SlideShare una empresa de Scribd logo
1 de 26
Data and Computer
Communications
Chapter 9 – Spread Spectrum
Spread Spectrum
 important encoding method for

wireless

communications
 analog & digital data with analog signal
 spreads data over wide bandwidth
 makes jamming and interception harder
 two approaches, both in use:



Frequency Hopping
Direct Sequence
General Model of Spread
Spectrum System
Spread Spectrum Advantages
 immunity from

noise and multipath

distortion
 can hide / encrypt signals
 several users can share same higher
bandwidth with little interference


CDM/CDMA Mobile telephones
Pseudorandom Numbers
 generated by a deterministic algorithm



not actually random
but if algorithm good, results pass reasonable
tests of randomness

 starting from an initial seed
 need to know algorithm

and seed to

predict sequence
 hence only receiver can decode signal
Frequency Hopping Spread
Spectrum (FHSS)
 signal is broadcast over seemingly

random series of frequencies
 receiver hops between frequencies in sync
with transmitter
 eavesdroppers hear unintelligible blips
 jamming on one frequency affects only a
few bits
Frequency Hopping Example
FHSS (Transmitter)
Frequency Hopping Spread
Spectrum System (Receiver)
Slow and Fast FHSS
 commonly use multiple FSK (MFSK)
 have frequency shifted every T c
 duration of signal element is T s
 Slow FHSS has Tc

seconds

≥ Ts

 Fast FHSS has Tc

seconds

< Ts

 FHSS quite resistant to noise or jamming


with fast FHSS giving better performance
Slow MFSK FHSS
Fast MFSK FHSS
Direct Sequence Spread
Spectrum (DSSS)
 each bit is represented by

multiple bits

using a spreading code
 this spreads signal across a wider
frequency band
 has performance similar to FHSS
Direct Sequence Spread
Spectrum Example
Direct Sequence Spread
Spectrum System
DSSS Example Using BPSK
Approximate
Spectrum of
DSSS Signal
Code Division Multiple
Access (CDMA)
 a multiplexing

technique used with spread

spectrum
 given a data signal rate D
 break each bit into k chips according to a
fixed chipping code specific to each user
 resulting new channel has chip data rate
kD chips per second
 can have multiple channels superimposed
CDMA Example
CDMA for DSSS
Problem
# Consider the seven-channel CDMA shown in
the following figure. Enlist the user code for
each channel. A positive sum is decoded (at
the receiver) as ‘1’ and a negative sum is
decoded as ‘0’. If all the channels are
transmitting as shown, determine whether the
receiver detects the correct bit of channel 1.
Problem
Orthogonal Sequence
Sequence is generated by Walsh Table:
W1 = [+1]
W2 = W1
W1

W1
!W1

W4 = W2 W2
W2 !W2
Summary
 looked at use of spread spectrum

techniques:
 FHSS
 DSSS
 CDMA

Más contenido relacionado

La actualidad más candente

Diversity techniques for wireless communication
Diversity techniques for wireless communicationDiversity techniques for wireless communication
Diversity techniques for wireless communicationIAEME Publication
 
Rayleigh Fading Channel In Mobile Digital Communication System
Rayleigh Fading Channel In Mobile Digital Communication SystemRayleigh Fading Channel In Mobile Digital Communication System
Rayleigh Fading Channel In Mobile Digital Communication SystemOUM SAOKOSAL
 
Introduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMAIntroduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMABidhan Ghimire
 
Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)Gagan Randhawa
 
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationSahar Foroughi
 
Power delay profile,delay spread and doppler spread
Power delay profile,delay spread and doppler spreadPower delay profile,delay spread and doppler spread
Power delay profile,delay spread and doppler spreadManish Srivastava
 
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMAL
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMALOFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMAL
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMALprem kamal
 
Link power and rise time budget analysis
Link power and rise time budget analysisLink power and rise time budget analysis
Link power and rise time budget analysisCKSunith1
 
Sonet (synchronous optical networking )
Sonet (synchronous optical networking )Sonet (synchronous optical networking )
Sonet (synchronous optical networking )Hamza Sajjad
 
Orthogonal frequency division multiplexing (ofdm)
Orthogonal frequency division multiplexing (ofdm)Orthogonal frequency division multiplexing (ofdm)
Orthogonal frequency division multiplexing (ofdm)Dilip Mathuria
 
The Wireless Channel Propagation
The Wireless Channel PropagationThe Wireless Channel Propagation
The Wireless Channel PropagationPei-Che Chang
 
Interferences
InterferencesInterferences
InterferencesAJAL A J
 

La actualidad más candente (20)

Diversity techniques for wireless communication
Diversity techniques for wireless communicationDiversity techniques for wireless communication
Diversity techniques for wireless communication
 
Rayleigh Fading Channel In Mobile Digital Communication System
Rayleigh Fading Channel In Mobile Digital Communication SystemRayleigh Fading Channel In Mobile Digital Communication System
Rayleigh Fading Channel In Mobile Digital Communication System
 
Introduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMAIntroduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMA
 
Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)
 
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless Communication
 
Power delay profile,delay spread and doppler spread
Power delay profile,delay spread and doppler spreadPower delay profile,delay spread and doppler spread
Power delay profile,delay spread and doppler spread
 
Mimo
MimoMimo
Mimo
 
Spread spectrum modulation
Spread spectrum modulationSpread spectrum modulation
Spread spectrum modulation
 
Propagation Models
Propagation ModelsPropagation Models
Propagation Models
 
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMAL
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMALOFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMAL
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMAL
 
Link power and rise time budget analysis
Link power and rise time budget analysisLink power and rise time budget analysis
Link power and rise time budget analysis
 
Sonet (synchronous optical networking )
Sonet (synchronous optical networking )Sonet (synchronous optical networking )
Sonet (synchronous optical networking )
 
Ee424 fading
Ee424 fadingEe424 fading
Ee424 fading
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
orthogonal frequency division multiplexing(OFDM)
orthogonal frequency division multiplexing(OFDM)orthogonal frequency division multiplexing(OFDM)
orthogonal frequency division multiplexing(OFDM)
 
Orthogonal frequency division multiplexing (ofdm)
Orthogonal frequency division multiplexing (ofdm)Orthogonal frequency division multiplexing (ofdm)
Orthogonal frequency division multiplexing (ofdm)
 
The Wireless Channel Propagation
The Wireless Channel PropagationThe Wireless Channel Propagation
The Wireless Channel Propagation
 
Interferences
InterferencesInterferences
Interferences
 
Propagation mechanisms
Propagation mechanismsPropagation mechanisms
Propagation mechanisms
 
MIMO in 15 minutes
MIMO in 15 minutesMIMO in 15 minutes
MIMO in 15 minutes
 

Destacado

Määramatus 4
Määramatus 4Määramatus 4
Määramatus 4aivarorav
 
Consumer Basics for Renewable Energy
Consumer Basics for Renewable EnergyConsumer Basics for Renewable Energy
Consumer Basics for Renewable EnergyRockyViewCounty
 
Imaginary Boundary - KIBO
Imaginary Boundary - KIBOImaginary Boundary - KIBO
Imaginary Boundary - KIBONuno Marçal
 
GS1/Oliot ALE and Next
GS1/Oliot ALE and NextGS1/Oliot ALE and Next
GS1/Oliot ALE and NextDaeyoung Kim
 
TIGA Guide to Investment For London Game Start-ups
TIGA Guide to Investment For London Game Start-upsTIGA Guide to Investment For London Game Start-ups
TIGA Guide to Investment For London Game Start-upsJohn Spindler
 
Docker for Fun and Profit, Devoxx 2014
Docker for Fun and Profit, Devoxx 2014Docker for Fun and Profit, Devoxx 2014
Docker for Fun and Profit, Devoxx 2014Carl Quinn
 
грамоты
грамотыграмоты
грамотыkillaruns
 
203385937 o-net-54-ปีการศึกษา-2553
203385937 o-net-54-ปีการศึกษา-2553203385937 o-net-54-ปีการศึกษา-2553
203385937 o-net-54-ปีการศึกษา-2553apichaya413
 
план урока
план урокаплан урока
план урокаkillaruns
 
Goldplated Tabletops(Premium Products) - 1
Goldplated Tabletops(Premium Products) - 1Goldplated Tabletops(Premium Products) - 1
Goldplated Tabletops(Premium Products) - 1Avik Enterprises
 
мы разные
мы разныемы разные
мы разныеkillaruns
 
Els amics sempre s'ajuden
Els amics sempre s'ajudenEls amics sempre s'ajuden
Els amics sempre s'ajudencarmeo
 
Branding amilia astrom - the riverstream
Branding   amilia astrom - the riverstreamBranding   amilia astrom - the riverstream
Branding amilia astrom - the riverstreamemilia åström
 
Informe historia medica
Informe historia medicaInforme historia medica
Informe historia medicaangiedaiana
 

Destacado (20)

Evaluation question 1 honica
Evaluation question 1 honicaEvaluation question 1 honica
Evaluation question 1 honica
 
Määramatus 4
Määramatus 4Määramatus 4
Määramatus 4
 
Consumer Basics for Renewable Energy
Consumer Basics for Renewable EnergyConsumer Basics for Renewable Energy
Consumer Basics for Renewable Energy
 
Teamwork
TeamworkTeamwork
Teamwork
 
Imaginary Boundary - KIBO
Imaginary Boundary - KIBOImaginary Boundary - KIBO
Imaginary Boundary - KIBO
 
Ucsf 4 2
Ucsf 4 2Ucsf 4 2
Ucsf 4 2
 
Unaico ofc
Unaico ofcUnaico ofc
Unaico ofc
 
GS1/Oliot ALE and Next
GS1/Oliot ALE and NextGS1/Oliot ALE and Next
GS1/Oliot ALE and Next
 
Basic concept of q c
Basic concept of q cBasic concept of q c
Basic concept of q c
 
TIGA Guide to Investment For London Game Start-ups
TIGA Guide to Investment For London Game Start-upsTIGA Guide to Investment For London Game Start-ups
TIGA Guide to Investment For London Game Start-ups
 
Docker for Fun and Profit, Devoxx 2014
Docker for Fun and Profit, Devoxx 2014Docker for Fun and Profit, Devoxx 2014
Docker for Fun and Profit, Devoxx 2014
 
грамоты
грамотыграмоты
грамоты
 
203385937 o-net-54-ปีการศึกษา-2553
203385937 o-net-54-ปีการศึกษา-2553203385937 o-net-54-ปีการศึกษา-2553
203385937 o-net-54-ปีการศึกษา-2553
 
план урока
план урокаплан урока
план урока
 
Goldplated Tabletops(Premium Products) - 1
Goldplated Tabletops(Premium Products) - 1Goldplated Tabletops(Premium Products) - 1
Goldplated Tabletops(Premium Products) - 1
 
мы разные
мы разныемы разные
мы разные
 
Els amics sempre s'ajuden
Els amics sempre s'ajudenEls amics sempre s'ajuden
Els amics sempre s'ajuden
 
Branding amilia astrom - the riverstream
Branding   amilia astrom - the riverstreamBranding   amilia astrom - the riverstream
Branding amilia astrom - the riverstream
 
Informe historia medica
Informe historia medicaInforme historia medica
Informe historia medica
 
60538
6053860538
60538
 

Similar a 09 spread spectrum (20)

09-SpreadSpectrum.ppt
09-SpreadSpectrum.ppt09-SpreadSpectrum.ppt
09-SpreadSpectrum.ppt
 
09 spread spectrum
09 spread spectrum09 spread spectrum
09 spread spectrum
 
8 spread spectrum
8 spread spectrum8 spread spectrum
8 spread spectrum
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
EC6651 COMMUNICATION ENGINEERING UNIT 4
EC6651 COMMUNICATION ENGINEERING UNIT 4EC6651 COMMUNICATION ENGINEERING UNIT 4
EC6651 COMMUNICATION ENGINEERING UNIT 4
 
Topic: Spread Spectrum
Topic: Spread SpectrumTopic: Spread Spectrum
Topic: Spread Spectrum
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
CDMA
CDMACDMA
CDMA
 
Spread Spectrum
Spread SpectrumSpread Spectrum
Spread Spectrum
 
Lect13 multiple access
Lect13 multiple accessLect13 multiple access
Lect13 multiple access
 
Unit-II Data Communication.ppt
Unit-II Data Communication.pptUnit-II Data Communication.ppt
Unit-II Data Communication.ppt
 
Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016Pmit lecture 03_wlan_wireless_network_2016
Pmit lecture 03_wlan_wireless_network_2016
 
cdma
cdmacdma
cdma
 
Ch11 spread spectrum
Ch11 spread spectrumCh11 spread spectrum
Ch11 spread spectrum
 
spread spectrum in digital communication
spread spectrum in digital communicationspread spectrum in digital communication
spread spectrum in digital communication
 
A.pptx
A.pptxA.pptx
A.pptx
 
09-SpreadSpectrum.ppt
09-SpreadSpectrum.ppt09-SpreadSpectrum.ppt
09-SpreadSpectrum.ppt
 
Spread spectrum technologies
Spread spectrum technologiesSpread spectrum technologies
Spread spectrum technologies
 
Dsss final
Dsss finalDsss final
Dsss final
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless Communications
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Último (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

09 spread spectrum

Notas del editor

  1. Spread spectrum is an increasingly important form of encoding for wireless communications. It can be used to transmit either analog or digital data, using an analog signal. The basic idea of spread spectrum is to modulate the signal so as to increase significantly the bandwidth (spread the spectrum) of the signal to be transmitted. It was initially developed for military and intelligence requirements. The use of spread spectrum makes jamming and interception more difficult and provides improved reception. The first type of spread spectrum developed is known as frequency hopping. A more recent type of spread spectrum is direct sequence. Both of these techniques are used in various wireless communications standards and products.
  2. Stallings DCC8e Figure 9.1 highlights the key characteristics of any spread spectrum system. Input is fed into a channel encoder that produces an analog signal with a relatively narrow bandwidth around some center frequency. This signal is further modulated using a sequence of digits known as a spreading code or spreading sequence. Typically, but not always, the spreading code is generated by a pseudonoise, or pseudorandom number, generator. The effect of this modulation is to increase significantly the bandwidth (spread the spectrum) of the signal to be transmitted. On the receiving end, the same digit sequence is used to demodulate the spread spectrum signal. Finally, the signal is fed into a channel decoder to recover the data.
  3. Several advantages can be gained from this apparent waste of spectrum by this approach: • The signals gain immunity from various kinds of noise and multipath distortion. The earliest applications of spread spectrum were military, where it was used for its immunity to jamming. • It can also be used for hiding and encrypting signals. Only a recipient who knows the spreading code can recover the encoded information. • Several users can independently use the same higher bandwidth with very little interference. This property is used in cellular telephony applications, with a technique known as code division multiplexing (CDM) or code division multiple access (CDMA).
  4. A comment about pseudorandom numbers is in order. These numbers are generated by an algorithm using some initial value called the seed. The algorithm is deterministic and therefore produces sequences of numbers that are not statistically random. However, if the algorithm is good, the resulting sequences will pass many reasonable tests of randomness. Such numbers are often referred to as pseudorandom numbers. The important point is that unless you know the algorithm and the seed, it is impractical to predict the sequence. Hence, only a receiver that shares this information with a transmitter will be able to decode the signal successfully.
  5. With frequency-hopping spread spectrum (FHSS), the signal is broadcast over a seemingly random series of radio frequencies, hopping from frequency to frequency at fixed intervals. A receiver, hopping between frequencies in synchronization with the transmitter, picks up the message. Would-be eavesdroppers hear only unintelligible blips. Attempts to jam the signal on one frequency succeed only at knocking out a few bits of it.
  6. Stallings DCC8e Figure 9.2 shows an example of a frequency-hopping signal. A number of channels are allocated for the FH signal. Typically, there are 2k carrier frequencies forming 2k channels. The spacing between carrier frequencies and hence the width of each channel usually corresponds to the bandwidth of the input signal. The transmitter operates in one channel at a time for a fixed interval; for example, the IEEE 802.11 standard uses a 300-ms interval. During that interval, some number of bits (possibly a fraction of a bit, as discussed subsequently) is transmitted using some encoding scheme. A spreading code dictates the sequence of channels used. Both transmitter and receiver use the same code to tune into a sequence of channels in synchronization.
  7. Stallings DCC8e Figure 9.3 shows a typical block diagram for a frequency-hopping system. For transmission, binary data are fed into a modulator using some digital-to-analog encoding scheme, such as frequency shift keying (FSK) or binary phase shift keying (BPSK). The resulting signal sd(t) is centered on some base frequency. A pseudonoise (PN), or pseudorandom number, source serves as an index into a table of frequencies; this is the spreading code referred to previously. Each k bits of the PN source specifies one of the 2k carrier frequencies. At each successive interval (each k PN bits), a new carrier frequency is selected. The frequency synthesizer generates a constant-frequency tone whose frequency hops among a set of 2k frequencies, with the hopping pattern determined by k bits from the PN sequence. This is known as the spreading or chipping signal c(t). This is then modulated by the signal produced from the initial modulator to produce a new signal with the same shape but now centered on the selected carrier frequency. A bandpass filter is used to block the difference frequency and pass the sum frequency, yielding the final FHSS signal s(t).
  8. On reception, Stallings DCC8e Figure 9.3 shows that the spread spectrum signal is demodulated using the same sequence of PN-derived frequencies and then demodulated to produce the output data. At the receiver, a signal of the form s(t) defined on the previous slide, will be received. This is multiplied by a replica of the spreading signal to yield a product signal. A bandpass filter is used to block the sum frequency and pass the difference frequency, which is then demodulated to recover the binary data.
  9. A common modulation technique used in conjunction with FHSS is multiple FSK (MFSK), which uses M = 2L different frequencies to encode the digital input L bits at a time (see Chapter 5). For FHSS, the MFSK signal is translated to a new frequency every Tc seconds by modulating the MFSK signal with the FHSS carrier signal. The effect is to translate the MFSK signal into the appropriate FHSS channel. For a data rate of R, the duration of a bit is T = 1/R seconds and the duration of a signal element is Ts = LT seconds. If Tc is greater than or equal to Ts, the spreading modulation is referred to as slow-frequency-hop spread spectrum; otherwise it is known as fast-frequency-hop spread spectrum. Typically, a large number of frequencies is used in FHSS so that bandwidth of the FHSS signal is much larger than that of the original MFSK signal. One benefit of this is that a large value of k results in a system that is quite resistant to jamming. If frequency hopping is used, the jammer must jam all 2k frequencies. With a fixed power, this reduces the jamming power in any one frequency band to Sj/2k. In general, fast FHSS provides improved performance compared to slow FHSS in the face of noise or jamming, as we will discuss shortly.
  10. Stallings DCC8e Figure 9.4 shows an example of slow FHSS, using the MFSK example from Stallings DCC8e Figure 5.9. Here we have M = 4, which means that four different frequencies are used to encode the data input 2 bits at a time. Each signal element is a discrete frequency tone, and the total MFSK bandwidth is Wd = Mfd. We use an FHSS scheme with k = 2. That is, there are 4 = 2k different channels, each of width Wd. The total FHSS bandwidth is Ws = 2kWd. Each 2 bits of the PN sequence is used to select one of the four channels. That channel is held for a duration of two signal elements, or four bits (Tc = 2Ts = 4T).
  11. Stallings DCC8e Figure 9.5 shows an example of fast FHSS, using the same MFSK example. Again, M = 4 and k = 2. In this case, however, each signal element is represented by two frequency tones. Again, Wd = Mfd and Ws = 2kWd. In this example Ts = 2Tc = 2T. In general, fast FHSS provides improved performance compared to slow FHSS in the face of noise or jamming. For example, if three or more frequencies (chips) are used for each signal element, the receiver can decide which signal element was sent on the basis of a majority of the chips being correct.
  12. With direct sequence spread spectrum (DSSS), each bit in the original signal is represented by multiple bits in the transmitted signal, using a spreading code. The spreading code spreads the signal across a wider frequency band in direct proportion to the number of bits used. Therefore, a 10-bit spreading code spreads the signal across a frequency band that is 10 times greater than a 1-bit spreading code.
  13. One technique with direct sequence spread spectrum is to combine the digital information stream with the spreading code bit stream using an exclusive-OR (XOR). Stallings DCC8e Figure 9.6 shows an example. Note that an information bit of one inverts the spreading code bits in the combination, while an information bit of zero causes the spreading code bits to be transmitted without inversion. The combination bit stream has the data rate of the original spreading code sequence, so it has a wider bandwidth than the information stream. In this example, the spreading code bit stream is clocked at four times the information rate.
  14. To see how this technique works out in practice, assume that a BPSK modulation scheme is to be used. Rather than represent binary data with 1 and 0, it is more convenient for our purposes to use +1 and –1 to represent the two binary digits. To produce the DSSS signal, we multiply the BPSK signal by c(t), which is the PN sequence taking on values of +1 and –1: s(t) = A d(t)c(t) cos(2πfct): Equation (9.5) At the receiver, the incoming signal is multiplied again by c(t). But c(t)  c(t) = 1 and therefore the original signal is recovered. Equation (9.5) can be interpreted in two ways, leading to two different implementations. The first interpretation is to first multiply d(t) and c(t) together and then perform the BPSK modulation. That is the interpretation we have been discussing. Alternatively, we can first perform the BPSK modulation on the data stream d(t) to generate the data signal sd(t). This signal can then be multiplied by c(t). An implementation using the second interpretation is shown in Stallings DCC8e Figure 9.7 above.
  15. Stallings DCC8e Figure 9.8 is an example of the approach discussed on the previous slide.
  16. The spectrum spreading achieved by the direct sequence technique is easily determined (Stallings DCC8e Figure 9.9 above). In our example, the information signal has a bit width of T, which is equivalent to a data rate of 1/T. In that case, the spectrum of the signal, depending on the encoding technique, is roughly 2/T. Similarly, the spectrum of the PN signal is 2/Tc. Figure 9.9c shows the resulting spectrum spreading. The amount of spreading that is achieved is a direct result of the data rate of the PN stream. As with FHSS, we can get some insight into the performance of DSSS by looking at its effectiveness against jamming. Let us assume a simple jamming signal at the center frequency of the DSSS system. Can show the carrier power Sj is spread over a bandwidth of approximately 2/Tc. However, the BPSK demodulator (Figure 9.7) following the DSSS despreader includes a bandpass filter matched to the BPSK data, with bandwidth of 2/T. Thus, most of the jamming power is filtered. The jamming power has been reduced by a factor of (Tc /T) through the use of spread spectrum. The result is similar to the result for FHSS.
  17. CDMA is a multiplexing technique used with spread spectrum. The scheme works in the following manner. We start with a data signal with rate D, which we call the bit data rate. We break each bit into k chips according to a fixed pattern that is specific to each user, called the user’s code, or chipping code. The new channel has a chip data rate, or chipping rate, of kD chips per second. With CDMA, the receiver can sort out transmission from the desired sender, even when there may be other users broadcasting in the same cell.
  18. As an illustration we consider a simple example with k = 6. It is simplest to characterize a chipping code as a sequence of 1s and –1s. Figure 9.10 shows the codes for three users, A, B, and C, each of which is communicating with the same base station receiver, R. Thus, the code for user A is cA = &lt;1, –1, –1, 1, –1, 1&gt;. Similarly, user B has code cB = &lt;1, 1, –1, –1, 1, 1&gt;, and user C has cC = &lt;1, 1, –1, 1, 1, –1&gt;. We now consider the case of user A communicating with the base station. The base station is assumed to know A’s code. For simplicity, we assume that communication is already synchronized so that the base station knows when to look for codes. If A wants to send a 1 bit, A transmits its code as a chip pattern &lt;1, –1, –1, 1, –1, 1&gt;. If a 0 bit is to be sent, A transmits the complement (1s and –1s reversed) of its code, &lt;–1, 1, 1, –1, 1, –1&gt;. At the base station the receiver decodes the chip patterns. If the decoder is linear and if A and B transmit signals sA and sB, respectively, at the same time, then SA (sA + sB) = SA (sA) + SA (sB) = SA (sA) since the decoder ignores B when it is using A’s code. The codes of A and B that have the property that SA (cB) = SB (cA) = 0 are called orthogonal. Using the decoder, Su, the receiver can sort out transmission from u even when there may be other users broadcasting in the same cell. In practice, the CDMA receiver can filter out the contribution from unwanted users or they appear as low-level noise. However, if there are many users competing for the channel with the user the receiver is trying to listen to, or if the signal power of one or more competing signals is too high, perhaps because it is very near the receiver (the “near/far” problem), the system breaks down.
  19. Let us now look at CDMA from the viewpoint of a DSSS system using BPSK. Stallings DCC8eFigure 9.11 depicts a configuration in which there are n users, each transmitting using a different, orthogonal, PN sequence (compare Figure 9.7). For each user, the data stream to be transmitted, di(t), is BPSK modulated to produce a signal with a bandwidth of Ws and then multiplied by the spreading code for that user, ci(t). All of the signals, plus noise, are received at the receiver&apos;s antenna. Suppose that the receiver is attempting to recover the data of user 1. The incoming signal is multiplied by the spreading code of user 1 and then demodulated. The effect of this is to narrow the bandwidth of that portion of the incoming signal corresponding to user 1 to the original bandwidth of the unspread signal, which is proportional to the data rate. Incoming signals from other users are not despread by the spreading code from user 1 and hence retain their bandwidth of Ws. Thus the unwanted signal energy remains spread over a large bandwidth and the wanted signal is concentrated in a narrow bandwidth. The bandpass filter at the demodulator can therefore recover the desired signal.
  20. Chapter 9 summary.