UNIT2.2
UNIT2.2
UNIT2.2
By
2
SPREAD SPECTRUM MODULATION
• It is a wideband modulation Technique.
• Spread spectrum transmission offers the following three main advantages
over fixed frequency transmission:
(a) Spread spectrum signals are highly resistant to noise and interference.
The process of re-collecting a spread signal spreads out noise and
interference, causing them to recede into the background.
(b) Spread spectrum signals are difficult to intercept.
(c) Spread spectrum transmissions can share a frequency band with many
types of conventional transmissions with minimal interference.
These signals add minimal noise to the narrow-frequency communications,
and vice versa. As a result, bandwidth can be utilized more efficiently.
Features of SSM
Spread spectrum techniques meet the following objectives:
4. Anti-jamming capability
6. Ranging.
There are two types of Spread Spectrum Systems:
1. Averaging system
2. Avoidance system
• Averaging system: In this system, interference reduction takes place
because the interference can be averaged over a large time interval.
Example: A Direct Sequence (DS) system
• Avoidance system: In this system, reduction of interference occurs
because the signal is made to avoid the interference for a large fraction
of time.
Example: Frequency Hopping (FH), time hopping (TH), and chirping
systems.
5
Pseudo-Noise Codes with properties and Code Generation
• In DS spread spectrum system, a unique code is used to spread and de spread the
signal. This is Direct Sequence or PN code.
Figure (a). XOR logic in spread spectrum methods and (b) spreading by multiplication
A unique code is used to spread and despread the signal using the logic shown in Figure (a). XOR logic in spread
spectrum methods and (b) spreading by multiplication
Pseudo-Noise Codes with properties and Code Generation
• Assume that the clock rate is provided for generating each bit of a PN
code (with one clock cycle, one bit of PN code comes out).
• The bit rate of a PN code is called the chip rate (1/ tchip ), which is 10
times or more than the data bit rate.
• The smallest time increment in the sequences of certain period or
duration is tchip and is known as a time chip .
• The total period consists of Nc time chips.
• The chip rate decides the final transmission spectrum of the DSSS
system.
Operation related to PN code or Sequence
1. Autocorrelation Property of DSSS- Matching of a signal is done
with itself
• Gold codes/sequences
• The Linear feedback shift register (LFSR) can be implemented in two ways:
1. Fibonacci Implementation : it consists of a simple shift register in which a binary
weighted modulo-2 sum of taps is fed back to the input [Fig.b].
2. Galois Implementation: it consists of a shift register, the contents of which are
modified at every step by a binary weighted value of the output stage[Fig.c].
15
Maximum Length Sequences
Primitive Polynomial-----
ML sequence operators (a) Typical PN code generator with three shift register stages and its
application for data spreading (b) Fibonacci implementation of LFSR ( linear feedback shift
register) (c) Galois implementation of LFSR
Direct Sequence Spread Spectrum
• The direct sequence spread spectrum (DSSS) technique also expands
the bandwidth of the original signal, but the process is different.
• In DSSS, each data bit is replaced with n bits using a spreading code.
In other words, each bit is assigned a code of n bits, called chips,
where the chip rate is n times that of the data bit.
• Whenever a user wants to send data using this DSSS technique, each
and every bit of the user data is multiplied by a secret code, called
as chipping code.
• This chipping code is nothing but the spreading code which is
multiplied with the original message and transmitted.
• The receiver uses the same code to retrieve the original message. 17
In the figure, the spreading code is 11 chips having the pattern 10110111000.
If the original signal rate is N, the rate of the spread signal is 11N. This means that the
required bandwidth for the spread signal is 11 times larger than the bandwidth of the
original signal.
The spread signal can provide privacy if the intruder does not know the code. It can also
provide immunity against interference if each station uses a different code.
18
DSSS TRANSMITTER & RECEIVER
19
Receiver Process
The received spread spectrum signal for a single user can be
represented as
24
Waveforms for Example
Frequency Hopping Spread
Spectrum (FHSS)
• The technique uses M different carrier frequencies
that are modulated by the source signal.
• At one moment, the signal modulates one carrier
frequency; at the next moment, the signal modulates
another carrier frequency.
• Although the modulation is done using one carrier
frequency at a time, M frequencies are used in the
long run.
• The bandwidth occupied by a source after spreading is
BFHSS >> B.
26
The frequency table uses the pattern to find the frequency to be used for this hopping period and
passes it to the frequency synthesizer. The frequency synthesizer creates a carrier signal of that
frequency, and the source signal modulates the carrier signal.
For Example M is 8 and k is 3. The pseudorandom code generator will create eight different 3-
bit patterns. These are mapped to eight different frequencies in the frequency table.
27
• The pattern for this station is 101, 111, 001, 000, 010, all, 100. Note that the pattern is
pseudorandom it is repeated after eight hoppings. This means that at hopping period 1, the
pattern is 101. The frequency selected is 700 kHz, the source signal modulates this carrier
frequency.
• The second k-bit pattern selected is 111, which selects the 900-kHz carrier; the eighth
pattern is 100, the frequency is 600 kHz. After eight hoppings, the pattern repeats, starting
from 101 again.
• If there are many k-bit patterns and the hopping period is short, a sender and receiver can
have privacy. If an intruder tries to intercept the transmitted signal, he can only access a
small piece of data because he does not know the spreading sequence to quickly adapt
herself to the next hop. The scheme has also an anti-jamming effect. A malicious sender
may be able to send noise to jam the signal for one hopping period (randomly), but not for
the whole period.
28
FHSS TRANSMITTER
29
FHSS RECEIVER
30
Slow frequency hopping and Fast frequency hopping.
Slow frequency hopping Fast frequency hopping
In slow frequency hopping, multiple
In fast frequency hopping, multiple hops are
symbols are transmitted in one frequency
required to transmit one symbol.
hop.
One or more symbols are transmitted over One symbol is transmitted over multiple
the same carrier frequency. carriers in different hops.
Symbol rate is equal to chip rate. Hop rate is higher than symbol rate.
Hop rate is lower than symbol rate. Hop rate is higher than symbol rate.
31
Advantages of FHSS
• FHSS offers three main advantages over a fixed-frequency transmission:
1.FHSS signals are highly resistant to narrowband interference because the
signal hops to a different frequency band.
2.Signals are difficult to intercept if the frequency-hopping pattern is not
known.
3.Jamming is also difficult if the pattern is unknown; a malicious individual
may only jam the signal for a single hopping period if the spreading
sequence is unknown.
4.FHSS transmissions can share a frequency band with many types of
conventional transmissions with minimal mutual interference. FHSS signals
add minimal interference to narrowband communications, and vice versa.
32
Data and Time-frequency Plane
(Example)
33
TIME HOPPING SPREAD SPECTRUM
34
TIME HOPPING SPREAD SPECTRUM
35
• In a typical time hopping signal is divided into frames, which in turn are subdivided into
M time slots.
• As the message is transmitted only one time slot in the frame is modulated with
information (any modulation).
• This time slot is chosen using PN generator.
• All of the message bits gathered in the previous frame are then transmitted in a burst
during the time slot selected by the PN generator.
• If we let: Tf = frame duration, k = number of message bits in one frame and Tf = k*tm ,
then the width of each time slot in a frame is Tf/M and the width of each bit in the time
slot is Tf/kM or just tm/M .
• Thus, the transmitted signal bandwidth is 2M times the message bandwidth.
36
37
HYBRID SPREAD SPECTRUM TECHNIQUE
• The use of hybrid techniques attempt to capitalize upon the advantages of a particular method
while avoiding the disadvantages.
• DS, suffers heavily from the near–far effect, which makes this technique hard to apply to systems
without the ability of power control, but its implementation is inexpensive.
• The PN code generators are easy to implement and the spreading operation itself can be simply
performed by XOR ports.
• FH effectively suppresses the near–far effect and reduces the need for power control. However,
implementation of the (fast) hopping frequency synthesizer required for a reasonable spreading
gain is more problematic in terms of higher silicon cost and increased power consumption.
• Selection of SFH/FFH also has its own pros and cones.
• Solutions are: PN/FH, PN/TH, FH/TH, and PN/FH/TH.
38
Applications of Spread Spectrum
• A specific example of the use of spread spectrum technology is the North American Code
Division Multiple Access (CDMA) Digital Cellular (IS-95) standard.
• The CDMA employed in this standard uses a spread spectrum signal with 1.23-MHz
spreading bandwidth.
• Since in a CDMA system every user is a source of interference to other users, control of
the transmitted power has to be employed (due to near-far problem). Such control is
provided by sophisticated algorithms built into control stations.
• The standard also recommends use of forward error-correction coding with interleaving,
speech activity detection and variable-rate speech encoding.
• Walsh code is used to provide 64 orthogonal sequences, giving rise to a set of 64
orthogonal ‘code channels’.
• The spread signal is sent over the air interface with QPSK modulation with Root Raised
Cosine (RRC) pulse shaping.
• Other examples of using spread spectrum technology in commercial applications include
39
satellite communications, wireless LANs based on IEEE 802.11 standard etc.
RAKE receiver
• RAKE receiver, used specially in CDMA cellular systems, can combine multipath
components, which are time-delayed versions of the original signal transmission.
• This combining is done in order to improve the signal to noise ratio (SNR) at the receiver.
• RAKE receiver attempts to collect the time shifted versions of the original signal by
providing a separate correlation receiver for each of the multipath signals.
• This can be done due to multipath components are practically uncorrelated from another
when their relative propagation delay exceeds a chip period.
40
Rake Receiver Configuration
Choosing weighting coefficients based on the actual outputs of the correlators yields better RAKE performance.
Figure: An M-branch (M-finger) RAKE receiver implementation. Each correlator detects a time shifted version of
the original CDMA transmission, and each finger of the RAKE correlates to a portion of the signal which is delayed
by at least one chip in time from the other fingers.
Near Far Problem
Near Far Problem
Power Control
45