lagrange/vandermonde mui eliminating user codes for quasi ...2058 ieee transactions on signal...

17
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000 2057 Lagrange/Vandermonde MUI Eliminating User Codes for Quasi-Synchronous CDMA in Unknown Multipath Anna Scaglione, Member, IEEE, Georgios B. Giannakis, Fellow, IEEE, and Sergio Barbarossa, Member, IEEE Abstract—A family of codes for low-complexity quasi-syn- chronous code division multiple access (CDMA) systems is developed in order to eliminate multiuser interference (MUI) completely in the presence of unknown and even rapidly varying multipath. Judiciously designed precomputable symbol-periodic user codes, which we term Lagrange or Vandermonde, and the corresponding linear receivers offer a generalization of orthogonal frequency division multiplexing (OFDM), which are especially valuable when deep-fading, carrier frequency errors, and Doppler effects are present. The flexibility inherent to the designed transceivers is exploited to derive transmission strategies that cope with major impairments of wireless CDMA channels. The symbol-periodic code design is also generalized to include the class of aperiodic spreading and orthogonal multirate codes for variable bit rate users. Performance analysis and simulations results illustrate the advantages of the proposed scheme over competing alternatives. Index Terms—Channel equalization, code division multiple ac- cess, multiuser and multicarrier communications. I. INTRODUCTION T HE recognition of code division multiple access (CDMA) as a promising multiple access scheme has rendered it a viable choice for the next generation cellular standard (UMTS/IMT-2000) [15]. Denoting by the symbol duration and by the available bandwidth, the maximum possible number of orthogonal codes is approximately equal to the time-bandwidth product [2]. CDMA systems use a large to accommodate a large number of users , with , where denotes the chip duration [24]. Although CDMA systems can provide higher capacity than TDMA systems in cellular networks, their performance de- pends on the number of active users and their rates. Higher aggregate data rates cause performance degradation when multiuser interference (MUI) increases. As a result, only underloaded CDMA systems outperform TDMA and FDMA if simple matched filter receivers are employed. However, Manuscript received January 11, 1999; revised February 18, 2000. This work was supported by NSF CCR under Grant 98-05350 and the Wireless Initiative Grant 99-79443. The associate editor coordinating the review of this paper and approving it for publication was Prof. Dimitrios Hatzinakos. A. Scaglione and G. B. Giannakis are with the Department of Electrical and Computer Engineering, University of Minnesota, Minneapolis, MN 55455 USA. S. Barbarossa is with the Information and Commmunication (INFOCOM) Department, University of Rome “La Sapienza,” Roma, Italy. Publisher Item Identifier S 1053-587X(00)04944-8. it is possible to achieve full capacity while preserving low error probability when more complex receivers are deployed, based on the active users’ codes and channel status informa- tion. Those include joint multiuser detectors and successive decoding schemes [24]. Zero-forcing (ZF) or minimum mean-square error (MMSE) linear multiuser detectors outperform matched filter receivers because (under certain constraints) they are capable of handling asynchronous users, near-far effects, and multipath (see, e.g., [9], [13]). Linear solutions are valuable because they simplify multiuser detection, but deriving the corresponding equalizers often involves complex operations. An exception is given by the receiver design in [7], but the price paid is that to achieve MUI elimination, the system should face a consistent reduction in the maximum possible aggregate rate. Moreover, since, in wireless communications, multipath channels are unknown, training sequences are periodically transmitted to estimate the active users’ channel parameters. Following [21], blind approaches based on subspace methods or adaptive inverse filtering have been proposed recently in order to obviate bandwidth-consuming training sequences [3], [11], [14], [20], [25]. They rely only on the received data and on the knowledge of the codes, but they have relatively high complexity when subspace channel estimation is employed or reduced capability to suppress MUI, especially when simple (e.g., LMS-type) receivers are adopted to equalize fast varying channels. Novel low-complexity CDMA transceivers are introduced in [17] that are capable of eliminating MUI deterministically in the presence of unknown and even rapidly varying multipath, provided that the channel has finite memory and that the users’ asynchronism is limited. More important, the resulting receivers in [17] do not rely on the received data because they are pre- computable from appropriately designed user codes. Compared with competing solutions such as [19], we will show herein that our design also leads to a class of codes capable of perfect MUI elimination with minimum product. Unlike blind CDMA systems that mitigate MUI at the receiver, the proposed system selects user codes so that MUI is suppressed, irrespective of FIR frequency selective multipath, which is converted into a flat fading one. The latter is analogous to the property exhibited by orthogonal frequency-division multiple access (OFDMA), which will turn out to be a special case of our general code design algorithm. We focus, as with OFDMA, on a quasisyn- chronous (QS) system, where users’ asynchronism is limited 1053–587X/00$10.00 © 2000 IEEE

Upload: others

Post on 24-Jan-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Lagrange/Vandermonde mui eliminating user codes for quasi ...2058 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000 to only a few chips.1 Under the QS model, our transmission

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000 2057

Lagrange/Vandermonde MUI Eliminating UserCodes for Quasi-Synchronous CDMA in Unknown

MultipathAnna Scaglione, Member, IEEE, Georgios B. Giannakis, Fellow, IEEE, and Sergio Barbarossa, Member, IEEE

Abstract—A family of codes for low-complexity quasi-syn-chronous code division multiple access (CDMA) systems isdeveloped in order to eliminate multiuser interference (MUI)completely in the presence of unknown and even rapidly varyingmultipath. Judiciously designed precomputable symbol-periodicuser codes, which we term Lagrange or Vandermonde, andthe corresponding linear receivers offer a generalization oforthogonal frequency division multiplexing (OFDM), which areespecially valuable when deep-fading, carrier frequency errors,and Doppler effects are present. The flexibility inherent to thedesigned transceivers is exploited to derive transmission strategiesthat cope with major impairments of wireless CDMA channels.The symbol-periodic code design is also generalized to includethe class of aperiodic spreading and orthogonal multirate codesfor variable bit rate users. Performance analysis and simulationsresults illustrate the advantages of the proposed scheme overcompeting alternatives.

Index Terms—Channel equalization, code division multiple ac-cess, multiuser and multicarrier communications.

I. INTRODUCTION

T HE recognition of code division multiple access (CDMA)as a promising multiple access scheme has rendered

it a viable choice for the next generation cellular standard(UMTS/IMT-2000) [15]. Denoting by the symbol durationand by the available bandwidth, the maximum possiblenumber of orthogonal codes is approximately equal to thetime-bandwidth product [2]. CDMA systems use alarge to accommodate a large number of users, with

, where denotes the chip duration [24].Although CDMA systems can provide higher capacity thanTDMA systems in cellular networks, their performance de-pends on the number of active users and their rates. Higheraggregate data rates cause performance degradation whenmultiuser interference (MUI) increases. As a result, onlyunderloaded CDMA systems outperform TDMA and FDMAif simple matched filter receivers are employed. However,

Manuscript received January 11, 1999; revised February 18, 2000. This workwas supported by NSF CCR under Grant 98-05350 and the Wireless InitiativeGrant 99-79443. The associate editor coordinating the review of this paper andapproving it for publication was Prof. Dimitrios Hatzinakos.

A. Scaglione and G. B. Giannakis are with the Department of Electricaland Computer Engineering, University of Minnesota, Minneapolis, MN 55455USA.

S. Barbarossa is with the Information and Commmunication (INFOCOM)Department, University of Rome “La Sapienza,” Roma, Italy.

Publisher Item Identifier S 1053-587X(00)04944-8.

it is possible to achieve full capacity while preserving lowerror probability when more complex receivers are deployed,based on the active users’ codes and channel status informa-tion. Those include joint multiuser detectors and successivedecoding schemes [24].

Zero-forcing (ZF) or minimum mean-square error (MMSE)linear multiuser detectors outperform matched filter receiversbecause (under certain constraints) they are capable of handlingasynchronous users, near-far effects, and multipath (see, e.g.,[9], [13]). Linear solutions are valuable because they simplifymultiuser detection, but deriving the corresponding equalizersoften involves complex operations. An exception is given bythe receiver design in [7], but the price paid is that to achieveMUI elimination, the system should face a consistent reductionin the maximum possible aggregate rate. Moreover, since, inwireless communications, multipath channels are unknown,training sequences are periodically transmitted to estimatethe active users’ channel parameters. Following [21], blindapproaches based on subspace methods or adaptive inversefiltering have been proposed recently in order to obviatebandwidth-consuming training sequences [3], [11], [14], [20],[25]. They rely only on the received data and on the knowledgeof the codes, but they have relatively high complexity whensubspace channel estimation is employed or reduced capabilityto suppress MUI, especially when simple (e.g., LMS-type)receivers are adopted to equalize fast varying channels.

Novel low-complexity CDMA transceivers are introduced in[17] that are capable of eliminating MUI deterministically inthe presence ofunknownand even rapidly varying multipath,provided that the channel has finite memory and that the users’asynchronism is limited. More important, the resulting receiversin [17] do not rely on the received data because they are pre-computable from appropriately designed user codes. Comparedwith competing solutions such as [19], we will show herein thatour design also leads to a class of codes capable of perfect MUIelimination with minimum product. Unlike blind CDMAsystems that mitigate MUI at the receiver, the proposed systemselects user codes so that MUI is suppressed,irrespectiveofFIR frequency selective multipath, which is converted into aflat fading one. The latter is analogous to the property exhibitedby orthogonal frequency-division multiple access (OFDMA),which will turn out to be a special case of our general codedesign algorithm. We focus, as with OFDMA, on a quasisyn-chronous (QS) system, where users’ asynchronism is limited

1053–587X/00$10.00 © 2000 IEEE

Page 2: Lagrange/Vandermonde mui eliminating user codes for quasi ...2058 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000 to only a few chips.1 Under the QS model, our transmission

2058 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000

to only a few chips.1 Under the QS model, our transmissionstrategy weds FDMA’s advantage of enabling channel indepen-dent MUI-free reception with TDMA’s improved performancethat are made by design independent of the number of activeusers. In addition, our proposed system preserves the attrac-tive features of CDMA in terms of efficiency and provision forMMSE and RAKE receivers that for a known channel and neg-ligible MUI are robust against common impairments affectingwireless channels.

In Section II, the discrete time model is described. OurLagrange-Vandermonde (LV) code design is developed inSection III, where we also establish theuniquenessof the LVtransceivers. In Section IV, we derive the dual solution, namely,the Vandermonde-Lagrange (VL) transceivers, which offerincreased flexibility in the code management. The current trendwithin the UMTS standardization process in Europe foreseesadoption of the so-called orthogonal variable spreading factor(OVSF) codes to accommodate variable bit rate users. How-ever, OVSF codes are highly sensitive to multipath becausetheir cross-correlations are not negligible. Building on theLV scheme, we provide in Section V a class of codes thatenables multirate services and guarantees MUI elimination atthe expense of a small reduction in the information rate dueto the insertion of guard times. In the same section, we alsoderive the class of MUI-free long codes, namely, those codeswith duration greater than the symbol period (the long codescurrently adopted by IS-95, for example). In Section VI, westudy the performance, which is expressed in terms of error andoutage probabilities, for frequency-selective Rayleigh fadingchannels. We also provide theoretical performance analysis ofour system in the presence of multipath and Doppler shifts. InSection VII, we compare the so-called root control with powercontrol strategies as antifading techniques. We also introduceredundant coding against channel fading and root hopping tobalance quality of service provided to different users.

II. M ODELING AND MOTIVATION

The block diagram in Fig. 1 represents the uplink of aCDMA system, which is described in terms of its equivalentdiscrete-time baseband model, where signals, codes, and chan-nels are represented by samples of their complex envelopestaken at the chip rate (see also [20] and [23]). The continuoustime signal transmitted by the th user is a PAMwaveform , where

th user’s encoded data;chip period;pulse-shaping filter.

Upsamplers and downsamplers serve the purpose of multi-plexing and demultiplexing (spreading and despreading) by afactor .

Each of the users spreads the information sequencewith the upsampler and encodes it using the code of

1In QS-CDMA systems, users attempt to transmit following the base station’sclock waveform [18] (or a GPS, as suggested in [5]). However, the receivedwaveforms at the base station are still asynchronous by a few chips due to oscil-lator drifts and Doppler arising from relative motion between the mobiles andthe base station.

Fig. 1. Multirate discrete-time CDMA model.

length : . Denoting bythe continuous time code

and by the symbol duration, the usual representationof the CDMA waveform can be easily obtained as

(1)

The th user’s transmitted signal is convolved with thechannel impulse response and filtered at the receiverthat is matched to . The spectrum is assumed tohave Nyquist characteristics such that for

with . The bandwidth is also the user band-width for the power spectrum of the user baseband equivalentsignal in (1) is (see, e.g., [2])

(2)

where indicates the continuous-time Fourier transform(CFT), is the discrete Fourier transform (DFT) of thesymbol’s correlation, is the DFT of the code ,and . Hence, in(2) dictates the signal bandwidth, whereas determineshow “spread” in frequency the users’ information (for example,if is a PN sequence, is nearly flat) is.

Let us denote the convolution of transmit with receive filtersby and the equivalent discrete time channel impulse re-sponse by . The thuser’s signal component at the chip rate can then be written as

(3)

In addition to transmit-receive filters andunknownmultipatheffects, the th-order FIR2 filter includes the th user’s asyn-

2The assumption of finite channel support is not exact if the bandwidth isstrictly limited, but this approximation is common in wireless environments,where the impulse response support is nearly equal to the maximum path delayplus a few chips.

Page 3: Lagrange/Vandermonde mui eliminating user codes for quasi ...2058 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000 to only a few chips.1 Under the QS model, our transmission

SCAGLIONEet al.: LAGRANGE/VANDERMONDE MUI ELIMINATING USER CODES 2059

chronism in the form of delay factors (note that if user 1 is takenas reference, then in the absence of multipath, asynchronism ofuser relative to user 1 by chips corresponds to a pure delaychannel with .The downlink scenario is subsumed in our model because it cor-responds to .

The multiplexed data are received in AGN (, filtered, and sampled at the chip rate to obtain

(4)

Subsequent processing by the receive filter amounts to cor-relating with the sequence of length [or equiv-alently convolving with the conjugated and time-reversed

]. The resulting output is downsampled by(thecombination of filtering and downsampling corresponds to de-spreading), and the decision is taken over the estimate

(5)

To cast (4) and (5) in vector-matrix form, let us define thevectors

(6)

(7)

the channel vector

(8)

and the Toeplitz code matrices with

(9)

Using definitions (6)–(9), we express theth element ofin (4) as

(10)

Observing that, we obtain

(11)

Note that (11) holds even if the code length is greater than, which is the symbol period in terms of chips, and the re-

sulting system operates as a “partial response” system. This addsflexibility to the system design that will be discussed in Sec-tion V. Because the codes convolved with the FIR channel yielda sequence of length , we have from (9) thatfor and . Therefore, the summationover in (11) has only nonzero terms,and we can rewrite it as

(12)

and, for example, if and , then .Recall now from (5) that has length , define

, and rewrite (5) as

(13)

where.

Based on (12) and (13), theth user’s symbol estimate isgiven by (14), shown at the bottom of the page.

Before raising the MUI elimination problem, we wish to un-derline that our signal model in (1) is symbol periodic. Sinceour goal is to design the set of user codes that guarantees de-terministic channel-irrespective MUI elimination with a linearreceive filter and operating in a symbol-by-symbol fashion, anonsymbol-periodic scheme would not modify the problem inessence.

If MUI in (14) is modeled as additive (approximately)Gaussian noise and one optimizes at the decision point,the simple yet robust matched filter (MF) receiver is obtainedas and is equivalent to the RAKE receiverif all channel paths are combined coherently. However, thissolution does not take advantage of the known interfering users’codes. Code design within the MF/RAKE receiver frameworkconsists of selecting codes with good cross correlation proper-ties, which satisfy

(15)

(14)

Page 4: Lagrange/Vandermonde mui eliminating user codes for quasi ...2058 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000 to only a few chips.1 Under the QS model, our transmission

2060 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000

where is an matrix, and isthe Kronecker delta. The term cancels MUI, whereas

eliminates ISI. The latter is not strictly necessary be-cause ISI can be handled with equalizers following the RAKEreceiver.

It is of interest to show why (15) can only be an approxima-tion. If (15) is to hold exactly, linear algebra requires thecolumns of all matrices to lie in the left null space

, . Hence, to ensure the absenceof MUI, the nullity of must satisfy

. Because in (9) is , this nullitybound is satisfied either when , which represents theundesired trivial case, or when .Such a spreading gain uses bandwidth inefficiently becausefor users and , we require

, which implies a bandwidth increase propor-tional to the channel memory and . If, besides MUI and ISIelimination we also want to have maximal ratio combining gain,we must impose (15) with so that the RAKE re-ceiver would yield maximum gain .However, imposing would require

, which in turn causes further loss in ef-ficiency because it requires longer codes3 . In the best scenario,we have and so that . Observe that MUIand ISI elimination requires . This wasalso observed in [7], where a “delay independent” linear decor-relating receiver was designed and is capable of canceling MUIindependent of the users’ asynchronism. Unfortunately, as muchas one chip of misalignment decreases the system capacity in [7]by 50%. In a nutshell, it is impossible to satisfy (15) exactly un-less we underutilize bandwidth by setting .

The natural question is whether it is possible to design codeswith perfect MUI cancellation using a linear receiver, as in [13],without knowing the users’ channels and without resorting toadaptive blind receivers. Such codes would enable one to copewith the near-far problem effectively and would handle additionof new users as gracefully as TDMA and FDMA. With this mo-tivation, instead of (15), we look for linear reduced-complexityreceivers that satisfy

(16)

where is an arbitrary vector. For (16) to hold, vectors must lie in the left null space

, .Because can be satisfied

with , let us consider the simplest case. If rank , then is

enough to include vectors in and, thus,satisfy (16). However, the Toeplitz structure ofimplies that rank , and then,

. Hence, the most efficientsolution corresponding to is possible only ifand, in the ideal case, where . Thelatter leads us to the choice of orthogonal user codes and

3Note, however, thatCCC (q) is not arbitrary, and thus far, we have not capi-talized on the special structure ofCCC (q) in (9).

corresponding matched receivers. For , the firstrows of form an lower triangularmatrix that has full rank if ; hence, with th-ordermultipath, in order to have , we need

and spreading . In the next section, we willdesign codes for , minimum spreading ,and minimum code length that implies . Notefrom (9) that if whenever , we have ;this case will be considered in Section IV, and the resultingcode-receiver design is the dual of the one presented in theensuing section.

III. L AGRANGE–VANDERMONDE CDMA TRANSCEIVERS

Our discussion in Section II motivates the following assump-tions.

a1) and , where is the maximumexpected order of all channels .

a2) We have codes with trailing zeros (guardchips); if , then .

a3) , which is guaranteed when the receiver issynchronized to the user of interest only.

The idea of introducing guard chips, which is called blackchip augmentation (BCA), was earlier advocated in [8]. Thenumber of guard chips in a2) may be large in the com-pletely asynchronous case (e.g., in IS-95) because

consists of the maximum delay in terms of chips withina symbol among all users relative to the user of interest, plusthe maximum delay-spread of the multipath.4 As (and hence

) increases, our system’s information rate decreases. In ourQS-CDMA system, chips, and hence, a1) is satis-fied with a small . On the other hand, users close to theBS will not mask the far users, and power control will under-take only the task of accounting for the dynamic range of thereceived signals.

Under a1)–a3), and, and a special case of (12) results:

(17)

Note that thanks to the guard chips in a2), successive data blocksdo not interfere with each other; thus, convolution of thethuser’s code with the channel is represented as multiplication ofthe th user’s Toeplitz matrix by the channelvector . According to (9), and under a1)–a3), matrixreduces to a Sylvester matrix

......

......

.. .

.. ....

..... .

...

(18)

4In a wireless cellular system with cell radiusR,L � RB=c, wherec is thespeed of light;L depends essentially on the transmission environment such ashilly terrain or urban.

Page 5: Lagrange/Vandermonde mui eliminating user codes for quasi ...2058 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000 to only a few chips.1 Under the QS model, our transmission

SCAGLIONEet al.: LAGRANGE/VANDERMONDE MUI ELIMINATING USER CODES 2061

If is the weight vector for receiver, its outputtakes the form

(19)

Our problem is to design codes or, equivalently,their polynomials and rely onlyon these codes to obtain so that the MUI [described by thesum in (19)] is eliminated deterministically.

To eliminate MUI irrespective of the channels ,receiver must satisfy for all ;hence, in (19) must lie in the intersection of null spaces

. On the other hand, should not annihi-late user , implying that . Following the samerationale for all users, we arrive at the necessary and sufficientconditions forchannel-independentMUI elimination:

and

(20)

With arbitrary codes , the existence of vectorssatisfying (20) is not guaranteed. For example, the

Walsh–Hadamard codes do not satisfy (20) for ; thus,perfect MUI suppression is impossible without relying onchannel knowledge. The key idea behind our code design isto exploit the Sylvester structure of in designing codesthat satisfy (20). It turns out that there is a one-to-one map-ping between the matrices and their -transform codepolynomials . In particular, ifis a root of , one can verify by direct substitution thatthe Vandermonde vector is a leftnull-vector of the corresponding matrix , i.e., .Hence, the null spaces of matrices can be controlledby the roots of the corresponding polynomials .Based on these ideas, our code design algorithm follows thesesteps.

Step 1) Select a set of distinct nonzero complex points.

Step 2) Use ’s to construct Lagrange polynomials(each of order :

(21)

where is a constant that controls theth user’stransmitted energy.

Step 3) Build the Vandermondereceive filters.

By direct substitution, it follows that andfor ; hence

(22)

for , whereas ;therefore, we have

(23)

Root is not a root of but is what we term a “signatureroot” for user because the Vandermonde receiveremploys

in order to recover and eliminate MUI interferencethat users introduce to user [by our design (21),is a root of ]. Note also that the pairs of LVtransceivers obey, by construction, (20), and upon substituting(22) and (23) into (19), we obtain

(24)

In words, (24) shows that complete MUI cancellation isachieved deterministically and that each frequency-selectivechannel is converted to a scalar multiplicative factor (flat-fadingcoefficient) .

For minimum redundancy, and symbol periodiccodes , we will prove that the LV trans-ceiver pair is theonlyone capable of accommodating exactlyusers while achieving deterministicchannel-independentMUIcancellation with a simple linear receiver (see Appendix A forthe proof).

Proposition 1: Under a1)–a3), minimum spreadingand minimum code length Lagrange

precoders and Vandermonde receivers are the only MUI-freetransceiver pairs.

Having established the uniqueness of LV pairs as the onlyMUI-free CDMA transceivers, we focus on special choices ofthe code roots. Already, from [24], one can recognize links ofLV-CDMA with OFDMA, which correspond to choosing

. The next proposition not only solidifies thislink but also attaches a means of optimality for such a choiceof signature roots (see Appendix B for the proof).

Proposition 2: OFDMA with a prefix of zeros corre-sponds to the Lagrange codes and Vandermonde receiversusing roots , . Inthis case, codes and receivers are matched, i.e., thethLagrange Vandermonde pair is , and

,Interestingly, the MUI-free code design for quasisynchronous

CDMA transmission in [19] can be interpreted as a special caseof the OFDMA roots selection but with more than one signa-ture root assigned to each user (see also Section VII-B). Ofcourse, to enforce , different users have distinct setsof roots. The user’s codes in [19] are a linear combination of theOFDMA codes polynomials with magnitude one coefficients.The code construction in [19], starts from the Rake receiverstructure in (15), and the related discussion in Section II explainswhy -free codes in [19] are such that .

We will introduce next a dual VL pair equipped with thesame MUI elimination capabilities. VL-CDMA transceiverswill allow for an easier dynamic root assignment with advan-tages similar to power control techniques used in CDMA andthe added feature of requiring minimal coordination amongusers.

Page 6: Lagrange/Vandermonde mui eliminating user codes for quasi ...2058 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000 to only a few chips.1 Under the QS model, our transmission

2062 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000

IV. V ANDERMONDE-LAGRANGE CDMA

From (24), we recall that LV transceivers eliminate MUI andconvert the channel’s frequency selectivity into flat fading. Tocope with this residual flat fading effect, we can exploit thedegrees of freedom available with the location of theroots

.To simplify the process of switching from one code set to

another and add flexibility to our system, we propose to inter-change the roles of Lagrange with Vandermonde filters. We willshow that the desired properties (22) and (23) are in effect evenif we use Vandermonde precoders and Lagrange decoders. Wewill term the transceivers adopting this section’s precoder-de-coder structure VL transceivers. Specifically, given a set of roots

, we build the VL transceiver pairs as follows.

i) Precoder for the th user is the Vandermondevector , where is thepower-controlling constant.

ii) Decoder for the th user is the vector, where are the co-

efficients of the polynomial [c.f. (21)]

(25)

The leading zeros in are used to cancel the guard intervalwhere there is superposition of two consecutive symbols due to

. Leading zeros in the VL design play the dual roleof the trailing zeros inserted in the LV design to prevent ISI. InAppendix C, we prove the following.

Proposition 3: If , the code/receiver designwith minimum spreading corresponds to the dualVL transceiver pair. The conventional OFDMA scheme withcyclic prefix is the counterpart of the OFDM with trailing zeros(Proposition 2) in the VL design.

The advantage of the new formulation with respect to theLV design shows when a deep fade, say , occurs.For example, if the th channel has a zero on , it is evi-dent from (23) that the th user cannot be recovered. Usingpower control, as foreseen by UMTS, for example, [15] wouldnot help either because the received power would remain zero ir-respective of the transmitted power. However, one can avoid theproblem by replacing the root with another rootunder the premise that is unlikely to be a channel root. TheBS then needs only to warn theth transmitter to switch fromroot to a different root, but all other users remain opera-tional without changing roots. Hence, the new formulation in-creases the system’s flexibility in the root assignment proce-dure. Of course, changing one user’s root requires modificationof all the decoder vectors, but this operation is performed at theBS; thus, VL is less troublesome than LV, where all the usershave to change their precoders when changes occur.

V. LONG-CODES AND MULTIRATE LV-CDMA SYSTEMS

Thus far, zero or negligible ISI was allowed in our designs.The received data block in the presence of ISI is given by (12).

ISI can be either an undesired effect arising when the channelorder exceeds the spreading factor or an induced ef-fect due to a code length spanning more than onesymbol. From our discussion by the end of Section II, the min-imum spreading necessary to achieve exact channel indepen-dent MUI cancellation is , which is incompat-ible with the inequality . Therefore, when ISI is dueto , ZF receivers may or may not exist, but either way,they are channel dependent. The situation is different whenlongcodes (lasting for the duration of several symbols) are adopted.In this case, and are allowed. CDMAsystems, such as IS-95, adopt codes that change from symbolto symbol in order to enhance the intercell interference mitiga-tion with matched (e.g., RAKE) receivers. In fact, the codes oftwo users in neighboring cells cannot persist in having strongcrosscorrelation due to the dynamic variation of the code. Sim-ilarly, codes spanning more symbols add degrees of freedom inthe design, which allow us to suppress interference from neigh-boring cells through the gain of coherent integration. In fact,the energy from the desired user’s signal at the receiver outputgrows as , whereas the average interference contribution in-creases as ; hence, the bigger is, the more effective inter-ference rejection becomes. However, it is important to empha-size that residual ISI mitigation and spreading gain depends on

rather than , and therefore, should be large enough to en-sure reliable symbol decisions. The channel-independent MUIsuppression feature of the LV/VL transceivers can be easily ex-tended to systems utilizing long codes. A straightforward gen-eralization of the LV/VL designs for that maintainsminimum spreading is to adopt as users’ codes

and receivers , for.

With respect to the code of Sections III or IV,the code that now spans symbols and leads to

is given by

(26)

where denotes the Kronecker product, andis an arbitrary vector. In this case,

(12) becomes

(27)

and perfect MUI cancellation can be obtained along the lines de-scribed in Sections III and IV, provided that codes and receiversare designed to satisfy (20). With receiver structure

, MUI is canceled thanks to (20), and we obtain, forthe th user’s symbol estimate

(28)

Page 7: Lagrange/Vandermonde mui eliminating user codes for quasi ...2058 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000 to only a few chips.1 Under the QS model, our transmission

SCAGLIONEet al.: LAGRANGE/VANDERMONDE MUI ELIMINATING USER CODES 2063

Different can be used in different cells to gainover the interfering signals. The coefficients dependon the strategy we adopt to cope with the deterministicISI introduced by the long codes. Notice that contrary to

, the coefficients are known to the receiver,and the two sequences and can be chosenin order to minimize ISI if their cross-correlation satisfies

. Ifare samples of a pseudo-noise sequence, the latter can beachieved with simple matched filtering . Forexample, different cells may have different PN sequences.With denoting the colored noise term, (28) is givenapproximately by

(29)

If is not sufficiently large to assure , aprecomputable linear MMSE Wiener receiver or a DFE can beadopted to achieve performance better than the matched filterreceiver.

This coding strategy is also useful for CDMA systems be-cause it enables different symbol rates through the assignmentof heterogeneous spreading factors. In the UMTS standard,all users employ the same chip rate, but the spreading factor

varies from 4 to 256 to accommodate users with differentrates. The spreading codes are the Walsh–Hadamard basis vec-tors with length and are recursively generated through

Kronecker products of all possibleth-order permutationsof the factors (1, 1) and (1,1). These codes are constructed tobe orthogonal for variable spreading factors (OVSF). Indeed, ifthere are two users and with a ratio between their symbolrates , their perfectly synchronoussignals will be orthogonal to each other whenever usercode,with the greater spreading factor and code length, is generatedas the Kronecker product of one of the codes orthog-onal to user code, followed by arbitrary factors (1, 1)and (1, 1). Otherwise stated, the short code should not be aparentof any longer code. Assigning a code excludes all thesubtrees (and possible users) originating from it, which impliesthat the number of possible OVSF codes and, consequently,users is limited by the number of users with highest rate/smallestspreading factor. Recall now that code orthogonality is lost inthe presence of users’ asynchronism and/or multipath propaga-tion. Implanting the OVSF property to our LV-VL designs willfollow the construction of the Walsh-Hadamard codes and thebasic idea underlying (26)–(28). Assume w.l.o.g. thatis thesmallest spreading factor, corresponding to the highest possiblerate. The number of highest rate users that can be accommo-dated with their LV-VL transceivers offering MUI suppressionis . However, similar to (26), from each code ,

, we can generate distinct codes with variousspreading factors , allowing channel independentMUI elimination, as follows:

(30)

Vectors are such thatfor all , we have . For a given ,

we can define orthogonal codes and thus accommo-date as many as users. As with the Walsh–Hadamard basis,to add flexibility to the system and allow for a wider varietyof rates, should also be chosen to satisfy the OVSFproperty. Hence, corresponding to one out of subcodes ,there are all the possible users associated with the OVSF schemerelying on super-codes for user separation. With theWalsh–Hadamard codes, a super-code with smaller rate cannotbe parent of a super-code associated with the same subcode ofa larger rate. Therefore, the number of possible users growsproportional to by a factor that varies from and

; thus, our system can support at leastand at mostMUI-free users with as the maximum possible

spreading factor/lowest rate. In this case, assuming inall vector definitions for , (12) reduces to

(31)

Equation (31) is a further simplification of (27) withbeing replaced by , which is the

th user’s symbol stream upsampled by a factor to achievethe highest rate . We use the suffix to indicate that the

th and th users can have , or in other words, they canhave the same subcode. Derivation of the correspondingthuser’s receiver is straightforward to find by setting

(32)

For equal subcodes , since, the user separation is obtained trough the orthogonality be-

tween and ; hence, users operating at the samerate can use the same subcode. In fact

(33)

Equation (33) shows that the LV/VL-CDMA system eliminatesMUI while allowing heterogeneous symbol rates, which is aproperty not exhibited by the OVSF Walsh–Hadamard basiscode vectors.

Page 8: Lagrange/Vandermonde mui eliminating user codes for quasi ...2058 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000 to only a few chips.1 Under the QS model, our transmission

2064 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000

Fig. 2. Scattering diagrams with the LV transceivers forN = 6; 12; 18.

Fig. 3. Scattering diagrams with OVSF Walsh–Hadamard codes and RAKEfor N = 4; 8; 16.

Example 1—Users with Multiple Rates:We compare ourmultirate LV transceivers against OVSF codes processed by aRAKE receiver that assumes perfect knowledge of the channel.In both cases, two users at three different rates are simultane-ously active. The SNR is 20 dB for both systems. The channelsare generated randomly as FIR filters of order with tapsthat are complex Gaussian variables with variance .The same set of channels is used in both schemes. The codeshave been selected so that shorter codes are notparentsoflonger codes in order to guarantee users’ orthogonality, atleast under ideal propagation conditions. From the scatteringdiagrams in Figs. 2 and 3 (different rows and columns refer,respectively, to different users and code lengths), we inferthat although long Hadamard codes manage to recover fromMUI, this is not true for short codes. Moreover, robustnesswith respect to fading is traded with a consistent degradation inperformance due to MUI. Notice also that since the LV receiveris MUI free, it clearly outperforms the RAKE receiver.

VI. PERFORMANCEANALYSIS

In all MUI-free schemes examined so far, the multipathchannel affects the th user’s performance through theflat fading factor . Symbol recoveryrequires mitigation of the multiplicative constant in

(34)

which amounts to either estimating and removingor decoding via differential demodulation the differentiallyencoded symbols. In both cases, channel variations are notallowed to be as fast as the symbol rate.

Statistical characterization of follows easily fromthe distribution of the channel vector since

(35)

where . Probability of error forthe th user depends on the signal-to-noise ratio (SNR)SNR at the output of the filter. If we normalize the

spreading-code energy, it is not difficult to prove that the LVand VL codes achieve exactly the same performance in termsof SNR , which denotes the th user’s SNR at the outputof the ZF receiver. Let us assume first that we adopt the LVscheme of Section III. Because is an AWGN vector, thenoise term in (34), becomes a (generally colored) Gaussianrandom variable with zero mean and variance

(36)

Based on (34) and (36), SNR is given by

SNR

(37)

where is the th user’s received power. In the VL case,normalizing the Vandermonde spreading code introduces thefactor , whereas the term atthe numerator of (37), which normalizes the Lagrange polyno-mials, is due to , that is, the inverse of the Lagrangereceivers’ energy. Hence, (37) with isvalid for both LV and VL schemes.

If, instead of the Vandermonde (Lagrange) receiver, the Rakereceiver is adopted, the interference from theother users will increase the noise power, and the SNRwillbe

SNR

(38)

Page 9: Lagrange/Vandermonde mui eliminating user codes for quasi ...2058 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000 to only a few chips.1 Under the QS model, our transmission

SCAGLIONEet al.: LAGRANGE/VANDERMONDE MUI ELIMINATING USER CODES 2065

where denotes the power of the MUI at the outputof the th user’s receiver. Assuming that the users are uncorre-lated, the latter is given by

(39)

Modeling the interference at the output of the Rake receiveras a zero mean Gaussian random variable, the probability oferror at the output of the Rake will be completely determinedby (38). Therefore, depending on the number of active users andrelative power levels, one may select either the ZF receiver thatis MUI free and does not suffer from near-far effects or the Rakereceiver, which is fading resistant. When the number of usersapproaches , most users will find it convenient toswitch to the ZF mode.

A. Outage Probability

Differential encoding and decoding offers simplicity at theexpense of performance loss in terms of bit error rate (BER) (seee.g., [2]). The alternative is frequent retraining to track channelvariations, which reduces bandwidth efficiency prohibitively,especially when rapid variations are present. In such cases, achannel independent MUI receiver followed by differential de-modulation is well motivated. Under the AGN assumption, non-coherent detection based on (34) for differential (D-)BPSK in-curs probability of error [2]:

SNR (40)

In the coherent case, error probability is proportional toerfc , where depends on SNR with proportionalityfactors that are constellation specific. Because, for ,erfc , we can adopt the approximationerfc and scale properly the exponentialargument to infer that (40) can still serve us as an upper bound.

To assess performance further, we model theth unknownfading channel as a complex Gaussian random vectorwith zero-mean independent components (which correspondsto the widely used Rayleigh fading model arising when nodirect path arrives at the receiver [16]). The exponentialdistribution is approximately valid, even when the coeffi-cients are non-Gaussian, provided that the followingextra conditions are met: i) the number of paths is suffi-ciently large; ii) the ’s have finite moments (which iscertainly true in practice) and are weakly correlated. Hence,

in (35) is also a zero mean complex Gaussianrandom variable and conditioned on , which implies thatSNR SNR follows an exponentialdistribution SNR SNR SNR , with

SNR (41)

where is the channel covariance matrix.With corresponding to the th receiver, the mean

, averaged over all possible channels, is propor-

Fig. 4. Roots of user codes.

tional to the characteristic function of , and for the ZFreceiver, we obtain

SNRSNR

(42)

However, the average alone is not fully repre-sentative of the overall system performance because there maybe great variations in . To characterize completely

and provide a practical figure of merit, we com-puted the outage probability , which is defined as theprobability that , where is the maximumtolerable error probability that depends on the quality of ser-vice. A system is declaredout of serviceif the error probabilityexceeds a prescribed threshold, e.g., for speech ;therefore, gives the percentage of time over which thesystem is considered out of service for the given.

The closed-form expression of is5 :

Pr

(43)

Thanks to the code/receiver design, in (43) does notdepend on power control or the number of users; thus, althoughsimple to compute, it is a very useful link-reliability parameter.

Example 2—Lagrange versus OFDMA for Time-In-variant Channels: To test Lagrange versus OFDMAcoding strategies, we simulated users withroots , with

, shown in Fig. 4 with circles, along withOFDMA’s root constellation (‘+’). We assumed the channelcovariance matrix to be , with constant for all channels,the same transmitted energy per bit for all users, and channelorder . The outage probability versus is depictedin Fig. 5, where is the receiver-noise power spectral density.The outage probability of the LV scheme with signature roots

5Using (40) PrfP (� ; hhh ) > T g = PrfSNR < � log T g. Thelast can be easily computed from the exponential distribution of SNR.

Page 10: Lagrange/Vandermonde mui eliminating user codes for quasi ...2058 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000 to only a few chips.1 Under the QS model, our transmission

2066 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000

Fig. 5. Outage probability versusE =N ; OFDMA (dashed line) LV userswith roots inside (LV-in dashed) and outside (LV-out dash-dotted).

depicted in Fig. 4 varies, depending on the root position relativeto the unit circle, whereas it remains constant for OFDMA(dashed line). Lower is achieved for the users whose coderoots have maximum amplitude 1.1, whereas those having am-plitude 0.9 have higher than OFDMA whose performanceis in the middle (and coincides with the performance of theroots with amplitude 1). This feature is potentially useful whenthe system is desired to accommodate different priority users.

The best average performance in a purely frequency selectivescenario and, with arbitrary root assignment, is achieved withthe OFDMA scheme. However, a first advantage of the extradegrees of freedom offered by the LV/VL designs arises if weconsider also time selectivity effects, which constitute the maindrawback of OFDMA schemes as will be shown in the ensuingsection.

Example 3—Comparison with Decorrelating and Rake Re-ceivers: The delay-independentreceiver in [7] has low com-plexity, as does our design. For the flat-fading QS scenario of-fers a suboptimal low complexity implementation of the decor-relating receiver in [13].

Relative to our frequency-selective channels, the channels in[7] correspond to pure delays, and ifis the maximum delayin terms of chips, in order to have , the receiver in[7] requires , with a capacity loss around50% for a single delay chip. Thanks to our judicious code de-sign, the LV transceivers can also cope withth-order multi-path channels with minimal spreading . As wesaw in Section II, if the channel is a pure delay times, a fadingscaling constant . Sinceis a Nyquist pulse, the channel transfer function will be basi-cally flat by construction. Assuming Hadamard codes with zeroguard time, setting and , we consider 16 activeusers with spreading codes numbered as with ,as in [7, Tab. I]. From Fig. 6, we observe that OFDMA outper-forms thedelay-dependentdecorrelating receiver in [13] (and,thus, it’s also the delay-independent version of [7]) in terms ofaverage BER (over 100 fading channel realizations). The users’channels are , with uniformly

Fig. 6. BER versusE =N for LV and Walsh-Hadamard and Decorrelatingreceiver in a asynchronous flat fading scenario(L = 1; P = 32+L;M = 16).

Fig. 7. BER versusE =N for LV and Gold codes of length 127 anddecorrelating receiver in frequency-selective fading(L � 15; P = 127;M =100).

distributed over one chip period, and is the raised-cosinechip-pulse with roll-off 0.22 (the rectangular pulses were usedin [7]).

In the presence of frequency selectivity our scheme suffers onthe average from fading. The average BER curves in Fig. 7 areobtained for 100 active users with Gold codes, ,and a six-finger RAKE receiver (dashed line) or the decorre-lating receiver of [13] (dashed dotted line). For our design (solidline), we used 100 roots placed uniformly around the unit circle.The random channels are generated using the power-delay pro-file known as Vehicular-B [15]; we assumed, as in UMTS [15],a chip rate of 4096 that the delays are = [0, 0.25,0.5, 0.75, 1, 1.2, 1.7, 1.9, 2.4, 2.7]s and that the paths’ am-plitudes are complex uncorrelated Gaussian random variableswith zero mean and variance [0,2.5, 6.5, 9.5, 12.5, 13,

15.5, 25.5, 21.5, 25.5] dB’s; a raised-cosine chip pulse

Page 11: Lagrange/Vandermonde mui eliminating user codes for quasi ...2058 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000 to only a few chips.1 Under the QS model, our transmission

SCAGLIONEet al.: LAGRANGE/VANDERMONDE MUI ELIMINATING USER CODES 2067

(a)

Fig. 8. (a) Roots of user codes forM = 32; 64; 128. (b) SNIR gain: Lagrange versus OFDMA forM = 32;64;128, respectively.

with roll-off 0.22 was used and the resulting random channel or-ders . Hence, appending 27 zeros to our 100-longcodes, our spreading factor . In thesecases, at high SNR, the decorrelating receiver outperforms theOFDMA solution. However, the decorrelator requires estima-tion of channel taps and the inversion ofa matrix of size 100. Furthermore, there is no guarantee that theZF receiver exists for all possible channels.

B. Doppler Effects

In contrast to OFDMA, where code roots are fixed and eq-uispaced around the unit circle, root locations in LV-CDMAcan be optimized to improve performance when dealing withfrequency- and time-selective channels. Time selectivity arisingdue to Doppler effects and/or carrier offsets manifests itself asmultiplicative factors, modulating each of the chan-nels . The th receiver output then becomes

(44)

which shows that three undesired effects arise.

ii) Symbols are modulated by .iii) Channel and code roots rotate by theunknownangle

on the complex plane.iv) MUI is superimposed to the user of interest because

is no longer a common root of(roots of the latter have rotated by .

The signal-to-noise and interference ratio (SNIR) for thethuser, resulting from (44), can be easily found to be (45), shownat the bottom of the page. Therefore, at least in principle, usercodes can be designed to maximize SNIR, by optimizingcode root locations. The optimization is challenging becauseSNIR depends nonlinearly on . However, suboptimal codesincreasing robustness against frequency drifts can be devised bydesigning polynomials such that i) is asflat as possible , and ii) is as small as possible

.Example 4—Time-Selective/Doppler Effects:To test our

Lagrange codes, we simulated users withthe roots located on concentric circles (each time 25% ofthe users have their signature roots on circles with radius

). We also compared LV with OFDMA,which assigns signature roots of all users on the unit circle.Fig. 8(b) depicts the ratio between

SNIR (45)

Page 12: Lagrange/Vandermonde mui eliminating user codes for quasi ...2058 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000 to only a few chips.1 Under the QS model, our transmission

2068 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000

obtained with the LV and OFDMA systems as a function ofthe SNR and the frequency shift, normalized to one symbolinterval . The energy of users’ codes is normalized, in allcases, to 1. Channel taps were generated as indepen-dent Gaussian random variables to simulate Rayleigh fadingchannels of order . Fig. 8(b) depicts the SNIR gain (indecibels) averaged over 128 independent channel realizationsper user and over the users and shows that OFDMA yieldsbetter performance for very small frequency shifts and atlow SNR. However, as soon as the frequency shift exceeds asmall fraction of the OFDMA filter bandwidth , the LVschemes built from the roots of Fig. 8(a) outperform OFDMA.In particular, for , the SNIR gain goes to zero whenthe product , and this is due to the fact that the anglethat separates the signature roots of the LV scheme in thisparticular case is four times the spacing between the OFDMAroots, which is . Unfortunately, the severe interferencecauses the corresponding BER curves to be very high for bothschemes, and the differences in performance are then lessaccentuated than in the SINR gain curves.

VII. FADING RESISTANT LV/VL V ARIANTS

To cope with the residual flat fading effects, in this sectionwe describe nonredundant and redundant (diversity-enhanced)modifications of our basic LV/VL design.

A. Root versus Power Control

For a given set of channels, the degrees of freedom offeredby the root selection could be optimally exploited by searchingfor the set of roots that minimize the error probabilities of allusers. However, even for known channels, such an optimiza-tion requires nonlinear programming with a large number of pa-rameters. Furthermore, the proposed LV/VL transceivers guar-antee zero-MUI, irrespective of the channel zero locations andwithout channel status information (CSI). In this subsection,we propose a nonredundant suboptimal technique for changingthe root positions when deep fades occur while maintaining theblind capability of our transceivers. The method generalizes thepower control technique currently foreseen by UMTS, wherethe BS sounds the power level of the signals received from allactive users and sends back control signals requiring users toincrease or decrease their transmitted power in order to limitMUI. In principle, the LV/VL coding strategy eliminates MUIcompletely so that power control is not needed to attenuate in-terference. However, some procedure must be developed to re-cover from deep fades that arise when some channels have zerosat the corresponding users’ codes.

With denoting the maximum number of active users theBS starts working with a set of complex roots equispaced aroundthe unit circle as with OFDMA. Proposition 2 established thatfor flat fading channels, OFDMA maximizes SNR because thedecoder is a filter matched to the precoder. With each user’ssignature root on the unit circle, the BS periodically sounds thepower received from all active users. If some users are receivedwith a power below a prescribed threshold, the BS initializes a

Fig. 9. Power received from all 32 users versus the modulus of the root of theuser with a deep fade.

procedure to move the corresponding root away from its initialposition. If the number of active users is less than the maximumnumber of users, the BS may simply assign a new signature rooton the unit circle to a low-power user. However, if the unit-circleroots are all occupied because the number of active users is equalto its maximum value, the BS must undertake a different action.Different from OFDMA, where the root positions are fixed, inour VL-CDMA system, the BS moves the root of the deeplyfaded user radially on the complex plane (the root’s phase is notaltered to avoid undesired coincidence with other roots), varyingits modulus within a certain range. The user thus gets assigned anew signature root having the same angle as before but with themodulus corresponding to the maximum power received fromthe BS. If that power level is still insufficient for reliable de-coding, the BS requests from the user to increase the transmittedpower.

Example 5—VL with Root Control:Fig. 9 refers to a CDMAsystem where 32 possible users are all active, and one of them(say, the user corresponding to the root ) transmits througha channel having a zero at . Power control can not handlesuch a fading effect. Fig. 9 shows the power that the BS receivesfrom all users as a function of the signature root of the userexperiencing the deep fade (each user transmits at a level of 0dBW). We observe that for , the power received from oneuser goes to dB. Changing the root location, some of theother users will suffer some loss, but the user with the deepestfade will recover. This gain is not possible by adjusting onlythe user’s transmit power. After having recovered from the deepfade, further power control may be used to balance the relativepower among different users.

We also considered a system with 64 users, and we simu-lated two users’ channels to have zeros on the correspondingusers’ codes. The BS changes the position of all users such thatthe corresponding received power falls below a prescribed level.Fig. 10 shows the final position of the roots (the ‘+’ correspondto the initial position, whereas the ‘’ correspond to the finalposition). With denoting the energy per bit and the noise

Page 13: Lagrange/Vandermonde mui eliminating user codes for quasi ...2058 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000 to only a few chips.1 Under the QS model, our transmission

SCAGLIONEet al.: LAGRANGE/VANDERMONDE MUI ELIMINATING USER CODES 2069

power spectral density, the minimum ratio recovers fromdB to 7 dB.

B. Redundancy Against Fading

From (22) and (23), we recall that the VL scheme eliminatesMUI and converts frequency-selective fading channels into flatfading channels characterized by the complex factor .This factor may cause severe attenuation ifis equal (or close)to a root of . To improve the robustness of the VL scheme,we may assign extra signature roots to each user. Specifically,if we assign signature roots to each user and associateVandermonde vectors with each transmitted symbol , thesignal received by theth receiver is

(46)

where is now the matrix corresponding to the Vander-monde vector formed by the root . The th receiver is com-posed of a bank of filters, each characterized by vectorsbuilt from the Lagrange polynomial having all its roots ,

, , except . Therefore, the threceiver provides outputs

(47)

which can be combined to yield an estimate of . To eval-uate the potential benefits coming from such a “root diversity,”we adopted the maximal ratio combining (MRC) strategy, as-suming that an error-free estimate of the channel is available.Supposing BPSK modulation, the decided symbol is given by

sign

sign (48)

where .The performance of MRC applied to our setup can be evalu-

ated in terms of bit error rate (BER) by extending the classicalderivations for MRC (see, e.g., [16]) when the fading coeffi-cients are expressed in terms of the channel transfer functions

.Using the Rayleigh channel model described in Sec-

tion VI-A and assuming that the roots have the samemodulus , the exponetially distributed random variables

have the same expected value (and thus variance).In general, the rv’s corresponding to differentvalues of are correlated. However, if we choose the rootsas , with and

, where is the channels’ coherence bandwidth,the random variables are approximately uncorre-lated. With this approximation, the average BER after MRC is[16, pp. 780–784]

(49)

Fig. 10. Roots of the users: original location (+) and location after (o)root-control.

where , is the average SNR per channel,i.e., , and is the variance of

. With sufficiently large, say, above 10 dB, canbe approximated as

(50)

Expression (50) is useful when it comes to choosingas areasonable compromise between robustness and efficiency loss.Larger values of lead to lower BER values, but at the sametime, they reduce the efficiency (measured as the number ofinformation bits per transmitted symbol) by exactly a factor.

C. Root Hopping

Motivated by frequency-hopping ideas, in this subsection, wedevelop a nonredundant method to cope with channel fadingusing signature root hopping. Equations (37) and (40) suggestthat the location of each user’s signature root should be as far aspossible from the channel roots. If the channel’s roots are un-known, a strategy to avoid deep fades is to switch roots fromsymbol to symbol. Recall that the channel roots are no morethan , whereas the possible signature roots are ; there-fore, not all codes will experience fading and the performanceof each user will be close to the average predicted performance.Moreover, if the hopping pattern is specific of the cell, intercellinterference can be mitigated by permuting the roots. Users atthe edges of adjacent cells will not experience consistent inter-ference from each other, even if they reuse their codes. Notethat differential demodulation can be performed only amongsymbols corresponding to the same signature root. This can beachieved by including an interleaving (deinterleaving) operationsuch that the symbols pertaining to the same root are differen-

Page 14: Lagrange/Vandermonde mui eliminating user codes for quasi ...2058 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000 to only a few chips.1 Under the QS model, our transmission

2070 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000

tially encoded (decoded). In addition, the channel should notvary faster than our root hopping rate.

Performance under our proposed root-hopping strategy, interms of SNR and , can be obtained by averaging over

, (37), and (40), respectively. However, the ad-vantage of the proposed technique can be appreciated by eval-uating how far the real performance would be from its averagewith and without root hoping. To provide a reliable transmissionlink, not only good average performance is desired, but the vari-ations around these averages should be small. On this subject.the following example illuminates the advantage of root hop-ping.

Example 6—Root Hopping:If hops are designed for theth user over the roots , the probability of error

will equal the performance of the th user, which is given byin (40), averaged over all the hops

(51)

Using (40) for the error probability expression under the sameassumptions on the channel vectors, the average probabilityof error is

(52)

and its mean square can be derived using the general formulafor the characteristic function of a quadratic form of Gaussianrandom vectors [1], and this is

(53)

where is the covariance matrix of the channel vector.Fig. 11 shows the standard deviation of the error probability

obtained without hopping (dashed line) and with hopping overroots (solid line). The results have been obtained

by averaging over 60 independent sets of channels and using,again, the Lagrange codes corresponding to the roots in Fig. 4.The channel model is the same as in Example 2. As expected,the variance of (51) decreases sensibly for , which showsthat root hopping improves the reliability of the transmissionlink.

VIII. C ONCLUDING REMARKS

We designed a general class of CDMA codes that guaranteeschannel-irrespective MUI elimination using simple linearreceivers. The resulting LV-CDMA system generalizes theOFDMA scheme, but it provides several additional degreesof freedom, which can be exploited to add robustness againstfading, carrier frequency offsets, and Doppler effects. Be-sides eliminating MUI, the proposed class of codes convertsfrequency-selective channels into flat fading channels. Tocombat the residual flat fading effects, we have introducedboth nonredundant techniques, based on root hopping or root

Fig. 11. Standard deviation of the error probability.

control, as well as redundant techniques based on maximumratio combining. Furthermore, in view of the importance oflong spreading codes used in IS-95 and the potential of accom-modating users with variable rates, we developed the class ofMUI-free long codes and LV-CDMA variable spreading codes.Our MUI-free variable rate coding scheme outperformed theWalsh-Hadamard-based scheme currently adopted for UMTS.Performance of the proposed LV/VL-CDMA transceivers wasevaluated also analytically for transmissions over frequency-se-lective Rayleigh fading channels.

Because LV/VL designs require BS-user coordination orextra diversity to ameliorate flat fading effects, we currentlyinvestigate MUI– and fading-free transceiver designs. Prelim-inary results relying on symbol blocking and long codes arereported in [6].

APPENDIX

A. Proof of Proposition 1

Matrix (18) is a convolution matrix, and its left singular vec-tors are Vandermonde because

(54)

where is the st order poly-nomial corresponding to the matrix . Clearly, from (54), theleft null space of is spanned by the Vandermonde vectorsbuilt from the roots of . When has multiple roots,a basis for the null space of should be built from the gener-alized Vandermonde (G-Vandermonde) vectors (see, e.g., [12]).The definition of the G-Vandermonde vectors is based on theproperty that if (and only if) is root of with multi-plicity , then for

(55)

Page 15: Lagrange/Vandermonde mui eliminating user codes for quasi ...2058 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000 to only a few chips.1 Under the QS model, our transmission

SCAGLIONEet al.: LAGRANGE/VANDERMONDE MUI ELIMINATING USER CODES 2071

For every th-order root of , we can define inde-pendent G-Vandermonde vectors of lengthas

where

(56)

Vector is such that for . When is not aroot of or a root with multiplicity less than, thevector is not a G-Vandermonde anymore but a cum-bersome function of the code polynomial derivatives (see, e.g.,[12]). However, it is linearly independent from with

.From (18), since in (18) has full column rank, the dimen-

sion of its null space is . Consider nowan arbitrary vector that satisfies (20). Since belongs to allleft null spaces of , , it can be expressed as

(57)

where is the Vandermondevector built from the th root of . In case ofmultiple roots, as many G-Vandermonde vectors as the rootmultiplicity will be introduced in the null-space basis of ,but for simplicity, we will keep the notation unchanged.We will denote by the number of nonzero coefficients

in the linear combination (57). The values withare assumed to be all distinct. Clearly, to

avoid the undesired trivial null solution , must bepositive. To satisfy (20), the vector in (57) must verify

(58)

On the other hand, according to (54), the product isstill a Vandermonde vector, and Vandermonde vectors corre-sponding to distinct roots are linearly independent. If is aG-Vandermonde corresponding to multiple roots, willalso be linearly independent. Hence, (58) is valid if and onlyif , the roots , corresponding to , areroots of . Considering (58) for all and , itturns out that the genericth polynomial must have asroots the union set

(59)

where multiple roots are counted as many times as their mul-tiplicity. When computing the cardinality of this set, we mustrecall that i) and that ii) the number of roots ofis , (hence, the cardinality of should be ).These two observations imply that the roots cannot be alldifferent. Indeed, if they were all different, even if only one

for each pair, we would end up with anumber of roots equal to , which contradicts ii). Con-sidering that (57) must be valid , the only possibilityfor the cardinality of to be is that , . Thisproves that the vectors are pure Vandermonde vectors or pureG-Vandermonde. Let us indicate the only nonzero term in (57)as . For every , this vector must be the same ; hence,the corresponding must be a common root of , .Moreover, to guarantee that , , must not bea root of , and thus, the only possible choice for the rootsis to select distinct points and assign of themto each polynomial, leaving out a different signature root foreach user. Arguing by contradiction, this implies that the rootsshould have multiplicity one. Indeed, if in a certain code poly-nomial, say, , , has multiplicity greater than one, thedegree of would be because must also haveall the other roots different from and from the sig-nature root . However, a code polynomial degree greater than

is in contradiction with ii). This leads directly to our codedesign algorithm.

B. Proof of Proposition 2

From the definition of in (21) and by setting, we have

(60)

Therefore, the roots of are located on theunit circle at angles .Because is of order , it follows that

is the Lagrange polynomial(21) that interpolates the points ,and

C. Proof of Proposition 3

Relying on the commutativity of convolution, we can inter-change the Toeplitz matrix in (18) with the

Vandermonde vector .If are the th Lagrange polynomial coefficients

equal to in the LV case, we obtain the product of thevector with the Toeplitzconvolution matrix built from the reversed Vandermondevector :

......

......

. . ....

. . .

(61)

Note that is a rankone matrix containing in its null space all vectors formed bythe coefficients of the st-order polynomials having

as a root; in particular, the Lagrange polynomials form abasis of its null space. Leading zeros select the lastrows of

, which, using the Vandermonde spreading codes, form

Page 16: Lagrange/Vandermonde mui eliminating user codes for quasi ...2058 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000 to only a few chips.1 Under the QS model, our transmission

2072 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000

an submatrix equal to in (61). Insertingthese expressions in (19), it is straightforward to verify that

,where is the polynomial corresponding to , i.e.,

. Therefore, building so thatare the Lagrange polynomials

(62)

we can satisfy the same conditions as (22) and (23) and achieveMUI elimination, as in (24).

This shows that VL design allows MUI cancellation withminimum spreading , with and, in par-ticular, with . The question that arises iswhether this dual VL design is also unique with the choice of

. Because and, (16) will be satisfied for all users

only if the vectors lie in the intersection. However, the structure of

for characterizes completely its null space,independent of the code. Indeed, from (9), we observe that if

, the only nonzero elements ofare contained in its first rows that form an full-rankupper-triangular submatrix. Therefore, is spannedby the canonical vectors that select the last null rowsof , or in other words, theonly possibility for having

is that has leading zeros. This is also whythe only case of interest is . Due to the struc-ture of , any should have leading zeros, withthe nonzero part of determined only by . Leadingzeros determine the absence of residual ISI and render a higherorder receiver unnecessary.

Having established the necessity of leading zeros, unique-ness of the VL design for and, thus, minimumspreading, comes from Proposition 1 as a byproduct of thecommutativity of convolution. Indeed, if is equipped withleading zeros, we are allowed to interchange the roles ofand the code vector that defines the Toeplitz matrix .We thus arrive at a problem already addressed by Proposition 1with a Sylvester matrix as in (18) that leads uniquely to the LV(here VL) design.

REFERENCES

[1] S. Betti, G. De Marchis, and E. Iannone,Coherent Optical Communica-tions Systems. New York: Wiley, 1995, vol. B.

[2] S. Benedetto, E. Biglieri, and V. Castellani,Digital TransmissionTheory. Englewood Cliffs, NJ: Prentice-Hall, 1987.

[3] S. E. Bensley and B. Aazhang, “Subspace-based channel estimation forcode division multiple access communication systems,”IEEE Trans.Commun., vol. 44, pp. 1009–1020, Aug. 1996.

[4] L. J. Cimini, “Analysis and simulation of a digital mobile channel usingorthogonal frequency division multiple access,”IEEE Trans. Commun.,vol. COMM-33, pp. 665–675, 1985.

[5] K. Fazel and G. P. Fettweis,Multi-Carrier Spread Spectrum. Boston,MA: Kluwer, 1997.

[6] G. B. Giannakis, Z. Wang, A. Scaglione, and S. Barbarossa, “Mutuallyorthogonal transceivers for blind uplink CDMA irrespective of multipathchannel nulls,” inProc. Int. Conf. Acoust., Speech, Signal Process., vol.V, Phoenix, AZ, Mar. 15–19, 1999, pp. 2741–2744.

[7] F. van Heeyswyck, D. D. Falconer, and A. U. H. Sheikh, “A delay inde-pendent decorreoating detector for quasisynchronous CDMA,”IEEE J.Select. Areas Commun., vol. 14, pp. 1619–1626, Oct. 1996.

[8] , “Code selection for decorrelating detected quasisynchronousCDMA,” in Proc. 6th Int. Conf. Wireless Commun., vol. 2, July 1994,pp. 555–569.

[9] M. L. Honig, U. Madhow, and S. Verdú, “Blind adaptive multiuser de-tection,” IEEE Trans. Inform. Theory, vol. 41, pp. 944–996, 1995.

[10] R. A. Iltis, “Demodulation and code acquisition using decorrelator de-tectors for quasisynchronous CDMA,”IEEE Trans. Commun., vol. 44,pp. 1553–1560, 1996.

[11] H. Liu and G. Xu, “A subspace method for signature waveform estima-tion in synchronous CDMA systems,”IEEE Trans. Commun., vol. 44,pp. 1346–1354, 1996.

[12] L. Lupas, “On the computation of generalized Vandermonde matrix in-verse,”IEEE Trans. Automat. Contr., vol. AC-20, pp. 559–561, 1975.

[13] R. Lupas and S. Verdú, “Near-far resistance of multiuser detectors inasynchronous channels,”IEEE Trans. Commun., vol. 38, pp. 496–508,1990.

[14] U. Madhow, “MMSE Interference suppression for direct-sequencespread-spectrum CDMA,”IEEE Trans. Commun., vol. 44, pp.3178–3188, 1994.

[15] E. Nikula, A. Toskala, E. Dahlman, L. Girard, and A. Klein, “FRAMESmultiple access for UMTS and IMT-2000,”IEEE Personal Commun.,vol. 41, pp. 16–24, Apr 1998.

[16] J. G. Proakis,Digital Communications, 2nd ed. New York: McGraw-Hill, 1989, pp. 722–725.

[17] A. Scaglione and G. B. Giannakis, “Design of user codes in QS-CDMAsystems for MUI elimination in unknown multipath,”IEEE Commun.Lett., vol. 3, pp. 25–27, Feb. 1999.

[18] V. M. Da Silva and E. S. Sousa, “Multicarrier orthogonal CDMA signalsfor quasisynchronous communication systems,”IEEE J. Select. AreasCommun., vol. 12, pp. 842–852, 1994.

[19] N. Suehiro, “A signal design without co-channel interference for approx-imately synchronized CDMA systems,”IEEE J. Select. Areas Commun.,vol. 12, pp. 837–841, June 1994.

[20] M. K. Tsatsanis, “Inverse filtering criteria for CDMA systems,”IEEETrans. Signal Processing, vol. 45, pp. 102–112, Jan. 1997.

[21] M. K. Tsatsanis and G. B. Giannakis, “Multirate filter banks for code-division multiple access systems,” inProc. Int. Conf. ASSP, vol. 2, NewYork, 1995, pp. 1484–1487.

[22] , “Optimal linear receivers for DS-CDMA systems: A signalprocessing approach,”IEEE Trans. Signal Processing, vol. 44, pp.3044–3055, Nov. 1996.

[23] M. K. Tsatsanis and Z. Xu, “Performance analysis of minimum vari-ance CDMA receivers,”IEEE Trans. Signal Processing, vol. 46, pp.3014–3022, Nov. 1998.

[24] S. Verdú, Multiuser Detection. Cambride, U.K.: Cambridge Univ.Press, 1998.

[25] X. Wang and V. Poor, “Blind equalization and multiuser detection in dis-persive CDMA channels,”IEEE Trans. Commun., vol. 46, pp. 91–103,Jan. 1998.

Anna Scaglione (M’99) received the M.Sc. andPh.D. degrees in electrical engineering from theUniversity of Rome “La Sapienza,” Rome, Italy, in1995 and 1999, respectively.

During 1997, she visited the University of Virginia(UVA), Charlottesville, as a Research Assistant. Sheis currently a Post Doctoral researcher at the Univer-sity of Minnesota, Minneapolis. Her research inter-ests are in statistical signal processing and communi-cation theory.

Page 17: Lagrange/Vandermonde mui eliminating user codes for quasi ...2058 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 7, JULY 2000 to only a few chips.1 Under the QS model, our transmission

SCAGLIONEet al.: LAGRANGE/VANDERMONDE MUI ELIMINATING USER CODES 2073

Georgios B. Giannakis(F’96) received the Diplomain electrical engineering from the National TechnicalUniversity of Athens, Athens, Greece in 1981. FromSeptember 1982 to July 1986, he was with the Uni-versity of Southern California (USC), Los Angeles,where he received the M.Sc. degree in electrical engi-neering in 1983, the M.Sc. degree in mathematics in1986, and the Ph.D. degree in electrical engineeringin 1986.

After lecturing for one year at USC, he joinedthe University of Virginia (UVA), Charlottesville,

in 1987, where he became a Professor of electrical engineering in 1997,Graduate Committee Chair, and Director of the Communications, Controls,and Signal Processing Laboratory in 1998. Since January 1999, he has beenwith the University of Minnesota, Minneapolis, as a Professor of electricaland computer engineering. His general interests lie in the areas of signalprocessing and communications, estimation and detection theory, time-seriesanalysis, and system identification—subjects on which he published more than100 journal papers. Specific areas of expertise have included (poly)spectralanalysis, wavelets, cyclostationary, and non-Gaussian signal processing withapplications to sensor array and image processing. Current research focuseson transmitter and receiver diversity techniques for equalization of single- andmultiuser communication channels, mitigation of rapidly fading channels,compensation of nonlinear amplifier effects, redundant filterbank transceiversfor block transmissions, multicarrier, and wideband communication systems.

Dr. Giannakis was awarded the School of Engineering and Applied ScienceJunior Faculty Research Award from UVA in 1988 and the UVA-EE OutstandingFaculty Teaching Award in 1992. He received the IEEE Signal Processing So-ciety’s 1992 Paper Award in the Statistical Signal and Array Processing (SSAP)area and the 1999 Young Author Best Paper Award (with M. K. Tsatsanis). Heco-organized the 1993 IEEE Signal Processing Workshop on Higher-Order Sta-tistics, the 1996 IEEE Workshop on Statistical Signal and Array Processing,and the first IEEE Signal Processing Workshop on Wireless Communicationsin 1997. He guest (co-)edited two special issues on high-order statistics (Inter-national Journal of Adaptive Control and Signal Processingand the EURASIPjournalSignal Processing) and the January 1997 Special Issue on Signal Pro-cessing for Advanced Communications of the IEEE TRANSACTIONS ONSIGNAL

PROCESSING. He has served as an Associate Editor for the IEEE TRANSACTIONS

ON SIGNAL PROCESSINGand the IEEE SIGNAL PROCESSINGLETTERS, a Secre-tary of the Signal Processing Conference Board, a member of the SP Publica-tions Board, and a member and vice-chair of SSAP Technical Committee. Henow chairs the Signal Processing for Communications Technical Committee andserves as Editor-in-Chief of the IEEE SIGNAL PROCESSINGLETTERS. He is alsoa member of the IEEE Fellow Election Committee, the IMS, and the EuropeanAssociation for Signal Processing.

Sergio Barbarossa(M’88) received the M.Sc. and Ph.D. degrees in electricalengineering from the University of Rome “La Sapienza,” Rome, Italy, in 1984and 1988, respectively.

From 1984 to 1986, he was a Radar System Engineer with Selenia, Rome,Italy. Since 1986, he has been with the Information and Communication De-partment, University of Rome “La Sapienza,” where he is an Associate Pro-fessor. In 1988, on leave from the University of Rome, he was a Research Engi-neer with the Environmental Research Institute of Michigan, Ann Arbor. Duringthe spring of 1995 and the summer of 1997, he was a visiting faculty memberwith the Department of Electrical Engineering, University of Virginia, Char-lottesville, and from March 1999 to August 1999, he was a Visiting Professorwith the University of Minnesota, Minneapolis. He has been involved in severalinternational projects concerning phased array radars, synthetic aperture radars,and mobile communication systems. His current research activity is in the areaof broadband mobile communication systems with specific attention to multipleaccess systems, optimal coding, synchronization, channel estimation, tracking,and equalization.

Dr. Barbarossa is a member of the IEEE Technical Committee on Signal Pro-cessing for Communications and is currently serving as an Associate Editor forthe IEEE TRANSACTIONS ONSIGNAL PROCESSING.