首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 109 毫秒
1.
Ross.  AH Gilh.  KS 《电信科学》1996,12(3):6-17
本文主要讨论数字移动通信中扩频码分多址技术,阐明了CDMA体制的优越之外,分析了CDMA的关键技术,全面介绍了CDMA系统设计的基本原则和IS-95-A空中接口标准的含义。  相似文献   

2.
码分多址数字蜂窝移动通信技术讲座──第七讲CDMA蜂窝移动通信系统的发展趋势朱云龙,吴彦群前6讲已将CDMA的基本概念,CDMA用于蜂窝移动通信的优越性、关键技术和组网设计等作了简要的介绍,本讲将简单地介绍CDMA的发展过程、现状、存在问题和发展趋势...  相似文献   

3.
简要介绍了码分多址(CDMA)数字蜂窝移动通信技术的优点和我国蜂窝移动通信的现状;针对我国蜂窝移动通信扩容的难点,提出可采用900MHz CDMA数字蜂窝移动通信兼容系统进行扩容。  相似文献   

4.
本文介绍数字蜂房移动通信中TDMA体制从GSM应用到ADC、PDC的技术进步及当前的研究趋向。  相似文献   

5.
主要讨论了SS—CDMA在蜂窝移动通信中的信道容量问题,阐述了CDMA体制的优越性,分析了CDMA的关键技术,并在此基础上对第三代CDMA系统作了初步的研究工作。  相似文献   

6.
本文简述了CDMA的技术优势,分别介绍了窄带码分多址(N-CDMA)移动通信系统和宽带码多址(W-CDMA)技术的发展情况,最后,提出应加强对W-CDMA技术上和研究并积极参与到第三代移动通信体制标准的制定工作中去  相似文献   

7.
M30MSC/VLR     
M30MSC/VLR随着全球移动通信的发展以及CDMA移动通信技术的成熟和投入商用,CDMA逐渐成为移动通信和个人通信(PCS)的实现方式.CDMA以其容量大,话音质量高、保密性好、成本低等优点,在数字蜂窝系统中将逐渐占据主导地位.MB30系统是80...  相似文献   

8.
码分多址(CDMA)蜂窝移动通信(2)吴家滨(广东省移动通信局)5CDMA数字蜂窝移动通信系统的容量在FDMA或TDMA蜂窝移动通信系统中,容量的计算是根据C/I的要求,求出频率重复使用次数K,再根据总的能使用的带宽B;和每个信道或等效信道的带宽Be...  相似文献   

9.
本文首先介绍CDMA、TDMA和FDMA这三种移动通信多址方式的差异,并介绍目前在数字蜂窝移动通信中,使用直接序列扩谱(DS-SS)CDMA的基本原理,在上述基础上简单介绍目前市场推出的窄带CDMA蜂窝移动电话系统,并探讨其容量、分析功率控制对容量的关系,最后,介绍CDMA蜂窝移动电话的自然属性,它对增加容量,提高通信服务质量等方面的一些好处。  相似文献   

10.
GSM和QUALCOMM CDMA系统信号设计方案的分析和比较   总被引:2,自引:0,他引:2  
TDMA和CDMA方式是当前数字移动通信中的两大主注,本文以其各自的典型系统(即泛欧的数字蜂窝移动通信系统GSM和Qualcomm公司的CDMA系统)为例,分别对它们的信号设计方案进行了分析和比较,并从中反映出了两个系统各自的特点和共同之处。  相似文献   

11.
We propose a scheme to implement secure digital mobile communications. The scheme can both enable multiple users to hold a secure teleconference and also resolve the problem of allowing a participant to join dynamically or to quit a teleconference already in progress. Essentially, teleconference is a synchronous collaboration session in which participants at remote locations cooperate through wireless communications. Two requirements for the system are: privacy and authentication. Privacy signifies that an eavesdropper cannot intercept conversations of a conference. Authentication ensures that the service is not obtained fraudulently in order to avoid usage charge usage. We present a conference key distribution scheme for digital mobile communications, according to which users can share a common secret key to hold a secure teleconference over a public channel. The participants need not alter their secret information when a participant joins late or quits the conference early  相似文献   

12.
As mobile communications have become so indispensable, every possible effort should be spent to achieve the optimum operating conditions. In addition to the normal impairments associated with wireless communications, in general, the mobile channel suffers from particular limitations that confine the performance of a mobile radio system. Among those impairments are the bandwidth limitation, interference, and multipath fading. With the strong motivation toward portable radio and personal communication systems, power limitation has manifest itself in the picture, and, consequently, nonlinear operation of the amplifiers involved (hence, the channel) will have to be dealt with. Constant envelope modulation schemes have been used in digital mobile radio systems recently installed. The Gaussian minimum shift keying (GMSK) is employed in the Global System for Mobile (GSM) communications installed in Europe, while in the North American IS-54 system, the modulation scheme used is the π/4-DQPSK. As the quest for higher data rates has kept on increasing, multilevel modulation schemes have been proposed with their performance over nonlinear channels having been overlooked. The paper provides a comparative study, based on simulation, and tests the performance of various modulation schemes operating over a wide variety of mobile radio channel conditions. The effective throughput of all systems is also considered  相似文献   

13.
A secure and efficient conference scheme for mobile communications   总被引:3,自引:0,他引:3  
A growing application area in mobile communications is mobile teleconferencing, in which a group of mobile users collaborate in an interactive procedure, such as a board meeting, a task force, a scientific discussion, or even a virtual classroom. Wireless communications transmit conversations via radio, making them more susceptible to eavesdropping and unauthorized access than are conversations carried via wires. Therefore, it is crucial to ensure confidentiality and authenticity in mobile teleconferencing. When deploying secure services in mobile teleconferences, it has to be taken into account that the mobility of users is usually built on portable devices with limited computing capability. A secure conference scheme for mobile communications needs to be executed efficiently on portable devices. We propose a new secure and efficient conference scheme for mobile communications. Based on a modular square root technique, this scheme is secure against eavesdropping, impersonating, and tracking attacks and allows a participant to join or quit a mobile teleconference dynamically. In addition, the scheme is particularly efficient on the mobile user's portable device because the mobile user needs to perform only single modular multiplication plus encryptions and decryptions of a secret key cryptosystem.  相似文献   

14.
Digital signal processors in cellular radio communications   总被引:3,自引:0,他引:3  
Contemporary wireless communications are based on digital communications technologies. The recent commercial success of mobile cellular communications has been enabled in part by successful designs of digital signal processors with appropriate on-chip memories and specialized accelerators for digital transceiver operations. This article provides an overview of fixed point digital signal processors and ways in which they are used in cellular communications. Directions for future wireless-focused DSP technology developments are discussed  相似文献   

15.
本文介绍了移动通信发展的概况以及在现有模拟与数字移动网上进行数据通信的原理。同时还介绍了专用的无线分组交换数据网如CDPD和Data TAC。  相似文献   

16.
A growing application area in mobile communications is mobile teleconference in which a group of mobile users collaborate in an interactive procedure, such as a board meeting, a task force, a scientific discussion, or even a virtual classroom. Wireless communications transmit conversations via radio, making them more susceptible to eavesdropping and unauthorized access than are conversations carried via wires. Therefore, it is crucial to ensure confidentiality and authenticity in a mobile teleconference. The authors design a new secure conference scheme for mobile communications. Based on a modular square root technique, this scheme is secure against eavesdropping, impersonating, and tracking attacks and allows a participant to join or quit a mobile teleconference dynamically.  相似文献   

17.
This paper proposes a frame synchronization method for an adaptive array antenna (AAA) used in digital mobile communications. The proposed scheme, which is based on the maximum likelihood estimation (MLE), calculates error signals by subtracting a training sequence convolved with an estimated channel impulse response from the AAA outputs and searches for the timing that minimizes the mean squared errors. Because the proposed scheme can effectively exploit delayed paths of the desired signal, it can improve the synchronization performance on frequency-selective fading channels. Computer simulations show that the proposed scheme can operate properly even in interference-rich fading environments and that it can significantly improve the synchronization performance.  相似文献   

18.
李承恕 《电信科学》1996,12(1):30-36
本文扼要探讨了移动通信发展现状,个人通信发展趋势和信息高速公路发展展望,并指出数字移动通信,个人通信和全球信息高速公路是当前及今后10年无线通信发展的主流。  相似文献   

19.
van Wyk  D.J. Linde  L.P. 《Electronics letters》1995,31(24):2077-2078
A novel multidimensional double complex correlation frame synchronisation strategy is proposed for the four-dimensional quadrature-quadrature phase-shift keying modulation technique. The synchronisation method is intended for application in high speed spectrally efficient burst mode mobile digital communications  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号