You are on page 1of 21

UNIVERSITY OF INFORMATION AND COMMUNICATION

VIETNAM – KOREA
COMPUTER SCIENCE

RESEARCH ON MULTIPLE ACCESS


METHODS IN 5G NETWORK

TOPIC: RESEARCH ON MULTIPLE ACCESS


METHODS IN 5G NETWORK

Students : LÊ MINH HUY Student code: 18IT142


PHAN TRÍ DŨNG Student code: 18IT131
LÊ THỊ CHU MỴ Student code: 18IT156
BÙI VĂN KHIÊM Student code: 18IT146
TRẦN NHẬT HUY Student code: 18IT143

Instructor : TS. VƯƠNG CÔNG ĐẠT


Class : 18IT3
Group :8

Da nang, May 19, 2022

Page 1 | 21
UNIVERSITY OF INFORMATION AND COMMUNICATION
VIETNAM – KOREA
COMPUTER SCIENCE

RESEARCH ON MULTIPLE ACCESS


METHODS IN 5G NETWORK

TOPIC: RESEARCH ON MULTIPLE ACCESS


METHODS IN 5G NETWORK

Students : LÊ MINH HUY Student code: 18IT142


PHAN TRÍ DŨNG Student code: 18IT131
LÊ THỊ CHU MỴ Student code: 18IT156
BÙI VĂN KHIÊM Student code: 18IT146
TRẦN NHẬT HUY Student code: 18IT143

Instructor : TS. VƯƠNG CÔNG ĐẠT


Class : 18IT3
Group :8

Da nang, May 19, 2022

Page 2 | 21
THANK YOU
In the first words of this Wireless and Mobile Networking Report
“RESEARCH ON MULTIPLE ACCESS METHODS IN 5G NETWORD”, our
team would like to extend our sincerest thanks and gratitude to all those who
supported, help me with knowledge and spirit during project implementation.

First of all, our team would like to thank Dr. Vuong Cong Dat, Lecturer at
Faculty of Computer Science - Vietnam Korea University of Information and
Communication Technology, who directly guided, commented, and helped our
group during the implementation of the network subject report. this cord and cell.

Finally, our team would like to thank our family, friends and relatives who
have supported and encouraged us a lot in the process of completing this wireless
and mobile network report. Due to the limited implementation time and limited
knowledge, our group's report certainly cannot avoid certain shortcomings.

Our group is looking forward to receiving suggestions from teachers and


friends so that I can gain more experience and continue to improve our group's
report.

Thank you sincerely!

Page 3 | 21
COMMENT

…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………

Da Nang, … /.…/ …….…

Instructor

DR. DAT

Page 4 | 21
TABLE OF CONTENTS
Page

THANK YOU................................................................................................................ 3
COMMENT................................................................................................................... 4
TABLE OF CONTENTS...............................................................................................5
TABLE OF IMAGE......................................................................................................6
PREAMBLE.................................................................................................................. 7
Reasons for Choosing Topics....................................................................................7
Research subjects.......................................................................................................7
Research scope........................................................................................................... 7
Expected Result.........................................................................................................7
CHAPTER I: INTRODUCTION 5G TECHNOLOGY.................................................8
1.1. What is 5g network?...........................................................................................8
1.2. How's 5G difference?..........................................................................................8
1.3. How does 5G work?............................................................................................8
1.4. 5G Economic Impact:.........................................................................................9
1.5. Where is 5G being used?..................................................................................10
1.6. Underlying technologies make up 5G...............................................................10
CHAPTER 2: MULTIPLE ACCESS FOR 5G NETWORK.......................................12
2.1. What is Multiple Techniques?..........................................................................12
2.2. Multiple Access for 5G network ?....................................................................12
2.3. 5G Multiple Access Schemes............................................................................13
CHAPTER 3: NON-ORTHOGONAL MULTIPLE ACCESS (NOMA).....................15
3.1. Power-Domain NOMA:....................................................................................15
3.2. Basic Power-Domain NOMA:..........................................................................15
3.3. Power Allocation in NOMA:............................................................................16
3.4. Multiple Antennas based NOMA:.....................................................................16
3.5. Cooperative NOMA:.........................................................................................17
3.6. Cognitive Radio Inspired NOMA:....................................................................17
CHAPTER 4: CONCLUSIONS..................................................................................18
4.1. Result:............................................................................................................... 18
4.2. Limit:................................................................................................................18
4.3. Development:....................................................................................................18
LIST OF REFERENCES.............................................................................................19

Page 5 | 21
Page 6 | 21
TABLE OF IMAGE

Page 7 | 21
PREAMBLE
Reasons for Choosing Topics

- Based on the need to use the internet

Research subjects

- RESEARCH ON MULTIPLE ACCESS METHODS IN 5G NETWORD

Research scope

- The study was carried out at Vietnam - Korea University of Information and
Communication Technology, University of Danang
- Time Range: The study was conducted within 2 months from 20/03/2022
- Scope of content: In this study, our group mainly studies the multi-access method
in 5G networks.

Expected Result

- Completed research report on multi-access method in 5G network

Page 8 | 21
CHAPTER I: INTRODUCTION 5G TECHNOLOGY

1.1. What is 5g network?


- 5G is the 5th generation mobile network. It is a new global wireless standard after
1G, 2G, 3G, and 4G networks. 5G enables a new kind of network that is designed to
connect virtually everyone and everything together including machines, objects, and
devices.
- 5G wireless technology is meant to deliver higher multi-Gbps peak data speeds, ultra
low latency, more reliability, massive network capacity, increased availability, and a
more uniform user experience to more users. Higher performance and improved
efficiency empower new user experiences and connects new industries.

1.2. How's 5G difference?


- The previous generations of mobile networks are 1G, 2G, 3G, and 4G.
- First generation - 1G
● 1980s: 1G delivered analog voice.
- Second generation - 2G
● Early 1990s: 2G introduced digital voice (e.g. CDMA- Code Division Multiple
Access).
- Third generation - 3G
● Early 2000s: 3G brought mobile data (e.g. CDMA2000).
- Fourth generation - 4G LTE
● 2010s: 4G LTE ushered in the era of mobile broadband.
- 1G, 2G, 3G, and 4G all led to 5G, which is designed to provide more connectivity
than was ever available before.
- 5G is a unified, more capable air interface. It has been designed with an extended
capacity to enable next-generation user experiences, empower new deployment models
and deliver new services.
- With high speeds, superior reliability and negligible latency, 5G will expand the
mobile ecosystem into new realms. 5G will impact every industry, making safer
transportation, remote healthcare, precision agriculture, digitized logistics and more a
reality.

1.3. How does 5G work?


- Wireless communications systems use radio frequencies (also known as spectrum) to
carry information through the air.
- 5G operates in the same way, but uses higher radio frequencies that are less
cluttered. This allows for it to carry more information at a much faster rate. These
higher bands are called 'millimeter waves' (mmwaves). They were previously unused
Page 9 | 21
but have been opened up for licensing by regulators. They had been largely untouched
by the public as the equipment to use them was largely inaccessible and expensive.

Figure 1: 5G Network Architecture


- While higher bands are faster at carrying information, there can be problems with
sending over large distances. They are easily blocked by physical objects such as trees
and buildings. In order to circumvent this challenge, 5G will utilize multiple input and
output antennae to boost signals and capacity across the wireless network.
- The technology will also use smaller transmitters. Placed on buildings and street
furniture, as opposed to using single stand-alone masts. Current estimates say that 5G
will be able to support up to 1,000 more devices per meter than 4G.
- 5G technology will also be able to ‘slice’ a physical network into multiple virtual
networks. This means that operators will be able to deliver the right slice of network,
depending on how it is being used, and thereby better manage their networks. This
means, for example, that an operator will be able use different slice capacities
depending on importance. So, a single user streaming a video would use a different
slice to a business, while simpler devices could be separated from more complex and
demanding applications, such as controlling autonomous vehicles.

1.4. 5G Economic Impact:


- 5G is driving global growth.
● $13.1 Trillion dollars of global economic output
● $22.8 Million new jobs created
● $265B global 5G CAPEX and R&D annually over the next 15 years

Page 10 | 21
- Through a landmark 5G Economy study, we found that 5G’s full economic effect
will likely be realized across the globe by 2035—supporting a wide range of industries
and potentially enabling up to $13.1 trillion worth of goods and services.
- This impact is much greater than previous network generations. The development
requirements of the new 5G network are also expanding beyond the traditional mobile
networking players to industries such as the automotive industry.
- The study also revealed that the 5G value chain (including OEMs, operators, content
creators, app developers, and consumers) could alone support up to 22.8 million jobs,
or more than one job for every person in Beijing, China. And there are many emerging
and new applications that will still be defined in the future. Only time will tell what the
full “5G effect” on the economy is going to be.

1.5. Where is 5G being used?


- Broadly speaking, 5G is used across three main types of connected services,
including enhanced mobile broadband, mission-critical communications, and the
massive IoT. A defining capability of 5G is that it is designed for forward
compatibility—the ability to flexibly support future services that are unknown today.
- Enhanced mobile broadband
● In addition to making our smartphones better, 5G mobile technology can usher
in new immersive experiences such as VR and AR with faster, more uniform
data rates, lower latency, and lower cost-per-bit.
- Mission-critical communications
● 5G can enable new services that can transform industries with ultra-reliable,
available, low-latency links like remote control of critical infrastructure,
vehicles, and medical procedures.
- Massive IoT
● 5G is meant to seamlessly connect a massive number of embedded sensors in
virtually everything through the ability to scale down in data rates, power, and
mobility—providing extremely lean and low-cost connectivity solutions.

1.6. Underlying technologies make up 5G


- 5G is based on OFDM (Orthogonal frequency-division multiplexing), a method of
modulating a digital signal across several different channels to reduce interference. 5G
uses 5G NR air interface alongside OFDM principles. 5G also uses wider bandwidth
technologies such as sub-6 GHz and mmWave.
- Like 4G LTE, 5G OFDM operates based on the same mobile networking principles.
However, the new 5G NR air interface can further enhance OFDM to deliver a much
higher degree of flexibility and scalability. This could provide more 5G access to more
people and things for a variety of different use cases.
- 5G will bring wider bandwidths by expanding the usage of spectrum resources, from
sub-3 GHz used in 4G to 100 GHz and beyond. 5G can operate in both lower bands
Page 11 | 21
(e.g., sub-6 GHz) as well as mmWave (e.g., 24 GHz and up), which will bring extreme
capacity, multi-Gbps throughput, and low latency.
- 5G is designed to not only deliver faster, better mobile broadband services compared
to 4G LTE, but can also expand into new service areas such as mission-critical
communications and connecting the massive IoT. This is enabled by many new 5G NR
air interface design techniques, such as a new self-contained TDD subframe design.

Page 12 | 21
CHAPTER 2: MULTIPLE ACCESS FOR 5G NETWORK

2.1. What is Multiple Techniques?


- Multiple access techniques allow multiple terminals to share the common
communication medium based on multiplexing. The multiplexing is provided in the
physical layer, and the shared communication medium can be wired cables or wireless
spectrum. The availability of the communication medium is limited, for example,
limited frequency band and limited time. Therefore, multiple access techniques are
essential to maintain successful communication among multiple devices. The basic
well-known multiple access techniques are frequency division multiple access
(FDMA), time division multiple access (TDMA), code division multiple access
(CDMA), and spatial division multiple access (SDMA). A class of non-orthogonal
multiple access (NOMA) techniques has recently gained much interest. The control
mechanism to distribute channels to users is also known as medium access control
(MAC).

2.2. Multiple Access for 5G network ?


 - Over the past few decades, wireless communications have advanced tremendously
and have become an indispensable part of our lives. Wireless networks have become
more and more pervasive in order to guarantee global digital connectivity. Wireless
devices have quickly evolved into multimedia smartphones running applications that
demand high-speed and high-quality data connections. The upcoming fifth generation
(5G) mobile cellular networks are required to provide significant increase in network
throughput, cell⁃edge data rates, massive connectivity, superior spectrum efficiency,
high energy efficiency and low latency, compared with the currently deployed long-
term evolution (LTE) and LTE⁃advanced networks. To meet these demanding
challenges of 5G networks, innovative technologies on radio air⁃interface and radio
access network (RAN) are of great importance in PHY designs. Recently
non⁃orthogonal multiple access (NOMA) has attracted increasing research interests
from both academic and industrial fields as a potential radio access technique. A few
examples include multiuser shared access (MUSA), sparse code multiple access
(SCMA), resource spread multiple access (RSMA) and pattern division multiple
access (PDMA) proposed by ZTE, Huawei, Qualcomm, DTmobile, etc. In the mean
time, multicarrier (MC) technologies that divide frequency spectrum into many narrow
subchannels, such as filter bank multicarrier (FBMC) and generalized frequency
division multiplexing (GFDM), become attractive and new concepts for dynamic
access spectrum management and cognitive radio applications.
- With these new developments, this special issue is dedicated to multiple access
transmission technologies and related for 5G cellular mobile communications. The
main focus is on the cutting⁃edge research, review and application on non ⁃orthogonal
Page 13 | 21
multiple access and related signal processing and coding methods for the air ⁃interface
of 5G enhanced mobile broadband (eMBB), mMTC, and ultra reliable and low latency
communication (URLLC). Papers for this issue were invited, and after peer review, six
were selected for publication. The selected papers cover reviews of various uplink and
downlink NOMA schemes, novel designs for MIMO⁃FBMC systems, review and new
designs on multiple access technologies for cellular M2M communications and IoT
applications. This issue is intended to be a timely, high-quality forum for scientists and
engineers.

2.3. 5G Multiple Access Schemes

Figure 2: 5G Multiple Access Schemes


- One key element of any cellular communications system is the multiple access
technology that is used. As a result the 5G multiple access schemes are being carefully
considered and researched to ensure that the optimum technique or techniques are
adopted.
- There are several candidate 5G multiple access schemes that are in the running. Each
has its own advantages and disadvantages and as a result, no single technique is likely
to meet all the requirements.
- Some details and preliminary information about the multiple access programs and
technologies being developed for 5G or 5G wireless or mobile mobile
telecommunications systems are:
● Orthogonal frequency division multiple access, OFDMA: OFDMA has been
widely used and very successful for 4G and could be used as a 5G multiple
access scheme. However it does require the use of OFDM and requiring
orthogonality between carriers and the use of a cyclic prefix has some
drawbacks. As a result other multiple access schemes are being investigated.
● Sparse Code Multiple Access, SCMA: SCMA is another idea being
considered as a 5G multiple access scheme and it is effectively a combination

Page 14 | 21
of OFDMA and CDMA. Normally with OFDMA a carrier or carriers is
allocated to a given user. However if each carrier has a spreading code added to
it, then it would be able to transmit data to or from multiple users. This
technique has been developed to use what are termed sparse code and in this
way significant numbers of users can be added while maintaining the spectral
efficiency levels.
● Non-orthogonal multiple access, NOMA: NOMA is one of the techniques
being considered as a 5G multiple access scheme. NOMA superposes multiple
users in the power domain, using cancellation techniques to remove the more
powerful signal. NOMA could use orthogonal frequency division multiple
access, OFDMA or the discrete Fourier transform, DFT-spread OFDM

Page 15 | 21
CHAPTER 3: NON-ORTHOGONAL MULTIPLE ACCESS
(NOMA)

3.1. Power-Domain NOMA:


- Power-domain NOMA is considered as a promising MA scheme for 5G networks .
Specifically, a downlink version of NOMA, named multiuser superposition
transmission (MUST), has been proposed for the 3GPP long-term evolution advanced
(3GPP-LTE-A) networks and has been shown that system capacity and user
experiences can be improved by it. The basic principles of various power-domain
NOMA related techniques, including power allocation in NOMA, multiple antenna
based NOMA, and cooperative NOMA are explained in the following.

3.2. Basic Power-Domain NOMA:


- By differentiating them with different power levels multiple users within the same
time/frequency/code resource block are supported by Power-domain NOMA. Unlike
multiuser detection in CDMA or MIMO systems that have multiple observations at the
receiver, power domain NOMA usually only has one observation. Specifically, in the
uplink transmission of NOMA, the signal received at the BS can be expressed as

- Where pa and xa are the transmit power and transmit symbols from the ath user,
respectively, n refers to AWGN with variance σ^2, and the number of users sharing
the same resource block is A. The transmit power pa for each individual user is
carefully adjusted to facilitate SIC at the receiver, that is, to make sure users with
stronger powers to be detected with high accuracy. At the receiver (the BS), first the
user with the best CSI is decoded with invoking of SIC. Then the corresponding signal
component is removed from the received signal. The SIC receiver works in the
descending order of the signal strengths. Since users experience different channel
conditions the transmit power levels of different NOMA users are usually different. If
the first detected symbols are all correct, the received signal-to-interference-plus-noise
ratio (SINR) of the a th NOMA user can be given by

- The downlink transmission of NOMA for the two-user case is shown in Fig. Here the
users which share the same resource block are differentiated by different power levels
with a total power con-straint. Typically, the BS sends a superimposed signal
containing the two signals for the two users. NOMA allocates less power for the users
with better downlink CSI, to guarantee overall fairness and to utilize diversity in
time/frequency/code domains. SIC is used for signal detection at the receiver. The user
with higher transmit power, that is, the one with smaller downlink channel gain, is first
decoded while treating another user’s signal as noise. Once the signal corresponding to
Page 16 | 21
the user with higher transmit power is detected and decoded, its signal component will
be subtracted from the received signal to facilitate the detection of subsequent users. It
should be noted that the first detected user suffers from the highest inter-user
interference and also the detection error in the first user will pass to the other users,
which is why we have to allocate sufficient power to the first user to be detected.

3.3. Power Allocation in NOMA:


- NOMA supports unequal transmission rates for users experiencing varying channel
conditions by assigning them different transmit powers. Hence, the power allocation
technique for different users is critical to power-domain NOMA. As mentioned, the
SIC receiver works according to descending order of the signal strengths. Here more
powers are allocated to the users with poor CSI. By doing so, interference from the
users with good CSI is reduced significantly as less power are allocated to them and
hence the detection accuracy at users with poor CSI can also be improved. As the
power allocation in NOMA is based on the order of CSI, the cases with perfect and
imperfect CSI are different and should be investigated separately, as in. When perfect
CSI is available, the optimization problem can be formulated to maximize the
individual/sum rate while considering the fairness among different users. While with
average CSI, the optimization problem can be formulated to minimize the maximum
outage probability.

3.4. Multiple Antennas based NOMA:


- Multiple antenna techniques can provide an additional degree of freedom on the
spatial domain, and bring further performance improvements to NOMA. Recently,
multiple antenna based NOMA has attracted lots of attention . Different from single-
Page 17 | 21
input-single output (SISO) based NOMA, where the channels are normally represented
by scalars, one of the research challenges in multiple antenna based NOMA comes
from user ordering; as the channels are generally in form of vectors or matrices.
Currently, the possible designs of multiple antenna based NOMA fall into two
categories where one or multiple users are served by a single beam forming vector. By
allocating different users with different beams in the same resource block, the quality
of service (QoS) of each user can be guaranteed in multiple antenna based NOMA
systems forcing the beams to satisfy a predefined order.

3.5. Cooperative NOMA:


- In cellular networks, a cell-edge user usually experiences a weaker received signal
power and lower data rates compared to those near the BS. Relaying and coordinated
multipoint (CoMP) transmission (and reception) techniques have been widely
employed to increase the transmission rates for cell-edge users]. The scenario with
users transmitting at different rates naturally matches the application scenarios typical
of NOMA. The basic idea of relay-assisted NOMA is to use the users with the better
CSI as the decode-and forward (DF) or amplify-and-forward (AF) as relays to improve
the transmission rates of the users with poor CSI. A cooperative NOMA model
supporting M users with M time slots has been proposed. In the first time slot, the
traditional non-cooperative NOMA scheme is conducted. In the second time slot, the
user with the best CSI acts as the DF relay for the user with the second best CSI. In the
following time slots, the user with the m-th best CSI works as the relay for the user
with the subsequent worse CSI to improve the transmission rates. CoMP transmission,
where multiple BSs support cell-edge users together, is capable of improving the
performance of cell-edge users.

3.6. Cognitive Radio Inspired NOMA:


- To address the spectrum scarcity issue in wireless communications, cognitive ratio
(CR) has been proposed which allows unlicensed users to use licensed spectrum as
long as they generate no (intolerable) interference to the licensed users. Spectrum
sensing is an enabling technique for CR, and how to balance the sensing overhead and
CR throughput has been investigated in . If an unlicensed user is at a distance away
from the licensed user that shares the same licensed spectrum, then the interference
between them will be small in general. Therefore, CR in this case can be regarded as
special NOMA in the location domain while the NOMA introduced in the previous
sections is in power, code, or multiple domains. Device-to-device (D2D)
communications, a popular research area recently, turn to a special CR if the two users
in D2D communications are regarded as a simple CR network. In addition to the
location domain, CR can also exploit the spatial domain and the frequency-spatial
domain.

Page 18 | 21
CHAPTER 4: CONCLUSIONS

4.1. Advantages and disadvantages in mobile network:


*Favorable:
- With 5G, we can download a host movie in seconds. Theoretically, the speed in 5G
network can reach 20Gbp/s, even higher, even at the coverage edge, the speed can still
reach from 1 to several hundred Mbps.
- In addition to higher speed and bandwidth, 5G is expected to also have many better
communication features between devices. For example, a smart home equipped with
5G technology can communicate with sensors for extremely large status updates or to
receive signals from long distances, what the smart home needs is the response time to
be. fast. 5G enabled devices have the ability to choose the right frequency to send a
signal, based on the type of data being sent.
- 5G network is considered as the key for us to enter the world of Internet of Things
(IoT). Billions of sensors will be integrated into home appliances, security systems,
fitness trackers, door locks, cars and wearables.
*Difficulty
- Dense connectivity, high number of connections of mobile devices
- Access range and traffic vary at different location, which can unbalance the
performance and access authority of devices.
- Private or shared access restrictions at different layers will generate different levels
of interference.
- The issue of prioritizing access to channels at different frequencies and prioritizing
resource allocation strategies.
- Communication between D2Ds can interfere with, interfere with, and disrupt access

4.2. How to fix?:


- Design optimization of multi-layer mobile network systems: Synchronize and
optimize mobile networks, design according to multi-layer model to support each other
and best transmit data to users. Increased use of new, low-energy and durable
equipment. New devices must be optimized in each network point to ensure that the
mining and usage process is not congested, and energy consumption is minimized. The
usage process must also be optimized to ensure a reasonable resource allocation to
provide for mobile devices, while having a mechanism to control the layers must also
ensure the most optimal.
- Design efficient methods to support multiple connected devices simultaneously:
Multi-layer 5G networks will increase system throughput and reduce loss rates,
increasing resource efficiency for users in close proximity. Therefore, it is necessary to
design new devices using modern technology, ensuring low energy consumption and
allowing many devices to be connected at the same time.
- Design effective methods of cooperation in layers: Effective cooperation between
different layers will ensure flexibility in data transmission, minimizing interference in
5G networks. Cooperation between macrocells and sub-layers of femtocells ensures a
Page 19 | 21
more flexible and interconnected network. A device can simultaneously download data
at macrocells and at other nearby femtocell layers. This may evolve to minimize
interference or overload usage in the network. However, there is a need for tight
integration between network nodes into a system that is reliable, fast, and low-latency
usable.
- Interference management in 5G multi-layer network for different users at different
frequencies in different time periods to ensure flexibility, no data duplication and
overload at a time somewhere (at femtocells or end users). Designs must overcome
these limitations to be as optimal a network as possible

4.3. Conclusion:
Although the non-orthogonal multiple access mechanism is still quite complex, it is
very feasible and superior to the orthogonal multiple access mechanism.
From the advantages and disadvantages of orthogonal multiple access and non-
orthogonal multiple access, we can see that there are too many benefits that these
mechanisms bring. from which it can be applied to many other communication fields
in the future.

Page 20 | 21
LIST OF REFERENCES

Tiếng Việt:
1. https://cungdev.com/cai-dat-react-native/#Cai_dat_React_Native
2. https://topdev.vn/blog/cai-dat-laravel/

Tiếng Anh:
1. https://stackoverflow.com/

Page 21 | 21

You might also like