Nowadays as both the number of subscribers of the wireless services and the amount of data transmitted via the aforesaid services are growing rapidly multiple access techniques are becoming of special urgency for specialists in the field. Frequency Hopping technique appears to be one of the most promising paradigms for the next-generation multiple access system design.
In conventional frequency hopping the entire available frequency band is divided into
Frequency hopping (assigning subbands to the users) can be either coordinated (this means that when choosing a code sequence for each user, we use knowledge about other users; therefore, this scheme is mostly used for the downlink transmission) or uncoordinated. The uncoordinated frequency hopping has a number of advantages (enables to realize random multiple access, is well protected from eavesdropping or intentional jamming, and does not require elaborated protocols, which are inevitable in a system with coordinated subcarrier assignment) and is used, as a rule, for the uplink transmission. We shall consider uplink transmission, and, hence, uncoordinated subcarrier assignment strategies. In turn, these strategies can be divided into two groups. Methods of the first group exploit code sequences specially designed for multiple access systems and satisfying certain requirements. The second group includes methods where subcarrier numbers are assigned to users pseudorandomly. In what follows a FH CDMA system using a method from the second group will be considered.
The proposed chapter is aimed at introducing to the readers a novel class of FH CDMA systems; these are Dynamic Hopset Allocation FH CDMA (DHA FH CDMA) systems. This class has been initially introduced in Zyablov & Osipov, 2008. As can be seen from its name the main difference between the conventional FH CDMA and the proposed class of Dynamic Hopset Allocation FH CDMA is that the hopset allocated to each user varies in time.
2. DHA FH: transmission technique
Let us now consider the basics of the DHA FH CDMA in more detail. Consider a multiple access system where
In what follows we shall assume that in the system under consideration optimal power control is used. The latter means that the amplitudes of all the signals from distinct users are equal at the receiver side. Furthermore we shall assume that in the system under consideration optimal phase estimation and prediction mechanism is used (i. e. phases of all the signals from distinct users are known to the base station). Hereinafter we shall consider a multiple access system, which uses an Additive White Gaussian Noise channel. In this case near optimal power control and phase estimation can be done fairly easily since both transmission ratio and phase of the signal from a certain user depend only on the distance between the transmitter and the receiver. The latter can be measured either by using pilot sequences or by analyzing information obtained from the downlink channel (which seems preferable since it is more convenient for implementing open loop power control and enables to avoid other users interference). Note, however, that in either case the transmitted signal is affected at least by the background noise, thus even in this case only near optimal power control and phase estimation can be maintained.
It is assumed that the base station is equipped with the subchannel numbers generator synchronized with that of the active user. The latter means that within the scope of the reception of the respective tuple subchannel numbers generator of the base station produces the very same subchannel numbers vector that has been generated by the subchannel numbers generator of the user under consideration. Note that this assumption is not restrictive since synchronized generators are an essential part of any conventional FH CDMA system. Thus we simply replace a generator producing random numbers with a generator producing random vectors.
Assume now that there is an eavesdropper, who intends to reconstruct the signals sent by the active users. In the conventional FH CDMA system eavesdropping is considered to be a complicated task since it is preassumed that the hopping sequences are not known to the eavesdropper. However even if the hopping sequence is not known to the user it is still possible to reconstruct the transmitted signal. Note that the DHA FH CDMA system is much more eavesdropping proof than the conventional one (since to reconstruct a tuple an eavesdropper needs not only to detect, which subchannel has actually been used to transmit a signal, but also to detect its position in the hopset, the latter being known only to the active user under consideration).
However, the introduction of the aforesaid new class of FH CDMA systems results in the emergence of a whole complex of problems. The problem of giving a suitable probabilistic description appears to be one of the most urgent ones. The present chapter is aimed at solving this problem. The latter is to be done using characteristic function apparatus. Since the probabilistic description depends on the reception strategy two different strategies, i. e. threshold reception and MAXP reception, will be considered. For each of the above mentioned reception strategies an analytical expression will be given. The results to be obtained will enable to get new insights into the whole complex of problems of novel types of CDMA systems study and development.
3. DHA FH OFDMA system with threshold reception: system model and probabilistic description
A receiver, equipped with a subchannel number generator synchronized with the subchannel number generator of this user, compares values of projections of signals received through these subchannels onto a direction denoted by the phase of the signal from the respective user at the receiver side with a ceratin threshold (in what follows, we shall assume that the base station knows the phases of complex transmission coefficients of all the subchannels; i. e., the system exploits an ideal estimation an prediction mechanism for frequency characteristics of the channel). If threshold crossing is detected in only one subchannel, a tuple corresponding to the subchannel where the threshold crossing was registered, is accepted. Otherwise, an erasure decision is made. If a symbol other than the transmitted one is accepted, we say that an error has occurred. The block diagram of the DHA FH CDMA system with a threshold receiver is shown in Figure 1.
Due to the above-made assumption on the availability of an ideal power control in the system, the signal of each user at the receiver end can be represented by a vector of a unit amplitude with a random phase uniformly distributed on the circle
Let us consider the projection of an output of the j-th subchannel onto a unit-amplitude vector with phase
Since for parameters that adequately describe modern multiple access systems, the probability of a collision of multiplicity greater than two is much less than the probability of a collision of multiplicity two (see Appendix A.) further on only collisions of multiplicity two will be considered; the occurrence probability of such a collision is set to be equal to the collision occurrence probability
and the projection is given by:
An expression for the density function of the value of the projection of the noise from the k-th “interfering” user onto a given vector follows from a formula due to Feller, 1971 and is of the form:
Finding an analytic expression for the density function of
Taking into account the domain of definition of the function, the characteristic function can be represented as follows:
is nothing but the zero-order Bessel function of the first kind of the variable
By a property of characteristic functions, the desired density function of the variable y is of the form:
This function characterizes the density function of the value of the projection of a subchannel output provided that a collision of multiplicity two occurred in the subchannel (i. e., there was one “interfering” user) and that the user under consideration transmitted a signal of amplitude a through this subchannel.
Thus, the conditional density function of the variable at the output of a subchannel, through
which the user transmitted a symbol of amplitude a, is of the form:
Below we are using the obtained probability density function to solve the detection problem in the described system.
3.2. DHA FH OFDMA system with threshold reception: threshold choice and analytical expressions for error and erasure probabilities
Symbol detection in the described system boils down to choosing between two hypotheses:
H0: the user did not transmit any symbol through this subchannel (a = 0);
H1: the user transmitted a symbol through this subchannel (a = 1).
The maximum likelihood condition implies that:
a priori probabilities. Hence we obtain,
Our goal is to find the threshold value y. The value will be found by solving the nonlinear equation (3.14) numerically.
Direct computation of the likelihood ratio on the left-hand side of (3.14) seems to be difficult. At the same time, numerical values of the conditional density function at any point can be computed using finitely many terms of the above-given expansion. To estimate these values to a given degree of accuracy, it suffices to find an expansion term, whose absolute value at a given point is less than the accuracy parameter and check that the same holds for the subsequent term too. Thus, the threshold finding problem is reduced to solving a nonlinear equation (3.14) which can be done numerically using specialized software packages. The solution of the equation (3.14)
Hereinbefore we have treated the process of assigning subchannels to the users in terms of series of random trials. Strictly speaking, when considering a set of subchannels, we are to consider the parameters of each consecutive test run as dependant on outcomes of the previous test runs. Consider the i-th subchannel of the q subchannels chosen by the subchannels number generator. Let us assume that k users were transmitting in i-1 previously considered subchannels. The probability of collision is to be estimated as
Thus, in what follows we shall assume that the probability of collision in a certain subchannel does not depend on the situation in other subchannels.
The error probability is the probability that the threshold is not crossed in the subchannel, through which the user under consideration has transmitted a symbol and at the same time the threshold is crossed in one of the subchannels, where this user has not transmitted any signal (and only in it). This probability can be written as:
To find the erasure probability, we shall find the probability of correct reception, i. e., the probability that the threshold crossing occurs only in the subchannel, through which the user has transmitted a symbol. This probability is described by the relation:
Since correct reception, error, and erasure form an exhaustive group of events, we may claim that the erasure probability is
Note that the obtained expressions are approximate (due to the aforementioned assumptions). More exact expressions can be easily obtained using the same method. However in this case the obtained expressions will have a much more cumbersome form.
4.1. DHA FH OFDMA system with a MAXP receiver: system model and probabilistic description
In the previous section a threshold reception has been considered; i. e. a receiver, equipped with a subchannel number generator synchronized with that of the user under consideration, was to compare values of the projections of the signals received from the subchannels with a certain threshold and take a decision on the symbol sent by the user under consideration. Hereinafter a far more simple and intuitive reception strategy will be used; i. e. the receiver is to compute the projections of the signals from the respective subchannels and to choose the subchannel with a maximum projection. In what follows we shall refer to this receiver as a MAXimum Projection receiver (a MAXP receiver). The block diagram of the DHA FH CDMA system with a threshold receiver is shown in Figure 2.
Note that in DHA FH CDMA with a threshold receiver an optimal threshold value is to be precomputed in advance. Moreover, as can be seen from the previous paragraphs, the optimal threshold value depends on the number of active users and SNR. In DHA FH CDMA with a MAXP receiver, on the other hand, neither additional computation nor any kind of side information is needed. It should be noted, however, that for DHA FH CDMA system with a threshold receiver and DHA FH CDMA system with a MAXP receiver different types of outer codes are to be used. In a DHA FH CDMA system with a threshold receiver outer codes capable of correcting erasures (a number of low density codes suited for the task were introduced recently) are to be used, whereas in a DHA FH CDMA system with a MAXP receiver only error correction is needed (woven and woven turbo codes seem to be the best solution in the case).
Let us consider a difference:
Note that for parameters that adequately describe modern multiple access systems, the probability of a collision of multiplicity greater than two is much less than the probability of a collision of multiplicity two. Therefore, hereinafter we are considering the case of a collision of multiplicity two only. Correspondingly we are to consider several distinct situations:
a. A collision has occurred both in the
b. A collision has occurred in the
c. A collision has occurred in the
d.A user has transmitted a symbol via the
e. A collision has occurred in the
f.No collision has occurred in the
Note that the distribution of
Moreover the probability density function of differences
can be obtained using the same method we have used to obtain the projection
The probability density function of differences
Similarly the characteristic function of
is given by:
And the probability density function of difference
Note that difference
4.2 DHA FH OFDMA system with a MAXP reception: error probability
To find the error probability let us consider the probability of correct reception. Correct reception is possible if (and only if )
The probability of such a situation is given by:
As has been already mentioned if the total number of active users amounts to
I. A collision has occurred in the subchannel, via which the user has transmitted a signal (this case obviously corresponds to the cases a.)-c.) from the previous section)
II. No collision has occurred in the subchannel, via which the user has transmitted a signal (this case corresponds to the cases d.)-f.) from the previous section)
Since we are considering collisions of multiplicity two only in case II, the number of interfering users is given by
To obtain the conditional probability note that in the abovementioned case, if a collision has occurred in the subchannel in use, we obtain
If there is no collision in the subchannel in use we obtain
Thus, the probability of error is given by:
5. Conclusions and future work
Hereinabove a novel class of FH CDMA systems has been introduced: these are Dynamic Hopset Allocation FH CDMA systems. Two models with different reception strategies were considered: the DHA FH CDMA system with a threshold receiver and the DHA FH CDMA with a MAXP receiver. For both models a probabilistic description has been given using the approach based on characteristic function apparatus (for the DHA FH CDMA system with a threshold reception both a nonlinear equation for optimal threshold value and analytical expressions for error and erasure probabilities have been given; for the DHA FH CDMA with a MAXP receiver an analytical expression for the probability of error has been given).
However, even though several simplifying assumptions were used the obtained expressions are still complicated. Thus, obtaining rougher but less cumbersome expressions for the probability density functions of the random variables in question and respectively obtaining upper and lower bounds for error and erasure probabilities is one of the most important tasks. Moreover, it is to be mentioned that the expressions in question were obtained for the AWGN channel. Generalizing the obtained results for fading channel models (say, Raleigh, Nakagami ect.) is also a very important task. Obviously power control at the receiver side is unacceptable in this case. However, even in case of open loop nearly ideal power control it is to be taken into account that the power of a real life transmitter is bounded i. e. even in this case expressions for error and erasure probabilities will be different from those obtained for the AWGN channel.
6. Appendix A
Let us show that the probability of collisions of multiplicities greater than two is much less than the probability of a multiplicity-two collision. To this end, consider the process of choosing subchannels for transmission by users as a sequence of independent trials. Due to asynchronicity, during the time when a user transmits a symbol, each other active user chooses two subchannels. Thus, the process of choosing subchannels for transmission by other active users is equivalent to a series of N = 2(K − 1) trials with “success” probability p = 1/Q (in this case, it is the probability that there is chosen the subchannel which is used by the user under consideration). Therefore, the probability that a collision of multiplicity m = k+1 occurs in a given subchannel is the probability that in a series of N = 2(K − 1) trials with “success” probability p = 1/Q there are precisely k successes. This probability is given by the Bernoulli formula:
It is seen from the aforesaid that:
hence we get:
For each term in this expansion, we may write:
thus, it is obvious that:
For any Q such that
As we have already noted, in real-world systems we have
7. Appendix B
To obtain the probability of such a situation let us find the number of all sets complying with the abovementioned condition. To simplify the process let us treat the process of random subchannel choice performed by each of the active users in terms of assigning the interfering signals from other active users to the subchannels (the latter procedure is analogous to the classical examples with balls randomly placed into boxes). Let us again consider the subset of
Now let us consider the process of the symbol transmission by the user under consideration. In what follows we shall assume that there are
And the number of all the sets meeting the abovementioned requirements is given by
Apparently the probability of the occurrence of the aforesaid situation is the fraction of all the sets meeting the abovementioned requirements in the total number of sets. The latter is to be computed by summing
Feller W. 1971 An Introduction to Probability Theory and Its ApplicationsWiley and Songs, 2 0471257095047125709-5, NY.
Lukacs E. 1987 Characteristic Functions., , 0-19520-578-2
Watson G. N. 1945Theory of Bessel Functions, Cambridge Press, 0-52148-391-3
Zigangirov K. Sh 2004 Theory of Code Division Multiple Access Communication., IEEE Press, 0-47145-712-4New Jersey.
Zyablov V. V. Osipov D. S. 2008 On the optimum choice of a threshold in a frequency hopping OFDMA system.. , 44 22008, 91 98, 0032-9460.