MC-IDMA based System

Published:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Performance Analysis of MC-IDMA based System
ABSTRACT

The Multiple Access (MA) schemes are normally differentiated on the principle that how user would be accessing the system resources, and whether that access is orthogonal or not. There are two broad categories of MA, Orthogonal MA schemes and Non-orthogonal MA schemes, the examples of orthogonal MA schemes are TDMA and FDMA whereas the examples of non-orthogonal MA schemes are CDMA and recently developed scheme known as IDMA (Interleave Division Multiple Access).

IDMA scheme has recently been developed as the alternate solution to the CDMA scheme. The concept of this technique IDMA was basically developed with the combination of the Begin Match to source 2 in source list: (11-15-09) http://eprints.ecs.soton.ac.uk/13914/1/microcoll07.pdfsomething known as code spread CDMA and also with chip Begin Match to source 2 in source list: (11-15-09) http://eprints.ecs.soton.ac.uk/13914/1/microcoll07.pdfinterleaved CDMA and potentially inherits all the attractive properties of CDMA.End Match Begin Match to source 2 in source list: (11-15-09) http://eprints.ecs.soton.ac.uk/13914/1/microcoll07.pdfIDMA is achieved by reversing the position of DS-spreading and interleaving, leading to chip interleaving instead ofEnd Match bit interleaving. Begin Match to source 2 in source list: (11-15-09) http://eprints.ecs.soton.ac.uk/13914/1/microcoll07.pdfThen different users are supposedly distinguished by their unique user specific interleavers combined with turbo-style iterative joint detection as well as channel decoding.End Match A further improvement from Begin Match to source 2 in source list: (11-15-09) http://eprints.ecs.soton.ac.uk/13914/1/microcoll07.pdfsingle carrier IDMA to Multi carrier IDMAEnd Match will be Begin Match to source 2 in source list: (11-15-09) http://eprints.ecs.soton.ac.uk/13914/1/microcoll07.pdfbeneficent End Match for the deployment of the next generation wireless networks

CHAPTER 1:
INTRODUCTION
1.1 OVERVIEW

In the earliest 20th century, numerous technologies were evolved extensively to provide novel methods and new products for the wireless communications, more significantly in the last one or two decades, wireless communication services had been penetrating in our society with tremendous growth rate. In the thesis the main concept of spread spectrum communication, particularly the cellular communication systems based on it is discussed,End Match in order to understand the concepts of multiple access technologies the below section discuss the generation of the Wireless Communication Systems in detail.

1.2 Generations of Wireless Communication Systems

Cellular generations are basically classifies on the accessing technologies they use the detailed description of the generation of wireless communication systems is provided below:

1.2.1 First Generation (1G) Wireless Communication Systems:

The very first cellular systems that were launched in the world were AMPS (i.e. Advanced Mobile Phone System), NMT (i.e. Nordic Mobile Telephone), and the TACS (i.e. Total Access Communication) [1]. These systems were designed such that these could carry voice transmission only. And these systems were based on assigning a unique frequency band to individual user. The way users could access the system was based on the principle of separating the signals of multiple users into the frequency domain known as Frequency Division Multiple Access (FDMA). In those days the market experienced tremendous growth rates which were from 30% to 50% and the user density was about 20 million by the end of 1990[2]. End Match

1.2.2 Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdf Second Generation (2G) Wireless Communication Systems:

Digital technologies shifted the 1st generation technologies to the 2nd generation technologies, 2G system were based on the multiple access techniques known as Time Division Multiple Access (TDMA) along with Code Division Multiple Access (CMDA). The first commercial system based on TDMA was known as Global System for Mobile Communication (GSM) in the year 1991 in Europe, other 2nd generation systems are IS-54 (i.e. Interim Standard 54) in North America and the PDC (i.e. Pacific Digital Cellular) in Japan, and the 2nd generation system based on CDMA was known as IS-95 (i.e. Interim Standard 95). In the mid 1990s cellular communication industry experienced extensive growth, there were about 600 million cellular subscribers worldwide at the end of 2001 [3]. End Match

1.2.3 Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfThird Generation (3G) Wireless Communication Systems:

3G wireless communication systems were actually developed to support high rate data services for example high speed internet access, videoconferencing, and the high quality image transmission). 3G wireless communication systems were initiated by the IMT-2000 (i.e. International Mobile Telecommunication 2000), which is defined by a set of independent ITU (i.e. International Telecommunication Union) Recommendations. In the meeting of the IMT-2000 a framework or particular rules for worldwide wireless access were devised by linking diversified systems based networks [4]. The important systems that were recognized were the European and Japanese Wideband-CDMA (i.e. WCDMA), besides these systems American CDMA2000 was also recognized, and also the Chinese Time Division Synchronous CDMA (i.e. TD-SCDMA) was also recognized as the 3G system. The above mentioned standards are basically based on CDMA and the operating range is about 2GHz. If we look at all over the world there are mainly four companies which have planned to launch 3G systems, which are Hutchison 3G Limited, Sunday 3G(Hong Kong), SmarTone 3G Limited and CSL Limited, these are the companies who have obtained the license from telecommunications authority, Hong Kong in the end of 2001 [5]. And CSL Limited was the first operator to launch 3G services in Hong Kong in the end of 2004End Match

1.2.4 Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfFourth Generation (4G) Wireless Communication Systems:

The technologies never stop from evolving so the 4G wireless communication Systems are being researched, before the 3G Systems were deployed, there was a debate within the researchers about the systems beyond 3G, so the researchers started investigating about the 4G systems. The standardization for the 4G systems is still on the way. In June, 2003 a recommendation was approved by ITU (i.e. ITU-R M.1645, “Frameworks and overall objectives of the future development of IMT-2000 and systems beyond IMT-2000”). This document details the expected capabilities along with the possible solutions for the 4G wireless communications systems.

Features of 4G Wireless Communication Systems:

1. 4G systems are expected to provide high data rates up to 100 Mbps for the mobility purpose, as an example for the mobile access, for the local wireless access with low mobility it is expected to provide a data rate up to 1Gbps

2. 4G systems are expected to use a packet based architecture which will be offering an increase in the system security along with the reliability, also the intersystem mobility and finally the interoperability capabilities.

3. 4G systems are expected to satisfy the future requirements for the wireless network universally so that it will provide a high data rates and seamless interface with the wired backbone network

1.3 MOTIVATION

The Multiple Access (MA) schemes are normally differentiated on the principle that how user would be accessing the system resources, and whether that access is orthogonal or not. There are two broad categories of MA, Orthogonal MA schemes and Non-orthogonal MA schemes, the examples of orthogonal MA schemes are TDMA and FDMA whereas the examples of non-orthogonal MA schemes are CDMA and recently developed scheme known as IDMA (Interleave Division Multiple Access).

IDMA scheme has recently been developed as the alternate solution to the CDMA scheme. The concept of IDMA was actually developed with the combination of the code spread CDMA [6], and also with the concept of Begin Match to source 3 in source list: Lajos Hanzo. chip interleaved CDMAEnd Match [7], Begin Match to source 3 in source list: Lajos Hanzo. and it potentially inherits many attractive properties of CDMA. The IDMA philosophy was then further developed by Ping and his teamEnd Match [8], [9] Begin Match to source 3 in source list: Lajos Hanzo. as well as by H¨oher and Sch¨oneichEnd Match [10], [11]. Begin Match to source 3 in source list: Lajos Hanzo. As described above, IDMA is achieved by reversing the position of DS-spreading and interleaving, leading to chip-interleaving instead of bit interleaving.End Match Furthermore multiple Begin Match to source 3 in source list: Lajos Hanzo. usersEnd Match are Begin Match to source 3 in source list: Lajos Hanzo. distinguished by their uniqueEnd Match user specific Begin Match to source 3 in source list: Lajos Hanzo. interleavers combined with turbo-style iterative joint detection as well as channel decoding [12].End Match A further improvement from Begin Match to source 2 in source list: (11-15-09) http://eprints.ecs.soton.ac.uk/13914/1/microcoll07.pdfsingle carrier IDMA to Multi carrier IDMAEnd Match will be Begin Match to source 2 in source list: (11-15-09) http://eprints.ecs.soton.ac.uk/13914/1/microcoll07.pdfbeneficialEnd Match for the deployment of the next generation wireless networks.

1.4. AIMS & OBJECTIVES

The aims and objectives of thesis are divided as follow:

The first objective of the thesis is to investigate the performance of the MC-IDMA system into fading channel using BPSK and QPSK modulation method and also to compare the performance.

Secondly the objective of this work is to investigate the performance of the MC-CDMA systems and compare the performance results to the MC-IDMA based system.

1.5 ORGANIZATION OF REPORT

The further chapters in this thesis work are organised as follow:

The second chapter discuss the fundamental concepts of MC-CDMA systems, furthermore the transmitter and receiver structure along with the detailed explanation. Also the key concepts of IDMA system in the multipath fading channels are discussed in order to provide the base line for the next chapter.

In the third chapter, the proposed system model is discussed along with detail discussion of the transceiver structure also the derivation is discussed in order to carry the detection analysis, finally the methodology is discussed in order to provide the necessary concepts for the simulation.

In this thesis the fourth chapter discuss the simulation results based on the proposed system model, this chapter is divided into the three scenarios, the first scenario analyze the performance of the MC-IDMA system using the BPSK modulation technique using the real channel parameters, second scenario provide the MC-IDMA system analysis using the BPSK and QPSK modulation technique and also the comparison of the first and second scenario is provided. The final scenario compares the performance of the MC-CDMA system with the MC-IDMA system and the results are discussed.

The final chapter of this thesis work discuss the overall conclusion of the simulation results along with the future recommendation.

CHAPTER 2:
BACKGROUND & LITERATURE REVIEW
1.5 BACKGROUND

One of the promising candidate for implementing the physical layer for the 4G wireless communication system is known as MC-CDMA or OFDM-CDMA. Allot of research has already been carried on OFDM-CDMA in [13],[14],[15] and [16]. But the problem is there are few disadvantages and also difficulties in the systems based on OFDM-CDMA. This scheme OFDM-CDMA employs the concept of mutual orthogonal codes to identify multiple users, the problem with this scheme is frequency selective channels can compromise the orthogonality among multiple users, which eventually results in the problem known as MAI.End Match

Multi User Detection Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdf(MUD) isEnd Match one of the Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfpotential techniqueEnd Match to handle Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfthe problemEnd Match caused by Multiple Access Interference (MAI), but there are limitations for example the Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfcomplexity level related toEnd Match MUD hasEnd Match been vital concernEnd Match as far as the practical applications are concerned

It is considered in [17], that the MAP (i.e. maximum a posteriori) has exponential complexity level with respect to the number of users (i.e. K). besides this, linear multiuser detectors of the conventional OFDM-CDMA system for examples, the decorrelator and the linear MMSE (i.e. minimum mean square error) have complexity level quadratic in nature with respect to the number of users (i.e. K), this complexity is due to the number of operations presented in resolving the phenomenon of correlation between the spreading sequences. If the K is large enough, it can be computationally prohibited for implementing practically.End Match

Systems based on MC-CDMA normally works on the concept related to the spreading sequence, which is utilized to identify different users. In another way if we discuss it in the coding theory point of view, it is not a considerable option to utilize spreading sequence concept for separating the users, because spreading will result in the bandwidth expansion without having suitable coding gain. In [18] and [19] some theoretical analysis are carried to describe that the capacity of multiple access channel can be approached only if the bandwidth expansion is entirely devoted to the Forward Error Correction coding.

A new concept of developing a hybrid communication scheme is recently proposed in which OFDM is combined with the IDMA known as OFDM-IDMA in [20] and [21]. In this scheme IDMA is employed instead of CDMA as in OFDM-CDMA, so this scheme potentially inherits many features of the OFDM-CDMA based systems, for example this scheme has simple treatment for ISI and has effective mitigation against the cross cell interference as well. And also some additional advantages are also incorporated because of IDMA, particularly IDMA has a very simple and effective turbo type iterative Multi User Detection algorithm which is applicable to systems having large number of users, which in face is crucial for systems in order to achieve high throughput. The algorithm is known as Chip by Chip detection (i.e. CBC), this algorithm has a complexity level linear in nature with respect to the number of user (i.e. K), because there are random interleavers to distinguish multiple signals from the multiple users due to this the spreading operation can simply be avoided in this scheme.

In this situation, the OFDM-IDMA scheme devotes entire bandwidth expansion to FEC coding and obtains additional coding gain. It isEnd Match considered Begin Match to source 12 in source list: Qinjing Gou. that the performanceEnd Match analysis Begin Match to source 12 in source list: Qinjing Gou. of MC-CDMAEnd Match systems Begin Match to source 12 in source list: Qinjing Gou. isEnd Match difficult. Begin Match to source 12 in source list: Qinjing Gou. ToEnd Match resolve this problem, it is required Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfto categorize the correlation matrix amongEnd Match the Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfspreading sequences,End Match Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfbecause the system performanceEnd Match is always dependent on the options of signature sequences

As it is a fact that the performance is not actually sensitive to the available options of spreading sequence when we have long random spreading codes, this phenomenon makes it mathematically demanding to analyze the performance using large random matrix theory as described in [22]

MCBegin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdf-IDMAEnd Match is a system which does not involve signature sequences, and because of because of this MC-IDMA system Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfgreatly simplifies theEnd Match problemsBegin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdf.

OFDM based system can be analyzed simply by a method known as SNR evolution, this method can be used find the optimization of the system performance can be further optimized by the power allocation.

2.2 Multicarrier CDMA (MC-CDMA) MC-CDMA is basically a technology which is based upon the concept spread spectrum principle along with the concept of combining Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfmulticarrier modulation and CDMA.

By the beginning of 1993, various multicarrier CDMA based schemes were proposed; those schemes can be differentiated on the basis of spreading and modulation type, so there are three categories: MC-CDMA, MC-DS-CDMA (i.e. Multicarrier Direct Sequence CDMA) and MT-CDMA (i.e. Multitone CDMA as in [23]. In this work the focus is only on the MC-CDMA which is also known as OFDM-CDMA. This scheme combines the benefits of OFDM and CDMA and by this it provides very effective solution for multiuser communication systems especially over the multipath channels in any cellular environment.

OFDM with sufficient Guard Interval can completely remove Intersymbol Interference. CDMA scheme can provide effective solution to mitigate the cross cell MAI problem if we compare it with other orthogonal multiple access schemes, and due to its spread spectrum nature CDMA is more robust against fading channels, so it is considered as a promising candidate for the implementation of physical layer of the future wireless systems. Allot of work is carried on this concept in [24], [25], [26] and [27]

2.3 Transmitter of OFDM-CDMA system

The transmitter block diagram of the OFDM-CDMA considering the uplink scenario with the simultaneous numbers of active users (i.e. K) is illustrated in the 2.1:

Consider the data stream of K users. Following the channel coding as well as the symbol mapping, one can obtain the complex valued symbols sequences , where the symbol J is representing the frame length. is spread by a spreading sequence. The resulting effect of the spreading process provides sequence with elements given as the developed sequence is actually OFDM modulated onto individual subcarriers. This spreading operation is carried out in frequency domain for OFDM-CDMA. This must be modulated to more than single OFDM symbol. If several elements of can be modulated in parallel. By specifying S as the factor of ), the complexity of transmission can be reduced. To make the derivation simple, we assume .

This is only considered to make a simpler notation.

2.4 Receiver block diagram of OFDM-CDMA system
The receiver block diagram of OFDM-CDMA based on soft PIC (i.e. Parallel Interference Cancellation) is depicted in the 2.2. the detector in 2.2 is comprised of a detector known as MMSE (i.e. Minimum Mean Square Error) detector block, K, MRC (i.e. Maximum Ratio Combining) single user detector blocks and the interference cancellation process defines the various samples of a complex white Gaussian noise having variance in every dimension. And diagonal fading coefficients matrix is defined for the simplicity and the diagonal elements is the fading coefficient on S subcarriers.

If we consider the transmission into the frequency selective channels, there is a chance that the orthogaonality among various users can be destroyed and MAI can be occurred. Various data detection techniques have been introduced to suppress the effects of MAI, in general these data detection techniques are classified into two categories: SUD (i.e. Single User Detection) and MUD (i.e. Multi User Detection) techniques.

* Single User Detection is designed by an adaptive single tap equalizer which compensates the amplitude and the phase distortions, which are imposed on the received signal during the transmission. SUD does not need to know about the information of Multi Access Interference. The block of the SUD in the 2.2 utilizes the Maximum Ratio Combining equalization

Multi User Detection technique has the capability to improve the uplink OFDM-CDMA performance effectively by exploiting the MAI information. There are two MUD techniques depicted in 2.2, PIC and MMSE [28]. The process of soft PIC of OFDM-CDMA system depicted in 2.2 is summarized as follow:

1. At the first, MMSE MUD is implemented to alleviate MAI and the desired signal is detected. It should be noted that MMSE MUD can only work during th entire detection process.

2. The resulting interference is reconstructed and subtracted from original signal for each individual user

3. MRC SUDs having low complexities are applied to detect the deseired signal

And finally the iterations are repeated out between second and third steps. Now the details of individual data detection are described as follow:

Maximum Ration Combining: in the MRC SUD equalization is used to maximize the SNR (i.e. Signal to Noise Ratio) for the case of single user. But when the system has various users simultaneously activated, the MAI can not be suppressed so eventually MRC performance is poor, but due to iterative process, the received signal is MAI free, MRC can become more efficient with low cost in that particular case. The resulting equalization coefficients can be represented as:

After MMSE -MUD, the detected signal is damped. The symbol demaper outputs the real-valued soft decided bits.

SISI (i.e. Soft In Soft Out) decoders are considered to be as APP decoders (i.e. A posteriori Probability decoders), which requires LLRs (i.e. Log Likelihood Ratios) as the inputs. Then the approximation is carried for the soft decided coded bits as input LLRs for DEC-K.

it should be noted here, MMSE detection block is comprised of the despreading process in particular, APP decoding is considered to be a standard operation as mentioned in [29] so it will not be discussed in detail.

Parallel Interference Cancellation (PIC): After the block of APP decoding, it is required to reconstruct the interferences for Soft PIC process.

For that the LLRs of the reencoded bits are transformed into soft bits by individual means. Furthermore soft bits are needed to be mapped onto soft symbols so that reliability information can be retained for the soft bits. Then we need to spread the reconstructed symbols with specific spreading sequence and the overall chips should be distorted by means of channel matrix to obtain To achieve for user k, the resulting MAI is then reconstructed by ……………………………………………………………………………………………..Equation 2.10

is subtracted from form received signal . After the cancellation of interference, the intended data symbols can be detected with single user detector.

2.5 IDMA over Multipath Channels

Here we provide Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdftheEnd Match fundamental Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdf of IDMA.End Match But the key Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdffocus isEnd Match on Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdftheEnd Match particular Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfdetection algorithm for IDMA scheme in complex multipath fading channels as mentioned inEnd Match [30].

IDMA is multiple accessEnd Match (MA) Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfscheme whichEnd Match is based on the concept of user specific interleavers for the purpose of the user separation. IDMA is considered Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfas a particular case ofEnd Match something called Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfchip interleaved CDMAEnd Match [31]. IDMA inherits many advantages of CDMA.End Match And many Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfthanks to random interleaving andEnd Match the concept of Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfchip by chip (CBC) iterativeEnd Match MUD concept. Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfTheEnd Match key concept regarding the IDMA scheme is that it is applicable to cancel sufficiently the effect such as Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfMAI and ISI andEnd Match it can Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfsupport systemsEnd Match carrying Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdflargeEnd Match number Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfof users in multipath fading channels.End Match

In Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdfthe End Match2.3, Begin Match to source 1 in source list: (11-25-09) http://www.ee.cityu.edu.hk/~liping/People/LYQThesis.pdftheEnd Match upper part basically describes the transmitter structure for the IDMA scheme with the number of simultaneous user K.

it is considered as represents data stream of k users. This data stream needs to be encodes with a FEC code, which results in a generated chip sequence . After that is permuted on the basis of inteleaver which is user specific to generate a resulting chip sequence . Right after the QPSK symbol mapping the symbol sequence is reproduced, where the term J denotes the length of frame.

As described in the lower part of 2.3, an iterative sub-optimal receiver structure is adopted, which is consisting of the ESE (i.e. Elementary Signal Estimator) along with the K single user. A Posterior Probability (APP) decoders. Afterward the multiple access along with the coding constraints are evaluated separately in the ESE as well as the DECs. In the iterative detection process, the ESE and DECs exchange extrinsic information in a turbo type manner [32].

The Log-likelihood ratios (LLRs) are basically identified by the subscripts, i.e., and which is dependent on whether they are generated by the ESE or DECs. For the ESE, y in equation 2.14 denotes the received channel output. For the DECs, y in equation 2.14 is the de-interleaved version of the outputs of the ESE. And then we try to apply globally a turbo type iterative process to exchange LLRs produced by the DECs and ESE, as mentioned below. The focus is on detection after receiving r. ( can be handled in a similar same way.) .There are two parts of CBC detection algorithm.

A. ESE Part

Here it is assumed that the extrinsic LLRs both part that is real and imaginary are uncorrelated, so the off diagonals elements are zeros. as described above, and { can be utilized by the ESE part in order to update the mean and variance of interference which is used in next iteration by (25), (26) and (27). First of all, we need to set and for all k, j, providing no feedback information from the DECs.

As the ESE detection process combines L LLRs values, which is for every path, as in the manner of Rake, the overall detection algorithm is termed as LLRC (i.e. IDMA with LLR combining) as mentioned in [33]

2.6 Conclusions

if we try to summarize all the points in this chapter, then initially some preliminaries were discussed for this thesis, we started with the fundamentals of OFDM modulation, then a review of fundamentals of OFDM-CDMA systems was presented along with the detection algorithms based on PIC was also discussed. Then we presented the basic architecture of IDMA along with its detection algorithm particularly in fading channels. By understanding these techniques it is necessary to investigate the spread spectrum multiple access communication system based on the combination of OFDM and IDMA.

CHAPTER - 03:

Proposed System Model for MC-IDMA based System

In this chapter the uplink system model for the MC-IDMA (Multi-Carrier Interleave Division Multiple Access) is proposed along with the transmitter and receiver structure. The chapter also discusses the iterative detection process used by this system known as Chip-by-Chip (CBC) detection algorithm.

3.1 Transceiver structure of MC-IDMA based system

The uplink Transceiver structures of MC-IDMA with K simultaneous users are shown in 3.1

3.1: Transceiver structures of the MC-IDMA scheme with simultaneous users K, where πk is the interleaver of user-k. In order to make things simple, the does not include the guard intervals between OFDM symbols.

Let us consider that be the data stream of user-k. his data stream is first needed to be encoded by FEC code, producing chip sequence . After that is permuted by inteleaver-k which is user specific, then we map symbols, the symbol sequence is produced, where the letter J represents the length of frame.

Then these symbols are modulated onto different sub-carriers by Inverse FFT.

Consider QPSK signaling

At the receiver side, OFDM demodulation is carried out before iterative MUD process as show in lower half of 3.1. It is assumed that the duration of cyclic prefix is longer than the maximum channel delay, the received signal after OFDM demodulation can be expressed as is the fading coefficient of subcarrier-j. , FFT of ) , is a complex white Gaussian noise with variance each dimension. Then the CBC detection algorithm for complex single-path channel can be applied [34].

3.2 Chip-by-Chip (CBC) Detection Algorithm

(i) Initialization: Set I is a identity matrix.

(ii) Main operations: The iterative process includes two steps.

Step (a): ESE Part

We concentrate on the detection of for user-k and rewrite equation 3.5 By means of the central limit theorem, can be approximated as a Gaussian random variable.

This approximation is used by ESE to generate LLR for And can be generated in a similar way. The calculations related to and in equation 3.11 are carried out as follows. According to equation 3.10, we In equation 3.14 , mean and variance of the received signal can be estimated as follows

Step (b): DEC Part

The decoder part i-e, DECs carry out APP (A Posteriori Probability) decoding using the output of the ESE (Elementary Signal Estimator) as the input. With QPSK signaling, outputs of the DEC-k are the extrinsic LLRs for and. We use the extrinsic information to update the mean and variance of each chip

............................................Equation 3.16

where we have assumed that the extrinsic LLRs for the complex parts i-e, real and imaginary parts of are uncorrelated, and thus the off-diagonal entries of are considered zeros.

CHAPTER - 04:

Simulation Results & Analysis

This chapter presents the simulation results based upon the analytical model for the MC-IDMA based system presented in the chapter-03, Also the detailed description about the multiple scenarios is also discussed keeping in the mind that the scenario are only subjected to the uplink case of a mobile network. The brief description of the simulation scenarios is given below:

1) In the first scenario the initial parameters for the IDMA and OFDM are set then the calculation of the performance of proposed MC-IDMA model using the BPSK modulation with real channel parameters is carried out.

2) In the second scenario the initial parameters for the IDMA and OFDM remain same but the analysis is extended to the QPSK modulation.

3) In the third scenario the performance of MC-CDMA based system is compared with the performance of the MC-IDMA based system.

The detailed description about the scenarios and the simulation parameters is discussed below:

4.1 First Scenario

In the first scenario of the simulation, the initial parameters for the IDMA and OFDM are provided to calculate the analytical performance of the MC-IDMA based system in the multipath fading channel, the modulation technique considered for this scenario is Binary Phase shift keying (BPSK) ,the detailed parameters for the simulation are provide in the Table-4.1.

Fig-4.1 is the Bit Error Rate (BER) performance of the MC-IDMA based system using BPSK modulation and real channel parameters (i-e., fading coefficients), these parameters are calculated by special function known as the damping method. So if we analyze the response of the Fig-4.1 one can clearly observe that the Bit Error Rate (BER) performance of the MC-IDMA based system when Data=128 and SL=16 is much better as compared to the performance at Data=256 and SL=32, and furthermore the performance of MC-IDMA based system at Data=512 and SL=32 is even worse. So one can conclude that the MC-IDMA based system work efficiently at the values Data=128 and SL=16 if you increase these values the performance degrades.

IDMA Parameters

OFDM Parameters

NUser

1

Number of parallel channel

128

DataLen

128

256

512

FFT length

128

SpreadLen

16

32

64

Number of carrier

128

ItNum

10

Modulation

BPSK

Block

200

Bit rate per carrier

256000

EbNoNum

10

Guard interval

32

EbNoStart

0

EbNoStep

2

Table-4.1: Simulation Parameters for the First Scenario.

4.2 Second Scenario

In the second scenario of the simulation, the initial parameters for the IDMA and OFDM are provided to calculate the performance of the MC-IDMA based system in the multipath fading channel, the modulation technique considered for this scenario is Binary Phase shift keying (BPSK) as well as the Quadrature Phase shift keying (QPSK), the detailed simulation parameters are provided in the Table-4.2. Furthermore the performance of the MC-IDMA using BPSK is compared with MC-IDMA using QPSK.

IDMA Parameters

OFDM Parameters

NUser

1

Number of parallel channel

128

DataLen

128

256

512

FFT length

128

SpreadLen

16

32

64

Number of carrier

128

ItNum

10

Modulation

BPSK & QPSK

Block

200

Bit rate per carrier

256000

EbNoNum

10

Guard interval

32

EbNoStart

0

EbNoStep

2

Table-4.2: Simulation Parameters for the Second Scenario.

Fig-4.2 is the Bit Error Rate performance of the MC-IDMA based system using BPSK and the QPSK modulation schemes and real channel parameters (i-e., fading coefficients), these parameters are calculated by special function known as the damping method. So if we analyze the response of the Fig-4.2 one can clearly observe that the Bit Error Rate (BER) performance of the MC-IDMA BPSK based system and MC-IDMA QPSK based system looks almost similar which is a very interesting result to conclude one point that the Bit Error Rate (BER) performance of the MC-IDMA based system using BPSK and QPSK modulation is similar, so the QPSK modulation can be adopted for the MC-IDMA system.

4.3 Final Scenario

In the final scenario of the simulation, initially the parameters for the CDMA and OFDM are set to simulate the performance of the MC-CDMA system using the BPSK modulation, the result of the MC-IDMA are considered same as the 1st scenario. The initial parameters are provide in the Table-4.3, if we carefully observe the Fig-4.3 one can observe that the MC-IDMA system outperforms the MC-CDMA system in terms of the BER which is a very useful result in order to consider a more potential candidate for the 4th generation mobile networks.

CDMA Parameters

OFDM Parameters

NUser

1

Number of parallel channel

128

DataLen

128

FFT length

128

SpreadLen

16

Number of carrier

128

ItNum

10

Modulation

BPSK

Block

200

Bit rate per carrier

256000

EbNoNum

10

EbNoStart

0

EbNoStep

2

Table-4.3: Simulation Parameters for the Final Scenario.

CHAPTER - 05:

CONCLUSION AND FUTURE RECOMMENDATION

5.1 CONCLUSION OF WORK

In this thesis a hybrid multiple access schemes is proposed which is known as MC-IDMA, this schemes has potentially the advantage of OFDM and IDMA for example it can produce an effective way to mitigate the problems known as ISI and MAI. If we place sufficient guard intervals with the help of OFDM ISI can be completely removed. And with the help of IDMA with its special iterative detection process the intercell and intracell MAI can easily be compensated. In this thesis an effort of comparison between the MC-CDMA and MC-IDMA is performed, it is observed that in term of the Bit Error Rate analysis MC-IDMA can outperform the performance of MC-CDMA, because MC-IDMA has very effective iterative detection process known as CBC detection algorithm. Another advantage of the proposed scheme is that it can achieve additional coding gain as compared to MC-CDMA, which is achieved by allocation bandwidth expansion to FEC coding. It can be concluded here that MC-IDMA can provide an effective solution to the needs of high rate multiuser communication systems in the channels having multipath fading.

5.2 FUTURE RECOMMENDATION

when we consider OFDM, every single user utilize all subcarriers equally by doing this the characteristics of frequency selective channels a re transforms into the frequency flat channels, which can be very efficient to analyze the channel frequency selective nature, so the performance can be improved by careful subcarrier and rate allocation. No system is perfect so the proposed system also has problems, major problem is utilizing the OFDM which results in the phenomenon known as PAPR (i.e. Peak to Average Power Ratio, in this phenomena there are large peaks in the transmitted signal, when we have signal from number of subcarriers adding constructively in phase there will be large signal peaks which will result in the saturation at the power amplifiers at the transmitter side, and there will be distortions in the transmitted signal. To alleviate this problem it is desirable that the power amplifiers operate in the linear range, also it is desirable to alleviate the power of transmitted signal. Also it is desirable to design clipping-compensation algorithm to compensate the PAPR problem.

Writing Services

Essay Writing
Service

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing
Service

Reports for any audience. Perfectly structured, professionally written, and tailored to suit your exact requirements.

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision
Service

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.