0% found this document useful (0 votes)
8 views25 pages

Spread Spectrum

The document discusses Spread Spectrum Modulation techniques, which enhance secure communication by spreading data over a wide bandwidth to prevent interference and jamming. It covers methods such as Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS), highlighting their operational principles and advantages. Additionally, it introduces various modulation techniques like Amplitude Shift Keying (ASK) and Frequency Shift Keying (FSK), along with their applications in wireless communication technologies.

Uploaded by

swapnilgupta9212
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views25 pages

Spread Spectrum

The document discusses Spread Spectrum Modulation techniques, which enhance secure communication by spreading data over a wide bandwidth to prevent interference and jamming. It covers methods such as Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS), highlighting their operational principles and advantages. Additionally, it introduces various modulation techniques like Amplitude Shift Keying (ASK) and Frequency Shift Keying (FSK), along with their applications in wireless communication technologies.

Uploaded by

swapnilgupta9212
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 25

Spread Spectrum and

modulation techniques
Chapter
Spread Spectrum

 A collective class of signaling techniques are


employed before transmitting a signal to provide
a secure communication, known as the Spread
Spectrum Modulation.
The main advantage of spread spectrum
communication technique is to prevent
“interference” whether it is intentional or
unintentional.
Spread Spectrum
• Analog or digital data
• Analog signal
• Spread data over wide bandwidth
• Makes jamming and interception harder
• Frequency hoping
— Signal broadcast over seemingly random series of
frequencies
• Direct Sequence
— Each bit is represented by multiple bits in transmitted
signal
— Chipping code
General Model of Spread
Spectrum System
Pseudo noise
 Pseudo Random Number
Generator(PRNG) refers to an algorithm that
uses mathematical formulas to produce
sequences of random numbers.
 PRNGs generate a sequence of numbers
approximating the properties of random
numbers.
 Many numbers are generated in a short time
and can also be reproduced later, if the starting
point in the sequence is known. Hence, the
numbers are deterministic and efficient.
Pseudorandom Numbers
• Generated by algorithm using initial seed
• Deterministic algorithm
—Not actually random
—If algorithm good, results pass reasonable
tests of randomness
• Need to know algorithm and seed to
predict sequence
Frequency Hopping Spread
Spectrum (FHSS)
• Signal broadcast over seemingly random
series of frequencies
• Receiver hops between frequencies in
sync with transmitter
• Eavesdroppers hear unintelligible blips
• Jamming on one frequency affects only a
few bits
Basic Operation
• Typically 2k carriers frequencies forming 2k
channels
• Channel spacing corresponds with
bandwidth of input
• Each channel used for fixed interval
—300 ms in IEEE 802.11
—Some number of bits transmitted using some
encoding scheme
• May be fractions of bit (see later)
—Sequence dictated by spreading code
Frequency Hopping Example
Frequency Hopping Spread
Spectrum System (Transmitter)
Frequency Hopping Spread
Spectrum System (Receiver)
Slow and Fast FHSS
• Frequency shifted every Tc seconds
• Duration of signal element is Ts seconds
• Slow FHSS has Tc  Ts
• Fast FHSS has Tc < Ts
• Generally fast FHSS gives improved
performance in noise (or jamming)
Various modulation technique
Various modulation technique
Various modulation technique
Various modulation technique
 Amplitude shift keying (ASK) is a
popular modulation technique used
in digital data communication for a
large number of low-frequency RF
applications. The source transmits a
large amplitude carrier when it wants to
send a '1', and it sends a small
amplitude carrier when it wants to send
a '0' in its simplest form.
 Various wireless technologies, including
Bluetooth®, ZigBee®, and Wi-Fi®, have
made considerable headway in today's
Advantages of ASK modulation: consumer world.
•It offers high bandwidth efficiency.
•It has a simple receiver design.
•Its generation and detection are easy thus facilitate a simple transmitter and
receiver section.
•ASK modulation and demodulation are relatively low-cost methods.
Various modulation technique
 FSK is a scheme of frequency
modulation.
 The output of a FSK modulated wave is
high in frequency for a binary High input
and is low in frequency for a binary
Low input.
 The binary 1s and 0s are called Mark
and Space frequencies.

Following are the typical applications of FSK modulation.


 It is used on voice grade lines for data rates upto 1200 bps.
It is used for high frequency radio transmission from 3 to 30 MHz.
It is also used in coaxial cable based LAN (Local Area Network) at higher
frequencies.
Various modulation technique
Direct Sequence Spread Spectrum
(DSSS)
• Each bit represented by multiple bits using
spreading code
• Spreading code spreads signal across wider
frequency band
— In proportion to number of bits used
— 10 bit spreading code spreads signal across 10
times bandwidth of 1 bit code
• One method:
— Combine input with spreading code using XOR
— Input bit 1 inverts spreading code bit
— Input zero bit doesn’t alter spreading code bit
— Data rate equal to original spreading code
• Performance similar to FHSS
Direct Sequence Spread Spectrum
Example
Direct Sequence Spread Spectrum
Transmitter
Direct Sequence Spread Spectrum
Transmitter
Direct Sequence Spread Spectrum
Using BPSK Example
Code Division Multiple Access
(CDMA)
• Multiplexing Technique used with spread spectrum
• Start with data signal rate D
— Called bit data rate
• Break each bit into k chips according to fixed
pattern specific to each user
— User’s code
• New channel has chip data rate kD chips per
second
• E.g. k=6, three users (A,B,C) communicating with
base receiver R
• Code for A = <1,-1,-1,1,-1,1>
• Code for B = <1,1,-1,-1,1,1>
• Code for C = <1,1,-1,1,1,-1>
CDMA Example

You might also like