Professional Documents
Culture Documents
1
Lecture Overview
1 Review of basic modulation properties and techniques
baseband complex envelope description
BPSK, QPSK, M-PSK, M-QAM
relation symbol rate and bandwidth
spectral efficiency
2 Direct Sequence Spread Spectrum
principle: modulation, demodulation
spreading gain and spectral efficiency
advantages/disadvantages of DS-SS
3 BER in case of noise and narrowband interference
4 DS-SS in WLAN
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 2 / 32
Modulation
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 3 / 32
Modulation
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 3 / 32
Modulation
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 3 / 32
Modulation
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 3 / 32
Bandpass Signals
Passband signals also called Bandpass signals refer to the signals after
modulating with a carrier.
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 4 / 32
Bandpass Signals (Cont’d)
Modulated Signal
Magnitude and phase representation
Where,
α(t), φ(t), sI (t) and sQ (t) represent the amplitude, phase, in-phase component
and quadrature component respectively.
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 5 / 32
Bandpass Signals (Cont’d)
Alternatively,
u(t) = α(t)ejφ(t)
q
Envelope ⇒ α(t) = s2I (t) + s2Q (t)
sQ (t)
Phase ⇒ φ(t) = tan−1 sI (t)
and
s(t) = R α(t)ejφ(t) ej2πfc t
= α(t)cos(2πfc + φ)t
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 6 / 32
Binary Phase Shift Keying
In binary phase shift keying (BPSK) the carrier phase is switched between
{0, π} dependent on the bit to be sent.
10
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 7 / 32
Multi-level Modulation Techniques
Rb [bit/s] Rb
The symbol rate Rs = l[bit/sym] = l [symb/s] or [Baud]
per symbol, l bits are transmitted and the symbol time is Ts = lTb .
11
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 8 / 32
M - PSK
and
xi = Ac cos θi , yi = Ac sin θi
Figure: signal state diagram for
8-PSK
Usually, we consider all symbols are equally likely!
12
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 9 / 32
Quadrature Amplitude Modulation (QAM)
In QAM, we allow discrete phase values as well as discrete amplitude values.
The general QAM structure is:
s(t) = x(t) cos wc t − y(t) sin ωc t.
with: g(t) = x(t) + jy(t) = R(t)eθ(t)
13
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 10 / 32
QAM (Cont’d)
As seen from the I, Q-description, QAM can be seen as two orthogonal ASK
signal modulating quadrature carriers:
P
∞
x(t) = xn h (t − nTs )
n=−∞
P
∞
y(t) = yn h (t − nTs )
n=−∞
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 11 / 32
QAM (Cont’d)
As seen from the I, Q-description, QAM can be seen as two orthogonal ASK
signal modulating quadrature carriers:
P
∞
x(t) = xn h (t − nTs )
n=−∞
P
∞
y(t) = yn h (t − nTs )
n=−∞
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 11 / 32
Spectral Efficiency: Profit
Rb [bit/s] 1/Tb
η, BT [Hz] = 2/lTb
Rb l
= 2Rs = 2 [bit/s/Hz]
16
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 12 / 32
Spectral Efficiency: Cost
According to Shannon:
S
Rb ≤ C = B log 1 + N
Rb C S
η= B ≤ B = log 1 + N
17
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 13 / 32
Channel Anomalies: Multi-path
Time domain: time dispersion
Usually, mean excess delay and rms-delay spread are accounted for time
dispersion.
The mean excess delay is the centre of gravity of the power delay profile.
The rms-delay spread is measure for the power dispersion in time. It
puts a limit on the maximum symbol rate due to ISI.
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 14 / 32
Channel Anomalies: Interference
The undesired signals present at the same time which disrupt detection
performance of the desired signal.
Interference sources
1 Noise: always present, usually generated by receiver electronics.
2 Other users of the same frequency band: similar or different systems
3 Large power out-of-band users: due to non-linearities in the receiver
front-end ⇒ receiver blocking.
4 Intentional jamming: usually only in a military environment.
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 15 / 32
Channel Anomalies: Interference
The undesired signals present at the same time which disrupt detection
performance of the desired signal.
Interference sources
1 Noise: always present, usually generated by receiver electronics.
2 Other users of the same frequency band: similar or different systems
3 Large power out-of-band users: due to non-linearities in the receiver
front-end ⇒ receiver blocking.
4 Intentional jamming: usually only in a military environment.
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 15 / 32
Channel Anomalies: Interference
The undesired signals present at the same time which disrupt detection
performance of the desired signal.
Interference sources
1 Noise: always present, usually generated by receiver electronics.
2 Other users of the same frequency band: similar or different systems
3 Large power out-of-band users: due to non-linearities in the receiver
front-end ⇒ receiver blocking.
4 Intentional jamming: usually only in a military environment.
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 15 / 32
Channel Anomalies: Interference
The undesired signals present at the same time which disrupt detection
performance of the desired signal.
Interference sources
1 Noise: always present, usually generated by receiver electronics.
2 Other users of the same frequency band: similar or different systems
3 Large power out-of-band users: due to non-linearities in the receiver
front-end ⇒ receiver blocking.
4 Intentional jamming: usually only in a military environment.
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 15 / 32
Channel Anomalies: Interference
The undesired signals present at the same time which disrupt detection
performance of the desired signal.
Interference sources
1 Noise: always present, usually generated by receiver electronics.
2 Other users of the same frequency band: similar or different systems
3 Large power out-of-band users: due to non-linearities in the receiver
front-end ⇒ receiver blocking.
4 Intentional jamming: usually only in a military environment.
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 15 / 32
Direct Sequence Spread Spectrum (DS-SS)
How?
Why?
24
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 16 / 32
Direct Sequence Spread Spectrum (DS-SS)
How?
Signal spreading over a much wider bandwidth is achieved by multiplying the
signal at the transmitter by a wideband code signal.
Why?
25
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 16 / 32
Direct Sequence Spread Spectrum (DS-SS)
How?
Signal spreading over a much wider bandwidth is achieved by multiplying the
signal at the transmitter by a wideband code signal.
Why?
To create robustness against: multi-path fading and dispersion, interference,
detection, eavesdropping.
Because of the low PSD, its presence is difficult to detect.
26
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 16 / 32
DS-SS Transmitter
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 17 / 32
DS-SS Transmitter (Cont’d)
28
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 18 / 32
DS-SS Transmitter (Cont’d)
data signal
f
2Rs
29
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 19 / 32
DS-SS Transmitter (Cont’d)
data signal
d(t) d(t)c(t)
f
2Rs
c(t)
PN-code signal
f
2Rc
30
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 19 / 32
DS-SS Transmitter (Cont’d)
data signal
DS-SS signal
d(t) d(t)c(t)
f
f 2Rc
2Rs
c(t)
PN-code signal
f
2Rc
1 1
The chip rate Rc = Tc symbol rate Rs = Ts
BWDS−SS Rc Ts
The ratio Gp = BWdata = Rs = Tc is called the processing gain or spreading
factor.
31
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 19 / 32
DS-SS Reception
At the DS-SS receiver, the
reverse operation is performed
We can recover the signal only if:
c(t)c0 (t)d(t) = d(t) ⇒
The code is known
Perfect synchronization
data signal
DS-SS signal
d(t)c(t) d(t)
f
2Rc f
2Rs
0
c (t)
PN-code signal
f
32
2Rc
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 20 / 32
DS-SS Reception (Cont’d)
DS-SS is very robust against interference. When de-spreading the desired
signal, the interference is spread.
Only a fraction 1/Gp of the spread interference overlaps with the de-spread
data signal spectrum.
BWdata 2Rs PI
Effective Interference power: Ieff = PI BWspread−interference = PI 2R c
= Gp
c0 (t)
DS-SS code signal
33
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 21 / 32
DS-SS Reception (Cont’d)
DS-SS is also robust against other DS-SS interference signals. When the
SS-code or code phase is different, the signal remains spread.
34
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 22 / 32
Pseudo-noise code generators
A DS-SS code is a ”pseudo random” sequence of {−1, 1}. There are several
ways to generate DS-SS codes depending on the required properties. One
way is to use ”Maximum length sequences” which are also called
Pseudo-Noise (PN) codes because of their noise like spectral properties.
A ML-code generator using a five stage shift register with code length 31.
35
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 23 / 32
Desired Properties of PN codes
Auto-correlation
Low auto-correlation of a PN-code outside the main peak is required:
to achieve reliable synchronisation
to lock on the main resolvable path and reduce interference from other
paths.
cross correlation
Low cross correlation between PN-codes is required:
to be able to separate signals of different users.
to obtain good detection performance because of low interference from
other users
36
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 24 / 32
Spectral Efficiency of DS-SS
For DS-SS, with M-level modulation, the spectral efficiency is given by:
Rb
η, BT
lRs lRs l
= BT = 2Rc = 2Gp [bit/s/Hz]
The price, we pay for the increased robustness against interference and
multi-path fading (large Gp ) is very low spectral effaciency.
37
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 25 / 32
Spectral Efficiency of DS-SS
For DS-SS, with M-level modulation, the spectral efficiency is given by:
Rb
η, BT
lRs lRs l
= BT = 2Rc = 2Gp [bit/s/Hz]
The price, we pay for the increased robustness against interference and
multi-path fading (large Gp ) is very low spectral effaciency.
This can be improved by letting multiple users share the same bandwidth!
38
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 25 / 32
Code Division Multiple Access (CDMA)
In code division multiple access (CDMA) the spectral responses are shared
among multiple users based on different DS-SS code.
Each user is defined by its code. The cross-correlation between the codes
has to be low (ideally zero ⇒ orthogonal codes).
5
P 5
P
cj (t)dj (t) d1 (t) + c0 (t)c j (t)dj (t)
j=1 1
j=2
39
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 26 / 32
Pseudo-Noise Code Generator
40
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 27 / 32
Bit Error Rate in DS-SS systems
41
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 28 / 32
DS-SS (Cont’d)
42
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 29 / 32
DS-SS (Cont’d)
43
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 30 / 32
DS-SS (Cont’d)
44
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 30 / 32
Employing DS-SS
45
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 31 / 32
Exercise
46
Dr. Ir. Muhammad Nasir (UOL) Part A: Communication Theory October 23, 2021 32 / 32