Expt. No. 3revised
Expt. No. 3revised
EXPERIMENT NO.3
Title: Study of DSSS transmitter and receiver using suitable hardware setup/kit.
1. Aim: Study of DSSS transmitter and receiver using suitable hardware setup/kit.
2. CO 301.4: Evaluate the performance of digital modulation techniques with spread
spectrum system.
3. ELO-2: Student will be able to study the generation and detection of DSSS, FHSS
techniques.
4. Objectives: After performing this experiment, Students will be able to understand the
concept of generation and detection of DSSS-BPSK.
5. Pre-requisites: Basic knowledge of spread spectrum modulation techniques
6. Appropriate Hardware and Software Tools:
DSSS Kit, CRO, connecting cables
7. Theory:
Spread spectrum is based on signaling schemes which greatly expands the transmitted
spectrum relative to the data rate. Spread spectrum is useful when it is necessary for the system to
resist external interference, to operate at low spectral energy, to provide multiple access
capability without external control & to provide a secure channel inaccessible to the outside
listeners. The main principle of spread spectrum communication is that the bandwidth occupancy
is much higher than usual. Because of this much larger bandwidth, the power spectral density is
lower in the channel, the signal looks like a noise. The spreading is done by combining the data
signal with code signal which is independent of the transmitted data message. The various types
of modulation techniques employed in spread spectrum are
1] Direct Sequencing 2] Frequency Hoping 3] Time Hoping 4] Hybrid Methods.
Direct sequence:
Spread Spectrum techniques were and are still used in military applications, because of
their high security, and their less susceptibility to interference from other parties. In this
technique, multiple users share the same bandwidth, without significantly interfering with each
other. The spreading waveform is controlled by a Pseudo-Noise (PN) sequence, which is a binary
random sequence. This PN is then multiplied with the original baseband signal, which has a lower
frequency, which yields a spread waveform that has a noise like properties. In the receiver, the
JSPM’s
JAYWANTRAO SAWANT COLLEGE OF ENGINEERING
Sr.No. 58, Handewadi Road, Hadapsar, Pune, Maharashtra411028
Department of Electronics and Telecommunication Engineering
opposite happens, when the pass band signal is first demodulated, and then despreads using the
same PN waveform. An important factor here is the synchronization between the two generated
sequences.
m’ (t) = d (t) * g (t)
where p (t) = PN sequence random sequence signal
m (t) =input bit pattern signal to be spread
m’ (t) = Spreaded signal
Tb= input bit pattern bit period
Tc= pn sequence one bit time ie chip period
Fb=1/Tb is bit rate
Fc=1/Tc is chip rate
N=no of chips of Tb is = Tb/Tc
The bit rate ‘fc’ of g(t) is usually much greater than the bit rate ‘fb’ of d(t) so that, g(t) is
chops bits of d(t) into chips & so rate of g(t) is called as chip rate fc & bit rate is fd. The
spectrum is spread by ratio fc/fd.
where m(t) is the data sequence, p(t) is the PN spreading sequence, fc is the carrier
frequency, and . is the carrier phase angle at t=0. Each symbol in m(t) represents a data
symbol and has a duration of Ts . Each pulse in p(t) represents a chip, and has a duration of
Tc. The transitions of the data symbols and chips coincide such that the ratio Ts to Tc is an
integer. The waveforms m(t) and p(t) are shown in fig. The resulting spread signal is then
modulated using the BPSK scheme. The carrier frequency fc should have a frequency at
least 5 times the chip frequency p(t).
As shown above, when we multiply two cosine signals together, we will obtain two
expressions, one of which has twice the frequency of the original message. And this part can
be removed by a LPF. The output is mss(t) as shown in figure. This design is based on
Coherent Detection BPSK, so we don’t have to worry about carrier synchronization issues.
As for the PN sequence in the receiver, it should be an exact replica of the one used
in the transmitter, with no delays, cause this might cause severe errors in the incoming
message.
T5. PN Signal:
10. Observations:
Sr.No A Tb A PN seq N=Tb/Tc Ac Fc
of NRZ of NRZ Of PN Chip (carrier) Of
data data Period Carrier
Tc
JSPM’s
JAYWANTRAO SAWANT COLLEGE OF ENGINEERING
Sr.No. 58, Handewadi Road, Hadapsar, Pune, Maharashtra411028
Department of Electronics and Telecommunication Engineering
Conclusion:
Thus we have studied DSSS transmitter and receiver using suitable hardware setup/kit.
Industry Reference:
CDMA cellphone technology: The DSSS technique was used to provide a multiple
access scheme that was used for 3G cellophane technology. Each mobile used a
different access code or spreading code and this enabled multiple users to access the
base station on the same frequency.
GNSS: Satellite based navigation systems use DSSS as this gives a signal gain by
spreading the signal out over a wide bandwidth. It also enables different satellites to
use the same channel without mutual interference.
QR Code
https://www.youtube.com/watch?v=MqnzaHsQ90U
Questions:
1. With the help of block diagram and suitable expressions, explain the generation and
reception of direct sequence spread spectrum signal using BPSK modulation.
Ans: To provide band pass transmission, the base band data sequence is multiplied by a
Carrier by means of shift keying. Normally binary phase shift keying (PSK) is used because
of its advantages. The transmitter first converts the incoming binary data sequence {bk} into
an NRZ waveform b(t), which is followed by two stages of modulation. The first stage
consists of a multiplier with data signal b(t) and the PN signal c(t) as inputs. The output of
multiplier is m(t) is a wideband signal. Thus a narrow – band data sequence is transformed
into a noise like wide band signal.The second stage consists of a binary Phase Shift Keying
(PSK) modulator. Which converts base band signal m(t) into band pass signal x(t). The
transmitted signal x(t) is thus a direct – sequence spread binary PSK signal. The phase
modulation θ(t) of x(t) has one of the two values ‘0’ and ‘π’ (180o) depending upon the
polarity of the message signal b(t) and PN signal c(t) at time t.Polarity of PN & Polarity of
PN signal both +, + or - - Phase ‘0’ Polarity of PN & Polarity of PN signal both +, - or - +
Phase ‘π’
JSPM’s
JAYWANTRAO SAWANT COLLEGE OF ENGINEERING
Sr.No. 58, Handewadi Road, Hadapsar, Pune, Maharashtra411028
Department of Electronics and Telecommunication Engineering
The receiver consists of two stages of demodulation. In the first stage the received signal y(t)
and a locally generated carrier are applied to a coherent detector (a product modulator
followed by a low pass filter), Which converts band pass signal into base band signal. The
second stage of demodulation performs Spectrum despreading bymultiplying the output of
low-pass filter by a locally generated replica of the PN signal c(t), followed by integration
over a bit interval Tb and finally a decision device is used to get binary sequence.
Fig: (a) Direct sequence spread spectrum signal using BPSK modulation
Transmitter
2. Explain processing gain, anti jamming property, jamming margin and low
imperceptibility for spread spectrum techniques.
Anti jamming property:- The spread spectrum technique widens the bandwidth of
the signal until it equals the original bandwidth plus the bandwidth of the pseudo-
JSPM’s
JAYWANTRAO SAWANT COLLEGE OF ENGINEERING
Sr.No. 58, Handewadi Road, Hadapsar, Pune, Maharashtra411028
Department of Electronics and Telecommunication Engineering
random noise injected. The pseudo-random noise added to the spread spectrum
technique prevents jamming and interference in wireless systems.
G P = the processing gain (in decibels); L SYS = the system losses (in decibels);
It is important to remember that spread spectrum signals almost always carry their
information in digital form.