Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
(IDMA)
By
SAJJAD ASHRAF
MOBILE COMMUNICATION SYSTEMS
DL STUDENT
SP2013-MSEE-011
CENTER FOR ADVANCED STUDIES IN ENGINEERING
sajjadashraf@gmail.com
Mob No. 0321-8503485
ABSTRACT
TABLE OF CONTENTS
1.INTRODUCTION TO CDMA.........................................................................4
1.1 CODE DIVISION MULTIPLE ACCESS (CDMA)..................................................4
1.1.1 Why CDMA?................................................................................................4
1.1.2 What is CDMA?............................................................................................4
1.1.3 Spread Spectrum Characteristics...................................................................5
1.2 Limitations in CDMA system..........................................................................5
2. INTERLEAVE DIVISION MULIPLE ACCESS (IDMA)...........................6
2.1 Why IDMA?.....................................................................................................6
2.2 What is IDMA?................................................................................................6
2.3 Comparison of IDMA with CDMA.................................................................7
2.4 IDMA TRANSMITTER STRUCTURE...................................................................8
2.4.1 Spreader.........................................................................................................8
2.4.1.1 FEC Encoder..............................................................................................8
2.4.1.2 Spreader:....................................................................................................9
2.4.2 Interleaver:....................................................................................................9
2.4.3 Channel Coefficient h(k):..............................................................................9
2.5 ITERATIVE CHIP-BY-CHIP RECEIVER..............................................................10
2.5.1 The First Iteration:.......................................................................................10
2.5.2 Random Deinterleaver:................................................................................11
2.5.3 The Decoder:...............................................................................................11
2.5.4 Random Interleaver:....................................................................................12
2.5.5 The Second Iteration:..................................................................................12
2.5.6 Decoder for 2nd Iteration:.............................................................................12
2.6 CONCLUSION...................................................................................................13
1. INTRODUCTION TO CDMA
In this chapter, I will emphasize on the features of CDMA and then I will
proceeds towards IDMA. I have discussed limiting factors in CDMA that forms the
basis towards the research of a new multiple access technique. IDMA is normally
defined as the special case of CDMA. Therefore after gaining basic knowledge of
CDMA, I will move to the introduction of IDMA.
X1
USER 1
FEC
INTERLEAVER
SPREADER 1
X2
USER 2
FEC
INTERLEAVER
SPREADER 2
.
.
.
.
.
.
USER M
FEC
INTERLEAVER
XM
SPREADER M
distinguish the signals from different users and hence it has been called interleavedivision multiple-access (IDMA).
X1
USER 1
FEC
SPREADER
INTERLEAVER 1
X2
USER 2
FEC
SPREADER
INTERLEAVER 2
.
.
.
.
.
.
USER M
FEC
SPREADER
XM
INTERLEAVER M
d1
Spreader
(k)
C j (k)
Spreader
dk
x j (k)
j
Cj
(k)
AWGN
(k)
rj
(k)
X
x j (k)
2.4.1 Spreader
In CDMA the spreader comes after the Interleaver, which is key principle for
user separation, shown in fig 2.1. While in IDMA, spreader consists of two parts, FEC
encoder and Spreader.
O/P
1
X
O
R
CODED DATA
USER DATA
1 0 11
1 0 0 1 0 1 0 11
X
O
R
O/P2
In this model, the input data sequence dk of user-k is encoded based on a lowrate code C, generating a coded sequence ck= [ck (1),, ck (j), ..., ck (J)]T, where J is
the frame length. Both of Convolution encoded streams are concatenated and then
treated as independent channel for every user.
2.4.1.2 Spreader:
Referring to figure 2.3, the spreading operation in CDMA is done after
interleaving and is used for user separation. Each user is assigned orthogonal code and
Number of user is dependant on length of spreading code.
While in IDMA, spreading is performed before Interleaving and is not used
for user separation. There are basic two types of spreading codes, Orthogonal Codes
and Repetitive codes.
Orthogonal codes consist of equal number of 1 and -1. Data is balanced i.e.,
consist of equal number of 1s and -1, after spreaded by Orthogonal codes. CDMA
uses orthogonal codes.
While in Repetitive code, each bit is repeated into number of times, equal to
the length of spreaded code. An example of repetitive code is [1 1 1 1 1 1 1 1]. In
repetitive code, data after spreading is biased towards 1 or -1 depend upon the value
of spreading code.
2.4.2 Interleaver:
As discussed earlier, the main difference between CDMA and IDMA is
interleaving. The basic purpose of Interleaver in CDMA is to combat against burst
errors. While the only mean for user separation in IDMA system is unique Interleaver,
which is user specified. There are two basic conditions for designing of Interleavers.
Firstly, Data within User should be UNCORELATED. That is, there should
not more than one bit in each spreaded sequence. Further, any bit at any location in a
byte should be uncorrelated.
Secondly, Data of all Users should be UNCORELATED. This can be
maintained by giving different interleaving pattern for different users.
Referring figure 2.3, ck is permutated by an interleaver k, producing xk = [xk
(1), , xk(j), , xk(J)]T. Following the CDMA convention, the elements in xk are
called chips.
rj h ( k ) xj ( k ) nj
j=1,2,..J
(2.1)
k 1
where xj
(k )
{ 1, 1}
h ( k ) the channel coefficient for user k, and n j zero-mean additive white Gaussian
rj
rj h ( k ) xj ( k ) j ( k )
where j
(k )
(2.2)
During the first iteration ESE allocates equal energy to every bit of every user xj
(k )
which is the mean energy obtained by dividing the received bit to number of users
(8,16 and 32) by using the following equation.
K
E ( rj ) h ( k ) E ( xj ( k ) )
k 1
(2.3)
Each xj
(k )
(k )
(k )
(initialized to 0 and 1 respectively). During first iteration the mean of random variable
and the mean of received bit would be same because every user has the same amount
of distributed energy. This information is then sent to Random Deinterleaver.
interleaved to form
{L(cj ), j 1,2,. . . . j}
(k )
{L(xj ), j 1,2,. . . . j}
(k )
are de-
(k )
(k )
code.
The
{L(cj )}
(k )
interleaving. Using the A posteriori probability (APP) each received bit is despreaded
by multiplying it with the spreading code in bitwise manner and then divides it by the
length of spreading code. This despreaded data is then respreaded in a similar way as
(k )
{L(cj )}
(k )
as
s
L(d 1( k ) ) sj ( k ) L(cj ( k ) )
(2.4)
j 1
The extrinsic LLR for a chip (cj ) within d 1( k ) s ( k ) for only first iteration is
(k )
defined by
Ext {( cj
(k )
)}= d 1( k ) s ( k )
(2.5)
(k )
( j)
j ' i.e cj
(k )
= xj
(k )
. The
output from Decoder Ext (cj ) (extrinsic LLRs) is now fed back to ESE for the
(k )
second iteration. This output for every user passes through unique Random interleaver
(which is same as used in transmitter for every user) before entering ESE.
E ( rj ) h ( k ) E ( xj ( k ) )
(2.6a)
k 1
Var ( rj ) h ( k ) Var ( xj ( k ) )
(2.6b)
k 1
(k )
(k )
) Var ( r j ) h ( k ) Var ( xj ( k ) )
(2.7a)
(2.7b)
The ESE outputs are the logarithm likelihood ratios (LLRs) about { xj
computed based on (2.7) as
L( xj ( k ) )
2h ( k ) (r j E (j ( k ) ))
Var (j ( k ) )
(2.8)
(k )
next iterations.
s
L(d 1( k ) ) sj ( k ) L(cj ( k ) )
(2.9a)
j 1
Ext (cj
(k)
Pr(cj ( k ) 1 | r )
) log
L(cj ( k ) )
(k)
Pr(cj 1 | r )
(k )
(2.9b)
=+1 if sj
(k )
= d1
(k )
and cj
(k )
=-1
otherwise Therefore,
Ext (cj ( k ) ) sj ( k ) L( dj ( k ) ) L(cj ( k ) )
(2.9c)
(k )
L(cj ( k ) ) (input to the decoder). This iterative process is repeated a preset number of
times. In the final iteration the DES produces hard decisions d 1( k ) on information bits
d 1( k ) based on (2.5).
The detection algorithm does not rely on coding unlike other methods used in
CDMA, but introducing coding can further enhance performance (details omitted
here). The principle can be generalized to situations with multipath fading. For
complexity, notice that (2.3) involves summations over all of the users, but the results
(and so the cost) are shared by all of the users.
2.6 Conclusion
A new multi user scheme named IDMA has been studied. The basic principle
is to use interleavers for user separation. It allows very low-cost multiuser detection.
The related cost is only two additions and two multiplications per chip per user per
iteration. A very large number of users can be processed with modest computing
power. Complexity is not a serious concern for multiuser detection. Near Shannon
capacity performance is observed for multiple access channels.
BIBLIOGRAPHY
[1] William Stallings., Data and Computer Communications, 7ed, Prentice Hall,Inc.,
February 8, 2006.
[2] Li Ping, Lihai Liu, K. Y. Wu, and W. K. Leung, Interleave-Division MultipleAccess, IEEE Trans. Wireless Commun., Vol. 5, No. 4, Apr. 2006, pp. 938-947.
[3] B.P Lathi., Modern Digital and Analog Communication System, 3rd ed., Oxford
University Press., March 1998.
[4] Bernard Sklar., Digital Communications-Fundamentals and applications,2nd ed,
Pearson Education,Inc., New Delhi, 2001
[5] Simon Haykin, Michael Moher., Modern Wireless Communications, Pearson
Education , Inc., India, 2005.
[5] Behrouz A.Forouzan., Data Communications and Networking,3rd ed, McGrawHill,Inc., New York,2003.
[6] Theodore S. Rappaport., Wireless Communications- Principles and Practice, 2nd
ed, Prentice Hall, Inc., December 2001.