Chapter 7 Multiuser Detection.

Slides:



Advertisements
Similar presentations
Multiuser Detection for CDMA Systems
Advertisements

1. INTRODUCTION In order to transmit digital information over * bandpass channels, we have to transfer the information to a carrier wave of.appropriate.
1 Multi-user Detection Gwo-Ruey Lee. Wireless Access Tech. Lab. CCU Wireless Access Tech. Lab. 2 Outlines Multiple Access Communication Synchronous CDMA.
Authors: David N.C. Tse, Ofer Zeitouni. Presented By Sai C. Chadalapaka.
1 12. Principles of Parameter Estimation The purpose of this lecture is to illustrate the usefulness of the various concepts introduced and studied in.
1 Wireless Communication Low Complexity Multiuser Detection Rami Abdallah University of Illinois at Urbana Champaign 12/06/2007.
Multiuser Detection in CDMA A. Chockalingam Assistant Professor Indian Institute of Science, Bangalore-12
MUD: Multi-user detection Jetmir Palushi Stevens Institute of Technology EE613 DSP for Communications.
Visual Recognition Tutorial
The 3 rd MCM of COST 289: TU Košice, October 30-31, 2003 Technical University of Košice, Slovakia 1 of 27 THE PIECE-WISE LINEAR MICROSTATISTIC MULTI-USER.
Partial Parallel Interference Cancellation Based on Hebb Learning Rule Taiyuan University of Technology Yanping Li.
EE360: Lecture 8 Outline Multiuser Detection
1 Dr. Uri Mahlab. INTRODUCTION In order to transmit digital information over * bandpass channels, we have to transfer the information to a carrier wave.
Synchronization in Software Radio (Timing Recovery) Presented by: Shima kheradmand.
Matched Filters By: Andy Wang.
Carrier-Amplitude modulation In baseband digital PAM: (2d - the Euclidean distance between two adjacent points)
Normalised Least Mean-Square Adaptive Filtering
EE513 Audio Signals and Systems Statistical Pattern Classification Kevin D. Donohue Electrical and Computer Engineering University of Kentucky.
Modulation, Demodulation and Coding Course
Equalization in a wideband TDMA system
Digital Communication I: Modulation and Coding Course
-1- ICA Based Blind Adaptive MAI Suppression in DS-CDMA Systems Malay Gupta and Balu Santhanam SPCOM Laboratory Department of E.C.E. The University of.
CHAPTER 6 PASS-BAND DATA TRANSMISSION
TELECOMMUNICATIONS Dr. Hugh Blanton ENTC 4307/ENTC 5307.
Wireless Communication Technologies 1 Outline Introduction OFDM Basics Performance sensitivity for imperfect circuit Timing and.
Multiuser Detection (MUD) Combined with array signal processing in current wireless communication environments Wed. 박사 3학기 구 정 회.
1 Chapter 2 Direct-Sequence Systems Definitions and Concepts Spread-spectrum signal –A signal that has an extra modulation that expands the signal.
OFDM Presented by Md. Imdadul Islam.
ECE 8443 – Pattern Recognition ECE 8423 – Adaptive Signal Processing Objectives: Deterministic vs. Random Maximum A Posteriori Maximum Likelihood Minimum.
CHAPTER 4 Adaptive Tapped-delay-line Filters Using the Least Squares Adaptive Filtering.
Baseband Demodulation/Detection
1 Dr. Uri Mahlab. 1.א1.א תוכן עניינים : Introduction of Binary Digital Modulation Schemes 2-10 Probability of error Transfer function of the optimum.
Space-Time and Space-Frequency Coded Orthogonal Frequency Division Multiplexing Transmitter Diversity Techniques King F. Lee.
1 Chapter 1 Introduction to spread-spectrum communications Part I.
ECE 8443 – Pattern Recognition LECTURE 10: HETEROSCEDASTIC LINEAR DISCRIMINANT ANALYSIS AND INDEPENDENT COMPONENT ANALYSIS Objectives: Generalization of.
Medicaps Institute of Technology & Management Submitted by :- Prasanna Panse Priyanka Shukla Savita Deshmukh Guided by :- Mr. Anshul Shrotriya Assistant.
Basic Characteristics of Block Codes
Performance of Digital Communications System
Code Division Multiple Access
1 Chapter 9 Detection of Spread-Spectrum Signals.
Chapter 6. Effect of Noise on Analog Communication Systems
Chapter 4: Baseband Pulse Transmission Digital Communication Systems 2012 R.Sokullu1/46 CHAPTER 4 BASEBAND PULSE TRANSMISSION.
CHAPTER 5 SIGNAL SPACE ANALYSIS
EE 3220: Digital Communication
Digital Communications Chapeter 3. Baseband Demodulation/Detection Signal Processing Lab.
The Effect of Channel Estimation Error on the Performance of Finite-Depth Interleaved Convolutional Code Jittra Jootar, James R. Zeidler, John G. Proakis.
VIRGINIA POLYTECHNIC INSTITUTE & STATE UNIVERSITY MOBILE & PORTABLE RADIO RESEARCH GROUP MPRG Combined Multiuser Detection and Channel Decoding with Receiver.
1 Channel Coding (III) Channel Decoding. ECED of 15 Topics today u Viterbi decoding –trellis diagram –surviving path –ending the decoding u Soft.
ECE 4710: Lecture #31 1 System Performance  Chapter 7: Performance of Communication Systems Corrupted by Noise  Important Practical Considerations: 
Timo O. Korhonen, HUT Communication Laboratory 1 Convolutional encoding u Convolutional codes are applied in applications that require good performance.
Spectrum Sensing In Cognitive Radio Networks
Outline Transmitters (Chapters 3 and 4, Source Coding and Modulation) (week 1 and 2) Receivers (Chapter 5) (week 3 and 4) Received Signal Synchronization.
Baseband Receiver Receiver Design: Demodulation Matched Filter Correlator Receiver Detection Max. Likelihood Detector Probability of Error.
Single Correlator Based UWB Receiver Implementation through Channel Shortening Equalizer By Syed Imtiaz Husain and Jinho Choi School of Electrical Engineering.
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
Performance of Digital Communications System
Digital Communications I: Modulation and Coding Course Spring Jeffrey N. Denenberg Lecture 3c: Signal Detection in AWGN.
Digital transmission over a fading channel
12. Principles of Parameter Estimation
Space-Time and Space-Frequency Coded Orthogonal Frequency Division Multiplexing Transmitter Diversity Techniques King F. Lee.
Advanced Wireless Networks
Lecture 1.30 Structure of the optimal receiver deterministic signals.
Advanced Wireless Networks
Equalization in a wideband TDMA system
Error rate due to noise In this section, an expression for the probability of error will be derived The analysis technique, will be demonstrated on a binary.
Enhancing capacity of wireless cellular CDMA
EE513 Audio Signals and Systems
Enhancing capacity of wireless cellular CDMA
12. Principles of Parameter Estimation
Presentation transcript:

Chapter 7 Multiuser Detection

We have discussed a simple method of MAI suppression in Chapter 6. The idea of MAI suppression stems from the single-user detection philosophy, in which we treat signals from other users as interference. In this chapter, we will introduce another way, namely multiuser detection, to tackle the near-far problem. In the paradigm of multiuser detection, we jointly detect data signals from all the users. There is not MAI since signals form all users are treated as the desired signals. However, one should note that this does not mean that we do not need to design spreading sequences with “good” correlation properties for the users.

For example, if two users use exactly the same sequence spreading sequence and their transmissions are synchronous, there is not way we can reliably resolve the data signals of the two users from the received signal even if we detect them jointly. On the other hand, with properly designed sequences, the near-far problem is solved implicitly by performing multiuser detection. Theoretically, receivers based on multiuser detection usually outperform, but are usually more complex than, receivers based on single-user detection. The applicability of multiuser receivers depends on system design issues, such as the security of joint detection, the implementation complexity, and the availability of information required to perform multiuser detection.

For example, let us consider a typical wireless cellular system. It would be difficult to employ multiuser receivers at the mobile units for forward-link transmission because of the limitation on the implementation complexity and the availability of information about other users. However, multiuser detection could be a viable choice in the base-station for reverse-link transmission. In this chapter, we will introduce some common multiuser detection techniques. We will start with the optimal multiuser receiver and then discuss some suboptimal but simpler receivers. As we mentioned in Chapter 6, we will also discuss some single-user MAI suppression receivers which happen to be specializations of the suboptimal multiuser receivers described in this chapter.

7.1 Maximum Likelihood Sequence (MLS) receiver First, let us spell out the mathematical model of DS-CDMA system we use throughout the chapter. Basically, we consider the same asynchronous DS-CDMA model in Section 6.1 with the following simplifications: Short sequences are employed and for notational convenience, we use ak(t) to represent one period of the spreading signal, i.e., A finite number of symbols are transmitted for each user. For the kth user, we define its symbol vector as

Hence, the received signal can be written as where n(t) is AWGN with power spectral density N0, The form of (7.3) actually embodies the idea of multiuser detection — all the user’s signals are treated as desired signals.

With this in mind, we note that (7. 3) is exactly the same as (1 With this in mind, we note that (7.3) is exactly the same as (1.1), the simple M-ary signaling in an AWGN channel, except that we have 2K(2M+1) possible “symbols” and the symbol duration is much longer than T in the multiuser case here. The whole development in Section 1.1 applies and the ML receiver decides b, all the bits of the users, which maximizes the following correlation metric, Let us define

where Then the correlation metric in (7.6) can be written as

From (7.11), we see that the statistics are sufficient for the detection of b. As a result, the MLS receiver consists of a branch of matched filters which are matched to the spreading signals of the users as shown in Figure 7.1.

We note that a brute-force maximization of c(b; r(t)) would require a complexity of O(2K(2M+1)) which is by no means practical. It has been shown [1] that the MLS receiver can be implemented by the Viterbi algorithm with a complexity of O(2K-1) in a feed-forward fashion. This makes the MLS receiver practical when the number of users in the system is small, say, less than 10. Unfortunately, this is seldom the case for a practical CDMA system. Therefore the use of the MLS receiver is limited.

Moreover, we note that in order to implement the MLS receiver, besides knowing all the spreading sequences, we need to estimate the delays, carrier phases as well as the receiver power of all the users. Usually, this estimation is very hard to achieve and thus further limits the usefulness of the MLS receiver. Nevertheless, the MLS receiver is important since it gives us a benchmark to gauge the performances of other sub-optimal receivers. It is shown in [1] that the MLS receiver is near-far resistant. We also note that the MLS receiver minimizes the joint error probability of all the bits of all the users. Another possible approach is to minimize the error probability of each individual bit.

Optimum Detectors Consider a DS/CDMA network with K users, each of which uses PSK to transmit a block of N binary symbols. A jointly optimum detector makes collective symbol decisions for K received signals based on the maximum a posteriori (MAP) criterion. The individually optimum detector selects the most probable set of symbols of a single desired signal from one user based on the MAP criterion, thereby providing the minimum symbol error probability. In nearly all applications, jointly optimum decisions would be preferable because of their lower complexity and because both types of decisions will agree with very high probability unless the symbol error probability is very high.

Assuming equally likely symbols are transmitted, the jointly optimum MAP detector is the same as the jointly optimum maximum-likelihood detector, which is henceforth referred to as the optimum detector. For synchronous communications in the presence of white Gaussian noise, the symbols are aligned in time, and the detection of each symbol of the desired signal is independent of the other symbols. Thus, the optimum detector can be determined by considering a single symbol interval . Let dk denote the symbol transmitted by user k. The customary (highly idealized) assumption is that a perfect carrier synchronization enables the receiver to remove a common carrier frequency and phase.

Thus, the composite baseband received signal is (7-12) Ak is the received symbol amplitude from user k pk(t) is the unit-energy spreading waveform of user k dk= ±1 n(t) is the baseband Gaussian noise. Assuming that all possible values of the symbol vector are equally likely, the optimum detector is the maximum-likelihood detector, which selects the value of d that minimizes the log-likelihood function (7-13)

The vector of the cross correlations between r(t) and the spreading sequences is denoted by (7-14) Let A denote the K × K diagonal matrix with diagonal components Let R denote the K × K correlation matrix with elements (7-15) where because the spreading waveforms are normalized to unit energy. Expanding (7-13), dropping an integral that is irrelevant to the selection of d, and then substituting (7-14) and (7-15), we find that the maximum-likelihood detector selects the value of d that maximizes the correlation metric (7-16)

This equation implies that the optimum detector uses a filter bank of K parallel correlators. Correlator k computes rk given by (7-14) and can be implemented as the single-user detector. Equation (7-16) also indicates that the K spreading sequences must be known so that R can be calculated, and the K signal amplitudes must be estimated. Short spreading sequences are necessary or R must change with each symbol. The optimum detector is capable of making joint symbol decisions for all K signals or merely the symbol decisions for a single signal.

As an example, consider synchronous communications with K = 2 and After the elimination of terms irrelevant to the selection, (7-16) implies that the optimum detector evaluates for the four pairs with d1= ±1 and d2= ±1. The pair that maximizes C provides the decisions for d1 and d2. In view of both the computational requirements and the parameters that must be estimated, it is highly unlikely that the optimum multiuser detector will have practical applications. Subsequently, alternative suboptimal multiuser detectors are considered.

Decorrelating detector The decorrelating detector may be derived by maximizing the correlation metric of (7-16) without any constraint on d. For this purpose, the gradient of f with respect to the real-valued n-dimensional vector x is defined as the column vector with components From this definition, it follows that for column vectors x and y (7-17) (7-18) Applying (7-17) and (7-18) to the correlation metric, we find that implies that C is maximized by where (7-19)

Since each component of the vector Ad' is a positive multiple of the corresponding component of d', there is no need to solve for d'. A suitable estimate of the transmitted bits is (7-20) The decorrelating detector, which implements (7-20), has the form diagrammed in Figure 7.2. For asynchronous communications, each of the K correlators in the filter bank produces N bits. The accumulator constructs the NK-dimensional vectorθand the linear transformer computes R-1θ The decision devices evaluate (7-20) to produce

Figure 7. 2: Architecture of decorrelating detector and MMSE detector Figure 7.2: Architecture of decorrelating detector and MMSE detector. Filter bank comprises parallel correlators.

A second derivation of the decorrelating detector assumes that the detector has the filter bank as its first stage. If (7-12) gives the input, then the output of this stage is (7-21) where n is the NK-dimensional noise vector. This equation indicates that the coupling among components of d, which causes the correlation among components of θ is due solely to the presence of the matrix R. The effect of this matrix is removed by computing (7-22) If (7-20) is used to determine the NK transmitted bits, the multiple-access interference is completely decorrelated from

A third derivation assumes the presence of the filter bank. If zero-mean, white Gaussian noise with two-sided power spectral density N0 /2 enters each correlator, then a straightforward calculation indicates that the NK × NK covariance matrixθof is (7-23) The probability density function of θ given Ad is (7-24)

The maximum-likelihood estimate of Ad is the estimate that maximizes (7-24) or, equivalently, minimizes the log-likelihood function (7-25) Using (7-17) and (7-18), we again obtain the estimate given by (7-19), which leads to given by (7-20). Although the decorrelating detector eliminates the multiple-access interference, it increases the noise by changing n to From (7-23), and the symmetric character of R, it follows that the covariance matrix of the noise vector entering the decision devices is (7-26)

The variance of the noise that accompanies one of the symbols of user is Therefore, the symbol error probability is (7-27) where is the symbol energy. The symbol error probability for single user detection by user in the absence of multiple access interference is (7-28) Thus, the presence of multiple-access interference requires an increase of energy by the factor when the decorrelating detector is used if a specified is to be maintained.

As an example, consider synchronous communications with K = 2 and The correlation matrix and its inverse are Equation (7-20) indicates that the symbol estimates are and Since (7-29) If the required energy increase or shift in each curve is less than 1.25 dB.

To demonstrate analytically the advantage of the decorrelating detector, consider synchronous communications and a receiver with a filter bank of K conventional detectors. Each conventional detector is a single-user matched filter. If perfect carrier synchronization removes a common phase shift of all the signals and produces the baseband received signal of (7-12), then (7-14) implies, that the output of detector is (7-30) The set of K symbols is estimated by (7-31)

Let Dk denote the (K – 1)-dimensional vector of all the Conditioning on Dk and calculating that we find that the conditional symbol error probability for user is (7-32) (7-33) If all symbol sets are equally likely, then the symbol error probability for user k is (7-34)

For K = 2 with and (7-32) to (7-37) yield the symbol error probability for user 1: (7-35) The second term in (7-35) is usually negligible compared with the first one if ρ≠0. Thus, if then a comparison of (7-35) with (7-29) indicates that decorrelating detector usually outperforms the conventional detector.

Compared with the optimum detector, the decorrelating detector offers greatly reduced, but still formidable, computational requirements. There is no need to estimate the signal amplitudes, but the transmission delays of asynchronous signals must still be estimated. The inversion of the correlation matrix R in real time is not possible for asynchronous signals with practical values of NK. Suboptimal partitioning and short spreading sequences are generally necessary and degrade the theoretical performance given by (7-27).

Minimum-Mean-Square-Error Detector The minimum-mean-square-error (MMSE) detector is the receiver that results from a linear transformation of θ by the K × K matrix L such that the metric (7-36) is minimized. Let L0 denote the solution of the equation (7-37) Let tr(B) denote the trace of the matrix B. Since for a vector x, (7-38)

Substitution of this equation (7-38) into (7-36) and the application of (7-37) yields which proves that L0 minimizes M. If the data symbols are independent and equally likely to be +1 or –1, then E[ddT]=I where I is the identity matrix. Using this result, (7-21), (7-23), E[n] = 0, and the independence of d and n, we obtain Substitution of these equations into (7-37) yields

Without any change in the MMSE estimate of the transmitted symbols: The MMSE detector has the structure of Figure 6.21.

Adaptive Multiuser Detector An adaptive multiuser detector [2] is one that does not require explicit knowledge of either the spreading sequences or the timing of the multiple-access interference signals. The receiver samples the output of a wideband filter at the chip rate. The use of short spreading sequences affords the opportunity for the adaptive detector to essentially learn the sequence cross-correlations and thereby to suppress the interference. The learning is accomplished by processing a known training sequence of symbols for the desired signal during a training phase. This operational phase is followed by a decision-directed phase that continues the adaptation by feeding back symbol decisions.

Adaptive detectors potentially can achieve much better performance than conventional ones at least if the transmission channel is time-invariant, but coping with fast fading and interference changes requires elaborate modifications.

7.2 References [1] S. Verd´u, “Minimum Probability of Error for Asynchronous Gaussian Multiple-Access Channels,” IEEE Trans. Inform. Theory, vol. 32, pp. 85–96, Jan. 1986. [2] S. Verd´u, Multiuser Detection, Cambridge University Press, 1998. [3] A. Duel-Hallen, J. Holtzman, and Z. Zvonar, “Multiuser Detection for CDMA Systems, ” IEEE Personal Commun., vol. 2, no. 2, pp. 46–58, Apr. 1995. [4] D. Torrieri, “Principles of spread spectrum communications theory,” Springer 2005.