Professional Documents
Culture Documents
transmitted signal against jammer. The jammer emits its finite power directed
towards receiver to distort the detection process. Later, we shall find how much
protection a spread spectrum can give for finite power of jammer. Let us reconsider
the conventional communication system where a base band signal after being
depending upon the carrier frequency. Here, this does not have any protection as
any intruder can decipher the message simply by tapping the signal and multiplying it
by its carrier frequency (which may easily be known by intruder). In spread spectrum
technique, we multiply the passband signal with certain code called PN sequence (to
be discussed next), thus spreading the power in a wideband. If any intruder wants to
detect the signal, then, it will have to use such a wideband to tap the signal, which is
generally difficult. Seccondly, it requires the exact information about this code (or
key) which is difficult to track as it keeps changing with the time. Thus, we have
provided protection to the signal by multiplying the passband signal with spreading
code. In other technique, known as frequency hopping, we, in stead of spreading the
passband signal in a large BW, we hop the passband in the given wideband in a
predetermined order which is known only to the desired receiver. Thus, hopping the
passbad signal in a given wide BW, provides protection to the signal as any
undesired element must know this predetermined order in which the signal band
Fig. 2
sequence (to be discussed later) which has a very large bandwidth. Hence, the
spectrum of resulting signal will occupy a very large BW. Since total power remains
fixed, thus, PSD of signal falls down and its level goes near noise level which has
spread in the complete range of frequency. Hence, it appears that signal has hidden
noise has got very wide BW and hence, this transmitted signal blends itself into this
know that from convolution theory if we multiply the two signal in time domain, then
b ( t ) . c ( t ) ↔ B ( f )∗G ( f ) (1)
So, convolution of narrow band with the wideband signal results in wideband signal.
m ( t )=b ( t ) c ( t ) (2)
z ( t )=r ( t )×c ( t )
=[ b ( t ) c ( t )+i ( t ) ] c ( t ) =b ( t ) c 2 ( t )+i ( t ) c ( t )
z ( t )=b ( t ) +i ( t ) c ( t ) (3)
2
amplitude+1 and -1. Hence, c ( t )=1 .
If we look to the frequency domain counter-part, then, the steps are as follows.
R( f ) C ( f ) | C ( f ) |2 B( f ) ( f ) I ( f ) C ( f )
| C ( f ) |2 B( f ) I ( f ) C ( f )
Baseband Signal Passband Signal
equation. This is illustrated in Fig. 3. The receiver to detect the baseband signal from
NOTE
(ii) The price we are paying for improved protection against interference is the
Hence, signal can easily be detected using suitable receiver. Now If the signal is
Figure 3(a). It may be noted that if the signal b(t) is multiplied in time-domain with
C(t), then, in frequency domain, this signal will be convolved with PN sequence as
shown in Figure 3(a). Hence, signal spectrum has spread in a wide range spectrum
and after being added with AWGN noise, as shown in Figure 3(b), it appears that it
has hidden itself into the noise background just like grasshopper camflouges itself in
a grass. Had the grasshopper been different from grass color, it could easily be
detected. Further, in Figure 3(c), this signal plus noise is being multiplied with the de-
spreading code and resultant signal will consist of base-band signal (low BW) plus
noise (Wide BW) as given in (3). Using Low pass filter, this baseband signal can
Here, we note that in the receiver stage, there are two-stage modulations. First stage
is to bring from pass band signal to baseband signal. Hence at (6), we get the
wave, this is to be multiplied by PN sequence. The reason for using LPF in first stage
baseband signal (or low pass signal), though, it has got wide spectrum, yet it is
BPSK, QPSK). Now these two operations can also be interchanged to each other.
The reason is that these two operations (i.e. spreading and modulation) are linear
Hence,
m ( t )=[ b1 ( t )+ b2 ( t ) ] c ( t )
=b 1 ( t ) c (t ) +b 2 ( t ) c ( t )
¿ m1 ( t ) +m2 ( t ) (1)
Hence, it proves that spreading and modulation both are linear process. Now, we
know that linear process can be interchanged without affecting the result. Hence it is
concluded that these two processes can be interchanged. In a similar way, it can be
shown that at receiver side, dispreading and demodulation both the process can also
be interchanged.
Fig. 5
y (t )=x ( t ) + j ( t ) (2)
Here, let us ignore the presence of noise as we are concerned about Jammer’s
interference and hence we are trying to see the effect of Jammer’s interference only.
u ( t ) = y ( t ) .c ( t )
x(t ) j (t ) c t x t c t j t c t
s t c 2 t j t c t
=s ( t )+ j (t ) c ( t ) (3)
2
Here, c ( t )=1
Here note that Jammer interference j ( t ) is a pass band signal. Now, if j (t) be
is baseband. Hence, s ( t ) could easily be filtered out using low pass filter.
¿ j ≠i ¿ ¿ ¿ ¿
n (5)
The first term is original desired message signal and second part is due to
contribution of cross-correlation term. Ideally, this second term should be zero. Since
most of the PN sequence codes are not perfectly orthogonal, and hence, second
term will be non-zero and will keep increasing linearly with increase of the number of
users (called soft capacity). This will degrade the performance of the system as SNR
will go down. This non-zero cross correlation value is the main constraint which limits
the increase in the number of users. Thus, we see the role of PN sequence in above
discussion. The next section deals with in details the concept and generation of PN
sequence.
Pseudo-noise sequence
appears like random binary wave. Its appearance as binary random wave but not
exactly equal to random wave results in the word like pseudo noise “.
How is it generated? It is generated using the shift register with some kind of
feedback combinational logic circuit which decides the kind and period of PN
sequence.
This is shift-register with length m. We first choose the some initial state of shift
register then, after clock is applied, logic circuit computes the output which will shift
the content of first FF when clk is applied . In this way , this process goes on till the
same state of FF is repeated . At the best, the number of possible state of shift
m
register is 2 −1 where m is the number of FF in shift register. Here, 1 is
subtracted because we have excluded one possible state of all zero. If the initial
state of shift register is all zero then next state will also be zero. In this way only this
given by
S j (k +1 )=SJ−1 ( k )
k≥0
1≤ j≤m (6)
Hence, PN sequence is the output of last F-F (that is, mth FF) of shift Register.
Note:
m
the period is exactly 2 −1 , the PN sequence (obtained at output of m th FF)
m
noted that the period of PN sequence may be less that 2 −1 depending on
the type of combination logic used. Hence, there are only specific number of
combinational logic circuits that corresponds to maximal-length PN sequence.
Register for m=3. Find the PN sequence assuming initial state of the shift register to
Modulo 2
Adder
Output, PN
1 2 3 Sequence
S0 S1 S2
Fig. 8
Hence the following is the list of all state of the shift register:
Hence the output PN sequence is 0011101=7 bits. We see that this is equal to
23 −1=7 . For initial state 111, the PN sequence is obtained as 1110100. This
signal waveform is as shown in Fig. 9. We note that the waveform repeats itself after
seven chips. This duration is called period of PN sequence. Here chip is the duration
of the individual pulse of this waveform. Thus, we note this example that there are
seven chips in one PN sequence period. Fig. 10 shows the spread sequence which
is obtained by multiplying the message (101) signal with the PN sequence. Here, we
are going to discuss that the some PN sequence satisfies some properties of run-
two levels. One value is 1 and another is –1/N). This is periodic in nature.
Considering the Fig. 6 once again, it may be noted that the capacity (number of
users) of the system depends upon the cross-correlation between the two
two PN sequences of the same type as the PN code at the Rx of Tx-Rx system, if