Академический Документы
Профессиональный Документы
Культура Документы
Submitted in the partial fulfillment of the requirements for the award of the degree of
Master of Technology
In
By
Ch. VenkateswaraRao
(14PA1D3803)
January 2016
VISHNU INSTITUTE OF TECHNOLOGY
(Approved by AICTE&Affiliated to JNTU Kakinada)
Accredited by NAAC and NBA
Vishnupur, Bhimavaram-534202.
CERTIFICATE
This is to certify that the technical seminar entitled Spread Spectrum Communication is being
submitted by Ch. Venkateswara Rao [14PA1D3803] partial fulfilment for the award of the
degree of Master of Technology in Digital Electronics and Communication Systems is a record
of bonafide work carried out by him under my guidance and supervision during academic year
2015-2016 and it has been found worthy of acceptance according to the requirements of the
university.
Our most sincere and grateful acknowledgement is due to this sanctum, Vishnu Institute of
Technology, for giving us opportunity to fulfill my aspirations and for successful completion of
Post-graduation.
I express my heartfelt thanks to our Principal Dr. D. Suryanarayana for providing us
with the necessary facilities to carry out this work.
It is great pleasure for me to acknowledge the guidance, encouragement and support that i
have received from Dr. N. Padmavathy, Ph. D (IIT-KGP), Professor, Department of Electronics
& Communication Engineering, Vishnu Institute of Technology. I am thankful for her
continuous assistance and invaluable suggestions. She not only provided me help whenever
needed, but also the resources required to complete this seminar report on time.
I would like to express my sincere thanks to PG Coordinator Dr. P.S.N. Murthy Ph. D,
Professor, Vishnu Institute of Technology and Prof. K. Srinivas, H.O.D, Electronics &
Communication Engineering, Vishnu Institute of Technology.
(14PA1D3803)
SPREAD SPECTRUM COMMUNICATION
Abstract
Advances in technology have brought to us a new form of digital radio service called Spread
Spectrum. The spread spectrum technique handles the radio signal differently from other forms
of digital radio. In spread-spectrum operation, the radio signal is spread across a great bandwidth
with the use of a spreading algorithm based upon a pseudo-noise (PN) code. The result is a signal
that is essentially buried in the noise floor of the radio band. The receiver is programmed to
examine the bandwidth of the spread signal and correlate the data (despread it). The process of
correlation also causes any other signal received to be spread as the wanted signal is despread.
This causes unwanted signals which appear as noise. The result is a signal that is extremely
difficult to detect, does not interfere with other services and still passes a great bandwidth of
data. The spread spectrum techniques like direct sequence spread spectrum, frequency hopping
spread spectrum, time hopping spread spectrum and hybrid spread spectrum are the commonly
used methods for spread spectrum technology. In this report we discuss how the signal
bandwidth is spread according to the spread spectrum technique, processing gain related to the
each technique, importance of jamming margin in spread spectrum and pseudo random codes.
Keywords: Spread spectrum; Processing gain; Jamming margin; Hopping; Pseudo random codes;
Correlation
List of Figures
Figure Page
Description
number number
1.1 Narrowband Verses spread spectrum 1
1.2 Spread spectrum communication system 4
Spreading operation spreads the signal energy over a wider
1.3 5
frequency bandwidth
1.4 Despreading operation recovers the original signal 5
Sharing of frequency band by multiple users with spread-spectrum
1.5 6
techniques.
Illustration of how the signal can reach the receiver over multiple
1.6 7
paths
1.7 Spread-spectrum signal is buried under the noise level 8
1.8 Basic importance of spread spectrum code. 8
1.9 Time-slot allocations among different users in a TDMA system. 9
1.10 Frequency allocation among different users in a FDMA system 9
CDMA systems access the same frequency band with unique keys
1.11 10
or code.
2.1 Spectrum-analyzer of a DSSS signal. 13
2.2 Spectrum-analyzer of a Frequency hopping spread spectrum signal 15
2.3 Concept of frequency hopping 16
2.4 Time Hopping Spread Spectrum block diagram 16
2.5 Time hopping spectrum 17
2.6 hybrid spread spectrum block diagram 18
2.7 Hybrid spread spectrum 18
5.1 Block diagram of a sample PRN generator 26
5.2 Fibonacci implementation of LFSR 28
5.3 Galois implementation of LFSR 28
5.4 Implementation of MSRG 29
5.5 Generating an m-sequence of length 7 31
List of Tables
Table Page
Description
number number
Relative comparison of spread spectrum techniques with respect
3.1 20
to processing gain
Relative comparison of spread spectrum techniques with respect
3.2 20
to instantaneous bandwidth
Relative comparison of spread spectrum techniques with respect
3.3 20
to average peak transmit power
5.1 Primitive polynomials used for generating m-sequences 30
Acronyms and Notations
Acronyms:
C Channel capacity
r Code rate
S Signal power
W Transmission bandwidth
Notations:
BD Bandwidth of data
GP Processing gain
MJ Jamming margin
N0 Noise power
RC Chip rate
TW Pulse width
INDEX
Page No.
1. Introduction 1-12
1.1 A Short History 2
1.2 Theoretical Justification 3
1.3 Spread spectrum communication system 4
1.4 Spreading and Despreading 5
1.5 Advantages of Spread Spectrum 6
1.6 Applications of Spread Spectrum 10
2. Spread Spectrum Techniques 13-17
2.1 Direct Sequence Spread Spectrum 13
2.1.1 Advantages 14
2.1.2 Disadvantages 14
2.2 Frequency Hopping Spread Spectrum 14
2.2.1 Advantages 15
2.2.2 Disadvantages 15
2.3 Time Hopping Spread Spectrum 16
2.4 Hybrid Spread Spectrum 17
3. Processing Gain 18-19
3.1 Definition 18
3.2 Processing Gain of various spread spectrum techniques 18
3.3 Comparisons 19
4. Jamming Margin 20-22
5. Pseudo Random Noise Codes 22-29
5.1 Definition and Properties 22
5.2 Pseudo Random Number Generator 23
5.3 Maximal Length PN Sequence 25
5.3.1 Primitive Polynomials 28
5.3.2 Properties 29
6. Summary 31
7. Future Scope 33
References 35
1 INTRODUCTION
Spread Spectrum Communications is a mostly used digital communications technology that was
originally developed during World War II. Spread spectrum systems like GPS (Global
Positioning System) and Wireless Local Area Networks (WLANS) are being used by literally
millions of people today.
The basic characteristics of the modern spread spectrum systems are as follows
1. The transmission bandwidth is much greater than the minimum bandwidth required to
transmit the message signal
2. Demodulation must be accomplished, in part, by correlation of the received signal with
replica of the signal used in the transmitter to spread the information signal.
3. The carrier is nearly unpredictable, pseudo random, wideband signal.
There are many reasons for spreading the spectrum, and if done properly, a multiplicity of
benefits can accrue simultaneously. Some of these are
1
1. Anti-jamming
2. Anti-interfacing
3. Low probability of intercept
4. Multiple user random access communication with selective addressing capability
5. High resolution ranging
6. Accurate universal timing.
Over the last several years a new commercial Spread spectrum market place has been
emerging. Spread spectrum Technology covers the art of secure digital communications that is
now being exploited for commercial and industrial purposes. Applications for commercial spread
spectrum range from Wireless LAN's , integrated bar code scanner / palmtop computer / radio
modem devices for warehousing, digital dispatch, digital cellular telephone communications,
information society city/area/state or country wide networks for passing faxes, computer data,
email, or multimedia data.
Early spark-gap wireless transmitters actually used spread spectrum, since their RF bandwidths
were much wider than their information bandwidth. The first intentional use of spread spectrum
was probably by Armstrong in the late 1920s or early 1930s with wide-band frequency
modulation (FM). However, the real impetus for spread spectrum came with World War II. Both
the allies and the axis powers experimented with simple spread-spectrum systems. Much of what
was done is still shrouded in secrecy, however.
The first publicly available patent on spread spectrum came from HeadyLamer, the
Hollywood movie actress, and George Antheil, an avant-garde music composer. This patent was
granted in 1942, but the details were a military secret for many years. The inventors never
2
realized a dime for their invention; they simply turned it over to the US government for use in
the war effort, and commercial use was delayed until the patent had expired.
Most of the work done in spread spectrum throughout the 1950s, 1960s and 1970s was
heavily backed by the military and drowned in secrecy. The global positioning system (GPS) is
now the world’s single largest spread-spectrum system. Most of the details on GPS are now
public information. Spread spectrum was first used for commercial purposes in the 1980s when
Equatorial Communications of Mountain View, CA, used direct sequence for multiple-access
communications over synchronous satellite transponders. In the late 1980s, the US Federal
Communications Commission (FCC) opened up the industrial, scientific and medicine (ISM)
frequency bands for unlicensed spread-spectrum communications.
Typical applications for the resulting short-range data transceivers include satellite-
positioning systems (GPS), 3G mobile telecommunications, W-LAN (IEEE 802.11a, IEEE
802.11b, IEEE 802.11g), and Bluetooth. Spread-spectrum techniques also aid in the endless race
between communication needs and radio-frequency availability—situations where the radio
spectrum is limited and is, therefore, an expensive resource.
The basics of spread spectrum technology are expressed by C.E.Shannon in the form of channel
capacity:
The relationship between the ability of channel to transfer the error–free information compared
with the signal to noise ratio existing in the channel, and the bandwidth used to transmit the
information is defined as channel capacity [2], which is determined using (1.1).
Letting C be the desired system information rate [2] and changing the bases of (1.1), we get (1.2)
3
If signal-to-noise ratio is small, say < 1(as in an anti-jam system) then,
𝐶⁄ = 1 ∙ 44 𝑆⁄ (1.3)
𝑊 𝑁0
𝑁0 𝐶⁄
𝑊= 𝑆1 ∙ 44 (1.4)
Thus, for any given signal-to-noise ratio, a low information error rate is obtained by increasing
the bandwidth used to transfer the information [2].
The general block diagram of the spread spectrum communication system [2] is shown in Fig.
1.2. Different spread-spectrum techniques are available, but all have one idea in common: the
key (also called the code or sequence) attached to the communication channel. The manner of
inserting this code defines precisely the spread-spectrum technique. The term spread spectrum
refers to the expansion of signal bandwidth, by several orders of magnitude in some cases, which
occurs when a key is attached to the communication channel.
4
To apply a spread-spectrum technique, simply inject the corresponding spread-spectrum code
somewhere in the transmitting chain before the antenna (transmitter) and this injection process is
called the spreading operation. The effect is to diffuse the information in a larger bandwidth.
Similarly a despreading operation reconstitutes the information into its original bandwidth.
Obviously, the same code must be known in advance at both ends of the transmission channel.
In the spread spectrum communication systems the information signal energy is spread over a
large bandwidth during the transmission and despread with in the signal original bandwidth
during the reception. Fig. 1.3 and Fig.1.4 show the bandwidth effects of the spreading and
despreading operations [2].
Fig 1.3: Spreading operation spreads the signal energy over a wider frequency bandwidth
5
At the receiving end the spread spectrum signal is despread to generate original narrowband
signal. One can also demonstrate that signals such as an interferer or jammer added during the
transmission will be spread during the despreading operation. Waste of bandwidth due to
spreading is offset by multiple users. Spreading results directly in the use of a wider frequency
band by a factor that corresponds exactly to the processing gain mentioned earlier. Therefore
spreading does not spare the limited frequency resource. That overuse is well compensated,
however, by the possibility that many users will share the enlarged frequency band as shown in
Fig. 1.5.
Fig 1.5: Sharing of frequency band by multiple users with spread-spectrum techniques.
Spread-spectrum systems provide some clear advantages to designers. Few benefits the designers
can expect when using a spread-spectrum-based wireless system has been highlighted and listed
below [1].
6
3. Lowered susceptibility to multipath fading: Because of its inherent frequency
diversity properties, a spread spectrum system is much less susceptible to multipath
fading. Wireless channels often include multipath propagation in which the signal has
more than one path from transmitter to receiver. The reflected path (R) can interfere
with the direct path (D) in a phenomenon called fading.Fig.1.6.demonistrated the
signal propagation over multipath [2].
7
narrowband transmissions). Since the communication band is spread, it can be
transmitted at a low power without being detrimentally by background noise. This is
because when de-spreading takes place, the noise at one frequency is rejected, leaving
the desired signal.Fig.1.7 describes the concept of data spread which is buried under
the noise level [2].
9. Harder to jam: The most important feature of spread spectrum is its ability to reject
interference. At first glance, it may be considered that spread spectrum would be most
effected by interference. However, any signal is spread in the bandwidth, and after it
passes through the correlator, the bandwidth signal is equal to its original bandwidth,
plus the bandwidth of the local interference. An interference signal with 2 MHz
bandwidth being input into a direct-sequence receiver whose signal is 10 MHz wide
gives an output from the correlator of 12 MHz The wider the interference bandwidth,
8
the wider the output signals. Thus the wider the input signal, the less its effect on the
system because the power density of the signal after processing is lower, and less
power falls in the band pass filter.
10. Spread spectrum allows multiple access techniques: spread spectrum allows the
multiple access techniques like Time Division Multiple Access (TDMA), Frequency
Division Multiple Access (FDMA) and Code Division Multiple Access (CDMA)[2].
With TDMA the different users speak and listen to each other according to a defined
allocation of time slots shown in Fig. 1.9. Different communication channels can then
be established for a unique carrier frequency. Examples of TDMA are GSM, DECT,
TETRA, and IS-136.
9
Fig 1. 10: Frequency allocation among different users in a FDMA system.
CDMA access to the air is determined by [2] a key or code shown in Fig. 1.11 In that
sense, spread spectrum is a CDMA access. The key must be defined and known in
advance at the transmitter and receiver ends. Growing examples are IS-95 (DS), IS-
98, Bluetooth, and WLAN.
Fig 1.11: CDMA systems access the same frequency band with unique keys or code.
The major application areas of the spread spectrum are wireless local area networks (WLANs),
Space systems, Global positioning system (GPS), Personal communications [1].
10
over the air, minimizing the need for wired connections. Thus, wireless local area networks
combine data connectivity with user mobility and enable movable LANs. Most wireless local
area network systems use spread spectrum techniques (both frequency hopping and direct
sequence). WLANs are being used in health care, retail, manufacturing, warehousing, academic
and other arenas. These industries have profited from the productivity gains of using handheld
terminals and notebook computers to transmit real time information to centralized hosts for
processing. WLANs offer productivity, convenience and cost advantages over wired networks.
In space stations, which are continuously accessible to interference, spread spectrum methods
have proved effective. This is especially true for communication satellites. In general, satellites
do not employ processing on-board as it adds to the complexity and would limit the number of
satellite users. A simple repeating satellite is used, so all the spread spectrum modulation and
demodulation must be done on the ground. With no onboard processing, the satellite is forced to
transmit an uplink interference signal, which reduces the spacecraft transmitter power to send the
desired signal. Another disadvantage of no onboard processing is that every receiver would have
to acquire a spread spectrum demodulator.
Global positioning system (GPS) is a satellite based navigation system developed and operated
by the US Department of Defense. The idea behind GPS is to transmit spread spectrum signals
that allow range measurement from an unknown satellite location. With knowledge of the
transmitter location and the distance to the satellite, the receiver can locate itself on a sphere
whose radius is the distance measured. After receiving signals and making range measurement
on other satellites, the receiver can calculate its position based on the intersection of several
spheres. GPS permits users to determine their 3-D position, velocity and time. This service is
available for military and commercial users round the clock, in all weather, anywhere in the
world.
GPS uses Navigation Satellite Timing and ranging satellites (NAVSTAR). The
constellation consists of 21 operational satellites and three active spares. This provides a GPS
receiver with four to twelve usable satellites in view at any time. A minimum of four satellites
11
allow the GPS card to compute latitude, longitude, altitude and GPS system time. The
NAVSTAR satellites orbit the earth at an altitude of 10,898 Nautical miles in six 55-degree
orbital planes, with four satellites in each plane. The orbital period of each satellite is
approximately 12 hours.
The GPS satellite signal contains information to identify the satellite, as also positioning,
timing, ranging data and satellite status. The satellites are identified by the space vehicle number
or the pseudo-random code number. They transmit on two L-band frequencies: 1.57542 GHz
(L1) and 1.22760 GHz (L2). The L1 signal has a sequence encoded on the carrier frequency by a
modulation technique that contains two codes, a precision (P) code and a course/acquisition
(C/A) code. The L2 code contains only P code, which is encrypted for military and authorized
commercial users.
The advantages of using spread spectrum in data and voice communications are:
1. Spread-spectrum signals can be overlaid onto bands where other systems are
already operating, with minimal performance impact to or from the other
systems.
2. The anti-interference characteristics of spread-spectrum signals are important in
environments where signal interference can be harsh, such as networks operating
on manufacturing floors.
3. Cellular systems designed with code-division multiple-access (CDMA) spread-
spectrum technology offer greater operational flexibility and possibly a greater
overall system capacity than systems built on frequency-division multiple-access
(FDMA) or time-division multiple-access (TDMA) methods.
4. The anti-multipath characteristics of spread-spectrum signaling and reception
techniques are desirable in applications where multipath is likely to be prevalent.
12
2 Spread Spectrum Techniques
The spread spectrum techniques are broadly classified as Direct Sequence Spread Spectrum,
Frequency Hopping Spread Spectrum, Time Hopping Spread Spectrum and Hybrid Technology
[3].
With the Direct Sequence Spread Spectrum technique (DSSS), the Pseudo Random Noise (PRN)
sequence is applied directly to data entering the carrier modulator. The modulator, therefore, sees
a much larger bit rate, which corresponds to the chip rate of the PRN sequence. Modulating an
RF carrier with such a code sequence produces a direct-sequence-modulated spread spectrum
sin 𝑋 2
with ( ) frequency spectrum, centered at the carrier frequency.
𝑋
The main lobe of this spectrum (null to null) has a bandwidth twice the clock rate of the
modulating code, and the side lobes have null-to-null bandwidths equal to the code's clock rate.
Fig 2.1 illustrates the most common type of direct-sequence-modulated spread-spectrum signal
[4]. Direct-sequence spectra vary somewhat in spectral shape, depending on the actual carrier and
data modulation used. Fig 2.1 is a binary phase shift keying (BPSK) signal, which is the most
common modulation type used in direct-sequence systems.
13
The information signal is modulated with the pseudo random sequence generated by the PRN
generator .The bandwidth spread in the direct sequence spread spectrum is equal to the twice of
the chip rate (pseudo random code).
2.1.1 Advantages
1. This system has best noise and anti- jam performance
2. Unrecognized receivers find it most difficult to detect direct sequence signals
3. It has discrimination against multipath signals
2.1.2 Disadvantages
1. It requires wide band channel with small phase distortion
2. It has long acquisition time
3. The pseudo noise generator should generate sequence at high rates
4. This system is distance relative.
2.2 Frequency Hopping Spread Spectrum
The frequency hopping spread spectrum (FHSS) [3] method causes the carrier to hop from
frequency to frequency over a wide band according to a sequence defined by the PRN. The speed
at which the hops are executed depends on the data rate of the original information. One can,
however, distinguish between fast frequency hopping spread spectrum (FFHSS) and low
frequency hopping spread spectrum (LFHSS). The latter method, the most common, allows
several consecutive data bits to modulate the same frequency. Fast frequency hopping spread
spectrum is characterized by several hops within each data bit.
flat over the band of frequencies used (see Fig 2.2). The bandwidth of a frequency-hopping
signal is simply K times the number of frequency slots available (i.e., k*freq. slots), where K is
number of frequency choices of each hop channel.
14
Fig 2.2: Concept of frequency hopping.
The bandwidth of the frequency hopping spread spectrum is K times multiplies of Instantaneous
Bandwidth
𝐵𝑆𝑆 = 𝐾𝐵𝐼𝑁 (2.2)
Where 𝐵𝑠𝑠 is the spread spectrum bandwidth in Hertz
K is frequency choices (used for hopping)
𝐵𝐼𝑁 is Instantaneous Bandwidth in Hertz
The instantaneous bandwidth is defined as the difference between the two consecutive frequency
choices (𝐵𝐼𝑁 ) i.e. difference between the frequencies f1 and f2 as shown in Fig. 2.3.
15
2.2.2 Disadvantages
1. These systems need complex frequency synthesizers.
2. They are not useful for range and range-rate measurement.
3. They need error correction.
2.3 Time Hopping Spread Spectrum
Fig. 2.4 describes the general block diagram of Time Hopping Spread Spectrum (THSS) [5]. In
this technique, the modulation is done according to the various time hops on the time axis. The
signal hops in the time period.
𝐵𝐷
𝐵𝑆𝑆 = ⁄𝛽 (2.3)
Where 𝐵𝐷 =bandwidth of the data
𝛽 = duty cycle factor
16
The duty cycle factor (𝛽) is defined as the ratio of pulse width to the average pulse interval as
given in (2.4),
𝑇
𝛽 = 𝑊⁄𝑇 (2.4)
Where 𝑇𝑊 = pulse width
𝑇 = average pulse interval
Hybrid spread spectrum is formed by the combination of the any of the three techniques namely
DSSS, FHSS and THSS. The bandwidth of the hybrid spread spectrum [9], which is formed by
direct sequence spread spectrum and frequency hopping spread spectrum is given by
17
3 PROCESSING GAIN
3.1 Definition:
The processing gain of the spread spectrum is given by the ratio of spread spectrum
bandwidth to the minimum information bandwidth. i.e., Processing Gain = spread spectrum
bandwidth/minimum information bandwidth [1]
𝐵𝑆𝑆
𝐺𝑃 = ⁄𝐵 (3.1)
𝐷
where 𝐺𝑃 = processing gain
𝐵𝑆𝑆 = spread spectrum bandwidth
𝐵𝐷 = minimum information bandwidth
The processing gain of the direct sequence spread spectrum is defined as the ratio of chip
rate to data bit rate, that is, DSPG=chip rate/data bit rate
𝑅𝐶
𝐺𝑃𝐷𝑆 = ⁄𝑅 (3.2)
𝐷
The equation (11) can also be expressed as the ratio of the data bit duration to the chip
duration
𝑡𝑑
𝐺𝑃𝐷𝑆 = ⁄𝑡 (3.3)
𝑐
The processing gain of the frequency hopping spread spectrum is defined as the number of
frequency choices, that is, FHPG=K
𝐺𝑃𝐹𝐻 = 𝑁 (3.4)
The processing gain of hybrid spread spectrum system is the product of processing gains of
composite system, assuming that orthogonality is maintained
3.3 Comparisons:
The spread spectrum techniques are compared with the processing gain, instantaneous
bandwidth, and peak transmit power density:
18
Table 3. 1: Relative comparison of spread spectrum techniques with respect to processing gain
Table 3. 2: Relative comparison of spread spectrum techniques with respect to instantaneous bandwidth
Table 3. 3: Relative comparison of spread spectrum techniques with respect to average peak transmit power
𝑃𝑆
FHSS ⁄𝐵 𝐺𝑃
𝐷
𝑃𝑆
THSS ⁄𝐵 𝐺𝑃
𝐷
The comparisons of spread spectrum techniques with the processing gain, instantaneous
bandwidth and average peak transmit power depending up on the characteristics likespread
spectrum bandwidth and actual data bandwidth. According to the definition of the processing
gain, Table 3.1 provides comparison of GP and implies that the processing gain [1, 2] is almost
similar of all spread spectrum techniques. Table 3.2 provides comparison of GP with respect to
instantaneous bandwidth and from the table it is clear that spectrum spread is proportional with
the processing gain. Table 3.3 provides the comparison of processing gain with respect to peak
transmit power.
19
4 Jamming Margin
It is the maximum jammer power to signal power ratio that a spread spectrum receiver can
tolerate, while still maintaining the specified bit-error-rate. It is expressed in decibels.
Mathematically the jamming margin is given by:
𝐺𝑃
𝑀𝐽 = ⁄ 𝑆 (4.1)
(( ⁄𝑁)𝐿)
where 𝑀𝐽 = Jamming margin
𝐺𝑃 = processing gain
𝑆⁄ = minimum required output signal-to-noise ratio
𝑁
𝐿 = system implementation loss
𝑀𝐽 (𝑑𝐵) = 𝐺𝑃 (𝑑𝐵) − (𝑆⁄𝑁)(𝑑𝐵) − 𝐿(𝑑𝐵) (4.2)
The coding used in the spread spectrum techniques for error correction does not reduce
the jamming margin .Then the jamming margin is given by:
𝐺𝑃
𝑀𝐽 = ⁄ 𝐸𝑏 (4.3)
[( ⁄𝑁 ) × 𝐿]
0
𝐸𝑠⁄
𝐸𝑏 = 𝑟 (4.4)
𝐵𝐷 = 𝐵𝑠 𝑟 (4.5)
1. A predictor jammer observe the spread signal and via computational capabilities breads
the pseudo random noise code .It uses this knowledge of code to predict the pseudo
random noise code choice made by the spread spectrum system and allocates its
resources to jam that signal
2. The predictor jammer’s ability to break the pseudo random noise code is a function of the
code type and not a function of spread spectrum technique used
20
3. The pseudo random noise sequences are vulnerable to jamming due to some special
properties of the PN codes
4. Because of the special properties of the PN codes even an infinitely fast follower jammer
is totally ineffective if the PN code rate satisfies the following condition [1]
21
5 Pseudo Random Noise Codes
A PN code used for direct sequence-spreading exists of some units called chips; these chips can
have two values: -1/1 (polar) or 0/1. As we combine every data symbol with a complete PN
code, the DS processing gain is equal to the code-length. To be usable for direct-sequence
spreading, a PN code must meet the following constraints:
The above requirement stands for good spectral density properties (equally spreading the energy
over the whole frequency-band). Codes that can be found in practical direct sequence-systems
are: Walsh-Hadamard codes, M-sequences, Gold codes and Kasami-codes. These code sets can
be roughly divided into two classes: orthogonal codes and nonorthogonal codes. Walsh
sequences fall in the first category, while the other group contains the so-called shift register
sequences. There are some desired properties we want the spreading sequences to possess:
22
1. Sequence elements should behave like identically independent (iid) random variables,
i.e., the sequence should be pseudo random.
2. It should be easy to distinguish a spreading signal from a time-shifted version of
spreading signal.
3. It should be easy to distinguish a spreading signal from other spreading signals, including
time shifted versions of them, in the set.
4. It should be easy for the transmitter and the intended receiver to generate the spreading
sequence.
5. It should be difficult for any unintended receiver to acquire and regenerate the spreading
sequence.
In the spread spectrum communication the pseudo random codes generated by the pseudo
random generator have pseudo randomness properties. According to the pseudo randomness of
the sequence the sequence elements are random for certain amount of time. After that the
sequence is repeated. The time shifted version of the spread signal causes fading effect and it is
easy to distinguish between the spread signal and multipath signal [5].
A pseudorandom number generator (PRNG), also known as a deterministic random bit generator
(DRBG), is an algorithm for generating a sequence of numbers whose properties approximate the
properties of sequences of random numbers. The PRN generated sequence is not truly random,
because it is completely determined by a relatively small set of initial values, called the PRNG's
seed (which may include truly random values). Although sequences that are closer to truly
random can be generated using hardware random number generators, pseudorandom number
generators are important in practice for their speed in number generation and their
reproducibility.
A PRNG can be started from an arbitrary initial state using a seed state. It will always
produce the same sequence when initialized with that state. The period of a PRNG is defined
thus: the maximum, over all starting states, of the length of the repetition-free prefix of the
sequence. The period is bounded by the number of the states, usually measured in bits. However,
23
since the length of the period potentially doubles with each bit of state added, it is easy to build
pseudo random number generator with periods long enough for many practical applications.
If a random number generator internal state contains n bits, its period can be no longer
than 2n results, and may be much shorter. For some PRNGs, the period length can be calculated
without walking through the whole period. Linear Feedback Shift Registers (LFSRs) are usually
chosen to have periods of exactly 2n−1. Linear congenital generators have periods that can be
calculated by factoring. Although these generators will repeat their results after they reach the
end of their period, a repeated result does not imply that the end of the period has been reached,
since its internal state may be larger than its output; this is particularly obvious with PRNGs with
a one-bit output.
24
In modern communication the codes are digital sequences that must be as long and as random
and possible to appear as noise-like as possible. But in any case, the codes must remain
reproducible, or the receiver cannot extract the message that has been sent. Thus, the sequence is
nearly random. Such a code is called a pseudo-random number (PRN) or sequence. The method
most frequently used to generate pseudo-random codes is based on a feedback shift register. The
Fig. 5.1 shows the simple feedback shift register for pseudo random number generator. The shift
register contains eight data flip-flops (FF). At the rising edge of the clock, the contents of the
shift register are shifted one bit to the left. The data clocked in by FF1 depends on the contents
fed back from FF8 and FF7. The PRN is read out from FF8. The contents of the FFs are reset at
the beginning of each sequence length. Simply note that the construction or selection of proper
sequences, or sets of sequences, are not trivial. To guarantee efficient spread-spectrum
communications, the PRN sequences must respect certain rules, such as length, autocorrelation,
cross -correlation, orthogonality, and bits balancing.
Maximum Length PN sequences are binary sequence generators that are capable of outputting all
possible combinations of binary sequences in 2𝑚 − 1 cyclic shifts, where m is the size of the
linear feedback shift register (LFSR) used in generating such sequences. Terms like
pseudorandom binary sequences (PRBS) or psuedonoise sequences are also used to refer m-
sequences. To generate an m-sequence, feedback connection of linear feedback shift register is
connected according to a primitive polynomial (generator polynomial).
Linear feedback shift register (LFSR) produce linear recursive sequences (LRS) because
all operations are linear. Generally speaking, the length of the sequence before repetition occurs
depends upon two factors, the feedback taps and the initial state. A linear feedback shift register
of any given size m (number of registers) is capable of producing every possible state during the
period 𝑁 = 2𝑀 − 1 shifts, but will do so only if proper feedback taps have been chosen. For
example, such an eight stage linear feedback shift register will contain every possible
combination of ones and zeros after 255 shifts. Such a sequence is called a maximal length
sequence, maximal sequence, or less commonly, maximum length sequence. It is often
25
abbreviated as m-sequence. In certain industries m-sequences are referred to as a pseudo noise
(PN) or pseudorandom sequences, due to their optimal noise-like characteristics.
Maximal length generators can actually produce two sequences. The first is trivial one
which has a length of one, and occurs when the initial state of the generator is set to all zeros.
(The generator simply remains in the zero state indefinitely.) The other one is the useful one
which has a length of2𝑚 − 1.Together, these two sequences account for all 2𝑚 states of an m-bit
state register.
When the feedback taps of a linear feedback shift register are non-maximal then the
length of the generated sequence depends upon the initial state of the linear feedback shift
register. A non-maximal generator is capable of producing two or more unique sequences (plus
the trivial all-zeros one), with the initial state determining which is produced. Each of these
sequences is referred to as a state space of the generator. Together, every non-maximal sequence
the generator can produce accounts for all 2𝑀 states of an m-bit state register.
The linear feedback shift register can be implemented in two ways. The Fibonacci
implementation and Galois implementation. The Fibonacci implementation consists of a simple
shift register in which a binary-weighted modulo-2 sum of the taps is fed back to the input. (The
modulo-2 sum of two 1-bit binary numbers yields 0 if the two numbers are identical, and 1 if the
differs: 0+0=0, 0+1=1, and 1+1=0.) The Fig. 5.2 shows the Fibonacci implementation [6] of the
linear feedback shift register.
26
For any given tap, weight 𝑔𝑖 is either 0, meaning no connection, or 1, meaning it is fed back.
Two exceptions are 𝑔0 and𝑔𝑚 , which are always 1 and thus always connected. Note that 𝑔𝑚 is
not really a feedback connection, but rather is the input of the shift register.
The Galois implementation consists of a shift register, the content of which is modified at
every step by a binary-weighted value of the output stage, again using modulo-2 math. The
bellow Fig. 5.3 shows the Galois implementation of linear feedback shift register.
Careful inspection reveals that the order of the Galois weights is opposite that of the Fibonacci
weights. Given identical feedback weights, the two LFSR implementations will produce the
same sequence. However, the initial states of the two implementations must necessarily be
different for the two sequences to have identical phase (that is, zero bit offset relative to each
other). The initial state of the Fibonacci form is called the initial fill or initial vector, and this
initial fill comprises the first m bits output from the generator. The initial state of the Galois
generator must be adjusted appropriately to attain the equivalent output of its first m bits. (In
mathematical literature, the initial state of either form is called the seed.)
27
In the simple shift register generator (SSRG) and modular shift register generator (MSRG) all
the feedback signals are returned to a single input.Fig.5.4shows the implementation of modular
shift register generator [3].
𝑁 = 2𝑀 − 1 (5.1)
𝑋 7 + 1 = (𝑋 + 1)(𝑋 3 + 𝑋 + 1)(𝑋 3 + 𝑋 2 + 1) (5.2)
Since the number of registers are m = 3, we have to choose a primitive polynomial that is of
degree 3. From the above equation we have two choices for m = 3, i.e., (𝑋 3 + 𝑋 + 1) and(𝑋 3 +
𝑋 2 + 1). These polynomials are often represented as [3 1 0] and [3 2 0] respectively.
Some of the primitive polynomials used for generating m-sequences are given below.
Table 5. 1: Primitive polynomials used for generating m-sequences.
28
5 31 𝑋5 + 𝑋2 + 1
6 63 𝑋6 + 𝑋 + 1
7 127 𝑋7 + 𝑋 + 1
8 255 𝑋8 + 𝑋7 + 𝑋2 + 𝑋 + 1
9 511 𝑋9 + 𝑋4 + 1
10 1023 𝑋10 + 𝑋 3 + 1
Fig. 5.5 describes the maximal sequence generator of length 7.In this number of input bit
sequences are three. So the generating sequence of length 7 i.e.23-1. The feedback taps in the
feedback shift register are selected to correspond to the coefficients of the primitive polynomial.
Binary sequences drawn from the alphabet {0, 1} are shifted through the shift register in
response to clock pulses. 1 signifies closed or a connection and, 0 signifies open or no
connection. Each clock time, the register shifts all its contents to the right. The particular 1s and
0s occupying the shift register stages after a clock pulse are called states. Consider the initial
state of the shift register is [0 0 1] then, during the first clock pulse the state of the register is [1 0
0].
5.2.1 Properties:
1. An m-bit register produces an m-sequence of period, 2𝑀 − 1 .
29
2. An m-sequence contains exactly 2𝑚−1ones and 2𝑚−1 − 1 zeros.
3. The modulo-2 sum of an m-sequence and another phase (i.e. time-delayed version) of
the same sequence yields yet a third phase of the sequence.
4. Each stage of an m-sequence generator runs through some phase of the sequence.
(While this is obvious with a Fibonacci LFSR, it may not be with a Galois LFSR.)
5. A sliding window of length m, passed along an m-sequence for 2𝑀 − 1 position, will
span every possible m-bit number, except all zeros, once and only once. That is, every
state of an m-bit state register will be encountered, with the exception of all zeros.
6. Define a run of length r to be a sequence of r consecutive identical numbers, bracketed
by non-equal numbers. Then in any m-sequence there are:
1 run of ones of length m.
1 run of zeros of length m-1.
1 run of ones and 1 run of zeros, each of length m-2.
2 runs of ones and 2 run of zeros, each of length m-3.
4 runs of ones and 4 run of zeros, each of length m-4.
.
.
2𝑚−3 runs of ones and 2𝑚−3 run of zeros, each of length 1.[4]
30
6 Summary
Spread spectrum systems exhibit unique qualities that cannot be obtained from conventional
narrowband systems. There are many research avenues exploring these unique qualities.
Amateurs in their inherent pioneering nature can and will find new and novel applications for
spread spectrum communications that the commercial sector may not even think of.so far we are
discussing about the basic fundamentals, spread spectrum techniques, processing gain, jamming
margin and pseudo random(PN)codes. This discussion is centered on the following main themes.
In this we have discussed about basic fundamentals of spread spectrum systems. How the spread
spectrum is differing from narrow band spectrum (Ref. Fig.1.1), the advantages of spread
spectrum, applications of spread spectrum and operation of spread spectrum like spreading and
dispreading operations (Ref. Fig.1.3 & Fig. 1.4).
The spread spectrum techniques are broadly classified as Direct Sequence Spread Spectrum,
Frequency Hopping Spread Spectrum, Time Hopping Spread Spectrum and Hybrid Technology.
With the Direct Sequence Spread Spectrum technique (DSSS), the Pseudo Random Noise (PRN)
sequence is applied directly to data entering the carrier modulator. The modulator, therefore, sees
a much larger bit rate, which corresponds to the chip rate of the PRN sequence. Modulating an
RF carrier with such a code sequence produces a direct-sequence-modulated spread spectrum
(sin 𝑋) 2
with ( ) frequency spectrum, centered at the carrier frequency. Depending upon the
𝑋
bandwidth of the spread signal of each technique the area of use of the modulation technique is
changed.
31
Processing Gain: The processing gain of the spread spectrum is given by the ratio of spread
spectrum bandwidth to the minimum information bandwidth.
Jamming Margin:
It is the maximum jammer power to signal power ratio that a spread spectrum receiver can
tolerate, while still maintaining the specified bit-error-rate. It is expressed in decibels.
PN codes:
Pseudo Random Noise (PRN) code sequences are deterministically generated but have properties
similar to random sequences generated by sampling a white noise process. Pseudo random codes
are very significant in spread spectrum communication. Depending upon the properties of these
codes the spreading and dispreading of the signal is happened. Some of the sequences used for
this are
32
7 Future scope
Spread spectrum systems exhibit unique qualities that cannot be obtained from conventional
narrowband systems. There are many research avenues exploring these unique qualities.
Amateurs in their inherent pioneering nature can and will find new and novel applications for
spread spectrum communications that the commercial sector may not even think of.
Power control is required to control the reuse of the frequency beyond code division
multiplexing. It also behooves us to explore good power control to limit interference and to
reduce the power consumption and drain on batteries. Routing of packets through a network is
typically a software issue, but with the ability to do code division multiplexing, how do we route
packets from one subnet to another when they do not use the same code sequence?
Driving cost down has always been a top goal of any designer, and even more so since
the Amateur is experimenting with their own money. Amateurs tend to be a frugal lot and will
find any means available to build a system that costs as little as possible. This spawns innovative
and creative methods to achieve this means. Then these means tend to be passed back to the
commercial sector and benefit everybody.
33
CDMA is not the exclusive province of direct sequence systems; CDMA can also be used
with frequency hopping. TDMA is not the exclusive province of narrowband systems; TDMA
can also be used with direct sequence or frequency hopping.
34
References
[1] Gaston, B., Applications of Spread Spectrum Radio Technology for the Security Market,
Security Technology, 1994, pp. 86-91.
[2] http://www.maximintegrated.com/support.
[3] Singh, M.R., Spectrum Utilization by Frequency Hopping Radio Systems vis-à-vis
Frequency Radio Systems, Journal of Electromagnetic Interference and Compatibility, V
pp.20-26, 1995.
[4] Pickholtz, R.L.; Schilling, D.L.; Milstein, L.B., Theory of Spread-Spectrum
Communications--A Tutorial, In the Proceedings of IEEE Transactions on
Communications, 30(5), pp.855-884, 1982.
[5] Utlaut, W.F., Spread spectrum: Principles and Possible Application to Spectrum
Utilization and Allocation, IEEE conference in Communications Society Magazine, 16(5),
pp.21-31, 1978.
[6] G. L. Stüber, Principles of Mobile Communication, Kluwer Academic, Boston 1996.
[7] Stüber, Gordon L. Principles of Mobile Communication. Springer Science & Business
Media, 2011.
[8] Dixon R C, Spread Spectrum System, John Wiley and Sons, New York, 1976.
[9] www.youtube.com\spread spectrum techniques and technology.
35