory
for k = M:-1:2
% Binary sequency index
binSeqIdx(:,k) = xor(binHadIdx(:,k),binHadIdx(:,k-1));
end
SeqIdx = bin2dec(int2str(binSeqIdx)); % Binary to integer sequency index
walshMatrix = hadamardMatrix(SeqIdx+1,:) % 1-based indexing
walshMatrix =
1 1 1 1 1 1 1 1
1 1 1 1 -1 -1 -1 -1
1 1 -1 -1 -1 -1 1 1
1 1 -1 -1 1 1 -1 -1
1 -1 -1 1 1 -1 -1 1
1 -1 -1 1 -1 1 1 -1
1 -1 1 -1 -1 1 -1 1
17 1 -1 1 -1 1 -1 1 -1
CDMA via Hadamard Matrix
N = 8; % 8 Users
H = hadamard(N); % Hadamard matrix
%% At transmitter(s),
S = [8 0 12 0 18 0 0 10];
r = S*H
% r = 8.*H(1,:) + 12.*H(3,:) + 18.*H(5,:) + 10.*H(8,:);
% Alternatively, use
% r = ifwht(S,N,'hadamard')
%% At Receiver,
S_hat = (1/N)*r*H'
% Alternatively, use
% S_hat = fwht(r,N,'hadamard')
Office Hours:
Dr.Prapun Suksompong Library (Rangsit) Mon 16:20-16:50
www.prapun.com BKD 3601-7 Wed 9:20-11:20
1
Evolution of cellular network
[Abu-Rgheff, 2007]
2
IS-95 System
Based on direct sequence CDMA (DS-CDMA)
First CDMA-based digital cellular standard.
The brand name for IS-95 is cdmaOne.
Also known as TIA-EIA-95.
Proposed by Qualcomm in 1989 and adopted in 1993.
North America
Replaced by IS-2000 (CDMA2000)
1.25 MHz Channel BW
1.228 Mb/s chip rate
Walsh functions of “order 64” are extensively used in the
IS-95 system.
Remarks
IS-95B = cdmaOne
Upgrade IS-95A
Can carry data at rates up to 14.4 kbps for IS-95A and
115 kbps for IS-95B.
3
64-ary Walsh Functions
5
IS-95 base station transceiver
(to provide privacy)
6
IS-95 terminal station transceiver
(for FEC)
7
IS-95
The reverse link is subject to near-far effects.
More powerful error correction is employed on the reverse link.
A rate 1/2 constraint length 9 convolutional code followed by an interleaver
on the forward channel
A rate 1/3 constraint length 9 convolutional code followed by an interleaver
is used on the reverse link.
Also with WH(6,64)
Interleaving is utilized to avoid large burst errors, which can be very
detrimental to convolutional codes.
Power control.
Use a subchannel on the forward link
Every 1.25 ms the base station receiver estimates the signal strength of the
mobile unit.
If it is too high, the base transmits a 1 on the subchannel. If it is too low, it
transmits a 0.
In this way, the mobile station adjusts its power every 1.25 ms as necessary
so as to reduce interference to other users.
8
IS-95: Increased Spectral Efficiency
Improve frequency reuse.
Narrow-band systems cannot use the same transmission frequency in
adjacent cells because of the potential for interference.
CDMA has inherent resistance to interference.
N = 1 (theoretically)
Although users from adjacent cells will contribute to interference level, their
contribution will be significantly less than the interference from the same cell
users.
Frequency reuse efficiency increases by a factor of 4 to 6.
When used to transmit voice signals, CDMA systems may exploit
the fact that voice activity typically lies at somewhat less than
40%, thus reducing the amount of interference to 40% of its
original value.
9
QCELP
Qualcomm code-excited linear prediction algorithm
Used for voice encoding.
The voice coder exploits gaps and pauses in speech.
The data rate is variable.
To keep the symbol rate constant, whenever the bit rate falls below the
peak bit rate of 9600 kbit/s, repetition is used to fill the gaps.
For example, if the output of the voice coder (and subsequently the
convolutional coder) falls to 2400 bit/s, the output is repeated three times
before it is sent to the interleaver.
Takes advantage of this repetition time by reducing the output power during
three out of the four identical symbols by at least 20 dB.
In this way, the multiple-access interference is reduced.
This voice activity gating reduces interference and increases overall
capacity.
10
References
J. S. Lee and L. E. Miller, CDMA Systems Engineering
Handbook, 1998.
Chapter 4 and 5
R.E. Ziemer, Fundamentals of Spread Spectrum
Modulation, 2007
Chapter 4
Office Hours:
Dr.Prapun Suksompong Library (Rangsit) Mon 16:20-16:50
www.prapun.com BKD 3601-7 Wed 9:20-11:20
1
Asynchronous CDMA Model
In cellular systems, the design of the reverse link (mobile-
to-base station) is considerably simplified if the users need
not be synchronized.
It is possible to let the users transmit asynchronously in
CDMA.
Codes assigned to different users need to have low cross
correlation with each other independent of the
relative delays
Gold codes
2
Gold codes
Gold codes have worse autocorrelation properties than
maximal-length codes, but better cross-correlation
properties if properly designed.
The chip sequences associated with a Gold code are produced
by addition of two m-sequences.
3
[Ziemer, 2007, Fig. 9]
Orthogonality (a revisit)
Downlinks
May use orthogonal spreading codes such as Walsh-Hadamard codes
Orthogonality can be degraded by multipath fading.
Uplinks
Generally use non-orthogonal codes due to the difficulty of user
synchronization and the complexity of maintaining code orthogonality in
uplinks with multipath.
Little dynamic coordination of users in time or frequency is required
Users can be separated by the code properties alone.
There is a hard limit on how many orthogonal channels (orthogonal
codes) can be obtained.
For non-orthogonal codes, there is no hard limit.
Non-orthogonal codes cause mutual interference between users.
The more users, the higher the level of interference
Degrade the performance of all the users.
Non-orthogonal CDMA scheme also requires power control in the
uplink to compensate for the near-far effect.
4 [Goldsmith, p 458]
Review: Near-far Effect
Arise in the uplink because the channel gain between a user’s
transmitter and the receiver is different for different users.
Suppose that one user is very close to his base station or access
point, and another user very far away.
If both users transmit at the same power level, then the interference
from the close user will swamp the signal from the far user.
Power control
Make the received signal power of all users to be roughly the same
Essentially inverts any attenuation and/or fading on the channel
Each interferer must contribute an equal amount of power
Eliminating the near-far effect
5
Global Positioning System (GPS)
Original application in the (US) military
Created in the early 1990s.
Allow a person to determine the time and the person's
precise location (latitude, longitude, and altitude) anywhere
on earth.
6
Applications
The potential applications of GPS are so vast that it has been
called (with some exaggeration) the next utility (similar to
gas, water, and electricity).
Most people probably think of it as the satellite system that
allows their satnavs to work,
but GPS is everywhere these days:
it automatically opens train doors at stations;
it tags our photos so we’ll remember where we took them;
it even keeps serves’ clocks in sync.
Its main use, however, is in preventing marital arguments on
long car journeys.
8
GPS and Gold codes
Gold codes are used to distinguish the signals from different
satellites
Coarse Acquisition Code (C/A)
Standard Positioning Service (SPS)
The message data is transmitted at 50 bits per second.
1023 bits with a period of one millisecond.
9
[Plausinaitis]
Auto and cross correlation of C/A code
10
How GPS Works?
A GPS receiver measuring its distance from a group of
satellites in space which are acting as precise reference points.
All the satellites have atomic clocks of unbelievable precision on
board and are synchronized.
The satellite are continuously transmitting the information about
their location and time.
GPS receiver on the ground is in synchronism with the satellites.
Off by an (unknown) amount .
For now, assume = 0.
By measuring the propagation time, the receiver can compute
distance d from that satellite.
11
GPS-Trilateration
Intersection of three sphere narrows down the location to
just two points.
Office Hours:
Dr.Prapun Suksompong Library (Rangsit) Mon 16:20-16:50
www.prapun.com BKD 3601-7 Wed 9:20-11:20
1
OFDM Applications
802.11 Wi-Fi: a/g/n/ac versions
DVB-T (Digital Video Broadcasting — Terrestrial)
terrestrial digital TV broadcast system used in most of the world
outside North America
DMT (the standard form of ADSL - Asymmetric Digital
Subscriber Line)
WiMAX, LTE (OFDMA)
2
Side Note: Digital TV
Japan: Starting July 24, 2011,
the analog broadcast has ceased
and only digital broadcast is
available.
US: Since June 12, 2009, full-
power television stations
nationwide have been
broadcasting exclusively in a
digital format.
3
OFDM: Overview (1)
Let S = (S1, S2, …, SN) contains the information symbols.
𝑆
S IFFT FFT
4
OFDM: Overview (2)
Let S = (S1, S2, …, SN) be the information symbol.
The discrete baseband OFDM modulated symbol can be
expressed as
1 N 1
2 kt
s (t ) S k exp j , 0 t Ts Some references
Some references N k 0 Ts may start with
may use different different time
N 1
1 2 kt
constant in the
Sk 10,Ts t exp j interval, e.g. [-Ts/2,
front
k 0 N Ts +Ts/2]
ck t
Note that:
1
N 1
2 kt 2 kt
Re s(t ) Re Sk cos Im Sk sin
N k 0 Ts Ts
5
Single-User OFDM
6
Motivation
7
ECS455: Chapter 5
OFDM
5.1 Wireless Channel (A Revisit)
Office Hours:
Dr.Prapun Suksompong Library (Rangsit) Mon 16:20-16:50
www.prapun.com BKD 3601-7 Wed 9:20-11:20
8
Single Carrier Digital Transmission
Baseband:
N 1
s t sk p t kTs
k 0
1, t 0, Ts
p t 10,Ts t
0, otherwise.
Passband:
x t Re s t e j 2 fct
(a) (b)
1.2
1
1
0.8
0.6
0.8
0.4
0.6 0.2
0.4 -0.2
-0.4
0.2
-0.6
-0.8
0
-1
9 -0.2
-1 0 1 2 3 4 5 6 7 8 9 -1 0 1 2 3 4 5 6 7 8 9
Time Time
Multipath Propagation
In a wireless mobile communication system, a transmitted
signal propagating through the wireless channel often
encounters multiple reflective paths until it reaches the
receiver
We refer to this phenomenon as multipath propagation
and it causes fluctuation of the amplitude and phase of the
received signal.
We call this fluctuation multipath fading.
10
Similar Problem: Ghosting
11
Wireless Comm. and Multipath Fading
The signal received consists of a number of reflected rays,
each characterized by a different amount of attenuation and
delay. v
r t x t h t n t i x t i n t
i 0
v
h t i t i
i 0
1
1 1
0.8
0.8 0.8
0.6
ISI
0.6 0.6
0.4
0.4 0.4
0.2
0.2 0.2
-0.2
0
-0.2
0
(Intersymbol Interference)
-0.2
-0.4
-0.4 -0.4
-0.6
-0.6 -0.6
-0.8
-0.8 -0.8
-1
12
-1 -1
6 7 8 9 -1 0 1 2 3 4 5 6 7 8 9
-1 0 1 2 3 4 5 6 7 8 9 0 2 4 6 8 10 12
Time
Time Time
Frequency Domain
The transmitted signal (envelope) |P(f)|
1
0.5
0
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
f
Channel with weak multipath |H1(f)|
1.5
1
0.5
0
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
f
Channel with strong multipath |H2(f)|
1.5
1
0.5
0
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
f
13
Observation
Delay spread causes ISI
Observation: A general rule of thumb is that a delay spread of
less than 5 or 10 times the symbol width will not be a
significant factor for ISI.
Solution: The ISI can be mitigated by reducing the symbol
rate and/or including sufficient guard times between
symbols.
14
COST 207 Channel Model
Based on channel measurements with a bandwidth of 8–
10MHz in the 900MHz band used for 2G systems such as
GSM.
15
[Fazel and Kaiser, 2008, Table 1-1]
3GPP LTE Channel Modelss
16
[Fazel and Kaiser, 2008, Table 1-3]
3GPP 6-tap typical urban (TU6)
Delay profile and frequency response of 3GPP 6-tap typical
urban (TU6) Rayleigh fading channel in 5 MHz band.
18
Equalizer design
Need to balance ISI mitigation with noise enhancement
Both the signal and the noise pass through the equalizer
Nonlinear equalizers suffer less from noise enhancement than
linear equalizers, but typically entail higher complexity.
Most equalizers are implemented digitally after A/D conversion
Such filters are small, cheap, easily tuneable, and very power efficient.
The optimal equalization technique is maximum likelihood
sequence estimation (MLSE).
Unfortunately, the complexity of this technique (even when using
Viterbi algorithm) grows exponentially with the length of the
delay spread, and is therefore impractical on most channels of
interest.
19
Simple Analog Equalizer
x t H eq f
H f x t n t
1
n t
Hf
Attempt to remove all ISI
Disadvantages:
If some frequencies in the channel frequency response H( f ) are
greatly attenuated, the equalizer Heq(f ) = 1/ H( f ) will greatly
enhance the noise power at those frequencies.
If the channel frequency response H( f ) has a spectral null (= 0 for
some frequency), then the power of the new noise is infinite.
Even though the ISI effects are (completely) removed, the
equalized system will perform poorly due to its greatly reduced
SNR.
20
Linear vs. Non-linear Equalizers
Linear digital equalizers
In general work by inverting the channel frequency response
Easy to implement and to understand conceptually
Typically suffer from more noise enhancement
Not used in most wireless applications
Nonlinear equalizers
Do not invert the channel frequency response
Suffer much less from noise enhancement
Decision-feedback equalization (DFE) is the most
common
Fairly simple to implement and generally performs well.
21
Equalizer Types
Symbol-by-symbol
(SBS) equalizers:
remove ISI from each Sequence estimators
symbol and then (SE): detect sequences of
detect each symbol symbols, so the effect of
individually. ISI is part of the
estimation process.
N 2L 1
25
Equalization for Digital Cellular
Telephony
GSM
Use adaptive equalizer
Equalize echos up to 16 ms after the first signal received
Correspond to 4.8 km in distance.
One bit period is 3.69 ms. Hence, echos with about 4 bit lengths delay
can be compensated
The direct sequence spreading employed by CDMA (IS-95)
obviates the need for a traditional equalizer.
If the transmission bandwidth is large (for example 20 MHz),
the complexity of straightforward high-performance
equalization starts to become a serious issue.
26
Wireless Propagation
27
Three steps towards modern OFDM
1. To mitigate multipath problem
Use multicarrier modulation (FDM)
2. To gain spectral efficiency
Use orthogonality of the carriers
3. To achieve efficient implementation
Use FFT and IFFT
28
ECS455: Chapter 5
OFDM
5.2 Multi-Carrier Transmission
Office Hours:
Dr.Prapun Suksompong Library (Rangsit) Mon 16:20-16:50
www.prapun.com BKD 3601-7 Wed 9:20-11:20
29
Single-Carrier Transmission
Re S I pI t jSQ pQ t e jct
30
Multi-Carrier Transmission
Convert a serial high rate data stream on to multiple
parallel low rate sub-streams.
Each sub-stream is modulated on its own sub-carrier.
Time domain perspective: Since the symbol rate on each
sub-carrier is much less than the initial serial data symbol
rate, the effects of delay spread, i.e. ISI, significantly
decrease, reducing the complexity of the equalizer.
33
Multi-Carrier (FDM) vs. Single Carrier
Single Carrier Multi-Carrier (FDM)
Single higher rate serial scheme Parallel scheme. Each of the parallel
subchannels can carry a low signalling rate,
proportional to its bandwidth.
Multipath problem: Far more susceptible Long duration signal elements and
to inter-symbol interference (ISI) due to the narrow bandwidth in sub-channels.
short duration of its signal elements and the Complexity problem: If built
higher distortion produced by its wider straightforwardly as several (N) transmitters
frequency band and receivers, will be more costly to
Complicated equalization implement.
BW efficiency problem: The sum of
parallel signalling rates is less than can be
carried by a single serial channel of that
combined bandwidth because of the unused
guard space between the parallel sub-
carriers.
34
FDM (con’t)
Before the development of equalization, the parallel
technique was the preferred means of achieving high rates
over a dispersive channel, in spite of its high cost and relative
bandwidth inefficiency.
35
OFDM
OFDM = Orthogonal frequency division multiplexing
One of multi-carrier modulation (MCM) techniques
Parallel data transmission (of many sequential streams)
A broadband is divided into many narrow sub-channels
Frequency division multiplexing (FDM)
High spectral efficiency
The sub-channels are made orthogonal to each other over the OFDM
symbol duration Ts.
Spacing is carefully selected.
Allow the sub-channels to overlap in the frequency domain.
Allow sub-carriers to be spaced as close as theoretically possible.
36
OFDM
Recall: Orthogonality-Based MA (CDMA)
1
s t Sk ck t where ck1 ck2
k 0
1 N 1
2 kt
s (t ) S k exp j , 0 t Ts
N k 0 Ts
N 1
1 2 kt
Sk 10,Ts t exp j
k 0 N Ts
ck t
When k1 k2 , Ts
k1 k2 t dt 1dt Ts
*
c t c
0
When k1 k2 ,
2 k1 k2 t
Ts
Ts
ck1 t c t dt j 2 k1 k2 exp j
*
k2
Ts 0
Ts
1 1 0
j 2 k1 k2
38
Frequency Spectrum
N 1
1 2 kt f
1
s (t ) Sk 10,Ts t exp j Ts
k 0 N Ts
ck t
This is the term
1 Ts Ts t Ts sin c Ts f that makes the
2 , 2 technique FDM.
Ts
1 1 j 2 f
c t 10,Ts t
C f Ts e 2
sin c Ts f
N N
2 kt k
ck t c t exp j Ck f C f C f k f
Ts Ts
N 1 N 1
s(t ) Sk ck t
S ( f ) S k Ck f
k 0 k 0
N 1 j 2 f k f
Ts
Ts sin c Ts f k f
1
39
N
Se
k 0
k
2
N 1
1 2 kt
s (t ) S k 10,Ts t exp j
k 0 N Ts
Subcarrier Spacing
N 1 j 2 f k f
Ts
Ts sin c Ts f k f
1
S f
N
S e
k 0
k
2
1
f
Ts
Each QAM signal carries one of N separate QAM signals,
OFDM FDM
the original input complex at N frequencies
numbers. separated by the signaling rate.
http://www.metageek.net/forums/showthread.php?4912-Chanalyzer-4-User-Guide
41
OFDM Carriers: N = 4
2 kt 2 kt
cos sin
s
T s
T
1 1
0 0
-1 -1
0 0.5 1 0 0.5 1
1 1
0 0
-1 -1
0 0.5 1 0 0.5 1
1 1
0 0
-1 -1
0 0.5 1 0 0.5 1
1 1
0 0
-1 -1
0 0.5 1 0 0.5 1
42
OFDM as a Multicarrier Technique
1
N 1
2 kt 2 kt
Re s(t ) Re Sk cos Im Sk sin
N k 0 s
T s
T
1
0
-1
0
1
0
-1
0
1
0
-1
0
1
0
-1
0
1
0
-1
0
1
0
-1
0
1
0
-1
1
0
43 -1
Time-Domain Signal
1 N 1
2 kt
s(t ) Sk exp j , 0 t Ts
N k 0 Ts
1 N 1 2 kt 2 kt
Re s(t ) Re Sk cos Im Sk sin
44 N k 0 s
T s
T
in-phase part quadrature part
Summary
So, we have a scheme which achieves
Large symbol duration (Ts) and hence less multipath problem
Good spectral efficiency
One more problem:
There are so many carriers!
45
Xˆ 0
4-pt DFT
x[0] = f[0] 2-pt DFT Xˆ 21 0 Xˆ 11 0 Fˆ 0
ECS455: Chapter 5
x[1] = g[0] 2-pt DFT
84
x[7] = g[3]
-1 Xˆ 24 1
43
-1
OFDM Xˆ 12 3 Gˆ 3 87
Xˆ 7
Office Hours:
Dr.Prapun Suksompong Library (Rangsit) Mon 16:20-16:50
www.prapun.com BKD 3601-7 Wed 9:20-11:20
1
Discrete Fourier Transform (DFT)
Transmitter produces
1 N 1
2 kt
s (t ) S k exp j , 0 t Ts
N k 0 Ts
T 1 N 1 2 k Ts
s n s n s S k exp j n
N N
N k 0 Ts
1 N 1 2 kn
S k exp j N IDFT S n
N k 0 N
Key Property:
1
N is a unitary matrix
3
N
DFT
4
DFT: Example
5 [http://www.fourier-series.com/fourierseries2/DFT_tutorial.html]
DTFT to DFT
Start with a sequence in discrete time x[n].
Z-transform: X z x n z n
n
N 1
N points in time domain: X e j
x n e j n
n 0
N 1 2
DFT: X k X e j
j
x n e
kn
N
k
k 2
N n 0
6
Efficient Implementation: (I)FFT
An N-point FFT requires only on the order of NlogN multiplications, rather than N2 as in
7 a straightforward computation.
FFT
The history of the FFT is complicated.
As with many discoveries and inventions, it arrived before the
(computer) world was ready for it.
Usually done with N a power of two.
Very efficient in terms of computing time
Ideally suited to the binary arithmetic of digital computers.
Ex: From the implementation point of view it is better to have, for
example, a FFT size of 1024 even if only 600 outputs are used than
try to have another length for FFT between 600 and 1024.
8
1 N 1
2 kt
s (t ) S k exp j , 0 t Ts
DFT Samples N k 0 Ts
0.6
Ts
s n s n
N
0.4
0.2
1 N 1 2 kn
0
N k 0
S k exp j
N
-0.2 N IDFT S n
-0.4
0n N
-0.6
-0.8
0 1 2 3 4 5 6 7 8
Ts
9
Oversampling
0.6
0.4
0.2
-0.2
-0.4
-0.6
-0.8
0 1 2 3 4 5 6 7 8
10
Oversampling (2)
Increase the number of sample points from N to LN on the
interval [0,Ts].
L is called the over-sampling factor.
Ts Ts
s n s n s
L
n
n s
N LN
0n N 0 n LN
1 N 1 2 k Ts 1 N 1
2 kn
s
L
n S k exp j
n
S k exp j
N k 0 Ts
LN N k 0 LN
1 1 N 1
2 kn
N
LN
LN
S
k 0
k exp j
LN
Zero padding:
1 N 1 2 kn NL 1 2 kn
Sk , 0 k N
L N k S exp j
0 exp j Sk
LN k 0 LN kN LN
0, N k LN
1 NL 1
2 kn
11 L N S k exp j
L N IDFT S n
LN k 0 LN
Oversampling: Summary
N points LN points
Ts Ts
s n s n N IDFT S n s n s n
L
L N IDFT S n
0 n N 0 n LN LN
N
Zero padding:
Sk , 0 k N
Sk
0, N k LN
0.6 0.6
0.4 0.4
0.2 0.2
0 0
-0.2 -0.2
-0.4 -0.4
12 -0.6 -0.6
-0.8 -0.8
0 1 2 3 4 5 6 7 8 0 1 2 3 4 5 6 7 8
OFDM implementation by IFFT/FFT
n s n
Ts
s
L
LN
L
L N IFFT S n
Sk
Rk S k
h t t should be h t t
r t h t s t w t s t w t
Additive white Gaussian noise
Sample every Ts/N
r n s n w n
Remarks:
15
OFDM Architecture
Office Hours:
BKD 3601-7
Wednesday 15:30-16:30
Dr.Prapun Suksompong Friday 9:30-10:30
1 prapun.com/ecs455
Three steps towards modern OFDM
1. Mitigate Multipath (ISI): Decrease the rate of the original
data stream via multicarrier modulation (FDM)
2. Gain Spectral Efficiency: Utilize orthogonality
3. Achieve Efficient Implementation: FFT and IFFT
Extra step: Completely eliminate ISI and ICI
Cyclic prefix
2
Cyclic Prefix: Motivation (1)
Recall: Multipath Fading and Delay Spread
3
Cyclic Prefix: Motivation (2)
OFDM uses large symbol duration Ts
compared to the duration of the impulse response τmax of the channel
to reduce the amount of ISI
Q: Can we “eliminate” the multipath (ISI) problem?
A: To reduce the ISI, add guard interval larger than that of the
estimated delay spread.
If the guard interval is left empty, the orthogonality of the sub-carriers
no longer holds, i.e., ICI (inter-channel interference) still exists.
Solution: To prevent both the ISI as well as the ICI, OFDM symbol is
cyclically extended into the guard interval.
4
Cyclic Prefix
5
Recall: Convolution
𝑥𝑚
Flip
m
Shift
N-1
N
Multiply (pointwise) ℎ𝑚
m
Add
v-1
v
ℎ −𝑚 = ℎ 0 − 𝑚
m
ℎ 1−𝑚
ℎ 𝑛−𝑚
m
n
x h n x m h n m
ℎ 𝑁−1−𝑚
m
m
ℎ 𝑁−𝑚
N
ℎ 𝑁+𝐿−1−𝑚
6 m
Circular Convolution (Regular Convolution)
𝑥𝑚 𝑥𝑚
m m
N-1
N-1
N
N
ℎ𝑚 ℎ𝑚
m m
v-1
v-1
v
v
ℎ −𝑚 = ℎ 0 − 𝑚 ℎ −𝑚 = ℎ 0 − 𝑚
m m
ℎ 1−𝑚 ℎ 1−𝑚
m m
ℎ 𝑛−𝑚 ℎ 𝑛−𝑚
m m
n
n
ℎ 𝑁−1−𝑚 ℎ 𝑁−1−𝑚
m m
ℎ 𝑁−𝑚
N
only on n = 0 to N-1 ℎ 𝑁+𝐿−1−𝑚
7 m
Circular Convolution: Examples 1
Find
1 2 3 4 5 6
1 2 3 4 5 6
1 2 3 0 0 4 5 6 0 0
8
Discussion
Regular convolution of an N1–point vector and an N2–point
vector gives (N1+N2-1)-point vector.
Circular convolution is performed between two equal-
length vectors. The results also has the same length.
Circular convolution can be used to find the regular
convolution by zero-padding.
Zero-pad the vectors so that their length is N1+N2-1.
Example:
1 2 3 0 0 4 5 6 0 0 1 2 3 4 5 6
In modern OFDM, we want to perform circular convolution
via regular convolution.
9
Circular Convolution in Communication
We want the receiver to obtain the circular convolution of the
signal (channel input) and the channel.
Q: Why?
A:
CTFT: convolution in time domain corresponds to
multiplication in frequency domain.
This fact does not hold for DFT.
DFT: circular convolution in (discrete) time domain corresponds
to multiplication in (discrete) frequency domain.
We want to have multiplication in frequency domain.
So, we want circular convolution and not the regular convolution.
Problem: Real channel does regular convolution.
Solution: With cyclic prefix, regular convolution can be used to
create circular convolution.
10
Let’s look closer at how
we carry out the circular
Example 2 convolution operation.
1 2 3 1 2 3 2 1 0 0 ? Recall that we replicate
the x and then perform the
Solution: regular convolution (for N
points)
1 2 3 1 2 1 2 3 1 2 1 2 3 1 2
0 0 1 2 3 1 1 2 2 1 3 1 4 3 8
0 0 1 2 3 2 1 1 2 2 3 2 2 6 2
0 0 1 2 3 1 1 2 2 3 3 1 4 9 6
0 0 1 2 3 2 1 3 2 1 3 2 6 3 7
0 0 1 2 3 3 1 1 2 2 3 3 2 6 11
1 2 3 1 2 3 2 1 0 0 8 2 6 7 11
1 2 3 1 2 1 2 3 1 2 1 2 3 1 2
0 0 1 2 3 1 1 2 2 1 3 1 4 3 8
0 0 1 2 3 2 1 1 2 2 3 2 2 6 2
0 0 1 2 3 1 1 2 2 3 3 1 4 9 6
0 0 1 2 3 2 1 3 2 1 3 2 6 3 7
0 0 1 2 3 3 1 1 2 2 3 3 2 6 11
1 2 3 1 2 3 2 1 0 0 8 2 6 7 11
12
Try this: use only the necessary part
of the replica and then convolute
Example 2 with the channel.
(regular convolution)
1 2 1 2 3 1 2 * 3 2 1 ?
Copy the last samples of the symbols at the beginning of the symbol.
This partial replica is called the cyclic prefix.
1 2 1 2 3 1 2
1 2 3 1 3 3
1 2 3 1 2 2 3 2 6 8
1 2 3 1 1 2 2 1 3 1 4 3 8
1 2 3 2 1 1 2 2 3 2 2 6 2
1 2 3 1 1 2 2 3 3 1 4 9 6
1 2 3 2 1 3 2 1 3 2 6 3 7
1 2 3 3 1 1 2 2 3 3 2 6 11
1 2 3 1 1 2 2 1 4 5
1 2 3 2 1 2
13 Junk!
Example 2
We now know that
1 2 1 2 3 1 2 * 3 2 1 3 8 8 2 6 7 11 5 2
Cyclic Prefix 1 2 3 1 2 3 2 1 0 0
2 1 2 1 3 2 1 * 3 2 1 6 1 6 8 5 11 4 0 1
Cyclic Prefix 2 1 3 2 1 3 2 1 0 0
14
Example 3
We know, from Example 2, that
[ 1 2 1 -2 3 1 2] * [3 2 1] = [ 3 8 8 -2 6 7 11 5 2]
And that
[-2 1 2 1 -3 -2 1] * [3 2 1] = [-6 -1 6 8 -5 -11 -4 0 1]
Check that
[ 1 2 1 -2 3 1 2 0 0 0 0 0 0 0] * [3 2 1]
= [ 3 8 8 -2 6 7 11 5 2 0 0 0 0 0 0 0]
and
[ 0 0 0 0 0 0 0 -2 1 2 1 -3 -2 1] * [3 2 1]
= [ 0 0 0 0 0 0 0 -6 -1 6 8 -5 -11 -4 0 1]
15
Example 4
We know that
[ 1 2 1 -2 3 1 2] * [3 2 1] = [ 3 8 8 -2 6 7 11 5 2]
[-2 1 2 1 -3 -2 1] * [3 2 1] = [-6 -1 6 8 -5 -11 -4 0 1]
= [ 3 8 8 -2 6 7 11 5 2 0 0 0 0 0 0 0]
+[ 0 0 0 0 0 0 0 -6 -1 6 8 -5 -11 -4 0 1]
= [ 3 8 8 -2 6 7 11 -1 1 6 8 -5 -11 -4 0 1]
16
Putting results together…
Suppose x(1) = [1 -2 3 1 2] and x(2) = [2 1 -3 -2 1]
Suppose h = [3 2 1]
At the receiver, we want to get
[1 -2 3 1 2] * [3 2 1 0 0] = [8 -2 6 7 11]
[2 1 -3 -2 1] * [3 2 1 0 0] = [6 8 -5 -11 -4]
We transmit [ 1 2 1 -2 3 1 2 -2 1 2 1 -3 -2 1].
Cyclic prefix Cyclic prefix
18
OFDM with CP for Channel w/ Memory
We want to send N samples S0, S1, …, SN-1 across noisy
channel with memory.
First apply IFFT: Sk IFFT
s n
Then, add cyclic prefix
s s N , , s N 1, s 0, , s N 1
This is inputted to the channel.
The output is
y n p N , , p N 1, r 0, , r N 1
Remove cyclic prefix to get r n h n s n w n
Then apply FFT: r n Rk
FFT
21
Reference
A. Bahai, B. R. Saltzberg, and M.
Ergen, Multi-Carrier Digital
Communications:Theory and
Applications of OFDM, 2nd ed.,
New York: Springer Verlag, 2004.
22
ECS455: Chapter 5
OFDM
5.5 Remarks about OFDM
Office Hours:
Dr.Prapun Suksompong Library (Rangsit) Mon 16:20-16:50
www.prapun.com BKD 3601-7 Wed 9:20-11:20
1
Summary: OFDM Advantages
For a given channel delay spread, the implementation
complexity is much lower than that of a conventional single
carrier (SC) system with time domain equalizer.
Spectral efficiency is high since it uses overlapping orthogonal
subcarriers in the frequency domain.
Modulation and demodulation are implemented using inverse
discrete Fourier transform (IDFT) and discrete Fourier transform
(DFT), respectively, and fast Fourier transform (FFT) algorithms
can be applied to make the overall system efficient
(computationally).
Capacity can be significantly increased by adapting the data
rate per subcarrier according to the signal-to-noise ratio
(SNR) of the individual subcarrier.
2
Example: 802.11a
1
4 0.8 s
3
OFDM Drawbacks
High peak-to-average power ratio (PAPR)
The transmitted signal is a superposition of all the subcarriers with
different carrier frequencies and high amplitude peaks occur because
of the superposition.
High sensitivity to frequency offset:
When there are frequency offsets in the subcarriers, the
orthogonality among the subcarriers breaks and it causes intercarrier
interference (ICI).
A need for an adaptive or coded scheme to overcome spectral
nulls in the channel
In the presence of a null in the channel, there is no way to recover the
data of the subcarriers that are affected by the null unless we use rate
adaptation or a coding scheme.
4
ECS455: Chapter 5
OFDM
5.6 OFDM-Based Multiple Access Techniques
Office Hours:
Dr.Prapun Suksompong Library (Rangsit) Mon 16:20-16:50
www.prapun.com BKD 3601-7 Wed 9:20-11:20
5
OFDM-based Multiple Access
1. OFDMA
2. OFDM-TDMA
3. Multi-Carrier CDMA (OFDM-CDMA)
Lowest
flexibility
Easiest to
implement
[Tarokh, 2009, Section 2.9, Fig 2.10]
6
subcarriers
OFDM-TDMA
Users are separated via time slots.
A particular user uses all sub-carriers within
the predetermined TDMA time slot.
time
Example: 802.11
Each user uses OFDM modulation and gets
transmission right through the MAC layer
channel access mechanism.
7
OFDM-TDMA (2)
Advantage:
MS can reduce its power consumption
Process only OFDM symbols which are dedicated to it.
Disadvantage:
Allocate the whole bandwidth to a single user
A reaction to different subcarrier attenuations could consist of leaving out
highly distorted subcarriers
8
OFDMA
Available subcarriers are distributed among all the users for
transmission at any time instant.
The fact that each user experiences a different radio channel
can be exploited by allocating only “good” subcarriers with
high SNR to each user.
Recall: For OFDM system, based on the subchannel
condition, different baseband modulation schemes can
be used for the individual subchannels
The number of subchannels for a specific user can be varied,
according to the required data rate.
9
OFDM-TDMA vs. OFDMA
subcarriers
subcarriers
OFDM-TDMA OFDMA
time time
10
OFDMA Block Diagram
Channel state information for all K
Combined subcarrier, bit,
users
and power allocation x N subcarriers/user
Adaptive mod. 1
User 1 data
User 2 data Subcarrier Adaptive mod. 2 Add guard
and bit IFFT interval
allocation
User K data Adaptive mod. N
Freq. selective
fading channel
for User k
Adaptive demod. 1
Adaptive demod. N
11
ECS455: Chapter 6
Applications
Office Hours:
Dr.Prapun Suksompong Library (Rangsit) Mon 16:20-16:50
www.prapun.com BKD 3601-7 Wed 9:20-11:20
1
Review: Cellular History
The first-generation (1G) systems introduced in the
1980s were characterized by analog speech
transmission.
The second-generation (2G) systems, developed in the
1990s, are digital and have data transport capabilities but
only to a limited extent.
GSM supports SMSs and user data at rates only up to 9.6 kb/s.
IS-95B (cdmaOne) provides data rates in the range of 64 to
115 kb/s in increments of 8 kb/s over a 1.25 MHz channel.
Each cell uses a carrier with a bandwidth of 1.25MHz, which is divided
into 64 data and signalling channels by the use of orthogonal CDMA
codes.
2
Review: GSM (2G)
4
ECS455: Chapter 6
Applications
6.1 3G (UMTS and WCDMA)
Office Hours:
Dr.Prapun Suksompong Library (Rangsit) Mon 16:20-16:50
www.prapun.com BKD 3601-7 Wed 9:20-11:20
5
Review: UMTS
Universal Mobile Telecommunications System (UMTS)
The research activity on UMTS started in Europe at the beginning of
the 1990s.
Even before the earliest 2G systems arrived on the market
Designed to support wideband services with data rates up to 2Mbit/s.
Developed from GSM
Keep the core network more-or-less intact
Change the air interface to use CDMA
Compatibility between UMTS and GSM:
Most UMTS mobiles also implement GSM, and the network can hand them
over from a UMTS base station to a GSM one if they reach the edge of the
UMTS coverage area.
However, network operators cannot implement the two systems in the same
frequency band, so they are not fully compatible with each other.
6
Bandwidth Comparison
Generation Transmission Bandwidth Standard
1G 25 and 30 kHz
2G 200 kHz GSM
8
UMTS W-CDMA FDD
(UMTS Terrestrial Radio Access)
and TDD
The air interface (UTRA) of UMTS is based on CDMA
UMTS W-CDMA FDD
Direct-sequence CDMA system
5 MHz bandwidth
UMTS W-CDMA TDD
Also uses CDMA with a bandwidth of 5 MHz
The frequency band is time shared in both directions—one half
of the time, it is used for transmission in the forward direction
and the other half of the time in the reverse direction.
FDD is currently much more popular
9
Cdma2000 (IMT Multi-Carrier)
Another 3G mobile technology standard
Multicarrier, direct-sequence CDMA FDD system.
Backward-compatible with its previous 2G iteration IS-95
(cdmaOne).
CDMA2000 1X (IS-2000)
also known as 1x and 1xRTT
1x = Spreading Rate 1 = use the same chip rate of IS-95 (i.e., 1.2288
Mcps).
Same RF bandwidth as IS-95: a duplex pair of 1.25 MHz radio channels.
Core CDMA2000 wireless air interface standard.
Almost doubles the capacity of IS-95 by adding 64 more traffic
channels to the forward link, orthogonal to (in quadrature with) the
original set of 64.
10
3G Spreading Codes
In UMTS and cdma2000, signaling and user data is spread
twice in succession
First with the channelization codes
Orthogonal Walsh codes
Inherently more tolerant of interference caused by multiple users.
Later with the scrambling codes
Not necessarily orthogonal
Built from PN codes
11
Review: CDMA
Two Users. Suppose the code length = 4.
User 1 uses code c1. Want to send messages a1, a2, a3, a4, …
Send x1 a1 c1 a2 c1 a3 c1 a4 c1
User 2 uses code c2. Want to send messages b1, b2, b3, b4, …
Send x 2 b1 c 2 b2 c 2 b3 c 2 b4 c 2
Receiver gets r x1 x 2
1
To recover a1, calculate r 1: 4 , c1
4
1
To recover b1, calculate r 1: 4 , c 2
4
To recover a2, calculate 1
r 5 : 8 , c1
4
12
OVSF (1)
Channelization codes used in UMTS W-CDMA and cdma2000 are
variable-length Walsh codes, also known as orthogonal
variable spreading factor (OVSF) codes.
The spreading factors in UMTS may vary from 4 to 256 chips on
uplink channels and from 4 to 512 chips on downlink channels.
In cdma2000, OVSF codes used on traffic channels may vary from 4
to 128 chips.
Comparison: IS-95 uses a set of 64 fixed-length Walsh codes to
spread forward physical channels. In the reverse direction, they
are used for orthogonal modulation where every six symbols from
the block interleaver output are modulated as one of 64 Walsh
codes.
13
OVSF (2)
Similar to Walsh sequences
Arranged and numbered in a different way
Use a tree structure
For each spreading factor SF = 1, 2, 4, . . . , which is a
power of 2, there are N = SF orthogonal codes obtained by
the recursion relations:
14
Tree structure for OVSF codes (1)
15
Tree structure for OVSF codes (2)
16
Code allocation rules (1)
OVSF codes can be applied to realize connections with
different data rates by varying the spreading factor.
Smaller SF = Faster data rate
To have connections with different data rates, need some
rules (for selecting the codes) to maintain orthogonality
Code blocking property: If a certain code is already used
for one connection, neither this code nor a code that is a
descendant or an ancestor of this code (on the tree) is
allowed to be used for another connection
These codes are not orthogonal to the already allocated one.
17
Code allocation rules (2)
19
OVSF: Disadvantages
Poor autocorrelation property
Look, for example, at the codes cSF,0.
When there is no perfect synchronization, the orthogonality
gets lost (high values for the cross correlation)
20
Scrambling Codes in UMTS
The scrambling codes in UMTS are complex valued and may be either long or
short.
A long code has a length of 38,400 chips (that is, 10 ms) and a short code only
256 chips.
A long code for a UMTS uplink channel is constructed with two PN codes,
whose characteristic polynomials are
g1 x x 25 x3 1 and g 2 x x 25 x3 x 2 x 1
They are implemented as sequences PN1 and PN2 using two 25-bit shift
registers.
PN1 and PN2 are added modulo 2, and the output is mapped to a real-valued
function, say, I.
Another function Q is derived by simply delaying I by 224 + 16 chips.
Q is multiplied by j, where the sign changes every chip period, and then added
to I to yield the long code.
21