Submission to IEEE P Wireless LANs. Code Separation vs. Frequency Reuse

Similar documents
EEG473 Mobile Communications Module 2 : Week # (6) The Cellular Concept System Design Fundamentals

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK DS-CDMA

Assignment 11: Problems on Multiuser CDMA Networks

SPREAD SPECTRUM (SS) SIGNALS FOR DIGITAL COMMUNICATIONS

On the Uplink Capacity of Cellular CDMA and TDMA over Nondispersive Channels

Assignment 11: Solutions to problems on Multiuser CDMA Networks

Unit-1 The Cellular Concept

Transmit Diversity Schemes for CDMA-2000

CDMA Bunched Systems for Improving Fairness Performance of the Packet Data Services

EECS 473 Advanced Embedded Systems. Lecture 14 Wireless in the real world

Spread Spectrum Techniques

IEEE P Wireless Personal Area Networks

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 3: Cellular Fundamentals

Coverage and Rate in Finite-Sized Device-to-Device Millimeter Wave Networks

September, Submission. September, 1998

Unit 3 - Wireless Propagation and Cellular Concepts

CH 5. Air Interface of the IS-95A CDMA System

CDMA Principle and Measurement

Analysis of Fast Fading in Wireless Communication Channels M.Siva Ganga Prasad 1, P.Siddaiah 1, L.Pratap Reddy 2, K.Lekha 1

Application Note AN041

Multirate schemes for multimedia applications in DS/CDMA Systems

<3rd generation CDMA wireless systems>

Wireless Communication Technologies (16:332:546)

A Steady State Decoupled Kalman Filter Technique for Multiuser Detection

CS 294-7: Wireless Local Area Networks. Professor Randy H. Katz CS Division University of California, Berkeley Berkeley, CA

1 Interference Cancellation

High Performance Phase Rotated Spreading Codes for MC-CDMA

Final Exam (ECE 408/508 Digital Communications) (05/05/10, Wed, 6 8:30PM)

Carrier Frequency Offset Estimation in WCDMA Systems Using a Modified FFT-Based Algorithm

Assignment 1: Solutions to Problems on Direct Sequence Spread Spectrum

2.4 OPERATION OF CELLULAR SYSTEMS

Introduction to Global Navigation Satellite System (GNSS) Signal Structure

Technical University Berlin Telecommunication Networks Group

Redline Communications Inc. Combining Fixed and Mobile WiMAX Networks Supporting the Advanced Communication Services of Tomorrow.

CH 4. Air Interface of the IS-95A CDMA System

Module 3: Physical Layer

IEEE C a-02/08

Spatial Transmit Diversity Techniques for Broadband OFDM Systems

Application of Narrow-Beam Antennas and Fractional Loading Factor in Cellular Communication Systems

Multipath signal Detection in CDMA System

System-Level Simulator for the W-CDMA Low Chip Rate TDD System y

SNS COLLEGE OF ENGINEERING COIMBATORE DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK

SIMULATIVE STUDY (LINK/SYSTEM) OF WCDMA SYSTEMS

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

6 Uplink is from the mobile to the base station.

EC 551 Telecommunication System Engineering. Mohamed Khedr

Wireless Networks (PHY): Design for Diversity

CHAPTER 10 CONCLUSIONS AND FUTURE WORK 10.1 Conclusions

SNR Estimation in Nakagami-m Fading With Diversity Combining and Its Application to Turbo Decoding

Part 3. Multiple Access Methods. p. 1 ELEC6040 Mobile Radio Communications, Dept. of E.E.E., HKU

Level 6 Graduate Diploma in Engineering Wireless and mobile communications

Revision of Lecture One

Wireless Physical Layer Concepts: Part II

Multiple access and cellular systems

Reduction of Cochannel Interference on the Downlink of a CDMA Cellular Architecture with Directional Antennas

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANS)

CODE division multiple access (CDMA) systems suffer. A Blind Adaptive Decorrelating Detector for CDMA Systems

ABHELSINKI UNIVERSITY OF TECHNOLOGY

A Soft-Limiting Receiver Structure for Time-Hopping UWB in Multiple Access Interference

4G Mobile Broadband LTE

Development of a Wireless Communications Planning Tool for Optimizing Indoor Coverage Areas

Required Background (You must satisfy All of the following requirements ) BSEE GPA>3 for technical Courses

ECE 3500: Fundamentals of Signals and Systems (Fall 2014) Lab 4: Binary Phase-Shift Keying Modulation and Demodulation

λ iso d 4 π watt (1) + L db (2)

Wireless Transmission & Media Access

IEEE P Wireless Access Method and Physical Layer Specification

Quick Site Testing with the 8800SX

Revision of Lecture One

THE EFFECT of multipath fading in wireless systems can

3 RANGE INCREASE OF ADAPTIVE AND PHASED ARRAYS IN THE PRESENCE OF INTERFERERS

BER ANALYSIS OF WiMAX IN MULTIPATH FADING CHANNELS

IJPSS Volume 2, Issue 9 ISSN:

Frequency-Hopped Multiple-Access Communications with Multicarrier On Off Keying in Rayleigh Fading Channels

Energy Harvested and Achievable Rate of Massive MIMO under Channel Reciprocity Error

Transmission Scheduling in Capture-Based Wireless Networks

Wearable networks: A new frontier for device-to-device communication

THE UNIVERSITY OF CALGARY. IS-95 Cellular Mobile Location Techniques. Geoffrey G. Messier ATHESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES

Interference in Finite-Sized Highly Dense Millimeter Wave Networks

Multiuser Detection for Synchronous DS-CDMA in AWGN Channel

Lab 3.0. Pulse Shaping and Rayleigh Channel. Faculty of Information Engineering & Technology. The Communications Department

Soft Handoff Parameters Evaluation in Downlink WCDMA System

Downlink Erlang Capacity of Cellular OFDMA

Chutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K.

On the Spectral Efficiency of MIMO MC-CDMA System

Lecture 3: Wireless Physical Layer: Modulation Techniques. Mythili Vutukuru CS 653 Spring 2014 Jan 13, Monday

Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment

DESIGN OF STBC ENCODER AND DECODER FOR 2X1 AND 2X2 MIMO SYSTEM

5.9 GHz V2X Modem Performance Challenges with Vehicle Integration

Advanced Communication Systems -Wireless Communication Technology

Exam 3 is two weeks from today. Today s is the final lecture that will be included on the exam.

REPORT ITU-R M

path loss, multi-path, fading, and polarization loss. The transmission characteristics of the devices such as carrier frequencies, channel bandwidth,

Improving Capacity of soft Handoff Performance in Wireless Mobile Communication using Macro Diversity

Antenna aperture size reduction using subbeam concept in multiple spot beam cellular satellite systems

Adaptive Modulation, Adaptive Coding, and Power Control for Fixed Cellular Broadband Wireless Systems: Some New Insights 1

ORTHOGONAL frequency division multiplexing (OFDM)

RECOMMENDATION ITU-R BS

EKT 450 Mobile Communication System

Load Balancing for Centralized Wireless Networks

CDMA Tutorial April 29, Michael Souryal April 29, 2006

Transcription:

Submission to IEEE P802.11 Wireless LANs Title: Code Separation vs. Frequency Reuse Date: May 1998 Author: K. W. Halford, Ph.D. and Mark Webster Harris Corporation mwebster@harris.com Abstract This submission compares an 8 chip code with a frequency reuse of 3 to a 16 chip code with a frequency reuse of 2. Simulation results show that in an average scenario, the 8 chip/3 frequency scheme outperforms the 16 chip/2 frequency scheme. Submission Page 1 Karen Halford, Harris Semiconductor

1. INTRODUCTION This paper compares an 8 chip system with a frequency reuse of 3 (called an 8/3 scheme) with a 16 chip system with a frequency reuse of 2 (called a 16/2 scheme.) The 8/3 scheme has an important advantage over the 16/2 scheme with respect to frequency reuse because the 16/2 scheme must contend with larger power and more cochannel interferers. However, the 16/2 scheme has the advantage of larger code separation than the 8/3 scheme. For the models used in this paper, the code separation for the 16/2 scheme is 4 chips/bit (16 chips/4 information bits), and the code separation for the 8/3 scheme is 2 chips/bit (8 chips/4 information bits.) Because of these two competing issues, it is very important to compare these two techniques on equal ground. Although the issue of an 8 chip sequence vs. a 16 chip sequence has been analyzed with respect to the sequences tolerance to additive Gaussian noise and CW interference in [ 1], these types of interference are not the critical issue in a system which is using direct sequence codes to isolate a desired user from a cochannel user. It is well known interference from cochannel interferers in a direct sequence system can devastate detection, and these interferers should not be treated as Gaussian noise or CW interference (see [ 2], [ 3], [ 4] ). The Central Limit Theorem does not apply in most of the important cases. 2. OVERVIEW OF FREQUENCY PLANS The 8/3 scheme that we consider has a frequency reuse of 3 while the 16/2 scheme has a frequency reuse of 2. Figure 1 illustrates these two frequency plans with geometric shapes. Cells which use the same frequency band are shown in the same color. Figure 1 shows that if the red cells correspond to the frequency band of interest then the K=3 pattern (the 8/3 scheme) has 6 distant cells which contain cochannel interferers. The K=2 pattern (the 16/2 scheme), on the other hand, has 8 cells which contain cochannel interferers (4 near interfering cells and 4 distant interfering cells). 8/3 Scheme Frequency Reuse: 3 16/2 Scheme Frequency Reuse: 2 cochannel interferer desired user Submission Page 2 Karen Halford, Harris Semiconductor

Figure 1: Frequency Reuse 3 vs. Frequency Reuse 2. The geometrical shapes are convenient for planning purposes; however, Figure 2 illustrates a more accurate frequency plan which uses circles to represent BSA s. The nearest cochannel interferer on the reverse link is indicated with a triangle. Frequency Reuse: 3 Frequency Reuse: 2 interferer access point Figure 2: BSA's are represented more accurately as circles. It is apparent from Figure 1 and Figure 2 that the 16/2 scheme is bombarded by considerably more cochannel interferers than the 8/3 scheme. 3. Code Separation As indicated in the previous section, the 16/2 scheme is disadvantaged because of the number and proximity of cochannel interfering cells. However, this scheme does achieve isolation by using encoding the data so that the code separation is 4 while the 8/3 scheme only has a code separation of 2. The comparison between these two schemes is further muddied by the fact that in both the 16/2 and the 8/3 schemes, the users codes are asynchronous relative to each other. Figure 3 illustrates the asynchronous nature of these systems for 3 different users. Notice that the users codes are not time aligned; instead, they are offset relative to each other. Thus, in order to quantify the performance of the system in the presence of cochannel interference, it is necessary to analyze the performance at each possible relative delay. Under these circumstances, simulations are an appropriate way to compare these two techniques. This paper compares the two schemes via simulations in Section 4, but first the coding techniques used by the two schemes are described in more detail in sections 3.1 and 3.2. Submission Page 3 Karen Halford, Harris Semiconductor

(i-1) st code i th code (i+1) st code User 1 User 2 (i-1) st code i th code (i+1) st code User 3 (i-1) st code i th code (i+1) st code Figure 3: Asynchronous nature of transmitted signals. 3.1. 16/2 Coding Scheme An overview of the 16/2 scheme is shown in Figure 4. This scheme partitions the incoming data into groups of 4 bits. Each group of 4 bits is mapped to one of sixteen possible Walsh functions (which are 16 chips long.) Once 4 Walsh functions (64 chips) have been selected, they are multiplied by a length 64 cover code. These codes do not spread but rather scramble the signal. Nearby cochannel cells can be assigned different cover codes to help isolate the desired user. 16 Chip Spreading rate=r rate=r/4 rate=r/4 User 1 s Random Bits Walsh Encoding C A C B C C C D Cyclic Cover Code 16 Data Bits Walsh Encoding Cover 4 Walsh Words with C A C B C C C D Figure 4: Overview of 16/2 coding scheme. Submission Page 4 Karen Halford, Harris Semiconductor

The 48 possible cover codes are given by the following table (taken from [ 5]). CCC_ID Code Seq. CCC_ID Code Seq. CCC_ID Code Seq. CCC_ID Code Seq. 1 C 0 C 1 C 2 C 3 13 C 2 C 0 C 1 C 3 25 C 4 C 5 C 6 C 7 37 C 6 C 4 C 5 C 7 2 C 0 C 1 C 3 C 2 14 C 2 C 0 C 3 C 1 26 C 4 C 5 C 7 C 6 38 C 6 C 4 C 7 C 5 3 C 0 C 2 C 1 C 3 15 C 2 C 1 C 0 C 3 27 C 4 C 6 C 5 C 7 39 C 6 C 5 C 4 C 7 4 C 0 C 2 C 3 C 1 16 C 2 C 1 C 3 C 0 28 C 4 C 6 C 7 C 5 40 C 6 C 5 C 7 C 4 5 C 0 C 3 C 1 C 2 17 C 2 C 3 C 0 C 1 29 C 4 C 7 C 5 C 6 41 C 6 C 7 C 4 C 5 6 C 0 C 3 C 2 C 1 18 C 2 C 3 C 1 C 0 30 C 4 C 7 C 6 C 5 42 C 6 C 7 C 5 C 4 7 C 1 C 0 C 2 C 3 19 C 3 C 0 C 1 C 2 31 C 5 C 4 C 6 C 7 43 C 7 C 4 C 5 C 6 8 C 1 C 0 C 3 C 2 20 C 3 C 0 C 2 C 1 32 C 5 C 4 C 7 C 6 44 C 7 C 4 C 6 C 5 9 C 1 C 2 C 0 C 3 21 C 3 C 1 C 0 C 2 33 C 5 C 6 C 4 C 7 45 C 7 C 5 C 4 C 6 10 C 1 C 2 C 3 C 0 22 C 3 C 1 C 2 C 0 34 C 5 C 6 C 7 C 4 46 C 7 C 5 C 6 C 4 11 C 1 C 3 C 0 C 2 23 C 3 C 2 C 0 C 1 35 C 5 C 7 C 4 C 6 47 C 7 C 6 C 4 C 5 12 C 1 C 3 C 2 C 0 24 C 3 C 2 C 1 C 0 36 C 5 C 7 C 6 C 4 48 C 7 C 6 C 5 C 4 where C 0 =0158, C 1 =0461, C 2 =131F, C 3 =1626, C 4 =020E, C 5 =0737, C 6 =1049, C 7 =1570. (These numbers are given in hex.) In all simulations, the sequences are transmitted in BPSK format. 3.2. 8/3 Coding Scheme Figure 5 shows the 8/3 coding scheme. The 8/3 scheme partitions the incoming data into groups of 4 bits. The first 3 bits are mapped into one of eight possible Walsh functions (of length 8 chips), and the 4 th bit determines the polarity of the Walsh function. This 8 bit sequence is then multiplied by the 8 bit code 03 H. In all simulations, the sequences are transmitted in BPSK format. Submission Page 5 Karen Halford, Harris Semiconductor

8 Chip Spreading rate=r rate=r/2 rate=r/2 User 1 s Random Bits Walsh Encoding Hex 3 Cover Code 4 Incoming Data Bits 3 Data Bits choose 1 of 8 codes 4th bit determines sign Walsh Encoding x -1 Cover Code: Figure 5: Overview of 8/3 coding scheme. 4. RESULTS The first three sections in this paper show that simulations are necessary in order to compare the 8/3 scheme to the 16/2 scheme. This section shows simulation results which directly compare the 8/3 scheme with the 16/2 scheme. In section 4.1, a desired user with a fixed amplitude is subjected to a single interferer whose signal power is varied. In section 4.2, the average probability of error is obtained for both schemes relative to the activity of the interferers. All users signals are simulated as BPSK signals. 4.1. Performance with a Single Interferer In these results, a desired user with a fixed amplitude was simulated in the presence of a single interferer. The signal-to-interference-ratio (SIR) is the ratio of power of the desired user to the signal power of an interfering user. The relative delays of the users were randomly chosen out 8 possible delays for the 8/3 scheme and 64 possible delays for the 16/2 scheme (see section 3 for more information on the asynchronous nature of the system.) For the 16/2 scheme, the cover codes were randomly chosen for the desired user and the interferer. Both schemes generated 1024 data bits for each Monte Carlo run. Approximately 1000 Monte Carlo runs were performed for each scheme. These ideal simulations do not include any Gaussian noise or fading. Notice that the probability of error is constant over a period of SIR s for both schemes. This behavior is a result of the short coding sequences and the fact that there is only one Submission Page 6 Karen Halford, Harris Semiconductor

interferer. At the discontinuities, the 8/3 scheme has the same Walsh word error rate as the 16/2 scheme for an SIR that is about 3 or 4 db higher. 0.9 0.8 0.7 Walsh Error Rate 0.6 0.5 0.4 0.3 0.2 8/3 Scheme 16/2 Scheme 0.1 0-10 -8-6 -4-2 0 2 4 SIR (db) Figure 6: Simulation results for a desired user in the presence of a single interferer. Although the 16/2 scheme has a lower Walsh error rate for the SIR s shown in the plots in this section, this does not imply anything about the relative performance of the two systems. Recall that the 16/2 scheme is hampered by more large powered interferers than the 8/3 scheme. Because of this interference, the 16/2 scheme will operate at a lower SIR region than the 8/3 scheme. Therefore, simulations which compare performance must include the frequency reuse effect. 4.2. Average Performance In order to simulate average performance in a system, the realistic scenario shown in Figure 7 is analyzed. The simulations for this scenario include lognormal fading and use a Signal to Interference Ratio (SIR) based on a number of interferers varying from 0 to 6 for the 8/3 scheme and from 0 to 8 interferers for the 16/2 scheme. The SIR is the ratio of signal power (seen by the access point) from a desired user at the edge of the cell to the signal power from a user located at the centroid of the nearest half of the interfering cell. Submission Page 7 Karen Halford, Harris Semiconductor

Frequency Reuse: 3 Frequency Reuse: 2 access point interferer Figure 7: Average interference scenario for the 8/3 scheme (left) and the 16/2 scheme (right). The distance between the access point and the nearest interferer is determined by the equation given in Figure 8. Frequency Reuse: 3 Frequency Reuse: 2 distance = circle s radius+ hexagon s side + distance = circle s radius+distance to centroid distance to centroid of semicircle of semicircle = r + r+ r(3 π-4)/3 π=2.5756r = r + r(3 π -4)/3 π =1.5756r Figure 8: Average distance calculations. Once the distances are calculated, the SIR s are derived using the parameters given in Table 1 for both the 8/3 and the 16/2 scheme. Frequency in Hz 2.45E+09 Wavelength in M 0.12244898 TX antenna Gain 1 RX antenna Gain 1 Free Space Reference Distance 1.224489796 Transmit Power in watts 0.1 Sensitivity in dbm -87 Sensitivity in Watts 1.99526E-12 Wavelength dependent expansion 6.33257E-05 Path Loss Exponent 4 Table 1: Simulation parameters. Submission Page 8 Karen Halford, Harris Semiconductor

All users (desired and interferers) have a lognormal fading with a standard deviation of 8 db. The relative delays of the users were randomly chosen from 8 possible delays for the 8/3 scheme and 64 possible delays for the 16/2 scheme (see section 3 for more information on the asynchronous nature of the system.) For the 16/2 scheme, the cover codes were randomly chosen for the desired user and the interferers. Both schemes generated 256 data bits for each Monte Carlo run. Ten thousand Monte Carlo runs were performed for each scheme. The 8/3 scheme has been simulated for m = [0,...,6] interferers assuming that the desired user is at the edge of the cell and the interferers are located at the centroid of the interfering cells. The 16/2 scheme was simulated for m = [0,...,8] interferers in which the desired user is at the edge of the cell and the interferers are at the centroid of the interfering cell. However, 24 simulations were run in order to account for all possible combinations of 4 sets of near interferers and the 4 sets of distant interferers. For example, in the case of m = 2 interferers, there can be either 2 near interferers, 1 near interferer and 1 far interferer, or 2 far interferers. In this analysis, these three possibilities are averaged (assumed equally likely) in order to determine the probability of 2 out of 8 possible interferers. By using simulations to determine the word error rate given [0,...,M] interferers, Pr( word error / m interferers), the overall word error rate is given by the following equation M Pr( word error) = Pr( word error / m interferers) Pr( m interferers) m= 0 where M is the total number of interferers. The Pr( m interferers) is simply a binomial distribution given by M Pr( m ) ( ) m p m p M m interferers = 1 where p is the probability that a given user is active. This probability will largely depend on the particular network; therefore, the two schemes are compared for a range of values of p. Simulation results on the probability of Walsh word error are shown in Figure 9. In general, the error rate of the 8/3 scheme is approximately half the error rate of the 16/2 scheme. The probability of an active interferer is the probability that a user in a cochannel cell is transmitting at the same time as the desired user. Submission Page 9 Karen Halford, Harris Semiconductor

1.00E+00 0.00005 0.00007 0.00009 0.0002 0.0004 0.0006 0.0008 0.001 0.003 0.005 Word Error Rate 1.00E-01 1.00E-02 1.00E-03 1.00E-04 8/3 Scheme 16/2 Scheme 1.00E-05 Probability of an Active Interferer Figure 9: Walsh word error rate for both schemes in an average setting. In order to make a fair comparison of the two schemes, it is important to examine the probability of packet error as well. If an 8000 bit (1000 byte) packet is transmitted, the packet error rate of the 8/3 scheme is given by 1-Pr(correct word) 8000/4 (since there are 4 bits per word.) Thus, the packet error rate is given by 1-(1-WER 8/3 ) 2000. Similarly, 5 bit words in the 16/2 scheme yield a packet error rate of 1-(1-WER 16/2 ) 1600. Notice that this calculation actually gives an unfair advantage to the 16/2 scheme since the simulation only uses 4 bits/word rather than 5 bits/word. Using the results from Figure 9 and the packet error rate equations above, the packet error rate curve is shown in Figure 10. Notice that the 8/3 scheme consistently outperforms the 16/2 scheme. 1 0.00005 0.00007 0.00009 0.0002 0.0004 0.0006 0.0008 0.001 0.003 0.005 Probability of Packet Error 0.1 0.01 8/3 Scheme 16/2 Scheme Probability of an Active Interferer Figure 10: Packet error rate for both schemes in an average setting. Submission Page 10 Karen Halford, Harris Semiconductor

5. CONCLUSION Although the 8/3 scheme has half the processing gain of the 16/2 scheme, the 8/3 frequency plan provides much more isolation than the 16/2 scheme. From the simulations in this paper, it is clear that the 8/3 scheme performs better than the 16/2 scheme in the average case scenario with lognormal fading. REFERENCES [ 1] John Cafarella, Loss of Functional Processing Gain with Few Chips Per Symbol, November 3, 1997. [ 2] K. W. Halford, Performance and Flexibility Enhancement Techniques for Spread Spectrum Multiuser Systems, Ph.D. Thesis, University of Virginia, Charlottesville, VA., January, 1997. [ 3] K. W. Halford, New-User Identification in a CDMA System, IEEE Trans. on Comm., pp. 144-155, January, 1998. [ 4] Sergio Verdu, Recent Progress in Multiuser Detection, Advances in Communication and Signal Processing, pp. 164-175, Springer-Verlag, Berlin, 1989. [ 5] John Cafarella, Proposal for High-Data-Rate 2.4-GHz PHY, January 16, 1998. Submission Page 11 Karen Halford, Harris Semiconductor