Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Bachelor of Technology
In
This is to certify that the seminar report entitled “MULTI-USER DETECTION IN CDMA”
TECHNOLOGY in 4th year at AMITY SCHOOL OF ENGG. AND TECH. affiliated to GURU
DATE:
ii
ACKNOWLEDGEMENT
I am thankful to my guide Mrs. Pinki Nayak for her support in collection and compilation of data
and providing guidance to use and analyze the data for seminar matter.
I also thank my parents and my family for their moral support to carry out the seminar report work.
TARUN KUMAR
DATE:
PLACE:
iii
ABSTRACT
iv
One of the major issues in present wireless communications is how users share the resources and
particularly, how they access to a common frequency band. Code Division Multiple Access (CDMA) is
one of the techniques exploited in third generation communications systems and is to be employed in the
next generation. In CDMA each user uses direct sequence spread spectrum (DS-SS) to modulate its bits
with an assigned code, spreading them over the entire frequency band. While typical receivers deal only
with interferences and noise intrinsic to the channel (i.e. Inter-Symbolic Interference, intermodulation
products, spurious frequencies, and thermal noise), in CDMA we also have interference produced by other
users accessing the channel at the same time. Interference limitation due to the simultaneous access of
multiple users systems has been the stimulus to the development of a powerful family of Signal
These techniques have been extensively applied to CDMA systems. Thus, most of last generation digital
communication systems such as Global Positioning System (GPS), wireless 802.11b, Universal Mobile
Telecommunication System (UMTS), etc, may take advantage of any improvement on this topic. In
CDMA, we face the retrieval of a given user, the User of Interest (UOI), with the knowledge of its
associated code or even the whole set of users codes. Hence, we face the suppression of interference due
to others users. If all users transmit with the same power, but the UOI is far from the receiver, most users
reach the receiver with larger amplitude, making it more difficult to detect the bits of the UOI. This is
well-known as the near-far problem. Simple detectors can be designed by minimizing the Mean Square
Error (MMSE) to linearly retrieve the user of interest. However, these detectors need large sequences of
There have been several attempts to solve the problem using nonlinear techniques. There are solutions
based on Neural Networks such as multilayer perceptron or radial basis functions but training times are
long and unpredictable. Recently, support vector machines (SVM) have been also applied to CDMA
MUD. The upcoming third generation mobile radio system in Europe is based on UMTS (Universal
Mobile Telecommunications Standard). In order to supply access to a common transmission channel for
several users, UMTS incorporates Code Division Multiple Access (CDMA). Besides a lot of practical
advantages, CDMA suffers from multi- user interference limiting spectral efficiency dramatically.
However, bandwidth is a very valuable resource and should be used as efficiently as possible. One
appropriate mean to increase spectral efficiency of CDMA systems is multi- user detection.
This report gives an overview of different multi- user detection techniques. Their performance is
compared with the conventional single-user detection including channel coding. Specifically, linear as
well as nonlinear multi- user detectors are considered. Efficient realizations of linear detectors are given
leading to improved nonlinear techniques. It is shown that nonlinear MUD including channel decoding
can achieve a spectral efficiency twice as high as that of the well-known GSM standard (Global System
for Mobile Communications) employing TDMA and FDMA.
TABLE OF CONTENTS
_________________________ __________________________________
CERTIFICATE ii
2
ACKNOWLEDGEMENT iii
ABSTRACT iv
LIST OF FIGURES 6
1. INTODUCTION
2.1. Description 11
4.4 Formulation 18
3
5. CONVENTIONAL DETECTION FOR MULTIPLE ACCESSES
DETECTION (MUD) 28
REFERENCES 30
4
LIST OF FIGURES
Chapter - 1
5
Chapter - 2
Chapter - 3
Chapter – 5
Chapter – 6
Chapter – 8
Chapter – 9
CHAPTER-1 INTRODUCTION
In addition to intersymbol and interchip interference, one of the key obstacles to signal detection and
separation in CDMA systems is the detrimental effect of multi-user interference (MUI) on the
performance of the receivers and the overall communication system. Compared to the conventional
single-user detectors where interfering users are modeled as noise, significant improvement can be
obtained with multi-user detectors where MUI is explicitly part of the signal model .if the spreading
6
sequences are periodic and repeat every information symbol, the system is referred to as short-code
CDMA, and if the spreading sequences are aperiodic or essentially pseudorandom, it is known as long-
code CDMA. Since multi-user detection relies on the cyclostationarity of the received signal, which is
significantly complicated by the time-varying nature of the long-code system, research on multi-user
detection has largely been limited to short-code CDMA for some time. On the other hand, due to its
robustness and performance stability in frequency fading environment, long code is widely used in
virtually all operational and commercially proposed CDMA systems, as shown in Figure 1. Actually,
each user’s signal is first spread using a code sequence spanning over just one symbol or multiple
symbols. The spread signal is then further scrambled using a long-periodicity pseudorandom sequence.
This is equivalent to the use of an aperiodic(long) coding sequence as in long-code CDMA system, and
the chip-rate sampled signal and MUIs are generally modeled as time-varying vector processes. The
time-varying nature of the received signal model in the long-code case severely complicates the
equalizer development approaches, since consistent estimation of the needed signal statistics cannot be
achieved by time-averaging over the received data record.
More recently, both training-based and blind multi-user detection methods targeted at the long-code
CDMA systems have been proposed. In this paper, we will focus on blind channel estimation and user
separation for long-code CDMA systems.
Based on the channel model, most existing blind algorithms can roughly be divided into three classes.
(i) Symbol-by-symbol approaches. As in long-code systems, each user’s spreading code changes
for every information symbol, symbol-by-symbol approaches process each received symbol
individually based on the assumption that channel is invariant in each symbol. Channel
estimation and equalization is carried out for each individual received symbol by taking
instantaneous estimates of signal statistics based on the sample values of each symbol. Based
on the BCJR algorithm, an iterative turbo multi-user detector was proposed.
(ii) Frame-by-frame approaches. Algorithms in this category stack the total received signal
corresponding to a whole frame or slot into a long vector, and formulate a deterministic
channel model. Computational complexity is reduced by breaking the big matrix into small
blocks and implementing the inversion “locally.” As can be seen, the “localization” is similar
to the process of the symbol-by-symbol approach. And the work is extended to fast fading
channels.
(iii) Chip-level equalization. With the observation that channels remain approximately stationary
over each time slot, the underlying channel, therefore, can be modeled as a time-invariant
7
system, and at the receiver, chip-level equalization is performed. In all these three categories,
one way or another, the time varying channel is “converted” or “decomposed” into time
invariant channels. In this paper, the long-code CDMA system is characterized as a time-
invariant MIMO system as in. Actually, the received signals and MUIs can be modeled as
cyclostationary processes with modulation-induced cyclostationarity, and we consider blind
channel estimation and signal separation for long-code CDMA systems using multistep linear
predictors. Compared with subspace methods, linear prediction methods can deliver more
accurate channel estimates and are more robust to overmodeling in channel order estimate. In
this paper, multistep linear prediction method is used to separate the intersymbol interference
introduced by multipath channel, and channel estimation is then performed using nonconstant
modulus precoding technique both with and without the matrix-pencil approach .The channel
estimation algorithm without the matrix-pencil approach relies on the Fourier transform, and
requires additional constraint on the code sequences other than being nonconstant modulus. It
is found that by introducing a random linear transform, the matrix-pencil approach can
remove (with probability one) the extra constraint on the code sequences. After channel
estimation, equalization is carried out using a cyclic Wiener filter. Finally, since chip-level
equalization is performed, the proposed approach can readily be extended to multirate cases,
either with multicode or variable spreading factor. Simulation results show that compared
with the approach using the Fourier transform, the matrix-pencil-based approach can
significantly improve the accuracy of channel estimation, therefore the overall system
performance.
8
The channel is assumed to be linear and noisy; therefore the chips from different users are added
together, plus Gaussian noise. Hence, the MUD has to recover from these chips the bits corresponding to
each user. At each time step t, the signal in the receiver can be represented in matrix notation as: xt =
HAbt + nt (1) where bt is a column vector that contains the bits (+1 or .1) for the K users at time k. The
K × K diagonal matrix A contains the amplitude of each user, which represents the attenuation that each
user’s transmission suffers through the channel (this attenuation depends on the distance between the
user and the receiver). H is an L × K matrix which contains in each column the L-dimensional spreading
code for each of the K users. The spreading codes are designed to present a low cross-correlation
between them and between any shifted versions of the codes, to guarantee that the bits from each user
can be readily recovered. The codes are known as spreading sequences, because they augment the
occupied bandwidth of the transmitted signal by L. Finally, xt represents the L received chips to which
Gaussian noise has been added, which is denoted by nt. At reception, we aim to estimate the original
transmitted symbols of any user i, bt(i), hereafter the user of interest. These MUDs have good
convergence properties and do not need a training sequence to decode the received bits, but they need
large training sequences before their probability of error is low. Therefore the initially received bits will
present a very high probability of error that will make impossible to send any information on them.
Some improvements can be achieved by using higher order statistics, but still the training sequences are
not short enough for most applications.
9
1.2 Asynchronous CDMA
The j:th user experiences the SNR:
m2jj m 2jj
SNR j
2
2
2
2.1. Description
a practical cdma reciever consists of a low pass filter which filters out the unwanted noise signals and
forwards the desired band of frequencies to a multiplier which multiplies the recieved signal with the
locally generated code,next is an integrator which integrates the product of the recieved signal with the
10
unit step signal and subsequently a sampled signal is produced after the decision and phasing of
sampling.
tm
From channel LPF u (t ) Decision
0
Lc Pj WPj / R
m 2jj
SNR j
2
2
E mij 2E mij n j E n 2j
i , j i , j
1 4 4 2 4 4 3 N B 0 eff PN
0
Hence, SNR upper bound for the j:th user is:
Lc Pj
SNR j U
P N
i 1
i 0 Beff
i j
Pi i 1 Pi (U 1) Pj
U
i j
11
2. Therefore the j:th user’s SNR equals
Lc Pj
( SNR ) 0
N 0 Beff (U 1) Pj
and the number of users is
1 1
U 1 Lc
SNRo SNR1
3. where* (for BPSK)
Pj PW 2 Eb
SNR1 Lc j
Beff N 0 PN R No
12
2.3 Near far effect in CDMA
Assume all users apply the same power but their distance to the receiving node is different. Hence the
power from the i:th node is
Where d is the distance, and a is the propagation attenuation coefficient (a = 2 for free space, in urban
area a = 3…5)
Express the power ratio of the i:th and j:th user at the common reception point
dj
Po Pd
i i Pj d j Pi Pj
di
Therefore, the SNR of the j:th user is
Lc Pj Lc Pj
SNR j U
SNR j
N 0 Beff Pi
U
d
N 0 Beff Pj j
i 1 d i
i 1
i j
i j
13
Multiple-access interference (MAI) power should not be larger than what the receiver sensitivity can
accommodate. Note the manifestation of near-far -effect because just one larger sum term on the left
side of the equation voids it
Example: Assume that all but one transmitter have the same distance to the receiving node. The
one transmitter has the distance d1=dj /2.5 and a=3.68, SNR0=14, SNR1=25,
Rb = 30 kb/s, Beff = 20 MHz, then
U
dj 1 1
3.68
(2.5) U 2
3.68
(2.5) U 2 L c
i 1 d i SNR0 SNR1
i j
U 2 2.53.68 L 1 1 14
c
SNR0 SNR1
Lc , BPSK (2 / Tc ) /(1/ Tb ) 2Tb / Tc 2Tb Beff
1 1
U 1 Lc 42
( SNR ) 0 ( SNR )1
Hence the presence of a single user so near has dropped the number of users into almost 1/3 part of
the maximum number
To minimize the near-far effect efficient power control is should be adaptively realized in
asynchronous CDMA-systems.
14
CHAPTER-3 CDMA COMMUNICATION SYSTEM MODEL
AND MUD
Consider a synchronous CDMA digital communication system as depicted in Figure 1. Its main goal is
to share the channel between different users, discriminating between them by different assigned codes.
Each transmitted bit is up sampled and multiplied by the users’ spreading codes and then the chips for
each bit are transmitted into the channel (each element of the spreading code is either +1 or .1 and they
are known as chips). The channel is assumed to be linear and noisy; therefore the chips from different
users are added together, plus Gaussian noise. Hence, the MUD has to recover from these chips the bits
corresponding to each user. At each time step t, the signal in the receiver can be represented in matrix
notation as: xt = HAbt + nt (1)
where bt is a column vector that contains the bits (+1 or .1) for the K users at time k. The K × K
diagonal matrix A contains the amplitude of each user, which represents the attenuation that each user’s
transmission suffers through the channel (this attenuation depends on the distance between the user and
the receiver). H is an L × K matrix which contains in each column the L-dimensional spreading code for
each of the K users. The spreading codes are designed to present a low cross-correlation between them
and between any shifted versions of the codes, to guarantee that the bits from each user can be readily
recovered. The codes are known as spreading sequences, because they augment the occupied bandwidth
of the transmitted signal by L. Finally, xt represents the L received chips to which Gaussian noise has
been added, which is denoted by nt.
At reception, we aim to estimate the original transmitted symbols of any user i, bt(i), hereafter the user
of interest. Linear MUDs estimate these bits as ˆbt(i) = sgn{w. i xt} (2) The matched filter (MF) wi = hi,
a simple correlation between xt and the ith spreading code, is the optimal receiver if there were no
additional users in the system, i.e. the received signal is only corrupted by Gaussian noise. The near-far
problem arises when remaining users, apart from the UOI, are received with significantly higher
amplitude. While the optimal solution is known to be nonlinear, some linear receivers such as the
minimum mean square error (MMSE) present good performances and are used in practice.
These MUDs have good convergence properties and do not need a training sequence to decode the
received bits, but they need large training sequences before their probability of error is low. Therefore
the initially received bits will present a very high probability of error that will make impossible to send
any information on them. Some improvements can be achieved by using higher order statistics , but still
the training sequences are not short enough for most applications.
15
3.3 Multiple Access Interference (MAI)
CDMA system can be realized by spreading codes having low cross -correlation as Gold codes
(asynchronous usage) or Walsh codes (synchronous usage).Multipath channel with large delay
spread can destroy code cross-correlation properties. Asynchronous systems with large code gain
Additional compensation of MAI yields further capacity (increases receiver sensitivity). This can
be achieved by:
Multi-user detection.
Note that there exists a strong parallelism between the problem of MAI and that of ISI:
Hence, a number of multi-user detectors have their equalizer counter parts as:
Maximum likelihood.
16
Zero-forcing.
Decision feedback.
1. Linear.
2. Subtractive.
17
CHAPTER-4 MAXIMUM LIKELIHOOD SEQUENCE
DETECTION
4.3Basic concept
Requires estimation of received amplitudes and phases that takes still more
computational power.
18
CHAPTER -5 CONVENTIONAL DETECTION FOR MULTIPLE
ACCESSES
Hence we require a large autocorrelation and small cross correlation (small ISI).
The output for the K:th user consist of the signal, MAI and filtered Gaussian noise terms (as
discussed earlier).
19
That is expressed by the matrix-vector notation as
Noise
y (I Q) Ad z Ad QAd z
Therefore the term Ad contains the decoupled data and QAd represents the MAI.
Objective of all MUD schemes is to cancel out the MAI-term as effectively as possible (constraints
to hardware/software complexity and computational efficiency).
20
CHAPTER-6 SYNCHRONOUS AND ASYNCHRONOUS
CHANNEL
In synchronous detection decisions can be made bit-by-bit. In asynchronous detection bits overlap and
multi-user detection is based on taking all the bits into account.
T
The matrix R contains now partial correlations that exist between every pair of the NK code words .
21
Note that the resulting matrix is sparse because most of the bits do not overlap. Sparse matrix algorithms
can be utilized to reduce computational difficulties (memory size & computational time).
The decorrelating detector applies the inverse of the correlation matrix to suppress MAI,
We note that the decorrelating detector eliminates the MAI completely! However, channel noise is
filtered by the inverse of correlation matrix - This results in noise enhancement!Decorrelating detector is
mathematically similar to zero forcing equalizer as applied to compensate ISI.
Many MUD techniques require inversion of R. This can be obtained efficiently by PE:
22
NS
dˆ PE wi R i y w0 R 0 y w1R1 y... wN S R N S y
i 0
For finite length message a finite length PE series can synthesize R-1 exactly. However, in practice a
truncated series must be used for continuous signaling:
23
CHAPTER-7 MINIMUM MEAN SQUARE ERROR (MMSE)
DETECTION
Based on solving MMSE optimization problem with
One notes that under high SNR this solution is the same as decorrelating receiver. This multi-user
technique is equal to MMSE linear equalizer used to combat ISI.
CONS:
24
CHAPTER-8 SUCCESSIVE INTERFERENCE
CANCELLATION (SIC)
This gives the highest benefit for canceling out the other users.
Note that the strongest user has therefore no use for this MAI canceling scheme!
CONS: Processing delay, signal reordered if their powers changes, in low SNR performance
suddenly drops.
25
CHAPTER-9 PARALLEL INTERFERENCE CANCELLATION
(PIC)
26
Simplifies system analysis.
Doing a partial MAI cancellation at each stage with the amount of cancellation increasing for
each successive stage.
Tentative decisions of the earlier stages are less reliable - hence they should have a lower
weight.
27
CHAPTER-10 BENEFITS AND LIMITATION OF MULTIUSER
DETECTION (MUD)
PROS:
Significant capacity improvement - usually signals of the own cell are included .
More efficient uplink spectrum utilization - hence for downlink a wider spectrum may be
allocated.
Reduced MAI and near-far effect - reduced precision requirements for power control.
CONS:
If the neighboring cells are not included interference cancellation efficiency is greatly reduced.
28
CONCLUSION AND FUTURE WORK
It has been shown that CDMA systems suffer from severe multi- user interference. Although strong error
control coding is able to ensure reliable transmissions for medium system loads, it is beneficial to apply
multi- user detection especially for high system loads. Based on the uplink of an OFDM-CDMA
environment, the performances of various multi-user detectors have been demonstrated. Concerning
linear approaches, the MMSE detector can be efficiently approximated by iterative strategies like the
Gauss-Seidel algorithm to avoid an explicit inversion of the correlation matrix and save computational
cost. Taking into account the discrete nature of the signal alphabet, nonlinear elements like clipping or
channel decoding have to be incorporated into the iterations. This concept improves performance
significantly. Even in the case of an overloaded system, e.g. 2 s U N =, the single-user performance can
be reached leading to high spectral efficiencies.
There are significant advantages to MUD which are, however, bounded and a simple
implementation is needed.
MUD research is still in a phase that would not justify making it a mandatory feature for 3G
WCDMA standards.
29
REFERENCES
1. Multi user detection using CDMA by Sergio Verdu.
5. Research paper titled multi user detection using Gaussian process by Fernando and Caro.
6. Multi-User Detection in Multicarrier-CDMA Systems by Dr.-Ing. Volker Kühn, Ronald Böhnke and
Prof. Dr. Ing Karl and Dirk Kammeyer.
7. Multi-User Detection for CDMA Systems by Alexander Duel Hallen and Zoran Zvonar.
30