Open Access

Residue Number System Arithmetic Assisted Coded Frequency-Hopped OFDMA

EURASIP Journal on Wireless Communications and Networking20092009:263695

DOI: 10.1155/2009/263695

Received: 31 July 2008

Accepted: 23 February 2009

Published: 26 March 2009

Abstract

We propose an RNS arithmetic-based FH pattern design approach that is well suited and easy to implement for practical OFDMA systems. The proposed FH scheme guarantees orthogonality among intracell users while randomizing the intercell interferences and providing frequency diversity gains. We present detailed construction procedures and performance analysis for both independent and cluster hopping scenarios. Using simulation results, we demonstrate the gains due to frequency diversity and intercell interference diversity on the system bit error rate (BER) performance. Furthermore, the BER performance gain is consistent across all cells unlike other FH pattern design schemes such as the Latin squares (LSs-)-based FH pattern design where wide performance variations are observed across cells.

1. Introduction

Orthogonal frequency division multiplexing (OFDM) has been widely accepted as an enabling technology for next generation wireless communication systems. In OFDM, high-rate data streams can be broken down into a number of parallel lower-rate streams, thereby avoiding the need for complex equalization. OFDM also forms the foundation for a multiple access scheme termed as orthogonal frequency division multiple access (OFDMA). In OFDMA, each user is assigned a fraction of available subcarriers based upon his/her demand for bandwidth. The advantages of OFDMA include (1) the flexibility in subcarriers' allocation; (2) the absence of multiuser interference due to subcarriers' orthogonality; (3) the simplicity of the receiver design [1].

In order to enhance system throughput and spectral efficiency, frequency hopping (FH) is generally used in OFDMA cellular systems. It is desirable for FH patterns to satisfy the following conditions [2]: (i) minimize intracell interference; (ii) average intercell interference; (iii) avoid ambiguity while identifying users; (iv) exploit frequency diversity by forcing hops to span a large bandwidth. The first aspect is relatively easy to achieve by using orthogonal hopping patterns within a cell. To average intercell interferences, hopping patterns are constructed in a way that two users in different cells interfere with each other only during a small fraction of all hops. The third condition requires base stations to have the capability of distinguishing different users efficiently according to their unique FH signatures. Finally, the last requirement not only ensures the security of the transmission, but also mitigates the effect of fading by exploiting frequency diversity.

Frequency hopping pattern design has received considerable attention in both commercial and military communication systems. There has been extensive work on designing FH-OFDMA systems [310]. In [3], concepts of fast frequency hopping along with OFDM are illustrated. In [4], authors show that the expected number of collisions per symbol under both independent and cluster hopping does not depend on the hopping strategy. In their later work [5], it is shown that the number of collisions can be further reduced by using space-frequency coding in multiple-antenna systems. Orthogonal Latin squares (LSs) are presented as FH patterns in TCM/BICM coded OFDMA in [6]. In LS-aided FH-OFDMA systems, it is seen that there is a wide variability in the performance of users in different cells. Therefore, it is not an effective scheme if one considers fairness to be important. Welch-Costas array is introduced in [7] and evaluated in [8] for coded FH-OFDMA. Here, although users across cells experience significant performance improvements, users within a cell may not occupy all of the available bandwidth to exploit full frequency diversity. Other aspects focusing on preventing hostile jamming and pilot-assisted channel estimation in FH-OFDMA are explored in [9, 10], respectively.

In this paper, we propose a novel frequency hopping pattern design strategy based on RNS arithmetic for practical OFDMA cellular systems. We show that the resulting patterns are orthogonal within a cell and intersect only once across cells in a frequency hopping cycle. RNS arithmetic has found applications in many areas. However, its use in designing frequency hopping patterns is rarely considered [11, 12]. In [11], the design procedure can be visualized as a "top-down" approach where a given bandwidth is divided into multiple candidate subbands based on a predetermined moduli set. As a result, if the moduli set changes, the bandwidth of subcarriers varies. In this work, the division of bandwidth into candidate subcarriers is assumed to be given or determined in advance. Therefore, we can consider our proposed approach as a "bottom-up" method driven by grouping and indexing the subcarriers according to the RNS arithmetic. For practical OFDMA cellular systems, the proposed "bottom-up" approach is more feasible. For example, in downlink OFDMA cellular systems, a fixed number of subcarriers (e.g., 1024) with identical subcarrier bandwidth within each cell is usually assumed. Furthermore, for reducing intercell interference, [11] suggests the use of different moduli sets for adjacent cells. This approach results in adjacent cells employing different numbers of subcarriers with different bandwidths across cells. Once again, this is a stringent requirement that may not be feasible in practice. In this work, we invoke the use of the so-called two-stage and multistage selection algorithms to construct RNS-FH patterns such that (1) different users can use the spectral resources simultaneously within each cell and (2) the same number of subcarriers can be employed from cell to cell. Additionally, the proposed FH sequences force the intracell interferences to zero and average out the intercell interferences. The performance of the proposed FH pattern incorporating with both independent and cluster hopping schemes is characterized. Simulation results show that RNS-FH OFDMA has significantly better BER performance relative to traditional OFDMA scheme without FH. Another aspect that makes RNS-FH pattern design outperforms other existing FH techniques is that user hopping patterns span a larger bandwidth. Therefore, the channel fades associated with consecutive hops become independent. Moreover, with the use of FEC codes over multiple hops, the system can correct errors due to subcarriers that experience deep fades or subcarriers that are severely interfered by others.

The rest of the paper is organized as follows. In Section 2, system model along with signal transmission scheme, access strategies, and interference models is introduced. In Section 3, detailed RNS-FH pattern design procedures along with comparisons with the existing technique are presented. Simulation results with performance analysis are given in Section 4. Finally, we conclude this paper in Section 5.

2. System Model

In this section, we first describe the signal transmission scheme for each individual user in an OFDMA system. Then, we introduce the access model and interference model under both independent and cluster hopping schemes.

2.1. Signal Transmission Scheme

The block diagram of FEC coded FH-OFDMA system is shown in Figure 1. Here, data bits of every user are first channel coded and then mapped to complex constellation points. We assume that there are https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq1_HTML.gif users in the system, utilizing a total of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq2_HTML.gif OFDM subcarriers. Each user is assigned a specific set of subcarriers out of the total available subcarriers according to his/her data rates. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq3_HTML.gif be the number of subcarriers allocated to user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq4_HTML.gif . Then, user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq5_HTML.gif transmits the information symbols https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq6_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq7_HTML.gif represents the transpose operation) on the assigned https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq8_HTML.gif subcarriers. Therefore, the baseband transmitted signal of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq9_HTML.gif can be expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ1_HTML.gif
(1)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq10_HTML.gif represents the time-domain signal, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq11_HTML.gif denotes one OFDM symbol duration. Since this is an OFDMA system, it is important to remember that every user is assigned a different set of subcarriers for transmission, and this allocation is dynamic in the case of frequency hopping OFDMA. That is, in the IFFT module, the frequency assignment follows a predetermined FH pattern. Moreover, each user transmits zeros on subcarriers which are not assigned to him/her.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Fig1_HTML.jpg
Figure 1

The block diagram of coded FH-OFDMA system.

For convenience, we note https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq12_HTML.gif as the subcarrier that is assigned to user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq13_HTML.gif . Hence, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq14_HTML.gif information symbols vector of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq15_HTML.gif can be written as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ2_HTML.gif
(2)
The discrete form of the transmitted signal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq16_HTML.gif is then given as,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ3_HTML.gif
(3)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq17_HTML.gif is the IFFT matrix defined as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ4_HTML.gif
(4)

where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq18_HTML.gif .

Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq19_HTML.gif denote the channel impulse response vector, then its Fourier transform is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ5_HTML.gif
(5)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq20_HTML.gif represents the Hermitian transpose. In general, each channel impulse response is a function of time and access delay which can be modeled as a tapped delay line, that is,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ6_HTML.gif
(6)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq21_HTML.gif is the number of multipaths and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq22_HTML.gif is the time delay of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq23_HTML.gif th path. The tap coefficients are independent, zero mean, circularly symmetric complex Gaussian random processes at each instant https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq24_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq25_HTML.gif with the total power normalized to unity, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq26_HTML.gif . In this work, we use Jakes' model to describe the time/frequency variation of each channel coefficient. Therefore, the spaced frequency ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq27_HTML.gif ) spaced time ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq28_HTML.gif ) correlation function of the channel frequency response can be expressed as [13]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ7_HTML.gif
(7)

where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq29_HTML.gif is the Doppler frequency.

At the receiver end, after FFT, the received signal corresponding to user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq30_HTML.gif on subcarrier https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq31_HTML.gif is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ8_HTML.gif
(8)
Then, the overall received signal which is a superposition of the signals transmitted from all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq32_HTML.gif users is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ9_HTML.gif
(9)

where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq33_HTML.gif is the Fourier transform of the noise vector.

2.2. Access Model

In this part, clustered and independent FH-OFDMA are introduced, and closed form expressions of the expected number of collisions per symbol under both of these two hopping strategies are presented.

2.2.1. Clustered FH-OFDMA

In cluster hopping, each user selects a set of continuous subcarriers, termed cluster, to transmit the information symbols. Specifically, the hopping takes place among clusters of subcarriers based on predetermined FH patterns. Therefore, collisions occur among clusters first, and then across all OFDM subcarriers within that cluster. The expected number of symbol losses per cluster collision corresponds to [4]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ10_HTML.gif
(10)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq34_HTML.gif is the number of subcarriers per cluster and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq35_HTML.gif represents the probability that at least one interfering user collides with the desired user. For cluster hopping, we have https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq36_HTML.gif hopping clusters. Therefore, the collision probability between the desired user and the interfering user in one cluster is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq37_HTML.gif . Hence, the probability that at least one of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq38_HTML.gif users collides with the desired user can be expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ11_HTML.gif
(11)

For convenience, throughout the rest of this paper, we assume that each user employs the same number of subcarriers ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq39_HTML.gif ) per cluster.

2.2.2. Independent FH-OFDMA

In independent hopping, subcarriers occupied by a user are selected independently from all available subcarriers. In other words, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq40_HTML.gif subcarriers in one cluster are not continuous anymore, and they are chosen in a pseudorandom fashion across the frequency spectrum. With independent hopping, the expected number of symbols lost per symbol collision is given by [4]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ12_HTML.gif
(12)

where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq41_HTML.gif is the probability that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq42_HTML.gif subcarriers out of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq43_HTML.gif subcarriers occupied by each user experience collisions due to interfering users.

Theorem 1.

For independent FH-OFDMA scheme described above, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq44_HTML.gif corresponds to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ13_HTML.gif
(13)

Proof.

https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq45_HTML.gif is the probability that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq46_HTML.gif subcarriers of the desired user collide with the subcarriers of interfering user given that each user occupies a total of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq47_HTML.gif subcarriers. It is evident that the number of possible combinations of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq48_HTML.gif subcarriers that experience collisions is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq49_HTML.gif . Define https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq50_HTML.gif as the probability that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq51_HTML.gif symbols are collision-free given that each user occupies https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq52_HTML.gif subcarriers. Furthermore, define https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq53_HTML.gif as the conditional probability that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq54_HTML.gif symbols collide given that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq55_HTML.gif symbols are collision-free. Therefore, we can write https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq56_HTML.gif as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ14_HTML.gif
(14)
Here, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq57_HTML.gif corresponds to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ15_HTML.gif
(15)
Equation (15) denotes the probability that the desired user's remaining https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq58_HTML.gif subcarriers are collision-free while none of the other https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq59_HTML.gif users within the same cell occupies these subcarriers. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq60_HTML.gif is expressed as [4]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ16_HTML.gif
(16)

Equation (16) represents the conditional probability that each of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq61_HTML.gif subcarriers of the desired user collides given that the other https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq62_HTML.gif subcarriers are collision-free. By substituting (15) and (16) into (14), we obtain the result in (13).

2.3. Interference Model

In this paper, we model intercell interferences as additive complex Gaussian-distributed distortions. This model is accurate when interferences from adjacent cells are perfectly randomized with respect to the cell of interest. Models specific to clustered and independent FH-OFDMA are presented in the following.

2.3.1. Clustered FH-OFDMA

In clustered FH-OFDMA, if interference occurs on any symbol on one subcarrier in the cluster, all other symbols in the same cluster will also experience interferences from adjacent cells. Hence, the interference for the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq63_HTML.gif th user can be modeled as [6]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ17_HTML.gif
(17)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq64_HTML.gif is an https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq65_HTML.gif vector, representing the received signal of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq66_HTML.gif ; https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq67_HTML.gif is the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq68_HTML.gif transmitted signal vector; https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq69_HTML.gif is an https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq70_HTML.gif matrix that contains the frequency domain representations of channel impulse response; https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq71_HTML.gif is an https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq72_HTML.gif vector whose components are complex Gaussian random variables with zero mean and variance https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq73_HTML.gif . Here, the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq74_HTML.gif vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq75_HTML.gif is the interference vector that captures the interference from all adjacent cells. The components of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq76_HTML.gif are i.i.d complex Gaussian random variables independent of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq77_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq78_HTML.gif with mean zero, variances https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq79_HTML.gif . The variances correspond to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ18_HTML.gif
(18)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq80_HTML.gif denotes the symbol signal-to-interference ratio and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq81_HTML.gif characterizes the presence/absence of a collision between users in different cells. That is, if there is a collision, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq82_HTML.gif equals to one; if there is no collision, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq83_HTML.gif is set to zero. Furthermore, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq84_HTML.gif can be modeled as Bernoulli's random variable with probability of collision equals to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq85_HTML.gif (i.e., https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq86_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq87_HTML.gif ), which can be expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ19_HTML.gif
(19)

where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq88_HTML.gif is the number of active users. If the system is fully loaded, then https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq89_HTML.gif . If there is a collision, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq90_HTML.gif , then all subcarriers in the cluster will be affected by the intercell interference.

2.3.2. Independent FH-OFDMA

In independent hopping, since subcarriers are selected independently of all other subcarriers according to predetermined FH patterns, collisions occur independently. Hence, for the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq91_HTML.gif th subcarrier of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq92_HTML.gif th user,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ20_HTML.gif
(20)
Here, the interference power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq93_HTML.gif of the i.i.d complex Gaussian random variable https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq94_HTML.gif corresponds to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ21_HTML.gif
(21)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq95_HTML.gif with probabilities https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq96_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq97_HTML.gif , respectively. The collision probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq98_HTML.gif is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ22_HTML.gif
(22)

For a fully loaded system with independent hopping, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq99_HTML.gif is identical to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq100_HTML.gif becomes to one.

3. RNS-FH Pattern Design

RNS is defined by the choice of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq101_HTML.gif number of positive integers https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq102_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq103_HTML.gif ), referred to as moduli [14]. If all the moduli are pairwise relative primes to each other, any integer https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq104_HTML.gif which falls in the range of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq105_HTML.gif can be uniquely and unambiguously represented by the residue sequence ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq106_HTML.gif ), where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq107_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq108_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq109_HTML.gif . Here, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq110_HTML.gif is used to describe the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq111_HTML.gif th user FH address. To recover https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq112_HTML.gif , or to distinguish users at the base station, Chinese remainder theorem (CRT) is generally used which is well known for its capability of solving a set of linear congruences, simultaneously. According to CRT, it can be shown that the numerical value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq113_HTML.gif can be computed as [15]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ23_HTML.gif
(23)

where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq114_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq115_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq116_HTML.gif .

Theorem 2.

The residue sequences obtained using the RNS arithmetic as described above are orthogonal.

Proof.

In order to prove that the residue sequences are orthogonal, we need to show that every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq117_HTML.gif in the range of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq118_HTML.gif has a unique residue set that is different from residue sets generated by other integers within the same range. We will prove this by contradiction as follows.

Assuming that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq119_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq120_HTML.gif are different integers which are in the same range of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq121_HTML.gif with the same residue set. That is,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ24_HTML.gif
(24)
Therefore, we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Equ25_HTML.gif
(25)

Thus, we can conclude from (25) that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq122_HTML.gif is actually the least common multiple (LCM) of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq123_HTML.gif . Furthermore, if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq124_HTML.gif are pairwise relative primes to each other, their LCM is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq125_HTML.gif and it must be that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq126_HTML.gif is a multiple of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq127_HTML.gif . However, this statement does not hold since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq128_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq129_HTML.gif . Therefore, by contradiction, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq130_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq131_HTML.gif should not have the same residue set. In general, the residue set ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq132_HTML.gif ) generated by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq133_HTML.gif is unique and can be used to represent the integer https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq134_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq135_HTML.gif .

Following the RNS arithmetic presented above, we propose to design FH patterns that satisfy all the requirements described in Section 1 while avoiding the limitations in [11]. Detailed procedures of constructing RNS-FH patterns are given in the following subsections. The first part describes the two-stage algorithm, while the second part introduces the multistage algorithm which can be considered as generalization of the two-stage algorithm. At the end of this section, we compare our proposed RNS-FH pattern design strategy with the method presented in [11].

3.1. Two-Stage Algorithm

In this part, the detailed procedures of constructing RNS-FH patterns via the so-called two-stage algorithm is introduced. We present the algorithm for a cluster hopping OFDMA system. It is straightforward to extend the algorithm to the independent hopping scenario. The steps involved in the two-stage selection algorithm are given as follows.
  1. (1)

    Divide the total available subcarriers https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq136_HTML.gif into https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq137_HTML.gif clusters with each cluster containing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq138_HTML.gif number of contiguous subcarriers.

     
  2. (2)

    If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq139_HTML.gif can be written as a product of two pairwise relative primes, for example, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq140_HTML.gif , we can first group https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq141_HTML.gif clusters into https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq142_HTML.gif groups with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq143_HTML.gif clusters in each group. Then, we index the groups from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq144_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq145_HTML.gif .

     
  3. (3)

    Index the clusters in each group from 0 to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq146_HTML.gif .

     
  4. (4)

    At the 0th time slot, assign integer https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq147_HTML.gif to user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq148_HTML.gif as its FH address according to its access order to the system, where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq149_HTML.gif .

     
  5. (5)

    If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq150_HTML.gif , then user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq151_HTML.gif selects the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq152_HTML.gif th cluster out of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq153_HTML.gif th group for transmission.

     
  6. (6)

    At the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq154_HTML.gif th time slot, assign integer https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq155_HTML.gif to user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq156_HTML.gif as its current FH address and repeat step 5.

     
  7. (7)

    Repeat steps 4–6 until one mutually orthogonal FH pattern is obtained.

     
  8. (8)

    If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq157_HTML.gif can be expressed as products of other combinations of two pairwise relative primes, for example, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq158_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq159_HTML.gif different orthogonal FH patterns can be obtained by repeating steps 2–7, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq160_HTML.gif times.

     
An example is given in Figure 2 to illustrate the two-stage RNS-assisted frequency hopping strategy. Here, 6 users access the system ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq161_HTML.gif ); the total number of subcarriers is 30 ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq162_HTML.gif ) and they are divided into 6 clusters ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq163_HTML.gif ) with each cluster containing 5 contiguous subcarriers ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq164_HTML.gif ). At the 0th time slot, the FH address assigned to the 5th user is 5 according to his/her access order to the system. Therefore, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq165_HTML.gif . User 5 will choose the 2nd cluster of subcarriers out of the 1st group of clusters to transmit. At the 1st time slot, the FH address assigned to this user becomes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq166_HTML.gif . Obviously, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq167_HTML.gif , then he/she will select the 0th cluster of subcarriers out of the 0th group of clusters for transmission at this time. This process continues until one FH sequence of length https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq168_HTML.gif is constructed.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Fig2_HTML.jpg
Figure 2

One example of RNS-assisted two-stage hopping strategy.

3.2. Multistage Algorithm

The multistage algorithm is an extension of the two-stage algorithm. Introducing the multistage algorithm cannot only enhance the flexibility of the pattern design, but also strengthen the robustness of the entire FH scheme. We describe the multistage algorithm assuming an independent hopping scheme with each user employing the same number of subcarriers, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq169_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq170_HTML.gif . The steps involved in the multistage algorithm correspond to the following.
  1. (1)

    If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq171_HTML.gif can be written as a product of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq172_HTML.gif pairwise relative primes, for example, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq173_HTML.gif , we can first group https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq174_HTML.gif subcarriers into https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq175_HTML.gif groups with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq176_HTML.gif subgroups in each group. Then, we index the first-stage groups from 0 to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq177_HTML.gif .

     
  2. (2)

    Index the second-stage groups in each first-stage group from 0 to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq178_HTML.gif . Then group the subcarriers in each second-stage group into https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq179_HTML.gif subgroups.

     
  3. (3)

    Similar steps continue on until all of the subcarriers are grouped and indexed at the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq180_HTML.gif th-stage.

     
  4. (4)

    At the 0th time slot, assign integer set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq181_HTML.gif to user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq182_HTML.gif as its FH addresses, where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq183_HTML.gif is its access order to the system, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq184_HTML.gif .

     
  5. (5)

    If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq185_HTML.gif , then user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq186_HTML.gif first selects the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq187_HTML.gif th second-stage group out of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq188_HTML.gif th first-stage group, then similar selecting procedures continue on until the subcarrier at the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq189_HTML.gif th-stage has been extracted out for transmission.

     
  6. (6)

    The process in step 5 is repeated on the other elements in the integer set of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq190_HTML.gif until https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq191_HTML.gif subcarriers have been extracted out for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq192_HTML.gif to transmit.

     
  7. (7)

    At the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq193_HTML.gif th time slot, assign integer set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq194_HTML.gif as the current FH addresses of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq195_HTML.gif and repeat steps 5-6.

     
  8. (8)

    Repeat steps 4–7 until one mutually orthogonal FH pattern is obtained.

     
  9. (9)

    If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq196_HTML.gif can be expressed as products of other combinations of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq197_HTML.gif pairwise relative primes, for example, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq198_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq199_HTML.gif different orthogonal FH patterns can be obtained by repeating steps 1–8, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq200_HTML.gif times.

     
It is easy to visualize the multistage algorithm by using a tree diagram. An example is given in Figure 3. Here, 30 users access the system ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq201_HTML.gif ); a total of 30 subcarriers are used, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq202_HTML.gif . Two specific examples are illustrated as follows: (1) consider user 2. The subcarriers used by this user at the 0th time slot can be calculated as follows: https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq203_HTML.gif ; that is, in the 0th first-stage group, the 2nd subcarrier out of the 2nd second-stage group is selected for transmission. This is indicated with a solid line in Figure 3; (2) consider user 27. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq204_HTML.gif ; that is, in the 1st first-stage group, the 2nd subcarrier out of the 0th second-stage group is selected by the 27th user for transmission at the 0th time slot. This is indicated with a dashed line in the figure. This procedure continues until an FH sequence of length https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq205_HTML.gif is completed. We should note that in this example, the system is fully loaded ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq206_HTML.gif ). For https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq207_HTML.gif , each user is assigned a set of FH addresses rather than one unique FH signature. For example, consider user 2 in Figure 3, the 2nd subcarrier occupied by user 2 at the 0th time slot is determined starting from his/her current FH address https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq208_HTML.gif and following the steps as before. These steps are repeated until https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq209_HTML.gif subcarriers for user 2 are identified. Extrapolating the procedure across the time axis, an entire FH sequence of length https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq210_HTML.gif is designed.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Fig3_HTML.jpg
Figure 3

One example of RNS-assisted multistage hopping strategy.

With respect to the design procedures, the major difference between independent hopping and cluster hopping is the following: in independent hopping, each FH address specifies a single subcarrier that can be used. Therefore, if users have very high bandwidth/rate or other QoS requirements, multiple FH addresses can be given to accommodate. In cluster hopping scenario, a user may demand only one unique FH address as a single address completely specifies all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq211_HTML.gif subcarriers required for transmission. Fully loaded independent hopping system is a special case of cluster hopping with one subcarrier in each cluster.

From Figures 2 and 3, it is evident that the proposed RNS-FH patterns guarantee the orthogonality among different users within a cell. That is, users within the same cell will not interfere with each other when they simultaneously access the system. The next example, which is shown in Figure 4, demonstrates that if different RNS-FH patterns are assigned to adjacent cells, intercell interferences can be perfectly averaged. In this example, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq212_HTML.gif is set to 10 while the moduli sets used to construct FH patterns in cells 1 and 2 are https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq213_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq214_HTML.gif , respectively. From Figure 4, it is evident that every user in cell 1 experiences interference from different users from cell 2 during each of his/her hops. For example, in the first OFDM symbol duration, user 1 in cell 1 is interfered by user 8 from cell 2; in the next OFDM symbol slot, user 1 is interfered by user 5 from cell 2 and so on. In general, users from different cells collide only once during a frequency hopping cycle under the proposed scheme. Therefore, full interference diversity is exploited in the case of RNS-FH patterns.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Fig4_HTML.jpg
Figure 4

Two different FH patterns are given and their only collision point is highlighted.

The properties of the proposed RNS-FH patterns can be summarized as follows.
  1. (1)

    At most, a size of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq215_HTML.gif mutually orthogonal FH pattern can be obtained for the independent hopping scheme. The size becomes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq216_HTML.gif for the cluster hopping.

     
  2. (2)

    If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq217_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq218_HTML.gif ) can be written as a product of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq219_HTML.gif pairwise relative primes, then at least, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq220_HTML.gif different RNS-FH patterns can be obtained.

     
  3. (3)

    With the use of the same moduli set, for independent hopping, RNS-FH patterns constructed after https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq221_HTML.gif frames ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq222_HTML.gif for cluster hopping) are actually periodical extensions of the RNS-FH pattern designed during the first https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq223_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq224_HTML.gif ) frames.

     
  4. (4)

    With knowledge of moduli and residue, the base station can regenerate the entire RNS-FH pattern using the CRT.

     

3.3. Comparison with [11]

In this section, we compare our proposed RNS-FH pattern design method with the technique presented in [11] (which also considers RNS as the design metric).

First of all, although both strategies (one proposed here and the other presented in [11]) use the RNS arithmetic as a basis, the mechanisms of determining the hopping sequence are different. In [11], the FH scheme can be visualized as a "top-down" approach where a given bandwidth is divided into multiple candidate subcarriers in multistages according to the predetermined moduli set (see [11, Figure 2]). That is, the choice of the moduli set (top level decision) determines the number of subcarriers that can be used (bottom level decision) for hopping. This scheme is driven in conjunction with MFSK-modulated signals and a reference register https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq225_HTML.gif , which has the same length as the moduli set ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq226_HTML.gif ), providing reference to each user in order to enable synchronous transmission. However, in our work, we assume that the division of the frequency bandwidth has already been done in advance. That is, the number of subcarriers that can be used for hopping is given (bottom level decision). Based on this number, we employ a proper moduli set to group and index each of the candidate subcarriers (top level decision). Therefore, we can interpret our proposed initialization process as a "bottom-up" approach (see Figure 3). It is important to note that in practical OFDMA cellular systems, the division of the bandwidth within a cell is usually fixed and predetermined (e.g., 1024 subcarriers). Therefore, our "bottom-up" approach is more suitable for such practical systems. Furthermore, unlike the length- https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq227_HTML.gif reference register https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq228_HTML.gif that is used in [11], the FH scheme proposed in this paper invokes the use of only a length-one register to store the time index which in turn can be used to calculate current FH address of each user at the base station.

Secondly, for reducing intercell interference, [11] suggests the use of different moduli sets for adjacent cells. Since the choice of the moduli set determines the number of subcarriers used for hopping, a different moduli set in adjacent cells will result in different number of subcarriers in adjacent cells. If the total bandwidth is the same for all cells, this approach translates into subcarriers in adjacent cells having different bandwidths. This may be an unrealistic assumption for practical OFDMA systems. If the method in [11] is applied to a practical scenario using fixed number of subcarriers (each with the same bandwidth), high intercell interference will result (as shown in Figure 8). Our proposed "bottom-up" approach does not suffer from this drawback as it is built on the premise that the number of subcarriers and their bandwidths are fixed across cells.

In summary, the method proposed in this work is flexible and well suited for practical OFDMA cellular systems.

4. Simulation Results

Parameters of the simulated system are provided in Table 1. The cyclic prefix within one OFDM symbol duration is assumed long enough to eliminate ISI (intersymbol interference). Two 6-ray channel pulse responses are considered following the UTRA vehicular test environment [16]. In Figure 5, the correlation functions of these two channels are plotted versus the variation of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq229_HTML.gif , while https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq230_HTML.gif slot and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq231_HTML.gif . From Figure 5, we can conclude that if small hopping intervals occur frequently in an FH pattern, Veh B can provide more frequency diversity than Veh A.
Table 1

System parameters.

Transmission BW

5 MHz

Carrier frequency

2 GHz

OFDM symbol duration

100  https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq232_HTML.gif s

CP duration

10  https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq233_HTML.gif s

Tone spacing

11 KHz

FFT size

128

Occupied subcarriers

110

Channel impulse response

Veh A/Veh B

Channel coding

1/2 convolutional code

Modulation

QPSK

Time slots

10

https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Fig5_HTML.jpg
Figure 5

Channel correlation function.

Theoretical (see (10) and (12) and simulated expected number of collisions per symbol in RNS-FH OFDMA are given in Figure 6. The high collision probability severely limits the number of active users that can be simultaneously supported by the FH system.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Fig6_HTML.jpg
Figure 6

Expected number of collisions per symbol versus the number of users.

In Figure 7, bit error rate (BER) versus SNR of RNS-FH OFDMA under both cluster and independent hopping is plotted. The main objective of this example is to characterize the effects of frequency diversity exploited by RNS-FH patterns on system performance. Here, we assume that 10 users are in the system with 11 subcarriers assigned to each via the two-stage RNS hopping strategy. For cluster hopping, the moduli set used is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq234_HTML.gif , while for independent hopping, it is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq235_HTML.gif . It is observed that both independent and clustered RNS-FH OFDMA dramaticallyoutperforms the regular OFDMA scheme without hopping in both Veh A and Veh B environments. Another observation is that under both independent and cluster hopping, the system performs better in Veh A. That is, in the proposed RNS-FH patterns, large hopping intervals occur more frequently than small hopping distances. This characteristic is very important since it reveals that users occupy a wide bandwidth during a small fraction of all hops. Furthermore, since independent hopping scheme results in a much larger FH pattern than cluster hopping, more frequency diversity can be exploited in the independent hopping case. This is also clearly reflected by the simulation results shown in Figure 7. For example, at a BER level of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq236_HTML.gif , nearly 8 dB gain is offered by independent hopping relative to cluster hopping in Veh A environment.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Fig7_HTML.jpg
Figure 7

BER versus SNR of RNS-FH OFDMA under cluster and independent hopping with different channel conditions. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq237_HTML.gif .

https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Fig8_HTML.jpg
Figure 8

Intercell interference-to-signal power ratio for given users under different RNS-FH patterns and identical RNS-FH patterns assignments across cells.

Figure 8 quantifies the intercell interferences experienced by different users in the cell of interest, averaged across time. The https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq238_HTML.gif -axis represents the indices of the users within the cell of interest while the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq239_HTML.gif -axis characterizes the time-averaged intercell interference-to-signal power ratio for a given user. Two situations are considered: (1) different RNS-FH patterns are allocated to the cell of interest and the interfering cell (denoted by the solid line); (2) the same RNS-FH pattern as the cell of interest is assigned to the interfering cell (denoted by the dashed line). Here, we model the intercell interference as additive Gaussian-distributed distortion. Therefore, in scenario (1), users in the cell of interest will experience different interferences from the interfering cell across all hops, which in turn induces interference diversity. Figure 8 clearly demonstrates that by employing the proposed method (i.e., allocating a different RNS-FH pattern to the interfering cell), the intercell interference floor can be significantly lowered relative to the scenario where all cells employ identical RNS-FH patterns.

Figures 9 and 10 show the effects of intercell interference diversity on system performance. BER versus signal-to-interference ratio (SIR) is plotted under cluster and independent hopping in Figures 9 and 10, respectively. For cluster hopping, the FH pattern assigned to the interfering cell is constructed by using https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq240_HTML.gif while it is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq241_HTML.gif for the independent hopping scenario. We simulate the case where the same RNS-FH pattern used in the cell of interest is assigned to adjacent interfering cells. Thus, users in the cell of interest will be affected by the same interferences from adjacent cells during all hops. Therefore, no interference diversity is exploited. Simulation results also reflect this feature. When the same RNS-FH pattern is assigned, frequency diversity as a result of hopping reduces the interference floor. Therefore, the no hopping case still exhibits the worst BER performance. When different patterns are allocated to interfering cells, the interference diversity along with frequency diversity further improves system BER performance. For example, in cluster hopping (Figure 9), with different pattern assignments, nearly 3 dB gain at a BER level of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq242_HTML.gif is achieved relative to the system employing identical hopping. This gain grows to 5 dB under independent hopping scenario (Veh B environment).
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Fig9_HTML.jpg
Figure 9

BER versus SIR of RNS-FH OFDMA under cluster hopping with different channel conditions. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq243_HTML.gif .

https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Fig10_HTML.jpg
Figure 10

BER versus SIR of RNS-FH OFDMA under independent hopping with different channel conditions. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq244_HTML.gif .

BER versus user loads is plotted in Figures 11 and 12 under cluster and independent hopping, respectively, in both Veh A and Veh B. Effects of frequency and interference diversities on system performance are explored at given SNR and SIR. It is evident that the system throughput can be significantly enhanced by assigning different RNS-FH patterns to different cells, while it is severely limited if no hopping occurs. Furthermore, the performance gap between the identical hopping and the different hopping decreases with the increase in user loads. That is, the benefit of intercell interference diversity is greater for lower user loads.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Fig11_HTML.jpg
Figure 11

BER versus user loads of RNS-FH OFDMA under cluster hopping with different channel conditions, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq245_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq246_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq247_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq248_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq249_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq250_HTML.gif .

https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Fig12_HTML.jpg
Figure 12

BER versus user loads of RNS-FH OFDMA under independent hopping with different channel conditions, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq251_HTML.gif .

Figure 13 illustrates that by increasing the cluster size (the number of subcarriers in one cluster), or the number of active users, the number of collisions increases. This in turn induces degradation in BER performance as can be seen from Figure 13.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Fig13_HTML.jpg
Figure 13

Performance of cluster-hopped RNS-FH OFDMA with different cluster sizes and different number of active users, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq252_HTML.gif .

Finally, we compare our proposed RNS-FH pattern design strategy with state-of-the-art FH pattern designs. Specifically, our benchmark for comparison is the Latin squares (LSs-)-aided FH pattern design presented in [6]. In our proposed RNS-FH pattern, the spacing between hops in time and frequency is far enough that subcarriers employed in a single time slot are weakly correlated. This feature provides remarkable performance improvements that are consistent across all cells. However, in Latin squares (LSs-)-aided FH pattern design, performances in different cells may vary a lot. Relative comparisons are given in Figure 14, where two Latin squares-based FH patterns https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq253_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq254_HTML.gif [6] are employed. In LS https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq255_HTML.gif , smaller hops happen more frequently, and for such smaller hops, Veh B exploits more frequency diversity than Veh A. The opposite is also true for LS https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq256_HTML.gif . Using simulation results, we first observe that in RNS-aided FH-OFDMA, different RNS-FH patterns provide nearly the same BER performance, while it varies a lot in LS-aided FH-OFDMA; the second observation is that our proposed RNS-FH patterns have similar BER performances to LS https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq257_HTML.gif while outperforming LS https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq258_HTML.gif . Although there may exist LS-aided FH pattern that has better performance than the proposed scheme, the performance variations in LS-aided FH pattern design really limit their applications.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_Fig14_HTML.jpg
Figure 14

Performance of independent-hopped RNS-FH OFDMA versus LS-FH OFDMA, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq259_HTML.gif , LS https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq260_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq261_HTML.gif are used, different moduli sets https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq262_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq263_HTML.gif are applied to construct RNS-FH patterns, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F263695/MediaObjects/13638_2008_Article_1621_IEq264_HTML.gif .

5. Conclusions

In this paper, we propose an RNS arithmetic-based FH pattern design that is well suited and easy to implement for practical OFDMA cellular systems. RNS-FH patterns not only guarantee zero collision within a cell, but also average the intercell interferences by assigning different FH patterns to adjacent cells. Additionally, by having a large spacing between the hopping frequencies, the RNS-FH patterns exploit frequency diversity effectively and provide significant improvement in BER performance. The BER performance gain is consistent across all cells unlike other FH pattern design schemes such as the LS-based method where wide performance variations are observed across cells. Simulation experiments demonstrate the superior performance of the RNS-FH scheme in terms of frequency diversity and intercell interference diversity under both independent and cluster hopping strategies.

Authors’ Affiliations

(1)
Department of Electrical & Computer Engineering, Kansas State University

References

  1. Gault S, Hachem W, Ciblat P: Performance analysis of an OFDMA transmission system in a multicell environment. IEEE Transactions on Communications 2007, 55(4):740-751.View Article
  2. Simon MK, Omura JK, Scoltz RA, Levitt BK: Spread Spectrum Communications. Computer Science Press, Rockville, Md, USA; 1985.
  3. Scholand T, Faber T, Seebens A, et al.: Fast frequency hopping OFDM concept. Electronics Letters 2005, 41(13):748-749. 10.1049/el:20050644View Article
  4. Kurt T, Deliç H: On symbol collisions in FH-OFDMA. Proceedings of the 59th IEEE Vehicular Technology Conference (VTC '04), May 2004, Milan, Italy 4: 1859-1863.
  5. Kurt T, Deliç H: Space-frequency coding reduces the collision rate in FH-OFDMA. IEEE Transactions on Wireless Communications 2005, 4(5):2045-2049.View Article
  6. Stamatiou K, Proakis JG: A performance analysis of coded frequency-hopped OFDMA. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC '05), March 2005, New Orleans, La, USA 2: 1132-1137.
  7. Maric SV, Moreno O: Using costas arrays to construct frequency hop patterns for OFDM wireless systems. Proceedings of the 40th IEEE Conference on Information Sciences and Systems (CISS '06), March 2007, Princeton, NJ, USA 505-507.
  8. Wang C, Zhang X, Yang D: Evaluation of welch-costas frequency hopping pattern for OFDM cellular system. Proceedings of the 18th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '07), September 2007, Athens, Greece 1-5.
  9. Li T, Ling Q, Ren J: A spectrally efficient frequency hopping system. Proceedings of the 50th IEEE Global Telecommunications Conference (GLOBECOM '07), November 2007, Washington, DC, USA 2997-3001.
  10. Popovic BM, Li Y: Frequency-hopping pilot patterns for OFDM cellular systems. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2006, E89-A(9):2322-2328. 10.1093/ietfec/e89-a.9.2322View Article
  11. Yang L-L, Hanzo L: Residue number system assisted fast frequency-hopped synchronous ultra-wideband spread-spectrum multiple-access: a design alternative to impulse radio. IEEE Journal on Selected Areas in Communications 2002, 20(9):1652-1663. 10.1109/JSAC.2002.805059View Article
  12. Chen J, Lv T, Zheng H: Joint cross-layer design for wireless QoS content delivery. Proceedings of IEEE International Conference on Communications (ICC '04), June 2004, Paris, France 7: 4243-4247.
  13. Proakis JG: Digital Communications. 4th edition. McGraw Hill, New York, NY, USA; 2001.
  14. Watson KW, Hastings CW: Self-checked computation using residue arithmetic. Poceeding of the IEEE 1966, 54(12):1920-1931.View Article
  15. Yang L-L, Hanzo L: Redundant residue number system based error correction codes. Proceedings of the 54th IEEE Vehicular Technology Conference (VTC '01), October 2001, Atlantic City, NJ, USA 3: 1472-1476.
  16. ETSI TR 101 112, UMTS 30.03, V3.1.0, Annex B, Std.

Copyright

© D. Zhu and B. Natarajan. 2009

This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.