Professional Documents
Culture Documents
Pseudonoise Sequences Direct Sequence Spread Spectrum Signal space dimensionality and Processing gain Probability of error Frequency hop spread spectrum Applications
Spread spectrum is a modulation method applied to digitally modulated signals that increases the transmit signal bandwidth to a value much larger than is needed to transmit the underlying information bits.
They are difficult to intercept for unauthorized person. 2. They are easily hidden, it is difficult to even detect their presence in many cases. 3. They are resistant to jamming. 4. They have an asynchronous multipleaccess capability. 5. They provide a measure of immunity to distortion due to multipath propagation
1.
The signal occupies a bandwidth much larger than is needed for the information signal. The spread spectrum modulation is done using a spreading code, which is independent of the data in the signal. Despreading at the receiver is done by correlating the received signal with a synchronized copy of the spreading code.
Pseudo-Noise Sequence
A pseudo-noise ( PN ) sequence is a periodic binary sequence with a noise like waveform that is usually generated by a means of a feed back shift register. It consists of a shift register made up of m flip-flops and a logic circuit to form a multiloop feedback circuit. The maximam-length sequence represents a commonly used periodic PN sequence.
x1
x2
x3 O/P
m 7 8 9 10 11 12 13 17 19
Balance property : In each period of a maximum-length sequence, the number of 1s is always one more than the number of 0s. Run property: Among the runs of 1s and 0s in each period of a maximum-length sequence, runs of each kind are of length 1, are of length 2, 1/8 are of length 3, and so on as long as these fractions represent meaningful numbers of runs. Correlation property: The autocorrelation function of a maximum-length sequence is periodic and binary valued.
k=lN k=lN
1. Direct sequence spread spectrum (DS/SS) 2. Frequency hopping spread spectrum (FH/SS)
SS modulation can provide protection against externally generated interfering (jammingbroadband noise/multitone waveform) signals with finite power. Purposely making the information bearing signal occupy a bandwidth far in excess bandwidth require to transmit it. Noise-like apperance The transmitted signal is thus enabled to propagate through the channel undetected by anyone who may be litening. Therefore SS as a method of camouflaging the information bearing signal.
x
(a) Transmitter
By multiplying the information-bearing signal b(t) the spreading code c(t), each information bit is chopped up into a number of small time increments. These small time increments are referred to as chips.
o/p
z(t)=c(t)r(t) = c(t)c(t)b(t)+c(t)i(t) ; c(t)c(t)=1 for all t z(t) =b(t) + c(t)i(t) ; b(t) NB & c(t)i(t)-WB Use of LPF z(t) = b(t) Pay for the improved protection against interference is increased transmission bandwidth, system complexity and processing gain. Here, our primary concern is the security of transmission.
The channel output given by: y(t) = x(t) + j(t) = c(t) s(t)+ j(t) The Coherent detector input u(t) : u(t) =c(t) y(t) = s(t)+ c(t) j(t) where for all t
Signal space dimentionality and Processing gain It is based on the signal space approach.
Signal space representations of the transmitted signal and the interfering signal (jammer). Consider a set of orthonormal basis functions,
----- 1 ------ 2
K=0,1..,N-1. -chip duration, N- number of chips per bit
-signal energy per bit, + -> 1, - -> 0 the code seq denotes the PN seq +/- 1 N-D req N orthonormal functions
--------- 3
j(t) is 2N-D The avg power of the interference j(t), ------- 7 Lack of knowledge of signal phase, the jammer can only place equal energy in the cosine and sine coordinates ------------ 8 rewrite eqn 4 , The coherent detector output is, ------------ 10 ----------- 11
Where,
------ 12 ------ 13
---- 14
Plus sign 1 & minus sign 0. Assuming
------- 15
The component due to interference,
------- 16
using eqn 1 and eqn 5
-------- 17
Approximate the PN seq Where & are RVs The probability of the event = + or 1 equals
------ 18
------ 19 The mean of the RV is zero since, for fixed k, ------ 20 For a fixed vector j, the variance of is given by, ------ 21 Since the spread factor , the variance in terms of the avg Interference power J as ------ 22 The output signal-to-noise ratio, An input signal-to-noise ratio, ------ 23 ------ 24
The output signal-to-noise ration in terms of the input signal-tonoise ratio, ------- 25 The signal-to-noise ratio in decibles, ------ 26 Where,
PG=
The processing gain in another way, 1. The bit rate of the binary data entering the transmitter input is given by ------- 27 2. The bandwidth of the PN seq c(t), defined in terms of the main lobe of its spectrum -----28
PG=
------ 29
Probability of error
Let the coherent detector output v and noise component the sample value of a random variable V and
are
------- 1
The decision rule used by the coherent detector is to declare that the received bit in an interval (0, ) is 1 or 0. With both information bits assumed equally likely, the average probability of error is same as the conditional probability of the receiver making a decision in favor of symbol 1, given that symbol 0 was sent. = --------- 2 is the sum of N identically distributed random variables. According to the central limit theorem, for large N, the random variable assumes a Gaussian variable with zero mean and variance , where J is the average interference power and is the chip duration. The average probability of error, ) ------- 3
Antijam characteristics:
The average probability of error for a coherent binary PSK system reproduced -------4 The calculation of bit error rate in a direct-sequence spread binary PSK system, the interference may be treated as wideband noise of power spectral density -------- 5 , where P is the average signal power
The bit energy and is the bit duration. The bit energy-to-noise density ratio --------- 6
The jamming margin, The jamming margin in terms of decibels,
FHSS
The wide bandwidth is divided into narrow sub-bands or channels The message signal is hopped from one channel to another. At the transmitter, the modulated message signal is transmitter at a transmit frequency determined by certain hopping algorithm.
FHSS Example
PN sequence generator
A PN sequence generator generates a periodic PN sequence based on a hopping algorithm. The generated PN sequence is fed to a frequency synthesizer, which then determines the frequency channel at which to transmit the message frame. m bit PN generator identifies 2m -1 possible frequencies.
FHSS Receiver
At the receiver there is an identical PN generator synchronized with the received signal. Receiver therefore knows which at frequency current frame will be transmitted.
Applications
Code division multiple access Multipath suppression