Spread Spectrum Signal for Digital Communications

Similar documents
Spread Spectrum Signal for Digital Communications

Initial Synchronization

Spread Spectrum Signal for Digital Communications

WCDMA FDD Mode Transmitter. Dr. Chih-Peng Li ( 李 )

Technical Specification Universal Mobile Telecommunications System (UMTS); Spreading and modulation (FDD) (3GPP TS version 11.3.

Multiple Access Techniques for Wireless Communications

Lauri Pirttiaho, NMP/Oulu

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

Cross Spectral Density Analysis for Various Codes Suitable for Spread Spectrum under AWGN conditions with Error Detecting Code

Spread Spectrum Techniques

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )

Code Division Multiple Access.

ECS455: Chapter 4 Multiple Access

Multiple Access Schemes

UNIT 4 Spread Spectrum and Multiple. Access Technique

ETSI TS V ( )

Chapter 7 Multiple Division Techniques for Traffic Channels

Lecture 9: Spread Spectrum Modulation Techniques

Mobile Comms. Systems. Radio Interface

CDMA Mobile Radio Networks

WCDMA Basics Chapter 2 OBJECTIVES:

SPREADING CODES PERFORMANCE FOR CORRELATION FUNCTION USING MATLAB

UNIK4230: Mobile Communications. Abul Kaosher

TELE4652 Mobile and Satellite Communications

Performance Analysis of DSSS and FHSS Techniques over AWGN Channel

Spread Spectrum: Definition

Level 6 Graduate Diploma in Engineering Wireless and mobile communications

ETSI TS V1.2.1 ( )

SC - Single carrier systems One carrier carries data stream

Wireless Transmission & Media Access

Spread Spectrum Basics Spreading Codes IS-95 Features- Transmitter/Receiver Power Control Diversity Techniques RAKE Receiver Soft Handoff

Multiple Access Techniques

A Simulation Tool for Third Generation CDMA Systems Presentation to IEEE Sarnoff Symposium

WCDMA / UMTS. Principle of Spectrum Spreading. Frequency used

Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using DSSS Optimized PN Codes in DS-CDMA Systems

SPREAD SPECTRUM (SS) SIGNALS FOR DIGITAL COMMUNICATIONS

Mobile Communications TCS 455

Part 3. Multiple Access Methods. p. 1 ELEC6040 Mobile Radio Communications, Dept. of E.E.E., HKU

ETSI TS V6.2.0 ( )

RF Lecture Series Modulation Fundamentals Introduction to WCDMA

CDMA - QUESTIONS & ANSWERS

<3rd generation CDMA wireless systems>

Technical Specification Universal Mobile Telecommunications System (UMTS); Spreading and modulation (TDD) (3GPP TS version 11.0.

CH 4. Air Interface of the IS-95A CDMA System

Multiple Access Techniques

CH 5. Air Interface of the IS-95A CDMA System

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

CDMA Technology : Pr. S. Flament Pr. Dr. W. Skupin On line Course on CDMA Technology

RFCD 202: Introduction to W-CDMA

Introduction to WCDMA and WCDMA Dimensioning for UMTS

ECS455: Chapter 4 Multiple Access

Access Methods and Spectral Efficiency

Chapter 7. Multiple Division Techniques

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.

W-CDMA for UMTS Principles

Reti di Telecomunicazione. Channels and Multiplexing

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Laboratory 5: Spread Spectrum Communications

Noise Effective Code Analysis on the Basis of Correlation in CDMA Technology

Chapter 2 Direct-Sequence Systems

= = (1) Denote the noise signal in the i th branch as n i, assume without loss of generality that the noise is zero mean and unit variance. i.e.

Spread Spectrum (SS) is a means of transmission in which the signal occupies a

CHAPTER 2 WCDMA NETWORK

Introduction to Wireless and Mobile Networking. Hung-Yu Wei g National Taiwan University

ALi Linear n-stage t ShiftRegister output tsequence

Index. API 218 APL 47 Application testing 301 Automatic Gain Control See AGC. 3GPP 18, 208, 312 3GPP specifications 47, 48, 57, 208, 220, 243, 273

Wireless Medium Access Control and CDMA-based Communication Lesson 08 Auto-correlation and Barker Codes

ETSI TS V2.1.1 ( ) Technical Specification

Cellular Network Planning and Optimization Part VI: WCDMA Basics. Jyri Hämäläinen, Communications and Networking Department, TKK, 24.1.

Smart antenna technology

Multiplexing Module W.tra.2

Chapter 7 Spread-Spectrum Modulation

ETSI SMG#24 TDoc SMG 903 / 97. December 15-19, 1997 Source: SMG2. Concept Group Alpha - Wideband Direct-Sequence CDMA: System Description Summary

Introductions to WCDMA FDD Mode Physical Layer

CHAPTER 6 SPREAD SPECTRUM. Xijun Wang

UNIK4230: Mobile Communications

ECS455: Chapter 4 Multiple Access

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Multiple Access, GSM, and IS-95

Design of Concatenated Extended Complementary Sequences for inter-base station synchronization in WCDMA TDD mode

CDMA Principle and Measurement

RADIO LINK ASPECT OF GSM

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

Communications Theory and Engineering

QUESTION BANK EC 1351 DIGITAL COMMUNICATION YEAR / SEM : III / VI UNIT I- PULSE MODULATION PART-A (2 Marks) 1. What is the purpose of sample and hold

Digital Communication System

Chapter 7 Spread-Spectrum Modulation

Mobile & Wireless Networking. Lecture 2: Wireless Transmission (2/2)

Multi-Carrier Systems

Part A: Spread Spectrum Systems

Lecture 3 Cellular Systems

Wireless Networks (PHY): Design for Diversity

IJPSS Volume 2, Issue 9 ISSN:

Unit 1 Introduction to Spread- Spectrum Systems. Department of Communication Engineering, NCTU 1

Transmission of Information by Nonsinusoidal Functions

Multi-Path Fading Channel

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK. Subject Name: Digital Communication Techniques

CDMA & WCDMA (UMTS) AIR INTERFACE. ECE 2526-WIRELESS & CELLULAR COMMUNICATION SYSTEMS Monday, June 25, 2018

Orthogonal Cyclic Prefix for Time Synchronization in MIMO-OFDM

CDMA Tutorial April 29, Michael Souryal April 29, 2006

Channel. Muhammad Ali Jinnah University, Islamabad Campus, Pakistan. Multi-Path Fading. Dr. Noor M Khan EE, MAJU

Transcription:

Wireless Information Transmission System Lab. Spread Spectrum Signal for Digital Communications Institute of Communications Engineering National Sun Yat-sen University

Multiple Access Schemes Table of Contents Spread Spectrum Communications Generation of Pseudo-Noise (PN) Sequences Elementary Codes in WCDMA

Wireless Information Transmission System Lab. Multiple Access Schemes Institute of Communications Engineering National Sun Yat-sen University

Multiple Access Schemes Time Division Multiple Access (TDMA) Frequency Division Multiple Access (FDMA) Space Division Multiple Access (SDMA) Code Division Multiple Access (CDMA)

Multiple Access -- TDMA Partition the time axis into frame of n slots and assign slots in some fashion require synchronization between users. allow variable rate sources (e.g. assign multiple slots per frame to a user). Time Orthogonality!!

Multiple Access -- FDMA Partition the spectrum into a set of bands and assign a band to each user no-need for synchronization in time between users different RF carrier frequencies variable peak power in the total signal inflexible to variable data rate per terminal the idle channel cannot be used by other users to increase or share capacity low complexity to implement Frequency Orthogonality!!

FDMA Channels

TDMA Channels on Multiple Carrier Frequencies GSM GSM System

TDMA with Use of Frequency Hopping Technique Add Add the the frequency diversity by by frequency hopping to to reduce reduce the the frequency-selective interference.

Multiple Access -- SDMA Space Division Multiple Access ( SDMA ) serves different users by using spot beam antennas. These different areas covered by the antenna beam may be served by the same frequency ( in a TDMA or CDMA system) or different frequencies ( in an FDMA system ). Use array antenna to separate the simultaneously received signals of spatially separated subscribes by exploiting the directional selectivity of the mobile radio channel. The SDMA technique can be combined with each of the other multiple access techniques ( FDMA, TDMA, CDMA ) to increase the network capacity. 0

Multiple Access -- SDMA

Block Diagram of Array Signal Processor

Adaptive Antenna Array

Concentration of Power Density of a Transmitting Antenna

Isotropic Radiator An isotropic radiator is an ideal antenna which radiates power with unit gain uniformly in all directions, and is often used to reference antenna gains in wireless systems. Maximum radiated power available from a transmitter in the direction of maximum antenna gain, as compared to an isotropic radiator, is called the effective isotropic radiated power (EIRP): EIRP = P t G t

Antenna Gain Pattern Examples of Antenna Gain Pattern: G = sin( θ ) θ G = sin( θ ) θ

sin( θ ) /θ sin(x)/x db Angle = 0 0. 0. 0. Antenna Gain 0. 0. 0. 0. 0. 0. 0 - -0. -0. -0. -0. 0 0. 0. 0. 0. Incident Angle [pi]

sin( θ ) /θ sin(x)/x db Angle = 0 0 0 0. 0 0 0. 0. 0. 0 0 0 0 0 0 0 00

( sin( θ ) / θ ) (sin(x)/x) db Angle = 0 0. 0. 0. Antenna Gain 0. 0. 0. 0. 0. 0. 0 - -0. -0. -0. -0. 0 0. 0. 0. 0. Incident Angle [pi]

( sin( θ ) / θ ) (sin(x)/x) db Angle = 0 0 0 0. 0 0 0. 0. 0. 0 0 0 0 0 0 0 00 0

Antenna Array For an M-element linear array, the array pattern is given by: Where G = e j( M ) sin( / ) φ / Mφ sin( φ / ) φ = πd sinθ / λ d : inter - element spacing λ : wavelength θ : incident angle

Array Pattern Frequency = e+00 [Hz] 0. 0. 0. M= M= M=0 Antenna Gain 0. 0. 0. 0. 0. 0. 0 - -0. -0. -0. -0. 0 0. 0. 0. 0. Incident Angle [pi]

M= M = ; Frequency = e+00 [Hz] 0 0 0. 0 0 0. 0. 0. 0 0 0 0 0 0 0 00

M= M = ; Frequency = e+00 [Hz] 0 0 0. 0 0 0. 0. 0. 0 0 0 0 0 0 0 00

M=0 M = 0; Frequency = e+00 [Hz] 0 0 0. 0 0 0. 0. 0. 0 0 0 0 0 0 0 00

Wireless Information Transmission System Lab. Spread Spectrum Communications Institute of Communications Engineering National Sun Yat-sen University

Spread Spectrum Communications Definition: The transmitted signal must occupy a bandwidth which is large than the information bit rate and which is independent of the information bit rate. Characteristics of Spread Spectrum Communications Demodulation must be accomplished, in part, by correlation of the received signal with a replica of the signal used in the transmitter to spread the information signal. Possess pseudo-randomness, which makes the signals appear similar to random noise & difficult to demodulate by receivers other than the intended ones.

Spread Spectrum Communications Advantages Jam resistance Low probability of intercept Resistance to multi-path fading Frequency sharing Channel sharing, soft capacity, soft blocking Soft handoff Disadvantages Self-jamming Near-far problem Implementation is more complex

Techniques for Spread Spectrum - Direct Sequence Spread Spectrum (DSSS) A carrier is modulated by a digital code in which the code bit rate is much larger than the information signal bit rate. These systems are also called pseudo-noise systems.

Techniques for Spread Spectrum - Time-hopped Spread Spectrum (THSS) The transmission time is divided into intervals called frames. Each frame is divided into time slots. During each frame, one and only one time slot is modulated with a message. 0

Techniques for Spread Spectrum - Frequency Hopping Spread Spectrum (FHSS) The carrier frequency is shift in discrete increments in a pattern generated by a code sequence. Fast-hop: frequency hopping occurs at a rate that is greater than the message bit rate. Slow-hop: the hop rate is less than the message bit rate.

Idealized Model of Baseband Spread- Spectrum System (DSSS System) Transmitter Channel Receiver

Waveforms in the Transmitter of DSSS

DSSS Technique in the Passband - Coherent Binary Phase-Shift Keying Transmitter

DSSS Technique in the Passband - Coherent Binary Phase-Shift Keying Receiver

Power Spectral Density

Power Spectral Density Relative to Narrow Band Interference (NBI)

Power Spectral Density After Despreading

Synchronization For proper operation, a spread-spectrum communication system requires that the locally generated PN sequence used in the receiver to despread the received signal be synchronized to the PN sequence used to spread the transmitted signal in the transmitter. A solution to the synchronization problem consists of two parts: acquisition and tracking. In acquisition, or coarse synchronization, the two PN codes are aligned to within a fraction of the chip in as short a time as possible. Once the incoming PN code has been acquired, tracking, or fine synchronization, takes place.

Synchronization Typically, PN acquisition proceeds in two steps: The received signal is multiplied by a locally generated PN code to produce a measure of correlation between it and the PH code used in the transmitter. An appropriate decision-rule and search strategy is used to process the measure of correlation so obtained to determine whether the two codes are in synchronism and what to do if they are not. For tracking, it is accomplished using phase-lock techniques, similar to those used for the local generation of coherent carrier references. 0

Wireless Information Transmission System Lab. Generation of Pseudo-Noise (PN) Sequences Institute of Communications Engineering National Sun Yat-sen University

Contents Hadamard Codes Systematic Linear Binary Block Codes Cyclic Codes Maximum-Length Shift-Register Codes (m-sequence) Preferred Sequences Gold Sequences

Hadamard Codes Hadamard code is obtained by selecting the rows of a Hadamard matrix. A Hadamard matrix M n is an n x n matrix that any row differs from any other row in exactly n/ positions. = = = 0 0 0 0 0 0 0 0 0 0 0 0 0 M M M M M M M n n n n n and form a linear binary code of block length. n n M M n min We can generate Hadamard codes with block length, and, where is a positive integer. m m n d n m = = =

Example of Hadamard Codes Hadamard Code of Length

Correlation of Orthogonal Codes Correlation properties of orthogonal codes are very sensitive to synchronization. Orthogonality of OVSF codes (or Hadamard codes) is achieved when codes are synchronized. Orthogonality of OVSF codes (or Hadamard codes) may not be maintained when codes are not synchronized.

Orthogonality is achieved when synchronization is maintained.

Orthogonality is maintained when codes are not synchronized

Orthogonality isn't maintained when codes are not synchronized

Systematic Linear Binary Block Code Any generator matrix G of an (n,k) code can be reduced by row operations (and column permutations) to the systematic form. A linear systematic (n,k) binary block encoder may be implemented by using a k-bit shift register and n-k modulo- adders tied to the appropriate stages of the shift register.

0 Systematic Linear Binary Block Code Consider a (,) code with generator matrix: m m m m C C C ] [ Word :C Code P] [I 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 m m m m m m m m m m m m m m m m x x x x x x x x x c c c x x x x G + + = + + = + + = = = =

Cyclic Codes Cyclic codes are a subset of the class of linear codes that satisfy the following cyclic shift property: if C=[c n-,c n-,,c,c,c 0 ] is a code word of a cyclic code, then [c n-,c n-,,c,c 0,c n- ], obtained by a cyclic shift of the elements of C, is also a code word. All cyclic shifts of C are code words. Reference: Digital Communications by John G. Proakis, rd edition.. &... or th edition.. &...

Pseudo-Noise Sequences A pseudo-noise (PN) sequence is a periodic binary sequence with a noiselike waveform that is usually generated by means of a feedback shift register.

Pseudo-Noise Sequences A feedback shift register consists of an ordinary shift register made up of m flip-flop (two-state memory stages) and a logic circuit that are interconnected to form a feedback circuit. With a total number of m flip-flops, the number of possible state of the shift register is at most m. A feedback shift register is said to be linear when the feedback logic consists entirely of modulo- adders. The all-zero state is not permitted. As a result, the period of a PN sequence produced by a linear feedback shift register with m flip-flops can t exceed m -. When the period is exactly m -, the PN sequence is called a maximal-length-sequence or simply m-sequence.

Properties of Maximal-Length Sequences In each period of a maximal-length sequence, the number of s is always one more than the number of 0s. Among the runs of s and of 0s in each period of a maximallength sequence, one-half the runs of each kind are of length one, one-fourth are of length two, one-eighth are of length three, and so on as long as these fractions represent meaningful numbers of runs. This property is called the run property. By a run, we mean a subsequence of identical symbols (s or 0s) within one period of the sequence. Autocorrelation property: the autocorrelation function of a maximum-length sequence is periodic and binary-valued.

Properties of Maximal-Length Sequences Convert 0 and -. Let c(t) denote the resulting waveform of the maximal-length sequence. The period of the waveform c(t) is: T b =NT c, where T c is the duration assigned to symbol or 0 and N= m -. The autocorrelation function of a periodic signal c(t) of period b T / T b is: ( τ) () ( τ) Rc = c t c t dt T Tb / b

Properties of Maximal-Length Sequences The autocorrelation function of the maximal-length sequence is: R c τ ( ) N + τ NTc = N τ T c otherwise

Properties of Maximal-Length Sequences Periodicity in the time domain is transformed into uniform sampling in the frequency domain. + N ( ) ( ) n n Sc f = δ f + sinc δ f N N n= N NTc n 0

Example of Maximum-Length Shift- Register Codes Systematic Code

Maximum-Length Shift Register

Maximal Length Shift Register (m=) 0

Maximal Length Shift Register (m=)

Maximal-Length Sequences of Shift- Register Lengths (-)

Maximal-Length Sequences of Shift- Register Lengths (-) Maximum-length shift-register codes exist for any positive value of m.

Problems with m-sequence Problems : jammer can determine the feedback connections by observing only m- chips from the PN sequence. Solution : Output sequences from several stages of the shift register or the outputs from several distinct m-sequences are combined in a nonlinear sequence that is considerably more difficult for the jammer to learn. Solution : Frequently changing the feedback connections and/or the number of stages in the shift registers.

Problems with m-sequence Problem : periodic cross correlation function between any pair of m-sequences of the same period can have relatively large peaks. Although it is possible to select a small subset of m sequences that have relatively smaller cross correlation peak values, the number of sequences in the set is usually too small for CDMA applications.

Correlation Properties of PN sequences Consider two PN sequences of period -=, one feedback shift register has the feedback taps [,] and the other one has the feedback taps [,,,]. Both sequences have the same autocorrelation function.

Peak Cross Correlation of m Sequences and Gold Sequences

Gold s theorem: Preferred Sequences Gold and Kasami proved that certain pairs of m sequences of length n (e.g. g (X) and g (X) ) exhibit a three-valued cross correlation function with values { -, -t(m), t(m)-} where: tm ( ) ( m+ )/ + odd m = ( m+ )/ + even m Two m sequences of length n with a periodic cross correlation function that takes on the possible values { -, - t(m), t(m)-} are called preferred sequences. The shift register corresponding to the product polynomial g (X) g (X) will generate m + different sequences, with each sequence having a period of m -.

Golden Sequences From a pair of preferred sequences, say a=[ a a a a n ] and b=[ b b b b n ], we construct a set of sequences of length n by taking the modulo- sum of a with the n cyclicly shifted versions of b or vice versa. Thus, we obtain n new periodic sequences with period n= m -. Together with the original sequences a and b, we have a total of n+ sequences, which are called Gold sequences. With the exception of the sequences a and b, the set of Gold sequences is not comprised of maximum-length shift-register sequences of length n. The cross correlation function for any pair of sequences from the set of n+ Gold sequences is three-valued with possible values { -, -t(m), t(m)-}. The off-peak autocorrelation function for a Gold sequence takes on values from the set { -, -t(m), t(m)-}.

Generator for a Gold Sequence of Period 0

Cross-Correlation Function Cross-correlation function of a pair of Gold sequences based on the two PN sequences [,] and [,,,].

Wireless Information Transmission System Lab. Elementary Codes in WCDMA Institute of Communications Engineering National Sun Yat-sen University

Elementary Codes in WCDMA Scrambling codes Uplink long scrambling codes Uplink short scrambling codes Downlink scrambling codes Channelization Codes Synchronization codes Downlink Synchronization Channel Uplink PRACH Preamble Reference: GPP TS. &.

Scrambling Codes Scrambling codes are used to scramble the spread sequences Multiply the spread sequences @ chip rate More random and orthogonal Uplink Long scrambling codes Short scrambling codes Possibility of multi-user detection at base stations Downlink Long scrambling codes

Spreading for Uplink DPCCH and DPDCHs c d, β d DPDCH DPDCH c d, β d Σ I c d, β d DPDCH S dpch,n I+ jq c d, β d S DPDCH c d, β d DPDCH DPDCH c d, β d Σ Q c c β c j DPCCH

Configuration of Uplink Scrambling Sequence Generator MSB LSB x c long,,n y c long,,n

Uplink Long Scrambling Codes Two elementary codes: c long,,n and c long,,n. c long,,n and c long,,n are constructed from position wise modulo sum of 00 chip segments of two binary m-sequences, x and y. x and y are originated from two generator polynomials of degree. x sequence: generator polynomial: X +X + y sequence: generator polynomial: y +y +y +y+ The sequence c long,,n is a chip shifted version of the sequence c long,,n. c long,,n and c long,,n are Gold codes.

For code number, n Uplink Long Scrambling Codes n=[n n 0 ], with n 0 being the LSB Let x n (i)andy(i) denote the i -th chip of the sequence x n and y. Initial conditions x n (0)=n 0, x n ()=n,, x n ()=n, x n ()=n, x n ()= y(0)=y()= =y()= y()=

Uplink Long Scrambling Codes Recursive formulation, i=0,, - x n (i+) =x n (i+) + x n (i) modulo y(i+) = y(i+)+y(i+) +y(i+)+y(i) modulo Gold sequence z n z n (i ) = x n (i ) + y (i ) modulo, i = 0,,,, - Z n ( i) + if zn( i) = 0 = for i = 0,,, if zn( i) =.

Uplink Long Scrambling Codes c long,,n (i ) = Z n (i ), i = 0,,,, - c long,,n is a chip shifted version of the sequence c long,,n c long,,n (i ) = Z n ((i+ ) modulo ( )), i = 0,,,, - C i i i) = c long,, n( i) + j( ) clong, n( ) long, n(, 0

Uplink Short Scrambling Sequence Generator for Chip Sequence 0 d(i) mod + + + + mod n addition multiplication mod 0 b(i) mod + z n (i) Mapper c short,,n (i) c short,,n (i) + + + 0 a(i) mod + + + +

Uplink Short Scrambling Codes Two elementary codes: c short,,n and c short,,n chips Generation From the family of periodically extended S() codes The n:th quaternary S() sequence z n (i ), 0 n, is obtained by modulo addition of three sequences One quaternary sequence a (i ) Two binary sequences b (i ) and d (i )

Uplink Short Scrambling Codes z n (i) = a(i) + b(i) + d (i) modulo (i = 0.. ) Given a code number n =[n n n 0 ] quaternary sequence a(i): g 0 (x)= x +x +x +x +x+ Initial conditions a (0) = n 0 + modulo a (i) = n i modulo, i =,,,, Recursive formulation a (i) = a (i-) + a (i-) + a (i-) + a (i-) + a (i-) modulo, i =,,,

Uplink Short Scrambling Codes Binary sequence b(i): g (x)= x +x +x +x+ Initial conditions B (i) = n +i modulo, i = 0,,,, Recursive formulation b (i) = b (i-) + b (i-) + b (i-) + b (i-) modulo, i =,,,

Uplink Short Scrambling Codes Binary sequence d (i): g (x)= x +x +x +x + Initial conditions d (i) = n +i modulo, i = 0,,, Recursive formulation d (i) = d (i-) + d (i-) + d (i-) + d (i-) modulo, i =,,, z n (i) = a(i) + b(i) + d(i) modulo (i = 0.. )

Uplink Short Scrambling Codes z n (i) is extended to length chips z n () = z n (0) Mapping C short, n is C i) = c z n (i) c short,,n (i) c short,,n (i) 0 + + - + - - + - ( i mod) + j( ) i short, n( short,, n short,, n c i mod

Spreading for All Downlink Physical Channels Except Synchronization Channel (SCH) I Any downlink physical channel except SCH S C ch,sf,m I+jQ S dl,n S P Q j

Spreading and Modulation for SCH and P- CCPCH Different downlink Physical channels (point S in Figure of previous page.) G G Σ P-SCH Σ G P S-SCH G S

Downlink Scrambling Codes codes are chosen from a total of - scrambling codes, numbered 0,, These chosen scrambling codes are divided into sets, each set has One primary scrambling code Code number, n=*i (i=0 ) secondary scrambling codes Code number, n=*i+k (k= )

Downlink Scrambling Codes primary scrambling codes Further divided into scrambling code groups Each group consisting of primary scrambling codes The j:th scrambling code group consists of primary scrambling codes **j+*k (j=0.. & k=0..) Each cell is allocated one and only one primary scrambling code. The primary CCPCH, primary CPICH, PICH, AICH, AP- AICH, CD/CA-ICH, CSICH and S-CCPCH carrying PCH are always transmitted using the primary scrambling code. The other downlink physical channels can be transmitted with either the primary scrambling code or a secondary scrambling code from the set associated with the primary scrambling code of the cell. 0

Configuration of Downlink Scrambling Code Generator 0 0 I Q 0 0

Downlink Scrambling Codes Constructed by combining two real sequences Each is constructed as the position wise modulo sum of two binary m-sequences, x and y Generator polynomials is of degree 00 chip segments (0 ms radio frame) Gold sequences x sequence: generator polynomial +X +X Initial: x (0)=, x()= x()=...= x ()= x ()=0 x(i+) =x(i+) + x(i) modulo, i=0,, -0, y sequence: generator polynomial +y +y + y 0 +y Initial: y(0)=y()= =y()= y()= y(i+) = y(i+0)+y(i+)+y(i+)+y(i) modulo, i=0,, -0

Downlink Scrambling Codes The nth Gold code sequence z n is z n (i) = x((i+n) modulo ( - )) + y(i) modulo, i=0,, - Mapping Z n ( i) + if z n ( i) = 0 = for i = 0,,, if z n ( i) = The n:th complex scrambling code sequence S dl,n is defined as: S dl,n (i) = Z n (i) + j Z n ((i+0) modulo ( -)), i=0,,,..

Channelization Codes Each CDMA channel is distinguished via a unique spreading code. These spreading codes should have low crosscorrelation values. In GPP W-CDMA, Orthogonal Variable SF (OVSF) codes are used. Preserve the orthogonality between a user s different physical channels. Scrambling is used on top of spreading.

Code-tree for Generation of Orthogonal Variable Spreading Factor (OVSF) Codes C ch,,0 =(,,,) C ch,,0 = (,) C ch,, = (,,-,-) C ch,,0 = () C ch,, = (,-,,-) C ch,, = (,-) C ch,, = (,-,-,) SF = SF = SF = The channelization codes are uniquely described as C ch,sf,k, where SF is the spreading factor of the code and k is the code number, 0 k SF-.

Channelization Codes As the chip rate is already achieved in the spreading by the channelization codes, the symbol rate is not affected by the scrambling. Another physical channel may use a certain code in the tree if no other physical channel to be transmitted using the same code three is using a code that is on an underlying branch, i.e. using a higher spreading factor code generated from the intended spreading code to be used. Neither can a smaller spreading factor code on the path to the root of the tree be used.

Channelization Codes The downlink orthogonal codes within each base station are managed by the radio network controller (RNC) in the network. The definition for the same code tree means that for transmission from a single source, from either a terminal or a base station. One code tree is used with one scrambling code on top of the tree. Different terminals and different base stations may operate their code trees independently of each other.

Generation of Channelization Codes C ch,,0 = = =,,0,,0,,0,,0,,,,0 ch ch ch ch ch ch C C C C C C ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) = + + + + + + + +,,,,,,,,,,,,,,,,,0,,0,,0,,0,,,,,,,,,,,,0, : : : n n ch n n ch n n ch n n ch n ch n ch n ch n ch n ch n ch n ch n ch n n ch n n ch n ch n ch n ch n ch C C C C C C C C C C C C C C C C C C

Synchronization The receiver requires a replica of the PN code with a correct clock phase in order to de-spread the signal. Applications in downlink synchronization Initial Cell Search (power on) Capture the slot & frame timing of the chosen BS and establish links. Target Cell Search (handoff) To re-synchronize to a new BS. In WCDMA, there is no global synchronization between BSs. Application in uplink synchronization PRACH preamble code detection.

Downlink Synchronization Base stations always transmit PN codes in synchronization channel - T c Synchronization code MS is synchronized to BS with the aid of synch. code In GPP, a synchronization code of chips is used. 00

Structure of Synchronisation Channel (SCH) Secondary SCH ac s i,0 Slot #0 Slot # Slot # Primary SCH ac p ac p ac p chips 0 chips ac s i, One 0 ms SCH radio frame ac s i, 0

Cell Search Procedures During the cell search, the UE searches for a cell and determines the downlink scrambling code and frame synchronisation of that cell. The cell search is typically carried out in three steps:. Slot synchronization. Frame synchronization/code-group identification. Scrambling-code identification 0

Slot Synchronization During the first step of the cell search procedure the UE uses the SCH s primary synchronisation code to acquire slot synchronisation to a cell. In GPP W-CDMA, Primary SCH is the same for every BS At each slot beginning, P-SCH codes of are transmitted and then turned off until the next slot. A matched filter could be used to match the code such that the strongest path from a certain BS could be captured. Due to path propagation loss, the strongest path usually comes from the nearest BS. 0

Slot Synchronization To reduce the noise effect, slot-wise accumulator could be used for accumulating the output power in several slots. Slot timing is then acquired by finding the maximum peak of accumulator output within one observation interval. One observation interval = slot period 0

Slot Synchronization Matched filter (c p ) Slot-wise accumulation Find maximum Timing modulo T slot T slot Two rays from BS i One ray from BS j Multipath channel!! 0

Primary Synchronization Codes Primary SYN code (PSC), C psc Constructed as a so called generalised hierarchical Golay sequence. Good aperiodic auto-correlation properties. Define a = <x, x, x,, x > = <,,,,,, -, -,, -,, -,, -, -, > PSC, C psc = ( + j) <a, a, a, -a, -a, a, -a, -a, a, a, a, -a, a, -a, a, a>, The leftmost chip in the sequence corresponds to the chip transmitted first in time 0

Frame Synchronization and Code Group Identification During the second step of the cell search procedure, the UE uses the SCH s secondary synchronisation code to find frame synchronisation and identify the code group of the cell found in the first step. This is done by correlating the received signal with all possible secondary synchronisation code sequences, and identifying the maximum correlation value. 0

Secondary Synchronization Codes codes: {C ssc,,,c ssc, } Complex-valued with identical real and imaginary components. Constructed from position wise multiplication of a Hadamard sequence and a sequence z The Hadamard sequences are obtained as the rows in a matrix H constructed recursively by: H H 0 k = () H = H k k H H k k k 0 Rows are numbered from the top (row): the all ones sequence.

Secondary Synchronization Codes z = <b, b, b, -b, b, b, -b, -b, b, -b, b, -b, -b, -b, -b, -b> b = <x, x, x, x, x, x, x, x, -x, -x 0, -x, -x, -x, -x, -x, -x > The k-th SSC, C ssc,k, k =,,,, C ssc,k = ( + j) <h m (0) z(0), h m () z(), h m () z(),, h m () z()> m = (k ) C ssc,k (0) is the first transmitted chip in time. 0

Code Allocation of SSCs The secondary SCH sequences are constructed such that their cyclic-shifts are unique. A non-zero cyclic shift less than of any of the sequences is not equivalent to some cyclic shift of any other of the sequences. Also, a non-zero cyclic shift less than of any of the sequences is not equivalent to itself with any other cyclic shift less than. 0

Allocation of SSCs for secondary SCH Group Group 0 Group Group 0 Group Group Group Group Group 0 0 Group 0 Group 0 Group 0 0 Group Group 0 Group 0 Group 0 Group 0 0 Group 0 0 Group Group 0 Group Group 0 0 0 Group 0 0 Group 0 Group 0 0 Group Group Group Group Group 0 0 Group 0 0 Group 0 # # # # #0 # # # # # # # # # #0 slot number Scrambling Code Group

Allocation of SSCs for secondary SCH 0 0 Group 0 Group 0 0 Group Group 0 0 Group 0 0 Group 0 0 Group 0 0 Group Group 0 0 Group Group 0 0 Group Group 0 0 Group 0 Group Group Group Group 0 0 Group Group 0 0 Group 0 0 Group Group 0 0 Group 0 Group Group 0 0 Group 0 0 Group Group Group Group 0 0 Group # # # # #0 # # # # # # # # # #0 slot number Scrambling Code Group

Frame Synchronization and Code Group Identification After the receiver knows the slot timing in the first step of cell search, the receiver can correlate the received signal with matched correlators. Each matched to Secondary Synchronization codes. However, the receiver has no knowledge about the slot position in the frame and in what group.

Frame Synchronization and Code Group Identification Solution: Exhaustive search for the slot position and the sequence of S-SCH codes. Accumulate these output samples extensively slot-byslot over all possible 0 combinations. sequences and slot positions. Choose one from 0 candidates to determine the code group and frame timing of the chosen BS. Since the cyclic shifts of the sequences are unique, the code group as well as the frame synchronisation is determined.

Scrambling-code Identification During the third and last step of the cell search procedure, the UE determines the exact primary scrambling code used by the found cell. The primary scrambling code is typically identified through symbol-by-symbol correlation over the CPICH with all codes within the code group identified in the second step. Recall that scrambling codes are in the derived code group. After the primary scrambling code has been identified, the Primary CCPCH can be detected. And the systemand cell specific BCH information can be read.

Uplink PRACH Preamble Detection The purpose of PRACH detection is to provide Node B the information of incoming requests, as well as the reference timing for delay estimation. The random-access transmission is based on a Slotted ALOHA approach. The UE can start the random-access transmission at the beginning of a number of well-defined time intervals, denoted access slots. There are access slots per two frames and they are spaced 0 chips apart.

Uplink RACH Access Slot Numbers and Their Spacing radio frame: 0 ms radio frame: 0 ms 0 chips Access slot #0 # # # # # # # # # #0 # # # # Random Access Transmission Random Access Transmission Random Access Transmission Random Access Transmission

Structure of the Random-Access Transmission The random-access transmission consists of one or several preambles of length 0 chips and a message of length 0 ms or 0 ms. Preamble Preamble Preamble Message part 0 chips 0 ms (one radio frame) Preamble Preamble Preamble Message part 0 chips 0 ms (two radio frames)

RACH Preamble Code Construction Each preamble is of length 0 chips and consists of repetitions of a signature of length chips. There are a maximum of available signatures. The random access preamble code C pre,n, is a complex valued sequence. It is built from a preamble scrambling code S r-pre,n and a preamble signature C sig,s as follows: C pre, n, s ( k) = S r pre, n ( k) C sig, s ( k) e π π j( + k ) where k=0 corresponds to the chip transmitted first in time., k = 0,,,,0

PRACH Preamble Scrambling Code The scrambling code for the PRACH preamble part is constructed from the long scrambling sequences. There are PRACH preamble scrambling codes in total. The n-th preamble scrambling code, n = 0,,,, is defined as: S r-pre,n (i) = c long,,n (i), i = 0,,, 0; 0

PRACH Preamble Scrambling Code The PRACH preamble scrambling codes are divided into groups with codes in each group. There is a one-to-one correspondence between the group of PRACH preamble scrambling codes in a cell and the primary scrambling code used in the downlink of the cell. The k-th PRACH preamble scrambling code within the cell with downlink primary scrambling code m, k = 0,,,, and m = 0,,,,, is S r-pre,n (i) as defined above with n = m + k.

PRACH Preamble Signature The preamble signature corresponding to a signature s consists of repetitions of a length signature P s (n), n=0. This is defined as follows: C sig,s (i) = P s (i modulo ), i = 0,,, 0. The signature P s (n) is from the set of Hadamard codes of length.

PRACH Preamble Signatures Preamble Signature 0 Value of n 0 P 0 (n) P (n) - - - - - - - - P (n) - - - - - - - - P (n) - - - - - - - - P (n) - - - - - - - - P (n) - - - - - - - - P (n) - - - - - - - - P (n) - - - - - - - - P (n) - - - - - - - - P (n) - - - - - - - - P 0 (n) - - - - - - - - P (n) - - - - - - - - P (n) - - - - - - - - P (n) - - - - - - - - P (n) - - - - - - - - P (n) - - - - - - - -