Notes on Fading Properties of SPread spectrum
Notes on Fading Properties of SPread spectrum
1
Modulation schemes studied thus far
• Efficient use of BW and Power. Trade off BW and Power. (Bandlimited
and Power limited Modulation Schemes)
• Margins provided for operation in AWGN environment
• ISI was controlled using pulse shaping
• No margins for interference from external sources was provided.
5
Figure 7.6
Illustrating the
waveforms in the
transmitter of
Figure 7.5a.
6
Two types of SS -
•Direct Sequence SS (DSSS) wherein a Pseudo Random (PN) data
sequence is used to spread the BW of the information sequence.
• Frequency Hopped SS (FHSS) wherein the information sequence
BW is frequency hopped across much wider SS BW.
Note:
• Both employ a spreading sequence generation called PN sequence.
• The PN sequence employed has good ACF and CCF properties that
make them suitable for multipath rejection and Ranging.
• DSSS is easily employed for multiuser applications.
• FHSS is more ideally suited for Antijam applications.
7
Data DSSS Bandwidth of FHSS Bandwidth of
Data Data
BW wideband carrier BW BW wideband carrier
8
PN sequences for Spread Spectrum
All zero initial state is not valid. Always initialized to a non zero state.
Feedback , Feedforward
Systematic , Non- Systematic 9
Maximal-length sequence, Feedback and Non-systematic
Maximal-length sequence generator for m 3.
Succession of states 100, 110, 111, 011, 101, 010, 001, 100
In FH SS – Two ways
1. The sequence is partitioned into k bit segments and each
segment determines hop frequency
2. Every state of Shift register determines a frequency that 12
corresponds to one output bit of sequence
Properties of Maximal Length Sequences (Used when we derive SNR)
13
Autocorrelation property (a) Waveform of maximal-length sequence
for length m 3 or period N 7. (b)
Autocorrelation function. (c) Power spectral
density. All three parts refer to the output of
the feedback shift register.
14
Maximal Linear m - sequences Autocorrelation property
15
Some Important Aspects about maximal length PN sequences
1. Vulnerability of the PN Sequence – Easy to find Tc and Tb from
spectrum analyzer. PN sequence should be long else feedback
connections may be easily determined. (Not suitable for antijam
applications)
2. Good Auto correlation properties especially for Ranging.
3. Auto correlation properties good for use in CDMA. But number of
such sequences are too limited for public cellular use.
4. Cross correlation properties not as good (see table) – Though it gets
better with longer sequence period ‘n’. Ideally PN sequences should
be mutually orthogonal so that interference adds on power basis. These
are not fully satisfied by linear m - sequences. Not used in CDMA
because of high values of Cross correlation.
5. Gold – Kasami sequences are the preferred choice in CDMA with
larger number of available sequences and significantly better cross
correlation properties than M-sequences.
Table on Pairs of m – sequences - next slide
16
17
Gold – Kasami Sequences
18
{-1, -t(m), t(m)- 2}
n = 2^5 – 1 = 31
Total number of seq = n+2
= 31+2 = 33
0 1 2 3 4 5
(1.x^0)+ (0.x^1)+(1.x^2)+(0.x^3)+(0.x^4)+(1.x^5)
(1.x^0)+ (1.x^1)+(1.x^2)+(0.x^3)+(1.x^4)+(1.x^5)
19
TX and Rx Architecture for DSSS with QPSK Modulation
Bandwidth Expansion Factor = (W/R) = (Tb/Tc) = Lc = N i.e number of chips per Transmitted Information bit
Encoder is a (n,k) block or a convolution coder.
Code rate Rc = (k/n) = (Tc/Tb) = (1/Lc). Therefore block length of code word n = k . Lc
In terms of Time - k information bits x bit time Tb = kTb = n coded bits x chip time Tc = nTc
How is this accomplished?
Data bits (1&0) at (1/Tb) rate – Chopped by all 1’s i.e. (n,1) block code – (1&0) at (1/Tc) rate – Modulo 2
added with PN sequence at (1/Tc) rate.
bi ai
gi
ci
This scheme is fine for Transmitter with ai shown implemented in additive form.
At the Demodulator we express s(t-iTc) and correspondingly the received signal in multiplicative form in terms of
information code words and PN sequence code words since multiplicative operations are invoked at the receiver.
This multiplicative form is easily obtained by defining a secondary set of waveform functions
ci(t) = (2 ci − 1)g(t − iTc) , for the polar form of encoded data words and
pi(t) = (2 bi − 1) p(t − iTc) , for the polar form of the impressed PN sequence where p(t) is a unit height
rectangular gating pulse of duration Tc.
Then the equivalent low pass transmit signal can be represented in polar waveform as
gi(t) = pi(t). ci(t) = (2 bi − 1)(2 ci − 1) p(t − iTc)g(t − iTc) = (2 bi − 1)(2 ci − 1) g(t − iTc)
= −(2 ai − 1) g(𝑡 − 𝑖𝑇𝑐)
Here we have used the fact that p(t – iTc) is a rectangular pulse leading to p(t – iTc) ∗ g(t – iTc) = g(t – iTc)
See table below that shows that (2bi – 1) (2ci – 1) = - (2ai -1)
This is same as the transmitted PSK signal using Mod-2 adder as evidenced by the table below.
20
?*'rWU 4
.o
Lffybx &, \\a\:*au,z [^R
4"*,/" ca,s<]
tl.aly,^:e
4 F* w-r,*A kT; IE /-,tuA 16 E, p**
/,I.*"J W *v* l^l<t?"-"'*-'
'rta-hnutr*e 4 *N '\a
lacear'*d
f,*' F + Nmf,L"'
vJ^tu* r lu'l :: Jia +t\os,,(.f) A+
-b
.f.bMil"a"J W e
b^r$dll Wtdils4'"') s?>Gl = aJ; nlurt
E hrl J \q r+) I
-P
r talu
(re.)
J-'io,+\"4 =
ri
=Jo 3$
-^lu
= ZErt"
b-t 2ilo
r;h4-L tr.J* f ht
=
= +t^'. &E'Ja
dt, =1,laEF.cl
ra Ec .2hnn; +ec|,'\^4
\",,=o(H) =.[m]=a( Fi
Lb= n Eo Et= Eb = Kc Eu
h,rX 'll^r*, K , *
)a
TxJ P.
,l* a-[l IW - \d'stL /'L
f'l r f-
T
2. Na]^b'PbtuJ l-Rw^'p'
g,rct) = d&.lo
ul
= fu h5l
l+ls ,lr^,
. wtl,-
I'L
Fl,{= I
l*
JI 16r
(+) I dn^ 4
-[0, '
hr
l>
t'"
=b Dt I
*wl,,-
16rfi)' )+
^ql,
hb, l.,t] 3, -*'1,
| '[2,+t
l'l+
{-*' =
E
fr,
fr*
tr" 4*" ok Ta 6 C{) ,\r, f l"fi-A
hi,r.o,
6t ) LEc'le
nWl-
v-*L = rr urn ee'Ic ('rt"\ 4
X, )r, j^?
d4 = ,lr--rlt gL
t,u'
-9- -+ -h9rTc
kx F=
H,Tc ) 2- _;
*=
ly Ec L,)n 1w
I) s,^.' &r) at € €-
^Pl-
+ E{
tJ,r $N
.F
h! u,- hr1
I Ft r.Lw^- =-(
t J + L.b-loare )
8 . Tb^4 fa"'*v't"-t*
tw
lt
\ tl g ut- Tq"t e'T c: )=r(ffi.)
Tc =J_
t^}
?,: [-@;*\
'>t a (! L'*''I
-- S"-.n ut k
NA,Ua^{b^^a
,
+, f a,rr"rrnlX @
&, = T641-r*a-
tu"*7 f^,* = &.I, a.tu)W Bw
dfr^fr &_
Ax
0.1t
Du
> o,1l
(eL,) &
W
i
lf u da"'tv- "ilt*l 4
a
Ib
{,
<0,11
hnkn- f u* ) qlfr>o"'l
)
I
kfu,
4
)" rl":tu
o
lu
M
q( 4L+
t
Rc hsm
tt\= > Jo
le
,, 1o = J"-
ln
F-ro =
y<n lr' = (a. {^i :-@.
JD jq*[* J,v R
(T* lf_,)
I,r3
------7'
K
U=
<-
t4
Jo
d&
JNp--- 4q t cq e J-'Itl
lw^',e^r^, 3*
Wd. W W, T*t
w
--=
LhofrA"or.
21
• Available channel BW is divided into a large number of
contiguous frequency slots.
• In any Transmit interval, signal occupies one or more of these
frequency slots.
• Selection of frequency slot is done Pseudo randomly using a
PN sequence
• Example 1: m- bits from a PN Seq generator can be used to
determine ( – 1) possible frequency translations.
• Example 2: – Every state of shift register array in PN
sequence generator determines a frequency slot.
23
Figure 7.10
Frequency-hop
spread M-ary
frequency-shift
keying.
(a) Transmitter.
(b) Receiver.
24
Rc = Max (Rh, Rs) where
Rh – hop rate,
Rs – symbol rate.
Slow Freq hop Rc = Rs= Rbitrate / K
and note that Rs > Rh
>= 1 symbols/Hop is Slow Freq Hop
Period of PN Sequence = 2^4 - 1 = 15
Figure 7.11
Illustrating slow-frequency hopping.
(a) Full spread bandwidth frequency variation
for one complete period of the PN sequence.
(b) Partitioned PN Seq. Each part mapped to a
hop frequency.
(c) Variation of the dehopped
frequency with time.
2 bits/tone, 4 FSK
2 symbols/hop
Rc = Max (Rh, Rs) where
Rh – hop rate,
Rs – symbol rate.
Fast Freq hop Rc = Rh and that is > Rs
< 1 symbol/Hop Fast Freq Hop
Figure 7.12
Illustrating fast-frequency hopping.
(a) Variation of the transmitter frequency with
time.
(b) Variation of the dehopped frequency with
time.
2 bits/tone, 4 FSK
1/2 symbol /hop or 1 bit/hop
Limitations of CDMA
27
t_
pftv,.na-'te-- Lm a,\ flilAfv C^^yr^!.l
% FHss @
*ry)
?.= \
;F'/r" = ; - Ybkt"tn
e2- ->(D
/>l
h/*t ),=
%
, ir AntanA l^"h 2*&* blee^rdl^'
l^^ F*t
b^k
V*n*-1 hffF,n
lF* *,%, &r. <az)^ lr*y catfuw1 ff'*
untqb t*Y lt'r 'rc{ettr-t'-
rB, A^U","'-) &i'
h"*r 3 €RnA w+6r,"ahc4^ b'*
C\^t,t ilI W
_vl, L-t
1
F
L ZKr (r"v4' --z@
.\
dL "l a :o
d_
T,--
; L .q s7*A4>
b
fo
ki
(
g_'[r'"]
it 'f:o \ Y I
vya*"\&n)
Y* R=r(*)= ry ) C1e{r
t'eceLw) r\i' J-^wJ 0C
'
I rru^Ub\ 1 "'1
il** Ta"'*'A'
,,rk) = L"( *f G"h)
D- -- \ r'/-
rL - ./,
-
€b 7->
-F =4
/ fErfToE'lun rD
1 -L ; ) tolp <L
Numerical problems on Spread Spectrum
Problem-1
Problem-2
Problem-3
1
lvu"*{-Y"-l frxr^Wb -Sy^€^A kfrd"/^- O
lg = 3o *It4
fnt = )''b d'b'
Problem-5
2
@
@ tl hw I t6L sW'{r?ea earA}^ct }s
'Ttu tM
svce sktr4 L= bz16'l
Wy >ax
: ro.o bF" {'r, '
sla.A{^,ileaaAS}UA:utflaysa.+t^42.,h.dbn%+=2bol]51
lb' 6' ' eg3 rAvb'
lN*.^ w,t- '{sx,-l *
bn ?ass @
** l\d{t
@ [?)
Sl'R -l* > l*Y* = >D
deAeanw lt
ct"ry €Trtt tri{'/" ry1c,1 -tph-ox-r-*
Wffi\ 4
p --
t2- J- {Eifu.*
til b't 2w1'{
Yr&\ "'}
= z.Qp K rtl
T. --- J-
,o Cr*{* [rr.)-l
b=* =R* XroG ckryfs"..
Tc
4= Soo r-
fu'5
f-.
eb
K
\-
N Axto3 = t# ++3
Problem-7