WCDMA system
Download
Report
Transcript WCDMA system
Multi-user CDMA
Enhancing capacity of wireless
cellular CDMA
Characterizing asynchronous CDMA system
Normalize power for each user:
1 t 2
0 si (t )dt 1, i 1, 2, U
tm
m
U
ˆ (tm ) m jj mij n j
Integrate and dump yields at the decision time: m
Intended signal for the j:th user:
1 t
User interference (MAI): mij 0
tm
i 1
i j
2(35)
m jj
m
1 t
0
tm
m
Pj s j (t )v j (t )dt Pj
Ps
(t )v j (t )dt Pi ij
i i
Timo O. Korhonen, Helsinki University of Technology
Characterizing asynchronous CDMA system (cont.)
The AWGN component is at the the decision time
nj
1 t
0 n(t )v j (t )dt
tm
m
Sum effect of user interference is a function of (1) applied codes
crosscorrelation, (2) modulation method, (3) user power balance,
(4) code synchronization, (5) channel characteristics
The j:th user experiences the SNR:
( SNR) j
( SNR ) j
3(35)
m 2jj
E mij n j
i
2
Pj
2
E mij 2 E mij n j E n 2j
i
i
Timo O. Korhonen, Helsinki University of Technology
Evaluating different interference and noise
components for multiple access
The background noise power is filtered by the code matched filter
or correlator:
E n 2j
2
2
Gn ( f ) Vi ( f ) df
tm
N
N 1
0 2 vi2 (t )dt 0
2tm
2 tm
0
The crossproduct component 2E mij n j is averaged into zero.
i
The user interference assuming equal rates and code
autocorrelations:
2
E mij
i
where
E[ ij2 ]
4(35)
U
U U
ij2
E mij mkj PE
i
i 1
i 1 k 1
i j k j
i j
2
2
2
R
(
)
d
s
tm 0
tm 0
t1
t1
2
2 t1
1
d
t
3 tm
1
Timo O. Korhonen, Helsinki University of Technology
SNR for the asynchronous CDMA
The user crosscorrelation power can be expressed by using the
effective bandwidth:
2
1
Beff G( f )df / G 2 ( f )df
2
that evaluates for the code matched filter as
Beff
and finally
E[ ij2 ]
3
4t1
1
2tm Beff
Therefore the j:th user experiences SNR of
( SNR ) j
Pj
1 N0
Pi
2
t
B
i 1
m eff 2tm
U
i j
Received power
2tm Beff Pj
U
N 0 Beff Pi
i 1
i j
MAI component
AWGN component
5(35)
Timo O. Korhonen, Helsinki University of Technology
Perfect power control
U
Equal received powers for U users means that
P (U 1)P
i 1
i j
i
r
2tm Beff Pr
Therefore ( SNR)O
N0 Beff (U 1) Pr
and the number of users is
1
1
U 1 2tm Beff
,
(
SNR
)
(
SNR
)
O
1
2t P
where SNR1 m j 2 Eb
N0
N0
Example: SNRO = 11.5 dB
R=30 kb/s
Note that there exist the limit for
the maximum number of users
that is not a function of Eb/N0
6(35)
Timo O. Korhonen, Helsinki University of Technology
Unequal received powers and the near-far -effect
Assume all users apply the same power but their distance to the
receiving node is different. Hence the power from the i:th node is
Pi P0 / dia
where d is the distance, and a: propagation attenuation
coefficient, a = 2 for free space. In multipath environment in UHF
range (300 MHz… 3 GHz), a = 3 … 4.
Express the power ratio of the i:th and j:th node at the common
reception point
a
a
d j
Pi d j
Pi Pj
Pj di
di
( SNR)O
2tm Beff Pj
a
dj
N 0 Beff Pj
i 1 d i
U
i j
7(35)
Timo O. Korhonen, Helsinki University of Technology
The near-far effect in asynchronous CDMA
In order to have the required (SNR)0 it is therefore required that
a
dj
d 2tm Beff
i 1 i
U
i j
1
1
( SNR)0 ( SNR)1
SNR1
2tm Pj 2 Eb
N0
N0
Note that the near-far -effect is manifested here because just one
sum term on the left side of this equation is adequate to fulfill the
condition
Example: Assume that all but one transmitter have the same
distance to the receiving node di d j , i j and i 1 . The one
transmitter has the distance d1 d j / 2.5
Assume further a=3.68, SNR=11.5 dB, Rb = 30 kb/s, Beff = 20
MHz and received Eb/N0 = 12.5, now
a
dj
3.68
d 2.5 U 2 U 14
i 1 i
U
i j
8(35)
Timo O. Korhonen, Helsinki University of Technology
Near-far effect (example cont.)
By using perfect power control the number of users is
U 1 int 2tm Beff
1
1
42
( SNR)0 ( SNR)1
Hence the presence of this single user so near has dropped the
number of users into almost 1/3 part of the maximum number
If this user comes closer than
d1 d j / 2.78
all the other users will be rejected, e.g. they can not communicate
in the system in the required SNR level. This illustrates the nearfar effect.
To minimize the near-far effect efficient power control is realized
in asynchronous CDMA-systems. (Closed and open loop power
control.)
9(35)
Timo O. Korhonen, Helsinki University of Technology
Multiple Access Interference (MAI)
For multiple access codes often have relatively good
crosscorrelations as Gold codes (asynchronous usage) or
Walsh codes (synchronous usage)
Quite often, however, correlation properties destroyed by
multipath (as happens in wireless communications)
Also Near-far-effect has a tendency to increase MAI into
harmful levels
Hence compensation of MAI would yields additional
capacity. This can be achieved by
Code waveform design
Power control
FEC codes
Adaptivity: - spatial - frequency - time
Multiuser detection
10(35)
Timo O. Korhonen, Helsinki University of Technology
Multi-user CDMA
The conventional detector
Mitigating the effect of MAI
Multi-user detection (MUD) limitations and potential
benefits
Matrix-vector notations
Synchronous and asynchronous channels
Detector classification and properties
Maximum likelihood sequence detection
Linear detectors
Decorrelating detector
Minimum mean-square error detector
Polynomial expansion detector
Subtractive interference cancellation
Serial and parallel cancellation techniques
Zero-forcing decision feedback detector
11(35)
Timo O. Korhonen, Helsinki University of Technology
Background
CDMA capacity is in great deal limited by multiple access
interference (MAI)
MAI is introduced by
breaking down code orthogonality due to
code design
always by multipath propagation
other cells build up interference
Multiuser detection is a method by which MAI can be
suppressed
Multiuser detection is computationally demanding, thus it
has become applicable quite lately
WCDMA-system has a provision for using multiuser
detection at base stations
12(35)
Timo O. Korhonen, Helsinki University of Technology
Received signal
Assume
single path AWGN channel
perfect carrier synchronization
BPSK
Received signal is therefore
K
r (t ) Ak (t ) g k (t )d k (t ) n(t )
k 1
where for K users
Ak (t ) is the amplitude
g k (t ) is the signature code waveform
d k (t ) is the modulation of the k:th user
n(t ) is the AWGN with N0/2 PSD
Note that there are PG chips/bit (PG:processing gain)
13(35)
Timo O. Korhonen, Helsinki University of Technology
Conventional detection
The conventional BS receiver for K users consists of K
matched filters or correlators:
r (t )
Tb
0
x(t )dx
decision
g1 (t )
Tb
0
x(t )dx
decision
dˆ1
dˆ2
g2 (t )
Tb
0
x(t )dx
decision
dˆK
gK (t )
Assumed that background noise is Gaussian, each user is
detected without considering deterministic noise of the
other users
14(35)
Timo O. Korhonen, Helsinki University of Technology
Output for the K:th user without MUD
Detection quality depends on code cross- and
1
autocorrelation
i ,k gi (t ) g k (t )dt
Tb Tb
Hence we require a large autocorrelation and small
crosscorrelation
i ,k 1, i k
0 i ,k 1, i k
The output for the K:th user consist of the signal, MAI and
filtered Gaussian noise terms
1
yk T r (t ) g k (t )dt
Tb
b
yk Ak d k i 1 i ,k Ai d i
K
ik
1
n(t ) g k (t )dt
T
Tb
b
yk Ak d k MAI k zk
15(35)
Timo O. Korhonen, Helsinki University of Technology
MAI versus ISI (Inter-Symbolic Interference)
Multiuser detection main classification:
linear
subtractive
Note that there exist a strong parallelism between the
problem of MAI and that of ISI:
Asynchronous K-user channel can be
modeled with a single user ISI
channel with memory of K-1
For this reason a number of multiuser detectors have
their equalizer counter parts as:
maximum likelihood
zero-forcing
minimum mean square
decision feedback
16(35)
Timo O. Korhonen, Helsinki University of Technology
Zero forcing equalizer for ISI cancellation
Classical technique to combat ISI is to use zero-forcing
equalizer (ZFE)
Principle used also in decorrelating MUD
ZFE is a time domain linear filter (or convolver) whose
discrete convolution sum can be required
to yield zero values outside of sampling instances
to be maximized at the sampling instant
17(35)
Timo O. Korhonen, Helsinki University of Technology
18(35)
Timo O. Korhonen, Helsinki University of Technology
19(35)
Timo O. Korhonen, Helsinki University of Technology
Benefits and limitations of multiuser detection
PROS:
Significant capacity improvement - usually signals of the
own cell are included
More efficient uplink spectrum utilization - hence for
downlink a wider spectrum may be allocated
Reduced MAI and near-far effect - reduced precision
requirements for power control
More efficient power utilization because near-far effect is
reduced
CONS:
If the neighboring cells are not included interference
cancellation efficiency is greatly reduced
Interference cancellation is very difficult to implement in
downlink where, however, largest capacity requirements
exist
20(35)
Timo O. Korhonen, Helsinki University of Technology
Matrix-vector notation
Assume a three user synchronous system with the
outputs
y1 A1d1 2,1 A2 d 2 3,1 A3d3 z1
y2 1,2 A1d1 A2 d 2 3,2 A3 d3 z2
y Ad A d A d z
1,3 1 1
2,3 2 2
3 3
3
3
y1 1
y
2 1,2
y3 1,3
2,1
1
2,3
3,1 A1
3,2 0
1 0
0
A2
0
0 d1 z1
0 d 2 z2
A3 d3 z3
that is expressed by the matrix-vector notation as
y RAd z
matched filter outputs
correlations between
each pair of codes
21(35)
noise
data
received amplitudes
Timo O. Korhonen, Helsinki University of Technology
The data-term and the MAI-term
Matrix R can be partitioned into two parts by setting
R IQ
and therefore MF outputs y RAd z can be expressed
as
y Ad QAd z
Note that hence Q contains off-diagonal elements or R (or
the crosscorrelations)
Therefore the term Ad contains decoupled data and QAd
represents the MAI
Objective of all MUD schemes is to cancel out the MAIterm as effectively as possible (with respect of HW and
computational efficiency)
22(35)
Timo O. Korhonen, Helsinki University of Technology
Asynchronous and synchronous channel
In synchronous detection decisions can be made bit-by-bit
In asynchronous detection bits overlap and multiuser
detection is based on taking all the bits into account
K
r (t ) Ak (t ) g k (t )d k (t k ) n(t )
k 1
User 1
User 2
1
3
2
5
4
1 2 Tb 1
6
User 1
1
3
5
User 2
2
4
6
3Tb 2
3Tb 1
Tb 1
The matrix R contains now the partial correlations that
exist between every pair of the NK code words (K users,
N bits)
23(35)
1
Timo O. Korhonen, Helsinki University of Technology
Asynchronous channel correlation matrix
In this example the correlation matrix extends to 6x6
dimension:
y RAd z
1
1,2
0
R
0
0
0
2,1
0
0
0
1
3,2
0
2,3
1
4,3
0
0
0
0
3,4
1
5,4
0
4,5
1
0
0
0
5,6
0
0
0
0
6,5
1
Note that the resulting matrix is sparse because most of
the bits do not overlap
Sparse matrix can be utilized to alleviate computational
difficulties
24(35)
Timo O. Korhonen, Helsinki University of Technology
Maximum-likelihood sequence detection
Optimum multiuser detection uses maximum-likelihood
principle:
Considering the whole received sequence
find the sequence estimate that has the
minimum distance to the received
sequence
The ML principle
has the optimum performance
has severe computational difficulties - In exhaustive
search 2NK vectors to consider! (K users, N bits)
can be implemented by using Viterbi-decoder that
reduces computations approximately to 215xN
requires estimation of received amplitudes and phases
that takes still more computational power
25(35)
Timo O. Korhonen, Helsinki University of Technology
Decorrelating detector
The decorrelation detector applies the inverse of the
correlation matrix
Ldec R1
and the data estimate is therefore
dˆ dec R 1y
R 1 ( Ad QAd z )
RAd
Ad R 1z Ad z dec
We note therefore that the decorrelating detector
completely eliminates the MAI
Note that the noise is filtered by the inverse of correlation
matrix - This results in noise enhancement
Mathematically decorrelating detector is similar to zero
forcing equalizer used to compensate ISI
26(35)
Timo O. Korhonen, Helsinki University of Technology
Decorrelating detector properties summarized
Provides substantial performance improvement over
conventional detector under most conditions
Does not need received amplitude estimation
Has computational complexity substantially lower that the
ML detector (linear with respect of number of users)
Corresponds ML detection when the energies of the users
are not know at the receiver
Has probability of error independent of the signal energies
Optimal near-far resistance metric
Noise enhancement
High computational complexity in inverting R
27(35)
Timo O. Korhonen, Helsinki University of Technology
Minimum mean-square error (MMSE) detector
Based on solving MMSE optimization problem where
2
E[ d Ly ]
should be minimized
This leads into solution
ˆd LMMSE y R ( N0 / 2)A2 1 y
One notes that under high SNR this solution is the same
as decorrelating receiver
This multiuser technique is exactly equal to MMSE linear
equalizer used to combat ISI
Pros: Provides improved noise behavior with respect of
decorrelating detector
Cons:
Requires estimation of received amplitudes
Performance depends on powers of interfering users
28(35)
Timo O. Korhonen, Helsinki University of Technology
r (t )
MF
user 1
Aˆ1 (t Tb )
decision
Tb
r (t Tb )
dˆ1
g1 (t 1 Tb )
- sˆ1 (t Tb )
+
r1 (t )
To the next stage
Successive interference cancellation (SIC)
Each stage detects, regenerates and cancels out a user
First the strongest user is cancelled because
it is easiest to synchronize and demodulate
this gives the highest benefit for canceling out the
other users
Note that the strongest user has therefore no use for this
MAI canceling scheme!
Pros: minimal HW and significant performance
improvement when compared to conventional detector
Cons: Processing delay, signal reordered if their powers
changes, in low SNR:s performance suddenly drops
29(35)
Timo O. Korhonen, Helsinki University of Technology
Parallel interference cancellation (PIC)
r (t Tb )
sˆ1 (t Tb )
dˆ1 (0)
dˆ2 (0)
dˆK (0)
Aˆ1 (t Tb )
sˆ2 (t Tb )
Aˆ2 (t Tb )
spreader
sˆK (t Tb )
amplitude
estimation
i 1
sˆi (t ) i2
sˆ (t ) i K
AˆK (t Tb )
s
(
t
)
ˆ
i
i
dˆ1 (1)
+
matched
filter
bank
ˆ
decisions d2 (1)
and
stage
weights dˆK (1)
parallel
summer
With equal weights for all stages the data estimates for
each state are
dˆ (m 1) y QAdˆ (m) y Ad QAd z
Ad QA(d dˆ (m)) z
Number of stages determined by required accuracy
(Stage-by-stage decision variance can be monitored)
30(35)
Timo O. Korhonen, Helsinki University of Technology
PIC variations
PIC variations
SIC performs better in non-power controlled channels
PIC performs better in power balanced channels
Using decorrelating detector as the first stage
improving first estimates improves total performance
simplifies system analysis
Linearly combining the soft-decision outputs of different
stages of the PIC detector
noise correlations between stages can be used to
cancel out each other improving performance greatly
Doing a partial MAI cancellation at each stage with the
amount of cancellation increasing for each successive
stage
tentative decisions of the earlier stages are less
reliable - hence they should have a lower weight
very large performance improvements have achieved
by this method
probably the most promising suboptimal MUD
31(35)
Timo O. Korhonen, Helsinki University of Technology
Zero-forcing decision-feedback (ZF-DF) detector
dec*
r (t )
dˆ1 (1)
K 1
dˆk (n 1) yw,k i 0 Fk ,i Ai dˆi (n)
A1 F2,1
matched
filter
bank
(F
F )
T 11
T
A1 F3,1
A1FK ,1
-
dˆ2 (1)
dec
A2 F3,2
-
A2 FK ,2
-
dec
AK FK , K
-
-
dec
dˆK (1)
An enhanced SIC technique consisting of
pre-whitening that removes noise correlations and
partially removes signal correlations
SIC performed in the descending order of signal power
T
The pre-whitening is realized by decomposing R F F
where after y w FAd ( N0 / 2)I
32(35)
*decision device
Timo O. Korhonen, Helsinki University of Technology
Some properties of ZF-DF detector
Pre-whitening can be shown to cause the first detected bit
to contain no MAI
Under the assumption that all past decisions are correct,
the ZF-DF eliminates all MAI and maximizes SNR.
ZF-DF principle can be used also to combat ISI
An important difficulty is is to calculate the whitening filter
(FT)-1. This can be simplified similar techniques than the
Polynomial expansion (PE) detector (next slide)
ZF-DF needs the estimates of received amplitudes
If the soft output of the decorrelating detector are used
for amplitude estimation, ZF-DF performance equals
decorrelating detector
If still improved amplitude estimates exists, ZF-DF
performance can be even higher
33(35)
Timo O. Korhonen, Helsinki University of Technology
Polynomial expansion (PE) detector
Many MUD techniques require inversion of R. This can be
obtained efficiently by PE
NS
L PE wi R i R 1
i 0
dˆ PE LPE y
For finite length message a finite length PE series can
synthesize R-1 exactly. However, in practice a truncated
series must be used for continuous signaling
dˆ PE LPE y
y
r (t )
matched
filter
bank
Weight
multiplication
Ry
R
y
R2 y
R
Ry
34(35)
Weight
multiplication
Weight
multiplication
R
R2 y
Timo O. Korhonen, Helsinki University of Technology
Summary of MUD techniques
MAI limits significantly performance of CDMA systems and
enhances near-far effect
MAI can be compensated by using MUD-techniques
MUD is especially applicable in cellular uplink
Optimum MUD (maximum likelihood) is too complicated to
realize, hence suboptimum techniques developed:
Linear
MMSE
PE
Subtractive
SIC
PIC
ZF-DF
35(35)
Timo O. Korhonen, Helsinki University of Technology