Professional Documents
Culture Documents
(:)= }
-
fe s.-c(fe
(
t -r,))
}-
C?
)
,
-c,/l
1*
,
,
--.,
(1)
in which W, L, fe = W /2L and r,are total bandwidth,
code length, chip bandwidth and bit duration,
respectively.b
)
c (O, l} are independent and identically
distributed (ij.d) data sequences in : time slot of :
user.C?
)
c (/,/
with
probability p and /
with probability (1 - p)
. We assume
C?
)
for all values of and to be mutually independent. The
sign could be used in time domain signal shaping [3]. The
resulting pulse is of infnite duration, however with fe =
/r, most of its energy is confned in the time interval
(-r,,r,).It was shown that under this assumption, samples
of output matched flter will not contain intersymbol
interference (lSI) [3-4].
. LU channel model
We consider the fequency selective Rayleigh fading model
for the UWB channel [3-6]. In this model the channel
fequency response for user can be supposed as:
)=
-
g
)n
(
-
c
)
/
c
.
h
'
h
n(
)-
[
1
. 0 <
X
<
1
d
g''
w
' ^ -
0, ;:
,
-
an g
l -
(2)
corresponds to the complex channel gain in the :fequency
chip.
]
= 2a
and e?
)
s are i.i.d uniformly distributed random phases. The
received signal fom :user in time domain characterizes as:
s
(:)= }
-
u
,
s.-c(u_(:-r,))
g?'
,
-c,/l1*
,
,
--.,
/ /
(3)
We assume asynchronous users transmit signals and create
total received signal as
-(:)= s
(:) }1
s(:-T
) -(:) (4)
in which r is the number of users. T
k
denotes the :
random delay and is uniformly distributed over [0 , r,). -(:)
indicates the white Gaussian noise with power spectral density
level No.
C Single user detector
In developing receiver we assume the channel random
gains, i.e., gi
k)
s, are unknown for all values of land .Under
the multiuser conditions, the optimal single user receiver, i.e.,
maximum likelihood (ML) will be complex. The conventional
approach is to approximate the multiuser interference (MUI)
in (4) as the Gaussian process (:)= }_
s(:- T
)
-(:).Therefore, the problem will be simplifed to the design
of a single user detector in A WGN channel in which (:)is
modeled as a zero mean Gaussian process with variance a;. In
appendix A we will demonstrate that:
a; = :
(r- l)nea(pcpf -/
;
/
;
No
W
(5)
in which :
Uo
= }
-
2
(
1
)
2
2
l u
o
, d
(6.a)
.
c
,
.
g
-
"c'e1
l (t)
feSinc fe(t)
.
! -(zo(zi-o.s)n_t-_
Fig. 2.Receiver structure
1070
c
- }
-
l
-.
.
c
-.
(6.b)
in which ,
and a
-(:)us.-c(u :)
,
-
-:
,
):
-
O
c c
-j
-(:)us.-c(u :)
,
-
-
-
:
,
):
O
c c
(7.a)
(7.b)
The receiver combines the signal energy for bit 0 and bit 1
and uses their diference for decision:
,
-,
c-c,- c
,
-
0 (8)
The single user receiver structure is shown in Fig. 2.
III. PERORNCE EVALUATION
In the frst step we fmd the probability density fnction
(pdf of decision variable c. Since the exact analysis is
extremely complicated, we employ the Gaussian
approximation. We assume that the desired data is the :bit
of frst user and assume that desired user sends 0 in this
interval. So, we have:
-(:)
-}
} }
,
-
(-
-
.-
,
.
)
-
-
-
,
_,
-
-.,
-(:) (9)
The outputs of the :correlators i.e., ,
and
,will be
simplifed as:
,-
u_ |-
-,
(10.a)
-|
(to.b)
in which -,
and nl,
l
are two mutually independent zero
mean complex Gaussian variables, with variance o
-
v
,
u_.
Also, |
-
,|
,
-
,
-..
-:
-.,
-- -
---
,
_-,
_
u_s.-c(u_(r,
t
)) (1l.a)
,
-
,
-
,
-..
-
-
:
-.,
-
-
-
,
-
_
u_s.-c(u_(r,
t
)) (1l.b)
Based on the central limit theorem and for sufciently large
r,|
-
and |
]-
0 (12.a)
r|, |,,]- r|
`]-0, Y 7
(12.b)
r|, |,
]-r
,
-0, Y 7
(12.c)
Therefore for 7
,|
-
and |
-
(as well as |
and |
)are
mutually independent complex Gaussian variables with
independent real and imaginary parts, and we have(see
appendix C):
o
/-r[l
,
|,(-r[|
|,(- r[
,
|
]
]
-
r[|
]
]
-
(r- )u
-(
r
(
/(
-/
;
/
;
(13)
Now,
(I
c-}-
u_ |
-
-,
-
|
-
)
(14)
in which ,
-
c
,
_
-
summation of zt independent terms, we can reasonably
employ the central limit theorem (for ztlarge enough) and
assume the Gaussian distribution for the probability density
fnction. Consequently, calculation of mean and variance of c
is enough in order to obtain the error probability. In this way,
we frst derive the characteristic fnction of the :term of
summation in (14), namely
.However, fom appendix D the
conditional mean and variance are evaluated as:
IV. NUMERICAL A SIMULATION RESULTS
(I5.a)
(15.b)
(16.a)
(16.b)
(17)
In this section, we provide some results on the performance
of asynchronous SE/ST CDMA system. We consider --,
/
-/
)
- az. We use
equation (17) to evaluate analytical bit error rate (BER) ad
defne sv-
zo,)v
,-ztu_-;/v,
. Direct BER
values ae also obtained through Monte Carlo simulations. The
comparison of analytical ad simulation results at diferent
values of rand tare depicted in Fig. 3 (next page). Fine
agreement between analytical approximations and simulation
results verifes the soundness of our analytical derivations.
Fig. 4 (next page) shows BER versus code length with
r-
3, 30 and three diferent value of sv.It can be seen that,
there are some optimum values of tdepends on the SNR and
the number of users. For larger values of r and sv the
optimum value of twill be increased, and for fxed svand
rincreasing tbeyond the optimum value results in the poor
performance. This behavior (which is common of non
coherent systems) occurs due to decreasing /,ad dominance
of noise efects at the output of correlators.
Fig. 5 (next page) illustrates the BER versus number of
users with t
-
50, 500, 5000 and sv-s. za.It is obvious
that BER is a monotonically decreasing fnction of r.
Furthermore, increasing tbeyond some optimum points will
not results in the better perforance.
V.CONCLUSION
Novel multi-level SE/ST CDMA scheme with non-coherent
detection was proposed for \ applications. We have
investigated the performance of multi-level SE/ST CDMA
system with non-coherent detection over Rayleigh fading
channels. Fine agreement between analytical and simulation
results was observed. The results show that there is an
optimum code length for a set number of users and SNR. This
107 1
-Ayr
Siuaton
10
"
_
SN{M)
Fig. 3 Analytical and simulation results of BER vs. SNR
10
'
10
'"
SNR=20dB
=)
SNR-20dB
K=30
10 .
500 1000
L0dftengta )
Fig. 4 BER vs. code length
2 4 0 8 10 12 14 16 18 20
?0m0ft 0 05fS
Fig. 5 BER vs. number of users
optimum value will be increased based on increasing number
of users and SNR. Also we have examined monotonic
increasing of BER versus r.
ApPENDIX A: VARIACE CALCULATION
Ifv(t) = }
(:- :
)+ -(:),then:
}
--
-r }
s,,(:)s
,,
(:) +NoW
However (see (A.2) on the top of next page),
r
{
'}
=
{
2(, 1 = l',k
= k'
I
I
T(/2,
;:
,
-. ,
r
,
j
=
'
, {
j.(8(k
)
_8(k')} {
1 1 = l' k = k'
0,
;:
,
-. ,
r
{
'}
=
{p(Pf - Pi) + Pi, 1 = l', k = k'
I
I
0,
;:
,
-. ,
(AI)
(A.3)
(AA)
(A.5)
Now (A2) is simplifed to (A6) on the top of next page.
The expectation in (A6) may be evaluated as in (A7).
However, summations in (A.6) may be more simplifed as
(A8). In Consequence (AI) leads to (5). It can be numerically
verifed that
and
-
0
7 tT
C
Smc T
C
t dt
U
= }
-
2
0
2
+ T
C
c(l
)
0
2
u j o
(B.2)
By assigning -
= and -
= 1 in (B.2),
Uo and c
will
be obtained, respectively.
ApPENDIX C: ESTABLISHING EQUATION (13)
From (C.l) and (C.2) on the top of next page:
r{l
Io.ln
=
(r- l)f
((p(Pf - pi) + pi)
(C.3)
in which (simila to appendix A), it can be numerically
verifed that ,
-0.75
.
We can fmd r{
I
Iun
in a
similar manner.
ApPENDIX D: CHARACTERISTIC FUNCTION
From (14), we defme U
I
as:
U
I
=
(1)
2
j (
+ z
f Re{
I"
]+
2
(1)
2
2
I I I I
-
u*T
C
j o
I
I
'
-
I
I
'
)
-
(D.I)
in which I
' -
= |
-
+ -
I
, |
= |
+
n
u
, I
-
=
,
8
ft
)
I
' -
.The characteristic fnction of U
I
conditioned on
}
j
j
05
j.-
d
0
2
r
{
..
}
an (
I
()
=
,
I
-
Ic
(
l
).
j
j
05
-- j
j
1072
r{
'
(:)s
`(:)
]
= , -
r[
]
r
{
,
(
-
--
)}
r[
]
.
~
_ _ .
~
-
-
,
--.--
[
^ }
--
ru
s.-cu
,
(:-r,-.
)s.-cu
,
(:-
r,-.
)
,
-
---
,-.
--.,--
,
.
J ,
(A.2)
r[}
~
s
(:)s
,
`(:)
]
=
tu
c(r-)(;(r;-,) ,)}
--
z
,
---
r js.-cu
,
(:-r,-.
)s.-cu
,
(:-
)
-c
,
--.,--
--c
,
',--.,--
,
[ ,-.
, ,
{
,
.
-
-,
,
--.,--
[ rs.-cu
,(:-r,- .
)s.-cu
,(:-
r,- .
)
,-c --,--
,
J
=
{
j
s.-c
(.)).,
=
s.-c(.) s.-c(. -
):as
(-.)). . 7
(A.6)
(A.7)
,
=
j
s.-c
(.)).- zj_
(-.)).
- _
s.-c(.)s.-c(. z-):as
(-.)). (A.8)
;t ;(-(:)
l
..
.-
)C
0
---
r
{
,,
;
[
.
j
_-(:)
_
us.-c(u :)
-
,
-
,
-,
,,
_
):
] }
=
,
c
.@ , ,
- -
0
0
---
rj
,,
;[2
-
. _j
-(:)us.-c(u :)
,
--,
,c
):c
)]
_,,
;[.
-
. u
][C
b') -
-
.@
, ,
---
n
-
.
-
`
_j
-(:)us.-c(u :)
,
--,
,c
):
,,
;
(
_
c-
`
) -,
,
-
alq
)
-
U
-
.@ , ,
(B.I)
r[l|,
=
(r-)u
c(;(/;-/,) /,)}
--
zr[( - -
)(- -_/)
]
r
s.-cu
,
(r, .)s.-cu
,
(
r,
.)
,
-,
-
---
.,
]
REFERENCES
[1] J. A. Salehi, A. M. Weiner, and J. P. Heritage, "Coherent ultrashort light
pulse code-division mUltiple access communication systems," J
Lightave Technol., vol. 8, no. 3, pp. 478-491, Mar. 1990.
[2] P. M. Crespo, M. 1. Honig, ad J. A. Salehi, "Spread-time code division
multiple access," !LLL Trans. Commun., pp. 2139-2148, June 1995.
[3] S. Mashhadi ad J. A. Salehi, "UWB spectrally-encoded spread-time
CDMA in the presence of multiple Gaussia interference: K
receiver and three-level codes," !LLL Trans. Commun., vol. 56, pp.
2178-2189, Dec. 2008.
[4] M. Farhag ad J. A. Salehi, "On the performance of spectraIly-encoded
spread-time ultrawidebad CDMA communicaion systems," !LLL
Trans. Wireless Commun., vol. 7, Nov. 2008.
[5] C. R. C. M. da Silva and 1. B. Milstein, "Spectral encoded U
communication systems," in Proc. !LLLConference on Uta Widband
Systems a Technologies., pp. 96-100, Nov. 2003.
[bj C. da Silva and 1. B. Milstein, "Spectral-encoded UWB communicaion
systems: real-time implementaion ad interference suppression," !LLL
Trans. Commun., vol. 53, no. 8, pp. 1391-1401, Aug. 2005.
[7j S. Roy, J. R. Foerster, V. S. Somayazulu, and D. G. Leeper,
"U1trawidebad radio design: the promise of high-speed, short-range
(C.I)
wireless connectivity," Proc. !LLL, vol. 92, no. 2, pp. 295-311, Feb.
2004.
[j M. G. Shayesteh, J. A. Salehi, ad M. Nasiri-Kenari, "Spread-time
CDMA resistance in fading channels," !LLL Trans. Wireless Commun.,
vol. 2, no. 3, pp. 446-458, May 2003.
[9] "P802.15.4a-2007, PART 15.4: wireless medium access control (MAC)
and physical layer (PHY) specifcations for low-rate wireless personal
area networks (LR-WPANs): amendment to add alterae PHY
(amendment oflEEE std 802.15.4)," 2007.
[10j C. Zhu, J.Mietmer, and R.Schober, "On the Performance of Non
Coherent Transmission Schemes with Equal-Gain Combining in
Generalized K-Fading" !LLL Trans. Wireless Commun., vol. 9, no. 4,
pp. 1337-1349, Apr. 2010.
[11j N. Jacobsen, and U. Madhow, "Coded noncoherent communicaion with
amplitude/phase modulation: fom Shanon theory to practical
architectures" !LLL Trans. Commun., vol. 56, no. 12, pp. 2040-2049,
2008.
[12] Rabachin, T.Q.S. Quek, P.e. Pinto, l. Oppermann, and M.Z. Win,
"Non-Coherent U Communication in the Presence of Multiple
Narrowband Interferers" IEEE Trans. Wireless Commun., vol. 9, no. 11,
pp. 3365-3379, 2010.
[13j H. Ning, e. Tepedelenlioglu, "Performance analysis of non-coherent
U receivers at diferent synchronizaion levels" !LLL Trans.
Wireless Commun., vol. 5, no. 6, pp. 1266-1273, 2006.
1073