扩频通信系统的介绍 英文翻译.doc_第1页
扩频通信系统的介绍 英文翻译.doc_第2页
扩频通信系统的介绍 英文翻译.doc_第3页
扩频通信系统的介绍 英文翻译.doc_第4页
扩频通信系统的介绍 英文翻译.doc_第5页
已阅读5页,还剩3页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

本科毕业设计英文翻译专业名称 通 信 工 程 学生姓名 王 祥 指导教师 吕 登 魁 完成时间 本科毕业设计英文翻译指导教师评阅意见学生姓名: 班级: 得分:请指导教师用红笔在译文中直接进行批改,并就以下几方面填写评阅意见,给出综合得分(满分按15分计)。1、专业术语、词汇翻译的准确性;2、翻译材料是否与原文的内容一致;3、翻译材料字数是否符合要求;4、语句是否通顺,是否符合中文表达习惯。 指导教师(签名): 年 月 日扩频通信系统的介绍摘要:本应用笔记概述了扩频技术的原理,讨论了涵盖直接序列和快速跳频的方法。相关理论方程的性能估算。以及讨论直接序列扩频(DSSS)和跳频(FHSS)这两种扩频方式。简介扩频技术越来越受欢迎,就连这一领域以外的电器工程师都渴望能够深入理解这一技术。很多书和网站上都有关于这方面的书,但是,很多都很难理解或描述的不够详尽。(例如,直接序列扩频技术广泛关注的是伪随机码的产生)。定义不同的扩频技术都有一个共同之处:密钥(也称为代码或序列)依附于传输信道。以插入代码的形式准确地定义扩频技术,术语“频谱扩展”是指扩频信号的几个数量级的带宽在有密钥的传输信道中的扩展。以传统的方式定义扩频更为精确:在射频通信系统中,将基带信号扩展为比原有信号的带宽宽得多的高频信号(如图1)。在此过程中,传输宽带信号产生的损耗,表现为噪声。扩频信号带宽与信息带宽之比称为处理增益。扩频过程的处理增益大都在10dB 到60dB之间。扩频的优点抗干扰性能和抗干扰的影响扩频技术有很多优点。抗干扰性是最重要的一个优点。有意或无意的干扰和干扰信号都是不希望存在的因为它们不包含扩频密钥。只有期望信号才有密钥,在解扩过程中才会被接收器接收,如图5。输电链扩频代码接收链扩频代码数据输入射频输出射频输入RF IN射频连接数据输出数据 干扰数据扩展和干扰扩展数据扩展数据扩展和干扰图5:扩频通信系统(注意,解扩链路中数据信号被传输的同时干扰能源也被传输)无论在窄带或宽带中,如果它不涉及解扩过程,你几乎可以忽略干扰。这种抑制反应也适用于其他没有正确密钥的扩频信号。因此不同的扩频通信系统可以工作在同一频段,例如CDMA。值得注意的是,扩频是宽带技术,但反之则不然:宽带技术不涉及扩频技术。抗截获抗截获是扩频通信技术的第二个优势。由于非法的听众没有密钥用于原始信号传播,这些听众无法解码。没有合适的钥匙,扩频信号会出现噪音或干扰。(扫描方法可以打破的这些密钥,但是密钥是短暂的。)甚至更好,信号电平可以低于噪声水平,因为扩频传输降低了频谱密度,如图6。(总能量是相同的,但它是广泛存在于频率的。)因此信息是无形的,这一影响在直接序列扩频(DSSS)技术上有充分的体现。(在下文的DSSS作更详细说明。)其他接收机无法“看到”这种传输,它们只能出现在整体噪音水平略有增加的情况下。噪声基准扩展后的数据噪声基准数据传播之前图6:在被噪音水平之下的扩频频谱信号(在没有正确的扩频传输密钥的情况下,接收器不能“看到”传输过程)抗衰落(多径效应)无线信道通常具有多径传播,即有一个以上的信号从发射机传到接收器(如图7)。这种多路径可以通过空气的反射或折射以及从地面反射或物体如这些路径建筑物引起。RxRDTx图7:信号是如何通过多个路径到达接收器的这种反射路径(R)可干扰直接路径(D)的现象称为解扩过程的同步衰落。因为解扩过程使信号D与信号R的同步被拒绝,即使它们包含了相同的密钥。将反射路径的信号应用于解扩是个有用的方法。扩频和(的)编码密钥现代通讯的代码是数字序列必须长期存在和随机出现的,尽可能地显示为“噪音像”。在任何情况下,代码必须确保是可再生的。或者接收器不能提取已发出去的消息。因此,该序列是几乎是随机的 。这样的代码被称为伪随机数(PRN)或序列。最常用的方法来产生伪随机是基于反馈移位寄存器的。许多书籍都在介绍伪随机码的发展与特征,但是,实际的发展已超出了这些教材所叙述的。注意的是,建立或选择适当的序列或序列集并不是微不足道的。为了保证有效的扩频通信,伪随机序列必须尊重一定的规律如长度、自相关、互相关、正交。比较受欢迎伪随机序列有Barker码,M序列码,Gold码,Walsh码等。考虑到存在更复杂的序列集,给它提供了一个更强大的扩展频谱链路。但是这产生了成本问题:扩频和解扩都需要在速度和性能都更复杂的电子产品,数字扩频解扩芯片包含几百万个等效的2输入与非门在几十兆赫间切换。An Introduction to Spread-Spectrum CommunicationsAbstract:This application note is a tutorial overview of spread-spectrum principles.The discussion covers both direct-sequence and fast-hopping methods.Theoretical equations are given to allow performance estimates.Relation direct-sequence spread-spectrum(DSSS) and frequency-hopping spread-spectrum(FHSS) methods.Introduction As spread-spectrum techmiques become increasingly popular,electrical engineers outside the field are eager for understandable explanations of the technology.There are books and websites on the subject,but many are hard to understand or describe some aspects while ignoring others(e.g.,the DSSS technique with extensive focus on PRN-code generation).The following discussion covers the full spectrum(pun intended).DefinitionsDifferent spread-spectrum techniques are available,but all have one idea in common:the key (also called the code or sequence) attached to the communication channel.The manner of inserting this code defines precisely the spread-spectrum technique.The term spread spectrum refers to the expansion of signal bandwidth,by several orders of magnitude in some cases,which occurs when a key is attached to the communication channel.Benefits of Spread SpectrumResistance to Interference and Antijamming EffectsThere are many benefits to spread-spectrum technology.Resistance to interference is the most important advantage.Intentional or unintentional interference and jamming signals are rejected because they do not contain the spread-spectrum key.Only the desired signal,which has the key, will be seen at the receiver when the despreading operation is exercised.See Figure 5.Figure 5:A spread-spectrum communication system.Note that the interferers energy is spread while the data signal is despread in the receive chain.You can practically ignore the interference,narrowband or wideband,if it does not include the key used in the dispreading operation.That rejection also applies to other spread-spectrum signals that do not have the right key.Thus different spread-spectrum communications can be active simultaneously in the same band,such as CDMA.Note that spread-spectrum is a wideband technology,but the reverse is not true:wideband techniques need not involve spread-spectrum technology.Resistance to Interception Resistance to interception is the second advantage provided by spread-spectrum techniques.Because nonauthorized listeners do not have the key used to spread the original signal,those listeners cannot decode it.Without the right key,the spread-spectrum signal appears as noise or as an interferer.(Scanning methods can break the code,however,if the key is short.) Even better,signal levels can be below the noise floor,because the spreading operation reduces the spectral density.See Figure 6.(Total energy is the same,but it is widely spread in frequency.) The message is thus made invisible,an effect that is particularly strong with the direct-sequence spread-spectrum (DSSS) technique.(DSSS is discussed in greater detail below.) Other receivers cannot “see” the transmission;they only register a slight increase in the overall noise level.Figure 6:Spread-spectrum signal is buried under noise level.The receiver cannot “see”the transmission without the right spread-spectrum keys.Resistance to Fading (Multipath Effects)Wireless channels often include multiple-path propagation in which the signal has more that one path from the transmitter to the receiver (Figure 7).Such multipaths can be caused by atmospheric reflection or refraction, and by reflection from the ground or from objects such as buildings.Figure 7:Illustration of how the signal can reach the receiver over multiple paths.The reflected path (R) can interfere with the direct path (D) in a phenomenon called fading.Because the dispreading process synchronizes to signal D,signal R is rejected even though it contains the same key. Methods are available to use the reflected-path signals by dispreading them and adding the extracted results to the main one.Spread Spectrum and (De) coding “Keys”In modern communications the codes are digital sequences that must be as long and as random as possible to appear as “noise-like” as possible.But in any case,the codes must remain reproducible.or the receiver cannot extract the message that has been sent.Thus,the sequence is “nearly random”.Such a code is called a pseudo-random number (PRN) or sequence.The method most frequently used to generate pseudo-random codes is based on a feedback shift register.Many books are available on the generation of PRNs and their characteristics,but that development is outside the scope of this basic tutorial.Simply note that the co

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论