- Research
- Open Access

# A review on synchronous CDMA systems: optimum overloaded codes, channel capacity, and power control

- Seyed Amirhossein Hosseini
^{1}Email author, - Omid Javidbakht
^{1}, - Pedram Pad
^{1}and - Farrokh Marvasti
^{1}

**2011**:62

https://doi.org/10.1186/1687-1499-2011-62

© Hosseini et al; licensee Springer. 2011

**Received:**13 December 2010**Accepted:**16 August 2011**Published:**16 August 2011

## Abstract

This paper is a tutorial review on important issues related to code-division multiple-access (CDMA) systems such as channel capacity, power control, and optimum codes; specifically, we consider optimum overloaded codes that achieve errorless transmission in the absence of noise for the binary and nonbinary cases. A survey of lower and upper bounds for the sum channel capacity of such systems is given in the presence and absence of channel noise. The asymptotic results for the channel capacity are also investigated. The channel capacity, errorless transmission codes, and power estimation for near-far effects are also explored. The emphasis of this tutorial review is on the overloaded CDMA systems.

## Keywords

- Code Division Multiple Access (CDMA)
- Optimum codes
- channel capacity bounds
- near-far effects
- power control

## I Introduction

code-division multiple access (CDMA) has been the most important multiple access technology for the 3rd generation GSM and American Cellular systems [1]. Optical CDMA systems have become an alternative multiple access for fiber optics and optical wireless systems [2–4].

In CDMA systems, each user is assigned a unique code signature that consists of a number of chips. The signature length (also called chip rate) is defined as the number of chips in each signature code. Each user signature is multiplied by the respective data, and the transmitted vectors are added up in the common channel. The resultant vector is then observed at the received user end. In order to decode the received signal, the detector of the received user should know its own unique signature. These codes should be designed such that the cross-correlations between the code of the desired user and the codes of the other users are minimal.

For the wireless case, the most well-known binary (Endnote a) code for the synchronous case is Hadamard orthogonal code that is appropriate for fully and under-loaded CDMA systems. (Endnote b) But because of bandwidth limitation in the communication systems, we are interested in finding codes that can support more users than the chip rate (overloaded case). In the overloaded case, we cannot use Hadamard codes; Even random codes create interference that cannot be eliminated completely [5–7]. Optical orthogonal codes (OOC) [3, 8] are not really orthogonal; however, using interference cancelation, we can remove interference completely. Most of the research in the overloaded case is related to code design and multi-access interference (MAI) cancelation in order to decrease the probability of error. Examples of these types of codes are pseudo random spreading [9, 10], Welsh Bound Equality (WBE) codes with minimal total square correlation (TSC) [11–14], OCDMA [15–17], Multiple-OCDMA [18], and PN/OCDMA [19] signature sets. None of the above codes guarantee errorless transmission in the absence of channel noise for overloaded CDMA systems. There are also some codes that are not designed upon cross-correlation and are designed such that they can provide one-to-one transformation such as codes for overloaded wireless (COW) and codes for overloaded optical (COO) codes [20–23]. By using these codes, we can achieve errorless transmission in the absence of channel noise for highly overloaded systems. The general case where both signature matrices and input vectors are complex is also discussed in [20, 21].

The decoding process of CDMA systems is more complex than the decoding of single user transmission systems. Since the transmitted signal is constructed upon a specific combination of all user data, multi user detection (MUD) is needed to decode the received vector. In MUD, the data of each user are extracted from the received vector at the receiver end, [24]. A popular method for MUD is maximum likelihood (ML) decoding where the received vector is compared with all possible input vectors and the most probable one is chosen as the transmitted vector.

There are many comprehensive theorems for capacity regions of multiple access channel (MAC), but the capacity region is not known in terms of specific model parameters. The capacity region includes a set of information rates such that simultaneous reliable communication is possible for each user. This problem was developed by Ahlswede [25, 26] and Liao [27] on a two-user discrete memoryless channel. Cover [28, 29] and Wyner [30] obtained an explicit expression for the capacity region of the Gaussian discrete memoryless MAC. In [31], Verdu found the capacity of the CDMA channel as a function of cross-correlation between the assigned signature waveforms and their signal-to-noise ratios (SNRs) for the symbol synchronous case and for inputs with power constraints. The same author [32] found the capacity region for symbol asynchronous case for Gaussian distributed inputs with power constraints; in these two papers, Verdu showed that the achievable rates depend only on the correlation matrix of the spreading coefficients. He discussed about the complexity of MUD receivers in his book [5]. The analysis of spectral efficiency (defined as bits per chip that can be transmitted reliably) for linear detector is done in [33]. For finite number of users and real inputs and signatures, an upper bound for the sum capacity has been defined in [34]. The extension of the sum capacity bounds for asymmetric user power constraint is given in [35]. In [36], the authors have found lower and upper bounds for spectral efficiency (defined as the sum capacity by the authors) under quasi-static fading environments, channel estimation, and training sequences; the bound evaluations are based on the works of [37, 38]. Another important issue is to obtain lower and upper bounds for the sum capacity in the asymptotic case, where the number of users (*n*) and the number of chips (*m*) go to infinity while *n/m* are constant. Tanaka obtained a formula for the normalized sum capacity by applying the replica method from statistical physics to this problem [39]. Tanaka evaluated the performance of a class of CDMA MUD in the large scale system limit analytically. These results were later extended in [24] to include unequal powers and fading channels. In [40, 41], progress was made toward a rigorous derivation of Tanaka's capacity formula. In [42], the authors have shown that, for large systems, the capacity concentrates around its mean, i.e., a random signature matrix results in a capacity very close to the "mean capacity" with high probability. The same authors in [41] proved that Tanaka's formula is an upper bound to the capacity for all values of the parameters and obtained various concentration theorems for the large scale system. In [20, 21], the authors have found lower and upper bounds for the channel capacity in the general case without using the statistical physics approach for both noiseless and noisy channels. In [43], the same task was performed for the binary case.

Another important issue in a communication system are near-far effects. In a cellular network, every user has a different distance from the base station, which makes the received power for each user to be different from each other. These phenomena are called the near-far effects. Most of the works on the near-far effects in CDMA are related to new methods for decoding such as MMSE in combination with successive interference cancelation (SIC) [44] and blind adaptive interference suppression [45]. In order to combat near-far effects, the method of isolation bit insertion was introduced in [46]. In [47], the authors have found lower and upper bounds for near-far distance of an MMSE detector. These methods depend on estimating the received power for each user. In [48], a new class of codes that are resistant to the near-far effects was presented. Another challenging problem is to derive the channel capacity of CDMA systems in the presence of near-far effects. The authors of [49] have presented lower and upper bounds for the channel capacity of overloaded CDMA systems with near-far effects. Some power control techniques are also used to combat these effects; however, because the techniques are imperfect, the receiver needs to estimate the received power for each user for a proper decoding. This problem becomes more critical in the overloaded case. The channel model that was used in [48, 49] is much worse than what happens in practice since it was proposed that the stochastic process of the power change for each user is a white process; the received value of the power for each user is independent of its value in any other time index. Nevertheless, in practice, the user powers vary slowly in comparison with the data rate. In [50], a new method has been presented in order to estimate the power of each user. The only information at the receiver is the signature matrix. The authors have assumed that the receiver knows the covariance matrix of noise. However, they have also showed that even without knowing the covariance matrix of noise, the power of each user can be calculated. But in this case, the maximum allowable number of users decreases. An iterative power estimating method was used in [50]. In each iteration, they extracted the estimated power obtained from the previous power estimation.

The organization of this tutorial review is as follows: In Section II, we take a look at generalized codes for overloaded wireless (GCO) which guarantee errorless transmission in an ideal channel and propose an ML decoding scheme for a special class of these codes. In this section, we will also survey the most popular case when the signature matrices and input vector entries are binary including active user detection. (Endnote c) In Section III, we will review the evaluation of the channel capacity of CDMA systems with and without channel noise. The asymptotic case will also be considered in this section. In Section IV, we will review a code that can support errorless transmission with the near-far effects. The channel capacity lower and upper bounds are also reviewed in the same section with near-far effects. Also in the same section, we will consider the received user power estimation for the highly over loaded CDMA systems. The summary, conclusion, and future works are in Section V.

## II Introduction to optimum codes for CDMA transmission

For combating the problem of bandwidth limitation in wireless and optical CDMA systems, we are interested to use optimum codes with a large overloading factor. In this section, we will review such signature codes for different cases. In the first part, the most general case is considered. In this case, the signature entries and input alphabets are completely arbitrary (real or complex) [20, 21]. But in real communication systems, we deal with more practical applications, and therefore, some special cases such as the binary input and binary signature CDMA systems [22] and the codes being able to detect the active users in a CDMA system [23] are considered. We will also take a brief look at CDMA systems with WBE (Welsh Bound Equality) codes that are optimum for analog inputs [11]. At the end of this section, the ML detection algorithms for the signature codes are presented.

### A Generalized codes for overloaded wireless CDMA systems

In this section, we will study a general class of optimum signature codes for CDMA transmission in an overloaded system. Optimality implies that such codes should provide errorless transmission in the absence of additive noise. In order to explain how these codes are optimum, a geometric interpretation of the transmission system is used. Assume that the number of users and chips are *n* and *m*, respectively; for the overloaded case, *n > m*. The signature code is thus an *m* × *n* matrix, and the noiseless channel expression for this transmission is represented by *Y* = **C** *X* where *X* is the *n* × 1 user input vector, *Y* is the *m* × 1 received vector, and **C** is the *m* × *n* signature matrix. Furthermore, assume that the inputs are from a given set $\mathcal{I}$ and the signature entries are taken from the given set $\mathcal{S}$. The *n*-dimensional user vector consisting of the user entries taken from the set ${\mathcal{I}}^{n}$ can be represented as vertices of a hypercube. This hypercube is mapped into an *m*-dimensional space since it is multiplied by the *m* × *n* signature matrix. In order for the transmission to be errorless, this mapping has to be one-to-one. Such matrices are called $GCO\left(m,n,\mathcal{I},\mathcal{S}\right)$, and we will find *m* and *n* such that $GCO\left(m,n,\mathcal{I},\mathcal{S}\right)$ codes exist. The following theorem shows a construction method for GCO matrices, which is proved in [20, 21].

By defining ${\stackrel{\u0303}{I}}_{m}$ to be the first *m -* 1 columns of the *m* × *m* identity matrix **I** _{
m
}, ${\stackrel{\u0303}{J}}_{m}$ to be the first *m -* 1 columns of the *m* × *m* all one matrix **J** _{
m
}, ${\stackrel{\u0303}{K}}_{m}$ to be $2{\stackrel{\u0303}{I}}_{m}-{\stackrel{\u0303}{J}}_{m}$ and ${\stackrel{\u0303}{0}}_{m}$ to be the first *m -* 1 columns of the *m* × *m* zero matrix **0** _{
m
}, the following theorem shows a general method for constructing GCO matrices

**1**For integer sets of $\mathcal{I}$, $\mathcal{S}$ assume that

**C**is a $GCO\left(m,n,\mathcal{I},\mathcal{S}\right)$ matrix,

**H**

_{ w }is a

*w*×

*w*Hadamard matrix, and

*k*is an integer number. Also, suppose that $\pm k\mathcal{S}\subset {\mathcal{S}}^{\prime}$ and

*d*is the largest nonzero integer such that $\frac{\mathcal{I}-\mathcal{I}}{d}\subset \mathbb{Z}$. If

**M**

_{1},

**M**

_{2},...,

**M**

_{ w }are matrices with entries from ${\mathcal{S}}^{\prime}$ such that ${\sum}_{i=1}^{w}{M}_{i}=t{I}_{m}$ where

*t*is any integer, then the following matrix

**B**is a $GCO\left(wm,wn+m,\mathcal{I},{\mathcal{S}}^{\prime}\right)$ matrix (Endnote d)

**B**is a $GCO\left(wm,wn+m,\mathcal{I},{\mathcal{S}}^{\prime}\right)$ matrix if

Since the creation of large GCO matrices is very complicated, in [20, 21], a method was introduced to create large sized GCO matrices from smaller ones. This method is presented below:

Theorem **2** If **A** is a $GCO\left(m,n,\mathcal{I},\mathcal{S}\right)$ matrix and **P** is a *w* × *w* invertible matrix with entries belonging to the set $\mathcal{R}$, then **P** ⊗ **A** is a $GCO\left(mw,nw,\mathcal{I},\mathcal{S}\cdot \mathcal{R}\right)$ matrix where $\mathcal{S}$. $\mathcal{R}$ is a set of all products of the elements of $\mathcal{S}$ and $\mathcal{R}$.

So far, the existence of such GCO codes has been shown, and matrices with specific overloading factors have been derived. But we can find signature matrices that can support a much larger number of users while the transmission is still errorless in the absence of noise. However, the number of users cannot exceed a maximum value because the vertices of the *n*-dimensional hypercube cannot be mapped to disjoint points. In [20, 21], the authors have shown an inequality that introduces an upper bound for the number of users for a GCO matrix with a fixed number of chips:

**3**If there exists a $GCO\left(m,n,\mathcal{I},\mathcal{S}\right)$, then

where ℙ(*Y*_{1} = *l*) is equal to the number of solutions of equation ${\sum}_{j=1}^{n}{a}_{j}{X}_{j}=l$ in $\mathcal{I}$, divided by $|\mathcal{I}{|}^{n}$.

### B Codes for overloaded wireless and optical CDMA

As mentioned earlier, practical communication systems predominantly use binary input and signature alphabets. We can apply the previous theorems to the binary case. In the wireless case, COW and in the optical case, COO CDMA systems are studied in [22]. In overloaded CDMA systems with binary inputs, we can use COW/COO signature matrices. By using these binary matrices, we can achieve errorless transmission in the absence of noise.

It can be shown that there exists an *m* × *n* COO matrix for the optical CDMA if there is an *m* × *n* COW matrix for wireless CDMA just by substituting all *-* 1 entries of the COW matrix by 0 [22]. Thus, from now on, we will only discuss the COW matrices. Since the signature matrix **C** must be one-to-one, the necessary and sufficient condition is that Ker**C** ∩ {*-* 1, 0, 1} ^{
n
} = {0} ^{
n
} , where Ker**C** is the null space of **C**.

The authors of [22] have applied Theorem 2 in order to develop a large COW matrix from a smaller one. In this case, the matrix **C** is an *m* × *n* COW matrix and **T** is an invertible *k* × *k* matrix. Thus, **C** ⊗ **T** is a *km* × *kn* COW matrix, where the overloading factor remains constant. However, the following theorem shows the existence of COW matrices with much higher overloading factor [51].

**4**Assume that

**C**is an

*m*×

*n*COW matrix and ${H}_{2}=\left[\begin{array}{c}+1\phantom{\rule{2.77695pt}{0ex}}\phantom{\rule{2.77695pt}{0ex}}+1\\ +1\phantom{\rule{2.77695pt}{0ex}}\phantom{\rule{2.77695pt}{0ex}}-1\end{array}\right]$ and

**V**

_{2}

*m*×(

*m -*1) = [

*v*

_{ ij }] such that

Then, **D** = [**H**_{2} ⊗ **C V**] is an 2*m* × (2*n* + *m -* 1) COW matrix.

By applying the above method on **C**_{4 × 5} COW matrix four times, a large overloaded signature matrix **C**_{64 × 193} is created.

where $\left(\begin{array}{c}\hfill n\hfill \\ \hfill i\hfill \end{array}\right)=\frac{n!}{i!\left(n-i\right)!}$.

### C Codes for analog input CDMA systems

So far, we have studied overloaded CDMA systems with finite input alphabets. But there is also a different class of CDMA systems with analog inputs. It is obvious that special signature codes are necessary for such systems. These codes are called Welsh bound equality (WBE) codes and can be also used for binary inputs (BWBE). It is shown that the capacity in such systems is maximized when the input has Gaussian distribution and the users have equal power [52]. According to a criterion called total squared correlation (TSC) [12], WBE codes have minimum correlation. Many methods have been introduced for constructing WBE codes either in the binary or nonbinary cases. In [11] it has been shown how to build large size Generalized WBE (GWBE) codes from smaller ones.

Two definitions of GWBE matrices are used in [11], namely a definition based on sum capacity and a definition based on TSC. Using these two definitions, we can derive another theorem, similar to Theorem 2 where large size GWBE codes can be constructed from small ones.

Theorem **5** If **S** is an *m*_{1} × *n*_{1} GWBE matrix (*n*_{1}*> m*_{1}) for a CDMA system with user powers *p*_{
i
} 's, and **T** is an *m*_{2} × *n*_{2} GWBE matrix (*n*_{2}*> m*_{2}) with user powers *q*_{
j
} 's, then **S** ⊗ **T** is an *m*_{1}*m*_{2} × *n*_{1}*n*_{2} GBWE matrix for a CDMA system with user powers *p*_{
i
}*q*_{
j
} 's for 1 ≤ *i* ≤ *n*_{1} and 1 ≤ *j* ≤ *n*_{2}.

The theorem was proved for the overloaded case. This method results in a huge reduction in computational complexity since it requires much less computation than the direct construction of such matrices [53]. This algorithm can also be used for the binary input case for constructing BWBE codes.

### D Overloaded CDMA with active user detection (COWDA)

In many communication systems, such as ad-hoc networks [54], identification and localization of active nodes in the neighborhood of the transmitter is an important aspect. In [23], the authors have shown a new class of overloaded codes that not only detects the active users but also provides errorless transmission in a noiseless channel. These codes are called Codes for Overloaded Wireless CDMA with Detection of Active Users (COWDA).

For developing these kinds of codes, the authors of [23] have used the same geometric interpretation as in the COW/COO case. The only difference is that in this case the vertices of the hypercube are taken from the set {0, ±1} ^{
n
} where 0 refers to the nonactive users. Now, a method is presented for creating this kind of signature matrices. The necessary and sufficient condition for the of a COWDA matrix **C** is that Ker**C** ∩ {±2, ±1, 0} ^{
n
} = {0} ^{
n
} . Thus, to find such COWDA matrices, Ker**C** should be compared with 5 ^{
n
} vectors. But in [23], a method was shown in which the number of comparisons is reduced to $\frac{{5}^{\left(n-m\right)}-1}{2}$ if **C** = [**A B**], where **A** is an *m* × *m* invertible matrix and **B** is an *m* × (*n - m*) matrix. The following theorem presents a method to construct large size COWDA matrices from smaller ones:

**6**Assume that

**C**is an

*m*×

*n*COWDA matrix and

**H**

_{4}=

**H**

_{2}⊗

**H**

_{2}and

**V**

_{4m ×(m - 1)}= [

*v*

_{ ij }] such that

Then,, **D** = [**H**_{4} ⊗ **C V**] is an 4*m* × (4*n* + *m -* 1) COWDA matrix

Theorem 2 is also valid for the COWDA case and can be expressed as follows: If **C** is an *m* × *n* COWDA matrix and **T** is an invertible *k* × *k* matrix, then **C** ⊗ **T** is a *km* × *kn* COWDA matrix.

By starting with the COWDA matrix **C**_{16×22} and applying Theorem 6, a 63 × 103 COWDA matrix can be obtained. In [51] the authors have conjectured that the number of users can increase up to 193.

*m*-dimensional space remains the same. The upper bound is found to be [23]:

*-*" denotes

*-*1.

### E ML decoding for finite input CDMA

where *Y* is the *m* × 1 received vector, **C** is the *m* × *n* signature matrix, *X* is the *n* × 1 input vector, and *N* is the *m* × 1 noise vector with Gaussian distribution with zero mean and auto covariance matrix *σ*^{2}**I** _{
m
}. At the receiver, we should search among all possible inputs and find the one which minimizes $\left|\right|Y-C\widehat{X}|{|}^{2}$. As a result, we need to perform 2 ^{
n
} Euclidean distance measurements (for the binary input case) while this number will increase to $|\mathcal{I}{|}^{n}$ for the general case. This decoding method requires a high amount of computations that makes the receiver system very complex.

In order to reduce the complexity of decoding systems, Tensor Decoding Algorithm was used in [22, 23]. This algorithm consists of two main steps that are described below:

*Step 1*: Suppose

**D**

_{km×kn}=

**P**

_{k×k}⊗

**C**

_{m×n}where

**P**is an invertible matrix and

**C**is a COW matrix. Assume the channel model is

*Y*=

**D**

*X*+

*N*, by multiplying both sides of the equation by, $\sqrt{k}\left({P}^{-1}\otimes {I}_{m}\right)$ we obtain,

where ${N}^{\prime}=\sqrt{k}\left({P}^{-1}\otimes {I}_{m}\right)N$. This implies that the first *m* entries of *Y*′ depend on the first *n* entries of *X* and the first *m* entries of *N*; the second *m* entries of *Y'* depend on the second *n* entries of *X* and the second *m* entries of *N* and so on. Consequently, the algorithm was simplified by breaking it down to *p k* smaller decoding problems. If the matrix **P** is Hadamard, the matrix $\sqrt{k}\left({P}^{-1}\otimes {I}_{m}\right)$ will be unitary. As a result, the vector *N'* will have identical properties to *N*. Therefore, the ML decoding of *Y'* will be equivalent to the ML decoding of *Y* .

*Step 2*: The complexity of the decoding algorithm can be decreased further if the COW matrix can be written as **C** = [**A B**], where **A** is an *m* × *m* invertible matrix and **B** is an *m* × (*n - m*) matrix. Thus, *Y* = **C** *X* = **A** *X*_{1} + **B** *X*_{2}, where *X*_{1} and *X*_{2} are *m* × 1 and (*n - m*) × 1 vectors, respectively. It is obvious that *X*_{1} can be written as **A**^{-1}**Y** - **A**^{-1}**B** *X*_{2}. In a noisy channel, we search for *X*_{2} such that || (**A**^{-1}*Y* - **A**^{-1}**B** *X*_{2}) sign(**A**^{-1}*Y* - **A**^{-1}**B** *X*_{2}) || is minimized. Next, we can find *X*_{1} by the equation *X*_{1}= sign(**A**^{-1}*Y* - **A**^{-1}**B** *X*_{2}). Thus, by applying this method, we decrease the number of Euclidean distance measurements from 2^{
n
}to 2^{
n-m
}.

*X*

_{1}is obtained from the following equations: For the

*i*th user, we have

- 1.If
*i*≤*m*$\{\begin{array}{l}{({\widehat{X}}_{1})}_{j}=\phantom{\rule{0.5em}{0ex}}\text{sign}\phantom{\rule{0.5em}{0ex}}(({\mathbf{A}}^{-1}Y-{A}^{-1}B{\widehat{X}}_{2}{)}_{j})\phantom{\rule{0.5em}{0ex}}j=i\\ {({\widehat{X}}_{1})}_{j}=\phantom{\rule{0.5em}{0ex}}\text{softlim}\phantom{\rule{0.5em}{0ex}}(({A}^{-1}Y-{A}^{-1}B{\widehat{X}}_{2}{)}_{j})\phantom{\rule{0.5em}{0ex}}\phantom{\rule{0.5em}{0ex}}\phantom{\rule{0.5em}{0ex}}j\ne i\end{array}$(12)In this case ${\widehat{X}}_{2}$ takes all vectors in {

*-*1, 0, +1}^{k-l}. - 2.If
*i > m*${\left({\widehat{X}}_{1}\right)}_{i}=softlim\left(({A}^{-1}Y-{A}^{-1}B{\widehat{X}}_{2}{)}_{i}\right)$(13)

*-*1, 0, +1} except for the (

*i - m*)th entry which is ±1. In this algorithm, softlimgf is a soft limiter described as follows:

Assume a COW matrix of size (64, 104) with the signature matrix **D** = **H**_{8} ⊗ **C**_{8 × 13} (**H**_{8} is an 8 × 8 Hadamard matrix and **C** is a COW matrix). By using the direct ML decoding, we need to calculate 2^{104} Euclidean distance measurements, but by applying the Tensor Decoding Algorithm, this number reduces to 8 × 2^{5} = 2^{8}.

*L*subsequent transmissions were taken into account simultaneously and a Markov chain was created for these observations. If we assume the input vectors of

*L*subsequent transmissions to be X

_{n×L}= [

*X*

_{1},

*X*

_{2},...,

*X*

_{L}] and Y to be the matrix of the corresponding received vectors, then the decoder will be

^{n×L}and $\overline{f}$ is the

*n*×

*L*dimensional PDF of Y. According to Bayes rule and the fact that the channel is memoryless, we get

This algorithm requires 3^{
nL
}computations which makes it very complex. But in [55], the Viterbi algorithm was used to decrease the complexity. In each step of the algorithm, we have 3 ^{
n
} states. The transition weight from step *i* to step *i*+1 is $\mathbb{P}\left({\stackrel{\u0303}{X}}_{i+1}|{\stackrel{\u0303}{X}}_{i}\right)f\left({Y}_{i+1}|{\stackrel{\u0303}{X}}_{i}\right)$. Thus, 3 ^{
n
} computations are required to find the path with the maximum weight and this task is performed for *L* vectors. As a result, just 3 ^{
n
} 3 ^{
n
}*L* computations are required. It should be noted that $\mathbb{P}\left({\stackrel{\u0303}{X}}_{i+1}|{\stackrel{\u0303}{X}}_{i}\right)$ just depends on the activeness or inactiveness of the user and therefore creates 2 instead of 3 states. Hence, the complexity reduces further to 2 ^{
n
} 3 ^{
n
}*L* computations. In addition, if the signature matrix satisfies the constraints of the first step of the Tensor Decoding Algorithm, the decoding problem can be broken down to several simpler decodings and thus, we need to perform 2 ^{
n
} 2 ^{
m
} 3 ^{
n
} ^{
-m
} computations. The same authors have also introduced three types of suboptimum decoders in order to reduce the amount of delay and memory needed for the decoding system. A low complexity decoding algorithm was also proposed in [56] for another class of signature codes. In the signature matrix introduced in [56], the signature vectors of each user have a hierarchical tree structure where each vector is correlated only with its direct ancestor and descendants, and the number of vectors at the bottom level is equal to the chip rate. It was also shown that if there are equal children emanating from each node in this tree structure, the number of levels of the tree is logarithmic in the number of users and the complexity is bounded by a very low order polynomial in *n*.

*E*

_{ b }

*/N*

_{0}for a 64 × 72 COW matrix. Also, other codes such as random codes, BWBE codes and Hadamard codes are shown on the same figure for comparison. Figure 3 is similar to Figure 2 except for a 64×104 signature code. In these figures, an iterative decoder for random and BWBE codes was used, while the Tensor Decoding Algorithm was applied for the COW case. The use of ML decoders for the BWBE and random codes is not practical. As we see in these figures, BWBE codes perform slightly better than COW codes for

*E*

_{ b }

*/N*

_{0}values less than 10 dB. However, for higher

*E*

_{ b }

*/N*

_{0}values, the performance of COW codes becomes better than BWBE codes. Since the mapping of BWBE codes, unlike the COW codes, is not invertible, for high values of

*E*

_{ b }

*/N*

_{0}(where the behavior of the systems tends to the noiseless case), the BER is saturated to a fixed value. These figures show the fact that for a high overloading factor, the COW codes with their simple ML decoding outperforms codes with iterative decoding. BWBE codes perform better than random codes because of its minimum correlation property. For an overloading factor of 63%, the Hadamard codes are 3 dB better than COW codes.

## III Capacity bounds for CDMA systems

In this section, we will review lower and upper bounds for the channel capacity of CDMA systems. In the first part, we define the concept of sum capacity. In the second part, lower and upper bounds are surveyed for binary and nonbinary CDMA transmission for the noiseless case and in the third part, the extension to the channel additive noise is discussed.

### A Definition of sum capacity

In Multi Access Channels (MAC), additive noise and multi user interference are the main factors that cause disturbance in CDMA transmission. These factors affect the capacity of such channels. In [28], the authors have defined capacity regions to find all achievable transmission rates in such channels. In order to assign a single value as a measure of channel capacity, the sum capacity would be the best choice. The sum capacity is defined as the maximum sum of all user rates that can be achieved and is equal to $\mathsf{\text{ma}}{\mathsf{\text{x}}}_{{p}_{1}\times {p}_{2}\times \cdot \cdot \cdot \times {p}_{n}}I\left({X}_{1},{X}_{2},...,{X}_{n};Y\right)$ where *p*_{
i
} is the input distribution function of the *i* th user.

**A**will be equal to $C\left(m,n\right)=A\in {\mathcal{M}}_{m\times n}\left(\pm 1\right)\phantom{\rule{0.3em}{0ex}}maxC\left(A\right)$, where

*C*(

**A**) is the sum capacity of the channel. For the noisy case, we again use the channel model $Y=\frac{1}{\sqrt{m}}AX+N$. The total power of the users is $tr(E\left(\frac{1}{m}AX{X}^{*}{A}^{*}\right)$ and the noise power is also modeled as $E\left({N}^{*}N\right)$. Thus, the multi user SNR at the receiver is defined in [20, 21] as

*N*are i.i.d. random variables,

*f*(·) is their common probability distribution function (pdf) with variance ${\sigma}_{f}^{2}$. This implies that the overall power at the receiver is equal to $m{\sigma}_{f}^{2}$. If $\frac{m}{n}SNR\le \eta $, we will have

**A**and

*η*, the sum channel capacity will be defined as

such that the above inequality is satisfied.

The authors of [43] have tried to find the lower bounds for both noisy and noiseless channels in binary CDMA systems by choosing a random signature matrix and then derive the expected value of the sum capacity of the channel corresponding to this random matrix. In other words, the lower bound is the average sum channel capacity of a typical signature matrix. According to [41–43], the capacity of a channel with random signature matrix will be higher than the expected value with high probability.

All upper bounds that are derived for noisy and noiseless channels are based upon a conjecture which implies that the input vectors have uniform distribution [43]. In [41], the authors used this conjecture for the special case when the noise has Gaussian distribution. But for the general case, the authors of [43] considered this conjecture to be true for all noise distributions. Although this conjecture looks very simple, it is still an open problem.

### B Noiseless channel capacity bounds

In this subsection, we will take a look at the lower and upper bounds for the sum capacity of general CDMA systems. These bounds are investigated further for several special cases such as COW matrices and active user detection systems. In the noiseless case, multi user interference is the only disturbance that has to be taken into account for CDMA transmission.

#### 1 Lower bounds for the sum capacity of CDMA systems for the noiseless case

*p*and

*π*as follows: Suppose that $\stackrel{\u0303}{\mathcal{I}}$ is the difference set of $\mathcal{I}$ and is defined as:

$\stackrel{\u0303}{p}\left(\cdot \right)$ is defined as a probability on $\stackrel{\u0303}{\mathcal{I}}$ to be the pdf of the difference of two independent random variables from the set $\mathcal{I}$ (the pdf of the random variables from $\mathcal{I}$ has the same distribution *p*(·)). *π*(·) is a probability distribution on $\mathcal{S}$. The probability measure on the signature matrix ${\mathcal{M}}_{m\times n}$ is induced by choosing entries of the random matrix independently and with the same distribution *π*(·).

In [20, 21], a lower bound for the channel capacity for the general case was introduced which is stated in the following theorem:

**7**

where $a\in {\mathcal{S}}^{n}$ and $\stackrel{\u0303}{X}\in {\stackrel{\u0303}{\mathcal{I}}}^{n}$ with i.i.d entries with distributions *π*(·) and $\stackrel{\u0303}{p}\left(\cdot \right)$, respectively.

For the special case, where the input and signature matrix alphabets are finite, a simpler form for the above expression is derived in [20, 21].

Another example could be the case where the input vectors are binary and $\mathcal{S}=\left\{0,\pm 1,...,\pm p\right\}$. The lower bound has been derived in [21, 51].

#### 2 Conjectured upper bounds for the sum capacity of CDMA systems for the noiseless case

In [20, 21], the authors introduced a theorem that presents a conjectured upper bound for the channel capacity in general

**8**In the absence of additive noise, if $\mathcal{I}=\left\{{i}_{1},...,{i}_{q}\right\}$ with distribution

*p*(

*i*

_{ i }) =

*p*

_{ i }and $\mathcal{S}=\left\{{s}_{1},\dots ,{s}_{l}\right\}$, the upper bound is as follows:

where *δ* is the Dirac function and $\mathbb{H}\left(f\right)$ is the entropy of the distribution *f*.

Also, when ${s}_{i}={e}^{\frac{2\pi i}{l}\sqrt{-1}}$ and *l* divides *n*, we conjecture that ${u}_{1}={u}_{2}=\cdot \cdot \cdot ={u}_{l}=\frac{n}{l}$.

*λ*is the unique positive solution of the equation

Another example could be the case where the input vectors are binary and $\mathcal{S}=\left\{0,\pm 1,...,\pm p\right\}$. The upper bound has been derived in [21, 51].

The conjectured upper bound that was introduced in Equation (25) was a special case when the noise variance is zero without restricting the signature to have unity magnitude. Another conjectured upper bound that is more general and does not depend on the symbol alphabet is introduced in [20, 21].

*m*= 64) are plotted versus the number of users. An interesting result that can be drawn from this figure is that the channel capacity increases almost linearly with the number of users until

*n*reaches a certain threshold value

*n*th. In this region, the errorless transmission is achieved and this implies that overloaded signature matrices do exist for these values of

*m*and

*n*. As

*n*goes beyond this threshold value, the lower and upper bounds tend to diverge from each other. This implies that errorless transmission cannot be achieved anymore and multi user interference causes transmission errors. The lower bound for an 8 × 13 COW matrix equals 12:164 bits. This shows the extreme tightness of this bound.

*n*(

*n*= 220). In this figure, we see that as the number of chips increases and before it reaches a certain value

*m*th, the channel is lossy and errorless transmission is not achievable. This is due to the fact that when the number of chips is less than a certain value, the transform of the input vectors into an

*m*-dimensional space is not one-to-one. But as

*m*increases over this threshold value, errorless transmission can be achieved. In this figure, we can also observe that in some regions, the upper bound introduced in (27) and (28) tends to be slightly tighter than the bound introduced in (25).

*m*and

*n*.

*n*and

*m*(small sale system) the sum channel capacity depends on the input and signature alphabets. In Figure 9 and 10, this dependence is shown for different systems with

*m*being equal to 32. In Figure 9, binary signature CDMA systems are considered while in Figure 10 the systems have binary inputs and ternary signatures.

### C Noisy channel capacity bounds

In the presence of noise, not only multi user interference but also additive noise can reduce the sum capacity of the system. In this subsection, lower and upper bounds sum channel capacity bounds with any arbitrary noise distribution are surveyed. However, only the Gaussian noise distribution is discussed in detail.

In the presence of additive noise, the calculation of channel capacity is a challenging problem. In [20, 21], a lower and a conjectured upper bound for the general case is introduced and will be discussed later. Assume **A** = *r* **B** where *r* is a fixed number and **B** is randomly chosen with distribution ${\mathcal{P}}^{\pi}$.

where *μ*_{
p
} and *σ*_{
p
} are the mean and variance of the input distribution *p*(·), respectively, and *μ*_{
π
} and *σ*_{
π
} are the mean and variance of the signature code distribution *π*(·).

#### 1 Lower bounds for the sum capacity of CDMA systems for the noisy case

The authors of [20, 21] presented a theorem to obtain a lower bound for the most general case for any given input and signature matrix symbols and additive noise with arbitrary distribution:

**9**

Here, *q*(·) is any arbitrary function, *N*_{1} is the first entry of the noise vector, *b* and $\stackrel{\u0303}{X}$ are vectors of length *n* with i.i.d. entries of distribution *π*(0) and *p*(0).

*e*and the resulting lower bound is shown below:

For special cases, where the user alphabets of the inputs and the arbitrary signature matrices are finite, a lower bound is presented in [20, 21]. The same authors have also obtained this lower bound for any noise distribution.

*f*and any arbitrary function

*q*:

where *s*_{
k
} is the sum of *k* independent random variables taking ±1 with equal probability.

*q*(

*x*) to be equal to

*- γ*log(

*f*(

*x*)) where

*f*is the pdf of additive Gaussian noise with variance

*σ*

^{2}. Now, suppose we denote the capacity in this case by

*C*

_{ G }(

*m*,

*n*,

*σ*

^{2}), then we have the following family of lower bounds

#### 2 Conjectured upper bounds for the sum capacity of CDMA systems for the noisy case

An upper bound is derived in [20, 21] for a general mode when the user inputs are finite in the presence of noise. However, we just review a conjectured upper bound for a special case where the input vectors and signature matrices are binary (COW) that was introduced in [43]. The following theorem shows this conjectured upper bound:

**10**For any symmetric pdf function

*f*, we have

and *h*(*f*) is the differential entropy of the distribution *f*. For the noiseless case, the usual entropy was used instead of the differential entropy.

*γ*. It can be concluded that for larger values of

*γ*, the capacity of the channel increases.

### D Asymptotic analysis of CDMA systems

*β*) remains constant. The asymptotic case which is also called

*large scale system*[39–42, 57], is being studied by many recent works. The base of these works are related to replica theory derived from statistical physics [39, 58]. In the replica method, a quantity called free energy is used which indicates the cumulative generating function carrying all the information about the statistics of the system and is defined as follows:

This equation does not always yield a unique value for the capacity. This phenomenon is called phase coexistence and it occurs for *β* values greater than 1.49. Tanaka considered the lowest solution to be the actual capacity. Montanari and Tse [40] used a new sparse signature scheme to prove the correctness of Tanaka's capacity for the binary input case for *β* ≤ 1.49, where the above mentioned expression for *t* has unique solution. Furthermore, they proved that for these values of *β*, optimal detection can be achieved using Belief Propagation (BP).

It was shown in [39] that as long as the channel capacity of the Gaussian input system is less than 1, it will be almost equal to the binary input system capacity for large *β*. But, since the binary input system capacity should not exceed 1, the channel capacity saturates in this case to 1, when the equivalent Gaussian input system capacity exceeds 1.

The replica method is nonrigorous and the channel capacities obtained from this method are conjectured. In [41], it is proved that Tanaka's expression is an upper bound for the actual channel capacity for all values of *β* using an interpolation method. The authors of [41] have also proved that the channel capacity for the large system limit (**C**) concentrates to its mean $\left({E}_{S}\left\{C\right\}\right)$[42]. In [40, 42] the authors have also proved that the sum channel capacity is independent of the signature alphabet for large scale systems.

where snr is the single user SNR, *η'* is the multiuser efficiency and $Z=\sqrt{snr}X+\frac{N}{\sqrt{{\eta}^{\prime}}}$.

Finally, it was concluded that for large scale systems, successive decoding with an individually optimal detection front end achieves the CDMA channel capacity with arbitrary inputs. For the special case of Gaussian inputs, the sum channel capacity can be achieved with Minimum Mean Square Error (MMSE) decoding.

Independently, the bounds for the asymptotic sum channel capacity were derived without using the replica method. The following inequality shows the lower bound for the asymptotic sum channel capacity that is derived in [20, 21]:

*b*and $\stackrel{\u0303}{X}$ be vectors of length

*n*with i.i.d. entries of distributions

*π*(·) and $\stackrel{\u0303}{p}\left(\cdot \right)$, respectively. Then

where $\widehat{p}$ the empirical distribution of $\stackrel{\u0303}{p}$, and *λ*_{1}, *λ*_{2} are eigenvalues of the covariance matrix of a random variable which has the distribution of the product of two independent variables with distribution $\widehat{p}$ and *π*, and $D\phantom{\rule{2.77695pt}{0ex}}\left(\cdot \left|\right|\cdot \right)$ is the Kullback-Leibler distance. The term in the limit is the sum capacity lower bound for finite alphabets which is derived in [21].

where *Z* is a Gaussian random variable independent of *N*_{1}. If the additive noise is Gaussian, then *N*_{1} is a Gaussian random variable with variance *σ*^{2}.

The above upper bound is reminiscent of the Shanon capacity for an AWGN channel where $\frac{1}{\beta}=\frac{m}{n}$ is the normalized bandwidth and the $SNR=\frac{\beta}{{\sigma}^{2}}$. As *β* approaches zero, the above bound goes to $log\frac{e}{2{\sigma}^{2}}$. This bound is appropriate for low SNR (for $\frac{{E}_{b}}{{N}_{0}}\le 1.593$ dB, this upper bound will be less than 1 bit per user). However, for *β* ≤ 1, the actual channel capacity reaches the single user capacity.

*β*increases, Tanaka's capacity tends to reach the upper bound and the lower and upper bounds become tighter.

*η*for QPSK inputs and for

*β*= 1 and 3. As

*β*increases, the lower bound that was introduced in [21] becomes closer to Guo-Verdu's result (

*η*is defined in (18)).

*β*is equal to [22]

As it was shown in the first section, as *m* becomes large, the rate of increase of *n* is much faster than *m* for COW codes. Thus, the assumption of reaching the full capacity in (50) is justifiable. For nonbinary inputs and signature matrices, the asymptotic lower capacity bound can be shown from the following theorem [21]

**11**

where $\mathcal{J}\cdot \mathcal{S}=\left\{js|j\in \mathcal{J},s\in \mathcal{S}\right\}$ and $\stackrel{\u0303}{p}\left(\mathcal{J}\right)={\sum}_{j\in \mathcal{J}}\stackrel{\u0303}{p}\left(j\right)$ and for a set of numbers Λ, rank(Λ) denotes the dimension of Λ as a set of vectors over the field of rational numbers $\mathcal{Q}$.

*π*and

*p*are uniform distributions on $\mathcal{I}$ and $\mathcal{S}$ (binary case), we have $\stackrel{\u0303}{\mathcal{I}}=\left\{-2,0,2\right\}$ and $\stackrel{\u0303}{p}\left(-2\right)=\stackrel{\u0303}{p}\left(2\right)=\frac{1}{4}$ and $\stackrel{\u0303}{p}\left(0\right)=\frac{1}{2}$. Thus, the above bound is simplified as shown below:

The above results for binary matrices show that the lower and upper capacity bounds approach each other asymptotically, and therefore, we have the actual capacity. stop

## IV Overloaded CDMA systems with near- far effects

So far, we have reviewed the cases in which we have perfect power control. This means that the received power of each user is equal at the receiver. But in reality this is not true since the distance between the base station and the users vary from user to user. Due to fading problems in the transmission channel, the user powers are not equal. In this section, we will first consider a class of COW codes that are resistant to near-far effects. Then, we will discuss the channel capacity bounds for such systems. At the end, we will survey optimum power estimation methods in systems with near-far effects for highly overloaded CDMA systems.

### A Errorless codes for CDMA systems with near- far effects

*Y*=

**C**

*X*+

*N*, where

**C**is the signature matrix. Without perfect power control, we cannot assume the input vectors to be ±1 at the receiver anymore. By considering near-far effects, the channel is modeled as follows:

**P**

^{1/2}belong to the interval [1

*- δ*, 1 +

*δ*], where 0 ≤

*δ*≤ 1. In [48], the authors have presented an additive channel model instead of (54) as shown below:

where *Z* is an *n* × 1 random vector with entries in the interval [-*δ*, *δ*]. In order to have errorless transmission in the absence of noise, a signature matrix should be found such that the intersection of the transformation of the sets *X*_{1} + [*-δ*, *δ*] ^{
n
} and *X*_{2} + [-*δ*, *δ*] ^{
n
} are empty for different *X*_{1}'s and *X*_{2}'s.

The following two definitions are needed for performance comparison [48].

**1**For a CDMA system with near-far effects, we define the Power Control Factor (PCF) as 10 $log\frac{E{\left(g\right)}^{2}}{var\left(g\right)}$, where

*g*is the general pdf of the entries of

**P**

^{1/2}. This concept shows the amount of power fluctuations of the users. In the special case where we assume the entries of

**P**

^{1/2}to be uniformly distributed in the interval [1

*-δ*, 1 +

*δ*], we obtain:

**2**

*δ*

_{sup}is defined as

*δ*

_{sup}(

**C**) = sup {

*δ*|

**C**·(

*X*+[

*-δ*,

*δ*]

^{ n }) are disjoint for all

*X*∈ {±1}

^{ n }}. Consequently,

*δ*

_{sup}(

**C**) is found

*δ*such that

For the **C**_{8 × 13} COW matrix in Section II, the upper and lower bounds have been evaluated. The upper bound is 0.48 and the lower bound is 0.13 and the simulation results shows that *δ*_{sup} is 0.23 [48].

*δ*

_{sup}for large sized signature matrices with this method requires a high amount of computation. It is shown in [48] that the

*δ*

_{sup}of a large signature matrix created with the method of Theorem 2 from a smaller one, is equal to the original matrix.

*δ*

_{sup}is equal for both signature matrices, a new lower bound can be found by substituting the new matrix in (59). Thus, we have

where **P** is a *k* × *k* invertible matrix.

The ML decoding of this kind of codes is very similar to the Tensor Decoding Algorithm. In this case, the received vector is *Y* = **C**(*X* + *Z*) + *N*. Each entry of *Z* takes a random value belonging to the interval [*-δ*, *δ* ]. In order to consider the worst case, uniform distribution for *Z* is assumed; the time samples of *Z* are also assumed to be independent. This assumption is much worse than what occurs in practice because in practical situations, user powers are constant at least for a short period of time. Thus, the time samples of *Z* should be correlated. By using the generalized Central Limit Theorem, *W* = **C** *Z* + *N* is approximated with a Gaussian vector with zero mean and auto covariance matrix $\frac{{\delta}^{2}}{3}C{C}^{T}+{\sigma}^{2}I$. Thus, the channel modeled as *Y* = **C** *X* + *W*. Similar to the previous sections, the Tensor Decoding Algorithm can be used to decode the received vector.

### B Channel capacity bounds for CDMA systems with near-far effects

**P**

^{1/2}has Gaussian distribution with mean equal to 1. Referring to the channel model shown in (55), the entries of

*Z*are independent with Gaussian distribution and zero mean. For underloaded codes (

*β <*1),

*C*(

*β*,

*σ*,

*ρ*) (where σ

^{2}and

*ρ*

^{2}are the variance of

*N*and

*Z*, respectively) is known, while for the overloaded case (

*β >*1), the determination of

*C*(

*β*,

*σ*,

*ρ*) is an open problem. Similar to previous sections, a lower bound and a conjectured upper bound are reviewed for the channel capacity. In order to derive a new upper bound, the lower bound derived in [49] is as follows:

where ${\theta}^{2}=(\sqrt{\beta}+{1)}^{2}{\rho}^{2}+{\sigma}^{2}$.

Since, for a given variance, the Gaussian distribution has the maximum entropy, the above lower bound is the lower bound for the sum capacity of any system with near-far variance equal to *ρ*^{2}.

where ${w}^{2}={(\sqrt{\beta}-1)}^{2}{\rho}^{2}+{\sigma}^{2}$.

*β*= 2 and several values of PCF are presented. This figure shows the effect of PCF on the channel capacity. As it can be predicted, greater PCF results in improved capacity.

*β*= 4. This figure shows that as

*E*

_{ b }

*/N*

_{0}increases, Tanaka's capacity reaches the upper bound and the upper and lower bounds become tighter.

### C Power estimation

In the previous subsection, we have surveyed a class of codes for which we can handle the near-far effects without actually estimating the received power of each user at the receiver. In this subsection, we consider a power estimating method which is suitable for overloaded CDMA systems [50]. The aim of this method is to estimate the power matrix **P** in (54). In order to achieve this goal, power estimation based on ML is employed.

**S**, the estimated power matrix is unique if and only if

Since the rank of a matrix cannot exceed the number of its columns, the maximum number of users for optimum power estimation is equal to $\frac{m\times \left(m+1\right)}{2}$.

Although this method is optimum for obtaining ML power estimation, its computational complexity is very high. A suboptimum method which has a lower complexity is also shown in [50]. If the channel noise is assumed to be white, this method can be employed for systems with unknown noise covariance matrix. In this case, the maximum number of users should not exceed $\frac{m\left(m-1\right)}{2}$ in order to have the desired power estimation.

In [50], the power change of a user with time, due to physical movement or channel characteristic variation, has also been considered. This helps the estimating systems to track sudden power changes more rapidly. Moreover, the existence of suitable signature matrices has also been studied. It can be shown that this power estimation method is optimum only when the input alphabet is Gaussian. For the binary input case, an iterative estimating method is used in [50]. In each iteration, the actual power is obtained from the previous iteration before decoding the data of each user; the next iteration is performed from this data.

## V Summary, conclusion, and future works

### A Summary

In this tutorial review, an extensive survey of synchronous CDMA systems is provided and key issues related to such systems are discussed. In this subsection, a general summary of the previous sections is given:

In Section II, we discussed overloaded binary and nonbinary signature codes that provide errorless transmission in noiseless channels. The extension of these errorless codes to active user detection system is also discussed. An upper bound for the maximum number of users for a given chip rate is also derived in this section. An example of an errorless code of size 64 × 193 (for *m* = 64 and *n* = 193) was also given. But in the same section, it was concluded that for the chip rate *m* equal to 64, more than 239 users cannot be supported for errorless transmission.

Section III is a survey of the sum channel capacity bounds for binary and nonbinary user inputs and signature matrices. The same section also reviews the bounds for the noiseless and noisy channels as well as the asymptotic cases.

Section IV is a review of errorless codes and sum capacity with near-far effects. This section discusses the same issues such as errorless transmission codes and channel capacity with near-far effects. To improve the robustness of COW/COO codes against near-far effects and improve the channel capacity, channel power estimation is required. Since power control is an important power estimation for near-far effects, a subsection is devoted to power estimation methods. This section also derives the channel capacity for input Gaussian and nonbinary matrices as well as lower and upper bounds for binary inputs and binary matrices.

### B Conclusions

CDMA has gained broad application in recent multiple access communication systems. The growth of demand and limited bandwidth has raised new issues in providing sufficient service to the growing number of subscribers. Overloaded CDMA is a proper solution for this problem. In overloaded CDMA, a larger number of users can be accommodated with the same signature size. This means that we can handle more users than TDMA and FDMA for the same bandwidth. COW/COO codes are an important class of signature codes which can provide errorless transmission in noiseless channels. It can be shown that these codes have better performance than random and BWBE codes for the binary case. Also, The COW/COO codes are resistant to near-far effects and each COW/COO code has its own robustness.

Channel capacity analysis is also an important issue in recent works related to CDMA. For small scale systems, the sum channel capacity depends on the signature alphabets while for large scale systems, the channel capacity tends to be independent of the signature alphabets. Tanaka's sum capacity for binary and Guo-Verdu's sum capacity for nonbinary cases lie between lower and upper bounds in the asymptotic case. However, as the overloading factor *β* increases, the sum capacity of Tanaka and Guo-Verdu approach the upper bound and the lower and upper bounds become tighter. Another important conclusion is that for small to medium scale systems, asymptotic values of Tanaka and Guo-Verdu cannot be used for the estimation of the sum channel capacity, and therefore, we have to use the lower and upper bounds introduced.

It can also be shown that that power estimation and control are possible for very highly overloaded systems.

### C Future works

Research topics that can be considered for future works are as follows: Although, Section II implies that ML decoding using Tensor Decoding Algorithm can be used for certain overloaded errorless codes, it is desirable to extend the overloading factor beyond the ones discussed in this paper. The same problem can be also extended to active user detection case. Despite the development of lower and upper bounds for the sum channel capacity in Section III, it is desirable to find the actual sum capacity for any given number of users, chip rates, and signal-to-noise ratios. In addition, it is very desirable to find the actual capacity regions. In active user detection systems, channel capacity should be explored with and without side information about the active users. The capacity bounds and the capacity region should be also extended to the near-far effects as discussed in Section IV. In the near-far effects, channel capacity should be derived considering channel state information. Finally, the asynchronous case should be explored for all the above cases. Generalized user vectors [60] is another interesting topic to be studied.

## Endnotes

**Endnote a**. In general, by wireless binary CDMA, we mean the signature codes and the input data are binary {±1}; while for optical CDMA systems, the binary elements are {0, 1}.

**Endnote b**. If the number of users is less than the signature length, the system is called underloaded. If the number of users is more than the signature length, it is called overloaded and the case where they are equal is called fully loaded.

**Endnote c**. Systems with the ability to detect users that are inactive in the current transmission are called systems with active user detection. Inactive users are modeled as users that transmit zero.

**Endnote d**. In Equation 1, ⊗ represents the Kronecker product.

## Declarations

## Authors’ Affiliations

## References

- Ojanpera T, Prasad R:
*Wideband CDMA For Third Generation Mobile Communications: Universal Personal Communications*. Artech House, Inc., Norwood; 1998.Google Scholar - Chung F, Salehi J, Wei V: Optical orthogonal codes: design, analysis and applications.
*IEEE Trans Inf Theory*1989, 35(3):595-604. 10.1109/18.30982MathSciNetView ArticleMATHGoogle Scholar - Salehi J: Code division multiple-access techniques in optical fiber networks. I. Fundamental principles.
*IEEE Trans Commun*1989, 37(8):824-833. 10.1109/26.31181View ArticleGoogle Scholar - Salehi J: Emerging OCDMA communication systems and data networks Invited.
*J Opt Netw*2007, 6(9):1138-1178. 10.1364/JON.6.001138View ArticleGoogle Scholar - Verdu S:
*Multiuser Detection*. Cambridge University Press, Cambridge; 1998.MATHGoogle Scholar - Kapur A, Varanasi M: Multiuser detection for overloaded CDMA systems.
*IEEE Trans Inf Theory*2003, 49(7):1728-1742. 10.1109/TIT.2003.813562MathSciNetView ArticleMATHGoogle Scholar - Moshavi S: Multi-user detection for DS-CDMA communications.
*IEEE Commun Mag*1996, 34(10):124-136. 10.1109/35.544334View ArticleGoogle Scholar - Chung F, Salehi J, Wei V: Optical orthogonal codes: design, analysis and applications.
*IEEE Trans Inf Theory*1989, 35(3):595-604. 10.1109/18.30982MathSciNetView ArticleMATHGoogle Scholar - Verdú S, Shamai S: Spectral efficiency of CDMA with random spreading.
*IEEE Trans Inf Theory*1999, 45(2):622-640. 10.1109/18.749007View ArticleMathSciNetMATHGoogle Scholar - Grant A, Alexander P: Random sequence multisets for synchronous code-division multiple-access channels.
*IEEE Trans Inf Theory*1998, 44(7):2832-2836. 10.1109/18.737515MathSciNetView ArticleMATHGoogle Scholar - Pad P, Faraji M, Marvasti F: Constructing and decoding GWBE codes using Kronecker products.
*IEEE Commun Lett*2010, 14(1):1-3.View ArticleGoogle Scholar - Karystinos G, Pados D:
*Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM)*.*Volume 2*. Minimum Total-Squared-Correlation Design of DS-CDMA Binary Signature Sets, San Antonio, Texas, USA; 2001:801-805.View ArticleGoogle Scholar - Karystinos G, Pados D: New bounds on the total squared correlation and optimum design of DS-CDMA binary signature sets.
*IEEE Trans Commun*2003, 51(1):48-51. 10.1109/TCOMM.2002.807628MathSciNetView ArticleGoogle Scholar - Welch L: Lower bounds on the maximum cross correlation of signals (Corresp).
*IEEE Trans Inf Theory*1974, 20(3):397-399. 10.1109/TIT.1974.1055219MathSciNetView ArticleMATHGoogle Scholar - Sari H, Vanhaverbeke F, Moeneclaey M: Extending the capacity of multiple access channels.
*IEEE Commun Mag*2000, 38(1):74-82. 10.1109/35.815455View ArticleGoogle Scholar - Vanhaverbeke F, Moeneclaey M, Sari H: DS/CDMA with two sets of orthogonal spreading sequences and iterative detection.
*IEEE Commun Lett*2000, 4(9):289-291. 10.1109/4234.873489View ArticleGoogle Scholar - Sari H, Vanhaverbeke F, Moeneclaey M: Multiple access using two sets of orthogonal signal waveforms.
*IEEE Commun Lett*2000, 4(1):4-6. 10.1109/4234.823531View ArticleGoogle Scholar - Vanhaverbeke F, Moeneclaey M, Sari H:
*Proceedings of the IEEE International Conference on Communications (ICC)*.*Volume 3*. Increasing CDMA Capacity Using Multiple Orthogonal Spreading Sequence Sets and Successive Interference Cancellation, New York, NY, USA; 2002:1516-1520.Google Scholar - Sari H, Vanhaverbeke F, Moeneclaey M: Extending the capacity of multiple access channels.
*IEEE Commun Mag*2000, 38(1):74-82. 10.1109/35.815455View ArticleGoogle Scholar - Alishahi K, Dashmiz S, Pad P, Marvasti F: Design of overloaded cdma and the derivation of sum capacity bounds for synchronous cdma systems.
*Conditionally accepted for publication in the IEEE Transactions on Information Theory*2011.Google Scholar - Alishahi K, Dashmiz S, Pad P, Marvasti F, Shafinia M, Mansouri M:
*The Enigma of CDMA Revisited*. 2010. Arxiv preprint arXiv:1005.0677Google Scholar - Pad P, Marvasti F, Alishahi K, Akbari S: A class of errorless codes for overloaded synchronous wireless and optical CDMA systems.
*IEEE Trans Inf Theory*2009, 55(6):2705-2715.MathSciNetView ArticleGoogle Scholar - Pad P, Soltanolkotabi M, Hadikhanlou S, Enayati A, Marvasti F:
*Proceedings of the IEEE International Conference on Communications (ICC)*. Errorless Codes for Over-Loaded CDMA with Active User Detection. Dresden, Germany; 2009:1-6.Google Scholar - Guo D, Verdu S: Randomly spread CDMA: asymptotics via statistical physics.
*IEEE Trans Inf Theory*2005, 51(6):1983-2010. 10.1109/TIT.2005.847700MathSciNetView ArticleMATHGoogle Scholar - Ahlswede R:
*Proceedings of the Second International Symposium on Information Theory*. Edited by: Petrov BN. Multi-way communication channels. Tsahkadsor, Armenia, USSR: Akadémiai Kiadó, Budapest; 1971:23-51.Google Scholar - Ahlswede R: The capacity region of a channel with two senders and two receivers.
*The Ann Probab*1974, 2(5):805-814. 10.1214/aop/1176996549MathSciNetView ArticleMATHGoogle Scholar - Liao H:
*Multiple Access Channels*. Hawaii University, Honolulu; 1972.Google Scholar - Cover T: Some advances in broadcast channels. Adv Commun Syst 1975, (4:):229-260.Google Scholar
- Cover T, Thomas J, Wiley J:
*Elements of Information Theory*.*Volume 1*. Wiley Online Library, London; 1991.View ArticleGoogle Scholar - Wyner A: Recent results in the Shannon theory.
*IEEE Trans Inf Theory*1974, 20(1):2-10. 10.1109/TIT.1974.1055171MathSciNetView ArticleMATHGoogle Scholar - Verdu S:
*Proceedings of the 24th Allerton Conference*. Capacity region of Gaussian CDMA channels: the symbol-synchronous case; 1986:1025-1034.Google Scholar - Verdu S: The capacity region of the symbol-asynchronous Gaussian multiple-access channel.
*IEEE Trans Inf Theory*1989, 35(4):733-751. 10.1109/18.32152MathSciNetView ArticleMATHGoogle Scholar - Verdú S, Shamai S: Spectral efficiency of CDMA with random spreading.
*IEEE Trans Inf Theory*1999, 45(2):622-640. 10.1109/18.749007View ArticleMathSciNetMATHGoogle Scholar - Rupf M, Massey J: Optimum sequence multisets for synchronous code-division multiple-access channels.
*IEEE Trans Inf Theory*1994, 40(4):1261-1266. 10.1109/18.335940View ArticleMATHGoogle Scholar - Viswanath P, Anantharam V: Optimal sequences and sum capacity of synchronous CDMA systems.
*IEEE Trans Inf Theory*1999, 45(6):1984-1991. 10.1109/18.782121MathSciNetView ArticleMATHGoogle Scholar - Ponnaluri S, Guess T: Effects of spreading and training on capacity in overloaded CDMA.
*IEEE Trans Commun*2008, 56(4):523-526.View ArticleGoogle Scholar - Medard M: The effect upon channel capacity in wireless communications of perfect and imperfect knowledge of the channel.
*IEEE Trans Inf Theory*2000, 46(3):933-946. 10.1109/18.841172View ArticleMATHGoogle Scholar - Hassibi B, Hochwald B: How much training is needed in multiple-antenna wireless links?
*IEEE Trans Inf Theory*2003, 49(4):951-963. 10.1109/TIT.2003.809594View ArticleMATHGoogle Scholar - Tanaka T: A statistical-mechanics approach to large-system analysis of CDMA multiuser detectors.
*IEEE Trans Inf Theory*2002, 48(11):2888-2910. 10.1109/TIT.2002.804053View ArticleMathSciNetMATHGoogle Scholar - Montanari A, Tse D:
*Proceedings of the Information Theory Workshop ITW, IEEE*. Analysis of Belief Propagation for Non-Linear Problems: The Example of CDMA (or: How to prove Tanaka's formula). Punta del Este; 2006:160-164.Google Scholar - Korada S, Macris N: Tight bounds on the capacity of binary input random CDMA systems.
*IEEE Trans Inf Theory*2010, 56(11):5590-5613.MathSciNetView ArticleGoogle Scholar - Korada S, Macris N:
*Proceedings of the IEEE International Symposium on Information Theory (ISIT)*. On the Concentration of the Capacity for a Code Division Multiple Access System. Nice, France; 2007:2801-2805.Google Scholar - Alishahi K, Marvasti F, Aref V, Pad P: Bounds on the sum capacity of synchronous binary CDMA channels.
*IEEE Trans Inf Theory*2009, 55(8):3577-3593.MathSciNetView ArticleGoogle Scholar - Cho Y, Lee J: Analysis of an adaptive SIC for near-far resistant DS-CDMA.
*IEEE Trans Commun*1998, 46(11):1429-1432. 10.1109/26.729384View ArticleGoogle Scholar - Madhow U: Blind adaptive interference suppression for the near-far resistant acquisition and demodulation of direct-sequence CDMA signals.
*IEEE Trans Signal Process*1997, 45(1):124-136. 10.1109/78.552211View ArticleGoogle Scholar - Zheng F, Barton S: Near-far resistant detection of CDMA signals via isolation bit insertion.
*IEEE Trans Commun*1995, 43(234):1313-1317.View ArticleGoogle Scholar - Madhow U, Honig M: On the average near-far resistance for MMSE detection of direct sequence CDMA signals with random spreading.
*IEEE Trans Inf Theory*1999, 45(6):2039-2045. 10.1109/18.782129MathSciNetView ArticleMATHGoogle Scholar - Shafinia M, Kabir P, Pad P, Mansouri S, Marvasti F:
*Proceedings of the IEEE International Conference on Communications (ICC)2*. Errorless Codes for CDMA Systems with Near-Far Effect. Cape Town, South Africa; 2010:1-5.Google Scholar - Pad P, Shafinia M, Mansouri S, Kabir P, Marvasti F:
*Bounds for the Sum Capacity of Binary CDMA Systems in Presence of Near-Far Effect*. 2010. Arxiv preprint arXiv:1003.5345Google Scholar - Mashayekhi O, Nashtaali D, Pad P, Moghaddasi S, Marvasti F:
*New Power Estimation Methods for Highly Overloaded Synchronous CDMA Systems*. 2011. Arxiv preprint arXiv:1104.4612v1Google Scholar - Dashmiz S, Takapoui M, Pad P, Marvasti F:
*Proceedings of the IEEE International Symposium on Information Theory (ISIT)*. New Bounds for the Sum Capacity of Binary and Nonbinary Synchronous CDMA Systems. Austin, Texas, USA; 2010:2093-2097.Google Scholar - Rupf M, Massey J: Optimum sequence multisets for synchronous code-division multiple-access channels.
*IEEE Trans Inf Theory*1994, 40(4):1261-1266. 10.1109/18.335940View ArticleMATHGoogle Scholar - Tropp J, Dhillon I, Heath R Jr: Finite-step algorithms for constructing optimal CDMA signature sequences.
*IEEE Trans Inf Theory*2004, 50(11):2916-2921. 10.1109/TIT.2004.836698MathSciNetView ArticleMATHGoogle Scholar - Xu Z: Blind identification of co-existing synchronous and asynchronous users for CDMA systems.
*IEEE Signal Process Lett*2001, 8(7):212-214. 10.1109/97.928681View ArticleGoogle Scholar - Pad P, Mousavi A, Goli A, Marvasti F: Simplified MAP-MUD for Active User CDMA.
*IEEE Commun Lett*2011, 15(99):599-601.View ArticleGoogle Scholar - Learned R, Willsky A, Boroson D: Low complexity optimal joint detection for oversaturated multiple access communications.
*IEEE Trans Signal Process*1997, 45(1):113-123. 10.1109/78.552210View ArticleGoogle Scholar - Korada S, Macris N:
*Proceedings of the Allerton Conference on Communications, Control, and Computing*. On the Capacity of a Code Division Multiple Access System. Monticello, USA; 2008.Google Scholar - Nishimori H:
*Statistical Physics of Spin Glasses and Information Processing: an Introduction*. Oxford University Press, USA; 2001.View ArticleMATHGoogle Scholar - Tanaka T:
*Proceedings of the IEEE International Symposium on Information Theory (ISIT)*. Replica Analysis of Performance Loss Due to Separation of Detection and Decoding in CDMA Channels. Seattle, Washington, USA; 2006:2368-2372.Google Scholar - Mow W: Recursive constructions of detecting matrices for multiuser coding: A unifying approach.
*IEEE Trans Inf Theory*2009, 55(1):93-98.MathSciNetView ArticleGoogle Scholar

## Copyright

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.