You are on page 1of 42

CHAPTER ONE

INTRODUCTION

A HF Jammer (sky wave communication jammer) is a device that


transmit signal on the same frequency at which the High communication
system operates that is in the range of 1.5 MHz – 30 MHz to interrupt,
disturb and decept the communication system or blocking the
communication in this range of frequency from reaching to its desired
destination.

The jamming success when the communication system in the area where
the jammer is located is disabled. Communication jamming devices
were first developed and used by military. Tactical commanders use RF
communications to exercise control of their forces, protect from attacks
and if necessary to attack adversaries communication system.

Until this days the HF jammer devices are becoming electronic warfare
devices rather than civilian products in order to prevent illegal jammers
from jamming the HF communication system because communications
held in this range of frequency needs security and they are almost
governmental and military communication system.
Problem statement

The main purpose of electronic attack is to disturb and decept the


adversaries communication system. Adversaries communication system
may held in different range of frequencies so,
Zxdcdcdcdcdcdcdcdcdcdcdc must design and use devices that enable as
to jamm these different adversaries range of frequencies.

Under the division EW we have currently working only two jamming


system are operating, these are VHF jammer () and UHF jammer ().

These jamming systems have the ability to jamm line of sight


communication but not sky wave communication. Therefore this was the
main problem and needs solutions to enable a system that is capable of
jamming the adversary/unnecessary communication system held in the
range of 1.5MHz – 30MHz frequencies (sky wave communication).
Objective of the Project

General objective:

The general objective of this project is to overcome the jammer system


operation for high frequency communication system under the division
electronic warfare.

Specific Objective:

Developing effective HF jammer


Determining the power level and losses along the path
Understanding the propagation characteristics of HF medium
Practical implementation of HF jammer using devices
CHAPTER TWO

2. HF jammer propagation
The task of the high power jammer is to disturb the reception of high
power broadcasting transmitters. It is presumed that these transmitters
transmit on known frequencies (and at a known time for HF). Although
"look through jamming" is normally utilized with tactical systems, with
high power jamming, provision for look through is more difficult. Site
selection of the high power jammer requires the following aspects to be
taken into consideration. Jamming may be performed over a wide area
and long distance using sky wave propagation (1000's of Km's) and
Small areas may be jammed over shorter distances by using ground
wave propagation (100's of Km's). So our main concern is how HF
jammer propagates through the sky wave to cover long distance and
jamm the legitimate receiver.
2.1 THE IONOSPHERE AND HF JAMMER RADIO
PROPAGATION

To understand sky wave propagation, you need to consider the effects of


the ionosphere and solar activity on HF radio propagation. We must also
be familiar with the techniques used to predict propagation and select the
best frequencies for a particular link at a given time. Let’s with some
definitions [1].

2.1.1 THE IONOSPHERE NATURE

The ionosphere is a region of electrically charged particles or gases in


the earth’s atmosphere, extending from approximately 50 to 600 km
above the earth’s surface. Ionization, the process in which electrons are
stripped from atoms and produces electrically charged particles, results
from solar radiation. When the ionosphere becomes heavily ionized, the
gases may even glow and be visible. This phenomenon is known as
Northern and Southern Lights (ionization) [1].

Also the ions and electrons formed by the solar radiation are lost through
recombination, and a simple form of the continuity equation which
determines the ionization balance is [2]:

(1)
Where N+ is the positive ion density and 𝛼𝑒𝑓𝑓 is a constant, the effective
recombination rate, x is the solar zenith angle. The height and intensity
of each layer varies in a systematic manner with solar elevation [2].

Why is the ionosphere important in HF radio? Well, this blanket of gases


is like nature’s satellite, making HF BLOS radio communications
possible. When radio waves strike these ionized layers, depending on
frequency, some are completely absorbed, others are refracted so that
they return to the earth, and still others pass through the ionosphere into
outer space. Absorption tends to be greater at lower frequencies, and
increases as the degree of ionization increases [1].

The angle at which sky waves enter the ionosphere is known as the
incident angle (Figure 2-1). This is determined by wavelength and the
type of transmitting antenna. Like a billiard ball bouncing off a rail, a
radio wave reflects from the ionosphere at the same angle it hits it [2].

Thus, the incident angle is an important factor in determining


communications range. If you need to reach a station that is relatively far
from you, you would want the incident angle to be relatively large. To
communicate with a nearby station, the incident angle should be more
acquit.
Figure 1: Ionosphere incident angle

Figure 2: The ionosphere layers


The incident angle of a radio wave is critical because if it is too nearly
vertical, it will pass through the ionosphere without being refracted back
to earth. If the angle is too great, the waves will be absorbed by the
lower layers before reaching the more densely ionized upper layers. So,
incident angle must be sufficient for bringing the radio wave back to
earth, yet not so great that it will lead to absorption [2].

2.1.1.1 LAYERS OF THE IONOSPHERE

Within the ionosphere, there are four layers of varying ionization (Figure
2-2). Since ionization is caused by solar radiation, the higher layers of
the ionosphere tend to be more highly ionized, while the lower layers,
protected by the outer layers, experience less ionization. Of these layers,
the first, discovered in the early 1920s by Appleton, was designated E
for electric waves. Later, D and F were discovered and noted by these
letters. Additional ionospheric phenomena were discovered through the
1930s and 1940s, such as sporadic E and aurora.

In the ionosphere, the D layer is the lowest region affecting HF radio


waves. Ionized during the day, the D layer reaches maximum ionization
when the sun is at its zenith and dissipates quickly toward sunset.

The E layer reaches maximum ionization at noon. It begins dissipating


toward sunset and reaches minimum activity at midnight. Irregular
cloud-like formations of ionized gases occasionally occur in the E layer.
These regions, known as sporadic E, can support propagation of sky
waves at the upper end of the HF band and beyond.

The most heavily ionized region of the ionosphere, and therefore the
most important for long-haul communications, is the F layer. At this
altitude, the air is thin enough that the ions and electrons recombine very
slowly, so the layer retains its ionized properties even after sunset.

In the daytime, the F layer consists of two distinct layers, F1 and F2. The
F1 layer, which exists only in the daytime and is negligible in winter, is
not important to HF communications. The F2 layer reaches maximum
ionization at noon and remains charged at night, gradually decreasing to
a minimum just before sunrise.

During the day, sky wave reflection from the F2 layer requires
wavelengths short enough to penetrate the ionized D and E layers, but
not so short as to pass through the F layer. Generally, frequencies from
10 to 20 MHz will accomplish this, but the same frequencies used at
night would penetrate the F layer and pass into outer space. The most
effective frequencies for long-haul nighttime communications are
normally between 3 and 8MHz.
2.1.2 FACTORS AFFECTING ATMOSPHERIC
IONIZATION

The intensity of solar radiation, and therefore ionization, varies


periodically. Hence, we can predict solar radiation intensity based on
time of day and the season, and make adjustments in equipment to limit
or optimize ionization effects on the communication system [1].

Ionization is higher during spring and summer because the hours of


daylight are longer. Sky waves are absorbed or weakened as they pass
through the highly charged D and E layers, reducing, in effect, the
communication range of most HF bands. Because there are fewer hours
of daylight during autumn and winter, less radiation reaches the D and E
layers. Lower frequencies pass easily through these weakly ionized
layers. Therefore, signals arriving at the F layer are stronger and are
reflected over greater distances [1].

Another longer term periodic variation results from the 11-year sunspot
cycle (Figure 2-3). Sunspots generate bursts of radiation that cause
higher levels of ionization. The more sunspots, the greater the ionization.
During periods of low sunspot activity, frequencies above 20 MHz tend
to be unusable because the E and F layers are too weakly ionized to
reflect signals back to earth. At the peak of the sunspot cycle, however,
it is not unusual to have worldwide propagation on frequencies above 30
MHz [1].
In addition to these regular variations, there is a class of unpredictable
phenomena known as sudden ionospheric disturbances (SID), which can
affect HF communications as well. SIDs are random events due to solar
flares that can disrupt sky wave communication for hours or days at a
time. Solar flares produce intense ionization of the D layer, causing it to
absorb most HF signals on the side of the earth facing the sun [1].

Magnetic storms often follow the eruption of solar flares within 20 to 40


hours. Charged particles from the storms have a scattering effect on the
F layer, temporarily neutralizing its reflective properties.

Figure 3: ionosphere FOT


2.1.2.1 FREQUENCIES AND PATH OPTIMIZATION

OF HF JAMMER

Because ionospheric conditions affect radio wave propagation,


communicators must determine the best way to optimize radio
frequencies at a particular time. The highest possible frequency that can
be used to transmit over a particular path under given ionospheric
conditions is called the Maximum Usable Frequency (MUF).
Frequencies higher than the MUF penetrate the ionosphere and continue
into space. Frequencies lower than the MUF tend to refract back to earth
[1].

As frequency is reduced, the amount of absorption of the signal by the D


layer increases. Eventually, the signal is completely absorbed by the
ionosphere. The frequency at which this occurs is called the Lowest
Usable Frequency (LUF). The “window” of usable frequencies,
therefore, lies between the MUF and LUF. The Frequency of Optimum
Transmission (FOT) is typically 85 percent of the MUF. Generally, the
FOT is lower at night and higher during the day. These frequencies are
illustrated in Figure 2-3 [1].

In addition to frequency, the route the radio signal travels must also be
considered in optimizing communications. A received signal may be
comprised of components arriving via several routes, including one or
more sky wave paths and a ground wave path. The arrival times of these
components vary because of differences in path length; the range of time
differences is called the multipath spread. The effects of multipath
spread can be minimized by selecting a frequency as close as possible to
the MUF [1].

2.1.2.1.1 Different frequencies


To gain a better idea of the characteristics of HF propagation using the
ionosphere, it is worth viewing what happens to a radio communications
signal if the frequency is increased across the frequency spectrum. First
it starts with a signal in the medium wave broadcast band. During the
day signals on these frequencies only propagate using the ground wave.
Any signals that reach the D region are absorbed. However at night as
the D region disappears signals reach the other regions and may be heard
over much greater distances [3].

If the frequency of the signal is increased, a point is reached where the


signal starts to penetrate the D region and signals reach the E region.
Here it is reflected and will pass back through the D region and return to
earth a considerable distance away from the transmitter [3].

As the frequency is increased further the signal is refracted less and less
by the E region and eventually it passes right through. It then reaches the
F1 region and here it may be reflected passing back through the D and E
regions to reach the earth again. As the F1 region is higher than the E
region the distance reached will be greater than that for an E region
reflection [3].

Finally as the frequency of the radio communications signal rises still


further the it will eventually pass through the F1 region and onto the F2
region. This is the highest of the regions in the ionosphere and the
distances reached using this are the greatest. As a rough guide the
maximum skip distance for the E region is around 2500 km and 5000 km
for the F2 region [3].

2.1.2.1.2Multiple hops

Whilst it is possible to reach considerable distances using the F region as


already described, on its own this does not explain the fact that radio
signals are regularly heard from opposite sides of the globe using HF
propagation with the ionosphere. This occurs because the signals are
able to undergo several "reflections". Once the signals are returned to
earth from the ionosphere, they are reflected back upwards by the earth's
surface, and again they are able to undergo another "reflection" by the
ionosphere. Naturally the signal is reduced in strength at each
"reflection", and it is also found that different areas of the Earth reflect
radio signals differently. As might be anticipated the surface of the sea is
a very good reflector, whereas desert areas are very poor. This means
that signals that are "reflected" back to the ionosphere by the Pacific or
Atlantic oceans will be stronger than those that use the Sahara desert or
the red centre of Australia [3].

It is not just the Earth's surface that introduces losses into the signal
path. In fact the major cause of loss is the D region, even for frequencies
high up into the HF portion of the spectrum. One of the reasons for this
is that the signal has to pass through the D region twice for every
reflection by the ionosphere. This means that to get the best signal
strengths it is necessary signal paths enable the minimum number of
hops to be used. This is generally achieved using frequencies close to the
maximum frequencies that can support communications using
ionospheric propagation, and thereby using the highest regions in the
ionosphere. In addition to this the level of attenuation introduced by the
D region is also reduced. This means that a radio signal on 20 MHz for
example will be stronger than one on 10 MHz if propagation can be
supported at both frequencies [3].
2.2 JAMMING TECHNIQUES

2.2.1 Jamming Strategies

It has been shown that jamming approximately 30% or more of a voice


transmission degrades the intelligibility significantly enough to deny an
effective transfer of information. Therefore, denying 30% of
transmissions represents a reasonable goal to strive for and serves as a
useful threshold to achieve for such communications [4].

Jamming of substantially less than 30% is effective against coded or


uncoded digital data communications, as will be shown. Jamming
effectiveness criteria for digital communications will be substantially
different from that for analog, voice communications. All important
SS communication systems utilize digital signaling techniques [4].

There are several possible strategies that a jammer can employ against a
communication system to include AJ systems. Some techniques are
more effective than others, and a successful strategy depends on the
particular type of AJ employed [4].

Two fundamental waveforms are typically used against AJ


communication systems. A carrier signal centered on the transmitting
frequency is unmodulated, modulated with one or more tone signals, or
modulated with a noise signal [4].
The bandwidth of the noise can be varied. When the carrier is not
modulated, the jamming waveform is a single tone. When
modulated with more than one tone, then multiple tones are
emitted by the jammer. Usually, the placement of these tones is based
on some knowledge of the target or targets to be jammed. Noise is used
to raise the background noise in the spectrum in which the AJ
system is operating [4].

The taxonomy of jamming strategies consists of how the available


jammer power is distributed with frequency, the type of modulation
transmitted (if any), the time-sharing of the jammer among several
targets, and power sharing, where the instantaneous power can be
distributed among several targets [4].
2.2.3.1 Broadband Noise Jamming
Broadband noise (BBN) jamming places noise energy across the entire
width of the frequency spectrum used by the target communication
systems. It is also called full band jamming and is sometimes called
barrage jamming. This latter appellation, however, also refers to cases
where less than the full band is jammed [4].
This type of jamming is useful against all forms of AJ
communications. It is generally useful for coverage of an area for
screening purposes as well. In this EP role, the jammer is placed
between an adversary’s ES system(s) and friendly communications.
Directional antennas are, of course, required to be pointed in the
direction of the ES systems if friendly fratricide is to be
minimized. If used correctly, this prevents the adversary from
intercepting friendly communications at least for a time [4].
Since BBN jamming generates signals that are similar to broadband
noise, the level of jamming power is sometimes referred to as J0 and
is measured in watts/hertz just as background noise is specified. The
primary limitation of BBN jamming is that it results in low J0 as limited
jammer power is spread very wide [4].

a) Possible strategies a jammer may use based on the channelized


spectrum
b) Broadband Noise Jamming
BBN jamming is a direct assault on the channel capacity of a
communication system. This capacity, assuming the noise is
Gaussian, was first investigated by Shannon in 1948 [2]. It
expresses the maximum data rate that the channel can carry with an
arbitrarily small error rate. If an attempt is made to transmit a digital
signal through the channel with a higher bit rate than that given by the
capacity, then errors are assured in the received signal. The capacity of a
channel corrupted by such noise is given by
𝑅
C = W 𝑙𝑜𝑔2 (1+
𝑃𝑡
)
Where W is the bandwidth of the signal, R is the average power of the
signal, and Pt is the total average noise present given by
Pt = W (N0 + J0).
Clearly, as the noise level is raised by intentionally inserting Gaussian
noise into the channel, the SNR decreases, thus decreasing the channel
capacity [4].
2.2.3.3 Narrowband Noise Jamming
Narrowband noise (NBN) jamming places all of the jamming energy in
to a single channel. The bandwidth of this energy injection could be the
whole width of the channel or it could be only the data signal
width or the complementary signal width. Pe for jamming both data
paths is given by the same expression as for BBN with Pn = J [4].
When there is a noise signal of average power J injected into the data
channel only, the overall BER is calculated by then Pe can be calculated
𝑅
𝑃𝑡 (− )
𝑃𝑒2 = 𝑒 2𝑃𝑁 +𝐽
2𝑃𝑁 + 𝐽

Where PN is the thermal noise power and J is the average jammer noise
power [4].

a) Possible strategies a jammer may use based on the channelized


spectrum
b) narrowband noise jamming (NBN)

2.2.3 Tone Jamming


In tone jamming, one or more jammer tones are strategically
placed in the spectrum. Where they are placed and their number
affect the jamming performance. Two types of tone jamming are
illustrated in the figure (b). Single-tone jamming places a single tone
where it is needed and is illustrated in Figure. Multiple-tone jamming
distributes the jammer power among several tones and is illustrated in
Figure(c) [4].
The phase of the jammer tone relative to the target signal can be an
important parameter. Suppose that the data symbol is a mark. Further,
assume the jammer signal level is sufficiently greater than the noise that
it can be neglected [4].
When n = 1, in a jammed channel the single jammer tone present is
either at the mark or the space frequency. If it is at the mark
frequency, then the phase can present a problem if the jammer
tone is sufficiently out of phase as explained below. If it is at the
space frequency, then if the JSR is large enough, the symbol is jammed
independent of the phase relationship.
When n > 2 and the tones are present in a contiguous band of channels,
then jamming performance, the same as that for PBN jamming is
achieved. For PBN jamming, it makes no theoretical difference whether
the jammer power that makes it through the detector filters is a tone with
or without noise modulation. Thus, we have partial-band multitone
jamming.
For n = 2 there will be a symbol error if the channel is jammed at all
and the jammer tone power in the complementary channel is greater than
the power in the symbol channel, which consists of the symbol tone and
one of the jammer tones. The power in the symbol channel depends on
the phase relationship between the symbol signal and the jammer tone.

2.2.3.1 Single Tone


A jamming signal transmitted at a single frequency was shown in Figure
(b). Thus, the jamming signal is a CW tone placed at a single frequency.
Single-tone jamming is also called spot jamming.

a) Possible strategies a jammer may use based on the channelized


spectrum

b) Single tone jamming


Single-tone jamming may be useful, for example, against DSSS AJ
systems by overcoming the processing gain of such systems at the
receivers and causing deleterious effects at the dispread level.
When the total jammer power is fixed, more power can be placed in a
single tone than in each of multiple tones, thereby increasing the
probability of overcoming the processing gain. When there is a single
tone and it is placed in the data channel, while the complementary
channel has only thermal noise, then the jammer can enhance the ability
of the receiver to correctly decode the data bit, depending on the
phase relationship between the interfering tone and the data tone
and the relative magnitudes of the tones. The probability of bit error is
given as

Which is

When the single tone is correctly placed in the complementary channel,


Pe is given by

2.2.3.2 Multiple Tones


The jammer could emit L > 1 tones, randomly placed, or placed at
specific frequencies. If a particular target AJ communication system
is vulnerable to specific tones and the jammer knows that, then it
may be more prudent to use tones at those specific frequencies rather
than placing them randomly.
When the tones are in consecutive channels, this is called comb
jamming. Herein, no matter which tone jamming strategy is being
discussed, it is tacitly assumed that the tone is placed precisely at a
frequency in the spectrum so that the jammer tone passes through the
receiver filters without distortion or attenuation. Multitone jamming is
illustrated in Figure 8.1(g). When the interference is jammer tones only
into both the data channel and the complementary channel with no noise,
then Pe is given by

Where

This expression must be evaluated numerically since there is no


known closed- form solution.
Confined to Within the Same Channel, L ≤ M
The L tones can be confined to be in the same channel or they can be
distributed through the spectrum. It is assumed that each of the jamming
tones is at the same power level as the others since the jammer does not
know which of the M data tones is present and has no basis upon which
to apply higher power to one of the tones over another. The goal when
constrained to within the channel is to place tones at two or more
locations where data tones may be located.
If an FFHSS AJ system hops to a channel where such a jammer is
located, one of M tones will be transmitted representing a single symbol.
By jamming with two or more tones, the jammer is assured of
hitting at least one incorrect tone and maybe two. It is also possible
for the jammer to reinforce the correct symbol tone with one of its own
tones. Therefore, whether the jammer is effective or not will depend on:
(1) if the correct symbol tone is not hit then the JSR at the tone
frequencies, and (2) if the correct symbol tone is hit with one of the
jammer tones, then depending on the phase relationship between the
jammer tone and data tone and the JSR, the receiver may correctly
decide which symbol was sent and the jammer will be ineffective or
the jammer could be successful.
If an SFHSS AJ system hops to such a channel then some of the symbol
tones could be received in error depending on the JSR. At those tone
frequencies, representing symbols that were not sent the jammer signal
must be larger than the signal frequency to be effective. At those symbol
times when the jammer hits the symbol tone that was sent, then the
receiver may correctly decide the transmitted symbol since the jammer
reinforces the symbol energy, but this depends on the phase
relationship.
If there are L tones all placed in the same channel, and left there
then this jamming technique would be ineffective against FHSS AJ
communication networks because the target would have to hop to
that channel to be jammed. Therefore, a better strategy is for the
jammer to be swept or hopped randomly to attempt to hit as many
channels as possible. This technique could be used against DSSS AJ
systems, but jammer performance is critically important for
effective jamming. The best jammer performance is obtained by
placing the multiple tones at integer multiples of the data rate.
a) Possible strategies a jammer may use based on the channelized
spectrum

b) Multi tone jamming

2.2.4 Sweep Jamming


A concept similar to broadband or partial-band noise jamming is swept
jamming. This is when a relatively narrowband signal, which could be as
narrow as a tone but more often is a PBN signal, is swept or scanned in
time across the frequency band of interest. At any instant in time,
the jammer is centered on a specific frequency and the only
portion of the spectrum being jammed is in a narrow region around
this frequency. However, since the signal is swept, a broad range of
frequencies can be jammed in a short period. When implemented
digitally, for example, the jammer may spend 100 µs at any one
frequency before moving on to the next band to be jammed. Normally
these bands would be consecutive, but do not have to be the bands
could actually be selected randomly with digital synthesizers
generating the jamming waveform. In this way this jammer could
cover the whole 1.5 – 30 MHz band in about 120 ms.
The net effect of such a jamming strategy is similar to a barrage jammer
except that the full power of the jammer is employed at each dwell
bandwidth. It is also possible to sectorize the jamming strategy and
avoid certain bands that might be in use by friendly forces. This is true
only when the timing is tailored to the target receivers so that the
jamming signal is present at the receiver for an adequate dwell
time. The characteristics of the target receivers must be taken into
consideration for swept jamming to be effective.
It is also important to note that the characteristics of the target
receiver are important for evaluating the effectiveness of swept
jamming. The filtering process in the receiver has considerable
impact on the dwell duration required
The main purpose for sweeping the partial-band noise waveform is to
ensure that the jammer enters the frequency spectrum where an
FHSS target net is located. Normally FHSS AJ networks do not use
every channel from, say, 1.5 MHz to 30 MHz, but only a portion, called
the hop set. These hop sets need not be that large to be effective. It could
be that a partial-band jammer permanently situated in a portion of the
spectrum does not cover any of the hop set frequencies, or perhaps just a
few of them. This renders the partial-band jammer ineffective. By
sweeping the jamming waveform over the whole range, then the jammer
is ensured to jam at the entire set of hop frequencies.
Timing is one of the more important parameters for a swept
jammer. The sweeping must be fast enough to ensure that the
whole band is covered in a sufficiently short period or hops will
occur for which no jamming signal is present. On the other hand,
sweeping cannot be so fast that when a hop is jammed, an
inadequate fraction of the hop is jammed. A BER of 10−1 means that it is
necessary to jam 1 bit out of 10, or for an AJ system that is sending data
at 20 kbps, 2,000 bits must be jammed to produce this BER.
The trade-off with these numbers is that as the instantaneous
bandwidth is increased, the power per channel decreases if the total
jammer power remains fixed. Obviously, when the instantaneous
bandwidth gets large enough to be equal to the total target system
bandwidth, the results are the same as BBN jamming. In that case, there
is no point in sweeping at all.

2.2.6 Follower Jamming


A follower jammer attempts to locate the frequency to which the
frequency hopping transmitter went, identify the signal as the one of
interest (the target), and jam at the new frequency. This jamming
waveform could be in the form of tones or it could modulate the
tones with, say, noise using FM modulation. Follower jamming is
also referred to as responsive jamming, repeater jamming, and repeat
back jamming.
The limitations of follower jammer related to the placement of the
communicators relative to the jammer that imposes timing constraints.
The task of the ES system is to acquire where an FHSS signal has
moved in frequency so the EA system can place the jamming signal at
that frequency. This is typically done by measuring the spectrum for
new energy loss or gain and making appropriate measurements on
those channels. A loss of energy implies that the target has moved to a
new frequency. A gain of energy in a channel implies that a new signal
is present, which may or may not be the target. ES to find the new
frequency can be very difficult to do accurately and rapidly. Even when
the channel structure of the spectrum is limited, when measuring
just energy, most targets may look similar. It requires an
examination of the details of each new signal to determine if it is the
target.
The timing of a follower jammer must satisfy certain constraints
due to the finite propagation and processing time of the signals. In
general, to meet the timing requirements, the jammer must lie anywhere
on or within the ellipse shown in Figure below.

Figure: Ground-based jamming scenario


where the distances are as shown in the figure, TJ is the
processing time at the jammer, Td is the dwell time of the target
signal, V is the fraction of the dwell that must be jammed to be
effective, and c is the speed of propagation. The transmitter and receiver
are the foci of this ellipse. This equation can be manipulated to

The timing of such is shown in Figure 8.16. Tδ represents the


difference in propagation time of the transmitter signal at the
receiver and the jammer. This time may actually be negative if the
jammer is closer to the transmitter than the receiver. The jammer takes a
certain amount of time to process the signal and this is represented by
Tprop. The jammer signal takes a certain amount of time to Propagate
to the receiver once the jammer signal is started. This is represented by
Tprop. For the majority of the cases of interest herein, the
propagation times are negligible compared with the other times
involved.
The dwell fraction within which follower jamming will be effective
depends on the path length difference between the path between
the transmitter and receiver versus the path from the transmitter to the
jammer and the jammer to the receiver. It is also affected by the
amount of processing time required at the jammer to make a
jamming decision.
Figure: FHSS follower jamming timing.
CHAPTER THREE
3. SYSTEM DESIGN AND PARAMETERS
3.1 IONOSPHERIC MODELS
Ionospheric modeling for HF-communication purposes aims at a
description of the ionosphere and its variations in time and space, which
allows prediction of propagation parameters. The model must therefore
be simple enough to be practical, and sufficiently complete and accurate
to be useful. The degree of complexity and sophistication in a model
depends upon the requirements and resources of the user, and the
practical solution is always a compromise between the needs for
simplicity and for accuracy. There are two different approaches to the
modeling of ionospheric circuits. The first is to fit empirical equations
to measurements of signal characteristics for different times and paths,
the other is to estimate these characteristics in terms of a number of
separate factors known to influence the signal (Bradley 1979), such as
critical frequencies, layer heights, absorption etc. When a large data
base exists for a particular circuit, the former may be useful, but it lacks
generality. The second approach has the advantage that a limited data
base can be combined with knowledge of physical principles to guide a
description of the behavior of the ionospheric layers.
The first approach has been successfully applied to medium frequency
(MF) propagation, whereas it is generally agreed that the second method
is the most efficient one for HF propagation.

3.1.1 Modeling of the ionospheric layers


If the ionospheric electron density height profile is known at every point
along a propagation path, the signal characteristics at the receiver may
be calculated using some form of raytracing procedure. A useful
approximation is to neglect variations along the path and assume that the
profile at the reflection point (or points if there are more than one hop)
may be used in the raytracing.
The problem is then to describe this profile in terms of a few measurable
parameters, so that the raytracing through the simplified model
ionosphere yields realistic signal characteristics, for vertical incidence
raytracing should reproduce an ionogram typical for the time and
location of the reflection point.

3.1.2 Modeling of ionospheric absorption


Most of the ionospheric absorption of HF-waves occurs in the D-region.
D region electron densities are, however, small and difficult to measure,
and the ionospheric loss is therefore normally modeled by means of
empirical equations based upon absorption measurements. The
absorption of the ordinary wave may be written (Budden 1966).
1
𝑁 𝜐𝑑𝑠
µ 𝑒
L = const ʃ𝑠 𝜐
(𝑓+ 𝑓𝑒 )+ ( )2
2𝛱

3.2 Signal to Noise ratio calculation Effectiveness


In order to disrupt a communication system, in a given location and at a
given time, two fundamental questions arise for the jamming. One is,
what is the best jamming waveform and strategy and the second, how
effective will jamming be against the system.
Today, development of communication techniques has severely curtailed
the possibilities of intercepting and communications. Thus, it seems
inevitable that military communications, in the battlefield, is forced to
operating in a jamming environment.
Intercepting communication is more difficult since the communication
energy is usually not directed toward the jammer and the transmitted
power is low. Although the communication system uses relatively low
power, the jamming signal must compete with a transmitted signal
traveling a one-way path. The jammer is usually farther away from the
communication receiver than the communication transmitter is.
In assessing the potential effectiveness of jamming it is useful to
calculate a signal to-jamming ratio at the communication receiver.
Figure A.3.1 illustrates the geometric configuration, where D, is the
distance between the transmitter and the receiver, and D, the distance
between the jammer and the receiver. The average power of the desired
signal at the input of the communication receiver is:

Where P, is the desired signal power, P. is the average transmitted


power. GR is the gain of the transmitter antenna in the direction of the
receiver, G, is the gain of the receiver antenna in the direction of the
transmitter, / is the wave length, and LR represents propagation and
equipment losses. Similarly power at the receiver antenna due to the
jammer ideally should be:

Where Pj is the average jamming power, G, is the gain of the jammer


antenna in the direction of the receiver, D, is the distance between
jammer and receiver. L., represent propagation and equipment losses of
jammer and receiver, and P, is the desired signal power received from
the jammer.
The amount of jamming power which reaches the receiver may be
reduced by two factors. First, there is a polarization loss due to the
jammers different polarization. This may be described by a factor P
which has the range 0 < P < 1. A second jamming power reduction may
be caused by receiver band pass filtering. This effect is described by the
function f (BR, B,), which has the range 0 < ABRB) < 1, where BR is
the effective bandwidth of the receiver band pass filter, and B, is the
bandwidth of the jamming signal. If the jamming spectrum is included
in the receiver band pass (B < BR) then:
J (BR, Bs) = 1
If jamming spectrum includes the entire receiver passband (B1 > BR)
then:

Hence the net jamming power effecting the receiver becomes

At the communication receiver, the environment noise is equal to KT,


BR. where K is Boltzmann's constant and T, is the effective noise
temperature. The total interference power is the sum of the
environmental power and the jamming power. Thus the signal-to-
jamming ratio is

If the jamming- is to be effective, it is generally necessary that P2>KTB,


hence
3.3 The distance to be jammed (D)
This parameter is very important in our design, since the amount of the
output power of the jammer depends on the area that we need to jam.
Later on we will see the relationship between the output power and the
distance D. Our design is established upon D

3.4 The frequency bands


3.5 Parts of the jammer devices & their
Specifications
3.5.1 Arbitrary Function Generator (HMF 2525/2550)
HMF 2525/2550 is an arbitrary function generator that generates
different types of wave forms (sine, Square, Pulse, Triangle and
Arbitrary waveforms) in the range of 10μHz...25MHz/50MHz
frequencies. The common key specifications of the function generator
are listed below:
Frequency range 10μHz...25MHz/50MHz Output voltage
5mVpp...10Vpp (into 50Ω) DC Offset ± 5mV...5V Arbitrary
waveform generator: 250MSa/s, 14Bit, 256kPts
Sine, Square, Pulse, Triangle, Ramp, Arbitrary waveforms incl.
standard curves (White, pink noise etc.).
Total harmonic distortion 0.04% (f‹100kHz)
Burst, Sweep, Gating, external Trigger Rise time ‹ 8ns, in pulse
mode 8ns...500ns variable-edge-time
Pulse mode: Frequency range 100μHz...12.5MHz/25MHz, pulse
width 10ns…999s, resolution 5ns
Modulation modes AM, FM, PM, PWM, FSK (int. and ext.)
10MHz Time base: ± 1ppm TCXO, rear I/O BNC connector
Front USB connector: save & recall of set-ups and waveforms
8,9cm (3.5") TFT: crisp representation of the waveform and all
parameters
USB/RS-232 Dual-Interface, optional Ethernet/USB or IEEE-488
3.5.2 Power amplifier (3061 / 3062)
CODAN HF power amplifier are reliable, affordable and designed for
use with CODAN HF transceiver. The CODAN3061 and 3062 provide
500W PEP and 1000W PEP output power respectively, and are suitable
for voice and data operation.

3.5.2.1 Features of CODAN Power amplifier


(3061 / 3062)
CODAN NGT HF transceiver interface

CODAN NGT HF transceivers provide users with a simple interface to


control and operate the HF power amplifier. Fault conditions are
automatically detected and reported to the user via the CODAN NGT
interface. The CODAN HF amplifier automatically switch to stand -by
mode when they are not being used, or when the attached CODAN NGT
HF transceiver is power off.
Continuous mode operation
The CODAN HF amplifier are rated for 100% continuous operation in
all modes for either or data applications.

High efficiency
Advanced switched mode power supplies are used in the final amplifier
output stage to maximize efficiency of the amplifier and reduce heat.
This is achieved by varying the supply voltage on the RF transistors
depending up on the current load and modulation.
Protection and backup
HF power amplifier are fully protected against all load conditions and
excessive heat sink temperatures. They are capable of operating with
loads of VSWR or temperature of up to 3:1 with reduced output power.
When excessive VSWR or over temperature occurs, the amplifier
switches to bypass mode to prevent permanent damage. In by-pass
mode, the full output power of the attached CODAN NGT HF
transceiver is available as backup to keep the station operational and on
air.
Antenna tuner interface
The CODAN HF amplifiers provide an interface to control an external
antenna tuner or coupler. The attached NGT transceiver automatically
performs a tune when a new transmit frequency is chosen.
Tuning operates on low power, then the high power output engages after
the tune is completed.
Front panel indicator
The Front panel indicator provide a comprehensive display of fault
conditions including internal fault, VSWR and over temperature. An
LED bar graph is provided to display either the PEP output power or
supply current status.
Amplifier cooling
The HF amplifier have extensive heat sink with fan forced airflow
cooling. For increased reliability and durability, the fun are
thermostatically controlled and operate on two speeds depending on the
heat sink temperature.
3.5.2.2 Specifications of CODAN Power amplifier
(3061 / 3062)

RF power output
Type 3061 500 W PEP ±1 dB, 300 W average
Type 3062 1 kW PEP ±1 dB, 600W average

Frequency range 1.5 to 30 MHz

Input/output 50 Ω
impedance

Operating –10 to +60°C


temperature
Duty cycle 100%: normal speech over full temperature range
100%: all modes up to maximum ambient of 45°C
Power supply 100–240 V AC ±10%, 50/60 Hz single phase
Power
consumption

Type 3061 800 VA (two-tone), 900 VA maximum


Type 3062 1.6 kVA (two-tone), 1.8 kVA maximum
Protection Safe under all load conditions
Bypass to 125W PEP from transceiver in the event
of excess VSWR, excess heat sink temperature &
internal fault conditions
Spurious and Better than 60 dB below PEP
harmonic
emissions
Intermodulation Better than 26 dB below each tone
(two-tone test) Better than 32 dB below PEP
Cooling Fan forced front panel exhaust
Thermostatically controlled dual speed
Low: > 45 degree Celsius
High: > 55 degree Celsius
Size Amplifier (5RU 19" rack): 222 x 483 x 410 mm (H
x W x D)
Power supply (5RU 19" rack): 222 x 483 x 410
mm (H x W x D)
Weight

Type 3061 Amplifier: 15.4 kg, Power supply: 6.7 kg


Type 3062 Amplifier: 23.6 kg, Power supply: 10.0 kg
ALC A 10 dB increase in signal input above
compression threshold produces < 0.5 dB increase
in power output
Maximum ALC range > 30dB
ALC attack time approximately 2ms

3.5.3 Antenna

You might also like