IDMA Slides P.ping

download IDMA Slides P.ping

of 56

Transcript of IDMA Slides P.ping

  • 7/24/2019 IDMA Slides P.ping

    1/56

    1

    Interleave Division Multiple Access

    (IDMA)

    Lihai Liu, Raymond Leung and Li Ping

    Department of Electronic and EngineeringCity University of Hong Kong

  • 7/24/2019 IDMA Slides P.ping

    2/56

    2

    Outline

    Introduction Iterative detection

    Performance evaluation

    Multi-user gain in fading channels Other applications

    Conclusions

  • 7/24/2019 IDMA Slides P.ping

    3/56

    3

    Outline

    Introduction Iterative detection

    Performance evaluation

    Multi-user gain in fading channels Other applications

    Conclusions

  • 7/24/2019 IDMA Slides P.ping

    4/56

    4

    The Focus of this Talk

    We will mostly focus on up-link multiple access channels

    (MAC), although the results can be applied to down-linkbroadcasting channels (BC).

    For detail, see

    Li Ping, Lihai Liu, K. Y. Wu and W. K. Leung, "Interleave-division multiple-

    access,"IEEE Trans. on Wireless Commun, pp. 938-947, April 2006.

  • 7/24/2019 IDMA Slides P.ping

    5/56

    5

    Desired Features of a Good Up-link Scheme

    low receiver cost

    de-centralized (i.e., asynchronous) control simple treatment of ISI cross-cell interference mitigation diversity against fading

    high power efficiency high spectral efficiency suitable for both wide or narrow band transmission flexible rate adaptation

    multi-user gain (detailed tomorrow).

    A conventional method (such as TDMA, FDMA, CDMA etc)cannot provide all these features simultaneously. Is there a unifiedsolution? Yes!

  • 7/24/2019 IDMA Slides P.ping

    6/56

    6

    Problems with TDMA, FDMA and CDMA

    TDMA and FDMA require centralized control and strict

    synchronization. They are not flexible in many situations. Forexample, it is quite difficult to synchronize an ad hoc network.

    TDMA and FDMA are strictly sub-optimal in fading environments.In particular, TDMA and FDMA (and OFDMA) can be seriously

    inferior in MIMO channels. This is related to multi-user gain.

    CDMA is flexible regarding synchronization. However, CDMA is a

    low-rate scheme by nature. It is difficult to provide high single-user

    throughput with CDMA.

  • 7/24/2019 IDMA Slides P.ping

    7/56

    7

    Multi-User Gain (MUG)

    From information theory, allowing multiple users to transmit

    simultaneously can lead to significantly power reduction. Thisadvantage is referred to as multi-user gain.

    See:

    Peng Wang, Jun Xiao, and Li Ping, "Comparison of orthogonal and non-

    orthogonal approaches to future wireless cellular systems,"IEEE Vehicular

    Technology Magazine, vol. 1, no. 3, pp. 4-11, Sept. 2006.

  • 7/24/2019 IDMA Slides P.ping

    8/56

    8

    Multi-User Gain in Fading Channels

    Up-link, sum-rate = 8 bits/chip, Pout= 0.01

    about12dB

    channelcapacity

  • 7/24/2019 IDMA Slides P.ping

    9/56

    9

    An Example of Multi-User Gain

    For details, see

    Li Ping, Qinghua Guo, and Jun Tong, The OFDM-IDMA approach towireless communication systems,IEEE Wireless Commun. Mag., June 2007.

    Multi-usergain

    OFDM-IDMA

    OFDMA

    Average transmission power

  • 7/24/2019 IDMA Slides P.ping

    10/56

    10

    The Problem with CDMA

    0

    0.5

    1

    1.5

    2

    2.5

    3

    3.5

    4

    -2 0 2 4 6 8 10 12 14

    Eb/N0 (dB)

    S

    p

    ectral

    efficien

    cy

    (b

    its/ch

    ip

    )

    Matched Filter

    Optimal

    xxx

    Multi-userdetection isnecessary to getinto this range.

  • 7/24/2019 IDMA Slides P.ping

    11/56

    11

    Shannon showed in 1940s that optimal communication systems can

    be built using randomly generated signals.

    However, random coding has long been regarded as genius

    theoretical concept, rather than a practical method. The advent ofturbo coding showed that Shannons is actually very practical, atleast for binary error correction codes.

    Turbo and LDPC codes have solved the problem for random binarycode design. How about other applications?

    It turns out that it is very easy to achieve random signaling in a

    multi-user environment.

    What is an Optimal System

    t

  • 7/24/2019 IDMA Slides P.ping

    12/56

    12

    Here is an engineering approach to random coding based

    on interleaving

  • 7/24/2019 IDMA Slides P.ping

    13/56

    13

    IDMA System Model

    h1

    hk

    hK n

    1d

    kd

    Kd

    Transmitter for user-1

    1ENC1

    Transmitter for user-k

    kENCk

    Transmitter for user-K

    .

    .

    KENCK

    ...

    ..

    .

    =

    +=K

    k

    kkh1

    nxr

    x1

    xk

    xK

  • 7/24/2019 IDMA Slides P.ping

    14/56

    14

    CDMA System Model

    h1

    hk

    hK n

    1d

    kd

    Kd

    Transmitter for user-1

    ENC1

    Transmitter for user-1

    ENCk

    Transmitter for user-K

    ENCK

    ...

    ..

    .

    =

    +=K

    k

    kkh1

    nxr

    x1

    xk

    xK

    s1

    sk

    sK

  • 7/24/2019 IDMA Slides P.ping

    15/56

    15

    Comparison of IDMA and CDMA

    h1

    hk

    hK n

    1d

    kd

    Kd

    Transmitter for user-1

    ENC1

    Transmitter for user-1

    ENCk

    Transmitter for user-K

    ENCK

    ...

    ...

    x1

    xk

    xK

    1

    k

    K

    h1

    hk

    hK n

    1d

    kd

    Kd

    Transmitter for user-1

    ENC1

    Transmitter for user-1

    ENCk

    Transmitter for user-K

    ENCK

    ...

    ...

    x1

    xk

    xK

    s1

    sk

    sK

    IDMA CDMA

    Interleaving in IDMA does not incur rate loss, but spreading inCDMA incurs rate loss.

  • 7/24/2019 IDMA Slides P.ping

    16/56

    16

    A Factor Graph for a LDPC Code

  • 7/24/2019 IDMA Slides P.ping

    17/56

    17

    A Factor Graph for a CDMA System

    User 1 information bits

    User 2 information bits

  • 7/24/2019 IDMA Slides P.ping

    18/56

    18

    A Factor Graph for an IDMA System

    User 1 information bits

    User 2 information bits

  • 7/24/2019 IDMA Slides P.ping

    19/56

    19

    Outline

    Introduction Iterative detection

    Performance evaluation

    Multi-user gain in fading channels Other applications

    Conclusions

  • 7/24/2019 IDMA Slides P.ping

    20/56

    20

    The Iterative Principle

    The optimal approach is to consider two constraints jointly.

    A sub-optimal approach is to handle one constraint at a time using aniterative process.

    User 1:

    User 2:

    coding constraintt

    User 3:

    ReceivedSignal:

    superpositionconstraint

  • 7/24/2019 IDMA Slides P.ping

    21/56

    21

    IDMA System Model

    h1

    hk

    hK n

    1d

    kd

    Kd

    user-1

    ENC1

    user-k

    ENCk

    user-K

    ENCK

    ...

    ...

    =

    +=K

    k

    kkh1

    nxr

    x1

    xk

    xK

    s1

    sk

    sK

  • 7/24/2019 IDMA Slides P.ping

    22/56

    22

    Message Passing at Channel Nodes

    User 1 information bits

    User 2 information bits

  • 7/24/2019 IDMA Slides P.ping

    23/56

    23

    Gaussian Approximation Detection

    Path model and Gaussian approximation

    Estimation:

    ( ) ( )k k k

    h x j j+=

    1( ) ( ) ( )

    K

    k k

    kr j h x j n j

    == +

    ( )

    2

    2

    ( ( ) E( ( )) )exp( )

    Pr( ( ) 1) 2Var( ( )) 2log = log ( ) E( ( ))

    ( ( ) E( ( )) )Pr( ( ) 1) Var( ( ))

    exp( )2Var( ( ))

    k k

    k k kk

    k kk k

    k

    r j j h

    x j j hr j j

    r j j hx j j

    j

    = + =

    +=

    Gaussian

    ( ) ( )2

    ( ) = ( ) E( ( ))Var( ( ))

    kk k

    k

    he x j r j j

    j

    Some details:

  • 7/24/2019 IDMA Slides P.ping

    24/56

    24

    Chip-by-Chip (CBC) Detection Algorithm

    Step 1.

    Step 2.

    Step 3.

    ( ) ( ) ( ) ( )E ( ) E E ( )k k kr jj h x j =

    ( ) ( )1

    E ( ) E ( )K

    k k

    k

    r j h x j

    =

    =

    ( ) ( )2

    ( ) ( ) E( ( ))Var( ( ))

    kk k

    k

    he x j r j j

    j=

    ( ) ( )2

    1

    Var ( ) Var ( )K

    k k

    k

    r j h x j

    =

    =

    ( ) ( ) ( )2

    ( )Var ( ) Var Var ( )k k kr jj h x j =

    Notes:(1) There is no matrix operation.(2) E(xk(j) and Var(xk(j)) are the feedback from the decoders.

  • 7/24/2019 IDMA Slides P.ping

    25/56

    25

    A Factor Graph for an IDMA System

    User 1 information bits

    User 2 information bits

  • 7/24/2019 IDMA Slides P.ping

    26/56

    26

    Chip-by-Chip Multiuser Detection

    Chip-by-ChipProcessing

    APPDEC-k

    k

    1k

    r={r(j)}

    APPDEC-11

    1

    1

  • 7/24/2019 IDMA Slides P.ping

    27/56

    27

    Complexity

    6 additions and 6 multiplications per chipper iteration peruser.

    Complexity (per user) is independent of user number K.

    Comparison: To achieve good performance, the cost for MMSECDMA multi-user detection is O(K2) due to matrix operations.

  • 7/24/2019 IDMA Slides P.ping

    28/56

    28

    Un-coded IDMA

    1.E-05

    1.E-04

    1.E-03

    1.E-02

    1.E-01

    1.E+00

    0 2 4 6 8 10 12 14 16 18 20 22 24

    Average Eb/N0(dB)

    BER

    8 users 64 users

    single-user

    Rate-1/8 repetition coding

  • 7/24/2019 IDMA Slides P.ping

    29/56

    29

    Convolutional-Repetition Coded IDMA

    (a)(b)

    1.E-05

    1.E-04

    1.E-03

    1.E-02

    1.E-01

    1.E+00

    0 2 4 6 8 10 12 14 16 18 20 22

    Average Eb/N0 (dB)

    BER

    IDMA

    8 users

    IDMA

    16 users

    IDMA

    32 usersIDMA

    64 users

    CDMA

    6 users

    matched filter

    capacities

    Rate and rate repetition coding. Overall rate =1/8.

  • 7/24/2019 IDMA Slides P.ping

    30/56

    30

    Outline

    Introduction Iterative detection

    Performance evaluation

    Multi-user gain in fading channels

    Other applications

    Conclusions

  • 7/24/2019 IDMA Slides P.ping

    31/56

    31

    The Basic Principle

    The analysis of an iterative decoder or iterative multi-user detectoris usually a difficult task. For example, for an iterative CDMAmulti-user detector, the impact of spreading sequences are acomplicated issue.

    However, for IDMA, it is quite straightforward. This is because theoperation is at the chip level. We detect a chip a time, which is veryeasy to analyze.

    For Detail, see

    Lihai Liu, Jun Tong, and Li Ping, "Analysis and optimization of CDMA systems

    with chip-level interleavers,"IEEE J. Select. Areas Commun., pp. 141-150,

    January 2006.

  • 7/24/2019 IDMA Slides P.ping

    32/56

    32

    IDMA Performance Evaluation

    )()()(

    )()()(

    1

    jnjxhpjxhp

    jnjxhpjr

    kiiiikkk

    K

    k

    kkk

    ++=

    +=

    =

    ( )

    +=ki

    old

    iiii

    kknewkSNRfhp

    hpSNR 2)(2

    2

    )(||

    ||

    Gaussian

    kSNR k = ,0)0(

    Received chip:

    SNR evolution:

    Initialization:

  • 7/24/2019 IDMA Slides P.ping

    33/56

    33

    SNR Evolution for an IDMA Detector

    ESE

    APPDEC-k

    1k

    r={r(j)}

    APP

    DEC-1

    k

    11

    1

    {e(x1(j))}

    {E(x1(j))}

    {e(xk(j))}

    {E(xk(j))}

    Iterativedetector

    ESE

    f()

    r={r(j)}

    f()

    SNR1

    SNRk

    Variance1

    Variancek

    Evolutionprocess

  • 7/24/2019 IDMA Slides P.ping

    34/56

    34

    SNR Evolution for an IDMA DecoderThe iterative detector can be characterized by the following SNRevolution process:

    This is much simpler and faster than simulation.

    2( )

    2 ( ) 2

    | |

    | | ( )new k k

    k old

    i i i i

    i k

    h pSNR

    h p f SNR

    =+

    ESE

    f()1

    k

    r={r(j)}

    f()

    SNR1

    SNRk

    k

    11

    1Variance1

    Variancek

    Evolution

    process

    Evolutionformula

  • 7/24/2019 IDMA Slides P.ping

    35/56

    35

    IDMA Performance Evaluation

    DECkSNRk

    f(SNRk)

    f-function of a rate R=1/2

    ideal code