(Kuo, 2008) Precoding Techniques For Digital Communication Systems (Springer) (324s)
(Kuo, 2008) Precoding Techniques For Digital Communication Systems (Springer) (324s)
Communication Systems
C.-C. Jay Kuo · Shang-Ho Tsai · Layla Tadjpour ·
Yu-Hao Chang
Precoding Techniques
for Digital Communication
Systems
123
C.-C. Jay Kuo Layla Tadjpour
Department of Electrical Engineering 908 N. Verdugo Rd.
EEB 440 Glendale, CA 91206
Hughes Aircraft Electrical
Engineering Building
3740 McClintock Ave.
Los Angeles, CA 90089
C 2008 Springer Science+Business Media, LLC
All rights reserved. This work may not be translated or copied in whole or in part without the written
permission of the publisher (Springer Science+Business Media, LLC., 233 Spring Street, New York,
NY10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in
connection with any form of information storage and retrieval, electronic adaptation, computer software,
or by similar or dissimilar methodology now known or hereafter developed is forbidden.
The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are
not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to
proprietary rights.
springer.com
Preface
During the past two decades, many communication techniques have been
developed to achieve various goals such as higher data rate, more robust link
quality, and more user capacity in more rigorous channel conditions. The most
well known are, for instance, CDMA, OFDM, MIMO, multiuser OFDM, and
UWB systems. All these systems have their own unique superiority while they
also induce other drawbacks that limit the system performance. Conventional
way to overcome the drawback is to impose most of the computational effort
in the receiver side and let the transmitter design much simpler than receiver.
The fact is that, however, by leveraging reasonable computational effort to
the transmitter, the receiver design can be greatly simplified. For instance,
multiaccess interference (MAI) has long been considered to limit the perfor-
mance of multiuser systems. Popular solutions to mitigate MAI issue include
multiuser detection (MUD) or sophisticated signal processing for interference
cancellation such as PIC or SIC. However, those solutions impose great bur-
den in the receiver. In this case, precoding offer good solutions to achieve
simple transceiver designs as we will mention later in this book.
This book is intended to provide a comprehensive review of precoding
techniques for digital communications systems from a signal processing per-
spective. The variety of selected precoding techniques and their applications
makes this book quite different from other texts about precoding techniques
in digital communication engineering.
In the first part of the book, we overview the principles of precoding for
channels with intersymbol interference (ISI) such as Tomlinson–Harashima
precoding and Trellis precoding. We also introduce how the widely used
OFDM systems can be treated as a special case of precoding techniques and in-
troduce precoding schemes for OFDM systems. Furthermore, it is well known
that the performance of code division multiple access (CDMA) systems is
limited by the MAI. As the number of users increases, a light weight receiver
may not be able to combat MAI efficiently. Thus, we introduce various ex-
isting precoding techniques that reduce the interference level while keeping
the receiver design simple. Finally, we devote a whole chapter to the issue
VI Preface
List of Symbols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XI
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1 Precoding for ISI Gaussian Channels . . . . . . . . . . . . . . . . . . . . . . . 6
1.2 Precoding for CDMA Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.3 Precoding for MIMO Channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.4 Precoding for Multiuser OFDM Systems . . . . . . . . . . . . . . . . . . . 8
1.5 Precoding for UWB Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
List of Symbols
≈ Approximately equal to
∗ Time-domain convolution operator
⊗ Kronecker product
A† Hermitian (Complex and conjugate) of A
At Transpose of A
M AIi←j [k] The MAI from user j to user i at subcarrier k
[x]↓M Signal x down-sampled by M
[x]↑M Signal x up-sampled by M
E {x} Expectation of x
CN (0, 1) Complex circular symmetric Gaussian
distribution
σx2 Variance of x
Jn Bessel function of the first kind of order n
Re{x} Real part of x
F Fourier matrix
sk Spreading code of user k
w(t) Unit power chip waveform defined as
Tc
0
|w(t)|2 = 1
δD (t) Dirac delta function
IN An identity matrix of size N × N
(i)
eN the ith column of IN
X‡ Pseudo inverse of matrix X
||x|| Vector 2-norm
||F||F Frobenius norm of matrix X
x A ceiling function of x
F{·} Fourier transform operator
diag(x1 x2 · · · xN ) N × N diagonal matrix with diagonal
elements x1 ,x2 ,· · · ,xN
Tc Chip interval
x(n) x in time domain
X(k) x in frequency domain
XII List of Symbols
L Multipath length
h(n) Channel impulse response
n and t Time indices
T Symbol period or number of users
k Discrete frequency domain index
x̂ Detected symbol, or estimated value of x
R Correlation matrix
Fc Carrier frequency
Fs Sampling frequency
V Velocity
τ , D, or d Delay
fD Doppler frequency
Mt Number of transmit antennas
Mr Number of receive antennas
H MIMO channel matrix
Eb Bit energy
Normalized carrier frequency offset (CFO)
τ Time offset
ν Length of cyclic prefix
Part I
than one-sided array links. The well-known Shannon theorem for capacity of
bandlimited Gaussian channels shows that there is a fundamental limit (chan-
nel capacity) for transmission data rate over Gaussian bandlimited channels.
With advances in communication theory and the growth of sophisticated sig-
nal processing and computation techniques, the possibility of achieving the
fundamental information limit on channel capacity seems higher than ever
before. In MIMO systems, if channel information is known to the transmit-
ter, precoding can be used to further improve the system performance based
on various design criteria such as maximum capacity or minimize the mean
square error. In the current wireless standards, precoding (or beamforming)
is adopted as an optional feature for IEEE 802.11n and IEEE 802.16 family,
where full channel information or partial channel information are required to
implement this feature. When channel varies rapidly, full channel information
may not be available in the transmitter. In this case, some researches showed
that “partial channel” information for MIMO precoding can still achieve sat-
isfactory performance. This concept also motivated us to use partial channel
information to perform precoding for UWB communication systems since the
channel impulse response for such systems is long and full channel information
may not be available in transmitter side (see Chapter 8).
As mentioned above, precoding schemes may be divided into three cate-
gories according to the accessibility of channel information. That is,
1. Transmit side has full channel information.
2. Transmit side only has partial channel information.
3. Transmit side does not have any channel information.
It is intuitive that the precoding scheme with full channel information can
achieve better performance than other two schemes. However, sometimes full
channel information may not be available in transmitter due to rapid channel
variation (feedback is not in time) or long delay spread (too much feedback in-
formation). An example that full channel or even partial information may not
be available is the uplink transmission in multiuser communication systems.
In this case, the signal from different users will lead to multiaccess interfer-
ence (MAI). To eliminate MAI using precoding technique with full channel
information, the mobile station may need to know the channel information
of all other mobile stations. However, this is somewhat impractical when the
number of users is large. Although multiuser detection (MUD) can be used
in the receiver to eliminate MAI, it demands high computational complexity,
especially when the number of users is large. This motivates us to approach
another research direction and we found that by properly designing transceiver
and multiaccess orthogonal code schemes, we can achieve MAI-free or nearly
MAI-free property without knowing channel information in the transmit side.
Since this precoding scheme is channel independent, the transceiver design
can be greatly simplified.
This book deals with precoding techniques in digital communication sys-
tems. Different precoding techniques can be employed in the transmitter
6 1 Introduction
that precoding can also be added on current OFDM systems. One example
is the channel independent Single Carrier with Cyclic Prefix (SC-CP) sys-
tem [113], where a DFT precoder is added in the transmitter and hence the
whole becomes a single carrier system. The SC-CP system enjoys a much lower
peak-to-average power ratio (PAPR) than the widely adopted OFDM system.
Furthermore, this system has been proven to achieve the minimum bit error
rate (BER) with certain modulation schemes [78]. Since the transmitter of
such precoding scheme does not need channel information in SC-CP systems,
the transceiver design can be greatly simplified.
nel estimation much more easily. Owing to the MAI-free property, every user
can enjoy a channel diversity gain of order L to improve the bit error perfor-
mance. Furthermore, the system has the additional advantage that it is robust
to CFO in a multipath environment. That is, by partitioning those codewords
into subsets, the number of supportable MAI-free users with Hadamard-Walsh
codes is 1 + log2 (N/G) in a CFO environment.
In Chapter 7, we show that the number of MAI-free users in CFO environ-
ment can be increased by partitioning the orthogonal carrier interferometry
(CI) codewords [92]. Since some users can achieve the MAI-free property, in a
fully-loaded MC-CDMA system, the complexity for MAI suppression can be
greatly reduced. We will use existing interference suppression techniques to
achieve fully-loaded user capacity in MC-CDMA with CFO and show that the
receiver complexity is indeed simplified by adopting the proposed precoding
scheme in the MC-CDMA system.
interval less than the channel response, we can adjust the phase codeword
length so that the output signal-to-interference power ratio (SIR) is maxi-
mized. Although the optimal code length can be found via the exhaustive
search, its computational complexity is high, especially when the number of
channel taps is large. A fast search algorithm is also developed to determine
the optimal codeword length with less computational power as compared with
the exhaustive search algorithm.
2
Precoding Techniques in ISI Channel
Since
r(D) = h(D)f (D)x(D) + w(D)f (D), (2.2)
we have
r (D) = x(D) + w(D). (2.3)
We see that the ISI is completely cancelled and only white noise exists. The
output signal to noise ratio is then given by
where Sx and Sn are the average energy of input symbols xi and noise, re-
spectively. Note that for a ZF linear equalizer, the feedback section of Fig. 2.1
does not exist and f (D) = 1/h(D). Then,
where 1/2
1
||1/h|| =
2
df
−1/2 |H(f )|2
is the noise enhancement factor. Therefore, SN RZF −DF E > SN RZF −LE , i.e.,
ZF-DFE improves SN RZF −LE by the the noise enhancement factor. How-
ever, the ideal DFE assumption may not be practical. In fact, one of the
main shortcomings of DFE is error propagation. Moreover, since the reliable
detected decisions are only available after a delay, channel coding cannot be
combined with DFE in a straightforward manner.
ISI cancellation can be performed by the optimum maximum likelihood
sequence estimation (MLSE) equalizer. Suppose transmitting sequence x(D)
is drawn from an M -point constellation set. If channel impulse response has
finite length L, it can be modeled as a shift register of length L with M -
state memory. The Viterbi algorithm can be applied to optimally decode the
received sequence r(D) in the presence of noise. Although the output SNR
for the MLSE equalizer can approach the effective SNR of the matched filter
bound SN RMF B = Sx ||h||2 /Sn , the complexity of Viterbi algorithm grows
exponentially with the channel length (M L ).
An alternative approach to equalizations in the receiver is to change the
signal format at the transmitter by using channel state information so that the
2.2 Tomlinson–Harashima Precoding (THP) 15
L−1
ri = hl xi−l (2.5)
l=0
We see that the symbols xi , xi−1 , . . . xi−L+1 will interfere with each other.
If the transmitter knows the channel impulse response, the inter-symbol in-
terference (ISI) effect can be overcome by a precoder with a transfer func-
tion equal to the inverse of the transfer function of the channel as shown in
Fig. 2.3(a).
However, when channel transfer function value is close to zero, the output
of this precoder may increase or diverge to infinity.
To overcome this issue, a nonlinear block with transfer function T(D)
is inserted before the h−1 (D) block, as shown in Fig. 2.3(b). The nonlinear
function makes the sequence z(D) peak limited, i.e.,
for some zmin and zmax and all D. Assume zmin = −zmax . Then, One possible
construction of T can be constructed as follows [84]
where P is an integer. Since z(D) = y(D) − v(D) and from Eq. (2.6), we can
determine the condition for P to limit the peak value of sequence z(D) to be
Fig. 2.3. (a) Block diagram of a precoder for ISI channel; (b) block diagram of
Tomlinson–Harashima precoder [[84]IEEE].
c
where w(D) is additive white Gaussian noise. After that, the inverse Trans-
formation T −1 computes the estimated input sequence x(D) from
or equivalently,
Assuming xmax − xmin < 2 zmax , we have xmin > xmax − 2 zmax and xmaz <
xmin + 2 zmax . Therefore, we can rewrite Eq. (2.11) as
(2P − 1)zmax + xmax − zmax ≤ ŷ(D) ≤ (2P + 1)zmax + xmin + zmax , (2.12)
where P = −P . Let
We see that the term 2P zmax can be obtained from (ŷ(D) − d) as the output
from the quantizer Q shown in Fig. 2.4 which was inserted in the transmitter.
From Eq. (2.9), x̂(D)) can be obtained from
For a special case where the information sequence is binary, i.e., x(D) can
take either 0 or 1, we can set zmin = −1, zmax = 1, and d = 1/2. Then, from
Fig. 2.7, it is clear that the original binary sequence can be restored by
0, ŷ(D) = even,
x̂(D) = (2.17)
1, ŷ(D) = odd.
where SN RDF E = Sx /Sn is the output signal power to noise power ratio of
an ideal DFE. According to Price’s results, at high SNR, the performance
of all uncoded QAM signals over strictly bandlimited channels, regardless of
channel characteristics (including the ideal AWGN channel), is the same with
ZF-DFE or TH precoding. Thus, for high signal to noise ratio, the capacity
of any bandlimited channel is approximated by [144]
Therefore,
SN Rnorm (2C − 1)/(2R − 1). (2.23)
Since r < C, SN Rnorm > 1. Now, suppose the M × M square QAM scheme
has minimum distance dmin . Since
and
R = log2 (M 2 ), (2.25)
and the noise is Gaussian, at high SNR, the symbol error probability can be
approximated by [44]
Fig. 2.9. Symbol error probability of uncoded QAM with precoding [[44]IEEE].
c
is given in Fig. 2.9. It is seen that the gap difference between Shannon capacity
limit and the performance of uncoded M × M QAM at Pr (E) = 10−6 is about
9 dB. The key concept here is that the dB gap between uncoded QAM and
capacity is approximately the same for over all strictly bandlimited high signal
to noise ratio channels including the ideal AWGN channel.
The Tomlinson–Harashima precoding can be regarded an attractive alter-
native to the ZF-DFE when the channel state information is available in the
transmitter, since as was shown by Price’s result, it has the same performance
for high SNR values over any ISI channel as ZF-DFE. It is nothworthy that TH
precoding can be viewed as a DFE whose feedback section has moved to the
transmitter. Therefore, it does not have the disadvantages of DFE mentioned
before. That is, since the equalization is performed at the transmitter, the
transmitting signals are perfectly known and the error propagation phenom-
ena never occurs. Also, no immediate decision is required and hence channel
coding can be combined easily with TH precoding.
The 9-dB SNR gap between performance of an uncoded QAM with Tomlinson–
Harashima precoding over any bandlimited AWGN channel and the channel
capacity at a given Pr (E), observed from Fig. 2.9 can be reduced with coding
and shaping gains achieved.
Precoding can be combined with coding to obtain additional coding gain.
The combining can be preformed in a very natural way. Coded modulated
symbols {xi } are sent into the TH precoder on which they perform the same
precoding operation as before to produce {zi } symbols. For example, trellis
coded modulated symbols can be used in conjunction with TH precoding.
2.3 Trellis Precoding 21
The received symbols are the trellis coded symbols plus the additive Gaussian
noise. The regular Viterbi algorithm can be used to find the closest sequence
to the received sequence, which can then be reduced to modulo 2M .
TH precoding combined with coded modulation schemes can achieve the
same coding gain over partial response channel (1 − D) [43] or arbitrary chan-
nel response [15] and [35] as is achieved over the ideal channel, with about
the same decoding complexity.
It was shown in [29] that spherical lattice codes can achieve capacity at high
SNR on ideal channels. Later, it was shown that the gain of a lattice code
over uncoded QAM is due to both a coding gain and a shaping gain. The
maximum shaping gain is shown to be about 1.53 dB. This means that a cod-
ing gain of 7.5 dB is required to fill the 9-dB gap with channel capacity. Since
the complexity of spherical lattice codes is high due to prohibitive memory
requirements, Forney and Eyuboglu [36] proposed trellis precoding, a com-
bination of trellis shaping [42] and trellis coded modulation and precoding
to leverage both coding and shaping gains. They argued that after the first
3–4 dB of coding gain, it is much easier to obtain the next 1 dB with shaping
than with coding.
The concept of lattice and cosets is important in the discussion of trellis
coded modulation (TCM) and trellis precoding. Here, we overview the basic
concepts briefly. A lattice denoted by Λ consists of N dimensional vectors
and is a subset of RN , where R denotes the set of real values. The simplest
example of lattice is Z, the set of integers. Z 2 and Z N are two-dimensional
and N -dimensional lattice, respectively. If we rotate each points of a lattice,
e.g., Z 2 , we obtain a new lattice denoted by RZ 2 . Also, we can scale each
point of Z 2 by a factor of k, where k is any integer and obtain another lattice
kZ 2 . A subset of lattice is called sublattice. Cosets are also subsets of lattice
but they must be disjoint. Thus, a sublattice can have many cosets.
The two-dimensional lattice is the general form behind constellation sets
used in digital communications such as M-PSK, M-QAM, etc. Higher dimen-
sion lattice have proven to be very useful in TCM. We assume that A is
a conventional two-dimensional M × M square constellation. In lattice no-
tation, A is the set of points from the two-dimensional half-integer lattice
Λ = Z 2 + (0.5)2 that fall within the two-dimensional boundary square re-
gion R = R1 × R2 , where R1 is the half-open interval R1 = (−M/2, M/2).
Figure 2.10 shows an 16 × 16 square two-dimensional constellation.
In the following sections, we first review the trellis shaping as described
in [42] in Section 2.3.1. Then, in Section 2.3.2, we describe the principles of
trellis precoding.
22 2 Precoding Techniques in ISI Channel
and
|A| = M 2 = 2R . (2.29)
where |A| is the size of constellation. The base line average energy for a
conventional M × M two-dimensional constellation or with d2min = 1, data
rate R and average energy SX , is defined as
Fig. 2.11. (a) Equivalence class of 4 points with the same less significant bits for a
square 16 × 16 two-dimensional constellation; (b) 64-point constellation consisting
of least energy points in each equivalence class with no restriction on the sign bits;
(c) 144-point constellation consisting of least energy points in each equivalence class
if the parity of sign bits are preserved [[42]IEEE].
c
24 2 Precoding Techniques in ISI Channel
shaping operation will choose the point with the least average energy in the
class, which will be one of the 64-least energy points of Fig. 2.11(b).
Since sign bit carries no information, R = 6. Assuming all points are
equiprobable, the average energy is reduced to Sx = 63/6 = 10.5 (10.21 dB).
Therefore, the shaping gain γs is equal to 64/63 which is equal to that of a
conventional 8 × 8 constellation.
If we demand the shaping operation change both sign bits together, then,
we will have 144 point constellation as shown in Fig. 2.11(c). The reduced
energy will be Sx = 129/6 = 21.5 (13.2 dB). Here, the sign bits carry one bit
of information, hence R is 7 bits per second. However, we still do not have a
shaping gain since the constellation shape is square (γs = 128/129 1).
To obtain a shaping gain (γs > 1 dB), we can use a binary rate 1/2
convolutional code as shown in Fig. 2.12. The convolutional code is called
shaping code Cs whose task is to modify the sign bit sequence t(D), which
is a sequence of binary 2-tuples to t (D) = t(D) ⊕ cs (D), where cs (D) is
any output sequence of the convolutional code and ⊕ denotes modulo sum
operation [42].
Suppose any sequence of two-dimensional constellation point is denoted by
a = {ai } = (ai1 , ai2 ). Then, by modifying t(D) to t (D), we will modify a(D)
sequence to x(D) such that we minimize the average energy Sx = E{||x||2 }.
This is done via a Viterbi algorithm through a trellis search of the convolution
code Cs .
A trellis diagram is a way of visualizing all encoder’s state transitions
over time. Each state transition over time i to time i + 1 corresponds to a
branch metric and is associated with encoder output sequence csi = (csi1 , csi2 ).
Given constellation point ai = (ai1 , ai2 ), the modified output symbol xi is
constellation point ai with sign bits modified with csi , the binary 2-tuple at
time i. If we assign to each branch labeled by csi , a branch metric ||xi ||2 the
Viterbi algorithm can search for a minimum weight path through the trellis
diagram of Cs . This search is equivalent to a search for the cs (D) ∈ Cs that
results in modified output sequence x(D) with the least average energy. The
complexity of the shaping is mainly determined by that of Viterbi decodes
which grows exponentially with the number of states.
cs(D) w(D)
t'(D) t'(D) s(D)
s(D)
(H–1)T
t(D) HT
Fig. 2.12. Sign-bit shaping using the rate-1/2 convolutional code as the shaping
code and square 16 × 16 constellation [[42]IEEE].
c
2.3 Trellis Precoding 25
Fig. 2.13. Binary coded modulation shaping using the rate-ks /ns convolutional
code as the shaping code and square 16 × 16 constellation [[36] IEEE].
c
bit does not change the partitioning of constellation points, the coding and
shaping are completely compatible with each other.
In fact, sign bit shaping is only a special case of a more general trellis
shaping depicted in Fig. 2.13. Here the constellation set A is N dimensional.
Trellis shaping is used in conjunction with binary lattice-type channel trellis
code Cc (Λc , Λc , Cc ) which comprises the top section of Fig. 2.13. Trellis coded
modulation [138] performs both coding and modulation without an increase
in bandwidth. A trellis code is composed of a binary kc /nc convolutional
code Cc and nu uncoded bits. The encoder Gc generates an n-tuple code
sequence cs (D) = b(D)Gc from the k-tuple input sequence b(D). Each csi
partitions the constellation sets into 2nc cosets. In lattice notation, each csi
partitions a translate Λc + a of an N -dimensional binary lattice Λc into 2nc =
|Λc /Λc | cosets of a sublattice Λc [42]. The nu uncoded bits d(D) determine
the coordinates of points within each of these subsets. This set partitioning
proposed by Ungerboeck guarantees that signal with the largest Euclidean
distance have less bit differences.
The bottom section of Fig. 2.13 is trellis shaping which consists of a binary
rate-ks /ns shaping convolutional code Cs and a partition of a region R of
N -dimension into 2ns subregions R(z) and also a shaping decoder.
From what was said before, we know that t (D) must fall in the same
coset Cs ⊕ t as the initial sequence t. The shaping decoder first selects the
output code sequence cs (D) to be any sequence that lies in the code Cs .
Then, using the Viterbi algorithm, the shaping decoder selects a label sequence
t (D) = t(D) ⊕ cs (D) that optimizes any desired characteristics, usually the
average transmit energy, of the transmitted sequence x(D).
The sequence x(D) is then sent through the noisy channel. The receiver
can use a conventional decoder for Cc to obtain the estimate of the sequence
xi , denoted by x̂i . The complexity and performance of this decoder is not
affected by shaping operation. The coded information bits can be recovered
with G−1 c for the generating matrix Gc of the code Cc . To obtain shaping bits,
the received modified sign bits must be extracted from subregion R(z) and
then sent through the syndrome-former HTs to obtain the syndrome sequence
ŝ(D) = t̂ (D)HTs . If the estimate x̂ is correct, x̂(D) = x(D), then ŝ(D) =
s(D). Again, HTs can be chosen to be feedbackfree, and thus occasional error
does not matter much.
2.3 Trellis Precoding 27
where w(D) is a while Gaussian noise sequence. The sequence {pi } can be
chosen according to various criterion. In TH precoding, {pi } is determined by
the simple memoryless modulo-M operation.
Figure 2.14 shows a trellis precoding composed of trellis shaping and TH
precoding. The important block in trellis precoding is shaping decoder which
selects not only the shaping code sequence cs (D) from Cs but also the precod-
ing lattice sequence p(D). The shaping decoder searches through all possible
code sequence cs (D) in Cs and precoding lattice sequence p(D) to optimize
any desired property of transmitting sequence z(D) such as minimizing the
average transmit energy Sz . In our case, the shaping decoder scans all possible
sequence superstates si = (si , pi−1 ), where si is a state of the convolutional
code Cs and pi−1 = (pi−1 , pi−2 , . . . , ).
b(D) y(D)
Gc
kc bits nc tuple
d(D)
nu =n-nc-ns bits
Constellation x(D) Mod z(D)
Decoder for Cs mapping 2M
cs(D) h(D)–1
s(D) t(D) t'(D)
(H–1)T
rs bits ns bits ns bits TH Precoding
where
|zj |2 = |xj − ( zj−k (s)hk ) − pj |2 , (2.39)
k≥1
In other words, the VA subtracts the ISI from xj using symbols zj−k (s). Then,
the coordinates of fj are reduced to the interval (−M/2, M/2] with modulo
M operations.
The VA will otherwise operates in a normal way, i.e., for each state, it se-
lects the surviving path among the merging paths. The only constraint is that
the final sequence cs (D) must be a legitimate code sequence in the shaping
code Cs .
From the above discussion, we can see that the TH precoder is incorporated
into the branch metric computations, and there is one precoder for each state
of the trellis. Since PDFD does not make use of the component pi−1 of the
superstate si = (si , pi−1 ), it does not minimize the average transmit energy.
In [37], it was shown that the shaping gain can be increased by expanded
trellises that takes into account some part of the omitted component pi−1 .
However, the above decoding technique offers the best performance/
complexity trade-off among the TH precoding the above precoder/decoder
other decoders of RSSE family
2.4 Multirate Representations for OFDM Systems 29
Recall that TH precoding (or ZF-DFE) have a 9-dB gap with channel capacity
over any bandlimited or ideal channel as shown in Fig. 2.9. Suppose there is
a coded modulation with coding gain γc and shaping gain γs . Then, the error
probability is given by
Multirate and filterbank design are very useful techniques for digital signal
processing. By representing communication systems using multirate/filterbank
forms, we can gain more insight into the systems since many important re-
sults can directly be derived from the existing multirate theories. This will
greatly simplify the analysis. In this section, we introduce the basic multirate
techniques [140] and represent the OFDM systems using multirate forms [76].
30 2 Precoding Techniques in ISI Channel
That is, each sample of y(n) is obtained by extracting every M sample of x(n).
The relationship between input and output for decimation in the z domain is
given by
1
M−1
Y (z) = X(z 1/M e−j2π m/M ). (2.43)
M m=0
From Eq. (2.43), the decimated signal is the stretched and scaled version of
the original signal in frequency domain. For convenience, we will use the block
diagram as shown in Fig. 2.15 to denote sequence being decimated by M .
Up-sample/Interpolation. x(n) is said to be up-sampled by M and results
in output y(n) if
x(n/M ), if n is multiple of M,
y(n) = [x(n)]↑M = (2.44)
0, otherwise.
(b)
Fig. 2.17. Noble Identities: (a) interchanging decimator with system function, (b)
interchanging interpolator with system function.
N −1
F (z) = z −k Gk (z N ). (2.49)
k=0
G0(z N) S0(z N)
z–1 Z
F(z) ≡ G1(z N) H(z) ≡ S1(z N)
.. ..
. Z .
z–1
GN–1(z N) SN–1(z N)
(a) (b)
Fig. 2.19. Polyphase decomposition: (a) Type I (with delay elements), (b) Type II
(with advance elements).
Continuing from above example and let H(z) = F (z). Then, for N = 3,
H(z) = (a0 + a3 z −3 + a6 z −6 ) + (a2 z −3 + a5 z −6 )z 1 + (a−3
1 + a4 z
−6 2
)z . In
this case, H0 (z ) = (a0 + a3 z + a6 z ), H1 (z ) = (a2 z + a5 z −6 ), and
3 −3 −6 3 −3
H2 (z 3 ) = (a−3
1 + a4 z
−6
).
Noise
q(n)
Transmitter Receiver
N −1
Fm (z) = z −k Gkm (z N ), m = 0, 1, · · · , M − 1, (2.51)
k=0
where
∞
Gkm (z) = gkm (n)z −n with gkm (n) ≡ fm (k + nN ). (2.52)
k=−∞
N −1
Hm (z) = z k Smk (z N ), m = 0, 1, · · · , M − 1, (2.53)
k=0
where
∞
Smk (z) = smk (n)z −n with smk (n) ≡ hm (−k + nN ). (2.54)
n=−∞
and
v(n) = (v0 (n) v1 (n) · · · vN −1 (n))t .
We can represent the relationship of x(n) and v(n) using matrix form in
z-domain, i.e.,
G0,m(z) N
z–1
N Fm(z) ≡ G1,m(z) N
..
. z–1
GN–1,m(z) N
N Sm,0(z)
z
Hm(z) N ≡ Sm,1(z)
N
.
.
z
.
N Sm,N–1(z)
v0(n)
x0(n) G0,0(z) N x0(n) G0,0(z) N
z–1 z–1
v1(n)
G1,0(z) N G1,0(z) N
.. .
.
. z–1
.
vN–1(n) z–1
..
GN–1,0(z) N
≡
GN–1,0(z)
.
N
xM–1(n)
.
G0,M–1(z) N xM–1(n)
.
.
G0,M–1(z)
z–1
G1,M–1(z) N G1,M–1(z)
.. .
.
. z–1
.
GN–1,M–1(z) N GN–1,M–1(z)
Note that the ith column is corresponding to the ith transmitting filter. Also,
the component Gj,i (z) is the jth polyphase of the ith transmitting filter.
Similarly, from the right hand side of Fig. 2.24, let
t
y(n) = (y0 (n) y1 (n) · · · yM−1 (n))
and
t
w(n) = (w0 (n) w1 (n) · · · wN −1 (n)) .
We can represent the relationship of y(n) and w(n), i.e.,
..
N S0,N–1(z)
≡
N
.
.
S0,N–1 (z)
N
. SM–1,0(z) yM–1(n)
.
SM–1,0 (z) yM–1 (n)
z
N SM–1,1(z) SM–1,1 (z)
..
z
.
N SM–1,N–1(z) SM–1,N–1 (z)
⎛ ⎞
S0,0 (z) S0,1 (z) ··· S0,N −1 (z)
⎜ S1,0 (z) S1,1 (z) ··· S1,N −1 (z) ⎟
⎜ ⎟
S(z) = ⎜ .. .. .. .. ⎟. (2.58)
⎝ . . . . ⎠
SM−1,0 (z) SM−1,1 (z) · · · SM−1,N −1 (z)
Again, notice that the ith row is corresponding to the ith receiving filter. Also,
the component Si,j (z) is the jth polyphase of the ith receiving filter.
From the discussion above, we can redraw Fig. 2.20 as in Fig. 2.25. Now we
would like to discuss how to formulate the channel matrix C(z) in Fig. 2.25.
Polyphase Representation of the Channel. By using the Type 1 polyphase
representation, we can decompose the channel as
where Ck (z) is the kth polyphase of C(z). The shaded area in Fig. 2.25 is
an N × N system. Each path can be described as a cascade of an interpo-
lator, delays, C(z), advances, and a decimator. The (m, n) path is shown
in Fig. 2.26(a). Using Polyphase Identity, we can redraw Fig. 2.26(a) as in
q(n)
v(n) w (n)
x0(n) N C (z) N y0(n)
z –1 z
x1(n)
.
.. G(z)
N
.. .. N
S (z) .. y1(n)
xM–1(n)
. z–1 z
. . yM–1(n)
N N
(a)
N z–m C(z) zn N
(b)
Cn–m (z)
(c)
z–1 CN+(n–m) (z)
Fig. 2.26. (a) General block diagram for every path (from vn (n) to wm (n)). When
n ≥ m, we can redraw (a) as in (b), when n < m, then (a) can redraw as in (c).
Fig. 2.26(b) when n ≥ m, and redraw as in Fig. 2.26(c) when n < m. Although
the decimator and interpolator are time-varing building blocks, the intercon-
nection in Fig. 2.26(a) happens to be time-invariant and circuits (a) and (b)
are equivalent, where C0 (z) is the 0th polyphase component of the transfer
function C(z). Thus the transfer matrix C(z) is given by
⎛ ⎞
C0 (z) z −1 CN −1 (z) . . . z −1 C1 (z)
⎜ C1 (z) C0 (z) ⎟
⎜ ⎟
C(z) = ⎜ .. . . ⎟. (2.59)
⎝ . . . .
. ⎠
CN −1 (z) CN −2 (z) . . . C0 (z)
This matrix falls into the category of the so-called pseudo circulant matrices
[140]. Let the channel be finite impulse response (FIR) with order ν (ν < N ),
and the kth channel tap be ck , the polyphase terms of C(z) is given by
ck if k < L + 1,
Ck (z) =
0 otherwise.
We can partition C(z) as a constant matrix CL and a matrix CR (z), in
particular
C(z) = [CL |CR (z)], (2.60)
where CL is an N ×M matrix and CR (z) is an N ×ν matrix given, respectively,
by
⎛ ⎞ ⎛ −1 ⎞
c0 0 . . . 0 . . . 0 z cν z −1 cL−1 . . . z −1 c1
⎜ c1 c0 0⎟ ⎜ 0 z −1 cν z −1 c2 ⎟
⎜ ⎟ ⎜ ⎟
⎜ .. . . ⎟ ⎜ 0 ⎟
⎜ . .. .. ⎟ ⎜ 0 ⎟
⎜ ⎟ ⎜ .. ⎟
⎜ cν cν−1 ⎟ ⎜
. . .
⎜ 0 ⎟ ⎜ .
.
. . . . ⎟
.
⎟
⎜ 0 cν ⎟
0 ⎟ and CR = ⎜ c0
CL = ⎜ ⎜ 0 z −1 cν ⎟
⎟.
⎜ .. .. . . . . .. ⎟ ⎟ ⎜ c1 ⎟
⎜ . . . . . ⎜ c 0 0 ⎟
⎜ ⎟ ⎜ ⎟
⎜0 0 cν c0 ⎟ ⎜ .. . .. .
.. ⎟
⎜ ⎟ ⎜ . ⎟
⎜ . . . . .. ⎟ ⎝
⎝ .. .. . . ⎠ 0 ⎠
0 0 0 . . . cν cL−1 cL−2 . . . c0
(2.61)
2.4 Multirate Representations for OFDM Systems 37
Based on the discussion above, the relationship between Y(z) and X(z) is
given by
Y(z) = S(z)C(z)G(z)X(z) + N, (2.62)
where N is the noise vector. Now we will represent OFDM systems using the
above model. Since OFDM are systems with block transmission, the maximum
length of the filters in transmitting filter bank Fm (z) and receiving filter bank
Hm (z) cannot exceed N . Otherwise, the current transmission block x(n) will
be affected by the blocks at other time instance k, where k = n, which is
not block transmission. Given the maximum length N for all filters, from
Eqs. (2.51) and (2.53), the matrices G(z) and S(z) become constant matrices.
We can simplify the input and output relationship as
Now consider the OFDM system with cyclic prefix, which is widely adopted
in current communications standards such as DVB-T, IEEE 802.11a/g/n, and
IEEE 802.16x. At the transmitter side, due to the appended cyclic prefix with
length L, the constant transmitting matrix Gcp is given by [77]
0 Iν
Gcp = F† , (2.64)
IM
where F is the M × M DFT matrix with the component at the nth row and
mth column given by
1
[F]n,m = √ e−j M nm .
2π
M
Consider zero forcing (ZF) equalization in the receiver side, due to the removal
of CP, the constant receiving matrix Scp is given by
Scp = Λ−1 F 0 IM , (2.65)
From Eqs. (2.61) and (2.65), we find that Scp C(z) will lead to the removal of
the upper ν rows of C(z) and is given by
From Eq. (2.71) and (2.64), the overall system function Scp C(z)Gcp can be
manipulated as
Scp C(z)Gcp = Λ−1 FCcir F† , (2.69)
where Ccir is an M × M circulant matrix given by
⎛ ⎞
c0 0 · · · · · · cν · · · c1
⎜ . . .. ⎟
⎜ c1 c0 . . ⎟
⎜ ⎟
⎜ .. . ⎟
⎜ . .. cν ⎟
⎜ ⎟
⎜ .. ⎟
Ccir = ⎜ cν . 0⎟ . (2.70)
⎜ ⎟
⎜ . ⎟
⎜ 0 cν .. ⎟
⎜ ⎟
⎜ . . . ⎟
⎝ .. . . . . 0⎠
0 · · · 0 cν · · · c1 c0
0 Iν
The effect that the matrix results in Ccp is to add the first ν columns
IM
to the last ν columns and then eliminate the first ν columns. Since FCcir F†
is a diagonal matrix with the diagonal elements being the M -point DFT of
(c0 , c1 , · · · , cν ) [47], from Eqs. (2.63) and (2.69), current Y(z) only depends
on current X(z). Hence there is no need to use z herein. The two vectors
become constant vectors and their relationship of x and y can be expressed as
Y = X + Λ−1 N, (2.71)
When the channel has zeros near the unit circle, the subchannels correspond-
ing to these zeros have serious fading. In this case, λk are small in these
subchannels. As a result, λ−1k are large and tend to enhance noise. Thus it
leads to relatively high bit error probability (BEP) in these subchannels. To
2.4 Multirate Representations for OFDM Systems 39
avoid significant noise enhancement, we may use minimum mean square error
(MMSE) technique. That is, define the averaged SNR
γ = Es /N0 , (2.72)
C(z)Gzp = CL F† , (2.76)
Y = Szp CL F† X. (2.77)
From Eq. (2.77), for zero forcing reconstruction, we can choose Szp as the
pseudo inverse of CL F† , i.e.,
40 2 Precoding Techniques in ISI Channel
Referring to Fig. 2.27, let the precoder P be an M × M DFT matrix and the
transmitting matrix Gcp be that described in Eq. (2.64). In this case, the whole
system becomes single carrier system with cyclic prefix. Figure 2.28 shows the
block diagram of the single carrier system with cyclic prefix. The SC-CP
x0 y0
x1 . P . G . . . . y1
.. .. .. C(z) .. S . P† .
xM–1 . . yM–1
Fig. 2.27. Block diagram for a general OFDM system with precoder.
x0 f0
qi y0
x1
.. P/S
and C(z)
remove
CP .. F .. f1
F† .. y1
xM–1
. add CP
and
S/P . . fM–1 . yM–1
Fig. 2.28. Block diagram for a single carrier system with cyclic prefix.
42 2 Precoding Techniques in ISI Channel
system has the following advantages when compared with the conventional
OFDM systems introduced in Sections 2.4.3 and 2.4.4.
1. Mitigation for High PAPR. It is well known that one of the critical
issues of conventional OFDM systems is its high PAPR (peak-to-average
power ratio) characteristic. Due to the use of IDFT in the transmitter, the
dynamic range of IDFT output will increase, and hence the peak value
increases. If we let the IDFT matrix be unitary, the average power of
IDFT output remains the same as that in the IDFT input. As a result,
the PAPR increases. It is intuitive that the PAPR increases as the number
of subchannels increases. In the transceiver of DVB-T, the number of
subchannels is up to 8192 and hence the system has large PAPR value.
High PAPR will increase design effort for analog circuits such as power
amplifier since the demand for linearity in systems with high PAPR is
much higher than in systems with low PAPR. System performance will
degrade significantly due to high PAPR. This drawback, however, can be
overcome by using SC-CP systems. The reason is that there is no need to
use IDFT in the transmitter side. Hence, the peak value of the transmit
signal is completely dependent on the the modulation scheme. Take IEEE
802.11a/g/n for instance, the highest modulation scheme is 64-QAM. The
corresponding PAPR for 64-QAM is around 1.63, which is much smaller
than the PAPR in conventional OFDM systems whose PAPR is in general
greater than 10 dB.
2. Simplification of DAC. Since there is no IDFT in the transmitter, it
may be sufficient to put a low bit width for DAC design. For instance,
for 64-QAM, the constellation level for both I and Q axes only have 8
different levels, i.e. (−7 − 5 − 3 − 1 + 1 + 3 + 5 + 7). Under such
situation, we may only require 3-bit DAC to represent such constellation
level, which again greatly simplifies the design effort of analog circuits.
3. Equalized BEP for All Subchannels. Now let us discuss the most
important characteristic of SC-CP system. That is, the SC-CP system
has equal BEP for all subchannels. Referring to the receiving noise path
of the SC-CP system in Fig. 2.29 and assuming that the receiving noise
qi is complex white Gaussian with zero mean and variance N0 , due to
the uncorrelated property of the noise, the correlation matrix of the noise
vector is given by
Rq = E qq† = N0 IM . (2.83)
q0 f0 e0
remove q1 f1 e1
CP . .. ..
.. F F†
qi
and
S/P qM–1 f
.
M–1
.e
M–1
Fig. 2.29. Receiving noise path of a single carrier system with cyclic prefix.
2.5 Precoding for OFDM Systems 43
e = (e0 e1 · · · eM−1 ).
Using Eqs. (2.83) and (2.84), we have the correlation matrix of the output
noise vector given by
Re = E ee† = F† Λ−1 FE qq† F† (Λ−1 )† F = N0 F† (ΛΛ† )−1 F.
(2.85)
To obtain the output noise variance, we only need to obtain the diagonal
elements of Re since the diagonal elements are the output noise variances.
From Eq. (2.85), since (ΛΛ† )−1 is diagonal with its diagonal element being
(1/|λ0 |2 1/|λ1 |2 · · · 1/|λM−1 |2 ), Re = F† (ΛΛ† )−1 F is a circulant matrix
and its diagonal elements are the 0th output component of the IDFT of
(1/|λ0 |2 1/|λ1 |2 · · · 1/|λM−1 |2 ), i.e.,
N0
M−1
[Re ]k,k = 1/|λm |2 , for all k. (2.86)
M m=0
From Eqs. (2.85) and (2.86), the variance of output noise for every sub-
channel is the same, i.e.,
N0
M−1
σe2k = E |ek | = [Re ]k,k =
2
1/|λm |2 . (2.87)
M m=0
Assume the transmitter power is Es . Due to the use of zero forcing equal-
ization and from Eq. (2.87), the output SNR for all subchannel is the same
and is given by
Es M
SN Rk = , for all k. (2.88)
N0 M−1
m=0 1/|λm |
2
Since the output SNR is the same (independent of k), all subchannels
have the same BEP in this situation.
The BEP result for SC-CP is very different from that of the conventional
OFDM systems. In conventional OFDM systems, the BEP of every individ-
ual subchannels is in general different. Thus, the performance corresponding
44 2 Precoding Techniques in ISI Channel
to the most serious fading will dominate the overall performance. Hence, we
usually use channel coding to overcome the issue that subchannels have deep
fading. On the contrary, SC-CP systems have the same BEP for all subchan-
nels. In this case, if the unique SNR of SC-CP is good, there may be no need
to use channel coding in this case. If the unique SNR of SC-CP is bad, how-
ever, using channel coding may not be able to rescue the system performance
because the channel coding such as convolutional code is designed to correct
burst error instead of block error. Observing from Eq. (2.88), if there is any
M−1
m=0 1/|λm | is
2
value for λk is small (deep fading), the summation term
large. Hence, the SNR value for all subchannels are the same bad. To over-
come this problem, we can use the MMSE equalization instead of zero forcing
equalization described as follows:
MMSE Equalization for SC-CP. Let the equalization coefficients be
γλ∗k
fk = , 0 ≤ k ≤ M − 1. (2.89)
1 + γ|λk |2
Let Γ be the diagonal matrix consists of fk , i.e., Γ = diag(f0 , f1 · · · fM−1 ).
In this case, the input and output relationship is given by
where the first term is contributed from the transmitted symbols and the
second term is contributed from noise. Since Ccir = F† ΛF, Eq. (2.90) can be
rewritten as
Note that the output noise vector in MMSE equalization contains the contri-
bution from both noise and transmitted symbols. Let us obtain the output
noise variance as follows. Assume the transmitted symbol vector X and the
noise vector q are uncorrelated, using Eqs. (2.83) and (2.91), we have
Re = F† Es (ΓΛ − IM )(ΓΛ − IM )† + N0 ΓΓ† F. (2.92)
D
Es + N0 γ 2 |λk |2
= . (2.93)
(1 + γ|λk |2 )2
Since γ = Es /N0 , we can rewrite Eq. (2.93) as
2.5 Precoding for OFDM Systems 45
1 + γ|λk |2 Es
dk = Es = . (2.94)
(1 + γ|λk | )
2 2 (1 + γ|λk |2 )
The diagonal elements of Re is the 0th component of the IDFT of (d0 d1 · · ·
dM−1 ). Thus, we have
Es
M−1
1
[Re ]k,k = . (2.95)
M 1 + γ|λk |2
k=0
From Eq. (2.95), the SNR is the same in individual subchannels and is given
by
M
SN Rk = M−1 1
. (2.96)
k=0 1+γ|λk |2
Compared Eq. (2.96) with Eq. (2.88), even if some suchannels have deep fad-
ing, the MMSE equalization will not lead to bad SNR value for all suchannels.
Another method for single carrier systems to avoid IBI is zero padding, which
is similar to the OFDM systems with zero padding as discussed in Section 2.4.4
except that now we have a precoder. Referring to Fig. 2.28, SC-ZP is the same
as that of SC-CP except that adding CP becomes zero padding. Hence, let
P = F and Gzp be the same as that in Eq. (2.75). For zero forcing and efficient
implementation, Szp can be chosen as that in Eq. (2.80). Hence, we have the
input and output relationship given by
which leads to the same results as that of SC-CP with zero forcing equalization
in Eqs. (2.83–2.88).
If we keep all conditions unchanged except that Szp = ΓFΦ as in
Eq. (2.89), it becomes SC-ZP with MMSE equalization. In this case, the same
results as in Eqs. (2.90–2.96) can be obtained. Similar to OFDM systems,
SC-ZP can use lower transmitter power to achieve the same performance as
SC-CP with little extra additions in the receiver.
We can also use the pseudo inverse solution with zero forcing to recon-
struct the transmitted symbols. That can be done by keeping the transmitter
unchanged as that in SC-ZP with MMSE equalization, and let Szp be chosen
as that in Eq. (2.80). In addition, let P† = F† . In this case, the input and
output relationship is given by
For pseudo inverse solution with MMSE receiver, we can choose Szp as that
in Eq. (2.79) and P† = F† . The input and output relationship in this case can
be expressed as
46 2 Precoding Techniques in ISI Channel
h1 (t)
^
x1(t) y1(t) MF1 b1 (i)
b1(i) p1(t)
hK (t)
S1
Tx-1
bK (i) pK (t)
xK (t) yK (t) ^
MFK bK (i)
SK
Fig. 3.1. The block diagram of the precoded SISO TDD DS-CDMA system.
3.1 System Model 49
The precoder for the kth user pk (t), which is a Lp -tap finite impulse response
(FIR) filter, is described as
Lp −1
pk (t) = pk,i δD (t − iTc ), (3.3)
i=0
where pk,i , which denotes the ith tap coefficient, is designed according to
different criteria. The spread signal xk (t) is first passed through the corre-
sponding precoder pk (t) before transmission and the output of the precoder
pk (t) is
yk (t) = xk (t) ∗ pk (t). (3.4)
The transmit signal y(t), which is the sum of all K prefilter output signals
yk (t), ∀k = 1, · · · , K, is given as
K
y(t) = yk (t). (3.5)
k=1
Please note that we omit the carrier frequency in y(t) since we represent our
transmit signal in the equivalent baseband.
Here we adopt the block fading channel model, i.e., the channel coefficients
remain unchanged during a block of transmit symbols and then changes in-
dependently from block to block. Also, channels of different users are realized
independently. Let hk (t) be the channel response for the kth user and is mod-
eled as an L-tap FIR filter given as
L−1
hk (t) = hk,i δD (t − iTc ), (3.6)
i=0
where the ith channel tap, hk,i , is described as one complex Gaussian random
variable whose mean is zero and has variance as σ 2 , i.e.,
After passing through the channel, the transmit signal is destroyed by the
multipath channel and contaminated by the noise, and the received signal at
the kth receiver is
50 3 Precoding Techniques in Multiple Access Channels
K
= Sj Hk pj bj (i) + I k (i) + nk (i), (3.9)
j=1
where
h̄j,k = [h̄j,k,0 , · · · , h̄j,k,L+Lp −2 ]t = Hk pj (3.10)
denotes the effective channel response for the signal bj (t) to the kth receiver,
and
nk (i) = [nk,0 (i), · · · , nk,L+Lp +N −3 (i)]t (3.12)
denotes the corresponding interference and noise vectors for the kth user,
respectively,
pj = [pj,0 , · · · , pj,Lp −1 ]t (3.13)
is a Lp × 1 precoding vector for the jth user, and
⎡ ⎤
sj,0
⎢ .. ⎥
⎢ . sj,0 ⎥
⎢ ⎥
⎢ .. .. ⎥
Sj = ⎢
⎢ sj,N −1 . .⎥⎥ (3.14)
⎢ .. ⎥
⎢ sj,N −1 .⎥
⎣ ⎦
..
.
(L+Lp +N −2)×(L+Lp −1)
and ⎡ ⎤
hj,0
⎢ .. ⎥
⎢ . hj,0 ⎥
⎢ ⎥
⎢ .. .. ⎥
Hj = ⎢
⎢ hj,L−1 . .⎥⎥ (3.15)
⎢ .. ⎥
⎢ hj,L−1 .⎥
⎣ ⎦
..
.
(L+Lp −1)×Lp
3.1 System Model 51
are two Toeplitz matrices for the convolution operation. In addition, every
element in nk (i) is modeled as an i.i.d. circularly complex Gaussian random
variable and is denoted as
To simplify the following analysis, we assume that the noise power is the same
for all users. Here we restrict each receiver employing a simple MF receiver,1
which first synchronizes to the Lp th effective channel tap in h̄k,k and perform
the despreading operation to get decision statistic zk (i), i.e.,
where
fk = [0, · · · , 0 , sk,0 , · · · , sk,N −1 , 0, · · · , 0]t . (3.18)
1×(Lp −1) 1×(L−1)
K
(0),†
= rj,k Hk pj bj (i) + Ik (i) + nk (i), (3.19)
j=1
and
N −1
rj,k (d) = sj,i+d sk,i (3.22)
i=0
measures the cross-correlation between sj and sk . Please note that the vari-
ables, vectors, and matrices shown in (3.19) are functions of the precoder
length Lp and we simply omit it for notation simplicity. The kth receiver
estimates the ith transmit symbol as
(0),†
K
(0),†
= rk,k Hk pk bk (i) + rj,k Hk pj bj (i) + Ik (i) + nk (i).
j=1;j =k
(3.24)
The first term at the right-hand side of (3.24) denotes the desired signal for
the kth user. The goal of Tx-MF is to maximize the desired signal power in
3.2 Transmit Matched Filter 53
zk (i) subject to the limited transmit power Ek . Hence, the precoder design
problem can be reformulated as
2 " # $
(T x−MF ) (0),† 2
pk = arg max E rk,k Hk pk bk (i) s.t. E |Sk pk bk (i)| = Ek .
pk
(3.25)
Please note that Sk above is a (Lp + N − 1) × Lp Toeplitz matrix, whose first
column is
[sk,0 , · · · , sk,N −1 , 0, · · · , 0 ]t . (3.26)
1×(Lp −1)
is also considered in [24] since the decoding performance is only related to the
real part of the desired signal. However, it is easy to show that both (3.25)
and (3.28) lead to the same solution.
Let us consider a special case when the autocorrelation property of sk is
ideal, i.e.,
1, i = 0,
rk,k (i) = (3.29)
0, elsewhere.
(0)
Therefore, RSk and rk,k become
and
(0)
rk,k = [0, · · · , 0, 1, 0, · · · , 0]t . (3.31)
L−1 L−1
is the reversed-order channel tap vector, and ||x|| denotes the 2-norm of vector
x. Equation (3.32) is the well-known Pre-Rake (or TRP), which is a special
case of Tx-MF when the autocorrelation property of the spreading code sk
is perfect. In other words, the Pre-Rake or TRP, which utilizes the time-
order reversed channel impulse response as its precoder, does not consider the
spreading code structure into its precoder design. In addition, the MF receiver
synchronizes to the channel tap h̄k,k,L−1 , whose power is
which suggests that the full multipath diversity is achieved at the MF receiver
output. This is because all the channel taps are combined coherently after
some delay and we denote h̄k,k,L−1 as the peak channel tap in h̄k,k . On the
contrary, the signal power of those off-peak signals h̄k,k,j , ∀j = L − 1 are much
weaker than that of h̄k,k,L−1 since the original channel taps in hk are combined
excursively. Obviously, the precoder length Lp also affects the concentrated
peak signal power in h̄k,k . In order to achieve the full diversity, we let Lp = L.
Example 3.1: Rather than considering an autocorrelation function of a
specific spreading code, a SISO Pre-Rake transmit filter example is given
in Fig. 3.2. We assume that all the channel taps are real so that they can
hk (t) pk (t)
1 1
Amplitude
Amplitude
0.5 0.5
0 0
−0.5 −0.5
0 1 2 3 4 0 1 2 3 4
Time (ms) Time (ms)
h̄kk (t)
1.5
1
Amplitude
0.5
−0.5
0 1 2 3 4 5 6 7 8
Time (ms)
Fig. 3.2. The example of Pre-Rake transmit prefilter for the kth user.
3.2 Transmit Matched Filter 55
be plotted in a two dimensional coordinate. hk (t), pk (t), and h̄k,k (t) are the
responses of the original channel, precoder, and the resultant channel for the
kth user, respectively. In addition, the total power in hk (t) is normalized to
one and the inter-arrival time between two consecutive taps is set as 1 ms.
An obvious peak signal is presented in h̄k,k (t) at 4 ms, which is the maximum
tap delay of hk (t).
100
MF w/o precoding
Tx-MF
10–1
BEP
10–2
10–3
0 2 4 6 8 10 12 14 16 18 20
SNR (dB)
Fig. 3.3. Performance gap between the conventional MF without precoding and
Tx-MF.
56 3 Precoding Techniques in Multiple Access Channels
receivers in the system since the channel responses from different users are
independent. Consequently, the MAI in the pre-Rake system is somewhat re-
duced as compared with that of the system without Tx-MF. It is however
that the Tx-MF scheme, which does not consider the transmit signals and the
downlink channel responses of other users in the system, may not suppress
MAI efficiently at the receiver output. Two different precoder design schemes,
namely Tx-ZF and Tx-Wiener, which remove or suppresse the possible inter-
ference, are reviewed next.
Although Tx-MF provided in the previous section achieves the maximal peak
signal power at the desired receiver output, it may cause a strong interference
to other co-channel users in the system since only the channel knowledge of
the desired user is considered for the precoder design. In fact, a better system
performance can be achieved by jointly designing all K precoders such that
not only the peak signal power is maximized but also the interference is erased
or minimized.
The transmit zero-forcing filter (Tx-ZF) is designed to decorrelate all the
transmit signals such that the signal at every receiver output is free of interfer-
ence and is derived as follows. Let us assume that every precoder is a Lp -tap
FIR filter and both Lp and L are much smaller than N so that the inter-
symbol interference (ISI) is dominated by previous one and next one transmit
symbols only. Please note that the scheme discussed here can be generalized
to different values of N , Lp , and L as well. If the kth MF receiver synchronizes
to the Lp th effective channel tap h̄k,k,Lp −1 and performs signal despreading,
the decision statistic for the ith transmit symbol in (3.24) can be represented
as
1 K
(l),†
zk (i) = rj,k Hk pj bj (i + l) + nk (i), (3.35)
l=−1 j=1
(0)
where rj,k is given in (3.21) and
(−1)
rj,k = [0, · · · , 0, rj,k (N − 1), · · · , rj,k (N − L + 1)]t , (3.36)
and
(+1)
rj,k = [rj,k (Lp − 1 − N ), · · · , rj,k (1 − N ), 0, · · · , 0]t (3.37)
denote different weight vectors for signals coming from the previous and fol-
lowed symbols, respectively. By substituting (3.21), (3.36), and (3.37) into
(3.35), zk (i) becomes
3.3 Transmit Zero-Forcing Filter 57
K
1
(l),†
zk (i) = rj,k Hk pj bj (i + l) + nk (i)
j=1 l=−1
(0),†
= rk,k Hk pk bk (i)
(−1),† (+1),†
+ rk,k Hk pk bk (i − 1) + rk,k Hk pk bk (i + 1)
K
1
(l),†
+ rj,k Hk pj bj (i + l) + nk (i), (3.38)
j=1,j =k l=−1
where the second and the third terms at the right-hand side of (3.38) are the
pre-cursor and post-cursor ISI, respectively, and the fourth term is the MAI
caused by all the other precoders pj , ∀j = k. In other words, the precoder pk
not only contributes ISI to the its receiver, but also causes MAI described as
1
(l),†
rk,j Hj pk bk (i + l)
l=−1
(T x−ZF ) (0),†
pk = arg max rk,k Hk pk (3.39)
pk
subject to
( (l),†
# Hj pk = 0, $∀1 ≤ j ≤ K and l = −1, 0, 1, except (j, l) = (k, 0),
rk,j
E |Sk pk bk (i)|2 = p†k S†k Sk pk = Ek ,
where Sk is the same as the one given in (3.25). The Tx-ZF design problem
in (3.39) can be solved in two steps, i.e., we design the precoder to satisfy
the zero-forcing constraint first while maintaining the unit channel gain for
the desired signal and then adjust the transmit power to confine the second
constraint. Consider the following linear system equation,
(3(k−1)+2)
Hk p̄k = e3K , (3.40)
58 3 Precoding Techniques in Multiple Access Channels
where
⎡ ⎤
Hk,1
⎢ .. ⎥
⎢ . ⎥
⎢ ⎥
Hk = ⎢⎢ Hk,k ⎥
⎥ , (3.41)
⎢ . ⎥
⎣ .. ⎦
Hk,K 3K×L
p
⎡ (−1),† ⎤
rk,j Hj
⎢ ⎥
Hk,j = ⎣ r(0),†
k,j Hj ⎦
. (3.42)
(+1),†
rk,j Hj 3×L
p
where we consider the equal gain for all K desired signals without the loss
of generality. The solution to this alternative Tx-ZF design is provided in
Section 3.5.2. In fact, the solution provided in Section 3.5.2 also minimizes
the meas-square-error (MSE) between bk (i) and zk (i), ∀1 ≤ k ≤ K. This is
because the noise term at the MF filter output is independent of the precoder
design and we can always design a proper Tx-ZF precoder to cancel all the
interference before hand. The Tx-ZF design using MMSE criterion was also
proposed in [147].
It is however noted that the zero-forcing precoder removes all the ISI and
MAI at the expense of reduced desired signal power since part of the transmit
power is used to cancel interference. On the contrary, more power is required to
maintain the same power level of the desired signal as compared to the system
without Tx-ZF. Therefore, when the transmit power limitation is imposed, the
MMSE design criterion cannot lead to Tx-ZF precoder anymore.
3.4 Transmit Wiener Filter 59
h1(t)
^
MF1 b1(i)
b1(i) p1(t)
hK(t)
TX-1 ^
bK(i) pK(t) MFK b K (i )
Fig. 3.4. The block diagram of the generalized SISO Tx-ZF DS-CDMA system in
[12] [IEEE].
c
^
α MFk bk(i)
Fig. 3.5. The block diagram of the modified Rx structure for SISO Tx-Wiener SISO
DS-CDMA system.
60 3 Precoding Techniques in Multiple Access Channels
the same for all K receivers. Again, consider the case when Tx-Wiener pre-
coder is a Lp -tap FIR filter and the kth MF receiver synchronizes to h̄k,k,Lp −1
for the received signal despreading. Thus, the output of the kth MF receiver
for the ith transmit symbol, zk (i) is described as
1
K
(l),†
zk (i) = αrj,k Hk pj bj (i + l) + αnk (i). (3.46)
l=−1 j=1
(T x−W iener)
The Tx-Wiener pk , ∀1 ≤ k ≤ K, and the receiver gain α(T x−W iener)
are jointly adjusted to minimize the sum of K output MSE subject to the total
precoder power constraint Ep , i.e.,
# $
(T x−W iener) (T x−W iener)
p1 , · · · , pK , α(T x−W iener)
K # 2 $
K
= arg min E bk (i) − zk (i) s.t. p†k S†k Sk pk = Ep .
p1 ,··· ,pK ,α
k=1 k=1
(3.47)
The Tx-Wiener filter and the optimal gain are derived in Section 3.5.3.
Recall that the receiver-based Wiener filter converges to the receiver-based
ZF and MF when the noise power approach to zero or infinity, respectively. In
fact, a similar property can be found in Tx-Wiener as well. Consider the case
when the noise power approaches infinity, the Tx-Wiener for the kth user in
(3.76) converges to
%
Ep
R−1
(T x−W iener) H (0)
lim pk = K (0),† † −1 (0) Sk Hk rk,k , (3.48)
σn →∞
2
r H R H r
k=1 k,k k Sk k k,k
which is the same as the Tx-MF filter shown in (3.27) with different scaling
factors. This is because both systems are derived under different constraints,
say, the individual transmit power limit for Tx-MF and the total transmit
power limit for Tx-Wiener. On the contrary, when the noise power becomes
infinitesimal, the Tx-Wiener is similar to Tx-ZF shown in (3.59) with different
scaling factor. This interesting behavior of Tx-Wiener filter was first reported
by Joham et al. in [61].
Example 3.3: The performance of different precoding schemes used to com-
bat interference, such as Tx-ZF and Tx-MMSE, are provided in this example.
The system parameters are the same as those in the previous example and
the result we have is shown in Fig. 3.6. Please note that the curves for both
Tx-MF and the conventional MF without precoding are plotted and served as
the references. It is obvious that suppressing interfering signals improves the
system performance. However, Tx-ZF with the fixed transmit power fails to
provide a better decoding performance than Tx-MF when SNR is less than 10
dB. This is because it reduces the interference power at the cost of its output
signal power.
3.5 Appendix 61
100
MF w/o precoding
Tx−MF
Tx−ZF w/ power constraint
Tx−ZF w/ minimum transmit power
Tx−MMSE
10–1
BEP
10–2
10–3
10–4
0 2 4 6 8 10 12 14 16 18 20
SNR (dB)
3.5 Appendix
The solution to (3.25) is given here. Let us first simplify the constrained
optimization problem as
# $ # $
= arg max p†k H†k rk,k rk,k Hk pk p†k RSk pk = Ek ,
(T x−MF ) (0) (0),†
pk s.t.
pk
(3.49)
where
RSk = S†k Sk = RSk RSk ,
1/2,† 1/2
(3.50)
−1/2
is a Lp × Lp full-rank matrix. Since RSk is also a full-rank matrix, we can
have the following transformation between pk and wk as
−1/2
pk = RSk wk . (3.51)
−1/2
where pk in (3.45) is replaced by RSk wk and RSk is given in (3.50). Gener-
(opt)
ally speaking, we can first figure out the optimal wk by using the pseudo-
−1/2
inverse of Hk RSk , i.e.,
& '†
(opt) −1/2 (3(k−1)+2)
wk = Hk RSk e3K , (3.56)
(T x−ZF )
and then acquire pk as
& '†
(T x−ZF ) −1/2 (opt) −1/2 −1/2 (3(k−1)+2)
pk = RSk wk = R Sk Hk R S k e3K . (3.57)
−1/2
Consider a special case when rank{Hk RSk } = Lp , and
& '† & '−1
−1/2 −1/2,† † −1/2 −1/2,† †
Hk R S k = RSk Hk Hk R S k RSk Hk . (3.58)
(3.59)
3.5 Appendix 63
where
b(i) = [b1 (i), · · · , bK (i)]t , (3.61)
) *
(l) (l) (l)
Rk = diag r1,k , · · · , rK,k , (3.62)
Hk = diag [Hk , · · · , Hk ] , (3.63)
p = [pt1 , · · · , ptK ]t . (3.64)
By substituting (3.60) into (3.47) and performing some manipulations, the
summation of K MSE becomes
K # 2 $
E bk (i) − zk (i)
k=1
K
1
2 † (l) (l),†
= K +α p HH
k Rk Rk Hk p
k=1 l=−1
K
†
H†k Rk eK
(k),† (0),† (0) (k)
−α eK Rk Hk p +p + α2 Kσn2 . (3.65)
k=1
Next, we let
1 −1/2
p= R w, (3.66)
α S
where
w = [wt1 , · · · , wtK ]t , (3.67)
RS = diag [RS1 , · · · , RSK ] (3.68)
and RSk is defined in (3.50). By substituting (3.65) and (3.66) into (3.47),
the constraint optimization is reformulated as
# $
w(opt) , α(T x−W iener)
( K 1
−1/2,† −1/2
= arg min K + w†
(l) (l),†
RS Hk Rk Rk Hk RS
H
w
w,a
k=1 l=−1
+
K
−1/2 −1/2,† † (0) (k)
w† RS
(k),† (0),†
− eK Rk Hk RS w + Hk Rk eK + α2 Kσn2
k=1
(3.69)
64 3 Precoding Techniques in Multiple Access Channels
subject to
w† w
= Ep . (3.70)
α2
Equation (3.70) implies that
w† w
α2 = . (3.71)
Ep
w(opt)
(
K
1
−1/2,† H (l) (l),† −1/2
†
= arg min K + w RS Hk Rk Rk Hk RS w
w
k=1 l=−1
K
−1/2 −1/2,† † (0) (k)
(k),† (0),† †
− eK Rk Hk RS w +w RS Hk Rk eK
k=1
"
Kσn2
+ w† w . (3.72)
Ep
K
−1/2,†
H†k Rk eK .
(0) (k)
RS (3.73)
k=1
(opt)
Due to the block-wise matrix operation in nature in (3.73), wk can be
individually represented as
⎛ ⎞−1
K
1
−1/2,† H (l) (l),† −1/2 Kσn2
=⎝ ILp ⎠ ∗
(opt)
wk R Sk Hk rj,k rj,k Hk RSk +
j=1 l=−1
Ep
−1/2,† (0)
RSk HH
k rk,k . (3.74)
and
) *t
(T x−W iener),t (T x−W iener),t
p(T x−W iener) = p1 , · · · , pK
%
Ep −1/2 (opt)
= K (opt),† (opt) S
R w , (3.76)
k=1 wk wk
where
%
(T x−W iener) Ep −1/2 (opt)
pk = K R
(opt),† (opt) Sk
wk ∀k = 1, · · · , K. (3.77)
k=1 wk wk
4
Precoding Techniques for MIMO Channels
Multiple input multiple output (MIMO) systems have been the most desirable
candidates for next generation of high data rate wireless communications.
MIMO systems can offer spatial multiplexing gain and greatly increases the
capacity of channels by independently sending streams of data across multiple
antennas. The Bell Laboratory Layered Space-Time (BLAST) system is the
most prominent example of this capacity achieving scheme. MIMO systems
can also provide diversity and coding gain by using space time codes that map
input symbols across time and space.
A block diagram of a MIMO system with either space-time code or mul-
tiplexing is shown in Fig. 4.1. Suppose there are Mt transmit antennas and
Mr receive antennas. The MIMO system can be described by
√
y= ρHx + w. (4.1)
ergodic, we assume its entries are i.i.d complex circularly symmetric Gaussian
with zero mean and unit variance. That means, each entry of H has uniform
phase and Rayleigh magnitude.
The capacity of an ergodic channel the capacity is achieved by maximizing
the mutual information I(x; y, H) with respect to the distribution of x. It is
shown that the capacity is achieved by transmitted signal x ∼ CN (0, Σx ) and
is given by [129]
C = E[log2 det(I + ρHΣx HH )] (4.2)
where Σx = E(xxH ) is the input covariance matrix.
If the channel state information (CSI) is known at both transmitter, H
can be considered deterministic. In this case the channel capacity is given by
H = UΛVH (4.4)
where U ∈ CMr ×Mr and V ∈ CMt ×Mt are unitary and Λ ∈ CMr ×Mt and its
diagonal elements (singular values) are square roots of eigenvalues of HHH .
If we multiply both sides of (4.1) with UH , we will obtain
√
ỹ = ρΛx̃ + w̃ (4.5)
where we assumed Mr < Mt . We see that SVD decouples the channel into a
set of m parallel independent subchannels, known as eigen subchannels with
eigenmodes λi .
The constrained optimization problem of (4.3) is simplified by using SVD
of H. The capacity is given by
m
C= (log2 (ρμλi ))+ (4.7)
i=1
m
1
(μ − )+ = 1 (4.8)
i=1
ρλi
4.2 Tomlinson-Harashima precoding (THP) for MIMO systems 69
F can also be chosen such that the main diagonal elements of B are one.
The feedback matrix, B−I cancels the interference caused by already detected
symbol. However, matrix DFE suffers from the same shortcomings as scalar
DFE for ISI channel. That is error propagation and the difficulty to combine
with coding schemes. When the channel state information is available, the
feedback section of the DFE can be moved to the transmitter so that linear
pre-equalization of the cascade B = FH can separate the signals from different
transmit antennas.
However, the above pre-equalization technique can increase the transmit
energy significantly. Therefore, a non linear function must be used to cripple
the transmit energy. As shown in Fig. 4.3, this can be done by a modulo device
as explained for TH-precoding for ISI channels in Chapter 2.
Ignoring the modulo device, the cascade of B = FH is a lower-triangular
and hence the output symbols yi , i = 1, 2, ...M are successively generated
from the data symbols xi ∈ A as
i−1
zi = xi − bij zj (4.10)
j=1
i−1
zi = xi + pi − bij zj (4.11)
j=1
√
where pi ∈ {2 Mc .(pI + jpQ ); pi , pQ ∈ Z}. The channel matrix H can be
factorized by QL factorization technique as
H = FH S (4.12)
where λi and ρ were as defined before and we have assume that rank
of H = M .
As we showed above, MIMO system with THP (or with the error-free deci-
sion feedback equalization) result in parallel and independent AWGN channel
with variance σn2 /|sii |2 , i = 1, ...M . Hence the capacity of THP MIMO for
high SNR values is
M
M
CT HP = log(1 + ρsii ) ≈
2
log(ρsii 2 ) (4.15)
i=1 i=1
72 4 Precoding Techniques for MIMO Channels
,
M
CT HP = log( ρλi ) = CSV D (4.17)
i=1
Fig. 4.4. Achievable rates for SVD-based equalization and for MIMO precoding
[[152]IEEE].
c
4.3 Joint Design of Linear Precoder and Decoder 73
Fig. 4.5. Average symbol error rates for different equalization techniques
[[152]IEEE].
c
tr(FFH ) ≤ p0 (4.22)
where p0 is the total power available and the expectation E is performed with
respect to the distribution of x and w. Note that
E{We 1/2 e2 } = E{tr(We 1/2 eeH We H1/2 )}
= tr(We 1/2 E{eeH }We H1/2 )
= tr(We E{eeH }), (4.23)
The method of Lagrange duality and the Karush-Kuhn-Tucker (KKT) condi-
tions can be used to solve the optimization problem in (4.22) as follows; We
first form the Lagrangian using Eqs. (4.21) and (4.23).
4.3 Joint Design of Linear Precoder and Decoder 75
k
−1/2
k
tr(Φf 2 ) = μ−1/2 (λi wei 1/2) − (λ−1
i ) = p0 (4.36)
i=1 i=1
where we have used the assumption Rxx = I. Using the optimum F and G
from Eqs. (4.32) and (4.33), SNR is simplified to
Tr(Λ−1/2 We 1/2 )
μ1/2 = (4.44)
Tr(Λ−1 ) + p0
78 4 Precoding Techniques for MIMO Channels
we can substitute the expression for We from (4.43) into (4.44) to obtain
Substituting (4.46) into (4.34) and (4.35), we obtain the following results for
the optimum precoder F and decoder G given in (4.32) and (4.33),
Hence equal SNR on each subchannels implies equal MSEs regardless of the
choice of error-weights.
Φf = (η −1/2 − Λ−1 )+
1/2
(4.62)
where
k
η 1/2 = k −1
.
p0 + i=1 (λi )
80 4 Precoding Techniques for MIMO Channels
Sometimes, minimizing the bit error probability is preferred. However, the op-
timization problem is hard to deal with since they are rarely solvable in closed
form. Instead, an indirect way of reducing probability of error is to maximize
the minimum distance between hypothesis. Since the minimum eigenvalue
λmin (SNR(F, G)) provides a lower bound for the minimum distance between
the hypothesis for the maximum likelihood (ML) detector (provided that the
noise is Gaussian and the symbols are i.i.d), it was suggested in [117] to use
the (4.42) as a sensible measure related to the probability of error. The cor-
responding optimization formulation is given in the following equations
F = VΦf (4.67)
and
G = Φg VH HH R−1
nn (4.69)
4.3 Joint Design of Linear Precoder and Decoder 81
Fig. 4.8 compares the performance of equal error designs and MMSE design
for Mt = Mr = 4 spatial multiplexing system. K = 3 streams of data are sent
over the channel with QAM modulation. As we see from the figure, although
equal error and MMSE have the same total average BER performance, the
subchannel BER performances for each of the 3 streams are different.
Fig. 4.9 shows the performance of the QoS-based design for a 3 × 3 MIMO
spatial multiplexing system. One audio stream and one video stream are sent
into the channel. The optimal precoder and decoder are obtained for each
channel realization. The figure shows that video stream are provided with
5-dB higher received SNR.
As we saw previously for some specific criteria, the linear precoder/ decoder
optimization decouples the MIMO channel into parallel subchannels if the
criterion is the minimization of weighted sum of MSEs of all subchannels.
It is of great interest to retain this diagonalized structure for other cri-
teria such as minimization of maximum or average BER. In [99] a unified
framework was developed for multicarrier MIMO systems which generalizes
the existing result. Instead of dealing with each designing criterion separately,
the minimization of some arbitrary objective function of the MSEs of all chan-
nel subchannels f0 (M SEi ), were considered, where MSE is the MSE of the
ith spatial subchannel, (Objective function of the SNRs and of the BERs are
easily incorporated in MSE). The objective function f0 must be chosen rea-
sonably such that it is increasing in each one one if its arguments while having
the rest fixed.
Two families of objective functions are considered here that embodies all
the above and other reasonable criteria: Schur-concave and Schur-convex func-
tions that arise in majorization theory.
For any x ∈ Rn , let x[1] ≥ ... ≥ x[n] denote the components of x in
descending order. Also, let x, y ∈ Rn . We say vector x is majorized by vector
y and represent it by x ≺ y if
4.3 Joint Design of Linear Precoder and Decoder 83
k
k
x[i] ≤ y[i] , 1≤k ≤n−1
i=1 i=1
n n
x[i] = y[i] (4.71)
i=1 i=1
where α and β are scalars and depends on the modulation scheme. Using the
Chernoff upper bound we can approximate the symbol error probability for
higher SINR values as
β
Pe (1/2)αe− 2 SIN R (4.78)
The BER can be approximately obtained from symbol error probability as
84 4 Precoding Techniques for MIMO Channels
where M is the constellation size. Both exact BER function and the Chernoff
upper bound are convex decreasing functions of SINR. In addition, for BER
less than 2 × 10−2 , both functions are convex increasing functions of the
MSE. Therefore, for practical purposes, we can assume the exact BER and
the Chernoff upper bound as convex functions of the MSE.
From the above discussion, we conclude that it suffices to focus on objective
function of MSEs without loss of generality. The following theorem, presents
the optimum linear precoder for any objective function of MSEs.
Theorem 2: Consider the following constraint convex optimization problem
min f0 (diag(MSE(F)))
F
tr(FFH ) ≤ p0 (4.80)
F = VΦf (4.81)
If f0 is Schur-convex,
F = VΦf UH (4.82)
where V is an Mt × K matrix orthogonal matrix consisting of the eigenvectors
corresponding to the K largest eigenvalues {λ}K
i=1 of H Rnn H. Φf is an v ×v
H H
1
M SEi = (4.83)
1 + φ2f,i λi
MSE-Based Design
K
f0 (M SEi ) = wei M SEi , (4.87)
i=1
,
K
f0 (M SEi ) = (M SEi )wei (4.88)
i=1
K
1
min wei
2
φi
i=1
1 + φ2f,i λi
K
φ2f,i ≤ p0 (4.89)
i=1
where μ−1/2 is the water-level chosen to satisfy the power constraint with
equality. Note that the above convex optimization problem and its solution is
nothing but the scaler version of (4.23) and (4.34).
Similarly, we can form the scalar convex optimization expressions for ob-
jective function (4.88) with the same power constraint and obtain the solution
with KKT optimality condition as
φi = (μ−1 wei − λ−1
1/2
i )+ (4.91)
where μ−1 is the water-level chosen to satisfy the power constraint with equal-
ity. We see that when wei = 1, the (4.91) becomes the classical capacity-
achieving water-filling solution.
Another MSE-based criterion is the minimization of the determinant of
the MSE matrix. Using the fact that X ≥ Y ⇒ detX ≥ detY it follows that
det(MSE(F)) is minimized for the choice of (4.56). Moreover, the determinant
of MSE(F) = (I + FH HH R−1 nn HF)
−1
does not change if F is post-multiplied
by a unitary matrix. Therefore, we can always choose an unitary (rotation)
matrix such that MSE(F) is diagonal and then
,
K
det(MSE(F)) = [MSE(F)]ii (4.92)
i=1
where Σx = FFH . Using the fact that det(I+XY) = det(I+YX), the mutual
information can be stated as I = − log det(MSE(F)). Therefore, the maxi-
mization of mutual information is equivalent to minimization of det(MSE(F))
and by (4.92) is the same as the minimization of the unweighted product of
the MSEs. The solution to all these criteria is given the classical capacity-
achieving water-filling for the power allocation
φi = (μ−1 wei − λ−1
1/2
i )+ (4.94)
Since the average BER performance is dominated by the symbols with
the highest MSE, the next reasonable criterion is the minimization of the
maximum of the MSEs. In other words, the objective function is
f0 (M SEi ) = max{M SEi } (4.95)
i
The above function is Schur-convex [99]. Thus, the MSE of the optimal so-
lution is not diagonal. However, tt is possible to make the diagonal of MSE
matrix identical by the optimal rotation matrix. The solution to the resulting
scalar convex problem can be written
−1/2
φi = (μ1/2 λi − λ−1
i )
+
(4.96)
where {μ1/2 } are multiple water levels chosen to satisfy the optimization con-
straints.
4.3 Joint Design of Linear Precoder and Decoder 87
SNR-Based Criteria
One useful such objective function is the weighted geometric mean of the
SINRs,
,K
f˜0 ({SINRi }) = − (SINRi )wei (4.97)
i=1
- −1
f0 ({xi }) = − K i=1 (xi − 1)wei can be shown to be minimized when the
weights are in increasing order and is then a Schur-concave function. Thus, the
objective function of (4.97) is concave when M SEi < 0.5, a condition easily
satisfied. Hence, by Theorem 2, the diagonalized structure is optimal and the
SINR is given by (4.84). The solution to the constraint convex optimization
problem, is
wei
φi = ( K p0 )1/2 (4.99)
i=1 wei
Note that if wei = 1, the solution is φi = (p0 /K)1/2 , i.e., uniform power
allocation.
There are other SINR-based criteria discussed in [99]. In particular, it
-K
is shown that the maximization of i=1 (1 + SIN Ri ) is equivalent to the
minimization of the determinant of MSE and also the maximization of mu-
tual information, both discussed before, with the solution given by capacity-
achieving water pouring expression given by (4.94). Also, maximization of the
minimum SINR is equivalent to the minimization of maximum MSE treated
before.
BER-Based Criterion
K
f˜0 ({BERi }) = BERi (4.100)
i=1
which can be expressed as a function of the MSEs using (4.76), (4.77) and
(4.79) as
K
f0 ({MSEi }) = BER(MSE−1i − 1) (4.101)
i=1
K
The function f0 ({xi }) = i=1 BER(x−1i − 1), (assuming θ ≥ xi > 0, for suffi-
ciently small θ such that BER(x−1
i − 1) ≤ 2 × 10−2) is a Schur-convex function
[99]. Therefore, by Theorem 2, the optimal solution has a non-diagonal MSE
matrix with diagonal elements given by (4.85) which have to be minimized.
The scalarized convex optimization problem is given by
K /
−1
min αi Q βi (ti − 1)
ti ,φ2i
i=1
1
K
1
θ ≥ ti ≥
K i=1
1 + λi φ2i
K
φ2i ≤ p0 (4.102)
i=1
Unfortunately, this problem does not have a closed form solution and one has
to resort to iterative methods such as interior-point methods [99].
So far, we have assumed that the there is no spatial correlation among transmit
and receive antennas. In other words, element of the MIMO channel matrix
fades independently. However, in many practical downlink scenarios, there
may be high correlation between base station (BS) antennas since the BS an-
tennas are typically placed high above the ground and see no local scatterers.
4.4 Precoder in MIMO Space-Time Code Systems 89
y = HFx + w (4.104)
Linear
Bits in Coding ML Bits out
ST-Code Precoder
Modulation F Decoder
Fig. 4.10. Linear precoder and space-time code in correlated fading channel
[[110]IEEE].
c
90 4 Precoding Techniques for MIMO Channels
y = Hw R1/2
a Fx + w (4.105)
Let x (t) be the K × N transmitted space-time codeword at time t. At the
k
1
P (xk (t) → xl (t)) ≤ (4.106)
(λgm 4σ1 2 )vMr
where, v is the rank of matrix Δx(k, l, t)ΔxH (k, l, t) and λgm stands for
the geometric mean of the product-of the v nonzero eigenvalues {λi }vi=1 of
v
Δx(k, l, t)ΔxH (k, l, t), i.e. λgm = ( i=1 λi )1/v .
The diversity gain is defined as
H
Gd = Nr min rank(Δx(k, l, t)Δx (k, l, t) (4.107)
xk (t),xl (t)
As seen from (4.106), the diversity gain determines the slope of the upper
bound for the log-log pairwise error probability-SNR curve. Maximum diver-
sity is obtained if the matrix Δx(k, l, t) is full rank for all distinct k, l,.
The coding gain is the minimum of the product of eigenvalues of
among all distinct pairs of (xk (t), xl (t)). In other words, the coding gain can
be written as
, v
Gc = min( λi )1/v (4.108)
i=1
For a given diversity gain, the coding gain measures the saving in SNR of the
space-time code.
We can design optimal linear precoder given such a known space-time
encoder. With the inclusion of the linear precoder F, the effective minimum
distance error matrix becomes Δx = FΔx. Similar to the proof steps in [128],
the PEP can be upper bounded by
where
where Ur and Vr are Mt × K orthogonal matrix whose columns are basis for
1/2
the range space of Ra . Vr and Ur are Mt × (Mt − K) orthogonal matrix
1/2
which constitutes a basis for the null space of Ra . Λr is a diagonal matrix
containing the K nonzero eigenvalues {λr }i=1 arranged in a decreasing order
K
F = Vr Φf Vx H
Φf = (γI − Λr −2 Λx −1 )+
1/2
(4.115)
system.
Fig. 4.11. Precoding gain for rate 3/4 space-time code and antenna correlation
function 0.7 [[110]IEEE]
c
4.4 Precoder in MIMO Space-Time Code Systems 93
y = Hs + w = HUDx + w (4.117)
fm
T
(xk − xl ) = 0 ∀ m ∈ [1, Mt ], ∀ xk , xl ∈ C Mt (4.119)
Linear ST-LCP x
x Coding ML
Precoder Mapper
Modulation Decoder
F U
T
Since fm (xk − xl ) is the mth coordinate of the precoder vector FT (xk − xl ),
we conclude from the above equation that to achieve maximum diversity, each
Mt × 1 output vector FT xk must be distinct in all its Mt coordinates.
From (4.108) and the fact that λm = fm T
(xk − xl )2 for m = 1, 2, ...Mt ,
we can express coding gain for LCP matrix when Gd = Mt Mr as
M 2/Mt
,t
Gc = min fm
T
(xk − x )
l
(4.120)
i=1
tr(FFH ) = Mt (4.121)
which ensures that total transmit energy over Mt time intervals is E{Fx2 } =
E{x2 } = Mt .
Now, we look for a unitary F that maximizes coding gain among diversity-
maximizing unitary precoders. The optimum unitary precoder can be found
by solving the following optimization problem
,
Mt
Fopt = arg max min fm
T
(xk − xl )2/Mt
F xk =xl
m=1
tr(FFH ) = Mt (4.122)
where
0 1
cos Ψ e−jΦ sin Ψ
UΨ,Φ = (4.125)
−e sin Ψ cos Ψ
jΦ
Let Z[j] is the ring of Gaussian integers whose elements are in the form of
p + jq with p, q ∈ Z. Let also Q(j) be the smallest subfield of C including
both Q and j. Suppose the minimal polynomial over subfield Q(j) is denoted
by (mα,Q(j) (x)). Let {αm }N
m=1 T are the roots of the minimal polynomial over
subfield Q(j).
Then the the linear constellation precoder can be constructed as follows
96 4 Precoding Techniques for MIMO Channels
⎡ t −1
⎤
1 α1 ... αM 1
⎢
1 ⎢1 α2 ... αM t −1 ⎥
2 ⎥
F = ⎢. .. .. ⎥ (4.127)
γ ⎣ .. . . ⎦
t −1
1 αMt ... αM
Mt
From Algebraic theory, it is easy to show [154] that the first row of F forms a
basis for Q(j), i.e., f1T (xk − xl ) ∈ Q(j). It follows that for all (xk − xl ) ∈ Z[j],
f1T (xk −xl ) is a root of a monic polynomial coefficients with coefficients in Z[j].
Defining ηm (α) = αm (m ∈ [1, Mt ]), we have ηm (f1T (xk − xl )) = f1T (xk − xl ).
-N
m=1 T ηm (f1 (x − x )) is actually called a relative norm of (f1 (x − x ))
T k l T k l
where FMt is the Mt -point inverse fast Fourier transform (FFT) matrix whose
2π
1
(i, j)th entry is given by √M ej Mt (i−1)(j−1) . A lower bound for coding gain of
t
the LCp-2 is given by [154]
4.4 Precoder in MIMO Space-Time Code Systems 97
1 2(χ−1) 1
Gc ≥ ( ) ( ) (4.131)
HMt Mt Es
I √
where χ = i=1 Di /Mt and H = maxxk ,xl ∈C Es (xk −xl ). I is the number
of distinct minimum polynomial pi (x) of βm = αej2π(m−1)/Mt , m = 1, ...Mt ,
over Q(j) and Di is the degree of pi (x), i = 1, ...I and Di ≥ Mt .
To design a LCP with large coding gain, the number of distinct minimal
polynomial βm and their degree must be as small as possible to make χ small
[154].
It turns out that the space-time code with unitary constellation precoder
can achieve higher average mutual information than orthogonal design space
time codes, for N t > 2 and large SNR [154].
the PEP performance of LCP and ST-OD compared via simulation and
the results are plotted in Fig. 4.13 and Fig. 4.14. In both figure, Mt = 3, 4.
For Mt = 4, complex precoders F were constructed according to LCP-1. For
Mt = 3, the parameterization method were used. Rate 3/4 ST-OD codes were
constructed according to [127] and were compared with rate 1 ST-LCP codes.
64 QAM constellation were used for ST-LCP to maintain the same spectral
efficiency of 6 bits/s/Hz that ST-OD achieves with 256 QAM constellation.
The SNR gain of ST-LCP gain is less than 1 dB in Fig. 4.13, it increases to 3
Since the real-time channel information is not possible at the transmitter due
to either fast channel variation or insufficient feedback capacity, the channel
statistic knowledge, namely, channel mean or covariance, which varies less fre-
quently, is more likely to be delivered to the transmitter. The precoder design
with either the channel mean or covariance matrix available at the transmitter
is recently studied in [91, 145, 59] from the channel capacity point of view.
For a specified input covariance matrix, the channel capacity is achieved by
the use of vector Gaussian symbols [144]. Therefore, the goal of the precoder
design here is to determine the best input covariance matrix that maximizes
the mutual information when the channel statistic is known to the transmitter
[91, 145, 59]. Some related research results are reviewed next.
The downlink, multiple-input, single-output (MISO) scenario considered
in [91, 145] is used as an example to illustrate this design idea1 . The block
diagram of the MISO precoder is given in Fig. 4.15, where Mt transmit anten-
nas are separated far enough at the base station to exploit spatial diversity
and a single receive antenna is employed at the mobile unit due to its size and
power limitation. Furthermore, we assume only one data link is established
at a time and the multiple access can be achieved via either time division
h1
Tx-1
data stream data stream
input X output
Precoder Decoder
Rx-1
hM n
Tx-Mt
Fig. 4.15. The block diagram of precoder design using channel statistic knowledge
[[145]IEEE].
c
1
Based on the similar design concept in [91, 145], Jafar and Goldsmith later ex-
tended the precoder design to the MIMO channel in [59].
100 4 Precoding Techniques for MIMO Channels
y = x† h + n, (4.132)
where n is the zero mean circularly complex Gaussian noise sample whose
power is equal to σn2 and h is a Mt × 1 channel vector. Let h be a circularly
symmetric Gaussian random vector as well, whose probability density function
(PDF) is completely specified by its mean ν and variance Σ and is denoted
as h ∼ CN(νν , Σ).
Let Q be the input covariance matrix of x. Conditioned on the channel
realization h, the maximum mutual information is given as
h† Qh
I(x; y|h) = log 1 + . (4.133)
σn2
where the averaged output signal power is limited to P . Let the eigen-
decomposition of matrix Qo be
where
UQ0 = [uQ0 ,1 , · · · , uQ0 ,Mt ], (4.136)
ΛQ0 = diag(λQ0 ,1 , · · · , λQ0 ,Mt ), (4.137)
and
λQ0 ,1 ≥ λQ0 ,2 · · · ≥ λQ0 ,Mt . (4.138)
Please note that the ith eigenvector uQ0 ,i specifies the direction of the ith
transmit signal while the ith diagonal element λQ0 ,i determines the corre-
sponding emitted power along uQ0 ,i . Later, we design the optimal input
covariance matrix in different scenarios by specifying its eigenvalues and eigen-
vectors.
Before discussing the precoding algorithm using channel statistic informa-
tion, let us consider two special cases as follows. First, when the transmitter
knows nothing about the channel, the expected value of the mutual informa-
tion is upper bounded as
"
||h||2 P
Eh {I(x; y|h)} ≤ Eh log 1 + , (4.139)
Mt σn2
where ||x|| is the 2-norm of vector x [91]. Please note that the above equality
holds if and only if
4.5 Precoding Techniques for the Limited Feedback Channel Capacity 101
P
Qo = IM . (4.140)
Mt t
As (4.140) implies, the channel capacity is achieved by transmitting Mt signals
in Mt orthogonal directions with equal power, i.e., there is no directional
preference for the transmit signal. In the following context, we denotes it as
the diversity transmission scheme. Second, when the ideal channel knowledge
is available at the transmitter, we can develop the following upper bound as
[91]
"
||h||2 P
Eh {I(x; y|h)} ≤ Eh log 1 + , (4.141)
σn2
where the equality is hold if and only if
hh†
Qo = P . (4.142)
||h||2
This result implies that when the channel state information is perfectly known
at the transmitter, the beamforming scheme, which combines Mt channel
gains coherently at the receiver, is able to achieve capacity. As comparing
these two capacity achieving schemes, the beamforming scheme not only pro-
vides a higher channel capacity but also requires less complexity for symbol
decoding than the diversity transmission scheme. However, it demands the in-
stant channel knowledge available at its transmitter. Delivering the real-time
channel information from the receiver to the transmitter may not be practical
in a time varying channel due to feedback delay. Furthermore, the channel
information estimated at the receiver is not perfect as well.
Generally speaking, the solution to the constraint optimization problem
in (4.134) for arbitrary ν and Σ is difficult to find. In what follows, we con-
sider the precoder design in (4.134) for two special cases, which depends on
the time duration of our interest [145, 59]. First, when the interested time
duration is short, the channel information can be somehow track based on the
fed back information at the transmitter [145]. The channel knowledge at the
transmitter can be modeled as
1. For the eigenvectors of Qo we have uQo ,1 = ν /||νν || and uQo ,2 , · · · , uQo ,Mt
form an arbitrary set of orthonormal basis whose span is perpendicular
to ν ,
2. For the eigenvalues of Qo we have λQo ,1 = λo and λQo ,2 = λQo ,3 = · · · =
λQo ,Mt = (P − λo ) / (Mt − 1).
Proof: The proof of the above theorem is omitted here. Interested readers
are referred to Sec. III in [145] for the detailed treatment.
When the channel mean feedback is made available, the best transmis-
sion scheme, which achieves the highest mutual information, is to transmit
the signal along the direction of ν with power equal to λo . Depending on
the total available power, if λo < P , we then distribute the residual power
equally to other Mt − 1 orthogonal directions. This implies that we switch
from the beamforming scheme (Rank(Qo )=1) to the diversity transmission
(Rank(Qo )=Mt ). Although the closed form solutions for the transmit power
in different directions, λQo ,1 , · · · , λQo ,Mt , are not given here, they can be
computed by some numerical scheme, such as the projected gradient descent
algorithm [9] as pointed out in [145].
Another channel model is suitable for the fast time varying channel or
a long channel observation period. In this case, the channel mean tracking
is not practical and can be treated as zero. It is however that the channel
covariance matrix Σ, which is determined by the relative geometry between
the transmitter and the receiver [120], is more stable [145, 59]. As a result, the
receiver can gradually passes the channel covariance matrix information to the
transmitter and this scheme is denoted as the channel covariance feedback in
the sequel. Mathematically, the knowledge of the channel at the transmitter
can be modeled as
h ∼ CN (0, Σ). (4.144)
For the channel covariance feedback, Visotsky and Madhow provides the op-
timal transmission scheme in [145], which is stated in the following theory.
Theorem 5: (Visotsky and Madhow [145]) For h ∼ CN (0, Σ) and channel
covariance feedback at the transmitter, the best transmission scheme is to
deliver signals along the eigenvector direction of Σ, i.e.,
UQo = UΣ , (4.145)
transmit antennas. The channel model we consider is the first order auto-
regressive channel model, which is described as
Based on (4.146) and (4.147), the knowledge of the channel at the transmitter
can be shown to be
h(t) ∼ CN (νν , σn2 I), (4.148)
where ν = ad h(t − d) and σn2 = (σw 2
(1 − a2d ))/(1 − a2 ). Please note that
d
the value of a in (4.148) determines the quality of channel information,
namely, the greater ad is, the better the channel information becomes. Three
different transmission schemes are compared, and they are diversity scheme
P νν †
(i.e.,Q = M t
IMt ), beamforming scheme (i.e.,Q = P ||ν ν ||2 ), and the optimal
scheme introduced in Theory 1. The result shown in Fig. 4.16 and 4.17 corre-
sponds to the information rate as a function of different schemes with different
feedback information quality, namely, ad = 0.9 and 0.3. It is observed from
both Fig. 4.16 and 4.17 that when the transmitter has better understand-
ing about the current channel, beamforming achieves the highest information
Fig. 4.16. Information rate of different transmission schemes in the channel mean
feedback case, ad = 0.9 [[145]IEEE].
c
104 4 Precoding Techniques for MIMO Channels
Fig. 4.17. Information rate of different transmission schemes in the channel mean
feedback case, ad = 0.3 [[145]IEEE].
c
rate while the diversity scheme is 2 dB away from optimal. However, when
the channel uncertainty at the precoder increases, the diversity transmission
scheme outperforms the beamforming since the direction of beamforming is
not very accurate.
Example 2: Channel Covariance Feedback
The numerical result for different transmission schemes based on the channel
covariance feedback in [145] is given here. Three transmit antennas are de-
ployed to deliver the information symbols using different transmission method,
P
namely, the diversity scheme (i.e., Q = M t
IMt ), the beamforming scheme,
which corresponds to send the information along the direction of the strongest
eigenvector direction, and the optimal scheme given in Theory 2. In order
to demonstrate how the eigenvalue spread of the channel covariance matrix
affects the achieved information rate, we consider two different cases, say,
σ1 = σ2 = σ3 and σ1 /σ2 = σ1 /σ3 = 2, where σi denotes the ith eigenvalue of
Σ. The results we have are shown in Fig. 4.18 and 4.19. As Fig. 4.18 and 4.19
suggest, when the eigenvalue of Σ are all equal, diversity scheme is optimal.
On the contrary, when the eigenvalue spread of Σ increases, beamforming
provides almost the same performance as the optimum scheme.
From the previous Example 1 and 2 we observe that the beamforming
scheme is the optimal transmission scheme when either the knowledge of the
4.5 Precoding Techniques for the Limited Feedback Channel Capacity 105
Fig. 4.18. Information rate of different transmission schemes in the channel covari-
ance feedback case, σ1 = σ2 = σ3 [[145]IEEE].
c
Fig. 4.19. Information rate of different transmission schemes in the channel covari-
ance feedback case, σ1 /σ2 = σ1 /σ3 = 2 [[145]IEEE].
c
106 4 Precoding Techniques for MIMO Channels
fed back channel mean improves or the eigenvalue spread of the fed back co-
variance matrix grows. As we mention earlier, the beamforming scheme, which
transmits only one data symbol at a time, requires lower decoding complex-
ity as compared to the diversity transmission scheme, where multiple data
symbols should be separated at the receiver. In [145], Visotsky and Mad-
how demonstrated that beamforming is optimum via simulation only. Later,
based on the same concepts of channel mean and covariance feedback, Jafar
and Goldsmith generalized the precoder design in [145] to the MIMO chan-
nel and provided the necessary and sufficient condition for the optimality of
beamforming in [59]. Interested readers are referred to [59] for the detailed
treatment of this topic.
The use of OSTBC is to increase the diversity gain of the MIMO channel such
that the probability of channel deep fading is low if channel gains between
different paths are independent [3, 127]. However, the full-rate OSTBC only
exists for a certain number of transmit antennas [127]. For arbitrary number
of transmit antennas, we can apply an additional precoding matrix to achieve
the full-rate code while enjoying additional array gain [62, 80].
The block diagram of the precoded OSTBC system is given in Fig. 4.20.
Let us consider a Mr × Mt MIMO system in a block fading channel, where
the number of the transmit antennas is less than that of the receive anten-
nas. The channel gain between different transceiver pair is assumed to be an
i.i.d., complexity Gaussian random variable whose probability density func-
tion (PDF) is CN (0, 1). The M (M < Mt ) data symbols are mapped onto
Mt transmit antennas via the precoding matrix Pi , which is specified by the
receiver according to the current channel realization. As a result, the received
signal corresponding to one OSTBC symbol Y can be formulated as
2
ρ
Y= HPi X + N, (4.150)
M
where ρ denotes the signal-to-noise power ratio, X
X = [x1 , · · · , xT ] (4.151)
Tx-1 Rx-1
Data stream n1,t
X Data stream
input OSTBC Output
encoder ML decoder
Pi
Codeword Codeword
Mapping Selection
Scheme
Tx-Mt Tx-Mr
nMr,t
Fig. 4.20. The block diagram of the precoded OSTBC system using unitary
precoding.
systems [80], the codeword selection and codebook construction processes are
in fact quiet similar with the precoded OSTBC system [80]. Only their design
criteria are different.
108 4 Precoding Techniques for MIMO Channels
and its (i, t) element, ni,t , which denotes the noise sample at the ith receive
antenna at the time instance t, is modeled as an i.i.d. complexity Gaussian
random variable, i.e., ni,t ∼ CN (0, 1).
If the maximum-likelihood (ML) decoding scheme is used to extract the
transmit symbols in Y, the conditional symbol error probability decreases
exponentially as the channel Frobenius norm goes up, i.e.,
Pr(error|H) = exp −γ||HPi ||2F , (4.152)
where the second equality comes from the fact that both Xl and Xm are
orthogonal. Hence, it is clear to see that the precoder is chosen such that the
Frobenius norm of the equivalent channel response is maximized. Next, we
are going to introduce the optimal unitary codeword, Popt , if the capacity of
the feedback channel is not limited [80]. Please note that even Popt , which
demands much more channel capacity for the precoder information feedback,
is not practical enough in a feedback limited system, it does provide insight
to our codebook design.
Let the singular value decomposition (SVD) of a m × n (m > n) matrix
A be
†
A = ΣA UA VA , (4.154)
where ΣA and VA are the unitary matrices of size m × m and n × n, respec-
tively, and UH of size m × n has m singular values λA,1 , · · · , λA,n on its main
diagonal and zeros elsewhere. Please note that n singular values are arranged
in a decreasing order, i.e.,
In addition, the peak power constraint is enforced in the precoder design, i.e.,
||Px||
maxx ≤ 1, (4.156)
||x||
λP,1 ≤ 1. (4.157)
i=1
where 0 is the zero matrix of size M × Mt and ŪH is composed of the first M
column vectors in UH . The property that the Frobenius norm of one matrix
is unchanged after being multiplied by an unitary matrix is applied to get
the second equation in (4.158) while the first inequality in (4.158) is true by
applying the upper bound on M singular values in P. In order to achieve the
upper bound in (4.158), Popt can be designed as
in the MIMO channel [46, 80], the antenna subset selection scheme has less
flexibility in design since each element in the precoder is either 1 or 0. Con-
sequently, its performance is worse than that of the unitary precoding as we
will show later in the simulation.
Here, we will demonstrate that the codebook construction for the unitary pre-
coding system can be related to the subspace packing problem in the Grass-
mannian manifold as follows.
Recall that N codewords in the unitary precoding codebook are designed
off-line and hence independent of the channel realization and Popt as well.
First, we can modify the codeword selection criteria in (4.153) as
where
||HPopt ||2F − ||HPi ||2F (4.164)
can be treated as the distortion due to an non-ideal codeword Pi . Love at al.
in [80] show that for a given channel realization H, the minimum distortion
can be bounded from top as
1 †
min ||HPopt ||2F − ||HPi ||2F ≤ λ2H,1 ||V̄H V̄H
min − Pi P†i ||2F .
i∈{1,··· ,N } 2 i∈{1,··· ,N }
(4.165)
For a given codebook, its performance can be evaluated via its averaged dis-
tortion, i.e., "
EH min ||HPopt ||F − ||HPi ||F
2 2
(4.166)
i∈{1,··· ,N }
In [7], Barg and Nogin have shown that when Mt is large, the probability
function defined above can be approximated by
( + 2Mt M+o(Mt )
8
N
δ
P r Popt ∈ Bi ≈ N √ . (4.171)
i=1
2 M
Using (4.168) and (4.171), we can have the following simplification [80]
"
1 †
EH min ||V̄H V̄H − Pi P†i ||2F
i∈{1,··· ,N } 2
"
= EH min d(Popt , Pi )2
i∈{1,··· ,N }
( + 2 ( +
8N
dmin 8N
≤ P r Popt ∈ Bi + 1 − P r Popt ∈ Bi ·M
i=1
2 i=1
2Mt M+o(Mt )
δ 1 2
≈ M +N √ d −M . (4.172)
2 M 4 min
design using Fourier based signal processing scheme in [53] can be applied to
find out a good space packing with large minimum distance. Even though this
scheme demands high computational complexity for codebook construction,
especially when Mt , Mr and M are large, it requires less memory to store
all N codewords thanks to its unique code structure. Interested readers are
referred to [80] and [53] for more discussion.
equal to 10−2 , but achieves higher diversity gain as well. In addition, a larger
codebook provides a better SER performance at the cost of more feedback
overhead. If the feedback channel capacity is limited to be 3-bit, applying the
unitary precoding algorithm renders a little extra performance gain over the
antenna subset selection.
Part II
5.1 Introduction
To transmit data simultaneously for multiple users with a shared common
channel, the multiuser OFDM technology offers an attractive solution, which is
the main focus of this research. Generally speaking, there exist two families of
multiuser OFDM systems, i.e., multicarrier code division multiplexing access
(MC-CDMA) [1, 48, 49, 67, 155] and orthogonal frequency division multiple
access (OFDMA) [57, 66, 114] as detailed below.
When compared with the CDMA technology, MC-CDMA inherits the ad-
vantages of multicarrier systems in combating ISI caused by frequency selec-
tive fading channels. MC-CDMA systems can be further divided into two types
[49]. In the first type, one bit is transmitted per time slot. The transmitted
bit is spread into several chips, which are allocated to different subchannels.
The number of subchannels equals to the number of chips [155]. This type
of MC-CDMA system can exploit the full frequency diversity gain when the
maximum ratio combing (MRC) [49, 108] is used in the receiver side. In the
second type, several bits are converted from serial-to-parallel and then each
bit is spread into several chips. The chips corresponding to the same bit are al-
located to the same subchannel [67], which is often called the MC-DS CDMA
system. Two more generalized MC-CDMA system was proposed in [1, 48, 49].
In the first scheme [48, 49], each S/P converted bit is spread into several chips
and then each subcarrier is modulated with one chip, where the frequency sep-
aration corresponding to each bit is maximized to achieve frequency diversity.
In the second scheme [1], similarly, each S/P converted bit is spread into sev-
eral chips. Then, the chips corresponding to the same symbol are modulated
in successive subcarriers. Although MC-CDMA systems spread symbols using
orthogonal codes to ensure orthogonality, when used in uplink transmission,
i.e., from the mobile station (MS) to the base station (BS), orthogonality may
be destroyed at the receiver due to frequency selective fading, thus leading to
multiaccess interference (MAI). The MAI problem cannot be solved by in-
creasing the transmit power since increasing the transmit power for one user
will also increase the interference for other users. To suppress MAI, sophisti-
cated multiuser detection (MUD) [144] and signal processing techniques have
been proposed at the receiver end [30, 49]. Furthermore, due to MAI, the CFO
estimation and estimation and compensation are much more complicated in
MC-CDMA systems [31, 126].
In contrast, OFDMA is MAI-free when the time and the frequency are
well synchronized in the system. It was originally proposed for the cable TV
application [114]. Currently, it has been included in the IEEE 802.16a standard
for the fixed wireless metropolitan area network (WMAN) [57, 66]. However,
similar to conventional OFDM, OFDMA systems are sensitive to frequency
asynchronism, i.e., the carrier frequency offset (CFO) problem [87, 101]. The
CFO effects result from the oscillator mismatch in the transceiver pair and/or
the Doppler effect due to mobile users. Research on accurate CFO estimation
and compensation has received a lot of attention in the design of practical
OFDM systems [87, 118, 141]. However, different CFOs of multiple users in
OFDMA systems make the CFO estimation much more difficult than that of
a single user OFDM system. This is because of the fact that, when a user has a
CFO, the CFO not only causes the performance degradation of this user (the
self-CFO effect) but also results in MAI for others [135, 156]. Then, OFDMA
systems are no longer MAI-free in the presence of CFO. The CFO estimation
are no longer MAI-free in the presence of CFO. The CFO estimation problem
for OFDMA systems has been extensively studied, e.g., [6, 88, 106, 107, 141].
An edge sidelobe suppressor was proposed in [156] to mitigate the CFO effect
of an OFDMA system. However, most solutions demand extra complexity
at the receiver. The CFO effect is recognized as one of the main technical
challenges that limits the mobility of OFDM systems.
Moreover, in the uplink transmission, it is difficult to guarantee that all
users’ signals are aligned at the receiver and this leads to time asynchronism.
Time asynchronism will lead to MAI in OFDMA as well [97]. Although the
timing mismatch problem can be handled using a sufficiently long cyclic pre-
fix to cover time offsets, this solution increases redundancy and decreases the
actual data rate. Like the frequency offset issue, some research has been con-
ducted using sophisticated signal processing to estimate time and frequency
offsets, e.g. [6, 88, 142]. Due to MAI, time offsets cannot be well compen-
sated in the receiver [88]. Offsets have to be estimated by the receiver and
sent back to every user via feedback so that each user can compensate the
offsets at the transmitter. In the IEEE 802.16 standard, this is done using a
feedback mechanism called ranging [57]. Although the time offset problem can
be solved using feedback, the solution imposes a higher computational load
on the system. In addition, it may not guarantee that all users are perfectly
synchronized. If some users fail to synchronize with the base station, MAI will
occur and the system performance will degrade.
Furthermore, OFDM-based systems have been designed for applications
with little mobility. However, mobile OFDM technology has recently attracted
a lot of attention for three reasons. First, it is desirable to provide high qual-
5.2 System Model and Its Properties 119
W1 = diag(+1 + 1 + 1 + 1 + 1 + 1 + 1 + 1)
and
W2 = diag(+1 − 1 + 1 − 1 + 1 − 1 + 1 − 1).
120 5 Precoded Multiuser (PMU)-OFDM System
Fig. 5.1. The block diagram of the proposed system [[135] IEEE].
c
M−1
M, i=j
wi [m + kM ]wj∗ [m + kM ] = , (5.2)
0, i=j
m=0
for all k with 0 ≤ k ≤ N − 1. After passing through the diagonal matrix, the
lth component of the orthogonally coded output vector zi is given by
At the third stage, each coded vector is passed through the N M -point unitary
inverse discrete Fourier transform (IDFT) matrix. Finally, at the fourth stage,
each transformed vector is converted from parallel to the serial and the cyclic
prefix (CP) of length ν = L − 1 is added, where L is the maximum multipath
length which includes delay spread.
As for the channel, we assume that the channel has tap delay line with
uniform delay, which is commonly used in both wired and wireless communi-
cations. PMU-OFDM system is suitable to be used in both wired and wireless
environments. For the wired environment, the channel path is the equivalent
channel equalized by the time-domain equalizer (TEQ) [27]. Moreover, the
crosstalk interference occurs in most wired applications can be regarded as an
MAI [28]. For convenience, we will let hi (n) be the channel path of user i, and
λi [l] be the lth element of N M -point DFT of hi (n), where 0 ≤ l ≤ N M − 1,
throughout the whole chapter.
5.2 System Model and Its Properties 121
At the receiver side, the receiver removes the CP and passes each block of
size N M through the unitary discrete Fourier transform (DFT) matrix. For
the detection of the symbols transmitted by the ith user, the DFT output
vector is multiplied by W∗i and then averaged. Let ŷi be the output of Wi∗
and x̂i be the averaged output. Then, the kth element of x̂i is given by
1
M−1
x̂i [k] = ŷi [m + kM ], 0 ≤ k ≤ N − 1. (5.4)
M m=0
1
M−1
x̂i [k] = ẑ[m + kM ]wi∗ [m + kM ], 0 ≤ k ≤ N − 1. (5.5)
M m=0
In the final stage, x̂i is passed through frequency equalization (FEQ) and
ready for detection. The operation of FEQ will be introduced in the following
section.
From Eqs. (5.3) and (5.6), the lth element of ŷj can be expressed as
T
ŷj [l] = λi [l]yi [l]wi [l]wj∗ [l] + e[l]wj∗ [l]. (5.7)
i=1
Let l = m + kM . From Eqs. (5.128) and (5.7), the kth element of x̂j is given
by
1
M−1
x̂j [k] = λj [m + kM ]yj [m + kM ]wj [m + kM ]wj∗ [m + kM ]
M m=0
1
T
M−1
+ λi [m + kM ]yi [m + kM ]wi [m + kM ]wj∗ [m + kM ]
M
i=1,i=j m=0
1
M−1
+ e[m + kM ]wj∗ [m + kM ], (5.8)
M m=0
where the first term is the desired signal, the second term is the MAI from
other users, and the third term is the additive noise. When N is sufficiently
122 5 Precoded Multiuser (PMU)-OFDM System
larger than the multipath length L, the coherent bandwidth is large, i.e.,
correlation between subchannels is large. In this case, the frequency response
for adjacent subchannels only varies a little. Therefore, we have the following
approximation
9i [k],
λi [m + kM ] ≈ λ 0 ≤ m ≤ M − 1, 0 ≤ k ≤ N − 1, (5.9)
M−1
9i [k] = 1
λ λi [m + kM ].
M m=0
M−1
9j [k]xj [k] 1
x̂j [k] ≈ λ wj [m + kM ]wj∗ [m + kM ]
M m=0
1
T
M−1
+ 9i [k]xi [k]
λ wi [m + kM ]wj∗ [m + kM ]
M m=0
i=1,i=j
1
M−1
+ e[m + kM ]wj∗ [m + kM ]
M m=0
M−1
9j [k]xj [k] + 1
=λ e[m + kM ]wj∗ [m + kM ]. (5.10)
M m=0
Observed from Eq. (5.10), the MAI is approximately zero. Hence, if there is
no channel noise, we can approximately reconstruct xi [k] by multiplying x̂i [k]
& '−1
by λ 9i [k] . Similar to OFDM systems, the one-tap gain multiplication is
what usually called frequency equalization (FEQ). Since the proposed system
is approximately MAI-free, its capacity increases as transmit power increases
in the SNR range that we are interested. This result is very different from that
of conventional MC-CDMA systems, in which increasing the transmit power
of one user will also increase the MAI for other users.
Although PMU-OFDM uses orthogonal codes to distinguish different
users, the approximate zero MAI property makes it significantly different from
conventional MC-CDMA systems in many aspects. Instead, it has more sim-
ilarities to OFDMA as explained below.
1. MAI-free. The PMU-OFDM system can achieve approximately MAI-free
when N is much larger than the multipath length L. That is, for a fixed
L, as N increases, the system will have less MAI. Hence, by increasing
N , PMU-OFDM can accommodate more users with negligible MAI. This
MAI-free property is similar to that of the OFDMA system, which is
MAI-free when frequency are well synchronized. Moreover, in an OFDMA
5.2 System Model and Its Properties 123
system, the block duration is in general much longer than the multipath
length. Such systems are usually used in WLAN or WMAN applications
[66]. On the other hand, CDMA or MC-CDMA systems are usually used
in the cellular phone system, where co-channel interference is the major
concern.
2. Detection. Due to MAI, sophisticated multiuser detection (MUD) may be
involved in MC-CDMA so that detection of individual symbols is depen-
dent [49]. In the PMU-OFDM and OFDMA system, there is no need of
using MUD, and detection of individual symbols is independent.
3. Loading. PMU-OFDM can achieve approximately MAI-free when N is
sufficiently large. Hence, by increasing N , the system can be fully loaded
with negligible MAI. Also the OFDMA system can be fully loaded with no
MAI. In contrast, the number of supportable users in MC-CDMA systems
is much less than the spreading factor M due to MAI [1, 48, 49].
4. Frequency equalization. As shown in Fig. 5.1, the PMU-OFDM system
performs “frequency equalization” [27] instead of “combining” before sym-
bol detection. This stands in contrast with MC-CDMA systems, where
“combining” is usually used before detection [1, 48, 49]. There are several
different combining methods such as MRC (maximum ratio combining),
EGC (equal gain combining) and ORC (orthogonality restoring combin-
ing) in MC-CDMA systems [49]. The combining techniques multiply every
spread chip by a weighted gain and then sum up M chips before detec-
tion. Hence, there are N M gain multiplications for MC-CDMA systems
[1, 48, 49]. On the other hand, form Eq. (5.128), the PMU-OFDM sys-
tem performs summation before the gain multiplication, i.e., frequency
equalization. Thus, it only needs N gain multiplications.
5. Hadamard-Walsh code in the uplink transmission. In the uplink transmis-
sion, it is difficult to guarantee that every user transmits his/her signal
simultaneously, i.e., there is a time offset between users. This will lead
to timing mismatch among users. If the Hadamard-Walsh code is used
in the uplink transmission in conventional CDMA systems, a small tim-
ing mismatch among users will result in great MAI even if the channel
is perfect. Therefore, Hadamard-Walsh code is usually used in downlink
transmission but seldom used in the uplink transmission unless the tim-
ing mismatch problem can be well resolved by some other mechanism. In
conventional CDMA or MC-CDMA systems, quasi-orthogonal codes that
have less cross correlation such as the Gold code or the Kasami code are
usually used to mitigate the timing mismatch problem. In contrast, since
the PMU-OFDM system is robust to timing mismatch [133], we can adopt
the low complexity Hadamard-Walsh code in the uplink transmission, i.e.,
letting D be the Hadamard matrix.
6. Frequency diversity. Although PMU-OFDM may lose the frequency di-
versity when compared with MC-CDMA, it can achieve the full loading
capacity while maintaining the MAI-free property. The diversity gain of
PMU-OFDM is close to that of OFDMA.
124 5 Precoded Multiuser (PMU)-OFDM System
L−1
hi (n)e−j N M nl .
2π
λi [l] = (5.11)
n=0
1 2 1 1 1
e−jθ = 1 − jθ − θ + j θ3 + θ4 − j θ5 − · · · ,
2! 3! 4! 5!
(: 2 ;
L−1
1 2π
−j 2π
λi [m + kM ] = hi (n)e 1− N kn mn + · · ·
n=0
2! N M
: 3 ;+
2π 1 2π
+j mn − mn + · · · . (5.13)
NM 3! N M
1
L−1
hi (n)e−j N kn φi,j (n),
2π
M AIj←i [k] ≈ xi [k] (5.15)
M n=0
where
( 2 1+ 0
M−1
1 2π 2π
φi,j (n) = − +j mn mn wi [m]wj∗ [m].
m=0
2! NMN M
# $
2
Now, we would like to evaluate E |M AIj←i [k]| . Let us assume the
transmitted symbol xi [k] and channel coefficients hi (n) are uncorrelated.
Fur-
thermore, E {xi [k]x∗i [k ]} = 0, for k = k . Let σx2i E |xi [k]|2 be the
averaged transmitted power. Assume that the channel coefficients
have the
same averaged power, which is defined as σh2 i = E |hi (n)|2 . It is worth to
emphasize that the equal power assumption for channel coefficients will lead
to a pessimistic MAI result. In practical situation, channel coefficients usually
have exponential decay. As a result, the actual MAI should be much smaller.
We will mention later how to extend the result with i.i.d. assumption to prac-
tical case. Now let us first introduce several lemmas and proposition to explain
the pessimistic result.
Lemma 5.1: When all M Hadamard-Walsh codewords# are used, the $maxi-
2
mum value of the MAI from user i to user j, maxi,j E |M AIj←i [k]| , can
be approximated by
: 2 L−1 2 L−1 ;
1 π2 1 1 π4 1
2 2
σxi σhi 1− 2
n + 4 1− 4
n , (5.16)
N2 4 M n=0
N 4 M n=0
and the maximum value occurs when wi [m] and wj [m] satisfy the following
condition
+1, 0 ≤ m ≤ M/2 − 1
wi [m]wj [m] = . (5.17)
−1, M/2 ≤ m ≤ M − 1
1 2 2
L−1
2
= σ σ |φi,j (n)| . (5.18)
M 2 xi hi n=0
# $
2
From Eq. (5.18), maximizing E |M AIj←i [k]| is equivalent to maximizing
|φi,j (n)|2 for all n. Thus, let us look at the term |φi,j (n)|2 . From Eq. (5.15),
φi,j (n) can be rearranged as
126 5 Precoded Multiuser (PMU)-OFDM System
where
2
M−1
1 2π
{φi,j (n)} = − n2 wi [m]wj [m]m2
2! NM m=0
and
2π
M−1
{φi,j (n)} = n wi [m]wj [m]m.
N M m=0
Since
2 2
|φi,j (n)|2 = | {φi,j (n)}| + | {φi,j (n)}| ,
maximizing |φi,j (n)|2 is equivalent to maximizing both M−1 w i [m]wj [m]m
m=0
M−1
and m=0 wi [m]wj [m]m2 . According to [65], the product of two arbitrary
codewords of M Hadamard-Walsh codes is again a codeword in M codewords,
i.e., wi [m]wj [m], 0 ≤ m ≤ M −1, is one of the codewords of the M Hadamard-
code. Since m and m are
Walsh 2
monotonically increasing
functions for m ≥
M−1 M−1 2
0, m=0 wi [m]wj [m]m and m=0 wi [m]wj [m]m are maximized if the
number of successive +1s and −1s of wi [m]wj [m] are maximized, which occurs
when wi [m] and wj [m] satisfy the condition in Eq. (5.17). Hence, we have
M−1 M−1
M/2−1
2 1 1
wi [m]wj [m]m = m2 − 2 m2 = M 3 1 − . (5.20)
4 M
m=0 m=0 m=0
M/2−1
M/2, i=j
wi [m]wj [m] = . (5.24)
0, i=j
m=0
Proof. From Eqs. (5.22) and (5.23), it is obvious that the product of any two
codewords from either symmetric or anti-symmetric codes is symmetric. That
is, wi [m]wj [m] is symmetric and satisfies wi [m]wj [m] = wi [M − 1 − m]wj [M −
1 − m], 0 ≤ m ≤ M/2 − 1. Since the product of any two codewords is again a
codeword [65], wi [m]wj [m] is a symmetric codeword in M Hadamard-Walsh
codes.
Now let us prove Eq. (5.24). The whole summation in Eq. (5.2) can be
divided into two terms, i.e.,
M−1
M/2−1
M−1
wi [m]wj [m] = wi [u]wj [u] + wi [v]wj [v]. (5.25)
m=0 u=0 v=M/2
According to Eq. (5.22) or Eq. (5.23), when only M/2 symmetric or anti-
symmetric codewords of M Hadamard-Walsh codes are used, the second sum-
mation term in Eq. (5.25) is given by
128 5 Precoded Multiuser (PMU)-OFDM System
M−1
M−1
wi [v]wj [v] = wi [M − 1 − v]wj [M − 1 − v]
v=M/2 v=M/2
0
= wi [v ]wj [v ]. (5.26)
v =M/2−1
From Eqs. (5.25) and (5.26), we prove the property in Eq. (5.24).
Lemma 5.3: Suppose that only M/2 symmetric or anti-symmetric codewords
of M Hadamard-Walsh codes are used. We have the following property
M−1
wi [m]wj [m]m = 0. (5.27)
m=0
M−1
Proof. m=0 wi [m]wj [m]m can be divided into two terms as
M−1
M/2−1
M−1
wi [m]wj [m]m = wi [u]wj [u]u + wi [v]wj [v]v. (5.28)
m=0 u=0 v=M/2
M−1
Let v = M − 1 − u and using either Eq. (5.22) or Eq. (5.23), m=0 wi [m]
wj [m]m can be manipulated as
M−1
M/2−1
wi [m]wj [m]m = wi [u]wj [u]u
m=0 u=0
0
+ wi [M − 1 − u]wj [M − 1 − u](M − 1 − u)
u=M/2−1
M/2−1
= (M − 1) wi [u]wj [u]
u=0
= 0. (5.29)
1
L−1 −1 2π
M−1 2
hi (n)e−j N kn
2π
M AIj←i [k] ≈ xi [k] mn wi [m]wj [m].
M n=0 m=0
2! N M
(5.30)
Hence, we have the following proposition.
Proposition 5.1: Suppose that only M/2 symmetric or anti-symmetric
#
codewords of M $Hadamard-Walsh codes are used. The maximum value of
E |M AIj←i [k]|2 can be approximated by
5.2 System Model and Its Properties 129
: ;
# $ 1 π4 4
L−1
2
max E |M AIj←i [k]| ≈ σx2i σh2 i n , (5.31)
i,j N 4 64 n=0
which occurs when wi [m] and wj [m] satisfy the following condition:
+1, 0 ≤ m ≤ M/4 − 1 or M/2 ≤ m ≤ 3M/4 − 1
wi [m]wj [m] = .
−1, M/4 ≤ m ≤ M/2 − 1 or 3M/4 ≤ m ≤ M − 1
(5.32)
Proof. According to Eq. (5.30), if the proposed code selection scheme is
used, the imaginary part of φi,j (n) in Eq. (5.19) disappears. Following
the# same argument $ in the proof of Lemma 5.1, we know that maximizing
2 M−1
E |M AIj←i [k]| is equivalent to maximizing m=0 wi [m]wj [m]m2 . Hence,
# $
2
the maximum E |M AIj←i [k]| occurs when the number of successive +1s
or −1s is maximized. Since wi [m]wj [m] is one of the symmetric codewords,
the last half M/2 elements can be obtained from the first M/2 elements. Also,
M/2−1
from Eq. (5.24), we know that m=0 wi [m]wj [m] = 0, for i = j. Hence, the
codeword product wi [m]wj [m] will have the largest number of successive +1’s
or −1’s if the condition in Eq. (5.32) is met. Given that the codeword product
wi [m]wj [m] satisfies Eq. (5.32), we have
M−1 M−1
3M/4−1
2 1 3
wi [m]wj [m]m = m −2
2
m2 = M . (5.33)
16
m=0 m=0 m=M/4
Based
# on Eqs. $ (5.19), (5.30) and (5.33), the maximum value of
E |M AIj←i [k]|2 can be approximated as that in Eq. (5.31).
As shown in Eq. (5.31), when only M/2# symmetric or$ anti-symmetric
2
codewords are used, the maximum value of E |M AIj←i [k]| decreases in an
order of O(N −4 ). As compared with Eq. (5.16) where the MAI term decreases
in an order of O(N −2 ), the use of the code design in Proposition 5.1 enables
the system to achieve MAI-free with a much faster rate as N increases. Let
us give an example to illustrate this point.
Example 5.1: MAI Decreasing Rate
In this example, we show that the theoretical result derived using the Taylor
approximation is close to the simulation result. Moreover, it is demonstrated
that the use of only M/2 symmetric or anti-symmetric codewords allows the
system to be MAI-free at a faster rate. For the theoretical result, Eqs. (5.16)
and (5.31) are used to obtain the maximum MAI power for fully- and half-
loaded systems, respectively. In the simulation, the Monte Carlo method and
the term M AIj←i [k] in Eq. (5.8) are used to run more than 2500 different
channel realizations. That is, the simulated MAI power is obtained by the
following average
130 5 Precoded Multiuser (PMU)-OFDM System
N −1
1 2
|M AIj←i [k]| ,
N
k=0
for more than 2500 channels. Let M = 16 and the modulation is BPSK, i.e.,
σx2i = 1. The multipath length L = 4 and the coefficients of the channel are
i.i.d. complex Gaussian random variables with an unit variance, i.e., σh2 i = 1.
Let us consider the maximum MAI power from user i to user j. The
maximum MAI occurs if wi [m]wj [m] satisfies Eq. (5.17) for the fully-loaded
case. If symmetric or anti-symmetric codewords are in use, it occurs when
wi [m]wj [m] satisfies Eq. (5.32). The maximum MAI power as a function of
N for theoretical and simulated results are shown in Fig. 5.2, where the MAI
power is obtained for N from 8 to 256 in theory while the simulated MAI power
is plotted for N = 8, 16, 32, 64, 128, and 256. We see from this figure, that
theoretical and simulation results are close to each other. This confirms the
assumption that the second order Taylor series expansion in Eq. (5.14) is good
enough for the MAI analysis in the proposed system. Moreover, we see that
the use of symmetric or anti-symmetric codewords enables the system to be
MAI-free at a faster rate than a fully-loaded system. This result corroborates
our derivation in Lemma 5.1 and Proposition 5.1.
Now, we would like to demonstrate that the maximum MAI power oc-
curs when wi [m] and wj [m] satisfies Eq. (5.17) for the fully-loaded case, and
satisfies Eq. (5.32) for the use of symmetric or anti-symmetric codewords.
0
Theoretical result: full codeword
Theoretical result: half code selection
−10 Simulation result: full codeword
Simulation result: half code selection
−20
[k] |2 } (dB)
−30
j← i
−40
Max E{ | MAI
−50
−60
−70
−80
0 50 100 150 200 250
N
Fig. 5.2. The maximum MAI power as a function of N for theoretical and simulated
results with L = 4.
5.2 System Model and Its Properties 131
For the fully loaded system, there are M = 16 possible combinations for
wi [m]wj [m] and this codeword product is again one of the original codeword.
Hence, we will simulate the MAI power for these 16 possible combinations of
wi [m]wj [m] (in Kronecker ordering [8]) and number them as #1 to #16. Note
that since #1 is the all-one code, it denotes the desired signal power instead
of MAI. The MAI power for the 16 possible combinations of wi [m]wj [m] are
shown in Fig. 5.3. Note that since wi [m]wj [m] is either symmetric or anti-
symmetric, we use squared and circled curves respectively, to identify them.
From the figure, we see that the maximum MAI power is the curve with
number #9, which is the same curve as the circled points in Fig. 5.2, since
the codeword #9 satisfies the condition in Eq. (5.17). This corroborates our
derivation.
Consider the use of symmetric or anti-symmetric code. With this code
design, the codeword product, wi [m]wj [m], is a symmetric codeword according
to Lemma 5.2. Hence, the MAI power for M/2 = 8 different combinations of
wi [m]wj [m] can be represented by the 8 squared curves in Eq. (5.3). From
the figure, we see that, with the code design, the maximum MAI power is
the curve with number #13, which is the same curve as the squared points in
Fig. 5.2. Note that codeword #13 satisfies the condition in Eq. (5.32), which
corroborates our theoretical derivation.
Fig. 5.3. The maximum MAI power as a function of N for symmetric and anti-
symmetric wi [m]wj [m] with L = 4.
132 5 Precoded Multiuser (PMU)-OFDM System
Now let us consider a more practical channel model, i.e., channel coeffi-
cients do not have the same averaged power. However, it is still reasonable to
assume that the channel coefficients are uncorrelated with E{hi (n)h∗i (n )} = 0
for n = n . Also, since the channel coefficient power may be different for dif-
ferent taps. Let us assume the averaged channel power of tap n be σh2 i (n). In
this case, Eq. (5.18) should be rewritten as
# $ 1
L−1
2 2
E |M AIj←i [k]| ≈ 2 σx2i σh2 i (n) |φi,j (n)| . (5.34)
M n=0
Since σh2 i (n) is a constant for a specific n, using similar derivation from
Eqs. (5.18)–(5.33),
# the $
maximum value of the MAI from user i to user j,
2
maxi,j E |M AIj←i [k]| , in Lemma 5.1 should be rewritten. It can be ap-
proximated by
: 2 L−1 2 L−1 ;
1 π2 1 1 π4 1
2
σxi 1− 2 2
σhi (n)n + 4 1− 2 4
σhi (n)n .
N2 4 M n=0
N 4 M n=0
(5.35)
Compared to Lemma 5.1, since σh2 i (n) usually has exponential decay, the
result in Eq. (5.35) leads to a much smaller MAI than that in Eq. (5.16) for
fully-loaded PMU-OFDM with Hadamard-Walsh
# $ code. Similarly, we should
2
rewrite the maximum value of E |M AIj←i [k]| in Proposition 5.1. It can
be approximated by
: ;
# $ 1 π4 2
L−1
2
max E |M AIj←i [k]| ≈ σxi 2 4
σ (n)n . (5.36)
i,j N 4 64 n=0 hi
Again, the result in Eq. (5.36) leads to a much smaller MAI than that in
Eq. (5.30) for half-loaded PMU-OFDM with Hadamard-Walsh code.
Corrupted
User j CP
Corrupted
User k CP
Corrupted
User i CP
n i nj nk n:Time index
whenever one user has a non-zero time offset, this user will cause not only
symbol distortion to himself/herself, but also MAI to all other users.
Referring to Fig. 5.4, let user j be the target user and thus nj is the
correct block extracting time for user j. Let user i has a time offset of τi =
ni − nj with respect to the jth user. Then, we say user i is timing advanced
if τi < 0 and is timing delayed if τi > 0. Since the MAI increases as |τi |
increases, we will consider the more sever case that |τi | is larger than ν. Later
we will show that the derivations also apply to the case |τi | ≤ ν. Without loss
of generality, suppose the receiver views ŝ(0), · · · , ŝ(M − 1) as one OFDM
block, where ŝ(n) is as depicted in Fig. 5.5. For presentational convenience,
we will add superscript (+) or (−) to denote, respectively, the data/channel
(+)
in the previous and next block. For instance, xi [k] is the kth symbol of
xi [k] in the previous block. Let the ν corrupted CP of the current block be
pi (0) · · · p9i (ν − 1)] and the received noise vector be ê. Referring to Fig. 5.5,
[9
the received vector, ŝ = Ti=1 p̂i + ê. For τi < 0, p̂i is given by
)
(−) (−)
pi (N M − |τi | + ν) · · · pi (N M − 1) p9i (0) · · · p9i (ν − 1)
pi (0) · · · pi (N M − 1 − |τi |)] , (5.37)
where
n
ν
(−)
p9i (n) = hi (m)si ((n−m)+N M −ν)+ hi (m)s(−) ((n−m)+N M ).
m=0 m=n+1
(5.38)
For τi > 0, p̂i is given by
)
(+) (+)
pi (τi ) · · · pi (N M − 1) p9i (0) · · · p9i (ν − 1)
*
(+) (+)
pi (0) · · · pi (τi − ν − 1) , (5.39)
where
(+)
n
(+) (+)
ν
p9i (n) = hi (m)si ((n−m)+N M −ν)+ hi (m)s((n−m)+N M ).
m=0 m=n+1
(5.40)
After DFT, the mixed signal from all the users are given by
T
ẑ[l] = ri [l] + e[l], 0 ≤ l ≤ N M − 1, (5.41)
i=1
where
N
M−1
1
ŝ(n)e−j N M nl ,
2π
ri [l] = √ (5.42)
N M n=0
and e[l] is the received noise after DFT. Now consider the symbol detection
for the jth user. From Eqs. (5.128) and (5.41), and let l = v + kM , where
0 ≤ v ≤ M −1, 0 ≤ k ≤ N −1, the kth element of x̂j under time asynchronism
is given by
1 1
M−1 T M−1
x̂j [k] = rj [v +kM ]wj∗ [v]+ M AIj←i [k]+ e[v +kM ]wj∗ [v],
M v=0 M v=0
i=1,i=j
(5.43)
where the first term comes from the jth user, and
1
M−1
M AIj←i [k] = ri [v + kM ]wj∗ [v]
M v=0
5.3 PMU-OFDM System in Time Offset Environment 135
(0)
where M AIj←i [k] is the MAI due to the current block of user i given by
1
M−1 N
M−1
1
pi (n − |τi |)e−j N M (k+vM)n
(0) 2π
M AIj←i [k] = √
M v=0 N M
n=|τ | i
(00) (01)
= M AIj←i [k] − M AIj←i [k], (5.45)
(00)
where M AIj←i [k] is given by
:N M−1 ;
1
M−1
1 −j N2π
√ pi ((n − |τi |)N M )e M (k+vM)n wj∗ [v],
M v=0 N M n=0
(01)
and M AIj←i [k] is given by
⎡ ⎤
|τi |−1
1 1 ⎣
M−1
pi ((n − |τi |)N M ) e−j N M (v+kM)n ⎦ wj∗ [v].
2π
√
M v=0 N M n=0
(1)
M AIj←i [k] is the MAI due to the previous block of the ith user given by
⎡ ⎤
|τi |−ν−1
1 1 ⎣
M−1
pi (n + N M − |τi | + ν)e−j N M (v+kM)n ⎦ wj∗ [v],
(−) 2π
√
M v=0 N M n=0
(5.46)
(2)
and M AIj←i [k] is the MAI due to the corrupted CP of user i given by
⎡ ⎤
|τi |−1
1 1 ⎣
M−1
p9i (n − |τi | + ν)e−j N M (v+kM)n ⎦ wj∗ [v]. (5.47)
2π
√
M v=0 N M
n=|τ |−ν i
136 5 Precoded Multiuser (PMU)-OFDM System
(1)
Note that when |τi | < ν, M AIj←i [k] as given in Eq. (5.46) is zero and
(2)
M AIj←i [k] in Eq. (5.47) will sum up terms only for n ≥ 0. When the timing
(0)
mismatch τi is significantly smaller than N M , M AIj←i [k] is the dominating
(1) (2)
MAI as compared with M AIj←i [k] and M AIj←i [k] since the current block
contributes N M − |τi | symbols. This number is greater than that from the
(00)
previous block or the corrupted CP. Moreover, when |τi | << N M , M AIj←i [k]
(01) (01)
is much greater than M AIj←i [k] since M AIj←i [k] is only a small fraction
(00)
of M AIj←i [k] according to Eq. (5.45). Hence, if we can greatly suppress
(00)
M AIj←i [k], the MAI due to time asynchronism can be greatly reduced. The
(00)
suppression of M AIj←i [k] is considered in the next section. Before moving to
next section, let us see an example as follows.
Example 5.2: Dominating MAI in Time Offset Environment
(0)
Here, we would like to show that M AIj←i [k] is the dominating MAI term
(1) (2)
over M AIj←i [k] and M AIj←i [k] for both τi < 0 and τi > 0. The simulation
was conducted with the following setting. We consider the performance in the
uplink direction, where each user may have a different time offset and channel
fading. The channel and the time offset are assumed to be quasi-invariant in
the sense that it remains unchanged in one block duration. Simulations are
conducted with the following parameter setting throughout this section. M =
16 and the BPSK modulation is used. For the PMU-OFDM, the Hadamard-
Walsh code is used. For every individual user, the Monte Carlo method is
used to run more than 500,000 symbols. We consider the worst time offset
situation. That is, except the target user who is assumed to have correct
timing, the time offsets of all the other users are randomly assigned to be
either +τ or −τ . All T users are the target user in turn. For instance, as
shown in Fig. 5.4, the correct timing for target user j is nj = 0. Other users
will have a time offset either +τ or −τ with respect to nj . Moreover, the CP
length ν = L−1 is added. In this situation, any non-zero timing mismatch will
(0)
lead to MAI. We will evaluate the averaged total MAI values of M AIj←i [k]
(1) (2)
and M AIj←i [k]+M AIj←i [k]. The averaged total MAI value of the dominating
MAI is obtained via averaging the value,
2
−1
1
T
1
N
T
M AIj←i [k] ,
(0)
T j=1 N
k=0 i=1,i=j
for more than 500,000 T symbols. That is, the total MAI per symbol of the
T individual users, for all T users. Similarly, the averaged total MAI value of
the non-dominating MAI is obtained via averaging the value,
2
N −1
1 1
T T
M AIj←i [k] + M AIj←i [k] ,
(1) (2)
T j=1 N
k=0 i=1,i=j
for more than 500,000 T symbols.
5.3 PMU-OFDM System in Time Offset Environment 137
−10
−20
Averaged total MAI power (dB)
−30
−40
−50
−60
N = 64: dominating MAI
N = 64: non−dominating MAI
−70 N = 128: dominating MAI
N = 128: non−dominating MAI
−80
0 5 10 15
τ: time offset
Fig. 5.6. The MAI effect is plotted as a function of the time offset when full M
Hadamard-Walsh codewords are used.
(5.48)
and from Eq. (5.45), and the time shift property of DFT [98], we have
1
M−1
xi [k]e−j N k|τi | λ[v + kM ]wi [v]wj [v]e−j N M v|τi | . (5.49)
(00) 2π 2π
M AIj←i [k] =
M v=0
(00) 1 9 2π
M−1
2π
M AIj←i [k] ≈ λi [k]xi [k]ej N kτi wi [v]wj [v]ej N M vτi . (5.50)
M v=0
Since the maximum value of v is M − 1, the term e−j2π/N Mv|τi | in Eq. (5.50)
is approximately 1 if N |τi |. This approximation becomes more accurate
as N increases. Since the value M−1 v=0 wi [v]wj [v] = 0 according to Eq. (5.2),
(00) (01)
M AIj←i [k] ≈ 0 for sufficiently large N . Now, consider M AIj←i [k]. From
Eq. (5.45), since pi ((n − |τi |)N M ) = pi (n + N M − |τi |) , for 0 ≤ n ≤ |τi | − 1,
(01)
M AIj←i [k] is given by
⎡ ⎤
|τi |−1
1 1 ⎣
M−1
pi (n + N M − |τi |) e−j N M (v+kM)n ⎦ wj∗ [v].
2π
√ (5.51)
M v=0 N M n=0
Using Eq. (5.48) and the approximation in Eq. (5.9), we can rewrite Eq. (5.51)
as
|τi |−1 N −1
1
(01)
M AIj←i [k] ≈ 9i [f ]ej 2π
xi [f ]λ N f (n−|τi |)−kn δ
(01)
2 i,j (τi ), (5.52)
N M n=0
f =0
M−1
where δi,j (τi ) = u=0,v=0 wi [u]wj [v]ej N M u(n−|τi |)−vn . For a fixed n, if N is
(01) 2π
sufficiently large, ej2π/N Mu(n−|τi |)−vn is approximately 1 for all possible com-
bination of u and v. For instance, if n = |τi | − 1, the maximum value of u(n −
|τi |)−vn is 0, i.e., when u = 0, v = 0, and the minimum value of u(n−|τi |)−vn
is −2(M − 1), i.e., when u = v = M − 1. Moreover, for Hadamard-Walsh
M−1 M−1 M−1
code is used, u=0,v=0 wi [u]wj [v] = u=0 wi [u] u=0 wj [v] = 0, for i = j.
(01) (01)
Hence, δi,j (τi ) in Eq. (5.52) is approximately zero and thus M AIj←i [k] ≈ 0.
(1)
Next, consider M AIj←i [k]. From Eqs. (5.46), (5.48) and the approximation
in Eq. (5.9),
5.3 PMU-OFDM System in Time Offset Environment 139
|τi |−ν−1 N −1
1
(1)
M AIj←i [k] ≈
(−)
xi 9(−) [f ]ej 2π
[f ]λ N f (n−|τi |+ν)−kn δ
(1)
i i,j (τi ),
NM2 n=0 f =0
(5.53)
M−1
M u(n−|τi |+ν)−vn . Using an argument
(1) j N2π
where δi,j (τi ) = w
u=0,v=0 i [u]wj [v]e
(01) (1)
similar to that for δi,j (τi ), we know that δi,j (τi ) is also approximately zero
(2)
for large N . Finally, consider M AIj←i [k]. From Eqs. (5.38), (5.47) and the
(2)
fact that si (n) is the N M -point IDFT of zi [l], M AIj←i [k] is given by
−1
:
1 N
ν−1 n
hi (m)ej N f (n−m−ν)−k(n+|τi |−ν) δi,j (τi )
2π (20)
2
x i [f ]
N M n=0 m=0
f =0
;
(−)
ν
(−) j 2π f (n−m)−k(n+|τ |−ν) (21)
+ xi [f ] hi (m)e N i
δi,j (τi ), , (5.54)
m=n+1
(20) (21)
where δi,j (τi ) and δi,j (τi ) are given by
M−1
wi [u]wj [v]ej N M u(n−m−ν)−v(n+|τi |−ν)
(20) 2π
δi,j (τi ) =
u=0,v=0
and
M−1
wi [u]wj [v]ej N M u(n−m)−v(n+|τi |−ν) .
(21) 2π
δi,j (τi ) =
u=0,v=0
(20) (21)
Similarly, δi,j (τi ) and δi,j (τi ) are also approximately zero for large N . Thus,
for sufficiently large N , PMU-OFDM can still be approximately MAI-free.
M−1
2π
φi,j (τi ) = wi [m]wj [m]ej N M mτi . (5.55)
m=0
If the code is properly designed such that φi,j (τi ) ≈ 0 for arbitrary combina-
tion of i and j, the dominating MAI can be made approximately zero. The
following derivation is similar to that in Section 5.2.2 except that now the MAI
140 5 Precoded Multiuser (PMU)-OFDM System
is due to time offset. Let us further manipulate φi,j (τi ) as follows. Express the
exponential term in Eq. (5.55) using the Taylor series representation, i.e.,
2 3
j N2π 2π 1 2π 1 2π
e M mτi =1+j mτi − mτi −j mτi + ··· .
NM 2! NM 3! NM
Since the maximum value of m is M −1, the maximum value of 2π/N M mτi <
2πτi /N . When τi N , we may use second order approximation of
e−j2π/N Mmτi , which leads to
: 2 ;
M−1
1 2π 2π
φi,j (τi ) ≈ wi [m]wj [m] 1 − mτi + j mτi
m=0
2! N M NM
: 2 ;
M−1
1 2π 2π
= wi [m]wj [m] − mτi + j mτi
m=0
2! N M NM
φ9i,j (τi ), (5.56)
M−1
where we have used m=0 wi [m]wj∗ [m] = 0, for i = j. From Eqs. (5.55) and
(5.56), we can rewrite Eq. (5.50) as
1 9
λi [k]xi [k]ej N kτi φ9i,j (τi ).
(00) 2π
M AIj←i [k] ≈ (5.57)
M
2 "
(00)
Now, we would like to evaluate E M AIj←i [k] , the averaged MAI power
from user i to user j. Let us assume the averaged transmitter power are the
same for all subchannels and E{xi [k]x∗i [k ]} = 0, for k = k . Also, assume the
averaged channel power are the same for different taps and E{hi [n]h∗i [n ]} = 0,
for n = n . Again, according to the same argument in Section 5.2.2, the equal
power assumption of channel coefficients will lead to a pessimistic result. Let
σx2i be the averaged transmitted power, and σh2 i be the averaged channel power
defined, respectively, by σx2i = E |xi [k]|2 and σh2 i = E |hi (n)|2 . Then, we
have the following lemma.
Lemma 5.4: When all the M Hadamard-Walsh codewords are used, i.e., fully
loaded case. The maximum "value of the MAI from user i to user j, denoted
2
(00)
by maxi,j E M AIj←i [k] , can be approximated by
: 2 ;
& τ '2 π 2 1
2 & ' 4
τi 4 π 1
i
σx2i σh2 i 1− + 1− , (5.58)
N 4 M N 4 M
and the maximum value occurs when wi [m] and wj [m] satisfy Eq. (5.17).
5.3 PMU-OFDM System in Time Offset Environment 141
L−1
9i [k] =
λ hi (n)e−j N nk ,
2π
n=0
2 "
(00)
E M AIj←i [k] can be approximated by
L−1
L−1
2
1
E {hi (n)h∗i (n )} e−j N k(n−n ) φ9i,j (τi )
2π
2
2
σxi
M n=0 n =0
L 2 2 9 2
= σ σ φi,j (τi ) . (5.59)
M 2 x i hi
2 "
(00)
From Eq. (5.59), maximizing E M AIj←i [k] is equivalent to maximizing
2
9
φi,j (τi ) . From Eq. (5.56), φ9i,j (τi ) can be rearranged as
# $ # $
φ9i,j (τi ) = φ9i,j (τi ) + j φ9i,j (τi ) , (5.60)
where
# $ 2 M−1
9 1 2π
φi,j (τi ) = − τi2 wi [m]wj [m]m2
2! N M m=0
and
: ;
# $ 2π
M−1
φ9i,j (τi ) = τi wi [m]wj [m]m .
N M m=0
Since
2 # $2 # $2
9
φi,j (τi ) = φ9i,j (τi ) + φ9i,j (τi ) ,
2
M−1
maximizing φ9i,j (τi ) is equivalent to maximizing both m=0 wi [m]wj [m]m
M−1
and m=0 wi [m]wj [m]m2 . According to [65], the product of two arbitrary
distinct Hadamard-Walsh is a non-all-one Hadamard-Walsh codeword. Note
that each of the non-all-one Hadamard-Walsh codeword has equal number
−1. Since m and m
2
of +1 and are monotonically increasing
functions for
M−1 M−1 2
m ≥ 0, m=0 wi [m]wj [m]m and m=0 wi [m]wj [m]m are maximized
142 5 Precoded Multiuser (PMU)-OFDM System
if wi [m]wj [m] are of the same sign for 0 ≤ m ≤ M/2 − 1. In this case,
we have
M−1
M−1 M/2−1
2 1 3 1
wi [m]wj [m]m = m2 − m2 = M 1− . (5.61)
4 M
m=0 m=M/2 m=0
M−1
M−1
M/2−1
1 2 1
wi [m]wj [m]m = m− m= M 1− . (5.62)
4 M
m=0 m=M/2 m=0
From Eqs. (5.59), (5.60), (5.61) and (5.62), we proved the approximation in
Eq. (5.58).
2 "
(00)
Observed from Eq. (5.58), the maximum value of E M AIj←i [k] de-
pends on two terms. One is proportional to 1/N 2 and the other is propor-
tional to 1/N 4 . When N grows, the term which is proportional to 1/N 2
will dominate
the performance. Hence, we may regard the maximum value
2 "
(00)
of E M AIj←i [k] decreases at a rate proportional to 1/N 2 . Note that
when all the M codewords are used, every target user will unavoidably
has interference from a certain user that attains the maximum given in
Eq. (5.16). For instance, let M = 16 and user i uses w1 and user j
uses w9 . Then, wi [k]wj [k] satisfies Eq. (5.17) and the dominating MAI oc-
curs. Now, if user i uses w2 and user j uses w10 , again wi [k]wj [k] satisfies
Eq. (5.17) and the dominating MAI occurs. Consider the overall MAI power
M 2 "
(00)
for user j, i.e., i=1,i=j E M AIj←i [k] . Since the maximum value of
2 " 2 "
(00) M (00)
E M AIj←i [k] is the dominating MAI of i=1,i=j E M AIj←i [k] ,
we may regard the overall MAI power decreases in an order of 1/N 2 .
Therefore, when all the M codewords are used and N is sufficiently large
(for the approximation in Eq. (5.9)), the overall MAI power of the
PMU-OFDM due to time asynchronism decreases in an order 1/N 2 . From
2
Eq. (5.16), the term proportional
# $ to 1/N dominates the performance, which
is contributed by φ9i,j (τi ) in Eq. (5.60). Hence, if we can constrain
# $
φ9i,j (τi ) = 0, the MAI due to time offset can be greatly reduced. This
goal can be achieved by properly selecting codewords from the Hadamard-
Walsh code.
5.3 PMU-OFDM System in Time Offset Environment 143
(00) 1 9 2π
−1 2π
M−1 2
M AIj←i [k] ≈ λi [k]xi [k]ej N kτi mτi wi [m]wj [m]. (5.63)
M m=0
2! N M
and this occurs when wi [m] and wj [m] satisfy Eq. (5.32).
Proof. According to Eq. (5.63), if the code selection mentioned in Propo-
sition 5.2 is used, the imaginary part of φi,j (n) in Eq. (5.60) disappears.
Following
the same argument in the proof of Lemma 5.4, we know that
2 "
(00) 2
E M AIj←i [k] is at its largest when the value M−1
m=0 wi [m]wj [m]m
M−1
M−1
3M/4−1
1 3
wi [m]wj [m]m2 = m2 − 2 m2 = M . (5.65)
m=0 m=0
16
m=M/4
2 "
(00)
From Eqs. (5.60), (5.63) and (5.65), the maximum value of E M AIj←i [k]
can be approximated as that in Eq. (5.64).
Observing from Eq. (5.64), we see that when
symmetric (anti-symmetric)
"
2
(00)
codewords are used, the maximum value of E M AIj←i [k] decreases in
an order of 1/N 4 for sufficiently large N . We can compare this result to fully
loaded case, in which MAI power decreases in an order of 1/N 2 . Thus, using
144 5 Precoded Multiuser (PMU)-OFDM System
10
Without approximation: fully-loaded
Without approximation: half-loaded
With approximation: fully-loaded
With approximation: half-loaded
0
−10
j←i
MaxE{|MAI(00) [k]|2}
−20
−30
−40
−50
50 100 150 200 250
N
2 "
(00)
Fig. 5.7. Term maxi,j E M AIj←i [k] with and without approximation as a
function of N for fully and half-loaded cases.
τi = 16. Now, if the system uses a more strick design parameter for time offset,
e.g., τi decreases from 16 to 8, to maintain the MAI power to be −34 dB in
this half-loaded situation, N can be decreased from 128 to 64. Therefore,
this result gives us an explicit way to determine N in a time asynchronous
environment.
Based on Proposition 5.2, it is easy to derive the following corollary.
Corollary 7.1: Suppose that only M/2 symmetric or anti-symmetric code-
words of M Hadamard-Walsh codes are used, for i = j, we have the following
properties:
M
−1
2
M−1
wi [u]wj∗ [v] = wi [u]wj∗ [v]
u=0,v=0 u= M M
2 ,v= 2
−1 M−1
M
−1
M
2
M−1
2
The code design procedure as stated in Proposition 5.2 also reduces the
(01) (1) (2)
three MAI terms, M AIj←i [k], M AIj←i [k], and M AIj←i [k] as well. This can
146 5 Precoded Multiuser (PMU)-OFDM System
about the MAI. Moreover, timing misalignment among individual users can
be compensated in the receiver end. For instance, the receiver can extract
individual users’ OFDM block at the corresponding correct timing for de-
tection. Note that even the timing misalignment for all the other users still
exist, this misalignment will only cause negligible MAI and will not degrade
the system bit error probability performance. Moreover, since the requirement
for accurate timing has been greatly relaxed, a much simpler synchronization
mechanism can be adopted for the transceiver.
These results stand in contrast to those of the OFDMA system, where
minor timing mismatch will cause significant MAI [97]. As mentioned in [142],
the timing asynchronism of OFDMA cannot be solved in the receiver end
alone and feedback mechanism is demanded. If some users somehow fail to
be well-synchronized, great performance degradation occurs and sophisticated
multiuser estimation, e.g., [88, 142], is needed to acquire time offset for the
users and this will cause extra complexity burden.
−10
−20
−30
Averaged total MAI power (dB)
−40
−50
−60
−70
First half codewords: dominating MAI
First half codewords: non-dominating MAI
−80
Anti-symmetric codewords: dominating MAI
Anti-symmetric codewords: non-dominating MAI
−90 Symmetric codewords: dominating MAI
Symmetric codewords: non-dominating MAI
−100
0 5 10 15
τ: time offset
Fig. 5.8. The MAI effect is plotted as a function of the time offset in a half-loaded
system for different code schemes with N = 64.
where the MAI reduction is 14–37 dB. This can be explained by the fact that,
when N increases, the approximation in Eq. (5.56) becomes more accurate.
Hence, better MAI suppression can be achieved.
Although the use of anti-symmetric codewords can lead to smaller non-
dominating MAI than symmetric codewords, the performance is actually
determined by the reduced dominating MAI. Hence, symmetric and anti-
symmetric codewords give rise to similar performance. Thus, in the following
discussion, we use symmetric codewords only to demonstrate the performance
of the proposed code scheme.
From the discussion in Section 5.2.1, we know that the PMU-OFDM sys-
tem has many characteristics similar to OFDMA. Thus, in the following two
examples, we compare the performance of PMU-OFDM and OFDMA under a
time asynchronous environment. Let the parameters remain the same as that
in Example 5.2. Every user in these two systems transmits N symbols and
the size of DFT/IDFT is the same, i.e., N M . Since the two systems transmit
N symbols per block and add the CP of the same length ν, their actual data
rates are the same. We consider both fully and half-loaded situations. For
the fully loaded OFDMA system, each user occupies N subchannels which
are maximally separated [114], i.e., user u is assigned subchannels indexed
by (u − 1) + kM , 1 ≤ u ≤ M , and 0 ≤ k ≤ N − 1. For the half-loaded
5.3 PMU-OFDM System in Time Offset Environment 149
−20
−30
−40
Averaged total MAI power (dB)
−50
−60
−70
−80
−90
Even indexed codewords: dominating MAI
Even indexed codewords: non-dominating MAI
−100
Anti−symmetric codewords: dominating MAI
Anti−symmetric codewords: non-dominating MAI
−110 Symmetric codewords: dominating MAI
Symmetric codewords: non-dominating MAI
−120
0 5 10 15
τ: time offset
Fig. 5.9. The MAI effect is plotted as a function of the time offset in a half-loaded
system for different code schemes with N = 128.
−10
−20
Averaged total MAI power (dB)
−30
−40
−50
−60
PMU–OFDM: fully-loaded
−70 OFDMA: fully-loaded
OFDMA: half-loaded
PMU-OFDM: half-loaded with even codewords
−80
0 5 10 15
τ: time offset
Fig. 5.10. The MAI performance comparison between PMU-OFDM and OFDMA
in a flat fading channel.
performance when there is no feedback in Fig. 5.11. For the comparison pur-
pose, we also show the curve of OFDMA without time offset as a benchmark.
We see that, in a serious timing mismatch environment such as specified in this
example, PMU-OFDM with the proposed code scheme can achieve compara-
ble performance as OFDMA without time offset. However, the performance
of OFDMA degrades significantly due to time asynchronism.
Example 5.6: Performance Comparison in a Multipath Environment
In this example, we examine the time asynchronous effect in a multipath
(or frequency-selective) fading channel. The number of multipaths, L, is set
to L = 4 while the other parameters remain the same as those given in
Example 5.5. The channel coefficients are i.i.d. complex Gaussian random
variables with an unit variance. The comparison of the MAI power for PMU-
OFDM and OFDMA is given in Fig. 5.12. In a fully loaded system, OFDMA
has less MAI than PMU-OFDM. However, in a half-loaded system, PMU-
OFDM outperforms OFDMA by around 13–25 dB due to the use of the pro-
posed code scheme. The lower MAI value of PMU-OFDM enables the system
to estimate time offset more accurately than OFDMA.
Figure 5.13 gives the BEP comparison between the two systems with
|τi | = 13 in a half-loaded system. We see that PMU-OFDM with the proposed
code design does not have a significant performance floor in the presence of
5.4 PMU-OFDM System in Frequency Offset Environment 151
10−2
Bit error probability
10−3
10 12 14 16 18 20 22 24 26 28 30
SNR: E /N
b 0
Fig. 5.11. The BEP performance comparison between PMU-OFDM and OFDMA
in a flat channel with time offset level |τj | = 13.
−10
Averaged total MAI power (dB)
−20
−30
−40
−60
0 5 10 15
τ: time offset
Fig. 5.12. The MAI comparison between PMU-OFDM and OFDMA in a frequency-
selective fading channel with L = 4.
In the PMU-OFDM system, the overall CFO effect consists of two parts. One
is the MAI caused by CFOs of other users. The other is the symbol distortion
and the inter carrier interference (ICI) due to the user’s own CFO. They will
be analyzed separately in this section.
Referring to Fig. 5.1, consider the lth element of the received vector after
DFT in a CFO environment, i.e.,
T
ẑ[l] = ri [l] + e[l], 0 ≤ l ≤ N M − 1, (5.69)
i=1
(0) (1)
ri [l] = ri [l] + ri [l], (5.70)
5.4 PMU-OFDM System in Frequency Offset Environment 153
10−2
PMU-OFDM: half-loaded with first M/2 codewords
OFDMA: half-loaded
PMU-OFDM: half-loaded with even codewords
Without time offset: OFDMA with half-loaded
Bit error probability
10−3
10−4
10 12 14 16 18 20 22 24 26 28 30
SNR: Eb/N0
Fig. 5.13. The BEP comparison between PMU-OFDM and OFDMA in a frequency-
selective channel with L = 4 and time offset level |τj | = 13.
where
(0)
ri [l] = αi λi [l]zi [l],
N
M−1
e−jπ N M
m−l
(1)
ri [l] = βi λi [m]zi [m] ,
m=0,m=l N M sin π(m−l+
NM
i)
sin πi N M −1 N M −1
αi = ejπi N M and βi = sin (πi )ejπi N M . (5.71)
N M sin NπMi
(0) (1)
ri [l] is the distorted symbol and ri [l] is the ICI caused by the CFO. Note
that when there is no CFO, ri [l] equals λi [l]zi [l] as defined in Eq. (5.6). From
Eqs. (5.128) and (5.69), we see that x̂j [k] under CFO is given by
154 5 Precoded Multiuser (PMU)-OFDM System
1
M−1
x̂j [k] = rj [v + kM ]wj∗ [v + kM ]
M v=0
sj [k]
T
1
M−1
+ ri [v + kM ]wj∗ [v + kM ]
M v=0
i=1,i=j
MAIj←i [k]
1
M−1
+ e[v + kM ]wj∗ [v + kM ], (5.72)
M v=0
where M AIj←i [k] is the interference due to user i. In the following, M AIj←i [k]
and sj [k] are considered separately.
Let us consider the MAI of the kth symbol of user j due to user i, i.e.,
M AIj←i [k] in Eq. (5.72). From Eqs. (5.70) and (5.72), we have
where
1 (0)
M−1
Aj←i [k] = r [v + kM ]wj∗ [v + kM ] (5.74)
M v=0 i
and
1 (1)
M−1
Bj←i [k] = r [v + kM ]wj∗ [v + kM ]. (5.75)
M v=0 i
Using Eqs. (5.1), (5.3) and the approximation in Eq. (5.9), we have
αi 9
M−1
Aj←i [k] ≈ λi [k]xi [k] wi [v + kM ]wj∗ [v + kM ]
M v=0
= 0. (5.76)
Therefore, the interference term Aj←i [k] is approximately zero. Thus, only
the term Bj←i [k] is of concern. The term Bj←i [k] can be rearranged as
βi
M−1 N
M−1
e−jπ
m−v−kM
NM
Bj←i [k] = λi [m]yi [m] wi [m]wj∗ [v].
M v=0
m=0,m=v+kM N M sin π(m−v−kM+
NM
i)
(5.77)
5.4 PMU-OFDM System in Frequency Offset Environment 155
We argue that the term of f = k is the dominating MAI in Eq. (5.79) below.
Since u = v + (k − f )M , we have
(
π(u − v + (k − f )M + ) π(−1+i )
min sin
i = sin N M , i > 0 .
NM sin π(1+ i)
NM , i < 0
u,v,k,f
βi 9
M−1
M−1
e−jπ N M
u−v
wi [u]wj∗ [v]
(0)
Bj←i [k] ≈ λi [k]xi [k] π(u−v+i )
(5.81)
M v=0 N M sin
u=0,u=v NM
156 5 Precoded Multiuser (PMU)-OFDM System
and
(1) (0)
Bj←i [k] = Bj←i [k] − Bj←i [k]. (5.82)
p
Referring to Eq. (5.81), let g(p) = e−jπ /N M sin −(M − 1) ≤
NM
π(p+i )
NM ,
p ≤ M − 1, p = 0. When N is sufficiently large, the denominator of g(p) is
approximately an odd function of p and the numerator is nearly constant for
all possible p with −M + 1 ≤ p ≤ M − 1, p = 0. Hence, we can approximate
g(p) as an odd function of p, i.e., g(p) ≈ −g(−p). Using the equality
M−1
M−1
g(u − v)wi [u]wj∗ [v]
v=0 u=0,u=v
( +
M−1
M−1−p
M−1−p
= g(p) wi [p + q]wj∗ [q] + g(−p) wi [q]wj∗ [p + q] ,
p=1 q=0 q=0
βi 9
M−1
M−1−p
wi [p + q]wj∗ [q] − wi [q]wj∗ [p + q] .
(0)
Bj←i [k] ≈ λi [k]xi [k] g(p)
M p=1 q=0
O
(5.83)
As given in Eq. (5.83), the quantity O is determined by the property of orthog-
onal codewords. If O = 0, the dominating MAI term of f = k in Eq. (5.79) is
approximately zero. One way to achieve this is the use of only M/2 of the M
Hadamard-Walsh codes, which are either symmetric or anti-symmetric.
Proposition 5.3: Suppose only the M/2 symmetric or the M/2 anti-
symmetric codewords of the M Hadamard-Walsh codes are used, O = 0 and
(0)
thus Bj←i [k] ≈ 0.
Proof. When symmetric codewords are used, from Eq. (5.22) and since
Hadamard-Walsh code is real, we have
M−1−p
M−1−p
wi [p + q]wj∗ [q] = wi [M − 1 − (p + q)]wj [M − 1 − q]. (5.84)
q=0 q=0
M−1−p
0
wi [p + q]wj∗ [q] = wi [q ]wj [p + q ]
q=0 q =M−1−p
M−1−p
= wi [q]wj∗ [p + q]. (5.85)
q=0
Thus, O in Eq. (5.83) is zero. As for the set of anti-symmetric codewords, from
Eq. (5.23), we have the same equality as given in Eq. (5.84) again. This leads
5.4 PMU-OFDM System in Frequency Offset Environment 157
N −1
M−1 u−v−(k−f )M
βi 9i [f ]xi [f ] e−jπ NM
wi [u]wj∗ [v].
(1)
Bj←i [k] ≈ λ π(u−v−(k−f )M+i )
M v=0,u=0 N M sin
f =0,f =k NM
(5.86)
(1)
Let l = f − k. For fixed k, −k ≤ l ≤ N − 1 − k and l = 0, Bj←i [k] in Eq. (5.86)
can be approximated by
−1−k
N
M−1
e−jπ
u−v+lM
βi 9i [k + l]xi [k + l]
NM
λ π(u−v+lM+i )
wi [u]wj∗ [v] . (5.87)
M v=0,u=0 N M sin
l=−k,l=0 NM
ζ
p
e−jπ N M
Let f (p, l) = π(p+lM +i ) , we have
N M sin NM
M−1
M−1
ζ = e−jπ N f (u − v, l)wi [u]wj∗ [v]
l
v=0 u=0
:
M−1
M−1−p
−jπ N
wi [p + q]wj∗ [q]
l
=e f (p, l)
p=1 q=0
;
M−1−p
+f (−p, l) wi [q]wj∗ [p + q] .
q=0
(5.88)
M−1
M−1−p
· [f (p, l) + f (−p, l)] wi [q]wj∗ [p + q]. (5.89)
p=1 q=0
158 5 Precoded Multiuser (PMU)-OFDM System
Assume that λ9i [k] and xi [k] are uncorrelated for all k, and xi [k] and xi [k ]
2 "
(1)
are uncorrelated for k = k . It can be shown that E Bj←i [k] can be
approximated by [135]
2
|βi |2 2 2
N −1 M−1
M−1−p
∗
σ σ [f (p, l) + f (−p, l)] wi [q]w [p + q] , (5.90)
M 2 λi xi j
p=1
l=1 q=0
where σλ2 i is the averaged channel gain, and σx2i is the averaged symbol power
of user i defined by
" # $
9 2 2
σλ2 i = E λ i [k] and σ 2
xi = E |xi [k]| , 0 ≤ k ≤ N − 1. (5.91)
Example 5.7: Assume σλ2 i = σx2i = 1. Let us first consider the CFO
case of i = 0.3. This CFO level may be regarded as a serious one. Let
M = 16 and N = 4. " Figure 5.14 shows the total residual MAI, i.e.,
T (1) 2
i=1,i=j E Bj←i [k] , as a function of the user index, where the sum-
mation term accounts for T = M/2 users in this system. As shown in
Fig. 5.14, the worst total residual MAI is about −18.5 dB, which is much
−18
symmetric codewords
anti-symmetric codewords
−20
[k]|2 } (dB)
−22
←i
E{|B i(1)
−24
≠j
−26
Σi=1,i
T
−28
−30
1 2 3 4 5 6 7 8
j: user index
2 "
T (1)
Fig. 5.14. Example 5.7: i=1,i=j E Bj←i [k] as a function of user index j with
M = 16 for symmetric and anti-symmetric codewords [[135] IEEE].
c
5.4 PMU-OFDM System in Frequency Offset Environment 159
−15
−20
E{|B(1) [k]|2}/ T (dB)
−25
j←i
j = 1 i = 1,i ≠ j
−30
ΣT ΣT
M=8
M = 16
M = 32
M = 64
−35
−40
0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5
ε: CFO
2 "
T T (1)
Fig. 5.15. Example 5.7: 1
T j=1 i=1,i=j E Bj←i [k] as a function of CFO for
different M [[135] IEEE].
c
(1)
smaller than the transmit power of 0 dB. Since the residual MAI Bj←i [k] is
relatively small, it will make channel estimation and CFO estimation much
more accurate. Let us consider theaveraged value
" of total residual MAI for
T T (1) 2
all users, i.e., T1 j=1 i=1,i=j E Bj←i [k] . Figure 5.15 shows the aver-
aged value of total residual MAI as a function of CFO for different M with
symmetric codewords. The performance with anti-symmetric codewords is
also similar to this figure. From Fig. 5.15, we see that, as M increases, the
averaged total residual MAI decreases. This result means that the increase
(1)
of M will help reduce Bj←i [k]. Note that since there are T = M/2 users
in this system, the increase of M will also increase the number of users. It
implies that the increase of users can help reduce the residual MAI for a
fixed CFO.
Although the codeword selection given in the Proposition 5.3 decreases the
number of users from M to M/2, it reduces the dominating MAI greatly and
the system is approximately MAI-free in the presence of CFOs. Thus, every
user only has to tackle his/her own CFO problem without worrying about
the CFOs of other users. This is very different from conventional multiaccess
OFDM systems, where sophisticated signal processing is used to solve the
multiuser CFO problem [6, 31, 88, 142].
160 5 Precoded Multiuser (PMU)-OFDM System
Fig. 5.16. Example 5.8: The MAI effect as a function of the CFO when the full M
Hadamard-Walsh codewords are used [[135] IEEE].
c
(0)
dominating MAI in Eq. (5.79). In the following, we call Bj←i [k] “dominating
(1)
MAI” and Bj←i [k] “residual MAI” for short.
Next, we demonstrate that the dominating MAI can be greatly reduced
using only M/2 symmetric codewords of the M Hadamard-Walsh codes. Let
the user number decreases from T = M = 16 to T = M/2 = 8 and only
the M/2 = 8 symmetric codewords are used. The performance is shown in
Fig. 5.17(a). Compared with Fig. 5.16, the residual MAI decreases around
4–5 dB due to the number of users decreasing from 16 to 8. In contrast, the
dominating MAI is greatly reduced by 12–47 dB. Note that, the simulation
result of the residual MAI is consistent with the theoretical result in Fig. 5.15.
Moreover, we see that using symmetric codewords, the dominating MAI is
even smaller than that of the residual MAI when the CFO is less than 0.35.
Figure 5.17(b) shows the performance using M/2 anti-symmetric code-
words. Compared with Fig. 5.17(a), we see that the performance of the set
of anti-symmetric codewords is similar to that of the set of symmetric code-
words. The result confirms that the dominating MAI can be greatly reduced
using the proposed code selection scheme.
Fig. 5.17. Example 5.8: The MAI effect as a function of the CFO (a) when only
M/2 symmetric Hadamard-Walsh codewords are used and (b) when only M/2 anti-
symmetric Hadamard-Walsh codewords are used [[135] IEEE].
c
5.4 PMU-OFDM System in Frequency Offset Environment 163
caused by his/her own CFO j . From Eqs. (5.70) and (5.72), we have
1 (0)
M−1
Cj [k] = r [v + kM ]wj∗ [v + kM ]
M v=0 j
αj
M−1
= λj [v + kM ]yj [v + kM ]wj [v + kM ]wj∗ [v + kM ]
M v=0
αj 9
M−1
≈ λj [k]xj [k] wj [v + kM ]wj∗ [v + kM ]
M v=0
9j [k]xj [k],
= αj λ (5.93)
1 (1)
M−1
Dj [k] = r [v + kM ]wj∗ [v + kM ]. (5.94)
M v=0 j
Using the same procedure of deriving Eqs. (5.75), (5.77), (5.78), and (5.79),
we have
N −1
βj 9
M−1 M−1
Dj [k] ≈ λj [f ]xj [f ]
M v=0
f =0 u=0,u=v+(k−f )M
−jπ u−v−(k−f )M
e NM
· π(u−v−(k−f )M+j )
wj [u]wj∗ [v]. (5.95)
N M sin NM
Using the same procedure of deriving Eqs. (5.81) and (5.83), the term of f = k
in Eq. (5.95), which is the interference caused by the kth symbol itself, can
be written as
βj 9
M−1
M−1−p
wj [p + q]wj∗ [q] − wj [q]wj∗ [p + q]
(0)
Dj [k] ≈ λj [k]xj [k] g(p)
M p=1 q=0
O
= 0, (5.96)
Next, consider the terms of f = k in Eq. (5.95), which is the ICI caused
by all other symbols except for the kth symbols. Using the same procedure of
deriving from Eqs. (5.86), (5.87), (5.88) and (5.89), we have
−1−k
N
βj 9j [k + l]xj [k + l]
e−jπ N λ
(1) l
Dj [k] ≈
M
l=0−k,l=0
M−1
M−1−p
· [f (p, l) + f (−p, l)] wj [q]wj∗ [p + q]. (5.97)
p=1 q=0
−5
symmetric codewords
anti-symmetric codewords
−10
−15
(dB)
[k]| }
2
−20
j←i
(1)
E{|D
−25
−30
−35
1 2 3 4 5 6 7 8
j: user index
2 "
(1)
Fig. 5.18. Example 5.9: E Dj←i [k] as a function of user index j with M = 16
for symmetric and anti-symmetric codewords [[135] IEEE].
c
−20
−25
−30
(dB)
E{|Dj [k]| }/T
−35
(1) 2
−40
j=1
T
Σ
−45 Anti-symmetric: M = 16
Anti-symmetric: M = 32
Anti-symmetric: M = 64
−50 Symmetric: M = 16
Symmetric: M = 32
Symmetric: M = 64
−55
0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5
ε: CFO
2 "
T (1)
i=1,i=j E Dj←i [k]
1
Fig. 5.19. Example 5.9: T
as a function of CFO for dif-
ferent M , where the all-one code is excluded for the set of symmetric codewords
[[135] IEEE].
c
166 5 Precoded Multiuser (PMU)-OFDM System
where the first term is the desired signal, the second term is the self-CFO
interference, the third term is the MAI from other users, and the fourth term
is the additive noise. Following the discussion in Sections 5.4.2 and 5.4.3,
impairments due to MAI and self-CFO interference (second term of Eq. (5.99))
are negligible if only M/2 symmetric or anti-symmetric codewords of the M
Hadamard-Walsh codes are used. The desired first term of Eq. (5.99) is much
larger than all other terms. Thus, we can estimate the self-CFO value j of each
user accurately with the algorithm for single user OFDM systems developed
in [87] and [118, 141]. Once j is estimated, we can multiply the lth received
−lj
symbols of user j by ej2π N M to remove the self-CFO effect, before passing
them through the DFT matrix. The penalty is that a separate DFT is needed
for each user.
In this case, sophisticated MUD techniques and the feedback mechanism
are not needed at the receiver end. On the other hand, if the MAI is not
reduced, the CFO estimation for each user could be difficult and MUD tech-
niques are needed, which imposes a heavy computational burden on the re-
ceiver. For example, CFOs of other users will cause the MAI to any target
user in OFDMA systems and signal processing techniques are often used to
estimate the CFO of this target user [6, 88, 142]. Furthermore, since OFDMA
does not have a negligible MAI-free property in the CFO environment, the
feedback mechanism is demanded after CFO estimation so that every user
can compensate his/her own CFO at the transmitter end [142].
In the following two examples, we would like to compare the CFO effect
on the proposed system, the OFDMA system, and two MC-CDMA systems
over a flat channel. Let the simulation parameters remain the same as that
in Example 5.8. Among the two MC-CDMA schemes, one is with subcarriers
uniformly allocated (called MC-CDMA/U for short) [48, 49] while the other
is with subcarriers successively allocated (called MC-CDMA/S for short) [1].
Every user in these four systems will transmit N symbols and the DFT/IDFT
size is the same, i.e., N M . Since all four systems transmit N symbols per block
and add the CP of the same length L, their actual data rates are the same.
We consider both fully-loaded and half-loaded situations. In a fully-loaded
situation, the Hadamard-Walsh code is used in the proposed PMU-OFDM
and the two MC-CDMA systems. For OFDMA, two MC-CDMA systems. For
OFDMA, each user occupies N subchannels which are maximally separated
[114], i.e., user u will be assigned subchannels indexed by (u − 1) + kM ,
5.4 PMU-OFDM System in Frequency Offset Environment 167
5
Proposed system, OFDMA
0 MC-CDMA/S
−5 MC-CDMA/U
Fully-loaded
−10
−15
OFDMA
MAI power (dB)
−20 MC-CDMA/U
−25
Proposed system,
−30 MC-CDMA/S
Fig. 5.20. Example 5.10: The MAI comparison among the proposed system, the
OFDMA system, and two MC-CDMA systems in a flat fading environment [[135]
IEEE].
c
168 5 Precoded Multiuser (PMU)-OFDM System
shows the averaged total MAI after equalization as a function of CFO for the
four systems in fully-loaded and half-loaded situations. Note that the perfor-
mance of the proposed system and the MC-CDMA/S are the same for the
flat channel so the two curves overlapped. In the fully-loaded case, the MC-
CDMA/U outperforms all other three systems. When the number of users
decreases from 16 to 8, the MAI of the proposed system is greatly reduced
by 15–16 dB and, consequently, the proposed system outperforms OFDMA by
10–11 dB. Recall that in Example 5.8, the dominating MAI of the proposed
system is larger than the residual MAI by around 10–11 dB in fully-loaded
situation. Using code selection, the dominating MAI is reduced to an amount
that is even smaller than the residual MAI. This explain why the proposed
system has similar performance with OFDMA in a fully-loaded situation while
it outperforms OFDMA by 10–11 dB in a half-loaded situation with code se-
lection.
The self-CFO impairment of the proposed system with symmetric code-
words is shown in Fig. 5.21. To compute the self-CFO impairment after fre-
quency equalization, we accumulate the symbol distortion and the interference
for the kth symbol of a target user due to his/her own CFO. This procedure
is repeated and, then, the impairment power is averaged for k, 0 ≤ k ≤ N − 1.
The self-CFO impairment of the 8 users in the proposed system are indicated
by the 8 solid curves in Fig. 5.21. Since the self-CFO impairment of an indi-
Fig. 5.21. Example 5.10: The self-CFO impairment of the proposed system [[135]
IEEE].
c
5.4 PMU-OFDM System in Frequency Offset Environment 169
vidual user is similar, these curves are overlapping. The bold-circled curve in
Fig. 5.21 is the averaged value of the 8 solid curves. By comparing this figure
with Fig. 5.20, we see that the self-CFO impairment is the main impairment
in the proposed system. Since the MAI is relatively small, we can estimate
αj or j accurately and then compensate the self-CFO effect as discussed in
Section 5.4.4. It is worthwhile to point out that, although not shown here, the
self-CFO impairment of OFDMA is very similar to that given in this figure.
Now, assume that each user has a normalized CFO of |j | = 0.1 and can
accurately estimate the self-CFO in these four systems. We would like to find
out the bit error probability when there is no feedback. The BEPs for the four
systems are shown in Fig. 5.22. For a fully-loaded situation, the BEP curves
of the proposed system and MC-CDMA/S are overlapping. Moreover, for a
half-loaded situation, the BEP curves of the proposed system, MC-CDMA/S,
and MC-CDMA/U are overlapping. We see that the BEP performance has a
similar trend as that of the MAI performance in Fig. 5.20.
Example 5.11: The CFO Effect in a Multipath Environment
In this example, we examine the CFO effect when the channel has the
multipath frequency-selective fading. The number of multipath is assumed
to be L = 4 and N =64 while the other parameters remain the same as
10−1
Fully-loaded
10−2
Bit error probability
10−3
Fully-loaded: OFDMA
Fully-loaded: MC-CDMA/U
Fully-loaded: MC-CDMA/S
Fully-loaded: proposed system
Half-loaded
Half-loaded: OFDMA
Half-loaded: MC-CDMA/U
Half-loaded: MC-CDMA/S
Half-loaded: proposed system
10−4
5 10 15 20 25 30
Eb/N0
Fig. 5.22. Example 5.10: The BEP comparison among the proposed system,
OFDMA and two MC-CDMA systems in a flat channel with a normalized CFO
|j | = 0.1 [[135] IEEE].
c
170 5 Precoded Multiuser (PMU)-OFDM System
10
−5
−10
MAI power (dB)
−15
−20
Fig. 5.23. Example 5.11: The MAI comparison among the proposed system, the
OFDMA system and two MC-CDMA systems in a multipath fading environment
[[135] IEEE].
c
those given in Example 5.10. The MAI performance of the four systems is
shown in Fig. 5.23. In a fully-loaded situation with the CFO smaller than
0.05, OFDMA has less MAI than the proposed system because OFDMA is
completely MAI-free when frequency and time are well synchronized. How-
ever, as CFO grows, the proposed system slightly outperforms OFDMA sys-
tem. In a half-loaded situation, the proposed system outperforms OFDMA
by around 10 dB due to the use of the code selection. The low MAI value
of the proposed system with code selection is also beneficial to CFO
estimation.
Let us see the comparison with MC-CDMA. The MAI performance curves
for the two MC-CDMA systems with ORC are not good, since ORC amplifies
the MAI power in the subcarrier with serious fading [49]. In a multipath
environment, it is likely that the frequency selective fading contains several
zeros to cause huge MAI in the two MC-CDMA systems. However, since a
large MAI value may only lead to the error of certain bits, MAI may not
be a good performance measure for this case. Instead, the BEP may provide
a more valuable measure for fair comparison. As MC-CDMA systems with
MRC outperforms those with ORC in a multipath environment, we will use
MRC for the two MC-CDMA systems in the MRC for the two MC-CDMA
systems in the following discussion.
5.4 PMU-OFDM System in Frequency Offset Environment 171
10−1
10−2
Bit error rate
10−3
OFDMA
MC-CDMA/U
MC-CDMA/S
proposed system
MC-CDMA/S without proposed code selection
10−4
0 5 10 15 20 25 30
Eb/N0
Fig. 5.24. Example 5.11: The BEP comparison among the proposed system,
OFDMA and two MC-CDMA systems with L = 4 and |j | = 0.1 in a half-loaded
situation [[135] IEEE].
c
Figure 5.24 shows the BEP comparison among the four systems with
|j | = 0.1 in a half-loaded situation. We see that MC-CDMA/S with the
proposed code selection outperforms OFDMA. Note that if the code selection
is not used in MC-CDMA/S, instead, e.g., the first M/2 codewords of the M
Hadamard-Walsh code are used, the performance as shown in the star curve is
much worse than that using code selection. This result shows the advantage of
using code selection in certain conventional MC-CDMA system. Furthermore,
although the half-loaded MC-CDMA/U has the worst performance in a multi-
path environment, this scheme can achieve a better frequency diversity order
and can perform better when the number of users is small [48]. Finally, we
observe that the proposed system with code selection outperforms OFDMA
and the two MC-CDMA systems in a half-loaded situation with multipath
fading.
of M Hadamard-Walsh code are used. That is, using this code scheme, the
dominating MAI due to CFO can be reduced to a negligible amount. Under
this situation, the system performance is determined by residual MAI. Since
the use of different Hadamard-Walsh codewords will cause different residual
MAI for individual users in a CFO environment. We can further improve
the performance using a code priority scheme. In this section, we extend the
result in the last section and propose a code priority scheme for PMU-OFDM
to improve the system performance in a CFO environment.
Following results in Section 5.4.2, it can be easily shown that
2
# $ |αi |2 2 2
L−1 M−1
2 ∗ −j N M vn
2π
E |Aj←i [k]| = σ σ wi [v]w [v]e , (5.100)
M 2 i i n=0 v=0
x h j
2 " |β |2
L−1
(0) i 2 2
E Bj←i [k] = 2
σ σ
x i hi
M n=0
2
M−1
e −jπ u−v
· M un ,
N M
∗ −j N2π
w
π(u−v+i ) i
[v]wj [v]e
v=0,u=0,u=v N M sin N M
(5.101)
and
2 " N −1 L−1
(1) |βi |2 2 2
E Bj←i [k] = σ σ
M 2 x i hi
f =0,f =k n=0
2
M−1
u−v−(k−f )M
e−jπ NM
∗ −j N2π
· wi [v]w [v]e M un
.
N M sin π(u−v−(k−f )M+i ) j
v=0,u=0 NM
(5.102)
It was shown in the last section that, if only M/2 symmetric or anti-symmetric
(0) (1)
codewords are used, Bj←i [k] can be reduced to be less than Bj←i [k]. In this
(1)
situation, Bj←i [k] will determine the system performance. Let us consider an
example below.
Example 5.12: MAI Suppression in a CFO Environment
(0) (1)
In this example, we evaluate Aj←i [k], Bj←i [k], and Bj←i [k]. Let σx2i =
2
σhi = 1, M = 16, and L = 4. First, let us consider the fully-loaded case.
T T # $
2
Figure 5.25 shows three MAI terms i.e., T1 j=1 i=1,i=j E |Aj←i [k]| ,
2 " 2 "
1 T T (0) 1 T T (1)
T j=1 i=1,i=j E Bj←i [k] , and T j=1 i=1,i=j E Bj←i [k] as
# $
functions of CFO for different N . We see that T1 Tj=1 Ti=1,i=j E |Aj←i [k]|2
5.4 PMU-OFDM System in Frequency Offset Environment 173
Fig. 5.25. The MAI terms are plotted as functions of CFO for the fully loaded case.
(1)
greatly reduced, which is even less than the residual MAI Bj←i [k]. That is,
the system performance is now determined by the residual MAI. From the
figure, the residual MAI is not affected by N so that increasing N will no
longer improve the performance.
–10
–20
–30
–40
–50
–60
–70
Fig. 5.26. The MAI terms are plotted as functions of CFO for the half-loaded case
with M/2 symmetric codes.
2
|βi |2 2 2
N −1 M−1
M−1−p
σ σ [f (p, l) + f (−p, l)] wi [q]wj [p + q] , (5.103)
M 2 λi xi
l=1 p=1 q=0
p
e−jπ N M
where f (p, l) = π(p+lM +i ) . It can be seen from Eq. (5.103) that the
N M sin NM
residual MAI is determined
by the cross-correlation of the assigned Hadamard-
∗
Walsh codewords, i.e., M−1−p
q=0 w i [q]wj [p + q].
M−1−p
M−1 M−1−p
M−1
wi [q]wj [p + q] = wi [p + q]wj [q] = 0, i = j. (5.104)
p=1 q=0 p=1 q=0
5.4 PMU-OFDM System in Frequency Offset Environment 175
M−1−p
M−1−p
wi [q]wj [p + q] = wi [p + q]wj [q], i = j. (5.105)
q=0 q=0
M−1
M−1 M−1−p
M−1
wi [u]wj [v] = {wi [q]wj [p + q] + wi [p + q]wj [q]} .
v=0 u=0,u=v p=1 q=0
(5.106)
For u = v, since
M−1
M−1−0
wi [v]wj [v] = {wi [q]wj [0 + q] + wi [0 + q]wj [q]} = 0,
v=0 q=0
we have
M−1
M−1 M−1−p
M−1
wi [u]wj [v] = {wi [q]wj [p + q] + wi [p + q]wj [q]} .
v=0 u=0 p=1 q=0
(5.107)
M−1 M−1 M−1 M−1
From Eq. (5.107), since v=0 u=0 wi [u]wj [v] = v=0 wj [v] u=0 wi [u]
= 0, we know that
M−1−p
M−1
{wi [q]wj [p + q] + wi [p + q]wj [q]} = 0. (5.108)
p=1 q=0
From Eqs. (5.105) and (5.108), we can draw a conclusion on Eq. (5.104).
From Eq. (5.104), if symmetric or anti-symmetric codewords are used, the
M−1−p
value q=0 wi [q]wj [p + q] for two given codewords wi [m] and wj [m] must
have positive and negative values so that the summation over all p is zero.
p
Since the maximum value of p is M − 1, if N is sufficiently large, e−jπ N M ≈ 1.
In this case, f (p, l) + f (−p, l) ≈ 1
π(p+lM +i ) +
1
π(−p+lM +i ) , which
N M sin NM N M sin NM
is a monotonically decreasing function of p. Thus, referring to Eq. (5.103),
a proper code priority is able to reduce the residual MAI when not all M/2
users
M−1−p are active. Intuitively, a “good” code priority here should be able to let
q=0 wi [q]wj [p+q] have the most zero values, or the fewest successive pos-
itive or negative values so that the absolute-and-squared term in Eq. (5.103)
can be efficiently cancelled out after summation for all p. For instance, let
M = 8 and symmetric codewords are used. Consider the code priority that
assigns the first two users the codewords
Table 5.1. The MAI of assigned codewords indexed by the zero-crossing numbers
for (a) M/2 symmetric codewords, (b) M/2 anti-symmetric codewords, for M = 16
(column 3) and M = 32 (column 5) [[134] IEEE].
c
No. of Code Code No. of Code Code
zero index φ j (8) index φ j (16) zero index φ j (8) index φj (16)
crossing (M = 16) (dB) (M = 32) (dB) crossing (M = 16) (dB) (M = 32) (dB)
0 1 –15.6 1 –14.6 1 9 –15.8 17 –14.9
2 13 –16.8 25 –15.8 3 5 –16.5 9 –15.5
4 7 –21 13 –19.4 5 15 –21.7 29 –19.9
6 11 –19.6 21 –18.3 7 3 –19.2 5 –17.9
8 4 –26.4 7 –23.8 9 12 –26.7 23 –24.0
10 16 –27.3 31 –24.4 11 8 –27.2 15 –24.3
12 6 –24.6 11 –22.4 13 14 –25.1 27 –22.7
14 10 –23.4 19 –21.5 15 2 –23.0 3 –21.2
16 4 –29.3 17 20 –29.4
18 28 –29.6 19 12 –29.6
20 16 –30.2 21 32 –30.2
22 24 –30.1 23 8 –30.1
24 6 –27.5 25 22 –27.6
26 30 –27.9 27 14 –27.9
28 10 –26.3 29 26 –26.6
30 18 –25.7 31 2 –25.4
2 "
(1)
Let us see the relationship of E Bj←i [k] and the number of crossings.
2 "
(1)
This is shown in Table 5.2. We see that E Bj←i [k] is symmetric in the
2 " 2 "
(1) (1)
sense that E Bj←i [k] = E Bi←j [k] . Note that if we sum up the
whole row or column, we get φi,j (T ) at the third column in Table 5.1(a).
We see from Table 5.2 that, for symmetric codewords, the one with 0 and 2
crossings will lead to the maximum total residual MAI. This result is a direct
consequence of Proposition 5.4.
Moreover, we see that different codewords will cause different levels of
MAI to other users. Thus, as shown in Table 5.1, different users will receive a
different total MAI level. From Table 5.1, we observe that, as M increases, the
new codewords, i.e., 8–14 crossings for symmetric codes and 9–15 crossings for
anti-symmetric codes, will cause less MAI than the previous codewords, i.e.,
0–6 crossings for symmetric codes and 1–7 crossings for anti-symmetric codes.
Hence, for a M/2-user system with M ≥ 8, the M/4 codewords with more
crossings should be assigned to the first M/4 active users. The M/4 codewords
178 5 Precoded Multiuser (PMU)-OFDM System
Table 5.2. E |M AIj←i [k]|2 (dB) is plotted as a function of codewords in terms
of crossing numbers [[134] IEEE].
c
0 2 4 6 8 10 12 14
crossing crossings crossings crossings crossings crossings crossings crossings
0
–18.5 –24.5 –22.4 –31.5 –33.2 –28.9 –27.1
crossing
2
–18.5 –27.3 –26.1 –33.2 –34.0 –31.2 –30.2
crossings
4
–24.5 –27.3 –29.6 –35.2 –35.7 –33.8 –33.2
crossings
6
–22.4 –26.1 –29.6 –34.8 –35.4 –33.2 –32.4
crossings
8
–31.5 –33.2 –35.2 –34.8 –39.2 –38.2 –37.7
crossings
10
–33.2 –34.0 –35.7 –35.4 –39.2 –38.3 –38.1
crossings
12
–28.9 –31.2 –33.8 –33.2 –38.0 –38.3 –36.3
crossings
14
–27.1 –30.2 –33.2 –32.4 –37.7 –38.1 –36.3
crossings
with fewer crossings will be further divided into two sets with M/8 codewords,
the M/8 codewords with more crossings have higher priority to be assigned
to users when the number of active users exceeds M/4. This procedure will
continue until the divided set only has one user.
Take M = 32 symmetric code for instance. As shown in Table 5.1, code-
words can be divided into the following five sets.
1. The first code set with 0–1 crossing (i.e., 0 for symmetric codes, and 1 for
anti-symmetric codes);
2. the second code set with 2–3 crossings;
3. the third code set with 4–7 crossings;
4. the fourth code set with 8–15 crossings; and
5. the fifth code set with 16–31 crossings.
When the index of the code set is higher, the caused MAI is smaller. Thus, we
should assign codewords from a higher indexed set to connected users with a
higher priority so that the overall performance is better as compared with a
random code assignment. Note that the above scheme is only a coarse code
priority. That is, in the same code set, codewords with more crossings does
not necessarily have a higher priority than codewords with fewer crossings.
Take the fifth code set for instance, the codeword with 20 crossings will cause
less MAI than the codeword with 30 crossings.
A
fine code
2 "
priority can be obtained off-line using the close form of
(1)
E Bj←i [k] in Eq. (5.102) to construct Tables 5.1 and 5.2. Based on
5.4 PMU-OFDM System in Frequency Offset Environment 179
these two tables, we can easily determine the fine code priority. For instance,
when M = 16 for symmetric codes, the fine code priority is
−5
−10
−15
−20
MAI power (dB)
−25
−30
# of zero-crossings: 0
−35
# of zero-crossings: 2
# of zero-crossings: 4
−40
# of zero-crossings: 6
# of zero-crossings: 8
−45
# of zero-crossings: 10
# of zero-crossings: 12
−50
# of zero-crossings: 14
−55
0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5
ε: CFO
2 "
T T (1)
Fig. 5.27. 1
T j=1 i=1,i=j E Bj←i [k] as a function of CFO for different
codewords [[134] IEEE].
c
180 5 Precoded Multiuser (PMU)-OFDM System
Fig. 5.28. MAI terms are plotted as functions of CFO for the quarterly loaded case
with code priority.
T T # 2 $
with Fig. 5.26, the two MAI terms, T1 j=1 i=1,i=j E Bj←i 0
[k] and
# $
1 T T B 1 [k]2 have been reduced simultaneously so that
T j=1 i=1,i=j E j←i
increasing N from 16 to 64 can further improve the system performance
in a CFO environment. This result is different from the half-loaded case in
Example 5.12.
−5
−10
−15
MAI power (dB)
−20
−25
−30
−35
OFDMA: half-loaded
−40
OFDMA: quaterly-loaded
PMU-OFDM: half-loaded
−45
PMU-OFDM: quaterly-loaded
−50
0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5
ε: CFO
Fig. 5.29. MAI comparison between PMU-OFDM and OFDMA in half- and
quarterly-loaded cases [[134] IEEE].
c
182 5 Precoded Multiuser (PMU)-OFDM System
Now, consider the bit error probability performance of both systems. Let
the CFO value be 0.2, which can be considered to be a serious CFO envi-
ronment. For instance, in a wireless broadband application [66, 88], let the
sampling frequency be 4 MHz and the carrier frequency be 4 GHz. Since there
are N M = 1024 subchannels, for CFO=0.2, it can be shown that the user
speed is around 211 km/h [108]. Note that it has also been verified that the
channel coherent time is around 542 μs (see Eq. (5.40.c) in [108]), which is
still greater than two times of one OFDM-block duration of 256 μs. Hence,
the assumption that the channel is quasi-statistic may still be valid in this
situation [108].
Figure 5.30 shows the BEP as a function of signal-to-noise ratio (SNR).
Comparing it with Fig. 5.29, we see that the BEP performance in Fig. 5.30
could be roughly evaluated by the MAI curves in Fig. 5.29. Take half-loaded
PMU-OFDM for instance, the performance floor occurs when SNR is around
15 dB. This is reasonable since we see from Fig. 5.29 that the MAI power is
around −18 dB at CFO=0.2. When SNR=18 dB for BPSK symbols, which
have 0 dB power, it means the noise power is around −18 dB. Hence, if we
include the MAI of −18 dB. The total power of noise plus interference is
10–1
OFDMA: half-loaded
OFDMA: quaterly-loaded
PMU-OFDM: half -loaded
PMU-OFDM: quaterly-loaded
10–2
Bit error probability
10–3
10–4
0 5 10 15 20 25 30
SNR: Eb/N0
Fig. 5.30. The BEP comparison between PMU-OFDM and OFDMA in half-loaded
and quarterly loaded cases (|j = 0.2|) [[134] IEEE].
c
5.4 PMU-OFDM System in Frequency Offset Environment 183
−15 dB. Hence, we see from Fig. 5.29 that the BEP of the half-loaded PMU-
OFDM at SNR=18 dB performs roughly the same as the quarterly loaded
PMU-OFDM at SNR=15 dB, where its MAI power is around −31 dB and
is sufficiently smaller than the noise power −15 dB. As SNR increases, the
noise will become less than −18 dB. However, the MAI remains −18 dB for
half-loaded PMU-OFDM if CFO is fixed at 0.2. In this case, the performance
floor will occur at SNR=18 dB. The same evaluation applies to the OFDMA
system. Furthermore, we see that quarterly loaded PMU-OFDM with code
priority makes the system more robust to this serious CFO environment. In
fact, due to the use of symmetric or anti-symmetric codes, half-loaded PMU-
OFDM outperforms quarterly loaded OFDMA.
Example 5.15: Codeword Assignment with Code Priority
Let the parameter setting remain the same as that in Example 5.14. First, we
evaluate the performance of different code priority schemes. The proposed fine
code priority is given
in Eq. (5.111), which is the code priority that results in
2 "
(1)
the minimum E Bj←i [k] according to Tables 5.1 and 5.2. Another code
priority used as a benchmark is given by
Priority Scheme for Comparision : w1 , w13 , w7 , w11 , w4 , w16 , w6 , w10 ,
which assigns codewords of crossings from the fewest to the most, i.e., from 0
to 14.
Figure 5.31 shows the MAI as a function of the number of active users T
for these two schemes. The dashed curves are for CFO=0.05 while the solid
curves are for CFO=0.2. We see that the proposed code priority greatly out-
performs the benchmark code priority. The benchmark scheme assigns the
first two users with the codewords having 0 and 2 crossings, which will cause
the most serious MAI in a CFO environment. Hence, we see that, as T in-
creases, the performance of the benchmark priority becomes slightly better.
Moreover, we see that the benchmark priority with CFO=0.05 performs even
worse than the proposed priority with CFO=0.2 when T < 5. These results
pronounce the fact that a good code priority design can further enhance the
system performance while a bad design may make the performance stay nearly
unchanged even if the number of users is decreased to 2.
In future communication systems, it is desirable that systems are robust
to different CFO levels. For instance, some users are in a fast mobile speed
so that they have large CFOs while some users are in a slow speed so that
they have small CFOs. In this case, code priority can be used in the following
way. That is, we assign codewords of higher priorities to users who have larger
CFOs and codewords with lower priorities to users who have # smaller CFOs.
$
2
Since the MAI effect is symmetric in the sense that E |M AIj←i [k]| =
# $
E |M AIi←j [k]|2 , if user i has the most serious CFO while it is assigned the
highest priority codeword, this codeword is most robust to CFO and it only
causes a small MAI to other users.
184 5 Precoded Multiuser (PMU)-OFDM System
−15
−20
−25
MAI power (dB)
−30
−35
−40
Fig. 5.31. MAI is plotted as a function of the number of active users for different
code priority schemes [[134] IEEE].
c
10–1
OFDMA
PMU-OFDM
10–2
Bit error probability
10–3
10–4
0 5 10 15 20 25 30
SNR: Eb/N0
Fig. 5.32. The BEP comparison between PMU-OFDM and OFDMA in an envi-
ronment with various CFOs [[134] IEEE].
c
where β(d) is the real envelope of the dth channel gain of the Rayleigh dis-
tribution, φd (n) is the phase of the dth multipath component of the uniform
distribution. The time-varying nature of the channel can be mathematically
modeled by treating h(τ ; n) as a wide-sense-stationary (WSS) random process
in n with autocorrelation
For most multipath channels, the attenuation and the phase shift associated
with different delays are assumed uncorrelated. This uncorrelated scattering
(US) leads to the following autocorrelation function [60, 105]
The above equation describes the autocorrelation function for the multi-
path channel under the wide sense stationary and uncorrelated scattering
assumptions. It is often known as the WSSUS model for the multipath fad-
ing channel. By applying the Fourier transform to autocorrelation function
R(τ, α) = E{h∗ (τ, n)h(τ, n + α)}, we can obtain the scattering function of the
channel as
∞
S(τ, f ) = F {R(τ, α)} = R(τ, α)e−j2πf α dα. (5.115)
−∞
Based on the above scattering function, we can derive the multipath intensity
profile (or the power-delay profile), which is defined as
It is the average received power expressed as a function of delay. The two most
common power-delay profiles are uniform and exponential. Every multipath
component has the same power in the uniform power-delay profile whereas
multipath components decay exponentially with delay in the exponential pro-
file.
Another useful function to characterize the time-varying nature of the
channel is the Doppler power spectrum, which can be derived from the scat-
tering function as ∞
SD (f ) = S(τ, f )dτ. (5.117)
−∞
θ between the motion direction of the mobile terminal and the direction of
arrival of scattered waves. Mathematically, fd can be written as
V
fd = fc cos θ, (5.118)
c
where fc is the carrier frequency, V is the velocity of the mobile terminal, and
c is the speed of light.
To model the Doppler phenomenon, it is often assumed that there are
many multipath components, each of which has a different delay but the same
Doppler spectrum (Fig. 5.33). Each multipath component is actually made up
of a large number of simultaneously arriving unresolvable multipath compo-
nents, having uniformly distributed angles of arrival at the receive antenna.
This channel model was suggested by Jakes. The classical Jakes’s Doppler
spectrum has the form [60]
1
SD (f ) = . , −fD ≤ f ≤ fD , (5.119)
1 − (f /fD )2
It turns out that we can factor the autocorrelation function as the product of
two one-variable functions of delay and time [105]
where σd2 is the variance of the dth tap and φ(n−m) is the time-autocorrelation
function. The Jakes model for the time-domain time-autocorrelation function
[60] can be written as
T L−1
r(n) = gi (n; d)si (n − d) + e(n), (5.126)
i=1 d=0
where e(n) is the discrete-time additive white Gaussian noise, gi (n; d) is the
channel complex coefficient of user i, and T is the number of multiple access
users. The output of DFT can be expressed as
N
M−1
r(n)e−j N M nl ,
2π
r[l] = 0 ≤ l ≤ N M − 1. (5.127)
n=0
1 1
M−1 T N M−1 L−1
x̂j [k] = wj [v + kM ] yi [Ω]wi [Ω] gi (n; d)
M v=0 N M i=1
n,Ω=0 d=0
# 2π $
· ej N M Ω(n−d) e−j N M n(v+kM) + ê[k],
2π
(5.128)
where
1
M−1
ê[k] = e[v + kM ]wj [v + kM ], (5.129)
M v=0
and
N
M−1
e(n) e−j N M n(v+kM) .
2π
e[v + kM ] = (5.130)
n=0
yi [Ω] = yi [u + f M ] = xi [f ], (5.131)
1
M−1 M−1
wi [u]wj [v] e−j N M (v−u)n e−j N M ud ,
2π 2π
ζi,j (n, d) = (5.132)
M v=0 u=0
190 5 Precoded Multiuser (PMU)-OFDM System
and using Eq. (5.131), we can express Eq. (5.128) in the following form
T N −1 N
M−1 L−1
1
gi (n; d)ζi,j (n, d) e−j N M (f M)d e−j N (k−f )n
2π 2π
x̂j [k] = xi [f ]
i=1 f =0
N M n=0
d=0
+ ê[k]. (5.133)
From the above equation, the MAI to the kth symbol of user j due to user
i, denoted by M AIj←i [k], is given by
N −1 N
M−1 L−1
1
M AIj←i [k] = xi [f ]
N M n=0
f =0 d=0
+
−j N2π −j 2π
· gi (n; d)ζi,j (n, d)e M (f M)d
e N (k−f )n
. (5.134)
# $
2
The averaged M AIj←i [k] power is E |M AIj←i [k]| . Let
where
1
M−1
wi [u]wj [v]e−j N M (v−u)n .
2π
ηi,j (n) = (5.135)
M u,v=0
We assume that xi [f ] and gi (n; d) are uncorrelated, and also cross correlation
between xi [f ] is zero; i.e., E {xi [f ]x∗i [f ]} = σx2i δ(f −f ). Then, by Eqs. (5.121)
and (5.122), the averaged power of M AIj←i [k] can be found as
# $ N −1 N M−1
σd σxi 2
2
E |M AIj←i [k]| = L( ) J0 (2πfD Ts (n − m))
NM
f =0 n,m=0
( +
∗
(m)e−j N (k−f )(n−m) .
2π
· ηi,j (n)ηi,j (5.136)
(0) (1)
M AIj←i [k] = M AIj←i [k] + M AIj←i [k]. (5.137)
(0)
M AIj←i [k] is obtained by letting f = k in Eq. (5.134) and is the inter-
ference contributed from the kth symbol of user i to the kth symbol of user
(1)
j. M AIj←i [k] is the interference contributed from all the f = kth symbols of
user i to the kth symbol of user j.
5.5 PMU-OFDM System in Time-Varying Channel Environment 191
(0)
From Eq. (5.136), the averaged power of M AIj←i [k] is given by
−15
−20
MAI from the kth symbol (f = k)
−25
−30
−35
MAI power (dB)
−40
−45
−50
(0)
−55 MAI
j
(0)
MAI
−60
MAI from all the other symbols (f ≠ k) (1)
MAI
j
−65
(1)
MAI
−70
1 2 3 4 5 6 7
−4
f T x 10
D s
Fig. 5.34. The dominating and the residual MAI curves as a function of the
normalized Doppler frequency [[125] IEEE].
c
192 5 Precoded Multiuser (PMU)-OFDM System
to change during one OFDM block, and they have the Rayleigh distribution
with an unit variance at the same path but different time indices.
The average dominating MAI for user j from all other users, denoted by
(0) (1)
M AI j and M AI j , respectively, are calculated as explained in Example 5.8.
The total MAI is plotted as a function of the maximum normalized
(0) (1)
Doppler frequency in Fig. 5.34, where M AI j and M AI j of all 16 users
are shown by 16 solid curves and 16 dashed curves, respectively. The solid
(0)
bold curve in Fig. 5.34, denoted by M AI , is the average value of 16 solid
T (0)
curves and obtained by T1 j=1 M AI j . Similarly, the dashed bold curve,
(1)
denoted by M AI , is the average value of 16 dashed curves and obtained by
1
T (0) (0)
T j=1 M AI j . We see from this figure that the average M AI is about
(1) (0) (1)
10 dB more than the average M AI . Thus, we can view M AI and M AI
as the dominating MAI and the residual MAI, respectively, as they are in CFO
environment.
Similar to the MAI caused by CFO, the dominating MAI due to the
Doppler spread can be reduced to a negligible amount if only M/2 symmetric
or anti-symmetric codewords of M Hadamard-Walsh codewords are used as
the following theorem will demonstrates.
Proposition 5.5: Suppose that only the M/2 symmetric or the M/2 anti-
symmetric codewords of M Hadamard-Walsh codewords are used. Then
(0)
M AIj←i [k] is approximately zero if the normalized Doppler frequency is less
than 1/(2πN M ).
M−1−p
Proof. From Lemma 5.5, M−1 p=1 q=0 wi [p + q]wj [q] = 0, i = j. Then,
we can rewrite Eq. (5.138) such that it includes this term. To do so, again we
can use the equality
M−1
M−1
M−1
α(u − v)wi [u]wj [v] =
u=0,u=v v=0 p=1
( +
M−1−p
M−1−p
α(p) wi [p + q]wj [q] + α(−p) wi [q]wj [p + q] , (5.139)
q=0 q=0
where α(.) can be any function. Note that if i = j in the above equation, we
have
M−1
M−1
M−1
M−1
α(u − v)wi [u]wj [v] = α(u − v)wi [u]wj [v]. (5.140)
u=0 v=0 u=0,u=v v=0
Let α(u − v) = e−j N M (v−u)n . Using the properties of symmetric and anti-
2π
symmetric codewords given in Eqs. (5.85) and by using Eqs. (5.139), (5.140),
ηi,j (n) can be rewritten as
5.5 PMU-OFDM System in Time-Varying Channel Environment 193
2
M−1 M−1−p
2π
ηi,j (n) = wi [p + q]wj [q] cos( pn), i = j. (5.141)
M p=1 q=0 NM
By substituting the above equation in Eq. (5.138) and making some rear-
(0)
rangement, we can obtain the averaged power of M AIj←i [k] as
2 " 2σd σxi 2
M−1 M−1−p
(0)
E M AIj←i [k] = L( ) wi [p + q]wj [q]
NM2 p=1 q=0
( M−1 M−1−r +
· wi [r + s]wj [s]ρ(p, r) , (5.142)
r=1 s=0
where
N
M−1
2π 2π
ρ(p, r) = J0 (2πfD Ts (n − m)) cos( pn) cos( rm). (5.143)
n,m=0
NM NM
0 ≤ n − m ≤ N M , we obtain
1
J0 (2πfD Ts (n − m)) 1 − π 2 (fD Ts )2 (n − m)2 , fD Ts < .
2πN M
(5.145)
Based on the above approximation, we can express ρ(p, r) in Eq. (5.142) as
N
M−1 N
M−1
2π 2π
ρ(p, r) cos( pn) cos( rm)
n=0 m=0
NM NM
N
M−1 N
M−1
2π 2π
− (πfD Ts )2 n2 cos( pn) cos( rm)
n=0
NM m=0
N M
N
M−1 N
M−1
2π 2π
− (πfD Ts )2 cos( pn) m2 cos( rm)
n=0
NM m=0
NM
N
M−1 N
M−1
2π 2π
+ 2(πfD Ts )2 n cos( pn) m cos( rm). (5.146)
n=0
NM m=0
N M
194 5 Precoded Multiuser (PMU)-OFDM System
1 z2
Fig. 5.35. Approximation of J0 (z) by 1 − 4
(1!)2
for z < 1 [[125] IEEE].
c
N M−1 N M−1
It can easily be shown that n=0 cos( N2πM pn) = m=0 cos( N2πM rm) = 0.
n−1
n sin( 2n−1 1 − cos(nx)
2 x)
k cos(kx) = − , x = 0. (5.147)
2 sin( x2 ) 4 sin2 ( x2 )
k=0
N
M−1 N
M−1
2π 2π
m cos( rm) = n cos( pn)
m=0
NM n=0
N M
N M sin( 2N M−1 2π
N M p) 1 − cos(2πp)
= 2
π −
2 sin( N M p) 4 sin2 ( NπM p)
N M sin(2πp − N M )
pπ
NM
= =− . (5.148)
2 sin( NpπM ) 2
NM 2
ρ(p, r) 2π 2 (fD Ts )2 ( ) ,
2
M−1−p
It was shown in Lemma 5.5 that M−1 p=1 q=0 wi [p + q]wj [q] = 0, if the
symmetric or anti-symmetric Hadamard-Walsh codewords are used. There-
fore, the dominating MAI is approximately reduced to
2 "
(0) 1
E M AIj←i [k] 0, if fD Ts < . (5.150)
2πN M
−40
−60
MAI power (dB)
−80 (0)
MAIj , symmetric codewords
(0)
MAI , symmetric codewords
(1)
−100 MAI , symmetric codewords
j
(1)
MAI , symmetric codewords
(0)
−120 MAIj , anti-symmetric codewords
(0)
MAI , anti-symmetric codewords
MAI(1), anti-symmetric codewords
−140 j
(1)
MAI , anti-symmetric codewords
1 2 3 4 5 6 7
fDTs −4
x 10
Fig. 5.36. The dominating and residual MAI versus the normalized Doppler fre-
quency when only M/2 symmetric or anti-symmetric Hadamard-Walsh codewords
are used [[125] IEEE].
c
N −1 N
M−1 L−1
1
gj (n; d)ζj,j (n, d)e−j N M (f M)d e−j N (k−f )n
2π 2π
x̂j [k] = xj [f ]
N M n=0
f =0 d=0
+ ê[k]. (5.151)
(0) (1)
x̂j [k] = xj [k]Hj [k] + ICIj [k] + ICIj [k] + ê[k], (5.152)
(0) (1)
where Hj [k], ICIj [k], and ICIj [k] are discussed below. The distortion
factor Hj [k], is obtained by putting f = k and u = v in ζj,j (n, d) in Eq. (5.151),
i.e.,
N 1 −j 2π (v+kM)d
M−1 L−1 M−1
1
Hj [k] = gj (n; d) e NM , (5.153)
N M n=0 M v=0
d=0
for 0 ≤ v ≤ M − 1 and 0 ≤ d ≤ L − 1.
(0)
The term ICIj [k] in Eq. (5.152) is the interference from subcarriers with
f = k and u = v to the desired subcarrier f = k; namely,
5.5 PMU-OFDM System in Time-Varying Channel Environment 197
N
M−1 L−1
(0) 1
ICIj [k] = xj [k] gj (n; d)
N M n=0
d=0
( +
−j N2π
· {ζj,j (n, d)|u=v }e M (kM)d , (5.154)
(1)
and ICIj [k] in Eq. (5.152) is the sum of all interferences from subcarriers
f = k, i.e.,
N −1 N
M−1 L−1
(1) 1
ICIj [k] = xj [f ] gj (n; d)
N M n=0
f =0,f =k d=0
( +
ζj,j (n, d)e−j N M (f M)d e−j N (k−f )n .
2π 2π
· (5.155)
(0)
The averaged power of ICIj [k] can be obtained in a manner similar to that
in deriving the MAI averaged power in Eq. (5.136) as
2 " σd σxj 2
N M−1
(0)
E ICIj [k] = L( ) J0 (2πfD Ts (n − m))
NM n,m=0
( +
∗
· {ηj,j (n)|u=v }{ηj,j (m)|u=v } . (5.156)
2
M−1 M−1−p
2π
ηj,j (n)|u=v = wj [p + q]wj [q] cos( pn). (5.157)
M p=1 q=0 NM
By substituting the above equation in Eq. (5.156) and using the approximate
formula Eq. (5.145) for the Bessel function and Eq. (5.148), we have
2 " πfD Ts σd σxj 2
M−1 M−1−p
(0)
E ICIj [k] 2L( ) wj [p + q]wj [q]
M p=1 q=0
( M−1 M−1−r
$
· wj [r + s]wj [s] . (5.158)
r=1 s=0
M−1−p
M−1 1
M−1
wj [p + q]wj [q] = wj [u]wj [v]
p=1 q=0
2
u,v=0,u=v
1 1 2
M−1 M−1 M−1
= wj [u] wj [v] − w [u].
2 u=0 v=0
2 u=0 j
M−1
Since u=0 wj [u] is equal to M for the all-one codeword and is 0 for all other
codewords, we have
M−1−p
M−1
M (M − 1)/2, all − onecode,
wj [p + q]wj [q] = (5.159)
−M/2, otherwise.
p=1 q=0
(1)
As compared with the averaged power of ICIj [k], the averaged power of
(0)
ICIj [k] is negligible for all codewords for practical values of N and L. This
can be clearly explained by the following example.
Example 5.19: Doppler ICI
Let us consider an example. Let N = 64, L = 4, M = 16. The maximum
Doppler frequency was chosen to be 10−4 , which
corresponds to the user speed
2 "
(0)
of 54 km/h. Also, σd = σxj = 1. Then, E ICIj [k]
2 2
−40.5 dB for the
2 "
(0)
all-one codeword, and E ICIj [k] −64 dB for other codewords.
5.5 PMU-OFDM System in Time-Varying Channel Environment 199
Using Eq.
(5.160) and the same set of parameters, we can compute the
2 "
(1)
value of E ICIj [k] to be about −10 dB for the user with the all-
one codeword dB, and between −25 dB and −50 dB for all other users.
2 "
(1)
Clearly, E ICIj [k] is much larger than the corresponding values of
2 "
(0) (1)
E ICIj [k] . Since ICIj [k] is the dominant ICI, we only need to con-
(0)
sider this ICI effect and ignore ICIj [k].
Figure 5.37 shows the average ICI power for each individual Hadamard-
Walsh codeword used in PMU-OFDM. For the kth symbol of the target user,
we accumulate the ICI from all other symbols f = k of the same user. The
(1)
average ICI power is then averaged for 0 ≤ k ≤ N − 1; namely, ICI j =
1 N −1 2
(1)
N k=0 ICIj [k] .
We see that different users experience a different amount of ICI. Espe-
cially, the user that employs the all-one codeword suffers more ICI than all
others by 15–40 dB. Intuitively, if a codeword has more sign changes, the main
lobes of interfering subcarriers may cancel each other so that the ICI power is
−10
−15
anti-symmetric codewords
−20 symmetric codewords
−25
ICI power (dB)
−30
−35
−40
−45
−50
1 2 3 4 5 6 7 8
user index
Fig. 5.37. The ICI (1) power as a function of user index for symmetric and anti-
symmetric codewords with fD Ts = 1 × 10−4 [[125] IEEE].
c
200 5 Precoded Multiuser (PMU)-OFDM System
(
2 "
N −1
(1) σd σxj 2
E ICIj [k] = L( )
NM
f =0,f =k
N
M−1
:
J0 (2πfD Ts (n − m)) e−j
2π
N (k−f )(n−m)
n,m=0
2 2
M−1 M−1
2π 2π
+ rj,j [p] cos( pn) + rj,j [p] cos( pm)
M p=1 NM M p=1 NM
M−1 2 ;+
4
2π 2π
+ rj,j [p] cos( pn) cos( pm) .
M 2 p=1 NM NM
Define
N
M−1
2π
ne−j N (k−f )n cos(
2π
β(p, k − f ) = pn),
n=0
NM
and
N
M−1
ne−j N (k−f )n .
2π
γ(k − f ) =
n=0
Since
N
M−1 N
M−1
2π
e−j N (k−f )n = e−j N (k−f )n cos(
2π 2π
pn) = 0,
n=0 n=0
NM
5.5 PMU-OFDM System in Time-Varying Channel Environment 201
for p = 1, 2, ...M − 1, and k − f = −2N, ..., −1, 1, ...2N , and by using the
approximate formula Eq. (5.145), we can express the average ICI power for
1
0 < fD Ts < 2πN M by
(
2 " N −1
π(fD Ts )σd σxi 2
(1)
E ICIj [k] 2L( ) |γ(k − f )|2
NM
f =0,f =k
4
M−1
+ {γ ∗ (k − f ) rj,j [p]β(p, k − f )}
M p=1
2 +
4
M−1
+ 2 rj,j [p]β(p, k − f ) , (5.161)
M p=1
where {.} denotes the real part. It was proven in [125] that the real part of
β(p, k − f ) is equal to −N M/2. Based on this result, we can rewrite the ICI
averaged power as
(
2 " π(fD Ts )σd σxi 2
N −1
(1)
E ICIj [k] 2L( ) |γ(k − f )|2
NM
f =0,f =k
( : ;+
4
M−1
∗
+ γ (k − f ) ø + rj,j [p]{β(p, k − f )}
M p=1
2 +
4
M−1
+ 2 ø + rj,j [p]{β(p, k − f )} , (5.162)
M p=1
where {.} is the imaginary part and ø can be obtained by Eq. (5.159) as
⎧
⎨ −(M−1)M N , all-one codeword,
2
4
ø=
⎩ M2N
4 , otherwise.
The quantity, rj,j [p] M−1−pq=0 wj [p + q]wj [q], 1 ≤ p ≤ M − 1 will appear
again. rj,j [p] can be interpreted as the autocorrelation of codeword j. Since
{β(p, k − f )} is a monotonically decreasing or increasing function of p for
given k − f as shown in [125], we can characterize the ICI values qualitatively
by rj,j [p] based on Eq. (5.162).
If rj,j [p], 1 ≤ p ≤ M − 1, has a sufficient number of sign changes, the
M−1
term p=1 rj,j [p]{β(p, k − f ) in Eq. (5.162) is likely to be cancelled out
after the summation over all p, which leads to a smaller ICI value. Since
M−1−p
rj,j [p] = q=0 wj [p + q]wj [q], for 1 ≤ p ≤ M − 1, there is a relation
between the number of sign changes in the codewords and the number of sign
changes in r[p].
Let us consider an example for codewords of size M = 8.
202 5 Precoded Multiuser (PMU)-OFDM System
With the above observation, we can adopt the following rule of thumb for
codeword selection in a PMU-OFDM system: “To give a higher priority to
codewords that have a higher number of sign-changes”. This result is similar
to PMU-OFDM in the presence of a pure CFO environment [134].
Example 5.19: Code Priority for ICI in Doppler Environment
In this example, we corroborate the code priority analysis given above for
ICI power of PMU-OFDM system in Doppler environment via computer
simulation.
The ICI power for 16 codewords is shown in Table 5.3, where the cor-
responding number of sign changes is also provided. System parameters are
chosen to be N = 64, M = 16, and L = 4. The maximum normalized Doppler
frequency and the SNR value were fixed at 10−4 and 30 dB, respectively.
We see that as a general trend, codewords with more sign changes have
less ICI. This observation verifies the theoretical result stated above.
Example 5.20: Performance Comparison of PMU-OFDM to
OFDMA in Doppler Environment
Here, we compare the performance of the PMU-OFDM and the OFDMA
systems via computer simulations. For fair comparison, we keep the size of
IDFT/DFT of both systems the same, i.e., N M , and consider both fully
loaded and half-loaded situations. To simulate the half-loaded PMU-OFDM
system, the set of anti-symmetric (or symmetric) Hadamard-Walsh codewords
is used. The subchannel for a fully loaded and half-loaded OFDMA systems,
are assigned in the same manner as Examples 5.10 and 5.11 for the half-loaded
OFDMA.
Table 5.3. The ICI averaged power in dB for 16 users [[125] IEEE].
c
# sign changes 0 2 4 6 8 10 12 14
ICI of symmetric −10.6 −32.5 −40.2 −38.4 −49.4 −49.9 −46.9 −45.8
codewords (dB)
# sign changes 1 3 5 7 9 11 13 15
ICI of anti-symmetric −24.8 −30.5 −40.5 −37.1 −49.6 −49.8 −47.2 −45.0
codewords (dB)
5.5 PMU-OFDM System in Time-Varying Channel Environment 203
Fig. 5.38. Comparison of the MAI power and the ICI power as a function of the
normalized Doppler frequency [[125] IEEE].
c
First, let us see how the MAI and ICI of half-loaded PMU-OFDM com-
pares with that of OFDMA as functions of the normalized Doppler frequency.
Let N = 64, M = 16, and L = 4. The ICI power and the MAI power for
OFDMA and PMU-OFDM are depicted versus maximum normalized Doppler
frequency as in Fig. 5.38. The average ICI power is the averaged value of eight
multiple access users (i.e., T = 8). The first observation is that the second
largest amount of interference is the ICI of PMU-OFDM with only symmet-
ric codewords. The reason should be obvious from our previous discussion in
Section 5.5.5. That is, the all-one codeword in the set of symmetric codewords
has a high ICI value as compared to the ICI or the MAI of all other users.
On the other hand, the ICI value of PMU-OFDM with the set of anti-
symmetric Hadamard-Walsh codewords is about 4 dB more than that of
OFDMA. The inferior ICI performance of PMU-OFDM compared to that
of OFDMA is explained by noting the subcarriers allocation we adopted for
OFDMA. That is, subcarriers allocated to a particular user in OFDMA are
spread uniformly across the available bandwidth. Hence, ICI results in less
impairment in OFDMA than in a single-user OFDM.
However, for OFDMA, the MAI power is significantly higher than that
of PMU-OFDM. As shown in Fig. 5.38, we observe that the MAI value of
204 5 Precoded Multiuser (PMU)-OFDM System
100
Fully-loaded PMU-OFDM
Fully-loaded OFDMA
Half-loaded OFDMA
10−1 Half-loaded PMU-OFDM with even codes
Half-loaded PMU-OFDM with odd codes
PMU-OFDM with even codes, without all-one code
Bit error probability
10−2
10−3
10−4
Fig. 5.39. The BEP comparison for PMU-OFDM and OFDMA as a function of
the normalized Doppler frequency [[125] IEEE].
c
5.5 PMU-OFDM System in Time-Varying Channel Environment 205
N
M−1 L−1
1
gj (n; d)e−j N kd .
2π
Hj [k] (5.163)
N M n=0
d=0
That is, for every time index n and any user j, we take the DFT of channel
coefficient gj (n; d) over path d with frequency index k. The result is then
206 5 Precoded Multiuser (PMU)-OFDM System
10−2
10−3
Bit error probability
OFDMA
PMU-OFDM
10−4
10−5
2 4 6 8 10 12 14 16
Number of users
Fig. 5.40. The BEP performance comparison as a function of the user number
for PMU-OFDM and OFDMA, where the codeword priority scheme is adopted for
PMU-OFDM [[125] IEEE].
c
L−1
gjavg (d)e−j N kd ,
2π
Hj [k] (5.164)
d=0
M−1
where gjavg (d) = N1M N n=0 gj (n; d) is the average of the dth channel tap
over one OFDM block. Therefore, Hj [k] represents the DFT of gjavg (d). Often,
subcarriers are much longer than the channel length and Hj [k] can be com-
puted from Eq. (5.153) or (5.153).
In Example 5.19, we ideally mitigated the symbol distortion effect in the
receiver using a frequency domain equalizer whose one tap gain for user j is
set to (Hj [k])−1 . In practice, we must obtain and estimate (Hj [k])−1 .
To this end, channels estimation for time-varying channel must be pre-
formed. When the channel is time-varying within an OFDM block, the
preamble-based training method may not work well. Periodic insertion of
training symbols during transmission of every block has been suggested for
OFDM in time-varying channels. It was shown in [93] that the best set of
5.5 PMU-OFDM System in Time-Varying Channel Environment 207
frequency domain pilot tones are those which are equally spaced. We adopt
this technique to estimate the fast fading channel. Let P be the number of
equally spaced pilot tones at subchannels Λ[k] = k × N/P , for 0 ≤ k ≤ P − 1.
An estimate of Hj [k] can be obtained at pilot tones via
P −1
1 j2πdk
ĝjavg (d) = Ĥj [Λ[k]]e P . (5.166)
P
k=0
100
Fully-loaded PMU-OFDM
Fully-loaded OFDMA
Half-loaded OFDMA with channel estimation (ch. est.)
Half-loaded OFDMA
Half-loaded PMU-OFDM with even codes
10–1
Half-loaded PMU-OFDM with odd codes and ch. est .
Half-loaded PMU-OFDM with odd codes
Bit error probability
10–2
10–3
10–4
5 10 15 20 25 30
E /N
b 0
Fig. 5.41. The BEP comparison for PMU-OFDM and OFDMA as a function of
the SNR value [[125] IEEE].
c
208 5 Precoded Multiuser (PMU)-OFDM System
6.1 Introduction
Multicarrier CDMA (MC-CDMA) has been proposed as a promising
multiaccess technique. MC-CDMA systems can be divided into two types [49].
For the first type, one symbol is transmitted per time slot. The input symbol
is spread into several chips, which are then allocated to different subchannels.
The number of subchannels is equal to the number of chips [26, 155]. For the
second type, a vector of symbols is formed via the serial-to-parallel conversion,
and each symbol is spread into several chips. The chips corresponding to the
same symbol are allocated to the same subchannel [67], which is often called
MC-DS CDMA. When compared with conventional CDMA systems, MC-
CDMA can combat inter-symbol-interference (ISI) more effectively. Moreover,
the frequency diversity gain can be fully exploited if the maximum ratio comb-
ing (MRC) technique [49, 109] is used at the receiver in MC-CDMA systems.
Despite the above advantages, the performance of MC-CDMA systems is still
limited by MAI in a multipath environment. Even though MAI can be reduced
by MUD [144] and other signal processing [49] techniques, the diversity gain
provided by multipath channels could be sacrificed since the received chips
are no longer optimally combined under MRC. Furthermore, channel status
information is needed for MRC and MUD. In a multiuser environment, mul-
tiuser channel estimation is more complicated and its accuracy degrades as the
number of users increases, which will in turn degrade the system performance.
In this chapter, we approach the MAI reduction problem for MC-CDMA
systems from another angle. That is, we investigate a novel way to select a
set of “good” spreading codes so as to completely eliminate the MAI effect
while keeping the transceiver structure simple and the computational bur-
den low. Code design based on Hadamard-Walsh code is proposed to achieve
the MAI-free property in a synchronous MC-CDMA system [26, 155]. More
specifically, let N and L denote, respectively, the spreading factor and the
multipath length. The N = 2ns Hadamard-Walsh codewords are partitioned
judiciously into G subsets, where G = 2ng with ns > ng ≥ 1 and G ≥ L.
Then we can obtain an MAI-free system and each user can fully exploit the
diversity gain provided by the multipath channel using any subset of code-
words in frequency-selective channels. The number of supportable MAI-free
users in each codeword subset is N/G. We also show a procedure to estimate
the channel information for individual users under an MAI-free environment.
Moreover, we consider the performance of the proposed Hadamard-Walsh code
based scheme in a carrier frequency offset (CFO) environment. It is shown
that this code scheme can reduce the CFO-induced MAI effect to a negli-
gible amount under an interested CFO level. Some Hadamard-Walsh code-
words can even achieve MAI-free in a CFO environment. Finally, based on
the theoretical requirements for MAI-free MC-CDMA, we propose a subset of
Hadamard-Walsh codes that are completely MAI-free even in the presence of
CFO. We show that, by partitioning those codewords into subsets, codewords
in some particular subsets will be MAI-free in a CFO environment and the
number of supportable MAI-free users with HW codes is 1 + log2 (N/G).
where wi [k] is the kth element of the ith orthogonal code. Note that we con-
sider the short code scenario here, where the spreading code for a target
user is the same for any time slot. After spreading, yi is passed through the
N × N IDFT matrix. Then, the output is parallel-to-serial (P/S) converted
and the cyclic prefix (CP) of length L−1 is added to combat the inter-symbol-
interference (ISI), where L is the considered maximum delay spread.
y [ 0]
DFT
At the receiver side, the receiver removes CP and passes each block of size
N through the N × N DFT matrix. Since there are T users, the kth element
of the DFT output ŷ can be written as [10, 27]
T −1
ŷ[k] = λj [k]yj [k] + e[k], (6.2)
j=0
where λj [k] is the kth component of the N -point DFT of user j’s channel
impulse response, and e[k] is the received noise after DFT. Based on ŷ, we will
detect symbols for T users. As shown in Fig. 6.1, to detect symbols transmitted
by the ith user, ŷ is multiplied by wi∗ [k] and frequency gain λ∗i [k]. The channel
information hj (n) or λj [k] of every user is assumed to be known to the receiver.
The estimation of channel information under an MAI-free environment will
be described in Section 6.2.2. After being multiplied with the frequency gains,
N chips are summed up to form reconstructed symbol x̂i . Using Eqs. (6.1)
and (6.2), x̂i is given by
N −1
T −1
N −1
N −1
x̂i = xi |λi [k]|2 + xj λ∗i [k]wi∗ [k]λj [k]wj [k] + λ∗i [k]wi∗ [k]e[k],
k=0 j=0,j =i k=0 k=0
multipath effect MAIi←j
(6.3)
where M AIi←j denotes the MAI from user j to user i. Note that, when the
channel noise e[k] is AWGN, the process from ŷ[k] to x̂i is called the maximum
ratio combining (MRC) technique [49], which ensures the minimum bit error
probability for detected symbols [108], or the maximum achievable diversity
gain provided by multipath channels [105].
For any target user i, if M AIi←j = 0, the reconstructed symbol x̂i will
be affected only by his/her own transmitted symbols xi and the correspond-
ing channel response λi [k]. Thus, this allows the system to use some simple
detection schemes without involving multiuser detection. When the channel
has flat fading, λi [k] and λj [k] are independent of k and M AIi←j = 0 if
orthogonal codes such as the Hadamard-Walsh codes are used. However, in
practical situations, the channel environment is usually frequency-selective
and the orthogonality of orthogonal codes will be lost under MRC.
The system model can also be used in downlink transmission, where the
signal for every user experiences the same fading. In this situation, MAI-free
can be achieved using ORC [49], i.e., the combining gain is λ−1 [k] instead
of λ∗ [k] in Eq. (6.3) (the subscript disappears since every user experiences
the same channel in downlink transmission). However, for subchannels with
serious fading, ORC tends to amplify the noise in these subchannels. Thus,
the performance will degrade dramatically. That is, the use of ORC may lead
to the loss of the diversity gain from multipath channels. In the following
sections, we will design wi [k] such that M AIi←j = 0 under the multipath
212 6 MAI-Free MC-CDMA System
Let F be the N × N DFT matrix with the element at the kth row and the nth
column given by [F]k,n = √1N e−j N kn and the maximum length of channel
2π
where
t
hi = (hi (0) hi (1) · · · hi (L − 1)) ,
I
F0 = F L ,
0 N ×L
and
Wi = diag(wi [0] · · · wi [N − 1]).
To have zero MAI for a frequency-selective fading channel, we need to have
M AIi←j = 0 for all nonzero hi and hj . This means that Ai,j in Eq. (6.4)
should be the L × L zero matrix for all i = j. Define Ri,j = Wi∗ Wj , where
Ri,j is diagonal, i.e.,
with
ri,j [k] = wi∗ [k]wj [k].
We can rewrite Ai,j as
IL
Ai,j = IL 0 F† Ri,j F , (6.5)
0
Bi,j
Since Ri,j is diagonal, it is well known that Bi,j is a circulant matrix [47].
t
That is, the first column of Bi,j , (bi,j (0) · · · bi,j (N − 1)) , is the N -point IDFT
of ri,j , where ri,j = (ri,j [0] · · · ri,j [N − 1])t . Matrix Ai,j is an L × L upper left
submatrix of Bi,j , i.e.,
⎛ ⎞
bi,j (0) bi,j (N − 1) . . . bi,j (N − L + 1)
⎜ .. ⎟
⎜ bi,j (1) bi,j (0) . ⎟
Ai,j = ⎜⎜ ⎟. (6.6)
.. . ⎟
⎝ . . . ⎠
bi,j (L − 1) ... bi,j (0)
6.2 System Model and Its Properties 213
Lemma 6.1: Suppose the channel length is L and the spreading gain is N .
To achieve MAI-free property, N should be greater or equal to 2L.
Proof: From Eq. (6.7), there should be at least 2L − 1 elements for the
codewords. However, if N = 2L − 1, all elements of the codewords are zeros.
Therefore, N ≥ 2L.
Note that Lemma 6.1 holds for both real and complex code design. In what
follows, we show how to achieve the MAI-free conditions in Eq. (6.7) using the
Hadamard-Walsh codes. Before proceeding, let us recall a well known property
of the Hadamard matrix [8] as follows.
An N × N Hadamard matrix HN with N = 2p , p = 1, 2, · · · , can be
recursively defined using the Hadamard matrix of order 2, i.e.,
HN/2 HN/2
HN = H2 ⊗ HN/2 = , (6.8)
HN/2 −HN/2
Our proposed code scheme is stated below. Suppose N = 2ns and G = 2ng ,
where both ns and ng are integers, and ns > ng ≥ 1. The columns of an N ×N
Hadamard matrix HN form the N Hadamard-Walsh codes. We divide the N
codewords into G subsets. Each subset # has N/G codewords. That $ is, the gth
subset, denoted by Gg , has codewords w N g , · · · , w N (g+1)−1 , where wi is
G G
the ith column of HN and 0 ≤ g ≤ G − 1. For instance, let N = 8 and G = 2.
Then, G0 contains codewords {w0 , w1 , w2 , w3 } and G1 contains codewords
{w4 , w5 , w6 , w7 }.
Lemma 6.2: Let ri,j be an N × 1 vector with the kth element be ri,j [k] =
wi∗ [k]wj [k]. For wi and wj that belong to the same subset, ri,j is equal to one
of the codewords in G0 excluding codeword w0 .
Proof: Let us first prove that for wi and wj ∈ G0 , ri,j is again a codeword
within G0 . According to Eq. (6.8), the N/G×N/G upper left submatrix of HN
is a N/G × N/G Hadamard matrix. Thus, the product of any two columns
of this submatrix is again a column of this submatrix (see [65]). Since the
codewords in subset 0 are the first N/G columns of HN , which is obtained
214 6 MAI-Free MC-CDMA System
We see from Eq. (6.9) that the product of any two columns in the last half
N/2 columns is equal to that of the two corresponding columns in the first
half N/2 columns, i.e.,
Suppose that we divide the N codewords into two sets, denoted by S0 and
S1 , respectively. The first N/2 half codewords form S0 while the last N/2 half
codewords form S1 . Hence, as proved in the beginning of the lemma that for
wi and wj in S0 , ri,j is again a codeword in S0 . For wi and wj in S1 , ri,j is
equal to a codeword in S0 based on Eq. (6.10). Using a similar procedure, we
can divide S0 into 2 sets, S00 and S01 . Thus, for wi and wj in S00 , ri,j is a
codeword in S00 . Now, we prove that for wi and wj in S01 , ri,j is a codeword
in S00 . From Eq. (6.8), for 0 ≤ i ≤ N/4 − 1, we have the following property
wi [k] = wi+N/4 [k], 0 ≤ k ≤ N/4 − 1 or N/2 ≤ k ≤ 3N/4 − 1,
wi [k] = −wi+N/4 [k], N/4 ≤ k ≤ N/2 − 1 or 3N/4 ≤ k ≤ N − 1.
(6.11)
We see from Eq. (6.11) that the product of any two columns in the second
quarter is equal to the product of the two corresponding columns in the first
quarter, i.e.,
From Eq. (6.14), for wi and wj in S01 , ri,j is again a codeword in S00 . Sim-
ilarly, we can divide S1 into two sets, i.e. S10 and S11 , and show that for
wi and wj in either S10 or S11 , ri,j is again a codeword in S00 . Using the
same procedure, we can continue to divide the codewords until we have G
subsets, and show that for wi and wj in the same subset, ri,j is a codeword of
subset 0.
Lemma 6.3: Let w̃i (n), 0 ≤ n ≤ N − 1 and 1 ≤ i ≤ N/G − 1 be the N -point
IDFT of the codewords in G0 excluding w0 . Then, w̃i (n) has the following
property:
w̃i (n) = 0, 0 ≤ n ≤ G − 1,
(6.13)
w̃i (N − n) = 0, 1 ≤ n ≤ G − 1.
6.2 System Model and Its Properties 215
N −1
Proof: For n = 0, it is easy to see w̃i (0) = k=0 wi [k] = 0 since there are
an equal number of +1 and −1 for any codeword except w0 . For n = 0, since
w̃i (n) is the IDFT of the codewords in G0 , we have
N −1
1 2π
w̃i (n) = wi [k]ej N mn . (6.14)
N m=0
Since codewords wi [k] in G0 are the first N/G columns of HN , they are formed
by repeating the upper left N/G × N/G submatrix of HN by G times. Hence,
wi [k] = wi [k + gN/G], 0 ≤ k ≤ N/G − 1, 0 ≤ g ≤ G − 1. We can rewrite
Eq. (6.15) as
1
N/G−1
w̃i (n) = wi [k]an , (6.16)
N
k=0
where
(
G−1
G, n = cG with c = 0, ±1, ±2, · · · ,
j 2π
G gn
an = e =
g=0
0, otherwise.
Therefore, we obtain
(
N/G−1
G
N k=0 wi [k], n = cG with c = 0, ±1, ±2, · · · ,
w̃i (n) = (6.17)
0, otherwise.
From Eq. (6.17) and w̃i (0) = 0, we are led to Eq. (6.13).
From Eq. (6.13) and Lemma 6.2, we have the following property
bi,j (n) = 0, 0 ≤ n ≤ G − 1,
(6.18)
bi,j (N − n) = 0, 1 ≤ n ≤ G − 1,
where bi,j (n) denotes the nth element of the IDFT of ri,j within the same
subset.
Magnitude
10
5
0
16 16
14 14
12 12
10 10
8 8
Fig. 6.2. |w̃i (n)| as a function of user index i and time index n with N = 16 [[136]
IEEE]
c [[136] IEEE].
c
codewords. From Lemma 6.3, for wi and wj in the same subset, ri,j is equal
to w1 . From the figure, the first eight elements of w̃1 (n) are zeros. If G = 4,
then we have four subsets and each subset has four codewords. Again from
Lemma 6.3, for wi and wj in the same subset, ri,j is equal to either w1 , w2 ,
or w3 . From the figure, the first four elements of w̃1 (n), w̃2 (n), and w̃3 (n) are
zeros.
Based on the above discussion, we have established one of the main results
of this work as stated below.
group
3
group group
1 0
group group group
3 2 3
group group group group
1 0 1 0
group group group
2 3 2
group group
1 0
group
2
Fig. 6.3. An example of frequency reuse using the proposed code scheme with
G = L = 4 [[136] IEEE].
c
218 6 MAI-Free MC-CDMA System
6
MAIi ← j: magnitude
0
60
60
40 50
40
j: user index 20 30
20
10 i: user index
0 0
(a)
10
8
MAIi ← j: magnitude
0
60
50 60
40 50
30 40
30
20 20
j: user index
10 10 i: user index
0 0
(b)
Fig. 6.4. |M AIi←j | as a function of user indices i and j with N = 64: (a) L = 2
and (b) L = 4 [[136] IEEE].
c
220 6 MAI-Free MC-CDMA System
10−1
L = 1 with all N codewords
L = 2 with the first N/2 codewords
10−2
Bit error probability
10−3
10−4
0 5 10 15 20 25 30
Eb/N0
Fig. 6.5. The bit error probability as a function of Eb /N0 to illustrate the diversity
order of the proposed code scheme [[136] IEEE].
c
In the last section, we assume that the channel information λi [k] for every user
is known to the receiver. Without accurate channel information, neither ORC
nor MRC can be performed at the receiver end. For non-MAI-free schemes,
channel information is needed for the MUD-based technique in the receiver. If
channel information is not available, it has to be estimated by some techniques
[132]. For uplink transmission, every user experiences a different fading. Thus,
multiuser channel estimation is required if the system is not MAI-free. For
downlink transmission, although the mixed signal of all users from the base
station experiences the same channel fading, orthogonality of users’ codes may
be destroyed as a result of frequency-selective fading. Unless the base station
uses the same training sequence xi and spreading code wi [k] for every user
at the same time slot, it would be difficult for an individual user to acquire
his/her own downlink channel information without extra signal processing
techniques. However, this reduces the system flexibility since all users have
to be coordinated for training with the same signature waveform at the same
6.2 System Model and Its Properties 221
T −1
ẑi = xi F0 hi + xj Wi Wj F0 hj + Wi e, (6.19)
j=0,j =i
where e is the noise vector after DFT. Taking the N -point IDFT of ẑi in
Eq. (6.19), we have
T −1
IL
F† ẑi = xi hi + xj F† Wi Wj F0 hj +F† Wi e, (6.20)
0
j=0,j =i
ci,j
where the second term is the interference term from other users. Since the
channel path is of length L, if the first L elements of ci,j are zeros for all hj ,
we can obtain channel hi without worrying about the interference from other
users.
Theorem 6.2: Suppose that the channel length is equal to L and the code
scheme as stated in Theorem 6.1 is used, where G ≥ L. Then, if we use any
one subset of codewords in the MC-CDMA system, the first L elements of
ci,j are zeros. As a result, we can estimate the channel hi in a completely
MAI-free environment. That is,
where zi (n) is the nth element of Fẑi and ẽi (n) is the nth element of F† Wi e.
Proof: Let us express the DFT matrix F as ( F0 F1 ). Then, ci,j in Eq. (6.20)
can be manipulated as
F†0 F†0 Ri,j F0
ci,j = Wi Wj F0 hj = hj . (6.22)
F†1 F†1 Ri,j F0
222 6 MAI-Free MC-CDMA System
From the discussion in Section 6.2.1, F†0 Ri,j F0 = 0 if any one subset of
codewords are used. Hence, the first L elements of ci,j are zeros, and we get
Eq. (6.21).
According to Eq. (6.21), if xi is a known training symbol, we can obtain
hi (n), 0 ≤ n ≤ L−1, without worrying about the interference from symbols of
other users. That is, channel estimation can be done in a completely MAI-free
environment.
In this section, we consider the CFO effect and show that it can be han-
dled by the use of the proposed code design. In particular, we show that the
MAI due to the CFO effect can be reduced to zero or a negligible amount.
Consider the kth chip of the received vector after DFT in a CFO environ-
ment, i.e.,
T −1
ŷ[k] = rj [k] + e[k], (6.23)
j=0
where e[k] is the received noise after DFT, and rj [k] is the received signal
due to channel fading and the CFO effect. Suppose the jth user has a nor-
malized CFO j , which is the actual CFO normalized by 1/N of the over-
all bandwidth and −0.5 ≤ j ≤ 0.5. rj [k] in Eq. (6.23) can be expressed
by [87]:
6.2 System Model and Its Properties 223
N −1
: N −1
;
1 1
λj [m]yj [m]ej N nm ej N nj e−j N nk
2π 2π 2π
rj [k] = √ √
N n=0 N m=0
N−1
e−jπ N
m−k
The first term of Eq. (6.24) is the distorted chip and the second term is the ICI
caused by the CFO. Note that, when there is no CFO, rj [k] equals λj [k]yj [k]
as in Eq. (6.2). From Eqs. (6.3) and (6.23), if the real Hadamard-Walsh code
is used, we see that x̂i [k] under CFO is given by
N −1
T −1
N −1
N −1
x̂i = ri [k]λ∗i [k]wi [k] + rj [k]λ∗i [k]wi [k] + e[k]λ∗i [k]wi [k],
k=0 j=0,j =i k=0 k=0
si i←j
MAI
(6.26)
where si is the desired signal and M AI i←j is the MAI of user i due to the
jth user’s CFO. Using Eqs. (6.24) and (6.26), it can be shown that the MAI
term is given by
M
(0) (1)
AI i←j = M AIi←j + M AIi←j , (6.27)
where
N −1
rj [k]λ∗i [k]wi [k]
(0) (0)
M AIi←j =
k=0
N −1
= αj xj λj [k]wj [k]λ∗i [k]wi [k] (6.28)
k=0
and
N −1
rj [k]λ∗i [k]wi [k]
(1) (1)
M AIi←j =
k=0
= βj xj ηj , (6.29)
where
N −1
N −1
e−jπ
m−k
N
ηj = λj [m]wj [m] π(m−k+j )
λ∗i [k]wi [k].
k=0 m=0,m=k N sin N
224 6 MAI-Free MC-CDMA System
(1)
Note that if there is no CFO for user j, i.e., αj = 1 and βj = 0, M AIi←j = 0
(0)
and M AIi←j is equal to the MAI term defined in Eq. (6.3). This gives us an
(0)
intuition that M AIi←j is the dominating MAI term when the CFO is small.
(0)
Hence, if we can find a way that makes M AIi←j = 0, the MAI due to the
CFO can be reduced to a negligible amount. According to Eqs. (6.3), (6.28)
and Theorem 6.1, we have the following Lemma.
Lemma 6.4: Let the channel length be L and the code scheme as stated in
Theorem 6.1 is used. Then, if we use any one of the G subsets of codewords
(0)
for the MC-CDMA system with G ≥ L, the dominating MAI term M AIi←j
in Eq. (6.28) is zero.
(1)
Now, let us look at another interference term M AIi←j , which is called the
p
e−jπ N
“residual MAI” for convenience. Define gj (p) = π(p+j ) . Then, we have
N sin N
the following Lemma.
Lemma 6.5: Let the channel length be L and the code scheme as stated in
Theorem 6.1 is used. Then, if we use any one of the G subsets of codewords
(1)
for the MC-CDMA system with G ≥ L, the residual MAI term M AIi←j in
Eq. (6.29) becomes
⎧ ⎫
⎪
⎪ ⎪
⎪
N −1 ⎨& '† ⎬
(1) (p) † (p)
M AIi←j = βj xj gj (−p) hi F0 Wi Wj F0 hj , (6.30)
⎪
⎪ ⎪ ⎪
p=1 ⎩ (p)
⎭
Di,j
where
(p)
Wi = diag (wi [p] · · · wi [N − 1] wi [0] · · · wi [p − 1]) (6.31)
and
& '
= hi (0)e−j N 0p hi (1)e−j N 1p · · · hi (L − 1)e−j N (L−1)p .
(p) 2π 2π 2π
hi (6.32)
Theorem 6.3: Suppose the codeword set G0 is used, the two codewords w0
(1) T −1 (1)
and w1 will have zero M AIi←j term. That is, j=0,j =0 M AI0←j = 0 and
T −1 (1)
j=0,j =1 M AI1←j = 0.
Fig. 6.6. The dominating and the residual MAI as a function of CFO in a fully-
loaded situation [[136] IEEE].
c
6.2 System Model and Its Properties 227
Fig. 6.7. The dominating and the residual MAI as a function of CFO in a half-
loaded situation with Shi and Latva-aho’s scheme [[136] IEEE].
c
Fig. 6.7 with Fig. 6.6, we see that both the dominating MAI and the resid-
ual MAI decrease by only about 3 dB, which shows a reasonable but not
satisfactory MAI reduction as the number of users decreases to half in the
system.
Next, let us consider the proposed code selection schemes with half-loaded.
Since L = 2, we divide the codewords into two subsets. G0 contains the first
N/2 codewords and G1 contains the last N/2 codewords. The performance
is shown in Fig. 6.8(a) and (b), respectively. Note that the dominating MAI
(0)
term M AIi is equal to zero so that it is not shown here. Moreover, there
(1)
are only six curves in Fig. 6.8(a) for M AIi , since the two codewords w0 and
w1 are completely MAI-free under the CFO environment.
By examining Fig. 6.6 and Fig. 6.8(a) and (b), we see that the dominating
MAI can be completely eliminated by the proposed code scheme. In this case,
the residual MAI will determine the system performance. Furthermore, the
residual MAI decreases around 5 dB. These results show that the MAI due
to the CFO effect can be greatly reduced using the proposed code schemes.
Moreover, if the codewords of G0 are used, users of w0 and w1 can still have
zero MAI under the CFO environment.
228 6 MAI-Free MC-CDMA System
(a)
(b)
Fig. 6.8. MAI reduction via the proposed code schemes using codewords in (a) G0
and (b) G1 [[136] IEEE].
c
−1
10
−2
10
Bit error probability
−3
10
Codewords with even indices
Shi and Latv-aho scheme
GO-MC-CDMA
G1
G0
−4
10
0 0.05 0.1 0.15 0.2 0.25 0.3
ε : CFO
Fig. 6.9. The BEP as a function of CFO (with fixed Eb /N0 = 15 dB) [[136] IEEE].
c
230 6 MAI-Free MC-CDMA System
−3
10
−4
10
−5
10
0 0.05 0.1 0.15 0.2 0.25 0.3
ε :CFO
Fig. 6.10. The mean squared error of CFO estimation as a function of CFO for the
proposed and the GO-MC-CDMA schemes [[136] IEEE].
c
We first consider two code priority schemes that assign codewords accord-
ing to the following order:
If there is no CFO, the system is MAI-free using only eight codewords in either
G0 or G1 according to Theorem 6.1. The order of the first eight codewords
can be changed arbitrarily. Also, we can assign codewords all from G1 first
and then from G0 .
The bit error probability is plotted as a function of the number of active
users for the above four code priority schemes in Fig. 6.11. Scheme I has
the worst performance as expected. The performance of the proposed code
priority stays the same when the number of active users is smaller than 9 due
to the MAI-free property. When T exceeds 8, the performance of the proposed
scheme degrades dramatically. However, its performance remains at least as
−1
10
−2
10
Bit error probability
−3
10
−4
10
Code priority #1
Shi and Latva-aho code priority
Code priority #2
Proposed code priority
−5
10
0 2 4 6 8 10 12 14 16
T: Number of users
Fig. 6.11. The BEP as a function of the number of users with SNR=18 dB [[136]
IEEE].
c
6.2 System Model and Its Properties 233
good as Schemes I and II. We also see that for Shi and Latva-aho’s scheme,
it has the same performance as the proposed code priority when the numbers
of users are 1, 2, 3, and 5. This is reasonable since codewords of these user
numbers fall in the set of G0 and, hence, they are free from MAI. However,
for other numbers of users, its performance is worse than the proposed code
priority scheme. Moreover, in the Shi and Latva-aho’s priority, if the number
of active users changes, some users will need to change their codewords, which
complicates the actual deployment of this scheme.
for 0 ≤ g ≤ G − 1 and 0 ≤ k ≤ N − 1.
Consider the N times N Hadamard-Walsh matrix, HN . As described in
Section 6.2.1, we can form the subset G0 = {w0 , w1 , · · · , w N −1 } for a channel
G
with maximum length L. We can further divide codewords in G0 into two
disjoint subsets of equal size as
Define
ri,j [k] = wi [k]wj∗ [k] k = 0, 1, · · · , N − 1.
(p) (p)
N −1
(p) 1 (p) 2π
ri,j (n) = ri,j [m]ej N mn . (6.40)
N m=0
(p) 1
N/G−1 G−1
(p) 2π
ri,j (n) = ri,j [k + gN/G]ej N (k+gN/G)n . (6.41)
N g=0
k=0
Since codewords wi and wj belong to G0 , they are among the first N/G
columns of the Hadamard matrix and formed by repeating the upper left
N/G × N/G submatrix of HN , G times. Hence, they are periodic with period
(p)
N/G. By Lemma 6.1, wi is also periodic with period N/G. Since the prod-
uct of two periodic functions whose periods are the same is another periodic
function with the same period, we have
(p) (p)
ri,j [k + gN/G] = ri,j [k]. (6.42)
Then, we can rewrite Eq. (6.41) as
(p) 1
N/G−1
(p) 2π
G−1
2π
ri,j (n) = ri,j [k]ej N kn ej G gn , (6.43)
N g=0
k=0
we have
N/G−1 (p) 2π
(p)
G
k=0 ri,j [k]ej N kn , n = 0, ±G, · · ·
ri,j (n) = N (6.45)
0, otherwise.
(p) (p)
To prove ri,j (0) = 0, we need to show ri,j has an equal number of +1
(p)
and −1. In general, ri,j does not belong to the Hadamard matrix whose
codewords have an equal number of +1 and −1. For example, for N = 8,
(1)
w8 · w7 has two −1’s and six 1’s, where · denotes the component-wise vector
(p)
product. However, if wi ∈ G01 and wj ∈ G00 , ri,j does have an equal number
of +1 and −1 as shown below. According to Eq. (6.8), codewords in G00 are
the first N/2G columns of HN and obtained by repeating the N/2G × N/2G
submatrix 2G times. Hence, any codeword wj ∈ G00 is periodic with period
N/2G. Similarly, we can show that any codeword wi ∈ G01 is antiperiodic
(p)
with antiperiodic N/2G. By Lemma 6.1, wi is also antiperiodic with the
same antiperiod. Therefore, for 0 ≤ k ≤ N − 1, we have
(p)
wi [((k + N/2G))N ]wj [((k + N/2G))N ] =
(p)
−wi [((N − p + k))N ] wj [k] = −wi [k]wj [k].
(p)
Hence, ri,j is antiperiodic with antiperiod N/2G. It can be easily shown
(p)
that any antiperiodic code has an equal number of ±1. Thus, ri,j (0) =
1 N −1 (p)
N k=0 ri,j [k] = 0.
6.3 MAI-Free MC-CDMA with CFO Using Hadamard-Walsh Codes 237
G00 = {w0 , w1 , w2 , w3 }
and
G01 = {w4 , w5 , w6 , w7 }.
By Lemma 6.7, any codeword chosen from G01 achieves zero MAI with respect
to any codeword from G00 . On the other hand, we will not necessarily have
an MAI-free system when both codewords are chosen from G00 (or both from
G01 ). For instance,
M AI 2←3 = 0 or M AI 4←5 = 0 for N = 16 and L = 2.
Note that Lemma 6.7 does not identify a subset of codewords that can be
assigned to all active users while keeping the system MAI-free. This choice will
be examined in the following theorem. In particular, we want to determine
such an MAI-free set from subsets of G0 and specify the number of codewords
in the resulting MAI-free set.
Theorem 6.4: For a channel of length L and G = 2q ≥ L, there are 1 +
log2 (N/G) codewords from N HW codes that will lead to an MAI-free MC-
CDMA system under any CFO level.
Proof: We form subsets G0 , G00 , and G01 as described above. To build an
MAI-free subset, we must choose only one of the codes from G01 . To determine
the remaining codes from G00 , we divide G00 into two subsets G000 and G001 ,
each with N/4G codes, by following the same procedure. Then, we can choose
one from G001 , since it can be proved by arguments similar to that in Lemma
6.2 that any codeword from G001 is MAI-free from any codeword in G000 . By
repeating this procedure, we can obtain an MAI-free set. Since the division
of a subset generates one codeword to be included in the MAI-free codeword
set in each stage, we have log2 (N/G) codes in the MAI-free set. Furthermore,
each of the two subsets has only one codeword in the last stage, we can add
both codewords (w0 and w1 ) to the MAI-free set. Thus, the total number of
MAI-free codewords is 1 + log2 (N/G).
Consider the previous example, where N = 16 and L = G = 2. By Lemma
6.2, we can choose one codeword, say w4 , from
G01 = {w4 , w5 , w6 , w7 }
G00 = {w0 , w1 , w2 , w3 }
into two subsets, i.e., G000 = {w0 , w1 } and G001 = {w2 , w3 }. Then, we
include either w2 or w3 in G001 in the MAI-free set. If we divide G000 further
into two more subsets, {w0 } and {w1 }, we can include both w0 and w1 in
the MAI-free set by Lemma 6.2. Therefore, there will be 1 + log2 (16/2) = 4
MAI-free codewords.
238 6 MAI-Free MC-CDMA System
to have low complexity and good performance. The PIC receiver [32, 89] pro-
cesses all N users simultaneously by cancelling their interference after all of
them have been decoded independently. The SIC receiver decodes users suc-
cessively in several stages with interference being cancelled at each stage [89].
The SIC receiver has a lower complexity than the PIC receiver at the cost of
higher latency.
A large amount of efforts has been made to reduce the complexity of the
multiuser detectors. Cai et al., [158] proposed to assign a set of subcarriers
to a group of users while preserving the frequency diversity of MC-CDMA as
much as possible. With this design, MAI is only present among users in the
same group so that it can be suppressed via simplified MUD techniques. A new
ML-MUD scheme called sphere decoding was proposed for MC-CDMA, whose
complexity is a polynomial function of the user number [14]. It applies lattice
sphere decoding to the received signal that is modeled as multidimensional
lattice packing points. However, when the user number is large, the sphere
decoding ML algorithm is cumbersome to perform. Moreover, neither of these
techniques are shown to be effective in the presence of CFO.
In asynchronous DS-CDMA where the size of cross-correlation matrix is
quite large, suboptimal approaches to implement the decorrelating detectors
have been proposed which are based on partitioning the long received sequence
into blocks of data that have more manageable size [63, 150]. A linear filter
implementation for the decorrelating detector was proposed in [82] where the
filter coefficients depend on the cross-correlations.
In this chapter, we show how the set of orthogonal carrier interferometry
(CI) codewords [92] can increase the number of MAI-free users to N/G, for a
multipath channel of length L and spreading gain N , where G is a power of 2
and L ≤ G < N , and in a CFO environment. It is worthwhile mentioning that
two sets of orthogonal CI codewords were introduced in [92] to increase user
capacity of MC-CDMA from N to 2N with negligible performance degra-
dation in a multipath fading channel. CI codes were also used as training
sequences for channel estimation to decouple the inter-antenna interference in
a CFO-free MIMO-OFDM system [72].
We also show that the use of CI codes will lead to simplified MAI multiuser
detection techniques if employed by a fully-loaded MC-CDMA in a CFO en-
vironment. We first use the PIC receiver to suppress MAI and evaluate the
performance of PIC in MC-CDMA with CI and HW codes over a multipath
Rayleigh fading channel with CFO. Using CI codewords, the complexity for
fully-loaded PIC (i.e., N active users) is linearly proportional to the chan-
nel length, L, rather than the user number, N . Since N is in general much
larger than L, the complexity is substantially reduced. Next, we show that,
by exploiting the sparsity of the cross-correlation matrix of MC-CDMA with
CI codes, we can lower the complexity of ML detectors so that its complexity
grows exponentially with the channel multipath length instead of the number
of active users. To be more specific, the complexity of the ML detector for a
fully-loaded MC-CDMA system with BPSK signals and spread gain N and
7.1 Orthogonal Carrier Interferometry Codes 241
T −1
ŷ[k] = rj [k] + e[k], (7.1)
j=0
where e[k] is the DFT of additive noise, and rj [k] is the received signal con-
tributed from the jth user due to the channel fading and the CFO effects and
is given by Eq. (6.24) as
242 7 MC-CDMA
N −1
rj [k] = αj λj [k]yj [k] + βj λj [m]yj [m]gj (m − k), (7.2)
m=0,m=k
where λj [m] is the mth component of the N-point DFT of the channel impulse
response of user j. αj and βj are given by Eqs. (6.25) in Chapter 6, and
gj (m−k) = e−jπm−k/N /N sin π(m − k + j )/N was also defined in Chapter 6.
When there is no CFO (i.e., j = 0), rj [k] = λj [k]yj [k]. Since βj gj (0) = αj
and by Eqs. (6.1) and (7.2), we have
ŷ = Cx + e, (7.3)
where the element in the ith row and the jth column is
N −1
C(i, j) = βj gj (m − i)λj [m]wj [m], (7.4)
m=0
and
ŷ = (ŷ[0], ŷ[1], . . . , ŷ[N − 1])T ,
and
e = (e[0], e[1], . . . , e[N − 1])T
is circularly symmetric complex Gaussian random vector with zero mean and
covariance σ 2 I.
To detect transmitted symbols, one way is to use single user detection tech-
niques such as the maximum ratio combining (MRC). As shown in Chapter 6,
the MRC detector detects the ith transmitted symbol as
N −1
ẑi = ŷ[k]λ∗i [k]wi∗ [k]
k=0
T −1
= si +
M AI i←j + êi , (7.5)
j=0,j =i
N −1
where êi = k=0 e[k]λ∗i [k]wi∗ [k] and si can be written as
N −1
si = ri [k]λ∗i [k]wi∗ [k]
k=0
N −1 N
−1
= βi xi gi (m − k)λi [m]yi [m]λ∗i [k]wi∗ [k]. (7.6)
k=0 m=0
where
N −1
λj [k]wj [k]λ∗i [k]wi∗ [k],
(0)
M AIi←j = αj xj (7.8)
k=0
and
−1
( +
N
e−jπ
m−k
N
λ∗i [k]wi∗ [k] . (7.9)
(1)
M AIi←j = βj xj λj [m]yj [m] π(m−k+j )
m=0,m=k N sin N
In this chapter we will find it more convenient to combine Eqs. (7.8) and (7.9)
into
N −1 N
−1
M AI i←j = βj xj gj (m − k)λj [m]yj [m]λ∗i [k]wi∗ [k]. (7.10)
k=0 m=0
IL
where F0 = F , hi = (hi (0) · · · hi (L − 1))T , and
0 N ×L
(1)
It was also shown in Chapter 6 that M AIi←j given by (7.9) can be rewrit-
ten as
−1
( +
(1)
N
(p) † † (p) †
M AIi←j = βj xj gj (−p) (hi ) F0 (Wi ) Wj F0 hj , (7.12)
p=1
(p)
Cij
where p
e−jπ N
gj (p) = π(p+j )
, (7.13)
N sin N
(p)
Wi = diag(wi [p] · · · wi [N − 1] wi [0] · · · wi [p − 1]), (7.14)
and
2π0p 2π(L−1)p
= (hi (0)e−j · · · hi (L − 1)e−j
(p)
hi N N )T . (7.15)
244 7 MC-CDMA
(0) (0)
where if p = 0, βj gj (0) = αj , Wi = Wi , and hi = hi .
Since a relatively small number of users can be MAI-free in a channel with
CFO using HW codes, we look for other codes to address this issue. In this
section, we study the carrier interferometry (CI) codes of size N , which is of
the following form
2π
wi [k] = ej N ki , k, i = 0, 1, · · · , N − 1. (7.17)
M AI i←j = 0.
(p)
Thus, Dij must be a zero matrix of dimension L × L for all i = j to achieve
MAI-free in a CFO environment. Similar to the proof of Lemma 6.7 in Chap-
ter 6, we can define matrix Ci,j = F† Wi Wj F and note that Di,j is an
(p) (p) (p)
(p)
L × L upper left submatrix of matrix Ci,j which is a circulant matrix [47].
(p)
Thus, the first column of Ci,j , (ci,j (0) · · · ci,j (N − 1))T , is the N -point IDFT
(p) (p)
of ri,j . To have Di,j = 0, the first L samples and the last L − 1 samples of
(p)
the IDFT of ri,j must be zeros.
Now, consider two codewords with indices i and i . By taking the IDFT
(p)
of ri,j , we have
N −1
(p) 1 (p) 2π
ri,i (n) = √ ri,i [m]ej N mn . (7.18)
N m=0
7.1 Orthogonal Carrier Interferometry Codes 245
(p) 1
N/G−1 G−1
(p) 2π
ri,i (n) = √ ri,i [k + gN/G]ej N (k+gN/G)n . (7.19)
N k=0 g=0
we have
ri,i [k + gN/G] = ej N (N −p+k+gN/G)i e−j N (k+gN/G)i
(p) 2π 2π
= ej N (N −p+k)i e−j N ki ej G g(i−i ) .
2π 2π 2π
(7.20)
If i − i = mG, where m can be any nonzero integer, we get ej2π/Gg(i−i ) =
ej2πmg = 1. Then, we have
ri,i [k + gN/G] = ej N (N −p+k)i e−j N ki = ri,i [k].
(p) 2π 2π (p)
(7.21)
(p) 1
N/G−1
(p) 2π
G−1
2π
ri,i (n) = ri,i [k]ej N kn ej G gn , (7.22)
N g=0
k=0
G−1
2π G, n = 0, ±G, · · ·
ej G gn = (7.23)
0, otherwise,
g=0
we have
( N/G−1 (p) 2π
(p) √G
k=0 ri,i [k]ej N kn , n = 0, ±G, · · ·
ri,i (n) = N
0, otherwise.
Thus, M AI i←j = 0. Since there are N/G codewords such that i − i = mG,
m = 1, 2, · · · , the total number of MAI-free codewords from N exponential
codes is N/G.
246 7 MC-CDMA
by the above equation. On the other hand, if i − i ≤ 0, then ri,i (n) = 0, for
(p)
n = N + L, N + L + 1, · · · , 2N − L. Since
N −1
(p) 1 j 2π (N −p+k)i −j 2π i k j 2π k(n+N )
ri,i (n + N ) = √ e N e N e N
N k=0
N −1
1 j 2π (N −p+k)i −j 2π i k j 2π k(n) (p)
= √ e N e N e N = ri,i (n),
N k=0
(p) (p)
ri,i (n) is periodic with period N . We conclude ri,i (n) = 0 for n = L, L +
(p) (p) (p) (p)
1, · · · , N − L, while ri,i (0) = ri,i (1) = · · · = ri,i (L − 1) = 0, and ri,i (N −
L + 1) = ri,i (N − L + 2) = · · · = ri,i (N − 1) = 0, for ((|i − i |))N −(L−1) ≥ L.
(p) (p)
Therefore M AI i←i = 0.
Example 7.1: MAI-Free with CI Codewords
Let N = 16, L = 2 and the CFO value is fixed to be ±0.1. That is, every user
was randomly assigned by a CFO value of either 0.1 or −0.1. The MAI power in
the unit of dB between users with different
N −1codewords is shown in Table 7.1.
k=0 |λi [k]| since the desired signal
2
The MAI power was normalized by
was scaled by the same amount. According to Theorem 7.1 in Section 7.1,
7.1 Orthogonal Carrier Interferometry Codes 247
users with even indexed codewords, i.e., {w0 , w2 , w4 , w6 , w8 , w10 , w12 , w14 }
are mutually MAI-free. This is illustrated in the top half of Table 7.1. We also
observe that users whose codewords’ indices difference is greater than L − 1
have zero MAI as proved by Theorem 7.2.
Proof: The condition L ≤ N/2 guarantees that there are i and i satisfying
((|i − i |))N −(L−1) ≥ L. For every codeword with index i, there are L − 1
codewords such as codeword i for which 0 < i − i and ((i − i ))N −(L−1) ≥ L
and L − 1 codewords such as codeword i for which i − i < 0 and ((i −
i))N −(L−1) ≥ L. Therefore, the number of interferers is 2(L − 1).
The Corollary leads to an important result. In practice, N >> L. That
is the spreading gain is much greater that the channel length. Thus, a user
has to combat much fewer interferers than what it would have to combat if
other codes instead of CI codes were used. On the other hand, the user with CI
codewords experiences a considerable amount of MAI from nonzero interferers
in a fully loaded MC-CDMA system. Fortunately, interference cancellation can
be employed to suppress MAI. In the next section.We will consider the parallel
interference cancellation (PIC) technique for this purpose and show that its
complexity can be reduced by the use of CI codewords since there are only
2(L − 1) instead of N − 1 interferers.
248 7 MC-CDMA
N −1
T
x̂0i = |λi [k]|2 xi + xj γi,j + êi [k], (7.25)
k=0 j=1,j =i
where
N −1
gj (−p)(λi )† (Wi )† Wj λj ,
(p) (p)
γi,j = βj
p=0
N −1
and êi [k] = k=0 e[k]λ∗i [k]wi∗ [k].
Fig. 7.1. The MC-CDMA receiver with single-stage PIC for the ith user.
7.2 Complexity Reduction in PIC MUD Detection 249
sgn[Re{x̂0j }].
These bits are then spread into multiple chips by their corresponding code-
words and scaled by channel gains before passing through the IDFT matrix
and the parallel-to-serial converter. To take the CFO effect into account, each
signal is multiplied by ej2π/N nj , n = 0, 1, · · · , N − 1. Here, it is assumed that
the exact knowledge of channel gains and CFO values for all users is available
in the receiver. Later, simulation results with imperfect channel estimation
will also be given. These estimated signals add up to form the MAI estimate
for desired user i, which can be subtracted from its received signal ŷ.
The resultant signal is used by the receiver of user i to produce new de-
tected symbol at stage 1 of the PIC detector denoted by x̂1i as
N −1
1
T
x̂1i = x̂0i − sgn[Re{x̂0j }]wj [k ]λj [k ]
N
j=1,j =i k,k =0
( N −1 +
2π
j N n(k −k+) ∗ ∗
e wi [k]λi [k] + êi [k] (7.26)
n=0
T
N −1
gj (−p)(λi )† (Wi )† Wj λj
(p) (p)
x̂1i = x̂0i − sgn[Re{x̂0j }]βj
j=1,j =i p=0
N −1
T
x̂1i = xi |λi [k]|2 + γi,j (xj − sgn[Re{x̂0j }]) + êi [k]. (7.28)
k=0 j=1,j =i
l=0 l =0
K
Due to the presence of xj terms, j=1,j =i xj γi,j in Eq. (7.25) is not Gaus-
sian for given λi . However, if it is conditioned on all possible xj , j = i,
we will have a collection of Gaussian random variables that can be ap-
proximated
# by the Gaussian
$ distribution [144]. Hence, we see that I0i =
K N −1
Re ê[k] + j=1,j =i γi,j xj − k=0 |λi [k]|2 in the above equation is condi-
tional Gaussian conditioned
onλi . By using Δx0i to denote (xi −sgn[Re{x̂0i }])
and noting that E Re2 {z[k]} = 12 Σ 2 , the probability of error conditioned
on λi is simply given by
⎛ ⎞
N −1
|λ [k]|2
P [Δx0i = 0|λi ] = Q ⎝ / k=0 ⎠,
i
(7.33)
T 2 2 /2
σ
j=1,j =i γi,j + σ
7.2 Complexity Reduction in PIC MUD Detection 251
where
1
σγ2i,j = E Re2 {γi,j |λi } = var[γi,j |λi ].
2
Then, the BEP can be obtained by
⎛ ⎞
∞ N −1
|λ [k]|2
Q ⎝ / k=0 ⎠P [λi ]dλi .
i
P [Δx0i = 0] = (7.34)
0 T 2 2
j=1,j =i σγi,j + σ /2
and
The assumption of Gaussian residual interference is not true when the number
of interfering users are not sufficiently large. For example, as proved in the
previous section, every user encounters only 2(L − 1) nonzero interference
terms if the CI codewords are used. Thus, for small values of L, the Gaussian
assumption for residual interference is not reasonable. The distribution of
residual interference must be derived and therefore, a new BEP formula can
be obtained.
In the following, we first derive the BEP formula for a system with only 2
interferes. Then, the result is extended to T interferers.
Suppose users i and i are interfering users for user i. The detected re-
ceived symbol for user i is given by
N −1
x̂1i = xi k=0 |λi [k]|2 + Δx0i γi,i + Δx0i γi,i + ê[k], (7.40)
Let Δx0i γi,i = U1 , Δx0i γi,i = U2 , and ê[k] = Z. Then, the probability den-
sity function of U1 conditioned on λi , denoted by fU1 (u1 |λi ), can be obtained
by
We use N (a, b) to denote the Gaussian distribution, where a and b are the
mean and variance, respectively. Since
we obtain
fU1 (u1 |λi ) = P [Δx0i = 0|λi ]N (0, 4σγ2i,i ) + (1 − P [Δx0i = 0|λi ])δ(u1 ),
where ⎛ ⎞
N −1
|λi [k]|2
P [Δx0i = 0|λi ] = Q ⎝ / k=0 ⎠.
T
j=1,j =i σγ2i ,j + σ 2 /2
7.2 Complexity Reduction in PIC MUD Detection 253
Similarly,
fU2 (u2 |λi ) = P [Δx0i = 0|λi ]N (0, 4σγ2i,i ) + (1 − P [Δx0i = 0|λi ])δ(u2 ).
Thus, the conditional BEP after one stage of PIC detector, with CI codewords
and L = 2 is given by
⎛ ⎞
N −1
k=0 |λi [k]|
2
P [error|λi ] = P [Δx0i = 0|λi ]P [Δx0i = 0|λi ]Q ⎝/ ⎠
4(σγi,i + σγ2i,i ) + σ 2 /2
2
N −1
k=0 |λi [k]|
2
+ (1 − P [Δx0i = 0|λi ])(1 − P [Δx0i = 0|λi ])Q .
σ 2 /2
⎛ ⎞
N −1
|λi [k]| ⎠
2
+ P [Δx0i = 0|λi ](1 − P [Δx0i = 0|λi ])Q ⎝ / k=0
4σγi,i + σ 2 /2
2
⎛ ⎞
N −1
|λ [k]| 2
+ (1 − P [Δx0i = 0|λi ])P [Δx0i = 0|λ1 ]Q ⎝ / k=0 ⎠.
i
4σγ2i,i + σ 2 /2
(7.43)
Next, we extend the above result to any number, I, of interferers. Let the set
of all interfering users’ indices for user i be Si . Then we have
N −1
x̂1i = xi |λi [k]|2 + Δx0Si [1] γi,Si [1] + Δx0Si [2] γi,Si [2] + . . . + Δx0Si [I] γi,Si [I]
k=0
+ êi [k], (7.44)
1
1
1
P [error|λi ] = ··· P [Δx0Si [1] = 0|λi ]r1 · · ·
r1 =0 r2 =0 rSi [I]=0
(
rSi [I]
P [Δx0Si [I] = 0|λi ]
and ∞
P [error] = P [E|λi ]P [λi ]dλi . (7.46)
0
−1
10
Bit error probability
−2
10
Analytical, CI codes
Simulated, CI codes
Analytical, HW codes
Simulated, HW codes
Analytical one-stage PIC, CI codes
Simulated one-stage PIC, CI codes
Analytical one-stage PIC, HW codes
−3
10 Simulated one-stage PIC, HW codes
5 10 15 20 25 30
Eb/N0, dB
Fig. 7.2. Analytical and simulated BEP versus Eb /N0 with N = 16, L = 2 and
CF O = ±0.1.
−1
10
Bit error probability
−2
10
0 5 10 15 20
E b /N 0 , dB
Fig. 7.3. BEP versus the SNR with N = 16, L = 2, CF O = ±0.1 dB.
−2
10
Bit error probability
−3
10
−4
Zero stage PIC, CI
10 Zero stage PIC, CI
One stage PIC, CI
Two stage PIC, CI
−5 One stage PIC, HW
10
LCM PIC, CI
Two stage PIC, HW
LCM PIC, HW
0 5 10 15 20
E /N , dB
b 0
Fig. 7.4. BEP versus the SNR with N = 32, L = 4, CF O = ±0.1 dB.
−2
10
Bit error probability
−3
10
−4
10
−6
10
10 15 20 25 30
Number of users
Fig. 7.5. BEP versus the active user number with N = 32, L = 4, CF O = ±0.3,
and Eb /N0 = 10 dB.
By expanding the right hand side of (7.47) and noting that ||ŷ||2 is indepen-
dent of x, we can reformulate the optimization problem as
where
Ω(x) = ||Cx||2 − 2{(Cx, ŷ)},
and where C is defined in Eq. (7.4) in a CFO environment. If there is no CFO,
Eq. (7.4) can be written as
Thus, we have
T −1
N −1
(Cx, ŷ) = x† (C† ŷ) = xj ŷj [k]wj∗ [k]λ∗j [k].
j=0 k=0
−1 ∗ ∗
Note that N k=0 ŷj [k]wj [k]λj [k] is actually the estimate of the input signal
for user j obtained by MRC (i.e., ẑj ). On the other hand,
||Cx||2 = x† H(0) x,
ẑ = Hx + ê, (7.48)
260 7 MC-CDMA
where
T −1
Ω(x) = ||ẑ − Hx||2 = |ẑi − hi x|2 , (7.50)
i=0
We know from Theorem 7.2 and its Corollary that for T = N active users with
CI codewords and L ≤ N/2, each user has only 2(L − 1) (instead of N − 1)
interfering users. Both H(0) and H are sparse matrices so that ML-MUD can
be performed with a much lower complexity. As shown in Fig. 7.6 for N = 16,
T = 16, and L = 2, the nonzero elements (indicated by black squares) of H
(or H(0) for the case without CFO) are concentrated along the three diagonal
lines. Elements in the off-diagonal region with |i − j| ≥ L are all equal to zero
except for two corners.
The well-known Viterbi algorithm (VA) can be used to solve the ML op-
timization problem. Generally speaking, its complexity is proportional to the
number of states. The number of transition per stage has to be taken into
account since the complexity is proportional to this number. The number of
state transitions per stage is referred to as the trellis size. It turns out that
regardless of how we define the states, the complexity of ML MUD is O(2T )
for a general non-sparse cross-correlation channel matrix and the BPSK mod-
ulation. On the other hand, by exploiting the sparsity of H, we can show
that the complexity of VA grows exponentially with 2L − 1. For example, for
N = T = 16 and L = 2 given in Fig. 7.6, Eq. (7.50) can be written as
N −1
Ω(x) = |ẑi − H(i, ((i − 1))N )x((i−1))N − H(i, i)xi
i=0
−H(i, ((i + 1))N )x((i+1))N |2 .
Thus, if a proper trellis is defined, the number of states at each stage can
be reduced to 2(L − 1) = 2 for this example. The trellis construction for the
sparse cross-correlation channel matrix of MC-CDMA with CI codewords is
explained below.
The structure of H (or H(0) for the case without CFO) implies a trellis
that is defined on a circulant time axis (or called the tail biting trellis (TBT)
[16]). TBT was defined and discussed for error correcting codes in [16]. TBT
also arises in the context of maximum likelihood (ML) detection in overloaded
array processing [52]. A method for trellis construction for a similar matrix
structure was proposed in [52] as explained below.
We denote the state of the trellis at stage i and the state space at the ith
stage by s[i] and Si , respectively. We use U [i] to denote the column indices
of nonzero elements on the ith row of H. For example, for the example given
in Fig. 7.6, we have U [0] = {0, 1, 15} and U [15] = {0, 14, 15}. The ith state is
defined as [52]
s[i] = {xu | u ∈ U [((i − 1))N ] ∩ U [i]}. (7.51)
Using the above definition, we obtain
s[i] ∪ s[((i + 1))N ] = {U [((i − 1))N ] ∩ U [i]} ∪ {U [i] ∩ U [((i + 1))N ]} = U [i].
(7.52)
In other words, state sequence {s[i]} for TBT is defined such that, during the
ith stage of the Viterbi algorithm recursion, U [i] corresponds to symbol indices
in both s[i] and s[i + 1]. From the sequence of states defined by Eq. (7.51),
we can construct the trellis by listing state values at stage i and connect the
valid state transition from stage i to stage i + 1.
By defining μ = 2(L − 1), we can determine the ith state from Eq. (7.51)
by
s[i] = (x((i−μ− ))N , · · · , xi , · · · , x((i+μ+ ))N ), (7.53)
where μ− = μ−12 and μ+ = 2 . Note that μ is the number of inter-
μ−1
ferers for each user in the MC-CDMA system with CI codes and μ + 1 is
262 7 MC-CDMA
(x10,x11)
(x11,x12)
(x12,x13)
(x13,x14)
(x14,x15)
(x15,x0)
(x9,x10)
(x15,x0)
(x0,x1)
(x1,x2)
(x2,x3)
(x3,x4)
(x4,x5)
(x5,x6)
(x6,x7)
(x7,x8)
(x8,x9)
Fig. 7.7. TBT for the case with N = T = 16 and L = 2.
the bandwidth of the cross-correlation channel matrix. For example, the state
definition for the cross-correlation channel matrix given in Fig. 7.6 is
s[i] = (x((i−1))N , xi ), 0 ≤ i ≤ N − 1.
With the state sequence for the example in Fig. 7.6, we construct the corre-
sponding trellis in Fig. 7.7, where the value of each state is placed at the top
of each stage. Note that the state is tail biting in the sense that it starts and
ends with the same state, i.e., (x15 , x0 ).
Given these state and trellis definitions, we have to solve the ML optimiza-
tion problem, which is equivalent to finding a closed path with the minimum
cost through TBT. A closed path around a TBT is a path that starts and
ends with the same state. In other words, it is identified by a sequence of
state-indices for which js [i] = js [i + N ], 0 ≤ i ≤ Nstgs − N .
Since the initial state is not actually defined in the TBT, finding the op-
timum ML solution requires a modified version of the VA that is explained
below. That is, the actual ML path for the TBT can be determined in two
steps. First, an arbitrary state value is selected as the initial state and the
optimum closed path is determined by running the VA. Then, the first step
is repeated for every possible value of the initial state. The optimum path is
then chosen to be the one with the minimum cost. However, this algorithm
has a complexity proportional to O(22μ ) [16]. For example, the TBT depicted
in Fig. 7.7 requires 4 calls of the Viterbi Algorithm.
Some approximate ML algorithms with less complexity and satisfactory
results for decoding TBT were discussed in [16, 52]. These algorithms initialize
all metrics at states in initial stage S0 to zero, decode with VA starting at
S0 and go around the TBT. Some of these algorithms require that, after each
run of VA, the resultant winning path should be checked to see if the starting
state is the same as the ending state (i.e., if the winning path is closed) [148].
A less complicated approximate ML algorithm, called the Iterative Tail Biting
Viterbi Algorithm (ITB-VA), was proposed in [52] that applies VA iteratively
around a TBT multiple times without excluding paths that are not closed.
This approach is taken in our work.
We define Nstgs = Nround N , where Nround > 1 is a real number. Nround
and Nstgs are in fact the desired numbers of iterations and stages around the
TBT, respectively. We can extend the received symbol sequence ẑ[i] (for the
7.3 Complexity Reduction in ML MUD Detection 263
(x10,x11)
(x11,x12)
(x12,x13)
(x13,x14)
(x14,x15)
(x15,x0)
(x9,x10)
(x15,x0)
(x0,x1)
(x1,x2)
(x2,x3)
(x3,x4)
(x4,x5)
(x5,x6)
(x6,x7)
(x7,x8)
(x8,x9)
(x0,x1)
(x1,x2)
(x2,x3)
(x3,x4)
(x4,x5)
(x5,x6)
(x6,x7)
(x7,x8)
Fig. 7.8. The periodically extended TBT for the case with N = T = 16 and L = 2
and Nround = 1.5.
A(x) = {Δ ∈ E, Δi = xi or 0}
= {Δ ∈ E, 2Δ − x ∈ {−1, 1}T },
where we have used the fact that, if x − 2Δ is the most likely vector, it is
more likely than x.
It can be easily shown that, when no CFO is present, we have
where the second equality is true since ẑ = H(0) x + ê. We see that this event
is dependent on noise ê only while Δ ∈ A(x) depends on x only. Thus, we
conclude that these two events are independent.
Extending Eq. (7.54) to the fading channel, we can express the error prob-
ability as
Pi (error|H(0) ) ≤ P {Ω(x − 2Δ) − Ω(x) ≤ 0|H(0) }
Δ∈Ei
( +
× P {Δ ∈ A(x)} , (7.55)
which follows from the fact that the admissibility of is independent of H(0) .
For equally likely transmitted bits, we have
−1
T,
P {Δ ∈ A(x)} = P {(xi − Δi )Δi = 0} = 2−w(Δ) ,
i=0
T −1
where w(Δ) = i=0 |Δi |. To compute P {Ω(x − 2Δ) − Ω(x) ≤ 0|H(0) }, we
note that, since ê is proper (circularly symmetric) complex Gaussian random
vector with zero mean and covariance σ 2 H(0) ,
7.3 Complexity Reduction in ML MUD Detection 265
1 1
E{({ΔT ê})2 } = E{ΔT êê† Δ} = σ 2 eT H(0) Δ.
2 2
Thus, the error probability for user i is bounded by
√
2Δ T H(0) Δ
Pi (error|H(0) ) ≤ 2−w(Δ) Q .
σ
Δ∈Ei
This integral can be calculated using the Monte Carlo method [102].
The upper bound for synchronous DS-CDMA in the AWGN channel was
made tighter in [144] by eliminating the so-called decomposable error vectors
(i.e., Δ ∈ Ei that meet certain criteria) from the summation. This result was
extended to the fading channel case in [11] by expressing channel matrix H as
A† RA where A and R only contain fading coefficients and cross-correlation
coefficients, respectively, and whereby allowing the set of indecomposable er-
rors to be independent of fading [11]. However, we are not able to separate
fading coefficients and cross-correlation in our system to make the bound
tighter.
Example 7.5: ML MUD BEP Versus Minimum Probability
of Error
Figure 7.9 shows the upper bound to BEP as a function of the SNR value,
Eb /N0 , under the setting of N = 8, L = 2, T = 8 for both zero CFO and
CFO= ±0.3 cases. The upper bound curves in each case are plotted against
their corresponding simulated BEP. To obtain simulated BEP, Nround = 1.5
and δ = 3. To shorten simulation and computation time, only the BEP for
the first user was computed. We see that the upper bound is not very tight
particularly for the system with CFO. The reason is that the decomposable
error sequences could not be identified and discarded in the presence of fading
channels, unlike the asynchronous DS-CDMA case in [11]. It is also clear from
the figure that ML performs better in the absence of CFO.
266 7 MC-CDMA
0
10
−1
10
−2
10
Bit error probability
−3
10
−4
10 No MUD, CFO = 0
No MUD, CFO = ± 0.3
Upper bound, CFO = ± 0.3
−5
10 ML MUD, CFO = ± 0.3
Upper bound, CFO = 0
ML MUD, CFO = 0
−6
10
0 2 4 6 8 10
E /N , dB
b 0
100
10−1
No MUD, CFO = 0
10−2
Bit error probability
10−4
10−5
10−6
0 2 4 6 8 10
Eb/N0, dB
Channel matrix H (or H 9 for the case without CFO) can be converted to a
band matrix by reducing the number of users to N − (L − 1), and employing
j2πki
CI codes wi [k] = e N , k = 0, 1, . . . N − 1, with the set of indices (i) which is
either {0, 1, . . . N − L} or {L, L + 1, . . . , N }. The bandwidth of the resulting
band matrix is L − 1 + L − 1 + 1 = 2L − 1. To give an example, for a channel
of length L = 3, its cross-correlation matrix with N = 16 can be transformed
into a band matrix of size N − (L − 1) = 14 and bandwidth 2L − 1 = 5, as
j2π0k
shown in Fig. 7.11, by omitting the first two CI codes, w0 [k] = e 16 and
j2π1k
w1 [k] = e 16 , k = 0, 1, · · · , 15.
Band matrices are usually stored by recording diagonals in the band while
the rest is simply set to zero. For example, for the following matrix of size
6 × 6 with ml = mu = 1:
⎡ ⎤
11 12 0 0 0 0
⎢ 21 22 23 0 0 0 ⎥
⎢ ⎥
⎢ 0 32 33 34 0 0 ⎥
⎢ ⎥ (7.57)
⎢ 0 0 43 44 45 0 ⎥
⎢ ⎥
⎣ 0 0 0 54 55 56 ⎦
0 0 0 0 65 66
we can store it compactly of the following 6 × 3 matrix:
268 7 MC-CDMA
Fig. 7.11. Conversion of a channel matrix into a band matrix with N = 16, L = 3
by reducing the user number to 14.
⎡ ⎤
0 11 12
⎢ 21 22 23 ⎥
⎢ ⎥
⎢ 32 33 34 ⎥
⎢ ⎥ (7.58)
⎢ 43 44 45 ⎥
⎢ ⎥
⎣ 54 55 56 ⎦
65 66 0
Hb = LU. (7.60)
The detected symbol for the above MUD detection technique is given by
x̂ = x + H−1
b ê, (7.62)
where ê is an N − L + 1 × 1 Gaussian random vector with zero mean and
covariance σ 2 H(0) where H(0) = C† C. Hence, we have
† −1†
E{(H−1 −1 † −1
b ê)(Hb ê) } = E{Hb êê Hb }
(0) −1†
= σ 2 H−1
b H Hb . (7.63)
(0) −1†
Let Hn = H−1
b H Hb . Since ê is a proper complex random vector, we have
1 1
E{{êê† }} = E{êê† } = σ 2 Hn .
2 2
Then, under the BPSK modulation, the conditional bit error probability for
the ith user is equal to
( % +
2
Pi (error) = E Q .
σ 2 Hn (i, i)
270 7 MC-CDMA
−2
10
N = 21, L = 4, K = 18, Analytical BEP
N = 21, L = 4, K = 18, Simulated BEP
N = 16, L = 3, K = 14, Simulated BEP
Bit error probability
−3
10
−4
10
0 5 10 15 20
E /N , dB
b 0
10−1
10−2
Bit error probability
10−3 No MUD
Decorrealting with 16 users
Decorrealting with 15 users
two-stage PIC
10−4 Optimum maximum likelihood detection
10−5
0 5 10 15 20
E /N , dB
b 0
The performance of single-stage PIC was analyzed in Section 7.2 under the
assumption that perfect knowledge of channel coefficients and CFO values for
each user is available in the receiver. In practice, channel and CFO estimation
must be performed using training sequences. Many Channel and CFO esti-
mation algorithms have been proposed for single user OFDM systems with a
quasi-static channel. A maximum likelihood CFO estimation algorithm was
proposed in [87]. Pilot-based channel estimation techniques for OFDM were
discussed in [17, 55, 71]. These CFO/channel estimation algorithms can be
extended to multiuser OFDM and MC-CDMA to avoid the use of complex
multiuser estimation schemes. However, performance of such CFO or channel
estimation techniques can be degraded by MAI.
In this section, we propose simple estimation techniques using the proposed
HW codewords in Chapter 6 or CI codewords as introduced in Section 7.1.
Since users with these codewords do not have MAI from other users in a
CFO environment, more accurate CFO or channel coefficients can be esti-
mated if groups of users employ these codewords in turn. In other words, only
log2 (N/G) + 1 users with HW codewords or N/G users with CI codewords
can be active simultaneously to send out pilot symbols.
272 7 MC-CDMA
The CFO estimation algorithm for OFDM given in [87] is based on the
repetition of data symbol xi and comparing the phases between successive
received symbols. In MC-CDMA, the detection output is actually one symbol
rather than an N × 1 OFDM symbol. If we denote two successive output
symbols by x̂i and x̂i , the CFO can be estimated by [87]
1
ˆi = tan−1 [{x̂∗i x̂i }/{x̂∗i x̂i }]. (7.64)
2π
T
z[k] = ai wi [k]wi∗ [k]λi [k] + aj wj [k]wi∗ [k]λj [k] + z[k]wi∗ [k], (7.65)
j=1,j =i
−1
10
−2
Bit error probability
10
0 5 10 15 20
E /N , dB
b 0
Fig. 7.14. The effect of channel/CFO estimation on the BEP performance, with
N = 16, L = 2, CF O = ±0.1 dB.
7.5 Channel and CFO Estimation 273
−1
10
−2
10
−3
10
Bit error probability
−4
10
−5
10 Zero stage PIC, CI, with channel/cfo estimation
Zero stage PIC, CI
−6 Zero stage PIC, HW, with channel/cfo estimation
10
Zero stage PIC, HW
LCM PIC, CI, with channel/cfo estimation
−7
10 LCM PIC, CI
LCM PIC, HW, with channel/cfo estimation
−8
LCM PIC, HW
10
0 5 10 15 20
E /N , dB
b 0
Fig. 7.15. The effect of channel/CFO estimation on the BEP performance, with
N = 32, L = 4, CF O = ±0.1 dB.
274 7 MC-CDMA
8.1 Introduction
The ultra-wideband (UWB) communication system, which conveys its data
symbol by a set of carrier-less pulse waveforms is also known as UWB impulse
radio. The narrow pulse, which is of the order of nanoseconds, leads to remark-
able multipath resolution at the receiver, i.e., signals coming from different
paths can be differentiated easily if their inter-arrival time is greater than one
pulse duration. As a result, tens or even hundreds of multipath components
are usually found in an indoor environment. Since different path experiences
independent channel gain and the probability that all pathes suffer from deep
fading simultaneously is low, these many multipath components can be ex-
ploited to combat signal deep fading efficiently. However, to acquire sufficient
signal power for symbol decoding, one method is to employ a large number of
Rake fingers at the receiver [151]. The receiver design of this kind is not only
expensive but also consumes a lot of battery power to decode the transmit-
ted symbol. Therefore, it is not favorable for the mobile application, where
hardware complexity and power consumption are the major concerns.
The idea called time-reversal prefilter (TRP) or Pre-Rake was recently ap-
plied to reduce the UWB receiver complexity in [58, 123, 139] and is described
as follows. Given that the channel response is available at the transmitter, the
TRP passes the original transmit signal through one prefilter whose impulse
response is the same as the order-reversed channel response. Therefore, the
equivalent channel response aftering precoding becomes the autocorrelation
of the original channel. All the multipath components will be constructively
combined after certain delay and it is named as the peak received signal af-
terward. As a result, the receiver with fewer fingers can enjoy full multipath
diversity. The TRP transmitter requires the complete channel response, which
is estimated and then passed to the transmitter by the receiver in a frequency
division duplex (FDD) system. Owing to a large number of channel taps in
the channel, the overhead of the channel information feedback is large and,
hence, the TRP scheme is not attractive to the real world implementation.
channel phase components, may not only improve the concentrated peak
power but also amplify the off-peak signal power as well. Consider the case
where the symbol interval is less than channel duration, the output signal
to interference power ratio (SIR) can be deteriorated consequently. Hence, a
longer code may not necessarily enhance the performance than a short one.
The design goal of CLO is to maximize the output SIR by adjusting the code-
word length. Since the best codeword length is usually less or equal to the
original channel response, CLO helps to further reduce the feedback burden.
However, it is worthwhile to point out that the closed-form solution to optimal
code size is not possible to find since the problem itself is highly nonlinear
in nature. Even though we can apply an exhaustive search algorithm to find
the best code length, this scheme also requires very high computational power
due to a huge number of channel taps in the UWB channel. To save the com-
putational complexity, a fast search algorithm for the optimal code length is
also proposed. Even though the fast algorithm maximizes the output SIR,
instead of the output signal to interference plus noise power ratio (SINR), the
difference between the resulting output SINR and the maximal one is small
even when the noise power is strong and it converges to the maximum SINR
as noise power goes down.
The organization of this chapter is detailed as follows. The system model
of CPP-UWB system is given in Section 8.2 followed by the performance
comparison between different precoding systems in Section 8.3. The lower
bound on the output SNR when the data symbol is encoded by the estimated
channel phase is derived in Section 8.4. Next, the CLO problem is formulated
and a fast search algorithm for solving CLO is derived in Section 8.5. Finally,
the power spectral mask of the proposed CPP system is derived and the
related implement issue is discussed in Section 8.6.
where hi = pi αi is the channel gain of the ith path and Δ denotes the duration
of pulse waveform, which is set as the minimum multipath resolution in time
domain. In a baseband channel, the channel gain of the ith signal path hi is a
real number and is composed of two random variables: phase pi and amplitude
278 8 CPP-UWB
where Ω is the power of the first tap and γ = e−Δ/Γ is a positive number
less than 1 since Γ that controls the rate of power decay is greater than Δ.
The effective channel response length is determined by the value of Γ , i.e., the
channel tap, whose power is less than Ωγ L−1 is ignored. Four different values
of Γ , which are suitable for four different channel modes, namely, channel
model 1 to 4 (CM 1–4) in [41], are also specified in [25]. Please note that the
inter-arrival time between two consecutive multipath components is fixed in
our model. This model is suitable for the environment, where the multipath
is dense since multipath components in the same time domain grid can be
viewed as an effect channel tap [18, 86].
The block diagram of the CPP-UWB system is shown in Fig. 8.1, where the
receiver sends the L-bit estimated channel phase knowledge to the transmitter
for symbol precoding. Once the transmitter acquires the fed back phase infor-
mation, it synthesizes the codeword c(L) with the reversed phase information
as
(L) (L) 1
c(L) = [c0 , · · · , cL−1 ]t = √ [p̂L−1 , · · · , p̂0 ]t , (8.4)
L
√
where L in the dominator is used to normalize the total transmitted power
per symbol. Next, the BPSK symbol, b(i), is modulated onto the codeword
c(L) and the pulse waveform ws (t). Mathematically, the transmitted signal
becomes
∞ (L)
L−1
xs (t) = b(i) cj ws (t − jΔ − iT ), (8.5)
i=−∞ j=0
Fig. 8.1. The block diagram of the CPP-UWB system [[20] IEEE]
c
8.2 System Model and Features 279
where
( i
(L)
√1 p̂L−1+j−i pj αj , 0 ≤ i ≤ L − 1,
hi = L j=0
2L−2−i (8.8)
√1
L j=0 pi+j−L+1 p̂j αi+j−L+1 , L ≤ i ≤ 2L − 2.
If the fed back phase information is accurate, i.e., p̂i = pi ∀i ∈ {0, · · · , L − 1},
we have
1
L−1
(L)
hL−1 = √ αj , (8.9)
p̂i =pi L j=0
where all the path gains are summed after some delay. As compared to other
(L)
taps in h(L) , the amplitude of hL−1 is much stronger due to the coherent
combination of all multipath components. By taking advantage of the con-
centrated signal power, a single finger rake receiver (i.e., a matched filter
(MF)), can be applied to decode the transmit symbol as
# $
(L)
b̂(i) = sign rL−1 (i) . (8.10)
In addition, the focused signal power allows the symbol interval to be reduced
to improve the data rate without much ISI penalty.
The CPP-UWB system contains several interesting features, which are de-
tailed next.
280 8 CPP-UWB
Low Cost Receiver Design and Low Bit Rate Feedback Channel
Capacity
The TRP transmitter requires full channel information, which includes both
phase and amplitude of every channel tap. Usually, a high resolution analogy-
to-digital converter (ADC) is necessary at the TRP receiver to resolve each
channel gain, for example, a 10-bit ADC is employed at TRP receiver in
[56]. The higher resolution ADC also produces more bits for every channel
estimation and thus demands more channel capacity for information feedback.
On the contrary, the CPP transmitter demands only the knowledge of channel
phase, which can be identified by a 1-bit ADC. Therefore, the receiver design
employing a lower resolution ADC is cheaper while the required feedback
channel capacity is lower.
The channel measurement result in [103] implies that the spatial correlation
between two responses measured by two different receive antennas separated
by more than 10 in. does not exceed 0.1. Hence, the channel responses at dif-
ferent locations are almost independent. Since the returned phase information
is location dependent, the peak power is achievable only at a specific place
while the signal power is spread elsewhere. Thanks to the scattered signal
power, it is hard for eavesdroppers to acquire the transmitted data symbol if
they are far away from the desired receiver. Even if the phase knowledge is
wiretapped by the third party users during the phase information feedback
stage, they have to combat a serious ISI during the decoding process. Conse-
quently, CPP technique enhances the transmission security by the nature of
its design.
It is worthwhile to mention that the TRP scheme also supports a high
rate transmission and a secure communication link. In fact, with more chan-
nel knowledge involved in the precoding process, TRP can achieve a higher
data rate and more secure communication link than CPP. However, its huge
feedback overhead and expensive ADC receiver design impedes its deployment
in practice.
8.3 Performance Analysis of CPP-UWB Systems 281
Given the ideal phase knowledge at the transmitter, from (8.8), the averaged
peak power at the receiver can be calculated as
⎧⎛ ⎞2 ⎫
& '2 " ⎪
⎨ 1 L−1 ⎪
⎬
= E ⎝√ αj ⎠
(L)
P̄h(L) ≡ E hL−1 b(i)
L−1 ⎪
⎩ L j=0 ⎪
⎭
⎧ ⎫
1 ⎨ 2 ⎬
L−1 L−1
= E αj + αl αm . (8.11)
L ⎩ j=0
⎭
l,m=0;l=m
Because the channel gain is assumed to be independent for different path, and
the
√ first and the second moments of the Rayleigh random variable αj equal
πΩγ j
2 and Ωγ j , respectively, the averaged power in (8.11) can be further
simplified as
⎛ ⎞
Ω(1 − γ L ) Ωπ ⎝
L−1
P̄h(L) = + γ (l+m)/2 ⎠
L−1 L(1 − γ) 4L
l,m=0;l=m
⎛ 2 L−1 ⎞
Ω(1 − γ L ) Ωπ ⎝ l/2
L−1
= + γ − γl⎠
L(1 − γ) 4L
l=0 l=0
& 2
π ' Ω(1 − γ L ) Ωπ 1 − γ L/2
= 1− + . (8.12)
4 L(1 − γ) 4L 1 − γ 1/2
Let ς denote the ratio between the second and the first terms at the right-hand
side of (8.12), i.e.,
& L/2
'2
Ωπ 1−γ
4L 1−γ 1/2
ς= L) . (8.13)
1 − π4 Ω(1−γ
L(1−γ)
After some manipulations, it can be shown that ς can be bounded from below
as
π 2Γ 1 − eη/2
ς≥ , (8.14)
4 − π Δ 1 + eη/2
282 8 CPP-UWB
where η is defined as
ΔL 1
η=. (8.15)
Γ
For a typical value of η (e.g., η = 6.146), we have the following relationship
L/2 2
Ωπ 1−γ
P̄h(L) ≈ . (8.17)
L−1 4L 1 − γ 1/2
Please note that the total channel power in the UWB channel is computed as
L−1
2 L−1 1 − γL
P̄chl = E hj = Ωγ j = Ω . (8.18)
j=0 j=0
1−γ
Let χ, which is defined as the ratio between P̄h(L) and P̄chl , be the power
L−1
degradation factor due to incomplete channel information usage in the pre-
coding process. We can have
where L is substituted by Γ η/Δ to get the last equation. Recall that since
Δ/2Γ is usually a small number, we can obtain the following approximation
where the higher order terms in the Taylor series expansion of e−Δ/2Γ are
ignored. From (8.20) and (8.19), the degradation factor χ in (8.19) can be
further simplified as
1
It is worthwhile to point out that the power of last channel tap E{h2L−1 } satisfies
the following equation.
where L and γ is replaced by Γ η/Δ and e−Δ/Γ , respectively, to arrive the last
equation. The variable η governs the effective channel length since channel taps
whose power is less or equal to Ωe−η are ignored.
8.3 Performance Analysis of CPP-UWB Systems 283
π(1 − e−η/2 )
χ≈ . (8.21)
η(1 + e−η/2 )
As (8.21) suggests, the degradation factor χ is also controlled by η. For a
larger value of η, i.e., a longer channel duration, the power degradation factor
χ could be even lower. This is because the power of each tap shrinks √ with
respective to its tap index and we normalize the phase codeword by L in its
dominator.
The TRP scheme that demands a very high feedback overhead to deliver full
channel knowledge back to the transmitter is not practical. Two Pre-Rake
schemes, namely, partial Pre-Rake (PPR) and selective Pre-Rake (SPR), are
proposed to save the feedback channel capacity of TRP in [58]. It is shown in
[21] that given the channel model in Section 8.2, PPR technique concentrates
on the highest channel power on the average for a fixed number of feed back
channel taps. Since both CPP and PPR transmitters utilize partial channel
information, namely the channel phase in CPP and the first several channel
taps in PPR, it would be interesting to compare their required feedback quan-
tity when both precoders generates the same amount of peak power at their
receivers.
Assume ideal phase information is available at the transmitter. The peak
power generated by a l-chip phase codeword is
P̄h(l) = P̄h(L) L=l . (8.22)
l−1 L−1
Consider the channel model specified in Section 8.2. The signal power con-
centrated at the receiver end when only L̄ first channel taps are given to the
PPR transmitter is shown as [21]
1 − γ L̄
P̄P P R (L̄) = Ω . (8.23)
1−γ
Therefore, the number of channel taps L̄ necessary to produce the same peak
power as P̄h(l) can be found by solving the following equation
l−1
where
284 8 CPP-UWB
2
1 π π 1 − γ l/2
ρ = (1 − )(1 − γ l ) + (1 − γ). (8.26)
l 4 4l 1 − γ 1/2
Please note that we adopt the peak power as our criterion to compare the
feedback overhead of both PPR and CPP systems in (8.25). Therefore, their
BEP performance should be roughly the same when the received signal is ISI-
free. However, both system may have different output SINR when the symbol
interval M is less than L. The closed-form relationship between L̄ and l may
not be possible if both systems are evaluated at the same output SINR level.
This is because the output SINR is a highly nonlinear function of either L̄
and l. In fact, when the ISI power is not large, as shown in Example 8.1, the
gap between their BEP curves is small and (8.25) is still valid.
Example 8.1: Comparison Between CPP-UWB and PPR Systems
In this example, we compare the feedback overhead between CPP-UWB and
PPR systems when both precoding schemes accumulate the same amount
of power at the peak. The system parameters are chosen as Δ = 0.7 ns,
Γ = 20.5 ns (CM3), and L = 180. Two different values of symbol intervals,
say, M = 30 and 60, which correspond to data rate equal to 47.6 and 23.8
Mbps, respectively, are considered. Furthermore, the result shown here is the
average of 1000 channel realizations. Let the corresponding feedback number
of channel phase l be the same as the symbol interval in chip. The amount of
0
10
CPP-UWB/CLO (M=60)
PPR (L̄=21,M=60)
CPP-UWB/CLO (M=30)
PPR (L̄=30,M=30)
−1
10
BEP
−2
10
−3
10
−4
10
0 5 10 15 20
SNR (dB)
Fig. 8.2. BEP performance between CPP-UWB and PPR at different noise power
[[80] IEEE].
c
8.4 Phase Estimation and Performance Analysis 285
feedback channel taps for PPR L̄ computed by (8.25) are L̄ = 30 and 21 for
M=60 and 30, respectively. If a 10-bit ADC is utilized at the PPR receiver
[56], this equals to 300(30 ∗ 10) and 210(21 ∗ 10) bits per channel feedback. On
the other hand, CPP-UWB requires only 60 and 30 bits per feedback, which
is much smaller than that of PPR.
Next, let us consider their decoding performance. The corresponding BEP
performance at different input SNR are plotted in Fig. 8.2. It is observed from
Fig. 8.2 that the BEP gap between two systems is small for two different data
rates considered in this example. Therefore, the feedback overhead comparison
based on the concentrated signal power is valid even when ISI occurs.
where
N −1
1
n̂t = [n̂t,0 , · · · , n̂t,L−1 ]t = bt (l)nt (l) (8.28)
N
l=0
and nt (l) ∼ N (0, N0 /2IL ) is the AWGN noise vector corresponding
to the lth training symbol. Also, it can be shown easily that n̂t ∼
N (0, N0 /2N IL ).
286 8 CPP-UWB
3. The channel phase is thus measured by the sign of every tap in the aver-
aged response r̂t . Thus, the channel phase estimate is given as
P̂ = sign{r̂t }. (8.29)
1
L−1 L−1
1
= Ωγ j + E {pj p̂j αj } E {pm p̂m αm } .
L j=0 L
j,m=0;j =m
(8.31)
Please note that whether the ith phase estimate is correct depends on the
magnitude of αi and the noise power of the ith element of n̂t . Conditioned on
one channel realization, the probability of correct phase estimate is
P r p̂i = pi αi = P r{p̂i = 1αi , pi = 1}P r{pi = 1}
+ P r{p̂i = −1αi , pi = −1}P r{pi = −1}
= P r pi αi + n̂t,i > 0αi , pi = 1 P r{pi = 1}
+ P r pi αi + n̂t,i < 0αi , pi = −1 P r{pi = −1}
/
= 1−Q 2
2N αi /N0 . (8.32)
8.4 Phase Estimation and Performance Analysis 287
From (8.32) and (8.33), the expected value of p̂i pi αi conditioned on the chan-
nel gain αi is computed as
E p̂i pi αi αi = αi P r{p̂i = pi } − αi P r{p̂i = pi }
/
= αi − 2αi Q 2N α2i /N0 . (8.34)
18
16
SNR = 20 dB
14
12
OutputSNR (dB)
10 SNR = 15 dB
4 SNR = 10 dB
2
20 40 60 80 100 120 140 160 180 200
Number of Training Symbols
Fig. 8.3. The output SNR vs the number of training symbols [[80] IEEE].
c
rate. In addition, the bound becomes tie as either N or input SNR increases
since the gap between Q(x) and its upper bound becomes small as x goes up.
Furthermore, the degradation between input SNR and ideal output SNR
is around 3.3 dB. With (8.15), the value of η in this example is computed as
180 ∗ 0.7
η= ≈ 6.146. (8.37)
20.5
By substituting (8.37) into (8.21), we have the peak power degradation as
π(1 − e−η/2 )
χ≈ = 0.4659 = −3.3 dB, (8.38)
η(1 + e−η/2 )
η=6.146
(MSE) of the phase estimate is zero as long as the number of training symbol
is large enough.
–40
–60
–80
–100
0 50 100 150 200 250 300 350 400
time (×0.7n s)
Codeword Length = 30
0
Peak = – 4.2 dB
–20 SIR = 15.7 dB
Power( dB)
–40
–60
–80
0 50 100 150 200 250
time (×0.7n s)
Fig. 8.4. The received signal power for different codeword lengths [[80] IEEE].
c
290 8 CPP-UWB
respectively. It is observed from Fig. 8.4 that the use of more phase informa-
tion that combines more channel taps at the receiver output could produce
more peak signal power as well as more interference from the neighboring
symbols. Therefore, the SIR generated by a longer phase code is actually
worse.
Although the focused signal power allows us to shrink the symbol in-
terval to rise the data transmission rate without much ISI, the more phase
knowledge at the transmitter may not reduce the symbol error rate at the
receiver as Example 8.3 suggests. Consider a fixed symbol interval, an op-
timal codeword length, which renders the highest output SIR at the CPP
receiver output, exists. Furthermore, since the optimal codeword length is
usually less than L, knowing the best codeword size reduces the feedback
burden, too.
Our CLO problem is based on the following assumption that the chan-
nel duration L is assumed to be an integer dividable by the symbol interval
M , i.e., L = KM , where K is a positive integer. The assumption here is
not as restrict as it first appears since we can always truncate or zero-pads
the original channel response to satisfy this requirement when the ampli-
tude of the last channel tap becomes very small. We will show later that
the system bit-error-probability (BEP) of this altered channel is almost in-
distinguishable from that of the original channel using one example later in
this section.
When a data symbol is encoded by a l-chip long codeword c(l) , i.e.,
(l) (l) 1
c(l) = [c0 , · · · , cl−1 ]t = √ [pl−1 , · · · , p0 ]t , (8.39)
l
(l) (l)
r(l) (i) = [r0 (i), · · · , rL+l−2 (i)]t
= H(l) c(l) b(i) + I (l) (i) + n(l) (i)
= h(l) b(i) + I (l) (i) + n(l) (i),
where H(l) is the (L+l−1)×l Toeplitz matrix, I (l) (i) and n(l) (i) are the inter-
(l) (l)
ference and AWGN vectors, respectively, h(l) = H(l) c(l) = [h0 , · · · , hL+l−1 ]t ,
and
⎧ 1 i
⎪ √
⎨ l j=0 pl−1+j−i pj αj , 0 ≤ i ≤ l − 1,
(l) l−1
j=0 pj pj+i−l+1 αj+i−l+1 , l ≤ i ≤ L − 1,
√1
hi = (8.40)
⎪
⎩ √1 l−i+L−2
l
The codeword c(l) leads to the coherent combination of the first l channel taps
(l) (l)
and the peak signal power occurs at hl−1 (i). The average output SIR at rl−1
is equal to
8.5 Codeword Length Optimization (CLO) in an ISI Channel 291
⎧
& '2 " ⎨(L−1)/M
& '2 "
(l) (l)
ν̄ (l) = E hl−1 b(i) × E hl+jM−1 b(i − j) +
⎩
j=1
⎫−1
(l−1)/M
& '2 "⎬
(l)
E hl−jM−1 b(i + j) . (8.41)
⎭
j=1
where
j/M
# $
2
I (j) ≡ E (αj−mM pj pj−mM b(i + m)) +
m=1
(L−j)/M
# $
2
E (αj+nM pj pj+nM b(i − n))
n=1
j/M (L−j)/M
= E α2j−mM + E α2j+nM
m=1 n=1
j/M (L−j)/M
= Ωγ j−mM + Ωγ j+nM
m=1 n=1
292 8 CPP-UWB
The proof of the above Lemma is straightforward and thus omitted here.
When the codeword length is not greater than M , we can determine the best
code length based on the following Proposition.
Proof: Let k denote the length of codeword less or equal to M . The output
SIR of codeword c(l) , ν̄ (k) , is first simplified as
& "
k−1 '2 # k−1 $
E j=0 αj E
k−1 2
αj + i,j=0;i=j αi αj
j=0
ν̄ (k) = k−1 (j) = k−1
j=0 I I (0) j=0 d2j
& '
k−1 2j π k−1 i i+j−1
Ω j=0 d + 2 i=1 j=1 d
=
(0)
k−1 2j
I j=0 d
k−1 i i+j−1
π i=1 j=1 d π
= β0 + β 0 k−1 2j = β0 + β0 g(k), (8.45)
2 j=0 d
2
8.5 Codeword Length Optimization (CLO) in an ISI Channel 293
k−1 i k−1
where d = γ 1/2 < 1 and g(k) = ( i=1 j=1 di+j−1 )/( j=0 d2j ) > 0 ∀k. It
is shown in the part A of the Appendix in [20] that g(k) is a monotonically
increasing function of k for 1 ≤ k ≤ M . Therefore, we can conclude that the
maximum SIR must occur at k = M . !
Next, consider the case when the code length l exceeds M and it is de-
composed as
l = kM + l̄, (8.46)
Proposition 8.3. Let the codeword length l be given by (8.46). The output
SIR, ν̄ (l) , is upper bounded by either ν̄ (kM) or ν̄ ((k+1)M) .
Proof: We try to establish this Proposition by showing that either one of the
following statements is true.
1. If ν̄ ((k+1)M) ≥ ν̄ (kM) , maxkM≤l≤(k+1)M ν̄ (l) = ν̄ ((k+1)M) .
2. If ν̄ (kM) ≥ ν̄ ((k+1)M) , maxkM≤l≤(k+1)M ν̄ (l) = ν̄ (kM) .
The proof of the first statement under the assumption ν̄ ((k+1)M) ≥ ν̄ (kM) is
given next. If ΔS( l̄)
ΔI(l̄)
≤ S(kM)
I(kM) , we recall the fact that
ΔS(l̄) S(kM)
from Lemma 8.1. Otherwise, consider the case where ΔI(l̄)
≥ I(kM) . It is
shown in Lemma 2 of [20] that ΔS( l̄)
ΔI(l̄)
is an increasing function with respective
¯ Therefore, we ΔS(l̄) ΔS(M)
to l. have ΔI(l̄) ≤ ΔI(M) , and then use Lemma 8.5.2 to get
The first statement is then approved based on (8.48) and (8.49). The second
statement that can be proved similarly is omitted here. !
Thus, we obtain the fast search algorithm that is given in the following propo-
sition.
Proposition 8.4. A fast search algorithm that identify the optimal code
length Lopt can be written as
As compared with the exhaustive search algorithm in (8.42), the fast algorithm
reduces the search number by a factor of M .
Another possible criterion for CLO is to consider both AWGN and ISI
jointly. That is, we can maximize the output SINR, i.e.,
⎛ # $ ⎞
l−1
E ( j=0 αj )2
L̂opt = arg max ⎝ l−1 ⎠. (8.53)
0<l≤L l · (N0 /2) + j=0 I (j)
The fast search algorithm in Proposition 8.4 may not give the maximum
output SINR, especially in the low SNR environment. In fact, as suggested
in the following example, the performance gap between these two criteria as
specified in (8.51) and (8.53) is small even in the presence of high noise power.
Example 8.4: Residual ISI Suppression of CPP-UWB Systems
In this example, we show that the performance of CPP-UWB systems can
be improved by adjusting its codeword length according to the proposed fast
search algorithm in Section 8.5. The system parameters are remained the same
as those in the Example 8.1. To simplify our discussion, the feedback phase
information is assumed to be perfect. The BEP curves of CPP-UWB system
with and without CLO are drawn in Fig. 8.5. In addition, the performance
curves of CPP-UWB system with different codeword length optimization cri-
teria given in (8.53) is presented for the performance benchmark. According
8.5 Codeword Length Optimization (CLO) in an ISI Channel 295
0
10
CPP−UWB (M = 60)
CPP−UWB/CLO (M = 60)
CPP−UWB/SINR max (M = 60)
CPP−UWB (M = 30)
−1
10 CPP−UWB/CLO (M = 30)
CPP−UWB/SINR max (M = 30)
BEP
−2
10
−3
10
−4
10
0 5 10 15 20
SNR (dB)
Fig. 8.5. The BEP performance improvement with different ISI suppression schemes
at different data rates [[80] IEEE].
c
to our simulation result, the optimal codeword size found by the proposed
fast searching algorithm for M = 30 and 60 are l=30 and 60, respectively. It
is observed from Fig. 8.5 that the fast algorithm provides additional 2 dB gain
at BEP equal to 10−3 as compared with the conventional CPP-UWB system
using full phase knowledge. For a low data rate case, the decoding perfor-
mance between two different codeword length choosing criteria is very small.
On the contrary, for a high data rate case, the performance gap between two
phase code designs reduces as signal power increases.
To better illustrate this idea, let us consider the output SINR of CPP-
UWB systems at different codeword length. Here we fix the symbol interval
at M = 30 and the corresponding output SINR is plotted as a function of
different code length under different input SNR in Fig. 8.6. The lower six
curves represents the cases that the input SNR is equal to 0–25 dB with a
step size of 5 dB while the top one denotes the case when the noise power is
very weak, i.e., the output SIR. The circle and triangle marks in each curve
denotes the maximum output SIR and SINR, respectively. From Fig. 8.6, the
codeword length determined by different criteria converges when the input
SNR is greater or equal to 20 dB. Even though different design criteria requires
different amount of phase information when the SNR is less than 20 dB, the
output SINR gap between two different size of phase codes is indeed small.
In the next example, we will validate the previous claim about the channel
length duration for the development of our fast search algorithm.
296 8 CPP-UWB
20
SNR = ∞
SNR =25 dB
15
10
Output SINR (dB)
–5 SNR = 0 dB
–10
SINR maximized
SIR maximized
–15
0 20 40 60 80 100 120 140 160 180
Codeword Length
Fig. 8.6. Output SINR with different codeword lengths at different input SNR
values [[80] IEEE].
c
-1
10
BEP
-2
10
-3
10
-4
10
0 2 4 6 8 10 12 14 16 18 20
SNR (dB)
Fig. 8.7. The BEP performance comparison between two systems using the approx-
imated and the real channels, where Δ = 0.7 ns, Γ = 20.5 ns (CM3) [[80] IEEE].
c
−40
−45
UWB EIRP Emission level (dBM)
−50
−55
−60
Indoor Limit
Part 15 Limit
−65
−70
3 4
10 10
Frequency (MHz)
Fig. 8.8. The power spectral mask of FCC for UWB transmitters in [39].
where
2 ∞ K−1 M−1
Es
x1 (t) = b(l − k)pL−1−kM−j δ(t − lM Δ − jΔ). (8.55)
L j=0
l=−∞ k=0
(Tf )
The time-averaged autocorrelation function of x1 (t) is equal to
1 # $ Es Es
(T ) (T )
E x1 f (t1 )x1 f (t2 ) = 2αM Kδ(t1 − t2 ) = δ(τ ), (8.58)
2Tf 2T Lα T
8.6 Consideration of FCC Power Spectral Mask 299
9.1 Conclusion
9.1.1 Chapter 2
9.1.2 Chapter 3
signal dimension. As a result, the overall signal power at the receiver output is
reduced. Finally, the Tx-Wiener precoding is also proposed to strike a balance
between signal power gain and interference suppression.
9.1.3 Chapter 4
9.1.4 Chapter 5
9.1.5 Chapter 6
9.1.6 Chapter 7
In Chapter 7, we show how different precoding scheme, i.e. CI code, can in-
crease the number of MAI-free users in MC-CDMA system with CFO. More-
over, thanks to the MAI-free property of the proposed code selection schemes,
if the system is to be operated in a fully-loaded situation, we can greatly sim-
ply the computational complexity for MAI suppression since each user does
not need to deal with the interference from all other users.
9.1.7 Chapter 8
CPP scheme is not only simpler in design but also computationally more effi-
cient than the TRP-based system. A performance lower bound on the output
SNR is derived to evaluate the system performance when the transmit symbol
is encoded by the estimated phase information acquired by a set of training
symbols. The concentrated signal power at the CPP receiver is exploited to
enhance the data transfer rate by reducing the symbol interval without much
ISI degradation. In the high date transmission case, a better system perfor-
mance can be achieved by optimizing the codeword length so that its output
SIR is maximized. The closed form solution is not possible since the optimiza-
tion problem is a highly nonlinear. Instead of resorting to an exhaustive search
scheme, a fast search algorithm is derived to find out the optimal codeword
length with low computational burden.
MAI-free. In this case, the interferers for each target user become fewer. Since
the complexity of MUD directly related to the number of interferers, reducing
number of interferers can reduce the complexity for MUD. In addition, since
the active users may not always be fully-loaded, once the active user number
is below the supportable MAI-free user number, there is no need to perform
MUD while those active users can still enjoy an MAI-free transmission.
[30] A. Dekorsy, V. Kühn, and K.-D. Kammeyer. Exploiting time and fre-
quency diversity by iterative decoding in OFDM-CDMA systems. In
IEEE Globlecom, 5:2576–2580, Dec. 1999.
[31] J. H. Deng and T. S. Lee. An iterative maximum SINR receiver for mul-
ticarrier CDMA systems over a multipath fading channel with frequency
offset. IEEE T. Wirel. Commun., 2:560–569, May 2003.
[32] D. Divsalar and M. K. Simon. CDMA with interference cancellation
for multiprobe missions. JPL TDA Progress Report, 42-120:40–53, Feb.
1995.
[33] G. F. Edelmann, T. Akal, W. S. Hodgkiss, S. Kim, W. A. Kuperman,
and H. C. Song. An initial demonstration of underwater acoustic com-
munication using time reversal. IEEE J. Oceanic Eng., 27:602–609,
2002.
[34] R. Esmailzadeh, E. Sourous, and M. Nakagawa. Prerake diversity com-
bining in time-division duplex CDMA mobile communications. IEEE
T. Veh. Technol., 48(3):795–801, May 1999.
[35] M. V. Eyuboglu and Jr. G. D. Forney. Combined coding and equal-
ization using trellis precoding. In Proc. of CSI Workshop on Advanced
Communications Technologies, Ruidoso, NM, May 1989.
[36] M. V. Eyuboglu and Jr. G. D. Forney. Trellis precoding: combined
coding, precoding and shaping for intersymbol interference channels.
IEEE T. Inform. Theory, 38(2):301–314, 1992.
[37] M. V. Eyuboglu and S. U. H. Qureshi. Reduced-state sequence estima-
tion with set partitioning and decision feedback. IEEE T. Commun.,
36:13–20, 1988.
[38] M. V. Eyuboglu and S. U. H. Qureshi. Reduced-state sequence estima-
tion for coded modulation on intersymbol interference channels. IEEE
J. Select. Areas Commun., 7(6):989–995, 1989.
[39] Federal Communications Commission (FCC). Revision of Part 15
of the Commission’s Rules Regarding Ultra-Wideband Transmission
Systems, First Report and Order, ET Decoet 98-153, FCC 02-48.
adopted/released Feb. 14/Apr. 22, 2002.
[40] M. Fink. Time reversal of ultrasonic fields-part I: basic principles. IEEE
T. Ultrason. Ferroelectr. Freq. Control, 39(5):555–566, Sep. 1992.
[41] J. R. Foerster. Channel modeling sub-committe report final. IEEE
P802.15 WPAN P802.15-02/490r1-SG3a, Feb. 2003.
[42] G. D. Forney. Trellis shaping. IEEE T. Inform. Theory, 38:281–300,
1992.
[43] Jr. G. D. Forney and A. R. Calderbank. Coset codes for partial response
channels; or, coset codes with spectral nulls. IEEE T. Inform. Theory,
35:925–943, 1989.
[44] G. D. Forney and M. V. Eyuboglu. Combined equalization and coding
using precoding. IEEE Commun. Mag., 29:25–34, 1991.
310 References
MC-CDMA, 117, 118, 122, 123, 166, Hadamard-Walsh Code, 124, 137
167, 169–171, 209, 210, 216–218, MAI decreasing rate, 129
221, 224, 230, 233, 234, 237, 238 self CFO, 161
MF, 47, 48, 51, 52, 54, 55, 58, 60 time offset, time asynchronism, 132
MIMO, 67 time-variant channel, 185
MISO, 52 polyphase decompositions, 31
MMSE receiver, 47 Polyphase Identity, 31
MRC, 209, 211, 212, 218, 220 polyphase representation, 35
MUD, 123, 166, 209, 220, 222, 225, 233, post-cursor ISI, 57
234 Power Spectral Mask, 297
multi-input single-output, 52 PPR, 281, 283
multipath, 13, 39, 47, 49, 52, 54, 55, pre-cursor ISI, 57
275, 276, 279, 318 Pre-Rake, 52, 54, 275
multipath, 47 Precoded Multiuser OFDM (PMU-
multiple access interference, 47 OFDM), 117
multiple access interference (MAI), 190,
192, 195, 237, 238, 244, 246 Rake receiver, 47
multirate, 29, 30, 32
multiuser detection, 118, 119, 123, 211 SC-CP, 41–44
multiuser detector, 47 MMSE equalization, 44
multiuser OFDM, 117, 119, 230, 318 zero forcing, 43
multiuser OFDM , 230 SC-ZP, 45
MMSE equation, 45
Noble Identities, 30 zero forcing, 45
selective Pre-Rake, 283
OFDM, 29 shaping constellation expansion ratio
channel information, 40 (CER), 23
cyclic prefix, 37 shaping gain, 22
multirate representations, 29, 32 sign bit shaping, 23
precoding, 41, 46 signal power focusing, 276
zero padding, 39 signal to interference power ratio, 277
OFDMA, 118, 122, 123, 146–153, signal-to-noise power ratio, 276
166–171, 181–183, 185, 202–205, single carrier system with cyclic prefix,
207, 208 41
single carrier system with zero padding,
PAPR, 42 45
parallel interference cancellation (PIC), Singular value decomposition (SVD), 68
247, 248, 255 SIR, 277, 290–294
partial Pre-Rake, 281 SNR, 276
peak-to-average power ratio, 42 SPR, 283
phase estimation, 286 syndrome
phase precoding, 275 syndrome sequence, 25
PMU-OFDM syndrome former, 25, 26
approximately MAI-free, 121 syndrome
carrier frequency offset (CFO), syndrome sequence, 25
frequency asynchronism, 151
code design, 139 TDD, 48, 275, 318
code priority, 171, 183, 184, 200, 202 TDD-DS-CDMA, 318
Doppler effect, 188 TDD-DS-CDMA, 52
Index 319
the additive white Gaussian noise, 279 TRP, 52, 54, 275, 280, 283
time division duplex, 48 Tx-MF, 48, 52
time-reversal prefilter, 52, 275 Tx-Wiener, 48, 59
Tomlinson–Harashima precoding Tx-ZF, 48, 56
(THP), 15, 19, 20
ultra wideband, 275
transmit matched filter, 48
UWB, 275
transmit Wiener filter, 48
transmit zero-forcing filter, 48 Viterbi algorithm, 24
Trellis precoding, 27
Trellis Shaping, 22 WSSUS, 186