You are on page 1of 16

Spread Spectrum Modulation

Concept of spared spectrum

As we know the goal of spread spectrum is to provide the protection to

transmitted signal against jammer. The jammer emits its finite power directed

towards receiver to distort the detection process. Later, we shall find how much

protection a spread spectrum can give for finite power of jammer. Let us reconsider

the conventional communication system where a base band signal after being

multiplied by a carrier is translated to passband signal occupying certain band

depending upon the carrier frequency. Here, this does not have any protection as

any intruder can decipher the message simply by tapping the signal and multiplying it

by its carrier frequency (which may easily be known by intruder). In spread spectrum

technique, we multiply the passband signal with certain code called PN sequence (to

be discussed next), thus spreading the power in a wideband. If any intruder wants to

detect the signal, then, it will have to use such a wideband to tap the signal, which is

generally difficult. Seccondly, it requires the exact information about this code (or

key) which is difficult to track as it keeps changing with the time. Thus, we have

provided protection to the signal by multiplying the passband signal with spreading

code. In other technique, known as frequency hopping, we, in stead of spreading the

passband signal in a large BW, we hop the passband in the given wideband in a

predetermined order which is known only to the desired receiver. Thus, hopping the

passbad signal in a given wide BW, provides protection to the signal as any

undesired element must know this predetermined order in which the signal band

is hopping. This will further be discussed latter part of this chapter.


Fig. 1

Fig. 2

In spread spectrum, a signal (Let us say, binary wave) is multiplied with PN

sequence (to be discussed later) which has a very large bandwidth. Hence, the

spectrum of resulting signal will occupy a very large BW. Since total power remains
fixed, thus, PSD of signal falls down and its level goes near noise level which has

spread in the complete range of frequency. Hence, it appears that signal has hidden

itself or submerged into an ocean of large BW spectrum of noise. Since the PN

noise has got very wide BW and hence, this transmitted signal blends itself into this

AWGN noise background so as to remain undetected by Jammer.

One more justification can be given as to why spread spectrum is wide. We

know that from convolution theory if we multiply the two signal in time domain, then

they will be convolved in frequency domain. Now b ( t ) is narrowband and c (t )

is wideband PN Sequence. The multiplication of both the signals in time-domain

results in convolution of their frequency counterpart given as

b ( t ) . c ( t ) ↔ B ( f )∗G ( f ) (1)

So, convolution of narrow band with the wideband signal results in wideband signal.

Therefore, we can divide the complete process of spreading and dispreading of

signal into three steps given as

Figure 1: Spreading and de-spreading

m ( t )=b ( t ) c ( t ) (2)

r ( t ) =m ( t )+i ( t )=b ( t ) c ( t )+i ( t )


This is the received signal r ( t ) . Now, for detection purpose, just reverse process

takes place i.e. r ( t ) should, first, be multiplied by c (t ) .Hence, we have

z ( t )=r ( t )×c ( t )

=[ b ( t ) c ( t )+i ( t ) ] c ( t ) =b ( t ) c 2 ( t )+i ( t ) c ( t )

z ( t )=b ( t ) +i ( t ) c ( t ) (3)

We see that b ( t ) is a narrow band signal and i ( t ) is a wideband signal (as

i ( t ) c ( t ) is also a kind of spread spectrum on i ( t ) ). Hence, low pass filter should

be used to filter out b (t ) . Here we note that c (t ) is a PN sequence having

2
amplitude+1 and -1. Hence, c ( t )=1 .

If we look to the frequency domain counter-part, then, the steps are as follows.

Step 1: Convolve B(f) with C(f).

Step 2: Add I(f) to this signal and hence R(f)=B(f)*C(f)+I(f).

Step 3: Convolve R(f) with C(f), i.e. R(f)*C(f)=B(f)*C(f)*C(f)+I(f)*C(f).

Step 4: Noting that C ( f ) * C ( f ) | C ( f ) |  ( f ) , we have


2

R( f )  C ( f ) | C ( f ) |2 B( f )   ( f )  I ( f )  C ( f )
 | C ( f ) |2 B( f )  I ( f )  C ( f )
          
Baseband Signal Passband Signal

X ( f )∗δ ( f −nf S ) =X ( f −nf S )


We have used the convolution property in the above

equation. This is illustrated in Fig. 3. The receiver to detect the baseband signal from

the received spread signal is designed as follows.


Figure 2: De-spreading and correlator

NOTE

(i) Here it is equally important to realize that both PN Sequence generator at

TX and RX should be in perfect synchronization, otherwise even a single

chip mismatch could render the product to be zero.

(ii) The price we are paying for improved protection against interference is the

increased transmission BW and increased system complexity. However, if

security is our prime concern then these thing can be compromised.

Consider the general case of communication system in which message signal is

occupying only certain narrow BW and it is added with AWGN noise.


Figure 3: Spreading and De-spreading

Hence, signal can easily be detected using suitable receiver. Now If the signal is

spreaded by multiplying with PN sequence, the situation looks like as shown in

Figure 3(a). It may be noted that if the signal b(t) is multiplied in time-domain with

C(t), then, in frequency domain, this signal will be convolved with PN sequence as

shown in Figure 3(a). Hence, signal spectrum has spread in a wide range spectrum

and after being added with AWGN noise, as shown in Figure 3(b), it appears that it

has hidden itself into the noise background just like grasshopper camflouges itself in

a grass. Had the grasshopper been different from grass color, it could easily be

detected. Further, in Figure 3(c), this signal plus noise is being multiplied with the de-

spreading code and resultant signal will consist of base-band signal (low BW) plus

noise (Wide BW) as given in (3). Using Low pass filter, this baseband signal can

easily be filtered out.

Direct-sequence spread spectrum with Coherent BPSK


Figure 4: DS-Spread Spectrum with Modulation

Here, we note that in the receiver stage, there are two-stage modulations. First stage

is to bring from pass band signal to baseband signal. Hence at (6), we get the

distorted version of spread sequence m ( t ) . To get the distorted version of binary

wave, this is to be multiplied by PN sequence. The reason for using LPF in first stage

demodulation is that even m(t ) which is also equal to c (t ) b ( t ) is also a

baseband signal (or low pass signal), though, it has got wide spectrum, yet it is

centered at zero. Hence, LPF is required.


Here, we note a very important point. The spreading is followed by modulation (Like

BPSK, QPSK). Now these two operations can also be interchanged to each other.

The reason is that these two operations (i.e. spreading and modulation) are linear

processes. This is shown as follows:

Let m1 ( t ) =b1 ( t ) c1 ( t ) and m2 ( t ) =b2 ( t ) c ( t )

Hence,

m ( t )=[ b1 ( t )+ b2 ( t ) ] c ( t )

=b 1 ( t ) c (t ) +b 2 ( t ) c ( t )
¿ m1 ( t ) +m2 ( t ) (1)

In a similar way, x 1 ( t )=m1 ( t ) Cos ω c t and x 2 ( t )=m 2 (t ) Cos ωc t

⇒ x ( t ) =[ m1 ( t ) +m 2 ( t ) ] Cos ω c t =m1 ( t ) Cos ωc t +m2 ( t ) Cos ωc t =x 1 ( t )+ x 2 ( t )

Hence, it proves that spreading and modulation both are linear process. Now, we

know that linear process can be interchanged without affecting the result. Hence it is

concluded that these two processes can be interchanged. In a similar way, it can be

shown that at receiver side, dispreading and demodulation both the process can also

be interchanged.

Hence, the resultant block diagram is as follows

Fig. 5

Here corresponding equations are

y (t )=x ( t ) + j ( t ) (2)
Here, let us ignore the presence of noise as we are concerned about Jammer’s

interference and hence we are trying to see the effect of Jammer’s interference only.

u ( t ) = y ( t ) .c ( t )

  x(t )  j (t )  c  t   x  t  c  t   j  t  c  t 
  s  t  c 2  t   j  t  c  t  

=s ( t )+ j (t ) c ( t ) (3)

2
Here, c ( t )=1

Here note that Jammer interference j ( t ) is a pass band signal. Now, if j (t) be

multiplied with c (t ) , the resulting term j ( t ) c ( t ) will also be passband. Now, S ( t )

is baseband. Hence, s ( t ) could easily be filtered out using low pass filter.

Soft capacity and Multiuser Communication


Figure 6: Multiuser Communication

Total Signal at Rx 1’ is given as (ignoring AWGN noise)

r(t )=m1 (t )+m2 (t )+.. .+mn (t ) (4)

After multiplying with de-spreading code C1(t), the Rx1 output is

r ' 1 (t )=[ b1 (t )C 1 (t )+b2 (t )C 2 (t )+. .. .+b n (t )Cn (t ) ] C 1 (t )


=b1 (t )+b2 (t )C 2 (t )C 1 (t )+. .. .+b n (t )Cn (t )C 1 (t )

In general, the output of ith receiver is given as

¿ j ≠i ¿ ¿ ¿ ¿
n (5)

The first term is original desired message signal and second part is due to

contribution of cross-correlation term. Ideally, this second term should be zero. Since

most of the PN sequence codes are not perfectly orthogonal, and hence, second
term will be non-zero and will keep increasing linearly with increase of the number of

users (called soft capacity). This will degrade the performance of the system as SNR

will go down. This non-zero cross correlation value is the main constraint which limits

the increase in the number of users. Thus, we see the role of PN sequence in above

discussion. The next section deals with in details the concept and generation of PN

sequence.

Pseudo-noise sequence

What is Pseudo-noise sequence? It is the periodic sequence of binary wave which

appears like random binary wave. Its appearance as binary random wave but not

exactly equal to random wave results in the word like pseudo noise “.

How is it generated? It is generated using the shift register with some kind of

feedback combinational logic circuit which decides the kind and period of PN

sequence.

Consider the following feed back shift register:

Fig. 7: PN Sequence generator

This is shift-register with length m. We first choose the some initial state of shift

register then, after clock is applied, logic circuit computes the output which will shift
the content of first FF when clk is applied . In this way , this process goes on till the

same state of FF is repeated . At the best, the number of possible state of shift

m
register is 2 −1 where m is the number of FF in shift register. Here, 1 is

subtracted because we have excluded one possible state of all zero. If the initial

state of shift register is all zero then next state will also be zero. In this way only this

zero loop will go on till infinite so, this situation is avoided.

If the state of the FF is given as { s1 ( k ) , s2 ( k ) . .. . s m ( k ) } where k ≥0

Then, as per definition of shift register, the state of j


th
FF at ( k +1 )th clock, is

given by

S j (k +1 )=SJ−1 ( k )

k≥0
1≤ j≤m (6)

Hence, PN sequence is the output of last F-F (that is, mth FF) of shift Register.

Note:

 A feedback shift Register is said to be Linear when the feedback logic

consists entirely of Modulo-2 adders.


m
 A period of shift Register will always be less that or equal to 2 −1 . When

m
the period is exactly 2 −1 , the PN sequence (obtained at output of m th FF)

is called a Maximal-Length Sequence or simply m-sequence. It may be

m
noted that the period of PN sequence may be less that 2 −1 depending on

the type of combination logic used. Hence, there are only specific number of
combinational logic circuits that corresponds to maximal-length PN sequence.

The list of such Filter will be given in next section.

Example: 1 Consider the following shift

Register for m=3. Find the PN sequence assuming initial state of the shift register to

be (i) 100. (ii) 111.

Modulo 2
Adder

Output, PN
1 2 3 Sequence
S0 S1 S2

Fig. 8

Hence the following is the list of all state of the shift register:

Clock Sate of Shift


register
1. 100
2. 110
3. 111
4. 011
5. 101
6. 010
7 001
8. 100
…..

Hence the output PN sequence is 0011101=7 bits. We see that this is equal to

23 −1=7 . For initial state 111, the PN sequence is obtained as 1110100. This
signal waveform is as shown in Fig. 9. We note that the waveform repeats itself after

seven chips. This duration is called period of PN sequence. Here chip is the duration

of the individual pulse of this waveform. Thus, we note this example that there are

seven chips in one PN sequence period. Fig. 10 shows the spread sequence which

is obtained by multiplying the message (101) signal with the PN sequence. Here, we

have assumed Tb=NTc. After understanding how a PN sequence is generated, we

are going to discuss that the some PN sequence satisfies some properties of run-

length. These sequences are known as maximal-length sequence.

Fig. 9: PN Sequence with initial state 111


Fig. 10: Plot of message bit [1 0 1], PN sequence for shift Register [3,1] with

initial state 10000 and spread sequence.

Properties of Maximal Length Sequence

1. The number of 1 is always greater than number of 0 by 1. For example in

above case, total number of 1 is equal to 4 and total number of 0 is 3.

2. Count total run-length. Run-Length means a subsequence of identical

sumbols (1 and 0) within one period.

Total number of run length of 1 bit=1/2 * Total Run Length

Total number of run length of 2 bit=1/4 * Total Run Length

Total number of run length of 3 bit=1/8* Total Run Length

For example, in above example, total Run Length=4

Hence run Length of 1 bit= 1/2*4=2


Run Length of 2 bits=1/4*4=1

Run Length of 3 bit= 1/8*4 can not be a fraction and hence 1

3. The autocorrelation function of PN sequence is Binary valued (that is having

two levels. One value is 1 and another is –1/N). This is periodic in nature.

Considering the Fig. 6 once again, it may be noted that the capacity (number of

users) of the system depends upon the cross-correlation between the two

sequences. Moreover, it is also important to understand the auto-correlation between

two PN sequences of the same type as the PN code at the Rx of Tx-Rx system, if

slightly desynchronized, may results in loss of transmitted message.

You might also like