Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Pulse Interval Modulation for Ultra-High Speed IR-UWB Communications Systems

Pulse Interval Modulation for Ultra-High Speed IR-UWB Communications Systems Pulse Interval Modulation for Ultra-High Speed IR-UWB Communications Systems //// Hindawi Publishing Corporation Home Journals About Us About this Journal Submit a Manuscript Table of Contents Journal Menu Abstracting and Indexing Aims and Scope Article Processing Charges Articles in Press Author Guidelines Best Paper Awards Bibliographic Information Contact Information Editorial Board Editorial Workflow Free eTOC Alerts Reviewers Acknowledgment Subscription Information Open Special Issues Published Special Issues Special Issue Guidelines Abstract Full-Text PDF Full-Text HTML Linked References How to Cite this Article EURASIP Journal on Advances in Signal Processing Volume 2010 (2010), Article ID 658451, 8 pages doi:10.1155/2010/658451 Research Article <h2>Pulse Interval Modulation for Ultra-High Speed IR-UWB Communications Systems</h2> Marijan Herceg , Tomislav Švedek , and Tomislav Matić Department of Communication, Faculty of Electrical Engineering, J.J.Strossmayer University of Osijek, Kneza Trpimira 2b, 31000 Osijek, Croatia Received 16 February 2010; Revised 6 May 2010; Accepted 21 July 2010 Academic Editor: Jacques Palicot Copyright © 2010 Marijan Herceg et al. This is an open access article distributed under the Creative Commons Attribution License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract This paper analyzes performances of the Pulse Interval Modulation (PIM) scheme for impulse radio ultra-wideband (IR-UWB) communication systems. Due to the PIM anisochronous nature, a tap delay line (TDL) coded division multiple access (CDMA) scheme based on strict optical orthogonal codes (SOOC) is proposed. This scheme is suitable for multiuser high-speed data asynchronous transmission applications because the average symbol length is shorter than in Pulse Position Modulation (PPM) schemes and it needs only chip synchronization. The error probability over the additive white Gaussian noise (AWGN) channel is derived in the single- and multi-user environment and compared with other modulation schemes. 1. Introduction Trends in modern communication systems place high demands on low power consumption, high-speed transmission, and anti-interference characteristics. Therefore, impulse radio ultra-wideband (IR-UWB) [ 1 ] systems have recently gained increased popularity. Since IR-UWB symbols are transmitted by short pulses ( < 2 ns), energy has spread over the frequency bands of up to 10 GHz. These pulses have to follow strict regulations concerning power and spectrum restrictions defined by local authorities, like the Federal Communications Commission (FCC) [ 2 ] in the USA. Because of power and spectral properties of the transmitted IR-UWB pulses, different types of orthogonal pulse shapes are used to provide a higher spectral efficiency [ 3 , 4 ]. Derivation of the Gaussian pulse and modified Hermite pulses (MHPs), usually called Hermites [ 5 ], provides a wide range of various pulse combinations for IR-UWB transmission and for that reason they are most commonly used as pulse shapes. The state of art in IR-UWB systems is presented by many applicable modulation techniques like Pulse Amplitude Modulation (PAM), PPM, Pulse Shape Modulation (PSM), on-off-keying (OOK), and biphase modulation (BPM). A combination of the exposed modulation techniques (hybrid techniques) can provide system improvements in terms of the error probability, a higher data rate, a less complex receiver, or less power consumption. Many hybrid techniques for IR-UWB communication systems have been applied recently, such as Pulse Position Amplitude Modulation (PPAM) [ 6 ], Biorthogonal Pulse Position Modulation (BPPM) [ 7 ], OOK-PSM [ 8 ], PPM-PSM [ 9 ], and hybrid Shape-Amplitude Modulation [ 10 , 11 ]. Regarding pulse amplitudes, positions, and shapes, three types of modulations can be distinguished. In PAM and OOK modulation information is contained in the amplitude of the signal, PPM uses the position of the pulse to convey information, whereas in PSM, information is conveyed in the shape of the pulse. PIM was first introduced in [ 12 ] for wireless optical communication systems. It is interesting because it displays a higher transmission capacity by eliminating unused time chips within each symbol and does not require both chip and symbol synchronization, but only chip synchronization, since each symbol is initiated with a pulse. Different anisochronous and synchronous pulse time modulation (PTM) techniques for optical short-range wireless communications are compared in [ 13 ]. This paper is organized as follows. Section 2 describes basic properties of the PIM scheme. In Section 3 , the proposed system model is described, while in Section 4 error performance analysis is made over the AWGN channel. Section 5 gives simulation results while some conclusions are given in Section 6 . 2. PIM Scheme Basics PIM is part of anisochronous PTM techniques. The main characteristic of anisochronous schemes is that they do not have a fixed symbol structure, which means that the symbol length varies and is determined by the information content of the symbol. In PPM, each symbol has a fixed length and the chips following the pulse are redundant, while in PIM that redundancy is removed. A PIM symbol which encodes 𝑀 = l o g 2 𝐿 input bits, where 𝐿 is the number of symbols, is represented by a constant power pulse in the “ON” chip followed by the ( 𝐿 − 1 ) “OFF” chips. In order to avoid symbols in which the time between adjacent pulses is zero, an additional guard chip may also be added to each symbol immediately following the pulse. Table 1 shows the transformation of the source bit sequence into PPM chip sequences and PIM chip sequences with the guard zero chip. Table 1: Mappings between source bits and transmitted chips for 4-PPM and 4-PIM (Example). The overall transmitted signal in the single-user case can be defined as  𝑠 ( 𝑡 ) = ∞ 𝑚 = 0  𝐸 𝑔 𝑝  𝑡 − 𝑇 𝑐   2 𝑚 + 𝑚 − 1 𝑙 = − ∞ 𝑆 𝑙   , ( 1 ) where 𝐸 𝑔 is energy of the pulse, 𝑇 𝑐 is chip duration, 𝑝 ( 𝑡 ) is the pulse shape function (unit energy Gaussian monocycle with duration 𝑇 𝑐 ), and 𝑆 𝑙 is a random data sequence representing PIM coded data. If the maximum PIM symbol duration is limited to the PPM symbol duration, then the average symbol length of PIM with the guard zero chip is 𝐿 a v g = ( 𝐿 + 3 ) / 2 . The achievable data rates for PIM and PPM are then 𝑅 𝑏 - P I M = l o g 2 𝐿 𝐿 a v g 𝑇 𝑐 , 𝑅 ( 2 ) 𝑏 - P P M = l o g 2 𝐿 𝐿 𝑇 𝑐 , ( 3 ) respectively. From ( 2 ) and ( 3 ), it can be clearly seen that the PIM bit rate is higher than PPM bit rate, due to the shorter average symbol length 𝐿 a v g . On the other hand, due to the shorter symbol length, PIM encoded data sequence has the higher average power than the data sequence encoded by using PPM. The average power per symbol for PIM and PPM is given as P o w P I M = 1 𝐿 a v g 𝑇 𝑐  ∞ − ∞ 𝑝 2 ( 𝑡 ) 𝑑 𝑡 , P o w P P M = 1 𝐿 𝑇 𝑐  ∞ − ∞ 𝑝 2 ( 𝑡 ) 𝑑 𝑡 , ( 4 ) respectively. The dependence of the symbol length and the average power ratio ( P o w P I M / P o w P P M ) on the number of bits per symbol is shown in Figure 1 . Figure 1: Dependence of symbol duration ( 𝐿 a v g ) and average power ratio ( P o w P I M / P o w P P M ) on the number of bits per symbol. Figure 2 shows an example of PPM and PIM symbols for the sequence of source bit combinations 01 and 10. Figure 2: PPM and PIM symbol structure for the sequence of source bit combinations 01 and 10. 3. The Proposed System Model In this section, the performance of PIM in a multi-user environment is derived for IR-UWB communication systems. Due to the PIM anisochronous nature, CDMA based on the TDL is proposed in [ 14 ]. This scheme is suitable for IR-UWB systems because it needs only chip synchronization, while the time-hopping systems proposed in [ 6 – 11 ] need both frame and chip synchronization which increase hardware complexity. Figure 3 shows a TDL-based transmitter and receiver. Figure 3: Proposed (a) transmitter and (b) receiver. At the transmitter input, a serial data stream is transformed into a parallel M -bit data sequence and then loaded in the latch. Simultaneously with loading, the counter is reset and it starts to count with chip clock frequency. The outputs of the counter and latch are compared, and when outputs match, the comparator goes high which implies starting of the new symbol generation. Then, the new M -bit data sequence is loaded into the latch and the counter is reset/started. The comparator drives the pulse generator which generates a Gaussian monocycle when its input goes high and extra ( 𝑛 − 1 ) redundant empty chips are added. After that, the PIM sequence is fed into the TDL encoder. TDL consists of w parallel tap-delay elements, where each element delay is determined by the codeword of the signature sequence. The signature sequence is obtained using an SOOC [ 15 ] defined by ( 𝑛 , 𝑤 , 𝜆 𝑎 , 𝜆 𝑐 ), where 𝑛 is code length, 𝑤 is code weight, and 𝜆 𝑎 and 𝜆 𝑐 are unity auto- and cross-correlation constraints, respectively. The overall transmitted signal of the 𝑘 th user is given as follows: 𝑠 ( 𝑘 )  ( 𝑡 ) = ∞ 𝑚 = 0  𝑤 𝑗 = 1  𝐸 𝑔 𝑝  𝑡 − 𝑐 𝑗 ( 𝑘 ) 𝑇 𝑐 −   𝑛 𝑚 + 𝑚 − 1 𝑙 = − 1 𝑆 𝑙 ( 𝑘 )  𝑇 𝑐  , ( 5 ) where 𝑐 𝑗 ( 𝑘 ) is an element of the SOOC codeword and 𝑆 𝑙 ( 𝑘 ) is the k th user data sequence representing data coded into PIM. Due to the added redundant chips, the overall achievable data rate is decreased, and from ( 2 ) it can be written as follows: 𝑅 𝑏 - P I M = l o g 2 𝐿  𝑛 + 𝐿 a v g  𝑇 𝑐 . ( 6 ) If AWGN is the only source of interference in the channel, the signal received in the multi-user environment is given as follows:  𝑟 ( 𝑡 ) = 𝑁 𝑢 𝑘 = 1 𝑠 ( 𝑘 )  𝑡 − 𝜏 ( 𝑘 )  + 𝑛 ( 𝑡 ) , ( 7 ) where 𝑁 𝑢 is the number of users, 𝜏 ( 𝑘 ) is time delay of the k th user (assumed to be the integer multiple of 𝑇 𝑐 ), and 𝑛 ( 𝑡 ) is an AWGN component with zero mean and variance 𝑁 0 /2. At the input of the receiver, 𝑟 ( 𝑡 ) is passed through the TDL decoder, where by tuning the delay elements a higher amplitude pulse can be formed by each of the pulses in the signature sequences. The decoded signal is then fed into the correlator-based matched filter which multiplies the signal by the template waveform. The decision which chip is empty and which chip contains a pulse is made on the basis of autocorrelation properties of the Gaussian monocycle at the threshold detector. At the output of the threshold detector, the transmitted PIM data encoded stream is estimated by removing redundant ( 𝑛 − 1 ) chips. The pulse at the start of the PIM symbol is then used to load the output of the counter in the latches and to reset the counter. If we assume that the first user is the desired user, then the decoded signal at the input of the matched filter (after the TDL decoder) is given as follows: 𝑟 T D L ( 𝑡 ) = 𝑆 ( 1 ) + 𝐼 S E L F + 𝐼 M U I + 𝑁 , ( 8 ) where 𝑆 ( 1 ) , 𝐼 S E L F , 𝐼 M U I , and N are the desired PIM sequence, self-interference, interference due to the multi-user interference (MUI), and AWGN interference, respectively, given as follows: 𝑆 ( 1 ) =  ∞ 𝑚 = 0 𝑤  𝐸 𝑔 𝑝 ×  𝑡 − ( 𝑛 − 1 ) 𝑇 𝑐 −   𝑛 𝑚 + 𝑚 − 1 𝑙 = − 1 𝑆 𝑙 ( 1 )  𝑇 𝑐 − 𝜏 ( 1 )  , 𝐼 S E L F =  ∞ 𝑚 = 0  𝑤 𝑤 𝑗 = 1  𝐽 = 1 𝐽 ≠ 𝑗 ×  𝐸 𝑔 𝑝  𝑡 − 𝑐 𝐽 ( 1 ) 𝑇 𝑐 −  𝑛 − 1 − 𝑐 𝑗 ( 1 )  𝑇 𝑐 −   𝑛 𝑚 + 𝑚 − 1 𝑙 = − 1 𝑆 𝑙 ( 1 )  𝑇 𝑐 − 𝜏 ( 1 )  , 𝐼 M U I =  ∞ 𝑚 = 0  𝑤 𝑗 = 1  𝑤 𝑗 ′ = 1  𝑁 𝑢 − 1 𝑘 = 1 ×  𝐸 𝑔 𝑝  𝑡 − 𝑐 𝑗 ( 𝑘 ) ′ 𝑇 𝑐 −  𝑛 − 1 − 𝑐 𝑗 ( 1 )  𝑇 𝑐 −   𝑛 𝑚 + 𝑚 − 1 𝑙 = − 1 𝑆 𝑙 ( 𝑘 )  𝑇 𝑐 − 𝜏 ( 𝑘 )  ,  𝑁 = 𝑤 𝑗 = 1 𝑛 ( 𝑡 ) . ( 9 ) Figure 4 shows an example of the PIM symbol with the (7, 3, 1, 1) SOOC signature sequence. Figure 4: PIM symbol (a) before the TDL encoder, (b) after the TDL encoder, (c) after the TDL decoder. 4. Error Performance Analysis In order to derive the error probability, some simplification has been assumed. (a) Channel model is an AWGN channel (no multipath components). (b) MUI is approximated as a Gaussian random variable. (c) There is a perfect synchronization and power control between the transmitter and the receiver. In order to recover the desired signal, at the input of the correlator-based matched filter (MF) the received signal is multiplied by the template signal 𝑝 ( 𝑡 ) and then integrated over the chip time 𝑇 𝑐 and a decision is made upon auto-correlation properties given as follows:  𝜌 ( Δ 𝑡 ) = 𝑇 𝑐 0 𝑝 ( 𝑡 ) 𝑝 ( 𝑡 − Δ 𝑡 ) 𝑑 𝑡 . ( 1 0 ) Note that  | | 𝑇 𝜌 ( Δ 𝑡 ) = 1 , Δ 𝑡 = 0 , 0 , Δ 𝑡 ≥ 𝑐 | | . ( 1 1 ) The decision whether a pulse occurs in the current chip is made according to the threshold level 𝑣 𝑡 ℎ √ 𝐸 𝑔 at the detector. When the pulse is detected, the data is recovered by removing redundant ( 𝑛 − 1 ) chips (due to the SOOC-CDMA) and counting empty chips employing the PIM demodulator. The error can occur in two ways. First, if the correct pulse is not detected, it would merge the previous and the current symbol. Second, if the false pulse is detected within empty 𝑆 𝑙 ( 1 ) chips, it would divide the current and the next symbol. In order to obtain the error probability, we will first derive the probability that a correct pulse is not detected. From Figure 4 , it can be seen that self-interference 𝐼 S E L F does not affect the chip where a correct pulse occurs, so the only interference is due to the MUI and AWGN. The decision variable for the chip where the pulse occurs in the 𝑚 th symbol is 𝑦 𝑐  = 𝑤 𝐸 𝑔 𝜌 ( 0 ) + 𝐼 M U I _ 𝑚 + 𝑁 , ( 1 2 ) where N is the AWGN interference, that is, a Gaussian random variable with zero mean and variance 𝑤 𝑁 0 /2 and 𝐼 M U I _ 𝑚 is the MUI in the m th symbol given as 𝐼 M U I _ 𝑚 =  𝑤 𝑗 = 1  𝑤 𝑗 ′ = 1  𝑁 𝑢 − 1 𝑘 = 1  𝐸 𝑔 𝜌  𝛿 M U I  . ( 1 3 ) From [ 16 ] it can be seen that the probability that one pulse occurs in a single chip due to the MUI has a binomial distribution, so 𝛿 M U I can be modeled as a binomial random variable which can be either zero (meaning that the MUI pulse occurs in the current chip) or ≥ | 𝑇 𝑐 | (means that the MUI pulse does not occur in the current chip) with probabilities 𝑃 M U I and ( 1 − 𝑃 M U I ), respectively. The probability of one pulse interference due to the MUI is given from [ 16 ] as follows: 𝑃 M U I = 2 2 𝑛 + 2 𝑀 − 1 , ( 1 4 ) where code length 𝑛 = 𝑁 𝑢 𝑤 ( 𝑤 − 1 ) and M is the number of bits per symbol. Probability density function (PDF) of 𝛿 M U I is P D F M U I  ( 𝑥 ) = 1 − 𝑃 M U I  𝛿 ( 𝑥 ) + 𝑃 M U I 𝛿 ( 𝑥 − 1 ) . ( 1 5 ) By using the central limit theorem, 𝐼 M U I _ 𝑚 can be modeled as a Gaussian random variable with mean 𝐸  𝐼 M U I _ 𝑚  =  𝑤 𝑗 = 1  𝑤 𝑗 ′ = 1  𝑁 𝑢 − 1 𝑘 = 1 𝐸   𝐸 𝑔 𝜌  𝛿 M U I   =  𝑁 𝑢  𝑤 − 1 2  𝐸 𝑔 𝑃 M U I , ( 1 6 ) where 𝐸 [ ∗ ] is the mean value operator. Variance of 𝐼 M U I _ 𝑚 is  𝐼 V a r M U I _ 𝑚   𝐼 = 𝐸 2 M U I _ 𝑚   𝐼 − 𝐸 M U I _ 𝑚  2 =  𝑤 𝑗 = 1  𝑤 𝑗 ′ = 1  𝑁 𝑢 − 1 𝑘 = 1 𝐸    𝐸 𝑔 𝜌  𝛿 M U I   2  −  𝑤 𝑗 = 1  𝑤 𝑗 ′ = 1  𝑁 𝑢 − 1 𝑘 = 1 𝐸   𝐸 𝑔 𝜌 ( 𝛿 M U I )  2 =  𝑁 𝑢  𝑤 − 1 2 𝐸 𝑔 𝑃 M U I  1 − 𝑃 M U I  . ( 1 7 ) The decision variable 𝑦 𝑐 can then be modeled as a Gaussian random variable with mean 𝑤 √ 𝐸 𝑔 + 𝐸 [ 𝐼 M U I _ 𝑚 ] and variance V a r [ 𝐼 M U I _ 𝑚 ] + 𝑤 𝑁 0 / 2 . If 𝑃 𝑝 denotes the probability of an error decision whether or not the pulse is detected in the current chip, then the probability that the correct pulse will not be detected is from [ 17 ] the probability equal to 𝑃 ( 𝑦 𝑐 < 𝑣 𝑡 ℎ √ 𝐸 𝑔 ) or 𝑃 𝑝 ⎛ ⎜ ⎜ ⎝    ⎷ = 𝑄   𝑁 𝑤 + 𝑢  𝑤 − 1 2 𝑃 M U I − 𝑣 𝑡 ℎ  2 𝐸 𝑔   𝐼 V a r M U I _ 𝑚  + 𝑤 𝑁 0  ⎞ ⎟ ⎟ ⎠ / 2 , ( 1 8 ) where Q -function is defined as follows: 1 𝑄 ( 𝑥 ) = √  2 𝜋 ∞ 𝑥 𝑒 − 𝑡 2 / 2 𝑑 𝑡 , 𝑥 ≥ 0 . ( 1 9 ) The second way that an error can occur is the probability that a false pulse is detected within an empty chip. The decision variable for the chip where the pulse does not occur in the m th symbol is 𝑦 𝑐 = 𝐼 S E L F _ 𝑚 + 𝐼 M U I _ 𝑚 + 𝑁 , ( 2 0 ) where 𝐼 S E L F _ 𝑚 is self-interference due to ( 𝑤 − 1 ) uncorrelated pulses at the end of the TDL decoder in the m th symbol. The probability of one pulse interference in a single chip due to self-interference also has a binomial distribution and it is given from [ 16 ] as follows: 𝑃 S E L F = 2 2 𝑛 + 2 𝑀 − 3 . ( 2 1 ) Using the same procedure for modeling 𝐼 M U I _ 𝑚 , 𝐼 S E L F _ 𝑚 can be modeled as a Gaussian random variable with mean 𝐸  𝐼 S E L F _ 𝑚   = 𝑤 ( 𝑤 − 1 ) 𝐸 𝑔 𝑃 S E L F ( 2 2 ) and variance  𝐼 V a r S E L F _ 𝑚  = 𝑤 ( 𝑤 − 1 ) 𝐸 𝑔 𝑃 S E L F  1 − 𝑃 S E L F  . ( 2 3 ) The decision variable 𝑦 𝑐 can then be modeled as a Gaussian random variable with mean 𝐸 [ 𝐼 M U I _ 𝑚 ] + 𝐸 [ 𝐼 S E L F _ 𝑚 ] and variance V a r [ 𝐼 S E L F _ 𝑚 ] + V a r [ 𝐼 M U I _ 𝑚 ] + 𝑤 𝑁 0 / 2 . If 𝑃 𝑧 denotes the probability whether or not a pulse is detected in a wrong chip, then the probability that a wrong pulse will be detected is from [ 17 ] the probability equal to P ( 𝑦 𝑐 > 𝑣 𝑡 ℎ √ 𝐸 𝑔 ) or 𝑃 𝑧 ⎛ ⎜ ⎜ ⎝    ⎷ = 𝑄  𝑣 𝑡 ℎ −  𝑤 ( 𝑤 − 1 ) 𝑃 S E L F +  𝑁 𝑢  𝑤 − 1 2 𝑃 M U I   2 𝐸 𝑔   𝐼 V a r S E L F _ 𝑚   𝐼 + V a r M U I _ 𝑚  + 𝑤 𝑁 0  ⎞ ⎟ ⎟ ⎠ / 2 . ( 2 4 ) In order to compare the performance of PIM with other modulation techniques, a packet error rate (PER) is introduced [ 18 ]. A packet error occurs if one or more symbols within a packet are erroneous. If the packet containing B data bits is considered, then the number of symbols and hence the number of transmitted pulses in a packet is B / M . Assuming that there is no guard slot in the symbol, the average number of empty slots per packet is 𝐵 ( 2 𝑀 − 1 ) /(2 M ) . Therefore, the probability of the packet error is given by 𝑃 P E  = 1 − 1 − 𝑃 𝑝  𝐵 / 𝑀  1 − 𝑃 𝑧  𝐵 ( 2 𝑀 − 1 ) / ( 2 𝑀 ) . ( 2 5 ) With ( 18 ), ( 24 ), and ( 25 ) the error probability is given as the function of energy per symbol, but in digital communication systems energy per bit ( 𝐸 𝑏 ) is a natural figure of merit, so by replacing 𝐸 𝑔 = 𝑀 𝐸 𝑏 , we can obtain PER as a function of 𝐸 𝑏 / 𝑁 0 . If we want to compare PER performance as the function of average signal power to the average noise power ratio (SNR), the following equation holds [ 19 ]: 𝐸 𝑏 𝑁 0 𝑊 = S N R 𝑅 𝑏 , ( 2 6 ) where 𝑊 = 1 / 𝑇 𝑐 is the channel bandwidth and 𝑅 𝑏 is the bit rate defined in ( 2 ), ( 3 ). 5. Simulation Results The error probability given by ( 18 ), ( 24 ), and ( 25 ) is compared with Monte Carlo simulation [ 20 ] in Figure 5 for three different PIMs and the packet length B = 128. It can be seen that the derived error probability matches simulation results for 4-PIM and 8-PIM, while for 2-PIM there is a slight difference for large 𝐸 𝑏 / 𝑁 0 . Figure 5: Comparison of PER performance between Monte Carlo simulation and the derived error probability for 𝐵 = 1 2 8 . In order to compare PIM with PPM and PAM, packet length is chosen to be B = 512 bits, w = 1, and 𝑣 𝑡 ℎ = 0 . 5 . PER performance of PIM is obtained using ( 18 ), ( 24 ), ( 25 ) and the results are shown in Figure 6 . In the simulation, the number of modulation levels is L = 2, 4, 8. In the case of L = 2, PIM has a 6 dB and 3 dB worse performance than 2-PAM and 2-PPM, respectively. With the increase of the modulation level to L = 4, PIM has a 0.8 dB better performance than 4-PAM and 3 dB worse than 4-PPM, while for L = 8 PIM performance is 7 dB better than 8-PAM and 3 dB worse than 8-PPM. Generally, it can be seen that if the modulation level increases, PIM and PPM performance increases while PAM decreases significantly. Figure 6: PER performance comparison of PAM, PPM, and PIM for the same bit energy. To compare PIM with PPM for the same average power per symbol, equations ( 18 ), ( 24 ), ( 25 ) and ( 26 ) are used. Packet length is chosen to be B = 512 bits, w = 1 and 𝑣 𝑡 ℎ = 0 . 5 . Results are shown in Figure 7 . In the simulation the number of modulation levels is L = 2, 4, 8. In the case of L = 2, PIM has a 4 dB lower PER than 2-PPM. With the increase of the modulation level to L = 4, 8 PIM performance decreases compared with PPM. Figure 7: PER performance comparison of PPM and PIM for the same average power per symbol. Figure 8 shows the influence of the threshold level 𝑣 𝑡 ℎ on the PER performance for 8-PIM when the code weight is w = 10. It can be seen that the optimal threshold is at 𝑣 𝑡 ℎ = 7 . It results from the fact that in an 8-PIM symbol there is only one chip where a pulse occurs and on average 4.5 empty chips, so the probability that a false pulse will be detected is higher than the probability that a correct pulse will not be detected. Figure 8: Influence of the 𝑣 𝑡 ℎ level on 8-PIM performance with code weight 𝑤 = 1 0 . Figure 9 shows the influence of the code weight w on PER performance for 8-PIM with 𝑣 𝑡 ℎ set to an optimal value. It can be seen that 8-PIM with w = 11 has a slightly better performance than 8-PIM with w = 10, and 2.3 dB better than 8-PIM with w = 9. Figure 9: Influence of code weight w on 8-PIM performance for the optimal 𝑣 𝑡 ℎ = 7 . Figure 10 shows the influence of the threshold level 𝑣 𝑡 ℎ on PER performance in the presence of the MUI for 8-PIM when the code weight is w = 10 and 𝐸 𝑏 / 𝑁 0 = 1 5 dB. It can be seen that for the optimal threshold 𝑣 𝑡 ℎ = 6 , the PER performance improves significantly. Figure 10: Influence of 𝑣 𝑡 ℎ on 8-PIM PER performance when the number of users increases, for 𝑤 = 1 0 and 𝐸 𝑏 / 𝑁 0 = 1 5 dB. Code weight w influence on 8-PIM in presence of the MUI for optimal 𝑣 𝑡 ℎ is analyzed and shown in Figure 11 . It can be seen that with an increase of code weight, PER is improved, which is a result of more correlated pulses at the receiver. This advantage is at the cost of the data rate shown from ( 6 ) in Figure 11 . Figure 11: Influence of the number of users on 8-PIM performance for optimal 𝑣 𝑡 ℎ and 𝐸 𝑏 / 𝑁 0 = 1 5 dB. Figure 12: Influence of the number of users on the bit rate for 8-PIM and 𝑇 𝑐 = 1 ns. 6. Conclusion This paper proposes an anisochronous PIM scheme for IR-UWB communication systems. The basic principles and characteristics of anisochronous PIM scheme are outlined. Unlike PPM, PIM requires no symbol synchronization, which results in a much simpler receiver structure (only one correlator). The proposed multiple access method based on SOOC-TDL-CDMA allows a totally asynchronous transmission and it needs only chip synchronization which significantly reduces hardware complexity, while classical time-hopping IR-UWB needs both frame and chip synchronization which increase hardware complexity. It is shown that an increase of code weight 𝑤 can decrease PER at the cost of hardware complexity (more delay elements at TDL) and the influence of 𝑣 𝑡 ℎ in both single- and multi-user environment is analyzed. The major disadvantage of anisochronous PIM techniques is that they have a variable symbol length, and hence the time required to transmit a data packet containing a fixed number of bits is not constant. Employing some form of a source coding scheme, packet length variation can be limited still maintaining the increase in information capacity over isochronous modulation techniques. Simpler receiver complexity and very high achievable bit-rates make PIM modulation very attractive for IR-UWB short-range communication systems. <h4>References</h4> R. A. Scholtz, “Multiple-access performance limits with time hopping modulation,” in Proceedings of the IEEE Military Communications Conference , pp. 11–14, October 1993. FCC, “Revision of part 15 of the commission’s rules regarding ultra-wideband transsmision systems,” Federal Communications Commission, ET Docket, pp. 98–153, 2002. Y. Kim, B. Jang, C. Shin, and B. F. Womack, “ Orthonormal pulses for high data rate communications in indoor UWB systems ,” IEEE Communications Letters , vol. 9, no. 5, pp. 405–407, 2005. J. A. N. da Silva and M. L. R. de Campos, “ Method for obtaining spectrally efficient orthogonal UWB pulse shapes ,” in Proceedings of the International Telecommunications Symposium (ITS '06) , pp. 46–51, Fortaleza-CE, Brazil, September 2006. M. Ghavami, L. B. Michael, and R. Kohno, Ultra Wideband Signals and Systems in Communication Engineering , John Wiley & Sons, New York, NY, USA, 2004. H. Zhang, W. Li, and T. A. Gulliver, “ Pulse position amplitude modulation for time-hopping multiple-access UWB communications ,” IEEE Transactions on Communications , vol. 53, no. 8, pp. 1269–1273, 2005. H. Zhang and T. A. Gulliver, “ Biorthogonal pulse position modulation for time-hopping multiple access UWB communications ,” IEEE Transactions on Wireless Communications , vol. 4, no. 3, pp. 1154–1162, 2005. S. Majhi and A. S. Madhukumar, “Combining OOK with PSM modulation for TH-UWB radio systems: a performance analysis,” EURASIP Journal on Wireless Communications and Networking , vol. 2008, 2008. C. J. Mitchell, G. T. F. de Abreu, and R. Kohno, “ Combined pulse shape and pulse position modulation for high data rate transmissions in ultra-wideband communications ,” International Journal of Wireless Information Networks , vol. 10, no. 4, pp. 167–178, 2003. M. Herceg, T. Matic, and T. Svedek, “Performances of hybrid amplitude shape modulation for UWB communications systems over AWGN channel in the single and multi-user environment,” Radioengineering Journal , vol. 18, no. 3, 2009. M. Herceg, T. Matic, and T. Svedek, “Performance of hybrid pulse shape amplitude modulation for UWB communications systems over multipath channels,” in Proceedings of the 9th International Conference on Telecommunication in Modern Satellite, Cable, and Broadcasting Services (TELSIKS '09) , October 2009. Z. Ghassemlooy, A. R. Hayes, N. L. Seed, and E. D. Kaluarachchi, “Digital pulse interval modulation for optical communications,” IEEE Communications Magazine , vol. 36, no. 12, pp. 95–99, 1998. T. Svedek and S. Rupcic, “Anisochronous modulation methods for optical short-range wireless comunnications,” in Proceedings of IEEE International Conference on Intelligent Engineering Systems , L. Žlajpah and I. J. Rudas, Eds., 2000. C. K. See, Z. Ghassemlooy, and J. M. Holding, “Hybrid PIM-CDMA for optical wireless networks,” in Proceedings of the 1st Annual PostGraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNET '00) , pp. 195–200, June 2000. J.-G. Zhang, “Strict optical orthogonal codes for purely asynchronous code-division multiple-access applications,” Applied Optics , vol. 35, no. 35, pp. 6996–6999, 1996. Z. Ghassemlooy and C. K. See, “ Symbol and bit error rates analysis of hybrid PIM-CDMA ,” EURASIP Journal on Wireless Communications and Networking , vol. 2005, Article ID 162417, 8 pages, 2005. J. G. Proakis, Digital Communications , McGraw-Hill, New York, NY, USA, 4th edition, 2001. Z. Ghassemlooy and A. R. Hayes, “Digital pulse interval modulation for IR communication systems—a review,” International Journal of Communication Systems , vol. 13, no. 7-8, pp. 519–536, 2000. B. Sklar, Digital Communications: Fundamentals and Applications , Prentice-Hall, New York, NY, USA, 2nd edition, 2001. J. G. Proakis and M. Salehi, Contemporary Communication Systems Using MATLAB , PWS, Boston, Mass, USA, 1998. // http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png EURASIP Journal on Advances in Signal Processing Hindawi Publishing Corporation

Pulse Interval Modulation for Ultra-High Speed IR-UWB Communications Systems

EURASIP Journal on Advances in Signal Processing , Volume 2010 (2010) – Sep 15, 2010

Loading next page...
 
/lp/hindawi-publishing-corporation/pulse-interval-modulation-for-ultra-high-speed-ir-uwb-communications-E0eQVOpcRk

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Hindawi Publishing Corporation
Copyright
Copyright © 2010 Marijan Herceg et al.
ISSN
1687-6172
eISSN
1687-6180
Publisher site
See Article on Publisher Site

Abstract

Pulse Interval Modulation for Ultra-High Speed IR-UWB Communications Systems //// Hindawi Publishing Corporation Home Journals About Us About this Journal Submit a Manuscript Table of Contents Journal Menu Abstracting and Indexing Aims and Scope Article Processing Charges Articles in Press Author Guidelines Best Paper Awards Bibliographic Information Contact Information Editorial Board Editorial Workflow Free eTOC Alerts Reviewers Acknowledgment Subscription Information Open Special Issues Published Special Issues Special Issue Guidelines Abstract Full-Text PDF Full-Text HTML Linked References How to Cite this Article EURASIP Journal on Advances in Signal Processing Volume 2010 (2010), Article ID 658451, 8 pages doi:10.1155/2010/658451 Research Article <h2>Pulse Interval Modulation for Ultra-High Speed IR-UWB Communications Systems</h2> Marijan Herceg , Tomislav Švedek , and Tomislav Matić Department of Communication, Faculty of Electrical Engineering, J.J.Strossmayer University of Osijek, Kneza Trpimira 2b, 31000 Osijek, Croatia Received 16 February 2010; Revised 6 May 2010; Accepted 21 July 2010 Academic Editor: Jacques Palicot Copyright © 2010 Marijan Herceg et al. This is an open access article distributed under the Creative Commons Attribution License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract This paper analyzes performances of the Pulse Interval Modulation (PIM) scheme for impulse radio ultra-wideband (IR-UWB) communication systems. Due to the PIM anisochronous nature, a tap delay line (TDL) coded division multiple access (CDMA) scheme based on strict optical orthogonal codes (SOOC) is proposed. This scheme is suitable for multiuser high-speed data asynchronous transmission applications because the average symbol length is shorter than in Pulse Position Modulation (PPM) schemes and it needs only chip synchronization. The error probability over the additive white Gaussian noise (AWGN) channel is derived in the single- and multi-user environment and compared with other modulation schemes. 1. Introduction Trends in modern communication systems place high demands on low power consumption, high-speed transmission, and anti-interference characteristics. Therefore, impulse radio ultra-wideband (IR-UWB) [ 1 ] systems have recently gained increased popularity. Since IR-UWB symbols are transmitted by short pulses ( < 2 ns), energy has spread over the frequency bands of up to 10 GHz. These pulses have to follow strict regulations concerning power and spectrum restrictions defined by local authorities, like the Federal Communications Commission (FCC) [ 2 ] in the USA. Because of power and spectral properties of the transmitted IR-UWB pulses, different types of orthogonal pulse shapes are used to provide a higher spectral efficiency [ 3 , 4 ]. Derivation of the Gaussian pulse and modified Hermite pulses (MHPs), usually called Hermites [ 5 ], provides a wide range of various pulse combinations for IR-UWB transmission and for that reason they are most commonly used as pulse shapes. The state of art in IR-UWB systems is presented by many applicable modulation techniques like Pulse Amplitude Modulation (PAM), PPM, Pulse Shape Modulation (PSM), on-off-keying (OOK), and biphase modulation (BPM). A combination of the exposed modulation techniques (hybrid techniques) can provide system improvements in terms of the error probability, a higher data rate, a less complex receiver, or less power consumption. Many hybrid techniques for IR-UWB communication systems have been applied recently, such as Pulse Position Amplitude Modulation (PPAM) [ 6 ], Biorthogonal Pulse Position Modulation (BPPM) [ 7 ], OOK-PSM [ 8 ], PPM-PSM [ 9 ], and hybrid Shape-Amplitude Modulation [ 10 , 11 ]. Regarding pulse amplitudes, positions, and shapes, three types of modulations can be distinguished. In PAM and OOK modulation information is contained in the amplitude of the signal, PPM uses the position of the pulse to convey information, whereas in PSM, information is conveyed in the shape of the pulse. PIM was first introduced in [ 12 ] for wireless optical communication systems. It is interesting because it displays a higher transmission capacity by eliminating unused time chips within each symbol and does not require both chip and symbol synchronization, but only chip synchronization, since each symbol is initiated with a pulse. Different anisochronous and synchronous pulse time modulation (PTM) techniques for optical short-range wireless communications are compared in [ 13 ]. This paper is organized as follows. Section 2 describes basic properties of the PIM scheme. In Section 3 , the proposed system model is described, while in Section 4 error performance analysis is made over the AWGN channel. Section 5 gives simulation results while some conclusions are given in Section 6 . 2. PIM Scheme Basics PIM is part of anisochronous PTM techniques. The main characteristic of anisochronous schemes is that they do not have a fixed symbol structure, which means that the symbol length varies and is determined by the information content of the symbol. In PPM, each symbol has a fixed length and the chips following the pulse are redundant, while in PIM that redundancy is removed. A PIM symbol which encodes 𝑀 = l o g 2 𝐿 input bits, where 𝐿 is the number of symbols, is represented by a constant power pulse in the “ON” chip followed by the ( 𝐿 − 1 ) “OFF” chips. In order to avoid symbols in which the time between adjacent pulses is zero, an additional guard chip may also be added to each symbol immediately following the pulse. Table 1 shows the transformation of the source bit sequence into PPM chip sequences and PIM chip sequences with the guard zero chip. Table 1: Mappings between source bits and transmitted chips for 4-PPM and 4-PIM (Example). The overall transmitted signal in the single-user case can be defined as  𝑠 ( 𝑡 ) = ∞ 𝑚 = 0  𝐸 𝑔 𝑝  𝑡 − 𝑇 𝑐   2 𝑚 + 𝑚 − 1 𝑙 = − ∞ 𝑆 𝑙   , ( 1 ) where 𝐸 𝑔 is energy of the pulse, 𝑇 𝑐 is chip duration, 𝑝 ( 𝑡 ) is the pulse shape function (unit energy Gaussian monocycle with duration 𝑇 𝑐 ), and 𝑆 𝑙 is a random data sequence representing PIM coded data. If the maximum PIM symbol duration is limited to the PPM symbol duration, then the average symbol length of PIM with the guard zero chip is 𝐿 a v g = ( 𝐿 + 3 ) / 2 . The achievable data rates for PIM and PPM are then 𝑅 𝑏 - P I M = l o g 2 𝐿 𝐿 a v g 𝑇 𝑐 , 𝑅 ( 2 ) 𝑏 - P P M = l o g 2 𝐿 𝐿 𝑇 𝑐 , ( 3 ) respectively. From ( 2 ) and ( 3 ), it can be clearly seen that the PIM bit rate is higher than PPM bit rate, due to the shorter average symbol length 𝐿 a v g . On the other hand, due to the shorter symbol length, PIM encoded data sequence has the higher average power than the data sequence encoded by using PPM. The average power per symbol for PIM and PPM is given as P o w P I M = 1 𝐿 a v g 𝑇 𝑐  ∞ − ∞ 𝑝 2 ( 𝑡 ) 𝑑 𝑡 , P o w P P M = 1 𝐿 𝑇 𝑐  ∞ − ∞ 𝑝 2 ( 𝑡 ) 𝑑 𝑡 , ( 4 ) respectively. The dependence of the symbol length and the average power ratio ( P o w P I M / P o w P P M ) on the number of bits per symbol is shown in Figure 1 . Figure 1: Dependence of symbol duration ( 𝐿 a v g ) and average power ratio ( P o w P I M / P o w P P M ) on the number of bits per symbol. Figure 2 shows an example of PPM and PIM symbols for the sequence of source bit combinations 01 and 10. Figure 2: PPM and PIM symbol structure for the sequence of source bit combinations 01 and 10. 3. The Proposed System Model In this section, the performance of PIM in a multi-user environment is derived for IR-UWB communication systems. Due to the PIM anisochronous nature, CDMA based on the TDL is proposed in [ 14 ]. This scheme is suitable for IR-UWB systems because it needs only chip synchronization, while the time-hopping systems proposed in [ 6 – 11 ] need both frame and chip synchronization which increase hardware complexity. Figure 3 shows a TDL-based transmitter and receiver. Figure 3: Proposed (a) transmitter and (b) receiver. At the transmitter input, a serial data stream is transformed into a parallel M -bit data sequence and then loaded in the latch. Simultaneously with loading, the counter is reset and it starts to count with chip clock frequency. The outputs of the counter and latch are compared, and when outputs match, the comparator goes high which implies starting of the new symbol generation. Then, the new M -bit data sequence is loaded into the latch and the counter is reset/started. The comparator drives the pulse generator which generates a Gaussian monocycle when its input goes high and extra ( 𝑛 − 1 ) redundant empty chips are added. After that, the PIM sequence is fed into the TDL encoder. TDL consists of w parallel tap-delay elements, where each element delay is determined by the codeword of the signature sequence. The signature sequence is obtained using an SOOC [ 15 ] defined by ( 𝑛 , 𝑤 , 𝜆 𝑎 , 𝜆 𝑐 ), where 𝑛 is code length, 𝑤 is code weight, and 𝜆 𝑎 and 𝜆 𝑐 are unity auto- and cross-correlation constraints, respectively. The overall transmitted signal of the 𝑘 th user is given as follows: 𝑠 ( 𝑘 )  ( 𝑡 ) = ∞ 𝑚 = 0  𝑤 𝑗 = 1  𝐸 𝑔 𝑝  𝑡 − 𝑐 𝑗 ( 𝑘 ) 𝑇 𝑐 −   𝑛 𝑚 + 𝑚 − 1 𝑙 = − 1 𝑆 𝑙 ( 𝑘 )  𝑇 𝑐  , ( 5 ) where 𝑐 𝑗 ( 𝑘 ) is an element of the SOOC codeword and 𝑆 𝑙 ( 𝑘 ) is the k th user data sequence representing data coded into PIM. Due to the added redundant chips, the overall achievable data rate is decreased, and from ( 2 ) it can be written as follows: 𝑅 𝑏 - P I M = l o g 2 𝐿  𝑛 + 𝐿 a v g  𝑇 𝑐 . ( 6 ) If AWGN is the only source of interference in the channel, the signal received in the multi-user environment is given as follows:  𝑟 ( 𝑡 ) = 𝑁 𝑢 𝑘 = 1 𝑠 ( 𝑘 )  𝑡 − 𝜏 ( 𝑘 )  + 𝑛 ( 𝑡 ) , ( 7 ) where 𝑁 𝑢 is the number of users, 𝜏 ( 𝑘 ) is time delay of the k th user (assumed to be the integer multiple of 𝑇 𝑐 ), and 𝑛 ( 𝑡 ) is an AWGN component with zero mean and variance 𝑁 0 /2. At the input of the receiver, 𝑟 ( 𝑡 ) is passed through the TDL decoder, where by tuning the delay elements a higher amplitude pulse can be formed by each of the pulses in the signature sequences. The decoded signal is then fed into the correlator-based matched filter which multiplies the signal by the template waveform. The decision which chip is empty and which chip contains a pulse is made on the basis of autocorrelation properties of the Gaussian monocycle at the threshold detector. At the output of the threshold detector, the transmitted PIM data encoded stream is estimated by removing redundant ( 𝑛 − 1 ) chips. The pulse at the start of the PIM symbol is then used to load the output of the counter in the latches and to reset the counter. If we assume that the first user is the desired user, then the decoded signal at the input of the matched filter (after the TDL decoder) is given as follows: 𝑟 T D L ( 𝑡 ) = 𝑆 ( 1 ) + 𝐼 S E L F + 𝐼 M U I + 𝑁 , ( 8 ) where 𝑆 ( 1 ) , 𝐼 S E L F , 𝐼 M U I , and N are the desired PIM sequence, self-interference, interference due to the multi-user interference (MUI), and AWGN interference, respectively, given as follows: 𝑆 ( 1 ) =  ∞ 𝑚 = 0 𝑤  𝐸 𝑔 𝑝 ×  𝑡 − ( 𝑛 − 1 ) 𝑇 𝑐 −   𝑛 𝑚 + 𝑚 − 1 𝑙 = − 1 𝑆 𝑙 ( 1 )  𝑇 𝑐 − 𝜏 ( 1 )  , 𝐼 S E L F =  ∞ 𝑚 = 0  𝑤 𝑤 𝑗 = 1  𝐽 = 1 𝐽 ≠ 𝑗 ×  𝐸 𝑔 𝑝  𝑡 − 𝑐 𝐽 ( 1 ) 𝑇 𝑐 −  𝑛 − 1 − 𝑐 𝑗 ( 1 )  𝑇 𝑐 −   𝑛 𝑚 + 𝑚 − 1 𝑙 = − 1 𝑆 𝑙 ( 1 )  𝑇 𝑐 − 𝜏 ( 1 )  , 𝐼 M U I =  ∞ 𝑚 = 0  𝑤 𝑗 = 1  𝑤 𝑗 ′ = 1  𝑁 𝑢 − 1 𝑘 = 1 ×  𝐸 𝑔 𝑝  𝑡 − 𝑐 𝑗 ( 𝑘 ) ′ 𝑇 𝑐 −  𝑛 − 1 − 𝑐 𝑗 ( 1 )  𝑇 𝑐 −   𝑛 𝑚 + 𝑚 − 1 𝑙 = − 1 𝑆 𝑙 ( 𝑘 )  𝑇 𝑐 − 𝜏 ( 𝑘 )  ,  𝑁 = 𝑤 𝑗 = 1 𝑛 ( 𝑡 ) . ( 9 ) Figure 4 shows an example of the PIM symbol with the (7, 3, 1, 1) SOOC signature sequence. Figure 4: PIM symbol (a) before the TDL encoder, (b) after the TDL encoder, (c) after the TDL decoder. 4. Error Performance Analysis In order to derive the error probability, some simplification has been assumed. (a) Channel model is an AWGN channel (no multipath components). (b) MUI is approximated as a Gaussian random variable. (c) There is a perfect synchronization and power control between the transmitter and the receiver. In order to recover the desired signal, at the input of the correlator-based matched filter (MF) the received signal is multiplied by the template signal 𝑝 ( 𝑡 ) and then integrated over the chip time 𝑇 𝑐 and a decision is made upon auto-correlation properties given as follows:  𝜌 ( Δ 𝑡 ) = 𝑇 𝑐 0 𝑝 ( 𝑡 ) 𝑝 ( 𝑡 − Δ 𝑡 ) 𝑑 𝑡 . ( 1 0 ) Note that  | | 𝑇 𝜌 ( Δ 𝑡 ) = 1 , Δ 𝑡 = 0 , 0 , Δ 𝑡 ≥ 𝑐 | | . ( 1 1 ) The decision whether a pulse occurs in the current chip is made according to the threshold level 𝑣 𝑡 ℎ √ 𝐸 𝑔 at the detector. When the pulse is detected, the data is recovered by removing redundant ( 𝑛 − 1 ) chips (due to the SOOC-CDMA) and counting empty chips employing the PIM demodulator. The error can occur in two ways. First, if the correct pulse is not detected, it would merge the previous and the current symbol. Second, if the false pulse is detected within empty 𝑆 𝑙 ( 1 ) chips, it would divide the current and the next symbol. In order to obtain the error probability, we will first derive the probability that a correct pulse is not detected. From Figure 4 , it can be seen that self-interference 𝐼 S E L F does not affect the chip where a correct pulse occurs, so the only interference is due to the MUI and AWGN. The decision variable for the chip where the pulse occurs in the 𝑚 th symbol is 𝑦 𝑐  = 𝑤 𝐸 𝑔 𝜌 ( 0 ) + 𝐼 M U I _ 𝑚 + 𝑁 , ( 1 2 ) where N is the AWGN interference, that is, a Gaussian random variable with zero mean and variance 𝑤 𝑁 0 /2 and 𝐼 M U I _ 𝑚 is the MUI in the m th symbol given as 𝐼 M U I _ 𝑚 =  𝑤 𝑗 = 1  𝑤 𝑗 ′ = 1  𝑁 𝑢 − 1 𝑘 = 1  𝐸 𝑔 𝜌  𝛿 M U I  . ( 1 3 ) From [ 16 ] it can be seen that the probability that one pulse occurs in a single chip due to the MUI has a binomial distribution, so 𝛿 M U I can be modeled as a binomial random variable which can be either zero (meaning that the MUI pulse occurs in the current chip) or ≥ | 𝑇 𝑐 | (means that the MUI pulse does not occur in the current chip) with probabilities 𝑃 M U I and ( 1 − 𝑃 M U I ), respectively. The probability of one pulse interference due to the MUI is given from [ 16 ] as follows: 𝑃 M U I = 2 2 𝑛 + 2 𝑀 − 1 , ( 1 4 ) where code length 𝑛 = 𝑁 𝑢 𝑤 ( 𝑤 − 1 ) and M is the number of bits per symbol. Probability density function (PDF) of 𝛿 M U I is P D F M U I  ( 𝑥 ) = 1 − 𝑃 M U I  𝛿 ( 𝑥 ) + 𝑃 M U I 𝛿 ( 𝑥 − 1 ) . ( 1 5 ) By using the central limit theorem, 𝐼 M U I _ 𝑚 can be modeled as a Gaussian random variable with mean 𝐸  𝐼 M U I _ 𝑚  =  𝑤 𝑗 = 1  𝑤 𝑗 ′ = 1  𝑁 𝑢 − 1 𝑘 = 1 𝐸   𝐸 𝑔 𝜌  𝛿 M U I   =  𝑁 𝑢  𝑤 − 1 2  𝐸 𝑔 𝑃 M U I , ( 1 6 ) where 𝐸 [ ∗ ] is the mean value operator. Variance of 𝐼 M U I _ 𝑚 is  𝐼 V a r M U I _ 𝑚   𝐼 = 𝐸 2 M U I _ 𝑚   𝐼 − 𝐸 M U I _ 𝑚  2 =  𝑤 𝑗 = 1  𝑤 𝑗 ′ = 1  𝑁 𝑢 − 1 𝑘 = 1 𝐸    𝐸 𝑔 𝜌  𝛿 M U I   2  −  𝑤 𝑗 = 1  𝑤 𝑗 ′ = 1  𝑁 𝑢 − 1 𝑘 = 1 𝐸   𝐸 𝑔 𝜌 ( 𝛿 M U I )  2 =  𝑁 𝑢  𝑤 − 1 2 𝐸 𝑔 𝑃 M U I  1 − 𝑃 M U I  . ( 1 7 ) The decision variable 𝑦 𝑐 can then be modeled as a Gaussian random variable with mean 𝑤 √ 𝐸 𝑔 + 𝐸 [ 𝐼 M U I _ 𝑚 ] and variance V a r [ 𝐼 M U I _ 𝑚 ] + 𝑤 𝑁 0 / 2 . If 𝑃 𝑝 denotes the probability of an error decision whether or not the pulse is detected in the current chip, then the probability that the correct pulse will not be detected is from [ 17 ] the probability equal to 𝑃 ( 𝑦 𝑐 < 𝑣 𝑡 ℎ √ 𝐸 𝑔 ) or 𝑃 𝑝 ⎛ ⎜ ⎜ ⎝    ⎷ = 𝑄   𝑁 𝑤 + 𝑢  𝑤 − 1 2 𝑃 M U I − 𝑣 𝑡 ℎ  2 𝐸 𝑔   𝐼 V a r M U I _ 𝑚  + 𝑤 𝑁 0  ⎞ ⎟ ⎟ ⎠ / 2 , ( 1 8 ) where Q -function is defined as follows: 1 𝑄 ( 𝑥 ) = √  2 𝜋 ∞ 𝑥 𝑒 − 𝑡 2 / 2 𝑑 𝑡 , 𝑥 ≥ 0 . ( 1 9 ) The second way that an error can occur is the probability that a false pulse is detected within an empty chip. The decision variable for the chip where the pulse does not occur in the m th symbol is 𝑦 𝑐 = 𝐼 S E L F _ 𝑚 + 𝐼 M U I _ 𝑚 + 𝑁 , ( 2 0 ) where 𝐼 S E L F _ 𝑚 is self-interference due to ( 𝑤 − 1 ) uncorrelated pulses at the end of the TDL decoder in the m th symbol. The probability of one pulse interference in a single chip due to self-interference also has a binomial distribution and it is given from [ 16 ] as follows: 𝑃 S E L F = 2 2 𝑛 + 2 𝑀 − 3 . ( 2 1 ) Using the same procedure for modeling 𝐼 M U I _ 𝑚 , 𝐼 S E L F _ 𝑚 can be modeled as a Gaussian random variable with mean 𝐸  𝐼 S E L F _ 𝑚   = 𝑤 ( 𝑤 − 1 ) 𝐸 𝑔 𝑃 S E L F ( 2 2 ) and variance  𝐼 V a r S E L F _ 𝑚  = 𝑤 ( 𝑤 − 1 ) 𝐸 𝑔 𝑃 S E L F  1 − 𝑃 S E L F  . ( 2 3 ) The decision variable 𝑦 𝑐 can then be modeled as a Gaussian random variable with mean 𝐸 [ 𝐼 M U I _ 𝑚 ] + 𝐸 [ 𝐼 S E L F _ 𝑚 ] and variance V a r [ 𝐼 S E L F _ 𝑚 ] + V a r [ 𝐼 M U I _ 𝑚 ] + 𝑤 𝑁 0 / 2 . If 𝑃 𝑧 denotes the probability whether or not a pulse is detected in a wrong chip, then the probability that a wrong pulse will be detected is from [ 17 ] the probability equal to P ( 𝑦 𝑐 > 𝑣 𝑡 ℎ √ 𝐸 𝑔 ) or 𝑃 𝑧 ⎛ ⎜ ⎜ ⎝    ⎷ = 𝑄  𝑣 𝑡 ℎ −  𝑤 ( 𝑤 − 1 ) 𝑃 S E L F +  𝑁 𝑢  𝑤 − 1 2 𝑃 M U I   2 𝐸 𝑔   𝐼 V a r S E L F _ 𝑚   𝐼 + V a r M U I _ 𝑚  + 𝑤 𝑁 0  ⎞ ⎟ ⎟ ⎠ / 2 . ( 2 4 ) In order to compare the performance of PIM with other modulation techniques, a packet error rate (PER) is introduced [ 18 ]. A packet error occurs if one or more symbols within a packet are erroneous. If the packet containing B data bits is considered, then the number of symbols and hence the number of transmitted pulses in a packet is B / M . Assuming that there is no guard slot in the symbol, the average number of empty slots per packet is 𝐵 ( 2 𝑀 − 1 ) /(2 M ) . Therefore, the probability of the packet error is given by 𝑃 P E  = 1 − 1 − 𝑃 𝑝  𝐵 / 𝑀  1 − 𝑃 𝑧  𝐵 ( 2 𝑀 − 1 ) / ( 2 𝑀 ) . ( 2 5 ) With ( 18 ), ( 24 ), and ( 25 ) the error probability is given as the function of energy per symbol, but in digital communication systems energy per bit ( 𝐸 𝑏 ) is a natural figure of merit, so by replacing 𝐸 𝑔 = 𝑀 𝐸 𝑏 , we can obtain PER as a function of 𝐸 𝑏 / 𝑁 0 . If we want to compare PER performance as the function of average signal power to the average noise power ratio (SNR), the following equation holds [ 19 ]: 𝐸 𝑏 𝑁 0 𝑊 = S N R 𝑅 𝑏 , ( 2 6 ) where 𝑊 = 1 / 𝑇 𝑐 is the channel bandwidth and 𝑅 𝑏 is the bit rate defined in ( 2 ), ( 3 ). 5. Simulation Results The error probability given by ( 18 ), ( 24 ), and ( 25 ) is compared with Monte Carlo simulation [ 20 ] in Figure 5 for three different PIMs and the packet length B = 128. It can be seen that the derived error probability matches simulation results for 4-PIM and 8-PIM, while for 2-PIM there is a slight difference for large 𝐸 𝑏 / 𝑁 0 . Figure 5: Comparison of PER performance between Monte Carlo simulation and the derived error probability for 𝐵 = 1 2 8 . In order to compare PIM with PPM and PAM, packet length is chosen to be B = 512 bits, w = 1, and 𝑣 𝑡 ℎ = 0 . 5 . PER performance of PIM is obtained using ( 18 ), ( 24 ), ( 25 ) and the results are shown in Figure 6 . In the simulation, the number of modulation levels is L = 2, 4, 8. In the case of L = 2, PIM has a 6 dB and 3 dB worse performance than 2-PAM and 2-PPM, respectively. With the increase of the modulation level to L = 4, PIM has a 0.8 dB better performance than 4-PAM and 3 dB worse than 4-PPM, while for L = 8 PIM performance is 7 dB better than 8-PAM and 3 dB worse than 8-PPM. Generally, it can be seen that if the modulation level increases, PIM and PPM performance increases while PAM decreases significantly. Figure 6: PER performance comparison of PAM, PPM, and PIM for the same bit energy. To compare PIM with PPM for the same average power per symbol, equations ( 18 ), ( 24 ), ( 25 ) and ( 26 ) are used. Packet length is chosen to be B = 512 bits, w = 1 and 𝑣 𝑡 ℎ = 0 . 5 . Results are shown in Figure 7 . In the simulation the number of modulation levels is L = 2, 4, 8. In the case of L = 2, PIM has a 4 dB lower PER than 2-PPM. With the increase of the modulation level to L = 4, 8 PIM performance decreases compared with PPM. Figure 7: PER performance comparison of PPM and PIM for the same average power per symbol. Figure 8 shows the influence of the threshold level 𝑣 𝑡 ℎ on the PER performance for 8-PIM when the code weight is w = 10. It can be seen that the optimal threshold is at 𝑣 𝑡 ℎ = 7 . It results from the fact that in an 8-PIM symbol there is only one chip where a pulse occurs and on average 4.5 empty chips, so the probability that a false pulse will be detected is higher than the probability that a correct pulse will not be detected. Figure 8: Influence of the 𝑣 𝑡 ℎ level on 8-PIM performance with code weight 𝑤 = 1 0 . Figure 9 shows the influence of the code weight w on PER performance for 8-PIM with 𝑣 𝑡 ℎ set to an optimal value. It can be seen that 8-PIM with w = 11 has a slightly better performance than 8-PIM with w = 10, and 2.3 dB better than 8-PIM with w = 9. Figure 9: Influence of code weight w on 8-PIM performance for the optimal 𝑣 𝑡 ℎ = 7 . Figure 10 shows the influence of the threshold level 𝑣 𝑡 ℎ on PER performance in the presence of the MUI for 8-PIM when the code weight is w = 10 and 𝐸 𝑏 / 𝑁 0 = 1 5 dB. It can be seen that for the optimal threshold 𝑣 𝑡 ℎ = 6 , the PER performance improves significantly. Figure 10: Influence of 𝑣 𝑡 ℎ on 8-PIM PER performance when the number of users increases, for 𝑤 = 1 0 and 𝐸 𝑏 / 𝑁 0 = 1 5 dB. Code weight w influence on 8-PIM in presence of the MUI for optimal 𝑣 𝑡 ℎ is analyzed and shown in Figure 11 . It can be seen that with an increase of code weight, PER is improved, which is a result of more correlated pulses at the receiver. This advantage is at the cost of the data rate shown from ( 6 ) in Figure 11 . Figure 11: Influence of the number of users on 8-PIM performance for optimal 𝑣 𝑡 ℎ and 𝐸 𝑏 / 𝑁 0 = 1 5 dB. Figure 12: Influence of the number of users on the bit rate for 8-PIM and 𝑇 𝑐 = 1 ns. 6. Conclusion This paper proposes an anisochronous PIM scheme for IR-UWB communication systems. The basic principles and characteristics of anisochronous PIM scheme are outlined. Unlike PPM, PIM requires no symbol synchronization, which results in a much simpler receiver structure (only one correlator). The proposed multiple access method based on SOOC-TDL-CDMA allows a totally asynchronous transmission and it needs only chip synchronization which significantly reduces hardware complexity, while classical time-hopping IR-UWB needs both frame and chip synchronization which increase hardware complexity. It is shown that an increase of code weight 𝑤 can decrease PER at the cost of hardware complexity (more delay elements at TDL) and the influence of 𝑣 𝑡 ℎ in both single- and multi-user environment is analyzed. The major disadvantage of anisochronous PIM techniques is that they have a variable symbol length, and hence the time required to transmit a data packet containing a fixed number of bits is not constant. Employing some form of a source coding scheme, packet length variation can be limited still maintaining the increase in information capacity over isochronous modulation techniques. Simpler receiver complexity and very high achievable bit-rates make PIM modulation very attractive for IR-UWB short-range communication systems. <h4>References</h4> R. A. Scholtz, “Multiple-access performance limits with time hopping modulation,” in Proceedings of the IEEE Military Communications Conference , pp. 11–14, October 1993. FCC, “Revision of part 15 of the commission’s rules regarding ultra-wideband transsmision systems,” Federal Communications Commission, ET Docket, pp. 98–153, 2002. Y. Kim, B. Jang, C. Shin, and B. F. Womack, “ Orthonormal pulses for high data rate communications in indoor UWB systems ,” IEEE Communications Letters , vol. 9, no. 5, pp. 405–407, 2005. J. A. N. da Silva and M. L. R. de Campos, “ Method for obtaining spectrally efficient orthogonal UWB pulse shapes ,” in Proceedings of the International Telecommunications Symposium (ITS '06) , pp. 46–51, Fortaleza-CE, Brazil, September 2006. M. Ghavami, L. B. Michael, and R. Kohno, Ultra Wideband Signals and Systems in Communication Engineering , John Wiley & Sons, New York, NY, USA, 2004. H. Zhang, W. Li, and T. A. Gulliver, “ Pulse position amplitude modulation for time-hopping multiple-access UWB communications ,” IEEE Transactions on Communications , vol. 53, no. 8, pp. 1269–1273, 2005. H. Zhang and T. A. Gulliver, “ Biorthogonal pulse position modulation for time-hopping multiple access UWB communications ,” IEEE Transactions on Wireless Communications , vol. 4, no. 3, pp. 1154–1162, 2005. S. Majhi and A. S. Madhukumar, “Combining OOK with PSM modulation for TH-UWB radio systems: a performance analysis,” EURASIP Journal on Wireless Communications and Networking , vol. 2008, 2008. C. J. Mitchell, G. T. F. de Abreu, and R. Kohno, “ Combined pulse shape and pulse position modulation for high data rate transmissions in ultra-wideband communications ,” International Journal of Wireless Information Networks , vol. 10, no. 4, pp. 167–178, 2003. M. Herceg, T. Matic, and T. Svedek, “Performances of hybrid amplitude shape modulation for UWB communications systems over AWGN channel in the single and multi-user environment,” Radioengineering Journal , vol. 18, no. 3, 2009. M. Herceg, T. Matic, and T. Svedek, “Performance of hybrid pulse shape amplitude modulation for UWB communications systems over multipath channels,” in Proceedings of the 9th International Conference on Telecommunication in Modern Satellite, Cable, and Broadcasting Services (TELSIKS '09) , October 2009. Z. Ghassemlooy, A. R. Hayes, N. L. Seed, and E. D. Kaluarachchi, “Digital pulse interval modulation for optical communications,” IEEE Communications Magazine , vol. 36, no. 12, pp. 95–99, 1998. T. Svedek and S. Rupcic, “Anisochronous modulation methods for optical short-range wireless comunnications,” in Proceedings of IEEE International Conference on Intelligent Engineering Systems , L. Žlajpah and I. J. Rudas, Eds., 2000. C. K. See, Z. Ghassemlooy, and J. M. Holding, “Hybrid PIM-CDMA for optical wireless networks,” in Proceedings of the 1st Annual PostGraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNET '00) , pp. 195–200, June 2000. J.-G. Zhang, “Strict optical orthogonal codes for purely asynchronous code-division multiple-access applications,” Applied Optics , vol. 35, no. 35, pp. 6996–6999, 1996. Z. Ghassemlooy and C. K. See, “ Symbol and bit error rates analysis of hybrid PIM-CDMA ,” EURASIP Journal on Wireless Communications and Networking , vol. 2005, Article ID 162417, 8 pages, 2005. J. G. Proakis, Digital Communications , McGraw-Hill, New York, NY, USA, 4th edition, 2001. Z. Ghassemlooy and A. R. Hayes, “Digital pulse interval modulation for IR communication systems—a review,” International Journal of Communication Systems , vol. 13, no. 7-8, pp. 519–536, 2000. B. Sklar, Digital Communications: Fundamentals and Applications , Prentice-Hall, New York, NY, USA, 2nd edition, 2001. J. G. Proakis and M. Salehi, Contemporary Communication Systems Using MATLAB , PWS, Boston, Mass, USA, 1998. //

Journal

EURASIP Journal on Advances in Signal ProcessingHindawi Publishing Corporation

Published: Sep 15, 2010

There are no references for this article.