Skip to main content Accessibility help
×
Hostname: page-component-6bb9c88b65-6scc2 Total loading time: 0 Render date: 2025-07-24T02:58:22.237Z Has data issue: false hasContentIssue false

4 - Spread Spectrum Technology

Published online by Cambridge University Press:  21 July 2025

Mainak Chowdhury
Affiliation:
Techno India College of Technology, Kolkata
Arumita Biswas
Affiliation:
Bharat Sanchar Nigam Limited, Kolkata
Get access

Summary

Introduction

In Chapter 1, the block diagram of a basic wireless communication system was explained.

In this chapter, the principle behind the working of a spread spectrum modulator and demodulator will be explained. Spreading as the name suggests is a technique by which a narrowband signal is transformed to a noise-like signal that has a wider bandwidth. Pseudo-Noise (PN) sequence is used for spreading or de-spreading the information signal. The transmission bandwidth allocated for any system is limited. Thus, using a spread signal for transmission of single user information can seem to be an inefficient technique. However, when a multi-user environment is considered, then the use of a spreading technique is beneficial in multiple ways. First, it permits multiple users information to spread and occupy the same bandwidth with least interference between each other. Second, on spreading, the signal becomes noise-like and can be de-spread only by the correct PN sequence. If de-spreading is attempted with any other PN sequence, the signal remains noise-like. Thus, use of the spreading technique ensures secured data transmission between the sender and the desired receiver. Third, it helps to prevent multi-path fading. Fourth, in multi-user systems, as all spread signals use the same bandwidth, there is no requirement of any frequency planning. Last but not the least, spreading a signal makes it immune to jamming.

Radio jamming is a collective term used for methods used to deliberately block or degrade the working of any wireless system including mobile telephony, satellite communication, CCTV systems and the like.

Information

Type
Chapter
Information
Wireless Communication
Theory and Applications
, pp. 167 - 191
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Book purchase

Temporarily unavailable

Accessibility standard: Unknown

Accessibility compliance for the PDF of this book is currently unknown and may be updated in the future.

Save book to Kindle

To save this book to your Kindle, first ensure no-reply@cambridge-org.demo.remotlog.com is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×