118
Multi-user Interference Cancellat ion in DS-CDMA with Forward Error Correction b~ Kitw Kar Yan Wong -4 thesis submitted to the Department of Electrical and Computer Engineering in conformity nit h the requirements for the degree of Master of Science (Engineering) Queen's University Kingston? Ontario, Canada September 2000 Copyright @ Kitty Kar Yan Wang: 2000

Interference Cancellat ion in DS-CDMA Forward Correctionnlc-bnc.ca/obj/s4/f2/dsk1/tape4/PQDD_0012/MQ53036.pdf · Acknowledgement s I would like to thank Dr. Peter McLane, my supervisor,

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Multi-user Interference Cancellat ion in DS-CDMA with Forward Error Correction

b~

Kitw Kar Yan Wong

-4 thesis submitted to the Department of Electrical and Computer Engineering

in conformity nit h the requirements for the degree of Master of Science (Engineering)

Queen's University Kingston? Ontario, Canada

September 2000

Copyright @ Kitty Kar Yan Wang: 2000

National Library 1+1 OfCa*,

Acquisitions and Acquisitions et Bi bliog raphic Services services bibliographiques 395 WeUinglon Street 395. r w Welihgm Ottawa ON KlAON4 O(iswaON KlAONI Canada Canada

The author has granted a non- exclusive licence dowing the National Library of Canada to reproduce, loan, distribute or sel1 copies of this thesis in microform, paper or electronic formats.

L'auteur a accordé une licence non exclusive permettant à la Bibliothèque nationale du Canada de reproduire, prêter, distribuer ou vendre des copies de cette thèse sous la forme de microfiche/film, de reproduction sur papier ou sur fomat électronique.

The author retains ownership of the L'auteur conserve la propriété du copyright in this thesis. Neither the droit d'auteur qui protège cette thèse. thesis nor substantial extracts fkom it Ni la thèse ni des extraits substantiels may be printed or othenvise de celle-ci ne doivent être imprimés reproduced without the author's ou autrement reproduits sans son permission. autorisation.

Abstract

In a code division multiple access (CDM-4) system, the presence of the multiple access

interference (LI-41) limits the number of users that can simultaneously communicate

over the channel. To overcome the detrimental effects of the M-41, the use of a multi-

user detection (MUD) algorithm is needed. Many MUD algorithms proposed in the

literature involve the use of complex maximum-a-posteriori (&lAP) decoders that

prohibits their use in many practical applications. The goal of this research project

is to design a lou- complexity algorithm that is targeted at the 384 kbps application

in t hird-generation wideband CDMA (WCDMA).

In this thesis, the use of multi-user interference cancellation in a F~rward Error

Correction (FEC) coded CDMA system is studied. The proposed algorithm combines

linear MUD and iterative interference cancellation. It involves iterative decoding and

soft interference cancellation that is based on FEC decoder decision feedback. The

investigation of the iterative algorithm uses a full CDMA system mode1 which involves

three types of commonly used spreading sequences: GoId. Kasami, and extended S(2)

sequences. Computer simulations are used in this thesis to obtain the performance

of the proposed algorithm using each of the spreading sequences.

For an AWGN channel, the classical CDM-4 detector with no MUD supports 5

high-bit-rate users in WCDMA a t a bit-error-rate of for the constraint length 7,

rate-; convolutionally coded system. The iterative algorithm proposed in this thesis

doubles the number of users in the targeted application.

Acknowledgement s

I would like to thank Dr. Peter McLane, my supervisor, for his support, guidance.

and patience. Without his help, the completion of this thesis would not be possible.

He is also a great addition t o Our softball team.

Special thanks for Dr. Mohsen Hossenian from Harris Corporation, Canada, who

suggested the use of the extended S ( 2 ) code in our simulations. This made Our work

much more meaningful, and gave some insight as why the es~ended S(2) code was

chosen by 3GPP.

Thanks to al1 members in Peter's lab for making it a great place to work. Specif-

ically: Jean .Au, for his help a t the early stage of this project on clarifj4ng some key

concepts; Frederick Lee, for his efforts in proof-reading my thesis; Chan-Tong Lam,

for his knowledge in LaSex: Elvis Chen. for his expertise in programming language,

LaTex, his effort in proof-reading my thesis? and his patience; Pawel Dmochowski and

JValaa Hamouda, for making the lab a friendly place.

Xlso, thanks to Dr. Fady -4lajaji: Dr. Steven Blostein, and Dr. Naraig Majikian for

their comments on this thesis. The quality of this thesis write-up n7as much improved.

Finallyv, thank you to my family and friends for their care and support.

iii

Table of Contents

Table of Contents iv

List of Abbreviations xiii

List of Symbols xiv

1 Introduction 1

1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

1.2 Performance Measure . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

1.3 Literature Sun-ey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

1.4 Thesis Contribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 -

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Thesis Outline 1

2 General Background 9

2.1 Oven-ien- of a CDhl-4 system . . . . . . . . . . . . . . . . . . . . . . 9

2.2 User capacity of a C D X 4 system . . . . . . . . . . . . . . . . . . . . 12

2 -3 On hl ultiple Access Interference Cancellation . . . . . . . . . . . . . . 14

2.3.1 Parallel Interference Cancellation . . . . . . . . . . . . . . . . 15

2.3.2 Serial Interference Cancellation . . . . . . . . . . . . . . . . . 16

2.4 Convolutional Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

. 2.4.1 Convolutional Encoder [l 2: 31 . . . . . . . . . . . . . . . . . 18

. . 2.1.2 Convolutional Decoder[l 2 31 . . . . . . . . . . . . . . . . . . 20

2 . 4 3 The ITiterbi Algorithm (1 . . . . . . . . . . . . . . . . . . . 21

. . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.44 Interleaving 23

2.5 CDMA with FEC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

The Discrete Mode1 28

. . . . . . . . . . . . . . . . . . . . 3.1 Iterative Interference Cancellation 29

3.1.1 Brute Force Interference Cancellation . . . . . . . . . . . . . . 3C

3.1.2 Partial Interference Cancellation . . . . . . . . . . . . . . . . . 36

3.1.3 Soft Interference Cancellation . . . . . . . . . . . . . . . . . . 40

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2 Pre-processing 43

3.2.1 The Decorrelating detector . . . . . . . . . . . . . . . . . . . . 44

3.2.2 The Minimum Mean-Squared-Error Detector . . . . . . . . . . 45

3.2.3 Iterative Interference Cancellation with Pre-processor . . . . . 45

. . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3 Chapter Surnmal 49

4 The Signature Sequences 52

. . . . . . . . . . . . . . . . 4.1 Maximal Length Shift Register Sequences 53

. . . . . . . . . . . . . . . . . . . . . . . . . . . 4.2 The Gold Sequences 58

. . . . . . . . . . . . . . . . . . . . . . . . . . 4.3 The Kasami Sequences 59

. . . . . . . . . . . . . . . . . . . . . . 4.4 The extended S(2) Sequences 60

. . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.5 Chapter Summary 62

5 Iterative Interference Canceilation for High Data Rate Users in

WCDMA 63

. . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.1 System parameters 63

5.2 Iterative Interference Cancellation with different spreading sequences 64

. . . . . . . . . . . . . . . . . 5.2.1 Spreading a i th Gold sequences 64 c. C . . . . . . . . . . . . . . . . 5.2.2 Spreading with Kasami sequences (a

. . . . . . . . . . . . 5.2.3 Spreading with extended S(2) sequences 82

3 Multi-user interference Cancellation with Increased Processing Gain . 87

5.4 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . SS

6 Conclusions 91

6.1 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

6.2 Suggestions for Future Work . . . . . . . . . . . . . . . . . . . . . . . 92

Bibliography 94

A Approximating the cross-correlation p 98

B Simulations and the Confidence Intervals 100

Vita 101

List of Tables

A list of m-sequences generated using primitive polynomial f (D) =

I t D + D 2 . . . . . . . . . . . . . . . . . . . * . . . . . . , . . . . .

Mapping from quantery S(2) sequences to extended S(2) sequences . .

Number of available sequences of each spreading code family - - - . .

Error Profile for the Brute Force IIC algorithm using tdegree Gold

code at an SXR of 5dB . . . . . . . . . . . . . . . . . . . . . . . . . -

The number of bits required to achieve different confidence inten-als -

List of Figures

2.1 -4 general ~V...user CDh1.A transmit ter . . . . . . . . . . . . . . . . . . 10

2.2 Conventional ikL-user CDM-4 receiver . . . . . . . . . . . . . . . . . . 11

. . . . . 2.3 .A general ;',.user parallel interference cancellation algorithm 15

. . . . . . 2.4 -4 general user serial interference cancellation algorithm 11

. . . . . . . . . . . . . 2.5 -4 general convolutional encoder of rate.k,/n, 19

. . . . . . . . . . 2.6 -4 rate-$. constraint length 3' convolutional encoder 40

2.7 State diagram for the rate-;: constraint length 3. encoder shown in

Figure2.6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

. . . . . . . 33 2.8 Trellis diagram for the rate-!' constraint length 3 encoder -- . . . . . . . 2.9 The add-compare-select process of the I'iterbi -Ilgorithm 23

2.10 .A typical interference cancellation procedure . . . . . . . . . . . . . . 24

. . . . . . . 2.11 The error propagation diagram for the Viterbi Algorithm 25

2.12 -AA%-u~erCDhI~4systemn-ithFEC . . . . . . . . . . . . . . . . . . 25

2.13 Conventional CDh4-A receiver with FEC . . . . . . . . . . . . . . . . 2s

. . . . . . . . 3.1 -4 general Iterative Interference Cancellation Algorithm 29

3.2 .A 2-user Iterative Brute Force Interference Cancellation .A lgorithm . . 30

3.3 Performance of the Brute Force IIC Algorithm on a 9-user system with

crosçcorrelation p = 0.20 . . . . . . . . . . . . . . . . . . . . . . . . . 33

3.4 Performance of the Brute Force IIC -ilgorithm on a 9-user system with

. . . . . . . . . . . . . . . . . . . . . . . . . cross-correlation p = (3.35 33

viii

Performance of the Brute Force IIC Algoritiim on a 9-user system with

cross-correlation p = 0.30 . . . . . . . . . . . . . . . . . . . . . . . . . Performance of the Brute Force IIC Algorithm on a l e u s e r system

with cross-correlation p = 0.25 . . . . . . . . . . . . . . . . . . . . . . Performance of the Brute Force IIC Algorithm on a Il-user system

with cross-correlation p = 0.25 . . . . . . . . . . . . . . . . . . . . . . Performance of the Brute Force IIC Algorithm on a 12-user p t e m

with cross-correlation p = 0.25 . . . . . . . . . . . . . . . . . . . . . .

-4 2-user Partial Iterative Interference Cancellation Algorithm . . . .

Cornparison on different values of the cancellation fractions on a 9-user

system wit h cross-correlation p = 0.25 . . . . . . . . . . . . . . . . . .

Performance of Partial IIC Algorithm with cancellation fraction y' =

60% on a 9-user system with cross-correlation p = 0.30 . . . . . . . .

Performance of Partial IIC Algorithm with cancellation fractions y l =

50%, y* = 5O%, y3 = 60% and y4 = 60% on a 9-user system with

cross-correlation p = 0.30 . . - . . . . . . . . . . . . . . . . . . . . . . The merging branches . . . . . . . . . . . . . . . . . . . . . . . . . .

Performance of the Soft IIC .Algorithm on a 9-user system with cross-

correlation p = 0.30 . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Performance of the decorrelôting detector and MMSE detector on a

9-user system with cross-correlation p = 0.25 . . . . . . . . . . . . . .

Performance of the pre-processor-aided Brute Force IIC -4lgorithm on

a 10-user system with cross-correlation p = 0.25 . . . . . . . . . . . .

Performance of the pre-processor-aided Brute Force IIC -4igorithm on

a 10-user system with cross-correlation p = 0.35 . . . . . . . . . . . .

Performance of the pre-processor-aided Brute Force IIC Algorit hm on

a 10-user system with cross-correlat ion p = 0.45 . . . . . . . . . . . .

3.19 Performance of the pre-processor-aided Brute Force IIC Algorit hm on

a 13-user system with crosçcorrelation p = 0.45 . . . . . . . . . . . .

The structure for a r-degree Linear Feedback Shift Register . . - . . .

-4 2-stage m-sequence generator . . . . . . . . . . . . . . . . . . . . .

-Autocorrelation function for an m-sequence with chip duration Tc and

period :t'Tc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Generating a Gold sequence of period K=7 . . . . . . . . . . . . . . .

Generating a Kasami sequence of penod N=4 . . . . - - . . . . . . .

The S (2) sequence generator . . . . . . . . . . . . . . . . . . . . . . .

Performance of the Brute Force IIC .Ilgorithm on a 9-user system with

processing gain of 7, spreading with Gold sequences. . . . . . . . . . .

The ,Yu-stage Preliminary Interference Cancellation -Algorithm . . . .

Performance of the Bmte Force IIC ,Ilgorit hm nvit h a %stage prelim-

inary IC on a 9-user system ni th processing gain of ï 1 spreading with

Gold sequences. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Performance of the Brute Force IIC .ilgorithm combined with a 2-stage

Partial Preliminary IC on a 9-user system with processing gain of 7.

spreading with Gold sequences. . . . . . . . . . . . . . . . . . . . . . Performance of the Brute Force IIC ,Ilgorithm combined with a 2-

stage Soj? Preliminary IC on a 9-user system with processing gain of

7. spreading with Gold sequences. . . . . . . . . . . . . . . . . . . . .

Performance of the 3.IMSE pre-processor on a 9-user system with pro-

cessing gain of 7, spreading with Gold sequences. . . . . . . . . . . .

Performance of the Brute Force IIC algorithm on a 9-user systern with

processing gain of 7: spreading with Kasami sequences. . . . . . . . . Performance of the Partial IIC .Algorithm on a 9-user system with

processing gain of 7, spreading with Kasami sequences. . . . . . . . .

5.9 Performance of the Soft IIC Algorithm on a 9-user q t e m 11-ith pro- -- cessing gain of 7. spreading n-ith Iiasami sequences. . . . . . . . . . . t t

5-10 Performance of the Pre-processor-aided Brute Force IIC algorithm on

a %user system mlth processing gain of 7. spreading n-ith Iiasami se-

quences. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

5-11 Performance of the Pre-processor-aided Partial IIC -ilgorithm on a 9-

user system with processing gain of 7: spreading with Kasami sequences. 79

5.12 Performance of the Pre-processor-aided Soft IIC Algorit hm on a 9-user

systern with processing gain of 7. spreading wïth Kasami sequences. . 79

5.13 -4 cornparison on average MMSE detector and optimal MMSE detector 80

5.14 Performance of the Pre-processor-aided Soft IIC -4lgorithm on a 10-

user system with processing gain of 7: spreading with Kasami sequences. 81

5.15 Performance of the Pm-processor-aided Soft IIC Algorithm on a 11-

user -tem with processing gain of 7. spreading with Iiasami sequences. 81

5.16 Performance of the Brute Force IIC Algorithm on a 9-user system 119th

processing gain of 7. spreading with extended S(2) sequences. . . . . .

5.17 Performance of the Partial IIC -Algorithm on a 9-user system with

processing gain of 7. spreading nith estended S(2) sequences. . . . . .

5.18 Performance of the Sofl IIC Algorithm on a 9-user system with pro-

cessing gain of 7. spreading with estended S(2) sequences. . . . . . .

5.19 Performance of the Pre-processor-aided Brute Force IIC Algorithm on

a 9-user system with processing gain of 7. spreading with estended

S (2) sequences. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

5.20 Performance of the Soft IIC .Algorithm on a 10-user system with pro-

cessing gain of 7. spreading with estended S(2) sequences. . . . . . .

5.21 Performance of the Soft IIC algorithm on a Il-user system with pro-

cessing gain of 7. spreading with estended S(2) sequences. . . . . . ,

5.22 Performance of the Pre-processor-aided Soft IIC algorithm on a Il-

user -stem nith processing gain of 7. spreading nith estended S(2)

sequences. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

5.23 Performance of the Pre-processor-aided Soft IIC aigorithm on a 12-

user system wlth processing gain of 7, spreading with estended S(2)

sequences. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87

5.24 Performance of the Brute Force IIC AIgorithm on a 18-user sj-stem

using rate-f convolutional code with uncoded processing gain of 30 - 89

5.25 Performance of the Brute Force IIC Algorithm on a 18-user system

using rate-$ convolutionai code with uncoded processing gain of 30 . 89

sii

List of Abbreviations

Third-Generation P artne~bip Project

Additive White Gaussian I\ioise

Bit-Enor-Rate

Base Station

Code Division Multiple -4tcess

Fonvard Error Correction

Int erference Cancellat ion

Linear Feedback Shift Register

Multiple -4ccess Interference

3Iaximurn -1 Posteriori

&Ia,uimurn Likelikhood

$1 inimurn Mean-Squared-&-or

Multi-User Detection

Wideband Code Division Plfultiple -4ccess

Pseudo-Xoise

\.'iterbi ,Algorit hm

Iterative Interference Cancellatiori

Soft-Input Soft-Output

Signal-to-Soise Ratio

Soft Output Viterbi -1lgoritfim

xiii

List of Symbols

- b;

b - -1

&k -1

- . I re f ined b;

bi

PK sequence assigneci to the jch user

for uncoded system: ith information sjmbol of the jth user for coded system: ih interleaver output q m b o l of the jth user

tentative bit decision made for b;

finai bit decision made for 6;

the tentative bit decision made for b; a t the kth iteration

interleaver output sequence of the jth user

the tentative decision made for b, at the kt" iteration

the bit decision made for 6; by the preliminary IC algorithm.

for uncoded system: ith information symbol vector of al1 users for coded system: i th interleaver output vector of al1 users

symbol bandwidth

branch metric from the transition from state S;' at time i - 1 to state Si at time 1

baseband signal of the jth user

unit delay

i units delay

characteristic polynomial of the LFSR

polynomial that captures the the initial load of the LFSR

kth feedback coefficient of the LFSR

the ich encoder generator

generating polynomial

the pre-processor matris

siv

the average pre-processor matrix

-Y,, x :Vu identity matr~x

average interference power spectral density seen by the receiver

total interference ponTer

number of input bits taken by the ccn~olutional encoder at each cycle

total iterations needed

constraint length of the convolutional encoder

length of information sequence

length of the encoded sequence

number of States of the encoder

MMSE filter

average 34MSE pre-processor

number of output bits produced by the convolutional encoder at each cycle

noise seen by the j th user during the ith interval

noise sequence for the j th user

noise vector for i th syrnbol intenal

period length of the LFSR sequence

number of primitive polynomial of degree r

number of users

power spectral density of the noise for .AWGX channel

rectangular pulse of duration Tc

processing gain of the CDh.1-4 systern

interference power after despreading

signal power

noise ponrer

Ph prime decomposition

path metric that ends at stâte S, at time 1 that includes the j th competing branch

the best path metric that ends at state S, at time Z

degree of the LFSR

degree of the ith shift register

mâ.\=imum number of aie ut^ tne shift register

baseband received signal

code rate

cross-correlation matris

average cross-correlation matrix

cross-correlation matris for the ith spreading i n t e m l

auto-correlation function

cross-correlation function

state z

the jth previous state of state S,

signature waveform for the jîh user

signature waveform for the ith symbol of the jth user

chip interval

SJ-rnbol inten-al

i th bit of the encoder input for shift register cycle 1

it" bit of the information sequence of the j'" user

tentative bit decision made for u; at the kth iteration

final bit decision made for u;

information sequence sent by the j th user

tentative decision sequence made for 2, a t the kîh iteration

final decision sequence made for gj

available channelbandwidth

encoder output for shift cycle Z

i th bit of the encoder output for shift register cycle Z

ith bit of the encoded sequence of the jth user

tentative bit decision made for x; at the kth iteration

encoded sequence of the j* user

tentative decision sequence made for z, at the kf"teration

final bit decision made for x;

final bit decision made for Z;

ith matched-filter output bit of the j th user

matched-filter output sequence of the jth user

ith matched-filter output vector

the reliability measure for &>k

the reliability rneasure sequence for 6: difference between the path metric for the ith merging path and the su-ivor path

cancellation fraction at kth iteration

cancellation fraction for the preliminary IC algorithm

decoding depth

3.1-41 seen by the j th user during the ith interval

estimation of I-,

tentative decision made for i9; at the kth iteration

SIAI sequence seen by the jth user

tentative decision made of z9, at the kth iteration

XIAI vector for ith symbol interval

cross-correlation between the sequence assigned to the nth and j th user for the ith interval

identical cross-correlation value in the discrete mode1

time offset of the j th user

svii

Chapter 1

Introduction

1.1 Motivation

The aim of the next-generation wireless network is to provide access to rnulti-media

services t hrough a universal persona1 communication device [4]. To achieve t his goal.

there is a need to improve both trafic capacity and service quality of esisting cellular

networks. Code Division Multiple -1ccess (CDM-4) is a spread-spectrum communica-

tien technique that offers solutions to the aforementioned problem [j]. Adopted by

the Telecornmunication Industry -i\ssociation. it is the standard platform for third-

generation persona1 cellular communication systems [6]. Unlike traditional multiple

access systems, CDM-4 allows al1 active users to transmit messages simultaneously

over the same channel bandtvidth. Alessages transmitted from each CDhll-1 user are

modulated a second time to a bandwidth much wider than necessary tvith a wide-

band noise-like signai called the pseudo-noise (PX) signal. This second modulation

is termed spreading. It alloms suppression of the multiple access interference (hl-41)

produced by other active users of the system provided that each user has a distinct

P N signzl. The amount of suppression depends on the cross-correlation properties

among the PN signals of al1 users as well as the ratio in bandwidth between the P N

signal and the information-bearing signal. This ratio. called the processing gain, is

crucial to the needed high spectral efficiency of CDM-4 systems. Due to the limited

wireless resources, the processing gain of a CDPVI-4 system is constrained by the avail-

able channel bandnidth. Hence. a typical CDbl-4 systern can only tolerate a fised

amount of 11-II. -4s a result. there exists a maximum number of active users that a

CDhl-4 system can support.

One way to expand user capacity is to rnodify the conventional CDlI-A detec-

tors [Tl. The conventional CDM-4 detector is composed of a bank of single-user

matched-filter receivers. each matched to the individual PX waveform assigned to

the corresponding user. This type of receiver structure performs independent data

detection for each user, neglects the presence of the other users. and is not optimal for

the non-Gaussian CDM-4 channel. Multi-user detection (MC'D) is a technique t hat

makes use of the MAI during the detection process to alleviate the disadvantages of

the conventional CDBIA detector [il. The optimal MUD algorithm derived by Verdu

[8, 91 is a maximum likelihood (ML) detection algorithm that performs joint detection

for al1 simultaneous users. This algorithm yields the minimum achievabie probability

of error in detecting CDM-4 signals and significantly improves the performance Gver

the conventional detectors. The improvement. however. is obtained at the espense

of a dramatic increase in computational complexity. n-hich grows esponentially with

the number of simultaneous users. Therefore. it is infeasible to implement the k r d u

algorit hm in practical applications.

,Mani sub-optimal hWD algorithms have been proposed that eshibit good perfor-

mance and complexity tradeoffs. Linear 11UD algorithms such as the decorrelating

detector [IO] and the minimum mean-squared-error (1IMSE) detector 111) are one

of the simpIer and earlier sub-optimum detectors proposed that give s a t i s f a c t o ~

performance by inverting the effect of the 11-41. The non-linear SICD scheme in-

volving interference cancellation (IC) is anot her popular approach t hat a t tempts to

remove the hi-41 from the received signal for each user before making data decisions

[12. 13. 14. 15. 16. 17. 18. 191.

The purpose of t his t hesis is to study various interference cancellation algorithms

for a CDM-JL system employing a fonvard error correction (FEC) scheme, and to

deveiop a low-complexiw suboptimal MUD scheme for the high-data-rate service

based on the Wideband-CDMA (WCDMA) [6] standard. In particular. this thesis

is focused on MUD schemes for the 384 kbps senlce in WCDhI.4. Homyever, the

additive white Gaussian noise (-4WGN) channel, a channel mode1 much simpler than

the models used in the WCDMA standard, is used. Combining both linear MUD and

iterative interference cancellation, a fairly low-complexity detection algorithm can be

designed to improve the user capacity of such systems, but at the cost of increased

delay.

1.2 Performance Measure

One of the most important performance measures in communications is the probabil-

ity of error or the bit-error-rate (BER). BER is defined as the probability of making

an error on an individual bit of information. It provides vital information conceming

the effectiveness of a given algorithm. In this thesis, the BER for a single-user system

in the absence of kL4I will be used as a benchmark for comparing the performance

of sub-optimal multi-user detectors. The particular MUD algorithm proposed in this

thesis has an iterative structure. Therefore, the nurnber of iterations needed for the

algorithm to converge to the single-user performance bound is also used as a figure of

merit. Since the system considered has a nonlinear structure due to both the FEC and

IC algorithms: a closed-form expression on the BER is very difficult to obtain. Thus,

cornputer simulations are used for determining the BER. For the research described

in this thesis, the goal is to achieve a BER of 10-~.

1.3 Literature Survey

The use of MUD to improve user capacity in CDMA communication systems is the

subject of much past and present research activity. In the early 198OYs, Verdu [20]

showed that the conventional matched-filter receiver is oniy individually optimum in

the sense that it gives optimal data detection for each individual user only when no

observation on the interfering users are allon-ed. 1;erdu [8. 91 Lias also derived and

analyzed the optimal detection algorithm that gives jointly optimal data decisions

based on the M L criterion. This algorithm searches through the set of al1 possible

input sequences and selects the one that yields the minimum achievable probabilit?.

of error. ,Ut hough the Verdu algorithm significantly improves the performance over

the conventional receiver, it suffers from a dramatic increase in the computational

complexity, which grows exponentially wïth the number of active users in the system.

This drawback has motivated researchers to seek low-complexi ty sub-optimal MUD

algorit hms.

The MUD algorithrns in the literature can be categorized into optimal. linear,

and nonlinear. Optimal MUD gives jointly optimal decisions on al1 user's bits based

on some optimality criterion. Recent work in this area combines MCID with FEC

schemes and makes use of the Turbo processing principle [21] to obtain an iterative

MUD algorithm that asymptotically achieves the optimal performance at the espense

of increasing delay [22' 23. 24: 25, 26. 271. In general. an iterative MGD algorithm

contains two soft-input soft-output (SISO) decoders. The first SISO decoder is a

multi-user rna.simum-a-posteriori (LLAP) decoder that reads the matched-filter output

of al1 the users and their a priori information to produce a set of soft measures on

the decoded bits. The second decoder consists of a bank of single-user decoders. each

uses the corresponding soft value produced by the first SISO decoder to generate the

a priori information for the particular user. -4 close loop through these two decoders

completes one iteration. The method of computing the soft values and the a priori

information depends on the particular opt imality criterion. In [22, 231 the optimal

iterative MGD algorithm based on the cross-eniropy minimization and its sub-optimal

implementation are derived by Moher. In [24]. an iterative MUD algorithm based on

the MAP criterion is proposed by Reed et al. In [25], Gamel and Geraniotis derived

their iterative receiver based on the MNSE criterion. Recently, Wang and Poor

[26, 271 derived their iterative hIUD algorithm based on an interference suppression

technique and M M E filtering. These iterative J K D algorithms generally give near-

optimal performance, but the use of the ven high complexity X 4 P decoders in these

algorithms prohibits their use in man'. practical applications.

Linear multi-user detection algorithms such as the decorrelating receiver [IO] and

the MMSE receiver [ll] make use of equalization techniques that perform linear trans-

formation on the receiver output to suppress the hl-AI. The decorrelating receivîr

completely eliminates the hl-41. but it also suffers from a channel noise enhancement

[il. The M'SE receiver, on the other hand. compromises between MAI rejection and

noise enhancement [7], but its linear structure limits its performance when compared

to other sub-optimal MUD algorithms. Xlthough these MUD algorithms do not pro-

vide near-optimal performance. their implementation sirnplicity makes them one of

the best candidates for practical multi-user detectors [28].

Nonlinear MUD such as interference cancellation attempts to rernove the 11-11 be-

fore making data decisions in order to improve the system performance with moderate

computational complexity [29]. Interference cancellation can be classified into serial

and parallel 1161. Serial cancellation ranks the users according to their received power

strengths and successively performs interference cancellation and data detection on

a user-by-user basis. ParalIel interference cancellation. on the other hand. at tempts

to remove interference from each user simultaneously. Serial cancellation generally

performs better when the users are received with different ponrer strengths. but it

also suffers from an extended delay compared to parallel cancellation (991. Many

serial-cancellation-based algorit hms (12. 13. l-l. 151 and parallel-cancellation-based

algorithms [16. 17, 18. 191 have been proposed. These algorithms focus mainly on

an uncoded system with no FEC. Less work on interference cancellation has been

conducted on a coded system.

The work in this thesis is focused on a convolutional coded CDMA system with

a sub-optimal MUD algorithm that combines Iinear MUD and parallel interference

cancellation. The main reference for the partial interference cancellation scheme used

in this thesis is the work by Simon and Divsalar [16]. The fundamental background

on XIUD can be found in the test by \>rd6 [il. It provides an estensive treatment

on different MUD algorithms including their performance as well as their cornplesit!-.

General communications texts used for reference include Proakis and Salehi [30].

Peterson et al (311. and Cooper and McGillum [32]. Information on the different

proposals submitted for the third generation mobile communications can be found

in the text by Ojanpera and Prasad [6] and the summary paper by Zeng et al [-Il.

References on the spreading sequences include texts by Golomb [33]. and Peterson

and Weldon [34]; a tutonal paper by Dinan and Jabbariin [35]: and the document by

the third generation partnership project group [36]. References on the convolut ional

code and its components can be found in Wilson [l], Wicker [2]. and \Ïterbi and

Omura [3]. The development of the soft output Viterbi algorithm can be found in a

paper by Hagenauer and Hoeher (371.

1.4 Thesis Contribution

1. Most of the literature on MUD with coding concentrates on a discrete mode1

which does not involve any particular class of spreading codes. This thesis uses

a full system mode1 and considers AICD performance for convolutional codes

with three types of spreading sequexxes: Gold. Kasami and estended S(2). The

thesis is focused on the 384 kbps third-generation \I'CDL.I,4 semice in a 5 hWiz

bandn-idth.

2. -4 novel MUD algorithm is considered for multi-user decoding. The decoding

algorithm is iterative and it has been found that the quality of the detected

data used in the first iteration is crucial for the convergence of the iterative

process. -4ccordingly: various pre-processors are applied to the matched-filter

outputs to improve the initial decoder decisions. In the following iterations, the

pre-processor is no longer used and the soft interference cancellation algorithm

is applied to the matched filter outputs until convergence is attained. In the

soft interference canceliation algorithm, the quality of the decoded outputs of

the previous iteration is used to aid the decoding process.

3. For an AWGN channel, it is found that the iterative decoder described abot-e can

double the number of users in the target application relative to the conventional

CDM-4 detector.

4. For the Gold codes, it is found that performance is limited by the fact that

the channel crosscorrelation matrix becomes singular. This fact has not been

found in the papers included in the literature survey.

5. In the case of using long codes, where only consecutive segments of the codes

are used in each transmissiont it was found that using the time average cross-

correlation matrix for the pre-processing step was inferior to using the instan-

taneous value of this matrix.

1.5 Thesis Outline

Chapter 2 of this thesis begins with an overview of a general CDMA system model.

The intuition behind the interference cancellation algorithm is discussed. The two

classical interference cancellation algorithms. parallel cancellation and serial cancella-

tion, are aIso introduced. The convolutional code and its components, including the

encoder and the Viterbi decoding algorithm? are summarized. The chapter concludes

with a discussion on the CDMA system mode1 employing the convolutional code.

Chapter 3 describes the iterative interference cancellation algorithm that is pro-

posed in this thesis and the intuition behind the different types of cancellation

schemes, including the brute force, partial, and soft cancellations. A simplified CDMA

channel is introduced for comparing the effectiveness of these algorithms. The perfor-

mance of each algorithm is studied and analyzed using the simpiified CDM.4 model.

Chapter 4 describes the linear feedback shift registers for generating spreading

sequences for the CD31-4 system. Practical sequences such as the Gold. Kasami. and

estended S (2) sequences are discussed.

Chapter 5 compares the performance of different iterative interference canceliation

schemes on a more refined CDh.1-4 model. The performance of these cancellation

schemes on common spreading sequences used in practice are also presented.

Finall_v. Chapter 6 provides the conclusions and addresses future work.

Chapter 2

General Background

In this chapter. a general CDMA system mode1 is presented followed by two classical

interference cancellation algorithrns. The background material on a convolutional

code and its components are discussed. This chapter then concludes with an outline

of a CDPV1-4 system that employs convolutional codes.

2.1 Overview of a CDMA system

The block diagram for a general CDlrLL sTstem with 1';, users communicating simul-

taneously over a common -4WGX channel is show-n in Figure 2.1. It consists of a bank

of :\; parallei transmitters, where each represents a single user in the system. In addi-

tion to the components of a conventional transmitter. a second modulator. called the

spreader, is incorporated for each user. Its function is to modulate the user's messages

by a wide-band noise-like time-varying waveform. the P N waveform. which is a pre-

assigned signature waveform for a particular user. It is assurned t hat binary antipodal

signals are used to transmit the information symbols from each user. Denote the ith

information symbol for the j th user as b;. where 6; E {Il}. During the i th symbol

interval, i = 0: 1. . . .. the input vector (for al1 users) is b' = [ b; 6 . . . b'vu lT. Each user symbol is spread by its orvn unit energ' signature waveform Sj ( t - iT') of

duration Ts, where Ts is the symbol interval. -4 signature waveform may be espressed

Figure 2.1: A general iL-user CDM-4 transmitter

S,(t - iT, )

where j denotes the j th

code sequence assigned

PG- 1

= a j ( l + iPG)p,(t - iTs - [Tc). O 5 t 5 T,: (2.1) 1 =O

user. i denotes the ith symbol interval. and { a j ( ( ) } is the PX

to the j th user that takes on values of {kl}. .Usa PG = 2 is the processing gain of the systern and p , ( t ) is a rectangular pulse of duration Tc-

The rectangular pulse p , ( t ) is usually called a chip. and its duration Tc is called the

chip intemai. In practice. the chip inten-al Tc is usually selected such that Ts is an

integer multiple of Tc. Hence. PG can be viewed as the number of chips of PX code

sequence per information bit.

The baseband signal for the jth user r n q be espressed as

where Ï, E [O7 Ts), j = 1:. . . . .\Tu. represents the spbol-epoch time offset for the jth

user with respect to an arbitrary time origin. -1 synchronous CDM-4 system has

identical offset for al1 users. Le.. r, = s V j ? while an asynchronous system has different

offsets for each user. For satellite and microcell applications, synchronous systerns

are of more practical interest since a quasi-synchronous approach has been proposed

[38,39]. Moreover, every asynchronous system can be generalized using a synchronous

Figure 2.2: Conventional Nu-user CD4IA receiver

system mode1 Mth more effective users [40]. Therefore. this thesis is focused on a

synchronous CDMA system. Without loss of generaliw. we should assume zero offset,

i-e.. r = 0. for al1 users.

The baseband received signal r ( t ) consists of the sum of antipodall-modulated

signature waveforms for al1 users embedded in additive white gaussian noise.

where n(t) represents the white gaussian noise.

Figure 2.2 depicts the block diagram of a conventional CDM.1 receiver. It is a

bank of matched-filter detectors. each consisting of a filter that is matched to the

individual P 3 signal assigned to the particular user followed by a sampler at time

instances iTs, i = 1 . 2 . . . .. It is easy to see that a decision for the jih user at the ith

symbol interval, 6: is a one-shot decision because it requires the obsen-ation of the

received signal only at its symbol time inten-al.

The ith matched-filter output symbol for the jth user is expressed as

where

(ii l)Ts n(t) Sj( t - iTs)dt'

It can be shonn that p L is the cross correlation between the PX sequences assigned

to the nth and j" users in the time-inten-al [iTs, ( 2 + l)Ts]. Le..

t PC-I

It is noted from Equation (2.4) that the matched-filter output. y:' is composed

of three terms: the desired information (b;): the .\LAI (9) and the noise (ni). If the

interference term can be subtracted from the matched-filter output. the performance

of the CDMA system can be enhanced. which results in a larger number of users being

simultaneously supported. This is the motivation behind the interference cancellation

scheme used in this thesis.

2.2 User capacity of a CDMA system

The interference suppression capability of a CDk1.4 system depends highly on its

processing gain. Denote II/' as the bandwidth of the transmitted signal and B as the

bandwidth of the information-bearing signal. where CC; = & » B = &. -Us0 denote

.J as the total ponTer of the interfering signal. .At the transmitter, the PX signal

spreads the information-bearing signal over a wider bandwidth I i.- for transmission.

-At the receiver, the received signal is multiplied with a synchronized replica of the

PX signal to despread the desired signal back to its original bandwidth B and to

spread the interference signal over a nrider bandwidth I.1-. The power spectrum of

the interference signal seen by the receiver has an average power-spectral density of

J ~ = J . ' ~ 5 - - After matched-filtering the total interfering power is reduced to

Therefore, the net effect of the spreading and despreading processes is to reduce the

interference power by a factor of g. This factor is termed the processing gain.

Theoretically, in the absence of &IUD. the maximum number of users a CDM-4

system can simultaneously support is proportional to the processing gain PG. Let P,

be the total power of each information symboi. If the CDM-4 system can support ivu

users, the total interference pow-er seen by a particular user prior to despreading is

Esing Equation (2.6). the amount of interference power seen after despreading is

Let SiV&eq,,,,d be the required signal-to-noise ratio (SXR) for the conventionai

CDh.1-A system to achieve a desired performance level in terms of the bit-error-rate.

The required signal-to-noise ratio is formulated by the ratio between signal power and

the surn of interfering power and noise power.

where P, denotes the white Gaussian noise power. In a typical mobile radio envi-

ronment. communication links are interference-limited and not noise-lirnited [41]: i.e.,

Pd >> P,. Hence. the noise term in Equation (2.9) can be omitted and thus

As observed from Equation (2.10): the number of users being simultaneously s u p

ported by a CDiçZ-4 system is proportional to its processing gain.

2.3 On Multiple Access Int erference Cancellat ion

Interference cancellation (IC) is a method that attempts to remove the hIAI before

making data decisions. Recail from Equation (2.4) that the basic idea of IC is to

estimate the MAI and later subtract it from the matched-filter output t o refine its

quality prior to data detection. In the literature. IC schemes are classified as either

parallel or seriai [16]. In a parallel IC algorithm. the MAI is removed from al1 of the

users simultaneously. In a serial IC algorithm. SIAI is cancelled on a user-by-user

basis. one after the other.

In this section. both parallel IC and serial IC algorithms are described. Note

that in order to perform IC or an' other l I G D algorithm. the knowledge of channel

parameters. as well as the PX sequences of al1 the active users are required. -2

sensitivity study on imperfect knowledge of there entities is left as a problem for

future s t u d . In a cellular system. a base station (BS) communicating with a number

of mobile usen has to detect al1 signals at any given instant while each mobile user is

concerned only a i t h its olr-n data detection. For this reason. hICD is currently being

envisioned for the BS only. that is for the reverse link from terminal to base station.

Figure 2.3: -4 general Nu-user parallel interference cancellation algorithm

2.3.1 Parallel Interference Cancellat ion

In the parallel IC algorithm. the MAI is estimated based on a rough evaluation on al1

users' messages. -4 final decision is made after the estimated M-41 is removed from

the received messages. Figure 2.3 illustrates the parallel IC algorithm.

Let 6; be the ith bit decision made for the jth user. One common way to estimate

received user bit is by the sign of the received amplitude, Le.,

where sgn(-) is a function that returns the sign of the variable in question.

With the knowledge of the cross-correlation values between al1 the P N sequences

and the initial decisions on al1 the users' bits. the MAI can be estimated. Let 8; be

the estimated M.41 seen by the jt" user at the ith syrnbol interval. 8; is estimated as

Let bi be the final decision on 6;. bi is formulated as

b; = q. (Y; - 8;)

= sgn (b; + ni - - 3;)

Su

= sgn (b; +ni + p;(6i -gi) n= 1 ,n#;

Xote chat an incorrect initial bit decision for a particular user doubles its contributed

3.1-41. The parallel IC algorithm improves performance if the initial bits decisions are

relatively reliable.

2.3.2 Serial Interference Cancellation

The idea behind serial IC arises from the observation that each mobile signal is re-

ceived n i th different power strength a t the BS (411. hIobile users closer to the BS tend

to have higher signal strengths than users who are further awa . Higher power u s e s

act as stronger interference sources to the weaker users but the' esperience relatively

less interference t han t hose users. Ltilizing the particular iriterference intensity a

user is esperiencing, the serial IC algorithm r a n k the mobile users according to their

received signal strengths and perfonns IC and data detection seriall. To illustrate

the serial IC algorithm. let us assume that al1 of the users in the system are ranked,

with a lower-indesed user indicating that the user \vas received with higher signal

strength (i.e.. this user may be considered to be more reiiable). Figure 2.4 illustrates

the serial IC algorithm. -At the first stage of the seria1 IC algorithm. the bit decision

for the first user (the user esperiencing the ieast 11-41) is detected as if there were no

m r ,

-At the second stage of the SIC algorithm, ,\LAI for second user is estimated based

solely on the decision made on the first user. i.e..

Figure 2.4: -4 general .Vu-user serial interference cancellation algorithm

At the kth stage. the kI-41 for the kth user is estimated based only on the bit decisions

made for the previous k - I users. The final bit decision is made neglecting the

presence of the remaining weaker users.

The above procedure is repeated until al1 of the mobile users are considered.

The serial IC algorithm improves the fidelity of the XL4I estimation at each suc-

cessive stage. Messages sent by the dominant users are detected only using an ap-

proximated M-41 estimation. Messages sent

M,41 are detected using a more refined MAI

Serial IC generally outperforms parallel

by users who suffered severely from the

estimation.

IC in a situation where al1 of the users

are received with different signal strengths. On the other hand. paraIlel IC performs

better when the received signal strengths are relatively equal [29]. For the same

CDk1.4 system, the serial algorithm suffers frorn an estended delay relative ro that

for the parallel algorithm [29]. It is easy to observe that an ,I; bit delay is required for

an ATu-user system with the serial cancellation but only 1 bit delay occurs for systems

\vit h the parallel algorit hm. In practical n-ireless systems. power-control algorithms

are often employed so that al1 mobile users are received with nearly identical signal

strengths at the BS. Therefore. this thesis focuses on a paraIlel IC-based algorithm.

2 -4 Convolut ional Codes

The noise introduced in communication channels corrupts transmit ted signals and

gives rise to channel transmission errors. One way to overcome this problem is to

employ a FEC scheme that adds controlled redundancy to the transrnitted signal.

Such an approach consists of two extra components. At the transmitter side. a channel

encoder is used to add information redundancy. At the receiving side. a decoder is

used to utilize such redundancy to detect and correct channel errors occurred during

transmission. Convolutional coding is one of the powerful FEC techniques that has

been widely used since its invention by Elias [U] in 1955. It is not only used in this

thesis to combat noise introduced by the channel. but it is also used to aid reliable

51-41 estimation for the IC algorithm.

2.4.1 Convolutional Encoder [l, 2, 31

Figure 2.5 demonstrates an encoder with a rate R, of k,/n,: where at each encoding

stage. k, is the number of input bits. n, is the number of output bits, and k, < n,.

The encoder. as a whole, consists of k, parallel shift registers. Each shift register

is composed of r, delay cells. where i denotes the ith shift register and r, may not

equal to r, for i # j. At shift cycle 1. the encoder reads in a binary Ir,-tuple u1 =

{ u ~ ~ ~ . uLJ . - . . Y U ' ~ ~ C - ~ ) and returns an output n-tuple xL = {xi". xLJ ..... X'+C-~} that

ul.I ..-, *S.. m.. I

Figure 2.5: -4 general convolutional encoder of rate-kc/nc

is produced by some Boolean functions operating on the entire set of inputs residing

in the various shift registers. For binaq convolutional codes, these Boolean functions

are modulo-2 sums.

-4s shown in Figure 2.5: the nc output bits are computed not only from the current

k,-tuple entering the encoder but are also computed from al1 other inputs stored

n-ithin the delay cells. Let r-,,, be the maximum number of delay cells of any shift

register. i.e.?

The nc output

T,, kc-tuples.

bits are constrained by the current input kc-tuple and the previous

Define KC as

&= mas r t + l . z=O ...., kc- 1

Hence h', is called the constraint length of the convolutional encoder. -A complete

convolutional encoder is specified by its code rate. constraint length. and its generators

that define the input-output relationship. For example. consider a rate-$_ constraint

length 3. convolutional encoder shown in Figure 2.6. The input-output relationship

is given by two generators. go and gl, that define the connection rules between the

Figure 2.6: -4 rate- $. constraint length 3: convolut ional encoder

delay line and the adders. The generators for this particular encoder are go = [101]

and g, = (1111; ahich correspond to the connection rules from the del- line to

the top and bottom adder, respectively, where the least significant bit corresponds

to the rightmost connection. Generally. a "1" represents a connection between the

corresponding position and the adder; whereas a "O" represents no connection is

presented. Generators are often espressed in octal form so that (go. gl) = (5.7) for

t his particular example.

-4 closed form espression for the encoder output in Figure 2.6 can be espressed as

where >: @ denotes modulo-2 sum and * denotes convolution. Note that the output

n,-tuple results from a convolution between the input sequence and the generator and

this is why the entire procedure is termed a convolutional encoder.

2.4.2 Convolutional Decoder(1, 2 , 31

-4 binary convolutional encoder with LV total delay cells can be viewed as a finite

state machine with 2h' States. each corresponding to the different contents in the

shift register. Figure 2.7 shows an alternative representation of the rate-$ encoder in

Figure 2.6. The output bits are determined according to the current input bit and the

state of the encoder. -1 state diagram can be transformed to a trellis diagram in order

Figure 2.7: State diagram for the rate-& constraint length 3. encoder shown in Figure 2.6

to incorporate time. Figure 2.8 shows the trellis diagram for the encoder in Figure 2.6.

Let Si: i = O?. . . : 2"' - 1, be the ith state of the encoder. It is assumed that the initial

and the ending States of the encoder are at state So, the all-zero state. Each branch

of the trellis diagram is labeled 114th the output bits corresponding to the associated

state transition. Eveq- codeword in a convolutional code is associated with a unique

path starting and ending a t state So through the associated trellis diagram. For a

rate-k,/n, code, there are 2'. branches leaving and entering each node. Giren an

input sequence of k,L bits' there are 2kL distinct paths through the general trellis,

each corresponding to a convolutional codeword of length n,(L t ICc - l), where

rie - 1 is the number of state transitions required for the encoder to return to state

So after the input sequence has been entered into the encoder. Therefore, the optimal

decoding algorithm. the ML decoder. involves searching through each of these 2 ' ~ ~

paths for the most probable sequence.

2.4.3 The Viterbi Algorithm (VA)

The Viterbi Algorithm (LT-4) [43]: named after its inventor, -4.J. Viterbi, is a ML

decoding algorithm that is widely used in practice. Instead of searching through al1

possible paths, the \.:A simplifies the ML decoder through the elimination of the non-

survivor paths a t each tirne instant by branch metric and path metric calculations.

Stae O (00)

Sotc 1 (01)

Satc 2 (10)

Sm= 3 (1 1)

L-2 - L-I L L-1 L-2

Figure 2.8: Trellis diagram for the rate-$, constraint length 3' encoder

The branch metric is a convenient value that represents the likelihood of a particular

branch n-hereas the path metne for a particular state at a particular time instant

represents the likelihood of the best path that originates from the initial state So and

ends at the state in question. The idea of the is to select the branch a t each time

instant for each state that results in a path with the best path metric. The selected

paths are cailed the sunrivors, while the others are called non-sumi\-ors.

For a binary rate-+ code, there are 2 branches leaving and entering each state S*

at each time instant i. Let Sp and SI be the 2 States that the 2 branches are entered

from. Let the branch metric for the transition from state S;'l j = 0. 1' at time 1 - 1

to state Si at time [ be denoted by BAfi-l(S:. Silyl-'). where y'-' is the received

n,-tuple at time instant i - 1. Let the path metric that ends a t state S;' at time

Z - 1 be PM:",. The path metric at time Z that includes the jth cornpeting branch is

calculated by

PM? ( j ) = P M ( - ~ ~ t B M [ - ~ (s:. S, I ~ I - ' ) . (2 -20)

The V-A compares the 2 cornpeting path rnetrics. PM,S' (0) and P1\fI1 (l), and selects

the better one. The non-sun-king path is discarded and the winning path and its

corresponding path metric are stored. This add-compare-select process (see Figure

2.9) is repeated for each state at each time instant until the end of the received

codeword is reached. At that time. the path with the best path metric is the M L

tirne f - f time f

Figure 2.9: The add-compare-select process of the Viterbi -Algorithm

path which represents the decoder output.

The VA can be further modified to make data decisions on the Z t h k,-tuple upon

receiving the (1 + I')th symbol where r is called the decoding depth. Instead of

choosing one h4L path, the path with the best path metric is chosen at each time

instant 1 + l? + 1 for decoding the Ph k,-tuple. It was shown in [30] that choosing

r 3 5Kc gives negligible performance degradation relative to the optimum \'.4 in

terms of the BER-

2.4.4 Interleaving

Alost well-known FEC schemes: inciuding convolutional codes. are not capable of

correcting errors in bursts but only those errors that are statistically independent [l].

However, many practical situations such as communicating over a fading channel,

errors tend to occur in bursts. A particularly important technique that aids the

decoders to correct these errors is interleaving. It re-orders a sequence of bits or

symbols according to some deterministic patterns. Its counterpart. deinterleaving,

maps the re-ordered sequence back into its original order.

Interleaving is often done for the encoded sequence prior to transmission while

deinterleaving is done for the dernodulated sequence prior to decoding. Together, the

interleaving and deinterleaving pair scrambles the error sequences seen at the receiver

and may possibly break down burst errors into nearly independent errors and hence

enhances decoder performance.

&coder R e f d

Figure 2.10: -4 typical interference cancellation procedure

Interleaving aiso p lay a crucial role in communication systems employing decision

feedback algorit hms. The IC is one of t hese algorit hms and its performance is sensitive

to the error patterns produced both by the channel and the decoder. During an

IC process. the estimated MAI based on the decoder decision is removed from the

matched-filter output signal to provide a more reliable data decision through another

decoding procedure. Figure 2.10 demonstrates a general IC algorithm with FEC. To

maximize the performance of the decoders shonm in Figure 2.10' it is necessary to

preclude error bursts from entering the decoders. Unfortunately, the errors produced

by the VA tend to be in bursts. To illustrate this fact, let us consider the trellis

diagram s h o w in Figure 2.11. If the decoder makes an erroneous bit decision at

time te' then this error propagates such that it t a h s more than one symbol for the

erroneous path to merge back into the correct path. Thus. errors made by the CA are

not statistically independent. but occur in bursts. In this thesis. an interleaver with

a random pattern is used to scramble error bursts produced by the Val. It is noted

that no effort is made to optirnize the interleaver in this thesis.

& c d v

2.5 CDMA with FEC

, Wou<purI, vitchi decoda

w o u t p u r l

subtnction MFoutpur Nu

In a CDM.4 system where FEC is eniployed. messages sent by each user are first

encoded, intarleaved, and then spread by the user-specfic P': signal. as depicted in

Figure 2.12.

~ O w

, , Final decoder ourpirt l

~~ vi-i

-

R+eà

MAI Vi-i decoder

M F q t N , dec*

0utpvtI

ourp.1 N"

i Final Vitcrbi > decoder

Time Sate O (00)

Smte 1 (O 1)

S u 2 (10)

Sote 3 (1 1)

Figure 2.11: The error propagation diagram for the Viterbi .Ilgorithm

Infomϟon E, Xi souru for > Emod.rjr ) In t . rk ivn j

b, usefj

Figure 2.12:

s,;. 0 )

CDM-4 system with FEC

Figure 2.13: Conventional CD3.l-4 receiver with FEC

Let 2, = [ u; uj . . . u:-' ] be a vector representing the information sequence

sent by the jth user: zj = [ 21: . . - xic-' ] be a wctor representing the encoded

sequence for the j fh user: and !I, = [ b; b; . . . 15:-' ] be a wctor representing the

j th interleaved sequence. where L denotes the length of the information sequence and

L, denotes the length of the encoded sequence. These sequences are related by the

following espressions:

where encode(-) denotes an encoding procedure and Ii(-) denotes interleaving. -At the

receiving end (see Figure 2.13). let y = [ y; . . . -1

] be a vector represent-

ing the matched-filter output sequence for the jth user; let 2, = [ 20 I f . . . ifc-' ] be a vector representing the jth deinterleaved sequence and 3 = [ 6; ûf . . . fifi ] be a vector representing the decoded sequence. These sequences are reiated by:

where ll-'(.) denotes deinterleaving and decode(-) denotes a decoding procedure. -As

in the uncoded case. the ith matched-filter output bit for the jth user? y; ? is formulated

where nf is the noise seen by the j th user during the ith bit interval. is the cross-

correlation between the PX sequences assigned to the jth and the nth users a t the ith

symbol interval, and i = O , . . . ? L, - 1.

The matched-filter output vector for al1 of the users during the ith symbol interval

where R' is an !Vu x Nu cross-correlation matrix.

T b' = [ bf 6; . . . biru ] is a vector representing the ith interkaver output for al1 :V,

users; ni = [ nf n . . . nk lT is a vector representing the zerernean Gaussian

noise with covariance rnatrix given by

where y is the power spectral density of the noise for the .WGN channel.

Equation (2.26) can be rewritten as

where 1% is an Nu x Nu identity matrix and 9' = (Ri - INu)bi denotes the M.41

vector for the ith bit interval. The matched-filter output for a coded CDM4 system

is also composed of three terms: the interleaved encoder output bi; the M.41 di; and

the noise ni. M-41 estimation in a coded system is done through the use of decoder

decisions. The detailed algorithm wil1 be demonstrated in the next chapter.

Chapter 3

The Discrete Mode1

The CDM-4 system model with FEC introduced in the previous chapter (see Figures

2.12 and 2.13) is further simplified for simulation purposes. Instead of generating the

PX sequences for ail of the users. one rnay model the CDBIA system by speci-ing the

cross-correlation matrix Ri shown in Equation (2 .26) . where R is a symmetric matrix

\vit h each element [Ri], representing the cross-correlation between the signature

sequences assigned to the nth and the jth users during the ith bit interval. In the

literature. XWD algorithms are generally studied and analyzed using a symmetric

channel. This channel is often modeled as a R matrix with identical cross-correlation

value between each PX sequence pair. i.e..

where L, is the length of the encoded sequence. This model is referred as the discrete

model in this thesis. -Although the discrete mode1 does not have much relevance in

practice, it does provide a means of rneasurement on the effectiveness of a MUD

algorithm. The typical value of p is about 0.22. The detailed calculation of p is given

in Appendi~ A at the end of this thesis. The rest of this chapter discusses the intuition

behind the different IC methods and presents the performance of each method through

the use of cornputer simulations. These simulations are aimed such that the simulated

BER is within 3~30% of the true BER with 95% confidence. Details on the confidence

MF ovrpwl

a MAI - F i ~ l subboctiori -

decirion 1

MF o u ~ t - MAI > Deciskm

wbbactiori mJgng '

decision N, -

Figure 3.1: -4 general Iterative Interference Cancellation -Ilgorithm

interval and the required number of trials to achieve the desired level of confidence

can be found in -1ppendiu B a t the end of this thesis. The FEC code used is the

rate-$. constraint length 7. convdutional code with generators {13, li}. Based on the

constraint length of the convolutional code. a decision depth of 36 (r 2 5Kc) is used

in the VA for near->IL decoding. To cope mith burst errors produced by each Viterbi

decoder, different block interleavers of size 1000 for each user are also used in the

simulations. These interleavers are randomly generated at run-time and no attempt

is made to optimize them. Since a block structure is needed for the interleavers: the

blocked data of length 2000 synbols that is appended with 36 dummy symbols to

give a block length of 2036 symbols is used in the simulations throughout the thesis.

3.1 Iterative Interference Cancellation

The iterative processing technique has received an enormous amount of attention

since the discovery of Turbo codes [21]. The idea behind an iterative algorithm is to

repeatedly improve the fidelity of the information being sought until no further prac-

tical improvement is attained. Figure 3.1 illustrates the block diagram for a general

iterative interference cancellation (IIC) algorithm. .At each stage of the IIC algorithm,

the MAI is being re-estimated using the decoder decisions from the previous stage of

- k + -hi

ZI =XI -91 ri, -' I * El Zl

Figure 3.2: -4 2-user Iterative Brute Force Interference Cancellation ,LUgorit hm

decoding. -4s the algorithm proceeds, the MU estimate becomes more accurate and

hence improves the quality of the decoded decisions at the end of the IIC aigorithm.

The number of iterations needed to achieve the desired performance level. Le.. the

single-user performance bound, is highly dependent on the channel characteristics

such as the signal-to-noise ratio (SNR) as well as the signal-to-interference ratio. The

criterion for convergence requires reliable decoder decisions at the initial stage.

In the following sections, the algorithms of three different kinds of IL41 cancella-

tion schernes are discussed. The three schemes are brute force cancellation, partial

caiicellation, and sofr cancellation. To demomtrate the capability of these IC tech-

niques, the performance of these schemes on a system with various cross-correlation

values and with different numbers of users are presented. The number of users \vas

chosen so that the simulation results in this Chapter can be cornpared with results in

Chapter 5 of this thesis.

3.1.1 Brute Force Interference Cancellation

In brute force cancellation. an attempt is made for each user to completely remove

the MAI at each stage of the iterating algorithm [16]. Figure 3.2 illustrates the block

diagram for such algorithm on a 2-user system.

Recall from the previous chapter that the matched-filter output sequences of the

2 users are given by:

where y . = [ y: . . . ] denotes the vector representing the j th rnatched- -1

filter output sequence. 9, = [ 9; 19: . . . ] is the wctor representing the j th

MAI sequence and 2, = [ n; nf . . . RF-' ] denotes the vector representing noise

sequence seen by the j th user.

Let the superscript k denotes the kth iteration of the IIC algorithm. Let ü:." be

the tentative decoder decision made a t the kth iteration on the i th information symbol

sent by the jth user. .Also, let 9;' be the estimation made at the kth iteration on the

MAI seen at the ith bit interval by the jch user. The >,LAI seen by the first and the

second user are estimated as

-k = p II (encode@:)) . (3-4)

-k = p - n (encode@:)) . (3.5)

- k where ej = Q?.* d i s k [ 1 I - - - dLc-l" ] denotes the M-AI sequence estimated a t the kih 1

-L-1,k iteration for the jth user‘iif = [ 69' citk . . . 111 ] denotes the j th information

sequence decoded at the kth iteration. Ii(-) denotes an interleaving procedure and

encode(-) denotes an encoding procedure.

At the (k + l)th iteration. the jch matched-filter output sequence is refined by

subtracting the h4.41. 3:' estirnated based on the decoder decisions frorn the previous

iteration:

-k - y1 -21, iktl - - 1 (3-6)

-k - y 2 - 4 - ykfl - -2 (3. '7)

The refined sequence. i jki '. is then deinterleaved and decoded to produce a new -3

decision sequence, ii?":

-"l = decode (Il-' (zjti')). gr -

31

where decode(-) denotes a decoding procedure and n-'(.) denotes a deinterleaving

procedure.

This estimate-subtract-decode procedure is repeated until the desired system per-

formance is achieved. Assuming h' iterations are needed for the IC algorithm to

achieve a desired performance level, the final decisions on the information sequences

The Nu-user iterative brute force cancellation algorithm is formulated as the foi-

Step(1) Initialization:

S tep(2) Recursive algorit hm:

S tep(3) Final decisions:

Figures 3.3. 3.4. and 3.5 demonstrate the simulation results using the brute force

IIC algorithm on a 9-user system with cross-correlation value of 0.20, 0.25: and 0.30,

respectively For comparison purposes, the BER for both the conventional receiver

and the single-user s ~ s t e m with no 31.41 are also plotted. The BER is plotted against

Figure 3.3: Performance of the Brute Force IIC -ilgorithm on a 9-user systern with cross-correlation p = 0.20

+ 4 rteralions

2 2.5 3 3.5 4 4 -5 S SNR (dB)

Figure 3.4: Performance of the Brute Force IIC -4Igorithrn on a 9-user system with cross-correlation p = 0.23

-- 2 3 3 5 4 4 5 5 SNR (dB)

Figure 3.5: Performance of the Brute Force IIC Algorithm on a 9-user system with cross-correlation p = 0.30

the SNR. which is defined as the signal energ'- per information bits. Eh. dil-ided

by No, where 9 is the power spectral density of the noise for the ;\CIGX channel.

This definition of SSR is used on al1 future plots in this thesis. For a particular

plot, the performance of the iterative algorit hm converges rapidly to the single-user

performance bound at the high-SNR region. .At the low-SXR region. the algorithm

converges either with many iterations or it does not converge at ali. Figure 3.5

shows that the operating SKR has to be above a threshold value in order to obtain

performance gain through the use of the cancellation algorithm. The IIC algorithm

converges to the single-user performance bound only at an SNR above the threshold.

Mrhen operating at an SNR below the threshold? no performance gain can be obtained.

Comparing the three figures, increasing the cross-correlation value requires a Iarger

number of iterations for the algorithm to converge to the single-user bound. The

threshold SNR value is also increased as the cross-correlation value increased.

The effect of increasing the nurnber of users is shown through Figures 3.6 to 3.8.

SNR (dB)

Figure 3.6: Performance of the Brute Force IIC Algorithm on a 10-user s p t e m with cross-correlation p = 0.25

, + convenbonal rccscver

: 6 3 iteraùons + 4 iterabons . + 5 itembons - ungie-user

I I 1

25 3 3.5 4 625 5 SNR (dB)

Figure 3.7: Performance of the Brute Force IIC -4lgorithm on a Il-user system with cross-correlation p = 0.23

Figure 3.8: Performance of the Brute Force IIC -4lgorithm on a 13-user sxstem with cross-correlation p = 0.23

-kt a cross-correlation value of 0.25, the performance of a IO-: a II-. and a 12-user

system are demonstrated in Figure 3.6, 3.7: and 3.8. respectively. Increasing the

number of users requires a larger number of iterations for the aigorithm to converge

to the single-user bound. The threshold SNR also increases as the number of users

increases. For example. the threshold SNR increases from 2.5dB to 4dB for the 10-user

case to the 12-user case.

3.1.2 Partial Interference Cancellation

The M.41 estimated a t the earIier stages of the IIC may not be as reliabie as the

latter stages. For this reason. it is not desirable to completely cancel the hl-41 at

early stages [16]. The partial cancellation algorithm is a modification to the brute

force algorithm that removes only a fraction of the hl-AI at a particular stage of the

IIC algorithm. Let 0 5 T' 5 1, be the desired fraction of the MAI to be removed

at the kth iteration. Figure 3.9 illustrates a 2-user IIC algorithm using the partial

Figure 3.9: -4 2-user Partid Iterative Interference Cancellation -Aigorithm

cancellation algorithm. The structure of the partial-IIC algorithm is almost identical

to the brute force case except for the M-41 estimation in Equations (3.4) and (3.5) are

The :Vu-user iterative partial cancellation algorithm is formulated as follow:

S tep(1) Initialization:

for 1 5 n 5 -Yu

a-' = 0 -n - S t ep (2) Recursive algorit,hrn:

for O 5 k 5 h'

Y; = decode (II-' (6")) -n

-k b, = l2 (encode (ci))

for 15 n 5 .rV,

sk = -,k =-y" -k -n j=i.j+n P - bj

S tep(3) Final decisions:

Figure system

3.10: with

t

5 toa: m .

los:--- c o m n O ~ - l ~ l + @am

1 +- . 4 a= a - * f) @- - eniuFora(@i=)

Cornparison on different values of the cancellation fractions cross-correlation p = 0.25

Figure 3.10 compares the performance of a 1-iteration partial cancellation algo-

rithm using different cancellation fractions on a 9-user system with cross-correlation

p = 0.25. NÏhen cancellation fraction. il. is above 50%. the partial cancellation algo-

rithm outperforms the brute force cancellation a!gorithm in the case shown. IVhen

the fraction is belon. 50%. the performance gain is obtained only at the low-SNR

region. For al1 SSR values. the fractions with values above 50% are superior than

those below 50%. Sotice that when the initial decoder decisions are relatively re-

liable, a larger cancellation fraction. i.e. = 80%. gives more performance gain

than the smaller one. Le.. = 60%. IVhen the initial BER is not reliable, a smaller

cancellation fraction. i.e. = 60%. results in better performance.

Figure 3.11 shows the performance of the partial IIC algorithm on a 9-user CDlc.1-4

system with cross-correlation p = 0.30. The cancellation fractions are 60% for the

first iteration 100% for the remaining iterations. Comparing to the brute force case

shomn in Figure 3.5. removing a fraction of the hIAI at only the first iteration signifi-

cantly enhances the performance of the IIC algorithm. The system employing partial

SNR (a)

Figure 3.11: Performance of Partial IIC Algorithm with cancellation fraction 7' = 60% on a 9-user system with cross-correlation p = 0.30

cancellation at iteration one iowered the threshold SNR value frorn about 3.75dB to

about 2.5dE3.

It is also possible to further improve the performance at the low-SNR region by

employing partial cancellation for more than 1 iteration. Figure 3.12 demonstrates the

performance of using partial cancellation for the first 4 iterations. The cancellation

fractions are 7' = 50%. î2 = 50%. 7 d 3 = 60%. 74 = 60%. respectiwly. Comparing

Figure 3.11 and 3.11. the 4-iteration partial IIC algorit hm significantly decreases the

threshold SKR and enhances the performance for the low-SXR region, but it does

not perform as well as the single-iteration case for the high-SNR region. -At higher

SNR, a relatively large canceilation fraction is required to obtain improvement over

the brute force algorithm. Whereas at lower-SXR. a smalIer fraction results in better

performance. Therefore. one should select these cancellation fractions according to

the desired operating S-iR. For operating at high-SNR. employing partial cancellation

a t only the first iteration wouid be sufficient to enhance system performance. For

- ungit-uscr 1 1 1 I 1

2 25 3 3.5 4 4.5 5 SNR (dB)

Figure 3.12: Performance of Partial IIC Algorithm with cancellation fractions -y1 = 5O%, y2 = 50%: -y3 = 60% and -t4 = 60% on a 9-user -tem with cross-correlation p = 0.30

operating at low-SNR region. several iterations of partial IC are required instead. The

optimal choice of these cancellation fractions depends highly on the system parameters

such as the number of users. the cross-correlation values. and the SSR. Yo effort is

made in this thesis to optimize these cancellation fractions.

3.1.3 Soft Interference Cancellation

The idea behind soft interference cancellation originates from partial interference

cancellation. During each symbol intemal. the decoded symbol of some users ma?; be

more accurate than others. Therefore. it is not optimal to use the same cancellation

fraction for al1 of the users. instead. cancellation can be done based on a reliability

rneasure for each decoded symbol of each user at each stage. This reliability measure

can be obtained by modifying the l ï te rb i algorithm.

ML p.th for tbe iOL symbol

Figure 3.13: The merging branches

Soft Output Viterbi Algorithm

The modified V-4 is called the Soft Output Viterbi Algorithm (SOV-4) [37]. It pro-

duces not only the decoded information bit, but also a soft-value that indicates the

reliability of each decoded bit. In addition to choosing the path. the S0\-.4 h a to

produce a soft reliability value for the each selected path. Recall that an information

symbol at time t = 2 . the ith s ~ m b o l . is decoded a t time t = i + r + 1 where r is

the decoding depth. Mhen an ML path is chosen for the ith symbol, there is one

non-sunriving path rhat could merge with the ML path at each time instant between

t = i to t = i + I' + 1. Figure 3.13 illustrates the typical M L path and its merging

branches. There are exactly r + 1 merging branches which leads to r + 1 different

merging paths. Denote Ar as the difference between the path metric for the Ph merg-

ing path and survivor path. Let Amin be the smallest 0 5 1 5 i'. which leads to

a different bit decision. The probability of selecting the wrong survit-or path is given

Thus- the reliability value for the ith decoded symbol is

Let the reliability measure for the jch user a t the kch iteration be denoted by 6: =

[ #?Y* 6;qk 6Lc-l .k 3 ... I 1: where b ; l k represents the reliability rneasure for &;* and

h;lk denotes the tentative bit decision made a t the kth iteration for the ith interleaver

output bit of the jth user.

For a Nu-user system using soft cancellation algorithm. the estimated IIAI at the

6'2.k Ph iteration of the jth user for the ith symbol interval is 6jiVk = x;kLJÉn - t k - p - 6 ; .

The Nu-user soft IIC algorithm is fomulated as follows:

S tep(1) Initialization:

for 1 5 n 5 -rV,

8-L = 0 -n -

Step(2) Recursive algorithm:

where multi(a, 6) denotes element by element multiplication of vector a and vector 6 .

Figure 3.14 shows the performance of such an algorithm on a 9-user system with

cross-correlation value of 0.30. Comparing to the brute force algorithm in Figure 3.5,

the soft cancellation algorithm significantly enhances the overall performance. Yotice

that the soft cancellation algorithm gives very similar performance as the partial

algorithm shown in Figure 3.1 1. The partial cancellation aigorithm has the advantage

that it is simpler to impiement. hotvevert the optimal sets of fractions changes with the

system parameters such as the cross-correlations and the operat ing SNR. Therefore,

Figure 3.14: Performance of the Soft IIC Algorithm on a 9-user system with cross- correlation p = 0.30

depending on the operating environment. these fractions are required to be computed

manually. On the other hand. the soft cancellation algorithm makes use of the decoder

structure and cornputes the reliability values automatically. However. ic requires an

extra amount of computational load for the decoders to compute these reliability

values.

It is observed that the performance of the iterative IC algorithm is very sensitive to

its initial decoder decisions. The convergence criteria depends on a reliable initial

tentative decisions.

One way to irnpro1.e the fidelity of the initial decoder decisions is to apply a Iinear

filter to the matched-filter outputs prior to the IIC algorithm to invert the effect of

the MAI. Linear filters such as the decorrelating receiwr (101 and the MUSE receiver

[Il] are widely used for XKD due to their implementation simplicity when compared

to the optimal MUD algorithm [il. They can be used in association a-ith the IIC

algorit hrns for furt her performance enhancement.

3.2.1 The Decorrelating detector

The decorrelating detector is one of the early MUD algorithms proposed [IO]. It

cancels the effect of MAI by decorrelating the matched-filter outputs. To demon-

strate the intuition behind the decorrelating detector, let us first consider a noise-free

environment. Recdl from Equation (2.26) that the matched-filter output vector is

where at the ith bit interval, R is the cross-correlation mat*, b' is the message vector

and ni is the noise vector.

In the absence of noise, the matched-filter output vector is simplified to

y' = Rbi

= bi+ (R- rNU)bi

= bi+9':

nhere IN, is a Nu x iK identity matrix, 19' is the M-41 vector, Nu is the number of

users, and i denotes the ith bit interval.

When the conventional receiver is employed, detection error occurs due to the

presence of the 34-41? 9'. To remove the effect of the MAI, the matched-filter output

vector y' is processed by rnultiplying it with the inverse of cross-correlation rnatrix

prior to data detection. Let z' be the resulting output vector,

where R-' is the inverse of R. If the cross-correlation matrui R is invertible, then

the decorrelating receiver exists, and hence the MAI can be successfully eliminated.

In the presence of noise. the processed matched-filter output can be espressed as

-4s observed from Equation (3.15)? the processed matched-filter output has only two

terms: the desired message vector b' and the noise vector R%'. The hIAI is com-

pletely eliminated by the decorrelating detector, however. the embedded noise. R-LnL.

is also enhanced [7]: which degrades the performance of the decorrelating detector rel-

ative to the optimal multi-user detector.

3.2.2 The Minimum Mean-Squared-Error Detector

The MMSE detector is another linear MUD algorithm proposed in the literarure [Il].

C'nlike the decorrelating detector. the MMSE detector takes into account the effect

of channel noise and gives appropriate tradeoff between AL41 rejection and noise

enhancement. The MIISE detector M. rninimizes the mean-squared error between

the matched-filter output and the resulting output zz. Its complete derivation can

be found in [î]. The MMSE detector is formulated as

where is the power spectral density of the noise for the .4M7GK channel. and IN,

is an iV, x !Vu Identity matris.

The MMSE detector M does not require the cross-correlation matris R to be

non-singular. It is also shown in [7] that the MMSE detector always e'ust.

3.2.3 Iterative Interference Cancellation with Pre-processor

Linear filtering can be applied to the matched-filter outputs prior to the IIC algo-

rithrns to aid reliable initial decoder decisions for accelerating the convergence rate

Figure 3.15: Performance of the decorrelating detector and XIPI4SE detector on a 9-user systern wit h cross-correlation p = 0.25

of the iterative IC aIgorithms. The use of a linear filter is referred to as the "pre-

processor" in this thesis.

Figure 3.15 compares the performance of the conventional receiver, the decorre-

Iating detector, and the 313ISE detector on a 9-user systern with cross-correlation

p = 0.25. The performance of the decorrelating detector and the hlMSE detector are

very sirnilar. Both detectors improve the BER by a significant amount when com-

pared to the conventional receiver. The performance of the decorrelating detector is

slightly better than the MMSE detector in the case shown. It is also less comples

to implement since it requires no knowledge about the channel noise. Therefore, the

decorrelating detector is always employed as the pre-processor in this thesis if it ex-

ists. Othenvise. the LIAISE detector is employed. In the cornputational results in

this Chapter, the decorrelating detector is always used as the pre-processor.

Let G be the pre-processor to be applied prior to the IIC algorithm. The pre-

processor-aided brute force IIC algorithm is formulated as follows:

Step(1) The initial stage:

for 1 5 n 5 ATu

2: = decode (II-' (gn))

S tep(2) Recursive algorithrn:

for 1s k 5 h'

for I 5 n 5 ATu

Step(3) Final decisions:

for the decorrelating detector where G = { 1 ) for the \,IMÇE detector

Figures 3.16, 3.17, and 3.18 show the performance of the decorrelator-aided brute

force IIC algorithm on a 10-user system mith cross-correlation p = 0.25. p = 0.35. and

p = 0.45, respectively. By pre-processing the matched-filter outputs, the initial BER

is significantly lowered. which accelerates the convergence rate for the brute force

IIC algorithm. Notice that with the aid of the decorrelating detector, the system

toIerates higher values of cross-correlation. However! t his improvement is obtained

Figure 3.16: Performance of the pre-processor-aided Brute Force IIC Xlgorithm on a 10-user system with cross-correlation p = 0.25

Figure 3.17: Performance of the pre-processor-aided Brute Force IIC Algorithm on a 10-user system with cross-correlation p = 0.35

SNR (dB)

Figure 3-18: Performance of the pre-processor-aided Brute Force IIC -ilgorit hm on a 10-user system tvith cross-correiation p = 0.45

a t the expense of extra computational load which involves matrix inverse calculation

and matrix multiplications.

With the aid of the pre-processor, the brute force IIC algorithm for a 13-user

system tolerates a cross-correlation value up to p = 0.45 (See Figure 3.19). Xotice

that a threshold SXR of 4dB is required to obtain any reasonable performance gain.

The use of the pre-processor results in a increase in complexity relative to the use

of the matched-filter receiver. The pre-processor in\*olves the inverse of a symmetric

mat ri^ that is only applied once on the initial rnatched-filter output before the itera-

tive detection algorithm is enabled. If the channel is knom-n. which is assumed in this

thesis, this matris inverse can be computed off-line.

Chapter Summary

Thsi chapter has introduced three iterative interference cancellation algorithms: brute

force cancellation, partial can~el la t ion~ and soft cancellation. The performance of

Figure 3.19: Performance of the pre-processor-aided Brute Force IIC -Algorithm on a 13-user system with cross-correlation p = 0.45

these algonthms are demonstrated and cornpared through the use of computer sim-

ulat ions. The brute force cancellation algorit hm seeks to corn plet el?. eliminates 31-41

at each iteration mithout taking into account the reliability of M.41 estimation. The

partial cancellation algorithm rnakes use of the reliability property of the iterative

algorithm and removes only a portion of the M-41 according to user-defined cancel-

lation fractions. The soft cancellation scheme uses the reliability measure provided

by the soft output Viterbi decoder and performs cancellation accordingly In general,

the soft cancellation scheme gives the best performance among the t hree algorithms.

It has the lowest threshold SXR. but it is also the most complex algorithm to im-

plement. The partial algorithm is less complex compared to the soft algorithni, but

i t gives similar performance to the soft algorithm a t high-SNRs. The brute force

algorithm has the worst performance arnong the three algorithms. It has the highest

t hreshold SNR and the slowest convergence rate.

The pre-processor-aided IIC algorithm is also introduced in this chapter. The two

pre-processors discussed are the decorrelating detector and the MNSE detector. \Vit h

the aid of a pre-processor. each IIC algorithm can support more users and tolerate a

higher cross-correlation value. In particular. a 13-user system using the pre-processor-

aided brute force IIC scheme can tolerate a cross-correlation value up to 0.45. The

improvement in performance is obtained at the expense of increased computational

complexity. which invoives matrix inversion and matrix multiplications.

Chapter 4

The Signature Sequences

The mathematical properties of the signature sequences used in CDhL4 communi-

cations are of fundamental importance in deterrnining the characteristics of such a

system. Recall from Equation (2.4) that when despreading is applied to the received

si,snaI, the arnount of the 34-11 contributed depends on the cross-correlation proper-

ties of the signature sequences. Good performance of such a system requires signature

sequences to have low cross-correlation values. Ideally, spreading codes are infinite

random sequences of equally likely binary digits. Ijnfortunately, the infinite memory

storage requiremeiit in both transmitter and receiver prohibits the use of such se-

quences, Therefore, mat hemat ically-generated periodic sequences t hat nearly satisfy

the randomness properties are generally employed [3 1). These sequences are called

the P N sequences. The randomness properties defined in Cooper and b1cGillem [32]

are re-stated as follo~vs:

1. In every period, the number of positive ones differs from the nurnber of negative

ones by exactly one. Hence the period A* is an odd number.

2. In e v e l period. half of the runs of the same sign have length 1. one fourth have

Iength 2, one eighth have length 3. and so forth. Also the number of positive

runs equals the number of negative runs.

3. The autocorrelation of a periodic sequence is tw-valued. That is, it can be

described by

7 = O. iv, 2 ~ ~ ~ . . . otherwise

where { a ( l ) ) represents the sequence in question.

Due to the nlde bandwidth of spreading sequences. the sequence generator is

required to operate at a veq- high speed. For this reason. shift-register-sequence

generatow are of most interest [31]. The PX sequences used most in practice (333 are

the Gold 144, 453. Kasami [46] and extended S(2) (361 sequences. Given the period

length, each code family chooses its member sequences over the entire set of available

codes according to mathematical d e s . Both the Gold and Kasami families have

very low cross-correlation member sequences [31]. They are binary sequences and are

obtained by combining two maximal length sequences. The estended S(2) codes are

complex-valued sequences that are obtained by estending the quaternaq S(2) code.

The extended S(2) codes are chosen by the Third Generation Partnership Project

(3GPP) Group [36] as one of their standard spreading sequences. In the folloaing

sections, the generation of the masimal length. Gold, Kasami. and estended S(2)

sequences are discussed.

4.1 Maximal Length Shift Register Sequence

The maximal length sequences (or m-sequences) are one of the most well-known

classes of P N sequences that satisfj- the randornness properties given in the previous

section. By definition. m-sequences have the masimum possible period that a Iinear

feedback shift register (LFSR) of a @\-en degree can generate. Figure 4.1 illustrates

the typical structure for a r-degree LFSR.

For a r-degree binary LFSR. there are 2' possible states, each corresponds to the

different contents that reside in the shift register. Since the riumber of states of the

Figure 4.1: The structure for a r-degree Linear Feedback Shift Register

LFSR is finite, the LFSR sequences are periodic 1331. To generate sequences with the

maximum possible period, the LFSR cycles through every possible state escept for

the all-zero state. as the subsequent states of the dl-zero state is always the all-zero

state. Therefore the maximum possible period .V for a r-degree LFSR is - 1 since

there are only 2' - I non-zero shift registers states.

Let {g17.. . ,g,},gi E {O. l}: 1 5 i 5 r, be the binary feedback coefficients of the

LFSR as s h o m in Figure 4.1. At each clock cycle, the LFSR shifts al1 contents to the

right and cornputes the feedback input. ai. The sequence { a * } is generated according

to the recursive formula

where gk, at E {O, 1}: 1 5 k 5 r and & denotes modulo-2 sum.

Define the output function of the LFSR as G(D),

where D is the delay operator. G ( D ) is called the generating polynomial of the shift

registers sequence. Combining Equations (4.2) and (4.3), the generating polynomial

becomes

Equation (4.4) gives:

where go(D) = zLz1 e9kDka-iD-' + . . . + a-lD-i and f (D) = 1 + EL,, @gkDk.

Therefore, the infinite generating polynomial G ( D ) can be espressed as a ratio of two

finite polynomials go(D) and f (D) . The denominator polynomial go(D) is dependent

on the initial load {a - , . . . . a- 1 } of the shift registers sh i ch determines the phase shift

of the sequence {a,}. The numerator polynomiai f ( D ) in Equation (4.5) is called the

characteristic polynomial for the LFSR sequence. This polynomial determines the

characteristics of the sequence {ai} such as the period length.

To generate an m-sequence. the characteristic polynomial f (D) of the LFSR must

be primitive. A polynomial of degree r is primitive if the following two conditions are

satisfied:

1. The smallest integer n for which f (D) divides Dn + 1 is n = 2' - 1 = N, and

2. f (D) is irreducible (non-factorable). i.e.. f ( D ) # f l ( D ) - f i (D) .

Figure 4.2: -4 %stage m-sequence generator

Table 4.1: A list of m-sequences generated using primitive polynomial f (D) = 1 +

.\nother restriction on generating m-sequences is that the initial state of the LFSR

D + D 2

has to be non-zero since a all-zero initial state generates only the all-zero sequence.

I n i t i a l l ~ a d { a - ~ , a - ~ ) { O : 11

Primitive polynomials exist for al1 values of the degree of the generating polpo-

mial T, r > 1. It is also showm in [33] that the number of primitive polynomials of

Statestransitions O 1 + 10 + 11 + O 1 + . . .

degree r is equal to

(ai 1 1~01l0110. - .

where {Pi, i = 1.2. . . - . k} is the prime decomposition of 2' - 1. That is.

where ni is an integer. -4 complete list of primitive polynomials with degree r 5 34

can be found in Peterson and Weldon [34].

Figure 4.2 illustrates a fi-stage m-sequence generater with primitive polynomial

f ( D ) = 1 + D + D2. The sequence { a i } is periodic with period N = 3. Table 4.1

lists the different m-sequences generated using the LFSR in Figure 4.2 with different

initial loads. The state transitions of each sequence are also shown in Table 4.1.

As observed from Table 4.1, using different initial loads resulted only with a

different phase shift of the same m-sequence. Without loss of generality, the initial

Figure 4.3: Autocorreiation function for an rn-sequence nith chip duration Tc and period NTc

- state of the shift registers is generally chosen to be a-1 = a-7 = . . . - al - , = O' a-, =

1. Therefore, the denominator of Equation (4.5) is simplified to go(D) = gr = 1 for a

r-degree m-sequence generator. The generating polynomial in Equation (4.5) is thus

reduced to 1

The normalized autocorrelation of any m-sequence is P-valued [33]. Denote Re&)

be the normalized autocorrelation funct ion?

where a( i ) = 1 -2a, is the ilh chip of the binary antipodal rn-sequence. 2 is any integer

and AT is the sequence period. Figure 4.3 illustrates the 2-valued autocorrelation

function for an m-sequence.

The cross-correlation functions of m-sequences are not well-behaved: they may be

many-valued functions. depending on the pair of sequences in question. The Iower

bound on the normalized cross-correlation between any pair of binary sequences of

period N in a set of m-sequences is [47]:

There exist composite code families t hat utilize- the ni-sequences to produce sets

of low cross-correlation codes. The Gold and Kasarni codes are among these and they

are widely used in practice as spreading sequences.

4.2 The Gold Sequences

The Gold code sets [44, 453 are generated by the summation of two distinct m-

sequences of the same period. Consider a binary m-sequence of penod N and let it

be represented by the vector a. Consider another sequence a' obtained by sampling

every qth symbol of a. The sequence a' is said to be a decimation of sequence a and is

denoted as a' = a[q]. It is proveo that the sequence a' is a m-sequence with penod N

if and only if gcd(N, q ) = 1, where "gcd(a, b)" denotes the greatest common divisor

of integer a and b [48]. Thus, any pair of m-sequences having the same period N

can be related by a' = a[q] for some q. The two m-sequences a and a' are called the

preferred pair if the following two conditions are satisfied:

1. r # O(mod4), where r is the degree of the shift register, and

2. q is odd and either q = 2' + 1 or q = 22k - 2k + 1 for some k

1 for r odd gcd(r, k) =

2 for r = 2(mod4)

If a and a' is a preferred pair, then the family of Gold codes

t hat sat isfies

(4.1 1)

for this preferred

pair of m-sequences is defined by {a, a'? a + a': a + Da', a + ~ ~ a ' , . . . , a t DN-la'}

where D is the delay element. The cross-correlation functions of the Gold farnily are

three-valued, where those three values are {-F, - k, k [t(r) - 211, and

for r odd for r even.

Tt is easily verified that the number of codes in the Gold farnily is N + 2 where N is

the sequence period.

Figure 4.4 illustrates the generation of a Gold sequence using two m-sequences

whose primitive polynomials are fi (D) = 1 + 0 + D3 and f2(D) = 1 + D2 + D3. The

Figure 4.4: Generating a Gold sequence of period N=7

different code sequences in the set can be generated using different initiai shift register

loads to obtain the desired sequence. The cross-correlation function of the above Gold

4.3 The Kasami Code

code set have values {-$. -$. q } . The correlation rnatrk for this particular code set

The Kasami family [46] is ariother class of important P N sequences that have low

is R = $

cross-correlation values between each sequence pair. Consider a m-sequence a of

- L

r 3 -1 -1 -1 -1 -1 -1 -1 - 3 7 -1 3 -1 -5 -1 3 -1

-1 -1 7 -1 -1 -1 -1 -1 -1 c. -1 3 -1 1 -1 -1 -1 -1 -1 - -1 -1 -1 -1 r -1 -1 -1 -1 - -1 -5 -1 -1 -1 r -1 -1 -1 - -1 -1 -1 -1 -1 -1 r -1 -1

-1 3 -1 -1 -1 -1 -1 T -1 - _ -1 -1 -1 -1 -1 -1 -1 -1 r _

period N = 2' - 1 where r is even. -Usa consider a second sequence a' which is obtain

by decimating a by 25 + 1. I t can be verified that a' is another m-sequence with

period 25 - 1 [35]- The family of Kasami sequences with M = 25 sequences is defined

by {a'a + a'. a + Da'. a + D'a'. . . . a t Di-2a'}. The auto-correlation and cross-

correlation of these sequences take on values from the set {-1: -(25 + l), 25 - 1).

Figure 4.5 illustrates the generator for a Kasami sequence of period !V equals 15.

Figure 4.5: Generating a Kasami sequence of period 3=4

The primitive p o l ~ o m i a l s for sequence a and a' are fi(D) = 1 + D3 + D4 and

f2 ( D ) = 1 + D +D2, respectively. The auto-correlation and cross-correlation functions

of the above Kasami code set have values {-&, -&, 5). The correlation matriu for r 13 -3 -5 -a 1

4.4 The extended S(2) sequences

this particular code set is R =

The extended S(2) sequences is chosen by the 3GPP group as the one of the standard

spreading sequences to be used in the third generation MiCDM.4 system [36]. At the

time of writing this thesis. there is no literature reference that gives the details on

the theory behind these codes. However. in Our simulation result (to be presented

in Chapter 5 of this thesis). it is demonstrated that the system spreading with the

extended S(2) sequences gives superior performance than those using other spreading

sequences.

The extended S(2) code family has 224 - 1 different code sequences, each with

period length ?V = 256. Each extended S(2) sequence is generated by extending

and mapping a length-255 quaternary S(2) sequence to a length-256 cornplex-valued

sequence. Hence, the code family is termed extended S(2).

-5 15 -5 -3 - - 15 -5

mod 2 1 ? I

@ multiplication

@ rnod n addition

Figure 4.6: The S(2) sequence generator

Each S(2) sequence is generated by modulo-4 addition of a quaternary sequence,

{ a r } : and 2 bina- sequences. {bi) and { d l ) These three sequences are 8-degree

LSFR sequences and are generated recursively according to the follon-ing generating

polynornials:

The generator for the S(2) code is shown in Figure 4.6. The initial loads for the

three LFSRs are determined froin the user number. Let jZ3 j2* . - . jO be the 24 bit

bina^ representation of the user number j, O 5 j 5 255. The initial loads are

a,l = 2 j o + 1 mod4,

a-i = 2ji,1 mod4, i = 2 . . . 8 .

b,i = jiCi mod 2, i = 1 . . .8.

Table 4.2: Mapping from quantery S ( 2 ) sequences to extended S(2) sequences

d-i = jlS+* mod 2, i = 1 . . -8.

The S(2) sequence for the j th user, {z,(i)}: of length 252 is generated according

to the folloning relationship:

~ ~ ( 1 ) = ai + 2br + 2dr mod 4 ,1 = 0: . . . .254. (1 .13)

This sequence is extended to length 236 by setting zj (255) = zj (O) -

The jth extended S(2) sequence. (C,(l)), is obtained by

a j ( l ) = n l ( l mod 236) ( 1 i j(-l) 'm2 ( L ( 1 mod 2 5 6 ) / 2 ] ) ) . ( 4 . 1 4 )

where m l ( l ) and m z ( l ) are mappings defined in Table 1.2: L-] denotes rounding to

the oearest lowest integer: and 1 = 0: 1:. . ..

4.5 Chapter Summary

This chapter stated the three commonly used spreading families for real applications.

These three code families are the Gold. Kasami and estended S(2) codes. Both

the Gold and Kasami codes are bina- sequences that have well-controiled cross-

correlation properties. In addition. the Kasami codes also have wll-controlled auto-

correlation properties. The estended S(2) codes are comples-valued codes nith the

advantage that they can supply a large number of code sequences mith good random-

ness properties. The performance of these codes for the IIC algorithm studied in tbis

thesis wïIl be given in the foilowing chapter.

Chapter 5

Iterat ive Interference Cancellat ion for High Data Rate Users in WCDMA

In contrast to Chapter 3, the performance of different IC schemes are verified in this

chapter using a more refined CDM-4 mode1 where actuai spreading takes place. This

chapter begins with the detail system parameters used in the cornputer simulations to

assess performance. The performance of different IC algorithms on common spreading

codes used in practice, such as the Gold, Kasami, and extended S(2) codes, are

presented. In the computational results to be given in this Chapter which involve

the use of a pre-processor. the MMSE case defined in Equation (3.16) was employed

as the pre-processing sub-system. This was done to avoid the possibility of having a

singular matrix to define the pre-processor which can occur for the decorrelator case.

5.1 System parameters

In this thesis, our system is targeted at the 384 kbps third-generation WCDMA

service. The available channel bandwidth, Wo for WCDMA is about 5MHz [4]. When

rate-; convolutional code is employed, the processing gain of the particular system is

given by

nhere B is the bandwidth of the encoded bit. To achieve the desired BER of

IO-'' the required SXR for a rate-?, constraint length 7, convolutional code is equal to

45dB [3]. Using Equation (2.10), only 5 users can be supported by such system a i t h

a processing gain of 7 when conventional CDMA detector without MUD is employed.

5.2 Iterative Interference Cancellation with differ- ent spreading sequences

Methods of spreading can be divided into 2 categories: spreading using sequences

with period larger than the bit period. i.e., N > PG. and spreading using sequences

with period equal to the bit period, i.e., N = PG. These two types of spreading

are referred as long and short spreading, respectively, in this thesis. The use of long

spreading complicates the task of MUD [?] since the code segments used for spreading

va- for each data syrnbol. On the other hand, the identical cross-correlation matrL~

in short spreading simplifies MUD, but a good spreading code family does not exist

for al1 period lengths N. Table 5.1 shows the number of available sequences of each

code family for a given period length N. Given a system with processing gain of 7,

the only code family with such a period length is the 3-degree Gold famil. Thus, the

3-degree gold code set is considered for short spreading, while the Kasami and the

estended S(2) codes are used for long spreading in this thesis.

5.2.1 Spreading with Gold sequences

The 3-degree Gold code set %th penod length AT = 7 is generated by using primitive

polynomials fi (D) = 1 + D2 + D3 and f2(D) = 1 + D + D3 (341. This code set has

only 9 available sequences and thus only 9 users can be supported. This Gold code

I number of seauences 1

Table 5.1: Number of available sequences of each spreading code family

set has normalized cross-correlation matLu

degree r

-4s observed from the cross-correlation matris. some spreading sequence pairs exhibit

larger cross-correlation than others. In particular. the sequence assigned to the sec-

ond user (the second column or row of the matr~x) has the worst cross-correlation

properties among the 9 users.

The performance of the brute force IIC algorithm on a 9-user system using Gold

spreading codes is demonstrated in Figure 5.1. It is observed that many iterations

are needed for this algorithm to converge CO the single-user performance bound. In

particular: at an SNR of 43dB. 7 iterations are needed. The reason for the slow

convergence is demonstrated by an esample shown telow.

Table 5.2 illustrates the number of errors each user has in a bit Stream of 0.2

million bits when using the iterative brute force IC algorithm at an SNR of 5 dB for

the first 4 iterations. It is noted that the user with the most errors alternates between

2 3

2 -

Period L\. i Gold Kasami

4 5 6 7 8 9 10

- -

ixtended S(2) 3 - 1

3 - 9

- - - -

z2' - 1 (X=226) - -

l a 31 63 127

255/256 511 1023

- 33

4 -

65 '

129 -

513 1025

8 -

16 (3=255) -

32

Figure 5.1: Performance of the Brute Force IIC Algorithm on a 9-user system n-ith processing gain of 7. spreading ~ l t h Gold sequences.

1 number of errors in 0.2 million bits at SNR=SdB 1

I I 1 I 1 1 1 I 1

2 iterations 1 8 1288101 O 1 O T 7 1 4 8 1 1 O 1 7 1 4 1 conventional receiver

1 iteration

1 I t 1 1 I 1 I r

3 iterations l 4 ? ! 6 1 O 1 4 4 1 2 1 7 3 5 0 1 O 1 6 4 1 6 1

Table 5.2: Error Profile for the Brute Force IIC algorithm using 3-degree Gold code at an SNR of 5dB

1

#3 84 3

#l 2038 797

#9 106 9

#a 81178 8978

#4 2120 830

#5 105 9

#6 34952

#7 88

#8 1944

53250 1 4 847

the second and the sixth user at each successive stage. This alternating phenomenon

is the key reason for the slow convergence. and the esplanation for this phenomenon

is as follows.

In order to obtain performance gain through the use of the parallel interference

cancellation algorithm, the A,I-kI estimation used must be relatively more reliable than

the received signal for the user in question. That is, the decoder decisions made for

the interfering users must be more reliable than the decoder decisions made for the

user in question. For the case shown in Table 5.2, performing IC on the second user

at the first iteration removes most of the MAI and resuits in fewer errors because

the estimated k1--1 is obtained from relatively reliable sources. On the other hand,

performing IC on the s ~ x t h user worsens its performance due to the unreliable 11-41

estimation caused bu the second user. Recail from Equation (2.13) that an incorrect

bit decision made for a particular user doubles its MAI contribution and further

degrades the quality of signal in question. Since the cross-correlation value between

the second user and the s h t h user is large. i.e., f i s = - k. I . the degradation caused

by an incorrect decision is detrimental. Therefore, at the end of the first iterative

IC stage. the sixth user resuits in more errors than its previous stage. Follo~ving the

same arguments, the sisth user results in fewer errors but the second user results in

more errors at the end of the second iteration. This situation keeps alternating until

the IC algorithm or the decoder makes no further improvement. Xotice that this

alternating phenomenon does not occur for users other than those mentioned above.

This is mainly due to the good crosçcorrelation properties between the other users

and the two aforementioned users. Therefore, the impact of performing IC using

incorrect estimates of both the second and the sixth users is not as detrimental.

-At a first glance. one might believe that serial caricellation is the best candidate

for solving the aforementioned problem. Serial cancellation works weli when the users

are received with unequal power strengths. In such a case. stronger users are usually

the reliable users and they contribute a larger percentage of the interference power

toward the nreaker users. Howevert in a case n-hen each user pair has its ou-n cross-

correlation. the reliable users are those who interfere other users the least 11-hile the

unreliable users are those who interfere others the most. Therefore. these two cases

are not equiwient. Fortunatelx a somewhat similar approach can be employed to

lower the initial BER for the two dominant interfering users to accelerate con\-ergence.

The algorithm used n-il1 be called the preliminary IC algorithm.

The preliminary IC algonthm is ernployed pnor to the regular IIC algorithm to

improve the initial XI,U estimation for a feu7 selected users. These users are usu-

ally the dominant interfering users and are determined by the cross-correlation ma-

trix. Starting with the most dominant interfering user. the preliminary IC algorithm

successively improves the fidelity of the estimated MAI for the user in question by

utilizing the result obtained from the previous stage of this algorithm. Figure 5.2

illustrates the procedures of a Su-user preliminary IC algorithm. Suppose the mobile

users are ranked with a lower index indicating a more unreliable user. The prelim-

inary IC is a simplified 4L-stage parallel IC algorithm where neither decoding nor

encoding procedures are involved. It uses the initial decoder decisions to improve

the estimation on the matched-filter outputs for the first ,Y, users on a user-by-user

b a i s and provides an improved -\LAI estimate at the end of the algorithm. Recall -0

that bj = [ bYl0 . . . &?-'*O ] denotes the estirnated received sequence for the j th -re f ined

user based on initial decoder decisions. Let b, = [ $.re fined 'L,- ivre fined ... b, 1 be the refinement of $ resulting from the preliminary IC algorithm. ;\t each stage

-re f ined x, 15 x 5 Xu, o, is obtained frorn an IC process for the user in question using

-re f ined -0 the refined received sequences 4, . I 5 n 5 rr - 1. and the original sequences on, x 5 n 5 1%. The algorithm continues for each user in succession until al1 -\-u users

are considered.

The procedure of the brute force IIC algorithm with a Su-stage preliminary IC

prior to its first iteration is formulated as follows:

Step(l) Initialization:

Figure 5.2: The &stage Preliminap Interference Cancellation .Algorithm

Step(2) Obtaining results from the initial decoding procedure

for 1 5 n 5 Nu -0 Y , = &

ü0 = decode (II-1 (2)) -n -0 on = n (e7zc.de (Q )

S tep (3) Preliminary IC algorit hm:

(i) Ini tialization:

for 1 5 n 5 AT,

iref incd - -0 -n - bn

(ii) Recursive algorit hm:

aref ined hr -re f ined

-x = EjZl Pjz bj bref incd -z = sgn (% - -r arefined)

(iii) Result Update:

for 1 < n 5 !Vu

Step(4) Proceed with regular Brute Force IIC algorit hm:

for 15 n < i& -k- 1

?jk = - gn -n

Ü" ddecode (II-1 (Q")) -n 4

-k on = il (encode (g:))

for l < n 5 1%

2 2 5 3 3.5 4 4.5 5 SNR (dB)

Figure 5.3: Performance of the Brute Force IC on a 9-user system with processing gain

IIC Algorithm with a 2-stage preliminary of 7, spreading with Gold sequences.

3' = p u -n ) = i j # n Pjn . bj

Step(5) Final decisions:

for 1 5 n 5 hYu

- -.ch' I n - -n

Figure 5.3 shows the performance of a 9-user CDMh srstem with a 2-stage prelimi-

nary IC algorithm prior to the first iterative stage of the regular IIC algorithm. The

two selected users are the second user and the sisth user gken in Table 5.2 according

to the cross-correlation matris in Equation (3.2). It is shown in Figure 5.2 that an

accelerated rate of convergence is pursuant which is attnbuted to the use of the pre-

liminary IC algorithm. Kote also that only 5 iterations are required for converging to

the single-user bound when the SXR is equal to 4.5dB. The improved performance

is obtained by an estra step that searches for the dominant interfering users. Notice

that the prelirninary IC algorithm does not require the decoding, encoding, interleav-

ing and deinterleaving procedures. Therefore. the delay incurred is minimal when

compared to the regular IIC aigorithm.

Partial interference cancellation or soft interference canceilation can also be a p

plied to the prelimina- IC algorithm as a further enhancement. Interference can-

cellation using the partiai preliminary IC algorithm is formulated by modifying the

third step from the ordinary p re i iminq IC algorithm as fol!ows:

Step(3)Preliminary IC algorithm:

(i) Initializat ion:

for 1 5 n 5 -Nu

iref lned -n = b0 -n

(ii) Recursive algorit hm:

f o r l ~ x < X ' ,

aref ined hU -r = YTe El=lj+r P ~ Z - -j irefined - te f ined k = sgn (& - -r arefined)

(iii) Result C'pdate:

where yPre denotes the fraction to cancel for the prelirnin ; IC dgorithm.

The soft preliminaq IC cancellation is formuiated by modifying the same step as

Step (3) Preliminary IC algorit hm:

(i) Initialization:

-re f ined -O - on - bn

(ii) Recursive algorithm:

(iii) Result Update:

,PO = pu -n j=ij+n P j n mdti

where 40, denotes the reliability sequence for the nth user gimn by the initial decoding

procedure and rnulti(at b) denotes element-by-element multiplication of vector a and

vector 6.

2 5 3 35 4 5 SNR (dB)

Figure 5.4: Performance of the Brute Force IIC Algorithm combined with a 2-stage Partial Pre l iminq IC on a 9-user system with processing gain of 7. spreading with Gold sequences.

Figures 5.4 and 5.5 demonstrate the performance of using partial preliminary

cancellation and soft preliminary cancellation, respectively. Both algorithms converge

to the single-user performance bound in 4 iterations at an SXR of 4.5dB. For the case

in Figure 5.5. the soft preliminary IC algorithm converges faster in the low-SNR

Figure 5.5: Performance of the Brute Force IIC AIgorithm combined with a 2-stage Soft Preliminary ZC on a 9-user system with processing gain of 7. spreading with Gold sequences.

Figure 5.6: Performance of the MMSE pre-processor on a 9-user system with pro-

I

Y

cessing gain of 7, spreading with Gold sequences.

1 o4

+ convenhonal recenier 4 MMSE Deimor

1 f 1

2 25 3 3.5 4 4 5 5 SNR (dB)

region.

-4 pre-processor can also be used in combination with the preliminary and the

i t erative IC algorit hm. However, the cross-correlation m a t r k given in Equat ion (3 2 )

is a singular matrix: therefore. only the MMSE pre-processor can be applied. Figure

5.6 demonstrates the performance of the bIbISE receiver. It shows that the gain

in performance in this particular case is v e l insignificant. Therefore. no work was

pursued in this direction. However: the use of the preliminary IC algorithm improves

the convergence by 3 iterations at an SNR of 4.5dB and ion-ers the threshold by O.5dB.

5 2 . 2 Spreading with Kasami sequences

Different Kasami code sets can be applied to a CDM-4 system for long spreading.

To ease irnplernentati~n~ the set with the smallest degree that gives sufficient code

sequences should be considered. Based on this criterion. the 8-degree Kasami set

of 16 available sequences each with period length of 255 is selected. The primitive

polj-nomial that generates the chosen Kasarni set is f ( D ) = 1 + D2 + D3 + D4 + Da. Since the period length of the spreading sequences esceeds the processing gain of the

system. consecutive segments of the Kasami sequences are used for spreading each

data symbol. The simulation result using a brute force IIC for a 9-user CDM-4 system

is shown in Figure 5.7.

Figure 5.7 shows that the brute force IIC algorithm requires a minimum SKR of

4dB to get some satisfactory performance gain. Jllso' a t an SNR of 4.5dB: 8 iterations

are needed for the algorithm to converge to the single-user performance bound. The

least satisfactory performance in this case is due to the Iarge cross-correlation d u e s

between the spreading sequences. Since only segments of the Kasami sequences are

used for spreading. the good cross-correlation properties of the Kasami familj. cannot

Figure 5.7: Performance of the Brute Force IIC algorithm on a 9-user system with processing gain of 7, spreading with Kasami sequences.

be maintained. -4 typical cross-correlation matris obtained from the simulation is

Figure 5.8 shows the simulation result of using a partial cancellation algorithm

with cancellation fractions of 60% for the first iteration and 100% for the remaining

iterations. Total convergence requires 4 iterations at an SNR of 4.5dB for this algo-

rithm. which is an improvement of 4 iterations n-hen compared to the brute force IIC

algorithm. Note that the threshold SNR is also lowered from 4dB to 3.5dB.

The performance of the soft IIC algorithm on Kasami sequences is shown in Figure

9 In the high-SNR region. the soft algorithm gives similar performance as the

Figure 5.8: Performance of the Partial IIC Algorithm on a 9-user system 111th pro- cessing gain of 7, spreading with Kasami sequences.

SNR (dB)

Figure 5.9: Performance of the Soft IIC -Algorithm on a 9-user system with processing gain of 7: spreading with Kasami sequences.

Figure 5.10: Performance of the Pre-processor-aided Brute Force IIC algorithm on a 9-user system nith processing gain of 7, spreading with Kasami sequences.

partial algorithm. In the lon-SNR region. the soft algonthm performs significantly

better. The threshold SNR is further lowered to 3dB by the soft IIC algorithm.

Pre-processing can also be applied to each IIC algorithm to achieve better per-

formance. Figure 5.10 shows the result of using a XISISE pre-processor in combi-

nation with the brute force IIC algorithm. Only 3 iterations are required for such

an algorithm to converge to the single-user bound at an SYR of 4.5dB. which is an

improvement of 1 iteration relative to the partial IIC case and 5 iterations relative

to the brute force case. Howec-er, the improvement is obtained at the espense of

increased computational complesity. In the case of Kasami codes ( N = 255) and the

estended S(2) codes ( N = 256) to follow. the matrix (R + 91~") in Equation (3.16)

must be computed and inverted on a symbol-by-symbol basis. The pre-processor mas

not used for the short Gold code. but if it is used. the MMSE matris is required to

be computed once.

Figures 5.1 1 and 5.12 show the performance of using a MMSE pre-processor in

Figure 5.1 1 : Performance of the Pre-pmcessor-aided Partial IIC Algorithm on a 9- user system with processing gain of 7: spreading nith Kasami sequences.

SNR (dB)

Figure 3.12: Performance of the Pre-processor-aided Soft IIC -4lgorithm on a 9-user system with processing gain of 7. spreading wit h Kasami sequences.

-e- average MMSE receiver

IO-= I I 1

2 25 3 3.5 4 4 5 5 SNR (dB)

Figure 5.13: A cornparison on average hISISE detector and optimal MMSE detector

combination with the partial cancellation and the soft cancellation algorithm. respec-

tivel. Both algorithms accelerate the convergence rate especially in the Ion-SNR

region. The threshold SSR is lowered to 3dB for the partial IIC case and 2.5dB for

the soft IIC case.

Instead of using a different 31MSE pre-processor for each symbol interval, the

performance of using an average &I.\ilSE pre-processor is studied. The average MXISE

pre-processor is obtained by

where R = EL, R' is the average cross-correlation matris. iV is the period length

of the spreading sequence. R' is given in Equation(2.27). 2 is power spectral density

of the noise in -4IVGX cchannel. and Inru is an ArK x i\i, identity matrix Figure 5.13

compares the performance of the conventional receiver: the average MMSE receiver

and the optimal MMSE receiver. The figure shows that the average MMSE receiver

is quite inferior to both the optimal MMSE receiver and the conventional receiver.

Figure 5.11: Performance of the Pre-processor-aided Soft IIC .Algorithm on a 10-user system with processing gain of 7. spreading with Kasami sequences.

Figure 5-15: Performance of the Pre-processor-aided Soft IIC Algorithm on a Il-user system \vit h processing gain of 7. spreading wi t h Kasami sequences.

With the optimal h1XfSE pre-processor. more than 9 users can be supported using

the soft IIC algorithm. Figure 5.14 and 5-15 show the simulation resuits for a 10- and

Il-user system, respectivel. At an SNR of 4.5dB, 4 iterations are required to achieve

the desired performance tevel for the 10-user -stem. However. many iterations are

required for the Il-user system to achieve the same performance level. Sote that

an SNR of at l e s t 3.5dB is needed to get an- reasonable performance gain for the

10-user system.

5.2.3 Spreading with extended S (2) sequences

The implementation i>f the estended S(2) code ntas presented in Chapter 1. Adopted

by the 3GPP group. this code family is designed to give a large number of sequences

with good cross-correlation properties (361.

The extended S(2) family with period length rV = 236 has 2*" - 1 available code

sequences. Each user selects its spreading sequence according to its user number.

Figure 5.16 demonstrates the performance of the brute force IIC algorithm on

a 9-user system spreading with extended S(2) sequences. -At an SYR of 4.5dB, 5

iterations are needed to converge to the single-user bound. Comparing to the case

when Kasami sequences are used (see Figure 5.7) . the estended S(Z) codes perform

relatively better. Fewer number of iterations are required for the system employing

the estended S(2) sequences to converge to the single-user bound at any given SXR.

Figures 5.17 and 5.18 demonstrate the performance of the partial and soft inter-

ference cancellation algorithms. respectivel. Total convergence requires 3 iterations

for the partial algorithm and 4 iterations for the soft algorithm a t an SXR of 4.SdB.

These 2 algorithms both lower the threshold SXR from 3.5dB to 2.5dB when com-

pared to the brute force case. Xotice that the partial IIC algorithm converges faster

in the high-SNR region for this case. When the decoder decisions on the interfering

users are reliable, a large cancellation fraction gives better performance than a small

one. Thus, soft IIC may not give better results when compared to the partial IIC in

2 2 5 3 3 5 4 5 SNR (dB)

Figure 5.16: Performance of the Brute Force IIC Algorithm on a 9-user system with processing gain of 7: spreading mith estended S(2) sequences.

4 1 ilerahon. oInb Parbal 1C 1 O* 4 2 flCrah0ftS

j -& 3 rterabons . +- 4 ~leralions . - 5 itemions

2 2.5 3 3.5 4 4 5 5

Figure 5.17: Performance of the Partial IIC -Algorithm on a 9-user system with processing gain of 7: spreading with extended S(2) sequences.

Figure 5.18: Performance of the Soft IIC Algorithm on a 9-user system with process- ing gain of 7, spreading with estended S(2) sequences.

the high-SNR region.

Figure 5-19 shows the performance of the pre-processor-aided brute force IIC

algorithm. Only 3 iterations are needed at an SNR of 4.5 dB to converge to the

single-user bound. which is an irnprovement of 2 iterations compared to the non pre-

processed case in Figure 3.16. Compared to the soft IIC case in Figure 5.18: the

pre-processor-aided brute force algorithm does not perform as me11 in the low-SNR

region. The t hreshold SXR for the pre-processor-aided brute force algorithm and the

soft IIC algorithm are about 3.5 and 2.5 dB. respectively.

\frithout the aid of the pre-processor, the systern that employs soft IIC can support

11 users. Figures 5.20 and 3.21 demonstrate the performance of a 10- and Il-user

system. respectively. For the IO-user system. 6 iterations are required at an SXR of

4.5dB to achieve a BER of IO-". For the Il-user system. T iterations arc required.

The threshold SKR for these 2 systems are 3dB and 3.5dB. respectively.

With the aid of the pre-processor, the Il-user system ernploying the soft IIC al-

Figure 5.19: Performance of the Pre-processor-aided Brute Force IIC -Aigorithm on a 9-user systern with processing gain of 7: spreading n-ith estended S(2) sequences.

SNR (dB)

Figure 5.20: Performance of the Soft IIC -Algorithm on a 10-user system cessing gain of 7, spreading with extended S(2) sequences.

with pro-

Figure cessing

5.21: Performance of the Soft IIC algorithm on a Il-user systern gain of 7. spreading with estended S(2) sequences.

with pro-

Figure 5.22: Performance of the Pre-processor-aided Safi IIC algorithm on a Il-user systern with processing gain of 7: spreading with extended S(2) sequences.

Figure 5.23: Performance of the Pre-pmcessor-aided Soft IIC algorithm on a 12-user system with processing gain of 7. spreading with extended S(2) sequences.

gorithm requires only 5 iterations to converge to the single-user performance bound

at a n SNR of 4.3dE. Figure 5.22 demonstrates the simulation result of such a sys-

tem. Note that the operating SXR has to be above 3.5dB to obtain any reasonable

performance gain. Csing the same algorithm. it is also possible to support 12 users.

The pre-processor-aided soft IIC algorithm requires T iterations at an SNR of 4.5dB

for the 12-user system to converge to the single-user bound.

5.3 Multi-user Interference Cancellation with In- creased Processing Gain

It is desirable to compare the performance of the IIC algorithm on a system with a

different code rate and a different processing gain. In this section. the performance of

the iterative interference cancellation algorithms with a larger processing gain using

both rate-$ and rate-f convolutional codes are esamined. The uncoded processing

gain considered is 30 such that the coded processing gain obtained from Equation (

5.1) are 15 and 10 for the rate-; and rate-$ code. respectively. The spreading code

farnily considered in this section is the extended S(2) code. It is shown in the previous

section that the systeïn using the estended S(2) sequences gkes superior performance

to those using the Gold or Kasami sequences.

To achieve a performance level of BER=10-'. the rate-?. constraint length 7. con-

volutional coded system employing conventional detector can support 6 simultaneous

users ulth a required SNR of 4.5dB.

Figure 5.24 demonstrates the performance of the brute force IIC algorithm on

a lbuser system using rate 4 convolutional code with coded processing gain of 15.

To achieve a BER of IO-': 4 iterations are needed for the brute force algorithm to

converge to the single-user performance at an SNR of 4.5dB. Sotice that the number

of user that can be simultaneously supported by the CDM-4 system employing IIC

algorithm is tripled when the uncoded processing gain is increased to 30.

Figure 5.25 demonstrates the performance of the brute force IIC algorithm on a

18-user system using rate-) code. The FEC code considered is the constraint length

9 convolutional code with generators (557.663.711) in octal. To achieve the desired

performance level. Le.. BER=10-'. 4 iterations. determined from Figure 5.25. are

required at an SKR of 3.5dB. Thus. the performance gain in terms of the convergence

rate obtained by using a lower rate code is insignificant. Hon-ever. the rate f code

requires a lower SXR to achieve the same performance level. This gain is obtained at

an increased computational complexity at the decoders.

5.4 Chapter Summary

The performance of the IIC algorithms with different spreading sequences are studied.

When the 3-degree Gold spreading sequences are used, the regular IIC algorithm fails

to provide a satisfactory performance. To solve this problem, a preliminary IC algo-

rithm is developed to accelerate the convergence rate. Using the partial preliminary

IC algorithm on a 9-user system. an improvement of 3 iterations is obtained at an

SNR (dB)

Figure 5.24: Performance of the Brute Force IIC Algorithm on a 18-user system using rate-; convolutional code with uncoded processing gain of 30

4 1 neratcon IO" 7 + 2 mations

I 4- 3 Rerarions + 4 ctara0ons

22 2 4 2.6 28 3 32 3.4 3.6 3.8 4 SNR (dB)

Figure 3.25: Performance of the Brute Force IIC Algorithm on a 18-user system using rate-+ convolutional code with uncoded processing gain of 30

SNR of 4.5dB.

IVhen the 8-degree Kasami spreading sequences are used. the best result is ob-

tained by using the pre-processor-aided soft IIC algorithm. The coefficients of the

pre-processor need to be updzted at every s-vmbol interval which increases the corn-

plesity of this algorithm significantly. For a 9-user system, the soft IIC algorithm

without pre-processing is only 1 iteration inferior to the one with pre-processing.

With the pre-processor-aided soft IIC algorithm, 10 users are possible at an SNR of

4.5dB with 4 iterations.

When the extended S(2) sequences are used. the soft IIC algorithm without the

aid of the pre-processor gives satisfactory performance on a 9-user system. Only 4

iterations are required for the ?stem to achieve the single-user performance at an

SXR of 4.5dB. To support 11 users, the pre-procesor-aided soft IIC algorithm is

needed for the system to converge in a reasonable number of iterations. In particuiar.

5 iterations are required at an SNR of 4.5dB.

For the system with uncoded processing gain of 30, the brute force IIC algonthm

on the rate-; coded system can support 18 users . When the rate-? code is employed.

a lower SNR can be used to obtain similar performance.

Chapter 6

Conclusions

6.1 Conclusions

The performance of muhi-user interference cancellation algorithms in a convolutional

coded CDM-4 system was evaluated in this thesis. The following points summarize

the major results:

1. For the AWGK channel, the use of an iterative interference cancellation algo-

rithm can double the number of high-bit-rate users in WCD3.I-1. In the case of

Gold codes, 9 users can be supported 11-hen the soft preliminary IC algorithm

is employed. in the case of Kasami codes. 10 users can be supported when the

pre-procesor-aided soft IIC algorithm is used. For the same algorithm, 11 users

can be supported in the case of extended S(2) codes.

2. The use of the 3-degree Gold spreading sequences demonstrates a phenornenon

where a particular user signature sequence esperiences much stronger interfer-

ence than other users in the system. In this case, the preliminary IC algorithm

is required to obtain satisfactory performance.

3. The performance of IIC on the estended S(2) codes is superior to that of the

Kasami codes. For each IC scheme. fewer number of iterations are required for

the system empIoying estended S(2) sequences to converge to the single-user

performance bound.

4. The amount of improvement obtained frorn the pre-processor-aided IIC varies

wit h the channel characteristics such as the cross-correlation values. In the

case of the Gold spreading sequences, the performance gain £rom using a pre-

processor is very insigdcant. On the other hand, improvements of a iterations

for the Kasami sequences and 2 iterations for the extended S(2) sequences are

O btained when compared to the non-pre-processed cases.

6.2 Suggestions for F'uture Work

The use of iterative interference cancellation algorithrns was shown to increase

user capacity of the CDMA system. Such results were obtained by cornputer

simulations that assumed perfect carrier and timing s~chronizat ion. One

should investigate the sensitivity of these algorithms without these assump

tions.

Perfect power control was also assumed in this thesis. One should consider

studying these algorithms with power control error.

In order to perform MUD: the knowledge of channel parameters are required. It

would be desirable to combine channel estimation with interference cancellation

and study the sensitivity of estimation error.

The work in this thesis was focused on the .4WGN channel. It would be desirable

to study the IIC algorithms under a channel model that includes shadow fading.

The CDM-4 model used in this thesis was idealized. I t would be desirable to

apply the IIC algorithm to a cellular structure with both inter-ce11 and intra-ce11

interference.

The performance of the soh IIC algorithm in this thesis was studied based on

the use of the SOV-4 decoding algorithm. It would be desirable to study the

same algorithm using the MAP decoder.

92

7. The spreading codes used in practice are designed without having hfUD in mind.

These spreading codes may not give the best performance under the LlLD

algorithms. For instance. the performance gain of using MMSE detector for a

system using Gold spreading sequences and a system using Kasami spreading

sequences are significantly different. This is due to the structural differences

in the crosscorrelation matrk- Therefore. it is desirable to design spreading

sequences that are optimized for MUD.

Bibliography

[Il Stephen G. Wilson. Digital Modulation and Coding. Prentice Hall. 1996.

[2] Stephen B. Wicker. E v o r Control Systems for Digitcl Communication and Stor- age. Prentice Hall, 1995.

[3] Andrew J. Viterbi and Jim K. Omura. Principles of Digital Communication and Coding. McGraw Hill? 1979.

141 M. Zeng, A. Annamalai, and V.K. Bhargava. Harmonization of Global Third Generation Mobile Systems. Proceedings, 20th Biennial Symposium on Com- rnunc~tions, Queen's - ~ n i u e r s i t ~ , Kingston Ontario, pages 139-143. May 2000.

Andrew J. Viterbi. CDMA: Principles of Spread Spectrum Communications. Addison 1995.

Rarnjee Prasad and Tero Ojanpera. Wideband CDMA for Third Generation Mo bile Conrnunications. Artech House Pu blishers. Boston. 1998.

Sergio Verdii. Multiuser Detection. Cambridge University Press. 1998.

Sergio Verdii. Optimum sequence detection of as_vnchronous multiple-access com- munications. Abstr. 1983 IEEE Internation Symposium. o n Information Theory, page 80? Sep 1983.

Sergio Verdu. Minimum probability of error for asynchronous multiple access communication systems. Proceedings, 1983 IEEE Military Communications Con- ference, pages 213-219. 1983.

K. Schneider. Optimum detection of code division multiplesed signals. IEEE Transactions on Aerospace and Electronic Systems, AES-15 (1): l8l- l8$ Jan 1979.

U. Madhow anà M. L, Honig. MMSE interference suppression for direct-sequence spread spectrum CD&1,4. IEEE Transactions on Communications, 42:3178-3188, Dec 1994.

hilahesh K. Varanasi and Behnaam Aazhang. hlultistage Detection in Asyn- chronous Code-Division multiple-,Access Communications. I E E E Transactions on Communications, 38(4):509-519, -4pr 1990.

Mahesh K. Varanasi and Behnaam Aazhang. Sear-Optimum Detection in Syn- chronous Code-Division Multiple-Access Systems. IEEE Transactions o n Com- munications, 39(5) :725-736, May 1991.

[14] Young C. Yoon, Ryuji Kohno. and Hideki Imai. -4 Spread-Spectrum hIultiaccess S-tem with Cochannel Interference Cancellation for Multipath Fading Chan- nels. IEEE Transactions on Communications. 11-7: 1067- 1075. Sep 1993.

[15] P.S. Guinand and Michael Aloher. Serial interference Cancellation for Highly Correlated Users. IEEE Pacific Rim Conference on Communications. Computers and Signal Processing, pages 133-136, 1999.

[16] Dariush Divsaiar and Marvin Simon. hproved CDM-4 Performance Gsing Par- allel Interference Cancellation. J P L Publicution. 95-21. October 1995.

[li] Markku Juntti, kIatti Latva-aho, and Kimmo Kansanen Olli-Pekka Kaurahalme. Performance of Parallel Interference Cancellation for CDM-4 with Delay Estima- tion and Channel Coding. Proceedings, I E E 5th International Symposium on Spread Spectrurn Techniques and Applications. 3:936-940. 1998.

[18] Matti Latva-aho and Jorma Lilleberg. Parallel Interference Cancellation - -1 Mul- tiuser Detection Framework. Symposium on Interference Rejection and Signal Separation in Wireless Communication, pages 127-146, Mar 1996.

[19] M. Latva-Aho, M. Juntti, and K. Kansanen. Residual interference suppression in parallel interference cancellation receivers. IEEE International Conference on Communications. 2:927-931. 1999.

[?O] Sergio Verdu. Demodulation in the presence of mulitaccess interference: Progress and misconceptions in intelligent methods in signal processing and communica- tions. pages 15-46. Birkhauser. 1997.

[21] C. Berrou. -4. Glavieux, and P. Thitimajshirna. Xear Shannon error-correcting coding and decoding: Turbo-codes (1). Proceedings, 1993 International Confer- ence on ~ornmunications, pages 1064-1070. 1993.

[22] Michael hloher. An Iterative Multi-user Decoder for -4synchronous BPSK Users. Proceedings, 1998 International Symposium on Information Theory, page 423, 1998.

[23] Michael Moher. An Iterative Multi-user Decoder for Near-Capacity Communi- cations. IEEE Transactions on Communications. 46-7:870-880. July 1998.

[21] Mark C. Reed. Christian B. Schlegel. Paul D. Alexander: and John -4. Asen- storfer. Iterative .\lultiuser Detection for CDXIA with FEC: Near-Single-User Performance. IEEE Transactions on Communications. 46(12):1693-1699. July 1998.

[25] Hesham Gama1 and Evaggelos Geraniotis. Iterative llultiuser Detection for coded CDM-4 signals in AWGX and Fading channels. IEEE Journal on Selected Areas in Communications. 18(1):30-41, January 2000.

[26] Xiaodong Wang and H. Vincent Poor. Iterative (turbo) soft interference cancel- lation and decoding for coded cdma. IEEE Transactions on Communications. 47(7), July 1999.

Xiaodong Wang and H. Vincent Poor. Turbo Multiuser Detection for Turbo- coded CDMA. IEEE Wireless Commvnications and Networking Conference. 3. September 1999.

S. Wijaya~uriya~ G. Sorton, and J. McGeehan. -4 Xovel Algorithm for Dynamic Ci pdating of Decorrelator Coefficients in Mobile DS-CD hLA. Proceedings of the 4th International Symposium on Personal, Indoor and Mobile Radio Cornmuni- cations, pages 292-296, Oct 1993.

Alexandra Duel-Hallen: Jack Holtzman, and Zoran Zvonar. Multiuser detection for CD hL4 systerns. IEEE Personal Communications Magazine. 2 ( 2 ) :46-58. Apr 1995.

John G. Proakis and Masoud Salehi. Cornmunicatiun Systerns Engineering. Pren- tice Hall, 1994.

W. Wesley Peterson, Roger E. Ziemer, and David E. Broth. Introduction to Spread Spectrum Communications. Prentice Hall. 1995.

George R. Cooper and Clare D. McGillem. Modem Commvnications And Spread Spectrum. McGraw-Hill. 1986.

Solornon W. Golomb. Shift Register Sequences. Holden-Day, 1967.

CI'. Wesley Peterson and Jr E. J. Weldon. Error- Cowecting Codes. hIIT Press. 1961.

Esmael H. Dinan and Bijan Jabbari. Spreading Codes for Direct Sequence CDh.IX and Wideband CDMA Cellular Xetwork. lEEE Cornminications Magazine, pages 48-54? September 1998.

Third-Generation Partnership Project Group. Technical Specification Group Radio -Access Setwork; Spreading and Modulation (FDD). http://www. 3gpp. org, 3G TS 25.213 version 3.1.0. December 1999.

Joachim Hagenauer and Peter Hoeher. -4 Viterbi -4lgorithm with Soft-Decision Outputs and its applications. Proceedings of IEEE Globecom Conference, pages 47.1.1-47.1.7. Xov 1989.

A. Kajiwara and 3.1- Kakagawa. 5licrocellular CDM-4 System with a Linear hl ultiuser Interfererce Canceller. IEEE Journal on Selected Areas in Communi- cations, l2-4:605-6 1 1 : May 1994.

R. De Gaudenzi, C. Elia, and R. Viola. Bandlimited Quasi-Synchronous CD-UIA: -4 Novel Satellite -4ccess Technique for Mobile and Persona1 Communication Systern. IEEE Journal on Selected Areas i n Cornm.t~nications, S-C-10-2328- 343, February 1992.

R. Lupas and Sergio Verdii. Near-Far Resistance of 34 ultiuser Detectors in A s p - chronous Channels. IEEE Transactions on Communications, COM-38-4:496- 508, April 1990.

Theodore S. Rappaport. Wireless Communications: Pn'nciples and Practice, volume IEEE Press. PH. 1996.

[42] P. Elias. Coding for noisy channels. IRE Conv. Record. 3:37-46. 1955.

[43] -2ndren J. Viterbi. Error bounds for convolutional codes and an asymptoticall?- optimum decoding algorithm. IEEE Transactions on Information Theoq. IT- l3(2): 260-269. Apr 1967.

[44] R. Gold. Optimal binary sequences for spread spectrum multiplesing. IEEE Transactions on Information Theory, pages 619-621. Oct 1967.

[45] R. Gold. Maximal recursive sequences Nith bcalue recursive cross-correlation function. IEEE Transactions on Information Theory, IT-4154-156. Jan 1968.

[16] T. Kasami. Weight distribution formula for some class of cyclic codes. Coordi- nated Science Lab, Uniu. IL, Urbana. Tech. Rep., pages R-285. Apr 1966.

[47] L. R. Welch. Lower Bounds on the Maximum Cross Correlation of Signais. IEEE Transactions on In fomat ion Theory, IT(20):397-399, May 1974.

[48] D. V. Sarwate and M. B. Pursle. Crosscorrelation properties of pseudorandom and related sequences. Proc. IEEE, 63:593-6 19, h~lay 1980.

[19] Yue K. J. Lau. Arithmetic Error Correcting Codes for Fault-Tolerant Digital Signal Processing in Processing Satellite Applications. In Master Thesis. Queen's Universit~., 1992.

Appendix A

Approximat ing the cross-correlat ion p

Based on the use of the Gaussian approximationo the average BER of a tj-pical CDM-4

system can be approximated by [dl]

(A. 1)

mhen the MAI is the dorninating noise.

Consider a discrete Nu-user CDbIA system nith identical cross-correlation value

p. The matched-filter output of the j th user is given by yj = bj + O j + nj. where 6,

is the desired information. 0, = x;ginw p - b, is the MAI. and nj is the Gaussian

noise. When AT, is large, dj can be modeled, based on the Central Limit Theorem.

by a zero-mean Gaussian random variable with variance od, shere

In the interference-limited case where the ILAI is dominating noise. the average

bit error probability of such system is approximated by

* -ta-/?

where Q ( x ) denotes 1: .%du.

The cross-correlation value p is appro-ximated bu equating (-4.1) and (-4.3).

In our typical CDM-4 system with processing gain of 7, the cross-correlation p is

approximately equal to 0.22.

Appendix B

Simulations and the Confidence Int ervals

The simulation results presented in this thesis are obtained based on the Monte-Carlo

method. To get an indication of the accuracy of the simulation results. the statistical

confidence intervals were used. The number of simulation trials (number of bits sent)

required to achieve a desired confidence level were derived in [49] using the Chernoff

bound. Table B.1 re-states the results obtained in [19].

The simulation results in this thesis are aimed such that the siniulated BER is

within 3~30% of the true BER with 95% confidence. To achieve the target confidence

level. a minimum of 8.98 x 106 trials are required for a BER of IO-'. Thus. the

simulations in this thesis use a bit Stream of 1 x 10' bits.

1 BER ( 95% certain / 95% certain 1 95% certain 1 99% certain 1 within 30% ( within 20% within 10% within 10%

10-' 8.00 x 102 1 1.755 x 103 6.833 x lo3 9.814 x 104 IO-' 8.88 x lo3 1 1.943 x 104 7.541 x 104 1.083 x 105

Table B.l: The number of bits required to achieve different confidence intervals