无线协作传输策略及其性能的研究
[Abstract]:The performance of a communication system is mainly based on its effectiveness, reliability and safety. Compared with wired communication, wireless communication faces more serious challenges in the aspects of validity, reliability and security: on the one hand, the multi-path fading effect will lead to the distortion of the received signal and the signal-to-noise ratio is low, thus affecting the validity and reliability of information transmission: on the other hand, the openness of the wireless channel will cause the transmission information to be easily intercepted and thus the security of the information transmission is reduced. In recent years, MIMO technology and cooperative communication technology are considered to be an effective means to improve and improve the performance of wireless communication system. The core research content of wireless cooperative communication technology is to design effective cooperative transmission strategy, so that the performance of wireless communication system in validity, reliability or security is obviously improved. As is well known, the multiplexing gain and diversity gain are the performance of evaluating the effectiveness and reliability of the MIMO wireless communication system, respectively. The existing research shows that the relationship between the multiplexing gain and the diversity gain is the relationship between the diversity gain and the diversity gain, that is, the high multiplexing gain can lead to lower diversity gain, and vice versa; and the split-set multiplexing trade-off (dmt) is the compromise between the diversity gain and the multiplexing gain. Therefore, it is reasonable to evaluate the effectiveness and reliability of the cooperative transmission system by analyzing the performance of dmt. Select. In addition, measure the performance index of the transmission system security Always use "security Rate", the meaning of which is to authorize the user to decode correctly, and the stolen information can not be decoded Rate. Based on several typical wireless collaborative communication scenarios, a wireless co-association based on dmt optimization or security rate optimization is investigated. As a transmission strategy, a more efficient multi-relay cooperative transmission strategy is designed to optimize the performance of the system in the aspect of multi-path fading, and a more efficient hybrid cooperative transmission strategy is designed in the aspect of anti-wiretapping, so as to achieve greater efficiency. Security rate. The main contents of this paper The contribution is as follows: 1) For multi-relay point-to-point channel model, a relay complex is proposed The basic idea of the strategy is to simulate a full-duplex relay with two half-duplex relay to overcome the half-duplex limitation of the relay; in addition, the strategy combines the hierarchical relay selection and the linear forcing zero algorithm, wherein the hierarchical relay selection guarantee Optimal diversity gain and low complexity forced-zero algorithm The theoretical analysis and Monte Carlo simulation experiments show that the strategy can optimize the performance of the system, and can approximate multi-input single-output (MISO). (2) For multi-relay multi-access channel model, a kind of superposition coding is proposed. The cooperative strategy is characterized in that each source information can be transmitted on each source end and the relay so as to realize the complete cooperation between the source end and the source end and the relay, and therefore, Theoretical analysis and Monte Carlo simulation experiments show that the strategy can optimize the performance of the system and can be approximated On the basis of the strategy of noisy network coding (NNC), the strategy based on partial decoding (PaDF) is proposed. According to the strategy of artificial state (AS), the first collaboration strategy combines the NNC compression pretransmission technology and the interference assistance technology, and the NNC compression pre-transmission technology is in order to improve the communication capability among the authorized users, and the interference assistance technology is to suppress the tap channel so as to reach the help of the master. the second cooperative strategy utilizes the basic encoding and decoding methods such as superposition coding, reverse decoding and the like, and the fusion part decodes the pre-transmission technology and the noise pre-transmission technology so as to improve the authorized users. the third cooperation strategy combines the artificial state and the noise pre-transmission technology, the artificial state is generated by the source end, the interference information generated by the joint relay can effectively inhibit the wiretap signal, Channel, without any damage to the destination, is characterized by the fact that the relay does not receive any source end information, and thus It is not affected by the quality of the source end to the relay channel. In addition, the above three cooperative transmission strategies are specially designed for the Gauss relay wiretapping channel, Theoretical analysis and numerical results show that they can reach the safe rate. the proposed collaboration strategy can promote Security performance of the system. 4) For multi-access wiretapping channels with "conference", a kind of base is proposed. A hybrid collaboration transmission strategy encoded by Willems. Its basic idea is to fuse Willems Code and W yner's random box technology allows both the source-to-destination communication capability to be raised through the & quot; conference & quot; link, and It can suppress the tapping ability of the bug through the multi-access interception channel. In addition, the basic theory of the system security is used to analyze the problem. The strategy can reach the secure rate domain and the outside of the secure capacity domain. multiplexing-based scheme and cooperative time division multiple access based connection Programme of admission Theoretical analysis and numerical calculation results show that the "meeting" between the source ends
【学位授予单位】:中国科学技术大学
【学位级别】:博士
【学位授予年份】:2014
【分类号】:TN92
【相似文献】
相关期刊论文 前5条
1 杨洋;黄建忠;白宝明;王新梅;;使用叠加编码的并行中继网络的传输策略[J];北京邮电大学学报;2010年04期
2 徐艺臻;赵东标;刘凯;章永年;;基于USB的离线插补加工模块设计与实现[J];中国制造业信息化;2010年17期
3 陈卓;冯大权;;BAT:一种资源受限DTN中的高效数据传输策略[J];计算机工程与应用;2011年21期
4 黄天云;;一类MPEG-4 FGS流视频传输的质量定义及算法[J];计算机学报;2006年05期
5 向伟;李俊;王嵩;吴刚;陈卿;;基于P2P的时移电视传输策略[J];信息与控制;2007年02期
相关博士学位论文 前2条
1 徐鹏;无线协作传输策略及其性能的研究[D];中国科学技术大学;2014年
2 李静远;P2P系统结构与数据传输策略研究与实现[D];中国科学技术大学;2009年
相关硕士学位论文 前6条
1 常传文;基于CDMA 2000 1X的H.264视频传输系统研究与实现[D];合肥工业大学;2007年
2 陈真清;基于JN5148的WSN平台设计及节能研究[D];大连理工大学;2010年
3 郜美娜;水利移民实物指标数据移动采集系统设计与实现[D];浙江大学;2013年
4 荣伟;协作MIMO无线传感器网络中节能传输策略研究[D];湘潭大学;2012年
5 韩庆普;融合IPv6的无线传感器网络接入技术研究[D];大连理工大学;2013年
6 陈珏奇;基于客户端驱动的流媒体自适应传输技术研究[D];南京邮电大学;2012年
,本文编号:2307072
本文链接:https://www.wllwen.com/kejilunwen/wltx/2307072.html