Beruflich Dokumente
Kultur Dokumente
I. I NTRODUCTION
Manuscript received June 2, 2010; revised December 25, 2010 and April
24, 2011; accepted July 7, 2011. The associate editor coordinating the review
of this paper and approving it for publication was K. B. Lee.
This article was presented in part at the IEEE Global Telecommunications
Conference, November/December 2009 (received the Best Paper Award).
K. Kusume and G. Bauch are with DOCOMO Euro-Labs, Landsbergerstr.
312, 80687 Munich, Germany (e-mail: kusume@docomolab-euro.com). G.
Bauch is also with Universitt der Bundeswehr Mnchen, Werner-HeisenbergWeg 39, 85577 Neubiberg, Germany.
W. Utschick is with Technische Universitt Mnchen, Arcisstr. 21, 80290
Munich, Germany.
Digital Object Identifier 10.1109/TWC.2011.111211.100954
c 2012 IEEE
1536-1276/12$31.00
KUSUME et al.: IDMA VS. CDMA: ANALYSIS AND COMPARISON OF TWO MULTIPLE ACCESS SCHEMES
bi,k
Fig. 1.
(Low-rate)
encoder
cj,k
cm,n,k
Symbol
mapper
xn,k
un,k
=1 = 0 and 2
=1 = 1. Note that ,, ,
{1, . . . , }, {1, . . . , }, denotes the -th bit
of the -th transmit symbol , of user , i.e., code bits
1,, , . . . , ,, from the encoder after the interleaver are
mapped onto symbol , by the symbol mapper.
In case of CDMA, the complex symbols , are further
spread by a user-distinct spreading code , , which
may depend on symbol index , if a scrambling code is
used. The resulting spread signals are often called chips by
convention of CDMA systems. In case of IDMA, chips are
equivalent to symbols as IDMA applies no spreading codes.
79
(4)
]T
where we define a receive vector: T , , T+s ,
[
]T
a noise vector: T , , T+s , and an effective
channel matrix of dimension (s + 1) (2s + 1) can
be defined as:
( s , s ) (, 0)
..
..
..
.
.
.
.
[
(, s ) ( + s , 0)
(5)
80
xn,1
hn,1
Ts
Ts
hn+1,1
hn+Ls ,1
n
yn
xn,K
hn,K
Ts
Ts
hn+1,K
hn+Ls ,K
multiuser
yn
1
1
1
Lm
a (cm,n,1 )
Lm (cm,n,K )
Lm
a (cm,n,K )
Fig. 3.
1
K
Ld (bi,1 )
Ld (cj,1 )
Ldc (cj,1 )
0
detector
APP
decoder
APP
decoder
Ldc (cj,K )
Ld (bi,K )
Ld (cj,K )
, , + .
(6)
=1 =s
(
)
,, for
With the a priori LLRs about code bits m
a
users and the observation , the goal of the multiuser detector
is to compute the a posteriori LLRs:
}
{
=
+1
(
)
,,
},
m ,, ln {
(7)
P ,, = 1
(
)
,,
terleaving operation by 1
. By using the total probability
theorem [26], we get:
(
)
m
e ,, =
{
}
p { , = }
P ,, =
ln
,, =+1
p { , = }
,, =1
P ,, =
},
(8)
tanh
1
+
a
,, /2
2
Each of decoders (receives) the deinterleaved version of
,, from the multiuser detector
the extrinsic LLRs m
e
d
as the channel LLRs c (, ) as illustrated in Fig. 3. From the
received channel LLRs and according to the code constraints,
the decoder computes a posteriori LLRs d (, ), which are
improved LLRs about the code bits. We do not further discuss
the decoding algorithm, since it is the standard function [27].
The channel LLRs dc (, ) are subtracted from d (, )
to get the extrinsic LLRs de (, ) (cf. Fig. 3): de (, )
d (, ) dc (, ), which are
( sent to
) the multiuser detector
m
KUSUME et al.: IDMA VS. CDMA: ANALYSIS AND COMPARISON OF TWO MULTIPLE ACCESS SCHEMES
1
, ,
1
H
, , ,
and
81
TABLE I
P ROPORTIONAL
EXPRESSION
OF CONDITIONAL PROBABILITY DENSITIES
{
}
p , = () OBTAINED BY THE DETECTORS .
,
, , H
,
E { } =
E { },
,
where
and the soft symbol replicas
, are{ computed as:
}
, E {, } =
.
,,
=1
, , H
, ,
,
We
{ also define2 } ,
2
=
,
P
{
=
}
, 2 ,
E ,
} ,
{
H
H
)(
) = + 2 .
and E (
Here, we assume the noise vector to be a zero
mean proper complex Gaussian with the covariance
matrix 2 and we assume {that transmit symbols }are
)(
)H =
mutually
E }(
{ T uncorrelated:
diag s , . . . , T , . . . , T+s ,
with
[
]T
,1 , . . . , , .
, where the
The MMSE estimate reads as:
, H
,
soft interference cancellation:
+ , , ,
,
(9)
is performed. Assuming that the MMSE estimate is Gaussian distributed, we compute the conditional mean and variance. Then, we end up with the conditional probability
density MMSE () in Table I, which is proportional to
p { , = }, i.e., p { , = } MMSE ().
Therefore, MMSE () can be used for computing the extrinsic
LLR in (8).
Note that the MMSE detector has been shown to be equivalent to the so-called jointly Gaussian detector for the BPSK
alphabet in [29] and for general complex alphabets in [28].
B. Rake Detector
Rake detector, also known as maximum ratio combining or
matched filter, is a conventional single user detection scheme
for DS-CDMA. The rake detector collects the frequency
diversity available from multipath channels, but unlike the
MMSE detection, it does not explicitly attempt to suppress
interference. Thus, the rake detector may suffer from performance degradation in the presence of strong interference, but
it is much simpler than the MMSE detector.
If the rake detector is integrated in the iterative detection and decoding technique, interference suppression
can still be performed as the soft interference cancellation by exploiting a priori information from the decoders.
Iterative rake detection has been studied, e.g., in [30]
[32]. After the soft interference cancellation as in (9), the
rake detector tries to maximize the desired signal portion
(rake)
(
MMSE
Rake
Soft rake
MMSE () exp
Rake () exp
SR () exp
1
, , )2
H
, , (
1
H
, , ,
)
(
, )2
H
,
,
(s +1)
=1
H
, , ,
T
2
(
, , )
T ,
,
and
vector
inner
products
, ,
1
H
).
The
rake
detector
is
simpler
because
,
, ,
,
no matrix inversion has to be computed, but there are still
the vector inner products. The simplest among these three
detectors is the soft rake, which does not require any of
the above mentioned complex operations. Several numerical
comparisons of the detectors by means of computer simulations will be provided in Section V. However, under certain
conditions, some of the solutions can analytically be shown to
be equivalent. In what follows, we discuss such equivalence
for CDMA and IDMA systems.
All the detectors generally give different solutions for
CDMA systems. However, the MMSE and rake detectors are
equivalent:
MMSE () = Rake () = SR ().
(for CDMA under Assumption III.1.)
Assumption III.1. users are perfectly synchronous ( =
0, ) and are transmitting over flat channels ( = 0, )
using orthogonal spreading codes ( ).
The equivalence under this assumption is intuitive and
straightforward and thus, the proof is omitted. Note, however,
82
that perfect user synchronous transmission is generally difficult to achieve and maintain in practical systems such as the
uplink of cellular systems or in ad hoc networks [35] due to,
e.g., different propagation delays for users.
The equivalence for CDMA can be further extended for
IDMA systems under a more relaxed condition. Users are not
restricted to be synchronous. That might be more relevant in
practical systems. The equivalence holds not only between the
MMSE and rake detectors, but also for the soft rake detector.
Now, we make the following assumption:
Assumption III.2. asynchronous users are transmitting
over flat channels ( = 0, ).
Under Assumption III.2, the effective channel matrix
in (5) has dimension (s + 1) (2s + 1) where
s = c = max because IDMA does not apply spreading
code, i.e., = 1 and symbol delay is equivalent to
chip delay. [The effective channel
]T vector can be written
= 0, +1 s +1 .
as: , = 0T 0, 0Ts
Other effective channel vectors , of are simply
time shifted versions of , and thus, they have at most
one non-zero element 0, . Therefore, the covariance
s
H
2
matrix =
=s , , , +
=1
has non-zero elements only in its main diagonal. Then,
2
T
, = , , H
, = , 0, +1 +1
is diagonal as well. With the diagonal structure,
1
=
we get the following equalities: H
, ,
T
T
1
T +1 1
=
)
,
0,
,
+1
+1
+1
0,
,
2
1
T
1
T
H
)
,
0,
, , ,
+1 , +1
,
becomes 0, , if = + 1, and 0 otherwise. Using these
equalities, it can be shown that:
MMSE () = Rake () = SR ()
(
)
2
2
H
0, + 2 Re{0,
, +1 }
= exp
.
T +1 , +1
(for IDMA under Assumption III.2.)
The equivalence is also applicable for broad band transmissions using orthogonal frequency division multiplexing
(OFDM) that transforms broad band signal into a set of narrow
band signals. Several references can be found that combine
IDMA with OFDM modulation [36], [37]. It should be pointed
out that the equivalence guarantees the MMSE solution without matrix inversions or matrix vector multiplications. This is
usually not the case for CDMA, if users are asynchronous.
We note that some part of the equivalence shown above
for IDMA systems have been discussed in the literature for
BPSK in [29], [38], [39] whereas our proof is more general for
complex modulation alphabets = {1 , . . . , 2 } fulfilling
the two conditions: 2=1 = 0 and 21 2=1 2 = 1
that are described in Section II.
IV. C OMPLEXITY A NALYSIS OF MMSE D ETECTOR FOR
CDMA AND IDMA
The complexity of the iterative MMSE detector arises from
the fact that the MMSE filter has to be computed for symbols of users that is repeated over iterations. There
have been a number of complexity reduction techniques in the
for large c .
KUSUME et al.: IDMA VS. CDMA: ANALYSIS AND COMPARISON OF TWO MULTIPLE ACCESS SCHEMES
TABLE II
M OST COMMONLY USED SIMULATION PARAMETERS .
10
IDMA
information bits
= 1024
convolutional code
c = 1/2, mem 4, [31, 27]8 , trellis is terminated
repetition code
r = 1/4
bit interleavers
user-independent, uniform random
interleaver size
= 2056
= 8224
modulation
QPSK (Gray labeling)
symbols
= 1028
= 4112
spreading codes
= 4, OVSF codes
user delay
= 1
K=8
10
10
BER
CDMA
10
10
according
{1/
2
+
j/
2,
1/
2
j/
2,
1/
2+
labeling:
QPSK
K=6
10
10
83
single user
CDMA, MMSE
IDMA, soft rake (=MMSE, rake)
1
3
4
Eb/N0 in dB
Fig. 4. BER performance of highly loaded CDMA (MMSE) and IDMA (soft
rake) systems with = 6, 8 users after 10 iterations on an AWGN channel.
84
10
K=8
10
10
BER
K=4
3
10
10
10
10
4
5
Eb/N0 in dB
Fig. 5. BER performance of highly user loaded CDMA and IDMA systems
with = 8 users after 10 iterations on randomly generated 16 paths channels.
The performance of the systems with = 4 users is plotted as a comparison.
( , m
a ( )) at the input of the multiuser detector, which
is also the mutual information at the output of the decoder
(, de ()) (cf. Fig. 3 and (8)). The vertical axis is the mu
tual information ( , m
e ( )) at the output of the multiuser
detector, which is also the mutual information at the input of
the decoder (, da ()).
Curves for the relation between input and output mutual
information can be plotted for both soft-in soft-out blocks:
the multiuser detector and the decoder in our system. The
trajectory between the two curves starting from the multiuser
KUSUME et al.: IDMA VS. CDMA: ANALYSIS AND COMPARISON OF TWO MULTIPLE ACCESS SCHEMES
I (c, Lm
(c)) = I (c, Lda(c))
e
0.8
K=4, CDMA
AWGN channel
K=8, CDMA
Eb/N0=5dB MMSE
rake
AWGN channel
0.9 Eb/N0=10dB
0.8
I (c, Lm
(c)) = I (c, Lda(c))
e
85
0.7
0.6
0.6
decoder:Rc=1/2
0.4
0.2
0
0
CDMA, MMSE
K=8, IDMA
K=4, IDMA
soft rake
decoder:Rc=1/2 &Rr=1/4
0.2
0.4
0.6
0.8
1
I (c, Lm
(c)) = I (c, Lde(c))
a
0.5
0.4
0.3
0.2
0.1
K=4
K=6
decoder:Rr=1/4
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
I (c, Lm
(c)) = I (c, Lde(c))
a
86
KUSUME et al.: IDMA VS. CDMA: ANALYSIS AND COMPARISON OF TWO MULTIPLE ACCESS SCHEMES
87