=Paper=
{{Paper
|id=Vol-3118/p06
|storemode=property
|title=FPGA Implementation of a BPSK Modulator with Frequency
Hopping
|pdfUrl=https://ceur-ws.org/Vol-3118/p06.pdf
|volume=Vol-3118
|authors=Francesco Beritelli,Giacomo Capizzi,Corrado Rametta,Christian Napoli
|dblpUrl=https://dblp.org/rec/conf/icyrime/BeritelliCRN21
}}
==FPGA Implementation of a BPSK Modulator with Frequency
Hopping==
FPGA Implementation of a BPSK Modulator with Frequency Hopping Francesco Beritellia , Giacomo Capizzia , Corrado Ramettab and Christian Napolib a Department of Electrical, Electronic and Computer Engineering, University of Catania, Viale A. Doria 6, 95125, Catania, Italy b Department of Computer, Control and Management Engineering, Sapienza University of Rome, Via Ariosto 25, 00135, Rome, Italy Abstract PSK modulations are very widespread in communication due to their robustness to the noise. In order to avoid interference or for anti-jamming purposes, frequency hopping may be applied. In this work we present an FPGA implementation of a BPSK modulator based on frequency hopping. The results shows good performance, more than 300 MHz of clock system, low area occupation and low power dissipation (about 100 mW). Keywords Frequency Hopping, DDS, BPSK, FPGA, Spread Spectrum, Anti-jamming 1. Introduction at regular intervals in a pseudo-random way through a pre-established code. Several modern applications make Phase-Shift Keying (PSK) modulations are the best known use of Frequency Hopping to avoid interference, among and most used numerical modulations in the field of com- them, the most known is the Bluetooth technology [8]. If munications. The information is encoded in the carrier several terminals transmit on the same carrier, collisions phase which assumes discrete values as a function of the are created. By applying Frequency Hopping according bits or sequence of bits to be transmitted. The signal to a certain law, this problem is avoided. Obviously only amplitude and frequency remain constant. Since the in- those who transmit and receive know the sequence of formation is coded in the phase, this type of modulation frequency jumps and where there should be interference has an excellent robustness towards amplitude errors in a given instant, it will be of short duration because of the received symbols [1, 2]. In modern applications at the next instant, the frequencies will most likely be there was the necessity to strengthen the communication different. With the diffusion of the IoT, secure commu- protocols mostly for avoiding interference both volun- nications will be always more required. Sensible data, tary (such as the case of jammers, very used in electronic locally processed by smart nodes equipped with machine warfare [3]) and involuntary (such as the transmission learning algorithms[9] (that nowadays find application in of several devices on the same frequency [4]). One of the always more fields [10],[11],[12],[13],[14],[15],[16] must most used technique useful to avoid these issues is the be transmitted over the internet in the safest way pos- Spread Spectrum [5]. The Spread Spectrum was initially sible In such a context, FPGAs can be a powerful and developed in the military field to avoid radio intercep- valuable ally for the de-centralization of computing as tions. Originally, any type of transmission that guaran- for example in [17]. teed a non-stationary spectrum was considered a spread The paper is structured as follows: Section 2 gives a spectrum. With the introduction of the Code Division brief introduction on PSK modulation, Section 2.1 gives Multiple Access (CDMA) [6], the spread spectrum is gen- some info about frequency hopping and its implemen- erated by multiplying the information by a code. Spread tation by using Digital Direct Synthesis, in Section 3 Spectrum can be also generated by using the frequency simulation and implementation results are shown, end, hopping technique, the so called Frequency-Hopping finally, in Section 4 some conclusion are discussed. Spread Spectrum (FHSS) [7]. As for CDMA, FHSS is a transmission technique used to increase the bandwidth of a signal. It consists in varying the transmission frequency 2. PSK Modulation ICYRIME 2021 @ International Conference of Yearly Reports on There are several types of PSK modulation. Among the Informatics Mathematics and Engineering, online, July 9, 2021 most used are: " francesco.beritelli@.unict.it (F. Beritelli); gcapizzi@diees.unict.it (G. Capizzi); rametta@diag.uniroma1.it (C. Rametta); • Binary phase-shift keying (BPSK): it associates cnapoli@diag.uniroma1.it (C. Napoli) the two binary digits 1 and 0 with two different 0000-0003-2555-9866 (G. Capizzi); 0000-0002-3336-5853 (C. Napoli) carrier phase values, such as 0° and 180°. © 2021 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). • Quadrature phase-shift keying (QPSK): in this CEUR Workshop Proceedings http://ceur-ws.org ISSN 1613-0073 CEUR Workshop Proceedings (CEUR-WS.org) case we have 4 equally spaced phases to represent 40 Francesco Beritelli et al. CEUR Workshop Proceedings 40–44 Figure 1: Time behavior of a BPSK modulation An easy way to generate the carrier is the use of a Digital Direct Synthesizer [18] based on a 2𝑁 locations memory where the samples for the wave generation are stored. The binary information, i.e. the shift phase, is given by adding an offset to the read-address. Offset 0 means 0° phase (bit 0), offset 2𝑁 −1 means 180° phase (bit 1). A simplified scheme of our system is depicted in Fig.2.1. In our experiments the number of bit N for the address has been set to 10, as consequence the number of memory locations is 1024. Also the number of bit of each memory word is N=10 bit, but in general these two parameter can be different. The tuning word is the input used to set the carrier frequency following the law: 𝑁 · 𝐹𝑐𝑙𝑘 𝐹𝑜𝑢𝑡 = (1) Figure 2: BPSK constellation 2𝑁 The input SEL is used to generate the binary informa- tion: SEL=0 → bit 0, SEL=1 → bit 1. 2 bits. • 8-PSK: similar to QPSK, but it uses 8 phases to represent 3 bit. 3. System simulation and FPGA Implementation In [7] the authors present a frequency hopping system based on Frequency Shift Key (FSK), in this work, we Before the implementation, the system has been simu- focused our attention on PSK modulation. In detail, we lated first in floating point and then in fixed point by implemented a BPSK modulatior but the developed sys- using Simulink. After the system simulation the system tem is suitable for any PSK modulation. Fig.2 depicts the has been coded in VHDL and implemented in a Xilinx time behavior of a BPSK modulation. The carrier phase Zynq 7020 FPGA. Fig.3 shows the exact correspondence (b) changes at varying of binary signal (a). between the simulink simulation and the Xilinx Vivado. In Fig.2, is instead shown the constellation of a BPSK. The Fig.3 shows the positive timing closure of the system with a clock period of 3 ns corresponding to 333 MHz. 2.1. Frequency Hopping with Digital About the power consumption, we did first an estima- Direct Synthesis (DDS) tion without considering the switching activity of the The aim of a frequency-hopping-based system is to jump circuit nodes (see Fig.3), and then we repeated the same to different frequencies. An example is depicted in Fig.2.1, estimation by using the value of switching activity pro- where are shown all 79 frequencies where a device Blue- vided by the simulation (see Fig.3). In the latter case, the tooth may work. value depends on the input test vectors. 41 Francesco Beritelli et al. CEUR Workshop Proceedings 40–44 Figure 3: Channel frequencies in Bluetooth communication resources utilization on FPGA. The synthesis results are shown in Fig.3 As can be seen, the resource utilization is very low. By increasing the value of N, the resource utilization will in- crease linearly with the exception of the memory used to store the wave samples that will increase exponentially. 4. Conclusion Figure 4: Developed System We propose the FPGA implementation of a BPSK modula- tor based on frequency hopping. The system can be used both for anti-jamming applications or to avoid collision when two devices transmit on the same carrier. The sys- tem has been tested with a clock frequency of 333 MHz on a Xilinx Zynq 7020 device. The system makes use of a very limited number of hardware resources with a power dissipation of 120 mW. Acknowledgments This work has been supported by the project “Green- TAGS” funded by the Italian Ministry of University and Research within the PRIN founding scheme 2017 (CUP B88D19003660001). References Figure 5: Correspondence between Simulink and Vivado sim- ulations [1] S. Q. Hadi, P. Ehkan, M. S. Anuar, S. A. Dawood, Per- formance comparison of stbc-ft based ofdm wireless communication system using m-qam and m-psk modulation techniques, in: 2016 3rd International In both cases the estimated power is similar and is 147 Conference on Electronic Design (ICED), 2016, pp. mW for vectorless estimation and 120 mW for vector- 174–179. doi:10.1109/ICED.2016.7804631. based estimation. [2] S. N. Ramlan, R. Mohamad, N. Arbain, Imple- The last aspect of the system implementation is the mentation of m-ary phase shift keying (psk) base- 42 Francesco Beritelli et al. CEUR Workshop Proceedings 40–44 Figure 6: System time closure results doi:10.1109/ICCAIE.2011.6162210. [3] P. Zhang, Y. Huang, Z. Jin, A new electronic jam- ming method inspried from bionics system, in: 2020 IEEE 5th International Conference on Signal and Image Processing (ICSIP), 2020, pp. 572–576. doi:10.1109/ICSIP49896.2020.9339414. [4] G. M. Bianco, R. Giuliano, G. Marrocco, F. Mazzenga, A. Mejia-Aguilar, Lora system for search and res- cue: Path-loss models and procedures in mountain Figure 7: Vectorless power estimation scenarios, IEEE Internet of Things Journal 8 (2020) 1985–1999. [5] P. Duraisamy, L. Nguyen, Performance of self- encoded spread spectrum under pulsed-noise jam- ming, in: 2010 IEEE 11th International Sympo- sium on Spread Spectrum Techniques and Appli- cations, 2010, pp. 170–174. doi:10.1109/ISSSTA. 2010.5649468. [6] L. L. Hanzo, L.-L. Yang, E.-L. Kuan, K. Yen, CDMA Overview, 2004, pp. 35–80. doi:10.1002/ 0470863110.ch2. Figure 8: Power estimation by considering the switching [7] G. Bouzid, H. Trabelsi, Z. Elabed, M. Masmoudi, activity Fpga implementation of fhss-fsk modulator, in: 2008 3rd International Conference on Design and Technology of Integrated Systems in Nanoscale Era, 2008, pp. 1–5. doi:10.1109/DTIS.2008. 4540261. [8] J. Marcel, How Bluetooth Technology Uses Adaptive Frequency Hopping to Overcome Packet Interference, Technical Report, Bluetooth SIG, 2020. URL: https://www.bluetooth.com/blog/ how-bluetooth-technology-uses-adaptive\ -frequency-hopping-to-overcome-packet\ -interference. Figure 9: Resource utilization [9] S. Russo, S. Illari, R. Avanzato, C. Napoli, Reducing the psychological burden of isolated oncological patients by means of decision trees, volume 2768, band modem on texas instrument digital signal 2020, p. 46 – 53. processor tms320c6713, in: 2011 IEEE Interna- [10] F. Bonanno, G. Capizzi, G. L. Sciuto, A neuro tional Conference on Computer Applications and wavelet-based approach for short-term load fore- Industrial Electronics (ICCAIE), 2011, pp. 627–632. casting in integrated generation systems, in: 2013 International Conference on Clean Electrical Power 43 Francesco Beritelli et al. CEUR Workshop Proceedings 40–44 (ICCEP), IEEE, 2013, pp. 772–776. [11] R. Avanzato, F. Beritelli, M. Russo, S. Russo, M. Vac- caro, Yolov3-based mask and face recognition al- gorithm for individual protection applications, vol- ume 2768, 2020, p. 41 – 45. [12] C. Napoli, F. Bonanno, G. Capizzi, Exploiting solar wind time series correlation with magnetospheric response by using an hybrid neuro-wavelet ap- proach, Proceedings of the International astronom- ical union 6 (2010) 156–158. [13] A. Simonetta, M. C. Paoletti, M. Muratore, A new approach for designing of computer architectures using multi-value logic, Inter- national Journal on Advanced Science, Engi- neering and Information Technology 11 (2021) 1440–1446. URL: http://ijaseit.insightsociety. org/index.php?option=com_content&view= article&id=9&Itemid=1&article_id=15778. doi:10.18517/ijaseit.11.4.15778. [14] G. De Magistris, S. Russo, P. Roma, J. Starczewski, C. Napoli, An explainable fake news detector based on named entity recognition and stance classifica- tion applied to covid-19, Information (Switzerland) 13 (2022). doi:10.3390/info13030137. [15] C. Napoli, G. Pappalardo, E. Tramontana, An agent- driven semantical identifier using radial basis neu- ral networks and reinforcement learning, volume 1260, 2014. [16] C. Pasquarella, et al., Microbial environmental con- tamination in italian dental clinics: A multicenter study yielding recommendations for standardized sampling methods and threshold values, Science of the total environment 420 (2012) 289–299. [17] F. Fallucchi, M. Gerardi, M. Petito, E. W. D. Luca, Blockchain framework in digital government for the certification of authenticity, timestamping and data property, in: Proceedings of the 54th Hawaii International Conference on System Sciences | 2021, University of Hawai’i at Manoa, Honolulu, HI, 2021, pp. 2307–2316. doi:10.24251/HICSS.2021.282, http://hdl.handle.net/10125/70895. [18] I. V. Strelnikov, I. V. Ryabov, E. S. Klyuzhev, Di- rect digital synthesizer of phase-manipulated sig- nals, based on the direct digital synthesis method, in: 2020 Systems of Signal Synchronization, Gen- erating and Processing in Telecommunications (SYNCHROINFO), 2020, pp. 1–3. doi:10.1109/ SYNCHROINFO49631.2020.9166040. 44