- 博客(0)
- 资源 (5)
空空如也
Spread Spectrum and CDMA -- Valery P. Ipatov
1 Spread spectrum signals and systems 1
1.1 Basic definition 1
1.2 Historical sketch 5
2 Classical reception problems and signal design 7
2.1 Gaussian channel, general reception problem and optimal decision rules 7
2.2 Binary data transmission (deterministic signals) 11
2.3 M-ary data transmission: deterministic signals 17
2.4 Complex envelope of a bandpass signal 23
2.5 M-ary data transmission: noncoherent signals 26
2.6 Trade-off between orthogonal-coding gain and bandwidth 28
2.7 Examples of orthogonal signal sets 31
2.7.1 Time-shift coding 31
2.7.2 Frequency-shift coding 33
2.7.3 Spread spectrum orthogonal coding 33
2.8 Signal parameter estimation 37
2.8.1 Problem statement and estimation rule 37
2.8.2 Estimation accuracy 39
2.9 Amplitude estimation 41
2.10 Phase estimation 43
2.11 Autocorrelation function and matched filter response 43
2.12 Estimation of the bandpass signal time delay 46
2.12.1 Estimation algorithm 46
2.12.2 Estimation accuracy 48
2.13 Estimation of carrier frequency 53
2.14 Simultaneous estimation of time delay and frequency 55
2.15 Signal resolution 58
2.16 Summary 61
Problems 62
Matlab-based problems 68
3 Merits of spread spectrum 77
3.1 Jamming immunity 77
3.1.1 Narrowband jammer 78
3.1.2 Barrage jammer 80
3.2 Low probability of detection 82
3.3 Signal structure secrecy 87
3.4 Electromagnetic compatibility 88
3.5 Propagation effects in wireless systems 89
3.5.1 Free-space propagation 90
3.5.2 Shadowing 90
3.5.3 Multipath fading 91
3.5.4 Performance analysis 95
3.6 Diversity 98
3.6.1 Combining modes 98
3.6.2 Arranging diversity branches 100
3.7 Multipath diversity and RAKE receiver 102
Problems 106
Matlab-based problems 109
4 Multiuser environment: code division multiple access 115
4.1 Multiuser systems and the multiple access problem 115
4.2 Frequency division multiple access 117
4.3 Time division multiple access 118
4.4 Synchronous code division multiple access 119
4.5 Asynchronous CDMA 121
4.6 Asynchronous CDMA in the cellular networks 12
2009-10-14
An Introduction to Cryptography - 2nd Edition - 2007
RICHARD A. MOLLIN
1 Mathematical Basics 1
1.1 Divisibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Primes, Primality Testing, and Induction . . . . . . . . . . 6
1.3 An Introduction to Congruences . . . . . . . . . . . . . . . . 17
1.4 Euler, Fermat, and Wilson . . . . . . . . . . . . . . . . . . . 35
1.5 Primitive Roots . . . . . . . . . . . . . . . . . . . . . . . . . . 44
1.6 The Index Calculus and Power Residues . . . . . . . . . . 51
1.7 Legendre, Jacobi, & Quadratic Reciprocity . . . . . . . . . 58
1.8 Complexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
2 Cryptographic Basics 79
2.1 Definitions and Illustrations . . . . . . . . . . . . . . . . . . 79
2.2 Classic Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
2.3 Stream Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . 109
2.4 LFSRs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
2.5 Modes of Operation . . . . . . . . . . . . . . . . . . . . . . . . 122
2.6 Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
3 DES and AES 131
3.1 S-DES and DES . . . . . . . . . . . . . . . . . . . . . . . . . . 131
3.2 AES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
4 Public-Key Cryptography 157
4.1 The Ideas Behind PKC . . . . . . . . . . . . . . . . . . . . . 157
4.2 Digital Envelopes and PKCs . . . . . . . . . . . . . . . . . . 165
4.3 RSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
4.4 ElGamal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
4.5 DSA — The DSS . . . . . . . . . . . . . . . . . . . . . . . . . 187
5 Primality Testing 189
5.1 True Primality Tests . . . . . . . . . . . . . . . . . . . . . . . 189
5.2 Probabilistic Primality Tests . . . . . . . . . . . . . . . . . . 198
vii
© 2007 by Taylor & Francis Group, LLC
viii
5.3 Recognizing Primes . . . . . . . . . . . . . . . . . . . . . . . . 204
6 Factoring 207
6.1 Classical Factorization Methods . . . . . . . . . . . . . . . . 207
6.2 The Continued Fraction Algorithm . . . . . . . . . . . . . . 211
6.3 Pollard’s Algorithms . . . . . . . . . . . . . . . . . . . . . . . 214
6.4 The Quadratic Sieve . . . . . . . . . . . . . . . . . . . . . . . 217
6.5 The Elliptic Curve Method (ECM) . . . . . . . . . . . . . . 220
7 Electronic Mail and Internet Security 223
7.1 History of the Internet and the WWW . . . . . . . . . . . 223
7.2 Pretty Good Privacy (PGP) . . . . . . . . . . . . . . . . . . 227
7.3 Protocol Layers and SSL . . . . . . . . . . . . . . . . . . . . . 241
7.4 Internetworking and Security — Firewalls . . . . . . . . . 250
7.5 Client–Server Model and Cookies . . . . . . . . . . . . . . . 259
8 Leading-Edge Applications 263
8.1 Login and Network Security . . . . . . . . . . . . . . . . . . 263
8.2 Viruses and Other Infections . . . . . . . . . . . . . . . . . . 273
8.3 Smart Cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
8.4 Biometrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
Appendix A: Fundamental Facts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
Appendix B: Computer Arithmetic . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Appendix C: The Rijndael S-Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Appendix D: Knapsack Ciphers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .337
Appendix E: Silver-Pohlig-Hellman Algorithm . . . . . . . . . . . . . . 344
Appendix F: SHA-1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .346
Appendix G: Radix-64 Encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
Appendix H: Quantum Cryptography. . . . . . . . . . . . . . . . . . . . . . . .352
Solutions to Odd-Numbered Exercises . . . . . . . . . . . . . . . . . . . . . . . 358
Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
About the Author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
2009-10-13
Wideband TDD - WCDMA for unpaired spectrum - Chitrapu P. (2004)
1 Introduction 1
1.1 WTDD Technology 2
1.2 Other Advanced Radio Interface Technologies 2
1.3 3GPP Standards for Wideband TDD (WTDD) 3
1.4 Overview of the Book 4
2 System Architecture and Services 5
2.1 UMTS System Architecture 5
2.1.1 CN Architecture 5
2.1.2 UTRAN Architecture 7
2.1.3 Radio Interface 10
2.2 Protocol Architecture 10
2.2.1 UMTS Protocol Layers 11
2.2.2 Protocol Models for UTRAN Interfaces 12
2.3 UMTS Services 15
2.3.1 Traffic Classes and Quality of Service 16
2.3.2 UMTS QoS Attributes 18
References 19
3 Fundamentals of TDD-WCDMA 21
3.1 TDD Aspects 21
3.2 TDMA Aspects 22
3.2.1 Data Burst Structure 22
3.2.2 Midamble Generation 23
3.2.3 Synchronization Bursts 25
3.3 WCDMA Aspects 26
3.3.1 Spreading and Modulation 26
3.4 Modem Transmitter 28
3.4.1 Error Protection 29
3.4.2 Interleaving and Rate Matching 31
3.4.3 WCDMA and TDMA Processing 32
3.4.4 Pulse Shaping and Up Conversion 32
3.4.5 RF Characteristics 32
3.4.6 Transmit Diversity 34
3.5 Mobile Radio Channel Aspects 36
3.5.1 Mean Pathloss and Shadow Characteristics 36
3.5.2 Multipath Characteristics 37
3.6 Modem Receiver Aspects 38
3.6.1 RF Characteristics 38
3.6.2 Detection of Direct Sequence Spread Spectrum Signals 39
3.6.3 Rake Receiver Structure 39
3.6.4 Joint Detection Receiver Structure 41
References 42
4 TDD Radio Interface 43
4.1 Overview 43
4.2 Protocol Architecture 45
4.3 Layer 1 Structure 48
4.3.1 Physical Channels 48
4.3.2 Transport Channels 55
4.4 Layer 1 Communication 59
4.4.1 Layer 1 Processing 59
4.4.2 Inter-Layer Communication 61
4.5 Layer 2 Structure 63
4.5.1 Logical Channels 63
4.5.2 Radio Bearers 64
4.6 Layer 2 Communication 65
4.6.1 Medium Access Control (MAC) Protocol 65
4.6.2 Radio Link Control (RLC) Protocol 71
4.6.3 Packet Data Protocols (PDCP) 77
4.6.4 BMC Protocol 79
4.7 Layer 3 Communication 81
4.7.1 Radio Resource Control (RRC) Protocol 81
Appendix 4.1 System Information Blocks 85
References 86
5 TDD Procedures 89
5.1 Introductory Concepts 89
5.1.1 RRC Modes and States 89
5.1.2 DRX/Sleep Mode 90
5.2 Overview of Procedures 93
5.3 PLMN/Cell Selection/Reselection Procedure 95
5.4 Random Access Procedure 97
5.5 Paging Procedures 99
5.5.1 Paging Types 99
5.5.2 Paging Process at Layer 2 and Above 100
5.5.3 Broadcast Paging 101
5.5.4 Paging at Layer 1 103
5.5.5 Dedicated Paging Example 104
5.6 RRC Connection Procedures 104
5.6.1 Procedure between Network Elements 104
5.6.2 Procedure between Protocol Entities 105
5.7 RAB/RB Establishment Procedures 106
5.8 RAB/RB Management Procedures 110
5.9 Power Control Procedures 114
5.10 UE Timing Advance Procedures 119
5.10.1 Initial Timing Advance 120
5.10.2 Steady-State Timing Advance 121
5.11 Measurements Procedures 122
5.11.1 Common UE Measurements 123
5.11.2 Specific UE Measurements 123
5.11.3 Measurement Types 123
5.11.4 Measurement Reporting Methods 125
5.11.5 Node B Measurements 127
5.12 Cell/URA Update Procedures 127
5.13 Handover Procedures 130
5.14 NAS Signaling Message Transmission Procedures 135
5.15 Data Transmission Initialization Procedures 136
5.15.1 Inter-Layer Procedure 138
5.16 End-to-End Communication Procedures 139
5.16.1 UE Registration Procedures 139
5.16.2 Authentication and Security 142
5.16.3 CS Call Control Procedures 143
5.16.4 PS Session Control Procedures 146
5.16.5 CS Call and PS Session Data Procedures 147
References 149
6 Receiver Signal Processing 151
6.1 Receiver Architecture 151
6.2 Channel Estimation 154
6.2.1 Post-processing 157
6.3 Data Detection 157
6.3.1 Introduction 157
6.3.2 Multi-User Detection 159
6.3.3 Zero-Forcing Block Linear Equalizer (ZF-BLE) JD 160
6.3.4 Minimum Mean Square Error Block Linear Equalizer
(MMSE-BLE) Joint Detector 161
6.3.5 Zero Forcing Block Linear Equalizer with Decision Feedback
(DF ZF-BLE) Joint Detector 161
6.3.6 Minimum Mean Square Error Block Linear Equalizer with
Decision Feedback (DF MMSE-BLE) Joint Detector 162
6.3.7 Approximate Cholesky/LDLH Factorization 162
6.3.8 Parallel Interference Cancellation (PIC) Detectors 165
6.3.9 Successive Interference Cancellers (SIC) Detectors 165
6.3.10 Implementation and Performance 166
6.4 Cell Search 169
6.4.1 Basic Initial Cell Search Algorithm 170
6.4.2 Basic Targeted Cell Search Algorithm 170
6.4.3 Hierarchical Golay Correlator 171
6.4.4 Auxiliary Algorithms 172
References 173
7 Radio Resource Management 175
7.1 Introduction 175
7.2 RRM Functions 177
7.2.1 Cell Initialization 177
7.2.2 Admission Control 178
7.2.3 Radio Bearer Establishment 179
7.2.4 Radio Bearer Maintenance 186
7.2.5 Cell Maintenance 190
7.3 Physical Layer RRM Algorithms 196
7.3.1 Basic Concepts 196
7.3.2 Dynamic Channel Assignment (DCA) Algorithms 200
References 207
8 Deployment Scenarios 209
8.1 Types of Deployment 209
8.2 Capacity and Coverage 210
8.2.1 Network Capacity 210
8.2.2 Analysis 211
8.2.3 TDD Capacity: Over-the-Rooftop Deployment 214
8.3 Coexistence 216
8.3.1 BS to BS Interference 217
8.3.2 UE to UE Interference 224
References 228
9 Alternate Technologies 229
9.1 WTDD-WLAN Comparison 229
9.1.1 System and Service Attributes of WLANs 229
9.1.2 Comparison of TDD and WLAN System and Service Attributes 231
9.1.3 Performance of 802.11b WLAN Systems 233
9.1.4 Comparison of UMTS TDD and 802.11b WLAN System
Performance 235
9.1.5 Deployment Considerations for UMTS TDD and WLAN
Systems 237
9.2 WTDD – TDSCDMA Comparison 237
9.2.1 TD-SCDMA in the Standards Evolution 237
9.2.2 Comparison 237
9.2.3 TD-SCDMA Potential Deployment Scenarios 239
References 240
Index 241
2009-10-13
3G CDMA2000 Wireless system engineering - Yang S. (2004)
Preface xiii
Acknowledgments xvii
CHAPTER 1
Introduction to 3G CDMA 1
1.1 Third Generation Systems 1
1.2 Protocol Architecture 2
1.3 Other Elements of Protocol Architecture 3
1.4 Spreading Rate 1 and Spreading Rate 3 5
1.5 Differences Between IS-2000 and IS-95 7
1.5.1 Signaling 7
1.5.2 Transmission 8
1.5.3 Concluding Remarks 8
References 9
CHAPTER 2
Physical Layer: Forward Link 11
2.1 Introduction 11
2.2 Radio Configurations 14
2.3 Signaling Channels 15
2.3.1 Forward Dedicated Control Channel (F-DCCH) 15
2.3.2 Quick Paging Chanel (F-QPCH) 16
2.3.3 Forward Common Control Channel (F-CCCH) 19
2.3.4 Broadcast Control Channel (F-BCCH) 20
2.3.5 Common Assignment Channel (F-CACH) 21
2.3.6 Common Power Control Channel (F-CPCCH) 22
2.3.7 Pilot Channels 24
2.4 User Channels 26
2.4.1 Forward Fundamental Channel (F-FCH) 26
2.4.2 Forward Supplemental Channel (F-SCH) 27
2.5 Channel Structure 31
2.6 Modulation 32
2.7 Capacity Gain: Forward Link 34
References 35
Selected Bibliography 35
vii
CHAPTER 3
Physical Layer: Reverse Link 37
3.1 Introduction 37
3.2 Radio Configurations 39
3.3 Signaling Channels 40
3.3.1 Reverse Dedicated Control Channel (R-DCCH) 40
3.3.2 Reverse Common Control Channel (R-CCCH) 41
3.3.3 Enhanced Access Channel (R-EACH) 42
3.3.4 Reverse Pilot Channel (R-PICH) 45
3.4 User Channels 49
3.4.1 Reverse Fundamental Channel (R-FCH) 50
3.4.2 Reverse Supplemental Channel (R-SCH) 50
3.5 Channel Structure 50
3.6 Modulation 51
3.7 Capacity Gain: Reverse Link 52
References 53
Selected Bibliography 53
CHAPTER 4
Medium Access Control 55
4.1 Introduction 55
4.2 Primitives 55
4.3 Multiplex Sublayers 57
4.4 Radio Link Protocol (RLP) 60
4.4.1 Overview of Layer 2 Protocols 60
4.4.2 llustration of the RLP 61
4.4.3 Concluding Remarks 62
4.5 Signaling Radio Burst Protocol (SRBP) 63
4.6 System Access 64
4.6.1 Basic Access Mode 65
4.6.2 Reservation Access Mode 65
4.6.3 Power Controlled Access Mode 67
4.6.4 Designated Access Mode 68
References 68
CHAPTER 5
Signaling Link Access Control 71
5.1 Introduction 71
5.2 LAC Sublayers 71
5.2.1 Authentication and Addressing Sublayers 71
5.2.2 ARQ Sublayer 73
5.2.3 Utility Sublayer 73
5.2.4 Segmentation and Reassembly Sublayer 74
5.3 Sublayer Processing 74
5.3.1 Common Signaling: Forward Link 74
5.3.2 Common Signaling: Reverse Link 76
5.3.3 Dedicated Signaling: Forward Link 77
viii Contents
5.3.4 Dedicated Signaling: Reverse Link 80
5.4 Interaction of Layer and Sublayers 80
5.4.1 Transmit Side 81
5.4.2 Receive Side 82
References 83
CHAPTER 6
Signaling: Upper Layers 85
6.1 Overview 85
6.2 State Transitions: Call Processing 87
6.2.1 Initialization State 88
6.2.2 Mobile Station Idle State 89
6.2.3 System Access State 91
6.2.4 Mobile Station Control on the Traffic Channel State 94
6.3 Mode Transitions: Packet Data Transmission 96
6.3.1 Active Mode 96
6.3.2 Control Hold Mode 96
6.3.3 Dormant Mode 96
6.3.4 Transitions 97
6.4 Channel Setup 97
6.4.1 Example 1: Base Station-Originated Voice Call 98
6.4.2 Example 2: Mobile Station-Originated Voice Call 99
6.4.3 Example 3: Mobile Station-Originated Packet Data Call 100
6.4.4 Example 4: Supplemental Channel Request During a
6.4.4 Packet Data Call 101
6.4.5 Concluding Remarks 104
References 104
CHAPTER 7
Power Control 107
7.1 Introduction 107
7.2 Power Control of the Forward Link 107
7.2.1 Inner Loop and Outer Loop 107
7.2.2 Power Control of Multiple Forward Traffic Channels 110
7.3 Power Control of the Reverse Link: Open Loop 113
7.3.1 Power Control of Multiple Reverse Channels 113
7.3.2 Summary 116
7.4 Power Control of the Reverse Link: Closed Loop 117
7.4.1 Inner Loop and Outer Loop 118
7.4.2 Power Control of Multiple Reverse Channels 119
References 121
CHAPTER 8
Handoff 123
8.1 Introduction 123
8.2 Soft Handoff 123
8.2.1 Active Set 124
Contents ix
8.2.2 Candidate Set 127
8.2.3 Neighbor Set 128
8.2.4 Remaining Set 129
8.2.5 Set Transitions 129
8.2.6 Example: Soft Handoff 129
8.3 Idle Handoff 133
8.3.1 Active Set 133
8.3.2 Neighbor Set 134
8.3.3 Private Neighbor Set 134
8.3.4 Remaining Set 134
8.3.5 Idle Handoff Process 134
8.4 Access Entry Handoff 134
8.5 Access Handoff 135
8.5.1 Active Set 136
8.5.2 Neighbor Set 136
8.5.3 Remaining Set 136
8.5.4 Access Handoff Process 136
8.6 Access Probe Handoff 138
8.7 Concluding Remarks 139
References 140
CHAPTER 9
System Performance 141
9.1 Introduction 141
9.2 Channel Supervision 141
9.2.1 Forward Link: Traffic Channel 141
9.2.2 Forward Link: Common Channel 142
9.2.3 Reverse Link 142
9.3 Code Management 142
9.3.1 Generation of Walsh Codes 143
9.3.2 Assignment of Walsh Codes: Forward Link 144
9.3.3 Quasi-Orthogonal Functions 147
9.3.4 Assignment of Walsh Codes: Reverse Link 147
9.4 Turbo Codes 150
9.5 Transmit Diversity 152
9.5.1 Orthogonal Transmit Diversity 152
9.5.2 Space Time Spreading 154
9.5.3 Concluding Remarks 156
References 156
Selected Bibliography 157
CHAPTER 10
System Design: Coverage 159
10.1 Introduction 159
10.2 Forward Pilot Channel 161
10.3 Forward Fundamental Channel 162
10.4 Forward Supplemental Channel 163
x Contents
10.5 Upper Bounds of Interference: Forward Link 165
10.6 Reverse Fundamental Channel 165
10.7 Reverse Supplemental Channel 167
10.8 Upper Bounds of Interference: Reverse Link 168
10.9 Eb/N0 and Receiver Sensitivity 169
10.10 Concluding Remarks 169
Reference 170
CHAPTER 11
System Design: Capacity 171
11.1 Introduction 171
11.2 Mathematical Definitions 171
11.2.1 Received Signal Power 171
11.2.2 Loading Factor 173
11.3 Reverse Link 174
11.3.1 Capacity 174
11.3.2 Capacity Improvements in IS-2000 176
11.3.3 Capacity Improvements in a System 177
11.4 Forward Link 178
11.4.1 Capacity 179
11.4.2 Capacity Improvements in IS-2000 182
11.4.3 Capacity Improvements in a System 183
References 185
CHAPTER 12
Network Architecture 187
12.1 Introduction 187
12.2 2G Network 187
12.2.1 Network Elements 187
12.2.2 Protocols 189
12.3 3G Network 189
12.3.1 Network Elements 190
12.3.2 Protocols 191
12.4 Simple IP 192
12.5 Mobile IP 193
12.6 Concluding Remarks 196
References 197
CHAPTER 13
1xEV-DO Network 199
13.1 Introduction 199
13.2 1xEV-DO Network 201
13.3 Protocol Architecture 202
13.3.1 Application Layer 204
13.3.2 Stream Layer 205
13.3.3 Session Layer 205
13.3.4 Connection Layer 206
Contents xi
13.3.5 Security Layer 210
13.3.6 Concluding Remarks 210
References 211
CHAPTER 14
1xEV-DO Radio Interface: Forward Link 213
14.1 Introduction 213
14.2 MAC Layer 213
14.2.1 Forward Traffic Channel MAC Protocol 214
14.2.2 Control Channel MAC Protocol 215
14.3 Physical Layer 215
14.3.1 Pilot Channel 215
14.3.2 Forward Traffic Channel/Control Channel 216
14.3.3 MAC Channel 219
14.3.4 Time Division Multiplexing 221
14.3.5 Modulation 225
14.4 Concluding Remarks 226
References 226
Selected Bibliography 226
CHAPTER 15
1xEV-DO Radio Interface: Reverse Link 227
15.1 Introduction 227
15.2 MAC Layer 227
15.2.1 Reverse Traffic Channel MAC Protocol 227
15.2.2 Access Channel MAC Protocol 228
15.3 Physical Layer 229
15.3.1 Reverse Traffic Channel 231
15.3.2 Access Channel 236
15.3.3 Modulation 238
15.4 Reverse Power Control 239
15.4.1 Open-Loop Power Control 239
15.4.2 Closed-Loop Power Control 240
References 240
Selected Bibliography 240
About the Author 241
Index 243
2009-10-13
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人