ebook img

Multiple Access Technology Towards Ubiquitous Networks: Overview and Efficient Designs PDF

194 Pages·2022·4.847 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Multiple Access Technology Towards Ubiquitous Networks: Overview and Efficient Designs

Multiple Access Technology Towards Ubiquitous Networks · · · Neng Ye Xiangming Li Kai Yang Jianping An Multiple Access Technology Towards Ubiquitous Networks Overview and Efficient Designs NengYe XiangmingLi BeijingInstituteofTechnology BeijingInstituteofTechnology Beijing,China Beijing,China KaiYang JianpingAn BeijingInstituteofTechnology BeijingInstituteofTechnology Beijing,China Beijing,China ISBN 978-981-19-4024-8 ISBN 978-981-19-4025-5 (eBook) https://doi.org/10.1007/978-981-19-4025-5 ©TheAuthor(s),underexclusivelicensetoSpringerNatureSingaporePteLtd.2023 Thisworkissubjecttocopyright.AllrightsaresolelyandexclusivelylicensedbythePublisher,whether thewholeorpartofthematerialisconcerned,specificallytherightsoftranslation,reprinting,reuse ofillustrations,recitation,broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,and transmissionorinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilar ordissimilarmethodologynowknownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthors,andtheeditorsaresafetoassumethattheadviceandinformationinthisbook arebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor theeditorsgiveawarranty,expressedorimplied,withrespecttothematerialcontainedhereinorforany errorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictional claimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSingaporePteLtd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore Preface The future wireless communication networks are expected to provide ubiquitous massivecoveragetomeettherequirementsofdiversifiedapplications.Withanexpo- nential increase of the number of users and devices, it is challenging to establish fastand reliable connections in the ubiquitous network. As the core technology in the evolution of wireless communication systems, multiple access technology can enableeffectivemassiveconnectionsandhasbecometheprominentresearchtrend forubiquitousnetworks.Thegoalofthisbookistoprovidereaderswithacompre- hensiveoverviewofthestate-of-the-artmultipleaccesstechnologiesforubiquitous network, with a focus on the novel ubiquitous multiple access technologies, the signalconstructiontechniquesofmultipleaccessandtheenhancedmultipleaccess transceivers using Artificial Intelligence (AI). For each of these topics, this book has tried to provide an advanced introduction, blending the basic multi-user infor- mationprincipleswiththeadvancedmultipleaccessmodelsandnovelapplication scenarios.Inaddition,thisbookhasprovidedelaboratesimulationresultsforeach topictoverifythefeasibilityofthecorrespondingschemes. Inparticular,tohave acomprehensive viewfortheapplication scenarios ofthe multiple access technology, this book discusses the evolution and deployment of multipleaccessin5Gandbeyond,followedbytheemergingmultipleaccesstech- nologiesdevelopedfortheubiquitousnon-terrestrialnetworks.Facingthechallenges of massive connections in ubiquitous networks this book investigates the effective signalconstructiontechniquesofmultipleaccess,includingconstellationdesignand ratesplitting.Moreover,theenhancementofmultipleaccesstransceiversusingAIis presented.Specifically,thisbookresortstoAIforconstructingunifiedoptimization framework and approaching the performance limit of multiple access system, and enhancesgrant-freemultipleaccesstomatchthefeaturesofInternetofThings(IoT) withdeeplearning.Thisbooksystematicallydescribesthetheoreticalframeworkand physical layer technologies of ubiquitous access, which can reflect the application prospectforfutureubiquitousnetworks. Webelievethatthisbookcanprovideusefulinsightsforthetheoryandmethodof ubiquitousmultipleaccess,anddisplaythewideapplicationofubiquitousnetworks in the future 6G. This book can be used as a reference for graduate students, v vi Preface researchers, and engineers in the field of wireless communications. We do hope thatthevaluabletimedevotedtothisbookwillbearfruitinstimulatinginterestin thestudyofmultipleaccesstechnologies. Beijing,China NengYe XiangmingLi KaiYang JianpingAn Acknowledgements TheworksinthisbookhavebeensupportedbytheNationalNaturalScience FoundationofChinaunderGrants62101048and62171030. Contents 1 Introduction ................................................... 1 1.1 Background ............................................... 1 1.2 EvolutionofMultipleAccessTechnology ...................... 2 1.3 SignalConstructionforMultipleAccessTechnology ............ 3 1.4 AI-EnhancedMultipleAccessTechnology ..................... 4 1.5 Organization ............................................... 4 References ..................................................... 6 2 MultipleAccessTowards5GandBeyond ......................... 7 2.1 Introduction ............................................... 7 2.2 TypicalMultipleAccessTechnologies ......................... 9 2.2.1 Bit-LevelNon-orthogonalMultipleAccess .............. 10 2.2.2 Symbol-LevelNon-orthogonalMultipleAccess .......... 15 2.2.3 Multi-userDetectionTechnologies ..................... 23 2.3 Grant-FreeMultipleAccessformMTC ........................ 28 2.3.1 Motivation .......................................... 28 2.3.2 Grant-FreeProcess ................................... 29 2.3.3 TypicalGrant-FreeMultipleAccessTechnologies ........ 31 2.3.4 DetectionTechniques ................................. 33 2.4 ImplementationIssues ...................................... 35 2.4.1 Scheduling-BasedMultipleAccess ..................... 36 2.4.2 Grant-FreeMultipleAccess ........................... 38 2.5 Conclusions ............................................... 41 References ..................................................... 41 3 MultipleAccessTowardsNon-terrestrialNetworks ................ 47 3.1 Introduction ............................................... 47 3.2 OverviewonNon-terrestrialIoT .............................. 48 3.2.1 SatelliteIoT ......................................... 50 3.2.2 UAVIoT ............................................ 51 3.3 PhysicalLayerTechnologiesofSatelliteIoT ................... 51 3.3.1 WirelessAccessTechnologies ......................... 52 vii viii Contents 3.3.2 High-EfficacyResourceAllocation ..................... 56 3.3.3 LargeDynamicChannel .............................. 57 3.3.4 MmWaveTransmissionSystem ........................ 58 3.3.5 OtherEnablingTechnologies .......................... 58 3.4 Non-physicalLayerTechnologiesofSatelliteIoT ............... 59 3.4.1 High-EfficacyProtocol ............................... 59 3.4.2 UbiquitousNetworkArchitecture ...................... 59 3.4.3 OtherEnablingTechnologies .......................... 60 3.5 MultipleAccessTechnologiesofUAVIoT ..................... 60 3.5.1 FlexibleDeploymentandRoutePlanning ................ 60 3.5.2 LowPowerConsumptionDesign ....................... 62 3.5.3 CollisionResolutionDesign ........................... 64 3.5.4 LargeDynamicChannel .............................. 64 3.5.5 OtherEnablingTechnologies .......................... 66 3.6 Conclusions ............................................... 68 References ..................................................... 68 4 ConstellationDesignTechniqueforMultipleAccess ............... 77 4.1 Introduction ............................................... 77 4.2 SystemModelandProblemFormulation ....................... 78 4.3 ConstellationRotationMethod ............................... 79 4.3.1 ProblemTransformation .............................. 79 4.3.2 VariationalApproximationMethod ..................... 80 4.4 AnalysisandDiscussions .................................... 82 4.4.1 AchievableCapacitywithSICReceiver ................. 82 4.4.2 AnalysisonInfiniteNumberofReceivingAntenna ....... 83 4.5 SimulationResultsandConclusions ........................... 83 References ..................................................... 86 5 Rate-AdaptiveDesignforMultipleAccess ........................ 87 5.1 Introduction ............................................... 87 5.1.1 RelatedWorkandMotivation .......................... 88 5.1.2 Contributions ........................................ 90 5.2 SystemModel ............................................. 91 5.3 Rate-AdaptiveMultipleAccess ............................... 93 5.3.1 Rate-SplittingPrinciple ............................... 93 5.3.2 RAMAforGrant-FreeTransmission .................... 94 5.3.3 ImplementationIssues ................................ 96 5.4 PerformanceAnalysisofConv-GFandRAMA ................. 97 5.4.1 OutagePerformanceAnalysisofGrant-FreeAccess ....... 97 5.4.2 OutagePerformanceAnalysisofRAMA ................ 102 5.4.3 Comparisons ........................................ 106 5.5 RAMAAmenableConstellations ............................. 108 5.5.1 OverlappingMethod ................................. 108 5.5.2 BundlingMethod .................................... 109 5.6 SimulationResults .......................................... 110 Contents ix 5.6.1 IdealSettings ........................................ 110 5.6.2 RealisticSettings .................................... 112 5.7 Conclusions ............................................... 113 References ..................................................... 117 6 ArtificialIntelligence-EnhancedMultipleAccess .................. 119 6.1 Introduction ............................................... 119 6.1.1 RelatedWorkandMotivation .......................... 120 6.1.2 Contributions ........................................ 121 6.2 SystemModelandProblemFormulation ....................... 122 6.2.1 UplinkNOMASystemModel ......................... 122 6.2.2 ProblemFormulation ................................. 123 6.3 DeepNOMA:AnEnd-to-EndDLFrameworkforNOMA BasedonMulti-taskLearning ................................ 125 6.3.1 DeepMulti-taskLearning ............................. 125 6.3.2 NetworkStructureofDeepNOMA ..................... 126 6.3.3 Multi-taskBalancingTechnique ........................ 130 6.3.4 TrainingAlgorithm ................................... 132 6.4 DeepMAS:Model-BasedMASMappingNetworkDesign ........ 132 6.4.1 Model-BasedTransmitterDesign ....................... 133 6.4.2 ParameterInitialization ............................... 134 6.5 DeepMUD:InterferenceCancellation-BasedMUDNetwork Design .................................................... 135 6.5.1 InterferenceCancellationforMultipleAccessChannel .... 135 6.5.2 ICNN:InterferenceCancellation-EnabledDNN .......... 136 6.5.3 DeepMUDBasedonICNN ............................ 138 6.5.4 TrainingDeepMUDoverFadingChannel ............... 140 6.6 SimulationResults .......................................... 141 6.6.1 NetworkTrainingPerformance ........................ 142 6.6.2 DesignExamplesofDeepMAS ........................ 145 6.6.3 PerformanceEvaluationofDeepNOMA ................. 146 6.7 Conclusions ............................................... 149 References ..................................................... 154 7 DeepLearning-AidedHigh-ThroughputMultipleAccess ........... 157 7.1 Introduction ............................................... 157 7.2 SystemModelandProblemFormulation ....................... 160 7.3 DeepLearning-AidedGrant-FreeNOMA ...................... 161 7.3.1 DeepVAEforGrant-FreeNOMA ...................... 161 7.3.2 EncodingNetwork ................................... 163 7.3.3 DecodingNetwork ................................... 164 7.4 Multi-lossBasedNetworkTrainingAlgorithm .................. 165 7.4.1 DatasetOrganizationwithRandomUserActivation ....... 165 7.4.2 Multi-lossFunctionDesign ............................ 166 7.4.3 OverallAlgorithm .................................... 169 7.5 SimulationResults .......................................... 170 x Contents 7.5.1 NetworkTrainingResultsandDesignExamples .......... 170 7.5.2 DetectionAccuracyAnalysis .......................... 172 7.6 Conclusions ............................................... 175 References ..................................................... 175 8 SummaryandOutlook ......................................... 179 8.1 Summary .................................................. 179 8.2 FutureDirections ........................................... 181

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.