3.1.
CONCEPTS AND CHARACTERISTICS
131
received signal and, hence, is called dehopping. The mixer output is applied to
a bandpass filter that excludes double-frequency components and power that
originated outside the appropriate frequency channel and produces the data-
modulated dehopped signal, which has the form of (3-1) with replaced by the
intermediate frequency.
Although it provides no advantage against white noise, frequency hopping
enables signals to hop out of frequency channels with interference or slow
frequency-selective fading. To fully exploit this capability against narrowband
interference signals, disjoint frequency channels are necessary. The disjoint
channels may be contiguous or have unused spectral regions between them.
Some spectral regions with steady interference or a susceptibility to fading
may be omitted from the hopset, a process called spectral notching. Multiple
frequency-shift keying (MFSK) differs fundamentally from frequency hopping
in that all the MFSK subchannels affect each receiver decision. No escape from
or avoidance of a subchannel with interference is possible.
To ensure the secrecy and unpredictably of the frequency-hopping pattern,
the pattern should be a pseudorandom sequence of frequencies. The sequence
should have a large period and a uniform distribution over the frequency chan-
nels and should be generated by a multilevel sequence with a large linear span.
The large period prevents the capture and storage of a period of the pattern by
an opponent. The linear span of a multilevel sequence is the smallest degree
of any linear recursion that the sequence satisfies. A large linear span inhibits
the reconstruction of the pattern from a short segment of it. The set of con-
trol bits produced by the code generator usually constitutes a symbol drawn
from a finite field with the necessary properties. A frequency-hopping pattern
is obtained by associating a distinct frequency with each symbol. A number of
methods have been found to ensure a large linear span [1], [2].
An architecture that enhances the transmission security by encrypting the
control bits is shown in Figure 3.3. The specific algorithm for generating the
control bits is determined by the key and the time-of-day (TOD). The key, which
is the ultimate source of security, is a set of bits that are changed infrequently
and must be kept secret. The TOD is a set of bits that are derived from the
stages of the TOD counter and change with every transition of the TOD clock.
For example, the key might change daily while the TOD might change every
second. The purpose of the TOD is to vary the generator algorithm without
constantly changing the key. In effect, the generator algorithm is controlled
by a time-varying key. The code clock, which regulates the changes of state
in the code generator and thereby controls the hop rate, operates at a much
higher rate than the TOD clock. In a receiver, the code clock is produced by
the synchronization system. In both the transmitter and the receiver, the TOD
clock may be derived from the code clock.
A frequency-hopping pulse with a fixed carrier frequency occurs during a
portion of the hop interval called the dwell interval. As illustrated in Figure 3.4,
the dwell time is the duration of the dwell interval during which the channel
symbols are transmitted. The hop duration is equal to the sum of the
dwell time and the switching time The switching time is equal to the