IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, July 2014, Pg. 402-407

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Implementation of Two-Level FH-CDMA with Non-Orthogonal Sequences for High Data Rate and Security D.Venkata Reddy, K.KarunaKumari, Dr. R. Ramana Reddy 1

2

M.Tech, ECE, GITAM University, Vizag, [email protected] Associate Professor, ECE, GITAM University, Vizag, India, [email protected] 3 Professor, ECE, MVGR, Vizag, India, [email protected]

Abstract--- In normal FH-CDMA scheme, the lengths and weights of the modulation codes and FH-patterns must be same, restricting the choice of modulation codes and FH-patterns to use. In order to overcome that problem and to get higher data rate and more spectral efficiency than normal FH-CDMA scheme “Two-level Frequency Hopping Code-Division Multiple Access scheme using non-orthogonal sequences was implemented, in which prime sequence/Reed-Solomon codes are modulated on the top of a FH-CDMA for supporting high date rates than conventional orthogonal MFSK/FH-CDMA scheme. The performance and spectral efficiency of Two-level FH-CDMA scheme with non-orthogonal sequences are analysed.The performance analysis showed that two level prime/FH-CDMA scheme increased the number of possible users and exhibited high data rate and more spectral efficiency than MFSK/FH-CDMA. It gives more flexibility in the design of FH-CDMA. In Two-Level FH-CDMA system, the weight and length of the modulation codes and FH-pattern sequence need not to be same but the length of the frequency hopping pattern must be less than or equal to the length of the modulation codes. Key words-- Galois field, FH-CDMA, Hard-limiting, de-hopping, Q-function, Alarm probability, prime codes

1. Introduction The Frequency Hopping code division multiple access (FH-CDMA) gives high data and security to the data by assigning one hit FH pattern to each user. In the frequency hopping code division multiple access (FH-CDMA) the narrow band signal is transmitted over a wider bandwidth for reducing the problems of multiple channel interference and multiple channel interference by assigning unique Frequency hopping pattern to each user. In Two levels FH CDMA, the data rate is increased by transmitting non-orthogonal sequences instead of data bits but in MFSK/FH-CDMA, the data rate is increased by transmitting symbols instead of data bits. In Two-level FH-CDMA scheme, the prime codes are used for generating the modulation codes and frequency hopping patterns for transmitting sequences instead of data bits. In Two-level FH-CDMA scheme, the length and weights of the modulation codes and frequency patterns need not to be same but in MFSK/FH-CDMA scheme the length and weights of the modulation codes and frequency hopping patterns must be same.so, In Two-level FHCDMA there is more flexibility in selection of modulation codes and frequency hopping patterns when compared with MFSK/FH-CDMA scheme. By assigning unique FH pattern to each user, channel capacity is also increased when compared with conventional MFSK/FH-CDMA. The prime/FH-CDMA or RS/FH-CDMA schemes supported high data rare when compare to MFSK/FH-CDMA. In this scheme, “one-hit “FH pattern was designed in order to reduce the multiple access interference (MAI). In MFSK/FH-CDMA and prime/FH-CDMA or RS/FH-CDMA schemes, the lengths and weights of the modulation codes and FH patterns need to be same, restricting the choice of modulation codes a. But in two- level FH-CDMA do not need to have the same lengths and weights of the modulation codes and FH-patterns. The only requirement is that the weight of the FH-pattern must be equal to the length of the modulation codes because each element of the modulation codes is to be conveyed by an element of FH-pattern. Therefore two-level FH-CDMA is more flexible in the selection of modulation codes and FH patterns when compare to MFSK/FH-CMDA and prime/FH-CDMA or RS/FH-CDMA schemes. In this paper, the performance of the two-level FH-CDMA over Additive Gaussian noise (AWGN) is analysed algebraically. While previous analyses used a constant β0 in the analysis of FH-CDMA over additive White Gaussian Noise (AWGN) channels. The comparison of FH-CDMA and MFSK/FH-CDMA in terms of performance and spectral efficiency is proved mathematically.

D.Venkata Reddy ,IJRIT

402

IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, July 2014, Pg. 402-407

2. FH- CDMA Scheme Description Conventional frequency hopped(FH) CDMA is a digital multiple access system in which individual users select one of Q frequencies with in a wideband channel as carrier frequency. The pseudorandom changes of the carrier frequencies randomize the occupancy of a specific band at any given time, thereby allowing for multiple accesses over a wide range of frequencies. In a conventional FH-CDMA system, the total hopping bandwidth W is divided into Q narrow bands each of bandwidth B, where B=W/Q. Each of the Q bands is defined as a spectral region with a central frequency called the carrier frequency. The set of all possible carrier frequencies is called “hop-set.” The bandwidth B of a band used in a hop set is called the instantaneous bandwidth. The bandwidth of the spectrum W over which the hopping occurs is called total hopping bandwidth. Information is sent by hopping the carrier frequency according to the pseudorandom law, which is known to the desired receiver. In each hop, a small set of code symbols is sent with conventional narrow band modulation before the carrier frequency hops again. The time duration between hops is called hop duration or hopping period and it is denoted by the time duration between transmissions of two consecutive symbols is T.

Fig 1: uplink transmission of FH-CDMA Usually in FH-CDMA frequency shift keying (FSK) is used. If in FH-CDMA system q-FSK is used, then each of the Q bands is divided into q sub-bands and during each hop one or several of the carrier frequencies of the sub-band with in the band can be sent. We shall also call each frequencies of the sub-bands within the bands can be sent. We will also call each frequency sub-band the transmission channel. We denote the total number of Qq of transmission channels by M. if binary FSK is used, M=2Q and the pair of passible instantaneous frequencies changes with each hop. At the receiver side, after the frequency hopping has been removed from the received signal, the resulting signal is said to be de-hopped. Before demodulation, the dehopped signal is applied to a conventional receiver. If another transmit in the same band at the same time in a FH-CDMA system, a collision can occur. Frequency hopping can be classified as slow or fast. Slow frequency hopping occurs if one or more q-aryl symbols are transmitted in the interval between frequency hops. Thus slow frequency hopping implies that the symbol rate 1/T exceeds the hopping rate 1/Tc. Fast frequency hopping occurs if there is more than one frequency hop during one symbol transmission time. If other users occupied the same band in the same time, the probability of incorrect transmission of the corresponding information symbols would become high. Therefore, it is advisable to combine frequency hopping with interleaving and coding.

3. Two-Level FH-CDMA Scheme Description In our two level FH-CDMA scheme, the transmission bandwidth is into H frequencies bands with M carrier frequencies in each band giving a total of M × H frequency carriers. The serial data bits are grouped together into symbols. The symbols in turn represented by a sequence of modulation codes of dimension M*L in first level of FH-CDMA scheme where M gives the number of carrier frequencies and L gives the number of time slots or code length Table 1: Twenty five (4 × 5, 4, 0, 1) primes sequences organized into four Groups

D.Venkata Reddy ,IJRIT

I2

Group 1 I1=0

Group 2 I1=1

Group 3 I1=2

Group 3 I1=3

Group 4 I1=4

0 1 2

0000X 1111X 2222X

0123X 123X0 23X01

02X13 1320X 2X130

O31X2 1X203 203X1

0X321 10X32 21X03

3 4

3333X 4444X

3X012 X0123

302X1 X1302

31X20 X2031

3210X X3210

403

IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, July 2014, Pg. 402-407 The number of data bits per symbol is depends on the number of available modulation codes. If there are φ m modulation codes, log ( φ m ) data bits are represented by each symbol. In second level of FH-CDMA scheme, each user is assigned by a FH pattern of dimension L × H where L represent the number of frequency band and H represents the time slot or pattern length. The elements in the modulation codes and FH pattern are present the carrier frequencies of the final FH-CDMA. The element of the modulation code represents the carrier frequency used in a particular frequency band and in time slot, an element of FH pattern represents the particular frequency band to be used. Prime codes are used as a modulation codes to illustrate the main concept of two levels FH CDMA scheme. The prime sequences are constructed in Galois field GF (p), where p represents the prime number. Galois field is a finite field. The prime sequences is given by ,  2 ⊕p ( 1 ⊗p l) where

i

i

l

th

element gives the

frequency in the lthposition.

Fig.2. Encoding process of two-level FH-CDMA with three As a result the construction algorithm gives 25 prime sequences of weight w=4 and length l=5 with λ=1. The table shows twenty four (4 × 5, 4, 0, 1) prime sequences where “x” denotes the drop of fifth element in order to have the modulation code weight of four. Using this prime sequences as modulation codes we can support twenty four symbols and each symbol represents four data bits of a particular user and also use (5 × 7,5,0,1) prime sequences as the one-hit FH-patterns. In the above figure, the shaded portion represents the frequencies bands and each frequency is contained four carrier frequencies. Each user transmits the symbol in particular carrier frequency by selecting particular frequency band. Let one –hit FH-pattern of three users at one time instant are H1=(0,2,4, x,1,3,x),H2=(0,4,1,x,2,x,3),and H3=(3,1,x,4,2,0,x). if the data symbols of three user are ”3”, “12” and “6”,then modulation codes S3,0 =(0,3,1,x,2), S2,2=(2,x,1,3,0) and S1,1=(1,2,3,x,0) is chosen for each user, where each column of S matrix represent the particular time slot of the user and reach row the carrier frequency used by the user. In fig.2, each frequency band contains four carrier frequencies. the carrier frequency used in ea is determined by super imposing all w=4 elements of SK on top of the first w non-“x” elements of Hk and the “x” elements of Sk produces non empty frequency bands in the final two-level FH-CDMA signal, where k=(1,2,3) i.e. number of users used to transmit the data. The shaded portion in transmission matrix Tk=(Tk,0,Tk,1,…..Tk,,i)=Sk ∆ (M × Hk), where Tk,I represent the carrier frequency used in the time slot and ∆ denotes the superimpose operation. The two level FH-CDMA signal of the first user is found to be T1=(0+0.4,3+2.4,1+4.4,x,x,2+3.4,x)=(0,11,17,x,x,14,x) after superimposing. Similarly , the other two simultaneous users have T2=(2,x,5,x,11,x12) and T3=(13,6,x,19,x,,0,x). In the receiver, the received matrix R is first hard-limited and the dehopped by user 1’s FH-pattern H1 to give a de-hopped signal R1

D.Venkata Reddy ,IJRIT

404

IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, July 2014, Pg. 402-407

Received matrices R1

Of dimension 4 × 5. The role of the de-hopping process simply brings the frequency bands in each time slot of R back to the baseband, according to the frequency bands specified by H1. The elements of R1 are compared with the elements of all modulation codes in use. The modulation code with the minimum distance from the shaded slots of R1 is chosen as the recovered symbol.

4. Performance Analysis In FH-CDMA systems, MAI depends on the cross-correlation values of FH-patterns. In Two-level FH-CDMA scheme, this cross correlation values of the modulation codes impose additional symbol interference and need to be considered. Assume that one-hit FH patterns of dimension L × H are used and the bandwidth is divided into M × H frequencies in which M frequencies are used to carry the modulation codes of weight w. The probability that a frequency of an interfere hits with one of w Frequencies of the desired user is given by Q= w/ (M × H × L)

(1)

The false alarm probability is the probability that a tone is detected in a receiver when none has been actually transmitted and it is given by

p

2

f

= exp( − β / 2)

(2)

The deletion probability is the probability that a receiver missed a transmission tone. For an AWGN channel, the deletion probability is given as

p Where

β

0

d

= 1 − Q( ( E b

N0

. × (k b )), β ) w 0

(3)

denotes the actual threshold divided by root-mean squared receiver noise, kb is the number of bits per symbol. Q

(a, b) is Marcum’s Q-function. To compare our partitioned two level FH-CDMA and Good-man’s MFSK/FH-CDMA schemes, SE=

k

b

ML

×k

(4)

is another figure of merits, which considers the number of bits per symbol, number of time slots L as a whole for a given performance our goal is to get SE as large as possible for better system efficiency or utilization Consider a situation where a customer Alice would like to purchase a laptop from a computer shop owned by Bob. For this purpose, Alice and Bob can first exchange their ambiguous signatures via the Internet as follows. As the initial signer, Alice first chooses a keystone, and signs her payment instruction ambiguously to pay Bob the price of a laptop. Upon receiving Alice’s signature, Bob as the matching signer agrees this order by signing a receipt ambiguously that authorizes Alice to pick one up from Bob’s shop. D.Venkata Reddy ,IJRIT

405

IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, July 2014, Pg. 402-407 However, to get the laptop from the shop physically, Alice has to show both Bob’s signature and the keystone, because Bob’s ambiguous signature alone can be forged by Alice easily. But the point is that once the keystone is released, both of the two ambiguous signatures become binding concurrently to Alice and Bob respectively.

5. Simulation result

After performing BPSK, modulation we had performed two times frequency hopping. By performing the multiple frequencies hopping the signal is spreads in the spectral spectrum with respect to signal

In Two-level FH-CDMA, three users transmitted three symbols, which are again represented with different modulation codes S1=(0,3,1,x,2) , S2=(2,x,1,3,0) and S3=(1,2,3,x,0) and FH-patterns H1=(0,2,4,x,1,3,x), H2=(0,4,1,x,2,x,3) and H3=(3,1,x,4,2,0,x)is taken for three users in FH-CDMA . By performing both Modulation Technique and hopping techniques for the users,the transmitted matrix of three users is determined as follows

D.Venkata Reddy ,IJRIT

406

IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, July 2014, Pg. 402-407

Table 2: Transmission matrix The received matrix of three user after performing deletion probability and hard-limiting the received matrix can be given as

Table 3: Received matrix

6. Conclusion In this paper, we proposed basic FH-CDMA and Two levels FH-CDMA. The prime/FH-CDMA and RS/FH-CDMA schemes were special cases of our scheme. In summary, the new scheme offered more flexibility in the design of FH-CDMA system to meet different operating requirement. To strengthen the ambiguity of concurrent signatures, two perfect concurrent signatures are proposed. This paper successfully identified an attack against those two perfect concurrent signatures showing that both of those two schemes are actually not concurrent signatures. Consequently, those two schemes are unfair in fact. To avoid this attack, we presented effective improvements to achieve truly perfect concurrent signatures.

7. References [1]. Y.R Tsai and J.F Chang, “frequency hopping technique to combat multipath interference in a multi-accessing environment.” IEEE Trance. Technical. vol. 43, no.2, pp211-222, May 1994. [2]. G. Kaleh, “Frequency-diversity spread spectrum communication system to counter band limited Gaussian interference,” IEEE Trans. Commu., vol. 44, no. 7, pp. 886-893, July 1996. [3] J.-Z Wang and L. B. Milstein. “CDMA overlay situations for micro- cellular mobile communications,” IEEE Trans. Commun., vol.c43, no. 2/3/4 pp. 603-614, Feb./Mar/Apr. 1995. [4] J.Z. Wang and J. Chen, “performance of CDMA systems with complex spreading and imperfect channel estimation,” IEEE J. Sel. Areas Commun., vol.19, no. 1, pp. 152-163, Jan. 2001. [5] D. J. Goodman, P. S. Henry, and V.K. prabhu, “Frequency-hopping multilevel FSK for mobile radio,” Bell Syst. Tech. J., vol. 59, no. 7, pp. 1257-1275, Sep. 1980. [6] G Einarsson, “Address assignment for a time-frequency, coded spread spectrum system,” Bell Syst. Tech. J., vol. 59, no. 7, pp. 1241-1255, Sep. 1980. [7] S.B. Wicker and V.K. Bhargava (eds.), Reed-Solomon Codes and their Applications. Willey-IEEE, 1999. [8] G.C Yang and W.C. Kwong, Prime codes with application to CDMA Optical and Wireless Networks. Norwood, MA: Artech House, 2002.\ [9] .Y.Chang, C.-C. Wang.G.-C. Yang, M.F...Lin, Y-S LIU AND W.C Kwong, “] Frequency Hooping CDMA Wireless Communication Systems Using Prime codes,” in p.roc. IEEE 63rd veh.technical.conf., pp.1753-1757, May 2006. [10] M. -F. Lin G.-C Yang C.-Y Chang, Y.-S. Liu, and W.C Kwong,”Frequency Hopping CDMA with Reed-Solomon code sequences in wireless communications,” IEEE Trans. Commun., vol. 55, no. 11, pp.2052-2055, Nov.2007. D.Venkata Reddy ,IJRIT

407

Implementation of Two-Level FH-CDMA with Non-Orthogonal ...

Implementation of Two-Level FH-CDMA with Non-Orthogonal. Sequences for High Data Rate and Security. D.Venkata Reddy, K.KarunaKumari, Dr. R. Ramana Reddy. 1M.Tech, ECE, GITAM University, Vizag, [email protected]. 2Associate Professor, ECE, GITAM University, Vizag, India, koyya.karuna@gmail.com.

1MB Sizes 1 Downloads 267 Views

Recommend Documents

Implementation of chaotic cryptography with chaotic ...
FIG. 1. An illustration of generating the keys from a master- slave type of a .... 12 Public-Key Cryptography: State of the Art and Future Direc- tions, edited by Th.

Design and implementation of I2C with Bist ...
and implementation of Inter-Integrated Circuit (I2C) protocol with self-testing ability. ... Most available I2C devices operate at a speed of 400kbps. .... FPGA Based Interface Model for Scale- Free Network using I2C Bus Protocol on Quartus II 6.0 ..

Implementation of Multicast Key Distribution with ...
sensors etc., in multicast group communication, all the authorized members share a session key, which will be changed dynamically to ensure forward and ... perform well as the new technology has a very long delay network path and possible link distri

Implementation of Two-Level FH-CDMA with Non ...
The Frequency Hopping code division multiple access (FH-CDMA) gives high data and security to the data by assigning one hit FH pattern to ... by transmitting non-orthogonal sequences instead of data bits but in MFSK/FH-CDMA, the data rate is increase

Design and Implementation of MPICH2 over InfiniBand with RDMA ...
from Intel Corporation, and National Science Foundation's grants #CCR-. 0204429 and ... the best of our knowledge, this is the first high performance design and implementation of ... data and the receive queue holds instructions that describe.

IMPLEMENTATION OF MIS Implementation of MIS ... -
space occupied by computers, terminals, printers, etc., as also by people and their movement. ... These classes are not necessarily exclusive, as they quite often.

Implementation of a three-phase inverter with ... - Workrooms Journal
Abstract— In the context of power loads a wind turbine based on a BLDC motor will be programmed ... will simulate the behaviour of a wind turbine using the given input data. ... control strategies on smart grids powered by renewable energies.

Design & Implementation of Adaptive NLMS Filter with ...
developed based on Linear Programming, Quadratic Programming and Heuristic methods in Artificial Intelligence. Remez. Exchange Algorithm(to design equiripple filter) and linear Programming (to design adaptive filter) are optimum in the sense that the

Robust Virtual Implementation with Incomplete ...
†Department of Economics, the University of Melbourne, Australia; .... 5We thank Stephen Morris for suggesting this name, which replaces our previous ..... and Morris (2007) the domain of the SCFs is not the true type space, but the payoff type.

Implementation of Recommendations.PDF
keywords: equine dentistry, dentistry disease, equine. 1. INTRODUÇÃO ... PDF. Implementation of Recommendations.PDF. Open. Extract. Open with. Sign In.

LEARNING COMMONS, STAGES OF IMPLEMENTATION
Apr 12, 2016 - How will individuals with pedagogical, content and technological .... Educational Technologies: Does the school technology plan support a ...

Implementation of IREM.PDF
No. t22l NEW DDLHI'THURSDAY, MARCH 8' 20I8/PHALGUNA l7,lr39. tdr{{rdc. @*t). qBqfdr. Etffi, gqr{, zotg. qnfttf.37m18. qr.m.R. ZtO 1e1.+ftam + 3r-f-*E 309 + qrq.6 artl TEiiT erRr,qi 6r e-fr{T +tt gq, trFcfr qil6m t{. *+r 1*ftft-a *aa1 fr{q, 2016 t ftq

Implementation of recommendations - Abolition of Allowance.PDF ...
Page 1 of 1. Implementation of recommendations - Abolition of Allowance.PDF. Implementation of recommendations - Abolition of Allowance.PDF. Open. Extract.

Implementation of recommendations of Seventh Central Pay ...
Indian NationalTrade Union Congress (INTUC). lnternational Transport Workers' Federation (lTF). No. V5(g)/PartVI. The Member Stafl. Railway Board,. New Delhi. Dear Sir. Sub:. Implementation of recommendations of Seventh Central Pay Commission accepte

Implementation with Near-Complete Information Kim ...
Mar 2, 2007 - Kim-Sau Chung; Jeffrey C. Ely. Econometrica, Vol. 71, No. 3. (May, 2003), pp. ... CO%3B2-O. Econometrica is currently published by The ...

Implementation of negotiated settlement.PDF
SLP/Review Petitions by the Apex Court. Copies of relevant communications of NFIR were also. handed over to CRB personally. In the light of above facts, the reply of Railway Board to NFIR vide letter dated. 1611112017 isvery unfortunate. NFIR therefo

Requirements and Implementation of Risk ...
Software Project, Risk management, Software Tool, Effort, Risk, Budget ... Sales risk – building a product that the sales force doesn't understand how to sell.

A Hardware Implementation of POET -
and LT , dedicated registers have been con- sidered to store the corresponding values. The design supports only the message blocks with a size of a factor of 128 bits (16 bytes). The user can set the secret key SK, with which the other constants are

Implementation of Vth CPC.PDF
NFIR, therefore, urges upon the Railway Board to extend the scheme beyond ... Implementation of Vth CPC.PDF. Implementation of Vth CPC.PDF. Open. Extract.

Implementation and Experimental Results of ...
GNU Radio is an open source software development toolkit that provides the ... increasing α, we shall see that the geometry of the modulation constellation ...

Implementation of CVMP guideline on environmental impact ...
18 Jan 2018 - 30 Churchill Place ○ Canary Wharf ○ London E14 5EU ○ United Kingdom. An agency of the European Union. Telephone +44 (0)20 3660 6000 Facsimile +44 (0)20 3660 5555. Send a question via our website www.ema.europa.eu/contact. © Europ