Download presentation
Presentation is loading. Please wait.
1
Lecture 4: Spread Spectrum and Coding Anders Västberg vastberg@kth.se 08-790 44 55 Slides are a selection from the slides from chapter 7 and 8 from: http://williamstallings.com/Wireless/Wireless2e.html
2
Multiple Access Techniques Frequency-division multiple access (FDMA) –Takes advantage of the fact that the useful bandwidth of the medium exceeds the required bandwidth of a given signal Time-division multiple access (TDMA) –Takes advantage of the fact that the achievable bit rate of the medium exceeds the required data rate of a digital signal
3
Frequency-division Multiplexing
4
Time-division Multiplexing
5
Spread Spectrum Input is fed into a channel encoder –Produces analog signal with narrow bandwidth Signal is further modulated using sequence of digits –Spreading code or spreading sequence –Generated by pseudonoise, or pseudo-random number generator Effect of modulation is to increase bandwidth of signal to be transmitted
6
Spread Spectrum On receiving end, digit sequence is used to demodulate the spread spectrum signal Signal is fed into a channel decoder to recover data
7
Spread Spectrum
8
What can be gained from apparent waste of spectrum? –Immunity from various kinds of noise and multipath distortion –Can be used for hiding and encrypting signals –Several users can independently use the same higher bandwidth with very little interference
9
Frequency Hoping Spread Spectrum (FHSS) Signal is broadcast over seemingly random series of radio frequencies –A number of channels allocated for the FH signal –Width of each channel corresponds to bandwidth of input signal Signal hops from frequency to frequency at fixed intervals –Transmitter operates in one channel at a time –Bits are transmitted using some encoding scheme –At each successive interval, a new carrier frequency is selected
10
Frequency Hoping Spread Spectrum Channel sequence dictated by spreading code Receiver, hopping between frequencies in synchronization with transmitter, picks up message Advantages –Eavesdroppers hear only unintelligible blips –Attempts to jam signal on one frequency succeed only at knocking out a few bits
11
Frequency Hoping Spread Spectrum
12
Frequency Hopping Spread Spectrum
13
FHSS Using MFSK MFSK (multiple FSK) signal is translated to a new frequency every T c seconds by modulating the MFSK signal with the FHSS carrier signal M=2 L where L is the number of bits in a signal element For data rate of R: –duration of a bit: T = 1/R seconds –duration of signal element: T s = LT seconds T c T s - slow-frequency-hop spread spectrum T c < T s - fast-frequency-hop spread spectrum
14
Slow Frequency-Hop SS
15
Fast Frequency-Hop SS
16
FHSS Performance Considerations Large number of frequencies used Results in a system that is quite resistant to jamming –Jammer must jam all frequencies –With fixed power, this reduces the jamming power in any one frequency band
17
Direct Sequence Spread Spectrum (DSSS) Each bit in original signal is represented by multiple bits in the transmitted signal Spreading code spreads signal across a wider frequency band –Spread is in direct proportion to number of bits used One technique combines digital information stream with the spreading code bit stream using exclusive- OR (Figure 7.6)
18
Direct Sequence Spread Spectrum (DSSS)
19
DSSS Using BPSK Multiply BPSK signal, s d (t) = A d(t) cos(2 f c t) by c(t) [takes values +1, -1] to get s(t) = A d(t)c(t) cos(2 f c t) A = amplitude of signal f c = carrier frequency d(t) = discrete function [+1, -1] At receiver, incoming signal multiplied by c(t) –Since, c(t) x c(t) = 1, incoming signal is recovered
20
DSSS Using BPSK
21
Code-Division Multiple Access (CDMA) Basic Principles of CDMA –D = rate of data signal –Break each bit into k chips Chips are a user-specific fixed pattern –Chip data rate of new channel = kD
22
CDMA Example If k=6 and code is a sequence of 1s and -1s –For a ‘1’ bit, A sends code as chip pattern –For a ‘0’ bit, A sends complement of code Receiver knows sender’s code and performs electronic decode function = received chip pattern = sender’s code
23
CDMA Example User A code = –To send a 1 bit = –To send a 0 bit = User B code = –To send a 1 bit = Receiver receiving with A’s code –(A’s code) x (received chip pattern) User A ‘1’ bit: 6 -> 1 User A ‘0’ bit: -6 -> 0 User B ‘1’ bit: 0 -> unwanted signal ignored
24
CDMA for Direct Sequence Spread Spectrum
25
Categories of Spreading Sequences Spreading Sequence Categories –PN sequences –Orthogonal codes For FHSS systems –PN sequences most common For DSSS systems not employing CDMA –PN sequences most common For DSSS CDMA systems –PN sequences –Orthogonal codes
26
PN Sequences PN generator produces periodic sequence that appears to be random PN Sequences –Generated by an algorithm using initial seed –Sequence isn’t statistically random but will pass many test of randomness –Sequences referred to as pseudorandom numbers or pseudonoise sequences –Unless algorithm and seed are known, the sequence is impractical to predict
27
Important PN Properties Randomness –Uniform distribution Balance property Run property –Independence –Correlation property Unpredictability
28
Linear Feedback Shift Register Implementation
29
Properties of M-Sequences Property 1: –Has 2 n-1 ones and 2 n-1 -1 zeros Property 2: –For a window of length n slid along output for N (=2 n-1 ) shifts, each n-tuple appears once, except for the all zeros sequence Property 3: –Sequence contains one run of ones, length n –One run of zeros, length n-1 –One run of ones and one run of zeros, length n-2 –Two runs of ones and two runs of zeros, length n-3 –2 n-3 runs of ones and 2 n-3 runs of zeros, length 1
30
Properties of M-Sequences Property 4: –The periodic autocorrelation of a ±1 m- sequence is
31
PN Autocorrelation Function
32
Definitions Correlation –The concept of determining how much similarity one set of data has with another –Range between –1 and 1 1 The second sequence matches the first sequence 0 There is no relation at all between the two sequences -1 The two sequences are mirror images Cross correlation –The comparison between two sequences from different sources rather than a shifted copy of a sequence with itself
33
Advantages of Cross Correlation The cross correlation between an m-sequence and noise is low –This property is useful to the receiver in filtering out noise The cross correlation between two different m- sequences is low –This property is useful for CDMA applications –Enables a receiver to discriminate among spread spectrum signals generated by different m-sequences
34
Gold Sequences Gold sequences constructed by the XOR of two m- sequences with the same clocking Codes have well-defined cross correlation properties Only simple circuitry needed to generate large number of unique codes In following example (Figure 7.16a) two shift registers generate the two m-sequences and these are then bitwise XORed
35
Gold Sequences
36
Orthogonal Codes Orthogonal codes –All pairwise cross correlations are zero –Fixed- and variable-length codes used in CDMA systems –For CDMA application, each mobile user uses one sequence in the set as a spreading code Provides zero cross correlation among all users Types –Welsh codes –Variable-Length Orthogonal codes
37
Walsh Codes Set of Walsh codes of length n consists of the n rows of an n ´ n Walsh matrix: –W 1 = (0) n = dimension of the matrix –Every row is orthogonal to every other row and to the logical not of every other row –Requires tight synchronization Cross correlation between different shifts of Walsh sequences is not zero
38
Typical Multiple Spreading Approach Spread data rate by an orthogonal code (channelization code) –Provides mutual orthogonality among all users in the same cell Further spread result by a PN sequence (scrambling code) –Provides mutual randomness (low cross correlation) between users in different cells
39
Coping with Data Transmission Errors Error detection codes –Detects the presence of an error Automatic repeat request (ARQ) protocols –Block of data with error is discarded –Transmitter retransmits that block of data Error correction codes, or forward correction codes (FEC) –Designed to detect and correct errors
40
Error Detection Probabilities Definitions P b : Probability of single bit error (BER) P 1 : Probability that a frame arrives with no bit errors P 2 : While using error detection, the probability that a frame arrives with one or more undetected errors P 3 : While using error detection, the probability that a frame arrives with one or more detected bit errors but no undetected bit errors
41
Error Detection Probabilities With no error detection F = Number of bits per frame
42
Error Detection Process Transmitter –For a given frame, an error-detecting code (check bits) is calculated from data bits –Check bits are appended to data bits Receiver –Separates incoming frame into data bits and check bits –Calculates check bits from received data bits –Compares calculated check bits against received check bits –Detected error occurs if mismatch
43
Error Detection Process
44
Parity Check Parity bit appended to a block of data Even parity –Added bit ensures an even number of 1s Odd parity –Addedbit ensures an odd number of 1s Example, 7-bit character [1110001] –Even parity [11100010] –Odd parity [11100011]
45
Cyclic Redundancy Check (CRC) Transmitter –For a k-bit block, transmitter generates an (n-k)-bit frame check sequence (FCS) –Resulting frame of n bits is exactly divisible by predetermined number Receiver –Divides incoming frame by predetermined number –If no remainder, assumes no error
46
CRC using Modulo 2 Arithmetic Exclusive-OR (XOR) operation Parameters: T = n-bit frame to be transmitted D = k-bit block of data; the first k bits of T F = (n – k)-bit FCS; the last (n – k) bits of T P = pattern of n–k+1 bits; this is the predetermined divisor Q = Quotient R = Remainder
47
CRC using Modulo 2 Arithmetic For T/P to have no remainder, start with Divide 2 n-k D by P gives quotient and remainder Use remainder as FCS
48
CRC using Modulo 2 Arithmetic Does R cause T/P have no remainder? Substituting, –No remainder, so T is exactly divisible by P
49
CRC using Polynomials All values expressed as polynomials –Dummy variable X with binary coefficients
50
CRC using Polynomials Widely used versions of P(X) –CRC–12 X 12 + X 11 + X 3 + X 2 + X + 1 –CRC–16 X 16 + X 15 + X 2 + 1 –CRC – CCITT X 16 + X 12 + X 5 + 1 –CRC – 32 X 32 + X 26 + X 23 + X 22 + X 16 + X 12 + X 11 + X 10 + X 8 + X 7 + X 5 + X 4 + X 2 + X + 1
51
CRC using Digital Logic Dividing circuit consisting of: –XOR gates Up to n – k XOR gates Presence of a gate corresponds to the presence of a term in the divisor polynomial P(X) –A shift register String of 1-bit storage devices Register contains n – k bits, equal to the length of the FCS
52
Digital Logic CRC
53
Wireless Transmission Errors Error detection requires retransmission Detection inadequate for wireless applications –Error rate on wireless link can be high, results in a large number of retransmissions –Long propagation delay compared to transmission time
54
Block Error Correction Codes Transmitter –Forward error correction (FEC) encoder maps each k-bit block into an n-bit block codeword –Codeword is transmitted; analog for wireless transmission Receiver –Incoming signal is demodulated –Block passed through an FEC decoder
55
Forward Error Correction Process
56
FEC Decoder Outcomes No errors present –Codeword produced by decoder matches original codeword Decoder detects and corrects bit errors Decoder detects but cannot correct bit errors; reports uncorrectable error Decoder detects no bit errors, though errors are present
57
Block Code Principles Hamming distance – for 2 n-bit binary sequences, the number of different bits –E.g., v 1 =011011; v 2 =110001; d(v1, v 2 )=3 Redundancy – ratio of redundant bits to data bits Code rate – ratio of data bits to total bits Coding gain – the reduction in the required E b /N 0 to achieve a specified BER of an error-correcting coded system
58
How Coding Improves Performance
59
Hamming Code Designed to correct single bit errors Family of (n, k) block error-correcting codes with parameters: –Block length:n = 2 m – 1 –Number of data bits: k = 2 m – m – 1 –Number of check bits: n – k = m –Minimum distance: d min = 3 Single-error-correcting (SEC) code –SEC double-error-detecting (SEC-DED) code
60
Hamming Code Process Encoding: k data bits + (n -k) check bits Decoding: compares received (n -k) bits with calculated (n -k) bits using XOR –Resulting (n -k) bits called syndrome word –Syndrome range is between 0 and 2 (n-k) -1 –Each bit of syndrome indicates a match (0) or conflict (1) in that bit position
61
Cyclic Codes Can be encoded and decoded using linear feedback shift registers (LFSRs) For cyclic codes, a valid codeword (c 0, c 1, …, c n-1 ), shifted right one bit, is also a valid codeword (c n-1, c 0, …, c n-2 ) Takes fixed-length input (k) and produces fixed- length check code (n-k) –In contrast, CRC error-detecting code accepts arbitrary length input for fixed-length check code
62
BCH Codes For positive pair of integers m and t, a (n, k) BCH code has parameters: –Block length: n = 2 m – 1 –Number of check bits: n – k mt –Minimum distance:d min 2t + 1 Correct combinations of t or fewer errors Flexibility in choice of parameters –Block length, code rate
63
Reed-Solomon Codes Subclass of nonbinary BCH codes Data processed in chunks of m bits, called symbols An (n, k) RS code has parameters: –Symbol length: m bits per symbol –Block length: n = 2 m – 1 symbols = m(2 m – 1) bits –Data length: k symbols –Size of check code: n – k = 2t symbols = m(2t) bits –Minimum distance: d min = 2t + 1 symbols
64
Block Interleaving Data written to and read from memory in different orders Data bits and corresponding check bits are interspersed with bits from other blocks At receiver, data are deinterleaved to recover original order A burst error that may occur is spread out over a number of blocks, making error correction possible
65
Block Interleaving
66
Convolutional Codes Generates redundant bits continuously Error checking and correcting carried out continuously –(n, k, K) code Input processes k bits at a time Output produces n bits for every k input bits K = constraint factor k and n generally very small –n-bit output of (n, k, K) code depends on: Current block of k input bits Previous K-1 blocks of k input bits
67
Convolutional Encoder
68
Decoding Trellis diagram – expanded encoder diagram Viterbi code – error correction algorithm –Compares received sequence with all possible transmitted sequences –Algorithm chooses path through trellis whose coded sequence differs from received sequence in the fewest number of places –Once a valid path is selected as the correct path, the decoder can recover the input data bits from the output code bits
69
Trellis Diagram
71
Trellis diagram
72
Viterbi algorithm
73
Automatic Repeat Request Mechanism used in data link control and transport protocols Relies on use of an error detection code (such as CRC) Flow Control Error Control
74
Flow Control Assures that transmitting entity does not overwhelm a receiving entity with data Protocols with flow control mechanism allow multiple PDUs in transit at the same time PDUs arrive in same order they’re sent Sliding-window flow control –Transmitter maintains list (window) of sequence numbers allowed to send –Receiver maintains list allowed to receive
75
Flow Control Reasons for breaking up a block of data before transmitting: –Limited buffer size of receiver –Retransmission of PDU due to error requires smaller amounts of data to be retransmitted –On shared medium, larger PDUs occupy medium for extended period, causing delays at other sending stations
76
Flow Control
77
Error Control Mechanisms to detect and correct transmission errors Types of errors: –Lost PDU : a PDU fails to arrive –Damaged PDU : PDU arrives with errors
78
Error Control Requirements Error detection –Receiver detects errors and discards PDUs Positive acknowledgement –Destination returns acknowledgment of received, error- free PDUs Retransmission after timeout –Source retransmits unacknowledged PDU Negative acknowledgement and retransmission –Destination returns negative acknowledgment to PDUs in error
79
Go-back-N ARQ Acknowledgments –RR = receive ready (no errors occur) –REJ = reject (error detected) Contingencies –Damaged PDU –Damaged RR –Damaged REJ
80
Go-back N ARQ
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.