外文翻译通信工程英文的毕业设计论文
通信工程毕业设计外文翻译--下一代无线宽带的目标(4G—5G)

附录一、英文原文:Goals Of True Broad band’s Wireless Next Wave(4G-5G)K.R.Santhi,Prof.V.K.Srivastava,G.SenthilKumaran,Eng. Albert Butare.Kigali Institute of Science Technology and Management (KIST),B.P.3900, Kigali,Rwanda.AbstractAs access technology increases, voice, video,multimedia, and broadband data services are becomingintegrated into the same network. Fourth Generation (4G)is the next generation of wireless networks that will replacethird Generation (3G) networks sometimes in future. 4G isintended to provide high speed, high capacity, low cost perbit, IP based services.4G is all about an integrated, globalnetwork that’s based on an open system approach. The goalof 4G i s to “replace the current proliferation of core cellularnetworks with a single worldwide cellular core networkstandard based on IP for control, video, packet data andV oIP. But while 3G haven’t quite arrived, researchers wantto contribute their ideas to the development of an as-yetundefined "wireless world" that could become operationalby around 2010. This paper deals with the fundamentalsand issues of networks, technologies, spectrum, standards,terminals, services of 4G and about the visions that thenetwork operators and service providers see for theevolution of 4G mobile systems and where is future researchfrom their perspective necessary?Keywords:Wireless, 4G, W-OFDM, MC-CDMA, LAS-CDMA,UWB.I. INTRODUCTIONWhile carriers and handset manufacturers obviously havetheir hands full with 3G, some companies are alreadylooking beyond this next generation of wirelesstechnology and networks. 4G is simply an initiative byacademic R&D labs to move beyond the limitations andproblems of 3G which is having trouble getting deployedand meeting its promised performance and throughput.While this 3G has not completely reached researchers andvendors are expressing growing interest in 4G why? Twomain areas are addressed in these initiatives: An increaseof capacity in the radio link and seamless mobility acrossheterogeneous access networks. Section 2 discusses aboutthe issues of 3G that has created interest towards 4Gdevelopments.Section 3 about evolution and comparison,Section 4 describes about the goals and the vision, section5 explains about some of the technologies for 4G, and inother following sections the applications, the research andother issues for 4G developments are discussed.II. WHY THE LEAP TOWARDS 4G?3G networks are in a very painful phase of theirdevelopment, with early trials yielding disappointingresults, costs ballooning, technical glitches, and networkoperators being forced to deflate expectations based onunrealistic hype. Despite the hype surrounding thehigher-speed 3G mobile networks now underconstruction, the reasons for the leap towards 4G are:A. PerformanceIndustry skeptics say that users will not be able to takeadvantage of rich multimedia content across wirelessnetworks with 3G. 4G communications will featureextremely high-quality video equal to that of high-definitiontelevision. In addition, it will enable wirelessdownloads at speeds exceeding 100 Mbps, about 260times than 3G wireless network.B. InteroperabilityThere are multiple standards for 3G making it difficult toroam and interoperate across networks. We need a globalstandard that provides global mobility and serviceportability so that service provider would no longer bebound by single-system vendors of proprietaryequipment.C. Networking3G are based on primarily a wide-area concept. We needhybrid networks that utilize both wireless LAN (hot spot)concept and cell or base-station WAN design. With 4G,the world would have base stations everywhere, ensuringphone usersconnection to a high-speed networkanywhere, anytime.D. BandwidthWe need wider bandwidth and higher bit rates. The 4Gtechnology, with its transmission speeds of more than 20mbps, would offer high-bandwidth services within thereach of LAN "hotspots," installed in offices,homes,coffee shops,and airport lounges. Away from thesehotspots, customers could connect to souped-up 2Gnetworks for voice and rudimentary data coverage.E. TechnologyUnlike 3G, 4G will more resemble a conglomeration ofexisting technologies rather than an entirely newstandard. Analysts define 4G as a seamless combinationof existing 2G wireless networks with local-areanetworks (LANs) or Bluetooth.F. ConvergenceConvergence involves more than mere technology; it is acoming together of services and markets.We need allnetwork that utilizes IP in its fullest form with convergedvoice and data capability,which the 4G will achieve.G. Cost4G systems will prove far cheaper than 3G, since theycan be built atop existing networks and won't requireoperators to completely retool and won't require carriersto purchase costly extra spectrum.Also an open systemIP wireless environment would probably further reducescosts for service providers by ushering in an era of realequipment interoperability.H. ScalabilityScalability, or the ability to handle increasing numbers ofusers and diversity of services, is more challenging withmobile networks."Design for Scalability," includesinformation that can help you meet changing usagedemands.Because an all IP core layer of 4G is easilyscalable, it is ideally suited to meet this challenge.III.EVOLUTION AND COMPARISON OFBROADBANDWIRELESS1) First Generation (1G):1G wireless mobilecommunication systems, was introduced in the early1980s.1G wireless was analog and supported the firstgeneration of analog cell phones.They include asignaling protocol known as SS7 (Signaling System 7).2) Second Generation (2G): 2G systems, fielded in thelate 1980s, were intended primarily for voicetransmission and was all about digital PCS.3) Third Generation (3G): 3G in wireless will be adeliberate migration to faster, data-centric wirelessnetworks.The immediate goal is to raise transmissionspeeds from 125kbps to 2M bit/sec.4) Fourth Generation (4G): In reality, as of first half of2002, 4G is a conceptual framework for or a discussionpoint to address future needs of a universal high speedwireless network that will interface with wirelinebackbone network seamlessly.IV. THE 4G NETWORK THAT THECELL-HEADSDREAM ABOUT4G can be imagined of as an integrated wireless systemthat enables seamless roaming between technologies.Auser can be operating in cellular technology network andget handed over to a satellite-based network and back to afixed wireless network, depending upon the networkcoverage and preference of charging.A. The GoalsOpen Mobile Alliance’s (OMA) main goal is to makesure different wireless services and devices worktogether, and across countries, operators, and mobileterminals.Other plans in the group's charter include:•Deliver open standards and specifications based onmarket and customer requirements.• Create and promote a common industry view on anarchitectural framework.• Help consolidate standards groups and work inconjunction with other existing standardsorganizations and groups.B. The Composite Vision• 20 Mbps data rates• Streaming Audio/Video• Asymmetric Access• Adaptive Modulation/Coding• Dynamic packet assignment• Smart/Adaptive antennas supportedC. 4G Network Architecture“4G” wireless networks can be realized with an IP-basedcore network for global routing along with morecustomized local-area radio access networks that supportfeatures such as dynamic handoff and ad-hoc routing aswell as newer requirements such as self-organization,QoS, multicasting, content caching, etc..In 4G LANs will be installed in trains and trucks as wellas buildings, or even just formed on an ad-hoc basisbetween random collections of devices that happen tocome within radio range of one other. Routing in suchnetworks will depend on new architectures, already underdevelopment by the IEEE and a European project calledMobile IP Network Developments (MIND).D. The working PrincipleIn 4G-style mobile IP, each cell phone is assigned apermanent "home" IP address, along with a "care-of"address that represents its actual location.When acomputer somewhere on the Internet wants tocommunicate with the cell phone, it first sends apacketto the phone's home address.A directory server on thehome network forwards this to the care-of address via atunnel, as in regular mobile IP. However, the directoryserver also sends a message to the computer informing itof the correct care-of address, so future packets can besent directly.This should enable TCP sessions and HTTPdownloads to be maintained as users move betweendifferent types of networks.Because of the manyaddresses and the multiple layers of subnetting, IPv6 isneeded for this type of mobility.V. TECHNOLOGIES THAT SUPPORT 4GThe revolution in 4G will be the optical networking, thenew air interface, the portable device etc.A. The Transmission Protocols1) OFDM: OFDM is a digital modulation technology inwhich in one time symbol waveform, thousands oforthogonal waves are multiplexed.This is good for highbandwidth digital data transition.2) W-OFDM: W-OFDM enables data to be encoded onmultiple high-speed radio frequencies concurrently. Thisallows for greater security, increased amounts of databeing sent, and the industry’s most efficient use ofbandwidth.W-OFDM enables the implementation of lowpower multipoint RF networks that minimize interferencewith adjacent networks.This enables independentchannels to operate within the same band allowingmultipoint networks and point-to-point backbone systemsto be overlaid in the same frequency band.3) MC-CDMA : MC-CDMA is actually OFDM with aCDMA overlay.Similar to single-carrier CDMA systems,the users are multiplexed with orthogonal codes todistinguish users in (multi-carrier) MC-CDMA.Howeverin MC-CDMA, each user can be allocated several codes,where the data is spread in time or frequency.4) LAS-CDMA:LinkAir Communications is developer of LAS-CDMA(Large Area Synchronized Code Division MultipleAccess) a patented 4G wireless technology. LAS-CDMAenables high-speed data and increases voice capacity andlatest innovative solution, CDD, merges the highlyspectral efficient LAS-CDMA technology with thesuperior data transmission characteristics of TDD.Thisresulting combination makes CDD the most spectrallyefficient, high-capacity duplexing system available today.B. The Radio Interface-UWB RadioTo make 4G really work carries will need to migrate toUltra Wideband (UWB) technology.UWB radiowill deliver essential new wireless andwired bandwidth inexpensively, without using preciousand scarce radio frequencies.Instead,digital video, voiceand data are enabled using modulated pulses of energythat peacefully co-exist alongside traditionalcommunications.UWB radio solves the multipath fadingissues and is 1,000% more process efficient than CDMA.C. The Network-LMDSLocal multipoint distribution system (LMDS) is thebroadband wireless technology used to deliver voice,data, Internet, and video services in the 25-GHz andhigher spectrum (depending on licensing).The acronymLMDS is derived from the following: L(local)—denotes that propagation characteristics ofsignals in this frequency range limit the potentialcoverage area of a single cell site;M (multipoint)—indicates that signals are transmitted ina point-to-multipoint or broadcast method;D (distribution)—refers to the distribution of signals,which may consist of simultaneous voice, data, Internet,and video traffic;S (service)—implies the subscriber nature of therelationship between the operator and the customer.VI. POTENTIAL APPLICATIONS OF 4G1) Virtual Presence: 4G system gives mobile users a"virtual presence" -- for example, always-on connectionsthat keep people involved in business activities regardlessof whether they are on-site or off.2)Virtual navigation:A remote database contains thegraphical representation of streets, buildings, andphysical characteristics of a large metropolis.Blocks ofthis database are transmitted in rapid sequence to avehicle, where a rendering program permits the occupantsto visualize the environment ahead.3) Tele-medicine: 4G will support remote healthmonitoring of patients.For e.g. the paramedic assistingthe victim of traffic accident in a remote location mustaccess medical records and may need videoconferenceassistance from a surgeon for an emergency intervention.The paramedic may need to relay back to the hospital thevictim's x-rays taken locally.4)Tele-geoprocessing applications:Thecombination of geographical information systems (GIS),global positioning systems (GPS), and high-capacitywireless mobile systems will enable a new type ofapplication referred to as tele-geoprocessing.Queriesdependent on location information of several users, inaddition to temporal aspects have many applications.5) Crisis-management applications:Naturaldisasters can affect the entire communicationsinfrastructure is in disarray.Restoring communicationsquickly is essential.With wideband wireless mobilecommunications Internet and video services, could be setup in hours instead of days or even weeks required forrestoration of wireline communications.6) Education :Educational opportunities availableon the internet, for individuals interested in life-longeducation, will be unavailable to client in remote areasbecause of the economic unfeasibility of providingwideband wireline internet access.4G wirelesscommunications provides a cost-effective alternative inthese situations.VII. ROLE OF THE WIRELESSINDUSTRYRECOMMENDATIONSWe are bringing to the attention of professionalsfollowing issues and problems that must be analyzed andresolved:1)Standardization: Standardization of wireless networksin terms of modulation techniques, switching schemesand roaming is an absolute necessity for 4G. We mustpay more attention to general meaning advancedtechnologies.2) Lower Price Points Only Slightly Higher thanAlternatives: The business visionaries should do someeconomic modeling before they start 4G hype. Theyshould understand that 4G data applications likestreaming video must compete with very low costwireline applications.3) More Coordination Among Spectrum RegulatorsAround the World:We must demand almost freespectrum NOT necessarily unlicensed Spectrumregulation bodies must get involved in guiding theresearchers by indicating which frequency band might beused for 4G.4) Regulatory frameworks:Policy and RegulatoryEnvironment which Provides Transparency, Certaintyand a Level Playing Field are necessary. The mostimportant thing is that we should recognize thatregulatory framework is as much an evolving matter astechnology, and be prepared to meet changes with anopen-minded and pragmatic attitude, always keeping theinterests of the industry and consumers in mind.5) More Academic Research:Universities must spendmore effort in solving fundamental problems in radiocommunications (especially multiband and widebandradios, intelligent antennas and signal processing).6) Voice-independent Business Justification Thinking:Business and Technology executives should not bias theirbusiness models by using voice channels as economicdeterminant for data applications.V oice has a built-indemand limit - data applications do not.7) Integration Across Different Network Topologies:Network architects must base their architecture on hybridnetwork concepts thatintegrates wireless wide areanetworks, wireless LANS (IEEE 802.11a, IEEE 802.11b,IEEE 802.11g, IEEE 802.15 and IEEE 802.16), Bluetoothwith fiber-based Internet backbone.Broadband wirelessnetworks must be a part of this integrated networkarchitecture.8) Non-disruptive Implementation: Upgrading from 3G to 4G is expected to be seamless to end-users with nodevice upgrades required.VIII. DEVELOPMENTS IN 4GAT&T is combining W-OFDM and EDGE technologies,to provide broadband mobile downlink access at peakrates of up to 10 Mbps while EDGE offers uplink accessat 384 Kbps with an 800KHz bandwidth in a high-mobilityenvironment.Sun Microsystems Laboratories are building 4G wirelesstechnologies that promise tointegrate voice and web datain an IP-based mobile communications.The Government of Karnataka in India has signed a MoUwith Charmed Technologies Inc from Beverly Hills,California and Software Technology Parks of India inKarnataka to develop 4G wireless technology. Theproject plan to use wireless technology based on theIEEE802.11a and IEEE802.11b standards for wirelessLAN for the underlying network is designed to support adata rate of up to 11Mbps and 54Mbps respectively. Thegoal is to get 6 billion people connected to the wirelessInternet by 2010.NTT DoCoMo and Hewlett-Packard Company &MOTOmediacollaboration will explore new mobile serviceconcepts in which people, places and things will be ableto interact, thereby bridging the real and the cyber world.MOTO-media is expected to enable high performancestreaming of multimedia content to mobile users.DoCoMo and HP aim to nish the shared study of basictechnology by 2003 and hope to push for 4G in 2006.IX. SUGGESTIONSWe would like to give the following suggestions for thedevelopment of 4G mobile technologies:1. Technologies like 4G must be developed to integrateinto a more flexible network that grow within thenetwork so that we don't have to scarp the old network toimplement the next generation, the generations to come.2. The very big challenge for developing a technology isproper human resource for building high quality systems.Big organization, which is engaged in software andsystem development, should rapidly go for tie-ups witheducational institutes for better manpower and knowledgemanagement.3. We talk about mobile multimedia that 4G will supportbut in reality people are not going to watch TV whilethey walk down the street. Likewise people will not buyCoca Cola at vending machines with a cell phone. Quitoften services conjured up by the engineering side of thevendor organizations has little to do with the reality. Sowireless industry should ponder well about marketdemand and invest money so that they will not be at loss.X.CONCLUSION4G should make a significant difference and addperceived benefit to an ordinary person’s life over 3G.We should drop the 2.5G, 3G, 4G speak altogether wherean additional “G” means merely an increase in capacity.What really means something for the users are newservices, integration of services, applications etc. Ourgoal is to struggle to get a “G”eneration of standards sothat we can take our phone anywhere in the world andaccess any service or communicate with any other userany way we want that will offer connectivity soinexpensively. In short, 4G or WWWW (World WideWireless web) should be a more intelligent technologythat interconnects the entire world without limits.二、英文翻译:下一代无线宽带的目标(4G—5G)摘要:随着接入技术的增长,语音、视频、多媒体和宽带数据业务正在集成到同一个网络中去。
本科毕业论文中英文翻译--Wireless-Communications无线通信【范本模板】

Wireless Communications*byJoshua S。
Gans,Stephen P。
King and Julian Wright1. IntroductionIn 1895, Guglielmo Marconi opened the way for modern wireless communications by transmitting the three—dot Morse code for the letter ‘S’ over a distance of th ree kilometers using electromagnetic waves。
From this beginning,wireless communications has developed into a key element of modern society. From satellite transmission, radio and television broadcasting to the now ubiquitous mobile telephone,wireless communications has revolutionized the way societies function.This chapter surveys the economics literature on wireless communications。
Wireless communications and the economic goods and services that utilise it have some special characteristics that have motivated specialised studies。
First, wireless communications relies on a scarce resource –namely,radio spectrum –the property rights for which were traditionally vested with the state. In order to foster the development of wireless communications (including telephony and broadcasting)those assets were privatised。
毕设外文原文及译文

北京联合大学毕业设计(论文)任务书题目:OFDM调制解调技术的设计与仿真实现专业:通信工程指导教师:张雪芬学院:信息学院学号:2011080331132班级:1101B姓名:徐嘉明一、外文原文Evolution Towards 5G Multi-tier Cellular WirelessNetworks:An Interference ManagementPerspectiveEkram Hossain, Mehdi Rasti, Hina Tabassum, and Amr AbdelnasserAbstract—The evolving fifth generation (5G) cellular wireless networks are envisioned to overcome the fundamental challenges of existing cellular networks, e.g., higher data rates, excellent end-to-end performance and user-coverage in hot-spots and crowded areas with lower latency, energy consumption and cost per information transfer. To address these challenges, 5G systems will adopt a multi-tier architecture consisting of macrocells, different types of licensed small cells, relays, and device-to-device (D2D) networks to serve users with different quality-of-service (QoS) requirements in a spectrum and energy-efficient manner. Starting with the visions and requirements of 5G multi-tier networks, this article outlines the challenges of interference management (e.g., power control, cell association) in these networks with shared spectrum access (i.e., when the different network tiers share the same licensed spectrum). It is argued that the existing interference management schemes will not be able to address the interference management problem in prioritized 5G multitier networks where users in different tiers have different priorities for channel access. In this context, a survey and qualitative comparison of the existing cell association and power control schemes is provided to demonstrate their limitations for interference management in 5G networks. Open challenges are highlighted and guidelines are provided to modify the existing schemes in order to overcome these limitations and make them suitable for the emerging 5G systems.Index Terms—5G cellular wireless, multi-tier networks, interference management, cell association, power control.I. INTRODUCTIONTo satisfy the ever-increasing demand for mobile broadband communications, the IMT-Advanced (IMT-A) standards have been ratified by the International Telecommunications Union (ITU) in November 2010 and the fourth generation (4G) wireless communication systems are currently being deployed worldwide. The standardization for LTE Rel-12, also known as LTE-B, is also ongoing and expected to be finalized in 2014. Nonetheless, existing wireless systems will not be able to deal with the thousand-fold increase in total mobile broadband data [1] contributed by new applications and services such as pervasive 3D multimedia, HDTV, VoIP, gaming, e-Health, and Car2x communication. In this context, the fifth generation (5G) wireless communication technologies are expected to attain 1000 times higher mobile data volume per unit area,10-100 times higher number of connecting devices and user data rate, 10 times longer battery life and 5 times reduced latency [2]. While for 4G networks the single-user average data rate is expected to be 1 Gbps, it is postulated that cell data rate of theorder of 10 Gbps will be a key attribute of 5G networks.5G wireless networks are expected to be a mixture of network tiers of different sizes, transmit powers, backhaul connections, different radio access technologies (RATs) that are accessed by an unprecedented numbers of smart and heterogeneous wireless devices. This architectural enhancement along with the advanced physical communications technology such as high-order spatial multiplexing multiple-input multiple-output (MIMO) communications will provide higher aggregate capacity for more simultaneous users, or higher level spectral efficiency, when compared to the 4G networks. Radio resource and interference management will be a key research challenge in multi-tier and heterogeneous 5G cellular networks. The traditional methods for radio resource and interference management (e.g., channel allocation, power control, cell association or load balancing) in single-tier networks (even some of those developed for two-tier networks) may not be efficient in this environment and a new look into the interference management problem will be required.First, the article outlines the visions and requirements of 5G cellular wireless systems. Major research challenges are then highlighted from the perspective of interference management when the different network tiers share the same radio spectrum. A comparative analysis of the existing approaches for distributed cell association and power control (CAPC) is then provided followed by a discussion on their limitations for5G multi-tier cellular networks. Finally, a number of suggestions are provided to modifythe existing CAPC schemes to overcome these limitations.II. VISIONS AND REQUIREMENTS FOR 5G MULTI-TIERCELLULAR NETWORKS5G mobile and wireless communication systems will require a mix of new system concepts to boost the spectral and energy efficiency. The visions and requirements for 5G wireless systems are outlined below.·Data rate and latency: For dense urban areas, 5G networks are envisioned to enable an experienced data rate of 300 Mbps and 60 Mbps in downlink and uplink, respectively, in 95% of locations and time [2]. The end-to- end latencies are expected to be in the order of 2 to 5 milliseconds. The detailed requirements for different scenarios are listed in [2].·Machine-type Communication (MTC) devices: The number of traditional human-centric wireless devices with Internet connectivity (e.g., smart phones, super-phones, tablets) may be outnumbered by MTC devices which can be used in vehicles, home appliances, surveillance devices, and sensors.·Millimeter-wave communication: To satisfy the exponential increase in traffic and the addition of different devices and services, additional spectrum beyond what was previously allocated to 4G standard is sought for. The use of millimeter-wave frequency bands (e.g., 28 GHz and 38 GHz bands) is a potential candidate to overcome the problem of scarce spectrum resources since it allows transmission at wider bandwidths than conventional 20 MHz channels for 4G systems.·Multiple RATs: 5G is not about replacing the existing technologies, but it is about enhancing and supporting them with new technologies [1]. In 5G systems, the existing RATs, including GSM (Global System for Mobile Communications), HSPA+ (Evolved High-Speed Packet Access), and LTE, will continue to evolve to provide a superior system performance. They will also be accompanied by some new technologies (e.g., beyondLTE-Advanced).·Base station (BS) densification: BS densification is an effective methodology to meet the requirements of 5G wireless networks. Specifically, in 5G networks, there will be deployments of a large number of low power nodes, relays, and device-to-device (D2D) communication links with much higher density than today’s macrocell networks.Fig. 1 shows such a multi-tier network with a macrocell overlaid by relays, picocells, femtocells, and D2D links. The adoption of multiple tiers in the cellular networkarchitecture will result in better performance in terms of capacity, coverage, spectral efficiency, and total power consumption, provided that the inter-tier and intratier interferences are well managed.·Prioritized spectrum access: The notions of both trafficbased and tier-based Prioriti -es will exist in 5G networks. Traffic-based priority arises from the different requirements of the users (e.g., reliability and latency requirements, energy constraints), whereas the tier-based priority is for users belonging to different network tiers. For example, with shared spectrum access among macrocells and femtocells in a two-tier network, femtocells create ―dead zones‖ around them in the downlink for macro users. Protection should, thus, be guaranteed for the macro users. Consequently, the macro and femtousers play the role of high-priority users (HPUEs) and lowpriority users (LPUEs), respectively. In the uplink direction, the macrocell users at the cell edge typically transmit with high powers which generates high uplink interference to nearby femtocells. Therefore, in this case, the user priorities should get reversed. Another example is a D2D transmission where different devices may opportunistically access the spectrum to establish a communication link between them provided that the interference introduced to the cellular users remains below a given threshold. In this case, the D2D users play the role of LPUEs whereas the cellular users play the role of HPUEs.·Network-assisted D2D communication: In the LTE Rel- 12 and beyond, focus will be on network controlled D2D communications, where the macrocell BS performs control signaling in terms of synchronization, beacon signal configuration and providing identity and security management [3]. This feature will extend in 5G networks to allow other nodes, rather than the macrocell BS, to have the control. For example, consider a D2D link at the cell edge and the direct link between the D2D transmitter UE to the macrocell is in deep fade, then the relay node can be responsible for the control signaling of the D2Dlink (i.e., relay-aided D2D communication).·Energy harvesting for energy-efficient communication: One of the main challenges in 5G wireless networks is to improve the energy efficiency of the battery-constrained wireless devices. To prolong the battery lifetime as well as to improve the energy efficiency, an appealing solution is to harvest energy from environmental energy sources (e.g., solar and wind energy). Also, energy can be harvested from ambient radio signals (i.e., RF energy harvesting) with reasonable efficiency over small distances. The havested energy could be used for D2D communication or communication within a small cell. Inthis context, simultaneous wireless information and power transfer (SWIPT) is a promising technology for 5G wireless networks. However, practical circuits for harvesting energy are not yet available since the conventional receiver architecture is designed for information transfer only and, thus, may not be optimal for SWIPT. This is due to the fact that both information and power transfer operate with different power sensitivities at the receiver (e.g., -10dBm and -60dBm for energy and information receivers, respectively) [4]. Also, due to the potentially low efficiency of energy harvesting from ambient radio signals, a combination of different energy harvesting technologies may be required for macrocell communication.III. INTERFERENCE MANAGEMENT CHALLENGES IN 5GMULTI-TIER NETWORKSThe key challenges for interference management in 5G multi-tier networks will arise due to the following reasons which affect the interference dynamics in the uplink and downlink of the network: (i) heterogeneity and dense deployment of wireless devices, (ii) coverage and traffic load imbalance due to varying transmit powers of different BSs in the downlink, (iii) public or private access restrictions in different tiers that lead to diverse interference levels, and (iv) the priorities in accessing channels of different frequencies and resource allocation strategies. Moreover, the introduction of carrier aggregation, cooperation among BSs (e.g., by using coordinated multi-point transmission (CoMP)) as well as direct communication among users (e.g., D2D communication) may further complicate the dynamics of the interference. The above factors translate into the following key challenges.·Designing optimized cell association and power control (CAPC) methods for multi-tier networks: Optimizing the cell associations and transmit powers of users in the uplink or the transmit powers of BSs in the downlink are classical techniques to simultaneously enhance the system performance in various aspects such as interference mitigation, throughput maximization, and reduction in power consumption. Typically, the former is needed to maximize spectral efficiency, whereas the latter is required to minimize the power (and hence minimize the interference to other links) while keeping theFig. 1. A multi-tier network composed of macrocells, picocells, femtocells, relays, and D2D links.Arrows indicate wireless links, whereas the dashed lines denote the backhaul connections. desired link quality. Since it is not efficient to connect to a congested BS despite its high achieved signal-to-interference ratio (SIR), cell association should also consider the status of each BS (load) and the channel state of each UE. The increase in the number of available BSs along with multi-point transmissions and carrier aggregation provide multiple degrees of freedom for resource allocation and cell-selection strategies. For power control, the priority of different tiers need also be maintained by incorporating the quality constraints of HPUEs. Unlike downlink, the transmission power in the uplink depends on the user’s batt ery power irrespective of the type of BS with which users are connected. The battery power does not vary significantly from user to user; therefore, the problems of coverage and traffic load imbalance may not exist in the uplink. This leads to considerable asymmetries between the uplink and downlink user association policies. Consequently, the optimal solutions for downlink CAPC problems may not be optimal for the uplink. It is therefore necessary to develop joint optimization frameworks that can provide near-optimal, if not optimal, solutions for both uplink and downlink. Moreover, to deal with this issue of asymmetry, separate uplink and downlink optimal solutions are also useful as far as mobile users can connect with two different BSs for uplink and downlink transmissions which is expected to be the case in 5G multi-tier cellular networks [3].·Designing efficient methods to support simultaneous association to multiple BSs: Compared to existing CAPC schemes in which each user can associate to a singleBS, simultaneous connectivity to several BSs could be possible in 5G multi-tier network. This would enhance the system throughput and reduce the outage ratio by effectively utilizing the available resources, particularly for cell edge users. Thus the existing CAPCschemes should be extended to efficiently support simultaneous association of a user to multiple BSs and determine under which conditions a given UE is associated to which BSs in the uplink and/or downlink.·Designing efficient methods for cooperation and coordination among multiple tiers: Cooperation and coordination among different tiers will be a key requirement to mitigate interference in 5G networks. Cooperation between the macrocell and small cells was proposed for LTE Rel-12 in the context of soft cell, where the UEs are allowed to have dual connectivity by simultaneously connecting to the macrocell and the small cell for uplink and downlink communications or vice versa [3]. As has been mentioned before in the context of asymmetry of transmission power in uplink and downlink, a UE may experience the highest downlink power transmission from the macrocell, whereas the highest uplink path gain may be from a nearby small cell. In this case, the UE can associate to the macrocell in the downlink and to the small cell in the uplink. CoMP schemes based on cooperation among BSs in different tiers (e.g., cooperation between macrocells and small cells) can be developed to mitigate interference in the network. Such schemes need to be adaptive and consider user locations as well as channel conditions to maximize the spectral and energy efficiency of the network. This cooperation however, requires tight integration of low power nodes into the network through the use of reliable, fast andlow latency backhaul connections which will be a major technical issue for upcoming multi-tier 5G networks. In the remaining of this article, we will focus on the review of existing power control and cell association strategies to demonstrate their limitations for interference management in 5G multi-tier prioritized cellular networks (i.e., where users in different tiers have different priorities depending on the location, application requirements and so on). Design guidelines will then be provided to overcome these limitations. Note that issues such as channel scheduling in frequency domain, timedomain interference coordination techniques (e.g., based on almost blank subframes), coordinated multi-point transmission, and spatial domain techniques (e.g., based on smart antenna techniques) are not considered in this article.IV. DISTRIBUTED CELL ASSOCIATION AND POWERCONTROL SCHEMES: CURRENT STATE OF THE ARTA. Distributed Cell Association SchemesThe state-of-the-art cell association schemes that are currently under investigation formulti-tier cellular networks are reviewed and their limitations are explained below.·Reference Signal Received Power (RSRP)-based scheme [5]: A user is associated with the BS whose signal is received with the largest average strength. A variant of RSRP, i.e., Reference Signal Received Quality (RSRQ) is also used for cell selection in LTE single-tier networks which is similar to the signal-to-interference (SIR)-based cell selection where a user selects a BS communicating with which gives the highest SIR. In single-tier networks with uniform traffic, such a criterion may maximize the network throughput. However, due to varying transmit powers of different BSs in the downlink of multi-tier networks, such cell association policies can create a huge traffic load imbalance. This phenomenon leads to overloading of high power tiers while leaving low power tiers underutilized.·Bias-based Cell Range Expansion (CRE) [6]: The idea of CRE has been emerged as a remedy to the problem of load imbalance in the downlink. It aims to increase the downlink coverage footprint of low power BSs by adding a positive bias to their signal strengths (i.e., RSRP or RSRQ). Such BSs are referred to as biased BSs. This biasing allows more users to associate with low power or biased BSs and thereby achieve a better cell load balancing. Nevertheless, such off-loaded users may experience unfavorable channel from the biased BSs and strong interference from the unbiased high-power BSs. The trade-off between cell load balancing and system throughput therefore strictly depends on the selected bias values which need to be optimized in order to maximize the system utility. In this context, a baseline approach in LTE-Advanced is to ―orthogonalize‖ the transmissions of the biased and unbiased BSs in time/frequency domain such that an interference-free zone is created.·Association based on Almost Blank Sub-frame (ABS) ratio [7]: The ABS technique uses time domain orthogonalization in which specific sub-frames are left blank by the unbiased BS and off-loaded users are scheduled within these sub-frames to avoid inter-tier interference. This improves the overall throughput of the off-loaded users by sacrificing the time sub-frames and throughput of the unbiased BS. The larger bias values result in higher degree of offloading and thus require more blank subframes to protect the offloaded users. Given a specific number of ABSs or the ratio of blank over total number of sub-frames (i.e., ABS ratio) that ensures the minimum throughput of the unbiased BSs, this criterion allows a user to select a cell with maximum ABS ratio and may even associate with the unbiased BS if ABS ratio decreases significantly. A qualitative comparison amongthese cell association schemes is given in Table I. The specific key terms used in Table I are defined as follows: channel-aware schemes depend on the knowledge of instantaneous channel and transmit power at the receiver. The interference-aware schemes depend on the knowledge of instantaneous interference at the receiver. The load-aware schemes depend on the traffic load information (e.g., number of users). The resource-aware schemes require the resource allocation information (i.e., the chance of getting a channel or the proportion of resources available in a cell). The priority-aware schemes require the information regarding the priority of different tiers and allow a protection to HPUEs. All of the above mentioned schemes are independent, distributed, and can be incorporated with any type of power control scheme. Although simple and tractable, the standard cell association schemes, i.e., RSRP, RSRQ, and CRE are unable to guarantee the optimum performance in multi-tier networks unless critical parameters, such as bias values, transmit power of the users in the uplink and BSs in the downlink, resource partitioning, etc. are optimized.B. Distributed Power Control SchemesFrom a user’s point of view, the objective of power control is to support a user with its minimum acceptable throughput, whereas from a system’s point of view it is t o maximize the aggregate throughput. In the former case, it is required to compensate for the near-far effect by allocating higher power levels to users with poor channels as compared to UEs with good channels. In the latter case, high power levels are allocated to users with best channels and very low (even zero) power levels are allocated to others. The aggregate transmit power, the outage ratio, and the aggregate throughput (i.e., the sum of achievable rates by the UEs) are the most important measures to compare the performance of different power control schemes. The outage ratio of a particular tier can be expressed as the ratio of the number of UEs supported by a tier with their minimum target SIRs and the total number of UEs in that tier. Numerous power control schemes have been proposed in the literature for single-tier cellular wireless networks. According to the corresponding objective functions and assumptions, the schemes can be classified into the following four types.·Target-SIR-tracking power control (TPC) [8]: In the TPC, each UE tracks its own predefined fixed target-SIR. The TPC enables the UEs to achieve their fixed target-TABLE IQUALITATIVE COMPARISON OF EXISTING CELL ASSOCIATION SCHEMESFOR MULTI-TIER NETWORKSSIRs at minimal aggregate transmit power, assuming thatthe target-SIRs are feasible. However, when the system is infeasible, all non-supported UEs (those who cannot obtain their target-SIRs) transmit at their maximum power, which causes unnecessary power consumption and interference to other users, and therefore, increases the number of non-supported UEs.·TPC with gradual removal (TPC-GR) [9], [10], and [11]:To decrease the outage ra -tio of the TPC in an infeasiblesystem, a number of TPC-GR algorithms were proposedin which non-supported users reduce their transmit power[10] or are gradually removed [9], [11].·Opportunistic power control (OPC) [12]: From the system’s point of view, OPC allocates high power levels to users with good channels (experiencing high path-gains and low interference levels) and very low power to users with poor channels. In this algorithm, a small difference in path-gains between two users may lead to a large difference in their actual throughputs [12]. OPC improves the system performance at the cost of reduced fairness among users.·Dynamic-SIR tracking power control (DTPC) [13]: When the target-SIR requirements for users are feasible, TPC causes users to exactly hit their fixed target-SIRs even if additional resources are still available that can otherwise be used to achieve higher SIRs (and thus better throughputs). Besides, the fixed-target-SIR assignment is suitable only for voice service for which reaching a SIR value higher than the given target value does not affect the service quality significantly. In contrast, for data services, a higher SIR results in a better throughput, which is desirable. The DTPC algorithm was proposed in [13] to address the problem of system throughput maximization subject to a given feasible lower bound for the achieved SIRs of all users in cellular networks. In DTPC, each user dynamically sets its target-SIR by using TPC and OPC in a selective manner. It was shown that when the minimum acceptable target-SIRs are feasible, the actual SIRs received by some users can be dynamically increased (to a value higher than their minimum acceptabletarget-SIRs) in a distributed manner so far as the required resources are available and the system remains feasible (meaning that reaching the minimum target-SIRs for the remaining users are guaranteed). This enhances the system throughput (at the cost of higher power consumption) as compared to TPC. The aforementioned state-of-the-art distributed power control schemes for satisfying various objectives in single-tier wireless cellular networks are unable to address the interference management problem in prioritized 5G multi-tier networks. This is due to the fact that they do not guarantee that the total interference caused by the LPUEs to the HPUEs remain within tolerable limits, which can lead to the SIR outage of some HPUEs. Thus there is a need to modify the existing schemes such that LPUEs track their objectives while limiting their transmit power to maintain a given interference threshold at HPUEs. A qualitative comparison among various state-of-the-art power control problems with different objectives and constraints and their corresponding existing distributed solutions are shown in Table II. This table also shows how these schemes can be modified and generalized for designing CAPC schemes for prioritized 5G multi-tier networks.C. Joint Cell Association and Power Control SchemesA very few work in the literature have considered the problem of distributed CAPC jointly (e.g., [14]) with guaranteed convergence. For single-tier networks, a distributed framework for uplink was developed [14], which performs cell selection based on the effective-interference (ratio of instantaneous interference to channel gain) at the BSs and minimizes the aggregate uplink transmit power while attaining users’ desire d SIR targets. Following this approach, a unified distributed algorithm was designed in [15] for two-tier networks. The cell association is based on the effective-interference metric and is integrated with a hybrid power control (HPC) scheme which is a combination of TPC and OPC power control algorithms.Although the above frameworks are distributed and optimal/ suboptimal with guaranteed convergence in conventional networks, they may not be directly compatible to the 5G multi-tier networks. The interference dynamics in multi-tier networks depends significantly on the channel access protocols (or scheduling), QoS requirements and priorities at different tiers. Thus, the existing CAPC optimization problems should be modified to include various types of cell selection methods (some examples are provided in Table I) and power control methods with different objectives and interference constraints (e.g., interference constraints for macro cell UEs, picocell UEs, or D2Dreceiver UEs). A qualitative comparison among the existing CAPC schemes along with the open research areas are highlighted in Table II. A discussion on how these open problems can be addressed is provided in the next section.V. DESIGN GUIDELINES FOR DISTRIBUTED CAPCSCHEMES IN 5G MULTI-TIER NETWORKSInterference management in 5G networks requires efficient distributed CAPC schemes such that each user can possibly connect simultaneously to multiple BSs (can be different for uplink and downlink), while achieving load balancing in different cells and guaranteeing interference protection for the HPUEs. In what follows, we provide a number of suggestions to modify the existing schemes.A. Prioritized Power ControlTo guarantee interference protection for HPUEs, a possible strategy is to modify the existing power control schemes listed in the first column of Table II such that the LPUEs limit their transmit power to keep the interference caused to the HPUEs below a predefined threshold, while tracking their own objectives. In other words, as long as the HPUEs are protected against existence of LPUEs, the LPUEs could employ an existing distributed power control algorithm to satisfy a predefined goal. This offers some fruitful direction for future research and investigation as stated in Table II. To address these open problems in a distributed manner, the existing schemes should be modified so that the LPUEs in addition to setting their transmit power for tracking their objectives, limit their transmit power to keep their interference on receivers of HPUEs below a given threshold. This could be implemented by sending a command from HPUEs to its nearby LPUEs (like a closed-loop power control command used to address the near-far problem), when the interference caused by the LPUEs to the HPUEs exceeds a given threshold. We refer to this type of power control as prioritized power control. Note that the notion of priority and thus the need of prioritized power control exists implicitly in different scenarios of 5G networks, as briefly discussed in Section II. Along this line, some modified power control optimization problems are formulated for 5G multi-tier networks in second column of Table II.To compare the performance of existing distributed power control algorithms, let us consider a prioritized multi-tier cellular wireless network where a high-priority tier consisting of 3×3 macro cells, each of which covers an area of 1000 m×1000 m, coexists with a low-priority tier consisting of n small-cells per each high-priority macro cell, each。
通信工程专业英语论文设计

The General Situation of AT89C51The AT89C51 is a low-power, high-performance CMOS 8-bit microcomputer with 4K bytes of Flash Programmable and Erasable Read Only Memory (PEROM) and 128 bytes RAM. The device is manufactured using Atmel’s high density nonvolatile memory technology and is compatible with the industry standard MCS-51™ instruction set and pin out. The chip combines a versatile 8-bit CPU with Flash on a monolithic chip; the Atmel AT89C51 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications.Features:• Compatible with MCS-51™ Products• 4K Bytes of In-System Reprogrammable Flash Memory• Endurance: 1,000 Write/Erase Cycles• Fully Static Operation: 0 Hz to 24 MHz• Three-Level Program Memory Lock• 128 x 8-Bit Internal RAM• 32 Programmable I/O Lines• Two 16-Bit Timer/Counters• Six Interrupt Sources• Programmable Serial Channel• Low Power Idle and Power Down ModesThe AT89C51 provides the following standard features: 4K bytes of Flash, 128 bytes of RAM, 32 I/O lines, two 16-bit timer/counters, a five vector two-level interrupt architecture, a full duplex serial port, on-chip oscillator and clock circuitry. In addition, the AT89C51 isdesigned with static logic for operation down to zero frequency and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port and interrupt system to continue functioning. The Power Down Mode saves the RAM contents but freezes the oscillator disabling all other chip functions until the next hardware reset.Block DiagramPin Description:VCC Supply voltage.GND Ground.Port 0:Port 0 is an 8-bit open drain bidirectional I/O port. As an output port each pin can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high impedance inputs.(Sink/flow)Port 0 may also be configured to be the multiplexed low order address/data bus during accesses to external program and data memory. In this mode P0 has internal pull-ups.Port 0 also receives the code bytes during Flash programming, and outputs the code bytes during program verification. External pull-ups are required during program verification.Port 1:Port 1 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 1 output buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 1 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups.Port 1 also receives the low-order address bytes during Flash programming and verification.Port 2:Port 2 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 2 output buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 2 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups.Port 2 emits the high-order address byte during fetches from external program memory and during accesses to external data memory that uses 16-bit addresses (MOVX @ DPTR). In this application it uses strong internal pull-ups when emitting 1s. During accesses to external data memories that use 8-bit addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function Register.Port 2 also receives the high-order address bits and some control signals during Flash programming and verification.Port 3:Port 3 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 3 output buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 3 pins that are externally being pulled low will source current (IIL) because of the pull-ups.Port 3 also serves the functions of various special features of the AT89C51 as listed below:Port 3also receivessome controlsignals forFlashprogramming and verification.RST:Reset input. A high on this pin for two machine cycles while the oscillator is running resets the device.ALE/PROG:Address Latch Enable output pulse for latching the low byte of the address during accesses to external memory. This pin is also the program pulse input (PROG) during Flash programming.In normal operation ALE is emitted at a constant rate of 1/6 theoscillator frequency, and may be used for external timing or clocking purposes. Note, however, that one ALE pulse is skipped during each access to external Data Memory.If desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no effect if the microcontroller is in external execution mode.PSEN:Program Store Enable is the read strobe to external program memory.When the AT89C51 is executing code from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory.EA/VPP:External Access Enable. EA must be strapped to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH. Note, however, that if lock bit 1(LB1) is programmed, EA will be internally latched (fasten with a latch) on reset.EA should be strapped to VCC for internal program executions.This pin also receives the 12-volt programming enable voltage(VPP) during Flash programming, for parts that require 12-volt VPP.XTAL1:Input to the inverting oscillator amplifier and input to the internal clock operating circuit.XTAL2:Output from the inverting oscillator amplifier.Oscillator Characteristics:XTAL1 and XTAL2 are the input and output, respectively, of an inverting amplifier which can be configured for use as an on-chip oscillator, as shown in Figure 1. Either a quartz crystal or ceramic resonator may be used. To drive the device from an external clock source, XTAL2 should be left unconnected while XTAL1is driven as shown in Figure 2. There are no requirements on the duty cycle of the external clock signal, since the input to the internal clocking circuitry is through a divide-by-two flip-flop, but minimum and maximum voltage high and low times specifications must be observed.Idle Mode:In idle mode, the CPU puts itself to sleep while all the on chip peripherals remain active. The mode is invoked by software. The content of the on-chip RAM and all the special functions registers remain unchanged during this mode. The idle mode can be terminated by any enabled interrupt or by a hardware reset.It should be noted that when idle is terminated by a hard ware reset, the device normally resumes program execution, from where it left off, up to two machine cycles before the internal reset algorithm takes control. On-chip hardware inhibits access to internal RAM in this event, but access to the port pins is not inhibited. To eliminate the possibility of an unexpected write to a port pin when Idle is terminated by reset, the instruction following the one that invokes Idle should not be one that writes to a port pin or to external memory.Power Down ModeIn the power down mode the oscillator is stopped, and the instruction that invokes power down is the last instruction executed. The on-chip RAM and Special Function Registers retain their valuesuntil the power down mode is terminated. The only exit from power down is a hardware reset. Reset redefines the SFRs but does not change the on-chip RAM. The reset should not be activated before VCC is restored to its normal operating level and must be held active long enough to allow the oscillator to restart and stabilize.Program Memory Lock BitsOn the chip are three lock bits which can be left unprogrammed (U) or can be programmed (P) to obtain the additional features listed in the table below:Lock Bit Protection ModesWhen lock bit 1 is programmed, the logic level at the EA pin is sampled and latched during reset. If the device is powered up without a reset, the latch initializes to a random value, and holds that value until reset is activated. It is necessary that the latched value of EA be in agreement with the current logic level at that pin in order for the device to function properly.Programming the Flash:The AT89C51 is normally shipped with the on-chip Flash memory array in the erased state (that is, contents = FFH) and ready to be programmed.The programming interface accepts either a high-voltage (12-volt) or a low-voltage (VCC) program enable signal.The low voltage programming mode provides a convenient way toprogram the AT89C51 inside the user’s system, while the high-voltage programming mode is compatible with conventional third party Flash or EPROM programmers.The AT89C51 is shipped with either the high-voltage or low-voltage programming mode enabled. The respective top-side marking and device signature codes are listed in the following table.The AT89C51 code memory array is programmed byte-bybyte in either programming mode. To program any nonblank byte in the on-chip Flash Programmable and Erasable Read Only Memory, the entire memory must be erased using the Chip Erase Mode.Programming Algorithm: Before programming the AT89C51, the address, data and control signals should be set up according to the Flash programming mode table and Figures 3 and 4. To program the AT89C51, take the following steps.1. Input the desired memory location on the address lines.2. Input the appropriate data byte on the data lines.3. Activate the correct combination of control signals.4. Raise EA/VPP to 12V for the high-voltage programming mode.5. Pulse ALE/PROG once to program a byte in the Flash array or the lock bits. The byte-write cycle is self-timed and typically takes no more than 1.5 ms. Repeat steps 1 through 5, changing the address and data for the entire array or until the end of the object file is reached.Data Polling: The AT89C51 features Data Polling to indicate the end of a write cycle. During a write cycle, an attempted read of thelast byte written will result in the complement of the written datum on PO.7. Once the write cycle has been completed, true data are valid on all outputs, and the next cycle may begin. Data Polling may begin any time after a write cycle has been initiated.Ready/Busy:The progress of byte programming can also be monitored by the RDY/BSY output signal. P3.4 is pulled low after ALE goes high during programming to indicate BUSY. P3.4 is pulled high again when programming is done to indicate READY.Program Verify: If lock bits LB1 and LB2 have not been programmed, the programmed code data can be read back via the address and data lines for verification. The lock bits cannot be verified directly. Verification of the lock bits is achieved by observing that their features are enabled.Chip Erase: The entire Flash Programmable and Erasable Read Only Memory array is erased electrically by using the proper combination of control signals and by holding ALE/PROG low for 10 ms. The code array is written with all “1”s. The chip erase operation must be executed before the code memory can be re-programmed.Reading the Signature Bytes: The signature bytes are read by the same procedure as a normal verification of locations 030H, 031H, and 032H, except that P3.6 and P3.7 must be pulled to a logic low. The values returned are as follows.(030H) = 1EH indicates manufactured by Atmel(031H) = 51H indicates 89C51(032H) = FFH indicates 12V programming(032H) = 05H indicates 5V programmingProgramming InterfaceEvery code byte in the Flash array can be written and the entire array can be erased by using the appropriate combination of controlsignals. The write operation cycle is selftimed and once initiated, will automatically time itself to completion.AT89C51的概况AT89C51是美国ATMEL公司生产的低电压,高性能CMOS8位单片机,片内含4Kbytes的快速可擦写的只读程序存储器(PEROM)和128 bytes 的随机存取数据存储器(RAM),器件采用ATMEL公司的高密度、非易失性存储技术生产,兼容标准MCS-51产品指令系统,片内置通用8位中央处理器(CPU)和flish存储单元,功能强大AT89C51单片机可为您提供许多高性价比的应用场合,可灵活应用于各种控制领域。
通信工程毕业设计 外文翻译

东华理工大学长江学院毕业设计外文翻译学生姓名:张伟学号:09323119专业:信息工程系别:信息工程指导教师:谌洪茂职称:讲师二0一三年六月五日OriginalOptical Fiber CommunicationsThe General System Communication may be broadly defined as the transfer of information from one point to another. When the information is to be conveyed over any distance a communication system is usually required. Within a communication system the information transfer is frequently achieved by superimposing or modulating the information onto an electromagnetic wave which acts as a carrier for the information signal. This modulated carrier is then transmitted to the required destination where it is received and the original information signal is obtained by demodulation. Sophisticated techniques have been developed for this process by using electromagnetic carrier waves operating at radio frequencies as well as microwave and millimeter w ave frequencies. However, ‘communication’ may also be achieved by using an electromagnetic carrier which is selected from the optical range of frequencies.An optical fiber communication system is similar in basic concept to any type of communication system.The communication system therefore consists of a transmitter or modulator linked to the information source, the transmission medium,and a receiver or demodulator at the destination point. In electrical communications the information source provides an electrical signal, usually derived from a message signal which is not electrical (e.g. sound), to a transmitter comprising electrical and electronic components which converts the signal into a suitable form for propagation over the trans-mission medium. This is often achieved by modulating a carrier, which, as mentioned previously, may be an electromagnetic wave. The transmission medium can consist of a pair of wires, a coaxial cable or a radio link through free space down which the signal is transmitted to the receiver, where it is transformed into the original electrical information signal (demodulated) before being passed to the destination.However, it must be noted that in any transmission medium the signal is attenuated, or suffers loss, and is subject to degradations due to contamination by random signals and noise, as well as possible distortions imposed by mechanisms within the medium itself. Therefore, in any communication system there is a maximum permitted distance between the transmitter and the receiver beyond which the system effectively ceases to give intelligible communication. For long-haul applications these factors necessitate the installation of repeaters or line amplifiers atintervals,both to remove signal distortion and to increase signal level before transmission is continued down the link.For optical fiber communications system shown in Figure (a) may be considered in slightly greater detail, as given in Figure (b).Fig(a) The general communication system(b)The optical fiber communication systemIn this case the information source provides an electrical signal to a transmitter comprising an electrical stage which drives an optical source to give modulation of the light wave carrier. The optical source which provides the electrical–optical conversion may be either a semiconductor laser or light-emitting diode (LED). The transmission medium consists of an optical fiber cable and the receiver consists of an optical detector which drives a further electrical stage and hence provides demodulation of the optical carrier. Photodiodes (p–n, p–i–n or avalanche) and, in some instances, phototransistors and photoconductors are utilized for the detection of the optical signal and the optical–electrical conversion. Thus there is a requirement for electrical interfacing at either end of the optical link and at present the signal processing is usually performed electrically.The optical carrier may be modulated using either an analog or digital information signal. In the system shown in Figure (b) analog modulation involves the variation of the light emitted from the optical source in a continuous manner. Withdigital modulation,however, discrete changes in the light intensity are obtained (i.e. on–off pulses).Although often simpler to implement, analog modulation with an optical fiber communication system is less efficient, requiring a far higher signal-to-noise ratio at the receiver than digital modulation. Also, the linearity needed for analog modulation is not always provided by semiconductor optical sources, especially at high modulation frequencies. For these reasons,analog optical fiber communication links are generally limited to shorter distances and lower bandwidth operation than digital links.Figure (c) shows a block schematic of a typical digital optical fiber link. Initially, the input digital signal from the information source is suitably encoded for optical transmission. The laser drive circuit directly modulates the intensity of the semiconductor laser with the encoded digital signal. Hence a digital optical signal is launched into the optical fiber cable. The avalanche photodiode (APD) detector is followed by a front-end amplifier equalizer or filter to provide gain as well as linear signal processing and noise bandwidth reduction.Fig(c)A digital optical fiber link using a semiconductor laser source and an avalanche photodiode(APD) detectorFinally, the signal obtained is decoded to give the original digital information. However, at this stage it is instructive to consider the advantages provided by light wave communication via optical fibers in com-parison with other forms of line and radio communication which have brought about the extensive use of such systems in many areas throughout the world.译文光纤通信一般来说把信息从一点传送到另一点就称为通信。
数据通信 毕业论文外文文献英文翻译

郑州轻工业学院本科毕业设计(论文)——英文翻译题目差错控制编码解决加性噪声的仿真学生姓名专业班级通信工程05-2 学号 12院(系)计算机与通信工程学院指导教师完成时间 2009年4月26日英文原文:Data communicationsGildas Avoine and Philippe OechslinEPFL, Lausanne, Switzerlandfgildas.avoine, philippe.oechsling@ep.chAbstractData communications are communications and computer technology resulting from the combination of a new means of communication. To transfer information between the two places must have transmission channel, according to the different transmission media, there is wired data communications and wireless data communications division. But they are through the transmission channel data link terminals and computers, different locations of implementation of the data terminal software and hardware and the sharing of information resources.1 The development of data communicationsThe first phase: the main language, through the human, horsepower, war and other means of transmission of original information.Phase II: Letter Post. (An increase means the dissemination of information)The third stage: printing. (Expand the scope of information dissemination)Phase IV: telegraph, telephone, radio. (Electric to enter the time)Fifth stage: the information age, with the exception of language information, there are data, images, text and so on.1.1 The history of modern data communicationsCommunication as a Telecommunications are from the 19th century, the beginning Year 30. Faraday discovered electromagnetic induction in 1831. Morse invented telegraph in 1837. Maxwell's electromagnetic theory in 1833. Bell invented the telephone in 1876. Marconi invented radio in 1895. Telecom has opened up in the new era. Tube invented in 1906 in order to simulate the development of communications.Sampling theorem of Nyquist criteria In 1928. Shannong theorem in 1948. The invention of the 20th century, thesemiconductor 50, thereby the development of digital communications. During the 20th century, the invention of integrated circuits 60. Made during the 20th century, 40 the concept of geostationary satellites, but can not be achieved. During the 20th century, space technology 50. Implementation in 1963 first synchronized satellite communications. The invention of the 20th century, 60 laser, intended to be used for communications, was not successful. 70 The invention of the 20th century, optical fiber, optical fiber communications can be developed.1.2 Key figuresBell (1847-1922), English, job in London in 1868. In 1871 to work in Boston. In 1873, he was appointed professor at Boston University. In 1875, invented many Telegram Rd. In 1876, invented the telephone. Lot of patents have been life. Yes, a deaf wife.Marconi (1874-1937), Italian people, in 1894, the pilot at his father's estate. 1896, to London. In 1897, the company set up the radio reported. In 1899, the first time the British and French wireless communications. 1916, implementation of short-wave radio communications. 1929, set up a global wireless communications network. Kim won the Nobel Prize. Took part in the Fascist Party.1.3 Classification of Communication SystemsAccording to type of information: Telephone communication system, Cable television system ,Data communication systems.Modulation by sub: Baseband transmission,Modulation transfer.Characteristics of transmission signals in accordance with sub: Analog Communication System ,Digital communication system.Transmission means of communication system: Cable Communications,Twisted pair, coaxial cable and so on.And long-distance telephone communication. Modulation: SSB / FDM. Based on the PCM time division multiple coaxial digital base-band transmission technology. Will gradually replace the coaxial fiber.Microwave relay communications:Comparison of coaxial and easy to set up, low investment, short-cycle. Analog phone microwave communications mainly SSB / FM /FDM modulation, communication capacity of 6,000 road / Channel. Digital microwave using BPSK, QPSK and QAM modulation techniques. The use of 64QAM, 256QAM such as multi-level modulation technique enhance the capacity of microwave communications can be transmitted at 40M Channel 1920 ~ 7680 Telephone Rd PCM figure.Optical Fiber Communication: Optical fiber communication is the use of lasers in optical fiber transmission characteristics of long-distance with a large communication capacity, communication, long distance and strong anti-interference characteristics. Currently used for local, long distance, trunk transmission, and progressive development of fiber-optic communications network users. At present, based on the long-wave lasers and single-mode optical fiber, each fiber road approach more than 10,000 calls, optical fiber communication itself is very strong force. Over the past decades, optical fiber communication technology develops very quickly, and there is a variety of applications, access devices, photoelectric conversion equipment, transmission equipment, switching equipment, network equipment and so on. Fiber-optic communications equipment has photoelectric conversion module and digital signal processing unit is composed of two parts.Satellite communications: Distance communications, transmission capacity, coverage, and not subject to geographical constraints and high reliability. At present, the use of sophisticated techniques Analog modulation, frequency division multiplexing and frequency division multiple access. Digital satellite communication using digital modulation, time division multiple road in time division multiple access.Mobile Communications: GSM, CDMA. Number of key technologies for mobile communications: modulation techniques, error correction coding and digital voice encoding. Data Communication Systems.1.4 Five basic types of data communication system:(1)Off-line data transmission is simply the use of a telephone or similar link to transmit data without involving a computer system.The equipment used at both ends of such a link is not part of a computer, or at least does not immediately make the data available for computer process, that is, the data when sent and / or received are 'off-line'.This type of data communication is relatively cheap and simple.(2)Remote batch is the term used for the way in which data communication technology is used geographically to separate the input and / or output of data from the computer on which they are processed in batch mode.(3)On-line data collection is the method of using communications technology to provide input data to a computer as such input arises-the data are then stored in the computer (say on a magnetic disk) and processed either at predetermined intervals or as required.(4)Enquiry-response systems provide, as the term suggests, the facility for a user to extract information from a computer.The enquiry facility is passive, that is, does not modify the information stored.The interrogation may be simple, for example, 'RETRIEVE THE RECORD FOR EMPLOYEE NUMBER 1234 'or complex.Such systems may use terminals producing hard copy and / or visual displays.(5)Real-time systems are those in which information is made available to and processed by a computer system in a dynamic manner so that either the computer may cause action to be taken to influence events as they occur (for example as in a process control application) or human operators may be influenced by the accurate and up-to-date information stored in the computer, for example as in reservation systems.2 Signal spectrum with bandwidthElectromagnetic data signals are encoded, the signal to be included in the data transmission. Signal in time for the general argument to show the message (or data) as a parameter (amplitude, frequency or phase) as the dependent variable. Signal of their value since the time variables are or not continuous, can be divided into continuous signals and discrete signals; according to whether the values of the dependent variable continuous, can be divided into analog signals and digital Signal.Signals with time-domain and frequency domain performance of the two most basic forms and features. Time-domain signal over time to reflect changing circumstances. Frequency domain characteristics of signals not only contain the same information domain, and the spectrum of signal analysis, can also be a clear understanding of the distribution ofthe signal spectrum and share the bandwidth. In order to receive the signal transmission and receiving equipment on the request channel, Only know the time-domain characteristics of the signal is not enough, it is also necessary to know the distribution of the signal spectrum. Time-domain characteristics of signals to show the letter .It’s changes over time. Because most of the signal energy is concentrated in a relatively narrow band, so most of our energy focused on the signal that Paragraph referred to as the effective band Bandwidth, or bandwidth. Have any signal bandwidth. In general, the greater the bandwidth of the signal using this signal to send data Rate on the higher bandwidth requirements of transmission medium greater. We will introduce the following simple common signal and bandwidth of the spectrum.More or less the voice signal spectrum at 20 Hz ~ 2000 kHz range (below 20 Hz infrasound signals for higher than 2000 KHz. For the ultrasonic signal), but with a much narrower bandwidth of the voice can produce an acceptable return, and the standard voice-frequency signal gnal 0 ~ 4 MHz, so the bandwidth of 4 MHz.As a special example of the monostable pulse infinite bandwidth. As for the binary signal, the bandwidth depends on the generalThe exact shape of the signal waveform, as well as the order of 0,1. The greater the bandwidth of the signal, it more faithfully express the number of sequences.3 The cut-off frequency channel with bandwidthAccording to Fourier series we know that if a signal for all frequency components can be completely the same through the transmission channel to the receiving end, then at the receiving frequency components of these formed by stacking up the signal and send the signal side are exactly the same, That is fully recovered from the receiving end of the send-side signals. But on the real world, there is no channel to no wear and tear through all the Frequency components. If all the Fourier components are equivalent attenuation, then the signal reception while Receive termination at an amplitude up Attenuation, but the distortion did not happen. However, all the transmission channel and equipment for different frequency components of the degree of attenuation is differentSome frequency components almost no attenuation, and attenuation of some frequency components by anumber, that is to say, channel also has a certain amount of vibrationIncrease the frequency characteristics, resulting in output signal distortion. Usually are frequency of 0 Hz to fc-wide channel at Chuan harmonic lost during the attenuation does not occur (or are a very small attenuation constant), whereas in the fc frequency harmonics at all above the transmission cross Decay process a lot, we put the signal in the transmission channel of the amplitude attenuation of a component to the original 0.707(that is, the output signal Reduce by half the power) when the frequency of the corresponding channel known as the cut-off frequency (cut - off frequency).Cut-off frequency transmission medium reflects the inherent physical properties. Other cases, it is because people interested in Line filter is installed to limit the bandwidth used by each user. In some cases, because of the add channel Two-pass filter, which corresponds to two-channel cut-off frequency f1 and f2, they were called up under the cut-off frequency and the cut-off frequency.This difference between the two cut-off frequency f2-f1 is called the channel bandwidth. If the input signal bandwidth is less than the bandwidth of channel, then the entire input signal Frequency components can be adopted by the Department of channels, which the letter Road to be the output of the output waveform will be true yet. However, if the input signal bandwidth greater than the channel bandwidth, the signal of a Frequency components can not be more on the channel, so that the signal output will be sent with the sending end of the signal is somewhat different, that is produced Distortion. In order to ensure the accuracy of data transmission, we must limit the signal bandwidth.4 Data transfer rateChannel maximum data transfer rate Unit time to be able to transfer binary data transfer rate as the median. Improve data transfer rate means that the space occupied by each Reduce the time that the sequence of binary digital pulse will reduce the cycle time, of course, will also reduce the pulse width.The previous section we already know, even if the binary digital pulse signal through a limited bandwidth channel will also be the ideal generated wave Shape distortion, and when must the input signal bandwidth, the smaller channel bandwidth, output waveformdistortion will be greater. Another angle Degree that when a certain channel bandwidth, the greater the bandwidth of the input signal, the output signal the greater the distortion, so when the data transmissionRate to a certain degree (signal bandwidth increases to a certain extent), in the on-channel output signal from the receiver could not have been Distortion of the output signal sent to recover a number of sequences. That is to say, even for an ideal channel, the limited bandwidth limit System of channel data transfer rate.At early 1924, H. Nyquist (Nyquist) to recognize the basic limitations of this existence, and deduced that the noise-free Limited bandwidth channel maximum data transfer rate formula. In 1948, C. Shannon (Shannon) put into the work of Nyquist 1 Step-by-step expansion of the channel by the random noise interference. Here we do not add on to prove to those now seen as the result of a classic.Nyquist proved that any continuous signal f (t) through a noise-free bandwidth for channel B, its output signal as a Time bandwidth of B continuous signal g (t). If you want to output digital signal, it must be the rate of g (t) for interval Sample. 2B samples per second times faster than are meaningless, because the signal bandwidth B is higher than the high-frequency component other than a letter has been Road decay away. If g (t) by V of discrete levels, namely, the likely outcome of each sample for the V level of a discrete one, The biggest channel data rate Rm ax as follows:Rmax = 2Blog 2 V (bit / s)For example, a 3000 Hz noise bandwidth of the channel should not transmit rate of more than 6,000 bits / second binary digital signal.In front of us considered only the ideal noise-free channel. There is noise in the channel, the situation will rapidly deteriorate. Channel Thermal noise with signal power and noise power ratio to measure the signal power and noise power as the signal-to-noise ratio (S ignal - to -- Noise Ratio). If we express the signal power S, and N express the noise power, while signal to noise ratio should be expressed as S / N. However, people Usually do not use the absolute value of signal to noise ratio, but the use of 10 lo g1 0S / N to indicate the units are decibels (d B). For the S / N equal 10 Channel, said its signal to noise ratio for the 1 0 d B; the same token, if the channel S / N equal to one hundred, then the signal to noiseratio for the 2 0 d B; And so on. S hannon noise channel has about the maximum data rate of the conclusions are: The bandwidth for the BH z, signal to noise ratio for the S / N Channel, the maximum data rate Rm ax as follows:Rmax = Blog 2 (1 + S / N) (bits / second)For example, for a bandwidth of 3 kHz, signal to noise ratio of 30 dB for the channel, regardless of their use to quantify the number of levels, nor Fast sampling rate control, the data transfer rate can not be greater than 30,000 bits / second. S h a n n o n the conclusions are derived based on information theory Out for a very wide scope, in order to go beyond this conclusion, like you want to invent perpetual motion machine, as it is almost impossible.It is worth noting that, S hannon conclusions give only a theoretical limit, and in fact, we should be pretty near the limit Difficult.SUMMARYMessage signals are (or data) of a magnetic encoder, the signal contains the message to be transmitted. Signal according to the dependent variable Whether or not a row of values, can be classified into analog signals and digital signals, the corresponding communication can be divided into analog communication and digital communication.Fourier has proven: any signal (either analog or digital signal) are different types of harmonic frequencies Composed of any signal has a corresponding bandwidth. And any transmission channel signal attenuation signals will, therefore, Channel transmission of any signal at all, there is a data transfer rate limitations, and this is Chengkui N yquist (Nyquist) theorem and S hannon (Shannon) theorem tells us to conclusions.Transmission medium of computer networks and communication are the most basic part of it at the cost of the entire computer network in a very Large proportion. In order to improve the utilization of transmission medium, we can use multiplexing. Frequency division multiplexing technology has many Road multiplexing, wave division multiplexing and TDM three that they use on different occasions.Data exchange technologies such as circuit switching, packet switching and packetswitching three have their respective advantages and disadvantages. M odem are at Analog phone line for the computer's binary data transmission equipment. Modem AM modulation methods have, FM, phase modulation and quadrature amplitude modulation, and M odem also supports data compression and error control. The concept of data communications Data communication is based on "data" for business communications systems, data are pre-agreed with a good meaning of numbers, letters or symbols and their combinations.参考文献[1]C.Y.Huang and A.Polydoros,“Two small SNR classification rules for CPM,”inProc.IEEE Milcom,vol.3,San Diego,CA,USA,Oct.1992,pp.1236–1240.[2]“Envelope-based classification schemes for continuous-phase binary Frequency-shift-keyed modulations,”in Pr oc.IEEE Milcom,vol.3,Fort Monmouth,NJ,USA,Oct.1994,pp. 796–800.[3]A.E.El-Mahdy and N.M.Namazi,“Classification of multiple M-ary frequency-shift keying over a rayleigh fading channel,”IEEE m.,vol.50,no.6,pp.967–974,June 2002.[4]Consulative Committee for Space Data Systems(CCSDS),Radio Frequency and Modulation SDS,2001,no.401.[5]E.E.Azzouz and A.K.Nandi,“Procedure for automatic recognition of analogue and digital modulations,”IEE mun,vol.143,no.5,pp.259–266,Oct.1996.[6]A.Puengn im,T.Robert,N.Thomas,and J.Vidal,“Hidden Markov models for digital modulation classification in unknown ISI channels,”in Eusipco2007,Poznan,Poland, September 2007,pp.1882–1885.[7]E.Vassalo and M.Visintin,“Carrier phase synchronization for GMSK signals,”I nt.J.Satell. Commun.,vol.20,no.6,pp.391–415,Nov.2002.[8]J.G.Proakis,Digital Communications.Mc Graw Hill,2001.[9]L.Rabiner,“A tutorial on hidden Markov models and selected applications in speechrecognition,”Proc.IEEE,vol.77,no.2,pp.257–286,1989.英文译文:数据通信Gildas Avoine and Philippe OechslinEPFL, Lausanne, Switzerlandfgildas.avoine, philippe.oechsling@ep.ch摘要数据通信是通信技术和计算机技术相结合而产生的一种新的通信方式。
通信工程外文资料翻译2篇

南京理工大学毕业设计(论文)外文资料翻译学院(系):电子工程与光电技术学院专业:通信工程姓名:学号:外文出处:1. IEEE TRANSACTIONS ONANTENNAS AND PROPAGATION,VOL. 53,NO.9, SEPTEMBER 20052. IEEE TRANSACTIONS ONMICROWA VE THEORY ANDTECHNIQUES, VOL. 53,NO.6,JUNE 2005附件:1.外文资料翻译译文一;2.外文资料翻译译文二;3.外文原文一;4.外文原文二;注:请将该封面与附件装订成册。
附件1:外文资料翻译译文一在单封装超宽波段无线通信中使用LTCC技术的平面天线作者:Chen Ying and Y.P.Zhang摘要:此通讯提出了一个使用低温度共烧陶瓷技术的平面天线用于超宽频带(UWB)无线通信的单封装解决方案。
该天线具有一个通过微带线反馈的椭圆形的辐射体。
该辐射体和微带线拥有与其它UWBR电路相同的接地板。
实验结果表明原型天线已达到110.9%的带宽,从1.34到5.43 dBi的增益,宽模式和频率从3到10.6GHz 的相对恒定的群延迟。
更多地还发现,标准化天线辐射功率谱密度基本符合FCCS 对于室内UWB系统的发射限制。
关键词:低温共烧陶瓷(LTCC),平面天线,超宽频带(UWB)。
一、引言现在,发展用于窄范围高速度的无线通信网络的超宽频带(UWB)无线电是一个研究热点。
超宽带无线电利用一个7.5 GHz的超宽带宽来交换信息。
使用这样大的带宽,在使U超宽带无线电发挥它最大的作用上存在一些问题.其中的一个主要问题是用于移植系统的超宽带天线的设计。
好的超宽带天线应具有较低的回波损耗,全向辐射模式,从3.1至10.6 GHz的超宽带宽下的高效率,同时也应当满足FCCS规定的发射限制。
现在已经有一些超宽带天线,如钻石偶极子和互补缝隙天线。
它们已被证明适用于超宽带无线电[1] - [4]。
通信工程外文文献翻译

毕业设计(论文)的外文文献翻译原始资料的题目/来源:Fundamentals of wireless communications by David Tse翻译后的中文题目:无线通信基础专业通信工程学生王晓宇学号110240318班号1102403指导教师杨洪娟翻译日期2015年6月15日外文文献的中文翻译7.mimo:空间多路复用与信道建模本书我们已经看到多天线在无线通信中的几种不同应用。
在第3章中,多天线用于提供分集增益,增益无线链路的可靠性,并同时研究了接受分解和发射分解,而且,接受天线还能提供功率增益。
在第5章中,我们看到了如果发射机已知信道,那么多采用多幅发射天线通过发射波束成形还可以提供功率增益。
在第6章中,多副发射天线用于生产信道波动,满足机会通信技术的需要,改方案可以解释为机会波束成形,同时也能够提供功率增益。
章以及接下来的几章将研究一种利用多天线的新方法。
我们将会看到在合适的信道衰落条件下,同时采用多幅发射天线和多幅接收天线可以提供用于通信的额外的空间维数并产生自由度增益,利用这些额外的自由度可以将若干数据流在空间上多路复用至MIMO信道中,从而带来容量的增加:采用n副发射天线和接受天线的这类MIMO 信道的容量正比于n。
过去一度认为在基站采用多幅天线的多址接入系统允许若干个用户同时与基站通信,多幅天线可以实现不同用户信号的空间隔离。
20世纪90年代中期,研究人员发现采用多幅发射天线和接收天线的点对点信道也会出现类似的效应,即使当发射天线相距不远时也是如此。
只要散射环境足够丰富,使得接受天线能够将来自不同发射天线的信号分离开,该结论就成立。
我们已经了解到了机会通信技术如何利用信道衰落,本章还会看到信道衰落对通信有益的另一例子。
将机会通信与MIMO技术提供的性能增益的本质进行比较和对比是非常的有远见的。
机会通信技术主要提供功率增益,改功率增益在功率受限系统的低信噪比情况下相当明显,但在宽带受限系统的高信噪比情况下则很不明显。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
编号:毕业设计(论文)外文翻译(译文)学院:信息与通信学院专业:通信工程学生姓名:学号:指导教师单位:信息与通信学院姓名:职称:2014年 2 月9 日Radio network planning process and methods for WCDMAAbstractThis paper describes the system dimensioning and the radio network planning methodology for a third generation WCDMA system. The applicability of each method is demonstrated using examples of likely system scenarios. The challenges ofmodeling the multiservice environment are described and the implications to the system performance simulations are introduced.Keywords: Telecommunication network planning, Mobile radio- communication, Code division multiple access, Wide band transmission, Multiple service network, Dimensioning, Simulator, Static model, Dynamic model, Cellular network.Resume(?)ContentsI.IntroductionII. Initial planning, system dimensioningIII. Detailed planning processIV. Example dimensioning case and verification ofdimensioning with static simulationsV. Comparison of a static to a dynamic network simulatorVI. ConclusionINTRODUCTIONAs the launch of third generation technology approaches, operators are forming strategies for the deployment of their networks. These strategies must be supported by realistic business plans both in terms offuture service demand estimates and the requirement for investment in network infrastructure. Evaluating the requirement for network infrastructure can be achieved using system dimensioning tools capable of assessing both the radio access and the core network components.Having found an attractive business opportunity, system deployment must be preceded by careful network planning. The network planning tool must be capable of accurately modeling the system behaviour when loaded with the expected traffic profile. The third generation cellular systems will offer services well beyond the capabilities of today's networks. The traffic profile, as well as the radio access technology itself form the two most significant challenges when dimensioning and planning a WCDMA based third generation system. The traffic profile describes the mixture of services being used by the population of users. There are also specific system functionalities which must be modelled including fast power control and soft handover. In order to accurately predict the radio coverage the system eatures associated with WCDMA must be taken into account in the network modeling process. Especially the channel characterization, and interference control mechanisms in the case of any CDMA system must be considered. In WCDMA network multiple services co-exist. Different services (voice, data) have different processing gains, Eb/N0 performance and thus different receiver SNR requirements. In addition to those the WCDMA coverage depends on the load characterization, hand over parameterization, and power control effects. In current second generation systems' coverage planning processes the base station sensitivity is constant and the coverage threshold is the same for each base station. In the case of WCDMA the coverage threshold is dependent on the number of users and used bit rates in all cells, thus itis cell and service specific.The WCDMA planning process can be divided into three phases: initial planning (dimensioning), detailed radio network planning and network operation and optimization. Each of these phases requires additional support functions like propagation measurements, Key Performance Indicator definitions etc. In a cellular system where all the air interface connections operate on the same carrier the number of simultaneous users is directly influencing on the receivers' noise floors. Therefore, in the case of VMTS the planning phases cannot be separated into coverage and capacity planning. In the case of the post second-generation systems data services start to play an important role. The variety of services requires the whole planning process to overcome a set of modifications. One of the modifications is related to the quality of service (QoS) requirements. So far it has been adequate to specify the speech coverage and blocking probability only. Also more and more one has to consider the indoor and in-car coverage probabilities. In the case of UMTS the problem is slightly more multidimensional. For each service the QoS targets have to be set and naturally also met. In practice this means that the tightest requirement shall determine the site density. In addition to the coverage probability the packet data QoS criteria are related to the acceptable delays and throughput. Estimation of the delays in the planning phase requires good knowledge of the user behaviour and understanding in the functions of packet scheduler.Common features between second and third generation coverage prediction also exist. In all the systems both of the links have to be analyzed. In current systems the links tend to be in balance whereas in the case of third generation one of the links can be higher loaded than the other, and thus either one of the links could be limiting the cell capacity or coverage. The propagation calculation is basically the same for all standards, with the exception that different propagation models could be used. Another common feature is the interference analysis. In the case of WCDMA this is needed for the loading and sensitivity analysis, in the case of TDMA/FDMA it is essential for frequency allocation. In order to fully utilize the WCDMA capabilities, a thorough understanding of the WCDMA air interface is needed from the physical layer to the network modeling, planning and performance optimization.In this paper the pre-operational phase of the WCDMA planning process, as depicted in Figure 1in detail, is discussed. Section II is concentrating on the initial planning issues. The WCDMA link budget is introduced and it is demonstrated how different services and their QoS requirements impact on the site density estimate. In Section III a static radio network simulator is introduced. The methodology required in the coverage and capacity estimation for WCDMA is described for both uplink and downlink. Topic of Section IV is to demonstrate the accuracy of dimensioning: an example area is dimensioned and the average site distance is determined. The dimensioning result is compared with the outcome of a static network simulation. In Section V the analysis methods of the static simulator are verified. The verification was performed with a dynamic system simulator. The paper is concluded in Section VI.I.INITIAL PLANNING, SYSTEM DIMENSIONINGInitial planning (i.e. system dimensioning) provides the first and most rapid evaluation of the network element count as well as the associated capacity of those elements. This includes both the radio access network as well as the core network. This paper focuses upon the radio access part solely. The target of the initial planning phase is to estimate the required site density and site configurations for the area of interest. Initial planning activities include radio link budget (RLB) and coverage analysis, capacity estimation, and finally, estimation for the amount of base station hardware and sites, radio network controllers (RNC), equipment at different interfaces, and core network elements. The service distribution, traffic density, traffic growth estimates and QoS requirements are essential already in the initial planning phase. In the initial planning phase the quality is taken into account in terms of blocking and coverage probability. RLB calculation is done for each service, and the tightest requirement shall determine the maximum allowed isotropic path loss.A.WCDMA specific items in the radio link budgetIn this section the WCDMA uplink and downlink budgets are discussed. To estimate the maximum range of a cell a RLB calculation is needed. In the RLB the antenna gains, cable losses, diversity gains, fading margins, diversity gains etc.are taken into account. The output of the RLB calculation is the maximum allowed propagation path loss which in return determines the cell range and thus the amount of sites needed. There are a few WCDMA specific items in the link budget if one compares to the current TDMA based radio access system like GSM. These include interference degradation margin, fast fading margin, transmit power increase and soft handover gain.The interference degradation margin is a function of the cell loading. The more loading is allowed in the system, the larger interference margin is needed in uplink, and the smaller is the coverage area. The uplink loading can be derived as follows, for simplicity the derivation is performed with service activity v = 1.To find out the required uplink transmitted and received signal power for a mobile station MSk connected to a particular base station BSn, the basic CDMA Eb/N0 equation is used. The usual, slightly theoretical, assumption is that Ioth, the interference received from the MSs connected to the other cells is directly proportional (proportionality constant i) to Iown, the interference received from the MSs connected to the same BSn as the desired MS. Assume that the MSk uses bit rate Rk, its Eb/N0 requirement is Pk and the CDMA modulation bandwidth is W. Then the received power of the k-th mobile, Pk, at the base station it is connected to, must be at least such that公式(1)k=l ..... Kwhere Kn is the number of MSs connected to BSn, N= NoW = NfkToW is the noise power in the case of an empty cell, Nf is the receiver noise figure, k is the Boltzmann constant and T0 is the absolute temperature.The inequalities in (1) are slightly optimistic because it is assumed that there is no interference from the own signal. In reality this is not exactly true in multipath propagation conditions. Equation (1) is however still chosen to avoid takingmultipath interference into account twice. I.e., the Eb/N0 requirements determined from link level simulations are presented so that N0 means only noise and multipath interference is visible in higher Eb/N0 requirement to a certain BER performance. Solving the inequalities as equalities means solving for the minimum required received power (sensitivity), Pk:公式(2)If the Equations in (2) are summed over the mobile stations connected to BSn then公式公式(3)since/ow, = ~ Pk' If loading is defined as k公式(4)this loading definition can be enhanced to include gain and service activity, v:公式(5)In [ 12] the uplink loading is estimated using equation公式(6)where m is the number of services used. The difference between Equations (5) and (6) are due to the fact that (6) does not include sectorisation gain and thatin the derivation starting from Equation (1) the denominator is Iown-Pk+iIow +N rather than Iown+ iIown +N, which is only the case when Pk <<Iown"The downlink dimensioning is following the same logic as the uplink. For aselected cell range the total base station transmit power ought to be estimated.In this estimation the soft handover connections must be included. If thepower is exceeded either the cell range ought to be limited, or number ofusers in a cell has to be reduced. For downlink the loading (ηDL) isestimated based on公式(7)where LPmi is the link loss from the serving BSm to MSi, LPni is the linkloss from another BSn, to MSi, Pi is the transmit Eb/N0 requirement for theMSi, including the SHO combining gain and the average power raise causedby fast power control, N is the number of base stations, I is the number ofconnections in a sector andαi is the orthogonality factor depending onmultipath conditions (α= 1: fully orthogonal).公式:The term ~" defines the iDL. n =l,n~:m LPn i Direct output of the downlink RLB is the single link power required by a user at the cell edge. The total base station power estimation must take into account multiple communication links with average (LPmi) distance from the serving base station. Furthermore, the multicell environment with orthogonalities a i should be included in the modeling. More on the downlink loading and transmit power estimations can be found in [13]. In the RLB calculation in uplink direction the limiting factor is the mobile station transmit power, in downlink direction the limit is the total base station transmit power. When balancing the uplink and downlink service areas both linksmust be considered.Fast fading margin or power control headroom is another COMA specific item in the RLB. Some margin is needed in the mobile station transmission power for maintaining adequate closed loop fast power control in unfortunate propagation conditions like the cell edge. This is applicable especially for pedestrian users where the Eb/N0 to be maintained is more sensitive to the closed loop power control. The power control headroom has been studied more in [6] and [7].Another impact of the fast power control is the transmit power increase. In the case of a slowly moving mobile station the power control is able to follow the fading channel and the average transmitted power increases. In own cell this is needed to provide adequate quality for the connection and does not cause any harm, since increased transmit power is compensated by the fading channel. For neighbouring cells however this means additional interference. The transmit power increase (TxPowerlnc) is used to reduce the reuse efficiency according to Equation (9). In Equation (4) i should be replaced with term TxPowerlnc×i in case the mobile station transmit power increase is significant.Soft handover gain is discussed already in [3]. Handovers-soft or hard-provide gain against shadow fading by reducing the required fading margin.Due to the fact that the slow fading is partly uncorrelated between cells, and by making handovers the mobile can select a better communication link. Furthermore, soft handover (macro diversity) gives an additional gain against fast fading by reducing the required Eb/N0 relative to a single radio link. The amount of gain is a function of mobile speed, diversity combining algorithm used in the receiver and channel delay profile. More about the SHO gain can be found in Section II C. Receiver sensitivity estimationIn the link budget the BS receiver noise density is estimating the noise level over one WCDMA —carrier. The required receiver SNR contains the processing gain and the loss due to the loading. The loading used is the total loading due to different services on the carrier in question. The required signal power (S) depends on the SNR requirement, receiver noise figure and bandwidth.公式(10)Where公式(11)公式(12)where Nf is the receiver noise figure, Κis Boltzmann constant, To is the absolute temperature and ηis the loading. In some cases the basic noise/interference level is further corrected with the man made noise term.A.Shadowing margin and soft hand over gain estimationThe next step is to estimate the maximum cell range and cell coverage area in different environments/regions. The RLB is estimating the maximum allowed isotropic path loss, from that value a slow fading margin, related to the coverage probability, has to be subtracted. When estimating the coverage probability the propagation model exponent and the standard deviation for the log-normal fading must be set. If the indoor case is considered the indoor loss is from 15dB to 18dBand the standard deviation for log-normal fading margin calculation is set to 10-12dB.In the case of outdoor coverage typical standard deviation value is 7 to 8dB. Typical propagation constants range from 2.5 to 4. Traditionally the area coverage probability used in the RLB is for single cell case [1]. The required probability is 90 % to 95 % and typically this leads to 7-8dB fading margin, depending on the propagation constant and standard deviation of the log-normal fading. The Equation (13) estimates the area coverage probability for single cell case: 公式(13)Pr is the received level at cell edge, n is the propagation constant, x0 is the average signal strength threshold andσis the standard deviation of the field strength.In real WCDMA cellular networks the coverage areas of cells overlap and the mobile station is able to connect to more than just one serving cell. If more than one cell can be detected the location probability increases and is higher than determined for a single isolated cell. Analysis performed in [2] indicates that if the area location probability is reduced from 96% to 90% the number of base stations is reduced by 38 %,This number indicates that the concept of multiserver location probability should be carefully considered. In reality the signals from two base stations are not completely uncorrelated, and thus the soft handover gain is slightly less than estimated in [2]. In [3] the theory of the multiserver case with correlated signals is introduced:公式(14)where Pout is the outage at the cell edge, γSHOis the fading margin in the caseof soft handover, σis the standard deviation of the field strength and for 50 % correlation a = b = 1/21/2. With the theory presented for example in [1] this probability at the cell edge can be converted to the area probability. In the WCDMA link budget the SHO gain is needed. The gain consists of two parts: combining gain against fast fading and gain against slow fading. The gain against slow fading is dominating and it is specified as:公式(15)If we assume 95% area probability, n = 3.5 and the standard deviation is 7dB the gain will be 7.3dB-4dB=3.3dB. If the standard deviation is larger and the probability requirement higher the gain will be more.B.Cell range and cell coverage area estimationOnce the maximum allowed propagation loss in a cell is known, it is easy to apply any known propagation model for the cell range estimation. The propagation model should be chosen so that it optimum describes the propagation conditions in the area. The restrictions of the model are related to the distance from the base station, the base station effective antenna height, the mobile antenna height and the frequency. One typical example for macro cellular environment is Okumura-Hata. Equation (16) presents an example Okumura-Hata path loss model for an urban macro cell with base station antenna height of 25m, mobile antenna height of 1.5m and carrier frequency of 1950 MHz [4].公式(16)After choosing the cell range the coverage area can be calculated. The coverage area for one cell in hexagonal configuration can be estimated with:公式(17)TABLE I. -Example of a WCDMA RLB.Exemple d'un bilan de liaison radio WCDMA.Where S is the coverage area, r is the maximum cell range and K is a constant, depending on the network topology. The number of sectors is typically from 1 to 3.In the case of WCDMA reasonable values are up to 6 sectors. In the case of 6 sectors the estimation of the cell coverage area becomes problematic,since a six-sectored site does not necessary resemble a hexagon. A proposal for the cell area calculation at this stage is that the equation for the omni case is used also in the case of 6 sectors and the larger area is due to a higher antenna gain. The more sectors are used the more careful soft handover overhead has to be analysed to provide an accurate estimate. InTable II some of the K-values are listed.TABLE II. --K-values for the site area calculation. Valeurs du param~tre K pour le calcul d'une zone de couverture autour d'un siteC.Capacity and coverage analysis in the initial planning phaseOnce the site coverage area is known the site configurations in terms of channel elements, sectors and carriers, and site density (cell range) has to be selected so that the supported traffic density can fulfil the requirements. An example dimensioning case can be seen in Section IV. The WCDMA RLB is slightly more complex than the TDMA one. The cell range depends on the number of simultaneous users (number of channels/users in terms of interference margin, see Equation (6)). Thus the coverage and capacity are connected and already in the very beginning the operator should have knowledge and vision of the subscriber distribution and growth since it has a direct impact on the coverage. Finding the correct configuration for the network so that the traffic requirements are met and the network cost minimised is not a simple task. The number of carriers, number of sectors, loading, number of users and the cell range all have an impact on the result.III. DETAILED PLANNING PROCESSA.Introduction to a static radio network planning simulatorIn this study the simulator first introduced in [9] was used. It is of static nature and needs as inputs a digital map, the network layout and the traffic distribution in form of a discrete user map. Each of the users can have different terminal speed and uses a different service (bit rate, activity factor, which both can be different ’for uplink and downlink). Therefore each mobile station gets assigned an individual Eb/N0 requirement imported from link level simulations. The simulator itself consists of basically three parts-initialisation, combined uplink and downlink analysis and post processing phase. Following the initialisation part, round after round in the main part of the tool, both the uplink and downlink for all mobile stations are analysed and after the iterations have fulfilled certain convergence criteria, in the final step, the results of the uplink and downlink analyses are post processed for various graphical and numerical outputs. On top of these results, for selected areas (which also can consist of the whole network) area coverage analyses for UL and OL dedicated channel as well as for common channels (common pilot CPICH, broadcast control channel 8CCH, forward access and paging channel FACH and PCH on the P-CCPCH and S-CCPCH) can be performed. In case a second carder is present in the network area, either used by the same operator or by another operator adjacent channel interference (ACI ) can be taken into account. Only in case the second carrier is assigned to the same operator, load can beshared according different strategies between the carriers (IF-HO).B. Initialisation PhaseIn the global initialisation phase the network configuration is read in from parameter files for base stations, mobile stations and the network area. Some system parameters are set and propagation calculations are performed. In the following step, requirements coming from the link level simulations are assigned to base stations and mobile stations. After some initialisation tasks for the iterative analysis-setting default transmit power sand network performance -the actual simulation can start.bined uplink and downlink analysisC1. Uplink iteration stepThe target in the uplink iteration is to allocate the mobile stations' transmit powers so that the (interference+noise)-levels and thus the base station sensitivity values converge. The average transmit powers of the mobile stations to each base station are estimated so that they fulfil the base stations Eb/N0 requirements. The average mobile stations'transmit powers are based on the sensitivity level of the base station, service (data rate) and speed of the mobile station and the link losses to the base stations. They are corrected by taking into account theactivity factor, the soft handover gains and average power raise due to fast transmit power control. The impact of the uplink loading on the base station sensitivity (noise rise) is taken into account by adjusting it with (l-η). ηcan be defined by Equation (5).After the average transmit powers of the mobiles have been estimated they are compared to the maximum value allowed and mobiles exceeding this limit are trying IF-HO if allowed or are put to outage. Now the interference analysis can be performed again and the new loading and base station sensitivities are calculated until their changes are smaller than specified thresholds. Also in case the uplink loading of a cell exceeds specified limits, mobile stations are moved to another carrier if allowed (IF-HO). Otherwise they are put to outage.C2. Downlink iteration stepSimilarly to the uplink the goal of the downlink iteration is to assign the base station transmit powers for each link (including SHO connections) a mobile station is having until all mobile stations receive their signal with the required carrier-to-interference-ratio, C/I, defined by Equation (18) 公式(18)is the received Eb/N0 requirement of the MS depending on where EbNoMSterminal speed and service. The actual received (C/I)of MS m is calculatedmusing MRC according Equation (19) by summing the C/I values of all links k, k = 1... K mobile station m is having.公式(19)where Pis the total transmit power of the base station to which link k is kis the link loss from the cell k to the mobile station m, αestablished, Lpk mk is the cell specific orthogonality factor, Pis the power allocated to the linkkmis the other cell interference from base station k to mobile station m, Ioth,mand Nm is the background and receiver noise of MS m.The initial transmit powers are adjusted iteratively according the difference between the achieved and the targeted C/I value until convergence is achieved. The process requires iteration, since the C/I at each mobile station is dependent on all the powers allocated to the other mobile stations and it is not known a priori whether a link can be established or not. In case either certain link power limits or the total transmit power of a base station is exceeded mobile stations are performing IF-HO if allowed or taken out randomly from the network.In a further step for each mobile station it is checked whether the received Ec/Io value is above a user defined threshold so that the mobile station canreliably measure the base station and synchronise to it. Also here if the threshold given is exceeded, the mobile station tries IF-HO or is put to outage. A flow chart for the detailed iteration steps can be seen from Figure 3.C3. Adjacent channel interference calculationsThe adjacent channel interference influence due to the two possible carriers - either from own network or from a competitive operator's network in the same area-is taken into account by filtering this interference with a channel separation dependent filter. In both directions UL and DL the adjacent carrier filtering is implemented as a two-fold process. In OL, one filter for the mobile stations has been implemented indicating its out of band radiation (acpFilterUL). This filter is used to indicate how much power the mobile station is leaking into the other carders receiving band (Adjacent Channel Leakage Ratio, ACZLR ) For the base station in the uplink another filter (aciFilterUL) has been implemented. This filter is indicating the selectivity of the base station's receiver in multicarrier situation, i.e. how big portion of the adjacent channel power isreceived by the base station as adjacent channel interference power (Adjacent Channel Protection, ACP). Also this filter setting depends on the carrier separation. The adjacent channel interference situation in UL is depicted in Figure 4. In the simulations these two filters are combined to a single filter by Equation (20):公式(20)) is taken into account when calculating Adjacent channel interference (IACIthe UL load according to Equation (21).公式(21)Also in the downlink similar type of filtering is introduced as in the uplink. One filter for the base stations has been implemented indicating the out of band radiation of the base station (acp Filter DL). This filter is used to indicate how much power the base station is leaking into the other carriers receiving band (ACLR). The filter setting depends on the separation between the carriers. For the mobile station another filter has been implemented (aci Filter DL). This filter is indicating the selectivity of the mobile station's receiver in multicarrier situation, i.e. how much of the adjacent channel interference power is received by the mobile station (ACP). Also this filter setting depends on the carrier separation. The adjacent channel interference situation in DL is depicted in Figure 5. In the simulations these two filters are combined to a single filter by Equation (22):公式(22)Adjacent channel interference (I) in DL is taken into account whenACI。