current position:Home>2WirelessNetwork
2WirelessNetwork
2022-01-27 02:24:56 【Aaaaazdy】
Wireless Network
1G :
Analog / Vehicle use / unsafe (Eavedropping/cloning)
except NMT( The band is 450/900, all No roaming )
2G:
Voice and low bit rate data services / digital transmission / More secure / More popular
e.g. GSM Global mobile communication system (Global System for Mobile Communications)
TDMA: different time slots, same frequency
FDMA: different frequency, same time
CDMA: different codes, same frequency and time
OFDMA: different Orthogonal Frequency, Compared to traditional code schema, More capacity (allow more users to working on same frequency band and time)
GSM(Global System for Mobile Communications)
features:
-
TDMA 8 channels
(TDMA : Time division multiple access / Only one device occupies / Can support 4Kb Voice coder )
-
FDD (Frequency Division Duplex) –different frequencies for uplink and downlink
( Duplex is realized at different frequencies through upload and download )
GSM Four variants of :
[ Failed to transfer the external chain picture , The origin station may have anti-theft chain mechanism , It is suggested to save the pictures and upload them directly (img-ujNGpPGl-1639586980734)(D:\photo\photolibrary\watermark,type_ZmFuZ3poZW5naGVpdGk,shadow_10,text_aHR0cHM6Ly9ibG9nLmNzZG4ubmV0L0hlcm1pX2hidw==,size_16,color_FFFFFF,t_70#pic_center.png)]
e.g. GSM900
-
Use 890–915 MHz(uplink)
-
Use 935–960 MHz(downlink)
-
The separate bandwidth of uplink and downlink is 25 MHZ, The duplex interval is 45 MHz
-
Provide 124 A wireless channel ( Channel number 1-124)
Each channel occupies 200 kHz, 100 kHz Protection bandwidth Placed at both ends of the frequency band
The duplex interval is : ** Uplink start The frequency and Downlink start ** Frequency interval
25 Plus duplex spacing ( Is the starting frequency distance between the two frequency bands , So just + once 25)
GSM network architecture
-
BTS: Base Transceiver( Transceiver ) Station The base station
-
BSC: Base Station Controller Base station control
-
BSS: Base Station Subsystem Base station subsystem
-
MSC: Mobile Switching Center Mobile switching center
In different contexts ,MSC There are different names , This also reflects their complex role in the network . Although all these terms can refer to the same MSC, But their functions are different at different times .
-
Gateway mobile switching center (GMSC)
from **HLR** Query the visitor information and send it back to VLR, And select the route according to this information
-
Visit the mobile switching center (VMSC)
Is where the customer is currently located MSC. With this MSC The associated VLR Will have the data of the contracted user .
-
Anchor attached mobile switching center
Anchor attachment MSC(anchor MSC) The switch is initiated MSC.
-
Target mobile switching center
The goal is MSC(target MSC) Is the one you're going to switch to MSC.
-
-
HLR: Home Location Register Home register
The home location register and the mobile switching center communicate with each other .HLR Store all user information ( Including the current roaming location MSC and VLR)
-
VLR: Visitors Location Register Visitor location register
-
AuC: Authentication Center authentication center
-
GMSC: Gateway Mobile Switching Center
from **HLR** Query to get called MS Current roaming code , And select the route according to this information
GMSC It can be arbitrary MSC, It can also be set separately . When set separately , Don't deal with MS The call of . therefore There is no need to set VLR, Not with BSC Connected to a
-
PSTN: Public Switched Telephone Network
Public switched telephone network
PSTN, Public switched telephone network , It is a circuit switching network based on analog technology . Among many Wan Interconnection Technologies , adopt PSTN The communication cost required for interconnection is the lowest , But its data transmission quality and transmission speed are also the worst , meanwhile PSTN The utilization rate of network resources is also relatively low .
-
EIR: Equipment Identity Register Device identification register
Mobile phone users initiate calls , MSC and VLR Request from mobile phone IMEI( Cell phone serial number ), And send it to EIR, EIR Will receive IMEI And white 、 black ( steal / There is a fault without model certification )、 Compare the three tables , Send the results to MSC/VLR
-
SMS-C: Short Message Service Center Embedded in MSC in
-
OMC: Operation and Maintenance Center Each functional entity in the operation and maintenance system
[ Failed to transfer the external chain picture , The origin station may have anti-theft chain mechanism , It is suggested to save the pictures and upload them directly (img-lOsOOF59-1639586980740)(D:\photo\photolibrary\watermark,type_ZmFuZ3poZW5naGVpdGk,shadow_10,text_aHR0cHM6Ly9ibG9nLmNzZG4ubmV0L3dlaXhpbl80MzUyNTQyNw==,size_16,color_FFFFFF,t_70-16393064697325.png)]
-
among **GMSC** Mainly the function of translation , take PSTN The fixed network signal is translated into MSC Signals that mobile networks can understand ;MSC after GMSC to PSTN It's the same thing .
-
GMSC You can also HLR communicate , But through AuC Certification by
A call / Positioning users :
- The switching device will immediately determine whether the user is calling from local , If the user is visiting from other places , So local VLR Will go to MSC Send query signal , Find relevant information about this user .( At this time, I don't know who the caller is )
- MSC And HLR signal communication , Send relevant information back VLR in
- VLR Send the relevant routing information to MSC, In this way, the mobile switching center can find the correct route of the user's location , Finally, the whole call connection is established .
Location of mobile terminal (Locating a Mobile terminal):
- MT start-up location updating procedure
- new MSC/VLR notice **HLR**
- HLR Delete the old MSC/VLR Information
- HLR Confirm and update new MSC/VLR
- Update and update the location area MT Confirm .
How do mobile terminals receive incoming calls (Mobile Terminating Call):
- PSTN Incoming from **
Fixline
** The call of , Pack it first , then PSTN Check whether the fixed network can connect to the user - GMSC Translate signals ( Will come from PSTN Of data frame Change to be able to be mobile network The form of recognition ), Create with HLR Two way connection of ,HLR Know the latest network connection status . GMSC Communicating data to MSC Before , According to the specific needs of the service , Decide whether to pass HLR Authentication
- MSC Received a better mobile signal , And VLR Create connection , Start mobile roaming
- BSC Start looking for the location of the connection object , Find the one with the strongest signal BTS Connect
Roaming is called (Roaming incoming call):
[ Failed to transfer the external chain picture , The origin station may have anti-theft chain mechanism , It is suggested to save the pictures and upload them directly (img-mwhk2m4c-1639586980742)(D:\photo\photolibrary\watermark,type_ZmFuZ3poZW5naGVpdGk,shadow_10,text_aHR0cHM6Ly9ibG9nLmNzZG4ubmV0L0hlcm1pX2hidw==,size_16,color_FFFFFF,t_70#pic_center-16393126320147.png)]
In the figure Roaming leg paid by recipient: Roaming segment paid by the recipient
GMSC Through HLR When doing validation , According to the information stored in it from VLR The record of , Know the terminal location , Direct to visited network and ** Not in the home network Waste in traffic Time **
Roaming out Roaming outgoing call
[ Failed to transfer the external chain picture , The origin station may have anti-theft chain mechanism , It is suggested to save the pictures and upload them directly (img-h2SgUGEk-1639586980744)(D:\photo\photolibrary\watermark,type_ZmFuZ3poZW5naGVpdGk,shadow_10,text_aHR0cHM6Ly9ibG9nLmNzZG4ubmV0L0hlcm1pX2hidw==,size_16,color_FFFFFF,t_70#pic_center-16393128599459.png)]
mobile network Medium traffic need GMSC Packaging function , To send further information to PSTN. Sometimes MSC and GMSC Can be configured in the same physical device ( In Physics , Both can use two different nodes , You can also use a node )
GSM Mobility management :
1. Authentication( Authentication )
- At terminal SIM card and MSC There is a pair of... In the database secret key
- Outside , key ki in MSC And a string of random serial numbers , after A3 Algorithm , Output a value SRESMSC
- Inside the mobile terminal ,key ks in SIM and The same string of random serial numbers , after A3 Algorithm , Output a value SRESMT
- Compare SRESMSC and SRESMT, If equal, the verification is successful .
( advantage : Security )
[ Failed to transfer the external chain picture , The origin station may have anti-theft chain mechanism , It is suggested to save the pictures and upload them directly (img-QicJkisP-1639586980746)(D:\photo\photolibrary\watermark,type_ZmFuZ3poZW5naGVpdGk,shadow_10,text_aHR0cHM6Ly9ibG9nLmNzZG4ubmV0L3dlaXhpbl80MzUyNTQyNw==,size_16,color_FFFFFF,t_70-163931303170211.png)]
2. Radio Access( Radio interview )
- Three sectors
- Each sector contains 2 An antenna
- The antenna has a low noise amplifier
- In some cases ,BTS It can be connected with by microwave BSC Connect ( When the cable connection is not available )
3. Diversity( diversity ): That is, multiple channels can reach , A path is blocked , The other one is still normal ; By algorithm , Two weak signals can be superimposed
Different antennas have different multipath rays for different signal sources , Therefore, the interference generated by different antennas will be different .
( Choose the one with strong signal ,diversity high )
[ Failed to transfer the external chain picture , The origin station may have anti-theft chain mechanism , It is suggested to save the pictures and upload them directly (img-W6iakeHu-1639586980747)(D:\photo\photolibrary\watermark,type_ZmFuZ3poZW5naGVpdGk,shadow_10,text_aHR0cHM6Ly9ibG9nLmNzZG4ubmV0L3dlaXhpbl80MzUyNTQyNw==,size_16,color_FFFFFF,t_70-163931335081413.png)]
- Frequency reuse( Frequency multiplexing )
- as long as cells If the distance between them is far enough, you can use the same frequency
- Whether it can be received only depends on the strength of the signal
- One cell Yes 6 individual neighbors
- The following figure , One cluster Yes 7 A community ,7 Two different frequencies
[ Failed to transfer the external chain picture , The origin station may have anti-theft chain mechanism , It is suggested to save the pictures and upload them directly (img-ESiLKMfh-1639586980749)(D:\photo\photolibrary\watermark,type_ZmFuZ3poZW5naGVpdGk,shadow_10,text_aHR0cHM6Ly9ibG9nLmNzZG4ubmV0L3dlaXhpbl80MzUyNTQyNw==,size_16,color_FFFFFF,t_70-163931352866715.png)]
In a wireless communication system :
- At the end is the antenna , Responsible for wireless signal transmission .
- The next level ahead is the community , It is called sector in mobile communication . A sector will have 1 Sub or many sub transmitting antennas .
- The next level is the base station , A base station will have 1 To 4 A community .
- At the top is the port , Be responsible for the connection between the client and the server .
Cluster more ?
- Less interference less interference
- Smaller capacity lower capacity( Because the bandwidth is certain , Block more , Relatively small capacity )
Sectoring( Fan )
It is generally divided into 3 Distribution method of shares
[ Failed to transfer the external chain picture , The origin station may have anti-theft chain mechanism , It is suggested to save the pictures and upload them directly (img-sbyrrPjo-1639586980750)(D:\photo\photolibrary\watermark,type_ZmFuZ3poZW5naGVpdGk,shadow_10,text_aHR0cHM6Ly9ibG9nLmNzZG4ubmV0L3dlaXhpbl80MzUyNTQyNw==,size_16,color_FFFFFF,t_70-163931362270317.png)]
- Partitioning can make the area covered by each part smaller , Therefore, the quality of communication may be higher , Less interference .
Radio Resource Management( Management of wireless power supply )
1. power control
-
Reduce interference , Save energy
-
terms of settlement : Signals from other zones can pass through power Filter out the size of
-
CDMA Medium cell breathing( Just breathe ), That is, the cell boundary will shrink to a certain extent , So as to avoid signal interference outside the cell
1.Downlink interference
[ Failed to transfer the external chain picture , The origin station may have anti-theft chain mechanism , It is suggested to save the pictures and upload them directly (img-sOh9tWJ3-1639586980751)(D:\photo\photolibrary\watermark,type_ZmFuZ3poZW5naGVpdGk,shadow_10,text_aHR0cHM6Ly9ibG9nLmNzZG4ubmV0L0hlcm1pX2hidw==,size_16,color_FFFFFF,t_70#pic_center-163931375684119.png)]
-
Problem description : For example GSM In the system , When adjacent BTS Same use frequency, On the edge of terminal Will receive Downlink interference( Received different BTS Different signals )
-
Affected people : terminal
-
Question why : Some BTS The signal is too strong
-
terms of settlement :Power control on BTS( Control signal strength , Form a virtual boundary )compensates for and minimises inter-cell interference
2.Uplink interference
[ Failed to transfer the external chain picture , The origin station may have anti-theft chain mechanism , It is suggested to save the pictures and upload them directly (img-g5wQmi9y-1639586980753)(D:\photo\photolibrary\watermark,type_ZmFuZ3poZW5naGVpdGk,shadow_10,text_aHR0cHM6Ly9ibG9nLmNzZG4ubmV0L0hlcm1pX2hidw==,size_16,color_FFFFFF,t_70#pic_center-163931385319921.png)]
- Problem description : For example 3G in ,Node B1 The received is served by others Node B Of [UE](user equipment) The signal of , Interferes with the use of the same from its services code Of UE The signal of
- Affected people :BTS(Node B)
- Question why : Same use code, Some UE On the edge ( Try to increase the signal strength to communicate )
- terms of settlement :Power control on UE( control UE Signal strength , Reduce energy consumption . The latter in DL interference Not considered , because BTS The power supply is generally sufficient , and UE It may be shut down due to insufficient power supply )
3. SNR&SINR
- SNR>target : decrease power
- SNR<target : increase power
[ Failed to transfer the external chain picture , The origin station may have anti-theft chain mechanism , It is suggested to save the pictures and upload them directly (img-oXjvWDQc-1639586980754)(D:\photo\photolibrary\image-20211212210250596.png)]
- Three types of power control
- Open-loop PC: used as initial power setting
- Closed-loop PC: fast power control loop (1.5 KHz)
- Outer-loop PC: set target for closed-loop PC.
4.Cell breathing in CDMA
[ Failed to transfer the external chain picture , The origin station may have anti-theft chain mechanism , It is suggested to save the pictures and upload them directly (img-FICE6iVA-1639586980755)(D:\photo\photolibrary\image-20211212211124383.png)]
a mobile might not get sufficient signal In gap ( because power control) And no signal
2. handover control( Handover control )
- When a mobile user crosses a cellular boundary , Keep wireless service
- Maintain the required QoS
- By connecting the mobile phone to the strongest base station or base station , Minimize the interference level of the whole system .
- Roaming between different networks
- Distribute load from hot areas ( Load balancing )
1. Hard Handover (GSM) / Hard switching
- Signal first To break off , Again Connect
- MT(Mobile Terminal) Need to switch frequency
2. Soft Handover (W-CDMA)/ Soft handoff
-
Signal first Connect , Again To break off
-
Every cell All use the same frequency
Advantages of soft switching :
- Less the“ping-pong”effect Reduce the ping-pong effect
- Smoother transmission Smooth transmission process
- No hysteresis margin Don't delay
- Macrodiversity gain Diversity gain
- Reduced overall uplink interference
- Reduce uplink and downlink Interference at the upper and lower levels
Disadvantages of soft handoff :
- More complexity More complicated
- Additional network resources are consumed in the downlink direction (code resource and power resource) The energy loss on the lower chain increases
The challenge of wireless network communication
- Limited resources : Limited radio spectrum
- Support mobility
- Maintain quality of service over unreliable wireless links (QoS)
- Connection and coverage
- Security
- Wireless channel “ to open up ”
- authentication
- Battery life of mobile terminal
- Provide integrated services through a single network
Thank you, sister Dear Slim. And my sister / Long Hermi_Mire Share your notes !!! This article is their rearrangement , thank !!
copyright notice
author[Aaaaazdy],Please bring the original link to reprint, thank you.
https://en.cdmana.com/2022/01/202201270224506910.html
The sidebar is recommended
- Spring IOC container loading process
- [thinking] the difference between singleton mode and static method - object-oriented programming
- Hadoop environment setup (MySQL environment configuration)
- 10 minutes, using node JS creates a real-time early warning system for bad weather!
- Git tool
- Force deduction algorithm - 92 Reverse linked list II
- What is the sub problem of dynamic programming?
- C / C + +: static keyword summary
- Idea does not have the artifacts option when configuring Tomcat
- Anaconda can't open it
guess what you like
-
I don't know how to start this
-
Matlab simulation of transportation optimization algorithm based on PSO
-
MySQL slow log optimization
-
[Vue] as the window is stretched (larger, smaller, wider and higher), the text will not be displayed
-
Popular Linux distributions for embedded computing
-
Suzhou computer research
-
After installing SSL Certificate in Windows + tomcat, the domain name request is not successful. Please answer!!
-
Implementation time output and greetings of jQuery instance
-
The 72 year old uncle became popular. Wu Jing and Guo fan made his story into a film, which made countless dreamers blush
-
How to save computer research
Random recommended
- Springboot implements excel import and export, which is easy to use, and poi can be thrown away
- The final examination subjects of a class are mathematical programming, and the scores are sorted and output from high to low
- Two pronged approach, Tsinghua Professor Pro code JDK and hotspot source code notes, one-time learning to understand
- C + + recursive knapsack problem
- The use of GIT and GitHub and the latest git tutorial are easy to understand -- Video notes of crazy God speaking
- PostgreSQL statement query
- Ignition database test
- Context didn't understand why he got a high salary?, Nginxfair principle
- Bootstrap switch switch control user's guide, springcloud actual combat video
- A list that contains only strings. What other search methods can be used except sequential search
- [matlab path planning] multi ant colony algorithm grid map path planning [including GUI source code 650]
- [matlab path planning] improved genetic algorithm grid map path planning [including source code phase 525]
- Iinternet network path management system
- Appium settings app is not running after 5000ms
- Reactnative foundation - 07 (background image, status bar, statusbar)
- Reactnative foundation - 04 (custom rpx)
- If you want an embedded database (H2, hsql or Derby), please put it on the classpath
- When using stm32g070 Hal library, if you want to write to flash, you must perform an erase. If you don't let it, you can't write continuously.
- Linux checks where the software is installed and what files are installed
- SQL statement fuzzy query and time interval filtering
- 69. Sqrt (x) (c + + problem solving version with vs runnable source program)
- Fresh students are about to graduate. Do you choose Java development or big data?
- Java project: OA management system (java + SSM + bootstrap + MySQL + JSP)
- Titanic passenger survival prediction
- Vectorization of deep learning formula
- Configuration and use of private image warehouse of microservice architect docker
- Relearn JavaScript events
- For someone, delete return 1 and return 0
- How does Java dynamically obtain what type of data is passed? It is used to judge whether the data is the same, dynamic data type
- How does the database cow optimize SQL?
- [data structure] chain structure of binary tree (pre order traversal) (middle order traversal) (post order traversal) (sequence traversal)
- Webpack packaging optimization solution
- 5. Operation element
- Detailed explanation of red and black trees
- redhat7. 9 install database 19C
- Blue Bridge Cup notes: (the given elements are not repeated) complete arrangement (arrangement cannot be repeated, arrangement can be repeated)
- Detailed explanation of springboot default package scanning mechanism and @ componentscan specified scanning path
- How to solve the run-time exception of test times
- Detailed explanation of k8s management tool kubectl
- Android system view memory command