6.3 Turbo Multiuser Detection for Synchronous CDMA


6.3.1 Turbo Multiuser Receiver

We consider a convolutionally coded synchronous real-valued CDMA system with k users, employing normalized modulation waveforms s 1 , s 2 , ..., s k , and signaling through an additive white Gaussian noise channel. A block diagram of the transmitter end of such a system is shown in Fig. 6.4. The binary information symbols { d k [ m ]} m for user k , k = 1, ..., K, are convolutionally encoded with code rate R k . A code-bit interleaver is used to reduce the influence of the error bursts at the input of each channel decoder. The interleaved code bits of the k th user are BPSK modulated, yielding data symbols of duration T . Each data symbol b k [ i ] is then spread by a signature waveform s k (t) and transmitted through the channel.

Figure 6.4. Coded CDMA system.

graphics/06fig04.gif

As seen from preceding chapters, the received continuous-time signal can be written as

Equation 6.27

graphics/06equ027.gif


where n(t) is a zero-mean white Gaussian noise process with power spectral density s 2 and A k is the amplitude of the k th user.

The turbo receiver structure is shown in Fig. 6.5. It consists of two stages: a soft-input/soft-output (SISO) multiuser detector, followed by k parallel single-user MAP channel decoders. The two stages are separated by deinterleavers and interleavers. The SISO multiuser detector delivers the a posteriori log- likelihood ratio (LLR) of a transmitted "+1" and a transmitted " “1" for every code bit of each user,

Figure 6.5. Turbo multiuser receiver.

graphics/06fig05.gif

Equation 6.28

graphics/06equ028.gif


As before, using Bayes' formula, (6.28) can be written as

Equation 6.29

graphics/06equ029.gif


where the second term in (6.29), denoted by l 2 [ b k ( i )], represents the a priori LLR of the code bit b k [ i ], which is computed by the MAP channel decoder of the k th user in the previous iteration, interleaved and then fed back to the SISO multiuser detector. For the first iteration, assuming equally likely code bits (i.e., no prior information available), we then have l 2 ( b k [ i ]) = 0, for 1 k k and 0 i < M . The first term in (6.29), denoted by l 1 ( b k [ i ]), represents the extrinsic information delivered by the SISO multiuser detector, based on the received signal r(t) , the structure of the multiuser signal given by (6.27), the prior information about the code bits of all other users, { l 2 ( b l [ i ])} i ; l k , and the prior information about the code bits of the k th user other than the i th bit, { l 2 ( b k [ j ])} j i . The extrinsic information { l 1 ( b k [ i ])} i of the k th user, which is not influenced by the a priori information { l 2 ( b k [ i ])} i provided by the MAP channel decoder, is then reverse interleaved and fed into the k th user's channel decoder as the a priori information in the next iteration. Denote the code-bit sequence of the k th user after deinterleaving as { graphics/315fig01.gif [ i ]} i .

Based on the prior information { l 1 ( graphics/315fig01.gif [ i ])} i and the trellis structure of the channel code (i.e., the constraints imposed by the code), the k th user's MAP channel decoder computes the a posteriori LLR of each code bit,

Equation 6.30

graphics/06equ030.gif


where the second equality was shown in Section 6.2 [cf. (6.10)]. It is seen from (6.30) that the output of the MAP channel decoder is the sum of the prior information l 1 ( graphics/315fig01.gif [ i ]) and the extrinsic information l 2 ( graphics/315fig01.gif [ i ]) delivered by the MAP channel decoder. As discussed in Section 6.2, this extrinsic information is the information about the code bit graphics/315fig01.gif [ i ] gleaned from prior information about the other code bits, { l 1 ( graphics/315fig01.gif [ j ])} j i based on the trellis constraint of the code. The MAP channel decoder also computes the a posteriori LLR of every information bit, which is used to make a decision on the decoded bit at the last iteration. After interleaving, the extrinsic information delivered by the k MAP channel decoders { l 2 ( b k [ i ])} i;k is then fed back to the SISO multiuser detector, as the prior information about the code bits of all users, in the next iteration. Note that at the first iteration, the extrinsic information quantities { l 1 ( b k [ i ])} i;k and { l 2 ( b k [ i ])} i;k are statistically independent. But subsequently, since they use the same information indirectly, they will become more and more correlated, and finally, the improvement through iteration will diminish.

6.3.2 Optimal SISO Multiuser Detector

For the synchronous CDMA system (6.27), it is easily seen that a sufficient statistic for demodulating the i th code bits of the k users is given by the K -vector y [ i ] = [ y 1 [ i ] ... y K [ i ] T , whose k th component is the output of a filter matched to s k (.) in the i th code-bit interval:

Equation 6.31

graphics/06equ031.gif


This sufficient statistic vector y [ i ] can be written as [520]

Equation 6.32

graphics/06equ032.gif


where R denotes the normalized cross-correlation matrix of the signal set s 1 , ..., s K :

Equation 6.33

graphics/06equ033.gif


graphics/317fig01.gif ; b [ i ] =[ b 1 [ i ] ... b k [ i ]] T ; and n [ i ] ~ N ( , s 2 R ) is a Gaussian noise vector, independent of b [ i ].

In what follows , for notational simplicity, we drop the symbol index i whenever possible. Denote

graphics/317equ02.gif

From (6.32), the extrinsic information l 1 ( b k ) delivered by the SISO multiuser detector [cf. (6.29)] is then given by

Equation 6.34

graphics/06equ034.gif


where we have used the notation graphics/318fig01.gif for b j {+1, “1}. The summations in the numerator (respectively, denominator) in (6.34) are over all the 2 K-1 possible vectors b in graphics/318fig02.gif (respectively, graphics/318fig03.gif ). We have

Equation 6.35

graphics/06equ035.gif


Note that the first term in (6.35) is independent of b and therefore will be canceled in (6.34). The third term in (6.35) can be written as

Equation 6.36

graphics/06equ036.gif


Equation 6.37

graphics/06equ037.gif


where (6.36) follows from the fact that b j {+1, “1}. The first term in (6.37) is also independent of b and will be canceled in (6.34). In (6.34) the a priori probabilities of the code bits can be expressed in terms of their LLRs l 2 ( b j [ i ]), as follows. Since

graphics/318equ01.gif

after some manipulations, we have for b j {+1, “1},

Equation 6.38

graphics/06equ038.gif


Equation 6.39

graphics/06equ039.gif


where (6.38) follows from a derivation similar to that of (6.37). Substituting (6.35), (6.37), and (6.39) into (6.34), we obtain

Equation 6.40

graphics/06equ040.gif


It is seen from (6.40) that the extrinsic information l 1 ( b k [ i ]) at the output of the SISO multiuser detector consists of two parts ; the first term contains the channel value of the desired user y k [ i ]}, and the second term is the information extracted from the other users' channel values { y j [ i ]} j k as well as their prior information { l 2 ( b 2 [ i ])} j k .

6.3.3 Low-Complexity SISO Multiuser Detector

It is clear from (6.40) that the computational complexity of the optimal SISO multiuser detector is exponential in terms of the number of users K, which is certainly prohibitive for channels with moderate to large numbers of users. In what follows we describe a low-complexity SISO multiuser detector based on a novel technique of combined soft interference cancellation and linear MMSE filtering, which was first developed in [552].

Soft Interference Cancellation and Instantaneous Linear MMSE Filtering

Based on the a priori LLR of the code bits of all users, { l 2 ( b k [ i ])} k , provided by the MAP channel decoder from the previous iteration, we first form soft estimates of the code bits of all users as

Equation 6.41

graphics/06equ041.gif


Equation 6.42

graphics/06equ042.gif


where (6.41) follows from (6.39). Define

Equation 6.43

graphics/06equ043.gif


Equation 6.44

graphics/06equ044.gif


where e k denotes a K -vector of all zeros, except for the k th element, which is 1. Therefore, graphics/319fig01.gif [ i ] is obtained from graphics/319fig02.gif [ i ] by setting the k th element to zero. For each user, a soft interference cancellation is performed on the matched-filter output y [ i ] in (6.32), to obtain

Equation 6.45

graphics/06equ045.gif


Such a soft interference cancellation scheme was first proposed in [168]. Next, in order to further suppress the residual interference in y k [ i ], an instantaneous linear minimum mean-square error (MMSE) filter w k [ i ] is applied to y k [ i ], to obtain

Equation 6.46

graphics/06equ046.gif


where the filter graphics/324fig13.gif is chosen to minimize the mean-square error between the code bit b k [ i ] and the filter output z k [ i ]:

Equation 6.47

graphics/06equ047.gif


where using (6.45), we have

Equation 6.48

graphics/06equ048.gif


Equation 6.49

graphics/06equ049.gif


and in (6.48),

Equation 6.50

graphics/06equ050.gif


because

Equation 6.51

graphics/06equ051.gif


Denote

Equation 6.52

graphics/06equ052.gif


Substituting (6.48) and (6.49) into (6.47), we have

Equation 6.53

graphics/06equ053.gif


Substituting (6.45) and (6.53) into (6.46), we obtain

Equation 6.54

graphics/06equ054.gif


Notice that the term R -1 y [ i ] in (6.54) is the output of a linear decorrelating multiuser detector. Next, we consider some special cases of the output z k [ i ].

  1. No prior information on the code bits of the interfering users; that is, l 2 ( b k [ i ]) = 0 for 1 k K . In this case, graphics/319fig01.gif [ i ] = , and V k [ i ] = A 2 . Then (6.54) becomes

    Equation 6.55

    graphics/06equ055.gif


    which is simply the output of the linear MMSE multiuser detector for user k.

  2. Perfect prior information on the code bits of the interfering users; that is, l 2 ( b k [ i ]) = ± for 1 k K . In this case,

    graphics/321equ01.gif

    Substituting these into (6.53), we obtain

    Equation 6.56

    graphics/06equ056.gif


    Equation 6.57

    graphics/06equ057.gif


    where (6.56) follows from the matrix inversion lemma [1] and (6.57) follows from the fact that graphics/321fig01.gif . The output of the soft instantaneous MMSE filter is then given by

    [1] graphics/321equ02.gif

    Equation 6.58

    graphics/06equ058.gif


    That is, in this case, the output of the soft instantaneous MMSE filter is a scaled version of the k th user's matched filter output after ideal interference cancellation.

  3. In general, the prior information provided by the MAP channel decoder satisfies 0 < l 2 ( b k [ i ]) < , 1 k K . The signal-to-interference-plus-noise ratio (SINR) at the soft instantaneous MMSE filter output is defined as

    Equation 6.59

    graphics/06equ059.gif


    Denote by SINR ( z k [ i ]) the output SINR when there is no prior information on the code bits of interfering users (i.e., the SINR of the linear MMSE detector). Also denote by graphics/322fig01.gif ( z k [ i ]) the output SINR when there is perfect prior information on the code bits of interfering users [i.e., the input signal-to-noise ratio (SNR) for the k th user]. Then we have the following result, whose proof is given in the Appendix (Section 6.9.1).

    Proposition 6.1: If 0 < l 2 ( b k [ i ]) < for 1 k K , we have

    Equation 6.60

    graphics/06equ060.gif


Gaussian Approximation of Linear MMSE Filter Output

It is shown in [386] that the distribution of the residual interference plus noise at the output of a linear MMSE multiuser detector is well approximated by a Gaussian distribution. In what follows, we assume that the output z k [ i ] of the instantaneous linear MMSE filter in (6.46) represents the output of an equivalent additive white Gaussian noise channel having b k [ i ] as its input symbol. This equivalent channel can be represented as

Equation 6.61

graphics/06equ061.gif


where m k [ i ] is the equivalent amplitude of the k th user's signal at the output and h k [ i ] ~ N (0, graphics/381fig10.gif ) is a Gaussian noise sample. Using (6.45) and (6.46), the parameters m k [ i ] and graphics/381fig10.gif can be computed as follows, where the expectation is taken with respect to the code bits of interfering users { b j [ i ]} j k and the channel noise vector n [ i ]:

Equation 6.62

graphics/06equ062.gif


Equation 6.63

graphics/06equ063.gif


Using (6.61) and (6.63) the extrinsic information delivered by the instantaneous linear MMSE filter is then

Equation 6.64

graphics/06equ064.gif


Recursive Procedure for Computing Soft Output

It is seen from (6.64) that to form the extrinsic LLR l 1 ( b k [ i ]) at the instantaneous linear MMSE filter, we must first compute z k [ i ] and m k [ i ]. From (6.54) and (6.62) the computation of z k [ i ] and m k [ i ] involves inverting a K x K matrix:

Equation 6.65

graphics/06equ065.gif


Next we outline a recursive procedure for computing F k [ i ]. Define graphics/323fig01.gif , and

Equation 6.66

graphics/06equ066.gif


Using the matrix inversion lemma, Y ( k ) can be computed recursively as

Equation 6.67

graphics/06equ067.gif


Denote graphics/324fig01.gif . Using the definition of V k [ i ] given by (6.52), we can then compute graphics/324fig02.gif from Y as follows:

Equation 6.68

graphics/06equ068.gif


Finally, we summarize the low-complexity SISO multiuser detection algorithm as follows.

Algorithm 6.2: [Low-complexity SISO multiuser detector ”synchronous CDMA]

  • Given graphics/324fig10.gif , form the soft bit vectors graphics/324fig11.gif and { graphics/324fig12.gif according to (6.42) “(6.44).

  • Compute the matrix inversion graphics/324fig05.gif , k = 1, ..., K , according to (6.66) “(6.68).

  • Compute the extrinsic information graphics/324fig10.gif according to (6.54), (6.62), and (6.64):

Equation 6.69

graphics/06equ069.gif


Equation 6.70

graphics/06equ070.gif


Equation 6.71

graphics/06equ071.gif


Next we examine the computational complexity of the low-complexity SISO multiuser detector discussed in this section. From the discussion above, it is seen that at each symbol time i , the dominant computation involved in computing the matrix graphics/324fig02.gif for k = 1, ..., K consists of 2 K K -vector outer products [i.e., K outer products in computing Y ( K ) as in (6.67), and K outer products in computing graphics/324fig02.gif as in (6.68)]. From (6.62) and (6.64), in order to obtain the soft output l 1 ( b k [ i ]), we also need to compute the soft instantaneous MMSE filter output z k [ i ], which by (6.54), is dominated by two K -vector inner products, one in computing the k th user's decorrelating filter output and another in computing the final z k [ i ]. Therefore, in computing the soft output of the SISO multiuser detector, the dominant computation per user per symbol involves two K -vector outer products and two K -vector inner products.

Note that a number of studies have addressed different aspects of turbo multiuser detection in CDMA systems. In particular, in [336], an optimal turbo multiuser detector is derived based on iterative techniques for cross-entropy minimization. Turbo multiuser detection methods based on different interference cancellation schemes are proposed in [13, 14, 88, 129, 157, 200, 265, 397, 409, 410, 471, 552, 576, 608].

An interesting framework that unifies these approaches to iterative multiuser detection is given in [50]. Moreover, techniques for turbo multiuser detection in unknown channels are developed in [540, 593], which are based on the Markov chain Monte Carlo (MCMC) method for Bayesian computation. Application of the low-complexity SISO detection scheme discussed in this section to equalization of ISI channels with long memory is given in [413].

Simulation Examples

In this section we present some simulation examples to illustrate the performance of the turbo multiuser receiver in synchronous CDMA systems. Of particular interest is the receiver that employs the low-complexity SISO multiuser detector of the preceding section. All users employ the same rate- ½ constraint-length n = 5 convolutional code (with generators 23 and 35 in octal notation). Each user uses a different interleaver generated randomly . The same set of interleavers is used for all simulations. The block size of the information bits for each user is 128.

First we consider a four-user system with equal cross- correlations r ij = 0.7, for 1 i,j 4. All the users have the same power. In Fig. 6.6 the BER performance of the turbo receiver that employs the optimal SISO multiuser detector (6.40) is shown for the first five iterations. In Fig. 6.7, the BER performance of the turbo receiver that employs the low-complexity SISO multiuser detector is shown for the same channel. In each of the these figures, the single-user BER performance (i.e., r ij = 0) is also shown. It is seen that the performance of both receivers converges toward single-user performance at high SNR. Moreover, the performance loss due to using the low-complexity SISO multiuser detector is small. Next, we consider a near “far situation, where there are two equal-power strong users and two equal-power weak users. The strong users' powers are 3 dB above the powers of the weak users. The user cross-correlations remain the same. Figures 6.8 and 6.9 show, respectively, the BER performance of strong and weak users under the turbo receiver that employs the low-complexity SISO multiuser detectors. It is seen that in such a near “far situation, the weak users actually benefit from the strong interference, whereas the strong users suffer performance loss from the weak interference, a phenomenon previously also observed in the optimal multiuser detector [518] and the multistage multiuser detector [512]. Note that with graphics/325fig01.gif (2 K ) computational complexity the optimal SISO multiuser detector (6.40) is not feasible for practical implementation in channels with moderate to large numbers of users K , whereas the low-complexity SISO multiuser detector has a reasonable complexity that can be implemented easily even for very large K . Figure 6.10 illustrates the BER performance of the turbo receiver that employs a low-complexity SISO multiuser detector in an eight-user system. The user cross-correlations are still r ij = 0.7. All users have the same power. Note that the performance of such a receiver after the first iteration corresponds to the performance of a traditional noniterative receiver structure consisting of a linear MMSE multiuser detector followed by K parallel (soft) channel decoders. It is seen from these figures that at a reasonably high SNR, the turbo receiver offers significant performance gain over traditional noniterative receivers.

Figure 6.6. Performance of a turbo multiuser receiver that employs an optimal SISO multiuser detector. k = 4, r ij = 0.7. All users have equal power.

graphics/06fig06.gif

Figure 6.7. Performance of a turbo multiuser receiver that employs a low-complexity SISO multiuser detector. k = 4, r ij = 0.7. All users have equal power.

graphics/06fig07.gif

Figure 6.8. Strong user performance under a turbo multiuser receiver that employs a low-complexity SISO multiuser detector. k = 4, r ij = 0.7. Two users are 3 dB stronger than the other two.

graphics/06fig08.gif

Figure 6.9. Weak user performance under a turbo multiuser receiver that employs a low-complexity SISO multiuser detector. k = 4, r ij = 0.7. Two users are 3 dB stronger than the other two.

graphics/06fig09.gif

Figure 6.10. Performance of a turbo multiuser receiver that employs a low-complexity SISO multiuser detector. k = 8, r ij = 0.7. All users have equal power.

graphics/06fig10.gif



Wireless Communication Systems
Wireless Communication Systems: Advanced Techniques for Signal Reception (paperback)
ISBN: 0137020805
EAN: 2147483647
Year: 2003
Pages: 91

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net