0% found this document useful (0 votes)
12 views21 pages

4. Spread Spectrum (1)

Uploaded by

Elly Michael
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views21 pages

4. Spread Spectrum (1)

Uploaded by

Elly Michael
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Spread

Spectrum
MANYAHI, B.
Short History on Spread Spectrum
 During World War II, Golden Age of Hollywood actress Hedy
Lamarr and co-inventor George Antheil developed an
intended jamming-resistant radio guidance system for use
in Allied torpedoes, patenting the device under US Patent
2,292,387 "Secret Communications System" on August 11,
1942.
 By manipulating radio frequencies at irregular intervals
between transmission and reception, the invention formed
an unbreakable code to prevent classified messages from
being intercept by enemy personnel.
Spread Spectrum
Definition
 In telecommunication and radio communication, spread-
spectrum techniques are methods by which a signal (e.g., an
electrical, electromagnetic, or acoustic signal) generated
with a particular bandwidth is deliberately spread in
the frequency domain, resulting in a signal with a
wider bandwidth.
 This is a technique in which a telecommunication signal is
transmitted on a bandwidth considerably larger than
the frequency content of the original information.
Model of Spread Spectrum
• Input is fed into a channel encoder
Produces analog signal with narrow bandwidth
• Signal is further modulated using sequence of digits
Spreading code or spreading sequence
Generated by pseudonoise, or pseudo-random
number generator
• Effect of modulation is to increase bandwidth of
signal to be transmitted
• On receiving end, digit sequence is used to
demodulate the spread spectrum signal
• Signal is fed into a channel decoder to recover data
Spread Spectrum Modulation

 A collective class of signaling techniques are employed


before transmitting a signal to provide a secure
communication, known as the Spread Spectrum
Modulation.
 The main advantage of spread spectrum communication
technique is to prevent “interference” whether it is
intentional or unintentional.
 The signals modulated with these techniques are hard to
interfere and cannot be jammed. An intruder with no official
access is never allowed to crack them. Hence, these
techniques are used for military purposes.
 These spread spectrum signals transmit at low power
density and has a wide spread of signals.
Pseudo-Noise Sequence

 A coded sequence of 1s and 0s with certain auto-


correlation properties, called as Pseudo-Noise coding
sequence is used in spread spectrum techniques.
 It is a maximum-length sequence, which is a type of cyclic
code.
 In cryptography, pseudorandom noise (PRN) is
a signal similar to noise which satisfies one or more of the
standard tests for statistical randomness.
 Although it seems to lack any definite pattern,
pseudorandom noise consists of a
deterministic sequence of pulses that will repeat itself after
its period.
Narrow-band and Spread-spectrum Signals

 Both the Narrow band and Spread spectrum signals can


be understood easily by observing their frequency
spectrum as shown in the following figures.
Narrow-band Signals
 The Narrow-band signals have the signal strength
concentrated as shown in the following frequency
spectrum figure.

Following are some of its


features
• Band of signals occupy a narrow
range of frequencies.
• Power density is high.
• Spread of energy is low and
concentrated.
Spread Spectrum Signals
 The spread spectrum signals have the signal strength
distributed as shown in the following frequency spectrum
figure.

Following are some of its features −


• Band of signals occupy a wide range of
frequencies.
• Power density is very low.
•Energy is wide spread.
 With these features, the spread spectrum signals are highly
resistant to interference or jamming.
 Since multiple users can share the same spread spectrum
bandwidth without interfering with one another, these can
be called as multiple access techniques.
 What is Modulation and type of Modulation techniques???
Benefits and application of Spread Spectrum

 Following are the benefits of spread spectrum −


1. Avoiding Interceptions
2. Privacy of Transmission
3. Resistance to fading
4. Accurate low power position finding
5. Improved multiple access scheme
 Applications of Spread spectrum
1. Satellite communication, (e.g. GLOBALSTAR satellite
communications system , Low Earth Orbiting (LEO) satellite
communications network systems, GPS for satellite navigation
system )
2. Mobile wireless communications
3. Wireless Local Area Networks (WLAN) IEEE 802.11 system
4. Optical codes for Fiber-optic Local Area Networks (LAN)
5. Underwater acoustic communication system
Although spread spectrum techniques were originally designed
for military uses, they are now being used widely for commercial
Spread spectrum techniques

 Spread spectrum techniques uses signals which


have a transmission bandwidth of a magnitude
greater than the minimum required RF
bandwidth.

These are of two types.


 Frequency Hopped Spread Spectrum (FHSS)
 Direct Sequence Spread Spectrum (DSSS)
Frequency Hopped Spread Spectrum (FHSS)

 This is frequency hopping technique, where the users are


made to change the frequencies of usage, from one to
another in a specified time interval, hence called
as frequency hopping.
For example, a frequency was allotted to sender 1 for a
particular period of time. Now, after a while, sender 1 hops to
the other frequency and sender 2 uses the first frequency,
which was previously used by sender 1. This is called
as frequency reuse.
 The frequencies of the data are hopped from one to another
in order to provide a secure transmission. The amount of
time spent on each frequency hop is called as Dwell time.
 The available frequency band is divided into smaller sub-
bands.
 Signals rapidly change ("hop") their carrier frequencies
among the center frequencies of these sub-bands in a
predetermined order.
Direct Sequence Spread Spectrum (DSSS)

 Whenever a user wants to send data using this DSSS


technique, each and every bit of the user data is multiplied
by a secret code, called as chipping code.
 This chipping code is nothing but the spreading code which
is multiplied with the original message and transmitted.
 The receiver uses the same code to retrieve the original
message.
Comparison between FHSS and DSSS/CDMA
Multiple

Access Techniques
There are several different ways to allow access to the
channel. These includes mainly the following −
 Frequency division multiple-access (FDMA)
 Time division multiple-access (TDMA)
 Code division multiple-access (CDMA)
 Space division multiple access (SDMA)
 Depending on how the available bandwidth is allocated to
the users, these techniques can be classified
as narrowband and wideband systems.
Frequency Division Multiple Access
(FDMA)
FDMA is the basic technology for advanced mobile phone
services. The features of FDMA are as follows.
 FDMA allots a different sub-band of frequency to each different
user to access the network.
 If FDMA is not in use, the channel is left idle instead of allotting
to the other users.
 FDMA is implemented in Narrowband systems and it is less
complex than TDMA.
 Tight filtering is done here to reduce adjacent channel
interference.
 The base station BS and mobile station MS, transmit and
receive simultaneously and continuously in FDMA.
Time Division Multiple Access
(TDMA)
 In the cases where continuous transmission is not required,
there TDMA is used instead of FDMA. The features of TDMA
include the following.
 TDMA shares a single carrier frequency with several users
where each users makes use of non-overlapping time slots.
 Data transmission in TDMA is not continuous, but occurs in
bursts. Hence handsoff process is simpler.
 TDMA uses different time slots for transmission and reception
thus duplexers are not required.
 TDMA has an advantage that is possible to allocate different
numbers of time slots per frame to different users.
 Bandwidth can be supplied on demand to different users by
concatenating or reassigning time slot based on priority.
Code Division Multiple Access
(CDMA)
Code division multiple access technique is an example of
multiple access where several transmitters use a single
channel to send information simultaneously. Its features are
as follows.
 In CDMA every user uses the full available spectrum instead of
getting allotted by separate frequency.
 CDMA is much recommended for voice and data
communications.
 While multiple codes occupy the same channel in CDMA, the
users having same code can communicate with each other.
 CDMA offers more air-space capacity than TDMA.
 The hands-off between base stations is very well handled by
CDMA.
Space Division Multiple Access
(SDMA)
 Space division multiple access or spatial division multiple
access is a technique which is MIMO (multiple-input
multiple-output) architecture and used mostly in wireless
and satellite communication. It has the following features.
 All users can communicate at the same time using the same
channel.
 SDMA is completely free from interference.
 A single satellite can communicate with more satellites
receivers of the same frequency.
 The directional spot-beam antennas are used and hence the
base station in SDMA, can track a moving user.
 Controls the radiated energy for each user in space.
Configuring Wireless LAN
in Packet Tracer

You might also like