Professional Documents
Culture Documents
Unit I
Unit I
Unit I
Spread Spectrum
Communications
M V K Gayatri Shivani
-Assistant Professor
INDEX
Spreading sequences-
➢Properties of Spreading Sequences,
➢Pseudo- noise sequence,
➢Gold sequences,
➢Kasami sequences,
➢Walsh Sequences,
➢Barker Sequence
➢Orthogonal Variable Spreading Factor Sequences
➢Complementary Codes
Text Book : Principles of Mobile Communication, 3rd Edition, Springer
[Chapter 9]
INDEX
Digital Modulation DQPSK ,8PSK, 16PSK, 8QAM, 16QAM,
x1 x2 x3
0 0 1
1 1 0 0
2 0 1 0
Sequence 3 1 0 1
generated 4 1 1 0
5 1 1 1
6 0 1 1
Sequence = 1 0 1 1 1 0 0
7 0 0 1
▪Balance Property
No of Ones :- 4
No of Zeroes :- 3
▪Run Property
Sequence generated = 1 0 1 1 1 0 0
Total runs = 4
Runs with length 1 = 2
Runs with Length 2 = 1
Cross Correlation Property
The cross-correlation of two discrete sequences x and y, normalized with
respect to the sequence length N,
is given by
Disadvantages of PN Sequences
• No of Sequences that can be generated using LFSR of given degree
are limited to the no of primitive polynomials that are available
▪Let p1(x) and p2(x) be a pair of primitive polynomials over GF(2) each
having degree m such that p1(α) = 0 and p2(α^d) = 0 for some integer d
▪ If if e = GCD(m,h) is such that m/e
is odd, then p1(x) and p2(x) constitute a preferred pair of polynomials.
▪Note that p2(x) may not be unique. For example, with m = 5, both h = 1
and h = 2 will work
▪To find the corresponding polynomials we can refer to Peterson’s table of
irreducible polynomials
Kasami Sequences
▪Let m be even.
▪Let p1(x) be a primitive polynomial over the binary field GF(2) with degree m and
α as a root, and let p2(x) be the irreducible minimal polynomial of α^d where d =
2m/2+1.
▪Once again, these polynomials can be identified using Peterson’s table of
irreducible polynomials
▪The set of Kasami sequences is generated using the two m-sequences in a fashion
similar to the generation of Gold sequences
▪The number of Kasami sequences in the set is each 2^(m/2) having period N =
2^(m)-1
This sequence generator can produce eight Kasami sequences of length 63
Walsh Sequences
Walsh–Hadamard sequences are obtained by selecting as sequences the rows of a
Hadamard matrix HM
For M = 2, the Hadamard matrix is
The walsh sequences are +1,+1 and +1,-1The rows in the Hadamard matrix define
the Walsh–Hadamard sequences, and have the property that they are mutually
orthogonal.
Larger Hadamard matrices are obtained using the recursion
Barker Sequence
The mirror images (or time reversed) sequences are also Barker sequences. Barker
sequences of other lengths do not exist. Barker sequences are specially designed
sequences that have almost ideal aperiodic autocorrelation functions, as defined in
(9.21). For the Barker sequences
Orthogonal Variable Spreading Factor Sequences
▪ The orthogonality properties are similar to Walsh–Hadamard sequences. In fact the set
of sequences is identical, and only their order is different.
▪ A code can be assigned for use if and only if no other code either on the path from the
specific code to the root of the tree, or on the subtree produced by the specific code, is
already being used.
▪ Hence, the total number of available codes is not fixed, but depends on the rate or
spreading factor of each physical channel.
Complementary Codes
Digital Modulation
❑8PSK
❑ 16PSK
❑ 8QAM
❑16QAM
❑DQPSK
With 8-PSK, three bits are encoded, forming tribits and producing eight different output
phases. With 8-PSK, n = 3,M = 8, and there are eight possible output phases. To encode
eightdifferent phases, the incoming bits are encoded in groups of three,
called tribits (23 = 8).
8-PSK Transmitter
Consider the input sequence:- 0 0 0 1 1 1 0 0 1
Step 1:- The bits are split for I,Q, C channels
100111000 0
0
In Q channel the bits are 0 1 1
In I channel the bits are 0 1 0
In C channel the bits are 0 1 0
In C channel the bits are 1 0 1
Step 2:-The bits enter 2-to-4-level converter. Essentially, the 2-to-4-level
converters are parallel-input digital-to-analog converters (DACs).
With 16-PSK, four bits (called quadbits) are combined, producing 16 different
output phases. With 16-PSK, n= 4 and M= 16; therefore, the minimum
bandwidth and baud equal one-fourth the bit rate ( fb/4).
With 16- PSK, the angular separation between adjacent output phases is only 22.5°.
Therefore, 16- PSK can undergo only a 11.25° phase shift during transmission and still
retain its integrity.
8 QAM
Quadrature-amplitude modulation (QAM) is a form of digital modulation similar to PSK
except the digital information is contained in both the amplitude and the phase of the
transmitted carrier.
With QAM, amplitude and phase-shift keying are combined in such a way that the positions
of the signaling elements on the constellation diagrams are optimized to achieve the greatest
distance between elements, thus reducing the likelihood of one element being misinterpreted
as another element
The minimum bandwidth required for 8-QAM is fb/3, the same as in 8-PSK and their
receiver structures are also same
8 QAM Transmitter
Consider the bit stream 000111
8-PSK 8 QAM
16 QAM
DQPSK
It conveys data by changing the phase of the carrier wave. For BPSK and
QPSK there is an ambiguity of phase if the constellation is rotated by some
effect in the communications channel through which the signal passes.
This problem can be overcome by using the data to change rather than set the
phase.
➢DS-CDMA Model,
➢Conventional receiver,
➢Rake Receiver ,
➢Synchronization in CDMA,
➢ Power Control,
➢Soft handoff,
➢Multiuser detection – Optimum multiuser detector, Linear multiuser detection
DS-CDMA Model
Direct Sequence Spread Spectrum (DSSS)
To produce the DSSS signal, we multiply the preceding by c(t), which is the PN
sequence taking on values of
At the receiver, the incoming signal is multiplied again by c(t).But c(t)xc(t) is 1 so at the
Receiver we can recover the signal as
Approximate
Spectrum of
DSSS Signal
Code Division Multiple Access (CDMA)
• Multiplexing Technique used with spread spectrum
• Start with data signal rate D
– Called bit data rate
• Break each bit into k chips according to fixed pattern specific to
each user
– User’s code
• New channel has chip data rate kD chips per second
• E.g. k=6, three users (A,B,C) communicating with base receiver R
• Code for A = <1,-1,-1,1,-1,1>
• Code for B = <1,1,-1,-1,1,1>
• Code for C = <1,1,-1,1,1,-1>
CDMA Explanation
• Consider A communicating with base
• Base knows A’s code
• Assume communication already synchronized
• A wants to send a 1
– Send chip pattern <1,-1,-1,1,-1,1>
• A’s code
• A wants to send 0
– Send chip[ pattern <-1,1,1,-1,1,-1>
• Complement of A’s code
• Decoder ignores other sources when using A’s code to decode
– Orthogonal codes
At the Reciever
• if the receiver R receives a chip pattern d = <d1, d2, d3, d4, d5, d6>, and
the receiver is seeking to communicate with a user u so that it has at hand
u’s code
• The receiver performs electronically the following decoding function:
For user A, chip code is <1,-1,-1,1,-1,1>, It sends bit 1, so the d = < -1,1,1,-1,1,-1 >
At the receiver
S(d) = (1*-1) + (-1*1)+ (-1*1)+ (1*-1)+ (-1*1)+ (1*-1) = -6
-6 will be decoded as 1
B(data bit -1 -1 1 1 -1 -1
Decoding B 0)
bit when
C(data bit 1 1 -1 1 1 -1
both are 1)
transmitted Combined 0 0 0 2 0 -2
Signal
Received 1 1 -1 -1 1 1
Codeword
Multiplicat 0 0 0 -2 0 -2 -4
ion
CDMA for DSSS
• n users each using different orthogonal PN
sequence
• Modulate each users data stream
– Using BPSK
• Multiply by spreading code of user
The conventional receiver
▪ The conventional receiver is the classical detection method used in a
spread spectrum transmission technique.
▪ It is simple and cheap to implement but its bit error rate performance is
degraded by the multiple access interference since no further processing is
used in the detection method to reduce or eliminate the interference
The symbol duration must be much larger than the delay spread so that
there is no ISI
Rake Receiver
▪In a spread spectrum communication operating at high spreading codes,
the delay between the multipath components is likely be equal to or
greater than one code pulse (chip) duration.
▪In a RAKE receiver, if the output from one correlator is corrupted by fading, the others
may not be, and the corrupted signal may be discounted through the weighting process.
The M decision statistics are weighted to form an overall decision statistics.
Synchronization in CDMA
Reliable data detection can only be carried out after the received spread-
spectrum is converted to its original narrowband equivalent.
Till the work of Verdu, it was thought that the optimum detector was
the matched filter per user.
But Verdu showed that the spreading code of the others can also be
used to decode the message of a user
Drawbacks of optimum Detector
- Grows increasingly complex as number of users increases
- Needs accurate information
- Requires k matched filters
Linear Multi user Detection
The aim of a linear MUD is to implement a suboptimal detector that
can deliver the capacity increase of the optimal detectors but with low
complexity implementation using known filters.