Professional Documents
Culture Documents
Optimal Seq Sit 99
Optimal Seq Sit 99
6, SEPTEMBER 1999
Abstract—There has been intense effort in the past decade to A significant thrust of work has been on developing multiuser
develop multiuser receiver structures which mitigate interference receiver structures which mitigate the interference between
between users in spread-spectrum systems. While much of this users in spread-spectrum systems. (See, for example, [21], [8],
research is performed at the physical layer, the appropriate
power control and choice of signature sequences in conjunction [9], [26], [10], [14], and [15].)
with multiuser receivers and the resulting network user capacity In this paper, we focus on a synchronous power-controlled
is not well understood. In this paper we will focus on a single cell CDMA system with multiuser receivers. The processing gain
and consider both the uplink and downlink scenarios and assume represents the degrees of freedom in the system. We assume
a synchronous CDMA (S-CDMA) system. We characterize the that at the receiver, each user is demodulated using a linear
user capacity of a single cell with the optimal linear receiver
(MMSE receiver). The user capacity of the system is the maximum receiver structure; in particular, we shall focus on the “linear
number of users per unit processing gain admissible in the system minimum mean-square error (MMSE) receiver” (formally de-
such that each user has its quality-of-service (QoS) requirement fined in Section II; also see [10]). We are interested in the
(expressed in terms of its desired signal-to-interference ratio) user capacity of both the uplink (mobiles to base station)
met. Our characterization allows us to describe the user capacity and the downlink (base station to mobiles) of this system
through a simple effective bandwidth characterization: Users are
allowed in the system if and only if the sum of their effective equipped with linear MMSE multiuser receiver. We say that a
bandwidths is less than the processing gain of the system. The set of users is admissible in the uplink system with processing
effective bandwidth of each user is a simple monotonic function of gain if one can allot signature sequences to the users and
its QoS requirement. We identify the optimal signature sequences control their received power such that the achieved signal-
and power control strategies so that the users meet their QoS to-interference (SIR) of each user is greater than its SIR
requirement. The optimality is in the sense of minimizing the sum
of allocated powers. It turns out that with this optimal allocation requirement. We are interested in the problem of characterizing
of signature sequences and powers, the linear MMSE receiver the maximum number of users per degree of freedom, called
is just the corresponding matched filter for each user. We also the user capacity of the uplink system. Analogous definitions
characterize the effect of transmit power constraints on the user of admissibility and user capacity can be made for the down-
capacity. link. For the most part, in this paper we shall focus on the
Index Terms—CDMA, linear MMSE receivers, power control, uplink (the downlink scenario turns out to be very similar and
user capacity, WBE sequences. we briefly summarize the results) and our main results are as
follows.
I. INTRODUCTION 1) users with SIR requirements are admis-
sible in the system with processing gain if and only
A central problem in the design of wireless networks is how
to use the limited resources such as bandwidth and power
most efficiently in order to meet the quality-of-service require-
if
we identify the optimal allocation, optimal in the sense corresponding systems with optimal sequences. We
of minimizing the sum of allocated powers. The optimal quantify precisely the gap in performance.
allocation has the following structure.
In related work, there has been a great deal of research
a) A user is said to be oversized if the user’s ef- studying the problem of power control of the users for con-
fective bandwidth is large relative to the effective ventional CDMA systems. Distributed iterative algorithms
bandwidths of the other users. Oversized users are that achieve power control of the users are discussed in, for
allocated orthogonal signature sequences (hence in- example, [4] and [6]. These ideas were extended subsequently
dependent channels) and powers proportional to their to systems with MMSE receivers [18], [7], but they focused
SIR requirements.
on deriving convergent power control algorithms rather than
b) Nonoversized users are allocated sequences that analyzing the achievable user capacity. The problem of iden-
we denote generalized Welch-bound-equality (WBE) tifying good signature sequences has been studied in [12] in
sequences. These users are allocated powers propor- the context of a spread-spectrum system with conventional
tional to their effective bandwidth. matched filter receiver and equal received power for all users.
3) With this allocation of signature sequences and powers, In [13], for equal received powers, the problem addressed
the MMSE linear receiver simplifies (somewhat unex- in an information-theoretic setting is to identify signature
pectedly) to the matched filter for each user. Thus the sequences for which the sum capacity, the sum of rates of
user capacity of a system using the a priori inferior all the users at which reliable communication can take place,
matched filter receiver is the same as that of the system is maximized. To achieve sum capacity joint processing of
using MMSE linear receiver. the users is required (for example, MMSE receivers with
4) In the special case when the SIR requirements of all the successive cancellation; see [20]) while in this paper we
users are equal (to, say, ), our main result simplifies restrict ourselves to single-user demodulators. Though the
to the following: users are admissible in the system problem addressed in [13] is thus different from the problem
with processing gain if and only if addressed in this paper, the optimal sequences turn out to
be identical. This statement is true even for the situation of
unequal received powers, as shown in recent work [23].
An important special case subsumed by our framework is
when the signature sequences are constrained to be chosen
Using the optimality (in the sense of minimizing sum of from an orthogonal sequence set. This corresponds to dividing
allocated powers) of the allocation scheme, we identify the entire bandwidth into frequency slots (or channels), i.e.,
the precise loss in the admissibility of number of users a joint FDMA/CDMA system. In this case, the receiver is
as a function of the background noise power and the trivial and both MMSE and matched-filter receiver structures
average received power constraint. coincide. Our main result in this framework is as follows:
In [17], the authors consider the scenario when the signature users each with SIR requirement are admissible in the
sequences of the users are independent and randomly chosen. system with processing gain if and only if .
They show that the SIR of the users of a large system (with We observe that the maximum number of users admissible
a large number of users and large processing gain) converges per unit processing gain differs from the earlier results by an
(in probability) and analyze the user capacity of the system integer part. Thus we identify the gain by using nonorthogonal
based on the value to which the SIR converges. It is interesting codes and multiuser linear receivers; the difference depends on
to compare the performance of that system with the one the factor and the processing gain . In the scenario when
considered here when the sequences are optimally chosen. users are differentiated by their SIR requirement, we identify
the user capacity of the system.
1) Under the MMSE receiver, the user capacity of a system This paper is organized as follows: In Section II, we give a
using random sequences is asymptotically identical to precise definition of the uplink model and of the admissibility
that of a system with optimally chosen sequences. This of the users. User capacity of the uplink system with linear
holds when there are no transmit power constraints, or MMSE receivers for the situation of equal SIR requirements
equivalently, when the background noise power is low. of the users is identified in Section III. In a physical system, the
We will provide an explanation for this phenomenon. power transmitted by a user is constrained naturally. In Section
2) Under the conventional matched-filter receiver, a system IV, we demonstrate the optimality of a particular allocation
using random sequences admits one user per degree scheme (developed in Section III) in the sense of minimizing
of freedom less than when the sequences are opti- the sum of allocated powers. This allows us to precisely
mally chosen. This shows that while the MMSE and quantify the loss in user capacity of the system with a received
the matched-filter receivers have the same performance power constraint. Section V completely generalizes the results
when the sequences are optimally chosen, the MMSE of Sections III and IV to the situation when users have
receiver is much more robust to the choice of spreading different SIR requirements. In Section VI, we will focus on
sequences. the downlink. We can ask our admissibility and user capacity
3) Under transmit power constraints, systems employing region questions in this setup too. As can be expected, there is
random sequences admit strictly fewer users than the a lot of connection between the downlink and uplink scenarios
1970 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 6, SEPTEMBER 1999
and we summarize the results. Section VII focuses on the transmitted symbols. Henceforth, we consider the allocation
joint FDMA/CDMA setup that corresponds to the restriction of of signature sequences for the users. By a suitable choice of
signature sequences to be chosen from an orthogonal sequence the orthonormal waveform set ,
set and identifies the user capacity of the system under various the signature waveforms for the users can be constructed
settings. Section VIII contains our conclusions and discusses (following (1)).
directions toward future work. Suppose the symbol of user is decoded using a linear
receiver, denoted by (a vector in ), then the signal-to-
II. MODEL AND DEFINITIONS interference ratio of user SIR is
(1)
and
where is an orthonormal
set in and is the inner product between
the waveform of user , namely, and
Let
. With some abuse of notation, let us
represent the vector of inner products
as the signature sequence of user ( is a vector in and
, the unit sphere in ). It is well known that the
projections of on
are sufficient statistics (see [22, Sec. 2.9.2 and and we note that they are positive definite. Let
Ch. 3]) for the problem of demodulating the user symbols. for a positive diagonal matrix and unitary . Also, let
Writing as a vector in , the received . Then
signal can be written as
SIR
Thus the is given by and the optimal There is a simple one-to-one relationship between the normal-
receiver structure is ized minimum mean-square error MMSE of user and the
SIR achieved by that user, namely, SIR (see (2)). Let be
(3)
the linear estimate of from using the linear receiver ,
Hence, under the MMSE receiver i.e., . We assume that is appropriately normalized
(4) so that the error in the estimate MMSE
is minimized at (the corresponding (minimum) error in
the estimate denoted by MMSE ). Then, it can be verified that
MMSE (11)
SIR
(5) In particular, this relation holds when the receiver is the linear
MMSE one, that is, is chosen according to (3). Using (9)
where we used the following formula in the second step: and (11), we have
SIR
MMSE
SIR
whenever the terms exist. Here is strictly less than
and thus all the terms are well defined. (12)
(7)
Proof: Suppose users are admissible in the system
with processing gain . Then, by definition, there exist
sequences , positive powers such
(8) that for every user , we have SIR , where the receiver
structure is as in (3). Appealing now to (13), we have the
where ’s are the eigenvalues of the matrix . If we let upper bound
MMSE
be the (normalized) minimum mean-square error for user , To see that this sufficient also, we provide an explicit valid
then (8) becomes allocation scheme:
Suppose . Choose the powers to be
MMSE (9)
(14)
(10)
1972 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 6, SEPTEMBER 1999
and sequences such that . Then, using (5), We use these notions and results to construct sequences such
that . The vector in is majorized by
SIR the vector with entries equal to and the remaining
SIR entries equal to (this is a simple application of Example
3.1). Now, appealing to Lemma 3.1, there exists a symmetric
matrix, say , with unit diagonal entries and eigenvalues
and with multiplicities (both algebraic and geometric)
equal to and , respectively. Let
be orthonormal eigenvectors of corresponding to
the eigenvalue . Denoting the matrix , we
allocate sequences for the users as follows:
Hence for each user , we have SIR and the users
are admissible in the system with processing gain . We need
to show the existence of sequences such that . We ..
begin with some definitions. .
Majorization makes precise the vague notion that the com- C. Observations on Valid Allocations
ponents of a vector are “less spread out” or “more nearly
equal” than are the components of a vector by the statement Below, we observe some properties of valid allocations
is majorized by . in general and in particular the specific valid allocation we
demonstrated in the proof of Theorem 3.1.
Definition 3.2: For , say that is majorized by
(or majorizes ) if 1) Suppose users are admissible in the system with
processing gain . Let be a valid allocation
of sequences. Then, with these sequences fixed, among
all valid allocations of powers (i.e., with this power
allocation SIR ) there exists a component-wise
minimal power allocation (see [18]) and with this power
allocation, SIR . Hence, when the sequences are
WBE sequences, it follows that the power allocation
A comprehensive reference on majorization and its appli-
cations is [11]. A simple (trivial, but important) example of
majorization between two vectors is the following:
Example 3.1: For every such that is the component-wise minimal power solution.
2) We shall now focus on this specific allocation scheme
majorizes of WBE sequences and corresponding component-wise
minimal powers. This scheme allocates the smallest sum
It is well known that the sum of diagonal elements of a of powers among all valid allocations. We shall show
matrix is equal to the sum of its eigenvalues. When the matrix this property in Section IV when we revisit user capacity
is symmetric the precise relationship between the diagonal with power constraints.
elements and the eigenvalues is that of majorization. 3) With this allocation, the MMSE receiver for user is
Lemma 3.1 ([11, Theorems 9.B.1 and 9.B.2]): Let be a given by, following (3),
symmetric matrix with diagonal elements and
eigenvalues we have
majorizes
That and cannot be
compared by an ordering stronger than majorization is the
consequence of the following converse: If
and are numbers such that majorizes , then
there exists a real symmetric matrix with diagonal elements
and eigenvalues . (15)
VISWANATH et al.: OPTIMAL SEQUENCES, POWER CONTROL, AND USER CAPACITY OF SYNCHRONOUS CDMA SYSTEMS 1973
where is a constant (which can be shown to be equal to IV. POWER CONSTRAINT AND USER CAPACITY
). Thus the optimal linear filter in this situation is just Our model has not included any constraints on the allocated
a scaled version of the matched filter. This observation received power of the users; we now include a received
allows us to conclude that the user capacity of a system power constraint in our model. In this section we precisely
equipped with the a priori inferior matched filter receiver quantify the loss in the user capacity due to the received power
is the same as that of the linear MMSE receiver: constraint; this loss will be a function of both the constraint
Corollary 3.2: users are admissible in the system with and the power of the background Gaussian noise. One way
processing gain and equipped with matched filter receivers to justify the constraint on the received power of the users is
if and only if by considering average transmit power constraint of the users.
If one is able to adopt a model of fading for the users that
is ergodic (with the same mean fading) and independent, an
average transmit power constraint on the users translates into
a received power constraint.
D. Comparison with Random Sequences
A. User Capacity with Power Constraints
It is interesting to compare this result with the corresponding
We define admissibility of users (each having SIR
characterization of user capacity of a system with random
requirement ) in the system with processing gain and
signature sequences carried out in [17]. The results in [17]
power constraint as being able to allot signature sequence
are asymptotic and are valid for a large system (i.e., a system
and power for every user such that the achieved
with a large processing gain and large number of users). We
SIR (given in (4)) is at least the target value . If the system
focus on the system where each user has SIR requirement
has just one user, then the minimum power required by that
, the number of users is , and the processing gain is
single user to meet its SIR requirement is . To prevent
and consider the regime , , and .
a degenerate situation, we shall assume that . As
Appealing to the results in [17] we conclude as follows:
before, we assume that the number of users is greater than the
1) Suppose MMSE linear receivers are used. Then, ([17, processing gain. Our main result in this section is to precisely
Sec. 5]) the SIR of each user converges (in probability) identify the loss in user capacity by including such a power
to a constant and (with appropriate power control) this constraint:
constant is at least the target requirement if and only
Theorem 4.1: users (each having SIR requirement ) are
if . Thus for a large system, this suggests that
admissible in the system with processing gain and average
using random sequences is as good as using the optimal
received power constraint if and only if
WBE sequences (in the context of user capacity) for the
signature sequences of the users.
From (10), note that the total normalized MMSE errors
of the users is a constant, independent of the relative Proof: We first show the necessity. Suppose users are
powers of the users and depends very weakly on the admissible. Then there exist signature sequences
signature sequences. To minimize the maximum MMSE , positive powers , such that for every user
among all users (or equivalently, to maximize the mini- , we have SIR . From (12), we have the conservation law
mum SIR’s), it is, therefore, optimal to have symmetry
among the users such that they have the same MMSE. SIR
(16)
This was achieved using equal received power and the SIR
WBE sequences described earlier. However, this “sym- where are the eigenvalues of the matrix .
metrization” can also be achieved asymptotically when We note that
random sequences are used, since it is shown in [17] that
(with appropriate power control) the SIR’s of all users
will converge to the same number. But maximizing the (17)
minimum SIR’s is equivalent to maximizing the number where the second equality follows by some algebra and noting
of users in a system with given equal SIR requirements. that the columns of have unit norm. Now, if we let
Hence, random sequences and the WBE sequences yield , then the vector is majorized
the same user capacity asymptotically. by the vector (see Example 3.1). We need the
2) For the scenario of matched filters, following [17, Sec. following definition.
5], the SIR of each user converges (in probability) to
Definition 4.1: A real-valued function is said
a constant and this constant is at least the requirement
to be Schur-concave if for all such that majorizes
if and only if . Thus one user per degree of
we have . We say that is Schur-convex if
freedom is lost asymptotically when random sequences
is Schur-concave.
are used. A conservation law similar to the one for
MMSE receivers (as in (12)) is lacking for the matched An important class of Schur-convex functions is the fol-
filter receivers. lowing ([11, Theorem 3.C.1]).
1974 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 6, SEPTEMBER 1999
Example 4.1: If is convex then the symmetric For the allocation in the proofs of Theorems 3.1 and 4.1,
convex function the lower bound in (19) is met with equality. We draw the
following conclusions.
1) The allocation of WBE sequences and powers all equal
is Schur-convex. By definition, if is concave then to
the symmetric concave function
user capacity strictly more than one user per degree of Observe that oversized users have effective bandwidth large
freedom when using random sequences when compared relative to the effective bandwidths of the other users. A simple
with the user capacity achieved with optimal sequences. recursive scheme to enumerate the oversized users follows
directly from the definition in (21).
V. MULTIPLE CLASSES, USER Let be the vector with
CAPACITY, AND OPTIMAL ALLOCATIONS the entry being in the th position. Then form
an orthonormal basis for . Recall that users are
In this section we consider the situation when the users
oversized, and we know that . Consider the following
have different SIR requirements and completely generalize the
allocation of powers and sequences:
results of the previous two sections. This level of generality
of allowing users to have different SIR requirements caters 1) For oversized users, we allocate independent channels,
to data and voice users, sharing the common system and i.e., for users in we allocate the signature
having different SIR requirements. As earlier, we shall assume, sequences and powers .
without loss of generality, that the number of users is bigger 2) For nonoversized users we allocate sequences from
than the processing gain. the subspace which has dimension
. From (21), it follows that
A. User Capacity Characterization
We first define admissibility of users (with SIR require-
ments ) in the system with processing gain
as being able to allot signature sequences and powers for
the users such that for each user the SIR achieved by and hence the vector with with entries equal to
the MMSE receiver for that user (as in (4)) is greater than and the other entries equal to
or equal to (such allocations are called valid). Our main
result of this section is an analog of Theorem 3.1; a complete
characterization of admissibilit:.
Theorem 5.1: users (with SIR requirements
majorizes the vector (see
) are admissible in the system with processing gain if
Example 3.1). Now, appealing to Lemma 3.1, there
and only if
exists a symmetric matrix, say , with diagonal entries
and eigenvalues
Proof: This result motivates the consideration of the
quantity as the effective bandwidth of a user with SIR
requirement . Then the criterion of admissibility has a simple
interpretation: Users are admissible if and only if the sum
of their effective bandwidths is less than the processing gain
and with multiplicities (both algebraic and geomet-
of the system. Let us denote the effective bandwidth by
ric) equal to and , respectively. Let
.
be orthonormal eigenvectors
We first show the necessity: since users are admissible, by
of corresponding to the eigenvalue
definition, there exists a valid allocation of signature sequences
and powers . Since SIR , and the effective bandwidth
is a monotonic function of the SIR requirement, from (12) we
have
Now, for every user choose power
proportional to its effective bandwidth, namely,
(21)
Say that the users are oversized. If , then no user Let be the diagonal matrix with entries
is oversized (and this happens when ). . For define sequences
1976 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 6, SEPTEMBER 1999
and the matrix as have SIR requirement . We know (from Section III)
that degrees of freedom can support
users each with SIR requirement . This suggests that
.. we could “channelize” the system such that users of
. different classes do not interfere with each other and
asymptotically achieve users of class per degree
of freedom whenever This is indeed
Since the diagonal entries of are unity, have unit
true and the following statement can be verified: We
norm for every . Also, note that
can admit at least users of class
in a system with processing gain where
(23) positive such that
We shall denote such sequences as generalized WBE 3) We can identify two important situations when there are
sequences. Note that when is a scaled identity, the no oversized users:
sequences reduce to the WBE sequences. The Ap- a) When all the SIR requirements are identical, then
pendix discusses the construction of generalized WBE no user is oversized. This is the result contained in
sequences. Theorem 3.1.
Now allocate signature sequences for users not oversized b) When there are at least as many users in each
as follows: class as the processing gain of the system then
it is straightforward to see that that there are no
oversized users. Suppose class has users
With this allocation of sequences and powers we now have and . Then, we can make a familiar
valid allocation: signature sequences for the users
of class to be WBE sequences (this can be done by
the hypothesis that ) and powers the same
for every user of class to be
(24)
Substituting in (5)
SIR The SIR of user of class , as in (5), can be verified
to be exactly . This ensures that for every class ,
SIR users of that class are admissible in the system.
4) In the proof of Theorem 5.1, the assumption that the
SIR requirements of the users be ordered was for nota-
(25) tional simplicity. Equivalently, the notion of oversized
users could be introduced (with no assumption on the
Thus each user has its SIR requirement met which completes ordering) as below:1 User is defined to be oversized if
the proof.
This characterization of admissibility along with the valid (26)
allocation scheme above allows us to make the following
remarks.
Denote the set of oversized users as . Then, (21) can
1) It is interesting to observe that the linearity of the be written in this notation as
boundary of the user capacity is a consequence of
(10), that the total minimum mean-square errors of the
users is a constant independent of the received powers
and dependent very weakly on the signature sequences.
This also explains why here, as in the single class
case, random sequences achieve asymptotically (as the We observe that there can be at most oversized
processing gain gets large) the same performance as users and that if user is oversized then every user with
optimal sequences. SIR requirement at least is also oversized. In the rest
2) In practice, one can imagine a small number of different of the paper we shall adhere to this notation.
SIR requirements of the users (say two or three). We 5) For the specific valid allocation demonstrated in the
introduce the notion of different “classes” of users; all proof of Theorem 5.1, we can calculate the MMSE
users of the same class have a common SIR requirement.
We assume there are classes (fixed) and users of class 1 We would like to thank Prof. Sergio Verdú for suggesting this terminology.
VISWANATH et al.: OPTIMAL SEQUENCES, POWER CONTROL, AND USER CAPACITY OF SYNCHRONOUS CDMA SYSTEMS 1977
receiver for the users (from (3)) to be and the remaining eigenvalues equal to . Hence,
referring to Lemma 3.1
majorizes (27)
majorizes
where is a constant (which is easily seen to be (28)
). Thus the MMSE Then the claim is that there exists an allocation of signature
receiver is just the scaled matched filter receiver for each sequences and user powers such that
user. This allows us to conclude, exactly as in Section
III, that there is no loss in user capacity when we restrict has eigenvalues (29)
the system to use the a priori inferior matched filter. To
emphasize
The attained SIR’s of the users are (30)
Corollary 5.2: users (with SIR requirements
) are admissible in the system with processing gain To see this, consider the following construction of and .
and equipped with matched filter receivers if and only if Given and satisfying (28),
by an appeal to Lemma 3.1, there exists a symmetric
matrix with diagonal entries
Hence by construction we have demonstrated the existence of in . Let the set of oversized users be denoted by . Let
signature sequences and powers so that both (29) and be
(30) are met.
We shall now use the observation in (27) and (28) to
characterize the optimality of our signature sequence and
power allocation. Now suppose we are given that the necessary (35)
condition in Theorem 5.1 is true. Then Consider the following claims:
by Theorem 5.1, there exist some and some such that (36)
the achieved SIR’s of the users are . If we denote
as the eigenvalues of and majorizes (37)
then (28) shows the relationship between
and . Now Suppose these are true. Then is the minimum value of
the minimization problem in (33) and the claim in Lemma 5.1
is now straightforward to verify. We only need to prove (36)
see (17)
and (37) above.
It is straightforward to verify from the
(32) definition of and by properties of oversized
users that . Let
and denote the order statistics of (see
The lemma below identifies a lower bound on . Recall Definition 3.1 for the notation). Let be the
that the set of oversized users is denoted by . order statistics of . By the definition of in (35)
and properties of oversized users, it can be verified that the
Lemma 5.1: Let be the set of oversized users. Given the following relation is true among the elements of :
constraint (28)
(38)
(33)
Suppose that this is true. Then for any allocation of se-
quences and powers so that the SIR requirements of the users
are met, (33) can be used in conjunction with (32) to obtain a
lower bound on the sum of allocated received powers
Hence we can write
(46)
VII. JOINT FDMA/CDMA CASE AND USER CAPACITY
where . Then, and hence for every Traditional multiple-access schemes divide the channel into
user we have slots and it is important to note that we can incorporate
a slotted system into our framework. We achieve this by
forcing the signature sequences to be chosen only from an
orthogonal sequence set. Then users that have the same
Using (45), signature sequence are in the same “slot” or “channel” and do
not cause any interference to users in different “channels” due
to the orthogonality of the signature sequences. In this case, the
SIR receiver is trivial and the MMSE and matched-filter receivers
coincide. It is interesting to identify the user capacity in this
(47) situation and this exercise will enable us to explicitly identify
the gain in user capacity by using nonorthogonal signature
sequences. In this section, we identify the user capacity of
the slotted system in a variety of settings. The conclusion we
draw from the results is that the user capacity in this case
(48) differs from the earlier one by an integer part of a function
of the SIR requirement. The assumption below is that the
where we used the fact that
signature sequences are now constrained to be chosen from
an orthogonal sequence set (whose linear span has dimension
equal to the processing gain of the system). We first focus on
the uplink.
since by hypothesis we have that and .
Hence the users are admissible. Proposition 7.1: users each with SIR requirement are
admissible in the system having processing gain if and
Some comments are in order now: only if
1) A (simple) closed-form expression of the allocation that if
is optimal (in the sense of the previous sections) seems
unattainable. But it is worth emphasizing that our alloca- else.
tion above has the property that the signature sequences Proof: Since the sequences are chosen from an orthogo-
are allocated (to be WBE sequences) independent of the nal set, only users having the same sequence (we shall refer to
path gains and only the powers are chosen as a function them as users in the same channel) cause interference to each
of the path gain. other. We hence focus on the user capacity for a single channel.
2) With matched-filter receivers, the admissibility is users are admissible into a channel with SIR requirement
unchanged and we have users with path gains if there exist positive powers such that, analogous
from the base station and each having the to (2)
same SIR requirement are admissible in the downlink
SIR (49)
of the system with processing gain if and only if
In the general situation when users have arbitrary SIR The proofs can be obtained by an argument similar to the
requirements, we summarize our results without detailing the ones made above.
proofs.
1) users (with path gains from the base station being
1) We focus on a single channel first. users with SIR ) each with SIR requirement are admissible
requirements are admissible in a single chan- in the downlink of the system having processing gain
nel if and only if if and only if
if
else.
2) When there are channels, a sufficient condition for ad-
2) users (with path gains from the base station being
missibility of users with SIR requirements
) with SIR requirements are ad-
is
missible in a single channel in the downlink if and only
if
matrix of user powers . Let . Then, entries. Though we have characterized all generalized WBE
say that (the unit sphere in ) are matrices through the eigenvectors of certain positive-definite
generalized WBE sequences and the matrix matrices with fixed diagonal entries and fixed eigenvalues,
as a generalized WBE matrix if the following three conditions this characterization does not seem to aid, in a straightforward
are satisfied: way, the answering of the design questions mentioned above.
1) The rows of have the same norm, equal to . Nevertheless, this has afforded us some intuition on construct-
2) The columns of have unit norm. ing generalized WBE matrices; in [23], we demonstrate a
3) The rows of are orthogonal to each other. constructive (iterative, with at most iterations) algorithm
Properties 1) and 3) can also be succinctly expressed as to construct the eigenvectors of the matrix .
. When and is scaled identity, For the special case when is the identity, the matrix
orthonormal matrices are the only matrices satisfying the reduces to a WBE matrix and simple construction schemes
above three properties. When and is not the scaled are known.
identity, then there is no generalized WBE matrix. We now 1) WBE matrix goes by the name of tight frame2 in the
generalize this observation to arbitrary . context of over complete expansions in in Wavelets
The matrix has the same eigenvalues as literature (see [2, Ch. 3] for a detailed review of tight
along with additional zero eigenvalues. Since the diagonal frames). The following construction of tight frames is
entries of are a necessary condition well known: assuming is odd, the th sequence is
for the existence of a generalized WBE matrix is, referring given by
to Lemma 3.1
majorizes
[2] I. Daubechies, Ten Lectures on Wavelets. Philadelphia, PA: SIAM, [14] P. Rapajic and B. Vucetic, “Adaptive receiver structures for asyn-
1992. chronous CDMA systems,” IEEE J. Select. Areas Commun., vol. 12,
[3] P. Fan and M. Darnell, Sequence Design for Communication Applica- pp. 685–697, May 1994.
tions. New York: Wiley, 1996. [15] M. Rupf, F. Tarköy, and J. Massey, “User-separating demodulation for
[4] G. J. Foschini and Z. Miljanic, “A simple distributed autonomous power code-division multiple access systems,” IEEE J. Select. Areas Commun.,
control algorithm and its convergence” IEEE Trans. Vehic. Technol., vol. vol. 12, pp. 786–795, June 1994.
40, no. 4. pp. 641–646, 1993. [16] E. Seneta, Nonnegative Matrices and Markov Chains, 2nd ed. Berlin,
[5] R. L. Graham, M. Grotschel, and L. Lovasz, Handbook of Combina- Germany: Springer-Verlag, 1981.
torics, vol. 2. Cambridge, MA: MIT Press, 1995. [17] D. Tse and S. Hanly, “Multiuser demodulation: Effective interference,
[6] S. V. Hanly, “An algorithm for combined cell-site selection and power effective bandwidth and capacity,” IEEE Trans. Inform. Theory, vol. 45,
control to maximize cellular spread spectrum capacity” IEEE J. Select. pp. 641–657, Mar. 1999.
Areas Commun. (Special Issue on the Fundamentals of Networking), [18] S. Ulukus and R. Yates, “Adaptive power control and MMSE interfer-
vol. 13, no. 7, Sept. 1995. ence suppression,” ACM Wireless Networks, vol. 4, no. 6, pp. 489–496,
[7] P. Kumar and J. Holtzman, “Power control for a spread-spectrum system 1998.
with multiuser receivers,” in Proc. 6th IEEE PIMRC, Sept. 1995, pp. [19] , “Iterative signature adaptation for capacity maximization of
955–959. CDMA systems,” in 36th Annual Allerton Conf. Communication, Con-
[8] R. Lupas and S. Verdú, “Linear multiuser detectors for synchronous trol and Computing, 1998.
[20] M. K. Varanasi and T. Guess, “Optimum decision feedback multiuser
code-division multiple access,” IEEE Trans. Inform. Theory, vol. 35,
equalization and successive decoding achieves the total capacity of the
pp. 123–136, Jan. 1989.
Gaussian multiple-access channel,” in Proc. Asilomar Conf. Signals,
[9] , “Near-far resistance of multiuser detectors in asynchronous
Systems and Computers, 1997.
channels,” IEEE Trans. Commun. , vol. 38, pp. 496–508, Apr. 1990. [21] S. Verdú, “Optimum multiuser asymptotic efficiency,” IEEE Trans.
[10] U. Madhow and M. Honig, “MMSE interference suppression for direct-
Commun., vol. 34, pp. 890–897, Sept. 1996.
sequence spread-spectrum CDMA,” IEEE Trans. Commun., vol. 42, pp. [22] , Multiuser Detection. Cambridge, U.K.: Cambridge Univ.
3178–3188, Dec. 1994. Press, 1998.
[11] A. W. Marshall and I. Olkin, Inequalities: Theory of Majorization and [23] P. Viswanath and V. Anantharam, “Optimal sequences and sum capacity
Its Applications. New York: Academic, 1979. of synchronous CDMA systems,” this issue, pp. 1984–1991.
[12] J. L. Massey and T. Mittelholzer, “Welch’s bound and sequence sets [24] A. J. Viterbi, CDMA—Principles of Spread Spectrum Communication.
for code-division multiple access systems,” in Sequences II, Meth- Reading, MA: Addison-Wesley, 1995.
ods in Communication, Security and Computer Science, R. Capocelli, [25] L. R. Welch, “Lower bounds on the maximum cross correlation of
A. De Santis, and U. Vaccaro, Eds. New York: Springer-Verlag, signals,” IEEE Trans. Inform. Theory, vol. IT-20, pp. 397–399, May
1993. 1974.
[13] M. Rupf and J. L. Massey, “Optimum sequence multisets for syn- [26] Z. Xie, Short, and C. Rushforth, “A family of suboptimum detectors for
chronous code-division multiple-access channels,” IEEE Trans. Inform. coherent multiuser communications,” IEEE J. Select. Areas Commn.,
Theory, vol. 40, pp. 1261–1266, July 1994. vol. 8, pp. 683–690, May 1990.