• 沒有找到結果。

CDMA 2000 系統數據流量分析 廖聰隆、李金椿

N/A
N/A
Protected

Academic year: 2022

Share "CDMA 2000 系統數據流量分析 廖聰隆、李金椿"

Copied!
2
0
0

加載中.... (立即查看全文)

全文

(1)

CDMA 2000 系統數據流量分析 廖聰隆、李金椿

E-mail: 9303432@mail.dyu.edu.tw

摘 要

本文係針對第三代無線通訊系統cdma 2000部署於蜂巢網路時,探對其通訊效能與數據流量,特別考慮控制通道對於傳輸 效能的影響以及RAKE接收機對於多重路徑衰變的改善效果。所考慮的無線傳輸通道包括路徑損失、遮蔽效應及多重路徑 衰變。我們以通訊中斷率做為通訊效能的標準,分析cdma 2000在多細胞環境下的通訊效能,並藉由2%的中斷率為標準,

評估系統容量與數據流量。其次,我們分析了控制通道對通訊容量與數據流量的影響。最後,我們分析多重路徑衰變 與RAKE接收機對數據流量的影響。我們發現在不考慮DCCH的情況下,各種傳輸率所造成的數據流量幾乎相同。而在考 慮DCCH時,由於DCCH也會產生細胞間干擾,各種傳輸率所能提供的數據流量則不儘相同,在低速率傳輸時的數據流量 愈低,高速率傳輸時的數據流量愈高。至於,多重路徑傳播的影響,在未使用RAKE接收機情況下,由於通道區隔碼無法 完全正交的關係,使得細胞內干擾增加,造成R0~R6通訊容量分別降低了50%、51%、52%、53%、57%、66%、100%。

當使用RAKE接收機與最大比例組合(Maximum Ratio Combining)時,組合後的訊號干擾比獲得改善,使得通訊容量增加 了47%、43%、47%、38%、42%、66%、100%。

關鍵詞 : 第三代無線通訊系統 ; 通訊容量 ; 多重載波 ; 中斷率 ; 話務負載 目錄

封面內頁 簽名頁 授權書...iii 中文摘要...vi 英文摘要...v 誌 謝...vi 目錄...vii 圖目錄...ix 表目錄...xii 第一章 緒論...1 第二章 行動通訊系統簡介...4 2.1行動通訊的演進...4 2.2蜂巢式 行動通訊系統架構...5 2.3行動無線通道 ...8 2.3.1路徑損失...9 2.3.2遮蔽效

應...9 2.3.3多重路徑衰變...10 2.4展頻原理...12 2.5 CDMA系 統...16 2.5.1交遞...17 2.5.2服務品質控制...18 2.5.3功率控

制...18 2.5.4耙式接收機...19 2.5.5分集技術...20 第三章 CDMA 2000下鏈系 統數據流量分析...21 3.1 CDMA 2000下鏈系統架構...21 3.2 DCCH對於傳輸效能影響...27 3.3 CDMA 2000單細胞下鏈系統...29 3.4 CDMA 2000多細胞下鍊系統...30 3.5不考慮DCCH造成負載之數據流量分 析...39 3.6考慮DCCH造成負載之數據流量分析...46 第四章 CDMA2000下鏈系統在多重路徑下分析....53 3.1多重 路徑下效能分析...53 3.2多重路徑下效能數值分析...60 第五章 結論...71 參考文 獻...74

參考文獻

[1] Clint Smith and Daniel Collins, “3G Wireless Networks”, McGraw-Hill, 2002.

[2] A. J. Viterbi, “CDMA Principles of Spread Spectrum Communication”, 1995.

[3] Ning Yang, “The Third Generation Wireless Network Using CDMA Air Interface”, IEEE Wireless Communication and Networking Conference, vol.2, pp. 649-653, 1999.

[4] H. lervik and A. Perkis, “Increase Capacity in DS-CDMA Systems by Reuse of Spreading Codes”, Proceedings of IEEE ICT 2001, vol.3, pp.

59-62.

[5] 陳俊男, “Performance analysis for multi-rate transmission in W-CDMA”, 大葉大學碩士論文2001.

[6] R. steele, C. C. Lee and P. Gould, “GSM CdmaOne and 3G Systems”, Wiley & Sons, 2001.

[7] Vijay K. Garg , “IS-95 CDMA and cdma 2000”, Prentice-Hall, 2000.

[8] Qiang Wu and Eduardo Esteves, “The cdma 2000 High data rate Packet Data System”, Qualcomm Technical Report, March 2002.

[9] Eduardo Esteves, “On the Reverse Link Capacity of cdma 2000 High data rate Packet Data System”, Qualcomm Technical Report, 2002.

[10] A. Chheda, “On The Forward Link Capacity of a cdma 2000 1X-System with Transmit Diversity ”, IEEE Trans. Veh. Tech., vol.2, pp.

618-623, September 2000.

[11] Sadayuki Abeta, Hiroyuki Atarashi and Mamoru Sawahashi, “Forward Link Capacity of Coherent DS-CDMA and MC-CDMA Broadband Packet Wireless Access in Multi-cell Environment”, IEEE Trans. Veh. Tech., vol.5, pp. 2213-2218, September 2000.

(2)

[12] S.R. Saunders, “Antennas and Propagation for Wireless Communication System”, John Wiley & Sons , 1999.

[13] BERNARD SKLAR, “Digital Communication Fundamentals and Applications”, Prentice-Hall, 1996.

[14] P. Jung, P. W. Basier and A.Steil, “Advantages of CDMA and spread spectrum techniques over FDMA and TDMA in cellular mobile radio applications”, IEEE Trans. Veh. Tech., vol.4, pp. 357-364, 1993.

[15] 3GPP2, “Physical Layer Standard for cdma 2000 Spread Spectrum System”, 1999.

[16] Syed Ali Jafar and Andrea Goldsmith, “Optimal Rate and Power Adaptation for Multi-rate CDMA”, IEEE Trans. Veh. Tech., vol.3, pp.

994-1000, September 2000.

[17] T. S. Rappaport, “Wireless Communication Principles and Practice”, Prentice Hall PTR, 1996.

[18] Pieter van Rooyen, Michiel Lotter, and Sanie van Wyk, “Space-Time Processing for CDMA Mobile Communication”, 2000.

參考文獻

相關文件

– The futures price at time 0 is (p. 275), the expected value of S at time ∆t in a risk-neutral economy is..

Remote root compromise Web server defacement Guessing/cracking passwords Copying databases containing credit card numbers Viewing sensitive data without authorization Running a

We also propose a Unified Code Management Schemes to eliminate code blocking completely and the reassignment cost will be reduced as far as possible based on CIDP.. Our schemes

The Performance Evaluation for Horizontal, Vertical and Hybrid Schema in Database Systems.. -A Case Study of Wireless Broadband

Abstract— This paper has analyzed link probability, expected node degree, expected number of links, and expected area collectively covered by a finite number of nodes in wireless ad

Wireless, Mobile and Ubiquitous Technology in Education, 2006. Methods and techniques of

[23] Tiantong You, Hossam Hassanein and Chi-Hsiang Yeh, “PIDC - Towards an Ideal MAC Protocol for Multi-hop Wireless LANs,” Proceedings of the IEEE International Conference

Krishnamachari and V.K Prasanna, “Energy-latency tradeoffs for data gathering in wireless sensor networks,” Twenty-third Annual Joint Conference of the IEEE Computer