Professional Documents
Culture Documents
Submitted by:
Vivek Kr. Choudhary
[200611029]
2. Literature survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3. Problem Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
6. Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
7. References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
1. Introduction
Error free communication is an important aspect of high speed wireless communication
development. It depends on the thoroughness with which, the building blocks and
atmospheric condition .Noise, attenuation causes main problem i.e. bits of information
may lost in communication medium, so it is necessary to detect and correct a bits of
information at receiving end because retransmission not possible for high speed data
communication. One way to solve this problem is to use “Direct Sequence Spread
Spectrum (DSSS) Technique”. Because of spread spectrum signal are highly resistant to
noise and interference.
Direct Sequence Spread Spectrum (DSSS) involves spreading the data signal in
frequency domain by multiplying it with a PN-sequence [6] .A common technique for
generating this sequence is by using a Linear Feedback Shift Register (LFSR).
In some situations it is required that a communication signal be difficult to
detect, and difficult to demodulate even when detected. Here the word „detect‟ is used in
the sense of „to discover the presence of‟. The signal is required to have a low probability
of intercept - LPI. In other situations a signal is required that is difficult to interfere with,
or „jam‟. The „spread spectrum‟ signal has properties which help to achieve these ends.
Spread spectrum signals may be divided into two main groups - direct sequence spread
spectrum (DSSS), and frequency hopping spread spectrum (FHSS).
There are two bandwidths involved here: that of the modulated signal, and the spreading
sequence. The first will be very much less than the second. The output spread spectrum
signal will be spread either side of the original RF carrier (ω0) by an amount equal to the
bandwidth of the PN sequence. Most of the energy of the sequence will lie in the range
DC to ωs, where ωs is the sequence clock. The longer the sequence the more spectral
components will lie in this range.
The modulated signal can be of any type, but typically digitally-derived, such as binary
phase shift keyed - BPSK. In this case the arrangement of Figure 1 can be expanded to
that of Figure 2. A digital message is preferred in an operational spread spectrum system,
since it makes the task of the eavesdropper even more difficult.
Figure 2: A spread BPSK signal
The arrangement of Figure 2 can be simplified by noting that, if the clock of the bipolar
message is a sub-multiple of the clock of the PN sequence, then the modulo two sum of
the message and the PN sequence can be used to multiply the RF carrier, generating a
DSSS signal with a single multiplier.
1.1.3 A DSSS demodulator: A demodulator for the DSSS of
Figure 1 is shown in block form in Figure 3.
Spread Spectrum uses wide band noise-like signals. Because Spread Spectrum signals are
noise-like, they are hard to detect. Spread Spectrum signals are also hard to intercept or
demodulate .further Spread Spectrum signal are harder to jam (interfere with) than
narrowband signals. These low probability of intercept (LPI) and anti-jam (AJ) feature
are why the military has used Spread Spectrum for so many years. Spread Signals are
intentionally made to be much wider band than the information they are carrying to make
them more noise-like and even for some case the transmitted signal power goes down the
noise power.
2. Literature survey:
As I mentioned earlier the problem , “Long Feedback Shift Register Implementation” [1]
has been solve by Synchronous RAM (on chip FPGA). In general ,the implementing long
Shift register as PN sequence generator can occupy significant area in VLSI technology
or large number of CLBs in FPGA technology. Figure 6 shows implementation of LFSR
using 32x1 synchronous RAM takes 3 CLBs (6 flip flop). The standard implementation
of shift register based only one FFs will require 32 FFs plus additional control logic.
Rest of two problems still remain same and need to be solved. I am trying to solve
error detection and correction when data bits are lost due to:
1) Attenuation and attenuation distortion
2) Delay distortion
3) Noise
Above problem could be solved in many ways as there are many algorithm which
can solve digital error detection and correction problem [3]. In CRC-16 over 16 bits of
data are using detection multiple bit error detection and single bit error correction on
FPGA. These things are used in internet and computer networking having speed of Gbps
range. In this case if header bits or data bits are lost, retransmission will take place, but in
case of wireless network, again retransmission of data is not possible. Because of this
reason wireless network requires detection and correction of data at receiving end.This
can be made possible by some useful error detection and correction algorithm.
Same thing is happening in high speed wireless system network. Following are the some
algorithms which can solve above problem:
a) Hamming Code Logic
b) Cyclic Redundancy Check (CRC)
c) Viterbi Algorithm
Fig 6: LFSR Implementation using on-chip FPGA RAM
3. Problem Definitions
The problems are defined as follows:
1. Implementation of Long feedback shift register (LFSR):
Problem of generation of long PN-sequence it‟s needed more number of flip flop
to implement LFSR.
2. Synchronization of PN-sequence between transmitter
and receiver: Long PN –sequence and high speed communication causes
synchronization problem.
3. Error correction and detection at receiving end: Digital-Bit
errors caused by
a) Attenuation and attenuation distortion
b) Delay distortion
c) Noise
Data can be corrupted during transmission. For reliable communication, error must be
detected and corrected.
3.1 TYPES OF ERRORS
Whenever bits flow from one point to another, they are subject to unpredictable changes
because of interference. There are two types of error .
3.1.1 Single Bit Error
In a single-bit error, only one bit in the data unit has changed.
3.1.2 Burst Error
A Burst error means that 2 or more bits in the data unit have changed.
3.2 Error Detection and Correction
Error detection is the ability to detect errors; Error correction has an additional feature
that enables identification and correction of the errors. Error detection always precedes
error correction, both can be achieved by having extra or redundant or check bits in
addition to data deduce that there is an error i.e. Original Data is encoded with the
redundant bit(s) and new data formed is known as code word.
Each data bit may be including in more than one calculation. In the sequences above, for
example, each of the original data bits is included in at least two sets, while the r bits are
included in only one.
Transmission and recalculation 4 new parity bits, using the same sets of bits used by the
sender plus relevant parity r bit for each set(fig 9).Then it assembles the new parity
values into a binary number in order of r position (r8, r4, r2, r1). In our example, this step
gives us the binary number 0111(7 in decimal), which is the precise location of the bit
error.
Once the bit is defined, the receiver can reverse its value and correct the error.
The beauty of the technique is that it can easily be implemented in hardware and the code
is correct before the receiver knows about it.
Test bench wave form is showing that how input data is being encoded as output.
Some simulation results have been shown in the table.
5 Future Work
Adding of redundancy bits increases channel bandwidth therefore implementation of
hamming code logic in wide band CDMA is best choice , because higher redundancy bit
can detect and correct high data input bits.
Viterbi algorithm also may be used because it work at the receiving end. All of
above algorithm can detect multiple errors but correct only one bit error so we have to
developed new algorithm that can detect and correct multiple bits errors.
7. References
[1] Predrag Markovic, Milan Markovic, “FPGA/VLSI Implementation Analysis of
PN Sequence Generator for Direct Sequence Spread Spectrum Systems”. IEEE
conference, Nis, Yugoslavia,13-15 October 1999.
[2] Sunil Shukla, Neil W. Bergmann, “SINGLE Bit Error Correction Implementation in
CRC-16 on FPGA”. IEEE conference, 6-8 Dec. 2004.
[3] Behrouz A. Forouzan. “Data Communications and Networking”. McGraw-Hill 3rd edition,
1 Nov. 1994, pp. 257-259.
[4] Bob Zeidman. “Verilog Designer‟s Library”. Prentice Hall Modern Semiconductor
Design Series, pp. 237-259.
[5] K.H. Tsoi, K.H. leung and P.H.W. Leong, “Compact FPGA –based True and Pseudo random
Number Generators”.IEEE conference, 9-11 April 2003.
[6] Taub.Schilling. “Principles of Communication System”. TATA McGRAW-HILL EDITION,
2nd edition, pp 720-751.