Designing Information Devices and Systems I Spring 2016 Official Lecture Notes Note 18

Similar documents
Designing Information Devices and Systems I Fall 2016 Babak Ayazifar, Vladimir Stojanovic Homework 11

Signal Recovery from Random Measurements

Multiple Access. Difference between Multiplexing and Multiple Access

Lecture 3. Direct Sequence Spread Spectrum Systems. COMM 907:Spread Spectrum Communications

Lecture 7: Centralized MAC protocols. Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday

Concurrent Channel Access and Estimation for Scalable Multiuser MIMO Networking

Communications Theory and Engineering

Blind Pilot Decontamination

CODE division multiple access (CDMA) systems suffer. A Blind Adaptive Decorrelating Detector for CDMA Systems

Advanced 3G and 4G Wireless communication Prof. Aditya K. Jagannatham Department of Electrical Engineering Indian Institute of Technology, Kanpur

MIMO II: Physical Channel Modeling, Spatial Multiplexing. COS 463: Wireless Networks Lecture 17 Kyle Jamieson

Multiuser Detection for Synchronous DS-CDMA in AWGN Channel

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

Design of Parallel Algorithms. Communication Algorithms

SPARSE CHANNEL ESTIMATION BY PILOT ALLOCATION IN MIMO-OFDM SYSTEMS

Cross Spectral Density Analysis for Various Codes Suitable for Spread Spectrum under AWGN conditions with Error Detecting Code

A Signal Space Theory of Interferences Cancellation Systems

Multiple Input Multiple Output (MIMO) Operation Principles

Exam 3 is two weeks from today. Today s is the final lecture that will be included on the exam.

Designing Information Devices and Systems I Spring 2019 Homework 12

M2M massive wireless access: challenges, research issues, and ways forward

Error-Correcting Codes

Antennas and Propagation. Chapter 6b: Path Models Rayleigh, Rician Fading, MIMO

Orthogonal Frequency Domain Multiplexing

PERFORMANCE ANALYSIS OF AN UPLINK MISO-CDMA SYSTEM USING MULTISTAGE MULTI-USER DETECTION SCHEME WITH V-BLAST SIGNAL DETECTION ALGORITHMS

Acentral problem in the design of wireless networks is how

MIMO III: Channel Capacity, Interference Alignment

Performance Evaluation of the VBLAST Algorithm in W-CDMA Systems

Digital Television Lecture 5

Advanced 3G & 4G Wireless Communication Prof. Aditya K. Jaganathan Department of Electrical Engineering Indian Institute of Technology, Kanpur

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )

Applications of sparse approximation in communications

EXACT SIGNAL RECOVERY FROM SPARSELY CORRUPTED MEASUREMENTS

Chapter 2: Signal Representation

Power allocation for Block Diagonalization Multi-user MIMO downlink with fair user scheduling and unequal average SNR users

Mobile Communications TCS 455

Lecture 3 - Regression

3858 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 6, JUNE Reduced-Dimension Multiuser Detection

Mobile Radio Systems OPAM: Understanding OFDM and Spread Spectrum

Compressive Sensing based Asynchronous Random Access for Wireless Networks

Spread Spectrum Modulation

Compressive Sensing Based Detection Strategy For Multiple Access Spatial Modulation Channel

Antennas and Propagation. Chapter 5c: Array Signal Processing and Parametric Estimation Techniques

Joint Transmitter-Receiver Adaptive Forward-Link DS-CDMA System

Non-Orthogonal Multiple Access (NOMA) in 5G Cellular Downlink and Uplink: Achievements and Challenges

Modeling and Analysis of User-Centric and Disjoint Cooperation in Network MIMO Systems. Caiyi Zhu

Image analysis. CS/CME/BIOPHYS/BMI 279 Fall 2015 Ron Dror

Spectrum- and Energy-Efficient OFDM Based on Simultaneous Multi-Channel Reconstruction

Layered Space-Time Codes

Block Processing Linear Equalizer for MIMO CDMA Downlinks in STTD Mode

Performance Analysis of MUSIC and LMS Algorithms for Smart Antenna Systems

Forward-Backward Block-wise Channel Tracking in High-speed Underwater Acoustic Communication

Lecture 12: Summary Advanced Digital Communications (EQ2410) 1

Chapter 15: Radio-Wave Propagation

CSCD 433 Network Programming Fall Lecture 5 Physical Layer Continued

Advanced 3G & 4G Wireless Communication Prof. Aditya K. Jagannatham Department of Electrical Engineering Indian Institute of Technology, Kanpur

Subspace Adaptive Filtering Techniques for Multi-Sensor. DS-CDMA Interference Suppression in the Presence of a. Frequency-Selective Fading Channel

Microlens Image Sparse Modelling for Lossless Compression of Plenoptic Camera Sensor Images

Performance Analysis of MUSIC and MVDR DOA Estimation Algorithm

Hamming Codes as Error-Reducing Codes

Noncoherent Multiuser Detection for CDMA Systems with Nonlinear Modulation: A Non-Bayesian Approach

Communications IB Paper 6 Handout 5: Multiple Access

Performance of Smart Antennas with Adaptive Combining at Handsets for the 3GPP WCDMA System

Energy-Optimized Low-Complexity Control of Power and Rate in Clustered CDMA Sensor Networks with Multirate Constraints

Wireless Communication: Concepts, Techniques, and Models. Hongwei Zhang

PinPoint Localizing Interfering Radios

Antennas Multiple antenna systems

Multiple Antennas in Wireless Communications

Experiment O11e Optical Polarisation

Spectrum Sharing Between Matrix Completion Based MIMO Radars and A MIMO Communication System

Wireless Medium Access Control and CDMA-based Communication Lesson 08 Auto-correlation and Barker Codes

A Novel SINR Estimation Scheme for WCDMA Receivers

An Introduction to Compressive Sensing and its Applications

Performance Study of A Non-Blind Algorithm for Smart Antenna System

Estimation of I/Q Imblance in Mimo OFDM System

Spread Spectrum Communications and Jamming Prof. Debarati Sen G S Sanyal School of Telecommunications Indian Institute of Technology, Kharagpur

Cooperative versus Full-Duplex Communication in Cellular Networks: A Comparison of the Total Degrees of Freedom. Amr El-Keyi and Halim Yanikomeroglu

Experimental Study on Super-resolution Techniques for High-speed UWB Radar Imaging of Human Bodies

J. Electrical Systems 13-3 (2017): Regular paper. An efficient digital signal processing method for RRNS-based DS-CDMA systems

S.D.M COLLEGE OF ENGINEERING AND TECHNOLOGY

Distributed Compressed Sensing of Jointly Sparse Signals

Advancing Underwater Acoustic Communication for Autonomous Distributed Networks via Sparse Channel Sensing, Coding, and Navigation Support

Channel Modelling ETI 085. Antennas Multiple antenna systems. Antennas in real channels. Lecture no: Important antenna parameters

Noncoherent Compressive Sensing with Application to Distributed Radar

Lecture 3: Wireless Physical Layer: Modulation Techniques. Mythili Vutukuru CS 653 Spring 2014 Jan 13, Monday

Resource Pooling and Effective Bandwidths in CDMA Networks with Multiuser Receivers and Spatial Diversity

CH 4. Air Interface of the IS-95A CDMA System

6 Uplink is from the mobile to the base station.

Question Points Score Total 100

Efficient Decoding for Extended Alamouti Space-Time Block code

SPREADING SEQUENCES SELECTION FOR UPLINK AND DOWNLINK MC-CDMA SYSTEMS

CSCD 433 Network Programming Fall Lecture 5 Physical Layer Continued

Outage Probability of a Multi-User Cooperation Protocol in an Asynchronous CDMA Cellular Uplink

Mobile & Wireless Networking. Lecture 4: Cellular Concepts & Dealing with Mobility. [Reader, Part 3 & 4]

Downlink Erlang Capacity of Cellular OFDMA

Neural Blind Separation for Electromagnetic Source Localization and Assessment

Blind Reconstruction and Automatic Modulation Classifier for Non-Uniform Sampling Based Wideband Communication Receivers

Degrees of Freedom in Multiuser MIMO

A Blind Array Receiver for Multicarrier DS-CDMA in Fading Channels

Transcription:

EECS 16A Designing Information Devices and Systems I Spring 2016 Official Lecture Notes Note 18 Code Division Multiple Access In many real world scenarios, measuring an isolated variable or signal is infeasible. Consider the case of CDMA (Code Division Multiple Access). In cellular networks, the geographical area is divided into cells which are served by a single cell tower. Users in a particular cell talk to the tower associated with that cell in order to communicate with other users (placing a call, texting) or to fetch content from the internet. Users use various techniques in order to avoid interfering with other users in the cell. (There is also the matter of interference with users from other cells but we will not talk about it in this notes.) One such technique used to separate users is CDMA. CDMA is a Spread-spectrum technology in which each user is allocated a special code which serves as its signature. The message signal to be transmitted changes at a much slower rate when compared to that of the signature code. The message signal is can be any real number and the signature codes are streams of ±1. The signature codes have a high auto-correlation values and the cross-correlation values with other codes are very low. The signature codes are known by each user as well as the tower. The signature codes are multiplied with the appropriate message signal to get the transmission signal. The signal received at the tower is a linear combination of signals from all transmitting users. We assume that most of the times, the number of users transmitting at the same time is a small fraction of the total number of users in the cell. Let T m be the message time which is the time for each message and T c be the code time which is the time for each new symbol of the code to be generated. In the figure T m = 14T c. In this note, the relationship between T m and T c is given by T m = k T c and k is called the signature length. Let the signature code for user i in a cell be represented by φ i. Consider a single message time. Let the message transmitted in this single message time by all the users in the cell be given by the vector x where x[i] denotes the message transmitted by user i. Let b denote the signal received at the tower in this message time. Then we have the following relationship: b = Φ x (1) where Φ is the matrix whose i th column is a circularly shifted version of φ i. How can one go about using b to extract the signal x? As a first attempt we could correlate the received signal b with each of the signatures that could possibly be and take the peak correlation value to be the message value. Let us look at this example in which there are about 2000 users in the cell and only 3 users (user 40, 100 and 312) transmit and their corresponding messages are 10, 10 and 8. The result of the correlation is shown in Fig. 1. We see that although we do see the peaks for all the users which are present, the values aren t quite right. Let us look at another example in which 4 users (user 40, 100, 312 and 350) transmit and their corresponding messages are 100, 10, 8 and 0.02. The result of the correlation with different signatures is shown in Fig. 2. EECS 16A, Spring 2016, Note 18 1

Figure 1: Maximum correlation of received signal with circular shifts of all the signatures Figure 2: Maximum correlation of received signal with circular shifts of all the signatures EECS 16A, Spring 2016, Note 18 2

Figure 3: Maximum correlation of residue of the received signal after genie aided removal with circular shifts of all the signatures The peaks corresponding to users 100, 312 and 350 don t seem to appear at all! What could possibly cause this? Perhaps the very haigh value of user 40 s signal cross-correlated enough with other signatures to kill the peaks corresponding to users 100, 312 and 350. What if a genie told us the level of the highest signal (user 40) is 100. Maybe killing the signal will result in canceling of this interference and we could see the other peaks. After removing the signal corresponding to user 40, the result of the correlation with the signatures is shown in Fig. 3 We now see the peaks correspnonding to users 100 and 312. But we do not usually have a genie to tell us the signal level. Then what could serve as a good proxy for the actual signal level? Let us try the max correlation value which is the projection of the recieved signal onto that signature space. The results of correlations of the received signal in the first step and residues in the subsequent steps is shown in Fig. 4 In Fig. 4d we would have expected to find a peak at user 350 but we surprisingly we don t. Why is that the case? When can we not find the peak where it should have been? The reason was that we were removing correlated signal from the measurement as if they were orthogonal which is not the case here. The right approach would be to remove the projection of the received signal onto the subspace spanned by the signatures (the least-squares approach would give us the projection of the received signal onto a subspace). If we project the received signal onto the subspace spanned by the signatures of user 40, 100 and 312 and remove it from the received signal and look for a unique signature again, we get Fig. 5. Orthogonal Matching Pursuit The discussion in the previous section gives us an algorithm for extracting information from sparse signal. This algorithm is called Orthogonal Matching Pursuit (OMP). Suppose x R d is the sparse vector we want to measure, with m non-zero entries (its sparsity). Let S be the EECS 16A, Spring 2016, Note 18 3

(a) Step 1: Correlation of signatures with the received signal (b) Step 2: Correlation with residue after removal of user 40 s signal (c) Step 3: Correlation with residue after removal of user 100 s signal (d) Step 4: Correlation with residue after removal of user 312 s signal Figure 4: Maximum correlation of received signal with circular shifts of all the signatures Figure 5: Maximum correlation of residue of the received signal after removal of the projection of the received signal onto the subspace spanned by the signatures found so far EECS 16A, Spring 2016, Note 18 4

n d measurement matrix with columns S i such that: [ S 1 S d ] x = y where the vector y R n is the results from the n measurements of x. We can recover the signal exactly if there are exactly d (linearly independent) measurements (n = d), but OMP works even when the number of measurements is less than the number of dimensions (n < d). Here is a high-level description of OMP: 1. Find the vector S (not chosen before) with the highest correlation with y. 2. Use least squares to project y onto the subspace spanned by the vectors already found in previous steps and S, then find the residue r (this is the quantity minimized by least squares). 3. Repeat the above steps using r in place of y for a total of m times, the sparsity of vector x. First, what does it mean for a vector S to have the highest correlation with y? Geometrically, this means that the angle between S and y is the smallest amongst all vectors S i. This translates to max, which is i S i y equivalent to max S i, y when we assume all vectors S i are normalized. Next, to project y onto the subspace i spanned by the selected vectors, we create a matrix A with the selected vectors as its columns, and find the least squares estimate ˆx minimizing A ˆx b 2. For example, if the selected vectors are S 2 and S 4, the [ ] [ ] minimized quantity is ˆx 2 2 S 2 S 4 b ˆx 4. The following section precisely describes the implementation of OMP. Setup: Let the number of possible unique signatures (and users) be d and the unique signatures be represented by S i (of length n). Each signature can potentially carry a message α i along with it. Then the measurement at the receiver is y = d i=1 S i, y α i S i (2) We will assume that the number of users talking at the same time is very small i.e., there are at most m non-zero α i s. The OMP algorithm is described below. 1: Inputs: An n d dimension signature matrix S with columns S i An n dimension measurement vector y The sparsity level m of the signal 2: Outputs: An estimate ˆα in R d of the ideal message A set Λ m containing m elements from {1,2,...,d} An n-dimensional approximation y Am of the measurement vector y An n-dimensional residual r = y y Am EECS 16A, Spring 2016, Note 18 5

3: procedure OMP(S, y, m) 4: r y (portion of measurement to be explained) 5: A 0 [ ] (signatures found in the measurement) 6: j 1 (interation variable) 7: Λ 0 [ ] (vectors found) 8: while r 0 do 9: procedure FIND SIGNATURE( r, S) 10: k argmax S i, r i 11: v j S k 12: A j [A j 1 v j ] 13: Λ j Λ j 1 k 14: end procedure 15: procedure FIND PROJECTION(A j, y) 16: y A j A j (A T j A j) 1 A T j y 17: r y y A j 18: end procedure 19: j j + 1 20: end while 21: ˆx (A T ma m ) 1 A T m y 22: The estimate for the ideal signal has nonzero indices at the components listed in Λ m. The value of the estimate ˆα in component equals λ j the jth component of ˆx 23: end procedure EECS 16A, Spring 2016, Note 18 6