Unit Iii
Unit Iii
CDMA stands for Code Division for Multiple Access and is considered a path-breaking
wireless technology due to its several superior properties. It was first employed in the 2nd
generation IS-95 cellular standard, which was predominantly used in North America, under
the brand name cdmaOne. It also forms the basis for several advanced 3rd Generation i.e., 3G
cellular standards such as Wideband CDMA (WCDMA), High-Speed Downlink Packet Access
(HSDPA), High Speed Uplink Packet Access (HSUPA), CDMA 2000, and 1x Evolution
Data Optimized (1xEV-DO). In order to understand the concepts in CDMA, it is critical to
understand the concept of multiple access. In conventional wired communication systems,
there is a dedicated wireline communication channel which is allocated exclusively to the
particular device such as a telephone, etc. However, in a wireless network, mobile phones and
other wireless-communication devices are required to share the common radio channel over
the air. This is shown in Figure 5.1. This is because the radio channel is common for all the
users/ devices and the available wireless frequency bands are limited. Thus, it is necessary to
device a mechanism for multiple users to access this common radio channel, which is termed
as a Multiple Access (MA) technology. Thus, multiple access is at the heart of modern wireless
technologies, especially 3G and 4G cellular technologies.
Several multiple-access technologies have been developed and employed for cellular
applications. In fact, each generation of cellular standards is characterized by a particular
multiple-access technology. For instance, the first generation, i.e., 1G cellular standards were
based on Frequency Division Multiple Access (FDMA). In FDMA, different users are alloted
different frequency bands. Thus, the users are multiplexed in the frequency domain and
120 Principles of Modern Wireless Communication Systems
they access the radio channel in their respective frequency bands of bandwidth B . This is
schematically shown in Figure 5.2. On the other hand, the second generation or 2G cellular
standards are based on digital Time Division for Multiple Access (TDMA) in which different
users are allocated different time slots of duration T for accessing the wireless channel.
Thus, the different users are multiplexed in the time domain as shown in Figure 5.3. These
technologies were replaced by CDMA in successive 3G wireless technologies. The motivation
and basic mechanism of CDMA is described in the next section.
T T T
CDMA, as the name suggests, is a multiple-access technology based on code division. In other
words, different users are multiplexed using different codes. Consider a two-user scenario, i.e.,
two users accessing the radio channel simultaneously. Let a0 denote the symbol of the user 0,
while a1 denotes the transmit symbol corresponding to the user 1. Let the code c0 of the user 0
be given as c0 = [1, 1, 1, 1]. The above code c0 is of length N = 4 chips. Each element of the
code is termed as a chip. The transmitted signal x0 of the user 0 is then given by multiplying
the code c0 with the symbol a0 as
x0 = a0 × [1, 1, 1, 1]
= [a0 , a0 , a0 , a0 ] (5.1)
The structure of the above transmit signal x0 can be interpreted as follows. The symbol a0,
of the user 0, is multiplied by the code c0 to yield 4 chips x0 (i), 0 ≤ i ≤ N − 1. Similarly,
let the code c1 , given as c1 = [1, −1, −1, 1], correspond to the code of the user 1. Hence, the
sequence of chips corresponding to the user 1 transmission is given as
The signals x0 , x1 corresponding to users 1, 2 respectively are now summed to yield the net
signal x as
This sum, or composite, signal is then transmitted on the downlink from which each of the users
0, 1 detect their own signal. This is done as follows. User 1 correlates the received signal x with
his code c0 , i.e., basically multiplies each chip of the received signal x with the corresponding
chip of the code c0 = [1, 1, 1, 1] and sums across the chips as follows.
a0 + a1 a0 − a1 a0 − a1 a0 + a1
× 1 1 1 1
(5.4)
(a0 + a1 ) + (a0 − a1 ) + (a0 − a1 ) + (a0 + a1 ) = 4a0
Thus, the result of the above correlation is 4a0 , which is proportional to the transmitted symbol
a0 . Similarly, at the user 2, the received signal x is correlated with the chip sequence c1 =
122 Principles of Modern Wireless Communication Systems
a0 + a1 a0 − a1 a0 − a1 a0 + a1
× 1 −1 −1 1
(5.5)
(a0 + a1 ) − (a0 − a1 ) − (a0 − a1 ) + (a0 + a1 ) = 4a1
to yield 4a1, which is proportional to the transmitted symbol a1 of the user 1. Thus, unlike in
GSM or FDMA, in which the signals of different users are transmitted in different time slots
or frequency bands, in CDMA, all the signals of the different users are contained in the single
signal x over all time and frequency. However, in CDMA, the symbols of the different users
are combined using different codes. For instance, in the above example, the symbols a0 , a1 of
users 0, 1 are multiplied with codes c0 , c1 prior to transmission. Thus, the users of the different
signals are multiplexed over the common wireless channel employing different codes. Hence,
this is termed Code Divison for Multiple Access, i.e., multiple access based on different codes.
The key operations in CDMA can be summarized as follows.
1. Multiplying or modulation the symbols of the different users with the corresponding
assigned unique code, similar to the procedure illustrated in equations (5.1), (5.2).
2. Combining or adding the code-modulated signals of all the users to form the composite
signal as shown in Eq. (5.3), followed by subsequent transmission of the signal.
3. Finally, correlation of the composite received signal x at each user with the corresponding
code of the user to recover the transmitted symbol. This is described in Eqs (5.4), (5.5).
In fact, from the example illustrated in the previous section, the astute reader will realize that
it is no accident by which we are able to recover the signals of users 0, 1. Computing the
correlation r01 of the user codes c0 , c1 yields
3
r01 = c0 (k) c1 (k)
k=0
Code Division for Multiple Access (CDMA) 123
= 1 × 1 + 1 × (−1) + 1 × (−1) + 1 × 1
= 1 + (−1) + (−1) + 1
=0
Thus, since the correlation between the codes c0, c1 is zero, the codes are, in fact, orthogonal.
This is what helps us recover the symbols of the different users from the composite signal.
This is a key property of the codes employed in CDMA wireless systems, and a fundamental
principle on which the theory of CDMA is based.
Further, consider a fundamental property of the CDMA system arising because of the
employment of these codes. Let the symbol rate for the symbols a0 of the user 0 be 1 kbps.
Hence, the time period T per symbol is
1
T = = 1 ms
1 kbps
1
B= = 1 kHz
T
However, now consider the transmission of the symbol a0 multiplied with the corresponding
code c0, i.e., a0 × [1, 1, 1, 1] = [a0 , a0 , a0 , a0]. Thus, for each symbol a0, one has to transmit
4 chips. Thus, to keep the symbol rate constant at 1 kbps, the time of each chip Tc has to be set
as Tc = 14 T = 0.25 ms. Thus, the bandwidth required for this system is
1 1
BCDMA = = = 4 kHz
Tc 0.25 ms
Thus, modulating with the code c0 of length N = 4, results in an increase of the required
bandwidth by a factor of N , i.e., from 1 kHz to 4 kHz. This is shown schematically in
Figure 5.4. Thus, it basically results in a spreading of the original signal bandwidth and, hence,
is termed a spreading code. Also, since the resulting signal occupies a large bandwidth, CDMA
systems are also termed spread spectrum or wideband systems.
Also, another interesting question the reader might be interested in is the following: How
many such orthogonals exist for a given spreading code length N ? The answer is there are N
such orthogonal codes. For instance, consider the case N = 4.
124 Principles of Modern Wireless Communication Systems
c0 = 1 1 1 1
c1 = 1 − 1 − 1 1
c2 = 1 − 1 1 − 1
c3 = 1 1 − 1 − 1
The reader can verify that the codes c0, c1 , c2 , c3 are orthogonal to each other. For example,
consider c1 , c2 . The correlation r12 between codes c1, c2 is
3
r12 = c0 (k) c1 (k)
k=0
This implies that given a spreading sequence length N , there exist N orthogonal codes and
hence, N users can be multiplexed together. This is important, since the bandwidth increases
by a factor of N due to transmission employing the codes as described earlier. However, it
is important to note that no inefficiency is introduced in the system because of the increase
in bandwidth, because this increase in bandwidth by a factor of N is compensated by the
parallel transmission of the signals corresponding to the N users over the same bandwidth.
Thus, the spectral efficiency of the system is not compromised. This is schematically illustrated
in Figure 5.5.
Code Division for Multiple Access (CDMA) 125
a0 Code 0
a1 Code 1
N Symbols
a2 Code 2
a3 Code 3
a0 a1 a2 a3
T = NTc
T Symbols
Consider the code c2 = [1, −1, 1, −1]. Observe that the code looks like a random sequence of
+1, −1, or a pseudo-noise (PN) sequence. This is so termed since it only resembles a noise
sequence, but is not actually a noise sequence. One method to generate such long spreading
codes based on PN sequences for a significantly large N is through the employment of a Linear
Feedback Shift Register (LFSR). This is described next.
Consider the shift register architecture shown in Figure 5.6, where the element D
represents delays. Thus, the digital circuit therein contains D = 4 delay elements or shift
registers. The input on the left is denoted by Xi , and the outputs of the different delays are
Xi−1 , Xi−2 , Xi−3 , Xi−4 . Let Xi−4 also denote the final output of the system. Also observe
that the xor Xi−4 ⊕ Xi−3 is fed back as Xi which is the input to the first shift register. Thus,
the governing equation of the circuit is
Xi = Xi−3 ⊕ Xi−4
which is a linear equation. Thus, since it implements a linear relation, with feedback and uses
delay elements or shift registers, such a circuit is also termed a Linear Feedback Shift Register
(LFSR) architecture. Since the next inpur, i.e., Xi depends on Xi−1, Xi−2, Xi−3, Xi−4, this
can also be thought of as the current state of the system. Consider initializing the system in the
state Xi−1 = 1, Xi−2 = 1, Xi−3 = 1, Xi−4 = 1. Thus, we have the corresponding Xi given
126 Principles of Modern Wireless Communication Systems
as
Xi = Xi−3 ⊕ Xi−4 = 1 ⊕ 1 = 0
This Xi becomes Xi−1 at the next instant and similarly, Xi−2, Xi−3 are shifted to the right as
Xi−3 , Xi−4 respectively. Continuing in this fashion, the entire sequence of state of the above
LFSR is summarized. It can be seen that the LFSR goes through the sequence of 15 states
1111, 0111, 0011, 0001, 1000, 0100, 0010, 1001, 1100, 0110, 1011, 0101, 1010, 1101, 1110,
before reentering the state 1111. Subsequently, the entire sequence of states repeats again.
Observe that this goes through 2D − 1 = 24 − 1 = 15 states. Also note that the maximum
number of possible states for D = 4 is 2D = 16. However, the LFSR can be seen to go
through all the possible states except one, which is the 0000 or the all-zero state.
Xi Xi - 1 Xi - 2 Xi - 3 Xi - 4
D D D D
Feedback
Xi = Xi - 3 ≈ Xi - 4
Xi = Xi−3 ⊕ Xi−4 = 0 ⊕ 0 = 0
Further, observe that if the LFSR is initialized in the 0000 state, it continues in the 0000 state,
since the corresponding Xi is leading to the next state of 0000. Thus, the LFSR never gets out
of the all zero states! Therefore, it is desired that the LFSR never enter the all-zero state. Such
an LFSR circuit which goes through the maximum possible 2D − 1 states, without entering the
all-zero state is termed a maximum-length shift register circuit or maximum length LFSR. The
generated PN sequence is termed a maximum-length PN sequence. Thus, the maximum-length
PN sequence is of length 2D − 1. For instance, for the above LFSR, the maximum-length PN
sequence is the sequence of outputs Xi−4 given as
PN Sequence = 1 1 1 1 0 0 0 1 0 0 1 1 0 1 0
Code Division for Multiple Access (CDMA) 127
We can map the bits 1, 0 to the BPSK symbols −1, +1 to get the modulated PN sequence,
PN sequence = −1 − 1 − 1 − 1 + 1 + 1 + 1 − 1 + 1 + 1 − 1 − 1 + 1 − 1 + 1 (5.6)
1 1 1
P (Xi = +1, Xi+1 = +1) = × =
2 2 4
Similarly, one can explain the fraction 18 corresponding to runs of length 3. Thus, this further
supports the noiselike properties of PN sequences.
Property 3-Correlation Property: The correlation property is one of the most important
properties of PN sequences. Consider again the BPSK chip sequence shown in Eq. (5.6) and
denote it by c0 (n). Let us now look at the correlation properties of this sequence. Consider the
correlation r00 (0), i.e., the correlation of the sequences c0 with itself (the meaning of the (0)
will become clear soon). This correlation is given as
N −1
1
r00 (0) = c0 (n) c0 (n)
N
i=0
N −1
1
= 1
N
i=0
1
= ×N = 1
N
Now, consider a circularly shifted version of the PN sequence, shifted by n◦ = 2. Let it be
denoted by c0 (n − 2). This circularly shifted sequence by 2 chips can be readily seen to be
given as
PN Sequence = −1 + 1, −1 − 1 − 1 − 1 + 1 + 1
+1 − 1 + 1 + 1 − 1 − 1 + 1 (5.7)
Let us denote the correlation between c0 (n) and c0 (n − 2) by r00 (2), where the (2) can now
be seen to represent a circular shift of 2. The correlation can be seen to be given as
N −1
1
r00 (2) = c0 (n) c0 (n − 2)
N
i=0
Code Division for Multiple Access (CDMA) 129
1
= {(−1) × (−1) + (−1) × (1) + (−1) × (−1) + (−1) × (−1) + (1) × (−1) +
15
(1) × (−1) + (1) × (1) + (−1) × (1) + (1) × (1) + (1) × (−1) + (−1) × (1) +
1
= (1 − 1 + 1 + 1 − 1 − 1 + 1 − 1 + 1 − 1 − 1 − 1 − 1 + 1 + 1)
15
1 1
= × (−1) = −
15 15
1
=−
N
In fact, one can compute the correlation for other such nonzero delays, and can demonstrate
the the correlation is always − N1 . This autocorrelation property of the PN sequence, i.e., of
the sequence with a delayed version of itself, is shown pictorially in Figure 5.7. Thus, it can
be seen that while the correlation of the sequence with itself corresponding to a lag of 0 is
1, for any other nonzero shift, it assumes a very low value of − N1 , which tends to the limit
0 as the spreading length N → ∞. This autocorrelation property of the PN sequences can be
summarized as follows.
Shift n0
-1/N
⎧
N −1 ⎨ 1 if n = 0
1 ◦
r00 (n◦ ) = =
N ⎩ − 1 otherwise
i=0 N
With this background, let us investigate the properties of random spreading sequences in the
next section.
130 Principles of Modern Wireless Communication Systems
In the previous section, we have seen that CDMA spreading sequences can be chosen as PN
sequences, which have noiselike properties. In other words, one can choose a chip sequence
ck (i) , 0 ≤ i ≤ N − 1 for the user k such that P (ck (i) = +1) = P (ck (i) = −1) = 12 . Thus,
we have,
1 1
E {ck (i)} = × (+1) + (−1) = 0.
2 2
The above property implies that each chip ck (i) is uncorrelated with chip ck (j). Further, one
can choose independent sequences for different users, that is, to say
Let us examine the correlation properties of such random spreading sequences. As before, let
r0 0 (k) denote the autocorrelation of the chip sequence of the user k = 0, corresponding to a
lag k = 0. This can be expressed as
N −1
1
r00 (k) = c0 (i) c0 (i − k)
N
i=0
N −1
1
= E {c0 (i) c0 (i − k)}
N
i=0
Code Division for Multiple Access (CDMA) 131
N −1
1
= E {c0 (i)} E {c0 (i − k)}
N
i=0
N −1
1
= 0=0
N
i=0
Thus, the average value or the expected value of the correlation E {r00 (k)} is zero for lags
k = 0. This is expected from the random properties of the spreading sequence. To compute the
2 (k) given as
variance of the autocorrelation r00 (k), consider r00
⎛ ⎞
N −1 N −1
2 1
r00 (k) = 2 c0 (i) c0 (i − k) ⎝ c0 (j) c0 (j − k)⎠
N
i=0 j=0
N −1 N −1
1
= 2 c0 (i) c0 (i − k) c0 (j) c0 (j − k)
N
i=0 j=0
Now, let us consider the quantity c0 (i) c0 (i − k) c0 (j) c0 (j − k). It can be seen that if i = j ,
the expected value of this quantity can be simplified as
E {c0 (i) c0 (i − k) c0 (j) c0 (j − k)} = E {c0 (i) c0 (i − k)} E {c0 (j) c0 (j − k)}
=0
= 1×1 = 1
2 (k) can be simplified as
Thus, the variance of r00 (k), i.e., E r00
N −1 N −1
2 1
E r00 (k) = 2 E {c0 (i) c0 (i − k) c0 (j) c0 (j − k)}
N
i=0 j=0
132 Principles of Modern Wireless Communication Systems
N −1
1
= E c20 (i) c20 (i − k)
N2
i=0
N −1
1 1
= 2 1= ×N
N N2
i=1
1
=
N
Thus, the variance or basically the power of r00 (k), the autocorrelation of the random CDMA
spreading sequence is E r00 2
(k) = N1 . Also, once again, the autocorrelation corresponding
to a lag of k = 0 can be readily seen to be given as
N −1
1
E {r00 (0)} = E c0 (i) c0 (i)
N
i=0
N −1
1
= E c20 (i)
N
i=0
N −1
1
= 1
N
i=0
1
= ×N = 1
N
Therefore, one can succinctly summarize the autocorrelation properties of the random
spreading sequence as follows. For k = 0, r00 (k) = 1. For k = 0, r00 (k) is a random variable
with E {r00 (k)} = 0 and variance E r002
(k) = N1 . Let us now examine the cross-correlation
properties of the random CDMA spreading sequences, i.e., the correlation between the
spreading sequences c0 (i) , 0 ≤ i ≤ N − 1 and c1 (j) , 0 ≤ j ≤ N − 1. We denote by r01 (k)
the cross-correlation between spreading sequences c0, c1 corresponding to a lag k as
N −1
1
r01 (k) = c0 (i) c1 (i − k)
N
i=0
Once again, the expected value for any lag k can be computed as
N −1
1
E {r01 (k)} = E c0 (i) c1 (i − k)
N
i=0
Code Division for Multiple Access (CDMA) 133
N −1
1
= E {c0 (i) c1 (i − k)}
N
i=0
N −1
1
= E {c0 (i)} E {c1 (i − k)}
N
i=0
N −1
1
= 0×0=0
N
i=0
2
Further, the variance E r01 (k) for any delay k is given as
⎧ ⎛ ⎞⎫
⎨ N −1 N −1 ⎬
2 1
E r01 (k) = 2 E c0 (i) c1 (i − k) ⎝ c0 (j) c1 (j − k) ⎠
N ⎩ ⎭
i=0 j=0
N −1 N −1
1
= E {c0 (i) c1 (i − k) c0 (j) c1 (j − k)}
N2
i=0 j=0
N −1
1
= E c20 (i) E c21 (i − k)
N2
i=0
N −1
1
= 2 1
N
i=0
1 1
= 2
×N =
N N
where we have again used the fact E {c0 (i) c1 (i − k) c0 (j) c1 (j − k)} is nonzero only if
i = j in the above derivation. Thus, once again, it can be seen that the cross-correlation
r01 (k) between two random CDMA spreading sequences c0 c1 is a random variable
with E {r01 (k)} = 0 and variance E r01 2
(k) = N1 . Thus, unlike the codes introduced in
Section 5.3, these random spreading codes do not satisfy the definition of exact orthogonality.
However, they are approximately orthogonal, in that the average value of the correlation is
zero and the power in the correlation is proportional to N1 which tends to 0 as N → ∞.
Now let us analyze the performance of a multi-user CDMA system using the properties
of the spreading sequences described above. Let a0 , a1 denote the symbols of users 0, 1
134 Principles of Modern Wireless Communication Systems
respectively. Further, let the transmit powers of the users be denoted by E |a0 |2 = P0 and
E |a1 |2 = P1 . On the downlink, as described in Section 5.2, the signal x0 (n) of the user 0
is derived by modulating the symbol a0 with the spreading sequence c0 (n) as
x0 (n) = a0 c0 (n)
Similarly, the signal x1 (n) is given as x1 (n) = a1c1 (n). The net downlink multiplexed signal
x (n) is formed from the constituent signals x0 (n) , x1 (n) as
Assuming a simplistic AWGN channel model to begin with, the received signal at the user 0 is
given in the presence of additive white Gaussian noise as
where the noise w (n) is such that E {w (n)} = 0 and E |w (n)|2 = σn2 . Further, the
whiteness property of the noise implies that E {w (n1 ) w (n2 )} = 0 if n1 = n2 . Again, as
described already in Section 5.2, we correlate with the spreading code c0 of the user 0 to
recover the symbol of the user 0 as
N −1
1
d0 = y (n) c0 (n)
N
i=0
N −1 N −1 N −1
1 1 1
= a0 c0 (n) c0 (n) + a1 c1 (n) c0 (n) + w (n) c0 (n),
N N N
i=0 i=0 i=0
Desired user Interferer Noise
−1
where the component N1 N i=0 a0 c0 (n) c0 (n) corresponds to the desired user signal when
−1
considering decoding at the user 0, while the component N1 N i=0 a1 c1 (n) c0 (n), which arises
due to a1 constitutes the interference, and is also termed multi-user interference in the context
−1
of CDMA. The last component N1 N i=0 w (n) c0 (n) corresponds to the noise at the receiver.
Below, we analyze and derive the statistical properties of each of the components described
Code Division for Multiple Access (CDMA) 135
above. We start with the signal of the desired user, which can be simplified as
N −1 N −1
1 1
a0 c0 (n) c0 (n) = a0 c0 (n) c0 (n)
N N
i=0 i=0
= a0 r00 (0) = a0 ,
where r00 (0) corresponds to the autocorrelation of spreading code c0 (n) of the user 0 for a
delay n◦ = 0, which was simplified above in Section 5.5. Hence, the desired signal power
is given as E |a0|2 = P0 . Next, we calculate the power in the multi-user interference
component. This component, denoted by I1 , i.e., interference from the user 1 can be simplified
as
N −1
1
I1 = a1 c1 (n) c0 (n)
N
i=0
N −1
1
= a1 c1 (n) c0 (n)
N
i=0
= a1 r01 (0)
1 P1
= P1 × = .
N N
Thus, unlike the previous cases described in Eqs (5.4) and (5.5), the interference from the user 1
is not exactly zero due to the approximate orthogonality of the random spreading codes as
described in Section 5.5. However, the interference power decays as N1 , which is significantly
small for large values of spreading length N . The noise power can be calculated as follows.
Let w̃0 denote the noise, i.e.,
N −1
1
w̃0 = w (n) c0 (n)
N
i=0
136 Principles of Modern Wireless Communication Systems
It can be readily seen that w̃0 is a linear combination of Gaussian noise components w (n) and
is, therefore, Gaussian in nature. Further, the expected or average value of w̃0 can be obtained
as
N −1
1
E {w̃0 } = E w (n) c0 (n)
N
i=0
N −1
1
= E {w (n)} c0 (n)
N
i=0
N −1
1
= 0 × c0 (n)
N
i=0
=0
Thus, the average value of the noise is 0. Also, the average power in the noise can be calculated
as
N −1 N −1
1
E |w̃0 |2 = E w (n) c0 (n) w (m) c0 (m)
N2
n=0 m=0
N −1 N −1
1
= 2 E {w (n) c0 (n) w (m) c0 (m)}
N
n=0 m=0
N −1
1
= E |w0 (n)|2 |c0 (n)|2
N2
n=0
N −1
1 1
= 2 σn2 = × N σn2
N n=0
N2
σn2
= (5.8)
N
In the above simplification, we have used the fact that the noise samples w (n) are uncorrelated.
Therefore, if n = m, we have
= 0 × 0 × c0 (n) c0 (m) = 0
Code Division for Multiple Access (CDMA) 137
Thus, the effective noise power is N1 σn2 . Hence, for the above CDMA scenario, one can define
the Signal-to-Interference-Noise power Ratio (SINR) as
Signal Power
SINR =
Interference Power + Noise Power
P0
= P1 σn
2
N + N
P0
=N× (5.9)
P1 + σn2
From the above expression, it can be clearly seen that the signal power is reduced at the receiver
not only due to the noise but also due to the interference. Hence, CDMA is an interference-
limited system, due which the interference power has to be managed for better performance.
Also, notice that there is a factor of N in the numerator, which arises because the interference
and noise power is suppressed by a factor of N . This is termed the spreading gain of the
CDMA system, which is equal to the spreading length.
The above expression in Eq. (5.9) for SINR in a CDMA network can be generalized to the
context of greater and two users. Consider K + 1 CDMA users 0, 1, ..., K transmitting with
powers P0 , P1 , ..., PK respectively on codes c0 (n) , c1 (n) , ..., cK (N ). Hence, the received
signal y (n) is given as
The corresponding SINR after for the user 0 after correlating and decoding with the spreading
code c0 (n) corresponding to the user 0 can be similarly obtained as
P0
SINR = P1 P2 PK σn
2
N + N + ... + N + N
P0
=N× K
(5.10)
k=0 Pk + σn2
Hence, the SNR at the receiver is SNR = σP2 . However, in the presence of a jamming signal
w
Thus, the jammer interferes with the signal reception and the signal-to-interference-noise
P
power ratio (SINR) can be calculated as SINR = Pj +σ 2 . Thus, the jammer has a significant
w
disruptive impact on the communication signal. Consider now a CDMA system in which the
transmitted signal x (n) is a spread-spectrum signal. As shown in the section above, the SINR
Code Division for Multiple Access (CDMA) 139
P
SINR = Pj σw
2 (5.11)
N + N
Thus, it can be seen that the jamming power Pj is suppressed by a factor of N . Moreover,
as the spreading factor N increases, the jammer suppression increases, minimizing the impact
of the jammer on the communication system. This is termed jammer suppression in CDMA
systems. Hence, CDMA which is inherently tolerant to jamming attacks is highly attractive for
defense applications. In fact, the earliest applications of CDMA were in the context of tactical
military secure communications, which were resistant to attacks by jammers. Only later were
the benefits of CDMA realized and applied in the context of civilian cellular networks. Also,
it is worthwhile noting that the gain of N in this context of jammer suppression is also termed
the jammer margin. Thus, the jammer margin is equal to N , i.e., the spreading length of the
CDMA codes.
P0
=N× K+1
k=0 Pk + σn2
Thus, the addition of a new user K + 1 with power PK+1 only causes an incremental
interference of PK+1
N at the user 0. Further, in general, at any user i = (K + 1), the additional
P
interference due to the introduction of this new user is K+1N . Therefore, the addition of the
new user K + 1 does not adversely affect any single user. Rather, the additional interference
caused by this new user is shared amongst all the existing users in the system leading to
interference distribution. This sharing of the interference by all the existing users leads to
140 Principles of Modern Wireless Communication Systems
a graceful degradation of the SINR at each user. This is termed the graceful degradation
property of CDMA systems. This idea of graceful degradation is key to understanding the big
advantage of CDMA networks, i.e., universal frequency reuse, which is described next.
Figure 5.9 Intercell interference for the user 0 on the cell edge
interference case described in Eq. (5.11). Thus, if the same frequency f is allocated in adjacent
cells, it will cause heavy interference and degradation of user SINR results from adjacent cell
Code Division for Multiple Access (CDMA) 141
However, now consider the same scenario in the context of a CDMA network. Again,
assume that the same frequency f is allotted for transmission to users in both C0 , C1 . However,
let x0 (n) with power P0 is now transmitted on code c0 (n), while x1 (n) with power P1 is
transmitted in the cell 1 on the random code c1 (n). Hence, now similar to the jammer scenario
in a CDMA system, the interference caused by the user on the identical frequency f in the
adjacent cell is now reduced by a factor of N to PN1 . Therefore, the SINR is now given as,
P0
SINR = P1 2
σw
N + N
This is the result of graceful degradation described in the previous advantage in Section 5.7.2.
Thus, the interference of each user is limited to a fraction N1 of the interferer power. Hence,
basically the jammer margin in defence applications, can be used for adjacent cell interference
power suppression in modern cellular networks! This is a great advantage of CDMA, which
142 Principles of Modern Wireless Communication Systems
implies that the same frequency bands can be used in all cells across the network. Another way
of stating this is that the fraction of bands used in each cell is 1, i.e., all the bands. Therefore,
this is termed universal frequency reuse or equivalently, as a cellular network with frequency
reuse factor 1. Thus, compared to GSM, which uses only 17 of the frequency bands in each
cell, CDMA can use all the available frequency bands in each cell. This right away leads to an
increase of the spectral efficiency and resulting capacity by a factor of 7. Thus, CDMA-based
cellular networks have a much higher capacity compared to conventional 1G and 2G cellular
networks. This has led to a widespread adoption and embrace of CDMA-based technologies
for mobile communication.
L−1
= h (l) x (n − l) + w (n)
l=0
As done previously, let us correlate with c0 (n) to recover the symbol corresponding to the user
0. This operation can be expressed as
N −1
1
d (0) = y (n) c0 (n)
N
n=0
N −1 L−1
1
= h (l) a0 c0 (n − l) + w (n) c0 (n)
N
n=0 l=0
N −1 L−1 N −1
1 1
= h (l) a0 c0 (n − l) c0 (n) + w (n) c0 (n)
N N
n=0 l=0 n=0
w̃0
2
Recall from the analysis in Eq. (5.8) that the noise w̃0 is Gaussian of power E w̃0 2 = σNw .
The first term in the above expression can be split into two components: one corresponding to
l = 0 and the other corresponding to l == 0. Simplifying, we have
N −1 L−1 N −1
1 1
d (0) = h (0) a0 c0 (n) c0 (n) + h (l) a0 c0 (n − l) c0 (n) + w̃0
N N
n=0 l=1 n=0
N −1 L−1 N −1
1 1
= h (0) a0 c0 (n) c0 (n) + a0 h (l) c0 (n − l) c0 (n) + w̃0
N N
n=0 l=1 n=0
L−1
= h (0) a0 r00 (0) + a0 h (l) r00 (l) + w̃0
l=1
At this point, we will employ the following simplifying approximation. Consider the quantity
r00 (l). As demonstrated in Section 5.5, for l = 0, r00 (l) is a random variable with mean 0
and power N1 . Observe that the power tends to 0 as N → ∞. Hence, for large values of N ,
r00 (l) ≈ 0. Employing this approximation in the above expression, and noting that r00 (0) =
1, we have
Observe now a very interesting property. Even though there is intersymbol interference in
the above channel, we are able to extract the signal corresponding to h (0), i.e., delay 0 by
correlation with the spreading code c0 (n). This is once again because of the approximate
orthogonality property that was introduced in the previous sections. Moreover, interestingly,
144 Principles of Modern Wireless Communication Systems
one can repeat this process by individually correlating with delayed versions of the spreading
sequence c0 (n − v) , 1 ≤ v ≤ L − 1 to extract the multipath components corresponding to
h (1) , h (2) , . . . , h (L − 1). Thus, correlating with c0 (n − v), the resulting statistic d (v) can
be simplified as,
N −1
1
d (v) = y (n) c0 (n − v)
N n=0
N −1 L−1
1
= h (l) a0 c0 (n − l) + w (n) c0 (n − v)
N
n=0 l=0
N −1 L−1 N −1
1 1
= h (l) a0 c0 (n − l) c0 (n − v) + w (n) c0 (n − v)
N N
n=0 l=0 n=0
w̃v
w̃2
Once again, it can be easily seen that the noise w̃v is Gaussian with variance E |w̃v |2 = Nv .
Further, splitting the first term into two components corresponding to l = v and l = v , one can
derive the expression for d (v) , 1 ≤ v ≤ L − 1 as
N −1
1
d (v) = h (v) a0 c0 (n − v) c0 (n − v)
N
n=0
L−1 N −1
1
+ h (l) a0 c0 (n − l) c0 (n − v) + w̃v
N
l=0, l=v n=0
N −1
1
= h (0) a0 c0 (n − v) c0 (n − v)
N
n=0
L−1 N −1
1
+ a0 h (l) c0 (n − l) c0 (n − v) + w̃v
N n=0
l=0, l=v
L−1
= h (v) a0 r00 (0) + a0 h (l) r00 (l − v) + w̃v
l=1
≈ h (v) a0 + w̃v
It can be readily seen that the above system is now similar to the multiple receive antenna
system, i.e., receive diversity system with channel coefficients h (0) , h (1) , . . . , h (L − 1).
The model can be, therefore, be succinctly expressed in vector notation as
d = ha0 + w̃
h
Hence, the optimal combiner is the Maximum Ratio Combiner (MRC) given by h . Also
2
observe that the power of each noise component w̃v is E |w̃v | = 1. Denoting the symbol
power E |a0 |2 by P and combining the observation vector d with the MRC yields the SNR
2
h P
SNR = σ 2
w
N
! P
= N × |h (0)|2 + |h (1)|2 + . . . + |h (L − 1)|2 2
σw
2
h
Observe that the above expression is similar to the SNR for the multiple receive
antenna system, in that there is a factor h 2 in the numerator, where h is the vector
of frequency-selective channel coefficients h = [h (0) , h (1) , . . . , h (L − 1)]T . This is in
addition to the spreading gain factor N . Thus, this is equivalent to the performance of a system
with diversity order L. This is the essence of multipath diversity and CDMA is able to exploit
this multipath diversity by correlating with the spreading code c0 (n − v) corresponding to
different lags 0 ≤ v ≤ L − 1, and combining the individual components employing MRC.
This receiver structure in CDMA is termed the rake receiver and the diversity gain thus
achieved is termed multipath diversity since it is extracted from the multipath components.
This multipath diversity arising out of rake combining is a unique feature of CDMA and
146 Principles of Modern Wireless Communication Systems
significantly improves its performance over wireless channels because of the higher diversity
order of decoding.
In this section, we introduce a unique aspect of the CDMA systems which is termed the near–
far problem. Recall from Eq. (5.9) that the SINR at the user 0 of a 2 user CDMA system is
given as,
P0
SINR = P1 2
σn
(5.12)
N + N
Consider, now a scenario where the user 1 is much closer to the base station than the user 0 as
√
shown in Figure 5.11. Specifically, let d0 = N d1. Let the transmitted power of each user at
the base station be denoted by PT . Since the radiated electromagnetic power decays at the rate
of d2 in free space, we have,
PT PT
P1 = 2
=
d0 N d21
PT
P0 =
d21
Code Division for Multiple Access (CDMA) 147
Substituting the values of P0 , P1 from above in the SINR expression in Eq. (5.12), we have
PT
N d21
SINR = PT σn
2
N d21 + N
PT
=
PT + d21 σn2
Thus, the above expression yields the surprising result that both the signal and interference
power at the user 0 are of the same magnitude and the effect of the spreading gain N is lost.
This phenomenon arises because the user 1, who is closer to the base station, drowns out the
power of the user 0, i.e., there is heavy interference at the user 0. This is the near–far problem
in CDMA systems. To avoid this near–far problem, the power that is transmitted to the different
users has to be regulated in CDMA systems, i.e., lower power has to be transmitted to users
closer to the base station such as the user 1, while transmitting at a higher power to users farther
away such as the user 0. This is termed power control in CDMA systems. Power control is a
very important aspect of any CDMA wireless network as CDMA systems are interference
limited as described already in Section 5.6.
This section will focus on developing a detailed analysis towards the characterization of
downlink performance of a CDMA cellular system with multiple users. Consider the downlink
scenario schematically shown in Figure 5.12, where the CDMA base station is transmitting to
K + 1 users indexed 0, 1, . . . , K . Let the information symbols transmitted to the K + 1 users
be a0 , a1 , . . . , aK+1 . Let c0 (n) , c1 (n) , . . . , cK+1 (n) be the spreading codes corresponding
to the K + 1 users. Thus, the individual transmit signal xk (m) , 0 ≤ k ≤ K is formed by
xk (m) = ak ck (m). The composite signal corresponding to all the users is obtained by adding
the individual signals corresponding to the K + 1 users, similar to Eq. (5.3) as
K
= xk (n)
k=0
K
= ak ck (n) (5.13)
k=0
148 Principles of Modern Wireless Communication Systems
Similar to the rake-receiver scenario described in Section 5.7.4, let the frequency selective
channel between the base station and user 0 be characterized by the channel taps
h0 (0) , h0 (1) , . . . , h0 (L − 1). The 0 in the subscript of the channel taps now denotes that
this corresponds to the channel of the user 0 to distinguish it from the channels corresponding
to the rest of the users. Thus, the intersymbol-interference-affected received symbol y0 (n) at
the user 0 corresponding to time instant n is given as
L−1
= h0 (l) x (n − l) + w (n)
l=0
Substituting now the expression for the composite downlink signal x (n) as x (n)
= K k=0 xk (n) =
K
k=0 ak ck (n), one can write the expression for y (n) as
L−1 K
y (n) = h0 (l) ak ck (n − l) + w (n) (5.14)
l=0 k=0
Multipath users
where the first summation above is with respect to the multipath components and the second
is with respect to the K + 1 users. Thus, since the signal of each user gives rise to L multipath
components, there are a total of (K + 1) L multipath components in the above expression.
These correspond to L components of the desired user 0 (for decoding at the user 0) and KL
interfering components of the rest of the K users. Consider now correlation with the spreading
code c0 (n) corresponding to the user 0. The statistic d0 (0), i.e., at the user 0 corresponding to
Code Division for Multiple Access (CDMA) 149
N −1
1
d0 (0) = y (n) c0 (n)
N
n=0
N −1 L−1 K N −1
1 1
= h0 (l) ak ck (n − l) c0 (n) + w (n) c0 (n)
N N
n=0 l=0 k=0 n=0
w̃0 (0)
where the noise w̃0 (0) denotes the noise at the user 0 corresponding to decorrelation with
lag 0, i.e., spreading code c0 (n). Once again, similar to the situation in Eq. (5.8), it can be
2
seen that the noise power is E |w̃0 (0)|2 = σNw . Further, the first part comprising of the total
(K + 1) L multipath components can be decomposed into three parts. The first comprising
of the component corresponds to k = 0 and l = 0, i.e., the user 0 and delay 0. The second
corresponds to k = 0 and l = 0, i.e., all the other multipath components corresponding to
user 0, which comprise the Multipath Interference (MPI) at the user 0. The third corresponds
to k = 0, i.e., 1 ≤ k ≤ K and all l , i.e., 0 ≤ l ≤ L − 1, which are basically the multipath
components of all users other than the desired user 0 and total KL in numbers. These constitute
the Multi-User Interference (MUI) at the user 0. The MPI and MUI together constitute the total
interference at the user 0. The above equation can, therefore, be written as
N −1 L−1 K N −1
1 1
d0 (0) = h0 (l) ak ck (n − l) c0 (n) + w (n) c0 (n)
N n=0 l=0 k=0
N n=0
w̃0 (0)
N −1 N −1 L−1
1 1
= h0 (0) a0 c0 (n) c0 (n) + h0 (l) a0 c0 (n − l) c0 (n)
N N
n=0 n=0 l=1
k=0, l=0 MPI: k=0, l=0
N −1 L−1 K
1
+ h0 (l) ak ck (n − l) c∗0 (n) +w̃0 (0) (5.15)
N n=0 l=0 k=1
MUI: k=0
150 Principles of Modern Wireless Communication Systems
The above expression can be further simplified in terms of the correlation between the
spreading sequences as
N −1 L−1 N −1
1 1
d0 (0) = h0 (0) a0 c0 (n) c0 (n) +a0 h0 (l) c0 (n − l) c0 (n)
N N
n=0 l=1 n=0
L−1 K N −1
1
+ h0 (l) ak ck (n − l) c∗0 (n) +w̃0 (0)
N
l=0 k=1 n=0
rk0 (l)
L−1 L−1 K
= h0 (0) a0 r00 (0) + a0 h0 (l) r00 (l) + h0 (l) ak rk0 (l) + w̃0 (0)
Signal
l=1 l=0 k=1 noise
Interference
For additional clarity, the signal, interference, and noise terms have been explicitly marked
in the above expression. Since the correlation r00 (0) = 1, the signal component in the above
expression is
L−1
= E |a0 |2 E |h0 (l)|2 E |r00 (l)|2
l=1
L−1
P0
= E |h0 (l)|2 (5.16)
N
l=1
where we have used the properties that the power of the user 0 is E |a0 |2 = P0 and
E |r00 (l)|2 = N1 . Interestingly, one can notice from the above expression that the multipath
interference power above increases with the signal power P0 . Thus, increasing the signal power
at the base station also potentially increases the interference power. This is a unique property of
interference-limited systems such as CDMA. The above relation for MPI power can be further
Code Division for Multiple Access (CDMA) 151
simplified as
L−1
P0
0
IMPI = E |h0 (l)|2 − E |h0 (0)|2
N
l=0
P0 2 P0
= h0 − |h0 (0)|2
N N
2
where h0 is defined as the norm of the channel-impulse response vector h0 , i.e.,
2
h0 = |h0 (0)|2 + |h0 (1)|2 + . . . + |h0 (L − 1)|2
Also, the power of the multiuser interference (MUI) component can be simplified as
⎧" "2 ⎫
⎨"L−1 K " ⎬
E |MUI|2 = E "
" "
h0 (l) ak rk0 (l)"
⎩" " ⎭
l=0 k=1
0
IMUI
K L−1
= E |ak |2 E |h0 (l)|2 E |rk0 (l)|2
k=1 l=0
K L−1
1
= Pk E |h0 (l)|2
N
k=1 l=0
L−1 K
1
= |h0 (l)|2 Pk
N
l=0 k=1
K
1 2
= h0 Pk
N
k=1
The statistic d0 (0), i.e., at the user 0 derived by correlating with c0 (n), i.e., corresponding to
a lag of 0 can be expressed as
d0 (0) = h0 (0) a0 + I 0
152 Principles of Modern Wireless Communication Systems
Also, similar to the rake receiver in Section 5.7.4, one can now correlate with other delayed
versions of the spreading sequence c0 (n) such as c0 (1) , c0 (2) , . . . , c0 (L − 1), correspond-
ing to lags of 1, 2, . . . , L − 1. The resulting decision statistics d0 (1) , d0 (2) , . . . , d0 (L − 1),
along with d0 (0) can be summarized as
d0 (0) = h0 (0) a0 + I 0
d0 (1) = h0 (1) a0 + I 1
..
.
d0 (L − 1) = h0 (L − 1) a0 + I L−1
Hence, one can perform maximum ratio combining across the statistics
d0 (0) , d0 (1) , . . . , d0 (L − 1) to yield the decision statistic
h∗0 (0) h∗ (1) h∗ (L − 1)
d= d0 (0) + 0 d0 (1) + . . . + 0 d0 (L − 1)
h0 h0 h0
L−1
h∗0 (l)
= d0 (l)
h0
l=0
L−1
h∗0 (l) !
= h0 (l) a0 + I l
h0
l=0
L−1 L−1
h∗0 (l) h∗0 (l) l
= h0 (l) a0 + I
h0 h0
l=0 l=0
Signal Noise + Interference
Code Division for Multiple Access (CDMA) 153
The signal part of the above combined decision statistic d can be simplified as
L−1
h∗0 (l)
signal = h0 (l) a0
h0
l=0
h0 2
= a0 = h0 a0
h0
Hence, the signal power is
2
h0 E |a0 |2 = P0 h0 2
(5.17)
Also, the noise plus interference power corresponding to the l th branch of the combiner is
#" " $ K
|h0 (l)|2 " "2 |h0 (l)|2 1 2 1 σ2
2 E "I l " = h0 Pk − P0 |h0 (l)|2 + w
h0 h0 2 N
k=0
N N
K
1 1 |h0 (l)|4 |h0 (l)|2 σw
2
= Pk |h0 (l)|2 − P0 +
N
k=0
N h0 2 h0 2 N
Finally, the sum of the total noise plus interference power across all the L branches of the
combiner is given as
K L−1
1 2 P0 |h0 (l)|4 2
σw
= Pk h0 − 2
+ (5.18)
N N h0 N
k=0 l=0
Hence, from the expressions for the signal and interference plus noise power from Eqs (5.17)
and (5.18) respectively, the total signal to interference plus noise power at the user 0 for the
downlink multi-user CDMA scenario is given as
2
N P0 h0
SINR0 = (5.19)
K 2 L−1 |h0 (l)|4 2
k=0 Pk h0 − P0 l=0 h0 2
+ σw
154 Principles of Modern Wireless Communication Systems
Observe that the factor of N above in the SINR expression represents the spreading gain of the
CDMA system. Generalizing the above expression, the signal to interference plus noise power
ratio SINRu at the uth user is given as
2
N Pu hu
SINRu = 4 (5.20)
K 2 L−1 |hu (l)| 2
k=0 Pk hu − Pu l=0 hu 2
+ σw
received signal component yk (n) of the user k at the base station is given as
L−1
= hk (l) xk (n − l)
l=0
L−1
= hk (l) ak ck (n − l)
l=0
Thus, the net superposed signal y (n) received at the base station is given as the sum of
the components y0 (n) , y1 (n) , . . . , yK (n) corresponding to all the users 0, 1, . . . , K in the
presence of noise, expressed as
K
= yk (n) + w (n)
k=0
K L−1
= ak hk (l) ck (n − l) + w (n) (5.21)
k=0 l=0
Observe that the key difference with respect to the downlink system model in Eq. (5.14) is that
in the uplink case, the signal of each user goes through the multipath channel of that particular
user, compared to the downlink case, where the signal of each user goes through the same
channel hk (0) , hk (1) , . . . , hk (L − 1) of the user k corresponding to the signal received at
the user k. Proceeding similarly as in the downlink case, it can be easily shown that the uplink
SINRu , corresponding to the user u is given as
2
N Pu hu
SINRu = 4 (5.22)
K 2 L−1 |hu (l)| 2
k=0 Pk hk − Pu l=0 hu 2
+ σw
Till this point in the development of CDMA, we have implicitly assumed that the CDMA
spreading sequences are aligned or synchronized as shown in Figure 5.14. However, frequently,
156 Principles of Modern Wireless Communication Systems
the spreading sequences at the base station in an uplink scenario are not aligned. This is due
to the fact that difference users are at different distances from the base station. Hence, the
resulting propagation delays are different, leading to loss of synchronization at the receiver.
One of the unique advantages of CDMA is the ability of asynchronous operation. The SINR
corresponding to asynchronous operation in CDMA scenarios can be derived as follows.
Consider the spreading sequences c0 (n), c1 (n) of users 1, 2 respectively, with the sequence
c1 (n) time shifted compared to c0 (n). Let the fraction f, 0 ≤ f ≤ 1, denote the time shift
relative to the CDMA chip time as shown in Figure 5.15. It can now be seen that the
asynchronous correlation between the sequences, will now comprise of two components. A
fraction of the sequence c0 (n), i.e., 1 − f will correlate with c1 (n), while the fraction f will
correlate with the shifted sequence c1 (n − 1). Hence, the asynchronous correlation r01 a can be
expressed as a linear combination of the two synchronous correlations r01 (0) , r01 (−1) as
a
r01 = (1 − f ) r01 (0) + f r01 (−1)
gf (f)
f
0 1
Further, in a practical CDMA scenario, the parameter f is a random variable since the users
are randomly distributed at various distances within a cell. Also, since 0 ≤ f ≤ f , it can be
assumed to be uniformly distributed in [0, 1]. Thus, the distribution of f , shown in Figure 5.16,
can be expressed as
gF (f ) = 1, 0 ≤ f ≤ 1
Further, the second moment E f 2 of the fractional shift random variable F can be derived
as
% 1
2
E f = f 2 gF (f ) df
0
% 1
= f 2 df
0
"
1 3 ""1 1
= f " =
3 0 3
Thus, we have E f 2 = 13 . Further, observe the the random variable 1 − f is also uniformly
distributed in [0, 1]. Hence, the variance or power of the asynchronous correlation is given as
a 2
E |r01 | = E |(1 − f ) r01 (0) + f r01 (−1)|2
1 1 1 1
= +
3N 3N
2 1
=
3N