SlideShare a Scribd company logo
1 of 14
Prof. Neeraj Bhargava
Pramod Singh Rathore
Department of Computer Science
School of Engineering & System Sciences,
MDS, University Ajmer, Rajasthan, India
1
•The Spread Spectrum Technology (S.S.T) is a technique
used for transmitting radio or telecommunications
signals.
•It is Wideband radio Technology use in requiring High
Security.
• These techniques are used for a variety of reasons,
including the establishment of secure communications,
increasing resistance to natural Interference , Noise
and Jamming.
•It use an Hopping Modulation Technique for Signal
Transmission.
Conversion of Signal
 The main advantage of spread spectrum
communication technique is to prevent
“INTERFERENCE” whether it is intentional or
unintentional.
 The signals modulated with these techniques are
hard to interfere and cannot be jammed. An intruder
with no official access is never allowed to crack them.
Hence, these techniques are used for military
purposesas per its Security Reasons.
 There is Pseudo-Noise Sequence used for
Transmitting Signal.
Basically there are 4 Spread Spectrum Techniques i.e:-
 Direct Sequence Spread Spectrum (D.S.S.S)
 Frequency Hopped Spread Spectrum (F.H.S.S)
 Time Hopped Spread Spectrum (T.H.S.S)
 Pulse Hopped Spread Spectrum (P.H.S.S)
 Direct Sequence Spread Spectrum (D.S.S.S)
 It is an popular technique adopted by CDMA & 3G wireless
communication.
 Data signal is multiplied by spreading code and resulting
signal occupies a much higher frequency band.
 Spreading code is Pseudo-random sequence.
 Whenever a user wants to send data using this DSSS
technique, each and every bit of the user data is multiplied by
a secret code, called as chipping code.
Spreading Information with Pseudo random sequence.
“This chipping code is nothing but the spreading code which is multiplied
with the original message and transmitted. The receiver uses the same
code to retrieve the original message.”
 Frequency Hopped Spread Spectrum (F.H.S.S)
 It is a technique use by Bluetooth and other
critical military communication system for
Security & simplicity.
 The user signal first to be Digitized before
modulating itself.
 The frequencies of the data are hopped from
one to another in order to provide a secure
transmission.
In a frequency-hopping spread spectrum (FHSS) system, the
transmitted signal is spread across multiple channels, as shown in
Figure below.
In the example of Figure , the full bandwidth is divided into 8
channels, centered at f1 through f8. The signal "hops" between them
in the following sequence: f5, f8, f3, f6, f1, f7, f4, f2.
FHSS DSSS / CDMA
Multiple frequencies are used Single frequency is used
Hard to find the user’s
frequency at any instant of time
User frequency, once allotted is
always the same
Frequency reuse is allowed Frequency reuse is not allowed
Sender need not wait Sender has to wait if the
spectrum is busy
Power strength of the signal is
high
Power strength of the signal is
low
Stronger and penetrates
through the obstacles
It is weaker compared to FHSS
It is never affected by
interference
It can be affected by
interference
It is cheaper It is expensive
This is the commonly used
technique
This technique is not frequently
used
 Reduced Crosstalk Interference
 Better Voice Quality/Data and less Noise
 Inherent Security
 Longer Operation Distances
 Hard to Intercept
 Harder to Jammed
Spread Spectrum promises several benefits such
as higher capacity and ability to resist multipath
propagation.
Spread Spectrum signal are difficult to intercept
for an unauthorized person, they are easily
hidden.
For an unauthorized person it is difficult to even
detect their presence in many cases.
13
14

More Related Content

Similar to 5.spread spectrum technology

Chapter 9 - Spread Spectrum 9e
Chapter 9 - Spread Spectrum 9eChapter 9 - Spread Spectrum 9e
Chapter 9 - Spread Spectrum 9e
adpeer
 
How does frequency hopping affect security precautions, if it all..pdf
How does frequency hopping affect security precautions, if it all..pdfHow does frequency hopping affect security precautions, if it all..pdf
How does frequency hopping affect security precautions, if it all..pdf
RBMADU
 
Modulation schemes 8
Modulation schemes 8Modulation schemes 8
Modulation schemes 8
jandrewsxu
 

Similar to 5.spread spectrum technology (20)

FHSS
FHSSFHSS
FHSS
 
Topic: Spread Spectrum
Topic: Spread SpectrumTopic: Spread Spectrum
Topic: Spread Spectrum
 
Chapter 9 - Spread Spectrum 9e
Chapter 9 - Spread Spectrum 9eChapter 9 - Spread Spectrum 9e
Chapter 9 - Spread Spectrum 9e
 
How does frequency hopping affect security precautions, if it all..pdf
How does frequency hopping affect security precautions, if it all..pdfHow does frequency hopping affect security precautions, if it all..pdf
How does frequency hopping affect security precautions, if it all..pdf
 
09-SpreadSpectrum.ppt
09-SpreadSpectrum.ppt09-SpreadSpectrum.ppt
09-SpreadSpectrum.ppt
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
spread spectrum
spread spectrumspread spectrum
spread spectrum
 
Bi36358362
Bi36358362Bi36358362
Bi36358362
 
Spread spectrum seminar
Spread spectrum seminarSpread spectrum seminar
Spread spectrum seminar
 
Spread spectrum technics
Spread spectrum technicsSpread spectrum technics
Spread spectrum technics
 
Modulation schemes 8
Modulation schemes 8Modulation schemes 8
Modulation schemes 8
 
spread spectrum communication
spread spectrum communicationspread spectrum communication
spread spectrum communication
 
Implementation of Direct Sequence Spread Spectrum Communication System Using ...
Implementation of Direct Sequence Spread Spectrum Communication System Using ...Implementation of Direct Sequence Spread Spectrum Communication System Using ...
Implementation of Direct Sequence Spread Spectrum Communication System Using ...
 
Spread Spectrum Modulation
Spread Spectrum ModulationSpread Spectrum Modulation
Spread Spectrum Modulation
 
time hopping spread spectrum term paper
time hopping spread spectrum term papertime hopping spread spectrum term paper
time hopping spread spectrum term paper
 
Multiplexing FDM and TDM
Multiplexing FDM and TDMMultiplexing FDM and TDM
Multiplexing FDM and TDM
 
Contemporary Spread Spectrum Techniques: A Comparative Study
Contemporary Spread Spectrum Techniques: A Comparative StudyContemporary Spread Spectrum Techniques: A Comparative Study
Contemporary Spread Spectrum Techniques: A Comparative Study
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Spread spectrum technologies
Spread spectrum technologiesSpread spectrum technologies
Spread spectrum technologies
 
EC6651 COMMUNICATION ENGINEERING UNIT 4
EC6651 COMMUNICATION ENGINEERING UNIT 4EC6651 COMMUNICATION ENGINEERING UNIT 4
EC6651 COMMUNICATION ENGINEERING UNIT 4
 

More from Pramod Rathore

More from Pramod Rathore (20)

Restoration by spatial filtering
Restoration by spatial filteringRestoration by spatial filtering
Restoration by spatial filtering
 
Image restoration
Image restorationImage restoration
Image restoration
 
Homomorphic filtering
Homomorphic filteringHomomorphic filtering
Homomorphic filtering
 
Sharpening filtering
Sharpening filteringSharpening filtering
Sharpening filtering
 
Image enhancement in frequency domain
Image enhancement in frequency domainImage enhancement in frequency domain
Image enhancement in frequency domain
 
Image enhancement in fourier transform part ii
Image enhancement in fourier transform  part iiImage enhancement in fourier transform  part ii
Image enhancement in fourier transform part ii
 
Image enhancement in fourier transform
Image enhancement in fourier transformImage enhancement in fourier transform
Image enhancement in fourier transform
 
Control statements
Control statementsControl statements
Control statements
 
Basic image operation
Basic image operationBasic image operation
Basic image operation
 
How to handling strings in r
How to handling strings in rHow to handling strings in r
How to handling strings in r
 
Smoothing spatial filtering
Smoothing spatial filteringSmoothing spatial filtering
Smoothing spatial filtering
 
Handle list in r
Handle list in rHandle list in r
Handle list in r
 
Spatial filtering
Spatial filteringSpatial filtering
Spatial filtering
 
Data types in r
Data types in rData types in r
Data types in r
 
6.histogram processing
6.histogram processing6.histogram processing
6.histogram processing
 
5.image enhancement in spatial domain copy - copy
5.image enhancement in spatial domain   copy - copy5.image enhancement in spatial domain   copy - copy
5.image enhancement in spatial domain copy - copy
 
4.image enhancement in spatial domain copy
4.image enhancement in spatial domain   copy4.image enhancement in spatial domain   copy
4.image enhancement in spatial domain copy
 
Issues in machine learning
Issues in machine learningIssues in machine learning
Issues in machine learning
 
R programming
R programmingR programming
R programming
 
Image enhancement in spatial domain
Image enhancement in spatial domainImage enhancement in spatial domain
Image enhancement in spatial domain
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 

Recently uploaded (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 

5.spread spectrum technology

  • 1. Prof. Neeraj Bhargava Pramod Singh Rathore Department of Computer Science School of Engineering & System Sciences, MDS, University Ajmer, Rajasthan, India 1
  • 2. •The Spread Spectrum Technology (S.S.T) is a technique used for transmitting radio or telecommunications signals. •It is Wideband radio Technology use in requiring High Security. • These techniques are used for a variety of reasons, including the establishment of secure communications, increasing resistance to natural Interference , Noise and Jamming. •It use an Hopping Modulation Technique for Signal Transmission.
  • 4.  The main advantage of spread spectrum communication technique is to prevent “INTERFERENCE” whether it is intentional or unintentional.  The signals modulated with these techniques are hard to interfere and cannot be jammed. An intruder with no official access is never allowed to crack them. Hence, these techniques are used for military purposesas per its Security Reasons.  There is Pseudo-Noise Sequence used for Transmitting Signal.
  • 5. Basically there are 4 Spread Spectrum Techniques i.e:-  Direct Sequence Spread Spectrum (D.S.S.S)  Frequency Hopped Spread Spectrum (F.H.S.S)  Time Hopped Spread Spectrum (T.H.S.S)  Pulse Hopped Spread Spectrum (P.H.S.S)
  • 6.  Direct Sequence Spread Spectrum (D.S.S.S)  It is an popular technique adopted by CDMA & 3G wireless communication.  Data signal is multiplied by spreading code and resulting signal occupies a much higher frequency band.  Spreading code is Pseudo-random sequence.  Whenever a user wants to send data using this DSSS technique, each and every bit of the user data is multiplied by a secret code, called as chipping code.
  • 7. Spreading Information with Pseudo random sequence. “This chipping code is nothing but the spreading code which is multiplied with the original message and transmitted. The receiver uses the same code to retrieve the original message.”
  • 8.  Frequency Hopped Spread Spectrum (F.H.S.S)  It is a technique use by Bluetooth and other critical military communication system for Security & simplicity.  The user signal first to be Digitized before modulating itself.  The frequencies of the data are hopped from one to another in order to provide a secure transmission.
  • 9. In a frequency-hopping spread spectrum (FHSS) system, the transmitted signal is spread across multiple channels, as shown in Figure below. In the example of Figure , the full bandwidth is divided into 8 channels, centered at f1 through f8. The signal "hops" between them in the following sequence: f5, f8, f3, f6, f1, f7, f4, f2.
  • 10. FHSS DSSS / CDMA Multiple frequencies are used Single frequency is used Hard to find the user’s frequency at any instant of time User frequency, once allotted is always the same Frequency reuse is allowed Frequency reuse is not allowed Sender need not wait Sender has to wait if the spectrum is busy Power strength of the signal is high Power strength of the signal is low Stronger and penetrates through the obstacles It is weaker compared to FHSS It is never affected by interference It can be affected by interference It is cheaper It is expensive This is the commonly used technique This technique is not frequently used
  • 11.  Reduced Crosstalk Interference  Better Voice Quality/Data and less Noise  Inherent Security  Longer Operation Distances  Hard to Intercept  Harder to Jammed
  • 12. Spread Spectrum promises several benefits such as higher capacity and ability to resist multipath propagation. Spread Spectrum signal are difficult to intercept for an unauthorized person, they are easily hidden. For an unauthorized person it is difficult to even detect their presence in many cases.
  • 13. 13
  • 14. 14