Intelligent Massive NOMA towards 6G Tutorials of PIMRC2020, London, - - PowerPoint PPT Presentation

intelligent massive noma towards 6g tutorials of
SMART_READER_LITE
LIVE PREVIEW

Intelligent Massive NOMA towards 6G Tutorials of PIMRC2020, London, - - PowerPoint PPT Presentation

Intelligent Massive NOMA towards 6G Tutorials of PIMRC2020, London, UK Dr. Yuanwei Liu, Prof. Zhiguo Ding and Prof. Lajos Hanzo Queen Mary University of London, UK The University of Manchester, UK University of Southampton, UK


slide-1
SLIDE 1

Intelligent Massive NOMA towards 6G Tutorials of PIMRC2020, London, UK

  • Dr. Yuanwei Liu, Prof. Zhiguo Ding and Prof. Lajos Hanzo

Queen Mary University of London, UK The University of Manchester, UK University of Southampton, UK yuanwei.liu@qmul.ac.uk zhiguo.ding@manchester.ac.uk hanzo@soton.ac.uk

  • Aug. 31st, 2020

1 / 33

slide-2
SLIDE 2

Outline

1 Wireless Standardization History: OMA vs NOMA

2 / 33

slide-3
SLIDE 3

Brief History of Wireless Standardization

MIMO Sq.

BF Close OVSF-CDMA St.

OMA/ NOMA Sq.

Turbo St.

FEC Sq.

LDPC St. BICM-ID St. MFAA St.

4G Sq. HetNets CR SDN Sq.

UL/DL decoupling St.

MFAA LS-MIMO Terrace 5G Place

  • Telepr. Ave.

MPEG St.

[1] Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan, and L. Hanzo, “Non-Orthogonal Multiple Access for 5G”, Proceedings of the IEEE; Dec 2017. 3 / 33

slide-4
SLIDE 4

Orthogonal multiple access: FDMA, TDMA and CDMA

C

  • d

e Time Frequency Frequency Frequency Time Time User 1 User 2 User 1 User 2 2 1 User 3

4 / 33

slide-5
SLIDE 5

Intentional DS-CDMA Spreading

A/SF Signal B A SF B Spreading code A/SF Interferer B A SF B Spreading code Despreading code A/SF A 5 / 33

slide-6
SLIDE 6

Unintentional Spreading in the FD

6 / 33

slide-7
SLIDE 7

Capacity of OMA vs. NOMA in AWGN channel: (a) Uplink; (b) Downlink.

A B C Rate of user 1 Rate of user 2 Rate of user 1 Rate of user 2 OMA NOMA OMA NOMA (a) (b)

7 / 33

slide-8
SLIDE 8

Diverse NOMA contributions

  • R. Zhang and L. Hanzo, “A unified treatment of superposition coding aided

communications: Theory and practice,” IEEE Commun. Surveys Tutorials,

  • vol. 13, no. 3, pp. 503–520, Mar. 2011.
  • P. Botsinis, D. Alanis, Z. Babar, H. Nguyen, D. Chandra, S. X. Ng, and
  • L. Hanzo, “Quantum-aided multi-user transmission in non-orthogonal multiple

access systems,” IEEE Access, vol. PP, no. 99, pp. 1–1, 2016.

  • A. Wolfgang, S. Chen, and L. Hanzo, “Parallel interference cancellation based

turbo space-time equalization in the SDMA uplink,” IEEE TWC, vol. 6, no. 2,

  • pp. 609–616, Feb. 2007.
  • L. Wang, L. Xu, S. Chen, and L. Hanzo, “Three-stage irregular convolutional

coded iterative center-shifting K-best sphere detection for soft-decision SDMA-OFDM,” IEEE TVT, vol. 58, no. 4, pp. 2103–2109, May 2009.

  • S. Chen, L. Hanzo, and A. Livingstone, “MBER space-time decision feedback

equalization assisted multiuser detection for multiple antenna aided SDMA systems,” IEEE TSP, vol. 54, no. 8, pp. 3090–3098, Aug. 2006.

  • L. Hanzo, S. Chen, J. Zhang, and X. Mu, “Evolutionary algorithm assisted joint

channel estimation and turbo multi-user detection/decoding for OFDM/SDMA,” IEEE TVT, vol. 63, no. 3, pp. 1204–1222, Mar. 2014.

  • S. Chen, A. Wolfgang, C. J. Harris, and L. Hanzo, “Symmetric RBF classifier for

nonlinear detection in multiple-antenna-aided systems,” IEEE TNN, vol. 19,

  • no. 5, pp. 737–745, May 2008.

8 / 33

slide-9
SLIDE 9

Diverse NOMA contributions

  • S. Chen, A. Livingstone, H. Q. Du, and L. Hanzo, “Adaptive minimum symbol

error rate beamforming assisted detection for quadrature amplitude modulation,” IEEE Trans. Wireless Commun., vol. 7, no. 4, pp. 1140–1145, Apr. 2008.

  • J. Zhang, S. Chen, X. Mu, and L. Hanzo, “Turbo multi-user detection for

OFDM/SDMA systems relying on differential evolution aided iterative channel estimation,” IEEE Trans. Commun., vol. 60, no. 6, pp. 1621–1633, Jun. 2012.

  • J. Zhang, S. Chen, X. Mu, and L. Hanzo, “Joint channel estimation and

multi-user detection for SDMA/OFDM based on dual repeated weighted boosting search,” IEEE Trans. Veh. Technol., vol. 60, no. 7, pp. 3265–3275,

  • Jun. 2011.

C.-Y. Wei, J. Akhtman, S.-X. Ng, and L. Hanzo, “Iterative near-maximum-likelihood detection in rank-deficient downlink SDMA systems,” IEEE Trans. Veh. Technol., vol. 57, no. 1, pp. 653–657, Jan. 2008.

  • A. Wolfgang, J. Akhtman, S. Chen, and L. Hanzo, “Iterative MIMO detection

for rank-deficient systems,” IEEE Signal Process. Lett., vol. 13, no. 11, pp. 699–702, Nov. 2006.

  • L. Xu, S. Chen, and L. Hanzo, “EXIT chart analysis aided turbo MUD designs

for the rank-deficient multiple antenna assisted OFDM uplink,” IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2039–2044, Jun. 2008.

9 / 33

slide-10
SLIDE 10

Diverse NOMA contributions

  • A. Wolfgang, J. Akhtman, S. Chen, and L. Hanzo, “Reduced-complexity

near-maximum-likelihood detection for decision feedback assisted space-time equalization,” IEEE Trans. Wireless Commun., vol. 6, no. 7, pp. 2407–2411,

  • Jul. 2007.
  • J. Akhtman, A. Wolfgang, S. Chen, and L. Hanzo, “An
  • ptimized-hierarchy-aided approximate Log-MAP detector for MIMO systems,”

IEEE TWC, vol. 6, no. 5, pp. 1900–1909, May 2007.

10 / 33

slide-11
SLIDE 11

NOMA Beamforming Example

NOMA Beamforming Example

11 / 33

slide-12
SLIDE 12

Uplink/Downlink Beamforming

Why? Increase of capacity How? Spatially separated interfering signals are suppressed

weight calculation

y = wHx

12 / 33

slide-13
SLIDE 13

MMSE Based Beamforming

Weights are calculated in order to minimize: ǫ(t)2 = wHx(t) − r(t)2 w: Beamformer weights x(t): Channel output r(t): Reference symbol For AWGN channels MMSE weights can be calculated using a closed form expression Realizations: LMS, RLS, SMI

reference sequence calculate weights to minimize MSE 13 / 33

slide-14
SLIDE 14

MSE and BER Surfaces at the Output of a [5 x 2] NOMA Beamformer

Error surfaces at the re- ceiver’s

  • utput

calculated for five BPSK modulated sources having equal re- ceived power and communi- cating over AWGN channels at SNR=10 dB.

  • 2
  • 1.5
  • 1
  • 0.5

0.5 1 1.5 2 Re{w1}

  • 2-1.5-1-0.5 0 0.5 1 1.5 2

Re{w2} 2 4 6 8 10 12 14 MSE

  • 0.5

0.5 1 1.5 2 2.5 Re{w1}

  • 0.5 0 0.5 1 1.5 2 2.5

Re{w2}

  • 6
  • 5
  • 4
  • 3
  • 2
  • 1

log10(BER)

The imaginary part of both weights of the 2-element array was fixed.

14 / 33

slide-15
SLIDE 15

MMSE vs MBER NOMA Beamforming

Test case: BPSK modulated sources having equal received power and communicating over AWGN channels MMSE solution calculated analytically MBER solution obtained with the aid of conjugate gradient algorithm

1e-20 1e-15 1e-10 1e-05 1e+00 5 10 15 20 BER SNR [dB] MMSE 2el MMSE 4el MBER 2el MBER 4el

Scenario S (2el.)

70

  • 15o

80

  • 30
  • 60
  • Scenario

U (4el.)

70

  • 26
  • 80
  • 4
  • 15o

15 / 33

slide-16
SLIDE 16

NOMA SDMA Example

NOMA SDMA Example

16 / 33

slide-17
SLIDE 17

Evolution from CDMA-NOMA to SDMA-NOMA

16 32 48 64 80 96 112 128

Symbol Index

0.0 0.2 0.4 0.6 0.8 1.0

Amplitude

16 32 48 64 80 96 112 128

Symbol Index

0.0 0.2 0.4 0.6 0.8 1.0

Amplitude

16 32 48 64 80 96 112 128

Symbol Index

0.0 0.2 0.4 0.6 0.8 1.0

Amplitude

16 32 48 64 80 96 112 128

Symbol Index

0.0 0.2 0.4 0.6 0.8 1.0

Amplitude

17 / 33

slide-18
SLIDE 18

Quantum-Search Aided MUD in NOMA

Multiple Access SDMA-OFDM Number of Users U = 3 Number of AEs at the BS P = 1 Normalized User-Load UL = Uq/P = 3 Modulation 8-PAM M = 8 Eb/N0 0 dB Channel Code Turbo Convolutional Code, 8 trellis states, R = 1/2 Channel Model Extended Typical Urban (ETU) Mobile Velocity v = 130 km/h Carrier Frequency fc = 2.5 GHz Sampling Frequency fs = 15.36 GHz (77 delay taps) Doppler Frequency fd = 70 Hz Number of Subcarriers Q = 1024 Cyclic Prefix CP = 128 Interleaver Length 10 240 bits per user Channel Estimation Perfect

18 / 33

slide-19
SLIDE 19

Quantum-Search Aided MUD in NOMA

There are 83 = 512 symbols in the full constellation, while 53 and 46 symbols are obtained by the randomly-initialized and ZF-initialized DHA, respectively. The purple circle denotes the random initial input, or the ZF detector’s output, which may be used as an initial input. The ZF is as bad as the random one in this rank-deficient scenario. By using the DHA, we find symbols better than the previously found symbols, which are denoted by the yellow circles in the 3D figure. But we also find symbols that are ”worse” than the previously found symbols, as represented by the blue circles in the 3D figure. The red square is the optimal symbol which is eventually found.

19 / 33

slide-20
SLIDE 20

D¨ urr-Høyer MUD for CDMA/SDMA NOMA - Userload=2

2 User 1 Full Constellation

  • 2
  • 2

User 2 2 1

  • 1
  • 2

2 User 3 2 User 1 Randomly Initialized DHA

  • 2
  • 2

User 2 2 1

  • 1
  • 2

2 User 3

20 / 33

slide-21
SLIDE 21

Quantum Computing Meets MUD

NOMA CDMA vs SDMA

21 / 33

slide-22
SLIDE 22

Iterative Joint Channel & Data Estimation Turbo-Receivers for NOMA

22 / 33

slide-23
SLIDE 23

DS-CDMA vs SDMA NOMA Systems

System 1 System 2 System 3 System 4 Number of Users U = 14 U = 14 U = 15 U = 15 Multiple Access Scheme DS-CDMA SDMA DS-CDMA SDMA Number of AEs at the BS P = 1 P = 7 P = 1 P = 15 Spreading Factor SF = 7 N/A SF = 15 N/A Spreading Codes m-sequences N/A Gold Codes N/A Normalized User Load UL = 2 UL = 2 UL = 1 UL = 1 Bit-based Interleaver Length 42 000 42 000 40 000 40 000 Number of AEs per User NTx = 1 Modulation BPSK M = 2 Channel Code Turbo Code, R = 1/2, 8 Trellis states Iinner = 4 iterations Channel Uncorrelated Rayleigh Channel Channel Estimation Perfect

23 / 33

slide-24
SLIDE 24

D¨ urr-Høyer CDMA/SDMA NOMA AT Userload=2

10−5

2 5

10−4

2 5

10−3

2 5

10−2

2 5

10−1

2 5

BER

3 4 5 6 7 8 9 10 11 12

Eb/N0 per Receive Antenna (dB)

ML MUD DHA QMUD U = 15, P = 15 U = 14, P = 7 U = 15, SF = 15 U = 14, SF = 7 SDMA DS-CDMA 24 / 33

slide-25
SLIDE 25

Milestones of multiple access technologies

FDMA (1G-1980’s) TDMA (2G-1990’s) CDMA (3G-2000’s) OFDMA (4G-2010’s) Multiple Access Technology IDMA (2003) LDS-CDMA (2006) Power-Domain NOMA (2012) BDM (2013) PDMA (2014) LDS-OFDM (2010) SCMA (2013) MUSA (2014) Non-Orthogonal Multiple Access (NOMA) Orthogonal Multiple Access (OMA) SAMA (2014)

Linglong Dai, Bichai Wang, Zhiguo Ding, Zhaocheng Wang, Sheng Chen and Lajos Hanzo: A Survey of Non-Orthogonal Multiple Access for 5G, c IEEE CST

25 / 33

slide-26
SLIDE 26

3D Index modulation

26 / 33

slide-27
SLIDE 27

Social Networking and Caching Aided Collaborative Computing for the Internet of Things by Ai, Wang, Han, Zhang, Hanzo, IEEE Comms. Mag. 2018

C C S Social relationships Idle capability Cooperative caching & computing C S C A B Computational task B Data A

Interest similarity

Cooperative computing Cooperative caching Idle computational capability Used computational capability Idle storage capability Strong social relationship Weak social relationship D2D links U4 U2 U3 U5 U1 U2 U3 U4 U1 U2 U3 U4

[Ci,Si] Idle capability matrix

[C1,S1] [C2,S2] [C3,S3] [C4,S4] NOMA cluster

Tasks & content distribution U1 U2 U3 U5 A S U1 U5 C

[C5,S5]

S C C S

coding

B U4 U5 B1 B2 A1 A2 Computational subtasks B1 B2 Coded data A1 A2

NOMA cluster

A A1 A2 A1 A2 S

27 / 33

slide-28
SLIDE 28

Social relationships

Social Interest Similarity

Social Trust Matrix Idle Capabilities Matrix Cooperative Caching and Computing Scheme

Face-to-face social relationship Online social relationship Strong social interaction Weak social interaction Cooperative caching or computing Modeling

U1 U2 U3 U4 U5 U6 U1

1.0 0.9 0.8 0.8 0.9 0.3

U2

0.8 1.0 0.2 0.3 0.2 0.3

U3

0.9 0.2 1.0 0.1 0.0 0.1

U4

0.9 0.1 0.2 1.0 0.3 0.2

U5

0.9 0.3 0.0 0.4 1.0 0.3

U6

0.2 0.2 0.2 0.1 0.2 1.0 Cluster formation

× × ×

U1 U2 U3 U4 U5 U6 Idle computational capability 1 1 Idle storage capability 1 1 1 1 1 …… capability …… …… …… …… …… ……

U1 U2 U3 U5 U4 U6 U1 U2 U3 U5 U4 U6

28 / 33

slide-29
SLIDE 29

Cache placement based on social relationships

A

1

B

1

A

2

A

3

B

2 Interest G roup A Interest G roup B

Cache P lacement A

1

A

2

A

3 Coded Fragment of Content A

B

1

B

2 Coded Fragment of Content B

A

1

B

1 P opular Content P iece Trusted node Untrusted node 29 / 33

slide-30
SLIDE 30

Exploiting coded caching and NOMA in our proposed framework

N OMA Cluster 1

B

1

B

2

   

U1 U2 U3

N OMA Cluster 2

A

1

A

2

 

Freq uency/ time slot P ow er domain

A

D ata A

B

Computational Task B

D ata P rocessing

   Case 1

Case 2

 Case 3

P oorer channel condition B etter channel condition

’ 1

U

2 ’

U

’ 1

U

2 ’

U

A

Coded Caching D ata Transmission Computational Offloading 30 / 33

slide-31
SLIDE 31

System latency of the proposed framework relying on coded caching versus uncoded caching in a multi-user scenario, where the total number of users is N = 15 and 30.

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

Social Index

0.11 0.12 0.13 0.14 0.15 0.16 0.17

System Latency / s

coded caching, N=15 uncoded caching, N=15 coded caching, N=30 uncoded caching, N=30

31 / 33

slide-32
SLIDE 32

Energy consumption of the proposed framework relying on NOMA exploited and OMA in a multi-user scenario, where the total number of users is N = 15.

0.6 0.65 0.7 0.75 0.8 0.85 0.9 0.95

Power Allocation Factor of User 1

4 4.5 5 5.5 6 6.5 7 7.5 8

System Energy Consumption / J

#10-3

OMA, Si,j=0,SNR1=SNR2=10dB NOMA, Si,j=0,SNR1=SNR2=10dB OMA, Si,j=0.5,SNR1=SNR2=10dB NOMA, Si,j=0.5,SNR1=SNR2=10dB OMA,Si,j=0.5,SNR1=10dB,SNR2=20dB NOMA,Si,j=0.5,SNR1=10dB,SNR2=20dB

32 / 33

slide-33
SLIDE 33

Future 5G network architecture.

Macro cell …… Massive MIMO Small cells

D2D

f

  • Ultra Wideband

(cmWave, mmWave)

  • NOMA

Power f

V2V M2M IoT

Fronthaul ... Cloud RAN

Forwarding Virtualization Software defined networking controller Applications ... IoT Health Safety Telco API

Radio access unit

VR [1] Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan, and L. Hanzo, “Non-Orthogonal Multiple Access for 5G”, Proceedings of the IEEE; Dec 2017. 33 / 33

slide-34
SLIDE 34

Non-Orthogonal Multiple Access

NOMA - A Paradigm Shift for Multiple Access for 5G and Beyond

Zhiguo Ding

School of Electrical and Electronic Engineering, University of Manchester A collaboration with Princeton, SWJTU, and FAU A Tutorial at PIMRC-2020

31 August 2020

slide-35
SLIDE 35

Non-Orthogonal Multiple Access Semi-Grant-Free Transmission

Outline

Semi-Grant-Free Transmission Rethink SIC Designs

slide-36
SLIDE 36

Non-Orthogonal Multiple Access Semi-Grant-Free Transmission

Motivations for Semi-Grant-Free Transmission (1/3)

Why is NOMA important to 5G and beyond:

eMBB: Improve the system throughput for downlink and uplink without consuming extra bandwidth URLLC: Users do not have to wait for a long time to be served even if there are not sufficient orthogonal resource blocks mMTC: Encouraging users to share their bandwidth resources instead of solely occupying them

Extensive studies have been done for the application of NOMA to eMBB, but not to URLLC and mMTC Let’s focus on grant-free transmission

An important feature to be supported in URLLC and mMTC

  • Z. Ding, R. Schober, P. Fan, and H. V. Poor, “Simple Semi-Grant-Free Transmission Strategies Assisted by

Non-Orthogonal Multiple Access”, IEEE Trans. Wireless Commun., 2019.

slide-37
SLIDE 37

Non-Orthogonal Multiple Access Semi-Grant-Free Transmission

Motivations for Semi-Grant-Free Transmission (2/3)

Use mMTC as an example. Charateristics: small data packets, low power consumption, and low cost. Requirements: 1 million devices/km and 100 billion connections in total. The use of grant-based protocols means that lengthy handshaking is needed for each user

Result in large latency and poor spectral efficiency.

slide-38
SLIDE 38

Non-Orthogonal Multiple Access Semi-Grant-Free Transmission

Motivations for Semi-Grant-Free Transmission (3/3)

Importance of grant-free transmission

A user is encouraged to transmit whenever it has data to send, without getting the grant from its base station. The lengthy handshaking process is avoided and signalling

  • verhead can be reduced

Challenges to realize grant-free transmission

Existing solutions based on massive MIMO or NOMA are special cases of random access, where the base station is not involved in multiple access (scheduling). Therefore, the number of users admitted to the same channel cannot be not controlled (excessive users → failure of MUD). Blind user activity identification and blind channel estimation are needed. Limited channels are reserved for grant-free transmission.

slide-39
SLIDE 39

Non-Orthogonal Multiple Access Semi-Grant-Free Transmission

Semi-Grant-Free Transmission (1/3)

Grant-based user Grant-free user Grant-free user Grant-free user Grant-free user Grant-free user

A semi-grant-free scenario is considered. Example of a grant-based user: a sensor for healthcare monitoring or critical care. Example of a grant-free user: a sensor for power meters or environmental monitoring An important scenario to consider

All the channels available in the network, even if they have been reserved by grant-based users, can be used for grant-free transmission Massive connectivity can be supported spectrally efficiently.

slide-40
SLIDE 40

Non-Orthogonal Multiple Access Semi-Grant-Free Transmission

Semi-Grant-Free Transmission (2/3)

Two semi-grant-free transmission strategies can be developed: Open-loop contention control

The base station broadcasts a threshold to the users and sets the criterion for the users to be qualified for transmission A strategy similar to random beamforming No need to know the users’ channels at the base station Compared to grant-based transmission, less signalling overhead is consumed by SGF

All the users which satisfy the criterion are granted to transmit without going through the individual handshaking process.

Compared to grant-free transmission, the number of the users admitted to the same channel in SGF can be carefully controlled

Avoid the failure of MUD due to excessive users.

slide-41
SLIDE 41

Non-Orthogonal Multiple Access Semi-Grant-Free Transmission

Semi-Grant-Free Transmission (3/3)

Distributed contention control

What is distributed contention control?

Once the contention time window starts, each user chooses a backoff value τm τm is a strictly decreasing (or increasing) function of the user’s channel gain A user transmits a beacon to the base station after τm expires, under the condition that τm is smaller than the time window.

A fixed number of users with the desirable channel conditions are granted to transmit.

The number of the users admitted by open-loop control is still random Avoid the failure of MUD due to excessive users The performance of the grant-based user can be strictly guaranteed, at a price of more signal overhead, compared to

  • pen-loop control.
slide-42
SLIDE 42

Non-Orthogonal Multiple Access Rethink SIC Designs

Outline

Semi-Grant-Free Transmission Rethink SIC Designs

slide-43
SLIDE 43

Non-Orthogonal Multiple Access Rethink SIC Designs Existing SIC Strategies

Channel State Information (CSI)-Based SIC (1/2)

An uplink communication scenario with (M + 1) users (Um ) Two-user power-domain NOMA is the most famous example

Un, 1 ≤ n ≤ M, is paired with U0 Two users transmit simultaneously Assume |hn|2 ≥ |h0|2, where hm denotes Um’s channel. The base staton decodes Un’s signal first, remove it and then decode Um’s signal. Data rates of NOMA are RN

n = log

  • 1 +

P|hn|2 1 + P|h0|2

  • ,

(1) and RN

0 = log

  • 1 + P|h0|2

, (2) Data rates of OMA are RO

i

= 1

2 log

  • 1 + PO|hi|2

, i ∈ {0, n}

slide-44
SLIDE 44

Non-Orthogonal Multiple Access Rethink SIC Designs Existing SIC Strategies

Channel State Information (CSI)-Based SIC (2/2)

Advantages

Consider the extreme case h0 → 0. The sum rate of NOMA can be approximated as follows: RN

sum = RN 0 + RN n −

h0→0 log

  • 1 + P|hn|2

− →

P→∞ log P,

(3) which is almost two times the sum rate of OMA, RO

sum RO 0 + RO n → 1 2 log P. (P = 1 2PO is assumed.)

Disadvantages

A user whose signal is decoded first suffers from severe interference ⇒ QoS deteriorates ⇒ difficult to be generalized Users’ channels need to be sufficiently different in order to yield a reasonable performance gain over OMA

slide-45
SLIDE 45

Non-Orthogonal Multiple Access Rethink SIC Designs Existing SIC Strategies

Quality of Service (QoS)-Based SIC (1/3)

Cognitive radio inspired (CR) NOMA is a good example

U0 is a delay-sensitive user with a low target data rate (R0) In OMA, U0 is allowed to occupy a dedicated resource block In CR-NOMA, U0 → Primary user, Un → Secondary user, A secondary user, Un, 1 ≤ n ≤ M, is scheduled if log

  • 1 +

P|h0|2 1 + P|hn|2

  • ≥ R0.

(4) If (??) is feasible, the first stage of SIC is guaranteed to be successful, and Un’s achievable data rate is given by RCR

n

= log

  • 1 + P|hn|2

. (5)

Rationale behind the used SIC order

The user whose signal os decoded first suffer interference ⇒ the user’s achievable data rate will be small. This is OK. Un has no interference. Un’s data rate constitutes the performance gain of CR-NOMA over OMA ⇒ unbounded.

slide-46
SLIDE 46

Non-Orthogonal Multiple Access Rethink SIC Designs Existing SIC Strategies

Quality of Service (QoS)-Based SIC (2/3)

Example 1:

Assume that there are M delay-sensitive users to be served at low data rates, and one delay-tolarent user. In OMA, (M + 1) time slots are needed to serve these users. With NOMA, all users are served in a single time slot ⇒ spectral efficiency improved (M + 1) times

Example 2:

h0 = hn = h, where CSI-based SIC fails With QoS-based SIC, the sum rate gain of NOMA over OMA is ∆sum =10 log

  • 1 + P|h|2

, (6) where 10 is an indicator function, i.e., 10 = 1 if log

  • 1 +

P|h|2 1+P|h|2

  • ≥ R0, otherwise 10 = 0.

In Rayleigh fading, we have P(10 = 1) → 1, for P → ∞. Therefore, ∆sum → ∞, for P → ∞

slide-47
SLIDE 47

Non-Orthogonal Multiple Access Rethink SIC Designs Existing SIC Strategies

Quality of Service (QoS)-Based SIC (3/3)

The implications of the channel conditions It is possible that U0’s channel conditions are weaker than Un’s, i.e., |h0|2 < |hn|2. This leads to the common question whether this situation results in a decoding failure.

Correct decoding depends on whether the data rate supported by the channel is larger than the target data rate. As long as this condition holds, the use of error correction coding can ensure correct decoding, even if the signal strength is weaker than the interference strength. Error correction coding injects redundant information, which reduces the information data rate. But if U0’s target data rate is small, a significant amount of redundant information can be added. For example, for the case of R0 = 0.1 bits/s/Hz, a repetition code with a code rate of

1 10 is affordable, where one bit is

repeated 10 times.

slide-48
SLIDE 48

Non-Orthogonal Multiple Access Rethink SIC Designs Existing SIC Strategies

Dilemma Faced By These Strategies (1/2)

Same system setup

U0 ⇒ Primary user One of the M secondary users is admitted to U0’s channel. Assume the secondary users are ordered as |h1|2 ≤ · · · ≤ |hM|2

CSI-based SIC

Schedule the strongest user (UM) to pair with U0 Decode UM’s signal ⇒ Decode U0’s signal UM needs to use the following data rate for its transmission RCSI

M

= log

  • 1 +

P|hM|2 1 + P|h0|2

  • .

(7) Pros: multi-user diversity exploited; U0’s QoS guaranteed Cons: exhibits error floors in outage probability P

  • log
  • 1 +

P|hM|2 1 + P|h0|2

  • < Rs

P→∞ P

  • log
  • 1 + |hM|2

|h0|2

  • < Rs
slide-49
SLIDE 49

Non-Orthogonal Multiple Access Rethink SIC Designs Existing SIC Strategies

Dilemma Faced By These Strategies (2/2)

QoS-based SIC

Decode U0’ signal ⇒ Decode the secondary user’s signal Schedule a weak user (U1) yielding the following data rate: RQoS

1

= log(1 + |h1|2P), (8) if log

  • 1 +

P|h0|2 1+P|h1|2

  • > R0, otherwise RQoS

1

= 0. Pros: RQoS

1

is interference free; Cons: loss of multi-user diversity; exhibits error floors in

  • utage probability

P

  • log
  • 1 +

P|h0|2 1 + P|h1|2

  • < R0
  • (9)

+ P

  • log
  • 1 +

P|h0|2 1 + P|h1|2

  • > R0, log
  • 1 + P|h1|2 < Rs
  • .
slide-50
SLIDE 50

Non-Orthogonal Multiple Access Rethink SIC Designs Existing SIC Strategies

Dilemma Faced By These Strategies - Simulation

5 10 15 20 25 30

Transmit SNR in dB

10-2 10-1 100

Admitted User’s Outage Probability

CSI-based, M=1 QoS-based, M=1 CSI-based, M=5 QoS-based, M=5 CSI-based, M=10 QoS-based, M=10 Outage performance achieved by NOMA transmission with the two types of SIC. Independent and identically distributed (i.i.d.) Rayleigh fading is assumed for the users’ channel gains. R0 = 0.2 bits/s/Hz, and Rs = 1 bits/s/Hz.

QoS-based SIC performs better in the high SNR region. Increasing M helps to improve the performance of CSI-based SIC. It seems that removing error floors is a mission impossible.

slide-51
SLIDE 51

Non-Orthogonal Multiple Access Rethink SIC Designs Hybrid SIC Strategy

Hybrid SIC (1/2)

Same system setup

U0 ⇒ Primary user One of the M secondary users is admitted to U0’s channel.

First set a threshold for the secondary users’ channels τ = max

  • 0,

|h0|2 2R0 − 1 − 1 P

  • .

(10) By using the threshold, the M secondary users can be divided into two groups:

S1 contains the strong users, i.e., |hn|2 > τ and can support CSI-based SIC only ⇒ R1

n = log

  • 1 +

P|hn|2 1+P|h0|2

  • , for n ∈ S1.

S2 contains the weak users, i.e., |hn|2 < τ, and can support either of the two SIC decoding orders ⇒ max

  • log
  • 1 +

P|hn|2 1+P|h0|2

  • , log(1 + P|hn|2)
  • , for n ∈ S2.
slide-52
SLIDE 52

Non-Orthogonal Multiple Access Rethink SIC Designs Hybrid SIC Strategy

Hybrid SIC (2/2)

The considered SIC scheme can be viewed as a hybrid version

  • f CSI- and QoS-based SIC, since both decoding orders can

be used. Error floors can be avoided by using this hybrid SIC We used to believe that swapping SIC decoding orders is trivial and does not yield a significant performance gain. Dynamically switching the SIC decoding order can achieve a surprising performance improvement that cannot be realized by the two conventional schemes. Distributed contention control can be applied to ensure that user scheduling is accomplished in a distributed manner.

  • Z. Ding, R. Schober, and H. V. Poor, “A New QoS-Guarantee Strategy for NOMA Assisted Semi-Grant-Free

Transmission”, IEEE TWC (submitted).

  • Z. Ding, R. Schober, and H. V. Poor, “Unveiling the Importance of SIC in NOMA Systems: Part I & II ”, IEEE

Communications Letters (invited paper)..

slide-53
SLIDE 53

Non-Orthogonal Multiple Access Rethink SIC Designs Hybrid SIC Strategy

Hybrid SIC - Simulation (1/2)

5 10 15 20 25 30

Transmit SNR in dB

10-4 10-3 10-2 10-1 100

Admitted User’s Outage Probability

CSI-based QoS-based Hybrid Solid lines: M=1 Dash-dotted lines: M=5 The performance achieved by NOMA transmission with the three types of SIC. I.i.d. Rayleigh fading is assumed for the users’ channel

  • gains. R0 = 0.2 bits/s/Hz, and Rs = 1 bits/s/Hz.

Outage probabilities are used as criteria. Both CSI and QoS-based SIC suffer error floors. A mission impossible is accomplished by hybrid SIC.

slide-54
SLIDE 54

Non-Orthogonal Multiple Access Rethink SIC Designs Hybrid SIC Strategy

Hybrid SIC - Simulation (2/2)

5 10 15 20 25 30

Transmit SNR in dB

2 4 6 8 10

Sum Rate Gain

CSI-based QoS-based Hybrid Solid lines: M=1 Dash-dotted lines: M=5

The performance achieved by NOMA transmission with the three types of SIC. I.i.d. Rayleigh fading is assumed for the users’ channel

  • gains. R0 = 0.2 bits/s/Hz, and Rs = 1 bits/s/Hz.

Ergodic rates are used as criteria. Hybrid SIC realizes the best performance. Increasing M helps to improve the performance of CSI-based SIC. QoS-based SIC outperforms CSI-based SIC.

slide-55
SLIDE 55

Non-Orthogonal Multiple Access Rethink SIC Designs Applications of Hybrid SIC

Outline

Semi-Grant-Free Transmission Rethink SIC Designs

slide-56
SLIDE 56

Non-Orthogonal Multiple Access Rethink SIC Designs Applications of Hybrid SIC

Applications of Hybrid SIC (1/2)

The following findings are important Using more than one SIC orders is not trivial. A simple strategy to switch between different SIC designs yields a surprising performance improvement that cannot be realized by the two conventional designs. In the second part of our invited paper at CL, we used NOMA assisted mobile edge computing (NOMA-MEC) as an example Conventional NOMA-MEC decides SIC according to the users’

  • ffloading deadlines

With such a fixed SIC design, we previously learned that the gain of NOMA over OMA is related to the deadlines Hybrid SIC has been shown to be applicable to NOMA-MEC Better gain is realized, and the gain is related to Tx powers. So these findings are useful not only for performance analysis but also

slide-57
SLIDE 57

Non-Orthogonal Multiple Access Rethink SIC Designs Applications of Hybrid SIC

Applications of Hybrid SIC (2/2)

Fundamentals of hybrid SIC Green communications User clustering and resource allocation Multiple-input multiple-output (MIMO) and intelligent reflecting surface (IRS) assisted NOMA Emerging applications of NOMA

slide-58
SLIDE 58

Non-Orthogonal Multiple Access Rethink SIC Designs Applications of Hybrid SIC

Thank you for your attention!

Email: zhiguo.ding@manchester.ac.uk

slide-59
SLIDE 59

Intelligent Massive NOMA towards 6G Tutorials of PIMRC2020, London, UK

  • Dr. Yuanwei Liu, Prof. Zhiguo Ding and Prof. Lajos Hanzo

Queen Mary University of London, UK The University of Manchester, UK University of Southampton, UK yuanwei.liu@qmul.ac.uk zhiguo.ding@manchester.ac.uk hanzo@soton.ac.uk

  • Aug. 31st, 2020

1 / 42

slide-60
SLIDE 60

Outline

1 Power-Domain NOMA Basics 2 Signal Processing Advances for NOMA: A Machine Learning

Approach

3 Emerging Applications for NOMA

Emerging Applications for NOMA: Exploiting NOMA in UAV Networks Emerging Applications for NOMA: Interplay Between RIS/IRS and NOMA Networks

2 / 42

slide-61
SLIDE 61

Power-Domain NOMA Basics

User m detection User n detection User n Subtract user m’s signal BS User m User m detection Superimposed signal of User m and n SIC Power Frequency User n User m Time

1 Supports multiple access within a given resource block

(time/frequecy/code), using different power levels for distinguishing/separating them [1].

2 Apply successive interference cancellation (SIC) at the

receiver for separating the NOMA users [2].

3 If their power is similar, PIC is a better alternative.

[1] Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan, and L. Hanzo, “Non-Orthogonal Multiple Access for 5G”, Proceedings of the IEEE; Dec 2017. (Web of Science Hot paper) [2] Z. Ding, Y. Liu, J. Choi, Q. Sun, M. Elkashlan, Chih-Lin I, and H. V. Poor (2017), “Application of Non-orthogonal Multiple Access in LTE and 5G Networks”, IEEE Communication Magazine;(Web of Science Hot paper, Top 5 Most Popular Article on Commun. Mag.). 3 / 42

slide-62
SLIDE 62

Signal Processing Advances for NOMA: A Machine Learning Approach

Raw Data Sets

Live streaming data Social media data

Proposed Unified Machine Learning Framework

Feature extraction Features Neural networks Reinforcement learning Data modelling Prediction/

  • nline

Refinement Data modelling Prediction/

  • nline

Refinement Periodically update

Applications

Raw input UAV comunication AD control MENs provisioning Predicted behaviors

Fig.: Artificial intelligent algorithms for wireless communications.

[1] Y. Liu, S. Bi, Z. Shi, and L. Hanzo, “When Machine Learning Meets Big Data: A Wireless Communication Perspective”, IEEE Vehicular Communication Magazine, accept to appear, https://arxiv.org/abs/1901.08329. 4 / 42

slide-63
SLIDE 63

System Model and Problem Formulation: Cache-Aided NOMA MEC

MEC server Task computation results caching storage Step 2: Task computing Step 3: Task computation results caching Step 1: Task

  • ffloading decision

Access point User 1 User 2 User Nu-1 User Nu

2

x

1

x

1 2

, , ,

t

N

z z Z z é ù = ë û ù û ,

t

Nt ù

,

N

z ,

1

u

N

x

  • u

N

x

1 2

, , ,

u

N

Y y y y é ù = ë ûZ ù û

u

Nu

y , ù

N

y ,

1 2

, , ,

u

N

X x x x é ù = ë û ù û ,

u

Nu

x , ù

N

x ,

1 2

, , ,

u

N

p p P p é ù = ë û ù û

u

Nu

p , ù

N

p ,

Fig.: An illustration of a multi-user cache-aided MEC.

Multiple users are served by

  • ne MEC server.

The computation tasks are capable of being computed locally at the mobile devices

  • r in the MEC server.

The computation results are selectively cached in the storage of the MEC server.

[1] Z. Yang, Y. Liu, Y. Chen, N. Al-Dhahir, “Cache-Aided NOMA Mobile Edge Computing: A Reinforcement Learning Approach”, IEEE Transactions on Wireless Communications, accept, https://arxiv.org/abs/1906.08812. 5 / 42

slide-64
SLIDE 64

System Model: Communication Model

The user with higher channel gain is decoded first, the signal-to-interference-plus-noise ratio (SINR) for user i at time t can be given by Ri (t) = Blog2

     

1 + ρi (t) |hi (t)|2

Nup

  • l=i+1

ρl (t) |hl (t)|2 + σ2

     

, (1) Accordingly, the offloading time for task j with input size πj at time t is Toffload

i,j

(t) = πj Ri (t). (2) Meanwhile, the transmit energy consumption of offloading at time t is given by Eoffload

i,j

(t) = ρi πj Ri (t). (3)

6 / 42

slide-65
SLIDE 65

System Model: Computation Model

Local Computing: The computing time Tloc

i,j and energy

consumption Eloc

i,j for task j with computational requirement

ωj are Tloc

i,j = ωj

ωloc

i

. (4) Eloc

i,j = Ploc i

ωj ωloc

i

. (5)

ωloc

i

: the local computing capability, Ploc

i

: the energy consumption per second.

MEC Computing: The computing time Tmec

i,j

(t) and energy consumption Emec

i,j

(t) are Tmec

i,j

(t) = ωj yi (t) CMEC . (6) Emec

i,j

(t) = Pmec ωj yi (t) CMEC . (7)

yi: the proportion of the computing resources allocated from the MEC server, Pmec: the energy consumption per second at MEC server.

7 / 42

slide-66
SLIDE 66

Problem Formulation

The sum energy consumption is Ei (t, xi (t) , yi (t) , fi (t) , ρi (t)) =

  • (1 − yi(t))
  • xi(t)Eloc

i,j + (1 − xi(t))

  • Eoffload

i,j

(t) + Emec

i,j

(t)

  • .

(8) The optimization problem is (P1) min

X,Y ,F,P T

  • t=1

Nu

  • i=1

Ei (t, xi (t) , yi (t) , fi (t) , ρi (t)), (9a) s.t. C1 : xi (t) ∈ {0, 1} , ∀i ∈ N, (9b) C2 : yi (t) ∈ {0, 1} , ∀i ∈ N, (9c) C3 :

  • i∈Nu fi (t) ≤ F,

(9d) C4 :

  • i∈Nu pi (t) ≤ Pi,

(9e) C5 : Toffload

i,j

(t) + Tmec

i,j

(t) ≤ T, ∀t ∈ [1, T] . (9f)

8 / 42

slide-67
SLIDE 67

Feature Extraction: Neural Networks (NN) for Prior Information Prediction

Time series episode Time series (user mobility/task popularity) Networks input time windows

Network outputs: user mobility/task popularity in the future

Resource allocation in AI-driven NOMA F-RANs

Network inputs: user mobility/task popularity in the history RNNs/LSTM networks

s s tanh s tanh s s tanh s tanh s s tanh s tanh

Fig.: Recurrent neural networks for user mobility/content popularity prediction.

The expert fitting characteristic of NN enables the ability of predicting time series. We invoke recurrent neural networks (RNNs)/long-short term memory (LSTM) networks for their skills of processing time-sequential data using internal memory units.

9 / 42

slide-68
SLIDE 68

Resource allocation: From the Formulated Problem to Reinforcement Learning Model

A Markov decision process (MDP) model is a tuple S, A, R.

1 Objective: maximize the sum reward

Vπ(s) = Eπ

  • t=0

γtrt |s0 = s

  • f a trajectory

s0

a1|r1

→ s1

a2|r2

→ s2 · · ·

an|rn

→ sn.

2 State space (S):

s (t) = [x (t) , y (t) , f (t) , ρ (t)] ∈ S = X × Y × F × ρ.

3 Action space (A):

a (t) = [∆x (t) , ∆y (t) , ∆f (t) , ∆ρ (t)] ∈ A.

4 Reward function (r): the sum energy consumption of taking

an action on a state rt = −

Nu

  • i=1

Ei (t, a (t) |s (t)).

10 / 42

slide-69
SLIDE 69

How to define State and Action Space? From Maze to the Proposed Framework

State Space: High dimensional matrix related to the parameters in the objective function. Action Space: Moving granularity in each element of the state space.

Maze game UAV trajectory Cache-Aided NOMA MEC State Space Action Space 2 Dimensional 3 Dimensional 4 Dimensional

( ) ( ) ( )

, s t x t y t = é ù ë û Î = ´ S X Y ( ) ( ) ( ) ( ) , , s t x t y t z t = é = ù ë Î ´ û ´ S X Y Z

( ) ( ) ( ) ( ) ( )

, , , s t x t y t f t t J r = é = ´ ù ë û Î ´ ´ S X Y F

( ) ( ) ( ) ( ) ( )

, , , a t x t y t f t t r = D D D D é ù ë û

( ) ( ) ( ) ( )

, , a t x t y t z t = D D D é ù ë û

( ) ( ) ( )

, a t x t y t = D D é ù ë û

Fig.: Setting of state and action space.

11 / 42

slide-70
SLIDE 70

Reinforcement Learning Model

The goal of reinforcement learning is to find an optimal policy that maximize the long-term sum rewards: π∗ = arg max

π

E

  • t=0

γtrt |π

  • .

(10) Policy π: a function from state to action that specifies what action to take in each state. The Q-value function is adopted to measure the performance of the policy. Q∗ (s, a) = max

π

E

  • t=0

γtrt |s = s0, a = a0, π

  • .

(11) The optimal Q-value function satisfies the Bellman Equation Q∗ (s, a) = Es′∼ε

  • r + γ max

a′ Q∗ s′, a′ |s, a

  • .

(12)

12 / 42

slide-71
SLIDE 71

How does the Intelligent Agent Learn?

st+1 st+2 st at+1 a1t at+2 rt rt+1 rt+1

… …

Q3(st,at)=0 Q1(st,at)=2 Q2(st,at)=1 a2t a3t

Fig.: Q-learning flow.

The agent takes action a1

t , because the corresponding Q value

Q1 (st, at) is max.

13 / 42

slide-72
SLIDE 72

The Learning Results: A Maze Case Example

Random policy before learning Optimal policy after training

Fig.: Q-learning expected result (star represents the treasure).

After learning, we obtain the optimal action for each state.

14 / 42

slide-73
SLIDE 73

Resource Allocation: The Proposed Reinforcement Learning for Cache-Aided NOMA MEC

Action 1 Action 2 Action N BLA based MAQ-learning in cache-aided NOMA-MEC networks Agent 1 (User 1) Agent 2 (User 2) Agent N (User N) State 1 State 2 State N Reward 1 Reward 2 Reward N Reward 1 Reward 2 Reward N BLA based action selection scheme BLA based action selection scheme BLA based action selection scheme BLA based action selection scheme BLA based action selection scheme BLA based action selection scheme

Fig.: Bayesian learning automata based multi-agent Q-learning for resource allocation.

Each mobile user is set as a intelligent agent. BLA is capable of obtaining

  • ptimal action for two

action case. The multiple intelligent agents operate in a selflish manner.

15 / 42

slide-74
SLIDE 74

Numerical Results: Feature Extraction (RNNs for User Mobility Prediction)

Start point Tremble1 Corner1 Corner2 Corner3 End point Tremble2

Fig.: User trajectory in Google Maps.

  • 600
  • 500
  • 400
  • 300
  • 200
  • 100

100 200 300 X/(m) 500 1000 1500 2000 Y/(m) User position prediction

  • 500
  • 480
  • 460
  • 440

1850 1900 1950

  • 160
  • 140
  • 120
  • 100

1100 1150 1200 1250

Start point End point

Fig.: Comparison between real user trajectory and predicted trajectory.

16 / 42

slide-75
SLIDE 75

Numerical Results: Resource Allocation (the proposed Reinforcement Learning Algorithm

Fig.: Total energy consumption vs. the computation capacity of the AP. Fig.: Total transmit energy consumption

  • vs. cache capacity of the AP..

17 / 42

slide-76
SLIDE 76

Emerging Applications for NOMA: Exploiting NOMA in UAV Networks

U1 U2

U2 signal detection U2 signal detection U1 signal detection Frequency Power U1 U2 Time Flying trajectory

UAV User

Subtract U2 signal SIC A B

[1] Y. Liu, Z. Qin, Y. Cai, Y. Gao, G. Ye Li, and A. Nallanathan, “UAV Communications Based on Non-Orthogonal Multiple Access”’, IEEE Wireless Communications, vol. 26, no. 1, pp. 52-57, Feb. 2019. 18 / 42

slide-77
SLIDE 77

Single UAV: MIMO-NOMA UAV Networks

z

  • x
  • h

Origin

  • Rm

Rd

  • Beamforming

directions

1) There are probabilistic line-of-sight links. 2) The small-scale fading follows Nakagami fading or Rice fading. 3) The height of UAV can be a random variable or any arbitrary value.

[1] T. Hou, Y. Liu, Z. Song, X. Sun, Y. Chen, “Multiple Antenna Aided NOMA in UAV Networks: A Stochastic Geometry Approach”, IEEE Transactions on Communications, vol. 67, no. 2, pp. 1031-1044, Feb. 2019. 19 / 42

slide-78
SLIDE 78

Frome Single UAV to Multiple UAVs: NOMA enabled UAV Communications

Transmitting UAV user NOMA Near user signal detection Far user signal detection SIC of far user signal h

Fig.: An illustration of NOMA UAV in Cellular Networks.

Massive UAV-BSs are located in the sky. Users are located on the ground NOMA technique is deployed. User-association is complicated.

[1] T. Hou, Y. Liu, Z. Song, X. Sun, Y. Chen, “Exploiting NOMA for Multi-UAV Communications in Large-Scale Networks”, IEEE Transactions on Communications, accept to appear. 20 / 42

slide-79
SLIDE 79

NOMA enabled UAV Communications—User-centric Scenario

  • 1000
  • 800
  • 600
  • 400
  • 200

200 400 600 800 1000 X coodinate(m)

  • 1000
  • 800
  • 600
  • 400
  • 200

200 400 600 800 1000 Y coodinate(m) Users UAVs Typical user Nearest UAV

Fig.: The proposed user-centric Scenario, which is a potential solution for emergency communications.

Ground users and UAVs are distributed according to HPPP. All the ground users must be served. Association is decided by users according to distance.

21 / 42

slide-80
SLIDE 80

NOMA enabled UAV Communications—UAV-centric Scenario

  • 800
  • 600
  • 400
  • 200

200 400 600 800 1000 X coodinate(m)

  • 1000
  • 800
  • 600
  • 400
  • 200

200 400 600 800 1000 Y coodinate(m) Users UAVs Far user Near user Nearest UAV UAV at origin

Fig.: The proposed UAV-centric Scenario, which is a potential solution for offloading communications.

Ground users and UAVs are distributed according to HPPP. UAV only provides access services to users located in hot spot areas. This is supplementary communications.

22 / 42

slide-81
SLIDE 81

NOMA UAV-to-Everything (U2X) Networks

NOMA

z x y D R

UAV NOMA OMA UAV

User Vehicle

Fig.: The illustration of NOMA enhanced UAV-to-Everything networks.

Users or receivers are located

  • n the ground or in the sky.

The coverage space is a sphere. NOMA is deployed.

[1] T. Hou, Y. Liu, Z. Song, X. Sun, Y. Chen, “Non-Orthogonal Multiple Access in UAV-to-Everything (U2X) Networks”, IEEE Internet of Things, accept to appear, https://arxiv.org/abs/1907.05571. 23 / 42

slide-82
SLIDE 82

Air-to-Ground NOMA: Trajectory Design and Resource Allocation

  • GBS 1

Desired Links Interference Links

I

q

F

q

1

b

GBS 2 2

b

GBS 3 3

b

GBS M M

b

1

u

2

u

3

u

M

u y x z

U

H

A rotary-wing UAV has a mission of travelling from an predefined initial location qI to a final location qF, while uploading specific information bits to M GBSs.

[1] X. Mu, Y. Liu, L. Guo, and J. Lin, “Non-Orthogonal Multiple Access for Air-to-Ground Communication”, IEEE Transactions on Communications, accept, https://arxiv.org/abs/1906.06523. 24 / 42

slide-83
SLIDE 83

System Model

The instantaneous coordinate of the UAV is denoted as

  • x (t) , y (t) , HU

, 0 ≤ t ≤ T. The coordinate of GBS m is fixed at

  • xG

m, y G m, HG

and its served GUE is located at (xm, ym, 0). We denote q (t), bm and um as the horizontal coordinates of the above locations The line-of-sight (LOS) channel power gain between the UAV and mth GBS at time instant t is

  • hUAV

m

(t)

  • 2 =

ρ0 (HU−HG)2+q(t)−bm2

The rayleigh fading channel power gain between GUE j and GBS m is

  • hUE

j,m

  • 2 = gUE

j,m10−

LUE j,m 10

A binary variable am (t) ∈ {0, 1} is defined to represent the UAV-GBS association state at time instant t.

25 / 42

slide-84
SLIDE 84

Optimization Problem

The considered UAV mission complete time minimization problem: (P1) : min

Q,A,T

T (13a) s.t. q (0) = qI, (13b) q (T) = qF, (13c) ˙ q (t) ≤ Vmax, 0 ≤ t ≤ T, (13d) Um ≥ Um, m ∈ MBS, (13e) am (t) q (t) − bm2 ≤ DNOMA

m

, ∀m ∈ MBS, 0 ≤ t ≤ T, (13f) q (t) − bm2 ≥ (1 − am (t)) DQoS

m

, ∀m ∈ MBS, 0 ≤ t ≤ T, (13g)

M

  • m=1

am (t) = 1, 0 ≤ t ≤ T, (13h) am (t) ∈ {0, 1} , ∀m ∈ MBS. (13i)

26 / 42

slide-85
SLIDE 85

Optimization Problem

Constraints (13b)-(13d) are the UAV mobility constraints. Constraint (13e) are the required UAV uploading information bits of each GBSs. Constraints (13f) and (13g) represent the UAV is required stay in the specific feasible regions when it is associated with different GBSs. Constraints (13h) means the UAV need to maintain connectivity during T and associate with at most one GBS at each time instant. There are two main reasons that make Problem (P1) is challenging to solve. First, (P1) is a mixed integer non-convex problem due to the non-convex constraints (13e) and integer constraints (13i). Constraints (13f) and (13g) further make Q and A coupled together. Second, the UAV trajectory Q and the UAV-GBS association vectors A are continuous functions of t, which make (P1) involve infinite number of

  • ptimization variables.

27 / 42

slide-86
SLIDE 86

Proposed Solutions: Fly-Hover-Fly Scheme

Theorem 1: Without lose of optimality to (P1), the optimal UAV trajectory can be assumed to be following fly-hover-fly structure: Except hovering at specific locations, the UAV travels at maximum speed Vmax. Based on Theorem 1, the total mission completion time of (P1) can be expressed as T (Dfly) = Tfly + Thover =

M

  • m=1
  • Dfly,m

Vmax + Um − Ufly,m Rhover,m

  • = Dfly

Vmax +

M

  • m=1
  • Um − Ufly,m

Rhover,m . (14) where Dfly,m is the total travelling distance when UAV is associated with GBS m, Utr,m is the UAV uploaded information bits to GBS m during travelling through Dfly,m and Rhover,m is the communication rate when UAV is associated with GBS m and hovers at the corresponding optimal location.

28 / 42

slide-87
SLIDE 87

Numerical Results

  • 1000
  • 500

500 1000 1500 2000 2500 3000 3500 x (m)

  • 1500
  • 1000
  • 500

500 1000 1500 y (m) Uplink NOMA Zone QoS Protected Zone θ =0.3 UAV trajectory θ =0.3 QoS Protected Zone θ =0.9 UAV trajectory θ =0.9

“△” are the locations of GBSs. “♦” is the UAV initial location. “⋆” is the UAV final location. Higher QoS requirements contribute larger QoS protected zones. When θ = 0.3 bit/s/Hz, the designed UAV trajectory (green line) is only composed of several line segments. It is due to the fact that smaller DQoS

m

  • impose

little constraints on UAV trajectory design.. When θ = 0.9 bit/s/Hz, the UAV trajectory (black line) is designed to exactly avoid the GUE QoS protected regions to have a shortest travelling distance.

29 / 42

slide-88
SLIDE 88

Numerical Results

50 100 150 200 250 300 350 400 Required uplodaing information bits U (Mbits) 100 200 300 400 500 600 700 800 UAV Mission Completion Time (s) OMA based scheme[9] proposed Fly-Hover-Fly NOMA scheme θ =0.3, 0.9 NOMA OMA

The proposed NOMA scheme significantly outperforms OMA scheme when U increase due to the spectrum sharing, which implies the proposed scheme is suitable for rate demanding UAV communication. When θ increases, the UAV mission completion time increases for same U. This is due to the increase of θ impose more constraints on the UAV trajectory design and enlarge the minimum UAV travelling distance.

30 / 42

slide-89
SLIDE 89

MIMO-Reflecting Intelligent Surfaces (RISs) Networks

Motivation

This is Next Generation Relay Networks. Meet the diversified demands of services and applications of smart communications, e.g., receivers on the died-zones or in the sky by controllable reflections. Provide stronger received power for mobile devices. Provide interference cancellation services for mobile devices.

Challenges

Multiple antennas are equipped on both BS and Users. How multiple RISs reflect received signals? We have to design Active beamforming (also called precoding matrix) at the BS, passive beamforming at RISs, detection vectors at users.

[1] T. Hou, Y. Liu, Z. Song, X. Sun, Y. Chen and L. Hanzo, “Reconfigurable Intelligent Surface Aided NOMA Networks”, IEEE Journal on Selected Areas in Communications; accept to appear, https://arxiv.org/abs/1910.13636. 31 / 42

slide-90
SLIDE 90

Interplay Between IRS and NOMA Networks

Motivations IRS-aided communication: low cost, programmable wireless environment, spectrum and energy efficiency enhancement. NOMA transmission: High spectrum efficiency, fairness and massive connectivity. explore the potential performance improvement brought by effective integration NOMA technology with IRS-aided communication. Challenges For multi-antenna NOMA transmission, additional decoding rate conditions need to be satisfied to guarantee successful SIC. Both the active and passive beamforming in IRS-NOMA affect the decoding order among users.

[1] X. Mu, Y. Liu, L. Guo, J. Lin and N. Al-Dhahir “Exploiting Intelligent Reflecting Surfaces in Multi-Antenna Aided NOMA Systems”, IEEE Transactions on Wireless Communications, https://arxiv.org/abs/1910.13636. 32 / 42

slide-91
SLIDE 91

System Model

k

r

j

r

BS IRS

k

h

j

h

  • User j

User k

G

An N-antenna base station serves K single-antenna users through the NOMA protocol with the aid of an IRS with M passive reflecting elements Θ = diag (u) ∈ CM×M denotes the diagonal reflection coefficients matrix

  • f the IRS with u = [u1, u2, · · · , uM] and um = βmejθm.

33 / 42

slide-92
SLIDE 92

IRS elements assumptions

Ideal IRS: Both the reflection amplitudes and phase shifts can be

  • ptimized.

Φ1 = um||um|2 ∈ [0, 1] . (15) Non-ideal IRS:

Continuous phase shifters with the unit modulus constraint. Φ2 =

  • um||um|2 = 1, θm ∈ [0, 2π)
  • .

(16) Discrete phase shifters with B resolution bits: Φ3 =

  • um||um|2 = 1, θm ∈ D
  • ,

(17) where D = n2π

2B , n = 0, 1, 2, · · · , 2B − 1

  • .

34 / 42

slide-93
SLIDE 93

Received Signal Model

The received signal at user k can be expressed as yk = hH

k + rH k ΘG K

  • k=1

wksk + nk, (18) Based on the NOMA principle, the received SINR of user j to decode user k is given by SINRk→j =

  • hH

j + rH j ΘG

wk

  • 2
  • Ω(i)>Ω(k)
  • hH

j + rH j ΘG

wi

  • 2 + σ2 .

(19) The corresponding decoding rate is Rj→k = log2

  • 1 + SINRj→k
  • .

Conditions of success SIC: Rk→j ≥ Rk→k for Ω (j) > Ω (k).

35 / 42

slide-94
SLIDE 94

Optimization Problem

The considered sum rate maximization problem: (P1) : max

Ω,Θ,{wk} K

  • k=1

Rk→k (20a) s.t. Rk→j ≥ Rk→k, Ω (j) > Ω (k) , (20b)

  • hH

k + rH k ΘG

wΩ(i)

  • 2 ≤
  • hH

k + rH k ΘG

wΩ(j)

  • 2, ∀k, i, j, Ω (i) > Ω (j) ,

(20c)

K

  • k=1

wk2 ≤ PT (20d) um ∈ Φ, (20e) Ω ∈ Π. (20f) Φ denotes different IRS assumptions. Π denotes the set of all possible SIC decoding orders.

36 / 42

slide-95
SLIDE 95

Proposed Solutions

Sum rate maximization in decoding order, active and passive beamforming (non-convex) Sum rate maximization in active and passive beamforming under given decoding order (non-convex) Subproblem 1: Active beamforming design Subproblem 2: Passive beamforming design SCA+SDP SROCR Quantization 3

F

SCA 1

F

2

F

Difficulties: Decoding order and beamforming vectors are highly coupled. Active and passive beamforming vectors both affect the conditions

  • f success SIC.

Solutions:Divide the complicated problem into some ease of subproblems.

37 / 42

slide-96
SLIDE 96

Numerical Results

Sum Rate versus Transmit Power

2 4 6 8 10 12 14 16 18 20 Transmit power P T (dBm) 1 2 3 4 5 6 7 8 9 10 Sum rate (bit/s/Hz) SCA: Φ1 SROCR: Φ2 Quantization: Φ3, B=2 Quantization: Φ3, B=1 SROCR: Φ3, B=1 Random phase shifts Without IRS 1-bit 2-bit

Significant sum rate gains can be achieved by deploying IRSs with the proposed algorithms. The performance gaps between the case of ideal IRS and continuous phase shifters can be ignored. The performance degradation caused by finite resolution phase shifters decreases as the bit resolution increases.

38 / 42

slide-97
SLIDE 97

Numerical Results

Sum Rate versus the Resolution Bits

1 2 3 4 5 Resolution bits of discrete phase shifters 2 3 4 5 6 7 8 Sum rate (bit/s/Hz) SCA: Φ1 SROCR: Φ2 Φ3 M=40 M=20 M=10

The ideal IRS case achieves the best performance, while the discrete phase shifters case achieves the worst performance. “1-bit” and “2-bit” schemes can achieve 80% and 90% performance of the ideal IRS case, respectively. The performance loss between the “3-bit” scheme and the ideal IRS is negligible.

39 / 42

slide-98
SLIDE 98

Numerical Results

Performance Comparison with OMA

10 15 20 25 30 35 40 45 50 Antenna number at BS 2 3 4 5 6 7 8 9 10 11 Sum rate (bit/s/Hz) IRS-NOMA IRS-OMA PT=15 dBm PT=10 dBm

The IRS-NOMA scheme significantly outperforms the IRS-OMA scheme with more than 5 dB performance gain since all users can be served simultaneously through the NOMA protocol compared with the OMA scheme.

40 / 42

slide-99
SLIDE 99

Discussion: Research Opportunities and challenges for NOMA

1 Error Propagation in SIC. 2 Imperfect SIC and limited channel feedback. 3 Synchronization/asynchronization design for NOMA. 4 Different variants of NOMA. 5 Novel coding and modulation for NOMA. 6 Hybrid multiple access 7 Efficient resource management for NOMA 8 Security provisioning in NOMA 9 Different variants of NOMA 10 Massive NOMA in IoT Networks

41 / 42

slide-100
SLIDE 100

Thank you!

Thank you!

42 / 42