Multiplexing, Spread Spectrum, Pseudo-Noise

Similar documents
CDMA TECHNOLOGY. Brief Working of CDMA

CS263: Wireless Communications and Sensor Networks

Revision of Lecture Eighteen

Digital Modulation. David Tipper. Department of Information Science and Telecommunications University of Pittsburgh. Typical Communication System

How To Understand The Theory Of Time Division Duplexing

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1

Implementation of Digital Signal Processing: Some Background on GFSK Modulation

Sampling Theorem Notes. Recall: That a time sampled signal is like taking a snap shot or picture of signal periodically.

AN Application Note: FCC Regulations for ISM Band Devices: MHz. FCC Regulations for ISM Band Devices: MHz

Lecture 1: Introduction

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?

Security and protection of digital images by using watermarking methods

Multiplexing on Wireline Telephone Systems

Solution. (Chapters ) Dr. Hasan Qunoo. The Islamic University of Gaza. Faculty of Engineering. Computer Engineering Department

The front end of the receiver performs the frequency translation, channel selection and amplification of the signal.

Lecture 1. Introduction to Wireless Communications 1

Mobile Communications Chapter 2: Wireless Transmission

AN INTRODUCTION TO DIGITAL MODULATION

EPL 657 Wireless Networks

MODULATION Systems (part 1)

Modern Wireless Communication

Physical Layer, Part 2 Digital Transmissions and Multiplexing

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications

DT3: RF On/Off Remote Control Technology. Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch

Design and Implementation of FHSS and DSSS for Secure Data Transmission

INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6

Wireless Personal Area Networks (WPANs)

Lecture 18: CDMA. What is Multiple Access? ECE 598 Fall 2006

Time and Frequency Domain Equalization

How To Encode Data From A Signal To A Signal (Wired) To A Bitcode (Wired Or Coaxial)

PCM Encoding and Decoding:

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii xvii

Appendix C GSM System and Modulation Description

HD Radio FM Transmission System Specifications Rev. F August 24, 2011

CS Cellular and Mobile Network Security: CDMA/UMTS Air Interface

Complementary Code Keying with PIC Based Microcontrollers For The Wireless Radio Communications

Chapter 3: Spread Spectrum Technologies

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

Hello viewers, welcome to today s lecture on cellular telephone systems.

1 Lecture Notes 1 Interference Limited System, Cellular. Systems Introduction, Power and Path Loss

CHAPTER 8 MULTIPLEXING

EECC694 - Shaaban. Transmission Channel

ERLANG CAPACITY EVALUATION IN GSM AND CDMA CELLULAR SYSTEMS

Multiplexing. Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single physical medium.

Multiple Access Techniques

The influence of Wi-Fi on the operation of Bluetooth based wireless sensor networks in the Internet of Things

Mobile Communications TCS 455

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

Appendix D Digital Modulation and GMSK

How To Understand And Understand The Power Of A Cdma/Ds System

Frequency Hopping Spread Spectrum PHY of the Wireless LAN Standard. Why Frequency Hopping?

TDM & FDM Overlays on Bluetooth

(Refer Slide Time: 2:10)

Cellular Wireless Networks. Principles of Cellular Networks

Introduction to FM-Stereo-RDS Modulation

The Phase Modulator In NBFM Voice Communication Systems

Computers Are Your Future Prentice-Hall, Inc.

Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics:

Improved user experiences are possible with enhanced FM radio data system (RDS) reception

DVB-T. The echo performance of. receivers. Theory of echo tolerance. Ranulph Poole BBC Research and Development

Lecture 17: Wireless Networking"

BROADBAND AND HIGH SPEED NETWORKS

Lecture 3: Signaling and Clock Recovery. CSE 123: Computer Networks Stefan Savage

What Does Communication (or Telecommunication) Mean?

Implementing Digital Wireless Systems. And an FCC update

AM Receiver. Prelab. baseband

DigiPoints Volume 1. Student Workbook. Module 4 Bandwidth Management

Implementing an In-Service, Non- Intrusive Measurement Device in Telecommunication Networks Using the TMS320C31

Algorithms for Interference Sensing in Optical CDMA Networks

Lock-in amplifiers. A short tutorial by R. Scholten

TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS

GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving

What is DECT? DECT stands for Digital Enhanced Cordless Telecommunications.

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP

Introduction to Wireless Communications and Networks

Wireless Local Area Networking For Device Monitoring

How To Make A Multi-User Communication Efficient

Digital Baseband Modulation

CDMA Performance under Fading Channel

Lezione 6 Communications Blockset

Loop Bandwidth and Clock Data Recovery (CDR) in Oscilloscope Measurements. Application Note

Course Duration: Course Content Course Description Course Objectives Course Requirements

Chapter 6: Broadcast Systems. Mobile Communications. Unidirectional distribution systems DVB DAB. High-speed Internet. architecture Container

Module: Digital Communications. Experiment 784. DSL Transmission. Institut für Nachrichtentechnik E-8 Technische Universität Hamburg-Harburg

Bluetooth voice and data performance in DS WLAN environment

Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse

What s The Difference Between Bit Rate And Baud Rate?

Tutorial on Basic Link Budget Analysis

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Intro to Practical Digital Communications

Probability and Random Variables. Generation of random variables (r.v.)

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Four Wave Mixing in Closely Spaced DWDM Optical Channels

SECTION 2 TECHNICAL DESCRIPTION OF BPL SYSTEMS

Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation

RF Measurements Using a Modular Digitizer

Abstract. 1. Introduction

TCOM 370 NOTES 99-6 VOICE DIGITIZATION AND VOICE/DATA INTEGRATION

Transcription:

College of Computer Science Lecture 5 Northeastern University September 24 2008 Wireless Networks CS G250 Lecturer: R. Sundaram Multiplexing, Spread Spectrum, Pseudo-Noise Handouts: Simulation assignment (due on 10/06/08) 1 Multiplexing Multiplexing is a term used to refer to a process where multiple analog message signals or digital data streams are combined into one signal over a shared medium. The aim is to share an expensive resource. There are two techniques used for multiplexing: time division multiple access(tdma) and frequency divison multiple access(fdma). The reverse process is known as demultiplexing. To multiplex a device named multiplexer (MUX) is used. The device that performs the reverse process is called a demultiplexer (DE- MUX). 1.1 Time Division Multiple Access(TDMA) It allows several users to share the same frequency channel by dividing the signal into different time slots. The users transmit one after the other each using his own time slot (Figure 1). 1.2 Frequency Division Multiple Access In FDMA the available bandwidth is divided into frequency bands. Each transmitter is allocated a particular frequency band to send its data. The allocated frequency band belongs to the transmitter all the time. To prevent from interferences, the frequency bands are separated from each other by small guard bands(figure 2). 2 Spread Spectrum Spread spectrum techniques are used to transmit either analog or digital data, using an analog signal. The idea is to spread the information signal

etc Channel 3 Channel 2 Channel 1 Time Frequency Figure 1: TDMA Time f2 f1 f3 etc Frequency Figure 2: FDMA 2

Input Data Channel encoder Modulator Channel Demodulator Channel deconder Output Data Spreading code Spreading code Pseudonoise generator Pseudonoise generator Figure 3: General Model of Spread Spectrum Communication Systems over a wider bandwidth to make jamming and interception more difficult. Also spread spectrum techniques increase the immunity to noise. The general model for spread spectrum is depicted in Figure 3. The spreading code or spreading sequence is actually a sequence of digits used to modulate the signal. Typically the spreading code is generated by pseudonoise or pseudorandom number generator. The effect of this modulation is to increase significantly the bandwidth (spread spectrum) of the signal to be transmitted. 2.1 Frequency Hopping Spread Spectrum (FHSS) With FHSS the signal is broadcast over a seemingly random series of radio frequencies, hopping from frequency to frequency. The receiver hops between frequencies in synchronization with the transmitter. The eavesdroppers will be able to jam only certain frequencies and therefore catch a few bits. They will be able to intercept the entire message only if they jam the entire spectrum, which requires huge power invested by the eavesdroppers. Both the receiver and the transmitter hop from frequency to frequency in the same order. The transmitter has the responsibility to let the receiver know in which order to hop. The basic approach for FHSS is to have 2 k carrier frequencies forming 2 k channels. The transmitter operates in one frequency channel for a fixed interval of time and then it hops to a different frequency channel. During the interval, the transmitter sends some number of bits. Figure 4 presents an example of FHSS. As a fun fact, this technique was invented by Hedy Lamarr, a very famous Hollywood actress in the 40s. 3

energy frequency 4 1 3 2 f4 f3 f2 f1 f1 f2 f3 f4 frequency time Figure 4: Frequency Hopping Spread Sprectrum - Example 2.1.1 FHSS using BFSK (Binary Frequency Shift Keying) For transmission, binary data are fed into a modulator using some digital-toanalog encoding scheme, such as BFSK. A pseudonoise serves as spreading code. Mathematically, s d (t) = A cos (2π (f 0 + 0.5 (b + 1) f) t), where A = amplitude f 0 = base frequency f = frequency separator b = value of the bit (1 for binary 1; -1 for binary 0) Why 0.5? Because when b = 1, then s d (t) = A cos (2πf 0 t) and when b = 1, then s d (t) = A cos (2π (f 0 + f) t)1. Thus the frequency of the data signal is either f 0 for b = 1 or f 0 + f for b = 1. To this signal s d (t) we apply a chipping signal c (t) which hops to a different frequency among a set of 2 k frequencies after k bits from the sequence. For simplicity reasons, let s assume we can send only one bit during one frequency hop. Then the signal during the i-th hop is: 4

p (t) = s d (t) c (t), where c (t) = chipping sequence c (t) = cos (2πf i t) Thus p (t) = A cos (2π (f 0 + 0.5 (b + 1) f) t) cos (2πf i t) By applying the following trigonometric identity cos x cos y = 1 (cos (x + y) + cos (x y)), 2 we get p (t) = 0.5A [cos (2π (f 0 + 0.5 (b i + 1) f + f i ) t) + cos (2π (f 0 + 0.5 (b i + 1) f f i ) t)] A bandpass filter is used to block the difference frequency and pass the sum frequency, yielding an FHSS signal of s (t) = 0.5A cos (2π (f 0 + 0.5 (b i + 1) f + f i ) t) At the receiver, a signal of the form s (t) will be received. This is multiplied by a replica of the spreading signal to yield a product signal of the form: p (t) = s (t) c (t) = 0.5A cos (2π (f 0 + 0.5 (b i + 1) f + f i ) t) cos (2πf i t) Using the trigonometric identity, we get: p (t) = s (t) c (t) = 0.25A [cos (2π (f 0 + 0.5 (b i + 1) f + f i + f i ) t) + cos (2π (f 0 + 0.5 (b i + 1) f) t)] 5

A bandpass filter is used to block the sum frequency and pass the difference frequency, yielding the signal s d (t) = cos (2π (f 0 + 0.5 (b i + 1) f) t). 2.1.2 FHSS using MFSK (Multiple Frequency Shift Keying) MFSK uses M = 2 L different frequencies to encode the digital input L bits at a time. The transmitted signal is of the form: s i (t) = A cos 2πf i t, where 1 i M and f i = f c + (2i 1 M)f d, where f c = carrier frequency f d = difference frequency M = number of different signal elements M = 2 L L = number of bits per signal element Let T s be the duration of a signal element and T c the number of seconds when I am sending on a certain frequency. According to the relationship between T c and T s we can characterize the spread spectrum as: slow-frequency-hop spread spectrum T c T s In this situation we will be able to pack more blocks of size L. fast-frequency-hop spread spectrum T c < T s In this situation, we are unable of sending the entire block of size L. This is extremely useful in military applications. The gain in signal-to-noise ratio or processing gain is: G P = W s W d = 2 k W d = the bandwidth of the transmitter W s = the bandwidth of a slot So, if frequency hopping is used the jammer must jam all 2 k frequencies (Figure 5). 6

Ws Wd 2^k slots Figure 5: Signal-to-noise ratio 2.2 Direct Sequence Spread Spectrum (DSSS) Each bit in the original signal is represented by multiple bits in the transmitted signal. One technique for DSSS is to combine the digital stream with the spreading code bit stream using XOR. 2.2.1 DSSS using BPSK Rather than representing binary data with 1 and 0, it is easier for the current purpose to use +1 and -1 to represent the two binary digits. In this case, a BPSK signal can be represented as: s d (t) = Ad (t) cos (2πf c t), where A = the amplitude of the signal f c = carrier frequency d (t) = the discrete function that takes the value +1 for 1 and -1 for 0 On the transmitter s side, the signal is multiplied by c (t), which is the pseudo-noise sequence. s (t) = s d (t) c (t) = Ad (t) c (t) cos (2πf c t) 7

On the receiver s side, the incoming signal is multiplied again by c (t). s (t) c (t) = Ad (t) c (t) c (t) cos (2πf c t) c (t) c (t) = 1 Therefore, s (t) c (t) = s d (t) 2.3 Code Division Multiple Access (CDMA) This technique allows the transmitters to send the information simultaneously over a single communication channel. Each transmitter is assigned a code which allows multiple users to be multiplexed over the same physical channel. The codes assigned to the users have the nice property of being orthogonal. Two vectors are orthogonal if their inner product is 0. Let s suppose we have two users: A and B. User A has been assigned C A = 1, 1, 1, 1 and user B has been assigned code C B = 1, 1, 1, 1. If user A wants to send a 1, then he sends C A = 1, 1, 1, 1. If the same user A wants to send a 0, then he sends C A = 1, 1, 1, 1, which is obtained by flipping each value of code C A. The same applies to user B. 1 To decode, the receiver applies the following formula: n sc A T, where n is the number of chips and s is the received code. So, in our example, if s = 1, 1, 1, 1 and n = 4, then the received value is: 1 4 1, 1, 1, 1 1, 1, 1, 1 T = 4 4 = 1, meaning that user A sent a 1. If s = 1, 1, 1, 1 and n = 4, then the received value is: 1 4 1, 1, 1, 1 1, 1, 1, 1 T = 4 4 = 1, meaning that user A sent a 0. So, what happens if we receive a s = 1, 1, 1, 1 and we apply C A? By applying the above formula, 1 4 1, 1, 1, 1 < 1, 1, 1, 1 >T = 0 4 = 0. So, if we apply the right code we get either 1 or 1, but if we apply the wrong code we always get 0. On the receiver s side, it could happen that we get the sum of the codes sent by A and B: r = ( ) s ACA + s BCB. If we want to find out the signal 8

sent ( by A, we ) multiply r by C T A. Because C B and C A are orthogonal, saca + s BCB T CA = s A. A similar thing happens when we want to extract the signal sent by B. Question: If we have 2 k channels, how many pairs of vectors can we have so that they are all orthogonal to each other? Answer: 2 k, meaning that this is the maximum number of people that can send data simultanously. Orthogonal codes are really nice to have, but the problem with them is that there aren t that many. 3 Pseudo-Noise Pseudo-noise has to satisfy two properties: randomness and unpredictability. Pure randomness is hard to achieve. Therefore we need to settle for pseudorandomness, which means that the sequences produced are long and there is no way of predicting the next number from the sequence. One way of generating pseudo-noise is by using Linear Feedback Shift Registers(LFSR). LFSR are implemented as a circuit consisting of XOR gates and shift register. The register is a string of 1-bit storage devices. The main idea is that the k-th bit is output as the result of an operation on the previous k 1 bits in the register. By using a long enough sequence of bits, the sequence may appear to be random, even though it is actually a long cycle. 9