The document discusses Spread Spectrum Modulation techniques, which enhance secure communication by spreading data over a wide bandwidth to prevent interference and jamming. It covers methods such as Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS), highlighting their operational principles and advantages. Additionally, it introduces various modulation techniques like Amplitude Shift Keying (ASK) and Frequency Shift Keying (FSK), along with their applications in wireless communication technologies.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
8 views25 pages
Spread Spectrum
The document discusses Spread Spectrum Modulation techniques, which enhance secure communication by spreading data over a wide bandwidth to prevent interference and jamming. It covers methods such as Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS), highlighting their operational principles and advantages. Additionally, it introduces various modulation techniques like Amplitude Shift Keying (ASK) and Frequency Shift Keying (FSK), along with their applications in wireless communication technologies.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 25
Spread Spectrum and
modulation techniques Chapter Spread Spectrum
A collective class of signaling techniques are
employed before transmitting a signal to provide a secure communication, known as the Spread Spectrum Modulation. The main advantage of spread spectrum communication technique is to prevent “interference” whether it is intentional or unintentional. Spread Spectrum • Analog or digital data • Analog signal • Spread data over wide bandwidth • Makes jamming and interception harder • Frequency hoping — Signal broadcast over seemingly random series of frequencies • Direct Sequence — Each bit is represented by multiple bits in transmitted signal — Chipping code General Model of Spread Spectrum System Pseudo noise Pseudo Random Number Generator(PRNG) refers to an algorithm that uses mathematical formulas to produce sequences of random numbers. PRNGs generate a sequence of numbers approximating the properties of random numbers. Many numbers are generated in a short time and can also be reproduced later, if the starting point in the sequence is known. Hence, the numbers are deterministic and efficient. Pseudorandom Numbers • Generated by algorithm using initial seed • Deterministic algorithm —Not actually random —If algorithm good, results pass reasonable tests of randomness • Need to know algorithm and seed to predict sequence Frequency Hopping Spread Spectrum (FHSS) • Signal broadcast over seemingly random series of frequencies • Receiver hops between frequencies in sync with transmitter • Eavesdroppers hear unintelligible blips • Jamming on one frequency affects only a few bits Basic Operation • Typically 2k carriers frequencies forming 2k channels • Channel spacing corresponds with bandwidth of input • Each channel used for fixed interval —300 ms in IEEE 802.11 —Some number of bits transmitted using some encoding scheme • May be fractions of bit (see later) —Sequence dictated by spreading code Frequency Hopping Example Frequency Hopping Spread Spectrum System (Transmitter) Frequency Hopping Spread Spectrum System (Receiver) Slow and Fast FHSS • Frequency shifted every Tc seconds • Duration of signal element is Ts seconds • Slow FHSS has Tc Ts • Fast FHSS has Tc < Ts • Generally fast FHSS gives improved performance in noise (or jamming) Various modulation technique Various modulation technique Various modulation technique Various modulation technique Amplitude shift keying (ASK) is a popular modulation technique used in digital data communication for a large number of low-frequency RF applications. The source transmits a large amplitude carrier when it wants to send a '1', and it sends a small amplitude carrier when it wants to send a '0' in its simplest form. Various wireless technologies, including Bluetooth®, ZigBee®, and Wi-Fi®, have made considerable headway in today's Advantages of ASK modulation: consumer world. •It offers high bandwidth efficiency. •It has a simple receiver design. •Its generation and detection are easy thus facilitate a simple transmitter and receiver section. •ASK modulation and demodulation are relatively low-cost methods. Various modulation technique FSK is a scheme of frequency modulation. The output of a FSK modulated wave is high in frequency for a binary High input and is low in frequency for a binary Low input. The binary 1s and 0s are called Mark and Space frequencies.
Following are the typical applications of FSK modulation.
It is used on voice grade lines for data rates upto 1200 bps. It is used for high frequency radio transmission from 3 to 30 MHz. It is also used in coaxial cable based LAN (Local Area Network) at higher frequencies. Various modulation technique Direct Sequence Spread Spectrum (DSSS) • Each bit represented by multiple bits using spreading code • Spreading code spreads signal across wider frequency band — In proportion to number of bits used — 10 bit spreading code spreads signal across 10 times bandwidth of 1 bit code • One method: — Combine input with spreading code using XOR — Input bit 1 inverts spreading code bit — Input zero bit doesn’t alter spreading code bit — Data rate equal to original spreading code • Performance similar to FHSS Direct Sequence Spread Spectrum Example Direct Sequence Spread Spectrum Transmitter Direct Sequence Spread Spectrum Transmitter Direct Sequence Spread Spectrum Using BPSK Example Code Division Multiple Access (CDMA) • Multiplexing Technique used with spread spectrum • Start with data signal rate D — Called bit data rate • Break each bit into k chips according to fixed pattern specific to each user — User’s code • New channel has chip data rate kD chips per second • E.g. k=6, three users (A,B,C) communicating with base receiver R • Code for A = <1,-1,-1,1,-1,1> • Code for B = <1,1,-1,-1,1,1> • Code for C = <1,1,-1,1,1,-1> CDMA Example