Soft Decision Parallel Interference Cancellation for Multi-Carrier DS-CDMA

Soft Decision Parallel Interference Cancellation for Multi-Carrier DS-CDMA

R. Radhakrishnan (Sri Ramakrishna Engineering College, India), K. R. Shankarkumar (Sri Ramakrishna Engineering College, India) and A. Ebenezer Jeyakumar (Government College of Engineering, India)
DOI: 10.4018/978-1-60566-148-3.ch012
OnDemand PDF Download:


In this chapter, we propose a new scheme for Multi User Detection (MUD) using Parallel Interference Cancellation (PIC) technique. This technique provides a good complexity, latency, and performance compromise. Among spread-spectrum techniques, the most popular one is the Direct-Sequence Code-Division Multiple-Access (DS-CDMA), where each active user’s data is modulated (multiplied) by a unique code. This technique is suitable for Multi-Carrier (MC) Direct-Sequence Code-Division Multiple-Access (DS-CDMA) systems. We offer a new scheme of soft detectors whose performance is superior to that of the other famous suboptimal detectors. On each sub carrier, instead of making hard bit decisions of the other users in the current stage and regenerating and canceling the interference signal, a weighted sum of the soft outputs of the other users in the current stage is canceled from the soft output of the desired user. This is the input to the next stage, then at the last stage, the interference canceled outputs from all the sub carriers are combined (Maximal Ratio Combining) to form the decision statistics. We derived expressions for the Bit Error Rate (BER) on Rayleigh fading channels. Analytical results are found for different stages in the proposed PIC scheme. The simulation results show that the proposed scheme offers good interference cancellation than the other filter receiver. The complexity of this scheme grows linearly with the number of users. Moreover, this scheme is much faster than other receivers such as Successive Interference Cancellation (SIC).
Chapter Preview


An important aspect of the air interface of a cellular telephone system is the multiple access method. Each user of the cellular system is given a separate channel, and how they are different is determined by the multiple access method. In a cellular system employing Direct Sequence Code Division Multiple Access (DS-CDMA), all users use the same frequency at the same time (Viterbi, 1995). Before transmission, the signal from each user is multiplied by a distinct signature waveform. The signature waveform is a signal which has a much larger bandwidth than the information bearing signal from the user. The CDMA system is thus a spread spectrum technique (Scholtz, 1982). All users use different signature waveforms to expand their signal bandwidth. At the base station, the sum of all the broadband signals is received. To demodulate a signal from a specific user, the received signal is correlated with the signature waveform of that user. To solve the problems with the conventional receiver a different type of multi-user detector has been designed (Short & Rushforth, 1990; Verdu, 1998; Xie, Short, & Rushforth, 1990).

Multi-carrier modulation is currently used in many wireless systems for transmission of data for telephone network and cellular radio (Bingham, 1990). MC-DSCDMA technique offers many advantages like robustness in fading interference, spectral efficiency, down link Bit Error Rate (BER) and non-contiguous bandwidth operations (Shinusuke Hara & Prasad, 1997). The modulated signal can be generated with the aid of the Fast Fourier Transform (FFT) at the cost of low receiver complexity.

Studies have been made to analyze the performance of multi-carrier DS-CDMA systems. It is known that Multiple Access Interference (MAI) limits DS-CDMA system capacity (Cooper & Nelleton, 1978), and that any technique, which can suppress/cancel MAI, can increase the capacity of system. Multi-user detectors exploit the inherent structure in the MAI to estimate and cancel the MAI to improve detection performance. Much of the research is aimed at finding an appropriate trade off between complexity and performance. Important linear sub optimum multi-user detectors including decorrelating detector and MMSE detectors were tried to remove the MAI (Shimon Moshavi & Bellcore, 1996; Sergio Verdu, 1998).The major disadvantages of the linear sub optimal detection were (i)The number of large computations needed to invert the matrix especially for asynchronous case (ii) Need to estimate the recovered amplitude or phase

Owing to the large complexity involved in the optimum detection, several sub optimal approaches had been studied (Zhenuhua Xie et al, 1990; Proakis, 1995; Alexandra Duel Hallen et al, 1995; Verdu, 1998). Non-linear sub optimum multi-user detectors, including Successive Interference Canceller (SIC) and Parallel Interference Canceller (PIC), make tentative decisions on the bits of the users using any detector.

Complete Chapter List

Search this Book:
Editorial Advisory Board
Table of Contents
Indranil Bose
Chapter 1
Varadharajan Sridhar
Telecom operators have a wide variety of functions to perform including marketing of telecom products and services, managing their networks... Sample PDF
Strategic Outsourcing: Opportunities and Challenges for Telecom Operators
Chapter 2
Sami J. Habib
This article presents a computer-aided integration tool, iCAD, that can predict a network evolution. We have used the term a network evolution to... Sample PDF
Empirical Prediction of Computer-Network Evolution
Chapter 3
Hak Ju Kim
This article seeks to develop a richer understanding of the suitability of IP telephony in the Public Switched Telephony Network (PSTN) with an... Sample PDF
Suitability of IP Telephony in the Public Switched Telephone Network (PSTN): A Case Study
Chapter 4
Abid Al Ajeeli
This chapter describes a detailed framework configuration infrastructure design for a high performance network. The configuration is described based... Sample PDF
A Framework for High-Speed Networking
Chapter 5
Nurul I. Sarkar, Catherine Byrne, Nabeel A.Y. Al-Qirim
Ethernet network technology is still one of the most popular LAN technologies in use today by many organizations and educational institutions... Sample PDF
Updating on Gigabit Ethernet Implementation: The Case of a Large New Zealand Organization
Chapter 6
M. Chandrasekaran, R. S.D. Wahida Banu
This chapter introduces and analyses a class of non-linear congestion control algorithms called polynomial congestion control algorithms. These... Sample PDF
Interaction Between MIMD-Poly & PIPD-Poly Algorithms and other TCP Variants in Multiple Bottleneck TCP Networks
Chapter 7
Xabiel G. Pañeda
This chapter presents a method for performance analysis and configuration of audio/video-on-demand services. These kind of services makes use of an... Sample PDF
A Systematic Approach to the Analysis and Configuration of Audio/Video-on-Demand Services
Chapter 8
Say Ying Lim
As more and more servers appearing in the wireless environment provide accesses to mobile users, more and more demand and expectation is required by... Sample PDF
Mobile Information Processing Involving Multiple Non-Collaborative Sources
Chapter 9
Vilmos Simon
In the next generation IP-based mobile networks, one of the most important QoS parameters are the delay and the delay variation. The cell handover... Sample PDF
Network Planning Algorithms for Optimizing Signalling Load in Mobile Networks
Chapter 10
Joon-Yeoul Oh, John P. Mullen
This chapter proposes a very effective heuristic algorithm to address a variation of the cellular network expansion problem and discusses each... Sample PDF
A Heuristic Solution to the Large Scale Cellular Telecommunication Network Expansion Problem
Chapter 11
Manuel Vilas
This article introduces a distributed system, called wireless proxy, to mitigate the effects of user mobility over streaming services on IEEE 802.11... Sample PDF
Wireless Proxy: Distributed System to Mitigate the Effects of User Mobility Over Streaming Services on IEEE 802.11 Wireless LANs
Chapter 12
R. Radhakrishnan, K. R. Shankarkumar, A. Ebenezer Jeyakumar
In this chapter, we propose a new scheme for Multi User Detection (MUD) using Parallel Interference Cancellation (PIC) technique. This technique... Sample PDF
Soft Decision Parallel Interference Cancellation for Multi-Carrier DS-CDMA
Chapter 13
Ghassan Kbar
This chapter introduces a new radio resource management technique based on distributed dynamic channel assignment, and sharing load among Access... Sample PDF
Distributed Resources Management in Wireless LANs that Support Fault Tolerance
Chapter 14
Mieso K. Denko
This article proposes a cooperative data caching and prefetching scheme for Mobile Ad Hoc Networks (MANETs). In this scheme, multiple hosts... Sample PDF
Cooperative Data Caching and Prefetching in Wireless Ad Hoc Networks
Chapter 15
Essam Natsheh
The challenge in creating a routing protocol for ad-hoc networks is to design a single protocol that can adapt to the wide variety of conditions... Sample PDF
A Survey on Fuzzy Reasoning Applications for Routing Protocols in Wireless Ad-Hoc Networks
Chapter 16
Essam Natsheh
Mobile ad-hoc network is a network without infrastructure, where every node has its own protocols and services for powerful cooperation in the... Sample PDF
Fuzzy Linguistic Knowledge for Active Queue Management in Wireless Ad-Hoc Networks
Chapter 17
Yun Wang, Lee Seidman
The use of network traffic audit data for retrieving anomaly intrusion information and profiling user behavior has been studied previously, but the... Sample PDF
Risk Factors to Retrieve Anomaly Intrusion Information and Profile User Behavior
Chapter 18
Rania Wehbi
In Inter-Vehicle Communication (IVC) networks, the high mobility and lack of infrastructure pose major challenges in designing secure routing... Sample PDF
Network Setup for Secure Routing in Inter-Vehicle Communication Networks
Chapter 19
Antonios Alexiou, Christos Bouras, John Papagiannopoulos, Dimitrios Primpas
This chapter presents the design principles that cover the implementation of broadband infrastructure in the region of Western Greece, by examining... Sample PDF
Metropolitan Broadband Networks: Design and Implementation Aspects, and Business Models
About the Contributors