SlideShare a Scribd company logo
1 of 24
PRESENTED BY:
Deepika patil
 INTRODUCTION
 WHY SPREAD SPECTRUM MODULATION?
 HOW IT WORKS
 SPREAD SPECTRUM TECHNIQUES
 APPLICATIONS
 CONCLUSION
Wireless Networks Spring 2005
Spread-spectrum radio communications is a favorite technology of the military
because it resists jamming and is hard for an enemy to intercept, Just as they
are unlikely to be intercepted by a military opponent
 Spread Spectrum : This is a technique in which
a telecommunication signal is transmitted on a bandwidth considerably
larger than the frequency content of the original information.
 Frequency hopping is a basic modulation technique used in spread
spectrum signal transmission.
A communication system is considered a spread spectrum system if it
satisfies the following two criteria:
 Bandwidth of the spread spectrum signal has to be greater than the
information bandwidth. (This is also true for frequency and pulse code
modulation!)
 The spreading sequence has to be independent from the information.
Thus, no possibility to calculate the information if the sequence is known
and vice versa.
 Problem of radio transmission: frequency dependent fading can wipe
out narrow band signals for duration of the interference
 Solution: spread the narrow band signal into a broad band signal
using a special code
detection
at
receiver
interference
spread
signal
signal
spread
interference
f f
power
power
frequency
channel
quality
1 2
3
4
5 6
Narrowband
signal
guard space
2
2
2
2
2
frequency
channel
quality
1
spread
spectrum
narrowband
channels
spread spectrum
channels
 Spread spectrum signals are distributed over a wide range
of frequencies and then collected back at the receiver
 These wideband signals are noise-like and hence difficult to
detect or interfere with
 Initially adopted in military applications, for its resistance
to jamming and difficulty of interception
 More recently, adopted in commercial wireless
communications
Wireless Environment and Wireless LANs
7
 Safeguards for physical
security must be even greater
in wireless communications
 Encryption: intercepted
communications must not be
easily interpreted
 Authentication: is the node
who it claims to be?
Wireless Environment and Wireless LANs
8
 A noise-like and random signal has to be generated at the
transmitter.
 The same signal must be generated at the receiver in
synchronization.
 We limit the complexity by specifying only one bit per
sample, i.e., a binary sequence.
 These special "Spreading" codes are called "Pseudo
Random" or "Pseudo Noise" codes. They are called
"Pseudo" because they are not real Gaussian noise
9
 PN generator produces periodic sequence that appears
to be random
 PN Sequences
 Generated by an algorithm using initial seed
 Sequence isn’t statistically random but will pass many test of
randomness
 Sequences referred to as pseudorandom numbers or
pseudonoise sequences
 Unless algorithm and seed are known, the sequence is
impractical to predict
Wireless Networks Spring 2005
 THE MAJOR SPREAD SPECTRUM TECHNIQUES
ARE
 DSSS
 FHSS
Wireless Environment and Wireless LANs
12
1101010010011
11010111010100100001101010010011111010100100111
Period of
one chip
Period of one
data bit
PG = SF = Tb / Tc
Wireless Environment and Wireless LANs
14
Wireless Environment and Wireless LANs
15
Wireless Networks Spring 2005
SS Technique advantage disadvantage
Direct Sequence 􀂉best behavior in multi
path rejection
􀂉no synchronization
􀂉simple implementation
􀂉difficult to detect
􀂉near far effect
􀂉coherent bandwidth
Frequency
Hopper
􀂉complex hardware
􀂉error correction
needed
􀂉no need for coherent
bandwidth
􀂉less affected by the near far
effect
1. Reduced crosstalk interference:
2. Better voice quality/data integrity and less static
noise
3. Lowered susceptibility to multipath fading
4. Inherent security:
5. Co-existence:
6. Longer operating distances
7. Hard to detect:
8. Hard to intercept or demodulate:
9. Harder to jam
• Radio-jamming is ever-present threat to radio channels
• This is an attack on the availability of signals
– Denial-of-Service (DoS) attack
• Traditional anti-jamming techniques rely on pre-shared
secret codes (keys) to increase channel availability
19
RCVR
XMTR JMR
• Spread-Spectrum Techniques
– FHSS (Frequency Hopping
Spread Spectrum)
– DSSS (Direct-Sequence
Spread Spectrum)
20
frequency
Hopping sequence (PRNG seed) must be known
to the sender and receiver but not the jammer.
Spreading code (PRNG seed) must be known
to the sender and receiver but not the jammer.
frequency
energyenergy
PRNGPRNG
PRNGPRNG
 Universal framework to
integrate a diverse set of
devices in a seamless, user-
friendly, efficient manner
 Devices must be able to
establish ad hoc
connections
 Support for data and voice
 Similar security as cables
 Simple, small, power-
efficient implementation
 Inexpensive!
Wireless Environment and Wireless LANs
21
Bluetooth
printer
module
Bluetooth
phone and
headset
 Multiple Transmitters  1 Receiver
 Choice of unique sequences to spread the
data bits
 Ability of receiver to distinguish between
data streams
 This method of communication
i.e in CDMA cannot offer much of the international
roaming and many other advanced user services
 Increased complexity
 Large Bandwidth
Spread spectrum seminar

More Related Content

What's hot

Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrumHarshit Gupta
 
spread spectrum communication
spread spectrum communicationspread spectrum communication
spread spectrum communicationDr Naim R Kidwai
 
FHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumFHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumRohit Choudhury
 
Chapter 9 - Spread Spectrum 9e
Chapter 9 - Spread Spectrum 9eChapter 9 - Spread Spectrum 9e
Chapter 9 - Spread Spectrum 9eadpeer
 
Presentation on fhss
Presentation on fhssPresentation on fhss
Presentation on fhsstanu_jaswal
 
time hopping spread spectrum term paper
time hopping spread spectrum term papertime hopping spread spectrum term paper
time hopping spread spectrum term paperHimanshu Shekhar
 
spread spectrum technique
 spread spectrum technique spread spectrum technique
spread spectrum techniqueTauseef khan
 
Dsss final
Dsss finalDsss final
Dsss finalAJAL A J
 
Frequency Hopping Spread Spectrum (FHSS) System
Frequency Hopping Spread Spectrum (FHSS) System Frequency Hopping Spread Spectrum (FHSS) System
Frequency Hopping Spread Spectrum (FHSS) System Ahmed Alfadhel
 
Wireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum DesignWireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum DesignJim Jenkins
 

What's hot (20)

Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrum
 
spread spectrum communication
spread spectrum communicationspread spectrum communication
spread spectrum communication
 
8 spread spectrum
8 spread spectrum8 spread spectrum
8 spread spectrum
 
4rth lec dsss
4rth lec   dsss4rth lec   dsss
4rth lec dsss
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Topic: Spread Spectrum
Topic: Spread SpectrumTopic: Spread Spectrum
Topic: Spread Spectrum
 
Iuwne10 S01 L05
Iuwne10 S01 L05Iuwne10 S01 L05
Iuwne10 S01 L05
 
09 spread spectrum
09 spread spectrum09 spread spectrum
09 spread spectrum
 
Dsss phy
Dsss phyDsss phy
Dsss phy
 
FHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumFHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread Spectrum
 
Spread Spectrum System
Spread Spectrum SystemSpread Spectrum System
Spread Spectrum System
 
Chapter 9 - Spread Spectrum 9e
Chapter 9 - Spread Spectrum 9eChapter 9 - Spread Spectrum 9e
Chapter 9 - Spread Spectrum 9e
 
Presentation on fhss
Presentation on fhssPresentation on fhss
Presentation on fhss
 
time hopping spread spectrum term paper
time hopping spread spectrum term papertime hopping spread spectrum term paper
time hopping spread spectrum term paper
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
spread spectrum technique
 spread spectrum technique spread spectrum technique
spread spectrum technique
 
Dsss final
Dsss finalDsss final
Dsss final
 
Frequency Hopping Spread Spectrum (FHSS) System
Frequency Hopping Spread Spectrum (FHSS) System Frequency Hopping Spread Spectrum (FHSS) System
Frequency Hopping Spread Spectrum (FHSS) System
 
Wireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum DesignWireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum Design
 
Chirps
ChirpsChirps
Chirps
 

Similar to Spread spectrum seminar

Spread spectrum communication schemes
Spread spectrum communication schemesSpread spectrum communication schemes
Spread spectrum communication schemesHira Shaukat
 
A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...JPINFOTECH JAYAPRAKASH
 
Introduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMAIntroduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMABidhan Ghimire
 
Wireless# Guide to Wireless CommunicationsChapter 3Und.docx
Wireless# Guide to Wireless CommunicationsChapter 3Und.docxWireless# Guide to Wireless CommunicationsChapter 3Und.docx
Wireless# Guide to Wireless CommunicationsChapter 3Und.docxambersalomon88660
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless CommunicationsUday Kumar
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless CommunicationsUday Kumar
 
Lect13 multiple access
Lect13 multiple accessLect13 multiple access
Lect13 multiple accesssumanuppala1
 
Division multiple access technology
Division multiple access technologyDivision multiple access technology
Division multiple access technologyAdams Firdaus
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrummpsrekha83
 

Similar to Spread spectrum seminar (20)

Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Cdma, speard spectrum
Cdma, speard spectrumCdma, speard spectrum
Cdma, speard spectrum
 
Spread spectrum communication schemes
Spread spectrum communication schemesSpread spectrum communication schemes
Spread spectrum communication schemes
 
UNIT-5 Spread Spectrum Communication.pdf
UNIT-5 Spread Spectrum Communication.pdfUNIT-5 Spread Spectrum Communication.pdf
UNIT-5 Spread Spectrum Communication.pdf
 
Bi36358362
Bi36358362Bi36358362
Bi36358362
 
Mobile comm. 2
Mobile comm. 2Mobile comm. 2
Mobile comm. 2
 
A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...
 
Mobile comm. 1
Mobile comm. 1Mobile comm. 1
Mobile comm. 1
 
09-SpreadSpectrum.ppt
09-SpreadSpectrum.ppt09-SpreadSpectrum.ppt
09-SpreadSpectrum.ppt
 
Introduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMAIntroduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMA
 
wireless la-ns
wireless la-nswireless la-ns
wireless la-ns
 
Wireless# Guide to Wireless CommunicationsChapter 3Und.docx
Wireless# Guide to Wireless CommunicationsChapter 3Und.docxWireless# Guide to Wireless CommunicationsChapter 3Und.docx
Wireless# Guide to Wireless CommunicationsChapter 3Und.docx
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless Communications
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless Communications
 
Lect13 multiple access
Lect13 multiple accessLect13 multiple access
Lect13 multiple access
 
Secure modem design
Secure modem designSecure modem design
Secure modem design
 
Division multiple access technology
Division multiple access technologyDivision multiple access technology
Division multiple access technology
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Free space optics
Free space opticsFree space optics
Free space optics
 
Wireless
WirelessWireless
Wireless
 

Recently uploaded

TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 

Spread spectrum seminar

  • 2.  INTRODUCTION  WHY SPREAD SPECTRUM MODULATION?  HOW IT WORKS  SPREAD SPECTRUM TECHNIQUES  APPLICATIONS  CONCLUSION
  • 3. Wireless Networks Spring 2005 Spread-spectrum radio communications is a favorite technology of the military because it resists jamming and is hard for an enemy to intercept, Just as they are unlikely to be intercepted by a military opponent
  • 4.  Spread Spectrum : This is a technique in which a telecommunication signal is transmitted on a bandwidth considerably larger than the frequency content of the original information.  Frequency hopping is a basic modulation technique used in spread spectrum signal transmission. A communication system is considered a spread spectrum system if it satisfies the following two criteria:  Bandwidth of the spread spectrum signal has to be greater than the information bandwidth. (This is also true for frequency and pulse code modulation!)  The spreading sequence has to be independent from the information. Thus, no possibility to calculate the information if the sequence is known and vice versa.
  • 5.  Problem of radio transmission: frequency dependent fading can wipe out narrow band signals for duration of the interference  Solution: spread the narrow band signal into a broad band signal using a special code detection at receiver interference spread signal signal spread interference f f power power
  • 6. frequency channel quality 1 2 3 4 5 6 Narrowband signal guard space 2 2 2 2 2 frequency channel quality 1 spread spectrum narrowband channels spread spectrum channels
  • 7.  Spread spectrum signals are distributed over a wide range of frequencies and then collected back at the receiver  These wideband signals are noise-like and hence difficult to detect or interfere with  Initially adopted in military applications, for its resistance to jamming and difficulty of interception  More recently, adopted in commercial wireless communications Wireless Environment and Wireless LANs 7
  • 8.  Safeguards for physical security must be even greater in wireless communications  Encryption: intercepted communications must not be easily interpreted  Authentication: is the node who it claims to be? Wireless Environment and Wireless LANs 8
  • 9.  A noise-like and random signal has to be generated at the transmitter.  The same signal must be generated at the receiver in synchronization.  We limit the complexity by specifying only one bit per sample, i.e., a binary sequence.  These special "Spreading" codes are called "Pseudo Random" or "Pseudo Noise" codes. They are called "Pseudo" because they are not real Gaussian noise 9
  • 10.  PN generator produces periodic sequence that appears to be random  PN Sequences  Generated by an algorithm using initial seed  Sequence isn’t statistically random but will pass many test of randomness  Sequences referred to as pseudorandom numbers or pseudonoise sequences  Unless algorithm and seed are known, the sequence is impractical to predict Wireless Networks Spring 2005
  • 11.  THE MAJOR SPREAD SPECTRUM TECHNIQUES ARE  DSSS  FHSS
  • 12. Wireless Environment and Wireless LANs 12 1101010010011 11010111010100100001101010010011111010100100111
  • 13. Period of one chip Period of one data bit PG = SF = Tb / Tc
  • 14. Wireless Environment and Wireless LANs 14
  • 15. Wireless Environment and Wireless LANs 15
  • 17. SS Technique advantage disadvantage Direct Sequence 􀂉best behavior in multi path rejection 􀂉no synchronization 􀂉simple implementation 􀂉difficult to detect 􀂉near far effect 􀂉coherent bandwidth Frequency Hopper 􀂉complex hardware 􀂉error correction needed 􀂉no need for coherent bandwidth 􀂉less affected by the near far effect
  • 18. 1. Reduced crosstalk interference: 2. Better voice quality/data integrity and less static noise 3. Lowered susceptibility to multipath fading 4. Inherent security: 5. Co-existence: 6. Longer operating distances 7. Hard to detect: 8. Hard to intercept or demodulate: 9. Harder to jam
  • 19. • Radio-jamming is ever-present threat to radio channels • This is an attack on the availability of signals – Denial-of-Service (DoS) attack • Traditional anti-jamming techniques rely on pre-shared secret codes (keys) to increase channel availability 19 RCVR XMTR JMR
  • 20. • Spread-Spectrum Techniques – FHSS (Frequency Hopping Spread Spectrum) – DSSS (Direct-Sequence Spread Spectrum) 20 frequency Hopping sequence (PRNG seed) must be known to the sender and receiver but not the jammer. Spreading code (PRNG seed) must be known to the sender and receiver but not the jammer. frequency energyenergy PRNGPRNG PRNGPRNG
  • 21.  Universal framework to integrate a diverse set of devices in a seamless, user- friendly, efficient manner  Devices must be able to establish ad hoc connections  Support for data and voice  Similar security as cables  Simple, small, power- efficient implementation  Inexpensive! Wireless Environment and Wireless LANs 21 Bluetooth printer module Bluetooth phone and headset
  • 22.  Multiple Transmitters  1 Receiver  Choice of unique sequences to spread the data bits  Ability of receiver to distinguish between data streams
  • 23.  This method of communication i.e in CDMA cannot offer much of the international roaming and many other advanced user services  Increased complexity  Large Bandwidth