Return to Spread Spectrum Topics Menu Page
Spread Spectrum Scene 
  Spread Spectrum Background
  Home || Navigation Help || Sign our Guestbook || Leave a Comment

As an introduction, a little history lesson and a few definitions seem to be in order.   Spread spectrum (SS) dates back to World War II  (see SSS Online's Spread Spectrum History Page, with information about Hedy Lamarr's patented "Secret Communications Technique.").

Early research and development efforts tried to provide countermeasures for radar, navigation beacons and communications. The U. S. Military has used SS signals over satellites for at least 25 years.   An old but faithful and highly capable design like the Magnavox USC-28 modem is an example of this kind of equipment.   Housed in two or three 6' racks, it had selectable data rates from a few hundred bits per second to about 64 kBits per second.    It transmitted a spread bandwidth of 60 MHZ.    Many newer commercial satellite systems have now converted to spread spectrum to increase channel capacity and reduce costs.

Over the last twenty years, many spread spectrum signals have appeared on the air.   The easiest way to characterize these modulations is by their frequency spectra.   These SS signals occupy a much greater bandwidth than needed by the information bandwidth of the transmitted data.    To rate being called a spread spectrum signal, two technicalities must be met:

  • The signal bandwidth must be much wider than the information bandwidth.

  • Some code or pattern, other than the data to be transmitted, determines the actual on-the-air transmit bandwidth.

One way to look at spread spectrum is that it trades a wider signal bandwidth for better signal to noise ratio.  In today's commercial spread spectrum systems, bandwidths of 10 to 100 times the information rates are used.    Military systems have used spectrum widths from 1000 to 1 million times the information bandwidth.   There are two very common spread spectrum modulations used in commercial applications: frequency hopping and direct sequence. At least two other types of spreading modulations have been used on occasion, although they are nowhere near as common: time hopping and chirp. The following paragraphs will describe each of the common techniques in a little more detail and show that pseudo noise code techniques provide the common thread through all spread spectrum types.

Frequency hopping is the easiest spread spectrum modulation to use.    Any radio with a digitally controlled frequency synthesizer can, theoretically, be converted to a frequency hopping radio.   This conversion requires the addition of a pseudo noise (PN) code generator to select the frequencies for transmission or reception.    Most hopping systems use uniform frequency hopping over a band of frequencies.    This is not absolutely necessary, if both the transmitter and receiver of the system know in advance what frequencies are to be skipped.    Thus a frequency hopper in the two meter band could be made that skipped over commonly used repeater frequency pairs.   A frequency hopped system can use analog or digital carrier modulation and can be designed using conventional narrow band radio techniques.    De-hopping in the receiver is done by a synchronized pseudo noise code generator that drives the receiver's local oscillator frequency synthesizer.

Direct sequence is the most practical all-digital version.    A direct sequence system uses a locally generated pseudonoise code to encode digital data to be transmitted.   The local code runs at much higher rate than the data rate.   Data for transmission is simply logically modulo-2 added (an EXOR operation) with the faster pseudonoise code.    The composite pseudonoise and data can be passed through a data scrambler to randomize the output spectrum (and thereby remove discrete spectral lines).   A direct sequence modulator is then used to double sideband suppressed carrier modulate the carrier frequency to be transmitted.    The resultant DSB suppressed carrier AM modulation can also be thought of as binary phase shift keying (BPSK).    Carrier modulation other than BPSK is possible with direct sequence; however, binary phase shift keying is the simplest and most often used modulation technique for spread spectrum.

A spread spectrum receiver uses a locally generated replica of the pseudonoise code and a receiver correlator to separate out the desired coded information from all possible signals. A spread spectrum correlator can be thought of as a very special matched filter -- it responds only to signals that are encoded with a pseudonoise code that matches its own code. Thus, an SS correlator can be "tuned" to different codes simply by changing its local code. This correlator does not respond to manmade, natural or artificial noise or interference. It responds only to SS signals with identical matched signal characteristics and pseudonoise code.

The use of these special pseudonoise codes in spread spectrum communications makes signals appear wideband and noise-like. It is this very characteristic that makes SS signals possess the quality of Low Probability of Intercept. SS signals are hard to detect on narrow band equipment because the signal's energy is spread over a bandwidth of maybe 100 times the information bandwidth.

The spread of energy over a wide band, or lower spectral power density, makes SS signals less likely to interfere with narrowband communications. Narrowband communications, conversely, cause little to no interference to SS systems because the correlation receiver effectively integrates over a very wide bandwidth to recover an SS signal. The correlator then "spreads" out a narrow band interferer over the receiver's total detection bandwidth. The total integrated signal density or SNR at the correlator's input determines whether there will be interference or not. All SS systems have a threshold or tolerance level of interference beyond which useful communication ceases. This tolerance or threshold is related to the SS processing gain. Processing gain is essentially the ratio of the RF bandwidth to the information bandwidth.

Besides being hard to intercept and jam, spread spectrum signals are hard to exploit or spoof. Signal exploitation is the ability of an enemy (or a non-network member) to listen in to a network and use information from the network without being a valid network member or participant. Spoofing is the act of falsely or maliciously introducing misleading or false traffic or messages to a network. Spread spectrum signals are naturally more secure than narrowband radio communications, and can be made to have any degree of message privacy that is desired. Messages can also be cryptographically encoded to any level of secrecy desired, offering even greater security. The very nature of spread spectrum allows military or intelligence levels of privacy and security to be had in the private sector with minimal complexity. While these characteristics may not be very important to every business and LAN (local area network) need, they are readily available if desired.

Tutorial on Spread Spectrum

Related Links on SSS Online:

Search E-zine Menu Pegasus Tech Welcome Home
  Tel: 865-717-9339   ||   FAX: 865-717-9904    ||   E-Mail:
This site © 1995-2012 by SSS Online, Inc. All rights reserved.
Revised January 30, 2012