The received signal, after demodulation, is multiplied by thescrambling code of each user, integrated over a symbol period usinga matched filter, and applied to a soft decision decoder..
Trang 1The maximum amount of multipath delay that can be exploited in
a rake receiver is usually limited, and is determined by the powerdelay profile As an example, for a city like New York, it lies in therange of 0.25—2.5 ms Thus, in UMTS W-CDMA, where the chip rate
is 3.84 Mc/s, the delay is about 1—10 chips
Although multipath diversity is a property of all CDMA systems,
it is only W-CDMA that provides multipath diversity for small cells(that is, the micro and pico cells) To see this, consider IS-95 wherethe carrier bandwidth is 1.25 MHz In this case, because the chiprate is 1.2288 Mc/s and because the delay must be at least one chiplong to achieve multipath diversity, the difference in path lengthsmust be at least 244 meters On the other hand, for W-CDMA with 5MHz bandwidth, the chip rate is 3.84 Mc/s, and so this path differ-ence is reduced to 81 meters
The multipath diversity employed in a rake receiver leads to an
improvement in performance For example, the value of Eb /N0required to ensure a bit error rate of 103 on a fading channel isabout 10 dB, assuming BPSK modulation, a 4-branch rake receiver,
and equal gain combining The required Eb/N0for the same bit errorrate is 14 dB with two branches and about 24 dB with one branch,that is, without any multipath diversity [21] The maximal ratio com-bining has the best performance If most of the signal energy is con-tained in only one branch, a conventional receiver will performbetter than a rake receiver that uses equal gain combining [33]because, in this case, branches with very little signal power will onlyadd to the noise
Multiuser Detection
Consider the uplink transmissions in UMTS Here, the user data onvarious physical channels (such as dedicated physical data channels,dedicated physical control channels, and so on) is first spread with achannelization code, and then scrambled with a user-specific PNcode Because channelization codes are mutually orthogonal andthus more resistant to multiuser interference, the physical channelscan be correctly separated at the receiver with a high probability The
Trang 2scrambling codes, on the other hand, are generally nonorthogonal.This is not a problem in a synchronous system, such as IS-95,because here, all transmissions are synchronized to a systemwidetime reference Thus, signals from multiple users arrive at the BSwith relatively small delays Consequently, the cross-correlationbetween the signals is quite small In contrast, because UMTS W-CDMA is an asynchronous system, these delays are random asshown in Figure 3-27, and may be comparable to the bit period As aresult, the cross-correlation between the received signals from mul-tiple users is no longer negligible and, if ignored, causes significanterrors in soft decision decoding.
Besides, very often the power control is not perfect Even when amobile is adjusting its transmitter power at 1,500 Hz on commandfrom the BS, this closed-loop power control algorithm does not workwell for mobile velocities of 100 km/h or more Thus, the amplitude ofthe desired signal may at times be quite small compared to interfer-ing signals So, the performance of a matched filter followed by a sim-ple decision circuit is not optimum anymore Multiuser detectionattempts to overcome this problem by detecting the desired user sig-nal in the presence of interference from all other users in some opti-mum way
A number of multiuser detection algorithms have been suggested[21] One of them is based on the Viterbi algorithm with soft decision
T
2 3
Trang 3decoding The ideas here are similar to those discussed in connectionwith the maximum likelihood decoding of convolutional codes [22],[23] The received signal, after demodulation, is multiplied by thescrambling code of each user, integrated over a symbol period using
a matched filter, and applied to a soft decision decoder The output ofthe matched filter corresponding to any desired user depends uponthe cross-correlation between the signal from that user and signalsfrom all other users over three consecutive symbol periods Over agiven symbol length, the soft decision decoder considers all combi-nations of symbols from multiple users, and using a channel modeltogether with the observed outputs of the matched filter, estimatesthe likelihood of each sequence of symbols Appendix C presents abrief description of this algorithm Although the performance of thisreceiver is optimum, it is not very practical because the number ofreal-time computations required increases as 2n , where n is the
number of users to be detected A number of authors have proposedsuboptimum receiver structures where these computational require-ments are less stringent
Another technique suggested for multiuser detection involves cessive cancellation of interference from the received signal [24]—[28] Here, the receiver first extracts the strongest signal of all usersand subtracts it from the received signal Next, the second strongestsignal is detected from the remaining signal, and subtracted fromthis latter signal, and so on, until signals from all users have beendetected The idea is illustrated in the block diagram of Figure 3-28.Because the performance of the receiver depends on the accuracywith which the strongest interference is detected in the first stage,reference [24] suggests using a multipath-combining receiver fordetecting the strongest interference.9The detected data of this user
suc-is then passed through a channel model to regenerate a signal,which approximates as closely as possible the received signal fromthis user The output of the channel model is subtracted from thereceived input The result is used to derive the second strongest sig-nal in the same way Conventional receivers may be used in the sec-ond and subsequent stages
the coherence bandwidth of the channel.
Trang 4Because of the complexity involved, multiuser detection is moreamenable to implementation at a BS Moreover, because a mobilestation is only concerned with detecting the signal from a single user,multiuser detection is really not necessary at a mobile station.
In UMTS W-CDMA, both long and short scrambling codes may beused on uplinks However, short codes are generally more suitablefor multiuser detection [41] Long codes are handled better by thealgorithm based on the successive cancellation of interference
Smart Antennas
In a previous chapter, isotropic and directional antennas were
dis-cussed An isotropic antenna is one that radiates energy equally in
all directions in any horizontal or vertical plane Practical antennas,however, are not isotropic For example, with an omnidirectionalantenna, such as a vertically mounted, half-wave dipole, or a shortmonopole, the signal strength at any given distance from theantenna is distributed equally in all directions in the horizontalplane In the vertical plane, however, the signal strength at any pointdepends on its location with respect to the vertical axis This isshown in Figure 3-29(a) The power density is 0 along the verticalaxis and increases as the angle u increases, attaining a maximumvalue on a horizontal plane through the antenna such that u 90degrees As discussed in Chapter 2, the signal strength decreases atpoints further and further away from the transmitter antenna Anexample of an omnidirectional antenna is the antenna at a mobilestation or a center-excited BS
Strongest User Data
+
Received Signal Multipath
Combining Receiver
Channel Model
Conventional Receiver
Channel Model
2nd Strongest User Data
Trang 5As the name implies, a directional antenna radiates most of itsenergy only in a certain direction, transmitting the signal in theform of a beam in the direction of the antenna The radiation patternfor a vertically mounted directional antenna is shown in Figure 3-29(b) Notice how the signal strength varies even in a horizontal plane.Depending upon the design, the energy in the back lobe is usuallyvery small Directional antennas are used to provide coverage onhighways and in corner-excited, 3-sector cell sites, where each sectorhas an angular width of 120 degrees Clearly, there are many advan-tages of a directional antenna For example, with a given transmit-ter power, it extends the coverage area, decreases the probability ofthe far-near problem that was discussed before, reduces interference
to a given mobile due to other active users on the same frequency,and thus increases the system capacity (such as the number of users
in a CDMA system)
In 3-sector cells, a sector may be covered by a number of beam antennas as shown in Figure 3-30 The beams formed by theseantennas are fixed, each of which may be used to cover users con-centrated in certain directions In this case, the BS must be able totrack each user and switch the beams appropriately as a mobile sta-tion moves from the coverage area of one beam to another A disad-vantage of the fixed beam approach is that if the traffic patternchanges from the one for which the beams were originally designed,the system may not operate at the same level of performance
narrow-Main Lobe
y
z
x z
Trang 6Because each mobile station has a unique physical location, thesignal received from each can be processed in real time and sepa-rated from the signals of all other users even though they may over-lap in the time or frequency domain Signal processing required to
perform this function is called spatial filtering or filtering in the space domain This technique is also called by some authors space- division multiple access (SDMA) because this enables multiple users
to be distinguished even though they may occupy the same quency or time slot
fre-Clearly, sectorization of cells with directional antennas and use offixed beams may be considered as a form of spatial filtering.Another way to implement spatial filtering is to use an adaptiveantenna array where the signal received from each element of the
array is multiplied by a gain coefficient, called a weight, summed
together, and then processed using digital signal processing niques so as to maximize the system performance according to somecriteria The weights are adjusted dynamically using an adaptationalgorithm that tries to achieve some design objectives For example,
tech-an objective may be the formation of a beam in a desired direction
so that the signal is maximized in that direction and minimized oreven reduced to a null in other directions, say, in the direction of co-
channel sources This is called digital beam forming Another
objec-tive may be the minimization of bit error rates for users located in
a certain geographical area where the error rate would otherwise be
excessively high due to clutter or other conditions The term smart antennas refers to both switched beam antennas and adaptive
Trang 7Fundamental to the operation of adaptive antennas is the ability
to estimate the angle of arrival of signals from different users and,based on the estimate, steer the beams on downlink channels Thearrival angle is generally quite well defined in rural areas, but not so
in microcells or indoors Because for large cells, the angle of arrivalvaries much more slowly than the instantaneous fading signal, mea-surements from mobile stations may also be used in the adaptationalgorithm
The concept and theory of adaptive antennas may be found inReferences [35], [36] Various authors have investigated the appli-cation of adaptive antennas to mobile communications systems[37]—[39], [42] Reference [40] discusses the possibility of extendingthe capacity of an existing cellular system so as to serve areas ofhigh traffic density by using smart antennas Possible benefits ofusing smart antennas in 3G systems have been studied under the
auspices of the Technology in Smart Antennas for Universal Advanced Mobile Infrastructure (TSUNAMI) project in Europe [41],
and include the following:
■ Extending the range or coverage area in a desired direction withbeamforming
■ Increasing the system capacity in areas with dense traffic (that
is, hot spots)
■ Dynamically adjusting the coverage area (say, from 120 to 45degrees)
■ Creating nulls to/from co-channel interferers so as to minimizethe co-channel interference
■ Tracking individual mobile stations using separate, narrowbeams in their direction
■ Reducing multipath fading
In this section, we will explain briefly how beam forming is plished by adaptive antennas
accom-Figure 3-31(a) shows a functional block diagram of a systemwhere adaptive antennas are being used to maximize the signalfor a given user Beam forming in a desired direction or creating anull (from co-channel interferers or various multipaths in a TDMAsystem) as shown in Figure 3-32 is similar in principle Signals
Trang 8from various sensors in an antenna array are converted into
digi-tal forms, multiplied by weights Wi, summed together, and after
coherent demodulation, despread in the usual way using localcopies of orthogonal Walsh codes and long user codes The output
Soft Decision Decoding Output
Matched Filter
BPF, RF
& IF Amplifier 1
W
BPF, RF
& IF Amplifier 2
W
Antenna 1
Antenna 2
o o
Adaptation Controller
o o
Coherent Demodulator Despreader
Long Code
Channelization Code
BPF, RF
& IF Amplifier
Coherent Demodulator Despreader
PN Codes
BPF, RF
& IF Amplifier
3
W
Antenna 3
Coherent Demodulator Despreader
Coherent Demodulator Despreader
Matched Filter
Matched Filter
Reference Signal
Σ
(b)
Towards Cochannel Interferers
Trang 9of the matched filter is decoded in a decision circuit The resultingoutput is also used by the adaptation controller to adjust theweights so as to maximize the signal-to-interference ratio for thegiven user in much the same way as a rake receiver, discussedpreviously.
In this approach, because signals are being weighted and summed
at the RF stage, the scheme suffers from the disadvantage that itsaccuracy is rather limited and that its implementation may becomequite complex, particularly when there are many elements in thearray A scheme that performs beamforming at the baseband wasshown in Figure 3-31(b) Because signal processing is now beingdone at the baseband, it is possible to use 16-bit arithmetic compared
to a 5- or 6-bit operation that is usual for RF beamforming
The improvement in performance with adaptive antennasdepends upon the antenna type—linear, planar, or circular—thenumber of elements in the array, and the spacing between adjacentelements This spacing is usually one half of the carrier wavelength.The improvement in signal-to-interference ratios is about 3 dB withtwo elements, 6 dB with four elements, 7.75 dB with six elements,and 9 dB with eight elements [42]
Trang 10Appendix A—Viterbi Decoding
of Convolutional Codes
The Viterbi algorithm performs sequential decoding using principles
of dynamic programming [9], [11] The algorithm is based on the fact
that if at any instant t k , there is a sequence of m information bits for which the decoder performance is optimum, then those m bits will be the first m bits of a sequence that optimizes the performance at any later instant t l t k Given a sequence of outputs from the matchedfilter over a desired observation period, a sequence of bits is chosen
at each stage as the most likely transmitted sequence
To continue with the algorithm, suppose that R is a sequence ofsamples of the matched filter output (which are analog voltages asmentioned before) At each symbol period, the number of samplesread by the decoder equals the number of output bits generated bythe encoder for each input bit That is, for a rate 1/2encoder, there aretwo samples to the input of the decoder at the end of each symbolperiod Furthermore, each of these samples is defined by one of thequantization levels R The maximum likelihood decision theorystates that X is the code that was most likely transmitted if the prob-ability of R (assuming X) is maximum, that is, if
To use this algorithm, then, it is first of all necessary to determinethe probability of occurrence of each quantization level of thedecoder inputs at each symbol period assuming that a transmittedbit is 0 Similarly, the probability of occurrence of each quantizationlevel of the decoder inputs at each symbol period, assuming that atransmitted bit is 1, is determined in the same manner Becausethese probabilities will be used at each step for sequential decoding,
P 1R 0 X2 is maximum.
Trang 11it is better to convert them into some suitable numbers that wouldspeed up the computation process Specifically, suppose that
each bit of the input, j takes only two values: 1 or 2, and so the
prob-ability of a code symbol for a path in the trellis diagram is a product
of two terms of type (A-1) In other words,
(A-2)
It is, therefore, convenient to take the logarithm of expression(A-2) and, for ease of computation, transform the result into an inte-ger using an appropriate expression This value can then be used as
a metric for a path In this way, the branch metrics for all paths ofthe trellis diagram are computed
For an encoder with m registers, the number of states for the lis diagram is 2m1 For instance, for the diagram of Figure 3-7, m
trel-3, and the number of states is 4 Referring to the trellis diagram ofFigure 3-9, the Viterbi algorithm can be summarized in the followingway:
1 Starting at state 00 of Figure 3-17 (at depth 3 or beyond), add
the metrics of the two paths coming to this state to thepreviously saved metrics of the two states (namely 00 and 01)from which these two paths have originated
2 Choose the larger of the two-path metrics computed in step 1
and save it This becomes the new path metric for this state (that
is, state 00) for subsequent use The branch that gives the larger
path metric is called a survivor path Identify this path by
adding a 0 to the path history if state 00 has a larger metric.Otherwise, add 1 to the path history This path history is saved
in memory for use in the next step
3 Repeat steps 1 and 2 for all other states at the same trellis depth.
P k p1r kl x kl 2 p1r k2 x kl2
p 1r kj x kl2
Trang 124 The path with the largest metric gives the desired decoded bit.
Clearly, the number of survivor paths at each iteration is equal tothe number of states of the trellis Eventually, however, at the end of
a transmitted sequence, it is necessary to choose only one of thesefour possible paths corresponding to the most likely transmitted
code This is easily done by adding two 0’s (m 1 0’s in a generalcase) to the end of the information sequence at the encoder input.Because in this case the final survivor path must terminate at state
00, the desired path is the one that ends at this state after the lastfour encoder output bits have been received and decoded
Figure 3-33 gives the bit error rate performance of convolutionalcodes of rate 1/2for two values of the constraint length, K 4 and
K 8 using a quantization level of 8 and assuming Gaussian noise
[9] Referring to Figure 3-15, the value of Eb /N0 required for a bit
Trang 13error rate of 104for BPSK without coding is about 8.5 dB, whereaswith a convolutional code of rate 1/2 and constraint length 8, the
required value of Eb/N0is only 3.3 dB Thus, the coding gain is about5.2 dB Notice, however, that the net information rate with this code
constitutes a symbol, and so on In general, if a symbol consists of m bits of digital data, the number of distinct symbols is N 2m Eachsymbol is then transmitted by setting the absolute phase angle of thecarrier to an appropriate value between 0 and 2p More specifically,
the absolute phase angle of the carrier corresponding to the n-th
symbol is given by
(B-1)
For instance, with QPSK, N 4, and the phase angles are p/4,
3p/4, 5p/4, and 7p/4 The phase transitions are shown as a lation in Figure 3-34 The lines connecting the symbol positions indi-cate how the phase may change with incoming symbols Forexample, assume that the present symbol is (0,0) In this case, thephase angle is 45 degrees If the next symbol is also (0,0), the phaseangle remains the same as before If, instead, it is (1,0), the phasechanges to 135 degrees, and so on Notice how the symbols have beenarranged in the constellation diagram With this arrangement, themost probable errors involve only one bit For instance, in the pres-
constel-un 12n 12p
N with n 1, p , N.
Trang 14ence of noise, a transmitted symbol (0,0) might be mistakenlydecoded at the receiver as (1,0) or (0,1), and with much lower proba-bility as (1,1).
Offset QPSK (OQPSK)
As mentioned earlier, to perform QPSK modulation, the incoming
data is usually split into two streams—the odd bits forming an phase (I) channel and the even bits forming a quadrature (Q) chan-
in-nel Each stream then modulates the carrier using BPSK In IS-95,the Q-channel data on reverse channels is delayed by one half of a
chip period before modulating the carrier This is called offset QPSK
(OQPSK) See Figure 3-35 Phase transitions in OQPSK modulationare shown in Figure 3-36 Because the modulated signals of the Iand Q channels undergo phase changes at different instants, themaximum change in the phase angle is only 90 degrees Thus, eventhough the output of the wave-shaping filter does not have a con-stant amplitude all the time, it never goes through 0 (compare Fig-ure 3-34 and Figure 3-36), and is, therefore, more suitable foramplification by a somewhat nonlinear amplifier without producingany spurious side bands
Differential QPSK (DQPSK)
In the previous definition, each modulating symbol was transmitted
using an absolute phase of the carrier In differential DQPSK, an
Trang 15incremental change in the phase instead of an absolute value is used
to transmit a symbol In other words, if un1is the phase of the
car-rier corresponding to symbol n 1, the phase angle for symbol n is
given by
where is the incremental phase change
corre-sponding to the n-th symbol [13] For example, with N 4,
Notice that in this case, phase changes occur at each symbolperiod regardless of the incoming data pattern, but not so in Figure3-34 or 3-36
¢un µ
p>4 for symbol 10,023p>4 symbol 10,125p>4 symbol 11,027p>4 symbol 11,12
¢un 12n 12p
N
un un1 ¢un
Symbol Mapper
Trang 16Appendix C—Multiuser Detection Using Viterbi Algorithm
In this appendix, we will further expand our ideas behind multiuserdetection, and discuss the detection principles based on Viterbi algo-rithm, using broad, general concepts For a detailed mathematicalanalysis of the subject, see references [21]-[24]
Because of its complexity, multiuser detection is more amenable toimplementation at a base station rather than a mobile station First,consider a synchronous CDMA system Since it uses a system-widetiming reference based on the Global Positioning System (GPS),symbols transmitted by individual mobile stations are synchronous.Thus, even though they undergo variable delays as they arrive at thebase station, these delays are usually quite small compared to thesymbol period, and therefore, the cross-correlation between scram-bling codes assigned to various users is also very small In this case,with perfect power control, the output of the matched filter corre-sponding to any user at the end of a symbol period depends only onthe signal from that user If, however, the power control is not per-fect, the weaker signals may be swamped by the stronger signals,and as a result the bit error rates for the weaker channels will behigh
In an asynchronous system, on the other hand, as we mentionedpreviously, time offsets between signals received from multiple usersmay be comparable to the symbol period Thus, any symbol of thedesired user may overlap with one or more successive symbols fromall other users Because the cross-correlation between scramblingcodes is no longer zero, the matched filter output from any given userdepends not only on the signal from that user but also on signalsreceived from all other users over a few consecutive symbol periods.Figure 3-37 shows a channel model describing the signal received
at a base station Here, the user data is mapped by the symbol
map-per to a bipolar signal The resulting data stream, say, {s1(i)} from user 1 is spread out by y1(t), the PN code sequence for this user A1isthe transmitted signal amplitude, c its carrier frequency which issame for all users,1the phase of the carrier,1the delay and n1(t) the noise introduced by the channel Similarly, {s (i)}, y (t), A,
Trang 17and n2(t) are the corresponding parameters for user 2, and so on The channel noise is assumed to be Gaussian T is the symbol period.
Figure 3-38 shows the base station receiver that uses matched ters and a soft decision decoder To detect the signal from any user,say, user 1, the demodulated output of the low pass filter is multi-
fil-plied by its PN code, that is, y1(t) The resulting signal rd1(t) is applied
to the input of the matched filter, where it is integrated over eachsymbol period, and the output read into the decoder at the end ofeach integration cycle
It may be intuitively clear from Figures 3-37 and 3-38 that theoutput of the matched filter corresponding to user 1 at the end of thej-th symbol period may be expressed as
(C-1)
where n1(t) is the base band noise The dots in (C-1) indicate that
there are similar terms accounting for the interference due to users
3, 4, and so on Notice in expression (C-1) that the filter output at theend of any symbol period depends on the present bit of this user andthree bits of user 2: the present, the previous and the next The rea-son for this dependence on three bits is that the mobile radio chan-nel is time-varying, and that based on the relative delays, the signalfrom user 2 may arrive at the base station either earlier or later withrespect to the signal from user 1 Also, the interference due to distant
symbols such as s2(j 2), s2(j 3), and so on, are ignored because it
Data from User 1
(PN Code)
Pulse Shaping Filter
)
1t y
Data from User 2
Pulse Shaping Filter
)
2t y
+
o o o Signals from Other Users
Trang 18is assumed that the relative delays between signals from any twousers, say,i j T Here, the auto-correlation function of a scram- bling code y1(t) is
Symbols can now be decoded using a soft decision decoder In fact,the Viterbi algorithm can be used to decode them in much the sameway as for convolutional codes Since this algorithm has been previ-ously described, we will simply mention here that the trellis diagramfor this two-user model has 16 states corresponding to the currentand previous symbols received from each user The state transitionsare caused by next symbols The metric associated with each branch
Matched Filter
Soft Decision Decoder
Carrier Recovery
Data Out
)
1 t y
o o o
Trang 19of the trellis is given by values of the cross-correlation functions.However, now, at each state, the survivor path is the one whose met-ric is closest to the output of the matched filter.
In UMTS, both long and short codes may be used on uplinks ever, short codes are better from the standpoint of multiuser detec-tion because their cross-correlation remains constant over a number
How-of consecutive symbol periods Because the number How-of states in thetrellis diagrams, and consequently the computational complexity,increase exponentially with the number of users, the procedure isnot very useful in practical applications
References
[1] A.J Viterbi, “The Evolution of Digital Wireless Technologyfrom Space Exploration to Personal Communication Ser-
) 1 (
2
) (
) 1 (
1
s
) (
s
) (
ro
) (
s
Delay T Delay T
+
−
++
... output of the wave-shaping filter does not have a con-stant amplitude all the time, it never goes through (compare Fig-ure 3-3 4 and Figure 3-3 6), and is, therefore, more suitable foramplification... bits of user 2: the present, the previous and the next The rea-son for this dependence on three bits is that the mobile radio chan-nel is time-varying, and that based on the relative delays, the... perform QPSK modulation, the incomingdata is usually split into two streams—the odd bits forming an phase (I) channel and the even bits forming a quadrature (Q) chan-
in-nel