• 博客(0)
  • 资源 (5)

空空如也

Spread Spectrum and CDMA -- Valery P. Ipatov

1 Spread spectrum signals and systems 1 1.1 Basic definition 1 1.2 Historical sketch 5 2 Classical reception problems and signal design 7 2.1 Gaussian channel, general reception problem and optimal decision rules 7 2.2 Binary data transmission (deterministic signals) 11 2.3 M-ary data transmission: deterministic signals 17 2.4 Complex envelope of a bandpass signal 23 2.5 M-ary data transmission: noncoherent signals 26 2.6 Trade-off between orthogonal-coding gain and bandwidth 28 2.7 Examples of orthogonal signal sets 31 2.7.1 Time-shift coding 31 2.7.2 Frequency-shift coding 33 2.7.3 Spread spectrum orthogonal coding 33 2.8 Signal parameter estimation 37 2.8.1 Problem statement and estimation rule 37 2.8.2 Estimation accuracy 39 2.9 Amplitude estimation 41 2.10 Phase estimation 43 2.11 Autocorrelation function and matched filter response 43 2.12 Estimation of the bandpass signal time delay 46 2.12.1 Estimation algorithm 46 2.12.2 Estimation accuracy 48 2.13 Estimation of carrier frequency 53 2.14 Simultaneous estimation of time delay and frequency 55 2.15 Signal resolution 58 2.16 Summary 61 Problems 62 Matlab-based problems 68 3 Merits of spread spectrum 77 3.1 Jamming immunity 77 3.1.1 Narrowband jammer 78 3.1.2 Barrage jammer 80 3.2 Low probability of detection 82 3.3 Signal structure secrecy 87 3.4 Electromagnetic compatibility 88 3.5 Propagation effects in wireless systems 89 3.5.1 Free-space propagation 90 3.5.2 Shadowing 90 3.5.3 Multipath fading 91 3.5.4 Performance analysis 95 3.6 Diversity 98 3.6.1 Combining modes 98 3.6.2 Arranging diversity branches 100 3.7 Multipath diversity and RAKE receiver 102 Problems 106 Matlab-based problems 109 4 Multiuser environment: code division multiple access 115 4.1 Multiuser systems and the multiple access problem 115 4.2 Frequency division multiple access 117 4.3 Time division multiple access 118 4.4 Synchronous code division multiple access 119 4.5 Asynchronous CDMA 121 4.6 Asynchronous CDMA in the cellular networks 12

2009-10-14

An Introduction to Cryptography - 2nd Edition - 2007

RICHARD A. MOLLIN 1 Mathematical Basics 1 1.1 Divisibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Primes, Primality Testing, and Induction . . . . . . . . . . 6 1.3 An Introduction to Congruences . . . . . . . . . . . . . . . . 17 1.4 Euler, Fermat, and Wilson . . . . . . . . . . . . . . . . . . . 35 1.5 Primitive Roots . . . . . . . . . . . . . . . . . . . . . . . . . . 44 1.6 The Index Calculus and Power Residues . . . . . . . . . . 51 1.7 Legendre, Jacobi, & Quadratic Reciprocity . . . . . . . . . 58 1.8 Complexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 2 Cryptographic Basics 79 2.1 Definitions and Illustrations . . . . . . . . . . . . . . . . . . 79 2.2 Classic Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 2.3 Stream Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . 109 2.4 LFSRs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 2.5 Modes of Operation . . . . . . . . . . . . . . . . . . . . . . . . 122 2.6 Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 3 DES and AES 131 3.1 S-DES and DES . . . . . . . . . . . . . . . . . . . . . . . . . . 131 3.2 AES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 4 Public-Key Cryptography 157 4.1 The Ideas Behind PKC . . . . . . . . . . . . . . . . . . . . . 157 4.2 Digital Envelopes and PKCs . . . . . . . . . . . . . . . . . . 165 4.3 RSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 4.4 ElGamal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 4.5 DSA — The DSS . . . . . . . . . . . . . . . . . . . . . . . . . 187 5 Primality Testing 189 5.1 True Primality Tests . . . . . . . . . . . . . . . . . . . . . . . 189 5.2 Probabilistic Primality Tests . . . . . . . . . . . . . . . . . . 198 vii © 2007 by Taylor & Francis Group, LLC viii 5.3 Recognizing Primes . . . . . . . . . . . . . . . . . . . . . . . . 204 6 Factoring 207 6.1 Classical Factorization Methods . . . . . . . . . . . . . . . . 207 6.2 The Continued Fraction Algorithm . . . . . . . . . . . . . . 211 6.3 Pollard’s Algorithms . . . . . . . . . . . . . . . . . . . . . . . 214 6.4 The Quadratic Sieve . . . . . . . . . . . . . . . . . . . . . . . 217 6.5 The Elliptic Curve Method (ECM) . . . . . . . . . . . . . . 220 7 Electronic Mail and Internet Security 223 7.1 History of the Internet and the WWW . . . . . . . . . . . 223 7.2 Pretty Good Privacy (PGP) . . . . . . . . . . . . . . . . . . 227 7.3 Protocol Layers and SSL . . . . . . . . . . . . . . . . . . . . . 241 7.4 Internetworking and Security — Firewalls . . . . . . . . . 250 7.5 Client–Server Model and Cookies . . . . . . . . . . . . . . . 259 8 Leading-Edge Applications 263 8.1 Login and Network Security . . . . . . . . . . . . . . . . . . 263 8.2 Viruses and Other Infections . . . . . . . . . . . . . . . . . . 273 8.3 Smart Cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286 8.4 Biometrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 Appendix A: Fundamental Facts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 Appendix B: Computer Arithmetic . . . . . . . . . . . . . . . . . . . . . . . . . . 325 Appendix C: The Rijndael S-Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335 Appendix D: Knapsack Ciphers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .337 Appendix E: Silver-Pohlig-Hellman Algorithm . . . . . . . . . . . . . . 344 Appendix F: SHA-1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .346 Appendix G: Radix-64 Encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350 Appendix H: Quantum Cryptography. . . . . . . . . . . . . . . . . . . . . . . .352 Solutions to Odd-Numbered Exercises . . . . . . . . . . . . . . . . . . . . . . . 358 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377 About the Author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413

2009-10-13

Wideband TDD - WCDMA for unpaired spectrum - Chitrapu P. (2004)

1 Introduction 1 1.1 WTDD Technology 2 1.2 Other Advanced Radio Interface Technologies 2 1.3 3GPP Standards for Wideband TDD (WTDD) 3 1.4 Overview of the Book 4 2 System Architecture and Services 5 2.1 UMTS System Architecture 5 2.1.1 CN Architecture 5 2.1.2 UTRAN Architecture 7 2.1.3 Radio Interface 10 2.2 Protocol Architecture 10 2.2.1 UMTS Protocol Layers 11 2.2.2 Protocol Models for UTRAN Interfaces 12 2.3 UMTS Services 15 2.3.1 Traffic Classes and Quality of Service 16 2.3.2 UMTS QoS Attributes 18 References 19 3 Fundamentals of TDD-WCDMA 21 3.1 TDD Aspects 21 3.2 TDMA Aspects 22 3.2.1 Data Burst Structure 22 3.2.2 Midamble Generation 23 3.2.3 Synchronization Bursts 25 3.3 WCDMA Aspects 26 3.3.1 Spreading and Modulation 26 3.4 Modem Transmitter 28 3.4.1 Error Protection 29 3.4.2 Interleaving and Rate Matching 31 3.4.3 WCDMA and TDMA Processing 32 3.4.4 Pulse Shaping and Up Conversion 32 3.4.5 RF Characteristics 32 3.4.6 Transmit Diversity 34 3.5 Mobile Radio Channel Aspects 36 3.5.1 Mean Pathloss and Shadow Characteristics 36 3.5.2 Multipath Characteristics 37 3.6 Modem Receiver Aspects 38 3.6.1 RF Characteristics 38 3.6.2 Detection of Direct Sequence Spread Spectrum Signals 39 3.6.3 Rake Receiver Structure 39 3.6.4 Joint Detection Receiver Structure 41 References 42 4 TDD Radio Interface 43 4.1 Overview 43 4.2 Protocol Architecture 45 4.3 Layer 1 Structure 48 4.3.1 Physical Channels 48 4.3.2 Transport Channels 55 4.4 Layer 1 Communication 59 4.4.1 Layer 1 Processing 59 4.4.2 Inter-Layer Communication 61 4.5 Layer 2 Structure 63 4.5.1 Logical Channels 63 4.5.2 Radio Bearers 64 4.6 Layer 2 Communication 65 4.6.1 Medium Access Control (MAC) Protocol 65 4.6.2 Radio Link Control (RLC) Protocol 71 4.6.3 Packet Data Protocols (PDCP) 77 4.6.4 BMC Protocol 79 4.7 Layer 3 Communication 81 4.7.1 Radio Resource Control (RRC) Protocol 81 Appendix 4.1 System Information Blocks 85 References 86 5 TDD Procedures 89 5.1 Introductory Concepts 89 5.1.1 RRC Modes and States 89 5.1.2 DRX/Sleep Mode 90 5.2 Overview of Procedures 93 5.3 PLMN/Cell Selection/Reselection Procedure 95 5.4 Random Access Procedure 97 5.5 Paging Procedures 99 5.5.1 Paging Types 99 5.5.2 Paging Process at Layer 2 and Above 100 5.5.3 Broadcast Paging 101 5.5.4 Paging at Layer 1 103 5.5.5 Dedicated Paging Example 104 5.6 RRC Connection Procedures 104 5.6.1 Procedure between Network Elements 104 5.6.2 Procedure between Protocol Entities 105 5.7 RAB/RB Establishment Procedures 106 5.8 RAB/RB Management Procedures 110 5.9 Power Control Procedures 114 5.10 UE Timing Advance Procedures 119 5.10.1 Initial Timing Advance 120 5.10.2 Steady-State Timing Advance 121 5.11 Measurements Procedures 122 5.11.1 Common UE Measurements 123 5.11.2 Specific UE Measurements 123 5.11.3 Measurement Types 123 5.11.4 Measurement Reporting Methods 125 5.11.5 Node B Measurements 127 5.12 Cell/URA Update Procedures 127 5.13 Handover Procedures 130 5.14 NAS Signaling Message Transmission Procedures 135 5.15 Data Transmission Initialization Procedures 136 5.15.1 Inter-Layer Procedure 138 5.16 End-to-End Communication Procedures 139 5.16.1 UE Registration Procedures 139 5.16.2 Authentication and Security 142 5.16.3 CS Call Control Procedures 143 5.16.4 PS Session Control Procedures 146 5.16.5 CS Call and PS Session Data Procedures 147 References 149 6 Receiver Signal Processing 151 6.1 Receiver Architecture 151 6.2 Channel Estimation 154 6.2.1 Post-processing 157 6.3 Data Detection 157 6.3.1 Introduction 157 6.3.2 Multi-User Detection 159 6.3.3 Zero-Forcing Block Linear Equalizer (ZF-BLE) JD 160 6.3.4 Minimum Mean Square Error Block Linear Equalizer (MMSE-BLE) Joint Detector 161 6.3.5 Zero Forcing Block Linear Equalizer with Decision Feedback (DF ZF-BLE) Joint Detector 161 6.3.6 Minimum Mean Square Error Block Linear Equalizer with Decision Feedback (DF MMSE-BLE) Joint Detector 162 6.3.7 Approximate Cholesky/LDLH Factorization 162 6.3.8 Parallel Interference Cancellation (PIC) Detectors 165 6.3.9 Successive Interference Cancellers (SIC) Detectors 165 6.3.10 Implementation and Performance 166 6.4 Cell Search 169 6.4.1 Basic Initial Cell Search Algorithm 170 6.4.2 Basic Targeted Cell Search Algorithm 170 6.4.3 Hierarchical Golay Correlator 171 6.4.4 Auxiliary Algorithms 172 References 173 7 Radio Resource Management 175 7.1 Introduction 175 7.2 RRM Functions 177 7.2.1 Cell Initialization 177 7.2.2 Admission Control 178 7.2.3 Radio Bearer Establishment 179 7.2.4 Radio Bearer Maintenance 186 7.2.5 Cell Maintenance 190 7.3 Physical Layer RRM Algorithms 196 7.3.1 Basic Concepts 196 7.3.2 Dynamic Channel Assignment (DCA) Algorithms 200 References 207 8 Deployment Scenarios 209 8.1 Types of Deployment 209 8.2 Capacity and Coverage 210 8.2.1 Network Capacity 210 8.2.2 Analysis 211 8.2.3 TDD Capacity: Over-the-Rooftop Deployment 214 8.3 Coexistence 216 8.3.1 BS to BS Interference 217 8.3.2 UE to UE Interference 224 References 228 9 Alternate Technologies 229 9.1 WTDD-WLAN Comparison 229 9.1.1 System and Service Attributes of WLANs 229 9.1.2 Comparison of TDD and WLAN System and Service Attributes 231 9.1.3 Performance of 802.11b WLAN Systems 233 9.1.4 Comparison of UMTS TDD and 802.11b WLAN System Performance 235 9.1.5 Deployment Considerations for UMTS TDD and WLAN Systems 237 9.2 WTDD – TDSCDMA Comparison 237 9.2.1 TD-SCDMA in the Standards Evolution 237 9.2.2 Comparison 237 9.2.3 TD-SCDMA Potential Deployment Scenarios 239 References 240 Index 241

2009-10-13

3G CDMA2000 Wireless system engineering - Yang S. (2004)

Preface xiii Acknowledgments xvii CHAPTER 1 Introduction to 3G CDMA 1 1.1 Third Generation Systems 1 1.2 Protocol Architecture 2 1.3 Other Elements of Protocol Architecture 3 1.4 Spreading Rate 1 and Spreading Rate 3 5 1.5 Differences Between IS-2000 and IS-95 7 1.5.1 Signaling 7 1.5.2 Transmission 8 1.5.3 Concluding Remarks 8 References 9 CHAPTER 2 Physical Layer: Forward Link 11 2.1 Introduction 11 2.2 Radio Configurations 14 2.3 Signaling Channels 15 2.3.1 Forward Dedicated Control Channel (F-DCCH) 15 2.3.2 Quick Paging Chanel (F-QPCH) 16 2.3.3 Forward Common Control Channel (F-CCCH) 19 2.3.4 Broadcast Control Channel (F-BCCH) 20 2.3.5 Common Assignment Channel (F-CACH) 21 2.3.6 Common Power Control Channel (F-CPCCH) 22 2.3.7 Pilot Channels 24 2.4 User Channels 26 2.4.1 Forward Fundamental Channel (F-FCH) 26 2.4.2 Forward Supplemental Channel (F-SCH) 27 2.5 Channel Structure 31 2.6 Modulation 32 2.7 Capacity Gain: Forward Link 34 References 35 Selected Bibliography 35 vii CHAPTER 3 Physical Layer: Reverse Link 37 3.1 Introduction 37 3.2 Radio Configurations 39 3.3 Signaling Channels 40 3.3.1 Reverse Dedicated Control Channel (R-DCCH) 40 3.3.2 Reverse Common Control Channel (R-CCCH) 41 3.3.3 Enhanced Access Channel (R-EACH) 42 3.3.4 Reverse Pilot Channel (R-PICH) 45 3.4 User Channels 49 3.4.1 Reverse Fundamental Channel (R-FCH) 50 3.4.2 Reverse Supplemental Channel (R-SCH) 50 3.5 Channel Structure 50 3.6 Modulation 51 3.7 Capacity Gain: Reverse Link 52 References 53 Selected Bibliography 53 CHAPTER 4 Medium Access Control 55 4.1 Introduction 55 4.2 Primitives 55 4.3 Multiplex Sublayers 57 4.4 Radio Link Protocol (RLP) 60 4.4.1 Overview of Layer 2 Protocols 60 4.4.2 llustration of the RLP 61 4.4.3 Concluding Remarks 62 4.5 Signaling Radio Burst Protocol (SRBP) 63 4.6 System Access 64 4.6.1 Basic Access Mode 65 4.6.2 Reservation Access Mode 65 4.6.3 Power Controlled Access Mode 67 4.6.4 Designated Access Mode 68 References 68 CHAPTER 5 Signaling Link Access Control 71 5.1 Introduction 71 5.2 LAC Sublayers 71 5.2.1 Authentication and Addressing Sublayers 71 5.2.2 ARQ Sublayer 73 5.2.3 Utility Sublayer 73 5.2.4 Segmentation and Reassembly Sublayer 74 5.3 Sublayer Processing 74 5.3.1 Common Signaling: Forward Link 74 5.3.2 Common Signaling: Reverse Link 76 5.3.3 Dedicated Signaling: Forward Link 77 viii Contents 5.3.4 Dedicated Signaling: Reverse Link 80 5.4 Interaction of Layer and Sublayers 80 5.4.1 Transmit Side 81 5.4.2 Receive Side 82 References 83 CHAPTER 6 Signaling: Upper Layers 85 6.1 Overview 85 6.2 State Transitions: Call Processing 87 6.2.1 Initialization State 88 6.2.2 Mobile Station Idle State 89 6.2.3 System Access State 91 6.2.4 Mobile Station Control on the Traffic Channel State 94 6.3 Mode Transitions: Packet Data Transmission 96 6.3.1 Active Mode 96 6.3.2 Control Hold Mode 96 6.3.3 Dormant Mode 96 6.3.4 Transitions 97 6.4 Channel Setup 97 6.4.1 Example 1: Base Station-Originated Voice Call 98 6.4.2 Example 2: Mobile Station-Originated Voice Call 99 6.4.3 Example 3: Mobile Station-Originated Packet Data Call 100 6.4.4 Example 4: Supplemental Channel Request During a 6.4.4 Packet Data Call 101 6.4.5 Concluding Remarks 104 References 104 CHAPTER 7 Power Control 107 7.1 Introduction 107 7.2 Power Control of the Forward Link 107 7.2.1 Inner Loop and Outer Loop 107 7.2.2 Power Control of Multiple Forward Traffic Channels 110 7.3 Power Control of the Reverse Link: Open Loop 113 7.3.1 Power Control of Multiple Reverse Channels 113 7.3.2 Summary 116 7.4 Power Control of the Reverse Link: Closed Loop 117 7.4.1 Inner Loop and Outer Loop 118 7.4.2 Power Control of Multiple Reverse Channels 119 References 121 CHAPTER 8 Handoff 123 8.1 Introduction 123 8.2 Soft Handoff 123 8.2.1 Active Set 124 Contents ix 8.2.2 Candidate Set 127 8.2.3 Neighbor Set 128 8.2.4 Remaining Set 129 8.2.5 Set Transitions 129 8.2.6 Example: Soft Handoff 129 8.3 Idle Handoff 133 8.3.1 Active Set 133 8.3.2 Neighbor Set 134 8.3.3 Private Neighbor Set 134 8.3.4 Remaining Set 134 8.3.5 Idle Handoff Process 134 8.4 Access Entry Handoff 134 8.5 Access Handoff 135 8.5.1 Active Set 136 8.5.2 Neighbor Set 136 8.5.3 Remaining Set 136 8.5.4 Access Handoff Process 136 8.6 Access Probe Handoff 138 8.7 Concluding Remarks 139 References 140 CHAPTER 9 System Performance 141 9.1 Introduction 141 9.2 Channel Supervision 141 9.2.1 Forward Link: Traffic Channel 141 9.2.2 Forward Link: Common Channel 142 9.2.3 Reverse Link 142 9.3 Code Management 142 9.3.1 Generation of Walsh Codes 143 9.3.2 Assignment of Walsh Codes: Forward Link 144 9.3.3 Quasi-Orthogonal Functions 147 9.3.4 Assignment of Walsh Codes: Reverse Link 147 9.4 Turbo Codes 150 9.5 Transmit Diversity 152 9.5.1 Orthogonal Transmit Diversity 152 9.5.2 Space Time Spreading 154 9.5.3 Concluding Remarks 156 References 156 Selected Bibliography 157 CHAPTER 10 System Design: Coverage 159 10.1 Introduction 159 10.2 Forward Pilot Channel 161 10.3 Forward Fundamental Channel 162 10.4 Forward Supplemental Channel 163 x Contents 10.5 Upper Bounds of Interference: Forward Link 165 10.6 Reverse Fundamental Channel 165 10.7 Reverse Supplemental Channel 167 10.8 Upper Bounds of Interference: Reverse Link 168 10.9 Eb/N0 and Receiver Sensitivity 169 10.10 Concluding Remarks 169 Reference 170 CHAPTER 11 System Design: Capacity 171 11.1 Introduction 171 11.2 Mathematical Definitions 171 11.2.1 Received Signal Power 171 11.2.2 Loading Factor 173 11.3 Reverse Link 174 11.3.1 Capacity 174 11.3.2 Capacity Improvements in IS-2000 176 11.3.3 Capacity Improvements in a System 177 11.4 Forward Link 178 11.4.1 Capacity 179 11.4.2 Capacity Improvements in IS-2000 182 11.4.3 Capacity Improvements in a System 183 References 185 CHAPTER 12 Network Architecture 187 12.1 Introduction 187 12.2 2G Network 187 12.2.1 Network Elements 187 12.2.2 Protocols 189 12.3 3G Network 189 12.3.1 Network Elements 190 12.3.2 Protocols 191 12.4 Simple IP 192 12.5 Mobile IP 193 12.6 Concluding Remarks 196 References 197 CHAPTER 13 1xEV-DO Network 199 13.1 Introduction 199 13.2 1xEV-DO Network 201 13.3 Protocol Architecture 202 13.3.1 Application Layer 204 13.3.2 Stream Layer 205 13.3.3 Session Layer 205 13.3.4 Connection Layer 206 Contents xi 13.3.5 Security Layer 210 13.3.6 Concluding Remarks 210 References 211 CHAPTER 14 1xEV-DO Radio Interface: Forward Link 213 14.1 Introduction 213 14.2 MAC Layer 213 14.2.1 Forward Traffic Channel MAC Protocol 214 14.2.2 Control Channel MAC Protocol 215 14.3 Physical Layer 215 14.3.1 Pilot Channel 215 14.3.2 Forward Traffic Channel/Control Channel 216 14.3.3 MAC Channel 219 14.3.4 Time Division Multiplexing 221 14.3.5 Modulation 225 14.4 Concluding Remarks 226 References 226 Selected Bibliography 226 CHAPTER 15 1xEV-DO Radio Interface: Reverse Link 227 15.1 Introduction 227 15.2 MAC Layer 227 15.2.1 Reverse Traffic Channel MAC Protocol 227 15.2.2 Access Channel MAC Protocol 228 15.3 Physical Layer 229 15.3.1 Reverse Traffic Channel 231 15.3.2 Access Channel 236 15.3.3 Modulation 238 15.4 Reverse Power Control 239 15.4.1 Open-Loop Power Control 239 15.4.2 Closed-Loop Power Control 240 References 240 Selected Bibliography 240 About the Author 241 Index 243

2009-10-13

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除