Professional Documents
Culture Documents
VIETNAM – KOREA
COMPUTER SCIENCE
Page 1 | 21
UNIVERSITY OF INFORMATION AND COMMUNICATION
VIETNAM – KOREA
COMPUTER SCIENCE
Page 2 | 21
THANK YOU
In the first words of this Wireless and Mobile Networking Report
“RESEARCH ON MULTIPLE ACCESS METHODS IN 5G NETWORD”, our
team would like to extend our sincerest thanks and gratitude to all those who
supported, help me with knowledge and spirit during project implementation.
First of all, our team would like to thank Dr. Vuong Cong Dat, Lecturer at
Faculty of Computer Science - Vietnam Korea University of Information and
Communication Technology, who directly guided, commented, and helped our
group during the implementation of the network subject report. this cord and cell.
Finally, our team would like to thank our family, friends and relatives who
have supported and encouraged us a lot in the process of completing this wireless
and mobile network report. Due to the limited implementation time and limited
knowledge, our group's report certainly cannot avoid certain shortcomings.
Page 3 | 21
COMMENT
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
Instructor
DR. DAT
Page 4 | 21
TABLE OF CONTENTS
Page
THANK YOU................................................................................................................ 3
COMMENT................................................................................................................... 4
TABLE OF CONTENTS...............................................................................................5
TABLE OF IMAGE......................................................................................................6
PREAMBLE.................................................................................................................. 7
Reasons for Choosing Topics....................................................................................7
Research subjects.......................................................................................................7
Research scope........................................................................................................... 7
Expected Result.........................................................................................................7
CHAPTER I: INTRODUCTION 5G TECHNOLOGY.................................................8
1.1. What is 5g network?...........................................................................................8
1.2. How's 5G difference?..........................................................................................8
1.3. How does 5G work?............................................................................................8
1.4. 5G Economic Impact:.........................................................................................9
1.5. Where is 5G being used?..................................................................................10
1.6. Underlying technologies make up 5G...............................................................10
CHAPTER 2: MULTIPLE ACCESS FOR 5G NETWORK.......................................12
2.1. What is Multiple Techniques?..........................................................................12
2.2. Multiple Access for 5G network ?....................................................................12
2.3. 5G Multiple Access Schemes............................................................................13
CHAPTER 3: NON-ORTHOGONAL MULTIPLE ACCESS (NOMA).....................15
3.1. Power-Domain NOMA:....................................................................................15
3.2. Basic Power-Domain NOMA:..........................................................................15
3.3. Power Allocation in NOMA:............................................................................16
3.4. Multiple Antennas based NOMA:.....................................................................16
3.5. Cooperative NOMA:.........................................................................................17
3.6. Cognitive Radio Inspired NOMA:....................................................................17
CHAPTER 4: CONCLUSIONS..................................................................................18
4.1. Result:............................................................................................................... 18
4.2. Limit:................................................................................................................18
4.3. Development:....................................................................................................18
LIST OF REFERENCES.............................................................................................19
Page 5 | 21
Page 6 | 21
TABLE OF IMAGE
Page 7 | 21
PREAMBLE
Reasons for Choosing Topics
Research subjects
Research scope
- The study was carried out at Vietnam - Korea University of Information and
Communication Technology, University of Danang
- Time Range: The study was conducted within 2 months from 20/03/2022
- Scope of content: In this study, our group mainly studies the multi-access method
in 5G networks.
Expected Result
Page 8 | 21
CHAPTER I: INTRODUCTION 5G TECHNOLOGY
Page 10 | 21
- Through a landmark 5G Economy study, we found that 5G’s full economic effect
will likely be realized across the globe by 2035—supporting a wide range of industries
and potentially enabling up to $13.1 trillion worth of goods and services.
- This impact is much greater than previous network generations. The development
requirements of the new 5G network are also expanding beyond the traditional mobile
networking players to industries such as the automotive industry.
- The study also revealed that the 5G value chain (including OEMs, operators, content
creators, app developers, and consumers) could alone support up to 22.8 million jobs,
or more than one job for every person in Beijing, China. And there are many emerging
and new applications that will still be defined in the future. Only time will tell what the
full “5G effect” on the economy is going to be.
Page 12 | 21
CHAPTER 2: MULTIPLE ACCESS FOR 5G NETWORK
Page 14 | 21
of OFDMA and CDMA. Normally with OFDMA a carrier or carriers is
allocated to a given user. However if each carrier has a spreading code added to
it, then it would be able to transmit data to or from multiple users. This
technique has been developed to use what are termed sparse code and in this
way significant numbers of users can be added while maintaining the spectral
efficiency levels.
● Non-orthogonal multiple access, NOMA: NOMA is one of the techniques
being considered as a 5G multiple access scheme. NOMA superposes multiple
users in the power domain, using cancellation techniques to remove the more
powerful signal. NOMA could use orthogonal frequency division multiple
access, OFDMA or the discrete Fourier transform, DFT-spread OFDM
Page 15 | 21
CHAPTER 3: NON-ORTHOGONAL MULTIPLE ACCESS
(NOMA)
- Where pa and xa are the transmit power and transmit symbols from the ath user,
respectively, n refers to AWGN with variance σ^2, and the number of users sharing
the same resource block is A. The transmit power pa for each individual user is
carefully adjusted to facilitate SIC at the receiver, that is, to make sure users with
stronger powers to be detected with high accuracy. At the receiver (the BS), first the
user with the best CSI is decoded with invoking of SIC. Then the corresponding signal
component is removed from the received signal. The SIC receiver works in the
descending order of the signal strengths. Since users experience different channel
conditions the transmit power levels of different NOMA users are usually different. If
the first detected symbols are all correct, the received signal-to-interference-plus-noise
ratio (SINR) of the a th NOMA user can be given by
- The downlink transmission of NOMA for the two-user case is shown in Fig. Here the
users which share the same resource block are differentiated by different power levels
with a total power con-straint. Typically, the BS sends a superimposed signal
containing the two signals for the two users. NOMA allocates less power for the users
with better downlink CSI, to guarantee overall fairness and to utilize diversity in
time/frequency/code domains. SIC is used for signal detection at the receiver. The user
with higher transmit power, that is, the one with smaller downlink channel gain, is first
decoded while treating another user’s signal as noise. Once the signal corresponding to
Page 16 | 21
the user with higher transmit power is detected and decoded, its signal component will
be subtracted from the received signal to facilitate the detection of subsequent users. It
should be noted that the first detected user suffers from the highest inter-user
interference and also the detection error in the first user will pass to the other users,
which is why we have to allocate sufficient power to the first user to be detected.
Page 18 | 21
CHAPTER 4: CONCLUSIONS
4.3. Conclusion:
Although the non-orthogonal multiple access mechanism is still quite complex, it is
very feasible and superior to the orthogonal multiple access mechanism.
From the advantages and disadvantages of orthogonal multiple access and non-
orthogonal multiple access, we can see that there are too many benefits that these
mechanisms bring. from which it can be applied to many other communication fields
in the future.
Page 20 | 21
LIST OF REFERENCES
Tiếng Việt:
1. https://cungdev.com/cai-dat-react-native/#Cai_dat_React_Native
2. https://topdev.vn/blog/cai-dat-laravel/
Tiếng Anh:
1. https://stackoverflow.com/
Page 21 | 21