简介
本书重点论述数字通信的技术基础和最新应用。全书共分15章,详细阐述了数字通信系统的基本信号变换、信号处理步骤、基带信号及高斯噪声中的信号检测、带通信号及其调制和解调技术、链路分析、各种信道编码方法、网格编码调制、同步问题、多路复用和多址接入、扩频技术及其应用、信源编码以及基本的加密/解密方法、衰落信道等。全书概念清晰,事例翔实,取材新颖,充分反映了近年来的新技术和新理论,还给出了大量富有特色的例题和习题。
本书可作为高等院校通信类、信息类、电子类等专业高年级本科生或低年级研究生的教材,也可供有关技术、科研和管理人员使用或作为继续教育的参考书。
目录
preface
1 signals and spectra
1.1 digital communication signal processing,
1.2 classification of signals,
1.3 spectral density,
1.4 autocorrelation,
1.5 random signals,
1.6 signal transmission through linear systems,
1.7 bandwidth of digital data,
1.8 conclusion,
2 formatting and baseband modulation
2.1 baseband systems,
2.2 formatting textual data (character coding),
2.3 messages, characters, and symbols,
2.4 formatting analog information,
2.5 sources of corruption,
2.6 pulse code modulation,
2.7 uniform and nonuniform quantization,
2.8 baseband modulation,
2.9 correlative coding,
. 2.10 conclusion,
3 baseband demodulation/detection
3.1 signals and noise,
3.2 detection of binary signals in gaussian noise,
3.3 intersymbol interference,
3.4 equalization,
3.5 conclusion,
4 bandpass modulation and demodulation/detection
4.1 why modulate?
4.2 digital bandpass modulation techniques,
4.3 detection of signals in gaussian noise,
4.4 coherent detection,
4.5 noncoherent detection,
4.6 complex envelope,
4.7 error performance for binary systems,
4.8 m-ary signaling and performance,
4.9 symbol error performance for m-ary systems (m ] 2),
4.10 conclusion,
5 communications link analysis
5.1 what the system link budget tells the system engineer,
5.2 the channel,
5.3 received signal power and noise power,
5.4 link budget analysis,
5.5 noise figure, noise temperature, and system temperature,
5.6 sample link analysis,
5.7 satellite repeaters,
5.8 system trade-offs,
5.9 conclusion,
6 channel coding: part
6.1 waveform coding and structured sequences,
6.2 types of error control,
6.3 structured sequences,
6.4 linear block codes.
6.5 error-detecting and correcting capability.
6.6 usefulness of the standard array,
6.7 cyclic codes,
6.8 well-known block codes,
6.9 conclusion,
7 channel coding: part 2
7.1 convolutional encoding,
7.2 convolutional encoder representation.
7.3 formulation of the convolutional decoding problem,
7.4 properties of convolutional codes,
7.5 other convolutional decoding algorithms,
7.6 conclusion,
8 channel coding: part 3
8.1 reed-solomon codes,
8.2 interleaving and concatenated codes,
8.3 coding and interleaving applied to the compact disc
digital audio system,
8.4 turbo codes,
8.5 conclusion,
9 modulation and coding trade-offs
9.1 goals of the communications system designer,
9.2 error probability plane,
9.3 nyquist minimum bandwidth,
9.4 shannon-hartley capacity theorem,
9.5 bandwidth efficiency plane,
9.6 modulation and coding trade-offs,
9.7 defining, designing, and evaluating digital
communication systems,
9.8 bandwidth-efficient modulation,
9.9 modulation and coding for bandlimited channels,
9.10 trellis-coded modulation,
9.11 conclusion,
10 synchronization
10.1 introduction,
10.2 receiver synchronization,
10.3 network synchronization,
10.4 conclusion,
11 multiplexing and multiple access
11.1 allocation of the communications resource,
11.2 multiple access communications system and architecture,
11.3 access algorithms,
11.4 multiple access techniques employed with intelsat,
11.5 multiple access techniques for local area networks,
11.6 conclusion,
12 spread-spectrum techniques
12.1 spread-spectrum overview,
12.2 pseudonoise sequences,
12.3 direct-sequence spread-spectrum systems ,
12.4 frequency hopping systems,
12.5 synchronization,
12.6 jamming considerations,
12.7 commercial applications,
12.8 cellular systems,
12.9 conclusion,
13 source coding
13.1 sources,
13.2 amplitude quantizing,
13.3 differential pulse-code modulation,
13.4 adaptive prediction,
13.5 block coding,
13.6 transform coding,
13.7 source coding for digital data,
13.8 examples of source coding,
13.9 conclusion,
14 encryption and decryption
14.1 models, goals, and early cipher systems,
14.2 the secrecy of a cipher system,
14.3 practical security,
14.4 stream encryption,
14.5 public key cryptosystems.
14.6 pretty good privacy,
14.7 conclusion,
15 fading channels
15.1 the challenge of communicating over .fading channels,
15.2 characterizing mobile-radio propagation,
15.3 signal time-spreading,
15.4 time variance of the channel caused by motion
15.5 mitigating the degradation effects of fading,
15.6 summary of the key parameters characterizing fading channels,
15.7 applications: mitigating the effects of frequency-selective fading,
15.8 conclusion,
a a review of fourier techniques
a.1 signals, spectra, and linear systems,
a.2 fourier techniques for linear system analysis,
a.3 fourier transform properties,
a.4 useful functions,
a.5 convolution,
a.6 tables of fourier transforms and operations,
b fundamentals of statistical decision theory
b.1 bayes' theorem,
b.2 decision theory,
b.3 signal detection example,
c response of a correlator to white noise
d often-used identities
e s-domain, z-domain and digital filtering
e.1 the laplace transform,
e.2 the z-transform.
e.3 digital filtering,
e.4 finite impulse response filter design,
e.5 infinite impulse response filter design,
f list of symbols
index
1 signals and spectra
1.1 digital communication signal processing,
1.2 classification of signals,
1.3 spectral density,
1.4 autocorrelation,
1.5 random signals,
1.6 signal transmission through linear systems,
1.7 bandwidth of digital data,
1.8 conclusion,
2 formatting and baseband modulation
2.1 baseband systems,
2.2 formatting textual data (character coding),
2.3 messages, characters, and symbols,
2.4 formatting analog information,
2.5 sources of corruption,
2.6 pulse code modulation,
2.7 uniform and nonuniform quantization,
2.8 baseband modulation,
2.9 correlative coding,
. 2.10 conclusion,
3 baseband demodulation/detection
3.1 signals and noise,
3.2 detection of binary signals in gaussian noise,
3.3 intersymbol interference,
3.4 equalization,
3.5 conclusion,
4 bandpass modulation and demodulation/detection
4.1 why modulate?
4.2 digital bandpass modulation techniques,
4.3 detection of signals in gaussian noise,
4.4 coherent detection,
4.5 noncoherent detection,
4.6 complex envelope,
4.7 error performance for binary systems,
4.8 m-ary signaling and performance,
4.9 symbol error performance for m-ary systems (m ] 2),
4.10 conclusion,
5 communications link analysis
5.1 what the system link budget tells the system engineer,
5.2 the channel,
5.3 received signal power and noise power,
5.4 link budget analysis,
5.5 noise figure, noise temperature, and system temperature,
5.6 sample link analysis,
5.7 satellite repeaters,
5.8 system trade-offs,
5.9 conclusion,
6 channel coding: part
6.1 waveform coding and structured sequences,
6.2 types of error control,
6.3 structured sequences,
6.4 linear block codes.
6.5 error-detecting and correcting capability.
6.6 usefulness of the standard array,
6.7 cyclic codes,
6.8 well-known block codes,
6.9 conclusion,
7 channel coding: part 2
7.1 convolutional encoding,
7.2 convolutional encoder representation.
7.3 formulation of the convolutional decoding problem,
7.4 properties of convolutional codes,
7.5 other convolutional decoding algorithms,
7.6 conclusion,
8 channel coding: part 3
8.1 reed-solomon codes,
8.2 interleaving and concatenated codes,
8.3 coding and interleaving applied to the compact disc
digital audio system,
8.4 turbo codes,
8.5 conclusion,
9 modulation and coding trade-offs
9.1 goals of the communications system designer,
9.2 error probability plane,
9.3 nyquist minimum bandwidth,
9.4 shannon-hartley capacity theorem,
9.5 bandwidth efficiency plane,
9.6 modulation and coding trade-offs,
9.7 defining, designing, and evaluating digital
communication systems,
9.8 bandwidth-efficient modulation,
9.9 modulation and coding for bandlimited channels,
9.10 trellis-coded modulation,
9.11 conclusion,
10 synchronization
10.1 introduction,
10.2 receiver synchronization,
10.3 network synchronization,
10.4 conclusion,
11 multiplexing and multiple access
11.1 allocation of the communications resource,
11.2 multiple access communications system and architecture,
11.3 access algorithms,
11.4 multiple access techniques employed with intelsat,
11.5 multiple access techniques for local area networks,
11.6 conclusion,
12 spread-spectrum techniques
12.1 spread-spectrum overview,
12.2 pseudonoise sequences,
12.3 direct-sequence spread-spectrum systems ,
12.4 frequency hopping systems,
12.5 synchronization,
12.6 jamming considerations,
12.7 commercial applications,
12.8 cellular systems,
12.9 conclusion,
13 source coding
13.1 sources,
13.2 amplitude quantizing,
13.3 differential pulse-code modulation,
13.4 adaptive prediction,
13.5 block coding,
13.6 transform coding,
13.7 source coding for digital data,
13.8 examples of source coding,
13.9 conclusion,
14 encryption and decryption
14.1 models, goals, and early cipher systems,
14.2 the secrecy of a cipher system,
14.3 practical security,
14.4 stream encryption,
14.5 public key cryptosystems.
14.6 pretty good privacy,
14.7 conclusion,
15 fading channels
15.1 the challenge of communicating over .fading channels,
15.2 characterizing mobile-radio propagation,
15.3 signal time-spreading,
15.4 time variance of the channel caused by motion
15.5 mitigating the degradation effects of fading,
15.6 summary of the key parameters characterizing fading channels,
15.7 applications: mitigating the effects of frequency-selective fading,
15.8 conclusion,
a a review of fourier techniques
a.1 signals, spectra, and linear systems,
a.2 fourier techniques for linear system analysis,
a.3 fourier transform properties,
a.4 useful functions,
a.5 convolution,
a.6 tables of fourier transforms and operations,
b fundamentals of statistical decision theory
b.1 bayes' theorem,
b.2 decision theory,
b.3 signal detection example,
c response of a correlator to white noise
d often-used identities
e s-domain, z-domain and digital filtering
e.1 the laplace transform,
e.2 the z-transform.
e.3 digital filtering,
e.4 finite impulse response filter design,
e.5 infinite impulse response filter design,
f list of symbols
index
- 名称
- 类型
- 大小
光盘服务联系方式: 020-38250260 客服QQ:4006604884
云图客服:
用户发送的提问,这种方式就需要有位在线客服来回答用户的问题,这种 就属于对话式的,问题是这种提问是否需要用户登录才能提问
Video Player
×
Audio Player
×
pdf Player
×
亲爱的云图用户,
光盘内的文件都可以直接点击浏览哦
无需下载,在线查阅资料!