480 research outputs found
Optimal Throughput Fairness Trade-offs for Downlink Non-Orthogonal Multiple Access over Fading Channels
Recently, non-orthogonal multiple access (NOMA) has attracted considerable
interest as one of the 5G-enabling techniques. However, users with better
channel conditions in downlink communications intrinsically benefits from NOMA
thanks to successive decoding, judicious designs are required to guarantee user
fairness. In this paper, a two-user downlink NOMA system over fading channels
is considered. For delay-tolerant transmission, the average sum-rate is
maximized subject to both average and peak power constraints as well as a
minimum average user rate constraint. The optimal resource allocation is
obtained using Lagrangian dual decomposition under full channel state
information at the transmitter (CSIT), while an effective power allocation
policy under partial CSIT is also developed based on analytical results. In
parallel, for delay-limited transmission, the sum of delay-limited throughput
(DLT) is maximized subject to a maximum allowable user outage constraint under
full CSIT, and the analysis for the sum of DLT is also performed under partial
CSIT. Furthermore, an optimal orthogonal multiple access (OMA) scheme is also
studied as a benchmark to prove the superiority of NOMA over OMA under full
CSIT. Finally, the theoretical analysis is verified by simulations via
different trade-offs for the average sum-rate (sum-DLT) versus the minimum
(maximum) average user rate (outage) requirement.Comment: 35 pages, 10 figures, 3 tables, the longer version of the paper with
the same titl
5G Wireless Network Slicing for eMBB, URLLC, and mMTC: A Communication-Theoretic View
The grand objective of 5G wireless technology is to support three generic
services with vastly heterogeneous requirements: enhanced mobile broadband
(eMBB), massive machine-type communications (mMTC), and ultra-reliable
low-latency communications (URLLC). Service heterogeneity can be accommodated
by network slicing, through which each service is allocated resources to
provide performance guarantees and isolation from the other services. Slicing
of the Radio Access Network (RAN) is typically done by means of orthogonal
resource allocation among the services. This work studies the potential
advantages of allowing for non-orthogonal sharing of RAN resources in uplink
communications from a set of eMBB, mMTC and URLLC devices to a common base
station. The approach is referred to as Heterogeneous Non-Orthogonal Multiple
Access (H-NOMA), in contrast to the conventional NOMA techniques that involve
users with homogeneous requirements and hence can be investigated through a
standard multiple access channel. The study devises a communication-theoretic
model that accounts for the heterogeneous requirements and characteristics of
the three services. The concept of reliability diversity is introduced as a
design principle that leverages the different reliability requirements across
the services in order to ensure performance guarantees with non-orthogonal RAN
slicing. This study reveals that H-NOMA can lead, in some regimes, to
significant gains in terms of performance trade-offs among the three generic
services as compared to orthogonal slicing.Comment: Submitted to IEE
Spectral, Energy and Computation Efficiency in Future 5G Wireless Networks
Wireless technology has revolutionized the way people communicate. From first generation, or 1G, in the 1980s to current, largely deployed 4G in the 2010s, we have witnessed not only a technological leap, but also the reformation of associated applications. It is expected that 5G will become commercially available in 2020. 5G is driven by ever-increasing demands for high mobile traffic, low transmission delay, and massive numbers of connected devices. Today, with the popularity of smart phones, intelligent appliances, autonomous cars, and tablets, communication demands are higher than ever, especially when it comes to low-cost and easy-access solutions.
Existing communication architecture cannot fulfill 5G’s needs. For example, 5G requires connection speeds up to 1,000 times faster than current technology can provide. Also, from transmitter side to receiver side, 5G delays should be less than 1ms, while 4G targets a 5ms delay speed. To meet these requirements, 5G will apply several disruptive techniques. We focus on two of them: new radio and new scheme. As for the former, we study the non-orthogonal multiple access (NOMA) and as for the latter, we use mobile edge computing (MEC).
Traditional communication systems allow users to communicate alternatively, which clearly avoids inter-user interference, but also caps the connection speed. NOMA, on the other hand, allows multiple users to transmit simultaneously. While NOMA will inevitably cause excessive interference, we prove such interference can be mitigated by an advanced receiver side technique. NOMA has existed on the research frontier since 2013. Since that time, both academics and industry professionals have extensively studied its performance. In this dissertation, our contribution is to incorporate NOMA with several potential schemes, such as relay, IoT, and cognitive radio networks. Furthermore, we reviewed various limitations on NOMA and proposed a more practical model.
In the second part, MEC is considered. MEC is a transformation from the previous cloud computing system. In particular, MEC leverages powerful devices nearby and instead of sending information to distant cloud servers, the transmission occurs in closer range, which can effectively reduce communication delay. In this work, we have proposed a new evaluation metric for MEC which can more effectively leverage the trade-off between the amount of computation and the energy consumed thereby.
A practical communication system for wearable devices is proposed in the last part, which combines all the techniques discussed above. The challenges for wearable communication are inherent in its diverse needs, as some devices may require low speed but high reliability (factory sensors), while others may need low delay (medical devices). We have addressed these challenges and validated our findings through simulations
On the Design of Secure Full-Duplex Multiuser Systems under User Grouping Method
Consider a full-duplex (FD) multiuser system where an FD base station (BS) is
designed to simultaneously serve both downlink users and uplink users in the
presence of half-duplex eavesdroppers (Eves). Our problem is to maximize the
minimum secrecy rate (SR) among all legitimate users by proposing a novel user
grouping method, where information signals at the FD-BS are accompanied with
artificial noise to degrade the Eves' channel. The SR problem has a highly
nonconcave and nonsmooth objective, subject to nonconvex constraints due to
coupling between the optimization variables. Nevertheless, we develop a
path-following low-complexity algorithm, which invokes only a simple convex
program of moderate dimensions at each iteration. We show that our
path-following algorithm guarantees convergence at least to a local optima. The
numerical results demonstrate the merit of our proposed approach compared to
existing well-known ones, i.e., conventional FD and nonorthogonal multiple
access.Comment: 6 pages, 3 figure
- …