SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
International Journal of Engineering Inventions
ISSN: 2278-7461, www.ijeijournal.com
Volume 1, Issue 9 (November2012) PP: 42-48


 An Improved VLSI Architecture Using Galois Sequence for High
          Speed DSSS Signal Acquisition at Low SNR
            D.Karunakar Reddy 1, Mekala Ramarao2, Dr. T. Satya Savithri 3
                                      1, 3
                                     (ECE Department, JNTUHCEH, INDIA)
                           2
                            (ECE Department, Malla Reddy Engineering College, INDIA)


Abstract:––In this paper, a new architecture for DSSS signal acquisition has been proposed and implemented. With the
increased requirement of data security and authentication, it is essential to use large PN sequence like Galois GF (2) in the
spreading and dispreading operations of DSSS communication. Spreading with a large PN sequence ensures the increased
frequency spectrum utilization with ultra narrow band (UNB) channels. An effective and efficient digital modulation
technique like QPSK is used for improved accuracy. It also provides acquisition even at low SNR. The simulation results
performed on both MATLAB and CPLD (XC3s100evq100-5) shows that the signal acquisition is comparatively improved in
terms of low SNR, low power and low complexity.

Key words:––DSSS, Galois sequence, Low SNR, MATLAB, CPLD, VHDL, VLSI

                                             I.        INTRODUCTION
          Among the various spread spectrum techniques, PN DSSS QPSK technology has various advantages like low
power density spectrum, low probability of intercept (LPI), powerful anti jamming performance, multiple access capability,
high bandwidth efficiency and convenient demodulation [1]. Hence it is widely used in military communication, weapon
guidance system and modern commercial communications. Generation of a spreading code along with a modulation
technique such as phase shift keying (PSK), prior to transmission is vital in DSSS communication. The DSSS receiver must
synchronize with this spreading code prior to demodulation [2]. After researching on the limitations of the traditional DSSS
architectures, a new approach of generating the spreading code, namely Galois sequence, is proposed and implemented.
QPSK modulation method has been used to ensure high quality signal acquisition as it has the advantage of converting a
narrow band signal into broadband thereby improving the quality of reception, especially in case of decreased signal
strength. Various spreading techniques have been investigated and low SNR signal acquisition has been demonstrated in this
paper. The component details of both transmitter and receiver along with the sub blocks have been discussed.
          This paper is organised as follows: In section II, the basic principle of DSSS communication is discussed. The
various advantages of DSSS communication over its counter parts are given in detail. In section III, the existing DSSS
architectures are discussed. The limitations and alternative measures to counter the drawbacks of these architectures are
discussed. Section IV introduces the proposed architecture and various sub blocks present in it are introduced in detail. In
section V provides the performance measures of the proposed architecture.

                                    II.           DSSS COMMUNICATION
           Spread spectrum is a method in which a signal generated with a specific bandwidth is spread in frequency domain
that results in a new signal with a wider bandwidth. Hence the bandwidth of the transmitted signal is much larger than that of
the frequency content of message signal. Spread spectrum communication may employ direct sequence spread spectrum
(DSSS), frequency hopping spread spectrum (FHSS) or hybrid of these two. These techniques have low probability of
intercept (LPI) i.e. decreasing the interference from the neighbouring receivers thereby providing privacy.
           FHSS is generally used to provide channel clearing time in multipath environment. It is a single user FSK system.
The transmitter in such system utilizes a set of predefined frequency bins which are generally selected to exceed the
maximum multipath delay. It ensures that no frequency bin is reused before the channel is completely cleared. This selection
of large bin reduces coincidence, error rate and the required coding gain. The interference between the users is not only
because of the coincidences of using same band at same time but also due to the multipath. Hence the performance is
measured by the multipath profile and the amount of power outside the symbol period. Hence maximizing the number of
users requires large number of frequency bins which results in a bandwidth relatively narrow. This corresponds to setting the
tone duration to be long with respect to channel clearing time. The resultant narrow bands are subjected to fading effect and
smaller Doppler shift [3].
           Frequency hopping spread spectrum has several performance limitations though it is simple to implement. To
overcome these limitations, DSSS technique is used which involves several codes rather than frequency bins for spreading
the baseband signal.




ISSN: 2278-7461                                   www.ijeijournal.com                                         P a g e | 42
An Improved VLSI Architecture Using Galois…




                                   Fig. 1: Principle Block Diagram of DSSS Communication.

          DSSS technique involves speeding and de-spreading of the message signal in frequency domain. It utilizes a PN
sequence for this purpose as shown in Fig. 1. An m-user DSSS system involves m n-length codes for spreading. These codes
are used to modulate a binary data stream [0, 1] mapped to [-1, 1]. A single user receiver is used to multiply the signal by the
original code. This process is called de-spreading. The SNR at the output stage after de-spreading is n times greater than the
SNR at the input stage. Hence acquisition of low SNR signals can be greatly achieved by using this technique. The concept
of DSSS provides high data security and reduced interference as spreading and de-spreading is done by codes generated
from a PN sequence rather than frequency bins. De-spreading has the additional advantage of de-correlating multiple access
interference (MAI). This is possible because the interfering signals have spreading codes orthogonal to the desired users
spreading codes.

                            III.            EXISTING DSSS ARCHITECTURES
Various architectures are available for implementing DSSS transmitter and receiver. They are:
          A FET based architecture: It employs a class D power FET for generating the spread signal from the message
           signal. It suffers from the problem of electromagnetic interference. The architecture has less immunity towards
           noise and hence it fails to transmit signals appreciably as the distance between the transmitter and receiver
           increases.
          FFT based architecture: The data security in this type of architectures is limited as the pattern can be predicted.
          PN sequence based architectures: In this type of architectures, a random sequence is generated for spreading the
           code. These architectures are effective, in terms of data security, only when the sequence is large enough.
           The problem of electromagnetic interference (EMI) present in the conventional architectures can be avoided by
using a large PN sequence, like Galois sequence, which generates random data bits. The limited data security problem,
which is a major drawback in the existing architectures, can be avoided with the use of Galois sequence. The signal
acquisition at low SNR is a major challenge in most of the communication systems such as satellites. This problem can be
avoided with the use of QPSK which converts narrow band signal into baseband.
           As the technology is improving day by day, there is a need for high data security. Ordinary PN sequence with 3 to
4 bits in a code sequence can be easily predicted. Hence to ensure security, large PN sequences are required. As the proposed
Galois structure provides large number of code streams, the data security is high. As the SNR of the original signal is
increased by 16 times, acquisition of low SNR signal is possible using this structure. The XOR gates shown can be replaced
by XNOR gates. The position of these gates can also be changed to generate various new code sequences [4].

                                 IV.           PROPOSED ARCHITECTURE




                                   Fig. 2: The Block Diagram of Proposed DSSS Architecture.



ISSN: 2278-7461                                    www.ijeijournal.com                                          P a g e | 43
An Improved VLSI Architecture Using Galois…

         The proposed architecture employs a Galois sequence generator instead of an ordinary PN sequence generator for
spreading and dispreading of the base band signal. The major blocks of this architecture are Galois sequence generator and
QPSK modulator.

4. 1       . GALOIS SEQUENCE
           Spreading of a message signal converts a narrow band signal into a broad band signal. The various sequences
normally used in spread spectrum are pseudo noise (PN) sequence, Gold code sequence, Walsh Hadamard sequence and
Kasami code sequence.
           A basic PN sequence is a periodic binary sequence with deterministic values and a noise like waveforms. It has the
following constraints:
          It must be built from two levelled numbers
          It should have a sharp peek for synchronization
          The codes must be of low cross correlation value
          The codes should be balanced i.e. the difference between ones and zeros may be as low as is sufficient for good
           power spectral density.
           A PN sequence is generally implemented by using linear feedback shift registers which consists of a few shift
registers and XOR gates. A pair of two linear feedback shift registers generates a Gold code. A Gold code sequence is
preferred as it provides minimum cross correlation. Walsh Hadamard sequence and Kasami code sequence also have the
same advantage [5].
All the sequences mentioned above have the following limitations:
          There is no offset between the streams. Hence every sequence does not start with a new start point
          The propagation times are more
          The software implementation is complex, especially in case of Gold code and Kasami code.
           To overcome these limitations, an alternative structure which can generate the output stream as that of a
conventional LFSR but with offset in time has been implemented. This structure is called Galois configuration.
In this configuration, when the system is clocked, the bits that do not have taps are shifted right as it is but the bits with taps
are XORed with the output bit and then shifted right. A sixteen bit Galois LFSR is shown in Fig. 3




                                          Fig. 3: Block Diagram of Galois Sequence

        This structure can provide a cycle of 65535 states excluding all zeroes state. The state shown in Fig. 4. is equal to
ACE1 hex which is followed by E270 hex.




                                          Fig. 4: Galois Sequence Working Diagram

          Compared to double gold code sequence which is being used in DSSS communication for its high data security, a
Galois sequence uses more number of XOR gates which ensures the random generation of code streams. The Galois
sequence produces 2n -1 different codes and each new stream has a new starting point. It avoids the random encoding of the
message signal. Hence Galois sequence provides a scientific and standard way of spreading and de-spreading. Hence error
detection and correction are easier using this structure than its counterparts.




ISSN: 2278-7461                                     www.ijeijournal.com                                           P a g e | 44
An Improved VLSI Architecture Using Galois…




                                         Fig. 5: State Diagram of Galois Sequence

4. 2       . QPSK TECHNIQUE
           An I / Q modulation technique is required to modulate and demodulate these encoded data bits. Quadrature phase
shift keying (QPSK) modulation is chosen as the target I / Q modulation technique. The purpose of QPSK modulation in the
proposed system is to convert the data bits into physical layer symbols and vice versa. These symbols are used as the
transmission bits between the physical layers present at transmitter and receiver, in an OSI reference model. This capability
is an essential factor in case of anti jamming application of DSSS communication [6].

4. 3       . WORKING OF THE ARCHITECTURE
           The proposed architecture is indeed an extension of the existing PN sequence based architecture. It uses a Galois
sequence rather than an ordinary PN sequence. Use of this new sequence provides 65,535 unique combinations of spread
stream ensure secured transmission of data. The major blocks present in the new architecture are Galois sequence generator
and QPSK modulator & demodulator.
           The transmitter of proposed DSSS architecture contains the data source,Galois sequence generator, DSSS block
and QPSK modulator. The Galois sequence generator generates various unique sequences which are feed to the DSSS block
along with the message signal. A logical operation such as XOR (or) XNOR needs to be performed on these two signals
within the DSSS block. The pattern of Galois sequence changes instantly with its output bit. This random sequence called
the spreading stream is XORed with the message signal to produce an encoded signal called DSSS signal. QPSK modulation
is performed on this encoded data for transmission. Reverse operation is performed at the receiver stage. The demodulated
signal i.e. DSSS signal along with the Galois sequence which is the spreading code is applied to the de-spreader. An XOR
(or) XNOR block can act as a de-spreader. After dispreading, we obtain the original data stream that was transmitted.

                                  V.           PERFORMANCE ANALYSIS
          The proposed architecture is implemented using CPLD (XC3S100EVQ100-5).The simulator used in Xilinx 9.2i
with Xilinx XST synthesis II. The RTL schematic thus generated is shown in Fig.6




                                    Fig. 6: RTL Schematic of the Proposed Architecture

          VHDL programming language is used for implementing this architecture. The VHDL test bench used for
simulation is shown in Fig- 7.




ISSN: 2278-7461                                  www.ijeijournal.com                                         P a g e | 45
An Improved VLSI Architecture Using Galois…




                                        Fig. 7: VHDL Test Bench Setup for Simulation.

          The simulation results obtained for this test bench on CPLD (XC3S100EVQ100-5) shows that the proposed
architecture provides high accuracy and security compare to the conventional methods as can be seen from Fig-8




                          Fig. 8: Simulation Results Obtained Using CPLD (XC3S100EVQ100-5)

           The architecture is targeted for low SNR signal acquisition of DSSS signals. QPSK modulation technique is used
for this purpose. The statistical analysis of SNR is considered with a signal in noise. In this case, we represent the noisy
output as
y t = n1 t + jnq t            (1)
To counter the noise, we consider the long base band DSSS signal r (t) intercepted by the receiver as y (t). Then we divide y
(t) into m segments. Hence, the auto correlation of m-th segment is given by
    m        1 T
 Ry τ =            y t y t − τ dt                 (2)
             T 0
The integration on equation (2) now provides
 y t y ∗ t − τ = nq t n1 t − τ − nq t nq t + j n1 t − τ nq t − nq t nq t                     (3)
From equation (2) and central limit theorem, the real and imaginary parts of R y (τ) approximately obeys Gaussian
distribution, with mean and variance as follows:
E Re R y τ = E Im R y τ = 0                           (4)
                                          σ4
Var Re R y τ = Var Im R y τ = n                      (5)
                                       2T
Hence the mean and variance of the noisy signal ρ2 (τ) is given by
                   E p τ
mρ2 = E ρ2 τ =            =1                          (6)
                    E p τ
                     Var p τ        1
σ22 = Var ρ2 τ
 ρ                 =            =                   (7)
                       E2 p τ       M
From the above analysis, the variance of the noisy signal is found to be 1/m times as that of noise less signal .Hence, it is
evident that by converting the base band signal in to m segments , it is possible to receive each signal accurately. QPSK
ISSN: 2278-7461                                   www.ijeijournal.com                                        P a g e | 46
An Improved VLSI Architecture Using Galois…

modulation is a method which converts the given DSSS signal in to M symbols. Using this method, the acquisition of low
SNR signals is possible.

          The operation of a QPSK modulation technique is demonstrated in Fig. 9




                                    Fig. 9: Simulation Result of QPSK Using MATLAB

           An input base band signal is modulated using QPSK. The simulation of QPSK modulation technique has been
performed in MATLAB. The odd and even bit streams of the input bit stream are considered separately. The odd bit streams
are multiplied by a cosine waveform where as the even bit stream is multiplied by a sine waveform. The summation of these
two waveforms provides the required QPSK signal.
           The device utilization summary of the proposed architecture is shown in Fig. 10. It is evident from this summary
that the architecture is less complex as it uses less number of components and is of low power circuit. The device utilization
is very less which provides an ease of designing more number of such circuits on a single IC.




                             Fig. 10: Device utilization summary of the proposed architecture

                           VI.           CONCLUSION AND FUTURE WORK
From the above simulation results and synthesis thereafter, the following results are observed:
        The performance of DSSS system was improved as the design was less complex and has less propagation delay.
        The use of QPSK modulation technique has provided the required number of symbols to retrieve signal even at
         low SNR condition.
        The architecture has the advantage of VLSI implementation which, intern, produces compact DSSS architecture
         and devices for future needs of 4G communication.
        The DSSS system has been implemented using lucid structures which are of low cost.
        In future, the concept used in the proposed architecture can be prolonged to other m –ary phase shift keying
         methods for better performance.

2.       ACKNOWLEDGEMENT
         The authors acknowledge the support received from ECE department, JNTU Hyderabad for reviewing the work
and providing the R&D infrastructure.




ISSN: 2278-7461                                   www.ijeijournal.com                                         P a g e | 47
An Improved VLSI Architecture Using Galois…

                                                REFERENCES
 1.     D.Karunakar Reddy , Mekala Ramarao, Dr. T. Satya Savitri , Implementation of A Low Power Low Complexity
        VLSI Architecture for DSSS Signal Transmission and Reception., IOSR Journal of VLSI and Signal Processing
        (IOSR-JVSP) Volume 1, Issue 2 (Sep-Oct. 2012), PP 21-29
 2.     Rafa_ St_pie_, Janusz Walczak, Application of the DLFSR Generators in Spread Spectrum Communication,
        MIXDES 2012, 19th International Conference "Mixed Design of Integrated Circuits and Systems", May 24-26,
        2012, Warsaw, Poland
 3.     Lee Freitag, Milica Stojanovic, Sandipa Singh, and Mark Johnson, Analysis of Channel Effects on Direct-
        Sequence and Frequency-Hopped Spread-Spectrum Acoustic Communication, IEEE JOURNAL OF OCEANIC
        ENGINEERING, VOL. 26, NO. 4, OCTOBER 2001
 4.     Zhanqi DONG Nianying HU, A Method for the Detection of Long Pseudo-Random Code DSSS Signals Based on
        the Processing of Delay-Multiply (II) - The Estimation of the Information Symbol Period and the Pseudo-Random
        Code Sequence, 2008 11th IEEE international conference on communication technology proceedings
 5.     Muhammad Baqer Mollah, Md. Rashidul Islam, Comparative Analysis of Gold Codes with PN Codes
 6.     Using Correlation Property in CDMA Technology, 2012 International Conference on Computer Communication
        and Informatics (ICCCI -2012), Jan. 10 – 12, 2012, Coimbatore, INDIA
 7.     Christina P¨opper, Mario Strasser, Anti-Jamming Broadcast Communication using Uncoordinated Spread
        Spectrum Techniques, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 28, NO. 5,
        JUNE 2010




ISSN: 2278-7461                              www.ijeijournal.com                                      P a g e | 48

Mais conteúdo relacionado

Mais procurados

Packet hiding methods for preventing selective
Packet hiding methods for preventing selectivePacket hiding methods for preventing selective
Packet hiding methods for preventing selectiveveenasraj
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...IOSR Journals
 
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet  Hiding MethodsJamming Attacks Prevention in Wireless Networks Using Packet  Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding MethodsIOSR Journals
 
Cm32996999
Cm32996999Cm32996999
Cm32996999IJMER
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
 
Energy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksEnergy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksGr Patel
 
Sparse channel estimation for underwater acoustic communication using compres...
Sparse channel estimation for underwater acoustic communication using compres...Sparse channel estimation for underwater acoustic communication using compres...
Sparse channel estimation for underwater acoustic communication using compres...IAEME Publication
 
Final year project list for the year 2012
Final year project list for the year 2012Final year project list for the year 2012
Final year project list for the year 2012Muhammad Farhan
 
spread spectrum communication
spread spectrum communicationspread spectrum communication
spread spectrum communicationabhishek reddy
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSijwmn
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsmmjalbiaty
 
Implementation of Direct Sequence Spread Spectrum Communication System Using ...
Implementation of Direct Sequence Spread Spectrum Communication System Using ...Implementation of Direct Sequence Spread Spectrum Communication System Using ...
Implementation of Direct Sequence Spread Spectrum Communication System Using ...IJAEMSJORNAL
 
Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Analysis of GPSR and its Relevant Attacks in Wireless Sensor NetworksAnalysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Analysis of GPSR and its Relevant Attacks in Wireless Sensor NetworksIDES Editor
 

Mais procurados (20)

Packet hiding methods for preventing selective
Packet hiding methods for preventing selectivePacket hiding methods for preventing selective
Packet hiding methods for preventing selective
 
Indoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor NetworksIndoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor Networks
 
Important question bank
Important question bankImportant question bank
Important question bank
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
 
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet  Hiding MethodsJamming Attacks Prevention in Wireless Networks Using Packet  Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
 
Cm32996999
Cm32996999Cm32996999
Cm32996999
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
 
Energy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksEnergy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networks
 
Sparse channel estimation for underwater acoustic communication using compres...
Sparse channel estimation for underwater acoustic communication using compres...Sparse channel estimation for underwater acoustic communication using compres...
Sparse channel estimation for underwater acoustic communication using compres...
 
Final year project list for the year 2012
Final year project list for the year 2012Final year project list for the year 2012
Final year project list for the year 2012
 
spread spectrum communication
spread spectrum communicationspread spectrum communication
spread spectrum communication
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
Implementation of Direct Sequence Spread Spectrum Communication System Using ...
Implementation of Direct Sequence Spread Spectrum Communication System Using ...Implementation of Direct Sequence Spread Spectrum Communication System Using ...
Implementation of Direct Sequence Spread Spectrum Communication System Using ...
 
Wwwwww
WwwwwwWwwwww
Wwwwww
 
Cm32546555
Cm32546555Cm32546555
Cm32546555
 
Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)
 
Es24906911
Es24906911Es24906911
Es24906911
 
Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Analysis of GPSR and its Relevant Attacks in Wireless Sensor NetworksAnalysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
 

Destaque (8)

call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Material Segurudad Social Y Reforma Compendio 2
Material Segurudad Social Y Reforma Compendio 2Material Segurudad Social Y Reforma Compendio 2
Material Segurudad Social Y Reforma Compendio 2
 
Take Control of Your Website for PR Pros! PRSA Southeast District Conference
Take Control of Your Website for PR Pros! PRSA Southeast District ConferenceTake Control of Your Website for PR Pros! PRSA Southeast District Conference
Take Control of Your Website for PR Pros! PRSA Southeast District Conference
 
International Journal of Engineering Inventions (IJEI), www.ijeijournal.com,c...
International Journal of Engineering Inventions (IJEI), www.ijeijournal.com,c...International Journal of Engineering Inventions (IJEI), www.ijeijournal.com,c...
International Journal of Engineering Inventions (IJEI), www.ijeijournal.com,c...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Top Seller
Top SellerTop Seller
Top Seller
 

Semelhante a International Journal of Engineering Inventions (IJEI)

PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...ijistjournal
 
Digital communication (DSSS)
Digital communication  (DSSS)Digital communication  (DSSS)
Digital communication (DSSS)SSGMCE SHEGAON
 
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfSpread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfakritigallery
 
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...IOSRJECE
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless CommunicationsUday Kumar
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless CommunicationsUday Kumar
 
Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Chyon Ju
 
Ofdm mimo and v-blast algorithm-key to high speed wireless communication
Ofdm mimo and v-blast algorithm-key to high speed wireless communicationOfdm mimo and v-blast algorithm-key to high speed wireless communication
Ofdm mimo and v-blast algorithm-key to high speed wireless communicationIAEME Publication
 
Ofdm mimo and v-blast algorithm-key to high speed wireless communication
Ofdm mimo and v-blast algorithm-key to high speed wireless communicationOfdm mimo and v-blast algorithm-key to high speed wireless communication
Ofdm mimo and v-blast algorithm-key to high speed wireless communicationIAEME Publication
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Editor IJARCET
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Editor IJARCET
 
PureWave White Paper : Multiple Antenna Processing For WiMAX
PureWave White Paper : Multiple Antenna Processing For WiMAXPureWave White Paper : Multiple Antenna Processing For WiMAX
PureWave White Paper : Multiple Antenna Processing For WiMAXGoing Wimax
 

Semelhante a International Journal of Engineering Inventions (IJEI) (20)

A.pptx
A.pptxA.pptx
A.pptx
 
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
 
Digital communication (DSSS)
Digital communication  (DSSS)Digital communication  (DSSS)
Digital communication (DSSS)
 
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfSpread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
 
Topic: Spread Spectrum
Topic: Spread SpectrumTopic: Spread Spectrum
Topic: Spread Spectrum
 
Dq33705710
Dq33705710Dq33705710
Dq33705710
 
Dq33705710
Dq33705710Dq33705710
Dq33705710
 
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...
Satellite Telemetry Data Transmission Immunity from the ASI and Jamming Using...
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless Communications
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless Communications
 
UNIT-5 Spread Spectrum Communication.pdf
UNIT-5 Spread Spectrum Communication.pdfUNIT-5 Spread Spectrum Communication.pdf
UNIT-5 Spread Spectrum Communication.pdf
 
DC@UNIT 5 ppt.ppt
DC@UNIT 5 ppt.pptDC@UNIT 5 ppt.ppt
DC@UNIT 5 ppt.ppt
 
Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016
 
Dq24746750
Dq24746750Dq24746750
Dq24746750
 
Ofdm mimo and v-blast algorithm-key to high speed wireless communication
Ofdm mimo and v-blast algorithm-key to high speed wireless communicationOfdm mimo and v-blast algorithm-key to high speed wireless communication
Ofdm mimo and v-blast algorithm-key to high speed wireless communication
 
Ofdm mimo and v-blast algorithm-key to high speed wireless communication
Ofdm mimo and v-blast algorithm-key to high speed wireless communicationOfdm mimo and v-blast algorithm-key to high speed wireless communication
Ofdm mimo and v-blast algorithm-key to high speed wireless communication
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377
 
PureWave White Paper : Multiple Antenna Processing For WiMAX
PureWave White Paper : Multiple Antenna Processing For WiMAXPureWave White Paper : Multiple Antenna Processing For WiMAX
PureWave White Paper : Multiple Antenna Processing For WiMAX
 
CDMA
CDMACDMA
CDMA
 

Mais de International Journal of Engineering Inventions www.ijeijournal.com

Mais de International Journal of Engineering Inventions www.ijeijournal.com (20)

H04124548
H04124548H04124548
H04124548
 
G04123844
G04123844G04123844
G04123844
 
F04123137
F04123137F04123137
F04123137
 
E04122330
E04122330E04122330
E04122330
 
C04121115
C04121115C04121115
C04121115
 
B04120610
B04120610B04120610
B04120610
 
A04120105
A04120105A04120105
A04120105
 
F04113640
F04113640F04113640
F04113640
 
E04112135
E04112135E04112135
E04112135
 
D04111520
D04111520D04111520
D04111520
 
C04111114
C04111114C04111114
C04111114
 
B04110710
B04110710B04110710
B04110710
 
A04110106
A04110106A04110106
A04110106
 
I04105358
I04105358I04105358
I04105358
 
H04104952
H04104952H04104952
H04104952
 
G04103948
G04103948G04103948
G04103948
 
F04103138
F04103138F04103138
F04103138
 
E04102330
E04102330E04102330
E04102330
 
D04101822
D04101822D04101822
D04101822
 
C04101217
C04101217C04101217
C04101217
 

International Journal of Engineering Inventions (IJEI)

  • 1. International Journal of Engineering Inventions ISSN: 2278-7461, www.ijeijournal.com Volume 1, Issue 9 (November2012) PP: 42-48 An Improved VLSI Architecture Using Galois Sequence for High Speed DSSS Signal Acquisition at Low SNR D.Karunakar Reddy 1, Mekala Ramarao2, Dr. T. Satya Savithri 3 1, 3 (ECE Department, JNTUHCEH, INDIA) 2 (ECE Department, Malla Reddy Engineering College, INDIA) Abstract:––In this paper, a new architecture for DSSS signal acquisition has been proposed and implemented. With the increased requirement of data security and authentication, it is essential to use large PN sequence like Galois GF (2) in the spreading and dispreading operations of DSSS communication. Spreading with a large PN sequence ensures the increased frequency spectrum utilization with ultra narrow band (UNB) channels. An effective and efficient digital modulation technique like QPSK is used for improved accuracy. It also provides acquisition even at low SNR. The simulation results performed on both MATLAB and CPLD (XC3s100evq100-5) shows that the signal acquisition is comparatively improved in terms of low SNR, low power and low complexity. Key words:––DSSS, Galois sequence, Low SNR, MATLAB, CPLD, VHDL, VLSI I. INTRODUCTION Among the various spread spectrum techniques, PN DSSS QPSK technology has various advantages like low power density spectrum, low probability of intercept (LPI), powerful anti jamming performance, multiple access capability, high bandwidth efficiency and convenient demodulation [1]. Hence it is widely used in military communication, weapon guidance system and modern commercial communications. Generation of a spreading code along with a modulation technique such as phase shift keying (PSK), prior to transmission is vital in DSSS communication. The DSSS receiver must synchronize with this spreading code prior to demodulation [2]. After researching on the limitations of the traditional DSSS architectures, a new approach of generating the spreading code, namely Galois sequence, is proposed and implemented. QPSK modulation method has been used to ensure high quality signal acquisition as it has the advantage of converting a narrow band signal into broadband thereby improving the quality of reception, especially in case of decreased signal strength. Various spreading techniques have been investigated and low SNR signal acquisition has been demonstrated in this paper. The component details of both transmitter and receiver along with the sub blocks have been discussed. This paper is organised as follows: In section II, the basic principle of DSSS communication is discussed. The various advantages of DSSS communication over its counter parts are given in detail. In section III, the existing DSSS architectures are discussed. The limitations and alternative measures to counter the drawbacks of these architectures are discussed. Section IV introduces the proposed architecture and various sub blocks present in it are introduced in detail. In section V provides the performance measures of the proposed architecture. II. DSSS COMMUNICATION Spread spectrum is a method in which a signal generated with a specific bandwidth is spread in frequency domain that results in a new signal with a wider bandwidth. Hence the bandwidth of the transmitted signal is much larger than that of the frequency content of message signal. Spread spectrum communication may employ direct sequence spread spectrum (DSSS), frequency hopping spread spectrum (FHSS) or hybrid of these two. These techniques have low probability of intercept (LPI) i.e. decreasing the interference from the neighbouring receivers thereby providing privacy. FHSS is generally used to provide channel clearing time in multipath environment. It is a single user FSK system. The transmitter in such system utilizes a set of predefined frequency bins which are generally selected to exceed the maximum multipath delay. It ensures that no frequency bin is reused before the channel is completely cleared. This selection of large bin reduces coincidence, error rate and the required coding gain. The interference between the users is not only because of the coincidences of using same band at same time but also due to the multipath. Hence the performance is measured by the multipath profile and the amount of power outside the symbol period. Hence maximizing the number of users requires large number of frequency bins which results in a bandwidth relatively narrow. This corresponds to setting the tone duration to be long with respect to channel clearing time. The resultant narrow bands are subjected to fading effect and smaller Doppler shift [3]. Frequency hopping spread spectrum has several performance limitations though it is simple to implement. To overcome these limitations, DSSS technique is used which involves several codes rather than frequency bins for spreading the baseband signal. ISSN: 2278-7461 www.ijeijournal.com P a g e | 42
  • 2. An Improved VLSI Architecture Using Galois… Fig. 1: Principle Block Diagram of DSSS Communication. DSSS technique involves speeding and de-spreading of the message signal in frequency domain. It utilizes a PN sequence for this purpose as shown in Fig. 1. An m-user DSSS system involves m n-length codes for spreading. These codes are used to modulate a binary data stream [0, 1] mapped to [-1, 1]. A single user receiver is used to multiply the signal by the original code. This process is called de-spreading. The SNR at the output stage after de-spreading is n times greater than the SNR at the input stage. Hence acquisition of low SNR signals can be greatly achieved by using this technique. The concept of DSSS provides high data security and reduced interference as spreading and de-spreading is done by codes generated from a PN sequence rather than frequency bins. De-spreading has the additional advantage of de-correlating multiple access interference (MAI). This is possible because the interfering signals have spreading codes orthogonal to the desired users spreading codes. III. EXISTING DSSS ARCHITECTURES Various architectures are available for implementing DSSS transmitter and receiver. They are:  A FET based architecture: It employs a class D power FET for generating the spread signal from the message signal. It suffers from the problem of electromagnetic interference. The architecture has less immunity towards noise and hence it fails to transmit signals appreciably as the distance between the transmitter and receiver increases.  FFT based architecture: The data security in this type of architectures is limited as the pattern can be predicted.  PN sequence based architectures: In this type of architectures, a random sequence is generated for spreading the code. These architectures are effective, in terms of data security, only when the sequence is large enough. The problem of electromagnetic interference (EMI) present in the conventional architectures can be avoided by using a large PN sequence, like Galois sequence, which generates random data bits. The limited data security problem, which is a major drawback in the existing architectures, can be avoided with the use of Galois sequence. The signal acquisition at low SNR is a major challenge in most of the communication systems such as satellites. This problem can be avoided with the use of QPSK which converts narrow band signal into baseband. As the technology is improving day by day, there is a need for high data security. Ordinary PN sequence with 3 to 4 bits in a code sequence can be easily predicted. Hence to ensure security, large PN sequences are required. As the proposed Galois structure provides large number of code streams, the data security is high. As the SNR of the original signal is increased by 16 times, acquisition of low SNR signal is possible using this structure. The XOR gates shown can be replaced by XNOR gates. The position of these gates can also be changed to generate various new code sequences [4]. IV. PROPOSED ARCHITECTURE Fig. 2: The Block Diagram of Proposed DSSS Architecture. ISSN: 2278-7461 www.ijeijournal.com P a g e | 43
  • 3. An Improved VLSI Architecture Using Galois… The proposed architecture employs a Galois sequence generator instead of an ordinary PN sequence generator for spreading and dispreading of the base band signal. The major blocks of this architecture are Galois sequence generator and QPSK modulator. 4. 1 . GALOIS SEQUENCE Spreading of a message signal converts a narrow band signal into a broad band signal. The various sequences normally used in spread spectrum are pseudo noise (PN) sequence, Gold code sequence, Walsh Hadamard sequence and Kasami code sequence. A basic PN sequence is a periodic binary sequence with deterministic values and a noise like waveforms. It has the following constraints:  It must be built from two levelled numbers  It should have a sharp peek for synchronization  The codes must be of low cross correlation value  The codes should be balanced i.e. the difference between ones and zeros may be as low as is sufficient for good power spectral density. A PN sequence is generally implemented by using linear feedback shift registers which consists of a few shift registers and XOR gates. A pair of two linear feedback shift registers generates a Gold code. A Gold code sequence is preferred as it provides minimum cross correlation. Walsh Hadamard sequence and Kasami code sequence also have the same advantage [5]. All the sequences mentioned above have the following limitations:  There is no offset between the streams. Hence every sequence does not start with a new start point  The propagation times are more  The software implementation is complex, especially in case of Gold code and Kasami code. To overcome these limitations, an alternative structure which can generate the output stream as that of a conventional LFSR but with offset in time has been implemented. This structure is called Galois configuration. In this configuration, when the system is clocked, the bits that do not have taps are shifted right as it is but the bits with taps are XORed with the output bit and then shifted right. A sixteen bit Galois LFSR is shown in Fig. 3 Fig. 3: Block Diagram of Galois Sequence This structure can provide a cycle of 65535 states excluding all zeroes state. The state shown in Fig. 4. is equal to ACE1 hex which is followed by E270 hex. Fig. 4: Galois Sequence Working Diagram Compared to double gold code sequence which is being used in DSSS communication for its high data security, a Galois sequence uses more number of XOR gates which ensures the random generation of code streams. The Galois sequence produces 2n -1 different codes and each new stream has a new starting point. It avoids the random encoding of the message signal. Hence Galois sequence provides a scientific and standard way of spreading and de-spreading. Hence error detection and correction are easier using this structure than its counterparts. ISSN: 2278-7461 www.ijeijournal.com P a g e | 44
  • 4. An Improved VLSI Architecture Using Galois… Fig. 5: State Diagram of Galois Sequence 4. 2 . QPSK TECHNIQUE An I / Q modulation technique is required to modulate and demodulate these encoded data bits. Quadrature phase shift keying (QPSK) modulation is chosen as the target I / Q modulation technique. The purpose of QPSK modulation in the proposed system is to convert the data bits into physical layer symbols and vice versa. These symbols are used as the transmission bits between the physical layers present at transmitter and receiver, in an OSI reference model. This capability is an essential factor in case of anti jamming application of DSSS communication [6]. 4. 3 . WORKING OF THE ARCHITECTURE The proposed architecture is indeed an extension of the existing PN sequence based architecture. It uses a Galois sequence rather than an ordinary PN sequence. Use of this new sequence provides 65,535 unique combinations of spread stream ensure secured transmission of data. The major blocks present in the new architecture are Galois sequence generator and QPSK modulator & demodulator. The transmitter of proposed DSSS architecture contains the data source,Galois sequence generator, DSSS block and QPSK modulator. The Galois sequence generator generates various unique sequences which are feed to the DSSS block along with the message signal. A logical operation such as XOR (or) XNOR needs to be performed on these two signals within the DSSS block. The pattern of Galois sequence changes instantly with its output bit. This random sequence called the spreading stream is XORed with the message signal to produce an encoded signal called DSSS signal. QPSK modulation is performed on this encoded data for transmission. Reverse operation is performed at the receiver stage. The demodulated signal i.e. DSSS signal along with the Galois sequence which is the spreading code is applied to the de-spreader. An XOR (or) XNOR block can act as a de-spreader. After dispreading, we obtain the original data stream that was transmitted. V. PERFORMANCE ANALYSIS The proposed architecture is implemented using CPLD (XC3S100EVQ100-5).The simulator used in Xilinx 9.2i with Xilinx XST synthesis II. The RTL schematic thus generated is shown in Fig.6 Fig. 6: RTL Schematic of the Proposed Architecture VHDL programming language is used for implementing this architecture. The VHDL test bench used for simulation is shown in Fig- 7. ISSN: 2278-7461 www.ijeijournal.com P a g e | 45
  • 5. An Improved VLSI Architecture Using Galois… Fig. 7: VHDL Test Bench Setup for Simulation. The simulation results obtained for this test bench on CPLD (XC3S100EVQ100-5) shows that the proposed architecture provides high accuracy and security compare to the conventional methods as can be seen from Fig-8 Fig. 8: Simulation Results Obtained Using CPLD (XC3S100EVQ100-5) The architecture is targeted for low SNR signal acquisition of DSSS signals. QPSK modulation technique is used for this purpose. The statistical analysis of SNR is considered with a signal in noise. In this case, we represent the noisy output as y t = n1 t + jnq t (1) To counter the noise, we consider the long base band DSSS signal r (t) intercepted by the receiver as y (t). Then we divide y (t) into m segments. Hence, the auto correlation of m-th segment is given by m 1 T Ry τ = y t y t − τ dt (2) T 0 The integration on equation (2) now provides y t y ∗ t − τ = nq t n1 t − τ − nq t nq t + j n1 t − τ nq t − nq t nq t (3) From equation (2) and central limit theorem, the real and imaginary parts of R y (τ) approximately obeys Gaussian distribution, with mean and variance as follows: E Re R y τ = E Im R y τ = 0 (4) σ4 Var Re R y τ = Var Im R y τ = n (5) 2T Hence the mean and variance of the noisy signal ρ2 (τ) is given by E p τ mρ2 = E ρ2 τ = =1 (6) E p τ Var p τ 1 σ22 = Var ρ2 τ ρ = = (7) E2 p τ M From the above analysis, the variance of the noisy signal is found to be 1/m times as that of noise less signal .Hence, it is evident that by converting the base band signal in to m segments , it is possible to receive each signal accurately. QPSK ISSN: 2278-7461 www.ijeijournal.com P a g e | 46
  • 6. An Improved VLSI Architecture Using Galois… modulation is a method which converts the given DSSS signal in to M symbols. Using this method, the acquisition of low SNR signals is possible. The operation of a QPSK modulation technique is demonstrated in Fig. 9 Fig. 9: Simulation Result of QPSK Using MATLAB An input base band signal is modulated using QPSK. The simulation of QPSK modulation technique has been performed in MATLAB. The odd and even bit streams of the input bit stream are considered separately. The odd bit streams are multiplied by a cosine waveform where as the even bit stream is multiplied by a sine waveform. The summation of these two waveforms provides the required QPSK signal. The device utilization summary of the proposed architecture is shown in Fig. 10. It is evident from this summary that the architecture is less complex as it uses less number of components and is of low power circuit. The device utilization is very less which provides an ease of designing more number of such circuits on a single IC. Fig. 10: Device utilization summary of the proposed architecture VI. CONCLUSION AND FUTURE WORK From the above simulation results and synthesis thereafter, the following results are observed:  The performance of DSSS system was improved as the design was less complex and has less propagation delay.  The use of QPSK modulation technique has provided the required number of symbols to retrieve signal even at low SNR condition.  The architecture has the advantage of VLSI implementation which, intern, produces compact DSSS architecture and devices for future needs of 4G communication.  The DSSS system has been implemented using lucid structures which are of low cost.  In future, the concept used in the proposed architecture can be prolonged to other m –ary phase shift keying methods for better performance. 2. ACKNOWLEDGEMENT The authors acknowledge the support received from ECE department, JNTU Hyderabad for reviewing the work and providing the R&D infrastructure. ISSN: 2278-7461 www.ijeijournal.com P a g e | 47
  • 7. An Improved VLSI Architecture Using Galois… REFERENCES 1. D.Karunakar Reddy , Mekala Ramarao, Dr. T. Satya Savitri , Implementation of A Low Power Low Complexity VLSI Architecture for DSSS Signal Transmission and Reception., IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 1, Issue 2 (Sep-Oct. 2012), PP 21-29 2. Rafa_ St_pie_, Janusz Walczak, Application of the DLFSR Generators in Spread Spectrum Communication, MIXDES 2012, 19th International Conference "Mixed Design of Integrated Circuits and Systems", May 24-26, 2012, Warsaw, Poland 3. Lee Freitag, Milica Stojanovic, Sandipa Singh, and Mark Johnson, Analysis of Channel Effects on Direct- Sequence and Frequency-Hopped Spread-Spectrum Acoustic Communication, IEEE JOURNAL OF OCEANIC ENGINEERING, VOL. 26, NO. 4, OCTOBER 2001 4. Zhanqi DONG Nianying HU, A Method for the Detection of Long Pseudo-Random Code DSSS Signals Based on the Processing of Delay-Multiply (II) - The Estimation of the Information Symbol Period and the Pseudo-Random Code Sequence, 2008 11th IEEE international conference on communication technology proceedings 5. Muhammad Baqer Mollah, Md. Rashidul Islam, Comparative Analysis of Gold Codes with PN Codes 6. Using Correlation Property in CDMA Technology, 2012 International Conference on Computer Communication and Informatics (ICCCI -2012), Jan. 10 – 12, 2012, Coimbatore, INDIA 7. Christina P¨opper, Mario Strasser, Anti-Jamming Broadcast Communication using Uncoordinated Spread Spectrum Techniques, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 28, NO. 5, JUNE 2010 ISSN: 2278-7461 www.ijeijournal.com P a g e | 48