SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Data and Computer
Communications
Chapter 9 – Spread Spectrum
Spread Spectrum
 important encoding method for

wireless

communications
 analog & digital data with analog signal
 spreads data over wide bandwidth
 makes jamming and interception harder
 two approaches, both in use:



Frequency Hopping
Direct Sequence
General Model of Spread
Spectrum System
Spread Spectrum Advantages
 immunity from

noise and multipath

distortion
 can hide / encrypt signals
 several users can share same higher
bandwidth with little interference


CDM/CDMA Mobile telephones
Pseudorandom Numbers
 generated by a deterministic algorithm



not actually random
but if algorithm good, results pass reasonable
tests of randomness

 starting from an initial seed
 need to know algorithm

and seed to

predict sequence
 hence only receiver can decode signal
Frequency Hopping Spread
Spectrum (FHSS)
 signal is broadcast over seemingly

random series of frequencies
 receiver hops between frequencies in sync
with transmitter
 eavesdroppers hear unintelligible blips
 jamming on one frequency affects only a
few bits
Frequency Hopping Example
FHSS (Transmitter)
Frequency Hopping Spread
Spectrum System (Receiver)
Slow and Fast FHSS
 commonly use multiple FSK (MFSK)
 have frequency shifted every T c
 duration of signal element is T s
 Slow FHSS has Tc

seconds

≥ Ts

 Fast FHSS has Tc

seconds

< Ts

 FHSS quite resistant to noise or jamming


with fast FHSS giving better performance
Slow MFSK FHSS
Fast MFSK FHSS
Direct Sequence Spread
Spectrum (DSSS)
 each bit is represented by

multiple bits

using a spreading code
 this spreads signal across a wider
frequency band
 has performance similar to FHSS
Direct Sequence Spread
Spectrum Example
Direct Sequence Spread
Spectrum System
DSSS Example Using BPSK
Approximate
Spectrum of
DSSS Signal
Code Division Multiple
Access (CDMA)
 a multiplexing

technique used with spread

spectrum
 given a data signal rate D
 break each bit into k chips according to a
fixed chipping code specific to each user
 resulting new channel has chip data rate
kD chips per second
 can have multiple channels superimposed
CDMA Example
CDMA for DSSS
Problem
# Consider the seven-channel CDMA shown in
the following figure. Enlist the user code for
each channel. A positive sum is decoded (at
the receiver) as ‘1’ and a negative sum is
decoded as ‘0’. If all the channels are
transmitting as shown, determine whether the
receiver detects the correct bit of channel 1.
Problem
Orthogonal Sequence
Sequence is generated by Walsh Table:
W1 = [+1]
W2 = W1
W1

W1
!W1

W4 = W2 W2
W2 !W2
Summary
 looked at use of spread spectrum

techniques:
 FHSS
 DSSS
 CDMA

Weitere ähnliche Inhalte

Was ist angesagt?

Small scale fading
Small scale fadingSmall scale fading
Small scale fadingAJAL A J
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniquesKaushal Kabra
 
Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)Keerthana Nambiar
 
Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)Ahmad Gomaa
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
 
Multiplexing
MultiplexingMultiplexing
Multiplexingstooty s
 
Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)ashishsoni1505
 
9. parameters of mobile multipath channels
9. parameters of mobile multipath channels9. parameters of mobile multipath channels
9. parameters of mobile multipath channelsJAIGANESH SEKAR
 
Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategiesAJAL A J
 
Large scale path loss 1
Large scale path loss 1Large scale path loss 1
Large scale path loss 1Vrince Vimal
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksPradeep Kumar TS
 

Was ist angesagt? (20)

Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
OFDM
OFDMOFDM
OFDM
 
Radio propagation
Radio propagationRadio propagation
Radio propagation
 
Mimo [new]
Mimo [new]Mimo [new]
Mimo [new]
 
Small scale fading
Small scale fadingSmall scale fading
Small scale fading
 
spread spectrum
spread spectrumspread spectrum
spread spectrum
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniques
 
Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)
 
Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
orthogonal frequency division multiplexing(OFDM)
orthogonal frequency division multiplexing(OFDM)orthogonal frequency division multiplexing(OFDM)
orthogonal frequency division multiplexing(OFDM)
 
Multiplexing : FDM
Multiplexing : FDMMultiplexing : FDM
Multiplexing : FDM
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)
 
9. parameters of mobile multipath channels
9. parameters of mobile multipath channels9. parameters of mobile multipath channels
9. parameters of mobile multipath channels
 
Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategies
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
Large scale path loss 1
Large scale path loss 1Large scale path loss 1
Large scale path loss 1
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networks
 

Andere mochten auch

Määramatus 4
Määramatus 4Määramatus 4
Määramatus 4aivarorav
 
Consumer Basics for Renewable Energy
Consumer Basics for Renewable EnergyConsumer Basics for Renewable Energy
Consumer Basics for Renewable EnergyRockyViewCounty
 
Imaginary Boundary - KIBO
Imaginary Boundary - KIBOImaginary Boundary - KIBO
Imaginary Boundary - KIBONuno Marçal
 
GS1/Oliot ALE and Next
GS1/Oliot ALE and NextGS1/Oliot ALE and Next
GS1/Oliot ALE and NextDaeyoung Kim
 
TIGA Guide to Investment For London Game Start-ups
TIGA Guide to Investment For London Game Start-upsTIGA Guide to Investment For London Game Start-ups
TIGA Guide to Investment For London Game Start-upsJohn Spindler
 
Docker for Fun and Profit, Devoxx 2014
Docker for Fun and Profit, Devoxx 2014Docker for Fun and Profit, Devoxx 2014
Docker for Fun and Profit, Devoxx 2014Carl Quinn
 
грамоты
грамотыграмоты
грамотыkillaruns
 
203385937 o-net-54-ปีการศึกษา-2553
203385937 o-net-54-ปีการศึกษา-2553203385937 o-net-54-ปีการศึกษา-2553
203385937 o-net-54-ปีการศึกษา-2553apichaya413
 
план урока
план урокаплан урока
план урокаkillaruns
 
Goldplated Tabletops(Premium Products) - 1
Goldplated Tabletops(Premium Products) - 1Goldplated Tabletops(Premium Products) - 1
Goldplated Tabletops(Premium Products) - 1Avik Enterprises
 
мы разные
мы разныемы разные
мы разныеkillaruns
 
Els amics sempre s'ajuden
Els amics sempre s'ajudenEls amics sempre s'ajuden
Els amics sempre s'ajudencarmeo
 
Branding amilia astrom - the riverstream
Branding   amilia astrom - the riverstreamBranding   amilia astrom - the riverstream
Branding amilia astrom - the riverstreamemilia åström
 
Informe historia medica
Informe historia medicaInforme historia medica
Informe historia medicaangiedaiana
 

Andere mochten auch (20)

Evaluation question 1 honica
Evaluation question 1 honicaEvaluation question 1 honica
Evaluation question 1 honica
 
Määramatus 4
Määramatus 4Määramatus 4
Määramatus 4
 
Consumer Basics for Renewable Energy
Consumer Basics for Renewable EnergyConsumer Basics for Renewable Energy
Consumer Basics for Renewable Energy
 
Teamwork
TeamworkTeamwork
Teamwork
 
Imaginary Boundary - KIBO
Imaginary Boundary - KIBOImaginary Boundary - KIBO
Imaginary Boundary - KIBO
 
Ucsf 4 2
Ucsf 4 2Ucsf 4 2
Ucsf 4 2
 
Unaico ofc
Unaico ofcUnaico ofc
Unaico ofc
 
GS1/Oliot ALE and Next
GS1/Oliot ALE and NextGS1/Oliot ALE and Next
GS1/Oliot ALE and Next
 
Basic concept of q c
Basic concept of q cBasic concept of q c
Basic concept of q c
 
TIGA Guide to Investment For London Game Start-ups
TIGA Guide to Investment For London Game Start-upsTIGA Guide to Investment For London Game Start-ups
TIGA Guide to Investment For London Game Start-ups
 
Docker for Fun and Profit, Devoxx 2014
Docker for Fun and Profit, Devoxx 2014Docker for Fun and Profit, Devoxx 2014
Docker for Fun and Profit, Devoxx 2014
 
грамоты
грамотыграмоты
грамоты
 
203385937 o-net-54-ปีการศึกษา-2553
203385937 o-net-54-ปีการศึกษา-2553203385937 o-net-54-ปีการศึกษา-2553
203385937 o-net-54-ปีการศึกษา-2553
 
план урока
план урокаплан урока
план урока
 
Goldplated Tabletops(Premium Products) - 1
Goldplated Tabletops(Premium Products) - 1Goldplated Tabletops(Premium Products) - 1
Goldplated Tabletops(Premium Products) - 1
 
мы разные
мы разныемы разные
мы разные
 
Els amics sempre s'ajuden
Els amics sempre s'ajudenEls amics sempre s'ajuden
Els amics sempre s'ajuden
 
Branding amilia astrom - the riverstream
Branding   amilia astrom - the riverstreamBranding   amilia astrom - the riverstream
Branding amilia astrom - the riverstream
 
Informe historia medica
Informe historia medicaInforme historia medica
Informe historia medica
 
60538
6053860538
60538
 

Ähnlich wie 09 spread spectrum (20)

09-SpreadSpectrum.ppt
09-SpreadSpectrum.ppt09-SpreadSpectrum.ppt
09-SpreadSpectrum.ppt
 
09 spread spectrum
09 spread spectrum09 spread spectrum
09 spread spectrum
 
8 spread spectrum
8 spread spectrum8 spread spectrum
8 spread spectrum
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
EC6651 COMMUNICATION ENGINEERING UNIT 4
EC6651 COMMUNICATION ENGINEERING UNIT 4EC6651 COMMUNICATION ENGINEERING UNIT 4
EC6651 COMMUNICATION ENGINEERING UNIT 4
 
Topic: Spread Spectrum
Topic: Spread SpectrumTopic: Spread Spectrum
Topic: Spread Spectrum
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
CDMA
CDMACDMA
CDMA
 
Spread Spectrum
Spread SpectrumSpread Spectrum
Spread Spectrum
 
Lect13 multiple access
Lect13 multiple accessLect13 multiple access
Lect13 multiple access
 
Unit-II Data Communication.ppt
Unit-II Data Communication.pptUnit-II Data Communication.ppt
Unit-II Data Communication.ppt
 
Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016
 
cdma
cdmacdma
cdma
 
Ch11 spread spectrum
Ch11 spread spectrumCh11 spread spectrum
Ch11 spread spectrum
 
spread spectrum in digital communication
spread spectrum in digital communicationspread spectrum in digital communication
spread spectrum in digital communication
 
A.pptx
A.pptxA.pptx
A.pptx
 
09-SpreadSpectrum.ppt
09-SpreadSpectrum.ppt09-SpreadSpectrum.ppt
09-SpreadSpectrum.ppt
 
Spread spectrum technologies
Spread spectrum technologiesSpread spectrum technologies
Spread spectrum technologies
 
Dsss final
Dsss finalDsss final
Dsss final
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless Communications
 

Kürzlich hochgeladen

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Kürzlich hochgeladen (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

09 spread spectrum

Hinweis der Redaktion

  1. Spread spectrum is an increasingly important form of encoding for wireless communications. It can be used to transmit either analog or digital data, using an analog signal. The basic idea of spread spectrum is to modulate the signal so as to increase significantly the bandwidth (spread the spectrum) of the signal to be transmitted. It was initially developed for military and intelligence requirements. The use of spread spectrum makes jamming and interception more difficult and provides improved reception. The first type of spread spectrum developed is known as frequency hopping. A more recent type of spread spectrum is direct sequence. Both of these techniques are used in various wireless communications standards and products.
  2. Stallings DCC8e Figure 9.1 highlights the key characteristics of any spread spectrum system. Input is fed into a channel encoder that produces an analog signal with a relatively narrow bandwidth around some center frequency. This signal is further modulated using a sequence of digits known as a spreading code or spreading sequence. Typically, but not always, the spreading code is generated by a pseudonoise, or pseudorandom number, generator. The effect of this modulation is to increase significantly the bandwidth (spread the spectrum) of the signal to be transmitted. On the receiving end, the same digit sequence is used to demodulate the spread spectrum signal. Finally, the signal is fed into a channel decoder to recover the data.
  3. Several advantages can be gained from this apparent waste of spectrum by this approach: • The signals gain immunity from various kinds of noise and multipath distortion. The earliest applications of spread spectrum were military, where it was used for its immunity to jamming. • It can also be used for hiding and encrypting signals. Only a recipient who knows the spreading code can recover the encoded information. • Several users can independently use the same higher bandwidth with very little interference. This property is used in cellular telephony applications, with a technique known as code division multiplexing (CDM) or code division multiple access (CDMA).
  4. A comment about pseudorandom numbers is in order. These numbers are generated by an algorithm using some initial value called the seed. The algorithm is deterministic and therefore produces sequences of numbers that are not statistically random. However, if the algorithm is good, the resulting sequences will pass many reasonable tests of randomness. Such numbers are often referred to as pseudorandom numbers. The important point is that unless you know the algorithm and the seed, it is impractical to predict the sequence. Hence, only a receiver that shares this information with a transmitter will be able to decode the signal successfully.
  5. With frequency-hopping spread spectrum (FHSS), the signal is broadcast over a seemingly random series of radio frequencies, hopping from frequency to frequency at fixed intervals. A receiver, hopping between frequencies in synchronization with the transmitter, picks up the message. Would-be eavesdroppers hear only unintelligible blips. Attempts to jam the signal on one frequency succeed only at knocking out a few bits of it.
  6. Stallings DCC8e Figure 9.2 shows an example of a frequency-hopping signal. A number of channels are allocated for the FH signal. Typically, there are 2k carrier frequencies forming 2k channels. The spacing between carrier frequencies and hence the width of each channel usually corresponds to the bandwidth of the input signal. The transmitter operates in one channel at a time for a fixed interval; for example, the IEEE 802.11 standard uses a 300-ms interval. During that interval, some number of bits (possibly a fraction of a bit, as discussed subsequently) is transmitted using some encoding scheme. A spreading code dictates the sequence of channels used. Both transmitter and receiver use the same code to tune into a sequence of channels in synchronization.
  7. Stallings DCC8e Figure 9.3 shows a typical block diagram for a frequency-hopping system. For transmission, binary data are fed into a modulator using some digital-to-analog encoding scheme, such as frequency shift keying (FSK) or binary phase shift keying (BPSK). The resulting signal sd(t) is centered on some base frequency. A pseudonoise (PN), or pseudorandom number, source serves as an index into a table of frequencies; this is the spreading code referred to previously. Each k bits of the PN source specifies one of the 2k carrier frequencies. At each successive interval (each k PN bits), a new carrier frequency is selected. The frequency synthesizer generates a constant-frequency tone whose frequency hops among a set of 2k frequencies, with the hopping pattern determined by k bits from the PN sequence. This is known as the spreading or chipping signal c(t). This is then modulated by the signal produced from the initial modulator to produce a new signal with the same shape but now centered on the selected carrier frequency. A bandpass filter is used to block the difference frequency and pass the sum frequency, yielding the final FHSS signal s(t).
  8. On reception, Stallings DCC8e Figure 9.3 shows that the spread spectrum signal is demodulated using the same sequence of PN-derived frequencies and then demodulated to produce the output data. At the receiver, a signal of the form s(t) defined on the previous slide, will be received. This is multiplied by a replica of the spreading signal to yield a product signal. A bandpass filter is used to block the sum frequency and pass the difference frequency, which is then demodulated to recover the binary data.
  9. A common modulation technique used in conjunction with FHSS is multiple FSK (MFSK), which uses M = 2L different frequencies to encode the digital input L bits at a time (see Chapter 5). For FHSS, the MFSK signal is translated to a new frequency every Tc seconds by modulating the MFSK signal with the FHSS carrier signal. The effect is to translate the MFSK signal into the appropriate FHSS channel. For a data rate of R, the duration of a bit is T = 1/R seconds and the duration of a signal element is Ts = LT seconds. If Tc is greater than or equal to Ts, the spreading modulation is referred to as slow-frequency-hop spread spectrum; otherwise it is known as fast-frequency-hop spread spectrum. Typically, a large number of frequencies is used in FHSS so that bandwidth of the FHSS signal is much larger than that of the original MFSK signal. One benefit of this is that a large value of k results in a system that is quite resistant to jamming. If frequency hopping is used, the jammer must jam all 2k frequencies. With a fixed power, this reduces the jamming power in any one frequency band to Sj/2k. In general, fast FHSS provides improved performance compared to slow FHSS in the face of noise or jamming, as we will discuss shortly.
  10. Stallings DCC8e Figure 9.4 shows an example of slow FHSS, using the MFSK example from Stallings DCC8e Figure 5.9. Here we have M = 4, which means that four different frequencies are used to encode the data input 2 bits at a time. Each signal element is a discrete frequency tone, and the total MFSK bandwidth is Wd = Mfd. We use an FHSS scheme with k = 2. That is, there are 4 = 2k different channels, each of width Wd. The total FHSS bandwidth is Ws = 2kWd. Each 2 bits of the PN sequence is used to select one of the four channels. That channel is held for a duration of two signal elements, or four bits (Tc = 2Ts = 4T).
  11. Stallings DCC8e Figure 9.5 shows an example of fast FHSS, using the same MFSK example. Again, M = 4 and k = 2. In this case, however, each signal element is represented by two frequency tones. Again, Wd = Mfd and Ws = 2kWd. In this example Ts = 2Tc = 2T. In general, fast FHSS provides improved performance compared to slow FHSS in the face of noise or jamming. For example, if three or more frequencies (chips) are used for each signal element, the receiver can decide which signal element was sent on the basis of a majority of the chips being correct.
  12. With direct sequence spread spectrum (DSSS), each bit in the original signal is represented by multiple bits in the transmitted signal, using a spreading code. The spreading code spreads the signal across a wider frequency band in direct proportion to the number of bits used. Therefore, a 10-bit spreading code spreads the signal across a frequency band that is 10 times greater than a 1-bit spreading code.
  13. One technique with direct sequence spread spectrum is to combine the digital information stream with the spreading code bit stream using an exclusive-OR (XOR). Stallings DCC8e Figure 9.6 shows an example. Note that an information bit of one inverts the spreading code bits in the combination, while an information bit of zero causes the spreading code bits to be transmitted without inversion. The combination bit stream has the data rate of the original spreading code sequence, so it has a wider bandwidth than the information stream. In this example, the spreading code bit stream is clocked at four times the information rate.
  14. To see how this technique works out in practice, assume that a BPSK modulation scheme is to be used. Rather than represent binary data with 1 and 0, it is more convenient for our purposes to use +1 and –1 to represent the two binary digits. To produce the DSSS signal, we multiply the BPSK signal by c(t), which is the PN sequence taking on values of +1 and –1: s(t) = A d(t)c(t) cos(2πfct): Equation (9.5) At the receiver, the incoming signal is multiplied again by c(t). But c(t)  c(t) = 1 and therefore the original signal is recovered. Equation (9.5) can be interpreted in two ways, leading to two different implementations. The first interpretation is to first multiply d(t) and c(t) together and then perform the BPSK modulation. That is the interpretation we have been discussing. Alternatively, we can first perform the BPSK modulation on the data stream d(t) to generate the data signal sd(t). This signal can then be multiplied by c(t). An implementation using the second interpretation is shown in Stallings DCC8e Figure 9.7 above.
  15. Stallings DCC8e Figure 9.8 is an example of the approach discussed on the previous slide.
  16. The spectrum spreading achieved by the direct sequence technique is easily determined (Stallings DCC8e Figure 9.9 above). In our example, the information signal has a bit width of T, which is equivalent to a data rate of 1/T. In that case, the spectrum of the signal, depending on the encoding technique, is roughly 2/T. Similarly, the spectrum of the PN signal is 2/Tc. Figure 9.9c shows the resulting spectrum spreading. The amount of spreading that is achieved is a direct result of the data rate of the PN stream. As with FHSS, we can get some insight into the performance of DSSS by looking at its effectiveness against jamming. Let us assume a simple jamming signal at the center frequency of the DSSS system. Can show the carrier power Sj is spread over a bandwidth of approximately 2/Tc. However, the BPSK demodulator (Figure 9.7) following the DSSS despreader includes a bandpass filter matched to the BPSK data, with bandwidth of 2/T. Thus, most of the jamming power is filtered. The jamming power has been reduced by a factor of (Tc /T) through the use of spread spectrum. The result is similar to the result for FHSS.
  17. CDMA is a multiplexing technique used with spread spectrum. The scheme works in the following manner. We start with a data signal with rate D, which we call the bit data rate. We break each bit into k chips according to a fixed pattern that is specific to each user, called the user’s code, or chipping code. The new channel has a chip data rate, or chipping rate, of kD chips per second. With CDMA, the receiver can sort out transmission from the desired sender, even when there may be other users broadcasting in the same cell.
  18. As an illustration we consider a simple example with k = 6. It is simplest to characterize a chipping code as a sequence of 1s and –1s. Figure 9.10 shows the codes for three users, A, B, and C, each of which is communicating with the same base station receiver, R. Thus, the code for user A is cA = &lt;1, –1, –1, 1, –1, 1&gt;. Similarly, user B has code cB = &lt;1, 1, –1, –1, 1, 1&gt;, and user C has cC = &lt;1, 1, –1, 1, 1, –1&gt;. We now consider the case of user A communicating with the base station. The base station is assumed to know A’s code. For simplicity, we assume that communication is already synchronized so that the base station knows when to look for codes. If A wants to send a 1 bit, A transmits its code as a chip pattern &lt;1, –1, –1, 1, –1, 1&gt;. If a 0 bit is to be sent, A transmits the complement (1s and –1s reversed) of its code, &lt;–1, 1, 1, –1, 1, –1&gt;. At the base station the receiver decodes the chip patterns. If the decoder is linear and if A and B transmit signals sA and sB, respectively, at the same time, then SA (sA + sB) = SA (sA) + SA (sB) = SA (sA) since the decoder ignores B when it is using A’s code. The codes of A and B that have the property that SA (cB) = SB (cA) = 0 are called orthogonal. Using the decoder, Su, the receiver can sort out transmission from u even when there may be other users broadcasting in the same cell. In practice, the CDMA receiver can filter out the contribution from unwanted users or they appear as low-level noise. However, if there are many users competing for the channel with the user the receiver is trying to listen to, or if the signal power of one or more competing signals is too high, perhaps because it is very near the receiver (the “near/far” problem), the system breaks down.
  19. Let us now look at CDMA from the viewpoint of a DSSS system using BPSK. Stallings DCC8eFigure 9.11 depicts a configuration in which there are n users, each transmitting using a different, orthogonal, PN sequence (compare Figure 9.7). For each user, the data stream to be transmitted, di(t), is BPSK modulated to produce a signal with a bandwidth of Ws and then multiplied by the spreading code for that user, ci(t). All of the signals, plus noise, are received at the receiver&apos;s antenna. Suppose that the receiver is attempting to recover the data of user 1. The incoming signal is multiplied by the spreading code of user 1 and then demodulated. The effect of this is to narrow the bandwidth of that portion of the incoming signal corresponding to user 1 to the original bandwidth of the unspread signal, which is proportional to the data rate. Incoming signals from other users are not despread by the spreading code from user 1 and hence retain their bandwidth of Ws. Thus the unwanted signal energy remains spread over a large bandwidth and the wanted signal is concentrated in a narrow bandwidth. The bandpass filter at the demodulator can therefore recover the desired signal.
  20. Chapter 9 summary.