Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum
Spread Spectrum All creative people want to do the unexpected. — Ecstasy and Me: My Life as a Woman ,  Hedy Lamarr
Spread Spectrum important encoding method for wireless communications analog & digital data with analog signal spreads data over wide bandwidth makes jamming and interception harder two approaches, both in use: Frequency Hopping Direct Sequence
General Model of Spread Spectrum System
Spread Spectrum Advantages immunity from noise and multipath distortion can hide / encrypt signals several users can share same higher bandwidth with little interference CDM/CDMA Mobile telephones
Pseudorandom Numbers generated by a deterministic algorithm not actually random but if algorithm good, results pass reasonable tests of randomness starting from an initial seed need to know algorithm and seed to predict sequence hence only receiver can decode signal
Frequency Hopping Spread Spectrum (FHSS) signal is broadcast over seemingly random series of frequencies receiver hops between frequencies in sync with transmitter eavesdroppers hear unintelligible blips jamming on one frequency affects only a few bits
Frequency Hopping Example
FHSS (Transmitter)
Frequency Hopping Spread Spectrum System (Receiver)
Slow and Fast FHSS commonly use multiple FSK (MFSK) have frequency shifted every T c  seconds duration of signal element is T s  seconds Slow FHSS has T c     T s Fast FHSS has T c  < T s FHSS quite resistant to noise or jamming with fast FHSS giving better performance
Slow MFSK FHSS
Fast MFSK FHSS
Direct Sequence Spread Spectrum (DSSS) each bit is represented by multiple bits using a spreading code this spreads signal across a wider frequency band has performance similar to FHSS
Direct Sequence Spread Spectrum Example
Direct Sequence Spread Spectrum System
DSSS Example Using BPSK
Approximate Spectrum of  DSSS Signal
Code Division Multiple Access (CDMA) a multiplexing technique used with spread spectrum given a data signal rate D break each bit into  k  chips according to a fixed chipping code specific to each user resulting new channel has chip data rate  kD  chips per second can have multiple channels superimposed
CDMA Example
CDMA for DSSS
Summary looked at use of spread spectrum techniques: FHSS DSSS CDMA

More Related Content

PPTX
Multichannel fading
PDF
9. parameters of mobile multipath channels
PPT
Small Scale Multi path measurements
DOC
DPSK(Differential Phase Shift Keying) transmitter and receiver
PPT
Point to point microwave
PPTX
Power delay profile,delay spread and doppler spread
PDF
Orthogonal Frequency Division Multiplexing (OFDM)
PDF
100 Technical Interview Questions on Wireless communication, LTE and 5G.
Multichannel fading
9. parameters of mobile multipath channels
Small Scale Multi path measurements
DPSK(Differential Phase Shift Keying) transmitter and receiver
Point to point microwave
Power delay profile,delay spread and doppler spread
Orthogonal Frequency Division Multiplexing (OFDM)
100 Technical Interview Questions on Wireless communication, LTE and 5G.

What's hot (20)

PPT
Broadside array vs end fire array
PPT
Massive mimo
PPTX
Multiplexing tdma fdma cdma wdma
PPTX
radio-wave-propagation
PPSX
Phase shift keying(PSK)
PDF
5. 2 ray propagation model part 1
PPTX
BCH Codes
PPT
Fading in wireless communication.ppt
PPT
Coherent systems
PPTX
QUADRATURE AMPLITUDE MODULATION
PPTX
Lecture5 teletraffic
PPTX
OFDM Basics
PPT
Dispersion-Management-of-Optical-Fiber-Presented-by-Titas-Sarker
PPTX
Quadrature amplitude modulation
PDF
Chapter4
PPTX
Amplitude shift keying
PPTX
Digital modulation techniques...
PPT
Introduction To Wireless Fading Channels
PPTX
Outdoor propagatiom model
PPT
spread spectrum
Broadside array vs end fire array
Massive mimo
Multiplexing tdma fdma cdma wdma
radio-wave-propagation
Phase shift keying(PSK)
5. 2 ray propagation model part 1
BCH Codes
Fading in wireless communication.ppt
Coherent systems
QUADRATURE AMPLITUDE MODULATION
Lecture5 teletraffic
OFDM Basics
Dispersion-Management-of-Optical-Fiber-Presented-by-Titas-Sarker
Quadrature amplitude modulation
Chapter4
Amplitude shift keying
Digital modulation techniques...
Introduction To Wireless Fading Channels
Outdoor propagatiom model
spread spectrum
Ad

Viewers also liked (13)

PPTX
PPTX
Local area network
PPT
PDF
Chapter 6 - Digital Data Communication Techniques 9e
PPT
PPT
Local area network
PPT
05 signal encodingtechniques
PPT
04 transmission media
PPTX
Wide area network (wan)
PDF
Chapter 5 - Signal Encoding Techniques 9e
Local area network
Chapter 6 - Digital Data Communication Techniques 9e
Local area network
05 signal encodingtechniques
04 transmission media
Wide area network (wan)
Chapter 5 - Signal Encoding Techniques 9e
Ad

Similar to 09 spread spectrum (20)

PPT
09-SpreadSpectrum.ppt
PPT
09 spread spectrum
PPT
Spread Spectrum Data communication chapter 9
PPT
09-SpreadSpectrum.ppt
PPT
SpreadSpectrum direct sequence for communication
PPTX
CS553_ST7_Ch09-SpreadSpectrum 23.pptx
PPT
spread spectrum technique
PPT
8 spread spectrum
PPTX
Lecture spread spectrum
PPT
Ch11 spread spectrum
PPTX
EC6651 COMMUNICATION ENGINEERING UNIT 4
PPT
Spread Spectrum.ppt
PDF
Chapter 9 - Spread Spectrum 9e
PPTX
Lecture 12 FHSS CDMA 26th lecture January.pptx
PPTX
Spread Spectrum
PPT
Topic: Spread Spectrum
PPT
Lecture 5
PPTX
spread spectrum in digital communication
PDF
Microsoft PowerPoint - Spread Spectrum.pptx.pdf
09-SpreadSpectrum.ppt
09 spread spectrum
Spread Spectrum Data communication chapter 9
09-SpreadSpectrum.ppt
SpreadSpectrum direct sequence for communication
CS553_ST7_Ch09-SpreadSpectrum 23.pptx
spread spectrum technique
8 spread spectrum
Lecture spread spectrum
Ch11 spread spectrum
EC6651 COMMUNICATION ENGINEERING UNIT 4
Spread Spectrum.ppt
Chapter 9 - Spread Spectrum 9e
Lecture 12 FHSS CDMA 26th lecture January.pptx
Spread Spectrum
Topic: Spread Spectrum
Lecture 5
spread spectrum in digital communication
Microsoft PowerPoint - Spread Spectrum.pptx.pdf

Recently uploaded (20)

PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PPTX
AQUEEL MUSHTAQUE FAKIH COMPUTER CENTER .
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PPTX
Presentation - Principles of Instructional Design.pptx
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PDF
Streamline Vulnerability Management From Minimal Images to SBOMs
PPTX
Information-Technology-in-Human-Society.pptx
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PPTX
How to Convert Tickets Into Sales Opportunity in Odoo 18
PDF
Human Computer Interaction Miterm Lesson
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Identification of potential depression in social media posts
PDF
SaaS reusability assessment using machine learning techniques
PDF
CCUS-as-the-Missing-Link-to-Net-Zero_AksCurious.pdf
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
CEH Module 2 Footprinting CEH V13, concepts
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
AQUEEL MUSHTAQUE FAKIH COMPUTER CENTER .
Co-training pseudo-labeling for text classification with support vector machi...
Rapid Prototyping: A lecture on prototyping techniques for interface design
Presentation - Principles of Instructional Design.pptx
giants, standing on the shoulders of - by Daniel Stenberg
A symptom-driven medical diagnosis support model based on machine learning te...
Build Real-Time ML Apps with Python, Feast & NoSQL
Streamline Vulnerability Management From Minimal Images to SBOMs
Information-Technology-in-Human-Society.pptx
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
How to Convert Tickets Into Sales Opportunity in Odoo 18
Human Computer Interaction Miterm Lesson
Advancing precision in air quality forecasting through machine learning integ...
Identification of potential depression in social media posts
SaaS reusability assessment using machine learning techniques
CCUS-as-the-Missing-Link-to-Net-Zero_AksCurious.pdf
Connector Corner: Transform Unstructured Documents with Agentic Automation
Early detection and classification of bone marrow changes in lumbar vertebrae...
CEH Module 2 Footprinting CEH V13, concepts

09 spread spectrum

  • 1. Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum
  • 2. Spread Spectrum All creative people want to do the unexpected. — Ecstasy and Me: My Life as a Woman , Hedy Lamarr
  • 3. Spread Spectrum important encoding method for wireless communications analog & digital data with analog signal spreads data over wide bandwidth makes jamming and interception harder two approaches, both in use: Frequency Hopping Direct Sequence
  • 4. General Model of Spread Spectrum System
  • 5. Spread Spectrum Advantages immunity from noise and multipath distortion can hide / encrypt signals several users can share same higher bandwidth with little interference CDM/CDMA Mobile telephones
  • 6. Pseudorandom Numbers generated by a deterministic algorithm not actually random but if algorithm good, results pass reasonable tests of randomness starting from an initial seed need to know algorithm and seed to predict sequence hence only receiver can decode signal
  • 7. Frequency Hopping Spread Spectrum (FHSS) signal is broadcast over seemingly random series of frequencies receiver hops between frequencies in sync with transmitter eavesdroppers hear unintelligible blips jamming on one frequency affects only a few bits
  • 10. Frequency Hopping Spread Spectrum System (Receiver)
  • 11. Slow and Fast FHSS commonly use multiple FSK (MFSK) have frequency shifted every T c seconds duration of signal element is T s seconds Slow FHSS has T c  T s Fast FHSS has T c < T s FHSS quite resistant to noise or jamming with fast FHSS giving better performance
  • 14. Direct Sequence Spread Spectrum (DSSS) each bit is represented by multiple bits using a spreading code this spreads signal across a wider frequency band has performance similar to FHSS
  • 15. Direct Sequence Spread Spectrum Example
  • 16. Direct Sequence Spread Spectrum System
  • 18. Approximate Spectrum of DSSS Signal
  • 19. Code Division Multiple Access (CDMA) a multiplexing technique used with spread spectrum given a data signal rate D break each bit into k chips according to a fixed chipping code specific to each user resulting new channel has chip data rate kD chips per second can have multiple channels superimposed
  • 22. Summary looked at use of spread spectrum techniques: FHSS DSSS CDMA

Editor's Notes

  • #2: Lecture slides prepared by Dr Lawrie Brown (UNSW@ADFA) for “Data and Computer Communications”, 8/e, by William Stallings, Chapter 9 “Spread Spectrum”.
  • #3: This quote is from the start of Stallings DCC8e Ch9.
  • #4: Spread spectrum is an increasingly important form of encoding for wireless communications. It it can be used to transmit either analog or digital data, using an analog signal.The basic idea of spread spectrum is to modulate the signal so as to increase significantly the bandwidth (spread the spectrum) of the signal to be transmitted. It was initially developed for military and intelligence requirements. The use of spread spectrum makes jamming and interception more difficult and provides improved reception. The first type of spread spectrum developed is known as frequency hopping. A more recent type of spread spectrum is direct sequence. Both of these techniques are used in various wireless communications standards and products.
  • #5: Stallings DCC8e Figure 9.1 highlights the key characteristics of any spread spectrum system. Input is fed into a channel encoder that produces an analog signal with a relatively narrow bandwidth around some center frequency. This signal is further modulated using a sequence of digits known as a spreading code or spreading sequence. Typically, but not always, the spreading code is generated by a pseudonoise, or pseudorandom number, generator. The effect of this modulation is to increase significantly the bandwidth (spread the spectrum) of the signal to be transmitted. On the receiving end, the same digit sequence is used to demodulate the spread spectrum signal. Finally, the signal is fed into a channel decoder to recover the data.
  • #6: Several advantages can be gained from this apparent waste of spectrum by this approach: • The signals gains immunity from various kinds of noise and multipath distortion. The earliest applications of spread spectrum were military, where it was used for its immunity to jamming. • It can also be used for hiding and encrypting signals. Only a recipient who knows the spreading code can recover the encoded information. • Several users can independently use the same higher bandwidth with very little interference. This property is used in cellular telephony applications, with a technique know as code division multiplexing (CDM) or code division multiple access (CDMA).
  • #7: A comment about pseudorandom numbers is in order. These numbers are generated by an algorithm using some initial value called the seed. The algorithm is deterministic and therefore produces sequences of numbers that are not statistically random. However, if the algorithm is good, the resulting sequences will pass many reasonable tests of randomness. Such numbers are often referred to as pseudorandom numbers. The important point is that unless you know the algorithm and the seed, it is impractical to predict the sequence. Hence, only a receiver that shares this information with a transmitter will be able to decode the signal successfully.
  • #8: With frequency-hopping spread spectrum (FHSS), the signal is broadcast over a seemingly random series of radio frequencies, hopping from frequency to frequency at fixed intervals. A receiver, hopping between frequencies in synchronization with the transmitter, picks up the message. Would-be eavesdroppers hear only unintelligible blips. Attempts to jam the signal on one frequency succeed only at knocking out a few bits of it.
  • #9: Stallings DCC8e Figure 9.2 shows an example of a frequency-hopping signal. A number of channels are allocated for the FH signal. Typically, there are 2 k carrier frequencies forming 2 k channels. The spacing between carrier frequencies and hence the width of each channel usually corresponds to the bandwidth of the input signal. The transmitter operates in one channel at a time for a fixed interval; for example, the IEEE 802.11 standard uses a 300-ms interval. During that interval, some number of bits (possibly a fraction of a bit, as discussed subsequently) is transmitted using some encoding scheme. A spreading code dictates the sequence of channels used. Both transmitter and receiver use the same code to tune into a sequence of channels in synchronization.
  • #10: Stallings DCC8e Figure 9.3 shows a typical block diagram for a frequency-hopping system. For transmission, binary data are fed into a modulator using some digital-to-analog encoding scheme, such as frequency shift keying (FSK) or binary phase shift keying (BPSK). The resulting signal s d ( t ) is centered on some base frequency. A pseudonoise (PN), or pseudorandom number, source serves as an index into a table of frequencies; this is the spreading code referred to previously. Each k bits of the PN source specifies one of the 2 k carrier frequencies. At each successive interval (each k PN bits), a new carrier frequency is selected. The frequency synthesizer generates a constant-frequency tone whose frequency hops among a set of 2 k frequencies, with the hopping pattern determined by k bits from the PN sequence. This is known as the spreading or chipping signal c ( t ). This is then modulated by the signal produced from the initial modulator to produce a new signal with the same shape but now centered on the selected carrier frequency. A bandpass filter is used to block the difference frequency and pass the sum frequency, yielding the final FHSS signal s ( t ).
  • #11: On reception, Stallings DCC8e Figure 9.3 shows that the spread spectrum signal is demodulated using the same sequence of PN-derived frequencies and then demodulated to produce the output data. At the receiver, a signal of the form s ( t ) defined on the previous slide, will be received. This is multiplied by a replica of the spreading signal to yield a product signal. A bandpass filter is used to block the sum frequency and pass the difference frequency, which is then demodulated to recover the binary data.
  • #12: A common modulation technique used in conjunction with FHSS is multiple FSK (MFSK), which uses M = 2 L different frequencies to encode the digital input L bits at a time (see Chapter 5). For FHSS, the MFSK signal is translated to a new frequency every T c seconds by modulating the MFSK signal with the FHSS carrier signal. The effect is to translate the MFSK signal into the appropriate FHSS channel. For a data rate of R , the duration of a bit is T = 1/ R seconds and the duration of a signal element is T s = LT seconds. If T c is greater than or equal to T s , the spreading modulation is referred to as slow-frequency-hop spread spectrum; otherwise it is known as fast-frequency-hop spread spectrum. Typically, a large number of frequencies is used in FHSS so that bandwidth of the FHSS signal is much larger than that of the original MFSK signal . One benefit of this is that a large value of k results in a system that is quite resistant to jamming. If frequency hopping is used, the jammer must jam all 2 k frequencies. With a fixed power, this reduces the jamming power in any one frequency band to S j /2 k . In general, fast FHSS provides improved performance compared to slow FHSS in the face of noise or jamming, as will discuss shortly.
  • #13: Stallings DCC8e Figure 9.4 shows an example of slow FHSS, using the MFSK example from Stallings DCC8e Figure 5.9. Here we have M = 4, which means that four different frequencies are used to encode the data input 2 bits at a time. Each signal element is a discrete frequency tone, and the total MFSK bandwidth is W d = Mf d . We use an FHSS scheme with k = 2. That is, there are 4 = 2 k different channels, each of width W d . The total FHSS bandwidth is W s = 2 k W d . Each 2 bits of the PN sequence is used to select one of the four channels. That channel is held for a duration of two signal elements, or four bits ( T c = 2 T s = 4 T ).
  • #14: Stallings DCC8e Figure 9.5 shows an example of fast FHSS, using the same MFSK example. Again, M = 4 and k = 2. In this case, however, each signal element is represented by two frequency tones. Again, W d = Mf d and W s = 2 k W d . In this example T s = 2 T c = 2 T . In general, fast FHSS provides improved performance compared to slow FHSS in the face of noise or jamming. For example, if three or more frequencies (chips) are used for each signal element, the receiver can decide which signal element was sent on the basis of a majority of the chips being correct.
  • #15: With direct sequence spread spectrum (DSSS), each bit in the original signal is represented by multiple bits in the transmitted signal, using a spreading code. The spreading code spreads the signal across a wider frequency band in direct proportion to the number of bits used. Therefore, a 10-bit spreading code spreads the signal across a frequency band that is 10 times greater than a 1-bit spreading code.
  • #16: One technique with direct sequence spread spectrum is to combine the digital information stream with the spreading code bit stream using an exclusive-OR (XOR). Stallings DCC8e Figure 9.6 shows an example. Note that an information bit of one inverts the spreading code bits in the combination, while an information bit of zero causes the spreading code bits to be transmitted without inversion. The combination bit stream has the data rate of the original spreading code sequence, so it has a wider bandwidth than the information stream. In this example, the spreading code bit stream is clocked at four times the information rate.
  • #17: To see how this technique works out in practice, assume that a BPSK modulation scheme is to be used. Rather than represent binary data with 1 and 0, it is more convenient for our purposes to use +1 and –1 to represent the two binary digits. To produce the DSSS signal, we multiply the BPSK signal by c ( t ), which is the PN sequence taking on values of +1 and –1: s ( t ) = A d ( t ) c ( t ) cos(2π f c t ) : Equation (9.5) At the receiver, the incoming signal is multiplied again by c ( t ). But c ( t )  c ( t ) = 1 and therefore the original signal is recovered. Equation (9.5) can be interpreted in two ways, leading to two different implementations. The first interpretation is to first multiply d ( t ) and c ( t ) together and then perform the BPSK modulation. That is the interpretation we have been discussing. Alternatively, we can first perform the BPSK modulation on the data stream d ( t ) to generate the data signal s d ( t ). This signal can then be multiplied by c ( t ). An implementation using the second interpretation is shown in Stallings DCC8e Figure 9.7 above.
  • #18: Stallings DCC8e Figure 9.8 is an example of the approach discussed on the previous slide.
  • #19: The spectrum spreading achieved by the direct sequence technique is easily determined ( Stallings DCC8e Figure 9.9 above). In our example, the information signal has a bit width of T , which is equivalent to a data rate of 1/ T . In that case, the spectrum of the signal, depending on the encoding technique, is roughly 2/ T . Similarly, the spectrum of the PN signal is 2/ T c . Figure 9.9c shows the resulting spectrum spreading. The amount of spreading that is achieved is a direct result of the data rate of the PN stream. As with FHSS, we can get some insight into the performance of DSSS by looking at its effectiveness against jamming. Let us assume a simple jamming signal at the center frequency of the DSSS system. Can show the carrier power S j is spread over a bandwidth of approximately 2/ T c . However, the BPSK demodulator (Figure 9.7) following the DSSS despreader includes a bandpass filter matched to the BPSK data, with bandwidth of 2/ T . Thus, most of the jamming power is filtered. The jamming power has been reduced by a factor of ( T c / T ) through the use of spread spectrum. The result is similar to the result for FHSS.
  • #20: CDMA is a multiplexing technique used with spread spectrum. The scheme works in the following manner. We start with a data signal with rate D , which we call the bit data rate. We break each bit into k chips according to a fixed pattern that is specific to each user, called the user’s code, or chipping code . The new channel has a chip data rate, or chipping rate , of kD chips per second. With CDMA, the receiver can sort out transmission from the desired sender, even when there may be other users broadcasting in the same cell.
  • #21: As an illustration we consider a simple example with k = 6. It is simplest to characterize a chipping code as a sequence of 1s and –1s. Figure 9.10 shows the codes for three users, A, B, and C, each of which is communicating with the same base station receiver, R. Thus, the code for user A is c A = &lt;1, –1, –1, 1, –1, 1&gt;. Similarly, user B has code c B = &lt;1, 1, –1, –1, 1, 1&gt;, and user C has c C = &lt;1, 1, –1, 1, 1, –1&gt;. We now consider the case of user A communicating with the base station. The base station is assumed to know A’s code. For simplicity, we assume that communication is already synchronized so that the base station knows when to look for codes. If A wants to send a 1 bit, A transmits its code as a chip pattern &lt;1, –1, –1, 1, –1, 1&gt;. If a 0 bit is to be sent, A transmits the complement (1s and –1s reversed) of its code, &lt;–1, 1, 1, –1, 1, –1&gt;. At the base station the receiver decodes the chip patterns. If the decoder is linear and if A and B transmit signals s A and s B , respectively, at the same time, then S A  ( s A + s B ) = S A  ( s A ) + S A  ( s B ) = S A  ( s A ) since the decoder ignores B when it is using A’s code. The codes of A and B that have the property that S A  ( c B ) = S B  ( c A ) = 0 are called orthogonal . Using the decoder, S u , the receiver can sort out transmission from u even when there may be other users broadcasting in the same cell. In practice, the CDMA receiver can filter out the contribution from unwanted users or they appear as low-level noise. However, if there are many users competing for the channel with the user the receiver is trying to listen to, or if the signal power of one or more competing signals is too high, perhaps because it is very near the receiver (the “near/far” problem), the system breaks down.
  • #22: Let us now look at CDMA from the viewpoint of a DSSS system using BPSK. Stallings DCC8e Figure 9.11 depicts a configuration in which there are n users, each transmitting using a different, orthogonal, PN sequence (compare Figure 9.7). For each user, the data stream to be transmitted, d i ( t ), is BPSK modulated to produce a signal with a bandwidth of W s and then multiplied by the spreading code for that user, c i ( t ). All of the signals, plus noise, are received at the receiver&apos;s antenna. Suppose that the receiver is attempting to recover the data of user 1. The incoming signal is multiplied by the spreading code of user 1 and then demodulated. The effect of this is to narrow the bandwidth of that portion of the incoming signal corresponding to user 1 to the original bandwidth of the unspread signal, which is proportional to the data rate. Incoming signals from other users are not despread by the spreading code from user 1 and hence retain their bandwidth of W s . Thus the unwanted signal energy remains spread over a large bandwidth and the wanted signal is concentrated in a narrow bandwidth. The bandpass filter at the demodulator can therefore recover the desired signal.
  • #23: Chapter 9 summary.