ee360 – lecture 5 outline

35
EE360 – Lecture 5 Outline • Announcements: Revised lecture 4 slides (minus typos) posted Paper summary deadlines: 4/27, 5/23 Project deadlines: Abstract 5/11, Progress report 6/6 MAC Channels Time Division and GSM Direct Sequence Spread Spectrum Frequency Hopping • Tradeoffs User Capacity

Upload: brede

Post on 25-Feb-2016

52 views

Category:

Documents


2 download

DESCRIPTION

EE360 – Lecture 5 Outline. Announcements: Revised lecture 4 slides (minus typos) posted Paper summary deadlines: 4/27, 5/23 Project deadlines: Abstract 5/11, Progress report 6/6 MAC Channels Time Division and GSM Direct Sequence Spread Spectrum Frequency Hopping Tradeoffs User Capacity. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: EE360 – Lecture 5 Outline

EE360 – Lecture 5 Outline• Announcements:

– Revised lecture 4 slides (minus typos) posted– Paper summary deadlines: 4/27, 5/23– Project deadlines: Abstract 5/11, Progress report 6/6

• MAC Channels• Time Division and GSM• Direct Sequence Spread Spectrum• Frequency Hopping• Tradeoffs• User Capacity

Page 2: EE360 – Lecture 5 Outline

Multiple Access Channels

• Multiple users transmitting to a single receiver• Signals have different path gains (near-far problem)• Channel can be divided using TD, FD, or CD

Page 3: EE360 – Lecture 5 Outline

Time Division Frames

Preamble Information Message Guard Time

Frame (Tf)

Slot 1 Slot 2 Slot 3 Slot N...

Header SynchBits

Control,Signaling CRCInfo. Bits

(Training)GuardTime

• In TDD half the slots are for upstream traffic and half for downstream traffic• Generic structure: not all frames used in all systems, and order may vary

Page 4: EE360 – Lecture 5 Outline

Frame Details

• Preamble contains address and sync information used by base and mobile

• Guard times allow sync of receivers between different frames

• Users are assigned a position in each frame (delay of Tf between bursts)

• Superframes (frames of frames) may have additional control frames

Page 5: EE360 – Lecture 5 Outline

Slot Structure• Header: guard (ramp) time for receiver synch. between slots

• Synch: Used to establish bit synch (also for equalizer training)

• Control: Used for handshaking, control, and supervisory messages

• Info. Bits: Coded or uncoded information bits, may include pilot symbols/sequences for channel measurement and equalizer training.

• Guard Time: Prevents overlap at base of slots arriving from different terminals.

Page 6: EE360 – Lecture 5 Outline

Requirements• Equalizer requirements: adaptive equalizer must compensate for time-varying ISI.

– Minimum N=/Ts symbols for training.– For =20sec and Rb=280 Kbps, N=6 minimum (GSM: N=26)– If Tf~Tc, need to retrain every frame (GSM: Tf=4.615 ms, Tc=1/fD=12.5ms for

fD=80 Hz, retrains every frame).

• Guard time requirements: must compensate for LOS propagation delay (R/c for R the cell radius) and delay spread due to multipath (reverse link only).– No delay spread: Tg>R/c=3.3 sec for R=1Km.– Do not need guard time for LOS propagation delay if base station synchronizes

to received (instead of transmitted) signal.– With delay spread : Tg>R/c+, but typically have a smaller guard time.

Page 7: EE360 – Lecture 5 Outline

GSM Slots

• Multiframe has 26 frames (each frame is 4.615ms), with 24 for data and 2 for control. Each call in progress assigned a control channel.

• Slot time is 577s• 26b equalizer training designed to handle delay spread up

to 20 sec. (equalizer design not part of spec.)• Guard time less than maximum • Flag bits distinguish voice from data• Transmission rate approx. 270 Kb/s

Tail3b

Guard8.25s

Data57b

Flag1b

Equal. Train26b

Flag1b

Data57b

Tail3b

Page 8: EE360 – Lecture 5 Outline

Spread Spectrum MAC• Basic Features

– signal spread by a code– synch. between pairs of users– compensation for near-far problem (in MAC channel)– compression and channel coding

• Spreading Mechanisms– direct sequence multiplication– frequency hopping

Note: spreading is 2nd modulation (after bits encoded into digital waveform, e.g. BPSK). DS spreading codes are inherently digital.

Page 9: EE360 – Lecture 5 Outline

Direct Sequence

• Chip time Tc is N times the symbol time Ts.• Bandwidth of s(t) is N+1 times that of d(t).• Channel introduces noise, ISI, narrowband and multiple access interference.

– Spreading has no effect on AWGN noise– ISI delayed by more than Tc reduced by code autocorrelation– narrowband interference reduced by spreading gain.– MAC interference reduced by code cross correlation.

LinearModulation.(PSK,QAM)

d(t)X

Sci(t)

SS Modulator

s(t)Channel X

Sci(t)

Linear Demod.

SS Demodulator

Synchronized

Page 10: EE360 – Lecture 5 Outline

BPSK Exampled(t)

sci(t)

s(t)

Tb

Tc=Tb/10

Page 11: EE360 – Lecture 5 Outline

Spectral Properties

Original Data Signal

Narrowband Filter

Other SS Users

Demodulator Filtering

ISI

Modulated Data

Data Signal with Spreading

Narrowband Interference

Other SS Users

Receiver Input

ISI

8C32810.117-Cimini-7/98

Page 12: EE360 – Lecture 5 Outline

Code PropertiesAutocorrelation:

Cross Correlation

• Good codes have ()=() and ij()=0 for all .– ()=() removes ISI– ij()=0 removes interference between users– Hard to get these properties simultaneously.

sT

cicis

dttstsT 0

)()(1)(

sT

cjcis

ij dttstsT 0

)()(1)(

Page 13: EE360 – Lecture 5 Outline

ISI Rejection• Transmitted signal: s(t)=d(t)sci(t).• Channel:h(t)=(t)+(t-).• Received signal: s(t)+s(t-)• Received signal after despreading:

• In the demodulator this signal is integrated over a symbol time, so the second term becomes d(t-)().– For ()=(), all ISI is rejected.

)()()()()()()()()()()( 2

tststdtdtststdtstdtstr

cici

cicicici

Page 14: EE360 – Lecture 5 Outline

MAC Interference Rejection• Received signal from all users (no multipath):

• Received signal after despreading

• In the demodulator this signal is integrated over a symbol time, so the second term becomes

– For ij()=0, all MAC interference is rejected.

)()()()()()()(,1

2 tststdtstdtstr cijcj

M

ijjjjciici

)()()()(11

j

M

jcjjjj

M

jj tstdtstr

)()(,1

jij

M

ijjjj td

Page 15: EE360 – Lecture 5 Outline

Walsh-Hadamard Codes

• For N chips/bit, can get N orthogonal codes• Bandwidth expansion factor is roughly N.• Roughly equivalent to TD or FD from a capacity

standpoint• Multipath destroys code orthogonality.• Used in IS-95 MAC

Page 16: EE360 – Lecture 5 Outline

Semi-Orthogonal Codes• Maximal length feedback shift register sequences have good

properties– In a long sequence, equal # of 1s and 0s.

• No DC component– A run of length r chips of the same sign will occur 2-rl times in l chips.

• Transitions at chip rate occur often.– The autocorrelation is small except when is approximately zero

• ISI rejection.– The cross correlation between any two sequences is small (roughly ij=G-

1/2 , where G=Bss/Bs)• Minimizes MAC interference rejection

Page 17: EE360 – Lecture 5 Outline

Frequency Hopping

• Spreading codes used to generate a (slow or fast) “hopping” carrier frequency for d(t).• Channel BW determined by hopping range.

– Need not be continuous.• Channel introduces ISI, narrowband, and MAC interference

– Hopping has no effect on AWGN– No ISI if d(t) narrowband, but channel nulls affect certain hops.– Narrowband interference affects certain hops.– MAC users collide on some hops.

NonlinearModulation.(FSK,MSK)

d(t)

Sci(t)

FH Modulator

s(t)Channel

Nonlinear Demod.

FH Demodulator

VCO

FMMod

VCO

FMDemod

Sci(t)

Page 18: EE360 – Lecture 5 Outline

Spectral Properties

Di(f-fc)

Dj(f-fc)

1 3 2 4

1 2 34

Page 19: EE360 – Lecture 5 Outline

Slow vs. Fast Hopping

• Fast Hopping - hop on every symbol– NB interference, MAC interference, and channel nulls affect just one

symbol.– Correct using coding

• Slow Hopping - hop after several symbols– NB interference, MAC interference, and channel nulls affect many

symbols.– Correct using coding and interleaving if # symbols is small.– Slow hopping used in cellular to average interference from other cells

Page 20: EE360 – Lecture 5 Outline

FH vs. DS• Linear vs. Nonlinear

– DS is a linear modulation (spectrally efficient) while FH is nonlinear

• Wideband interference/jamming– Raises noise spectral density, affects both techniques equally.

• Narrowband interference/jamming– DS: interfering signal spread over spread BW, power reduced by spreading gain in demodulator– FH: interference affects certain hops, compensate by coding (fast hopping) or coding and interleaving (slow

hopping).

• Tone interference– DS: tone is wideband, raises noise floor for duration of the tone. Compensate by coding (tone

duration=symbol time) or coding and interleaving (tone duration>symbol time). Similar affect as NB interference in FH.

– FH: Tone affects certain hops. Compensate by coding or coding and interleaving.

Page 21: EE360 – Lecture 5 Outline

FH vs. DS• ISI Rejection

– DS: ISI reduced by code autocorrelation.– FH: ISI mostly eliminated.

• MAC interference– DS: MAC interference reduced by cross correlation of spreading codes. Each additional user raises noise

floor.• Overall SNR reduced

– FH: MAC interference affects certain hops. Each additional user causes more hops to be affected.• More bits likely to be received in error.

• Overlay systems: high-power NB interferers– Similar impact as with regular interferers– DS: Noise floor raised significantly – FH: Hops colliding with interferers are lost– Can notch out interfering signals

Page 22: EE360 – Lecture 5 Outline

Evolution of a Scientist turned Entrepreneur

• “Spread spectrum communications - myths and realities,” A.J. Viterbi, IEEE Comm. Magazine, May ‘79 (Linkabit 5 years old - A TDMA company).

• “When not to spread spectrum - a sequel,” A.J. Viterbi, IEEE Comm. Magazine, April 1985 (Linkabit sold to M/A-Com in 1982)

• “Wireless digital communications: a view based on three lessons learned,” A.J. Viterbi, IEEE Comm. Magazine, Sept.’91. (Qualcomm CDMA adopted as standard).

Page 23: EE360 – Lecture 5 Outline

Myths and Realities• Myth 1: Redundancy in error correction codes spreads signal bandwidth and thereby

reduces processing gain – Reality: Effective processing gain increased by coding by considering symbol rate and

energy– Reality today: coded modulation more efficient even without symbol argument. But

tradeoffs between coding and spreading an open issue.

• Myth 2: Error correction codes only good against uniform interference– Reality: Not true when coding combined with spread spectrum, since SS averages

interference. – Reality today: Unchanged.

• Myth 3: Interleaving destroys memory which can be used to correct errors, hence interleaving is bad

– Reality: Memory preserved by soft-decisions even with an interleaver – Reality today: Unchanged, but interleavers may require excessive delays for some

applications.

Page 24: EE360 – Lecture 5 Outline

• Myth 4: Direct sequence twice as efficient as frequency hopping– Myth=Reality. Argument is that DS is coherent and that accounts for 3dB

difference. Analysis shows that higher level signaling alphabets does not help FH performance with partial band jammer.

– Reality today: A true efficiency tradeoff of FH versus DS has not been done under more general assumptions. FH typically used to average interference. Appealing when continuous spreading BW not available.

Page 25: EE360 – Lecture 5 Outline

When not to Spread Spectrum - A Sequel

• Conclusion 1: When power is limited, don’t contribute to the noise by having users jam one another.

• Conclusion 2: Network control is a small price to pay for the efficiency afforded by TDMA or FDMA– Power control is a big control requirement.

• Conclusion 3: Interference from adjacent cells affects the efficiency of TDMA or FDMA less severely than in CDMA.

• Conclusion 4: Treating bandwidth as an inexpensive commodity and processing as an expensive commodity is bucking current technology trends.

• Caveat: Application was small earth terminals for commercial satellits.

Page 26: EE360 – Lecture 5 Outline

Three Lessons Learned

• Never discard information prematurely

• Compression can be separated from channel transmission with no loss of optimality

• Gaussian noise is worst case. Optimal signal in presence of Gaussian noise has Gaussian distribution. So self-interference should be designed as Gaussian.

Page 27: EE360 – Lecture 5 Outline

Realities• Never discard information prematurely

– Use soft-decisions and sequence detectors, if complexity okay.• Compression can be separated from channel transmission

– For time-invariant single-user channels only.• Self-interference should be designed as Gaussian

– Based on Viterbi’s argument, this represents a saddle (not optimal) point.

– If the self-interference is not treated as interference, then Gaussian signaling is suboptimal (by Shannon theory).

Page 28: EE360 – Lecture 5 Outline

MAC Capacity• User Capacity

– How many users can be accommodated in the channel given performance specs.

- Assumes identical users and white noise model for interference

• Shannon Capacity Region– Upper bound on rate vector that all users can achieve

simultaneously– No complexity or delay constraints.– Optimal signaling and reception (unless constraints are added)– Asymptotically small error probabilty.– Signals from other users not treated as interference

Page 29: EE360 – Lecture 5 Outline

User Capacity• Applicable to CDMA, since TDMA and FDMA have fixed capacity

(# of channels).

• S/(N+I(M)) determined based on the total number of users M and the system model.– Can be deterministic or random (fading).– Interference I(M) modeled as AWGN

• Based on the modulation, coding, channel model, etc., we find the probability of bit error Pe=f[S/(N+I(M))]

• For a given performance Pe we invert the above expression to get the maximum possible M.– Often set N=0 to simplify inversion, implies an interference-

limited system.

Page 30: EE360 – Lecture 5 Outline

Probability of Error• Coherent BPSK: for m users, and a spreading gain G:

• m is typically random. For L total users each with probability p of active transmission and voice activity factor :

2/1

320

G

m

bE

NQPe

mkmmkkLpkp

kL

QPG

m

bE

NL

k

k

me

)1()1(2/1

320

0 0

Note that Pe is concave in m

Page 31: EE360 – Lecture 5 Outline

Pe Approximation

• By concavity of Pe and Jensen’s inequality:

.,2/1

~32

0 LpMQePePG

M

bE

N

Use RHS as approximation for Pe

``Spread spectrum for mobile communications”, Pickholtz, Milstein, Schilling

Page 32: EE360 – Lecture 5 Outline

Effective Energy/Symbol

– M is average number of active users.– r is the code rate– K is the out-of-cell interference ratio (equals zero for a purely MAC

channel) – is the voice activity factor– N is the number of chips per symbol– Factor of 2/3 assumes rectangular pulses, will decrease for other shapes.– Assumes no ISI, flat-fading, or diversity gain.

)1(

320

0

KMNr

EN

NE

seff

s

Page 33: EE360 – Lecture 5 Outline

Required Es/N0• Target Pe

• Invert target Pe to get required Es/N0

• Example: DPSK

targete

reqdo

se P

NEP

1target

e

reqdo

s PNE

targetln5. ereqdy

e PeP

Often cannot get reqd in closed form: Must usenumerical techniques or obtain from BER curve.

Page 34: EE360 – Lecture 5 Outline

User Capacity• Total number of users the MAC channel can support:

• A rougher approximation

reqd

s

NEGM

0

1

Channel coding and interference mitigation increase user capacity

reqd

ssreqd

s

NEaK

GEN

NE

aKGM

0

0

1

0

1)1(2

3)1(2

31

Page 35: EE360 – Lecture 5 Outline

SS vs. Narrowband

• BPSK at a BER of 10-4 requires Es/N07.4dB• Consider a two-user (M=2) DSSS system:

reqds NEGM ]//[1 0

G24568

S/I (dB) 3 6 7 7.8 9

Two-user DSSS system requires spreading gain of 5-6 to getdesired BER, TD system could fit 5-6 users in this bandwidth

Argument for DSSS based on frequency reuse and soft capacity

7.4