无线通信基础双语教学ppt课件.ppt
《无线通信基础双语教学ppt课件.ppt》由会员分享,可在线阅读,更多相关《无线通信基础双语教学ppt课件.ppt(63页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、6 6、Channel assignment strategiesChannel assignment strategies4 4、Call blocking and delay at the cell-siteCall blocking and delay at the cell-site3 3、CochannelCochannel and adjacent channel interference and adjacent channel interference5 5、Other mechanisms for capacity increaseOther mechanisms for c
2、apacity increase1 1、Frequency reuse and mobility managementFrequency reuse and mobility management2 2、Cell cluster conceptCell cluster conceptl Fixed Channel Assignment(FCA)l Dynamic Channel Assignment(DCA)In FCA,each cell is allocated a predetermined set of voice channels.Any call attempt within th
3、e cell can only be served by the unused channels in the particular cellA borrowing option may be considered,if all of a cells own channels are already occupied and the neighboring cell has spare channels.In DCA,voice channels are not allocated to different cells on a permanent basis.Each time a call
4、 request is made,the serving base station requests a channel from the MSC.Multiple access is a signal transmission situation in which two or more users wish to simultane-ously communicate using the same propagation channel.Shared MultipleAccess ChannelNode 4Node 3Node 2Node 1Node NEach node is attac
5、hed to a transmitter/receiver which communicates via a channel shared by other nodesTransmission from any node is received by other nodesShared MultipleAccess ChannelNode 4Node 3Node 2Node 1Node N5.2 5.2 Random AccessRandom Access5.1 5.1 Multiple access in a radio cellMultiple access in a radio cell
6、5.35.3 Conflict-free multiple access technologies Conflict-free multiple access technologies 5.45.4 Spectral efficiency Spectral efficiencyl Orthogonality between two signalsl Conflict-Free Mulitiple Accessl Random Access and VariantsThe transmission in the downlink can be heard by each and every us
7、er in the cell,this mode of transmission is referred to as broadcastingThe transmission in the uplink to the base station is many-to-one,and is referred as multiple accssTransmission in the uplink have the following attributes:a.Multiple mobile users want to access the common resource(base station)r
8、andomlyb.If the transmissions from two or more users arrive at the base station receiver at the same time,there will be destructive interference,unless the multiple arriving signals are mutually orthogonalOrthogonality between two signals xi(t)and xj(t)means that their inner product over the signali
9、ng interval 0 T vanishes.That isThe key element in multiple access is to make the transmitted signals from the different users orthogo-nal to each otherlMultiple access protocolsSolving multiple access issuesDifferent types:Channel Partitioning(FDMA TDMA CDMA)Taking Turns(Taking Ring)Random Access(A
10、loha CSMA)Orthogonality can be mechanized usinga.Space division multiple access(SDMA)b.Frequency division multiple access(FDMA)c.Time division multiple access(TDMA)d.Code division multiple access(CDMA)In non-conflict-free multiple access,transmissions by the different users are either uncoordinated
11、or are only partially coordinatedUncoordinated-random accessIn random access,a user contends for usage of the same resource,independent of any other users.For this reason,random access is also referred to as contention accessl Alohal CSMAl In certain situations,it may be advantageous to employ a non
12、-conflict-free multiple access scheme.l In conflict-free multiple access system,random access is often used to gain the initial access to the systemsRandom access was used by a research group from the University of Hawaii in the late 1960s and early 1970s,which was called AlohalPure AlohalSlotted Al
13、ohaThe time interval required to transmit one packet is called a slot1.Transmit whenever you have data to send2.Listen to the broadcastBecause broadcast is fed back,the sending host can always find out if its packet was destroyed just by listening to the downward broadcast one round-trip time after
14、sending the packet3.If the packet was destroyed,wait a random amount of time and send it againThe waiting time must be random to prevent the same packets from colliding over and over again2Node 2 Packet32Time1Node 1 PacketRetransmissionRetransmissionCollision mechanism in ALOHAWaiting a random time3
15、Node 3 PacketThe maximum interval over which two packets can overlap and destroy each other is called the vulnerable periodCollision1.If a host has a packet to transmit,it waits until the beginning of the next slot before sending2.Listen to the broadcast and check if the packet was destroyed3.If the
16、re was a collision,wait a random number of slots and try to send again12&32TimeCollisionRetransmissionRetransmission3SlotNode 1 PacketNodes 2&3 PacketsCollision mechanism in slotted ALOHALet S be the throughput,defined as the successfully transmitted traffic load,and G be the total offered channel t
17、raffic load.The probability of successful transmission is defined as:Psuccess=Pno other packet transmission occurs within a vulnerable periodAssuming that traffic generated for transmission obeys a Possion distribution,thenP no other packet transmission occurs=e GWhere is the vulnerable period.Thus,
18、we have:andCombining the two equations,we have the through-put equation of the Aloha systems given by:The maximum value of S occurs when the slope of the throughput curve is 0,and we getSlotted AlohaAloha0.3680.184GSThe delay experienced by a packet in the system is measured from the instant of the
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 无线通信 基础 双语 教学 ppt 课件
限制150内