SlideShare a Scribd company logo
1 of 14
AIM
Weaknesses
of present
schemes
•Conservation of
bandwidth
•Good spectral density
•Concentrated
spectrum easy to
detect and intercept
•Low redundancy
makes signal
susceptible to
jamming
The spread spectrum
technologies were initially
developed for the military
and intelligence
communities to overcome
interception and jamming.
 Digital (telecommunication) signal is transmitted on a
bandwidth considerably larger than the frequency content
of the original information.
 For FIXED TRANSMISSION POWER, a broader spectrum implies:
i. Lower power signal
ii. High spectral redundancy
 Low signal power makes the communication signals difficult
to be intercepted and detected
 High spectral density makes signals resistant to partial band-
jamming
 Carrier is an unpredictable/ “pseudo-random” wide-
band signal
 Bandwidth of carrier is much wider than the bandwidth of
the data modulation
 Reception is accomplished by cross-correlation of the
received wide-band signal with a synchronously
generated replica of the wide-band carrier
Pseudorandom-
Seemingly random
but reproducible
Except wideband
FM, conventional
comm systems
multiplicity factor = 1
SS systems multiplicity
factor in thousands
Lower power level
per format
SS
SYSTEMS
SSCOMMUNICATION
SCHEMES
FREQUENCY HOPPING
SPREAD SPECTRUM
DIRECT SEQUENCE
SPREAD SYSTEM
FHSS uses a narrow band signal (less
than 1 MHz), which modulates a data
signal causing it to „hop‟ in random
and the hopping happens in a
pseudorandom „predictable‟
sequence in a regular time from
frequency to frequency which is
synchronized at both transmitting and
receiving ends.
The main difference now is that the
carrier frequency varies over
intervals in accordance to a
predetermined pseudo-random
pattern.
The evasive signal so generated
takes a broader spectrum and
becomes difficult to jam and
intercept.
 Though PAM, PSK and QAM schemes are more
efficient, M-ary modulation is used due to its less
complex non-coherent detection abilities
 PN hopping pattern demands the reciever to
maintain phase coherence with every one of the
frequencies used in the hopping pattern.
 FSK is allowed as it allows non-coherent detection
GSM
Cellular
systems
WLAN
WiFi
Network
WPAN
Bluetooth
Spread spectrum communication schemes

More Related Content

What's hot

What's hot (18)

Modulation schemes 8
Modulation schemes 8Modulation schemes 8
Modulation schemes 8
 
Ultra wideband technology(mujeeb ur rehman)
Ultra wideband technology(mujeeb ur rehman)Ultra wideband technology(mujeeb ur rehman)
Ultra wideband technology(mujeeb ur rehman)
 
Fd24967971
Fd24967971Fd24967971
Fd24967971
 
27. cognitive radio
27. cognitive radio27. cognitive radio
27. cognitive radio
 
Ultra wideband technology (UWB)
Ultra wideband technology (UWB)Ultra wideband technology (UWB)
Ultra wideband technology (UWB)
 
Bi36358362
Bi36358362Bi36358362
Bi36358362
 
Paper id 2520148 (2)
Paper id 2520148 (2)Paper id 2520148 (2)
Paper id 2520148 (2)
 
Uwb interview presentatin
Uwb interview presentatinUwb interview presentatin
Uwb interview presentatin
 
09 spread spectrum
09 spread spectrum09 spread spectrum
09 spread spectrum
 
Dcn 3
Dcn 3Dcn 3
Dcn 3
 
Diversity Techniques in mobile communications
Diversity Techniques in mobile communicationsDiversity Techniques in mobile communications
Diversity Techniques in mobile communications
 
Report underwater-wireless
Report underwater-wirelessReport underwater-wireless
Report underwater-wireless
 
Radio individual presentation
Radio individual presentationRadio individual presentation
Radio individual presentation
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmission
 
COGNITIVE RADIO
COGNITIVE RADIOCOGNITIVE RADIO
COGNITIVE RADIO
 
Small-Scale Fading and Multipath
Small-Scale Fading and MultipathSmall-Scale Fading and Multipath
Small-Scale Fading and Multipath
 
Wireless networks by Engineer Geremew T,
Wireless networks by Engineer Geremew T,Wireless networks by Engineer Geremew T,
Wireless networks by Engineer Geremew T,
 
Ultra-wide band Technology
Ultra-wide band TechnologyUltra-wide band Technology
Ultra-wide band Technology
 

Viewers also liked

Differential pulse code modulation
Differential pulse code modulationDifferential pulse code modulation
Differential pulse code modulationRamraj Bhadu
 
Encoding in Data Communication DC8
Encoding in Data Communication DC8Encoding in Data Communication DC8
Encoding in Data Communication DC8koolkampus
 
Isi and nyquist criterion
Isi and nyquist criterionIsi and nyquist criterion
Isi and nyquist criterionsrkrishna341
 
Chapter 5 - Signal Encoding Techniques 9e
Chapter 5 - Signal Encoding Techniques 9eChapter 5 - Signal Encoding Techniques 9e
Chapter 5 - Signal Encoding Techniques 9eadpeer
 
PULSE CODE MODULATION (PCM)
PULSE CODE MODULATION (PCM)PULSE CODE MODULATION (PCM)
PULSE CODE MODULATION (PCM)vishnudharan11
 

Viewers also liked (8)

Lecture13
Lecture13Lecture13
Lecture13
 
Differential pulse code modulation
Differential pulse code modulationDifferential pulse code modulation
Differential pulse code modulation
 
Data encoding
Data encodingData encoding
Data encoding
 
Encoding in Data Communication DC8
Encoding in Data Communication DC8Encoding in Data Communication DC8
Encoding in Data Communication DC8
 
Isi and nyquist criterion
Isi and nyquist criterionIsi and nyquist criterion
Isi and nyquist criterion
 
Chapter 5 - Signal Encoding Techniques 9e
Chapter 5 - Signal Encoding Techniques 9eChapter 5 - Signal Encoding Techniques 9e
Chapter 5 - Signal Encoding Techniques 9e
 
PULSE CODE MODULATION (PCM)
PULSE CODE MODULATION (PCM)PULSE CODE MODULATION (PCM)
PULSE CODE MODULATION (PCM)
 
Pulse modulation
Pulse modulationPulse modulation
Pulse modulation
 

Similar to Spread spectrum communication schemes

Spread spectrum seminar
Spread spectrum seminarSpread spectrum seminar
Spread spectrum seminarDeepika Patil
 
Multimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMultimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMazin Alwaaly
 
Brief Introduction to Spread spectrum Techniques
Brief Introduction to Spread spectrum TechniquesBrief Introduction to Spread spectrum Techniques
Brief Introduction to Spread spectrum TechniquesAnil Nigam
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless CommunicationsUday Kumar
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless CommunicationsUday Kumar
 
Smart antennas
Smart antennasSmart antennas
Smart antennasrakshapg57
 
Introduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMAIntroduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMABidhan Ghimire
 
Concept of Diversity & Fading (wireless communication)
Concept of Diversity & Fading (wireless communication)Concept of Diversity & Fading (wireless communication)
Concept of Diversity & Fading (wireless communication)Omkar Rane
 
The wireless channel, diversity and capacity of wireless channels
The wireless channel, diversity and capacity of wireless channelsThe wireless channel, diversity and capacity of wireless channels
The wireless channel, diversity and capacity of wireless channelsFaiz Ur Rehman Qureshi
 
Lect13 multiple access
Lect13 multiple accessLect13 multiple access
Lect13 multiple accesssumanuppala1
 

Similar to Spread spectrum communication schemes (20)

Spread spectrum seminar
Spread spectrum seminarSpread spectrum seminar
Spread spectrum seminar
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
ss1.pdf
ss1.pdfss1.pdf
ss1.pdf
 
SS.pdf
SS.pdfSS.pdf
SS.pdf
 
OFDM.ppt
OFDM.pptOFDM.ppt
OFDM.ppt
 
UNIT-5 Spread Spectrum Communication.pdf
UNIT-5 Spread Spectrum Communication.pdfUNIT-5 Spread Spectrum Communication.pdf
UNIT-5 Spread Spectrum Communication.pdf
 
Multimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMultimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networks
 
Brief Introduction to Spread spectrum Techniques
Brief Introduction to Spread spectrum TechniquesBrief Introduction to Spread spectrum Techniques
Brief Introduction to Spread spectrum Techniques
 
Cdma
CdmaCdma
Cdma
 
Mobile comm. 2
Mobile comm. 2Mobile comm. 2
Mobile comm. 2
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless Communications
 
Evolution of Wireless Communications
Evolution of Wireless CommunicationsEvolution of Wireless Communications
Evolution of Wireless Communications
 
Smart antennas
Smart antennasSmart antennas
Smart antennas
 
Cdma, speard spectrum
Cdma, speard spectrumCdma, speard spectrum
Cdma, speard spectrum
 
Introduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMAIntroduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMA
 
Mobile comm. 1
Mobile comm. 1Mobile comm. 1
Mobile comm. 1
 
3rd lec fcss
3rd lec   fcss3rd lec   fcss
3rd lec fcss
 
Concept of Diversity & Fading (wireless communication)
Concept of Diversity & Fading (wireless communication)Concept of Diversity & Fading (wireless communication)
Concept of Diversity & Fading (wireless communication)
 
The wireless channel, diversity and capacity of wireless channels
The wireless channel, diversity and capacity of wireless channelsThe wireless channel, diversity and capacity of wireless channels
The wireless channel, diversity and capacity of wireless channels
 
Lect13 multiple access
Lect13 multiple accessLect13 multiple access
Lect13 multiple access
 

More from Hira Shaukat

Mobility Management
Mobility ManagementMobility Management
Mobility ManagementHira Shaukat
 
Development of Islamabad through SME
Development of Islamabad through SME Development of Islamabad through SME
Development of Islamabad through SME Hira Shaukat
 
Future Cooperative Networks
Future Cooperative NetworksFuture Cooperative Networks
Future Cooperative NetworksHira Shaukat
 
Speaker recognition using MFCC
Speaker recognition using MFCCSpeaker recognition using MFCC
Speaker recognition using MFCCHira Shaukat
 
Home automation system
Home automation system Home automation system
Home automation system Hira Shaukat
 
Cruise control simulation using matlab
Cruise control simulation using matlabCruise control simulation using matlab
Cruise control simulation using matlabHira Shaukat
 

More from Hira Shaukat (8)

4 bit counter
4 bit counter4 bit counter
4 bit counter
 
Mobility Management
Mobility ManagementMobility Management
Mobility Management
 
Development of Islamabad through SME
Development of Islamabad through SME Development of Islamabad through SME
Development of Islamabad through SME
 
Future Cooperative Networks
Future Cooperative NetworksFuture Cooperative Networks
Future Cooperative Networks
 
Speaker recognition using MFCC
Speaker recognition using MFCCSpeaker recognition using MFCC
Speaker recognition using MFCC
 
3 d printer
3 d printer3 d printer
3 d printer
 
Home automation system
Home automation system Home automation system
Home automation system
 
Cruise control simulation using matlab
Cruise control simulation using matlabCruise control simulation using matlab
Cruise control simulation using matlab
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Spread spectrum communication schemes

  • 1.
  • 2. AIM Weaknesses of present schemes •Conservation of bandwidth •Good spectral density •Concentrated spectrum easy to detect and intercept •Low redundancy makes signal susceptible to jamming
  • 3. The spread spectrum technologies were initially developed for the military and intelligence communities to overcome interception and jamming.
  • 4.  Digital (telecommunication) signal is transmitted on a bandwidth considerably larger than the frequency content of the original information.  For FIXED TRANSMISSION POWER, a broader spectrum implies: i. Lower power signal ii. High spectral redundancy  Low signal power makes the communication signals difficult to be intercepted and detected  High spectral density makes signals resistant to partial band- jamming
  • 5.  Carrier is an unpredictable/ “pseudo-random” wide- band signal  Bandwidth of carrier is much wider than the bandwidth of the data modulation  Reception is accomplished by cross-correlation of the received wide-band signal with a synchronously generated replica of the wide-band carrier
  • 6. Pseudorandom- Seemingly random but reproducible Except wideband FM, conventional comm systems multiplicity factor = 1 SS systems multiplicity factor in thousands Lower power level per format SS SYSTEMS
  • 8.
  • 9. FHSS uses a narrow band signal (less than 1 MHz), which modulates a data signal causing it to „hop‟ in random and the hopping happens in a pseudorandom „predictable‟ sequence in a regular time from frequency to frequency which is synchronized at both transmitting and receiving ends.
  • 10. The main difference now is that the carrier frequency varies over intervals in accordance to a predetermined pseudo-random pattern. The evasive signal so generated takes a broader spectrum and becomes difficult to jam and intercept.
  • 11.
  • 12.  Though PAM, PSK and QAM schemes are more efficient, M-ary modulation is used due to its less complex non-coherent detection abilities  PN hopping pattern demands the reciever to maintain phase coherence with every one of the frequencies used in the hopping pattern.  FSK is allowed as it allows non-coherent detection

Editor's Notes

  1. Ignoring the frequency converters, the system is no different from a simple digital communication system with an FSK modulator and demodulator [1]. The difference is created in this system by allowing carrier frequency hopping controlled at the transmitter by the pseudo-noise (PN) generator. To track the hopping carrier the receiver must utilize the same (PN) generator in synchronization with the transmitter PN generator. The mixer in the transmitter section serves as a frequency up-converter while in the receiver section it serves as frequency down-converter.
  2. The motivation of preferring binary or M-ary FSK modulation schemes over the more efficient PAM, PSK and QAM schemes stems from its ability to utilize less complex non-coherent detection. The PN hopping pattern demands the receiver to maintain phase coherence with every one of the frequencies used in the hopping pattern. This requirement is difficult to satisfy during frequency hopping. Therefore FSK is employed in FHSS systems, since it allows non-coherent detection.
  3. GSM Cellular systemsWLANWiFi NetworkWPANBluetooth