外文翻译通信工程英文的毕业设计论文

合集下载

通信工程毕业设计外文翻译--下一代无线宽带的目标(4G—5G)

通信工程毕业设计外文翻译--下一代无线宽带的目标(4G—5G)

附录一、英文原文:Goals Of True Broad band’s Wireless Next Wave(4G-5G)K.R.Santhi,Prof.V.K.Srivastava,G.SenthilKumaran,Eng. Albert Butare.Kigali Institute of Science Technology and Management (KIST),B.P.3900, Kigali,Rwanda.AbstractAs access technology increases, voice, video,multimedia, and broadband data services are becomingintegrated into the same network. Fourth Generation (4G)is the next generation of wireless networks that will replacethird Generation (3G) networks sometimes in future. 4G isintended to provide high speed, high capacity, low cost perbit, IP based services.4G is all about an integrated, globalnetwork that’s based on an open system approach. The goalof 4G i s to “replace the current proliferation of core cellularnetworks with a single worldwide cellular core networkstandard based on IP for control, video, packet data andV oIP. But while 3G haven’t quite arrived, researchers wantto contribute their ideas to the development of an as-yetundefined "wireless world" that could become operationalby around 2010. This paper deals with the fundamentalsand issues of networks, technologies, spectrum, standards,terminals, services of 4G and about the visions that thenetwork operators and service providers see for theevolution of 4G mobile systems and where is future researchfrom their perspective necessary?Keywords:Wireless, 4G, W-OFDM, MC-CDMA, LAS-CDMA,UWB.I. INTRODUCTIONWhile carriers and handset manufacturers obviously havetheir hands full with 3G, some companies are alreadylooking beyond this next generation of wirelesstechnology and networks. 4G is simply an initiative byacademic R&D labs to move beyond the limitations andproblems of 3G which is having trouble getting deployedand meeting its promised performance and throughput.While this 3G has not completely reached researchers andvendors are expressing growing interest in 4G why? Twomain areas are addressed in these initiatives: An increaseof capacity in the radio link and seamless mobility acrossheterogeneous access networks. Section 2 discusses aboutthe issues of 3G that has created interest towards 4Gdevelopments.Section 3 about evolution and comparison,Section 4 describes about the goals and the vision, section5 explains about some of the technologies for 4G, and inother following sections the applications, the research andother issues for 4G developments are discussed.II. WHY THE LEAP TOWARDS 4G?3G networks are in a very painful phase of theirdevelopment, with early trials yielding disappointingresults, costs ballooning, technical glitches, and networkoperators being forced to deflate expectations based onunrealistic hype. Despite the hype surrounding thehigher-speed 3G mobile networks now underconstruction, the reasons for the leap towards 4G are:A. PerformanceIndustry skeptics say that users will not be able to takeadvantage of rich multimedia content across wirelessnetworks with 3G. 4G communications will featureextremely high-quality video equal to that of high-definitiontelevision. In addition, it will enable wirelessdownloads at speeds exceeding 100 Mbps, about 260times than 3G wireless network.B. InteroperabilityThere are multiple standards for 3G making it difficult toroam and interoperate across networks. We need a globalstandard that provides global mobility and serviceportability so that service provider would no longer bebound by single-system vendors of proprietaryequipment.C. Networking3G are based on primarily a wide-area concept. We needhybrid networks that utilize both wireless LAN (hot spot)concept and cell or base-station WAN design. With 4G,the world would have base stations everywhere, ensuringphone usersconnection to a high-speed networkanywhere, anytime.D. BandwidthWe need wider bandwidth and higher bit rates. The 4Gtechnology, with its transmission speeds of more than 20mbps, would offer high-bandwidth services within thereach of LAN "hotspots," installed in offices,homes,coffee shops,and airport lounges. Away from thesehotspots, customers could connect to souped-up 2Gnetworks for voice and rudimentary data coverage.E. TechnologyUnlike 3G, 4G will more resemble a conglomeration ofexisting technologies rather than an entirely newstandard. Analysts define 4G as a seamless combinationof existing 2G wireless networks with local-areanetworks (LANs) or Bluetooth.F. ConvergenceConvergence involves more than mere technology; it is acoming together of services and markets.We need allnetwork that utilizes IP in its fullest form with convergedvoice and data capability,which the 4G will achieve.G. Cost4G systems will prove far cheaper than 3G, since theycan be built atop existing networks and won't requireoperators to completely retool and won't require carriersto purchase costly extra spectrum.Also an open systemIP wireless environment would probably further reducescosts for service providers by ushering in an era of realequipment interoperability.H. ScalabilityScalability, or the ability to handle increasing numbers ofusers and diversity of services, is more challenging withmobile networks."Design for Scalability," includesinformation that can help you meet changing usagedemands.Because an all IP core layer of 4G is easilyscalable, it is ideally suited to meet this challenge.III.EVOLUTION AND COMPARISON OFBROADBANDWIRELESS1) First Generation (1G):1G wireless mobilecommunication systems, was introduced in the early1980s.1G wireless was analog and supported the firstgeneration of analog cell phones.They include asignaling protocol known as SS7 (Signaling System 7).2) Second Generation (2G): 2G systems, fielded in thelate 1980s, were intended primarily for voicetransmission and was all about digital PCS.3) Third Generation (3G): 3G in wireless will be adeliberate migration to faster, data-centric wirelessnetworks.The immediate goal is to raise transmissionspeeds from 125kbps to 2M bit/sec.4) Fourth Generation (4G): In reality, as of first half of2002, 4G is a conceptual framework for or a discussionpoint to address future needs of a universal high speedwireless network that will interface with wirelinebackbone network seamlessly.IV. THE 4G NETWORK THAT THECELL-HEADSDREAM ABOUT4G can be imagined of as an integrated wireless systemthat enables seamless roaming between technologies.Auser can be operating in cellular technology network andget handed over to a satellite-based network and back to afixed wireless network, depending upon the networkcoverage and preference of charging.A. The GoalsOpen Mobile Alliance’s (OMA) main goal is to makesure different wireless services and devices worktogether, and across countries, operators, and mobileterminals.Other plans in the group's charter include:•Deliver open standards and specifications based onmarket and customer requirements.• Create and promote a common industry view on anarchitectural framework.• Help consolidate standards groups and work inconjunction with other existing standardsorganizations and groups.B. The Composite Vision• 20 Mbps data rates• Streaming Audio/Video• Asymmetric Access• Adaptive Modulation/Coding• Dynamic packet assignment• Smart/Adaptive antennas supportedC. 4G Network Architecture“4G” wireless networks can be realized with an IP-basedcore network for global routing along with morecustomized local-area radio access networks that supportfeatures such as dynamic handoff and ad-hoc routing aswell as newer requirements such as self-organization,QoS, multicasting, content caching, etc..In 4G LANs will be installed in trains and trucks as wellas buildings, or even just formed on an ad-hoc basisbetween random collections of devices that happen tocome within radio range of one other. Routing in suchnetworks will depend on new architectures, already underdevelopment by the IEEE and a European project calledMobile IP Network Developments (MIND).D. The working PrincipleIn 4G-style mobile IP, each cell phone is assigned apermanent "home" IP address, along with a "care-of"address that represents its actual location.When acomputer somewhere on the Internet wants tocommunicate with the cell phone, it first sends apacketto the phone's home address.A directory server on thehome network forwards this to the care-of address via atunnel, as in regular mobile IP. However, the directoryserver also sends a message to the computer informing itof the correct care-of address, so future packets can besent directly.This should enable TCP sessions and HTTPdownloads to be maintained as users move betweendifferent types of networks.Because of the manyaddresses and the multiple layers of subnetting, IPv6 isneeded for this type of mobility.V. TECHNOLOGIES THAT SUPPORT 4GThe revolution in 4G will be the optical networking, thenew air interface, the portable device etc.A. The Transmission Protocols1) OFDM: OFDM is a digital modulation technology inwhich in one time symbol waveform, thousands oforthogonal waves are multiplexed.This is good for highbandwidth digital data transition.2) W-OFDM: W-OFDM enables data to be encoded onmultiple high-speed radio frequencies concurrently. Thisallows for greater security, increased amounts of databeing sent, and the industry’s most efficient use ofbandwidth.W-OFDM enables the implementation of lowpower multipoint RF networks that minimize interferencewith adjacent networks.This enables independentchannels to operate within the same band allowingmultipoint networks and point-to-point backbone systemsto be overlaid in the same frequency band.3) MC-CDMA : MC-CDMA is actually OFDM with aCDMA overlay.Similar to single-carrier CDMA systems,the users are multiplexed with orthogonal codes todistinguish users in (multi-carrier) MC-CDMA.Howeverin MC-CDMA, each user can be allocated several codes,where the data is spread in time or frequency.4) LAS-CDMA:LinkAir Communications is developer of LAS-CDMA(Large Area Synchronized Code Division MultipleAccess) a patented 4G wireless technology. LAS-CDMAenables high-speed data and increases voice capacity andlatest innovative solution, CDD, merges the highlyspectral efficient LAS-CDMA technology with thesuperior data transmission characteristics of TDD.Thisresulting combination makes CDD the most spectrallyefficient, high-capacity duplexing system available today.B. The Radio Interface-UWB RadioTo make 4G really work carries will need to migrate toUltra Wideband (UWB) technology.UWB radiowill deliver essential new wireless andwired bandwidth inexpensively, without using preciousand scarce radio frequencies.Instead,digital video, voiceand data are enabled using modulated pulses of energythat peacefully co-exist alongside traditionalcommunications.UWB radio solves the multipath fadingissues and is 1,000% more process efficient than CDMA.C. The Network-LMDSLocal multipoint distribution system (LMDS) is thebroadband wireless technology used to deliver voice,data, Internet, and video services in the 25-GHz andhigher spectrum (depending on licensing).The acronymLMDS is derived from the following: L(local)—denotes that propagation characteristics ofsignals in this frequency range limit the potentialcoverage area of a single cell site;M (multipoint)—indicates that signals are transmitted ina point-to-multipoint or broadcast method;D (distribution)—refers to the distribution of signals,which may consist of simultaneous voice, data, Internet,and video traffic;S (service)—implies the subscriber nature of therelationship between the operator and the customer.VI. POTENTIAL APPLICATIONS OF 4G1) Virtual Presence: 4G system gives mobile users a"virtual presence" -- for example, always-on connectionsthat keep people involved in business activities regardlessof whether they are on-site or off.2)Virtual navigation:A remote database contains thegraphical representation of streets, buildings, andphysical characteristics of a large metropolis.Blocks ofthis database are transmitted in rapid sequence to avehicle, where a rendering program permits the occupantsto visualize the environment ahead.3) Tele-medicine: 4G will support remote healthmonitoring of patients.For e.g. the paramedic assistingthe victim of traffic accident in a remote location mustaccess medical records and may need videoconferenceassistance from a surgeon for an emergency intervention.The paramedic may need to relay back to the hospital thevictim's x-rays taken locally.4)Tele-geoprocessing applications:Thecombination of geographical information systems (GIS),global positioning systems (GPS), and high-capacitywireless mobile systems will enable a new type ofapplication referred to as tele-geoprocessing.Queriesdependent on location information of several users, inaddition to temporal aspects have many applications.5) Crisis-management applications:Naturaldisasters can affect the entire communicationsinfrastructure is in disarray.Restoring communicationsquickly is essential.With wideband wireless mobilecommunications Internet and video services, could be setup in hours instead of days or even weeks required forrestoration of wireline communications.6) Education :Educational opportunities availableon the internet, for individuals interested in life-longeducation, will be unavailable to client in remote areasbecause of the economic unfeasibility of providingwideband wireline internet access.4G wirelesscommunications provides a cost-effective alternative inthese situations.VII. ROLE OF THE WIRELESSINDUSTRYRECOMMENDATIONSWe are bringing to the attention of professionalsfollowing issues and problems that must be analyzed andresolved:1)Standardization: Standardization of wireless networksin terms of modulation techniques, switching schemesand roaming is an absolute necessity for 4G. We mustpay more attention to general meaning advancedtechnologies.2) Lower Price Points Only Slightly Higher thanAlternatives: The business visionaries should do someeconomic modeling before they start 4G hype. Theyshould understand that 4G data applications likestreaming video must compete with very low costwireline applications.3) More Coordination Among Spectrum RegulatorsAround the World:We must demand almost freespectrum NOT necessarily unlicensed Spectrumregulation bodies must get involved in guiding theresearchers by indicating which frequency band might beused for 4G.4) Regulatory frameworks:Policy and RegulatoryEnvironment which Provides Transparency, Certaintyand a Level Playing Field are necessary. The mostimportant thing is that we should recognize thatregulatory framework is as much an evolving matter astechnology, and be prepared to meet changes with anopen-minded and pragmatic attitude, always keeping theinterests of the industry and consumers in mind.5) More Academic Research:Universities must spendmore effort in solving fundamental problems in radiocommunications (especially multiband and widebandradios, intelligent antennas and signal processing).6) Voice-independent Business Justification Thinking:Business and Technology executives should not bias theirbusiness models by using voice channels as economicdeterminant for data applications.V oice has a built-indemand limit - data applications do not.7) Integration Across Different Network Topologies:Network architects must base their architecture on hybridnetwork concepts thatintegrates wireless wide areanetworks, wireless LANS (IEEE 802.11a, IEEE 802.11b,IEEE 802.11g, IEEE 802.15 and IEEE 802.16), Bluetoothwith fiber-based Internet backbone.Broadband wirelessnetworks must be a part of this integrated networkarchitecture.8) Non-disruptive Implementation: Upgrading from 3G to 4G is expected to be seamless to end-users with nodevice upgrades required.VIII. DEVELOPMENTS IN 4GAT&T is combining W-OFDM and EDGE technologies,to provide broadband mobile downlink access at peakrates of up to 10 Mbps while EDGE offers uplink accessat 384 Kbps with an 800KHz bandwidth in a high-mobilityenvironment.Sun Microsystems Laboratories are building 4G wirelesstechnologies that promise tointegrate voice and web datain an IP-based mobile communications.The Government of Karnataka in India has signed a MoUwith Charmed Technologies Inc from Beverly Hills,California and Software Technology Parks of India inKarnataka to develop 4G wireless technology. Theproject plan to use wireless technology based on theIEEE802.11a and IEEE802.11b standards for wirelessLAN for the underlying network is designed to support adata rate of up to 11Mbps and 54Mbps respectively. Thegoal is to get 6 billion people connected to the wirelessInternet by 2010.NTT DoCoMo and Hewlett-Packard Company &MOTOmediacollaboration will explore new mobile serviceconcepts in which people, places and things will be ableto interact, thereby bridging the real and the cyber world.MOTO-media is expected to enable high performancestreaming of multimedia content to mobile users.DoCoMo and HP aim to nish the shared study of basictechnology by 2003 and hope to push for 4G in 2006.IX. SUGGESTIONSWe would like to give the following suggestions for thedevelopment of 4G mobile technologies:1. Technologies like 4G must be developed to integrateinto a more flexible network that grow within thenetwork so that we don't have to scarp the old network toimplement the next generation, the generations to come.2. The very big challenge for developing a technology isproper human resource for building high quality systems.Big organization, which is engaged in software andsystem development, should rapidly go for tie-ups witheducational institutes for better manpower and knowledgemanagement.3. We talk about mobile multimedia that 4G will supportbut in reality people are not going to watch TV whilethey walk down the street. Likewise people will not buyCoca Cola at vending machines with a cell phone. Quitoften services conjured up by the engineering side of thevendor organizations has little to do with the reality. Sowireless industry should ponder well about marketdemand and invest money so that they will not be at loss.X.CONCLUSION4G should make a significant difference and addperceived benefit to an ordinary person’s life over 3G.We should drop the 2.5G, 3G, 4G speak altogether wherean additional “G” means merely an increase in capacity.What really means something for the users are newservices, integration of services, applications etc. Ourgoal is to struggle to get a “G”eneration of standards sothat we can take our phone anywhere in the world andaccess any service or communicate with any other userany way we want that will offer connectivity soinexpensively. In short, 4G or WWWW (World WideWireless web) should be a more intelligent technologythat interconnects the entire world without limits.二、英文翻译:下一代无线宽带的目标(4G—5G)摘要:随着接入技术的增长,语音、视频、多媒体和宽带数据业务正在集成到同一个网络中去。

本科毕业论文中英文翻译--Wireless-Communications无线通信【范本模板】

本科毕业论文中英文翻译--Wireless-Communications无线通信【范本模板】

Wireless Communications*byJoshua S。

Gans,Stephen P。

King and Julian Wright1. IntroductionIn 1895, Guglielmo Marconi opened the way for modern wireless communications by transmitting the three—dot Morse code for the letter ‘S’ over a distance of th ree kilometers using electromagnetic waves。

From this beginning,wireless communications has developed into a key element of modern society. From satellite transmission, radio and television broadcasting to the now ubiquitous mobile telephone,wireless communications has revolutionized the way societies function.This chapter surveys the economics literature on wireless communications。

Wireless communications and the economic goods and services that utilise it have some special characteristics that have motivated specialised studies。

First, wireless communications relies on a scarce resource –namely,radio spectrum –the property rights for which were traditionally vested with the state. In order to foster the development of wireless communications (including telephony and broadcasting)those assets were privatised。

毕设外文原文及译文

毕设外文原文及译文

北京联合大学毕业设计(论文)任务书题目:OFDM调制解调技术的设计与仿真实现专业:通信工程指导教师:张雪芬学院:信息学院学号:2011080331132班级:1101B姓名:徐嘉明一、外文原文Evolution Towards 5G Multi-tier Cellular WirelessNetworks:An Interference ManagementPerspectiveEkram Hossain, Mehdi Rasti, Hina Tabassum, and Amr AbdelnasserAbstract—The evolving fifth generation (5G) cellular wireless networks are envisioned to overcome the fundamental challenges of existing cellular networks, e.g., higher data rates, excellent end-to-end performance and user-coverage in hot-spots and crowded areas with lower latency, energy consumption and cost per information transfer. To address these challenges, 5G systems will adopt a multi-tier architecture consisting of macrocells, different types of licensed small cells, relays, and device-to-device (D2D) networks to serve users with different quality-of-service (QoS) requirements in a spectrum and energy-efficient manner. Starting with the visions and requirements of 5G multi-tier networks, this article outlines the challenges of interference management (e.g., power control, cell association) in these networks with shared spectrum access (i.e., when the different network tiers share the same licensed spectrum). It is argued that the existing interference management schemes will not be able to address the interference management problem in prioritized 5G multitier networks where users in different tiers have different priorities for channel access. In this context, a survey and qualitative comparison of the existing cell association and power control schemes is provided to demonstrate their limitations for interference management in 5G networks. Open challenges are highlighted and guidelines are provided to modify the existing schemes in order to overcome these limitations and make them suitable for the emerging 5G systems.Index Terms—5G cellular wireless, multi-tier networks, interference management, cell association, power control.I. INTRODUCTIONTo satisfy the ever-increasing demand for mobile broadband communications, the IMT-Advanced (IMT-A) standards have been ratified by the International Telecommunications Union (ITU) in November 2010 and the fourth generation (4G) wireless communication systems are currently being deployed worldwide. The standardization for LTE Rel-12, also known as LTE-B, is also ongoing and expected to be finalized in 2014. Nonetheless, existing wireless systems will not be able to deal with the thousand-fold increase in total mobile broadband data [1] contributed by new applications and services such as pervasive 3D multimedia, HDTV, VoIP, gaming, e-Health, and Car2x communication. In this context, the fifth generation (5G) wireless communication technologies are expected to attain 1000 times higher mobile data volume per unit area,10-100 times higher number of connecting devices and user data rate, 10 times longer battery life and 5 times reduced latency [2]. While for 4G networks the single-user average data rate is expected to be 1 Gbps, it is postulated that cell data rate of theorder of 10 Gbps will be a key attribute of 5G networks.5G wireless networks are expected to be a mixture of network tiers of different sizes, transmit powers, backhaul connections, different radio access technologies (RATs) that are accessed by an unprecedented numbers of smart and heterogeneous wireless devices. This architectural enhancement along with the advanced physical communications technology such as high-order spatial multiplexing multiple-input multiple-output (MIMO) communications will provide higher aggregate capacity for more simultaneous users, or higher level spectral efficiency, when compared to the 4G networks. Radio resource and interference management will be a key research challenge in multi-tier and heterogeneous 5G cellular networks. The traditional methods for radio resource and interference management (e.g., channel allocation, power control, cell association or load balancing) in single-tier networks (even some of those developed for two-tier networks) may not be efficient in this environment and a new look into the interference management problem will be required.First, the article outlines the visions and requirements of 5G cellular wireless systems. Major research challenges are then highlighted from the perspective of interference management when the different network tiers share the same radio spectrum. A comparative analysis of the existing approaches for distributed cell association and power control (CAPC) is then provided followed by a discussion on their limitations for5G multi-tier cellular networks. Finally, a number of suggestions are provided to modifythe existing CAPC schemes to overcome these limitations.II. VISIONS AND REQUIREMENTS FOR 5G MULTI-TIERCELLULAR NETWORKS5G mobile and wireless communication systems will require a mix of new system concepts to boost the spectral and energy efficiency. The visions and requirements for 5G wireless systems are outlined below.·Data rate and latency: For dense urban areas, 5G networks are envisioned to enable an experienced data rate of 300 Mbps and 60 Mbps in downlink and uplink, respectively, in 95% of locations and time [2]. The end-to- end latencies are expected to be in the order of 2 to 5 milliseconds. The detailed requirements for different scenarios are listed in [2].·Machine-type Communication (MTC) devices: The number of traditional human-centric wireless devices with Internet connectivity (e.g., smart phones, super-phones, tablets) may be outnumbered by MTC devices which can be used in vehicles, home appliances, surveillance devices, and sensors.·Millimeter-wave communication: To satisfy the exponential increase in traffic and the addition of different devices and services, additional spectrum beyond what was previously allocated to 4G standard is sought for. The use of millimeter-wave frequency bands (e.g., 28 GHz and 38 GHz bands) is a potential candidate to overcome the problem of scarce spectrum resources since it allows transmission at wider bandwidths than conventional 20 MHz channels for 4G systems.·Multiple RATs: 5G is not about replacing the existing technologies, but it is about enhancing and supporting them with new technologies [1]. In 5G systems, the existing RATs, including GSM (Global System for Mobile Communications), HSPA+ (Evolved High-Speed Packet Access), and LTE, will continue to evolve to provide a superior system performance. They will also be accompanied by some new technologies (e.g., beyondLTE-Advanced).·Base station (BS) densification: BS densification is an effective methodology to meet the requirements of 5G wireless networks. Specifically, in 5G networks, there will be deployments of a large number of low power nodes, relays, and device-to-device (D2D) communication links with much higher density than today’s macrocell networks.Fig. 1 shows such a multi-tier network with a macrocell overlaid by relays, picocells, femtocells, and D2D links. The adoption of multiple tiers in the cellular networkarchitecture will result in better performance in terms of capacity, coverage, spectral efficiency, and total power consumption, provided that the inter-tier and intratier interferences are well managed.·Prioritized spectrum access: The notions of both trafficbased and tier-based Prioriti -es will exist in 5G networks. Traffic-based priority arises from the different requirements of the users (e.g., reliability and latency requirements, energy constraints), whereas the tier-based priority is for users belonging to different network tiers. For example, with shared spectrum access among macrocells and femtocells in a two-tier network, femtocells create ―dead zones‖ around them in the downlink for macro users. Protection should, thus, be guaranteed for the macro users. Consequently, the macro and femtousers play the role of high-priority users (HPUEs) and lowpriority users (LPUEs), respectively. In the uplink direction, the macrocell users at the cell edge typically transmit with high powers which generates high uplink interference to nearby femtocells. Therefore, in this case, the user priorities should get reversed. Another example is a D2D transmission where different devices may opportunistically access the spectrum to establish a communication link between them provided that the interference introduced to the cellular users remains below a given threshold. In this case, the D2D users play the role of LPUEs whereas the cellular users play the role of HPUEs.·Network-assisted D2D communication: In the LTE Rel- 12 and beyond, focus will be on network controlled D2D communications, where the macrocell BS performs control signaling in terms of synchronization, beacon signal configuration and providing identity and security management [3]. This feature will extend in 5G networks to allow other nodes, rather than the macrocell BS, to have the control. For example, consider a D2D link at the cell edge and the direct link between the D2D transmitter UE to the macrocell is in deep fade, then the relay node can be responsible for the control signaling of the D2Dlink (i.e., relay-aided D2D communication).·Energy harvesting for energy-efficient communication: One of the main challenges in 5G wireless networks is to improve the energy efficiency of the battery-constrained wireless devices. To prolong the battery lifetime as well as to improve the energy efficiency, an appealing solution is to harvest energy from environmental energy sources (e.g., solar and wind energy). Also, energy can be harvested from ambient radio signals (i.e., RF energy harvesting) with reasonable efficiency over small distances. The havested energy could be used for D2D communication or communication within a small cell. Inthis context, simultaneous wireless information and power transfer (SWIPT) is a promising technology for 5G wireless networks. However, practical circuits for harvesting energy are not yet available since the conventional receiver architecture is designed for information transfer only and, thus, may not be optimal for SWIPT. This is due to the fact that both information and power transfer operate with different power sensitivities at the receiver (e.g., -10dBm and -60dBm for energy and information receivers, respectively) [4]. Also, due to the potentially low efficiency of energy harvesting from ambient radio signals, a combination of different energy harvesting technologies may be required for macrocell communication.III. INTERFERENCE MANAGEMENT CHALLENGES IN 5GMULTI-TIER NETWORKSThe key challenges for interference management in 5G multi-tier networks will arise due to the following reasons which affect the interference dynamics in the uplink and downlink of the network: (i) heterogeneity and dense deployment of wireless devices, (ii) coverage and traffic load imbalance due to varying transmit powers of different BSs in the downlink, (iii) public or private access restrictions in different tiers that lead to diverse interference levels, and (iv) the priorities in accessing channels of different frequencies and resource allocation strategies. Moreover, the introduction of carrier aggregation, cooperation among BSs (e.g., by using coordinated multi-point transmission (CoMP)) as well as direct communication among users (e.g., D2D communication) may further complicate the dynamics of the interference. The above factors translate into the following key challenges.·Designing optimized cell association and power control (CAPC) methods for multi-tier networks: Optimizing the cell associations and transmit powers of users in the uplink or the transmit powers of BSs in the downlink are classical techniques to simultaneously enhance the system performance in various aspects such as interference mitigation, throughput maximization, and reduction in power consumption. Typically, the former is needed to maximize spectral efficiency, whereas the latter is required to minimize the power (and hence minimize the interference to other links) while keeping theFig. 1. A multi-tier network composed of macrocells, picocells, femtocells, relays, and D2D links.Arrows indicate wireless links, whereas the dashed lines denote the backhaul connections. desired link quality. Since it is not efficient to connect to a congested BS despite its high achieved signal-to-interference ratio (SIR), cell association should also consider the status of each BS (load) and the channel state of each UE. The increase in the number of available BSs along with multi-point transmissions and carrier aggregation provide multiple degrees of freedom for resource allocation and cell-selection strategies. For power control, the priority of different tiers need also be maintained by incorporating the quality constraints of HPUEs. Unlike downlink, the transmission power in the uplink depends on the user’s batt ery power irrespective of the type of BS with which users are connected. The battery power does not vary significantly from user to user; therefore, the problems of coverage and traffic load imbalance may not exist in the uplink. This leads to considerable asymmetries between the uplink and downlink user association policies. Consequently, the optimal solutions for downlink CAPC problems may not be optimal for the uplink. It is therefore necessary to develop joint optimization frameworks that can provide near-optimal, if not optimal, solutions for both uplink and downlink. Moreover, to deal with this issue of asymmetry, separate uplink and downlink optimal solutions are also useful as far as mobile users can connect with two different BSs for uplink and downlink transmissions which is expected to be the case in 5G multi-tier cellular networks [3].·Designing efficient methods to support simultaneous association to multiple BSs: Compared to existing CAPC schemes in which each user can associate to a singleBS, simultaneous connectivity to several BSs could be possible in 5G multi-tier network. This would enhance the system throughput and reduce the outage ratio by effectively utilizing the available resources, particularly for cell edge users. Thus the existing CAPCschemes should be extended to efficiently support simultaneous association of a user to multiple BSs and determine under which conditions a given UE is associated to which BSs in the uplink and/or downlink.·Designing efficient methods for cooperation and coordination among multiple tiers: Cooperation and coordination among different tiers will be a key requirement to mitigate interference in 5G networks. Cooperation between the macrocell and small cells was proposed for LTE Rel-12 in the context of soft cell, where the UEs are allowed to have dual connectivity by simultaneously connecting to the macrocell and the small cell for uplink and downlink communications or vice versa [3]. As has been mentioned before in the context of asymmetry of transmission power in uplink and downlink, a UE may experience the highest downlink power transmission from the macrocell, whereas the highest uplink path gain may be from a nearby small cell. In this case, the UE can associate to the macrocell in the downlink and to the small cell in the uplink. CoMP schemes based on cooperation among BSs in different tiers (e.g., cooperation between macrocells and small cells) can be developed to mitigate interference in the network. Such schemes need to be adaptive and consider user locations as well as channel conditions to maximize the spectral and energy efficiency of the network. This cooperation however, requires tight integration of low power nodes into the network through the use of reliable, fast andlow latency backhaul connections which will be a major technical issue for upcoming multi-tier 5G networks. In the remaining of this article, we will focus on the review of existing power control and cell association strategies to demonstrate their limitations for interference management in 5G multi-tier prioritized cellular networks (i.e., where users in different tiers have different priorities depending on the location, application requirements and so on). Design guidelines will then be provided to overcome these limitations. Note that issues such as channel scheduling in frequency domain, timedomain interference coordination techniques (e.g., based on almost blank subframes), coordinated multi-point transmission, and spatial domain techniques (e.g., based on smart antenna techniques) are not considered in this article.IV. DISTRIBUTED CELL ASSOCIATION AND POWERCONTROL SCHEMES: CURRENT STATE OF THE ARTA. Distributed Cell Association SchemesThe state-of-the-art cell association schemes that are currently under investigation formulti-tier cellular networks are reviewed and their limitations are explained below.·Reference Signal Received Power (RSRP)-based scheme [5]: A user is associated with the BS whose signal is received with the largest average strength. A variant of RSRP, i.e., Reference Signal Received Quality (RSRQ) is also used for cell selection in LTE single-tier networks which is similar to the signal-to-interference (SIR)-based cell selection where a user selects a BS communicating with which gives the highest SIR. In single-tier networks with uniform traffic, such a criterion may maximize the network throughput. However, due to varying transmit powers of different BSs in the downlink of multi-tier networks, such cell association policies can create a huge traffic load imbalance. This phenomenon leads to overloading of high power tiers while leaving low power tiers underutilized.·Bias-based Cell Range Expansion (CRE) [6]: The idea of CRE has been emerged as a remedy to the problem of load imbalance in the downlink. It aims to increase the downlink coverage footprint of low power BSs by adding a positive bias to their signal strengths (i.e., RSRP or RSRQ). Such BSs are referred to as biased BSs. This biasing allows more users to associate with low power or biased BSs and thereby achieve a better cell load balancing. Nevertheless, such off-loaded users may experience unfavorable channel from the biased BSs and strong interference from the unbiased high-power BSs. The trade-off between cell load balancing and system throughput therefore strictly depends on the selected bias values which need to be optimized in order to maximize the system utility. In this context, a baseline approach in LTE-Advanced is to ―orthogonalize‖ the transmissions of the biased and unbiased BSs in time/frequency domain such that an interference-free zone is created.·Association based on Almost Blank Sub-frame (ABS) ratio [7]: The ABS technique uses time domain orthogonalization in which specific sub-frames are left blank by the unbiased BS and off-loaded users are scheduled within these sub-frames to avoid inter-tier interference. This improves the overall throughput of the off-loaded users by sacrificing the time sub-frames and throughput of the unbiased BS. The larger bias values result in higher degree of offloading and thus require more blank subframes to protect the offloaded users. Given a specific number of ABSs or the ratio of blank over total number of sub-frames (i.e., ABS ratio) that ensures the minimum throughput of the unbiased BSs, this criterion allows a user to select a cell with maximum ABS ratio and may even associate with the unbiased BS if ABS ratio decreases significantly. A qualitative comparison amongthese cell association schemes is given in Table I. The specific key terms used in Table I are defined as follows: channel-aware schemes depend on the knowledge of instantaneous channel and transmit power at the receiver. The interference-aware schemes depend on the knowledge of instantaneous interference at the receiver. The load-aware schemes depend on the traffic load information (e.g., number of users). The resource-aware schemes require the resource allocation information (i.e., the chance of getting a channel or the proportion of resources available in a cell). The priority-aware schemes require the information regarding the priority of different tiers and allow a protection to HPUEs. All of the above mentioned schemes are independent, distributed, and can be incorporated with any type of power control scheme. Although simple and tractable, the standard cell association schemes, i.e., RSRP, RSRQ, and CRE are unable to guarantee the optimum performance in multi-tier networks unless critical parameters, such as bias values, transmit power of the users in the uplink and BSs in the downlink, resource partitioning, etc. are optimized.B. Distributed Power Control SchemesFrom a user’s point of view, the objective of power control is to support a user with its minimum acceptable throughput, whereas from a system’s point of view it is t o maximize the aggregate throughput. In the former case, it is required to compensate for the near-far effect by allocating higher power levels to users with poor channels as compared to UEs with good channels. In the latter case, high power levels are allocated to users with best channels and very low (even zero) power levels are allocated to others. The aggregate transmit power, the outage ratio, and the aggregate throughput (i.e., the sum of achievable rates by the UEs) are the most important measures to compare the performance of different power control schemes. The outage ratio of a particular tier can be expressed as the ratio of the number of UEs supported by a tier with their minimum target SIRs and the total number of UEs in that tier. Numerous power control schemes have been proposed in the literature for single-tier cellular wireless networks. According to the corresponding objective functions and assumptions, the schemes can be classified into the following four types.·Target-SIR-tracking power control (TPC) [8]: In the TPC, each UE tracks its own predefined fixed target-SIR. The TPC enables the UEs to achieve their fixed target-TABLE IQUALITATIVE COMPARISON OF EXISTING CELL ASSOCIATION SCHEMESFOR MULTI-TIER NETWORKSSIRs at minimal aggregate transmit power, assuming thatthe target-SIRs are feasible. However, when the system is infeasible, all non-supported UEs (those who cannot obtain their target-SIRs) transmit at their maximum power, which causes unnecessary power consumption and interference to other users, and therefore, increases the number of non-supported UEs.·TPC with gradual removal (TPC-GR) [9], [10], and [11]:To decrease the outage ra -tio of the TPC in an infeasiblesystem, a number of TPC-GR algorithms were proposedin which non-supported users reduce their transmit power[10] or are gradually removed [9], [11].·Opportunistic power control (OPC) [12]: From the system’s point of view, OPC allocates high power levels to users with good channels (experiencing high path-gains and low interference levels) and very low power to users with poor channels. In this algorithm, a small difference in path-gains between two users may lead to a large difference in their actual throughputs [12]. OPC improves the system performance at the cost of reduced fairness among users.·Dynamic-SIR tracking power control (DTPC) [13]: When the target-SIR requirements for users are feasible, TPC causes users to exactly hit their fixed target-SIRs even if additional resources are still available that can otherwise be used to achieve higher SIRs (and thus better throughputs). Besides, the fixed-target-SIR assignment is suitable only for voice service for which reaching a SIR value higher than the given target value does not affect the service quality significantly. In contrast, for data services, a higher SIR results in a better throughput, which is desirable. The DTPC algorithm was proposed in [13] to address the problem of system throughput maximization subject to a given feasible lower bound for the achieved SIRs of all users in cellular networks. In DTPC, each user dynamically sets its target-SIR by using TPC and OPC in a selective manner. It was shown that when the minimum acceptable target-SIRs are feasible, the actual SIRs received by some users can be dynamically increased (to a value higher than their minimum acceptabletarget-SIRs) in a distributed manner so far as the required resources are available and the system remains feasible (meaning that reaching the minimum target-SIRs for the remaining users are guaranteed). This enhances the system throughput (at the cost of higher power consumption) as compared to TPC. The aforementioned state-of-the-art distributed power control schemes for satisfying various objectives in single-tier wireless cellular networks are unable to address the interference management problem in prioritized 5G multi-tier networks. This is due to the fact that they do not guarantee that the total interference caused by the LPUEs to the HPUEs remain within tolerable limits, which can lead to the SIR outage of some HPUEs. Thus there is a need to modify the existing schemes such that LPUEs track their objectives while limiting their transmit power to maintain a given interference threshold at HPUEs. A qualitative comparison among various state-of-the-art power control problems with different objectives and constraints and their corresponding existing distributed solutions are shown in Table II. This table also shows how these schemes can be modified and generalized for designing CAPC schemes for prioritized 5G multi-tier networks.C. Joint Cell Association and Power Control SchemesA very few work in the literature have considered the problem of distributed CAPC jointly (e.g., [14]) with guaranteed convergence. For single-tier networks, a distributed framework for uplink was developed [14], which performs cell selection based on the effective-interference (ratio of instantaneous interference to channel gain) at the BSs and minimizes the aggregate uplink transmit power while attaining users’ desire d SIR targets. Following this approach, a unified distributed algorithm was designed in [15] for two-tier networks. The cell association is based on the effective-interference metric and is integrated with a hybrid power control (HPC) scheme which is a combination of TPC and OPC power control algorithms.Although the above frameworks are distributed and optimal/ suboptimal with guaranteed convergence in conventional networks, they may not be directly compatible to the 5G multi-tier networks. The interference dynamics in multi-tier networks depends significantly on the channel access protocols (or scheduling), QoS requirements and priorities at different tiers. Thus, the existing CAPC optimization problems should be modified to include various types of cell selection methods (some examples are provided in Table I) and power control methods with different objectives and interference constraints (e.g., interference constraints for macro cell UEs, picocell UEs, or D2Dreceiver UEs). A qualitative comparison among the existing CAPC schemes along with the open research areas are highlighted in Table II. A discussion on how these open problems can be addressed is provided in the next section.V. DESIGN GUIDELINES FOR DISTRIBUTED CAPCSCHEMES IN 5G MULTI-TIER NETWORKSInterference management in 5G networks requires efficient distributed CAPC schemes such that each user can possibly connect simultaneously to multiple BSs (can be different for uplink and downlink), while achieving load balancing in different cells and guaranteeing interference protection for the HPUEs. In what follows, we provide a number of suggestions to modify the existing schemes.A. Prioritized Power ControlTo guarantee interference protection for HPUEs, a possible strategy is to modify the existing power control schemes listed in the first column of Table II such that the LPUEs limit their transmit power to keep the interference caused to the HPUEs below a predefined threshold, while tracking their own objectives. In other words, as long as the HPUEs are protected against existence of LPUEs, the LPUEs could employ an existing distributed power control algorithm to satisfy a predefined goal. This offers some fruitful direction for future research and investigation as stated in Table II. To address these open problems in a distributed manner, the existing schemes should be modified so that the LPUEs in addition to setting their transmit power for tracking their objectives, limit their transmit power to keep their interference on receivers of HPUEs below a given threshold. This could be implemented by sending a command from HPUEs to its nearby LPUEs (like a closed-loop power control command used to address the near-far problem), when the interference caused by the LPUEs to the HPUEs exceeds a given threshold. We refer to this type of power control as prioritized power control. Note that the notion of priority and thus the need of prioritized power control exists implicitly in different scenarios of 5G networks, as briefly discussed in Section II. Along this line, some modified power control optimization problems are formulated for 5G multi-tier networks in second column of Table II.To compare the performance of existing distributed power control algorithms, let us consider a prioritized multi-tier cellular wireless network where a high-priority tier consisting of 3×3 macro cells, each of which covers an area of 1000 m×1000 m, coexists with a low-priority tier consisting of n small-cells per each high-priority macro cell, each。

通信工程专业英语论文设计

通信工程专业英语论文设计

The General Situation of AT89C51The AT89C51 is a low-power, high-performance CMOS 8-bit microcomputer with 4K bytes of Flash Programmable and Erasable Read Only Memory (PEROM) and 128 bytes RAM. The device is manufactured using Atmel’s high density nonvolatile memory technology and is compatible with the industry standard MCS-51™ instruction set and pin out. The chip combines a versatile 8-bit CPU with Flash on a monolithic chip; the Atmel AT89C51 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications.Features:• Compatible with MCS-51™ Products• 4K Bytes of In-System Reprogrammable Flash Memory• Endurance: 1,000 Write/Erase Cycles• Fully Static Operation: 0 Hz to 24 MHz• Three-Level Program Memory Lock• 128 x 8-Bit Internal RAM• 32 Programmable I/O Lines• Two 16-Bit Timer/Counters• Six Interrupt Sources• Programmable Serial Channel• Low Power Idle and Power Down ModesThe AT89C51 provides the following standard features: 4K bytes of Flash, 128 bytes of RAM, 32 I/O lines, two 16-bit timer/counters, a five vector two-level interrupt architecture, a full duplex serial port, on-chip oscillator and clock circuitry. In addition, the AT89C51 isdesigned with static logic for operation down to zero frequency and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port and interrupt system to continue functioning. The Power Down Mode saves the RAM contents but freezes the oscillator disabling all other chip functions until the next hardware reset.Block DiagramPin Description:VCC Supply voltage.GND Ground.Port 0:Port 0 is an 8-bit open drain bidirectional I/O port. As an output port each pin can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high impedance inputs.(Sink/flow)Port 0 may also be configured to be the multiplexed low order address/data bus during accesses to external program and data memory. In this mode P0 has internal pull-ups.Port 0 also receives the code bytes during Flash programming, and outputs the code bytes during program verification. External pull-ups are required during program verification.Port 1:Port 1 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 1 output buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 1 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups.Port 1 also receives the low-order address bytes during Flash programming and verification.Port 2:Port 2 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 2 output buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 2 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups.Port 2 emits the high-order address byte during fetches from external program memory and during accesses to external data memory that uses 16-bit addresses (MOVX @ DPTR). In this application it uses strong internal pull-ups when emitting 1s. During accesses to external data memories that use 8-bit addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function Register.Port 2 also receives the high-order address bits and some control signals during Flash programming and verification.Port 3:Port 3 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 3 output buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 3 pins that are externally being pulled low will source current (IIL) because of the pull-ups.Port 3 also serves the functions of various special features of the AT89C51 as listed below:Port 3also receivessome controlsignals forFlashprogramming and verification.RST:Reset input. A high on this pin for two machine cycles while the oscillator is running resets the device.ALE/PROG:Address Latch Enable output pulse for latching the low byte of the address during accesses to external memory. This pin is also the program pulse input (PROG) during Flash programming.In normal operation ALE is emitted at a constant rate of 1/6 theoscillator frequency, and may be used for external timing or clocking purposes. Note, however, that one ALE pulse is skipped during each access to external Data Memory.If desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no effect if the microcontroller is in external execution mode.PSEN:Program Store Enable is the read strobe to external program memory.When the AT89C51 is executing code from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory.EA/VPP:External Access Enable. EA must be strapped to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH. Note, however, that if lock bit 1(LB1) is programmed, EA will be internally latched (fasten with a latch) on reset.EA should be strapped to VCC for internal program executions.This pin also receives the 12-volt programming enable voltage(VPP) during Flash programming, for parts that require 12-volt VPP.XTAL1:Input to the inverting oscillator amplifier and input to the internal clock operating circuit.XTAL2:Output from the inverting oscillator amplifier.Oscillator Characteristics:XTAL1 and XTAL2 are the input and output, respectively, of an inverting amplifier which can be configured for use as an on-chip oscillator, as shown in Figure 1. Either a quartz crystal or ceramic resonator may be used. To drive the device from an external clock source, XTAL2 should be left unconnected while XTAL1is driven as shown in Figure 2. There are no requirements on the duty cycle of the external clock signal, since the input to the internal clocking circuitry is through a divide-by-two flip-flop, but minimum and maximum voltage high and low times specifications must be observed.Idle Mode:In idle mode, the CPU puts itself to sleep while all the on chip peripherals remain active. The mode is invoked by software. The content of the on-chip RAM and all the special functions registers remain unchanged during this mode. The idle mode can be terminated by any enabled interrupt or by a hardware reset.It should be noted that when idle is terminated by a hard ware reset, the device normally resumes program execution, from where it left off, up to two machine cycles before the internal reset algorithm takes control. On-chip hardware inhibits access to internal RAM in this event, but access to the port pins is not inhibited. To eliminate the possibility of an unexpected write to a port pin when Idle is terminated by reset, the instruction following the one that invokes Idle should not be one that writes to a port pin or to external memory.Power Down ModeIn the power down mode the oscillator is stopped, and the instruction that invokes power down is the last instruction executed. The on-chip RAM and Special Function Registers retain their valuesuntil the power down mode is terminated. The only exit from power down is a hardware reset. Reset redefines the SFRs but does not change the on-chip RAM. The reset should not be activated before VCC is restored to its normal operating level and must be held active long enough to allow the oscillator to restart and stabilize.Program Memory Lock BitsOn the chip are three lock bits which can be left unprogrammed (U) or can be programmed (P) to obtain the additional features listed in the table below:Lock Bit Protection ModesWhen lock bit 1 is programmed, the logic level at the EA pin is sampled and latched during reset. If the device is powered up without a reset, the latch initializes to a random value, and holds that value until reset is activated. It is necessary that the latched value of EA be in agreement with the current logic level at that pin in order for the device to function properly.Programming the Flash:The AT89C51 is normally shipped with the on-chip Flash memory array in the erased state (that is, contents = FFH) and ready to be programmed.The programming interface accepts either a high-voltage (12-volt) or a low-voltage (VCC) program enable signal.The low voltage programming mode provides a convenient way toprogram the AT89C51 inside the user’s system, while the high-voltage programming mode is compatible with conventional third party Flash or EPROM programmers.The AT89C51 is shipped with either the high-voltage or low-voltage programming mode enabled. The respective top-side marking and device signature codes are listed in the following table.The AT89C51 code memory array is programmed byte-bybyte in either programming mode. To program any nonblank byte in the on-chip Flash Programmable and Erasable Read Only Memory, the entire memory must be erased using the Chip Erase Mode.Programming Algorithm: Before programming the AT89C51, the address, data and control signals should be set up according to the Flash programming mode table and Figures 3 and 4. To program the AT89C51, take the following steps.1. Input the desired memory location on the address lines.2. Input the appropriate data byte on the data lines.3. Activate the correct combination of control signals.4. Raise EA/VPP to 12V for the high-voltage programming mode.5. Pulse ALE/PROG once to program a byte in the Flash array or the lock bits. The byte-write cycle is self-timed and typically takes no more than 1.5 ms. Repeat steps 1 through 5, changing the address and data for the entire array or until the end of the object file is reached.Data Polling: The AT89C51 features Data Polling to indicate the end of a write cycle. During a write cycle, an attempted read of thelast byte written will result in the complement of the written datum on PO.7. Once the write cycle has been completed, true data are valid on all outputs, and the next cycle may begin. Data Polling may begin any time after a write cycle has been initiated.Ready/Busy:The progress of byte programming can also be monitored by the RDY/BSY output signal. P3.4 is pulled low after ALE goes high during programming to indicate BUSY. P3.4 is pulled high again when programming is done to indicate READY.Program Verify: If lock bits LB1 and LB2 have not been programmed, the programmed code data can be read back via the address and data lines for verification. The lock bits cannot be verified directly. Verification of the lock bits is achieved by observing that their features are enabled.Chip Erase: The entire Flash Programmable and Erasable Read Only Memory array is erased electrically by using the proper combination of control signals and by holding ALE/PROG low for 10 ms. The code array is written with all “1”s. The chip erase operation must be executed before the code memory can be re-programmed.Reading the Signature Bytes: The signature bytes are read by the same procedure as a normal verification of locations 030H, 031H, and 032H, except that P3.6 and P3.7 must be pulled to a logic low. The values returned are as follows.(030H) = 1EH indicates manufactured by Atmel(031H) = 51H indicates 89C51(032H) = FFH indicates 12V programming(032H) = 05H indicates 5V programmingProgramming InterfaceEvery code byte in the Flash array can be written and the entire array can be erased by using the appropriate combination of controlsignals. The write operation cycle is selftimed and once initiated, will automatically time itself to completion.AT89C51的概况AT89C51是美国ATMEL公司生产的低电压,高性能CMOS8位单片机,片内含4Kbytes的快速可擦写的只读程序存储器(PEROM)和128 bytes 的随机存取数据存储器(RAM),器件采用ATMEL公司的高密度、非易失性存储技术生产,兼容标准MCS-51产品指令系统,片内置通用8位中央处理器(CPU)和flish存储单元,功能强大AT89C51单片机可为您提供许多高性价比的应用场合,可灵活应用于各种控制领域。

通信工程毕业设计 外文翻译

通信工程毕业设计 外文翻译

东华理工大学长江学院毕业设计外文翻译学生姓名:张伟学号:09323119专业:信息工程系别:信息工程指导教师:谌洪茂职称:讲师二0一三年六月五日OriginalOptical Fiber CommunicationsThe General System Communication may be broadly defined as the transfer of information from one point to another. When the information is to be conveyed over any distance a communication system is usually required. Within a communication system the information transfer is frequently achieved by superimposing or modulating the information onto an electromagnetic wave which acts as a carrier for the information signal. This modulated carrier is then transmitted to the required destination where it is received and the original information signal is obtained by demodulation. Sophisticated techniques have been developed for this process by using electromagnetic carrier waves operating at radio frequencies as well as microwave and millimeter w ave frequencies. However, ‘communication’ may also be achieved by using an electromagnetic carrier which is selected from the optical range of frequencies.An optical fiber communication system is similar in basic concept to any type of communication system.The communication system therefore consists of a transmitter or modulator linked to the information source, the transmission medium,and a receiver or demodulator at the destination point. In electrical communications the information source provides an electrical signal, usually derived from a message signal which is not electrical (e.g. sound), to a transmitter comprising electrical and electronic components which converts the signal into a suitable form for propagation over the trans-mission medium. This is often achieved by modulating a carrier, which, as mentioned previously, may be an electromagnetic wave. The transmission medium can consist of a pair of wires, a coaxial cable or a radio link through free space down which the signal is transmitted to the receiver, where it is transformed into the original electrical information signal (demodulated) before being passed to the destination.However, it must be noted that in any transmission medium the signal is attenuated, or suffers loss, and is subject to degradations due to contamination by random signals and noise, as well as possible distortions imposed by mechanisms within the medium itself. Therefore, in any communication system there is a maximum permitted distance between the transmitter and the receiver beyond which the system effectively ceases to give intelligible communication. For long-haul applications these factors necessitate the installation of repeaters or line amplifiers atintervals,both to remove signal distortion and to increase signal level before transmission is continued down the link.For optical fiber communications system shown in Figure (a) may be considered in slightly greater detail, as given in Figure (b).Fig(a) The general communication system(b)The optical fiber communication systemIn this case the information source provides an electrical signal to a transmitter comprising an electrical stage which drives an optical source to give modulation of the light wave carrier. The optical source which provides the electrical–optical conversion may be either a semiconductor laser or light-emitting diode (LED). The transmission medium consists of an optical fiber cable and the receiver consists of an optical detector which drives a further electrical stage and hence provides demodulation of the optical carrier. Photodiodes (p–n, p–i–n or avalanche) and, in some instances, phototransistors and photoconductors are utilized for the detection of the optical signal and the optical–electrical conversion. Thus there is a requirement for electrical interfacing at either end of the optical link and at present the signal processing is usually performed electrically.The optical carrier may be modulated using either an analog or digital information signal. In the system shown in Figure (b) analog modulation involves the variation of the light emitted from the optical source in a continuous manner. Withdigital modulation,however, discrete changes in the light intensity are obtained (i.e. on–off pulses).Although often simpler to implement, analog modulation with an optical fiber communication system is less efficient, requiring a far higher signal-to-noise ratio at the receiver than digital modulation. Also, the linearity needed for analog modulation is not always provided by semiconductor optical sources, especially at high modulation frequencies. For these reasons,analog optical fiber communication links are generally limited to shorter distances and lower bandwidth operation than digital links.Figure (c) shows a block schematic of a typical digital optical fiber link. Initially, the input digital signal from the information source is suitably encoded for optical transmission. The laser drive circuit directly modulates the intensity of the semiconductor laser with the encoded digital signal. Hence a digital optical signal is launched into the optical fiber cable. The avalanche photodiode (APD) detector is followed by a front-end amplifier equalizer or filter to provide gain as well as linear signal processing and noise bandwidth reduction.Fig(c)A digital optical fiber link using a semiconductor laser source and an avalanche photodiode(APD) detectorFinally, the signal obtained is decoded to give the original digital information. However, at this stage it is instructive to consider the advantages provided by light wave communication via optical fibers in com-parison with other forms of line and radio communication which have brought about the extensive use of such systems in many areas throughout the world.译文光纤通信一般来说把信息从一点传送到另一点就称为通信。

数据通信 毕业论文外文文献英文翻译

数据通信  毕业论文外文文献英文翻译

郑州轻工业学院本科毕业设计(论文)——英文翻译题目差错控制编码解决加性噪声的仿真学生姓名专业班级通信工程05-2 学号 12院(系)计算机与通信工程学院指导教师完成时间 2009年4月26日英文原文:Data communicationsGildas Avoine and Philippe OechslinEPFL, Lausanne, Switzerlandfgildas.avoine, philippe.oechsling@ep.chAbstractData communications are communications and computer technology resulting from the combination of a new means of communication. To transfer information between the two places must have transmission channel, according to the different transmission media, there is wired data communications and wireless data communications division. But they are through the transmission channel data link terminals and computers, different locations of implementation of the data terminal software and hardware and the sharing of information resources.1 The development of data communicationsThe first phase: the main language, through the human, horsepower, war and other means of transmission of original information.Phase II: Letter Post. (An increase means the dissemination of information)The third stage: printing. (Expand the scope of information dissemination)Phase IV: telegraph, telephone, radio. (Electric to enter the time)Fifth stage: the information age, with the exception of language information, there are data, images, text and so on.1.1 The history of modern data communicationsCommunication as a Telecommunications are from the 19th century, the beginning Year 30. Faraday discovered electromagnetic induction in 1831. Morse invented telegraph in 1837. Maxwell's electromagnetic theory in 1833. Bell invented the telephone in 1876. Marconi invented radio in 1895. Telecom has opened up in the new era. Tube invented in 1906 in order to simulate the development of communications.Sampling theorem of Nyquist criteria In 1928. Shannong theorem in 1948. The invention of the 20th century, thesemiconductor 50, thereby the development of digital communications. During the 20th century, the invention of integrated circuits 60. Made during the 20th century, 40 the concept of geostationary satellites, but can not be achieved. During the 20th century, space technology 50. Implementation in 1963 first synchronized satellite communications. The invention of the 20th century, 60 laser, intended to be used for communications, was not successful. 70 The invention of the 20th century, optical fiber, optical fiber communications can be developed.1.2 Key figuresBell (1847-1922), English, job in London in 1868. In 1871 to work in Boston. In 1873, he was appointed professor at Boston University. In 1875, invented many Telegram Rd. In 1876, invented the telephone. Lot of patents have been life. Yes, a deaf wife.Marconi (1874-1937), Italian people, in 1894, the pilot at his father's estate. 1896, to London. In 1897, the company set up the radio reported. In 1899, the first time the British and French wireless communications. 1916, implementation of short-wave radio communications. 1929, set up a global wireless communications network. Kim won the Nobel Prize. Took part in the Fascist Party.1.3 Classification of Communication SystemsAccording to type of information: Telephone communication system, Cable television system ,Data communication systems.Modulation by sub: Baseband transmission,Modulation transfer.Characteristics of transmission signals in accordance with sub: Analog Communication System ,Digital communication system.Transmission means of communication system: Cable Communications,Twisted pair, coaxial cable and so on.And long-distance telephone communication. Modulation: SSB / FDM. Based on the PCM time division multiple coaxial digital base-band transmission technology. Will gradually replace the coaxial fiber.Microwave relay communications:Comparison of coaxial and easy to set up, low investment, short-cycle. Analog phone microwave communications mainly SSB / FM /FDM modulation, communication capacity of 6,000 road / Channel. Digital microwave using BPSK, QPSK and QAM modulation techniques. The use of 64QAM, 256QAM such as multi-level modulation technique enhance the capacity of microwave communications can be transmitted at 40M Channel 1920 ~ 7680 Telephone Rd PCM figure.Optical Fiber Communication: Optical fiber communication is the use of lasers in optical fiber transmission characteristics of long-distance with a large communication capacity, communication, long distance and strong anti-interference characteristics. Currently used for local, long distance, trunk transmission, and progressive development of fiber-optic communications network users. At present, based on the long-wave lasers and single-mode optical fiber, each fiber road approach more than 10,000 calls, optical fiber communication itself is very strong force. Over the past decades, optical fiber communication technology develops very quickly, and there is a variety of applications, access devices, photoelectric conversion equipment, transmission equipment, switching equipment, network equipment and so on. Fiber-optic communications equipment has photoelectric conversion module and digital signal processing unit is composed of two parts.Satellite communications: Distance communications, transmission capacity, coverage, and not subject to geographical constraints and high reliability. At present, the use of sophisticated techniques Analog modulation, frequency division multiplexing and frequency division multiple access. Digital satellite communication using digital modulation, time division multiple road in time division multiple access.Mobile Communications: GSM, CDMA. Number of key technologies for mobile communications: modulation techniques, error correction coding and digital voice encoding. Data Communication Systems.1.4 Five basic types of data communication system:(1)Off-line data transmission is simply the use of a telephone or similar link to transmit data without involving a computer system.The equipment used at both ends of such a link is not part of a computer, or at least does not immediately make the data available for computer process, that is, the data when sent and / or received are 'off-line'.This type of data communication is relatively cheap and simple.(2)Remote batch is the term used for the way in which data communication technology is used geographically to separate the input and / or output of data from the computer on which they are processed in batch mode.(3)On-line data collection is the method of using communications technology to provide input data to a computer as such input arises-the data are then stored in the computer (say on a magnetic disk) and processed either at predetermined intervals or as required.(4)Enquiry-response systems provide, as the term suggests, the facility for a user to extract information from a computer.The enquiry facility is passive, that is, does not modify the information stored.The interrogation may be simple, for example, 'RETRIEVE THE RECORD FOR EMPLOYEE NUMBER 1234 'or complex.Such systems may use terminals producing hard copy and / or visual displays.(5)Real-time systems are those in which information is made available to and processed by a computer system in a dynamic manner so that either the computer may cause action to be taken to influence events as they occur (for example as in a process control application) or human operators may be influenced by the accurate and up-to-date information stored in the computer, for example as in reservation systems.2 Signal spectrum with bandwidthElectromagnetic data signals are encoded, the signal to be included in the data transmission. Signal in time for the general argument to show the message (or data) as a parameter (amplitude, frequency or phase) as the dependent variable. Signal of their value since the time variables are or not continuous, can be divided into continuous signals and discrete signals; according to whether the values of the dependent variable continuous, can be divided into analog signals and digital Signal.Signals with time-domain and frequency domain performance of the two most basic forms and features. Time-domain signal over time to reflect changing circumstances. Frequency domain characteristics of signals not only contain the same information domain, and the spectrum of signal analysis, can also be a clear understanding of the distribution ofthe signal spectrum and share the bandwidth. In order to receive the signal transmission and receiving equipment on the request channel, Only know the time-domain characteristics of the signal is not enough, it is also necessary to know the distribution of the signal spectrum. Time-domain characteristics of signals to show the letter .It’s changes over time. Because most of the signal energy is concentrated in a relatively narrow band, so most of our energy focused on the signal that Paragraph referred to as the effective band Bandwidth, or bandwidth. Have any signal bandwidth. In general, the greater the bandwidth of the signal using this signal to send data Rate on the higher bandwidth requirements of transmission medium greater. We will introduce the following simple common signal and bandwidth of the spectrum.More or less the voice signal spectrum at 20 Hz ~ 2000 kHz range (below 20 Hz infrasound signals for higher than 2000 KHz. For the ultrasonic signal), but with a much narrower bandwidth of the voice can produce an acceptable return, and the standard voice-frequency signal gnal 0 ~ 4 MHz, so the bandwidth of 4 MHz.As a special example of the monostable pulse infinite bandwidth. As for the binary signal, the bandwidth depends on the generalThe exact shape of the signal waveform, as well as the order of 0,1. The greater the bandwidth of the signal, it more faithfully express the number of sequences.3 The cut-off frequency channel with bandwidthAccording to Fourier series we know that if a signal for all frequency components can be completely the same through the transmission channel to the receiving end, then at the receiving frequency components of these formed by stacking up the signal and send the signal side are exactly the same, That is fully recovered from the receiving end of the send-side signals. But on the real world, there is no channel to no wear and tear through all the Frequency components. If all the Fourier components are equivalent attenuation, then the signal reception while Receive termination at an amplitude up Attenuation, but the distortion did not happen. However, all the transmission channel and equipment for different frequency components of the degree of attenuation is differentSome frequency components almost no attenuation, and attenuation of some frequency components by anumber, that is to say, channel also has a certain amount of vibrationIncrease the frequency characteristics, resulting in output signal distortion. Usually are frequency of 0 Hz to fc-wide channel at Chuan harmonic lost during the attenuation does not occur (or are a very small attenuation constant), whereas in the fc frequency harmonics at all above the transmission cross Decay process a lot, we put the signal in the transmission channel of the amplitude attenuation of a component to the original 0.707(that is, the output signal Reduce by half the power) when the frequency of the corresponding channel known as the cut-off frequency (cut - off frequency).Cut-off frequency transmission medium reflects the inherent physical properties. Other cases, it is because people interested in Line filter is installed to limit the bandwidth used by each user. In some cases, because of the add channel Two-pass filter, which corresponds to two-channel cut-off frequency f1 and f2, they were called up under the cut-off frequency and the cut-off frequency.This difference between the two cut-off frequency f2-f1 is called the channel bandwidth. If the input signal bandwidth is less than the bandwidth of channel, then the entire input signal Frequency components can be adopted by the Department of channels, which the letter Road to be the output of the output waveform will be true yet. However, if the input signal bandwidth greater than the channel bandwidth, the signal of a Frequency components can not be more on the channel, so that the signal output will be sent with the sending end of the signal is somewhat different, that is produced Distortion. In order to ensure the accuracy of data transmission, we must limit the signal bandwidth.4 Data transfer rateChannel maximum data transfer rate Unit time to be able to transfer binary data transfer rate as the median. Improve data transfer rate means that the space occupied by each Reduce the time that the sequence of binary digital pulse will reduce the cycle time, of course, will also reduce the pulse width.The previous section we already know, even if the binary digital pulse signal through a limited bandwidth channel will also be the ideal generated wave Shape distortion, and when must the input signal bandwidth, the smaller channel bandwidth, output waveformdistortion will be greater. Another angle Degree that when a certain channel bandwidth, the greater the bandwidth of the input signal, the output signal the greater the distortion, so when the data transmissionRate to a certain degree (signal bandwidth increases to a certain extent), in the on-channel output signal from the receiver could not have been Distortion of the output signal sent to recover a number of sequences. That is to say, even for an ideal channel, the limited bandwidth limit System of channel data transfer rate.At early 1924, H. Nyquist (Nyquist) to recognize the basic limitations of this existence, and deduced that the noise-free Limited bandwidth channel maximum data transfer rate formula. In 1948, C. Shannon (Shannon) put into the work of Nyquist 1 Step-by-step expansion of the channel by the random noise interference. Here we do not add on to prove to those now seen as the result of a classic.Nyquist proved that any continuous signal f (t) through a noise-free bandwidth for channel B, its output signal as a Time bandwidth of B continuous signal g (t). If you want to output digital signal, it must be the rate of g (t) for interval Sample. 2B samples per second times faster than are meaningless, because the signal bandwidth B is higher than the high-frequency component other than a letter has been Road decay away. If g (t) by V of discrete levels, namely, the likely outcome of each sample for the V level of a discrete one, The biggest channel data rate Rm ax as follows:Rmax = 2Blog 2 V (bit / s)For example, a 3000 Hz noise bandwidth of the channel should not transmit rate of more than 6,000 bits / second binary digital signal.In front of us considered only the ideal noise-free channel. There is noise in the channel, the situation will rapidly deteriorate. Channel Thermal noise with signal power and noise power ratio to measure the signal power and noise power as the signal-to-noise ratio (S ignal - to -- Noise Ratio). If we express the signal power S, and N express the noise power, while signal to noise ratio should be expressed as S / N. However, people Usually do not use the absolute value of signal to noise ratio, but the use of 10 lo g1 0S / N to indicate the units are decibels (d B). For the S / N equal 10 Channel, said its signal to noise ratio for the 1 0 d B; the same token, if the channel S / N equal to one hundred, then the signal to noiseratio for the 2 0 d B; And so on. S hannon noise channel has about the maximum data rate of the conclusions are: The bandwidth for the BH z, signal to noise ratio for the S / N Channel, the maximum data rate Rm ax as follows:Rmax = Blog 2 (1 + S / N) (bits / second)For example, for a bandwidth of 3 kHz, signal to noise ratio of 30 dB for the channel, regardless of their use to quantify the number of levels, nor Fast sampling rate control, the data transfer rate can not be greater than 30,000 bits / second. S h a n n o n the conclusions are derived based on information theory Out for a very wide scope, in order to go beyond this conclusion, like you want to invent perpetual motion machine, as it is almost impossible.It is worth noting that, S hannon conclusions give only a theoretical limit, and in fact, we should be pretty near the limit Difficult.SUMMARYMessage signals are (or data) of a magnetic encoder, the signal contains the message to be transmitted. Signal according to the dependent variable Whether or not a row of values, can be classified into analog signals and digital signals, the corresponding communication can be divided into analog communication and digital communication.Fourier has proven: any signal (either analog or digital signal) are different types of harmonic frequencies Composed of any signal has a corresponding bandwidth. And any transmission channel signal attenuation signals will, therefore, Channel transmission of any signal at all, there is a data transfer rate limitations, and this is Chengkui N yquist (Nyquist) theorem and S hannon (Shannon) theorem tells us to conclusions.Transmission medium of computer networks and communication are the most basic part of it at the cost of the entire computer network in a very Large proportion. In order to improve the utilization of transmission medium, we can use multiplexing. Frequency division multiplexing technology has many Road multiplexing, wave division multiplexing and TDM three that they use on different occasions.Data exchange technologies such as circuit switching, packet switching and packetswitching three have their respective advantages and disadvantages. M odem are at Analog phone line for the computer's binary data transmission equipment. Modem AM modulation methods have, FM, phase modulation and quadrature amplitude modulation, and M odem also supports data compression and error control. The concept of data communications Data communication is based on "data" for business communications systems, data are pre-agreed with a good meaning of numbers, letters or symbols and their combinations.参考文献[1]C.Y.Huang and A.Polydoros,“Two small SNR classification rules for CPM,”inProc.IEEE Milcom,vol.3,San Diego,CA,USA,Oct.1992,pp.1236–1240.[2]“Envelope-based classification schemes for continuous-phase binary Frequency-shift-keyed modulations,”in Pr oc.IEEE Milcom,vol.3,Fort Monmouth,NJ,USA,Oct.1994,pp. 796–800.[3]A.E.El-Mahdy and N.M.Namazi,“Classification of multiple M-ary frequency-shift keying over a rayleigh fading channel,”IEEE m.,vol.50,no.6,pp.967–974,June 2002.[4]Consulative Committee for Space Data Systems(CCSDS),Radio Frequency and Modulation SDS,2001,no.401.[5]E.E.Azzouz and A.K.Nandi,“Procedure for automatic recognition of analogue and digital modulations,”IEE mun,vol.143,no.5,pp.259–266,Oct.1996.[6]A.Puengn im,T.Robert,N.Thomas,and J.Vidal,“Hidden Markov models for digital modulation classification in unknown ISI channels,”in Eusipco2007,Poznan,Poland, September 2007,pp.1882–1885.[7]E.Vassalo and M.Visintin,“Carrier phase synchronization for GMSK signals,”I nt.J.Satell. Commun.,vol.20,no.6,pp.391–415,Nov.2002.[8]J.G.Proakis,Digital Communications.Mc Graw Hill,2001.[9]L.Rabiner,“A tutorial on hidden Markov models and selected applications in speechrecognition,”Proc.IEEE,vol.77,no.2,pp.257–286,1989.英文译文:数据通信Gildas Avoine and Philippe OechslinEPFL, Lausanne, Switzerlandfgildas.avoine, philippe.oechsling@ep.ch摘要数据通信是通信技术和计算机技术相结合而产生的一种新的通信方式。

通信工程外文资料翻译2篇

通信工程外文资料翻译2篇

南京理工大学毕业设计(论文)外文资料翻译学院(系):电子工程与光电技术学院专业:通信工程姓名:学号:外文出处:1. IEEE TRANSACTIONS ONANTENNAS AND PROPAGATION,VOL. 53,NO.9, SEPTEMBER 20052. IEEE TRANSACTIONS ONMICROWA VE THEORY ANDTECHNIQUES, VOL. 53,NO.6,JUNE 2005附件:1.外文资料翻译译文一;2.外文资料翻译译文二;3.外文原文一;4.外文原文二;注:请将该封面与附件装订成册。

附件1:外文资料翻译译文一在单封装超宽波段无线通信中使用LTCC技术的平面天线作者:Chen Ying and Y.P.Zhang摘要:此通讯提出了一个使用低温度共烧陶瓷技术的平面天线用于超宽频带(UWB)无线通信的单封装解决方案。

该天线具有一个通过微带线反馈的椭圆形的辐射体。

该辐射体和微带线拥有与其它UWBR电路相同的接地板。

实验结果表明原型天线已达到110.9%的带宽,从1.34到5.43 dBi的增益,宽模式和频率从3到10.6GHz 的相对恒定的群延迟。

更多地还发现,标准化天线辐射功率谱密度基本符合FCCS 对于室内UWB系统的发射限制。

关键词:低温共烧陶瓷(LTCC),平面天线,超宽频带(UWB)。

一、引言现在,发展用于窄范围高速度的无线通信网络的超宽频带(UWB)无线电是一个研究热点。

超宽带无线电利用一个7.5 GHz的超宽带宽来交换信息。

使用这样大的带宽,在使U超宽带无线电发挥它最大的作用上存在一些问题.其中的一个主要问题是用于移植系统的超宽带天线的设计。

好的超宽带天线应具有较低的回波损耗,全向辐射模式,从3.1至10.6 GHz的超宽带宽下的高效率,同时也应当满足FCCS规定的发射限制。

现在已经有一些超宽带天线,如钻石偶极子和互补缝隙天线。

它们已被证明适用于超宽带无线电[1] - [4]。

通信工程外文文献翻译

通信工程外文文献翻译

毕业设计(论文)的外文文献翻译原始资料的题目/来源:Fundamentals of wireless communications by David Tse翻译后的中文题目:无线通信基础专业通信工程学生王晓宇学号110240318班号1102403指导教师杨洪娟翻译日期2015年6月15日外文文献的中文翻译7.mimo:空间多路复用与信道建模本书我们已经看到多天线在无线通信中的几种不同应用。

在第3章中,多天线用于提供分集增益,增益无线链路的可靠性,并同时研究了接受分解和发射分解,而且,接受天线还能提供功率增益。

在第5章中,我们看到了如果发射机已知信道,那么多采用多幅发射天线通过发射波束成形还可以提供功率增益。

在第6章中,多副发射天线用于生产信道波动,满足机会通信技术的需要,改方案可以解释为机会波束成形,同时也能够提供功率增益。

章以及接下来的几章将研究一种利用多天线的新方法。

我们将会看到在合适的信道衰落条件下,同时采用多幅发射天线和多幅接收天线可以提供用于通信的额外的空间维数并产生自由度增益,利用这些额外的自由度可以将若干数据流在空间上多路复用至MIMO信道中,从而带来容量的增加:采用n副发射天线和接受天线的这类MIMO 信道的容量正比于n。

过去一度认为在基站采用多幅天线的多址接入系统允许若干个用户同时与基站通信,多幅天线可以实现不同用户信号的空间隔离。

20世纪90年代中期,研究人员发现采用多幅发射天线和接收天线的点对点信道也会出现类似的效应,即使当发射天线相距不远时也是如此。

只要散射环境足够丰富,使得接受天线能够将来自不同发射天线的信号分离开,该结论就成立。

我们已经了解到了机会通信技术如何利用信道衰落,本章还会看到信道衰落对通信有益的另一例子。

将机会通信与MIMO技术提供的性能增益的本质进行比较和对比是非常的有远见的。

机会通信技术主要提供功率增益,改功率增益在功率受限系统的低信噪比情况下相当明显,但在宽带受限系统的高信噪比情况下则很不明显。

通信工程 毕业设计 外文文献翻译:超宽带系统的数据通信

通信工程 毕业设计 外文文献翻译:超宽带系统的数据通信

英文资料Ultra-Wideband Systems for Data CommunicationsG. Racherla, J.L. Ellis, D.S. Furuno, S.C. LinGeneral Atomics, Advanced Wireless Group10240 Flanders Ct. San Diego CA 92121WebsitABSTRACTUltra-Widebandt (UWB) is a radio transmission scheme that uses extremely low power pulses of radio energy spread across a wide spectrum of frequencies. UWB has several advantages over conventional continuous wave radio communications including potential support for high data rates, robustness to multipath interference and fading. We present an overview of UWB technology and its use in data communications and networking. We look at design considerations for UWB based networks at various layers of the protocol stack.1.INTRODUCTIONUltra-Wideband [1-6]一also known as baseband or impulse radio一is a carrier-free radio transmission that uses narrow, extremely low power pulses of radio energy spread across a wide spectrum of frequencies. UWB has recently gained a great deal of interest due to the recent Federal Communications Commission (FCC) Report and Order which allocates the UWB band一7.5 GHz of unlicensed spectrum for indoor and outdoor communication applications. UWB communications are required to have a -10 dB fractional bandwidth of more than 20% or a -10 dB bandwidth of more than 500 MHz [7]. It is important to note that the FCC has not defined a specific modulation scheme to be used. UWB systems offer the promise of high data rate, low susceptibilityto multipath fading, high transmission security low prime power requirements, low cost, and simple design [1,2,5,6].UWB has been used in military applications for the past several years for ground-penetrating precision radar applications and secure communications [3,8]. For the past few years, UWB has been developed for commercial applications [1,2,5,6]. With the recent FCC [7] report and order for theuse of UWB technology, there has been an added impetus to this endeavor. Other notable UWB applications include collision avoidance radar, tagging/identification; geolocation [9] and data communications in personal area networks (PAN) and local area network (LAN) environments.There are several future challenges to the wide adoption of UWB for wireless data communications including the infancy of the technology in the commercial arena, lack of reliablechannel models, the early stages of standardization effort and lack of low-cost system on chip (SoC) implementations. In this paper, we look at UWB technology for data communications and inside a UWB physical (PHY) layer characteristics. We also briefly introduce other related wireless standards such as 802.11 [10], 802.15.3 [11-13] Bluetooth [14], HomeRF [15] and HIPERLAN [16] and present a brief synopsis of the regulatory effort worldwide with special emphasis on the FCC. We also present the design considerations for UWB based data networking.2.ULTRA-WIDEBAND TECHNOLOGYThe basic waveform that employed in a UWB system is an approximation to an impulse, such as that shown in Fig. 1. The short duration of the pulse is associated with large inherent bandwidth; hence, the nomenclature "Ultra-Wideband". Typical attributes of UWB waveforms are summarized in Table 1.Fig. 1. UWB waveform example.The high spectral content of the UWB waveform gives rise to one of the primary advantages UWB operation for communications where a UWB system is robust against multipath fading[17] and narrowband interference [18]. In multipath fading, where the transmitted radio frequency (rt) signal can reflect off objects in its transmission path and can cause destructive interferences at the receiver, a loss of reception can occur. ThisTable 1: Characteristics of Typical UWB SystemsFractional Bandwidth > 20%Pulse Width 0.1-2 asPulse Repetition Frequency 1 kHz-2 GHzAverage Transmitted Power<1mWeffect is particularly problematic indoors where there are many reflecting surfaces. In the frequency domain, multipath is shown as frequency selective fading. Because UWB communications systems spreads the transmitted data over a broad frequency band if destructive interference occurs at a specific frequency, whether due to multipath or narrowband interference, the information can still be recovered over the good frequencies.UWB implementations can provide low complexity, low cost solutions [19], thus enabling vast deployments of the technology. A critical component that reaffirms a low cost solution is noting that UWB signals, being carrier-less, have greater simplicity over narrowband transceivers and require smaller silicon die sizes [20]. UWB can be designed to achieve very high bit rates while still achieving low power consumption, a feature set which will be exploited by the consumer electronics industry [21]. UWB schemes can further be designed to be very scalable in terms of complexity, bit rate, power consumption, and range.UWB technology can support many applications. Different UWB modulation schemes offer different advantages for communication, radar, and precisiongeo-location applications. UWB technology, which operates between 3.1 and 10.6 GHz, intrinsically offers an efficient reuse of precious spectrum by operating stealthily at the noise floor [22]. This UWB system operates at low power, to be compliant with operating under FCC Part 15 emissions, across a wide range of frequencies. As a spread spectrum technology, UWB offers a low probability of intercept and a low probability of detection [8]. Thus, it is particularly well suited for covert military or sensitive usage seenarios [8]. Because UWB signals have extremely short bursts in time (e.g., durations of 1 ns or less) they are suited for precision geo-location applications. Though UWB intrinsically offers the above-mentioned features, application optimization and improvements on these characteristics are left to specific designs and implementations, most notably by careful consideration of modulation schemes.2.1. UWB System Design ConsiderationsSeveral considerations are needed when designing a PAN. First, low power design is necessary because the portable devices within the network are battery powered. Second, high data rate transmission is crucial for broadcasting multiple digi\tal audio and video streams: Lastly, low cost is a prerequisite to broadening consumer adoption. In addition to these criteria, the UWB system designer must address synchronization and coexistence. Capturing and locking onto these short pulses make synchronization a non-trivial task. Coexisting peacefully with other wireless systems without interference is important;In particular, one needs to pay attention to the 802.1 la wireless LANs that operate in the 5 GHz ISM bands.At the physical layer, additional challenges lie in the transceiver and antenna design. At the transmitter, pulse shaping is required to produce flat and wideband emission in the desired frequency bands. Although new integrated circuits provide less expensive forms of integration, the pulses can be affected by the parasitics from the component and packaging [23]. To accommodate the high data rates, tradeoffs between high and low pulse repetition frequency (PRF) and modulation schemes must be considered. The low PRF system with higher modulation (more bits per symbol) may require a more complex receiver, while the high PRF system with lower modulation may lead to performance degradation for delay spread in the channel. Finally, traditional antenna designs gear towards narrow band systems. To avoid dispersion at the receiver, the new wideband antennas need phase linearity and a fixed phase center [23].3. UWB STANDARDIZATION ANDREGULATORY EFFORTSThere are several standards bodies presently considering, at some level, UWB technologies. The standards body most advanced in the consideration of UWB is study group "a" of IEEE 802.15.3, which was formed in November 2001 [11-13]. A serious effort is well underway to define a UWB channel model, and numerous UWB tutorials have been given. Many hallway conversations talk to a physical layer standard being ratified in 2004 (though there is no formal knowledge or position on this) and will accompany the soon to be approved 802.15.3 Medium Access Control (MAC) which supports quality of service (QoS) for real-time multimedia applications [12]. The technical requirements presently call for bit rates of 110 to 200 Mbps at ranges up to 10 m, with the option to achieve 480 Mbps possibly at shorter distances. The powerconsumption requirement is presently set at 100 to 250 mW with lOe 5 bit error rate at the top of the physical layer. Complexity/cost are presently expected to be comparable to Bluetooth and the physical layer is required to support four collocated piconets. Coexistence is presently crucial (e.g., IEEE 802.1 la) and the ability to scale the technology is key to a long lasting and widely adopted standard. These technical requirements come from documents that are still being revised; additionally, it is not possible to predict if proposals may fall short of meeting some of the desired requirements.The United States FCC issued a report and order in the early part of 2002. This landmark decision to permit UWB operation in the 3.1 to 10.6 GHz spectrum under Part 15 emis- sion limits, with some additional restrictions, has catalyzed development and standardization processes as is evident by the sheer number of entities (companies, academic and government institutions) associated with UWB and through the serious efforts of the IEEE 802.15.3 group. The FCC carefully chose the frequency band of operation to be above 3.1 GHz to avoid interfering with GPS and other life critical systems. Furthermore, the FCC ruled that emissions below Part 15 would pro-vide for peaceful coexistence, the ability to have narrowband and UWB systems collocated on a non-interfering basis, because unintentional emissions from devicessuch as laptops are also limited to Part 15 rules. This ruling makes it possible to have up to 15 UWB frequency bands in the 7.5 GHz allocated unlicensed spectrum [7]. Extensive efforts are being conducted throughout Europe (CEPT, ETSI, and the European Commission), Korea, and Japan (Association of Radio Industries and Businesses, and the Japanese Ministry of Telecommunications).4. NETWORKING WITH UWB SYSTEMSThere is a significant interest in the ability to perform location determination and tracking of assets and people throughout warehouses, factories, ships, hospita梦,business environments, and other buildings or structures. The ability for UWB technologies to operate within such intense multipath environments in conjunction with the ability for UWB to provide very accurate geo-location capability at low cost and long battery life justifies the increasing technological activity in this market [20].As the rf tags [24] are distributed, it is also recognized tha they can be coordinated and networked. To further reduce the cost of the transceivers, position determination can occur at networked computer terminals. Additionally, it is quite conceivable that tag complexity can be further simplified by installink transmitters that chirp periodically [8]. Just as UWB demonstrates many benefits for rf tags, the technology equally lends itself to distributed sensor networks [9]. Sensor network applications include feedback controls systems and environmental surveillance for commercial, industrial,_ and military applications.In the data communication area, UWB technology may be used to implement ad-hoc networks. An ad-hoc network [25-27] is characterized by a collection of hosts that form a network "on-the-fly". An ad-hoc network is a multi-hop wireless network wherein each host also acts as a router. Mobile TRANSPORT Ad-hoc NETworks (MANETs) [25-27] are ad-hoc networks wherein the wireless hosts have the ability to move. Mobility of hosts in MANETs has a profound impact on the topology of the network and its performance. Figure 2 illustrates how the various layers of the OSI protocol stack have to operate in order to successfully complete a communication session. We look at some of relevant design issues at the different layers for UWB-based sensor networks and MANETs.4.1. Design Issues for Layers of the Protocol StackThere are several design considerations of sensor networks setup (including rftags) [24]. The sensors typically work on batteries and need be low cost, low power, with LPI/LPD and the ability to do geo-location. All of these requirements are satisfied by a UWB PHY.The PHY layer [26,27] is a very complex layer which deals with the medium specification (physical, electrical and mechanical) for data transmission between devices. The PHY layer specifies the operating frequency range, the operating temperature range, modulation scheme, channelization scheme. channel switch time, timing, synchronization, symbol coding, and interference from other systems, carrier-sensing and transmit/receive operations of symbols and power requirements for operations. The PHY layer interacts closely with, the MAC sublayer to ensure smooth performance of the network. The PHY layer for wireless systems (such as MANETs) has special considerations to take into account as the wireless medium is inherently error-prone and prone to interference from other wireless and rf systems in the proximity. Multipath is important to consider when designing wireless PHY layer as the rf propagation environment changes dynamically with time; frequent disconnections may occur. The problem is exacerbated when the devices in the network are mobile because of handoffs and new route establishment. It should be noted that there is a concerted effort by several UWB companies muster supportfor a UWB-based high data rate PITY in the IEEE 802.15.3 working group.The data link layer consists of the Logical Link Control (LLC) and the MAC sub layers. The MAC sublayer is responsible for channel access and the LLC is responsible for link maintenance, framing data unit, synchronization, error detection and possible recovery, and flow control. The MAC sublayer tries to gain access to the shared channel to prevent collision and distortion of transmitted frames with frames sent by the MAC sublayers of other nodes sharing the medium. TheMAC sublayer in sensor networks and MANETs needs to be power-aware, self-organizing and support mobility and handoffs.The network layer of such networks should perform routing so as to minimize power and the number of node hops in the route. In some cases, flooding/gossiping may be required to increase chances of the packets reaching the destination. Data aggregation/fusion may be used for. data-centric routing [24] in the network layer. The network layer needs to allow for route maintenance and updates for fast changing network topology.The transport layer is responsible for the end-to-end integrity of data in thenetwork. The transport layer performs multiplexing, segmenting, blocking, concatenating, error detection and recovery, flow control and expedited data transfer. In the MANET environment, the mobility of the nodes will almost certainly cause packets to be delivered out of order and a significant delay in the acknowledgements is to be expected as a result. Retransmissions are very expensive in terms of the power requirements. Transport protocols for MANETs and sensor networks need to focus on the development of feedback mechanisms that enable the transport layer to recognize the dynamics of the network and adjust its retransmission timer, window size and perform congestion control with more information on the network.Fig. 2. Issues at each layer of the protocol stackThe application layer needs support for location-based services, network management, task assignment, query and data dissemination for sensor networks and possible MANETs.5. RELATED TECHNOLOGIESIn order to better understand UWB-based technologies, we look at some related technology standards. More information on these technologies can be found in Ref. 27.5.1. BluetoothBluetooth [14] is a short-range radio technology standard originallyintended as a wireless cable replacement to connect portable computers, wireless devices, handsets and headsets. Bluetooth devices operate in the 2.4 GHz ISM band. Bluetooth uses the concept of a piconet which is a MANET with a master device controlling one or several slave devices. Bluetooth also allow scatternets wherein a slave device can be part of multiple piconets. Bluetooth has beed designed to handle both voice and data. traffic.5.2. HIPERIANl1 and HIPERIANIlHIPERLAN/I and HIPERLAN/2 [16] are European wireless LAN (WLAN) standards developed by European Telecommunications Standards Institute (ETSI). HIPERLAN/1 is a wireless equivalent of Ethernet while HIPERLAN/2 has architecture based on wireless Asynchronous Transfer Mode (ATM). Both the standards use dedicated frequency spectrum at -5 GHz. HIPERLAN/I provides a gross data rate of 23.5 Mb/s and net data rate of more than 18 Mb/s while HIPERLAN/2 provides gross data rates of 6/16/36154 Mb/s and a maximum of 50 Mb/s net data rate. Both standards use 10/100/1000 mW of transmit power and have a maximum range of 50 m. Also, the standards provide isochronous and asynchronous services with support for QoS. However, they have different channel a-ss and modulation schemes.5.3. IEEE 802]]This IEEE family of wireless Etherdet standards is primarily intended for indoor and in-building WLANs. There are several varities of this standard. The current available versions are the 802.1 la, 802.11b and 802.llg (emerging draft standard) with other versions which are starting to show on the horizon [10]. The 802.11 standards support ad-hoc networking as well as connections using an access point (AP). The standard provides specifications of the PHY and the MAC layers. The MAC specified uses CSMA/CA for access and provides service discovery and scanning, link setup and tear down, data fragmentation, security, power management and roaming facilities. The 802.1 la PHY is similar to the HIPERLAN/2 PHY. The PHY uses OFDM and operates in the 5 GHz UNII band. 802.1 la supports data rates ranging from 6 to 54 Mbps. 802.11 a currently offers much less potential for rf interference than other PHYs (e.g., 802.11b and 802.11g) that utilize the crowded 2.4 GHz ISM band. 802.11 a can support multimedia applications in densely populated user environments.' The 802.11b standard, proposed jointly by Harris and Lucent Technologies, extends the 802.11 Direct Sequence Spread Spectrum (DSSS) PHY to provide 5.5 and 11 Mb/s data rates.5.4. IEEE 802.75.3The emerging draft standard [11-13] defines MAC and PHY (2.4 GHz) layer specifications for a Wireless Personal Area Network (WPAN). The standard is based on the concept of a piconet which is a network confined to a 10 m personal operating space (POS) around a person or object. A WPAN consists of one or more collocated piconets. Each piconet is controlled by a piconet coordinator (PNC) and may consist of devices (DEVs). The 802.15.3 PHY is defined for 2.4 to 2.4835 GHz band and has two defined channel plans. It supports five different data rates (11 to 55 Mb/s). The base uncoded PHY rate is 22 Mb/s5.5. HomeRFHomeRF [15] working group was formed to develop a standard for wireless data communication between personal computers and consumer electronics in a home environment. The HomeRF standard is technically solid, simple, secure, and is easy to use. HomeRF networks provide a range of up to 150 ft typically enough for home networking. HomeRF uses Shared Wireless Access Protocol (SWAP) to provide efficient delivery of voice and data traffic. SWAP uses a transmit power of up to 100 mW and a gross data rate of 2 Mb/s. It can support a maximum of 127 devices per network. A SWAP-based system can work as an ad-hoc network or as a managed network using a connection point6. CONCLUSIONIn this paper, we presented an overview of UWB technology and its characteristics and advantages over conventional, continuous wave transmissions. We presented how UWB is well suited for several applications like sensor networks and MANETs. UWB technology has garnered a lot of interest among vendors who are looking at standardizing the use of the technology in various forums including IEEE.中文翻译超宽带系统的数据通信G. Racherla, J.L. Ellis, D.S. Furuno, S.C. LinGeneral Atomics, Advanced Wireless Group10240 Flanders Ct.San Diego CA 92121E-mail: {gopal.racherla, jason.ellis, susan.lin,超宽带(UWB)是一种在宽频谱范围内使用超低功耗传播无线脉冲能量的无线电传输方案。

毕业论文外文文献翻译mimo通信工程专业无线通信基础

毕业论文外文文献翻译mimo通信工程专业无线通信基础

毕业设计(论文)外文文献翻译文献、资料中文题目:无线通信基础文献、资料英文题目:文献、资料来源:文献、资料发表(出版)日期:院(部):专业:通信工程班级:姓名:学号:指导教师:翻译日期: 2017.02.14毕业设计(论文)外文资料翻译外文出处无线通信基础(Fundamentals ofwireless communications by DavidTse)附件:1.外文资料翻译译文;2.外文原文附件1:外文资料翻译译文7.mimo:空间多路复用与信道建模本书我们已经看到多天线在无线通信中的几种不同应用。

在第3章中,多天线用于提供分集增益,增益无线链路的可靠性,并同时研究了接受分解和发射分解,而且,接受天线还能提供功率增益。

在第5章中,我们看到了如果发射机已知信道,那么多采用多幅发射天线通过发射波束成形还可以提供功率增益。

在第6章中,多副发射天线用于生产信道波动,满足机会通信技术的需要,改方案可以解释为机会波束成形,同时也能够提供功率增益。

章以及接下来的几章将研究一种利用多天线的新方法。

我们将会看到在合适的信道衰落条件下,同时采用多幅发射天线和多幅接收天线可以提供用于通信的额外的空间维数并产生自由度增益,利用这些额外的自由度可以将若干数据流在空间上多路复用至MIMO信道中,从而带来容量的增加:采用n副发射天线和接受天线的这类MIMO信道的容量正比于n。

过去一度认为在基站采用多幅天线的多址接入系统允许若干个用户同时与基站通信,多幅天线可以实现不同用户信号的空间隔离。

20世纪90年代中期,研究人员发现采用多幅发射天线和接收天线的点对点信道也会出现类似的效应,即使当发射天线相距不远时也是如此。

只要散射环境足够丰富,使得接受天线能够将来自不同发射天线的信号分离开,该结论就成立。

我们已经了解到了机会通信技术如何利用信道衰落,本章还会看到信道衰落对通信有益的另一例子。

将机会通信与MIMO技术提供的性能增益的本质进行比较和对比是非常的有远见的。

通信工程毕业设计的论文外文翻译TDCDM与WCM络优化分析

通信工程毕业设计的论文外文翻译TDCDM与WCM络优化分析

毕业设计(论文)外文参考资料及译文译文题目: TD-SCDMA与WCMA网络优化分析3G network optimization 学生姓名:学号:专业:通信工程所在学院:龙蟠学院指导教师:职称:讲师2011年 12 月 1 日说明:要求学生结合毕业设计(论文)课题参阅一篇以上的外文资料,并翻译至少一万印刷符(或译出3千汉字)以上的译文。

译文原则上要求打印(如手写,一律用400字方格稿纸书写),连同学校提供的统一封面及英文原文装订,于毕业设计(论文)工作开始后2周内完成,作为成绩考核的一部分.3G network optimization摘自TD-SCDMA无线网络优化原理及方法One, the basic process of 3G network optimizationOperators aim is to build a profitable network, they are very concerned about the network construction, expansion and upgrade in the process of investment cost and its final performance, but the expansion,upgrade costs and network performance is a pair of contradiction. Construction cost budget and control can get relatively accurate numerical,but the performance of the network is composed of many subjective and objective factors. On one hand, the network capacity expansion,upgrading and upgrades to existing users can guarantee the normal use,on the other hand, it also can provide competitive new business,and makes further expansion,upgrading and upgrades can be carried out smoothly。

DRO设计

DRO设计

南京理工大学毕业设计(论文)外文资料翻译学院(系):电子工程与光电技术学院专业:通信工程姓名:顾江川学号: 0504220129外文出处:Exclusive Agents for NEC RF, Microwave and (用外文写)Optoelectronic semiconductor products inthe U.S. and Canada附件: 1.外文资料翻译译文;2.外文原文。

数字通信系统中Ku波段介质谐振振荡器的设计考虑翻译:顾江川学号:0504220129一.摘要本应用指南将叙述介质谐振振荡器设计者选择建立在性能要求基础上的拓扑结构和设备的过程,DROs因为他们的高效,低噪声和良好的输出功率和高温度稳定性而成为有吸引力的微波源。

他们相对于其他信号源(如腔振荡器,微带振荡器或乘以晶体振荡器)来说有一个低廉的成本,恰当的大小和稳定的工作状态。

用数字直接广播系统(分布式数据库系统)中本地Ku波段低噪声振荡器模块的应用作为一个实例,本文将演示主频在11.25Ghz条件下NEC的一款新的使用超低价塑料封装MESFETs的介质振荡器。

所需要的系统规格和设计演示将详细介绍,文章随后讨论如何选择一个适当的设备以及如何确定包含在非线性模型中的相位噪声参数。

重点审查基本DRO 的拓扑结构和反射型振荡器,本文所得的线性和非线性模拟使用了HP - EEsof系列四准确地预测DRO中的表现。

我们也考虑了测量结果和实际的“板凳优化”方法。

最后,至关重要的是设计师商业产品的成本,DRO部分和硬件部分的成本子那个和也会统计出来。

它仅采用了可应用于高频通信系统的几个的介质振荡器的设计技术,它可能不会作为被最优化的设计解决方案而被所有银行采用。

二.说明在分布式数据库系统的系统应用中, DRO中必须表现出低相位噪声,以满足数字调制方案和误码率( BER )的要求。

它还必须有最低限度的频率漂移温度保持接收机锁定到选定的通道,并应提供足够的输出功率,以直接驱动混频器降(通常是二极管环或积极砷化镓场效应管混频器)。

通信工程专业英语论文翻译

通信工程专业英语论文翻译

CDMA versus TDMATerm Paper :DTEC 6810Submitted by:Sabareeshwar Natarajan.Fall 2006DTEC 6810Communication TechnologyCDMA Vs TDMA in travel:Both GSM and CDMA can be found across United States, which doesn’t mean that it doesn’t matter which technology we choose. When we travel domestically it is possible that we reach areas where digital service is not available. While traveling between places it is possible that we reach certain rural areas were only analog access is offered. CDMA handsets offer analog capabilities which the GSM don’t offer. Another difference between GSM and CDMA is in the data transfer methods. GSM’s high-speed wireless data technology, GPRS (General Packet Radio Service), usually offers a slower data bandwidth for wireless data connection than CDMA’s high-speed technology, which has the capability of providing ISDN (Integrated Services Digital Network) with speeds as much as 144Kbps.GSM’s benefits over the CDMA in domestic purpose are that GSM uses SIM card that identifies a user and stores the information in the handset. The SIM card can be swapped between handsets, which enable to move all the contacts to the new handset with ease. CDMA can have this flexibility with their own service that stores data on the operator’s datab ase. This service allows the user to swap data’s between two handsets with a little trouble, but the advantage is it can be done when the handset is even lost but in GSM technology, when a handset is lost, SIM card is also lost with it.When it comes for international roaming handsets with GSM is far better than CDMA handsets because GSM is used in most the markets across the globe. Users using tri-band or quad-band can travel to Europe, India and most of Asia and still can use their cell phone. CDMA does not have this multiband capability, thus cannot be used multiple countries with ease.Differences between CDMA and TDMA:CDMA technology claims that its bandwidth is thirteen times efficient than TDMA and forty times efficient than analog systems. CDMA also have better security and higher data and voice transmission quality because of the spread spectrum technology it uses, which has increased resistance to multipath distortion. The battery life is higher in TDMA compared to CDMA because CDMA handsets transmit data all the time and TDMA does not require constant transmission. CDMA has greater coverage area when compared to TDMA. Though, when it comes to international roaming TDMA is better than CDMA. CDMA is patented by Qualcomm, so an extra fee is paid to Qualcomm. When it comes to United States and Canada market size for CDMA is larger than GSM’s market size but worldwide the market size for GSM is far bigger both in the number of subscribers and coverage ,than CDMA.Conclusion:From the comparisons made above we cannot say that TDMA is better than CDMA or vice versa. The main advantage of the CDMA is that, in the single detection method it is more flexible than TDMA or joint detection. CDMA is said to have higher capacity than TDMA. But in the future GSM can be extended by an optional CDMA component in order to further increase the capacity. Finally, it does not matter whether which one is better CDMA or TDMA right now. It can be only found out with the evolution of these technologies. When going for a cell phone the user should choose the technology according to where they use it. For users who travel abroad it is better to go with GSM handsets. For the users in United States CDMA is better than TDMA because of the coverage we can get at rural areas where digital signals cannot be transmitted.CDMA与TDMA学期论文:6810 DTEC提交:sabareeshwar纳塔拉詹。

现代移动通信 毕业论文外文翻译 (2)

现代移动通信  毕业论文外文翻译 (2)

一、英文原文Modern mobile communication technologyIn now highly the information society, the information and the correspondence have become the modern society “the life”. The information exchange mainly relies on the computer correspondence, but corresponds takes the transmission method, with the sensing technology, the computer technology fuses mutually, has become in the 21st century the international society and the world economic development powerful engine. In order to of adapt the time request, the new generation of mobile communication technology seasonable and lives, the new generation of mobile communication technology is the people said that third generation's core characteristic is the wide band addressing turns on non-gap roaming between the rigid network and numerous different communications system's, gains the multimedia communication services.Along with the time progress, the technical innovation, people's life request's enhancement, the mobile communication technology renewal speed is quite astonishing, almost every other ten year mobile communication technology has a transformation update, from the 1980s “the mobile phone” to present's 3G handset, during has had two mobile communication technology transformation, transits from 1G AMPS to 2G GSM, from GSM to IMT-2000 (i.e. 3G technology). Knows modern on me the mobile communication technology to have the following several aspect important technology:1. wideband modulation and multiple access techniqueThe wireless high speed data transmission cannot only depend on the frequency spectrum constantly the expansion, should be higher than the present number magnitude at least in the frequency spectrum efficiency, may use three technologies in the physical level, namely OFDM, UWB and free time modulation code. OFDM with other encoding method's union, nimbly OFDM and TDMA, FDMA, CDMA, SDMA combines the multiple access technique.In the 1960s the OFDM multi-channel data transmission has succeeded uses in complex and the Kathryn high frequency military channels. OFDM has used in 1.6 M bit/s high bit rate digital subscriber line (HDSL), 6 M bit/s asymmetrical digital subscriber line (ADSL), 100 M bit/s really high speed figure subscriber's line (VDSL), digital audio frequency broadcast and digital video broadcast and so on. OFDM applies on 5 GHz provides 54 M bit/s wireless local network IEEE 802.11 a and IEEE 802.11g, high performance this region network Hi per LAN/2 and ETSI-BRAN, but also takes metropolitan area network IEEE 802.16 and the integrated service digit broadcast (ISDB-T) the standard. Compares with the single load frequency modulation system service pattern, the OFDM modulation service pattern needs to solve the relatively big peak even power ratio (PAPR, Peak to Average Power Ratio) and to the frequency shifting and the phase noise sensitive question.High speed mobile communication's another request is under the wide noise bandwidth, must demodulate the signal-to-noise ratio to reduce as far as possible, thus increases the cover area. May adopt the anti-fading the full start power control and the pilot frequency auxiliary fast track demodulation technology, like the frequency range anti-fading's Rake receive and the track technology, the OFDMA technology which declines from the time domain and the frequencyrange resistance time and the frequency selectivity, the link auto-adapted technology, the union coding technique.2. frequency spectrum use factor lift techniqueThe fundamental research pointed out: In the independent Rayleigh scattering channel, the data rate and the antenna several tenth linear relationships, the capacity may reach Shannon 90%. Is launching and the receiving end may obtain the capacity and the frequency spectrum efficiency gain by the multi-antenna development channel space. The MIMO technology mainly includes the spatial multiplying and the space diversity technology, concurrent or the salvo same information enhances the transmission reliability on the independent channel.Receives and dispatches the bilateral space diversity is the high-capacity wireless communication system uses one of technical. Bell Lab free time's opposite angle BLAST (D-BLAST) capacity increase to receive and dispatch the bilateral smallest antenna number in administrative levels the function. The cross time domain which and the air zone expansion signal constitutes using MIMO may also resist the multi-diameter disturbance. V-BLAST system when indoor 24~34 dB, the frequency spectrum use factor is 20~40 bit/s/Hz. But launches and the receiving end uses 16 antennas, when 30 dB, the frequency spectrum use factor increases to 60~70 bit/s/Hz.The smart antenna automatic tracking needs the signal and the auto-adapted free time processing algorithm, produces the dimensional orientation wave beam using the antenna array, causes the main wave beam alignment subscriber signal direction of arrival through the digital signal processing technology, the side lobe or zero falls the alignment unwanted signal direction of arrival. The auto-adapted array antennas (AAA, Adaptive Array Antennas) disturbs the counter-balance balancer (ICE, Interference Canceling Equalizer) to be possible to reduce disturbs and cuts the emissive power.3. software radio technologyThe software radio technology is in the hardware platform through the software edition by a terminal implementation different system in many kinds of communication services. It uses the digital signal processing language description telecommunication part, downloads the digital signal processing hardware by the software routine (DSPH, Digital Signal Processing Hardware). By has the general opening wireless structure (OWA, Open Wireless Architecture), compatible many kinds of patterns between many kinds of technical standards seamless cut.UWB is also called the pulse to be radio, the modulation uses the pulse width in the nanosecond level fast rise and the drop pulse, the pulse cover frequency spectrum from the current to the lucky hertz, does not need in the radio frequency which the convention narrow band frequency modulation needs to transform, after pulse formation, may deliver directly to the antenna launch.4. software radio technologyThe software radio technology is in the hardware platform through the software edition by a terminal implementation different system in many kinds of communication services. It uses the digital signal processing language description telecommunication part, downloads the digital signal processing hardware by the software routine (DSPH, Digital Signal Processing Hardware). By has the general opening wireless structure (OWA, Open Wireless Architecture), compatible many kinds of patterns between many kinds of technical standards seamless cut.5. network security and QoSQoS divides into wireless and the wired side two parts, wireless side's QoS involves theradio resource management and the dispatch, the admission control and the mobility management and so on, the mobility management mainly includes the terminal mobility, individual mobility and service mobility. Wired side's QoS involves based on the IP differ discrimination service and the RSVP end-to-end resources reservation mechanism. Mechanism maps the wireless side IP differ IP the QoS. Network security including network turning on security, core network security, application security, safety mechanism visibility and configurable.In the above modern mobile communication key technologies' foundation, has had the land honeycomb mobile communication, the satellite communication as well as the wireless Internet communication, these mailing address caused the correspondence appearance to have the huge change, used the digital technique the modern wireless communication already to permeate the national economy each domain and people's daily life, for this reason, we needed to care that its trend of development, hoped it developed toward more and more convenient people's life's direction, will let now us have a look at the modern mobile communication the future trend of development.modern mobile communication technological development seven new tendencies :First, mobility management already from terminal management to individual management and intelligent management developmentSecond, network already from synchronized digital circuit to asynchronous digital grouping and asynchronous transfer mode (ATM) development;the three, software's developments actuated from the algorithm to the procedure-oriented and face the goal tendency development;the four, information processing have developed from the voice to the data and the image;five, wireless frequency spectrum processing already from narrow band simulation to the narrow band CDMA development;the six, computers have developed from central processing to the distributional server and intellectualized processing;the seven, semiconductor devices have developed from each chip 16,000,000,000,000 /150MHz speed VLSI to 0.5 /350MHz speed VLSI and 2,000,000,000,000,000 /550MHz speed VLSI.Under this tendency's guidance, the mobile service rapid development, it satisfied the people in any time, any place to carry on the correspondence with any individual the desire. The mobile communication realizes in the future the ideal person-to-person communication service way that must be taken. In the information support technology, the market competition and under the demand combined action, the mobile communication technology's development is progresses by leaps and bounds, presents the following several general trends: work service digitization, grouping; 2. networking wide band; working intellectualization; 4.higher frequency band; 5. more effective use frequency; 6.each kind of network tends the fusion. The understanding, grasps these tendencies has the vital practical significance to the mobile communication operator and the equipment manufacturer.二、英文翻译现代移动通信在当今高度信息化的社会,信息和通信已成为现代社会的“命脉”。

通信工程专业英语论文

通信工程专业英语论文

通信工程专业英语论文外文翻译(原文)The General Situation of AT89C51The AT89C51 is a low-power, high-performance CMOS 8-bit microcomputer with 4K bytes of Flash Programmable and Erasable Read Only Memory (PEROM) and 128 bytes RAM. The device is manufactured using Atmel’s high density nonvolatilememory technology and is compatible with the industry standard MCS-51?instruction set and pin out. The chip combines a versatile 8-bit CPU with Flash on a monolithic chip; the Atmel AT89C51 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications.Features:• Compatible with MCS-51? Products• 4K Bytes of In-System Reprogrammable Flash Memory• Endurance: 1,000 Write/Erase Cycles• Fully Static Operatio n: 0 Hz to 24 MHz• Three-Level Program Memory Lock• 128 x 8-Bit Internal RAM• 32 Programmable I/O Lines• Two 16-Bit Timer/Counters• Six Interrupt Sources• Programmable Serial Channel• Low Power Idle and Power Down ModesThe AT89C51 provides the following standard features: 4K bytes of Flash, 128 bytes of RAM, 32 I/O lines, two 16-bit timer/counters, a five vector two-level interrupt architecture, a full duplex serial port, on-chip oscillator and clock circuitry. In addition, the AT89C51 is designed with static logic for operation down to zero frequency and supports two software selectable power saving modes. 1外文翻译(原文)The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port and interrupt system to continue functioning. The Power Down Mode saves the RAM contents but freezes the oscillator disabling all other chip functions until the next hardware reset.Block DiagramPin Description:VCC Supply voltage.GND Ground.Port 0:Port 0 is an 8-bit open drain bidirectional I/O port. As an output port eachpin can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high impedance inputs. (Sink/flow) Port 0 may also be configured to be the multiplexed low order address/data bus during accesses to external program and data memory. In this mode P0 has 2外文翻译(原文)internal pull-ups.Port 0 also receives the code bytes during Flash programming, and outputs the code bytes during program verification. External pull-ups are required during program verification.Port 1:Port 1 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 1 output buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 1 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups.Port 1 also receives the low-order address bytes during Flash programming and verification.Port 2 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 2 Port 2:output buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 2 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups.Port 2 emits the high-order address byte during fetches fromexternal program memory and during accesses to external data memory that uses 16-bit addresses (MOVX @ DPTR). In this application it uses strong internal pull-ups when emitting 1s. During accesses to external datamemories that use 8-bit addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function Register.Port 2 also receives the high-order address bits and some control signals during Flash programming and verification.Port 3:Port 3 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 3 output buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 3 pins that are externally being pulled low will source current (IIL) because of the pull-ups.3外文翻译(原文)Port 3 also serves the functions of various special features of the AT89C51 as listed below:Port 3 also receives some control signals for Flash programming and verification.RST:Reset input. A high on this pin for two machine cycles while the oscillator is running resets the device.ALE/PROG:Address Latch Enable output pulse for latching the low byte of theaddress during accesses to external memory. This pin is also the program pulse input (PROG) during Flash programming.In normal operation ALE is emitted at a constant rate of 1/6 the oscillator frequency, and may be used for external timing or clockingpurposes. Note, however, that one ALE pulse is skipped during each access to external Data Memory.If desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no effect if the microcontroller is in externalexecution mode.PSEN:Program Store Enable is the read strobe to external program memory. When the AT89C51 is executing code from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory.4外文翻译(原文)EA/VPP:External Access Enable. EA must be strapped to GND in orderto enable the device to fetch code from external program memorylocations starting at 0000H up to FFFFH. Note, however, that if lock bit 1(LB1) is programmed, EA will be internally latched (fasten with a latch) on reset.EA should be strapped to VCC for internal program executions.This pin also receives the 12-volt programming enable voltage(VPP) during Flashprogramming, for parts that require 12-volt VPP.XTAL1:Input to the inverting oscillator amplifier and input to the internal clock operating circuit.XTAL2:Output from the inverting oscillator amplifier.Oscillator Characteristics:XTAL1 and XTAL2 are the input and output, respectively, of an inverting amplifier which can be configured for use as an on-chip oscillator, as shown in Figure 1. Either a quartz crystal or ceramic resonator may be used. To drive the device from an external clock source, XTAL2 should be left unconnected while XTAL1 is driven as shown in Figure 2. There are no requirements on the duty cycle of the external clock signal, since the input to the internal clockingcircuitry is through a divide-by-two flip-flop, but minimum and maximum voltage high and low times specifications must be observed.Idle Mode:In idle mode, the CPU puts itself to sleep while all theon chip peripherals remain active. The mode is invoked by software. The content of the on-chip RAM and all the special functions registersremain unchanged during this mode. The idle mode can be terminated byany enabled interrupt or by a hardware reset.It should be noted that when idle is terminated by a hard ware reset, the device normally resumes program execution, from where it left off,up to two machine cycles before the internal reset algorithm takes control. On-chip hardware inhibits access to internal RAM in this event, but access to the port pins is not inhibited. To eliminate thepossibility of an unexpected write to a port pin when Idle is terminated by reset, the instruction following the one that invokes Idle 5 外文翻译(原文)should not be one that writes to a port pin or to external memory.Power Down ModeIn the power down mode the oscillator is stopped, and theinstruction that invokes power down isthe last instruction executed. The on-chip RAM and Special Function Registers retain their values until the power down mode is terminated. The only exit from power down is a hardware reset. Reset redefines the SFRs but does not change the on-chip RAM. The reset should not be activated before VCC is restored to its normal operating level and must be held active long enough to allow the oscillator to restart and stabilize.Program Memory Lock BitsOn the chip are three lock bits which can be left unprogrammed (U)or can be programmed (P) to obtain the additional features listed in the table below:When lock bit 1 is programmed, the logic level at the EA pin is sampled and latched during reset. If the device is powered up without a reset, the latch initializes to a random value, and holds that value until reset is activated. It is6外文翻译(原文)necessary that the latched value of EA be in agreement with the current logic level at that pin in order for the device to function properly.Programming the Flash:The AT89C51 is normally shipped with the on-chip Flashmemory array in the erased state (that is, contents = FFH) and ready to be programmed. The programming interface accepts either a high-voltage (12-volt) or alow-voltage (VCC) program enable signal. The low voltage programming mode provides a convenient way to program the AT89C51 inside the user’s system, whilethe high-voltage programming mode is compatible with conventional third party Flash or EPROM programmers.The AT89C51 is shipped with either the high-voltage or low-voltage programming mode enabled. The respective top-side marking and device signatureThe AT89C51 code memory array is programmed byte-bybyte in either programming mode. To program any nonblank byte in the on-chip Flash Programmable and Erasable Read Only Memory, the entire memory must be erased using the Chip Erase Mode.Programming Algorithm: Before programming the AT89C51, the address, data and control signals should be set up according to the Flash programming mode table and Figures 3 and 4. To program the AT89C51, take the following steps.1. Input the desired memory location on the address lines.2. Input the appropriate data byte on the data lines.3. Activate the correct combination of control signals.4. Raise EA/VPP to 12V for the high-voltage programming mode.7外文翻译(原文)5. Pulse ALE/PROG once to program a byte in the Flash array or thelock bits. The byte-write cycle is self-timed and typically takes nomore than 1.5 ms. Repeat steps 1 through 5, changing the address anddata for the entire array or until the end of the object file is reached.Data Polling: The AT89C51 features Data Polling to indicate the endof a write cycle. During a write cycle, an attempted read of the lastbyte written will result in the complement of the written datum on PO.7. Once the write cycle has been completed, true data are valid on all outputs, and the next cycle may begin. Data Polling may begin any time after a write cycle has been initiated.Ready/Busy: The progress of byte programming can also be monitoredby the RDY/BSY output signal. P3.4 is pulled low after ALE goes high during programming to indicate BUSY. P3.4 is pulled high again when programming is done to indicate READY.Program Verify: If lock bits LB1 and LB2 have not been programmed,the programmed code data can be read back via the address and data lines for verification. The lock bits cannot be verified directly.Verification of the lock bits is achieved by observing that theirfeatures are enabled.Chip Erase: The entire Flash Programmable and Erasable Read Only Memory array is erased electrically by using the proper combination of control signals and byholding ALE/PROG low for 10 ms. The code array is written with all “1”s. The chiperase operation must be executed before the code memory can be re-programmed.Reading the Signature Bytes: The signature bytes are read by the same procedure asa normal verification of locations 030H, 031H, and 032H, except that P3.6 and P3.7must be pulled to a logic low. The values returned are as follows.(030H) = 1EH indicates manufactured by Atmel(031H) = 51H indicates 89C51(032H) = FFH indicates 12V programming(032H) = 05H indicates 5V programming8外文翻译(原文)Programming InterfaceEvery code byte in the Flash array can be written and the entire array can be erasedby using the appropriate combination of control signals. The write operation cycle isselftimed and once initiated, will automatically time itself to completion.9单片机温度控制系统中英文翻译资料AT89C51的概况AT89C51是美国ATMEL公司生产的低电压,高性能CMOS8位单片机,片内含4Kbytes的快速可擦写的只读程序存储器(PEROM)和128 bytes 的随机存取数据存储器(RAM),器件采用ATMEL公司的高密度、非易失性存储技术生产,兼容标准MCS-51产品指令系统,片内置通用8位中央处理器(CPU)和flish 存储单元,功能强大AT89C51单片机可为您提供许多高性价比的应用场合,可灵活应用于各种控制领域。

通信毕设中英文文献翻译

通信毕设中英文文献翻译

英文文献The Application of one point Multiple Access Spread SpectrumCommunication SystemLiu Jiangang, Nan yang City, Henan Province Electric Power Industry Bureau【ABSTRACT】Spread Spectrum Digital Microwave communication as a communication, because their excellent performance have been widely used. The article in Nan yang City Power Industry Bureau one point Multiple Access Spread Spectrum Communication System as an example. briefed the spread spectrum communications, the basic concept and characteristics of the power system communication applications.KEYWORDS:one point multiple access; Spread-spectrum communication; AttenuationNan yang City in the outskirts of Central cloth 35 to 11 kv substation farm terminals, their operation management rights belong to the Council East, Rural Power Company west (the eastern suburb of agricultural management companies -- four, the western suburbs of Rural Power Company Management 7), Scheduling of the various stations of the means of communication to the original M-150 radio and telephone posts. 2002 With the transformation of rural network, the remote station equipment into operation and communication channels to put a higher demand .As PUC Dispatch Communication Building to the east and west of farmers -- the difference between a company linked to fiber, Therefore, if 11 substations and the establishment of a transfer Link Building links Point may be the data and voice were sent to two rural power companies dispatch room, Rural Network scheduling for the implementation of automation to create the necessary conditions.Given the status and power grid substation level, nature, taking into account the carrier and optical-fiber communications to conduct multiple forwarding, increasing the instability factor, considering the cost and conditions of the urban construction, Finallydecided to adopt wireless spread-spectrum technology to establish that 11 farm terminal substation communication system. This paper describes the spread spectrum technology and the current system of the building.1.The basic concept of spread-spectrum communication.Spread Spectrum Communication's basic characteristics, is used to transmit information to the signal bandwidth (W) is far greater than the practical information required minimum (effective) bandwidth (△ F) , as the ratio of processing gain GP .G P = W/△FAs we all know, the ordinary AM, FM, or pulse code modulation communications, GP values in the area more than 10 times, collectively, the "narrow-band communication", and spread-spectrum communications GP values as high as hundreds or even thousands of times, can be called "broadband communications."Due to the spread-spectrum signal, it is very low power transmitters, transmission space mostly drowned in the noise, it is difficult to intercepted by the other receiver, only spreading codes with the same (or random PN code) receiver, Gain can be dealt with, and dispreading resume the original signal.2.The technology superiority of spread-spectrum communication.Strong anti-interference, bit error rate is low. As noted above, the spread spectrum communication system due to the expansion of the transmitter signal spectrum, the receiver dispreading reduction signal produced spreading gain, thereby greatly enhancing its interference tolerance. Under the spreading gain, or even negative in the signal-to-noise ratio conditions, can also signal from the noise drowned out Extraction, in the current business communications systems, spread spectrum communication is only able to work in a negative signal-to-noise ratio under the conditions of communication.Anti-multi-path interference capability, increase the reliability of the system. Spread-spectrum systems as used in the PN has a good correlation, correlation is very weak. different paths to the transmission signal can easily be separated and may in time and re-alignment phase, formation of several superimposed signal power, thereby improving the system's performance to receive increased reliability of the system.Easy to use the same frequency, improving the wireless spectrum utilization.Wireless spectrum is very valuable, although long-wave microwave have to be exploited, and still can not meet the needs of the community. To this end, countries around the world are designed spectrum management, users can only use the frequency applications, rely on the channel to prevent the division between the channel interference.Due to the use of spread-spectrum communication related receive this high-tech, low signal output power ( "a W, as a general-100 mW), and will work in the channel noise and thermal noise in the background, easy to duplicate in the same area using the same frequency, can now all share the same narrow-band frequency communications resources.Spread spectrum communication is digital communications, particularly for digital voice and data transmission while, spread spectrum communication with their own encryption, only in the same PN code communication between users, is good for hiding and confidential in nature, facilitating communications business . Easy to use spread-spectrum CDMA communications, voice compression and many other new technologies, more applicable to computer networks and digitization of voice, image information transmission.Communication is the most digital circuits, equipment, highly integrated, easy installation, easy maintenance, but also very compact and reliable. The average failure rate no time was very long.We have decided to adopt the spread-spectrum communication technology construction of 11 farm terminal substation communications system, Due to the spread-spectrum communication by the line-of-sight transmission distance restrictions, has become unstoppable system design premise.If the PUC scheduling Building and 11 substations have stopped, and the problem becomes more complicated, use spread spectrum system on the feasibility greatly reduced. Therefore, we look at the city Aerial topographical map, initially identified has not stopped to consider systems design, and requests the companies used this equipment Spread Spectrum 11 points transmission routing of the measured and the results have been satisfactory.Then spread spectrum wireless equipment market supply of cash, initially, weselected a series of Spread Spectrum Comlink third generation products. Because most of the point-to-point mode, Merit functions of the spread-spectrum equipment in a point-to-multipoint application environments encountered many problems: First is the issue of frequency resources. Even a minimum of 64 kbit / s data rate radio, space also occupied bandwidth 5 MHz, Because 32 of the PN code isolation is only about 15 dBm, the project had to use frequency division multiple access 35 db to get around the theoretical isolation. 11 stations will use 11 frequencies, frequency greater waste of resources. Comlink and Spread Spectrum products in the same frequency to achieve a point-to-multipoint communications.Second antenna erection problems, point-to-point equipment for the main radio station, the main station need to set up a number of terminal antennas, the vast majority of domestic engineering companies used by the U.S. Conifer 24 dBi parabolic semi-cast magnesium grid directional antenna. vertical polarization - 1 m wide, it is difficult to top the layout and avoid flap and the mutual interference, Although the project can be set up to take stratified, or through cooperation and on the road to one or more Omni directional antenna launch, However, as construction of a road and the signal attenuation, transmission result is not satisfactory.In addition, the RF cable lying, The application of network management software such factors we have also decided to adopt the final 1:00 Comlink Multiple Access Spread Spectrum products. Its system configuration, as shown in Figure 2:3.Routing AnalysisCombining visual distance access and use the radio and antenna gain, cable attenuation and environmental factors, and testing the design is reasonable, determinethe attenuation affluent channel capacity. Spread spectrum microwave link attenuation depends on the reliability margin.Attenuation margin calculation formula : F G= G SG + G ANT - L GL - L PLF G——Attenuation margin ;G SG——System Gain (dB);G ANT——Antenna Gain (dBi);L GL——Connectors and cables attenuation (dB);L pL—— Channel attenuation (dB)。

全球定位系统的介绍 --通信工程外文翻译

全球定位系统的介绍 --通信工程外文翻译

毕业设计(论文)外文参考资料及译文译文题目:Introduction to the Global Positioning System全球定位系统的介绍学生姓名:学号:专业:通信工程所在学院:指导教师:职称:201x年 xx月xx日Introduction to the Global Positioning System---------From “Corvallis Microtechnology, Inc. 1996”Chapter One: What is GPS?The Global Positioning System (GPS) is a location system based on a constellation of about 24 satellites orbiting the earth at altitudes of approximately 11,000 miles. GPS was developed by the United States Department of Defense (DOD), for its tremendous application as a military locating utility. The DOD's investment in GPS is immense. Billions and billions of dollars have been invested in creating this technology for military uses. However, over the past several years, GPS has proven to be a useful tool in non-military mapping applications as well.GPS satellites are orbited high enough to avoid the problems associated with land based systems, yet can provide accurate positioning 24 hours a day, anywhere in the world. Uncorrected positions determined from GPS satellite signals produce accuracies in the range of 50 to 100 meters. When using a technique called differential correction, users can get positions accurate to within 5 meters or less.Today, many industries are leveraging off the DOD's massive undertaking. As GPS units are becoming smaller and less expensive, there are an expanding number of applications for GPS. In transportation applications, GPS assists pilots and drivers in pinpointing their locations and avoiding collisions. Farmers can use GPS to guide equipment and control accurate distribution of fertilizers and other chemicals. Also,GPS is used for providing accurate locations and as a navigation tool for hikers, hunters and boaters.Many would argue that GPS has found its greatest utility in the field of Geographic Information Systems (GIS). With some consideration for error, GPS can provide any point on earth with a unique address (its precise location). A GIS is basically a descriptive database of the earth (or a specific part of the earth). GPS tells you that you are at point X,Y,Z while GIS tells you that X,Y,Z is an oak tree, or a spot in astream with a pH level of 5.4. GPS tells us the "where". GIS tells us the "what". GPS/GIS is reshaping the way we locate, organize, analyze and map our resources.Chapter Two: Trilateration - How GPS Determines a LocationIn a nutshell, GPS is based on satellite ranging - calculating the distances between the receiver and the position of 3 or more satellites (4 or more if elevation is desired) and then applying some good old mathematics. Assuming the positions of the satellites are known, the location of the receiver can be calculated by determining the distance from each of the satellites to the receiver. GPS takes these 3 or more known references and measured distances and "triangulates" an additional position.As an example, assume that I have asked you to find me at a stationary position based upon a few clues which I am willing to give you. First, I tell you that I am exactly 10 miles away from your house. You would know I am somewhere on the perimeter of a sphere that has an origin as your house and a radius of 10 miles. With this information alone, you would have a difficult time to find me since there are an infinite number of locations on the perimeter of that sphere.Second, I tell you that I am also exactly 12 miles away from the ABC Grocery Store. Now you can define a second sphere with its origin at the store and a radius of 12 miles. You know that I am located somewhere in the space where the perimeters of these two spheres intersect - but there are still many possibilities to define my location.Adding additional spheres will further reduce the number of possible locations. In fact, a third origin and distance (I tell you am 8 miles away from the City Clock) narrows my position down to just 2 points. By adding one more sphere, you can pinpoint my exact location. Actually, the 4th sphere may not be necessary. One of the possibilities may not make sense, and therefore can be eliminated.For example, if you know I am above sea level, you can reject a point that has negative elevation. Mathematics and computers allow us to determine the correct point with only 3 satellites.Based on this example, you can see that you need to know the following information in order to compute your position:A) What is the precise location of three or more known points (GPS satellites)?B) What is the distance between the known points and the position of the GPS receiver?Chapter Three: How the Current Locations of GPS Satellites are Determined GPS satellites are orbiting the Earth at an altitude of 11,000 miles. The DOD can predict the paths of the satellites vs. time with great accuracy. Furthermore, the satellites can be periodically adjusted by huge land-based radar systems. Therefore, the orbits, and thus the locations of the satellites, are known in advance. Today's GPS receivers store this orbit information for all of the GPS satellites in what is known as an almanac. Think of the almanac as a "bus schedule" advising you of where each satellite will be at a particular time. Each GPS satellite continually broadcasts the almanac. Your GPS receiver will automatically collect this information and store it for future reference.The Department of Defense constantly monitors the orbit of the satellites looking for deviations from predicted values. Any deviations (caused by natural atmospheric phenomenon such as gravity), are known as ephemeris errors. When ephemeris errors are determined to exist for a satellite, the errors are sent back up to that satellite, which in turn broadcasts the errors as part of the standard message, supplying this information to the GPS receivers.By using the information from the almanac in conjuction with the ephemeris error data, the position of a GPS satellite can be very precisely determined for a given time.Chapter Four: Computing the Distance Between Your Position and the GPSSatellitesGPS determines distance between a GPS satellite and a GPS receiver by measuring the amount of time it takes a radio signal (the GPS signal) to travel from the satellite to the receiver. Radio waves travel at the speed of light, which is about 186,000 miles per second. So, if the amount of time it takes for the signal to travel from the satellite to the receiver is known, the distance from the satellite to the receiver (distance = speed x time) can be determined. If the exact time when the signal was transmitted and the exact time when it was received are known, the signal's travel time can be determined.In order to do this, the satellites and the receivers use very accurate clocks which are synchronized so that they generate the same code at exactly the same time. The code received from the satellite can be compared with the code generated by the receiver. By comparing the codes, the time difference between when the satellite generated the code and when the receiver generated the code can be determined. This interval is the travel time of the code. Multiplying this travel time, in seconds, by 186,000 miles per second gives the distance from the receiver position to the satellite in miles.Chapter Five: Four (4) Satellites to give a 3D positionIn the previous example, you saw that it took only 3 measurements to "triangulate" a 3D position. However, GPS needs a 4th satellite to provide a 3D position. Why?? Three measurements can be used to locate a point, assuming the GPS receiver and satellite clocks are precisely and continually synchronized, thereby allowing the distance calculations to be accurately determined. Unfortunately, it is impossible to synchronize these two clocks, since the clocks in GPS receivers are not as accurate as the very precise and expensive atomic clocks in the satellites. The GPS signals travel from the satellite to the receiver very fast, so if the two clocks are off by only a small fraction, the determined position data may be considerably distorted.The atomic clocks aboard the satellites maintain their time to a very high degree ofaccuracy. However, there will always be a slight variation in clock rates from satellite to satellite. Close monitoring of the clock of each satellite from the ground permits the control station to insert a message in the signal of each satellite which precisely describes the drift rate of that satellite's clock. The insertion of the drift rate effectively synchronizes all of the GPS satellite clocks.The same procedure cannot be applied to the clock in a GPS receiver. Therefore, a fourth variable (in addition to x, y and z), time, must be determined in order to calculate a precise location. Mathematically, to solve for four unknowns (x,y,z, and t), there must be four equations. In determining GPS positions, the four equations are represented by signals from four different satellites.Chapter Six: The GPS Error BudgetThe GPS system has been designed to be as nearly accurate as possible. However, there are still errors. Added together, these errors can cause a deviation of +/- 50 -100 meters from the actual GPS receiver position. There are several sources for these errors, the most significant of which are discussed below:Atmospheric ConditionsThe ionosphere and troposphere both refract the GPS signals. This causes the speed of the GPS signal in the ionosphere and troposphere to be different from the speed of the GPS signal in space. Therefore, the distance calculated from "Signal Speed x Time" will be different for the portion of the GPS signal path that passes through the ionosphere and troposphere and for the portion that passes through space.As mentioned earlier, GPS signals contain information about ephemeris (orbital position) errors, and about the rate of clock drift for the broadcasting satellite. The data concerning ephemeris errors may not exactly model the true satellite motion or the exact rate of clock drift. Distortion of the signal by measurement noise can further increase positional error. The disparity in ephemeris data can introduce 1-5 meters ofpositional error, clock drift disparity can introduce 0-1.5 meters of positional error and measurement noise can introduce 0-10 meters of positional error.Ephemeris errors should not be confused with Selective Availability (SA), which is the intentional alteration of the time and ephemeris signal by the Department of Defense.A GPS signal bouncing off a reflective surface prior to reaching the GPS receiver antenna is referred to as multipath. Because it is difficult to completely correct multipath error, even in high precision GPS units, multipath error is a serious concern to the GPS user.Chapter Seven: Measuring GPS AccuracyAs discussed above, there are several external sources which introduce errors into a GPS position. While the errors discussed above always affect accuracy, another major factor in determining positional accuracy is the alignment, or geometry, of the group of satellites (constellation) from which signals are being received. The geometry of the constellation is evaluated for several factors, all of which fall into the category of Dilution Of Precision, or DOP.DOP is an indicator of the quality of the geometry of the satellite constellation. Your computed position can vary depending on which satellites you use for the measurement. Different satellite geometries can magnify or lessen the errors in the error budget described above. A greater angle between the satellites lowers the DOP, and provides a better measurement. A higher DOP indicates poor satellite geometry, and an inferior measurement configuration.Some GPS receivers can analyze the positions of the satellites available, based upon the almanac, and choose those satellites with the best geometry in order to make the DOP as low as possible. Another important GPS receiver feature is to be able to ignore or eliminate GPS readings with DOP values that exceed user-defined limits. Other GPS receivers may have the ability to use all of the satellites in view, thus minimizing the DOP as much as possible.全球定位系统的介绍----摘自Corvallis Microtechnology公司,1996第一章:什么是GPS?全球定位系统(GPS)是一种基于24颗高度大约11000英里的地球轨道卫星的定位系统。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

编号:毕业设计(论文)外文翻译(译文)学院:信息与通信学院专业:通信工程学生姓名:学号:指导教师单位:信息与通信学院姓名:职称:2014年 2 月9 日Radio network planning process and methods for WCDMAAbstractThis paper describes the system dimensioning and the radio network planning methodology for a third generation WCDMA system. The applicability of each method is demonstrated using examples of likely system scenarios. The challenges ofmodeling the multiservice environment are described and the implications to the system performance simulations are introduced.Keywords: Telecommunication network planning, Mobile radio- communication, Code division multiple access, Wide band transmission, Multiple service network, Dimensioning, Simulator, Static model, Dynamic model, Cellular network.Resume(?)ContentsI.IntroductionII. Initial planning, system dimensioningIII. Detailed planning processIV. Example dimensioning case and verification ofdimensioning with static simulationsV. Comparison of a static to a dynamic network simulatorVI. ConclusionINTRODUCTIONAs the launch of third generation technology approaches, operators are forming strategies for the deployment of their networks. These strategies must be supported by realistic business plans both in terms offuture service demand estimates and the requirement for investment in network infrastructure. Evaluating the requirement for network infrastructure can be achieved using system dimensioning tools capable of assessing both the radio access and the core network components.Having found an attractive business opportunity, system deployment must be preceded by careful network planning. The network planning tool must be capable of accurately modeling the system behaviour when loaded with the expected traffic profile. The third generation cellular systems will offer services well beyond the capabilities of today's networks. The traffic profile, as well as the radio access technology itself form the two most significant challenges when dimensioning and planning a WCDMA based third generation system. The traffic profile describes the mixture of services being used by the population of users. There are also specific system functionalities which must be modelled including fast power control and soft handover. In order to accurately predict the radio coverage the system eatures associated with WCDMA must be taken into account in the network modeling process. Especially the channel characterization, and interference control mechanisms in the case of any CDMA system must be considered. In WCDMA network multiple services co-exist. Different services (voice, data) have different processing gains, Eb/N0 performance and thus different receiver SNR requirements. In addition to those the WCDMA coverage depends on the load characterization, hand over parameterization, and power control effects. In current second generation systems' coverage planning processes the base station sensitivity is constant and the coverage threshold is the same for each base station. In the case of WCDMA the coverage threshold is dependent on the number of users and used bit rates in all cells, thus itis cell and service specific.The WCDMA planning process can be divided into three phases: initial planning (dimensioning), detailed radio network planning and network operation and optimization. Each of these phases requires additional support functions like propagation measurements, Key Performance Indicator definitions etc. In a cellular system where all the air interface connections operate on the same carrier the number of simultaneous users is directly influencing on the receivers' noise floors. Therefore, in the case of VMTS the planning phases cannot be separated into coverage and capacity planning. In the case of the post second-generation systems data services start to play an important role. The variety of services requires the whole planning process to overcome a set of modifications. One of the modifications is related to the quality of service (QoS) requirements. So far it has been adequate to specify the speech coverage and blocking probability only. Also more and more one has to consider the indoor and in-car coverage probabilities. In the case of UMTS the problem is slightly more multidimensional. For each service the QoS targets have to be set and naturally also met. In practice this means that the tightest requirement shall determine the site density. In addition to the coverage probability the packet data QoS criteria are related to the acceptable delays and throughput. Estimation of the delays in the planning phase requires good knowledge of the user behaviour and understanding in the functions of packet scheduler.Common features between second and third generation coverage prediction also exist. In all the systems both of the links have to be analyzed. In current systems the links tend to be in balance whereas in the case of third generation one of the links can be higher loaded than the other, and thus either one of the links could be limiting the cell capacity or coverage. The propagation calculation is basically the same for all standards, with the exception that different propagation models could be used. Another common feature is the interference analysis. In the case of WCDMA this is needed for the loading and sensitivity analysis, in the case of TDMA/FDMA it is essential for frequency allocation. In order to fully utilize the WCDMA capabilities, a thorough understanding of the WCDMA air interface is needed from the physical layer to the network modeling, planning and performance optimization.In this paper the pre-operational phase of the WCDMA planning process, as depicted in Figure 1in detail, is discussed. Section II is concentrating on the initial planning issues. The WCDMA link budget is introduced and it is demonstrated how different services and their QoS requirements impact on the site density estimate. In Section III a static radio network simulator is introduced. The methodology required in the coverage and capacity estimation for WCDMA is described for both uplink and downlink. Topic of Section IV is to demonstrate the accuracy of dimensioning: an example area is dimensioned and the average site distance is determined. The dimensioning result is compared with the outcome of a static network simulation. In Section V the analysis methods of the static simulator are verified. The verification was performed with a dynamic system simulator. The paper is concluded in Section VI.I.INITIAL PLANNING, SYSTEM DIMENSIONINGInitial planning (i.e. system dimensioning) provides the first and most rapid evaluation of the network element count as well as the associated capacity of those elements. This includes both the radio access network as well as the core network. This paper focuses upon the radio access part solely. The target of the initial planning phase is to estimate the required site density and site configurations for the area of interest. Initial planning activities include radio link budget (RLB) and coverage analysis, capacity estimation, and finally, estimation for the amount of base station hardware and sites, radio network controllers (RNC), equipment at different interfaces, and core network elements. The service distribution, traffic density, traffic growth estimates and QoS requirements are essential already in the initial planning phase. In the initial planning phase the quality is taken into account in terms of blocking and coverage probability. RLB calculation is done for each service, and the tightest requirement shall determine the maximum allowed isotropic path loss.A.WCDMA specific items in the radio link budgetIn this section the WCDMA uplink and downlink budgets are discussed. To estimate the maximum range of a cell a RLB calculation is needed. In the RLB the antenna gains, cable losses, diversity gains, fading margins, diversity gains etc.are taken into account. The output of the RLB calculation is the maximum allowed propagation path loss which in return determines the cell range and thus the amount of sites needed. There are a few WCDMA specific items in the link budget if one compares to the current TDMA based radio access system like GSM. These include interference degradation margin, fast fading margin, transmit power increase and soft handover gain.The interference degradation margin is a function of the cell loading. The more loading is allowed in the system, the larger interference margin is needed in uplink, and the smaller is the coverage area. The uplink loading can be derived as follows, for simplicity the derivation is performed with service activity v = 1.To find out the required uplink transmitted and received signal power for a mobile station MSk connected to a particular base station BSn, the basic CDMA Eb/N0 equation is used. The usual, slightly theoretical, assumption is that Ioth, the interference received from the MSs connected to the other cells is directly proportional (proportionality constant i) to Iown, the interference received from the MSs connected to the same BSn as the desired MS. Assume that the MSk uses bit rate Rk, its Eb/N0 requirement is Pk and the CDMA modulation bandwidth is W. Then the received power of the k-th mobile, Pk, at the base station it is connected to, must be at least such that公式(1)k=l ..... Kwhere Kn is the number of MSs connected to BSn, N= NoW = NfkToW is the noise power in the case of an empty cell, Nf is the receiver noise figure, k is the Boltzmann constant and T0 is the absolute temperature.The inequalities in (1) are slightly optimistic because it is assumed that there is no interference from the own signal. In reality this is not exactly true in multipath propagation conditions. Equation (1) is however still chosen to avoid takingmultipath interference into account twice. I.e., the Eb/N0 requirements determined from link level simulations are presented so that N0 means only noise and multipath interference is visible in higher Eb/N0 requirement to a certain BER performance. Solving the inequalities as equalities means solving for the minimum required received power (sensitivity), Pk:公式(2)If the Equations in (2) are summed over the mobile stations connected to BSn then公式公式(3)since/ow, = ~ Pk' If loading is defined as k公式(4)this loading definition can be enhanced to include gain and service activity, v:公式(5)In [ 12] the uplink loading is estimated using equation公式(6)where m is the number of services used. The difference between Equations (5) and (6) are due to the fact that (6) does not include sectorisation gain and thatin the derivation starting from Equation (1) the denominator is Iown-Pk+iIow +N rather than Iown+ iIown +N, which is only the case when Pk <<Iown"The downlink dimensioning is following the same logic as the uplink. For aselected cell range the total base station transmit power ought to be estimated.In this estimation the soft handover connections must be included. If thepower is exceeded either the cell range ought to be limited, or number ofusers in a cell has to be reduced. For downlink the loading (ηDL) isestimated based on公式(7)where LPmi is the link loss from the serving BSm to MSi, LPni is the linkloss from another BSn, to MSi, Pi is the transmit Eb/N0 requirement for theMSi, including the SHO combining gain and the average power raise causedby fast power control, N is the number of base stations, I is the number ofconnections in a sector andαi is the orthogonality factor depending onmultipath conditions (α= 1: fully orthogonal).公式:The term ~" defines the iDL. n =l,n~:m LPn i Direct output of the downlink RLB is the single link power required by a user at the cell edge. The total base station power estimation must take into account multiple communication links with average (LPmi) distance from the serving base station. Furthermore, the multicell environment with orthogonalities a i should be included in the modeling. More on the downlink loading and transmit power estimations can be found in [13]. In the RLB calculation in uplink direction the limiting factor is the mobile station transmit power, in downlink direction the limit is the total base station transmit power. When balancing the uplink and downlink service areas both linksmust be considered.Fast fading margin or power control headroom is another COMA specific item in the RLB. Some margin is needed in the mobile station transmission power for maintaining adequate closed loop fast power control in unfortunate propagation conditions like the cell edge. This is applicable especially for pedestrian users where the Eb/N0 to be maintained is more sensitive to the closed loop power control. The power control headroom has been studied more in [6] and [7].Another impact of the fast power control is the transmit power increase. In the case of a slowly moving mobile station the power control is able to follow the fading channel and the average transmitted power increases. In own cell this is needed to provide adequate quality for the connection and does not cause any harm, since increased transmit power is compensated by the fading channel. For neighbouring cells however this means additional interference. The transmit power increase (TxPowerlnc) is used to reduce the reuse efficiency according to Equation (9). In Equation (4) i should be replaced with term TxPowerlnc×i in case the mobile station transmit power increase is significant.Soft handover gain is discussed already in [3]. Handovers-soft or hard-provide gain against shadow fading by reducing the required fading margin.Due to the fact that the slow fading is partly uncorrelated between cells, and by making handovers the mobile can select a better communication link. Furthermore, soft handover (macro diversity) gives an additional gain against fast fading by reducing the required Eb/N0 relative to a single radio link. The amount of gain is a function of mobile speed, diversity combining algorithm used in the receiver and channel delay profile. More about the SHO gain can be found in Section II C. Receiver sensitivity estimationIn the link budget the BS receiver noise density is estimating the noise level over one WCDMA —carrier. The required receiver SNR contains the processing gain and the loss due to the loading. The loading used is the total loading due to different services on the carrier in question. The required signal power (S) depends on the SNR requirement, receiver noise figure and bandwidth.公式(10)Where公式(11)公式(12)where Nf is the receiver noise figure, Κis Boltzmann constant, To is the absolute temperature and ηis the loading. In some cases the basic noise/interference level is further corrected with the man made noise term.A.Shadowing margin and soft hand over gain estimationThe next step is to estimate the maximum cell range and cell coverage area in different environments/regions. The RLB is estimating the maximum allowed isotropic path loss, from that value a slow fading margin, related to the coverage probability, has to be subtracted. When estimating the coverage probability the propagation model exponent and the standard deviation for the log-normal fading must be set. If the indoor case is considered the indoor loss is from 15dB to 18dBand the standard deviation for log-normal fading margin calculation is set to 10-12dB.In the case of outdoor coverage typical standard deviation value is 7 to 8dB. Typical propagation constants range from 2.5 to 4. Traditionally the area coverage probability used in the RLB is for single cell case [1]. The required probability is 90 % to 95 % and typically this leads to 7-8dB fading margin, depending on the propagation constant and standard deviation of the log-normal fading. The Equation (13) estimates the area coverage probability for single cell case: 公式(13)Pr is the received level at cell edge, n is the propagation constant, x0 is the average signal strength threshold andσis the standard deviation of the field strength.In real WCDMA cellular networks the coverage areas of cells overlap and the mobile station is able to connect to more than just one serving cell. If more than one cell can be detected the location probability increases and is higher than determined for a single isolated cell. Analysis performed in [2] indicates that if the area location probability is reduced from 96% to 90% the number of base stations is reduced by 38 %,This number indicates that the concept of multiserver location probability should be carefully considered. In reality the signals from two base stations are not completely uncorrelated, and thus the soft handover gain is slightly less than estimated in [2]. In [3] the theory of the multiserver case with correlated signals is introduced:公式(14)where Pout is the outage at the cell edge, γSHOis the fading margin in the caseof soft handover, σis the standard deviation of the field strength and for 50 % correlation a = b = 1/21/2. With the theory presented for example in [1] this probability at the cell edge can be converted to the area probability. In the WCDMA link budget the SHO gain is needed. The gain consists of two parts: combining gain against fast fading and gain against slow fading. The gain against slow fading is dominating and it is specified as:公式(15)If we assume 95% area probability, n = 3.5 and the standard deviation is 7dB the gain will be 7.3dB-4dB=3.3dB. If the standard deviation is larger and the probability requirement higher the gain will be more.B.Cell range and cell coverage area estimationOnce the maximum allowed propagation loss in a cell is known, it is easy to apply any known propagation model for the cell range estimation. The propagation model should be chosen so that it optimum describes the propagation conditions in the area. The restrictions of the model are related to the distance from the base station, the base station effective antenna height, the mobile antenna height and the frequency. One typical example for macro cellular environment is Okumura-Hata. Equation (16) presents an example Okumura-Hata path loss model for an urban macro cell with base station antenna height of 25m, mobile antenna height of 1.5m and carrier frequency of 1950 MHz [4].公式(16)After choosing the cell range the coverage area can be calculated. The coverage area for one cell in hexagonal configuration can be estimated with:公式(17)TABLE I. -Example of a WCDMA RLB.Exemple d'un bilan de liaison radio WCDMA.Where S is the coverage area, r is the maximum cell range and K is a constant, depending on the network topology. The number of sectors is typically from 1 to 3.In the case of WCDMA reasonable values are up to 6 sectors. In the case of 6 sectors the estimation of the cell coverage area becomes problematic,since a six-sectored site does not necessary resemble a hexagon. A proposal for the cell area calculation at this stage is that the equation for the omni case is used also in the case of 6 sectors and the larger area is due to a higher antenna gain. The more sectors are used the more careful soft handover overhead has to be analysed to provide an accurate estimate. InTable II some of the K-values are listed.TABLE II. --K-values for the site area calculation. Valeurs du param~tre K pour le calcul d'une zone de couverture autour d'un siteC.Capacity and coverage analysis in the initial planning phaseOnce the site coverage area is known the site configurations in terms of channel elements, sectors and carriers, and site density (cell range) has to be selected so that the supported traffic density can fulfil the requirements. An example dimensioning case can be seen in Section IV. The WCDMA RLB is slightly more complex than the TDMA one. The cell range depends on the number of simultaneous users (number of channels/users in terms of interference margin, see Equation (6)). Thus the coverage and capacity are connected and already in the very beginning the operator should have knowledge and vision of the subscriber distribution and growth since it has a direct impact on the coverage. Finding the correct configuration for the network so that the traffic requirements are met and the network cost minimised is not a simple task. The number of carriers, number of sectors, loading, number of users and the cell range all have an impact on the result.III. DETAILED PLANNING PROCESSA.Introduction to a static radio network planning simulatorIn this study the simulator first introduced in [9] was used. It is of static nature and needs as inputs a digital map, the network layout and the traffic distribution in form of a discrete user map. Each of the users can have different terminal speed and uses a different service (bit rate, activity factor, which both can be different ’for uplink and downlink). Therefore each mobile station gets assigned an individual Eb/N0 requirement imported from link level simulations. The simulator itself consists of basically three parts-initialisation, combined uplink and downlink analysis and post processing phase. Following the initialisation part, round after round in the main part of the tool, both the uplink and downlink for all mobile stations are analysed and after the iterations have fulfilled certain convergence criteria, in the final step, the results of the uplink and downlink analyses are post processed for various graphical and numerical outputs. On top of these results, for selected areas (which also can consist of the whole network) area coverage analyses for UL and OL dedicated channel as well as for common channels (common pilot CPICH, broadcast control channel 8CCH, forward access and paging channel FACH and PCH on the P-CCPCH and S-CCPCH) can be performed. In case a second carder is present in the network area, either used by the same operator or by another operator adjacent channel interference (ACI ) can be taken into account. Only in case the second carrier is assigned to the same operator, load can beshared according different strategies between the carriers (IF-HO).B. Initialisation PhaseIn the global initialisation phase the network configuration is read in from parameter files for base stations, mobile stations and the network area. Some system parameters are set and propagation calculations are performed. In the following step, requirements coming from the link level simulations are assigned to base stations and mobile stations. After some initialisation tasks for the iterative analysis-setting default transmit power sand network performance -the actual simulation can start.bined uplink and downlink analysisC1. Uplink iteration stepThe target in the uplink iteration is to allocate the mobile stations' transmit powers so that the (interference+noise)-levels and thus the base station sensitivity values converge. The average transmit powers of the mobile stations to each base station are estimated so that they fulfil the base stations Eb/N0 requirements. The average mobile stations'transmit powers are based on the sensitivity level of the base station, service (data rate) and speed of the mobile station and the link losses to the base stations. They are corrected by taking into account theactivity factor, the soft handover gains and average power raise due to fast transmit power control. The impact of the uplink loading on the base station sensitivity (noise rise) is taken into account by adjusting it with (l-η). ηcan be defined by Equation (5).After the average transmit powers of the mobiles have been estimated they are compared to the maximum value allowed and mobiles exceeding this limit are trying IF-HO if allowed or are put to outage. Now the interference analysis can be performed again and the new loading and base station sensitivities are calculated until their changes are smaller than specified thresholds. Also in case the uplink loading of a cell exceeds specified limits, mobile stations are moved to another carrier if allowed (IF-HO). Otherwise they are put to outage.C2. Downlink iteration stepSimilarly to the uplink the goal of the downlink iteration is to assign the base station transmit powers for each link (including SHO connections) a mobile station is having until all mobile stations receive their signal with the required carrier-to-interference-ratio, C/I, defined by Equation (18) 公式(18)is the received Eb/N0 requirement of the MS depending on where EbNoMSterminal speed and service. The actual received (C/I)of MS m is calculatedmusing MRC according Equation (19) by summing the C/I values of all links k, k = 1... K mobile station m is having.公式(19)where Pis the total transmit power of the base station to which link k is kis the link loss from the cell k to the mobile station m, αestablished, Lpk mk is the cell specific orthogonality factor, Pis the power allocated to the linkkmis the other cell interference from base station k to mobile station m, Ioth,mand Nm is the background and receiver noise of MS m.The initial transmit powers are adjusted iteratively according the difference between the achieved and the targeted C/I value until convergence is achieved. The process requires iteration, since the C/I at each mobile station is dependent on all the powers allocated to the other mobile stations and it is not known a priori whether a link can be established or not. In case either certain link power limits or the total transmit power of a base station is exceeded mobile stations are performing IF-HO if allowed or taken out randomly from the network.In a further step for each mobile station it is checked whether the received Ec/Io value is above a user defined threshold so that the mobile station canreliably measure the base station and synchronise to it. Also here if the threshold given is exceeded, the mobile station tries IF-HO or is put to outage. A flow chart for the detailed iteration steps can be seen from Figure 3.C3. Adjacent channel interference calculationsThe adjacent channel interference influence due to the two possible carriers - either from own network or from a competitive operator's network in the same area-is taken into account by filtering this interference with a channel separation dependent filter. In both directions UL and DL the adjacent carrier filtering is implemented as a two-fold process. In OL, one filter for the mobile stations has been implemented indicating its out of band radiation (acpFilterUL). This filter is used to indicate how much power the mobile station is leaking into the other carders receiving band (Adjacent Channel Leakage Ratio, ACZLR ) For the base station in the uplink another filter (aciFilterUL) has been implemented. This filter is indicating the selectivity of the base station's receiver in multicarrier situation, i.e. how big portion of the adjacent channel power isreceived by the base station as adjacent channel interference power (Adjacent Channel Protection, ACP). Also this filter setting depends on the carrier separation. The adjacent channel interference situation in UL is depicted in Figure 4. In the simulations these two filters are combined to a single filter by Equation (20):公式(20)) is taken into account when calculating Adjacent channel interference (IACIthe UL load according to Equation (21).公式(21)Also in the downlink similar type of filtering is introduced as in the uplink. One filter for the base stations has been implemented indicating the out of band radiation of the base station (acp Filter DL). This filter is used to indicate how much power the base station is leaking into the other carriers receiving band (ACLR). The filter setting depends on the separation between the carriers. For the mobile station another filter has been implemented (aci Filter DL). This filter is indicating the selectivity of the mobile station's receiver in multicarrier situation, i.e. how much of the adjacent channel interference power is received by the mobile station (ACP). Also this filter setting depends on the carrier separation. The adjacent channel interference situation in DL is depicted in Figure 5. In the simulations these two filters are combined to a single filter by Equation (22):公式(22)Adjacent channel interference (I) in DL is taken into account whenACI。

相关文档
最新文档