Energy-Efficient Coding and Modulation Methods for Interference Suppression in Wireless Sensor Network Systems by Chun-Hung Liu B.S. Mechanical Engineering National Taiwan University, 1997 Submitted to the Department of Mechanical Engineering in Partial Fulfillment of the Requirements for the Degree of Master of Science in Mechanical Engineering at the BARKEr Massachusetts Institute of Technology OCT 2 5 2002 June, 2002 @ Massachusetts Institute of Technology 2002 All rights reserved Signature of Author -W, MASSACHUSEMS INSTITUTJE OF TECHNOLOGY -P - - - F LIBRARIES 9 Department Of Mechanical Engineering May 10, 2002 'I Certified by Haruhiko Harry Asada Engineering Mechanical Ford Professor of _oeo<,0rhesisSupervisor Accepted by Ain A. Sonin Students Graduate on Committee Department Chairman, Energy-Efficient Coding and Modulation Methods for Interference Suppression in Wireless Sensor Network Systems by Chun-Hung Liu Submitted to the Department of Mechanical Engineering on May 10, 2002 in Partial Fulfillment of the Requirements for the Degree of Master of Science in Mechanical Engineering Abstract An Energy-Efficient DS-CDMA communication and modulation technique for reducing multiple access interference (MAI) as well as for reducing power consumption in DSCDMA wireless sensor LAN systems is presented. Source symbols are represented by a special coding, termed Minimum Energy coding (ME coding), which exploits redundant bits for saving power when transmitted via RF links with On-Off-Keying. Since, in OOK, energy is consumed mostly when high bits are transmitted, the ME coding represents source symbols with the least number of high bits, given an extended word length. This ME coding is applied to DS-CDMA sensor network systems in order to reduce MAI as well as to reduce power consumption. When each channel uses the ME coding combined with a spreading code and OOK, fewer high bits are transmitted and thereby the probability of multiple channels sending signals at the same time is lowered. This implies that the MAI is reduced. It is shown that, with the new low MAI ME coding, signal-tonoise ratio is significantly increased and that the error probability is lowered as well. First, the architecture of this low MAI DS-CDMA communication system is described, followed by the principle of interference reduction. Second, a signal model is obtained for the new source coding and transmission process, and the SNR and error probability are analyzed. Third, guidelines for designing the optimal length of codeword, the number of communication channels, and power efficiency are obtained. Finally, a RF sensor network system is designed and simulation is conducted to verify the theoretical results and demonstrate the low MAI and low energy features of the sensor network. Thesis Supervisor: Haruhiko H. Asada Title: Professor of Mechanical Engineering 2 To My Parents and My Brother 3 Acknowledgement I would like to thank my thesis supervisor, Professor Haruhiko Asada, for his guidance and encouragement throughout my research. His profound insight and splendid wide vision gave me a great chance to get into the world of new research directions. His valuable support and advice were the greatest factor that I could write this thesis. I also would like to thank to all my lab-mates in d'Arbeloff Laboratory who showed me sincere friendship and care. Also, I would like to express deep thanks to my best friends at MIT, Chung-Yao Kao and Wen-Hua Kuo, who made my life more energetic and enjoyable. I also would like to say thanks to my best female friend, Mei-Feng Chang who always supported me during my depression. Finally, I would like to express my best appreciation to my parents and my brother, Jun-Chieh Liu, who have been watching me with great love. Their love and care have been the main source of energy that encouraged me through my life. 4 Contents 9 1. Introduction .................................................................. 2. Minimum Energy Coding Algorithms ................................. 12 2.1 RF Transmitter Power Consumption ............................................. 13 2.2 Memoryless ME Coding ............................................................. 14 2.2.1 M E C oding ........................................................................ 14 2.2.2 Fixed-Length ME Coding ...................................................... 18 2.2.3 Optimality Bound to ME Coding .............................................. 19 3. Energy Efficient DS-CDMA for RF Transmission ................... 21 3.1 Motivation of Power Saving ........................................................ 21 3.2 Energy Efficient Spreading Codes ................................................ 24 3.2.1 Auto-correlation and Cross-correlation between PN sequences .......... 24 3.2.2 Ideal pseudorandom (PN) sequences ......................................... 25 3.2.3 Finite-Field Arithmetic: Modulo-2 addition and multiplication .......... 26 3.3 Energy-Efficient DS-CDMA Communication Systems ....................... 27 3.3.1 Signal recovery method of general DS-CDMA systems .................. 27 3.3.2 Signal recovery for spreading codes taking values of 0 and I ............ 29 ........ 31 3.3.3 Signal recovery for spreading codes taking values of 0, 1 and -1 3.4 Simulation Results ................................................................... 31 3.5 Estimation of SNR for Different Spreading Codes ........................... 34 3.5.1 SNR 1 estimation for +1/-I spreading codes ................................. 34 3.5.2 SNR 2 estimation for 1/0 spreading codes .................................... 34 3.5.3 SNR 3 estimation for 1/0/-I spreading codes ................................. 35 3.5.4 Comparison of SNRs for different spreading codes ........................ 36 3.6 Estimation of Error Probability for Different PN Sequences ............... 38 3.6.1 Error probability for +1/-I spreading codes ................................. 38 3.6.2 Error Probability for 0/1 spreading codes .................................... 40 3.6.3 Error Probability for 0/1/-1 spreading codes ................................. 40 3.6.4 Comparison of error probability for different spreading codes ............ 41 5 4 Suppression of Multiple Access Interference (MAI) in EnergyEfficient DS-CDMA Communication Systems ........................ 44 4.1 Principle of MAI Suppression ...................................................... 44 4.2 Signal Model ........................................................................... 47 4.3 Evaluation of System Performances .............................................. 48 4.3.1 Signal-to-noise-ratio (SNR) .................................................... 49 4.3.2 Error Probability .................................................................. 50 4.4 Simulation Results ..................................................................... 52 5 Communication System Design ........................................... 54 5.1 Critical Codeword Length .......................................................... 54 5.2 System Parameters and General Considerations ............................... 56 5.3 Updating Algorithm of Seeking the Optimal Codeword Length ............. 57 5.4 Circuit Design of ME Coding Transmitters ....... ............................... 59 6 Conclusion .................................................................... 63 R eferences ......................................................................... 64 A ppendix ........................................................................... 66 6 List of Figures 9 Figure 1.1 Wireless Body LANfor Wearable Computing ................................... Figure 1.2 FingerRing Sensor with RF Transmitterfor Monitoring Vital Signs ......... 10 Figure2.1 PrincipleofMinimum Energy Coding .......................................... 13 Figure 2.2 DigitalRF Transmitter ............................................................ 13 Figure 2.3 FixedLength L-bit Codewords ................................................... 18 Figure3.1 Bi-directionalCommunicationsin The Intelligent Sensor Network ......... 22 Figure 3.2 Energy Efficient Spreading Codesfor DS-CDMA ............................. 23 Figure3.3 Block Diagramof a DS-CDMA Transmitter ................................... 23 Figure3.4 Block Diagramof a DS-CDMA Receiver ....................................... 24 Figure 3.5 Modulo-2 Addition and Multiplication .......................................... 26 Figure3.6 Signal Recovery Processfora GeneralDS-CDMA System .................. 28 Figure3.7 Signal Recovery forSpreadingCodes Taking Values of ] and 0 .............. 30 Figure 3.8 Signal Recovery for Spreading Codes Taking Values of 0, 1 and -1 ......... 31 Figure 3.9 Data Signals and Chipped Data Signals ........................................ 32 Figure 3.10 TransmittedSignal and Received Signal ........................................ 32 Figure 3.11 DemodulatedSignal Sd(t) and Output of the IntegratorY ................... 33 Figure 3.12 S,(t), ^,(t)G 1 (t) and d,(t) ................................................. 33 Figure 3.13 SNR v.s. Power Saving Rate for 10 Receivers and The Periodof Spreading Codes N =31 ........................................................................ 37 Figure 3.14 SNR v.s. Power Saving Rate for 10 Receivers and The Periodof Spreading Codes N = 1023 ...................................................................... 38 Figure 3.15 ErrorProbabilityv.s. Eb/Nofor Different SpreadingCodes if a] = 0.5 ... 42 Figure 3.16 Errorprobabilityv.s. E/Nofor different spreadingcodes if a] = 0.1 ...... 43 Figure4.1 DS-CDMA Combinedwith ME Source Coding .................................. 44 Figure4.2 Principleof Multiple Access Interference Reduction ............................ 45 Figure 4.3 SNR for Energy-Efficient DS-CDMA vs. The Variationof al if E/No = 10 dB andN =63 .............................................................................. 7 50 Figure 4.4 Error Probabilityper Bit for Energy-Efficient CDMA with the Variation of a, ....................................................................................... 52 Figure 4.5 ME Signal TransmissionforTwo-Sender Case ................................... 53 Figure 4.6 Total Signals in The Channel ..................................................... 53 Figure 5.1 Ratio of Lk/Lb with The Variationof a,ifM=50 andN=63 ..................... 55 Figure 5.2 Trade-offProblem of Choosing The Optimal Codeword Length ............... 57 Figure 5.3 UpdatingProceduresof Seeking an Optimal Codeword Length ............... 59 Figure 5.4.1 Basic Architecture of a ME Coding Transmitter ............................ 60 Figure 5.4.2 Circuit Design of Analog Switch (1) ........................................ 60 Figure 5.4.3 CircuitDesign of Power Switch (2) ......................................... 60 Figure 5.5 Basic Architecture of a ME Coding Receiver.................................. 61 8 Chapter 1 Introduction There is an increasing need for short-range, low power, multiple access wireless communications. Connecting laptop computers, PDA, and mobile phones together with video cameras, printers, and other peripheral devices, we will soon use wireless links in our daily life. Furthermore, as the wireless device gets smaller, it can be placed on the human body and micro machines, places where traditional RF and IR devices cannot be used. This would open up new possibilities of wireless local area network. Figure 1.1 illustrates a wireless body LAN for wearable computing. Data collected from various parts of the body are linked to each other. Figure 1.2 shows a finger ring sensor monitoring vital signs of the patient and transmitting the data to a PDA and mobile phone 24 hours a day. These examples point in the future direction of wireless networking and distributed sensing. Figure 1 Wireless Body LAN for Wearable Computing Low power, wireless networking is still a challenging problem, however. Bluetooth is an ambitious technology, but its power consumption, around 30 mA, is too high to power the device by a small cell battery, needing a regular-size battery that limits its form factor. Furthermore, Bluetooth still has a major difficulty in multiple access interference (MAI), causing a serious delay of delivery. i-Bean by Millennial Net is powered by a cell 9 battery, consuming only I mA under normal conditions, but is limited in channel capacity and interference reduction. MAI reduction has been studied extensively in academia in conjunction with DS-CDMA. A theoretical analysis has revealed that the average bit error probability sharply increases as the channel number increases in DS-CDMA systems with BPSK modulation [1]. In the past decade, numerous methods for MAI cancellation and reduction have been developed, most of which focus on the design of effective correlation receivers. [2]-[4] reported a receiver that outperforms the linear correlation receiver. However, they have a significant increase in complexity. For example, the computational complexity of the proposed receiver in [2] grows exponentially with the number of users. Figure 1.2 Finger Ring Sensor with RF Transmitter for Monitoring Vital Signs In this thesis we would like to explore a different approach, focusing on source coding. Instead of merely designing receivers to suppress interferences, our idea is to represent source symbols using a special codebook so that MAI can be greatly reduced. The codebook is designed in such a way that the probability of multiple channels sending RF signals at the same time is substantially lowered than that of a standard source coding. The remainder of this thesis is organized as follows. Chapter 2 summarizes a special source coding, called the ME coding [5],[6]. Chapter 3 applies this ME coding to the DSCDMA communication system. In Chapter 4, signal models for ME transmissions are described, and the principle of reducing interference is explained, and Signal-to noise 10 ratio (SNR) and error probability are evaluated as well; then Chapter 5 discusses the design issues of energy-efficient communication systems. Finally Chapter 6 summarizes the major results. 11 Chapter 2 Minimum Energy Coding Algorithms Wireless networking is enjoying its fastest growth period in history, due to the enabling technologies that permit wide-spread deployment [7]. However, this growth is still limited due to the limited battery power at the portable terminals. Since the progress in battery technology is rather slow to meet the rapidly increasing application demands, new technology for energy efficient wireless communication must be crated [8-13]. In attempt to devise new technology for energy efficient wireless communication, this paper aims to optimize the power consumption in digital RF transmission. Digital RF transmitters constitute the major power-consuming component in many portable communication devices. Current efforts on transmitter power optimization aim to minimize the transmitted power while satisfying some qualify of service constraints. These efforts aim to achieve optimal transmitter performance via transmitter power level adaptation [12], error control strategy adaptation [8,13], or a combination of the two [14] for vary channel conditions. While these efforts are of considerable value, they do not provide the ultimate optimal performance. In this paper, we propose a formulation of the energy efficient RF transmission problem, solution of which can be combined with the previous efforts to yield the ultimate optimal performance. In attempt to solve this problem, this chapter aims to find special source codes that minimize power consumption in RF transmission. Here we developed a novel memoryless coding algorithm, that is, minimum energy coding (ME coding). ME coding is a low-power coding algorithm that minimizes power consumption when transmitting the same amount of information through a RF channel. The method uses On-Off-keying, which is limited in performance, but is simple and energy efficient. In On-Off keying, power is more consumed when a high bit is transmitted. Therefore the total power consumption is dominated by the number of high bits to be transmitted. When a few redundant bits are added to the original codeword, as shown in Figure 2.1, one can use a set of codewords that contain fewer high bits to represent the same number of source symbols. Therefore we can use redundant bits for the purpose of power saving. 12 Original Codeword Length N umber of Redundent Bits ME Coding - New Codeword Length (more zeros) Figure 2.1 Principle of Minimum Energy Coding 2.1 RF Transmitter Power Consumption Digital RF transmitter modulates the information to be communicated onto a carrier waveform, amplify the waveform to the desired power level, and deliver it to the transmitting antenna [16]. Many digital transmitter components are similar with the major power consuming component being the oscillator. The oscillator is the circuitry responsible for the modulation of the message signal (i.e. the bit stream of encoded data) onto the transmitted waveform. An attempt to formulate the power consumption optimization problem requires understanding the oscillator operation. Oscillators are actuated upon the receipt of high bits only (see Figure 2.2); hence, power consumption in the transmitter occurs only when high bits are sent and virtually no power is consumed when low bits are sent. Each bit period tb is assigned High Low Energy consumed for Ct tb transmitting one high bit Figure 2.2 Digital RF Transmitter a minimum detectable value that is determined from the channel characteristics. Since this period is much longer than the oscillator period (a factor of nearly 106), the transient 13 period when the oscillator begins to oscillate is negligible in evaluating the power consumption. Therefore, the total energy consumed in the RF transmitter in one second, Eotai, is proportional to the total duration of high bits, namely, the total number of high bits, nlotal, times the bit period tb Ei,, = CItltoal (2.1) where Ct is the power consumption coefficient. Let M be the number of symbols transmitted in one second and n-be the average number of high bits involved in each codeword. The average power consumption per symbol, C , is therefore given by C -otal M - tbn (2.2) Equation (2.2) suggests several ways of optimizing power consumption. Power consumption can be optimized by (2.1) improving the transmitter circuitry to minimize C, , (2.2) minimizing tb, and (2.3) minimizing n-. The first two are determined by the physical conditions of the transmitter and the channel, and require modifications to the physical layer. The third one, on the other hand, is a non-physical factor, which would allow us to further enhance energy efficiency beyond the physical limit. The average number of high bits in each codeword q n= Pn, (2.3) i=1 where q is the number of source symbols, ni is the number of high bits in i-th codeword, and Pi is the probability of the i-th symbol. The objective of this paper is to reduce this average high bit number, W . Next, we introduce Memoryless ME coding, a novel source coding algorithm optimizing power consumption in RF transmission. At this point we should note that in our application, noise is not of significant magnitude. Hence, we consider noiseless source coding on at this stage. 2.2 Memoryless ME Coding 2.2.1 ME Coding 14 ME coding is a source coding algorithm that aims to optimize the energy efficiency in RF transmission by minimizing the average number of high bits used in coding the information source. ME coding is generated through two distinct steps: Codebook Optimality and Coding Optimality. The former is to determine a set of codewords, termed a codebook, that has fewest high bits, and the latter is to assign codewords having less high bits to symbols with higher probability. The following two theorems underpin the theory of ME Coding. Theorem 1: Coding Optimality. Let S = {s1 , s 2 ,..., qs_1 s be a source alphabet with symbol probabilityes P ={PI -- Pq- I P2 (2.4) Jq Given a codebook of q codewords, each of which contains ni high bits, I <i < q, the optimal code that minimizes the average number of high bits n= n, P is given by assigningthe codewords to symbols such that n, : n2 : ... : nq_, ! nq (2.5) In this optimal coding, all the codewords are arrangedin the ascending order of the number of high bits involved in each codeword, and the symbols are assigned these codewords in the descending order of symbol probabilities. This coding algorithm provides optimal codes for a given codebook with respect to power consumption. Proof i<j Let i and] be arbitrary integers such that 1 P q. From equations (2.4) and (2.5), P and n, nj q Consider the two terms involved in n n, = Old: Pn, +Pnj Interchanging the codewords for the i-th and j-th symbols yields New: P,n, + Pn, 15 (2.6) Subtracting Old from New and using (2.6), the net change in the average number of high bits due to this re-assignment becomes New - Old = (P,- P,Xn, - ni) 0 Therefore, the advantage number of high bits, ii, does not decrease for any interchange of codewords. Hence, this coding algorithm provides optimal codes for a given codebook with respect to energy consumption. Let W be a codebook of q codewords arranged in the ascending number of high bits involved in each codeword. The code C(W,S) assigns the q codewords in codebook W to q symbols in source S in such a manner that equations (2.4) and (2.5) determine the minimum -nfor the given W. Hence, the minimum of n- varies depending on properties of the codebook used. The remaining question is how to obtain a codebook that provides the overall minimum of n. Let W, = {w1 , w2 that are usable for ME Coding; q ... , wq-j,,I I be the entire set of codeword q0 <+oo. We first number each codeword in the ascending number of high bits involved in it, namely, n, n2 ... nq,_, nq., where ni is the number of high bits in codeword w,. Then, we generate the codebook used for ME coding by taking the first q codewords having the least high bits. Definition: Minimum Codebook. Let the codewords of the whole codeword set W, {WJW2,.,Wq-1,Wq} be numbered in the ascending number of high bits involved in each codeword, n, : n 2 ... ... nq nq, . A minimum codebook of q codewords, Wmin, consists of the first q codewords of the whole codeword set W Wmin = {w, W2 , -Iq- 1, wq IC (2.7) Wo It can be noticed in the previous example that the overall minimum energy codign cannot be obtained unless the above minimum codebook is used. Theorem 2: Codebook Optimality. Let S be a q-symbol source with symbol probabilities P ={P ! P2 . P- q } and W be a code book of q-codewords taken from the usable codewords set W = {w,w 2 ,...,w-q,wq 1, q , = q0 <±+oo; W c W0 . The , n, P, is that the codebook W is a minimum codebook of Wo. 16 Proof Let n, n2 ... n, n be the number of high bits in the codeword w, through ... wq involved in the minimum codebook Wmin. The proof is given by showing that replacing an arbitrary codeword wi involved in Wmin with an arbitrary codeword wj not involved in Wmin does not decrease the minimum average number of high bits n- . Since iiq j n,,, qO and n, n,+1 - n, .. nq n1 , the following inequalities hold 0, n,+2 - n,+,., nq , - n 0 , ni -nq 0 (2.8) Multiplying P,, P,,..., Pq by the above inequalities individually and summing them yield P,(ni+ -n,)+...+ P_(nq -nq- j+ P(nj -nj )! 0 (2.9) or Pnf, P~n, +...+ P_,n_ +Pnq Pin +... + Pqnq Adding Pn, +... + P, n, 1 to both sides, P,n, +...+ P,_n +...+ P_,nq, + Pnq Pn, +...+ P,, n- + PI n < +...+ P_,nq + P(n1 The left hand side gives the minimum average number of high bits for the minimum for a non-minimum codebook where wi codebook, while the right hand side provides Wn is replaced by wj. The former is always smaller than or equal to the latter. Therefore, the codebook must be a minimum codebook in order to minimize n- for available WO and given P. Combining Theorem 1 and 2, the following Corollary is easily obtained. Corollary 1: ME Coding. Let S be a q-symbol source with symbol probabilities P={P, P2 high bits i =( -P-- ,q n= , andW={w,w 2 ,--, wq- 1 ,Wq I be the average number of where ni is the number of high bits involved in the codeword wi, is given by (z) Using the minimum codeword Wmin of Wofor the codebook; W= Wmin c WO, and (ii) Assigning the q codewords of Wmin in the ascending order of number of high bits to the q-symbols of the descending order ofsource probabilities. This optimal coding is referredto as ME Coding. 17 Consider a special case equals the total number of high bits in the codebook divided by q. Therefore, the following Corollary holds. Corollary 2: A minimum codebook contains the minimum number of high bits; MinE n 2.2.2. Fixed-Length ME Coding Of practical importance is ME Coding with fixed-length codewords. Hence, the rest of this paper will concentrate on fixed-length ME Coding and extensions of fixed length ME Coding. As shown by Theorem 2 and Corollary 1, use of a minimum codebook is the necessary condition for obtaining ME Coding. Thus, we must first generate a minimum codebook. For L-bit fixed-length codewords, Figure 2.3 shows the entire set of usable codewords sorted by the number of high bits; W = {w ... , Note Wq. that the total number of usable codewords is q, = 2' . W1 Codeword Number of C12 Codewords L W2'''"W1,4 ..~ -'' 3 L L I '22'* 2L L-1 L L L - Codeword Pattern flr-----I Discard Figure 2.3 Fixed Length L-bit Codewords The first column has only has 1 = 1 codeword with zero high bit, the second column = L codewords with one high bit, the third column has 2 codewords containing two high bits and so on. All the codewords are number I through 2L in the ascending order of the number of high bits. The last codeword, w2 consists of all high 18 bits. Selecting the first q codewords from this exhaustive list of 2 L codewords yields the minimum codebook needed for ME Coding. It is clear from Figure 3 that, as the codeword length L becomes longer, the total number of high bits involved in the first q codewords becomes smaller. An extreme case is the unary coding, where L is long enough to express all q symbols with only high bit per codeword, e.g., 00010000. Since a longer codeword takes a longer transmission time if the bit period tb is kept constant, transmission rate decrease. Hence, this constitutes the trade-off between energy efficiency and transmission rate. 2.2.3. Optimality Bound to ME Coding In section 2.2.1 and 2.2.2, we proved the optimality of ME coding and introduced fixed-length ME coding. Since a closed form solution for the optimal performance of fixed-length ME Coding is not available, we derive the following optimality bound (2.11) 1 k(kl Bk where Hk is the source entropy and Bk is the codebook capacity defined as Bk (2.12) =Lk-' 1=1 where k is an arbitrary constant greater than 1. Inequality (2.11) suggests that source entropy Hk and codebook capacity Bk provide a lower bound on the optimal energy performance. As the entropy Hk decreases and the codebook consisting of q codewords of fixed-length L, the maximum codebook capacity Max(Bk) can be obtained from Table 1. Namely, the minimum codebook consisting of the first q codewords in the table provides the maximum codebook capacity given by Max(Bk )= (L+-kI j+ko0 +(L) k'a +b k a+1 (2.13) where a and b are positive integers shown in Table 1. In the (a+1) column, the q-th codeword exists at the b-th position. In other words, q = 19 + b. Note that any exchange of the first q codewords with the other (2L-q) codewords decreases the value of codebook capacity unless exchanging codewords within the (a+I)st column. Note also that, as the codeword length L increases, maximum codebook capacity Max(Bk) tends to increase, hence a longer codeword tends to lower the average number of high bits and the energy consumption. 20 Chapter 3 Energy Efficient DS-CDMA for RF Transmission Direct-sequence code-division multiple access (DS-CDMA) has recently generated increasing interest, particularly for cellular mobile and wireless communication. Energy Efficient DS-CDMA is a power-saving communication technique we exploited in the wireless sensor network by performing special modulation algorithms. Multiple access property is basically achieved by assigning a unique code sequence that each receiver uses to encode its information-bearing signal. In our research we have to design a set of energy efficient spreading codes to achieve the multiple access property and save power at the same time. An ideal spreading sequence would be an infinite random sequence of equally likely random binary digits. However, the use of an infinite random sequence implies infinite storage in both the transmitter and receiver, which is impossible in practice. Having a deterministic, periodic spreading code which has very similar attributes inherently coming from a real random sequence can make a huge improvement in signal recovery. In order to be able to spread and despread data signals successfully we have to devise a new signal recovery process different from that of general DS-CDMA communication systems. We will take a combined algorithm including Modulo-2 addition and multiplication on the receiver side to recover the intended data signal. Finally we can evaluate the system performance by means of estimation of error probability and signal-to-noise ratio (SNR) via on-off keying signal transmission, and further seek an effective means to improve it. 3.1 Motivation of Power Saving According to the previous description for ME coding principle, one can know that we already exploited redundant bits for saving power and correcting errors, and proposed a new source coding and modulation techniques with the feature of minimizing power consumption when transmitting signals. Nonetheless, the future problem we will deal with is a wireless communication network containing a couple of smart sensors in which 21 we need multiple access techniques to achieve the goal of bi-directional communications between smart sensors, the PDA and cell phone. SSensor B i-d irec tional W ireless C o m m u n ic a tio n s Figure 3.1 Bi-directional Communications in The Intelligent Sensor Network The most important issue of the multiple access capability is how to make each icoin receive its own signal and discard those signals that do not belong to it and noise. Direct Sequence Code Division Multiple Access (DS-CDMA) is an attractive modulation technique for solving our problem. If multiple transmitters convey a spread-spectrum signal at the same time, the receiver will be able to distinguish between the transmitters, provided that each transmitter has a unique spreading code (pseudorandom code, or PN code) that has a sufficient low cross-correlation with the other codes. The classic spreading code is basically not designed under the power saving condition. In order to save more power, we should design a new energy-efficient spreading code to minimize energy consumption for short-range RF transmission. The new spreading code is basically to use the 1 and 0 sequence instead of the traditional ±1 to modulate the data signal. Since the oscillator is the circuitry responsible for the modulation of the data signal onto the transmitted waveform and is actuated on the receipt of high bit only, power consumption in the transmitter occurs only when high bits are sent and virtually no power is consumed when low bits are sent. The function of energy-efficient spreading codes is to partition the high bit signal into small high bit chips as less as possible. Then we take a new signal process of recovery to receive the intended data signal. 22 C(t): 1/0 spreading code C(t) : 1/0/-l spreading code L t - t 6 T: chip duration -1 T :chip duration Figure 3.2 Energy Efficient Spreading Codes for DS-CDMA In the DS-CDMA systems the modulated information-bearing signal (the data signal) is directly modulated by a digital code signal. The data signal can be either an analog signal or a digital one. In most cases it will be a digital signal. What we often see in the case of a digital is that the data modulation is omitted and the data signal is directly multiplied by the code signal and the resulting signal modulates the wideband carrier. It is from this multiplication that the direct-sequence CDMA get its name. In Figure3.3 a block diagram of a DS-CDMA transmitter is given. The binary data signal modulates an RF carrier. The modulated carrier is then modulated by the code signal. This code signal consists of a number of code bits or "chips" that can be either +1 or -I. To obtain the desired spreading of the signal, the chip rate of the code signal must be much higher than the chip rate of the information signal. Data Signal Wide-Band Data 0 01Modulator code - Modulator Carrier Code Generator Generator Figure 3.3 Block Diagram of a DS-CDMA Transmitter 23 After transmission of the signal, the receiver (which can be seen in Figure 3.4) uses coherent demodulation to despread the spread spectrum (SS) signal, using a locally generated code sequence. To be able to perform the despreading operation, the receiver must not only know the code sequence used to spread the signal but also the codes of the received signal and the locally generated code must also be synchronized. This synchronization must be accomplished at the beginning of the reception and maintained until the whole signal has been received. After despreading the modulated data signal and after demodulation the original data can be recovered. Code Data Demodulator Demodulator Data Signal Carrier Code Synchr. Code Tracking Generator Generator Figure 3.4 Block Diagram of a DS-CDMA Receiver In the previous paragraphs a number of advantageous properties of spread-spectrum signals were mentioned. The most important of those properties from the viewpoint of DS-CDMA is the multiple access capability, the multipath interference rejection, the narrowband interference rejection, and with respect to secure/private communication, the low probability of interception. 3.2 Energy Efficient Spreading Codes 3.2.1 Auto-correlation and Cross-correlation between PN sequences 24 The spreading signal c(t) is deterministic, so that its autocorrelation function is defined by [17] R, (r)= - c(t)c(t - r)dt (3.1) Since c(t) is periodic with period T, it follows that Ra(T) is also periodic with period T. Consider two different spreading signals cj(t) and c2(t). The cross-correlation function of these two deterministic signals is Re (')=- fC1(t)- C2(t T - r)dt (3.2) where it has been assumed that both signals have the same period T. The cross-correlation function is also periodic with period T. 3.2.2 Ideal pseudorandom (PN) sequences There are two major objectives of the pseudorandom noise sequences used in wireless digital or personal communication DS-CDMA system. One is spreading the bandwidth of the modulated signal to the larger transmission bandwidth. The other is to distinguish between the different user signals utilizing the same transmission bandwidth in a multiple-access scheme. An ideal PN sequence is not random; it is deterministic, periodic sequences. The following are the three key properties of an ideal PN sequence [18] 1. The relativefrequencies of minus one and one are each 1/2. 2. For minus ones or ones, half of all run lengths are of length 1; one quarter are of length 2; one eighth are of length 3; and so on. 3. If a PN sequence is shifted by any nonzero number of elements, the resultingsequence will have an equal number of agreements and disagreements with respect to the originalsequence. To achieve the spreading objective, the power spectrum of a PN sequence should be like white Gaussian noise in order to make the spreaded signal occupy the transmission band equally. The second and more difficult objective of the PN sequence for a multiuser CDMA system is to distinguish between the signals of the different users utilizing the same transmission bandwidth. The PN code is the key of each user to his or her intended 25 signal in the receiver. For this reason the complete set of PN sequences has to be chosen with a small cross-correlation between the several sequences. This keeps the adjacent channel interference small. Theoretically, a zero cross-correlation is maintained by every set of orthogonal spreading signals. However, in practical wireless systems one has to design for easy, coherent generation of the PN sequences, on both the transmitter and the receiver sides. As a matter of fact, an energy efficient spreading code is a PN sequence of taking one and zero values. For a general purpose, we can just use a linear feed back shift register to generate a sequence which has those three properties just mentioned in the previous section. However, the energy-efficient spreading code cannot provide the same signal-to-noise ratio (SNR) at receiver as the traditional ±1 spreading code. The signal power is lowered by the spreading code but the decreased noise energy could not be proportional to the signal power reduction. General speaking, SNR will become a little bit worse if we use energy efficient spreading codes. 3.2.3 Finite-Field Arithmetic: Modulo-2 addition and multiplication Some of the manipulations that will be performed on the code sequences introduced later require an understanding of the mechanics of finite-field arithmetic, especially, Modulo-2 addition. Here we only summarize the main properties for Mdoulo-2 addition. Consider the set S={O, } with addition and multiplication defined in Figure 3.5. It can easily be verified that this set, with the operations defined in Figure 3.5 satisfies closed, communicative, distributive over addition and associative properties. There also exist an additive identity element, an additive inverse element, multiplicative identity element and multiplicative inverse element in S. This field is a binary number of field that will be used extensively in what follows. Observe that addition can be accomplished electronically using an Exclusive-OR gate and multiplication can be accomplished using an AND gate. Multiplication Addition S1 1 0 0 1 0 1 Ii 0 1 110 0 0 0 0 Figure 3.5 Modulo-2 Addition and Multiplication 26 3.3 Energy-Efficient DS-CDMA Communication Systems Before we discuss the energy-efficient DS-CDMA system, we have to briefly reminisce the signal transmission model at the transmitter side. Consider a general DSCDMA with channel delay and let S,(t) denote the transmitted signal which consists of M receivers. Then S, (t) = JJ1%dk (t - rkc, (t - Tk,)cos(oct + pk) (3.3) k=I where Pkis the signal power, oic is the carrier angular frequency, dk (t) is the data signal for the kth receiver, # and 'rk Ck (t) is the spreading signal corresponding to the kth data signal and are the signal phase and delay for the kth receiver, respectively. The data signal dk (t) can be expressed as follows (3.4) dd)=)n(jT, (i+ )T) dk( The spreading signal can be expressed ()3.c 5) ck where a I1(t,,t 2 ) is Pr(dk) = 0)>> Pr(dk) () e f-1,1} with C ) = unit rectangular pulse on [t ,t 2 ) , d k) e {0,1} where 1) because of using ME coding to code our data and ()N for all j and k and for some integer N. The integer N is the minimum period of the spreading sequence. The chip length Tc will be assumed to be given by T, = Tb/N where Tb is the bit interval duration. 3.3.1 Signal recovery method of general DS-CDMA systems The signal recovery process of a DS-CDMA system is shown in Figure 3.6. After we send our spreading modulated signal to the channel, the signal could be contaminated by some noise. For the convenience of analysis, we will view noise in the channel as additive white Gaussian noise (AWGN). Thus the received signal at the receiver can be 27 expressed as S, (t = I 2Pkcd/k (t - -k )ck (t - k )cos(ot + Without loss of generality, we will restrict our consideration to the Ok )+ n(t) 1s' (3.6) user and assume that r, =#, = 0. Furthermore, there is no loss in generality in assuming that -Ck e [0,T) and bk e [-5,.) since we are only interested in time delays modulo T and phase delays modulo 2n. Then the despreaded demodulated signal Sd(t) can be easily described as M Sd W)= 2Pkdk(t -r k k(t -1k)cos(ot +$kcosC k=2(3.7) (37 + 2Jd,(t)cos2 coj + n(tc,(t)coscoct Sampling C,(t)COS ct t = nT) S,(tW Bit Detection )/ d,(t ) Figure 3.6 Signal Recovery Process for a General DS-CDMA System The major objective here of using the integrator (or called correlator) is to find the signal autocorrelation and crosscorrelation and make the noise become much smaller. Let Y denote the output of the correlator receiver matched to user I at t=T. Then Y= T d() + N + k" w2 h I()(T,,d) 2 where 28 (3.8) dk =(d(k),d k)) Ng= I (k) f n(tc, (t)cos ot dt k)R Ccosk d R,(k)(r) = fC 1 (ck r = k) (t- 1k C1 ()ck (t - + d()k)(k) (k) )dt Trk The second term Ng in Y is a Gaussian random variable due to integration of the Gaussian channel noise and the third sum of terms in Y is referred to as multiple access noise. The final step to recover the data signal di(t) is the bit detection that is to detect which time slot signal is one or zero. The bit detection process could fail if the total noise energy is pretty high. Hence it is very crucial to maintain a low crosscorrelation between different spreading codes. Usually our approach is to make the spreading signals have a long period to improve the crosscorrelation and autocorrelation properties. Of course we need more memories to storage the spreading pattern. If the bit detection process is successful we can get the data signal from transmitter 1, i.e. d, (t)= d, (t) (3.9) 3.3.2 Signal recovery for spreading codes taking values of 0 and 1 If we use the spreading code taking values of 0 and I the process of recovering the data signal d1 (t) should be modified as shown in Figure 3.7. Then the despreaded and demodulated signal Sd(t) is Sd(t) = 2Pkd1 d (t - 1k 1 ()ck (t -rk )cos(ot + $ )cos (.t k=2(3.10) + 2pd, (t)c1 (t)cos 2 ayt + n(t)c, (t)cos oct where c(t) has the same form of (3.3) but c .) e {0,1} and note c 2 (t)= c(t). The integrator in Figure 3.7 has an upper limit Tc that is different from that in Figure 3.6. 29 c, Sampling t = nT1, (t)cosa't (-t S,(t) Chip Detection Pass d (Low (t) W Filter C1 ( ) c, (t) Figure 3.7 Signal Recovery forSpreading Codes Taking Values of I and 0 This is because we want to reduce the noise influence on the data signal in the chip duration. The sampled output of the integrator is sent to a chip detection mechanism used to recover the chipped data signal. Let Y be the output of the integrator, then we have Y= 2 Td(')c()+N + g'0 k=2 2 I,(')(rk,#k d) (311 where dk Ng (d(k),d (k) = = f n(t)c, (t)cos ow dt (k) = cos Ok R,(k)(r)= R = [d ±) d Rk ) - c1 (t)ck (t - k)Rd )(k) ) rkdt C1 (tck (t -r-k kit If there is no error occurring in the following chip detection process we can have S, (t) as follows Afe= , (ti After performing the modulo-2 Addition, we get 30 (t) d,A(td, t od(t)u= (3.12) S1,I @ -(t) = d,(t) + (I- d,()).1(t) (3.13) The second term in (3.13) is a high frequency signal. It can be filtered out by a low pass filter. Therefore, the output signal of the low pass filter should be the same as the data signal di(t). 3.3.3 Signal recovery for spreading codes taking values of 0, 1 and -1 The third case we will discuss here is to use an energy efficient spreading code taking values of 0, 1 and -l when chipping the data signal. The signal recovery process is very similar to the previous one described in Section 3.2. The only difference is that we have to use .2 (t) to perform the Modulo-2 addition. Since c, (t) is not equal to c, (t) but c, (t1. Thus the output of chip detection S, (t) equals to d, (t)cl (t). After performing the Modulo-2 addition we know 5,(t)@2 (t)=d, (tc2(t)@j (t)=d,(t)+(I-d,(t))j2(t) Similarly, we can find the data signal d, (t) by filtering out the high frequency term. Sampling c. (t)cos aOit S,() Sr) -) Sd)0 d Chip Detection -- Low Pass Filter 1 0 c71 (t=leC2 (t) Figure 3.8 Signal Recovery for Spreading Codes Taking Values of 0, 1 and -l 3.4 Simulation Results 31 (3.14) We use Figure 3.9-3.12 to present the whole signal recover process. Figure 3.12 shows that we successfully recover the data signal d (t). 2 1.5 1.5 0.5 0.5 0 0 -0.5 -0.5 -1 0 6 4 2 10 8 - -1 ) 2 4 tim e(m s) 6 8 10 8 10 time(m s) 2 1.5 1.5 a0.5 0 0 -0.5 -0.5 -1 2 0 8 6 4 -1 10 0 2 4 6 time(ms) time(ms) Figure 3.9 Data Signals and Chipped Data Signals ill S0 -1 0 1 2 3 4 1 2 3 4 5 tme(ms) 6 7 8 9 10 5 6 7 8 9 10 3 2- S, 0 -1-2 0 ime(ms) Figure 3.10 Transmitted Signal and Received Signal 32 4- 2 INi*i0'i 1i 0 -2 -I 0 3 2 1 4 I II 5 6 9 8 7 10 time(ms) .5 0.5 - 0 (, -0.5 --11 0 2 1 4 3 7 6 5 10 9 8 time(ms) Figure 3.11 Demodulated Signal Sd(t) and Output of the Integrator Y 2 I I I I 1 2 3 4 I I I I I 5 6 7 8 9 I I I I I 5 6 7 8 9 5 6 7 8 I 5 6 7 8 9 0 0 1 time(ms) 9-' I 1 I I 3 4 0 '5 -1 0 0 1 2 10 time(ms) 0 0 -1 0 1 4I 12 2 3 4 time(ms) Figure 3.12 S,(t), ,(t) E,(t) and d (t) 33 10 0 3.5 Estimation of SNR for Different Spreading Codes The signal-to-noise ratio (SNR) is an efficient index to evaluate the quality of the received signal. We can realize the variation of SNRs by means of the output of the correlator under using different spreading codes. Here we analyze SNRs for three different cases. 3.5.1 SNR, estimation for +1/-1 spreading codes Recall the output of the integrator Y in Figure 3.6 is as follows Id Y = -- T L+N+ I ) We can calculate the signal power by the following definition: 2 PdI T fT 2 dt = aP'T2 d 2 if d')e{0,1} (3.15) where a, is the percentage of high bits for di(t) during the transmission duration of T seconds. Then the noise power can be shown to be NOTb " 4 k=2 kPk 2 (3.16) 2 The detailed procedures of deriving (3.15) and (3.16) can be proved in Appendix. Therefore, the SNR for this case can be found as SNR1 = P, NOTb 4 (3.17) k=2 ,P 2 3.5.2 SNR2 estimation for 1/0 spreading codes We already obtained the output of the integrator Y in Figure 3.7 as 34 Yd - 2k~)~jd )c') +Ng +~ The signal power is 2 Pd2 where dt - al A PI 2 f-T d(')c(l) F2 ' T Th2 (3.18) p, is the percentage of chipped high bits of c, (t) in a bit duration. Then the noise power is P2 = I)(kk,dkj2 N9+1 dt= + 4 Mak/k P k=2 2 (3.19) The detailed procedures of deriving (3.18) and (3.19) can be proved in Appendix Therefore, the SNR for this case can be found as follows SNR2 2_ 2 /2 _ P0 T,,/3 N (3.20) 2 Ma/PI 4 k=2 2 where pI, is the percentage of chipped high bits of c, (t)ck (t - 17k) in a bit duration. 3.5.3 SNR3 estimation for 1/0/-1 spreading codes Similarly, we can show the output of the integrator Y in Figure 3.8 is as follows Y= 2T d +Ng+ k (3.21) I( ) where Ng and I,(k)(rk,$,, dk) are the same as those in (3.8). The signal power can be found as Pd3 where $, +)/i =21 Td(c dt = 2 (#, + y, )T;) is the percentage of chipped high bits of c2(t) in a bit duration. 35 (3.22) The noise power can be computed as follows 2d P IN +Y' T \ I('rk,',dk)Idt (3.23) k=2 (=/+y,)NoT 4 k=2 a 2 2 The detailed procedures of deriving (3.22) and (3.23) can be proved in Appendix. Therefore, the SNR for this case can be found as follows (A +r,)PiT SNa, SNR _ 3 d3 P _/2 NOT (6+y) 4 where ,+ 71k a ( k=2 (3.24) +y)P 2 2 ' is the percentage of chipped high bits of c, (t)ck (t - rk) in a bit duration. 3.5.4 Comparison of SNRs for different spreading codes According the equations (3.17), (3.20) and (3.24) derived above we can plot Figure 3.13 and 3.14 to show the discrepancies between different SNRs. In Figure 3.13 we assume there are ten receivers in the communication system and the period of each spreading code is 31; that is, the data signal will be chipped 31 times in one single bit duration. We have to notice several key points when taking a look at these diagrams. The power saving rates on the vertical axis for SNR, SNR2 and SNR3 are equal to (1ai)xlOO%, (1-ci pi) xl00% and (1-ixi(3 1+71)) x100% respectively. For example, assume all SNRs are 2 dB, 81 = 0.5 for SNR2 and /3+y; = 0.5, then we can calculate in Figure 3.13 al=0.75, (1-ai Pi)xlOO%=(1-ax(@3i+y)) x]00%=62.5%. Check SNR2 and SNR3 lines at 62.5%, we found the corresponding SNR1 and SNR2 are about 0.4 and I dB, respectively. This means although we sacrifice some SNR the power saving rate is largely increased. Then for the BPSK (Bi-Phase Shift Keying) case without saving any power, we can find its SNR is equal to 2 /2 BIK =PPTT2K SNR SN] BPK NOT A4 4 36 k=1 2 ~ PM= 1, Tb= I ms and No = 0.00015 as the Here we adopted M= 10, P1 = P2 = .... calculating conditions and found SNRBPSK =6.02 dB if the period of spreading codes is 31. It is the merging point of these three curves in Figure 3.13. Figure 3.14 shows the discrepancy of taking spreading codes with different periods. It is obvious that the SNR for each case is increased at the same power saving rate if compared to Figure 3.13. Although using a spreading code with a very long period can improve SNRs, it makes the chip detection process become difficult. Thus how long the period we should use is also another important issue in practice. 90 80 70 SNR2 600) C .5 Cu (I, G) 0 0~ SNR3 SNR, 50 40 U30 20- N=31 M=10 10- 01 -1 1 -10 -8 -6 -4 -2 0 2 4 6 SNR (dB) Figure 3.13 SNR v.s. Power Saving rate for 10 receivers and the period of spreading codes N=31 37 8 90 I I I I 80- SNR2 70- SNR 3 60- SNR > 50I 40- 30 -20- N =1023 10- 0 -8 M =10 -6 -4 -2 2 0 SNR (dB) 4 6 8 10 Figure 3.14 SNR v.s. Power Saving Rate for 10 Receivers and The Period of Spreading Codes N= 1023 3.6 Estimation of Error Probability for Different PN Sequences The estimation of error probability in a communication system is very important since we can realize whether the communication performance is good or not based on the relation between SNR and error probability. The performance is related to the correlation properties of the unique spreading code used. We usually evaluate the performance of a CDMA system by calculating it transmission error probability. A communication system has a good system performance, which means its error probability is lower than that of other systems under the same SNR. Here what we are concerned with is whether taking the energy efficient spreading codes to spread the data signals instead of traditional spreading codes results in an increase of error probability or not. We start to formulate the problem from a general DS-CDMA system. 3.6.1 Error probability for +1/-1 spreading codes 38 A bit detection error usually occurs in misjudging a high bit signal into a low bit signal or vice versa. The average error probability of receiver I for transmitting one bit can be denoted as P(O= (I) Pr(Y 61d' =O)+p')Pr(Y <S d(' =i) where p() is the probability of transmitting zero signals for probability of transmitting one signals for Jst (3.25) transmitter, p') is the transmitter, 6 is the threshold for bit 1 st detection (1) If d') = 0, we can know the output of the integrator from (3.8) can be simplified to YO=N +M k=2 (2) If d(' , I ( (3.26) 2 1, we can know the output of the integrator from (3.8) can be also simplified to Y, = N + (I,, 2IT ,d (3.27) T where a > 0, we have Substitute (3.26) and (3.27) into (3.25) and let o= a =2 P(])=p ')Pr(YO 6)+p0'Pr<6 PO) Pr Ng ,dka 2L b+ (3.28) A0)Pr Ng +k L k=2 2 IW)(rk,$O ,d)+ IT, <a T, A straightforward application of the central limit theorem then indicates that Pj') goes to p1)Q(a SNR, ) as long as SNRI approaches constant [19]. -k P k=2 2 -- oo as M -> oo and p1) >> p() 1 Under these conditions, we can simplify (3.28) into 39 P(') ~ pQ(aSNRj =(I-a,Q(a S-NR,j (3.29) 2 where Q(x)= e 2du 3.6.2 Error Probability for 0/1 spreading codes According to (3.11), we know the output of the Integrator in Figure 3.7 is N id(')c(l) 2= 0O+ 2 I + (1) If d(')c(' =0 , then Y becomes YO =N + Z k=2 I (k)(k,,d,) (3.30) 2 (2) If d')c() =1, then Y becomes At g2 L= T +N + , 2 f(k)(r1,#bd) (3.31) Although Y is sampled by each chipping rate T~, the error probability we estimate is based on one bit signal transmitted. Hence, the average error probability for one bit can be expressed as )]Pr(Y P,' =[(I1-ai)(1 - A)+ai(I-#A)+ (I-aJA ! 9)+ (a,,)Pr(Y; < 9) Using the same approach and conditions in Section 3.6.1, we can get a more concise form of Pe : PV (-a,#A)Q(a SNR2 ) 3.6.3 Error Probability for 0/1/-1 spreading codes According to (3.21), we know the output of the Integrator in Figure 3.8 is 40 (3.32) Y= Tdo( (C( kI I()(zk, 2+N],Z+ $kd, k=22 (3) If d() (c')) =0, then Y becomes (3.33) )(r,k d) 2 PI YO =N9 + k=2 (4) If d (C = =1, then Y becomes Y,= Te+N, + =2 Tk=2k k I(k)(rk,,#k 2 dk) (3.34) Although Y is sampled by each chipping rate Te, the error probability we estimate is based on one bit signal transmitted. Hence, the average error probability of receiver I for transmitting one bit can be expressed as P(') = [(I -a,)(] -,)+a, (I- ,)+ (I -aj), +a, (I -,)]Pr(Yo + [a.(A + r, )] Pr(Y, < 9) Using the same approach in Section 5.1, we can also get a concise form of P< Pe(') ~ 1- Cr (A, + r.)]QWTNa ) >!9) as (3.35) 3.6.4 Comparison of error probability for different spreading codes We use (3.29), (3.32) and (3.35) to demonstrate the relationship between error probability and SNR. As you can see in the following figures, the three curves for SNR1 , SNR2 and SNR3 almost overlap together, but SNRBPSK is greatly different from them. Actually there are some small differences between these three curves. This feature tells us a very important result; that is, the error probability in the energy-efficient DS-CDMA system is barely influenced by using different energy efficient spreading codes. Nevertheless, it is much worse than that in the BPSK DS-CDMA system and we cannot expect the error probability would not increase if excessively saving the transmitting 41 power since the above example is an ideal case. It just tells you the error probability would not alter abruptly in a reasonable power-saving range. There is also an interesting feature we can find if we compare Figure 3.15 with Figure 3.16. That is, if we save more power (decrease a1 ) the differences between error probability cures for three cases are getting smaller and smaller and the error probability become worse and worse. Therefore, the error probabilities by using different energyefficient spreading codes will approach the same value and the signal communication performance becomes bad if a keeps decreasing. 10 10 02 SNRI, >. -4 .$ 10-0 -L 2 10-6 SNR BS M=10 N =511 a, =0.5 A, =0.5 for SNR 2 pA +y, =0.5 for SNR 3 10-8 0 5 10 15 Eb/No (dB) 20 25 30 Figure 3.15 Error Probability v.s. EJ/No for Different Spreading Codes if ai = 0.5 42 100 10 SNR, 11. >. S10 -4 CU SNR13,S M=10 10- N=511 a, =0.2 A =0.5 for SNR 2 A, +y, =0.5 for SNR 3 I 1 10 0 5 10 15 Eb/No (dB) 20 25 30 Figure 3.16 Error Probability v.s. E/No for Different Spreading Codes if (X= 0.1 In this chapter, we investigated the problem of energy efficient DS-CDMA communications in the wireless sensor network. We can learn there are three important findings in this research: (1) New signal recovery methods for energy efficient spreading codes are proposed here. (2) Although SNRs for energy efficient spreading codes become a little bit worse, we can save a lot of power. (3) Error Probability almost does not alter if using energy efficient Spreading codes. In the future research work, we would like to figure out a good method to generate energy efficient spreading codes based on how much power we want to save. The traditional linear feed back shift register to generate a PN sequence is not suitable for our case. Then we will discuss the synchronization problem for the energy efficient DS-CDMA system. 43 Chapter 4 Suppression of Multiple Access Interference (MAI) in Energy-Efficient DS-CDMA Communication Systems 4.1 Principle of MAT Suppression The ME Coding described above is effective for reducing MAI, when it is used for DS-CDMA. MAI is reduced due to the low overlap probability of transmitting high bit signals to multiple receivers. Since ME coding decreases the number of high bits, it not only reduces power consumption but also reduces the chance of signal interference among multiple channels. As a result, MAI is significantly reduced. Pseudorandom Pattern Generator Modulator Cobn ME Coding of ME Coding Modulator cNo(t) Channel ataSorc M Dat Surc I ME Coding d Noise Modulator MED ---- der kt Demodulator 4---- - Receiver Pseudorandom Pattern Generator Figure 4.1 DS-CDMA Combined with ME Source Coding Figure 4.1 represents the configuration of an Energy- Efficient DS-CDMA system combined with the ME source coding. Data sources, I through M, are coded with the ME 44 coding having sufficient redundant bits. Each channel of signal di(t) is spreaded with a unique pseudorandom (PN) sequence. The PN sequence, however, applies only to high bits of source code d,(t); for low bits, no spread signals are produced. All the channel signals are superimposed and modulated with a carrier frequency. At a receiver, the transmitted signal is demodulated, and then decoded to recover the original source symbol. Figure 4.2 shows how multiple sources of signals are mixed and modulated. The data signal to j-th receiver, dj(t), is coded with the ME Coding and thereby it contains fewer high bits, as shown in the figure. Note that a PN sequence is generated only for the high bits, and that no signal is generated for low bits. Unlike the standard CDMA using Binary Phase Shift Keying (BPSK), which generates signals for both high and low bits, the proposed method superimposes multiple channels of signals that are very sparse. Therefore the probability of superimposing multiple channels of non-zero signals is low. d, (t)c,(t)cosox 0o Signal No Signal No Signal I No Signal Time d No Signal (t)c,(t)cosn 0~IX~ No Signal Signal Highly Chipped Signal No IIVl~~ o Signal Time d" (t)c,(t)coscd No Signal No Signal No Signal * I No Signal No Signal Time Figure 4.2 Principle of Multiple Access Interference Reduction 45 Figure 4.2 illustrates that multiple non-zero signals are seldom superimposed; all the time slots except the second slot are occupied by one or zero channel. The system can send multiple non-zero signals at the same time, since unique PN sequences are assigned to individual channels, but the chances of such superimposition are lowered in the proposed method. As the number of channels increases, the chances of interference may increase. This can be overcome simply by increasing the word length in ME coding. As a longer word length is used, the number of high bits decreases in the ME codebook, and individual channels may have sparser non-zero signals to send together. In consequence, the probability of interference gets lower. In the standard CDMA with BPSK, MAI rapidly increases as the number of channels increases. The proposed method resolves this rapid increase of MAI by adding a few redundant bits to source coding. Two conventional methods for reducing MAI at the transmitter side are to increase the system processing gain and to boost the signal power. Increasing the processing gain often entails a longer PN sequence for spreading the signal. This leads to the increase of memory size, computational complexity, and difficulty in designing spreading sequences. Boosting the signal power is not desirable for mobile applications and others where available power is limited. High output power is often prohibited by regulations in some countries as well. At the receiver side, on the other hand, efficient correlation filters have been developed to lower MAI, as described previously. Sophisticated correlation filters, however, add complexity and increase cost. Our source coding approach would supplement those downstream filter designs, so that effective MAI reduction may be accomplished with minimum complexity and cost along with substantial power saving. The salient feature of the proposed method is that the more power the system saves, the more the MAI is reduced, however, at the expense of sacrificing transmission rate. In the following sections, we will analyze the system performance with respect to signal to noise ratio, error probability, and transmission rate. Since we use primitive OOK instead of BPSK and other modulation methods, the processing gain is lowered for that. Nevertheless the overall performance would be better, since MAI is significantly lowered. Also important to note is that, when too many redundant bits are added to the ME codebook, they not only lower the transmission rate but also increase the error probability in the whole word. In the following sections we will analyze the relationship among 46 transmission rate, error probability, S/N ratio, and power consumption to address design trade-offs among word length, channel number, and output power. 4.2 Signal Model A signal transmission model is developed in this section in order to analyze the system characteristics. Consider a general DS-CDMA with M receivers. The transmitted signal consisting of M receivers is given by St )= 2Pkdk(t - k)ck(t -r (4.1) )cos(Wt+ k) k=1 where Pk is the signal power, oic is the carrier angular frequency, dk(t) is the data signal for the kth receiver, Ck (t) is the spreading signal corresponding to the kth data signal and # and rk are the signal phase and delay for the kth receiver, respectively. The data signal dk (t) can be expressed as follows dk(t)= d )H (jTh, (j +)T) (4.2) J=-* The spreading signal is given by C' (t)= where l(t1 ,t2 ) is a unit rectangular (4.3) c(+& C (ck,)j pulse on [tdt 2 ) e {0,1} , where Pr(dk) =0) >>Pr(d(k) = 1) because of using ME coding to code the data and C() E {1,1 with for all j and k and for some integer N. The integer N is the C k) = Ck) minimum period of the spreading sequence. The chip length Tc is given by Tc = T /N where Tb is the bit interval duration. Assuming that the channel noise is additive white Gaussian (AWGN), we can write the received signal at the receiver as S,(t )= I 2Pkdk (t - 1k )ck k=1 47 (t - rk )cos( owt + k )+ n(i) (4.4) Without loss of generality, we consider the 1 St user and assume that r, = Furthermore, there is no loss in generality in assuming that rk e [0, T) and #k e [- 00 ,) since we are only interested in time delays modulo T and phase delays modulo 27r. Then the de-spread demodulated signal Sd(t) is given by Sd (t) = d2Pkck (t - Tk )cI (tck (t - Tk )cosot + 'k )cos k=2 WOLt (4.5) + 2J d, (t)cos wot + n(t)c, (t)cosat 2 Following [20] and [21], let Y denote the output of the correlation receiver matched to transmitter I at t = Tb. We have Y = 2 Td() + N + M kI()(r' A ,d ) (4.6) k=22 where (dlk), d (k)) dk = Ng = b n(t)c, (t)cos coj dt J(k) = cosAdd(k)R()( )+ d R, )(r = R )= f c, (t)ck (t - Tdt C,(t)ck (t - kt (k)(-k) The second term Ng in Y is a Gaussian random variable due to integration of the Gaussian channel noise and the third sum of terms in Y is referred to as multiple access noise. The final step to recover the data signal di(t) is the bit detection that is to detect which time slot signal is one or zero. The bit detection process could fail for a conventional CDMA communication system if Y is very high. Therefore, it is very essential to maintain a low cross-correlation between different spreading signals. Conversely, the request of the cross-correlation property between spreading codes for an energy-efficient DS-CDMA system can be relaxed since Y is always maintained at a small magnitude. 4.3 Evaluation of System Performances 48 4.3.1 Signal-to-noise-ratio (SNR) The signal-to-noise ratio (SNR) is an efficient index to evaluate the quality of the received signal. To calculate SNR, first the signal power of d](t) can be found by the following definition: N2 =(T1e) d 22 T dt - 1,P T1, if dfl c= {0,1} (4.7) where a, is the percentage of high bits for di(t) during the transmission duration of T seconds. Then the MAI and AWGN powers can be shown to be ccki aaP cNjj;,h P, aNOT,, 4 2(k (4.8) 2 =2 Therefore, the SNR in the energy-efficient DS-CDMA system can be found as SNR = PT(4.9) a,NoT +m 2 In the BPSK case, a, = k=2 a 2 =-=ak =1 , then the SNR reduces to SNR = lsK= IT 2 NoTh 2 k=2 Several means for calculating the error probability of a CDMA receiver have been published in the literature over the past couple of decades. If we take a similar simplistic approach that first appeared in [23], in that MAI is assumed sufficiently well represented by an equivalent Ganssian random process. In addition, we make the usual assumption that power control is used so that all transmitters' signals arrive at the receiver of transmitter I with the same power and the probability of transmitting high bits for each transmitter is the same, i.e., a, = a2 =-= a,. Under these conditions we can show that Eq. (4.9) can further be simplified as 1+ Nj SNRn=raI (3N 49 2Eb or SNRBPSK =LM-1 3N +Ebi 2Eb (4.10) Figure 4.3 plots SNR against power saving coefficient a, for different numbers of transmitter s M. Note that SNR increases with saving more power. 4 10 N=63 3 10 2 10 M=5 z M=25 10 M=100 - =200 10 0 M=500 - 0-11 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 a1 Figure 4.3 SNR for Energy-Efficient DS-CDMA vs. The Variation of a, if E/No = 10 dB and N=63 4.3.2 Error Probability A bit detection error usually occurs in misjudging a high bit signal into a low bit signal or vice versa. The average error probability of receiver 1 for transmitting one bit can be denoted as P,, = p() Pr(Y > 9 1d() 0)+ p() Pr(Y < 9 1d() where p(O is the probability of transmitting zero signals for 1 st 1) (4.11) transmitter, p(') is the probability of transmitting one signals for Ist transmitter and S is the threshold for bit detection. If d(') = 0 we can know the output of the integrator from (4.6) can be simplified to 50 O=Ng +31 (4.12) 2dIk) If d(') = 1, we can know the output of the integrator from (6) can be also simplified to Y=Ng +L Substitute (4.12) and (4.13) into (4.11) and let g P,, = p ') Pr Y > As SNRME approaches constant, k=2 T + 2 (4.13) k ~ rk Ipk,dk +IT 2 9 we have Pr Y, < as k ak-><x> M -+ T (4.14) oo and p!') >> p'), under these conditions, we can simplify (4.13) into =IP-(1 - a,)Q SNRME) where Q(x)= (4.15) fe 2du Figure 4.4 below presents the results of (4.15) for different (xi cases and we can find the error probability can be decreased largely with saving more power if compared to the BPSK case (a, =1). 51 0 10- 10 a1=1(BPSK) 10 -2 _ 10 - a1=0.7 Z (D CC1=0.3 10 0. -5 CL -- 1c - 10 10 10 -1- -8 10 - M=50 a=. 1-9 0 2 4 6 8 10 Eb/N, (dB) 12 14 16 18 20 Figure 4.4 Error Probability per Bit for Energy-Efficient CDMA with the Variation of cc 4.4 Simulation Results In the following simulation example, we use a two-transmitter case to verify the SNR and error probability are improved if using ME transmission. Figure 4.5 presents the BPSK signals and ME coding signals at the transmitter side. We have to notice that the transmitted information in the same period for BPSK and ME coding cases are usually not equal. The objective here is just to show the signal interference in the same time period. As you can see in Figure 4.6, the signal interference in ME transmission case is much less than that in the BPSK case. The computational results can prove the SNR in the ME case can be augmented up to 5dB better than that in the BPSK case. Hence, we can facilitate the signal detection process at the receiver end. 52 BPSK Signal Transmission ME Coding Signals 2 2 1 *0 -o .-1 U J- t-- 0) -l - -L 0 0 20 10 time (ms) ) -1 30 0 10 20 time (ms) 30 0 20 10 time (ms) 30 2 2 .JU 04 N _ .L 1 CD 0 cc) C5 cc -1 -2 10 0 30 20 time (ms) 0 Figure 4.5 ME Signal Transmission for Two-Sender Case BPSK Signal Transmission 2 164 iii.. I I,I I 1.,.. 11j 1111 _0 0 -1 ---1irij -jI.rI 7 ,- 111 i -9 0 5 10 , F ' r'1'' 1 15 time(ms) 1 ji*1 -1- I I I. 11 20 25 30 Signal Transmission Using ME Coding 3 2 - 1 -I - 0 -1 All I" I -2 -3 0 5 10 15 time(ms) 20 Figure 4.6 Total Signals in The Channel 53 25 30 Chapter 5 Communication System Design In the previous chapter, we already knew the communication system has a good signal transmission quality because of MAI reduction. However, the information transmission could become worse if the codeword is excessively extended. The ensuing problems include a low transmission rate, a high average error probability per codeword and a increasing difficulty in synchronization. Therefore, we devised an algorithm for how to decide the codeword length under some system requirements. The first step is to find the upper bound of the codeword length. 5.1 Critical Codeword Length The error probability per bit was derived in the previous chapter. Suppose a codeword having a length L. Define Ek as the event that no error is made at time k. Then the event &that no error is made in the entire block is the union of the events Ek. If each event is independent, the probability of event &is as follows Pr (e)= (1 where Pr(Ec) = (5.1) P) (1- P) and Pb is the error probability per bit as shown in (4.15). The error probability of a codeword P, can be represented as P, = I - Pr(e) (5.2) If LPb <<1, (5.2) can be approximated by P,, = L -P (5.3) To find the critical length of a codeword for ME transmission compared to the BPSK case, we can start from the condition PE > pBifSK , that is K r r lQns whereLadLbarete an ME t(5.4) where L,, and Lb are the codeword lengths for BPSK and ME transmission, respectively. 54 Although Q(x) function cannot be expressed as a explicit form it can be bounded by exp(x 2/2). Thus the critical length L, for ME transmission can also be rewritten as 4 = exp - SNRHPSK 2 SNRM -) (5.5) L I -a, Substitute (4.10) into (5.5), and then we can obtain a simpler form of L, as L = (5.6) Lb exp[( -a, )SNRml] 1-a, 108 aC =0.1 10 aCq=0.15 n -J C) 04 a 1=0. 3 102 5 a =0 . 7 I 100 0 5 I 10 1 15 Eb/NO (dB) 20 25 30 Figure 5.1 Ratio of L,/Lb with The Variation of a,if M=50 and N=63 Therefore, the ME codeword length L.. must be smaller than L, and its exact value can be obtained on the basis of the given system performance and transmission rate. Figure 5.1 depicts the relationship between the ratio of Lc to Lb and Eb/No , and we can see the ratio of La/Lb increases as a I increases. The reasonable value of L,, can be determined from Figure 4.4. For example, we can know Lc=10 4Lb if a, = 0.15 and E/No= 10 dB. If 55 the minimum transmission rate Rmin is also given, the length of a ME codeword can be determined based on this rule: Lm min(O'Lh, Rmi.Tb) where T is the bit duration. 5.2 System Parameters and General Considerations The optimal codeword length of ME coding is related to many system parameters. We can usually group system parameters into two categories: Given and Design parameters. Generally speaking, the optimal codeword length could not be expressed as a close form equation since many parameters couple together. The given system parameters can be nearly learned as follows: (1) Number of Channels: M (2) Power of AWGN: N, (3) Number of the source symbols to be encoded: q (4) Minimum transmission rate to be maintained: (5) Time required to transmit one symbol: 2 min treq (6) Maximum allowable error probability per codeword: 1', In addition, there are only two design parameters to be considered: Signal power pi and the processing gain Gp. There are several facts that should be addressed before we precede the procedures of seeking the optimal codeword length. In general, the communication system is requested to have a transmission rate f which is higher than a minimum rate, i.e. 7 min, at most of the communication time to avoid serious transmission delay occurring in the system. We can find an upper limit of an ME codeword L0 based on the minimum transmission rate. According to the previous discussion we apprehend the SNRME and error probability Pb are both affected by some given parameters such as M, No, a 1and Eb, etc. Moreover, the error probability of a ME codeword Pc, is just the function of the codeword length Lm and Pb as shown in Eq. (5.3). In other words, Pc, can be determined if SNRME and Lm are lucid. As we already knew from Eq. (5.6), the critical codeword length L, is the allowable longest value of a ME codeword length if compared to the BPSK transmission mode. Thus, the upper bound of a ME codeword length can be suggested to determine through using the following relationship: 56 Lr = max (Le,L.) (5.7) Furthermore, we are very concerned about the power consumption problem in this wireless sensor network. We can find another codeword length Lp merely according to the power saving consideration if the number of source symbols q is known. Finally we are looking forward to seeing the following result: (5.8) Lr > Lm > L, Figure 5.2 presents the possible optimal codeword position. After the upper and lower limits are determined, we have to evaluate saving more power or increasing more transmission rate, which one is more beneficial in the practical communication. Once how much augmented power or rate the optimal is verified the optimal codeword position can be easily located. Lm Lr Save Power LMincrease Y LP Lopt Trade-off ? Figure 5.2 Trade-off Problem of Choosing The Optimal Codeword Length 5.3 Updating Algorithm of Seeking the Optimal Codeword Length Since power consumption in the system is the most important issue, we can start with the ME coding part to find an average codeword length. For simplicity, we here assume all source symbols are equally probable. Then each symbol is performed by unuly coding which means the longest codeword length is adopted and each codeword has at most one high bit. The codeword length by this coding method is denoted as Lp. Then we can calculate the average of power coefficient a. The next step is to try to calculate SNRME by using Eq. (4.10) if we plug in the first initial guess of E/No. We have mentioned in the preceding section that the maximum allowable error probability 57 (per bit or codeword) should be provided by the system designer. We are able to examine the error probability obtained from (4.15) or (5.3) once SNRME is available. If the error probability were not satisfactory, we would keep increasing E/No until it meets the requirement. Afterwards, the signal power can be acquired from the final value of Eb/No. The following phase is to find the upper limit of a codeword. Assume the minimum required transmission rate Ymnin has the unit of bit per second and the required time to transmission one symbol treq is given, then the maximum codeword length Lr on the basis of Ymin and treq is capable of being expressed as Lr = V , )mrq (5.9) where [x] is the smallest integer not less than x. The upper limit value can be determined as follows Lma = min(Lr, Li) (5.10) The final step we have to do is to check whether Lm, is greater than L, or not. If Lp exceeds Lm., which means the error probability and transmission rate could not be attained, we have to abridge Lp and go back to rerun all the previous steps until you can find an appropriate Lp making the following parameter relationship valid: L. (5.11l) > L,, > L* Where L*, is the final updated value of L4 and Lm is the candidate codeword length for ME coding. As for the optimal value of Lm, we suggest to use the following equation to compute it instead of another better solution we can come up with at present LOP,= L max + AL* 2p (5.12) (.2 where X, and X2 are constants which satisfy kl+X 2 = 1. If we are more concerned about the power consumption, for instance, we can let k2 procedures of seeking Lopt are presented in Figure 5.3. 58 be greater than X1. The entire flow Output E orpA Yrnin - mm req Yes No C.4L No-' R L 9MF -- ngNo- Chec~k Lm > Find Yes ,, > L, ' - adjust Figure 5.3 Updating Procedures of Seeking an Optimal Codeword Length 5.4 Circuit Design of ME Coding Transmitters The most important issue for the circuit of a ME transmitter is how to turn off the power of the oscillator while the low bits are transmitting. Figure 5.4.1 shows the basic architecture of the special transmitter. Basically it contains a spreading code generator which is based on the coming ME data to generate the PN sequence for each different data source, a BPSK modulator, filters, oscillator of generating the carrier frequency, power amplifier, a analog switch and a power switch. The power switch as shown in Figure 5.4.2 is used to turn off the power of the oscillator as low bits come in. We adopted some CMOS transistors because of high-speed response considerations. Moreover, we need an analogy switch to avoid the noise or distortional signals flowing out from the modulator from entering the following power amplifier and antenna circuit. 59 Antenna BPSK Minimam Energy AL Switch (1) DC 4- Switch (2) Jim-t Spreading Co de Generator Figure 5.4.1 Basic Architecture of a ME Coding Transmitter 60 Filter Amplifier R2 RI +V. Figure 5.4.2 Circuit Design of Analog Switch (1) /RN +Vcc R2 I 01 Figure 5.4.2 Circuit Design of Power Switch (2) 61 Chapter 6 Conclusion In the previous descriptions, we comprehend how an energy efficient DS-CDMA communication system can greatly reduce the multiple access interference. There are two important findings in this research. First, the system capacity can be largely increased because of the MAI reduction. Second, it will be capable of saving lots of power and improving the system performances, i.e. SNR and error probability, at the same time. Besides, we can develop a time-division based ME coding for signal transmission and design a new correlation receiver to further reduce and suppress the MAI. In other words, MAI reduction and suppression in the energy-efficient DS-CDMA system can be achieved by an upstream coding technique and a downstream processing signal recovery, as shown in Figure 6.1. Upstream Optimal Codeword Length -------------------------------- ---------------------------------------- Downstream Figure 6.1 MAI Reduction and Suppression : Upstream and Downstream Strategies 62 The performances of an energy-efficient DS-CDMA communication are much better than those of a traditional DS-CDMA communication because of the extension of the codeword length. The simulation and experimental results both verify that SNR and error probability are largely increased and reduced, respectively. Nonetheless, in order to acquire a good transmission quality, the ME codeword length cannot be extended arbitrarily since the error probability will increase with it. An optimal codeword length can be found if the system requirements are given such as, SNR, bit error probability and transmission rate, etc. Once we can make a good trade-off based on the system needs, the optimal codeword length can be determined by the proposed updating algorithm described in Section 5.3. In the future research work, we would like to figure out how to design a good correlation receiver that can further suppress the received noise and solve the synchronization problem. In summary, we investigated the problem of suppressing MAI in energy efficient DS-CDMA sensor network in this thesis. We can learn there are three important findings in this research. First, the MAI problem is not so significant in the energy-efficient DSCDMA communication system if compared to a regular DS-CDMA communication system. Second, although SNR for energy efficient spreading codes becomes a little bit worse, we still can compensate this loss by MAI suppression and largely reduce the error probability; of course, we are able to achieve the objective of saving a lot of power as well. Third, the error probability almost does not alter if using energy efficient Spreading codes. 63 References [1] Y.C. Yoon, R. Kohno and H. Imai, "Spread-spectrum multi-access system with co-channel interference cancellation for multipath fading channel," IEEE J Selected Areas Communication, Vol. 11, No.7, pp. 1067-1075, Sep. 1993. [2] S. Verdu, "Minimum probability of error for asynchronous Gaussian multiple-access channels," IEEE Trans. Inform. Theory, Vol. IT-32, pp. 85-86, Jan. 1986 [3] R. Lupas and S. Verdu, "Near-far resistance of multiuser detectors in asynchrous channels," IEEE Trans. Commun., vol. 38, pp. 496-508, Apr. 1990. [4] M. K. Varanasi and B. Aazhang, "Multistage detection in asynchronous code-division multiple-access systems," IEEE Trans. Commun., vol. 39, pp. 725-736, May 1991. [5] C. Erin and H. H. Asada, "Energy optimal codes for wireless communications," Proc. of the [6] 3 8 'h IEEE Conference on Decision and Control, Vol. 5, pp. 4446-4453, 1999. C. Erin, H. H. Asada and K.-Y. Siu, "Minimum energy coding for RF Transmission, IEEE WCNC, Vol. 2, pp. 621-625, 1999. [7] T. S. Rappaport, Wireless Communication: Principlesand Practices,Prentice Hall, 1996. [8] M. Zorzi and R. R. Rao, "Energy-Constrainted Error Control for Wireless Channels," IEEE PersonalCommunications, 4(6): 27-33, Dec 1997. [9] N. Babos. Toward, Communications: "Power-Sensitive Concepts, Issues, Network and Design Architectures Aspects," in Wireless IEEE Personal Communications,5(3):50-59, June 1998. [10] E. Biglieri, G. Caire, and G. Taricco, "Coding and Modulation under Power Constraints," IEEE PersonalCommunications, 5(3):32-39, June 1998. [11] E. Ayanoglu, S. Paul, T. F. LaPorta, K. K. Sabnani, and R. D. Gitlin, "AIRMAIL: A Link-layer Protocol for Wireless Networks," Wireless Networks, 1(1):47-60, 1995. [12] J. M. Rulnick and N. Bambos, "Mobile Power Management Communication Networks," Wireless Networks, 3(1):3-14, 1997. 64 for Wireless [13] P. Lettieri, C. Fragouli, and M. B. Srivastava, "Low Power Error Control for Wireless Link," In MobiCom 1997. Proceedings of the third Annual ACM/IEEE International Conference on Mobile Computing and Neworking, pages 139-150, 1997. [14] P. Agrawal, B. Narebdran, J. Sienicki, and S. Yajnik, "An Adaptive Power Control and Coding Scheme for Mobile Radio Systems," In Proceedings of the 1996 IEEE InternationalConference on Personal Wireless Communications, pages 283-288. IEEE, Feb 19-21 1996. [15] B.-H. Yang, S. Rhee, and H. H. Asada, "A Twenty-four Hour Tele-nursing System using a Ring Sensor," In Proceedings of the 1998 IEEE InternationalConference on Robotics andAutomation, Vol. 1, pages 387-392. IEEE, 1998. [16] J.R. Smith, Modern Communication Circuits,McGraw-Hill, 1998. [17] R. L. Peterson, R. E. Ziemer and D. E. Borth, "Introduction to spread spectrum communications", Prentice Hall, 1995. [18] R. C. Dixon, "Spread Spectrum Systems", second edition, John Wiley & Sons, New York, 1984. [19] R. J. Serfling, "Approximation Theorems of Mathematical Statistics", New York, Wiley, 1980. [20] K. Yao, "Error probability of asynchronous spread spectrum multiple access communication systems, " IEEE Trans. Commun., Vol. COM-25, pp. 803-809, Aug. 1977. [21] K. B. Letaief, "Efficient Evaluation of the Error Probabilities of Spread-Spectrum Multiple-Access Communications, " IEEE Trans. Commun., Vol. 45, pp.239-246, Feb. 1997. [22] R. J. Serfling, Approximation Theorem of Mathematical Statistics, New York, Wiley, 1980. [23] M. B. Pursley, "Performance Evaluation of Phase-Coded Spread Spectrum Multiple-Access Communication," IEEE Trans. Commun., Vol. COM-25, pp.800803, Aug. 1977. 65 Appendix A.1 Proof of (3.15) d P1 2 r = -d 2dt+r (d'))2dt+...+ (d'))2dtl= LV'LII, 2T , -L . dt Td f( -.- P a, PT 2 if a]= Lb where T = LTb and Lb is the number of ones in T seconds. A.2 Proof of (3.16) - Cos wj dt n(t)- c,(t)- Ng = . n(t )c, (t, )coso t1 dt, No 6(t, -t2 Jn(t 2 )c(t 2 )cos t 2 dt2 ) dt dh 2 NOTb 4 I f(Ng )2dt-N~ 2 k T f' k=2 V2 dt I I(k) T [fb' (.)2dt + LTb k=2 Pn, T f'(Ng )2dt + f Ik k2 2 fl, LLT 2 k Pka 2 I L7 T 2LTh h + f'4 dt ( 1 ())2 (.)2d, =4 aP dt Z2 k=2 21',, k \ I' T k 2' ) dt] 2 1 )(- (k Af FLk I k=2 A.3 Proof of (3.18) 66 N+ 4 M k=2 akPk 2 2 2 dt 0 0 I-T d(')c(l) f r2 Pd2 ,9; AT2L -fb ()2dt + Tf2d')dt= 2 L T fib (-)2dt + f (.)2dt] 2 T 2 b 2LTb f' T 2d(')4')dt 0C T S2 A.4 Proof of (3.19) n(t, )n(t 2 )c (t N n2 2(Ca)(c sa)2(t -t2)dt Idt2 n2(t)dt =fIN, =Q 2 Te 4 d= 4 f(Ng )2dt =N~ Then I Mk T k2F2 =n IAN =JN 0 T 4 ,N 2 I 2 )c (t 2 )cos eOtO coswt t I dt2 2 (k) dt = Af kI dt= akfikPk k=2 +' $ dk fk Ik Ma dt = T 2 2 [ k Uh N dt + k y k=2 F2 -) 2 dt 2 k=2 A.5 Proof of (3.22) 2 )2 (c(1) d3 T r2 =1Lj20c6 +y Lb + dt - d(l) 0 0 c 1 )T,2d()di 2T T dl)( c1 ITb2 2L 8 +y)TFd(I)dt+ fd(')dt 0L, b 11 L 2 A.6 Proof of (3.23) 67 )2dt d(')dt] . 2 = fh f n(t 1 )n(t 2)c,(t 1)c1 (t 2 )cos cot, cos Cot fb (, + y) 2 (t )(cos C&)2S =b + t 2)dt - 2 dt dh 2 dt 2 n(t)dt = il + r, )NO T 2 and T fI k=2F 2 Adt=k ~~~~2~= + k~( M +f I - (N4gy)N (+ r 0I+~ck dt I k=2 ~ j ,d) (1k I (8k = d 2dt 2d2 Ik)ak )NO T 68 + 2i~~ 2 2 Oh1()