Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

Similar documents
Revision of Lecture Eighteen

How To Understand The Theory Of Time Division Duplexing

CDMA TECHNOLOGY. Brief Working of CDMA

Digital Modulation. David Tipper. Department of Information Science and Telecommunications University of Pittsburgh. Typical Communication System

CS263: Wireless Communications and Sensor Networks

Cellular Wireless Networks. Principles of Cellular Networks

Lecture 18: CDMA. What is Multiple Access? ECE 598 Fall 2006

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications

Mobile Communications TCS 455

AN Application Note: FCC Regulations for ISM Band Devices: MHz. FCC Regulations for ISM Band Devices: MHz

Lecture 1: Introduction

Multiple Access Techniques

Mobile Communications Chapter 2: Wireless Transmission

Complementary Code Keying with PIC Based Microcontrollers For The Wireless Radio Communications

Security and protection of digital images by using watermarking methods

Chapter 3: Spread Spectrum Technologies

Lecture 1. Introduction to Wireless Communications 1

How To Understand And Understand The Power Of A Cdma/Ds System

Design and Implementation of FHSS and DSSS for Secure Data Transmission

EPL 657 Wireless Networks

Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics:

Implementation of Digital Signal Processing: Some Background on GFSK Modulation

Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Frequency Hopping Spread Spectrum PHY of the Wireless LAN Standard. Why Frequency Hopping?

Modern Wireless Communication

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1

Appendix D Digital Modulation and GMSK

HD Radio FM Transmission System Specifications Rev. F August 24, 2011

Duobinary Modulation For Optical Systems

T = 1 f. Phase. Measure of relative position in time within a single period of a signal For a periodic signal f(t), phase is fractional part t p

Lezione 6 Communications Blockset

NRZ Bandwidth - HF Cutoff vs. SNR

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA

Lecture 3: Signaling and Clock Recovery. CSE 123: Computer Networks Stefan Savage

Antennas & Propagation. CS 6710 Spring 2010 Rajmohan Rajaraman

MODULATION Systems (part 1)

Whitepaper n The Next Generation in Wireless Technology

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii xvii

1 Lecture Notes 1 Interference Limited System, Cellular. Systems Introduction, Power and Path Loss

Hello viewers, welcome to today s lecture on cellular telephone systems.

Time and Frequency Domain Equalization

Sampling Theorem Notes. Recall: That a time sampled signal is like taking a snap shot or picture of signal periodically.

CS Cellular and Mobile Network Security: CDMA/UMTS Air Interface

Example/ an analog signal f ( t) ) is sample by f s = 5000 Hz draw the sampling signal spectrum. Calculate min. sampling frequency.

GSM Network and Services

Boost Your Skills with On-Site Courses Tailored to Your Needs

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

Physical Layer, Part 2 Digital Transmissions and Multiplexing

Appendix C GSM System and Modulation Description

Data Link Layer Overview

Wireless Personal Area Networks (WPANs)

4 Cellular systems: multiple access

Course Duration: Course Content Course Description Course Objectives Course Requirements

OFDM, Mobile Software Development Framework

How To Encode Data From A Signal To A Signal (Wired) To A Bitcode (Wired Or Coaxial)

INTERNATIONAL TELECOMMUNICATION UNION $!4! #/--5.)#!4)/. /6%2 4(% 4%,%0(/.%.%47/2+

DT3: RF On/Off Remote Control Technology. Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Algorithms for Interference Sensing in Optical CDMA Networks

QAM Demodulation. Performance Conclusion. o o o o o. (Nyquist shaping, Clock & Carrier Recovery, AGC, Adaptive Equaliser) o o. Wireless Communications

Timing Errors and Jitter

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computers Are Your Future Prentice-Hall, Inc.

Lecture 17: Wireless Networking"

Chapter 6 Wireless and Mobile Networks

ECE/CS 372 introduction to computer networks. Lecture 13

Bit Error Rate Performance Analysis on Modulation Techniques of Wideband Code Division Multiple Access

Pradipta Biswas Roll No. 04IT6007 M. Tech. (IT) School of Information Technology Indian Institute of Technology, Kharagpur

Adaptive Equalization of binary encoded signals Using LMS Algorithm

AM Receiver. Prelab. baseband

The Effect of Network Cabling on Bit Error Rate Performance. By Paul Kish NORDX/CDT

Adjacent Channel Interference. Adaptive Modulation and Coding. Advanced Mobile Phone System. Automatic Repeat Request. Additive White Gaussian Noise

ERLANG CAPACITY EVALUATION IN GSM AND CDMA CELLULAR SYSTEMS

Performance of Quasi-Constant Envelope Phase Modulation through Nonlinear Radio Channels

CDMA Performance under Fading Channel

Digital Transmission (Line Coding)

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP

Technical Specifications for KD5HIO Software

Digital Baseband Modulation

RF Measurements Using a Modular Digitizer

Introduction to Wireless Communications and Networks

Non-Data Aided Carrier Offset Compensation for SDR Implementation

Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?

TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS

Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT)

Tutorial on Basic Link Budget Analysis

DVB-T. The echo performance of. receivers. Theory of echo tolerance. Ranulph Poole BBC Research and Development

Loop Bandwidth and Clock Data Recovery (CDR) in Oscilloscope Measurements. Application Note

Ch GSM PENN. Magda El Zarki - Tcom Spring 98

AN INTRODUCTION TO DIGITAL MODULATION

INTERNATIONAL TELECOMMUNICATION UNION

4 Digital Video Signal According to ITU-BT.R.601 (CCIR 601) 43

Wi-Fi and Bluetooth - Interference Issues

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2

Analog vs. Digital Transmission

Bluetooth voice and data performance in DS WLAN environment

What Does Communication (or Telecommunication) Mean?

Transcription:

Spread Spectrum Chapter 18 FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

Single Carrier The traditional way Transmitted signal Data Mod. f C t Radio spectrum f C f Slides for Wireless Communications Edfors, Molisch, Tufvesson 422

Spread Spectrum Techniques Power density spectrum [W/Hz] Single carrier bandwidth Single carrier signal Noise and interference Spread spectrum bandwidth f Spread spectrum signal Slides for Wireless Communications Edfors, Molisch, Tufvesson 423

Spread Spectrum Techniques Spectrum Spectrum f Information Spreading f Noise and interference f Information Despreading f Slides for Wireless Communications Edfors, Molisch, Tufvesson 424

Spread Spectrum Input is fed into a channel encoder Produces analog signal with narrow bandwidth Signal is further modulated using sequence of digits Spreading code or spreading sequence Generated by pseudonoise, or pseudo-random number generator (seed + algorithm) Effect of modulation is to increase bandwidth of signal to be transmitted

Spread Spectrum On receiving end, the same digit sequence is used to demodulate the spread spectrum signal Signal is fed into a channel decoder to recover data

Spread Spectrum Analog data Analog signal

Spread Spectrum What can be gained from apparent waste of spectrum? Immunity from various kinds of noise and multipath distortion Can be used for hiding and encrypting signals Several users can independently use the same bandwidth with very little interference

Frequency Hoping Spread Spectrum (FHSS) Signal is broadcast over seemingly random series of radio frequencies A number of channels allocated for the FH signal Width of each channel corresponds to bandwidth of input signal Signal hops from frequency to frequency at fixed intervals Transmitter operates in one channel at a time Bits are transmitted using some encoding scheme At each successive interval, a new carrier frequency is selected (IEEE 802.11 standard uses 300 ms intervals)

Frequency Hoping Spread Spectrum Channel sequence dictated by spreading code Receiver, hopping between frequencies in synchronization with transmitter using the same spreading code, picks up the message using the same encoding scheme as the transmitter Spreading code = c(t) also known as chipping code Advantages Eavesdroppers hear only unintelligible blips Attempts to jam signal on one frequency succeed only at knocking out a few bits

Frequency Hoping Spread Spectrum Figure in textbook is correct

FHSS Details - Transmitter Note signal frequency determination source

FHSS Using MFSK fc 3fd fc fd for M = 4 fc + fd fc + 3fd MFSK signal is translated to a new frequency every T c seconds by modulating the MFSK signal with the FHSS carrier signal For data rate of R: duration of a bit: T = 1/R seconds (T is the bit period) duration of signal element: T s = LT seconds where L bits are encoded per signal element (M = 2 L ) T c T s - slow-frequency-hop spread spectrum frequency hop time larger than signal element time/duration T c < T s - fast-frequency-hop spread spectrum frequency hops within signal element duration

MFSK Signal Before & After FHSS

Fast FHSS (Ts > Tc)

FHSS Performance Considerations Large number of frequencies used Results in a system that is quite resistant to jamming Jammer must jam all (hopping) frequencies With fixed power, this reduces the jamming power in any one frequency band The gain in jamming is the processor gain Gp = Ws / Wd ( FHSS bandwidth / MFSK bandwidth ) Fast FHSS more jamming robust than slow FHSS since multiple frequencies (chips) are used for each signal element (majority voting could be used)

Direct-Sequence Spread Spectrum DSSS (1) Information signal Spreading DSSS signal 1: 1: 0: 0: 1 BW Tb 1 BW Tc Users/channels are separated by using different spreading codes. T b T c Length of one chip in the code. Spreading code Slides for Wireless Communications Edfors, Molisch, Tufvesson 431

Direct-Sequence Spread Spectrum DSSS (2) DSSS signal Despreading Information signal 1: 1: 0: 0: Spreading code Slides for Wireless Communications Edfors, Molisch, Tufvesson 432

Direct Sequence Spread Spectrum (DSSS) Each bit in original signal is represented by multiple bits in the transmitted signal Spreading code spreads signal across a wider frequency band The amount of sperading is in direct proportion to number of pseudonoise (PN) bits used One technique combines digital information stream with the spreading code bit stream (PN bit stream) using exclusive-or d(t) * c(t) & then BPSK modulation

Direct Sequence Spread Spectrum (DSSS) See errata sheet for 1 st edition

DSSS Using BPSK Multiply BPSK signal, s d (t) = A d(t) cos(2 f c t) by c(t) [takes values +1, -1] to get s(t) = A d(t) c(t) cos(2 f c t) A = amplitude of signal f c = carrier frequency d(t) = discrete function [+1, -1 used to represent binary 1 & 0] At receiver, incoming signal multiplied by c(t) Since c(t) x c(t) = 1, incoming signal is recovered Can perform BPSK modulation either before or after the chipping signal c(t) is used in direct sequence spreader DSSS Performance similar to FHSS in terms of the SNR or performance gain Gp Ws/Wd Gp = signal bandwidth/spread spectrum bandwidth the spread of the jamming power over the signal bandwidth

DSSS Using BPSK Chipping signal applied after BPSK modulation. Note data rate sources vs FHSS frequency determination sources

Data Before & After DSSS

Code-division multiple access (CDMA) Code 1 Despread( Code 1) Despread( Code 2) f f Code 2 Code N f Despread( Code N) We want codes with low cross-correlation between the codes since the cross-talk between users is determined by it. f Slides for Wireless Communications Edfors, Molisch, Tufvesson 433

Impact of delay dispersion CDMA spreads signals over larger bandwidth -> delay dispersion has bigger impact. Two effects: Intersymbol interference: independent of spreading; needs to be combatted by equalizer Output of despreader is not impulse, but rather an approximation to the impulse response Needs Rake receiver to collect all energy Slides for Wireless Communications Edfors, Molisch, Tufvesson 434

Rake receivers Despreading becomes a bit more complicated...... but we gain frequency diversity. Copyright: Prentice-Hall Slides for Wireless Communications Edfors, Molisch, Tufvesson 435

Code-Division Multiple Access (CDMA) Basic Principles of CDMA (a multiplexing scheme used with spread spectrum) D = rate of data signal Break each bit into k chips Chips are a user-specific fixed pattern This pattern is called the User s Code The codes are orthogonal (limited set) Chip data rate of new channel = kd chips/sec

CDMA Example If k = 6 and code is a sequence of 1 s and -1 s For each 1 bit, A sends user code as a chip pattern <c1, c2, c3, c4, c5, c6> For each 0 bit (-1), A sends complement of user code <-c1, -c2, -c3, -c4, -c5, -c6> Receiver knows sender s code and performs decode function (assume synchronized so that the receiver knows when to apply the user code ) S u d d1 c1 d2 c2 d3 c3 d4 c4 d5 c5 d6 c6 < d1, d2, d3, d4, d5, d6 > = received chip pattern < c1, c2, c3, c4, c5, c6 > = sender s code

CDMA Example User A code = <1, 1, 1, 1, 1, 1> To send a 1 bit = <1, 1, 1, 1, 1, 1> To send a 0 bit = < 1, 1, 1, 1, 1, 1> User B code = <1, 1, 1, 1, 1, 1> To send a 1 bit = <1, 1, 1, 1, 1, 1> Receiver receiving with A s code (A s code) x (received chip pattern) User A 1 bit decoded results: + 6 which translates into 1 User A 0 bit: - 6 binary 0 User B 1 or 0 bit decoded result: 0 signal ignored, S A signal decode results in a value of 0 which is different from a decode value of +/- 6 for transmitted bits 1 or 0 from User A

CDMA Example Continued B Sends (data bit = 1) 1 1-1 -1 1 1 Receiver codeword A (decode) 1-1 -1 1-1 1 Multiplication 1-1 1-1 -1 1 = 0 S A (1,1,-1,-1,1,1) = 1 X 1 + 1 X (-1) + (-1) X (-1) + (-1) X 1 + 1 X (-1) + 1 X 1 = 0 B Sends (data bit = 0) -1-1 1 1-1 -1 Receiver codeword A 1-1 -1 1-1 1 Multiplication -1 1-1 1 1-1 = 0 S A (-1,-1,1,1,-1,-1) = (-1) X 1 + (-1) X (-1) + 1 X (-1) + 1 X 1 + (-1) X (-1) + (-1) X 1 = 0

B (data bit = 0) -1-1 1 1-1 -1 C (data bit = 1) 1 1-1 1 1-1 Combined signal 0 0 0 2 0-2 Receiver codeword B 1 1-1 -1 1 1 Multiplication 0 0 0-2 0-2 = -4 Top Case B sends a 1 S B = 8 Bottom Case B sends a 0 S B = - 4

Transmissions from B and C, receiver attempts recovery using A s codeword (an error situation) B (data bit = 0) -1-1 1 1-1 -1 C (data bit = 1) 1 1-1 1 1-1 Combined signal 0 0 0 2 0-2 Receiver codeword A 1-1 -1 1-1 1 Multiplication (S A ) 0 0 0 2 0-2 = 0 Decode result: S A = 0 for this case where B and C have sent data and we attempt to recover a transmission from A. Different receiver codeword can result in S x that is non-zero but much less than the correct orthogonal result.

CDMA for Direct Sequence Spread Spectrum BPSK Demodulator CDMA User Code BPSK Spreading Code of User 1 The use of the code at the receiving end has the effect of narrowing the bandwidth for the specific user. Includes noise

Categories of Spreading Sequences Spreading Sequence Categories PN sequences (pseudonoise) Orthogonal codes For FHSS systems PN sequences most common For DSSS systems not employing CDMA PN sequences most common For DSSS CDMA systems PN sequences Orthogonal codes Spreading codes result in a higher transmitted data rate increased bandwidth; increased system redundancy (jamming resilient); the spreading codes are noise like in their appearance

PN Sequences PN generator produces periodic sequence that appears to be random PN Sequences Generated by an algorithm using initial seed The algorithm is deterministic Sequence isn t statistically random but will pass many test of randomness Sequences referred to as pseudorandom numbers or pseudonoise sequences Unless algorithm and seed are known, the sequence is impractical to predict

Important PN Properties Randomness Uniform distribution (frequency of occurrence) Balance property (equal # of 1 and 0 in a long sequence) Run property (length of a sequence of all 1 or 0 diminishes) Independence (no value in sequence inferred from the others) Correlation property (comparisons of shifts of itself) # of terms that are the same differs from those that are different by at most 1 Unpredictability

Linear Feedback Shift Register Implementation (LSFR)

Linear Feedback Shift Register (LSFR) Clocked high-speed sequential circuit, generates a sequence of period N (the output repeats every N bits). Must be fast since spreading rate > data rate Generates a sum of XOR terms B n = A 0 B 0 A 1 B 1 A 2 B 2... A n-1 B n-1 LSFRs produce a generator polynomial (Ex-OR gates represent the terms in the generator polynomial; actual circuit implementation doesn t need multiply circuits as previously shown. Same type of circuit used in CRC generation and checking.) Modulo 2 arithmetic (Ex-OR function) Resulting sequences are maximal-length sequences or m-sequences

Properties of M-Sequences (enables synchronization) Property 1 of maximal-length sequences: Has 2 n-1 ones and 2 n-1-1 zeros Property 2: For a window of length n slid along output for N shifts, where N = 2 n 1 each n-tuple appears exactly once, except for the all zeros sequence Property 3: Sequence contains one run of ones, length n One run of zeros, length n-1 One run of ones and one run of zeros, length n-2 Two runs of ones and two runs of zeros, length n-3 In general 2 n-3 runs of ones and 2 n-3 runs of zeros, length 1

Properties of M-Sequences Property 4: The periodic autocorrelation of a ±1 (changed from 0,1) m-sequence is R 1 0, N, 2N,... τ 1 otherwise N This is the definition of periodic autocorrelation which is the correlation of a sequence with all phase shifts of ITSELF

Definitions: Autocorrelation and Cross Correlation Correlation The concept of determining how much similarity one set of data has with another Autocorrelation is the correlation or comparison of a sequence with all phase shifts of itself. N R( ) = 1/N B k B k- k = 1 The periodic autocorrelation of a PN generator implemented with a Linear Feedback Shift Register or mathematically generated called a maximal-length sequence (m-sequence) is R( ) = 1 for 0, N, 2N,.. R( ) = - 1/N otherwise High degree of correlation Low degree of correlation

Autocorrelation and Cross Correlation Range between -1 and 1 1 The second sequence matches the first sequence 0 There is no relation at all between the two sequences -1 The two sequences are mirror images of each other Random data has a correlation of close to 0 whereas the same m-sequences have a sharp peak correlation at the chipping period which aids synchronization by the receiver (since the receiver knows the m-sequence). Cross Correlation N R A, B ( ) = 1/N A k B k- k = 1 The comparison between two sequences from different sources rather than a shifted copy of a sequence with itself Same general properties as for Autocorrelation

Advantages of Cross Correlation The cross correlation between an pseudo noise sequence (an m-sequence) and noise is low This property is useful to the receiver in filtering out noise Noise is random (autocorrelation = 0 for all phase shifts of itself) The cross correlation between two different m-sequences is low (should be 0 or close to 0) This property is the basis of CDMA applications Enables a receiver to discriminate among spread spectrum signals generated by different m-sequences High cross correlation for spread spectrum signal with the same PN bit stream applied at receiver Low cross correlation for spread spectrum signal and different PN applied at receiver.

Gold Sequences Gold sequences constructed by the XOR of two m-sequences (preferred pairs) with the same clocking (bit shifts) Gold Codes have well-defined cross correlation properties (not generally produced by m-sequences and thus m-sequences are not optimal for CDMA DSSS) Only simple circuitry needed to generate large number of unique codes using preferred pairs of m-sequences. In following example, two shift registers generate the two m-sequences and these sequences are then bitwise XORed to produce the Gold sequence.

Gold Sequences

Orthogonal Codes Orthogonal codes All pairwise cross correlations are zero Fixed- and variable-length codes used in CDMA systems For CDMA application, each mobile user uses one sequence in the set as a spreading code Provides zero cross correlation among all users Types Welsh codes Variable-Length Orthogonal codes

Walsh Codes (most common in CDMA) Set of Walsh codes of length n consists of the n rows of an n x n Walsh matrix: W 1 = (0) W 2n W W n = dimension of the matrix (overscore logical NOT) Every row is orthogonal to every other row and to the logical not of every other row Requires tight synchronization Cross correlation between different shifts of Walsh sequences is not zero; alternative is to use PN n n W W 2n n

Multiple Spreading Approachs Spread data rate by an orthogonal code (channelization code) Provides mutual orthogonality among all users in the same cell Further spread result by a PN sequence (scrambling code) Provides mutual randomness (low cross correlation) between users in different cells Requires sufficient bandwidth (since each spread increases the data rate) but is effective for decoding users in the same cell and reducing interference between users in different cells CDMA in combination with FDMA total bandwidth is divided into multiple subbands in which CDMA is used as the multiple access method

Summary The available radio resource is shared among users in a multiple access scheme. When we apply a cellular structure, we can reuse the same channel again after a certain distance (based on signal to interferrence levels). In cellular systems the limiting factor is interference. For FDMA and TDMA the tolerance against interference determines the possible cluster size and thereby the amount of resources available in each cell. For CDMA systems, we use cluster size one, and the number of users depends on code properties and the capacity to perform interference cancellation (multi-user detection). Slides for Wireless Communications Edfors, Molisch, Tufvesson 449