Upload
devvrat-shah
View
226
Download
0
Embed Size (px)
Citation preview
8/6/2019 21444658 Multi User Detection in Cdma Project Report
1/33
A SEMINAR REPORT ON
MULTI-USER DETECTION IN CDMA
Submitted in partial fulfillment of the requirements
for the award of the degree of
Bachelor of Technology
In
Electronics & Communication Engineering
Guide: Submitted by:
Mrs. PINKI NAYAK TARUN KUMAR
Roll No.: 0111042805
Amity School of Engineering & Technology
Guru Gobind Singh Indraprastha University (GGSIPU), Delhi
8/6/2019 21444658 Multi User Detection in Cdma Project Report
2/33
8/6/2019 21444658 Multi User Detection in Cdma Project Report
3/33
ACKNOWLEDGEMENT
I am thankful to my guide Mrs. Pinki Nayak for her support in collection and compilation of data
and providing guidance to use and analyze the data for seminar matter.
I also thank my parents and my family for their moral support to carry out the seminar report work.
TARUN KUMAR
DATE:
PLACE:
iii
8/6/2019 21444658 Multi User Detection in Cdma Project Report
4/33
ABSTRACT
One of the major issues in present wireless communications is how users share the resources and
particularly, how they access to a common frequency band. Code Division Multiple Access (CDMA) is
one of the techniques exploited in third generation communications systems and is to be employed in the
next generation. In CDMA each user uses direct sequence spread spectrum (DS-SS) to modulate its bits
with an assigned code, spreading them over the entire frequency band. While typical receivers deal only
with interferences and noise intrinsic to the channel (i.e. Inter-Symbolic Interference, intermodulation
products, spurious frequencies, and thermal noise), in CDMA we also have interference produced by other
users accessing the channel at the same time. Interference limitation due to the simultaneous access of
multiple users systems has been the stimulus to the development of a powerful family of Signal
Processing techniques, namely Multi-user Detection (MUD).
These techniques have been extensively applied to CDMA systems. Thus, most of last generation digital
communication systems such as Global Positioning System (GPS), wireless 802.11b, Universal Mobile
Telecommunication System (UMTS), etc, may take advantage of any improvement on this topic. In
CDMA, we face the retrieval of a given user, the User of Interest (UOI), with the knowledge of its
associated code or even the whole set of users codes. Hence, we face the suppression of interference due
to others users. If all users transmit with the same power, but the UOI is far from the receiver, most users
reach the receiver with larger amplitude, making it more difficult to detect the bits of the UOI. This is
well-known as the near-far problem. Simple detectors can be designed by minimizing the Mean Square
iv
8/6/2019 21444658 Multi User Detection in Cdma Project Report
5/33
Error (MMSE) to linearly retrieve the user of interest. However, these detectors need large sequences of
training data. Besides, the optimal solution is known to be nonlinear.
There have been several attempts to solve the problem using nonlinear techniques. There are solutions
based on Neural Networks such as multilayer perceptron or radial basis functions but training times are
long and unpredictable. Recently, support vector machines (SVM) have been also applied to CDMA
MUD. The upcoming third generation mobile radio system in Europe is based on UMTS (Universal
Mobile Telecommunications Standard). In order to supply access to a common transmission channel for
several users, UMTS incorporates Code Division Multiple Access (CDMA). Besides a lot of practical
advantages, CDMA suffers from multi- user interference limiting spectral efficiency dramatically.
However, bandwidth is a very valuable resource and should be used as efficiently as possible. One
appropriate mean to increase spectral efficiency of CDMA systems is multi- user detection.This report gives an overview of different multi- user detection techniques. Their performance is
compared with the conventional single-user detection including channel coding. Specifically, linear as
well as nonlinear multi- user detectors are considered. Efficient realizations of linear detectors are given
leading to improved nonlinear techniques. It is shown that nonlinear MUD including channel decoding
can achieve a spectral efficiency twice as high as that of the well-known GSM standard (Global System
for Mobile Communications) employing TDMA and FDMA.
v
8/6/2019 21444658 Multi User Detection in Cdma Project Report
6/33
TABLE OF CONTENTS
_________________________ ___________________________________________________________ __________________________________
CERTIFICATE ii
ACKNOWLEDGEMENT iii
ABSTRACT iv
LIST OF FIGURES 6
1. INTODUCTION
1.1 Synchronous CDMA 9
1.2 Asynchronous CDMA 10
2. PRACTICAL CDMA RECIEVER
2.1. Description 11
2.2 Perfect power control 12
2.3 Near far effect in CDMA 13
3. CDMA COMMUNICATION SYSTEM MODEL AND MUD
vi
8/6/2019 21444658 Multi User Detection in Cdma Project Report
7/33
3.1 Multiple access interference (MAI) 16
3.2 MAI versus Intersymbol interference (ISI) 16
4. MAXIMUM LIKELIHOOD SEQUENCE DETECTION
4.3 Basic concept 18
4.4 Formulation 18
5. CONVENTIONAL DETECTION FOR MULTIPLE ACCESSES
5.1 Output of the kth user 19
5.2 Matrix Notation 19
5.3 Data term and MAI term 20
6. SYNCHRONOUS AND ASYNCHRONOUS CHANNEL
6.1 Channel correlation matrix 21
6.2 Decorrelating detector 22
6.3 Polynomial expansion detectors 22
7. MINIMUM MEAN SQUARE ERROR (MMSE) DETECTION 24
8. SUCCESSIVE INTERFERENCE CANCELLATION (SIC) 25
9. PARALLEL INTERFERENCE CANCELLATION (PIC)
9.1 PIC properties 26
vii
8/6/2019 21444658 Multi User Detection in Cdma Project Report
8/33
10. BENEFITS AND LIMITATION OF MULTIUSER
DETECTION (MUD) 28
CONCLUSION AND FUTURE WORK 29
REFERENCES 30
viii
8/6/2019 21444658 Multi User Detection in Cdma Project Report
9/33
LIST OF FIGURES
Chapter - 1
Fig. 1.1 Asynchronous CDMA 9
Chapter - 2
Fig. 2.1 Practical CDMA receivers 11
Fig. 2.2 AWGN vs. Users graph 12
Chapter - 3
Fig. 3.1 CDMA communication system model 16
Chapter 5
Fig 5.1 Conventional detection for multiple accesses 19
Chapter 6
Fig 6.1 Asynchronous and Synchronous channel 22
Chapter 8
Fig 8.1 SIC block diagram 25
Chapter 9
ix
8/6/2019 21444658 Multi User Detection in Cdma Project Report
10/33
Fig 9.1 PIC block diagram 26
CHAPTER-1 INTRODUCTION
In addition to intersymbol and interchip interference, one of the key obstacles to signal detection and
separation in CDMA systems is the detrimental effect of multi-user interference (MUI) on the
performance of the receivers and the overall communication system. Compared to the conventional
single-user detectors where interfering users are modeled as noise, significant improvement can be
obtained with multi-user detectors where MUI is explicitly part of the signal model .if the spreading
sequences are periodic and repeat every information symbol, the system is referred to as short-code
CDMA, and if the spreading sequences are aperiodic or essentially pseudorandom, it is known as long-
code CDMA. Since multi-user detection relies on the cyclostationarity of the received signal, which is
significantly complicated by the time-varying nature of the long-code system, research on multi-user
detection has largely been limited to short-code CDMA for some time. On the other hand, due to its
robustness and performance stability in frequency fading environment, long code is widely used in
virtually all operational and commercially proposed CDMA systems, as shown in Figure 1. Actually,
each users signal is first spread using a code sequence spanning over just one symbol or multiple
symbols. The spread signal is then further scrambled using a long-periodicity pseudorandom sequence.
This is equivalent to the use of an aperiodic(long) coding sequence as in long-code CDMA system, and
the chip-rate sampled signal and MUIs are generally modeled as time-varying vector processes. The
time-varying nature of the received signal model in the long-code case severely complicates the
equalizer development approaches, since consistent estimation of the needed signal statistics cannot be
achieved by time-averaging over the received data record.
More recently, both training-based and blind multi-user detection methods targeted at the long-codeCDMA systems have been proposed. In this paper, we will focus on blind channel estimation and user
separation for long-code CDMA systems.
Based on the channel model, most existing blind algorithms can roughly be divided into three classes.
(i) Symbol-by-symbol approaches. As in long-code systems, each users spreading code changes
for every information symbol, symbol-by-symbol approaches process each received symbol
x
8/6/2019 21444658 Multi User Detection in Cdma Project Report
11/33
individually based on the assumption that channel is invariant in each symbol. Channel
estimation and equalization is carried out for each individual received symbol by taking
instantaneous estimates of signal statistics based on the sample values of each symbol. Based
on the BCJR algorithm, an iterative turbo multi-user detector was proposed.
(ii) Frame-by-frame approaches. Algorithms in this category stack the total received signal
corresponding to a whole frame or slot into a long vector, and formulate a deterministic
channel model. Computational complexity is reduced by breaking the big matrix into small
blocks and implementing the inversion locally. As can be seen, the localization is similar
to the process of the symbol-by-symbol approach. And the work is extended to fast fading
channels.
(iii) Chip-level equalization. With the observation that channels remain approximately stationary
over each time slot, the underlying channel, therefore, can be modeled as a time-invariant
system, and at the receiver, chip-level equalization is performed. In all these three categories,
one way or another, the time varying channel is converted or decomposed into time
invariant channels. In this paper, the long-code CDMA system is characterized as a time-
invariant MIMO system as in. Actually, the received signals and MUIs can be modeled as
cyclostationary processes with modulation-induced cyclostationarity, and we consider blind
channel estimation and signal separation for long-code CDMA systems using multistep linear
predictors. Compared with subspace methods, linear prediction methods can deliver more
accurate channel estimates and are more robust to overmodeling in channel order estimate. In
this paper, multistep linear prediction method is used to separate the intersymbol interference
introduced by multipath channel, and channel estimation is then performed using nonconstant
modulus precoding technique both with and without the matrix-pencil approach .The channel
estimation algorithm without the matrix-pencil approach relies on the Fourier transform, and
requires additional constraint on the code sequences other than being nonconstant modulus. It
is found that by introducing a random linear transform, the matrix-pencil approach can
remove (with probability one) the extra constraint on the code sequences. After channel
estimation, equalization is carried out using a cyclic Wiener filter. Finally, since chip-level
equalization is performed, the proposed approach can readily be extended to multirate cases,
either with multicode or variable spreading factor. Simulation results show that compared
with the approach using the Fourier transform, the matrix-pencil-based approach can
xi
8/6/2019 21444658 Multi User Detection in Cdma Project Report
12/33
significantly improve the accuracy of channel estimation, therefore the overall system
performance.
1.1Synchronous CDMA
Consider a synchronous CDMA digital communication system as depicted in Figure 1. Its main goal is
to share the channel between different users, discriminating between them by different assigned codes.
Each transmitted bit is upsampled and multiplied by the users spreading codes and then the chips for
each bit are transmitted into the channel (each element of the spreading code is either +1 or .1 and they
are known as chips).
The channel is assumed to be linear and noisy; therefore the chips from different users are added
together, plus Gaussian noise. Hence, the MUD has to recover from these chips the bits corresponding to
each user. At each time step t, the signal in the receiver can be represented in matrix notation as: xt =
HAbt + nt (1) where bt is a column vector that contains the bits (+1 or .1) for the K users at time k. The
K K diagonal matrix A contains the amplitude of each user, which represents the attenuation that each
xii
8/6/2019 21444658 Multi User Detection in Cdma Project Report
13/33
users transmission suffers through the channel (this attenuation depends on the distance between the
user and the receiver). H is an L K matrix which contains in each column the L-dimensional spreading
code for each of the K users. The spreading codes are designed to present a low cross-correlation
between them and between any shifted versions of the codes, to guarantee that the bits from each user
can be readily recovered. The codes are known as spreading sequences, because they augment the
occupied bandwidth of the transmitted signal by L. Finally, xt represents the L received chips to which
Gaussian noise has been added, which is denoted by nt. At reception, we aim to estimate the original
transmitted symbols of any user i, bt(i), hereafter the user of interest. These MUDs have good
convergence properties and do not need a training sequence to decode the received bits, but they need
large training sequences before their probability of error is low. Therefore the initially received bits will
present a very high probability of error that will make impossible to send any information on them.
Some improvements can be achieved by using higher order statistics, but still the training sequences are
not short enough for most applications.
1.2Asynchronous CDMA
Thej:th user experiences the SNR:
xiii
{ }
2 2
2 2 2
2
, , ,
0
2
jj jj
j
ij j ij ij j j
i j i j i j
m mSNR
m n m m n n
= + + +
E E E E
1 4 4 2 4 4 3
8/6/2019 21444658 Multi User Detection in Cdma Project Report
14/33
Block diagram of asynchronous system
CHAPTER-2 PRACTICAL CDMA RECIEVER
2.1. Description
a practical cdma reciever consists of a low pass filter which filters out the unwanted noise signals and
forwards the desired band of frequencies to a multiplier which multiplies the recieved signal with the
locally generated code,next is an integrator which integrates the product of the recieved signal with the
unit step signal and subsequently a sampled signal is produced after the decision and phasing of
sampling.
0( )
mt
u tLPF
Local code
From channel Decision
Phasing of sampling
xiv{ }
2
2 2
2
, ,
0
2
jj
j
ij ij j j
i j i j
mSNR
m m n n
+ +
E E E1 4 4 2 4 4 3
/c j j L P WP R=
8/6/2019 21444658 Multi User Detection in Cdma Project Report
15/33
Hence, SNR upper bound for thej:th user is:
2.2 Perfect power control
1. Equal received powers forUusers means that
2. Therefore the j:th users SNR equals
and the number of users is
3. where* (for BPSK)
s Number of users is limited by:
x Channel AWGN levelN0.
x Processing gainLc.
xv
0 eff N NB P =
01
c j
j U
i eff i
i j
LP
SNR P N B
=
+
1 ( 1)Uii i ji j
P P U P =
= =
0
0
( )( 1)
c j
eff j
L PSNR
N B U P
+
1
1 11 co
U LSNR SNR
+
1
0
2j j bc
eff N o
P PW ESNR L
B N P R N = = =
8/6/2019 21444658 Multi User Detection in Cdma Project Report
16/33
x received powerPr.
2.3 Near far effect in CDMA
Assume all users apply the same power but their distance to the receiving node is different. Hence the
power from the i:th node is
Where d is the distance, and a is the propagation attenuation coefficient (a = 2 for free space, in urban
area a = 35)
s Express the power ratio of the i:th and j:th user at the common reception point
s Therefore, the SNR of the j:th user is
xvi
j
o i i j j i j
i
d P Pd Pd P P
d
= = =
00
11
c j c j
j jUU
jeff i
eff ji
i i
i j i j
L P L P SNR S NR
d N B P N B P d
==
+ +
8/6/2019 21444658 Multi User Detection in Cdma Project Report
17/33
2.3.a The near-far effect in asynchronous CDMA
s Grouping the previous yields condition
Multiple-access interference (MAI) power should not be larger than what the receiver sensitivity can
accommodate. Note the manifestation ofnear-far -effect because just one larger sum term on the left
side of the equation voids it
s Example: Assume that all but one transmitter have the same distance to the receiving node. The
one transmitter has the distance d1=dj /2.5 and a=3.68, SNR0=14, SNR1=25,Rb = 30 kb/s,Beff= 20 MHz, then
s By using the perfect power balance the number of users is
Hence the presence of a single user so near has dropped the number of users into almost 1/3 part of
the maximum number
If this user comes closer than:
all the other users will be rejected, e.g. they can not communicate in the system in the required SNR
level. This illustrates the near-far effect
, (2 / ) /(1/ ) 2 / 2c BPSK c b b c b eff L T T T T T B= =
xvii
1 0 1
1 11
Uj
ci i
i j
dL U
d SNR SNR
=
=
3.68
1
(2.5) 2U
j
i i
i j
dU
d
=
= +
3.68
0 1
3.68
0 1
1 1(2.5) 2
1 12 2.5 14
c
c
U LSNR SNR
U LSNR SNR
+
+ =
0 1
1 11 42
( ) ( )cU L
SNR SNR
= + =
1 /2.78jd d
8/6/2019 21444658 Multi User Detection in Cdma Project Report
18/33
To minimize the near-far effect efficient power control is should be adaptively realized in
asynchronous CDMA-systems.
CHAPTER-3 CDMA COMMUNICATION SYSTEM MODEL
AND MUD
Consider a synchronous CDMA digital communication system as depicted in Figure 1. Its main goal is
to share the channel between different users, discriminating between them by different assigned codes.
Each transmitted bit is up sampled and multiplied by the users spreading codes and then the chips for
each bit are transmitted into the channel (each element of the spreading code is either +1 or .1 and they
are known as chips). The channel is assumed to be linear and noisy; therefore the chips from different
users are added together, plus Gaussian noise. Hence, the MUD has to recover from these chips the bits
corresponding to each user. At each time step t, the signal in the receiver can be represented in matrix
notation as: xt = HAbt + nt (1)
where bt is a column vector that contains the bits (+1 or .1) for the K users at time k. The K K
diagonal matrix A contains the amplitude of each user, which represents the attenuation that each users
transmission suffers through the channel (this attenuation depends on the distance between the user and
the receiver). H is an L K matrix which contains in each column the L-dimensional spreading code for
each of the K users. The spreading codes are designed to present a low cross-correlation between them
and between any shifted versions of the codes, to guarantee that the bits from each user can be readily
recovered. The codes are known as spreading sequences, because they augment the occupied bandwidth
of the transmitted signal by L. Finally, xt represents the L received chips to which Gaussian noise has
been added, which is denoted by nt.
At reception, we aim to estimate the original transmitted symbols of any user i, bt(i), hereafter the user
of interest. Linear MUDs estimate these bits as bt(i) = sgn{w. i xt} (2) The matched filter (MF) wi = hi,
a simple correlation between xt and the ith spreading code, is the optimal receiver if there were no
xviii
8/6/2019 21444658 Multi User Detection in Cdma Project Report
19/33
additional users in the system, i.e. the received signal is only corrupted by Gaussian noise. The near-far
problem arises when remaining users, apart from the UOI, are received with significantly higher
amplitude. While the optimal solution is known to be nonlinear, some linear receivers such as the
minimum mean square error (MMSE) present good performances and are used in practice.
These MUDs have good convergence properties and do not need a training sequence to decode the
received bits, but they need large training sequences before their probability of error is low. Therefore
the initially received bits will present a very high probability of error that will make impossible to send
any information on them. Some improvements can be achieved by using higher order statistics , but still
the training sequences are not short enough for most applications.
3.3 Multiple Access Interference (MAI)
s CDMA system can be realized by spreading codes having low cross -correlation as Gold codes
(asynchronous usage) or Walsh codes (synchronous usage).Multipath channel with large delay
spread can destroy code cross-correlation properties. Asynchronous systems with large code gain
assume other users to behave as Gaussian noise.
s Additional compensation of MAI yields further capacity (increases receiver sensitivity). This can
be achieved by:
x Code waveform design (BW-rate/trade-off).
x Power control (minimizes near-far effect).
x FEC- and ARQ-systems.
x Diversity-systems: - Spatial - Frequency Time.
x Multi-user detection.
3.4 MAI versus Intersymbol interference (ISI)
xix
8/6/2019 21444658 Multi User Detection in Cdma Project Report
20/33
x Note that there exists a strong parallelism between the problem of MAI and that of ISI:
x Hence, a number of multi-user detectors have their equalizer counter parts as:
x Maximum likelihood.
x Zero-forcing.
x Minimum mean square.
x Decision feedback.
x General classification of multi-user detectors:
1. Linear.
2. Subtractive.
xx
Asynchronous channel of K-users behaves the same
way as a single user channel having ISI with *memory
depth of K-1
8/6/2019 21444658 Multi User Detection in Cdma Project Report
21/33
CHAPTER-4 MAXIMUM LIKELIHOOD SEQUENCE
DETECTION
4.3Basic concept
s The Maximum Likelihood(ML) principle:
x Has the optimum performance provided transmitted symbols equal alike.
x Has large computational complexity - In exhaustive search 2NKvectors to be
considered! (Kusers,Nbits).
x Requires estimation of received amplitudes and phases that takes still more
computational power.
x Can be implemented by using Viterbi-decoder that is practically optimum ML-detection
scheme to reduce computational complexity by surviving path selections.
xxi
8/6/2019 21444658 Multi User Detection in Cdma Project Report
22/33
CHAPTER -5 CONVENTIONAL DETECTION FOR MULTIPLE
ACCESSES
5.1Output of the kth user
s Detection quality depends on code cross- and autocorrelation:
,
1( ) ( )
b
i k i k
Tb
g t g t dtT
= .
s Hence we require a large autocorrelation and small cross correlation (small ISI).
,
,
1,
0 1,
i k
i k
i k
i k
==
s The output for the K:th user consist of the signal, MAI and filtered Gaussian noise terms (as
discussed earlier).
xxii
8/6/2019 21444658 Multi User Detection in Cdma Project Report
23/33
1 ,
1( ) ( )
1( ) ( )
b
b
k kTb
K
ik k k i k i i k Ti k
b
k k k k k
y r t g t dt T
y Ad Ad n t g t dt T
y Ad MAI z
=
=
= + +
= + +
Received SNR of this was considered earlier in this report.
5.2 Matrix Notation
Assume a three user synchronous system with a matched filter receiver:
1 2,1 2 2 3,1 3 3 1
2 1,2 1 1 3,2 3 3 2
3 1
1
,3 1 1 2,3 2 2 3
1
2 2
3 3
Ad
A
y Ad Ad z
y Ad Ad z
y A dd z
d
Ad A
=+ + +
= ++ + = + ++
1 2,1 3,1 1 1 1
2 1,2 3,2 2 2 2
3 1,3 2,3 3 3 3
1 0 01 0 0
1 0 0
y A d z y A d z
y A d z
= +
That is expressed by the matrix-vector notation as
= +y RAd z
= +y R A d z
5.3 Data term and MAI term
xxiii
Matched filter outputs
Correlations between each pair of codes
Received amplitudes
Data
Noise
8/6/2019 21444658 Multi User Detection in Cdma Project Report
24/33
Matrix Rcan be partitioned into two parts by setting:
= +y RAd z
Note that hence Q contains off-diagonal elements orR(or the crosscorrelations)
And therefore MF outputs = +y RAd z can be expressed as
Therefore the term Ad contains the decoupled data and QAd represents the MAI.
Objective of all MUD schemes is to cancel out the MAI-term as effectively as possible (constraints
to hardware/software complexity and computational efficiency).
CHAPTER-6 SYNCHRONOUS AND ASYNCHRONOUS
CHANNEL
In synchronous detection decisions can be made bit-by-bit. In asynchronous detection bits overlap and
multi-user detection is based on taking all the bits into account.
1
( ) ( ) ( ) ( ) ( )K
k k k k
k
r t A t g t d t n t =
= +
1 1bT + 13 bT +1 2 1bT + 23 bT + 1 1bT + 13 bT +1 2 1bT + 23 bT + TThe matrix Rcontains now partial correlations that exist between every pair of theNKcode words .
6.1Channel correlation matrix
xxiv
( )= + + = +y I Q A d z d Q A dA z
8/6/2019 21444658 Multi User Detection in Cdma Project Report
25/33
In this example the correlation matrix extends to 6x6 dimensions:
= +y RAd z
2,1
1,2 3,2
2,3 4,3
3,4 5,4
4,5 6,5
5,6
1 0 0 0 0
1 0 0 0
0 1 0 0
0 0 1 0
0 0 0 1
0 0 0 0 1
=
R
Note that the resulting matrix is sparse because most of the bits do not overlap. Sparse matrix algorithms
can be utilized to reduce computational difficulties (memory size & computational time).
6.2 Decorrelating detector
s The decorrelating detector applies the inverse of the correlation matrix to suppress MAI,
1
dec
=L R
and the data estimate is therefore:
1
1
1
( )
dec
dec
=
= ++
=+=+
RAd
d R y
R z
Ad R z Ad z
AA Q dd
We note that the decorrelating detector eliminates the MAI completely! However, channel noise is
filtered by the inverse of correlation matrix - This results in noise enhancement!Decorrelating detector ismathematically similar to zero forcing equalizer as applied to compensate ISI.
6.3 polynomial expansion detectors
Many MUD techniques require inversion ofR. This can be obtained efficiently by PE:
xxv
8/6/2019 21444658 Multi User Detection in Cdma Project Report
26/33
1
0
SNi
PE i
i
w
=
= L R R
PE PE y=d L
0 1
0 1
0
...S
S
S
NNi
PE i N
i
w y w y w y w y=
= = + +d R R R R
For finite length message a finite length PE series can synthesize R-1 exactly. However, in practice a
truncated series must be used for continuous signaling:
y yR 2yR
y yR 2yR0w 1w 2w
xxvi
8/6/2019 21444658 Multi User Detection in Cdma Project Report
27/33
8/6/2019 21444658 Multi User Detection in Cdma Project Report
28/33
CHAPTER-8 SUCCESSIVE INTERFERENCE
CANCELLATION (SIC)
1 ( )
b A t T 1 1( b g t T
1(
b s t T
( )b
r t Tb
T
( )r t1
d
Each stage detects, regenerates and cancels out a user
s First the strongest user is cancelled because
x It is easiest to synchronize and demodulate.
x This gives the highest benefit for canceling out the other users.
s Note that the strongest user has therefore no use for this MAI canceling scheme!
s PROS: Small HW requirements and large performance improvement when compared toconventional detector.
s CONS: Processing delay, signal reordered if their powers changes, in low SNR performance
suddenly drops.
xxviii
8/6/2019 21444658 Multi User Detection in Cdma Project Report
29/33
CHAPTER-9 PARALLEL INTERFERENCE CANCELLATION
(PIC)
2 ( )bA t T
( )K b A t T
1 ( )bA t T
1
( )i
i
s t
2
( )ii
s t
( )i
i K
s t
( )br t T
1( ) b s t T
2 ( ) bs t T
( )K b s t T
( 1) ( )
( ( ))
m m
m
+ =
= + +
d y QAd
Ad QA d d z
= + +y Ad QAd z
( )= + += + +
y I Q Ad z
d QAdA z
9.1 PIC properties
s SIC performs better in non-power controlled channels.
xxix
8/6/2019 21444658 Multi User Detection in Cdma Project Report
30/33
s PIC performs better in power balanced channels.
s Using decorrelating detector as the first stage:
x Improving first estimates improves total performance.
x Simplifies system analysis.
s Doing a partial MAI cancellation at each stage with the amount of cancellation increasing for
each successive stage.
x Tentative decisions of the earlier stages are less reliable - hence they should have a lower
weight.
x Very large performance improvements have achieved by this method.
x Probably the most promising suboptimal MUD.
xxx
8/6/2019 21444658 Multi User Detection in Cdma Project Report
31/33
CHAPTER-10 BENEFITS AND LIMITATION OF MULTIUSER
DETECTION (MUD)
s Significant capacity improvement - usually signals of the own cell are included .
s More efficient uplink spectrum utilization - hence for downlink a wider spectrum may be
allocated.
s Reduced MAI and near-far effect - reduced precision requirements for power control.
s More efficient power utilization because near-far effect is reduced.
s If the neighboring cells are not included interference cancellation efficiency is greatly reduced.
s Interference cancellation is very difficult to implement in downlinkreception where, however,
larger capacity requirements exist (DL traffic tends to be larger).
xxxi
PROS:
CONS:
8/6/2019 21444658 Multi User Detection in Cdma Project Report
32/33
CONCLUSION AND FUTURE WORK
It has been shown that CDMA systems suffer from severe multi- user interference. Although strong
error control coding is able to ensure reliable transmissions for medium system loads, it is beneficial to
apply multi- user detection especially for high system loads. Based on the uplink of an OFDM-CDMA
environment, the performances of various multi-user detectors have been demonstrated. Concerning
linear approaches, the MMSE detector can be efficiently approximated by iterative strategies like the
Gauss-Seidel algorithm to avoid an explicit inversion of the correlation matrix and save computational
cost. Taking into account the discrete nature of the signal alphabet, nonlinear elements like clipping or
channel decoding have to be incorporated into the iterations. This concept improves performance
significantly. Even in the case of an overloaded system, e.g. 2 s U N=, the single-user performance can
be reached leading to high spectral efficiencies.
There are significant advantages to MUD which are, however, bounded and a simple
implementation is needed.
Current investigations involve implementation and robustness issues.
MUD research is still in a phase that would not justify making it a mandatory feature for 3G
WCDMA standards.
Currently other techniques such as smart antenna seem to be more promising.
xxxii
8/6/2019 21444658 Multi User Detection in Cdma Project Report
33/33
REFERENCES
1. Multi user detection using CDMA by Sergio Verdu.
2.Licentiate Course on Signal Processing in Communications (CDMA Overview) by Mika Raitola of
Nokia Research Center Radio Communications Laboratory.
3.Implementation Issues of Multi-user Detection in CDMA Communication Systems by Gang Xu.
4. Computer networks by Tanenbaum.
5. Research paper titledmulti user detection using Gaussian process by Fernando and Caro.
6.Multi-User Detection in Multicarrier-CDMA Systems by Dr.-Ing. Volker Khn, Ronald Bhnke and
Prof. Dr. Ing Karl and Dirk Kammeyer.
7. Multi-User Detection forCDMA Systems by Alexander Duel Hallen and Zoran Zvonar.
8.Optimal Multiuser Detection for CDMA Systems byDr M Motani.