throbber
Synthesis Lectures on Communications
`
`© SYNTHESIS
`COLLECTION OF TECHNOLOGY
`
`Code Division Multiple
`Access (CDMA)
`
`1
`
`APPLE 1022
`Apple v. Ericsson
`IPR2022-00343
`
`APPLE 1022
`Apple v. Ericsson
`IPR2022-00343
`
`1
`
`

`

`Code Division Multiple Access
`Code Division Multiple Access
`(CDMA)
`(CDMA)
`
`2
`
`

`

`(cid:219)(cid:2)(cid:55)(cid:84)(cid:86)(cid:77)(cid:82)(cid:75)(cid:73)(cid:86)(cid:2)(cid:50)(cid:69)(cid:88)(cid:89)(cid:86)(cid:73)(cid:2)(cid:55)(cid:91)(cid:77)(cid:88)(cid:94)(cid:73)(cid:86)(cid:80)(cid:69)(cid:82)(cid:72)(cid:2)(cid:37)(cid:43)(cid:2)(cid:22)(cid:20)(cid:22)(cid:22)
`(cid:54)(cid:73)(cid:84)(cid:86)(cid:77)(cid:82)(cid:88)(cid:2)(cid:83)(cid:74)(cid:2)(cid:83)(cid:86)(cid:77)(cid:75)(cid:77)(cid:82)(cid:69)(cid:80)(cid:2)(cid:73)(cid:72)(cid:77)(cid:88)(cid:77)(cid:83)(cid:82)(cid:2)(cid:219)(cid:2)(cid:49)(cid:83)(cid:86)(cid:75)(cid:69)(cid:82)(cid:2)(cid:9)(cid:2)(cid:39)(cid:80)(cid:69)(cid:93)(cid:84)(cid:83)(cid:83)(cid:80)(cid:2)(cid:22)(cid:20)(cid:20)(cid:26)
`
`All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in
`any form or by any means—electronic, mechanical, photocopy, recording, or any other except for brief quotations
`in printed reviews, without the prior permission of the publisher.
`
`Code(cid:2)Division(cid:2)Multiple(cid:2)Access(cid:2)(CDMA)(cid:2)
`R.(cid:2)Michael(cid:2)Buehrer
`
`(cid:29)(cid:27)(cid:28)(cid:16)(cid:23)(cid:16)(cid:20)(cid:23)(cid:21)(cid:16)(cid:20)(cid:20)(cid:25)(cid:24)(cid:25)(cid:16)(cid:29)(cid:2) paperback(cid:2)
`(cid:29)(cid:27)(cid:28)(cid:16)(cid:23)(cid:16)(cid:20)(cid:23)(cid:21)(cid:16)(cid:20)(cid:20)(cid:25)(cid:24)(cid:25)(cid:16)(cid:29)(cid:2)
`paperback
`
`(cid:29)(cid:27)(cid:28)(cid:16)(cid:23)(cid:16)(cid:20)(cid:23)(cid:21)(cid:16)(cid:20)(cid:21)(cid:26)(cid:27)(cid:23)(cid:16)(cid:28)(cid:2)
`ebook
`(cid:29)(cid:27)(cid:28)(cid:16)(cid:23)(cid:16)(cid:20)(cid:23)(cid:21)(cid:16)(cid:20)(cid:21)(cid:26)(cid:27)(cid:23)(cid:16)(cid:28) (cid:2) ebook
`
`(cid:40)(cid:51)(cid:45)(cid:2)(cid:21)(cid:20)(cid:18)(cid:21)(cid:20)(cid:20)(cid:27)(cid:19)(cid:29)(cid:27)(cid:28)(cid:16)(cid:23)(cid:16)(cid:20)(cid:23)(cid:21)(cid:16)(cid:20)(cid:21)(cid:26)(cid:27)(cid:23)(cid:16)(cid:28)
`
`A(cid:2)Publication(cid:2)in(cid:2)the(cid:2)(cid:55)(cid:84)(cid:86)(cid:77)(cid:82)(cid:75)(cid:73)(cid:86)(cid:2)series
`SYNTHESIS(cid:1)LECTURES(cid:1)ON(cid:1)COMMUNICATIONS(cid:1)#2
`
`Lecture #2
`Series Editor: William Tranter, Virginia Tech
`
`Series ISSN: 1932-1244 print
`Series ISSN: 1932-1708
`electronic
`
`First Edition
`10 9 8 7 6 5 4 3 2 1
`
`3
`
`

`

`Code Division Multiple Access
`(CDMA)
`
`R. Michael Buehrer
`Virginia Polytechnic Institute and State University,
`Blacksburg, Virginia, USA
`
`SYNTHESIS LECTURES ON COMMUNICATIONS #2
`
`Morgan Claypool Publishers
`
`4
`
`

`

`iv
`
`ABSTRACT
`This book covers the basic aspects of Code Division Multiple Access or CDMA. It begins
`with an introduction to the basic ideas behind fixed and random access systems in order to
`demonstrate the difference between CDMA and the more widely understood TDMA,
`FDMA or CSMA. Secondly, a review of basic spread spectrum techniques is presented which
`are used in CDMA systems including direct sequence, frequency-hopping, and time-hopping
`approaches. The basic concept of CDMA is presented, followed by the four basic principles
`of CDMA systems that impact their performance: interference averaging, universal frequen-
`cy reuse, soft handoff, and statistical multiplexing. The focus of the discussion will then shift
`to applications. The most common application of CDMA currently is cellular systems. A
`detailed discussion on cellular voice systems based on CDMA, specifically IS-95, is present-
`ed. The capacity of such systems will be examined as well as performance enhancement tech-
`niques such as coding and spatial filtering. Also discussed are Third Generation CDMA cel-
`lular systems and how they differ from Second Generation systems. A second application of
`CDMA that is covered is spread spectrum packet radio networks. Finally, there is an exami-
`nation of multi-user detection and interference cancellation and how such techniques impact
`CDMA networks. This book should be of interest and value to engineers, advanced students,
`and researchers in communications.
`
`KEYWORDS
`CDMA, Multiple Access, Spread Spectrum, Multiuser Detection, TDMA, FDMA, Packet
`Radio Networks
`
`5
`
`

`

`This book is dedicated to those who patiently waited for me to finish: My wife Andrea and
`our children, Faith, JoHannah, Noah, Gabrielle and Ruth.
`
`6
`
`

`

`vi
`
`Contents
`
`1. Multiuser Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
`1.1 Conflict-Free Medium Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
`1.1.1 Time Division Multiple Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
`1.1.2
`Frequency Division Multiple Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
`1.1.3 Code Division Multiple Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
`1.1.4 Traffic Engineering and Trunking Efficiency . . . . . . . . . . . . . . . . . . . . . . . . 8
`1.1.5
`Frequency Reuse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
`1.2 Contention-Based Medium Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
`1.2.1 ALOHA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
`1.2.2 Carrier Sense Multiple Access and Carrier Sense Multiple
`Access/Collision Avoidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
`1.2.3 Other Random Access Methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
`1.3 Multiple Access with Spread Spectrum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
`1.4
`Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
`
`2.
`
`2.3
`
`Spread Spectrum Techniques for Code Division Multiple Access . . . . . . . . . . . . . . . . 23
`2.1
`Forms of Code Division Multiple Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
`2.2 Direct Sequence Code Division Multiple Access . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
`2.2.1
`Power Spectral Density of Direct Sequence Spread Spectrum . . . . . . . . 27
`2.2.2 Multiple Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
`Frequency Hopping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
`2.3.1
`Slow Versus Fast Hopping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
`2.3.2
`Power Spectral Density of Frequency-Hopped
`Spread Spectrum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
`2.3.3 Multiple Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
`2.4 Time Hopping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
`2.5 Link Performance of Direct Sequence Spread Spectrum in Code
`Division Multiple Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45
`2.5.1 Additive White Gaussian Noise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
`2.5.2 Multipath Fading Channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
`2.5.3
`Impact of Bandwidth. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54
`
`7
`
`

`

`CONTENTS vii
`
`2.6 Multiple Access Performance of Direct Sequence Code
`Division Multiple Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56
`2.6.1 Gaussian Approximation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
`2.6.2
`Improved Gaussian Approximation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
`2.7 Link Performance of Frequency-Hopped Spread Spectrum . . . . . . . . . . . . . . . . . . 64
`2.8 Multiple Access Performance of Frequency-Hopped
`Code Division Multiple Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
`Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
`
`2.9
`
`Cellular Code Division Multiple Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
`3.1
`Principles of Cellular Code Division Multiple Access . . . . . . . . . . . . . . . . . . . . . . . 73
`3.1.1
`Interference Averaging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
`3.1.2
`Frequency Reuse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
`3.1.3
`Soft Hand-Off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
`3.1.4
`Statistical Multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
`3.2 Code Division Multiple Access System Overview . . . . . . . . . . . . . . . . . . . . . . . . . . 83
`3.3 Capacity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85
`3.3.1 Comparison of Multiple Access Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . 85
`3.3.2
`Second-Order Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
`3.3.3 Capacity–Coverage Trade-Off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
`3.3.4 Erlang Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
`3.4 Radio Resource Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
`3.4.1
`Power Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .100
`3.4.2 Mobile-Assisted Soft Hand-Off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
`3.4.3 Admission Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
`3.4.4 Load Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
`Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .110
`
`3.5
`
`Spread Spectrum Packet Radio Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
`4.1 Code Assignment Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
`4.1.1 Common-Transmitter Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
`4.1.2 Receiver-Transmitter Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
`4.2 Channel Access Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
`4.3 Direct Sequence Packet Radio Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
`4.4
`Frequency-Hopped Packet Radio Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
`4.4.1
`Perfect Side Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
`4.4.2 No Side Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
`Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .124
`
`4.5
`
`3.
`
`4.
`
`8
`
`

`

`viii CONTENTS
`5. Multiuser Detection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .127
`5.1
`System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
`5.2 Optimal Multiuser Reception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
`5.3 Linear Sub-Optimal Multiuser Reception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
`5.3.1 The Decorrelating Detector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
`5.3.2 Linear Minimum Mean Squared Error Receiver . . . . . . . . . . . . . . . . . . . 137
`5.4 Non-Linear Sub-Optimal Receivers: Decision Feedback . . . . . . . . . . . . . . . . . . . 137
`5.4.1 Decorrelating Decision Feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
`5.4.2
`Successive Interference Cancellation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
`5.4.3
`Parallel Interference Cancellation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
`5.4.4 Multistage Receivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
`5.5 A Comparison of Sub-Optimal Multiuser Receivers . . . . . . . . . . . . . . . . . . . . . . . 156
`5.5.1 AWGN Channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
`5.5.2 Near-Far Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
`5.5.3 Rayleigh Fading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
`5.5.4 Timing Estimation Errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
`5.6 Application Example: IS-95. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .162
`5.6.1
`Parallel Interference Cancellation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
`5.6.2
`Performance in an Additive White Gaussian Noise Channel . . . . . . . . 167
`5.6.3 Multipath Fading and Rake Reception . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
`5.6.4 Voice activity, power control, and coding . . . . . . . . . . . . . . . . . . . . . . . . . . 168
`5.6.5 Out-of-Cell Interference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
`Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
`
`5.7
`
`9
`
`

`

`ix
`
`Preface
`
`The objective of this book is to provide the reader with a concise introduction to the use
`of spread spectrum waveforms in multiple user systems, often termed code division multiple
`access or CDMA. The book has been an outgrowth of course notes presented in a graduate-
`level course on spread spectrum communications. This book should provide sufficient material
`to cover CDMA systems within a graduate-level course on spread spectrum, advanced digital
`communication, or multiple access. The text should also be useful for working engineers who
`desire a basic understanding of the fundamental concepts underlying CDMA.
`The reader of this book is expected to have a fundamental understanding of digital com-
`munications and some understanding of wireless systems in general. Additionally, readers are
`assumed to be generally familiar with basic stochastic processes, detection theory, and commu-
`nication theory. The book builds on these fundamentals by explaining how spread spectrum
`systems differ from standard digital communication systems and, more importantly, how spread
`spectrum waveforms can be used as a means of channelization in a multiple user scenario.
`The book covers the basic aspects of CDMA. In Chapter 1, the basic ideas behind
`conflict-free and contention-based systems are introduced to demonstrate the difference be-
`tween CDMA and more widely understood orthogonal access techniques such as time division
`multiple access and frequency division multiple access. Additionally, random access schemes
`such as carrier sense multiple access are examined.
`In Chapter 2, basic spread spectrum techniques that are used in CDMA systems are
`reviewed, including direct sequence spread spectrum, frequency-hopped spread spectrum, and
`time-hopping approaches. Both the link performance of such waveforms (in additive white
`Gaussian noise channels and fading channels) as well as the multiple access performance are
`examined. Special emphasis is given to fading channels since spread spectrum is more advanta-
`geous in these channels.
`Once the basic concept of CDMA is presented, Chapter 3 focuses on cellular CDMA
`systems. Specifically, four basic principles of cellular CDMA systems are presented, and their
`impact on the performance of CDMA is explained. These four basic concepts include interfer-
`ence averaging, universal frequency reuse, soft hand-off, and statistical multiplexing. While the
`discussion is general, the CDMA cellular standard IS-95 is often used as an example. Addi-
`tionally, important CDMA system functions (often termed radio resource management tech-
`niques), such as power control, mobile-assisted hand-off, load control, and admission control, are
`
`10
`
`

`

`x PREFACE
`examined. Finally, the capacity of CDMA cellular systems on both the uplink and downlink is
`derived, emphasizing the differences between the links.
`Spread spectrum waveforms are used not only in fixed access techniques such as in cellular
`systems, but also for multiple access in packet radio networks (PRNs). Chapter 4 discusses
`spread spectrum based PRNs emphasizing the differences between PRNs and their better
`known cellular counterparts. A primary emphasis is on spreading code assignment techniques,
`which is crucial in non-centralized systems.
`Finally, Chapter 5 focuses on multiuser detection. A primary limitation of CDMA link
`performance and system capacity is in-cell multiple access interference (MAI). Multiuser de-
`tection is one means of mitigating MAI on the uplink of CDMA systems. The discussion of
`multiuser detection algorithms is broken down into two basic categories: linear techniques and
`non-linear techniques. Linear techniques discussed include the decorrelating detector and the
`minimum mean square error detector. Among the non-linear approaches examined, parallel in-
`terference cancellation and successive interference cancellation are the most prominent. Finally,
`all these techniques are compared, the benefits and detriments of each approach are mentioned,
`and the application of multiuser detection to the IS-95 cellular standard is examined.
`I would like to acknowledge the many students who helped make this book possible.
`First, I would like to thank all of the students who have taken my spread spectrum course for
`their comments and input. I would also like to specifically thank several graduate students who
`helped with various plots and simulations including (but certainly not limited to) Ihsan Akbar,
`Dan Hibbard, Jihad Ibrahim, Nishant Kumar, Rekha Menon, and Swaroop Venkatesh as well
`as former colleagues at Bell Labs, especially Steve Nicoloso and Rob Soni for their assistance
`in Section 5.6. I also want to thank Lori Hughes for her many hours of editing that (or is it
`“which”?) greatly improved the initial manuscript.
`
`11
`
`

`

`1
`
`C H A P T E R 1
`Multiuser Communications
`
`All communication systems that support multiple users must have a set of protocols to allow
`these multiple users to share a common access medium. This single-access medium may be
`explicitly shared or broken up into smaller pieces, termed channels, that must also be shared.
`A logical channel can be defined as some fraction of the available access medium that is used
`by a particular transmit/receive pair. The system may contain only a single channel or tens of
`channels. However, in either case, the number of possible transmit/receive pairs in the system
`typically far outweighs the number of channels that are available. Thus, communication systems
`must have some mechanism for sharing the available channels among active transmit/receive
`pairs. This mechanism is termed multiple access control or sometimes medium access. Many meth-
`ods exist for providing multiple access, and we will briefly examine the major techniques in
`this chapter. However, the focus of this book is one specific multiple access technique termed
`code division multiple access or CDMA, which is inherently associated with spread spectrum
`communication techniques. Since spread spectrum was developed as a military technology,
`CDMA techniques traditionally have been limited to military systems [1]. However, since the
`early 1990s, CDMA has been heavily investigated for commercial systems. Of particular note is
`the success that CDMA has experienced in commercial cellular systems. The first commercial
`CDMA standard, IS-95, pioneered by Qualcomm, Inc., was one of the three major second
`generation cellular standards and led to a third generation of cellular systems that was domi-
`nated by CDMA techniques (at least for voice services). However, before we discuss CDMA
`in detail, we must first discuss the more general concept of multiple access.
`Two basic classes of multiple access are illustrated in Figure 1.1 [2]: contention-based
`techniques and conflict-free techniques. Conflict-free multiple access involves some type of
`reservation scheme in which the resources are divided into multiple channels. These channels are
`then reserved (through some other mechanism) for use by transmit/receive pairs for the duration
`of their communication. On the other hand, contention-based multiple access techniques allow
`no reservation. Instead, users must contend for the system resources whenever communication
`takes place. Such systems typically use the entire access medium as a single channel, although
`multi-channel versions are certainly possible. Both types of systems have several variations and
`
`12
`
`

`

`2 CODE DIVISION MULTIPLE ACCESS (CDMA)
`
`Multiple access
`techniques
`
`Contention-based
`
`Conflict-free
`
`Random
`access
`
`ALOHA,
`CSMA,
`CSMA/CA,
`RTS/CTS,
`etc.
`
`Collision
`resolution
`
`TREE,
`WINDOW,
`etc.
`
`FIGURE 1.1: Multiple access techniques.
`
`TDMA,
`CDMA,
`FDMA,
`Token Bus,
`etc.
`
`provide benefits for different types of traffic. We will now discuss the two major classes of
`multiple access.
`
`CONFLICT-FREE MEDIUM ACCESS CONTROL
`1.1
`As mentioned previously, contention-free (or conflict-free) multiple access involves the division
`of system resources (i.e., the access medium) into fixed channels, which are then reserved
`by transmit/receive pairs for communication. In this way, users are guaranteed a channel for
`the duration of their communication. This type of multiple access is particularly beneficial for
`applications that require continuous, regular access to a channel, such as voice or video. However,
`for bursty data sources, such a scheme is inefficient because the channel is very often unused
`while it is reserved. The main difference between the types of contention-free multiple access is
`in how the channels are defined. In time division multiple access (TDMA), channels are defined
`according to time slots. In frequency division multiple access (FDMA), channels are defined
`according to frequency bands, and in CDMA, channels are defined not by time or frequency
`but by a spread spectrum parameter known as a spreading code. We will briefly review each type.
`
`13
`
`

`

`MULTIUSER COMMUNICATIONS 3
`
`1.1.1 Time Division Multiple Access
`TDMA systems define channels according to time slot. In other words, system time is defined as
`a series of repeating, fixed-time intervals (often called frames) that are further divided into a fixed
`number of smaller time periods called slots. When a transmit/receive pair is given permission
`to communicate, it is assigned a specific time slot in which to do so. Every time frame, each
`transmit/receive pair may communicate during its slot. An example is given in Figure 1.2 for
`four time slots. Typically, all users are given an opportunity to transmit once during a frame.
`Thus, the total frame is made up of K user slots and K guard times where K is the number
`of transmitters actively accessing the medium or equivalently the number of channels. Guard
`times are inserted to prevent collisions due to imperfect synchronization. The user throughput
`is a function of the overall system transmission rate and the number of time slots available (i.e.,
`the fraction of time they are permitted to transmit).
`
`User 1
`
`User 2
`
`User 3
`
`User 4
`
`Rx
`
`User
`1
`
`User
`2
`
`User
`3
`
`User
`4
`
`User
`1
`
`User
`2
`
`Time
`
`FIGURE 1.2: Example of a four-user TDMA system.
`
`Guard time
`
`14
`
`

`

`4 CODE DIVISION MULTIPLE ACCESS (CDMA)
`The example in Figure 1.2 demonstrates a centralized system in which multiple users
`communicate to a single receiver.1 A decentralized system can also use TDMA, but providing
`strict time synchronization in a large, decentralized system can be very challenging. Additionally,
`the example given shows only one side of the communication (mobile to base station) and
`inherently assumes frequency division duplex (FDD) operation in which the channels from the
`centralized transmitter to the distributed receivers occur on a different frequency channel. This
`second band is also divided into time slots for transmission to the separate users. However,
`TDMA systems can also use time division duplex (TDD) in which time is broken into two
`consecutive frames; the first time frame is used for uplink (or downlink) transmission, and the
`second time frame is used for downlink (or uplink) transmission.
`In a pure TDMA system, each transmitter occupies the entire bandwidth when transmit-
`ting. The system bit rate RS
`b is the rate at which each user transmits when accessing the channel.
`Ignoring guard times, the data rate per user is Rb = (RS
`b )/K , where K is the number of time
`slots per frame. If guard times are included, the relationship is a little more complicated. The
`time allocated per channel is simply equal to (Tf /K ) − Tg where Tf is the frame duration, K
`(cid:3)
`(cid:2)
`is the number of time slots (i.e., channels), and Tg is the guard time. The data rate per channel
`is equal to the number of bits transmitted per user divided by the frame duration. Thus,
`− Tg
`Tf
`− Tg
`Tf
`Clearly, we wish to have a small guard time to improve the efficiency of the system. How-
`ever, practical considerations limit the minimum size of Tg . The bandwidth of the system is
`proportional to the system data rate:
`
`Rb =
`= R S
`b
`K
`
`Tf
`K
`
`R S
`b
`
`R S
`b
`
`(1.1)
`
`b
`

`
`BS ∝ R S
`k
`where k is the number of bits per symbol and α is a constant related to the filtering, pulse shape,
`and modulation scheme.
`There are advantages and disadvantages of TDMA as compared to other multiple ac-
`cess schemes. One advantage of the scheme is that it requires only a single radio frequency/
`intermediate frequency (RF/IF) section since all channels have the same frequency character-
`istics. Another advantage of TDMA is the ease with which variable data rates and asymmetric
`
`(1.2)
`
`1Note that the transmission from distributed users to a single receiver is typically referred to as the uplink while
`transmission from the centralized transmitter to the distributed receivers is termed the downlink.
`
`15
`
`

`

`MULTIUSER COMMUNICATIONS 5
`links are accommodated. Variable data rates can be assigned by simply assigning multiple time
`slots to a single transmit/receive pair. Asymmetric links can be accommodated by changing the
`relative duration of uplink and downlink time slots. The relationship between the user-specific
`data rate and the overall system data rate is further illustrated in the following example.
`
`Example 1.1. A TDMA system is to be designed with ten channels and a guard time of 50μs.
`If quadrature phase shift keying (QPSK) modulation is used, what system symbol rate is needed
`to achieve a data rate of 200kbps with a frame duration 10ms?
`
`Solution: The frame duration Tf
`is 10ms. Due to guard time, the total time available for
`transmission is 10ms − 10 ∗ 50μs = 9.5ms. The transmission time per channel is thus
`= 0.95ms
`9.5ms
`10
`
`(1.3)
`
`(1.4)
`
`(1.5)
`
`The required system data rate is then
`
`RS
`b
`
`Alternatively, from (1.1),
`
`= 10ms ∗ 200kbps
`
`0.95ms
`
`= 2.105Mbps
`
`= Rb
`− Tg
`
`1K
`
`Tf
`
`RS
`b
`
`= 200 kbps
`0.1 − 0.005
`= 2.105 Mbps
`Using QPSK (two bits per symbol), the symbol rate needed is 2.105/2 = 1.05Msps.
`
`1.1.2 Frequency Division Multiple Access
`The second major type of contention-free multiple access is FDMA in which channels are
`defined according to frequency allocation. Thus, all transmitters are active simultaneously but
`occupy different segments of the RF spectrum as illustrated in Figure 1.3. In an FDMA system,
`the bandwidth per user is simply related to the data rate and modulation scheme used. The total
`bandwidth of the system is BS = K ∗ B where K is the number of channels and B = α(Rb /k)
`(cid:5)
`is the bandwidth per channel ignoring guard bands. With guard bands, we have
`B + Bg
`
`BS = K ∗(cid:4)
`
`(1.6)
`
`where Bg is the size of the guard band.
`The efficiency of TDMA and FDMA are essentially the same, with slight differences
`depending on the guard times/bands required. Both techniques are referred to as orthogonal
`
`16
`
`

`

`6 CODE DIVISION MULTIPLE ACCESS (CDMA)
`
`FIGURE 1.3: Example of three-channel FDMA system.
`
`multiple access techniques since, ideally, there is no interference between channels. An advantage
`of FDMA over TDMA is the substantial reduction in the required symbol rate. Another
`advantage of the FDMA is that no tight synchronism between users is required and strict
`isolation between channels is relatively easy to maintain with properly designed filters and
`tuners. However, disadvantages include the fact that with a larger number of channels the IF
`filter (used to select the channel of interest) must be fairly narrow and allocating variable data
`rates requires multiple receive filters.
`
`1.1.3 Code Division Multiple Access
`As we have seen from the previous two sections, a key to contention-free multiple access is the
`definition of orthogonal channels. Orthogonal channels are channels in which a system user can
`communicate without causing interference to another user. The orthogonality can be created
`either in the time domain or in the frequency domain. In TDMA, users simply transmit at
`different times, thus maintaining orthogonality in the time domain. In FDMA, users transmit
`in different frequency bands, which creates orthogonality in the frequency domain since receivers
`can filter out unwanted frequency bands. In reality, the channels in these access techniques are
`
`17
`
`

`

`MULTIUSER COMMUNICATIONS 7
`not truly orthogonal due to imperfect filters or imperfect time synchronization, but the cross-
`channel interference is very small.
`In CDMA systems, channels are defined not by time or frequency but by code. Spread
`spectrum systems (as we will see in more detail in Chapter 2) rely on pseudo-random waveforms
`termed spreading codes to create noise-like transmissions. If users can be given different codes
`that have low cross-correlation properties, channels can be defined by those codes. To better
`(cid:6)
`understand this, let us consider an FDMA system with two channels. Assuming a linear
`modulation scheme, the transmit signals from two distinct users can be written as
`(cid:6)
`s 1 (t) =
`2P1b1 (t) cos (ω1t + θ1)
`2P2b2 (t) cos (ω2t + θ2)
`s 2 (t) =
`where Pi, bi (t), ωi, and θi are the transmit power, data signal, transmit frequency, and random
`phase offset for the ith user, respectively. Now consider the received signal (normalized so that
`the desired signal is received at maximum power) at user 1:
`r1 (t) = s 1 (t) +
`P LRs 2 (t) + n (t)
`where P LR is the relative path loss between transmitter 2 and receiver 1 and n (t) is additive
`white Gaussian noise (AWGN). Now, assuming square pulses for simplicity, the output of the
`matched filter receiver at user 1 for an arbitrary symbol period is
`r1 (t) cos (ω1t + θ1) dt
`Z = 1
`T
`0
`where T is the data symbol period and we have examined the first symbol period. Provided
`that |ω1 − ω2| (cid:4) T, the signal s 2(t) will produce no response to the filter matched to signal
`s 1(t). Thus, we can say that the channels are orthogonal. We can write similar equations for
`TDMA where the channels are defined by a time slot. However, in CDMA, the channels are
`defined by spreading codes. For example, with direct sequence CDMA (DS-CDMA), the two
`signals can be defined by
`
`(cid:6)
`
`(cid:7)
`
`T
`
`(1.7a)
`(1.7b)
`
`(1.8)
`
`(1.9)
`
`(cid:6)
`(cid:6)
`2P1a1 (t) b1(t) cos (ω1t + θ1)
`s 1(t) =
`2P2a2 (t) b2(t) cos (ω1t + θ2)
`s 2(t) =
`where a1(t) and a2(t) are spreading codes that define the

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket