406 research outputs found

    A Tutorial on Nonorthogonal Multiple Access for 5G and Beyond

    Full text link
    Today's wireless networks allocate radio resources to users based on the orthogonal multiple access (OMA) principle. However, as the number of users increases, OMA based approaches may not meet the stringent emerging requirements including very high spectral efficiency, very low latency, and massive device connectivity. Nonorthogonal multiple access (NOMA) principle emerges as a solution to improve the spectral efficiency while allowing some degree of multiple access interference at receivers. In this tutorial style paper, we target providing a unified model for NOMA, including uplink and downlink transmissions, along with the extensions tomultiple inputmultiple output and cooperative communication scenarios. Through numerical examples, we compare the performances of OMA and NOMA networks. Implementation aspects and open issues are also detailed.Comment: 25 pages, 10 figure

    A Tutorial on Interference Exploitation via Symbol-Level Precoding: Overview, State-of-the-Art and Future Directions

    Get PDF
    IEEE Interference is traditionally viewed as a performance limiting factor in wireless communication systems, which is to be minimized or mitigated. Nevertheless, a recent line of work has shown that by manipulating the interfering signals such that they add up constructively at the receiver side, known interference can be made beneficial and further improve the system performance in a variety of wireless scenarios, achieved by symbol-level precoding (SLP). This paper aims to provide a tutorial on interference exploitation techniques from the perspective of precoding design in a multi-antenna wireless communication system, by beginning with the classification of constructive interference (CI) and destructive interference (DI). The definition for CI is presented and the corresponding mathematical characterization is formulated for popular modulation types, based on which optimization-based precoding techniques are discussed. In addition, the extension of CI precoding to other application scenarios as well as for hardware efficiency is also described. Proof-of-concept testbeds are demonstrated for the potential practical implementation of CI precoding, and finally a list of open problems and practical challenges are presented to inspire and motivate further research directions in this area

    Interference Exploitation via Symbol-Level Precoding: Overview, State-of-the-Art and Future Directions

    Get PDF
    Interference is traditionally viewed as a performance limiting factor in wireless communication systems, which is to be minimized or mitigated. Nevertheless, a recent line of work has shown that by manipulating the interfering signals such that they add up constructively at the receiver side, known interference can be made beneficial and further improve the system performance in a variety of wireless scenarios, achieved by symbol-level precoding (SLP). This paper aims to provide a tutorial on interference exploitation techniques from the perspective of precoding design in a multi-antenna wireless communication system, by beginning with the classification of constructive interference (CI) and destructive interference (DI). The definition for CI is presented and the corresponding mathematical characterization is formulated for popular modulation types, based on which optimization-based precoding techniques are discussed. In addition, the extension of CI precoding to other application scenarios as well as for hardware efficiency is also described. Proof-of-concept testbeds are demonstrated for the potential practical implementation of CI precoding, and finally a list of open problems and practical challenges are presented to inspire and motivate further research directions in this area

    Secure Simultaneous Information and Power Transfer for Downlink Multi-User Massive MIMO

    Get PDF
    In this article, downlink secure transmission in simultaneous information and power transfer (SWIPT) system enabled with massive multiple-input multiple-output (MIMO) is studied. A base station (BS) with a large number of antennas transmits energy and information signals to its intended users, but these signals are also received by an active eavesdropper. The users and eavesdropper employ a power splitting technique to simultaneously decode information and harvest energy. Massive MIMO helps the BS to focus energy to the users and prevent information leakage to the eavesdropper. The harvested energy by each user is employed for decoding information and transmitting uplink pilot signals for channel estimation. It is assumed that the active eavesdropper also harvests energy in the downlink and then contributes during the uplink training phase. Achievable secrecy rate is considered as the performance criterion and a closed-form lower bound for it is derived. To provide secure transmission, the achievable secrecy rate is then maximized through an optimization problem with constraints on the minimum harvested energy by the user and the maximum harvested energy by the eavesdropper. Numerical results show the effectiveness of using massive MIMO in providing physical layer security in SWIPT systems and also show that our closed-form expressions for the secrecy rate are accurate

    Energy-efficient non-orthogonal multiple access for wireless communication system

    Get PDF
    Non-orthogonal multiple access (NOMA) has been recognized as a potential solution for enhancing the throughput of next-generation wireless communications. NOMA is a potential option for 5G networks due to its superiority in providing better spectrum efficiency (SE) compared to orthogonal multiple access (OMA). From the perspective of green communication, energy efficiency (EE) has become a new performance indicator. A systematic literature review is conducted to investigate the available energy efficient approach researchers have employed in NOMA. We identified 19 subcategories related to EE in NOMA out of 108 publications where 92 publications are from the IEEE website. To help the reader comprehend, a summary for each category is explained and elaborated in detail. From the literature review, it had been observed that NOMA can enhance the EE of wireless communication systems. At the end of this survey, future research particularly in machine learning algorithms such as reinforcement learning (RL) and deep reinforcement learning (DRL) for NOMA are also discussed
    corecore