Frequency Hopping: Mathematical Approach, Applications and Simulation
Frequency Hopping: Mathematical Approach, Applications and Simulation
كريم سعيد محمد حافظ عمرو عصام حسان أيمه أسامة السيد
Section: 7 Number:210 Section: 7 Number:191 Section:3 Number:83
مصطفى محمود محمد مروان مصطفى مصطفى مروان محمد عادل عبد
خيرهللا العظيم
Section: 10 Number: 295 Section: 10 Number:281 Section: 10 Number:280
Group N42
شريف ربيع.د.أ
-1-
Table of contents
1. Introduction 3
2. Spread spectrum 3
3. Direct sequence vs. frequency hopping 3
4. Pseudorandom process 4
5. Basic concept 4
6. Basic frequency hopping spread spectrum algorithm 5
7. Frequency hopping sequences and hit probability 5
8. Frequency Hopping Code Division Multiple Access (FH-CDMA) 7
9. Plotting the distribution of hitting 8
Appendix A. MatLab code for the plot 9
Appendix B. MatLab simulation for sequence generation 9
Appendix C. Adaptive frequency hopping for unlicensed bands 11
Appendix D. References 12
-2-
1. Introduction
In 1895, Guglielmo Marconi opened the way for modern wireless
communications by transmitting the three-dot Morse code for the letter ‘S’ over a
distance of three kilometers using electromagnetic waves. From this beginning,
wireless communications has developed into a key element of modern society. From
satellite transmission, radio and television broadcasting to the now ubiquitous mobile
telephone, wireless communications has revolutionized the way societies function.
To understand how the signal is transmitted in air, we make an analogy between
electromagnetic waves and sound. At the ear of the listener, the waves impinge upon
the eardrum of the listener and are translated into familiar words, phrases, and tones.
When information is transmitted through wireless means such as in radio
transmission, this information must first be converted to electrical signals. In order to
understand the benefits of radio transmission, it is helpful to discuss the nature of the
term "spectrum."
2. Spread Spectrum
Spread-spectrum techniques are methods by which a signal (e.g. an electrical,
electromagnetic) generated in a particular bandwidth is deliberately spread in
the frequency domain, resulting in a signal with a wider bandwidth. These techniques
are used for a variety of reasons, including the establishment of secure
communications, increasing resistance to natural interference and jamming, to prevent
detection … etc. Most commercial spread spectrum systems transmit an RF signal
bandwidth in the neighborhood of one to two orders of magnitude greater than the
bandwidth of the information that is being sent.
There are at least two problems with conventional wireless communications that
can occur under certain circumstances. First, a signal whose frequency is constant is
subject to catastrophic interference. This occurs when another signal is transmitted on,
or very near, the frequency of the desired signal. Catastrophic interference can be
accidental it can be deliberate. Second, a constant-frequency signal is easy to
intercept, and is therefore not well suited to applications in which information must be
kept confidential between the source (transmitting party) and destination (receiving
party).
That's why there are two popular forms of spread spectrum modulation, Direct
Sequence and Frequency Hopping.
3. Direct sequence vs. Frequency Hopping
Direct sequence spread spectrum, the stream of information to be transmitted is
divided into small pieces, each of which is allocated across to a frequency channel
across the spectrum. A data signal at the point of transmission is combined with a
higher data-rate bit sequence (also known as a chipping code) that divides the data
according to a spreading ratio. The redundant chipping code helps the signal resist
interference and also enables the original data to be recovered if data bits are damaged
during transmission.
On the other hand, Frequency-hopping spread spectrum (F.H.S.S) is a method of
transmitting radio signals by rapidly switching a carrier among many
frequency channels, using a pseudorandom sequence known to
both transmitter and receiver. An FHSS signal simply appears as an increase in the
background noise to a narrowband receiver. An eavesdropper would only be able to
intercept the transmission if the pseudorandom sequence was known.
Spread-spectrum transmissions can share a frequency band with many types of
conventional transmissions with minimal interference. The spread-spectrum signals
-3-
add minimal noise to the narrow-frequency communications, and vice versa. As a
result, bandwidth can be utilized more efficiently.
4. Pseudorandom process
It is a process that appears to be random but it is not. Pseudorandom sequences
typically exhibit statistical randomness while being generated by an entirely
deterministic causal process. Such a process is easier to produce than a genuine
random one, and has the benefit that it can be used again and again to produce exactly
the same numbers, useful for testing and fixing software. Besides, it have to be known
by transmitter and receiver only so when any other one try to enter the sequence he
just hear noises and no information can be heard.
5. Basic Concept
Any communication system has a band of transmission. This band is divided into
channels, and each user occupies a channel to perform his call.
There are several ways to generate families of sequences with minimal hit
probability, we will discuss the approach delivered by this paper; "Families of
sequences with optimal Hamming correlation properties" published 1974, then we
will state other approaches.
We will discuss briefly the principle concept used in generating the sequence:
-5-
Auto Correlation: The sequence is compared to itself but with
time shift.
Cross Correlation: Two different sequences are compared
together.
b. M - Sequence :
It was found mathematically that its range is a Prime numbers of channels, i.e.
{0, 1... P-1}. Also can be implemented using linear feedback registers.
For every prime number and positive integer n, there exist an M-sequence of
length q = Pn-1; n is a parameter.
Now we are going to talk about the proposed approach to develop optimal
families of sequences:
We can conclude that for any frequency hopping sequence family there are
three parameters:
v: Length of the sequence.
m: Number of channels.
λ: Maximum number of hits of two users having same sequence
H(Y).
It is obvious that the probability that two users having the same sequence hit at
given time slot is (λ/v).
And the probability that two users having the same sequence is (1/m).
If the two users have the same sequence Phit = λ/vm, then the probability that
two users not having the same sequence hit equals (λ+1)/v.
The probability that they don't have the same sequence equals (m-1)/m.
Therefore,
Total Phit = λ/vm + [λ+1/v]*[(m-1)/m]
-6-
And the number of users interfering a given user: x, can be modeled as a
binomial random variable, as each user independently interfere the given user
or not. Then,
Phit = 𝑈−1
𝑥
phitx (1- phit )U-x-1, phit is the PDF of x and U is the number of active
users.
8. Frequency Hopping Code Division Multiple Access (FH-CDMA)
Code Division Multiple Access (CDMA) is a channel transmission standard that
allows several transmitters to send information simultaneously over a single
communication channel. This ensures that the bandwidth is used in a perfect way and
in an optimized manner.
CDMA is popular because it provides privacy, protection against multi-path
interference, anti-jamming capabilities, and a low probability of interception (LPI). In
CDMA each sender is assigned a unique code sequence that encodes the information-
bearing signal. The receiver also knows the code sequence of the sender and decodes
the received signal upon reception, recovering the original data. FH-CDMA technique
is a relatively less widely used CDMA scheme in real applications. The reason for its
less wide acceptance is owing to several factors. First, the FH technique requires a
very accurate reference clock in the whole wireless system which uses the FH-CDMA
technique for user separation. This accurate network-wide reference clock is very
costly to implement using currently available digital technology.
In an FH-CDMA system, a transmitter "hops" between available frequencies
according to a specified algorithm, which can be either random or preplanned. The
transmitter operates in synchronization with a receiver, which remains tuned to the
same center frequency as the transmitter. A short burst of data is transmitted on a
narrowband. Then, the transmitter tunes to another frequency and transmits again. The
receiver thus is capable of hopping its frequency over a given bandwidth several times
a second, transmitting on one frequency for a certain period of time, then hopping to
another frequency and transmitting again. Frequency hopping requires a much wider
bandwidth than is needed to transmit the same information using only one carrier
frequency.
The length of time the transmitted carrier is unchanged is called the dwell time
(TD). After this time has elapsed the transmitted carrier may change, i.e. hop, to
another carrier. There is a sequence of frequency hops that is given to a user. This
sequence is a frequency hopping code, and in general this code sequence continuously
repeats while a user is transmitting data. Figure 8.1 shows a code sequence for the
situation of eight carrier frequencies. Each shaded block represents a data modulated
signal positioned at a specific frequency. Suppose the modulated data are binary
frequency shift keying (BFSK) where a logical 1 is represented by frequency fA and a
logical 0 by a frequency fB. If the duration of a data bit is Tb, then the BFSK output is
either fA or fB and lasts for Tb seconds. Should TD < Tb, then it follows that for one bit
there will be a number of frequency hops as shown in figure 8.2. This is the case of
FFH-CDMA On the other hand, if TD ≥ Tb, each hop may last for a packet of data
and this is referred to as (SFH-CDMA) shown in figure 8.3 . The military often use
FFH-CDMA, where the hopping rate may be very fast making it difficult to
effectively jam the transmitted signal. However, the technology is complex and
expensive for the commercial market where SFH-CDMA is preferred.
-7-
Fig. 8.1 Fig. 8.2 Fast FHSS
-8-
It is clear from the above figure that as the number of channels gets greater and
the length of sequence gets longer, the expected value for the number of users
interfering a given user decreases, which is good.
n=n+1;%next iteration
end
Our problem was that we had not deal with generating m-sequences before.
Fortunately there is an open source function to generate an m-sequence within the
ranges in the following table.
p n
2 2,3,4,5,6,7,8,9,10
3 2,3,4,5,6,7
5 2,3,4
Table B.1
We took that m-sequence and made the transformation twice on it, and then we
calculated the number of hits between a sequence and itself, and between the two
sequences.
ms=transpose(mseq(p,n));
for j=p^n:(p^n)+k-1
ms(j)=ms(j-p^n+1);
end
-9-
for i=1:(p^n)-1
fhs(i) = 0;
for j=1:k
o=i+j-1;
fhs(i) = fhs(i)+ms(o)*(p^(j-1));
end
end
for i=1:(p^n)-1
if i<(p^n)-1
fhs2(i+1)=fhs(i);
else
fhs2(1)=fhs(i);
end
end
h=0;
for i=1:(p^n)-1
if fhs2(i)==fhs(i)
h=h+1;
end
end
for j=1:(p^n)-1
ms2(j)=ms(j);
end
ms2=circshift(ms2,[0 60]);
for j=p^n:(p^n)+k-1
ms2(j)=ms2(j-p^n+1);
end
for i=1:(p^n)-1
fhs3(i) = 0;
for j=1:k
o=i+j-1;
fhs3(i) = fhs2(i)+ms2(o)*(p^(j-1));
end
end
M=0;
for i=1:(p^n)-1
if fhs3(i)==fhs(i)
M=M+1;
end
end
- 10 -
Fig B.1 p=2, n=3, k=2, U=100
It appears that in both runs the output values are within the limits derived before.
- 11 -
Adaptive frequency hopping has two main types:
- 12 -