333 research outputs found

    Rate Splitting for MIMO Wireless Networks: A Promising PHY-Layer Strategy for LTE Evolution

    Get PDF
    MIMO processing plays a central part towards the recent increase in spectral and energy efficiencies of wireless networks. MIMO has grown beyond the original point-to-point channel and nowadays refers to a diverse range of centralized and distributed deployments. The fundamental bottleneck towards enormous spectral and energy efficiency benefits in multiuser MIMO networks lies in a huge demand for accurate channel state information at the transmitter (CSIT). This has become increasingly difficult to satisfy due to the increasing number of antennas and access points in next generation wireless networks relying on dense heterogeneous networks and transmitters equipped with a large number of antennas. CSIT inaccuracy results in a multi-user interference problem that is the primary bottleneck of MIMO wireless networks. Looking backward, the problem has been to strive to apply techniques designed for perfect CSIT to scenarios with imperfect CSIT. In this paper, we depart from this conventional approach and introduce the readers to a promising strategy based on rate-splitting. Rate-splitting relies on the transmission of common and private messages and is shown to provide significant benefits in terms of spectral and energy efficiencies, reliability and CSI feedback overhead reduction over conventional strategies used in LTE-A and exclusively relying on private message transmissions. Open problems, impact on standard specifications and operational challenges are also discussed.Comment: accepted to IEEE Communication Magazine, special issue on LTE Evolutio

    Integrated Data and Energy Communication Network: A Comprehensive Survey

    Get PDF
    OAPA In order to satisfy the power thirsty of communication devices in the imminent 5G era, wireless charging techniques have attracted much attention both from the academic and industrial communities. Although the inductive coupling and magnetic resonance based charging techniques are indeed capable of supplying energy in a wireless manner, they tend to restrict the freedom of movement. By contrast, RF signals are capable of supplying energy over distances, which are gradually inclining closer to our ultimate goal – charging anytime and anywhere. Furthermore, transmitters capable of emitting RF signals have been widely deployed, such as TV towers, cellular base stations and Wi-Fi access points. This communication infrastructure may indeed be employed also for wireless energy transfer (WET). Therefore, no extra investment in dedicated WET infrastructure is required. However, allowing RF signal based WET may impair the wireless information transfer (WIT) operating in the same spectrum. Hence, it is crucial to coordinate and balance WET and WIT for simultaneous wireless information and power transfer (SWIPT), which evolves to Integrated Data and Energy communication Networks (IDENs). To this end, a ubiquitous IDEN architecture is introduced by summarising its natural heterogeneity and by synthesising a diverse range of integrated WET and WIT scenarios. Then the inherent relationship between WET and WIT is revealed from an information theoretical perspective, which is followed by the critical appraisal of the hardware enabling techniques extracting energy from RF signals. Furthermore, the transceiver design, resource allocation and user scheduling as well as networking aspects are elaborated on. In a nutshell, this treatise can be used as a handbook for researchers and engineers, who are interested in enriching their knowledge base of IDENs and in putting this vision into practice

    Optimizing Resource Allocation with Energy Efficiency and Backhaul Challenges

    Get PDF
    To meet the requirements of future wireless mobile communication which aims to increase the data rates, coverage and reliability while reducing energy consumption and latency, and also deal with the explosive mobile traffic growth which imposes high demands on backhaul for massive content delivery, developing green communication and reducing the backhaul requirements have become two significant trends. One of the promising techniques to provide green communication is wireless power transfer (WPT) which facilitates energy-efficient architectures, e.g. simultaneous wireless information and power transfer (SWIPT). Edge caching, on the other side, brings content closer to the users by storing popular content in caches installed at the network edge to reduce peak-time traffic, backhaul cost and latency. In this thesis, we focus on the resource allocation technology for emerging network architectures, i.e. the SWIPT-enabled multiple-antenna systems and cache-enabled cellular systems, to tackle the challenges of limited resources such as insufficient energy supply and backhaul capacity. We start with the joint design of beamforming and power transfer ratios for SWIPT in MISO broadcast channels and MIMO relay systems, respectively, aiming for maximizing the energy efficiency subject to both the Quality of Service (QoS) constraints and energy harvesting constraints. Then move to the content placement optimization for cache-enabled heterogeneous small cell networks so as to minimize the backhaul requirements. In particular, we enable multicast content delivery and cooperative content sharing utilizing maximum distance separable (MDS) codes to provide further caching gains. Both analysis and simulation results are provided throughout the thesis to demonstrate the benefits of the proposed algorithms over the state-of-the-art methods

    Secrecy Rate of the Cooperative RSMA-Aided UAV Downlink Relying on Optimal Relay Selection

    Full text link
    The Cooperative Rate-Splitting (CRS) scheme, proposed evolves from conventional Rate Splitting (RS) and relies on forwarding a portion of the RS message by the relaying users. In terms of secrecy enhancement, it has been shown that CRS outperforms its non-cooperative counterpart for a two-user Multiple Input Single Output (MISO) Broadcast Channel (BC). Given the massive connectivity requirement of 6G, we have generalized the existing secure two-user CRS framework to the multi-user framework, where the highest-security users must be selected as the relay nodes. This paper addresses the problem of maximizing the Worst-Case Secrecy Rate (WCSR) in a UAV-aided downlink network where a multi-antenna UAV Base-Station (UAV-BS) serves a group of users in the presence of an external eavesdropper (Eve). We consider a practical scenario in which only imperfect channel state information of Eve is available at the UAV-BS. Accordingly, we conceive a robust and secure resource allocation algorithm, which maximizes the WCSR by jointly optimizing both the Secure Relaying User Selection (SRUS) and the network parameter allocation problem, including the RS transmit precoders, message splitting variables, time slot sharing and power allocation. To circumvent the resultant non-convexity owing to the discrete variables imposed by SRUS, we propose a two-stage algorithm where the SRUS and network parameter allocation are accomplished in two consecutive stages. With regard to the SRUS, we study both centralized and distributed protocols. On the other hand, for jointly optimizing the network parameter allocation we resort to the Sequential Parametric Convex Approximation (SPCA) algorithm. Our numerical results show that the proposed solution significantly outperforms the existing benchmarks for a wide range of network loads in terms of the WCSR.Comment: arXiv admin note: text overlap with arXiv:1910.07843 by other author

    Research Issues, Challenges, and Opportunities of Wireless Power Transfer-Aided Full-Duplex Relay Systems

    Get PDF
    We present a comprehensive review for wireless power transfer (WPT)-aided full-duplex (FD) relay systems. Two critical challenges in implementing WPT-aided FD relay systems are presented, that is, pseudo FD realization and high power consumption. Existing time-splitting or power-splitting structure based-WPT-aided FD relay systems can only realize FD operation in one of the time slots or only forward part of the received signal to the destination, belonging to pseudo FD realization. Besides, self-interference is treated as noise and self-interference cancellation (SIC) operation incurs high power consumption at the FD relay node. To this end, a promising solution is outlined to address the two challenges, which realizes consecutive FD realization at all times and forwards all the desired signal to the destination for decoding. Also, active SIC, that is, analog/digital cancellation, is not required by the proposed solution, which effectively reduces the circuit complexity and releases high power consumption at the FD relay node. Specific classifications and performance metrics of WPT-aided FD relay systems are summarized. Some future research is also envisaged for WPT-aided FD systems

    Beamforming and non-orthogonal multiple access for rate and secrecy enhancement of fifth generation communication system

    Get PDF
    The fifth-generation (5G) communication systems have many anticipated functionalities and requirements such as high data rate, massive connectivity, wide coverage area, low latency and enhanced secrecy performance. In order to meet these criteria, communication schemes that combine 5G key enabling technologies need to be investigated. In this thesis, a novel communication system that merges non-orthogonal multiple access (NOMA), energy harvesting, beamforming, and full-duplex (FD) techniques in order to enhance both capacity and secrecy of 5G system is introduced. In the capacity improving scheme, NOMA is first combined with beamforming to serve more than one user in each beamforming vector. Next, simultaneous wireless information and power transfer (SWIPT) technique is exploited to encourage the strong user (user with better channel condition) to relay the information messages of the weak user (user with poor channel condition) in FD manner. The total sum rate maximisation problem is formulated and solved by means of convex-concave procedure. The system performance is also analysed by deriving the outage probability of both users. Additionally, the model is extended to a more general case wherein the users are moving, and the outage probability of this dynamic topology is provided by means of the stochastic geometry framework. Novel secure schemes are also introduced to safeguard legitimate users’ information from internal and external eavesdroppers. In the internal eavesdropper’s case, artificial signal concept is adopted to protect NOMA’s weak user’s information from being intercepted by the strong user. The secrecy outage probability of theweak user is derived and validated. In addition, game theory discipline is exploited to provide an efficient eavesdropping avoidance algorithm. Null-steering beamforming is adopted in the external eavesdropper’s case in two different schemes namely self and nonself-cooperative jamming. In self-cooperative strategy, the base station applies the null-steering jamming to impair the eavesdropper channel, while sending the information-bearing signals to the intended legitimate users. Whereas in the nonself-cooperative jamming scheme, the base station provides the helpers with the required information and power by means of SWIPT technique in the first phase. The helpers deploy null-steering beamforming to jam the eavesdropper during the information exchange between the base station and the intended users in the second phase. The secrecy outage probability of the legitimate users is derived in both jamming schemes. Game theory is also introduced to the nonself-cooperative jamming scheme for further improvements on the secrecy outage behaviour and the economic revenue of the system. The proposed capacity enhancing scheme demonstrates about 200% higher sum rate when compared with the non-cooperative and half-duplex cooperative NOMA systems. In addition, the novel secure scheme in the internal eavesdropper case is proven to enhance the information security of the weak user without compromising the functionalities of the strong user or NOMA superiority over orthogonal multiple access systems. Null-steering based jamming system also illustrates improved secrecy performance in the external eavesdropper case when compared to the conventional jamming schemes. Numerical simulations are carried out in order to validate the derived closed-form expressions and to illustrate the performance enhancement achieved by the proposed schemes where the rate is increased by 200% and the secrecy outage probability is decreased by 33% when compared to the baseline systems
    • …
    corecore