scholarly journals Performance of downlink NOMA with multiple antenna base station, full-duplex and D2D transmission

Author(s):  
Minh-Sang Van Nguyen ◽  
Dinh-Thuan Do
Sensors ◽  
2019 ◽  
Vol 19 (11) ◽  
pp. 2475 ◽  
Author(s):  
Dinh-Thuan Do ◽  
Minh-Sang Van Nguyen ◽  
Thi-Anh Hoang ◽  
Byung Moo Lee

In this paper, we investigate power domain division-based multiple access (PDMA) to support the base stations (BS) equipped with multiple antennas to serve mobile users. Such a system deploys multiple input single output (MISO)-based wireless transmission and a full-duplex (FD) scheme. Furthermore, such MISO PDMA system consists of BS employing transmit antenna selection to reduce complexity in signal processing at the receivers. We distinguish two kinds of mobile users, device-to-device (D2D) users and traditional users. In such MISO PDMA, there exists a trade-off between outage performance of each PDMA user and power allocation factors. Since the implementation of the FD scheme at PDMA users, bandwidth efficiency will be enhanced despite the existence of self-interference related to such FD. In particular, exact expressions of outage probability are derived to exhibit system performance with respect to D2D users. Finally, valuable results from the simulated parameters together with the analytical results show that MISO PDMA can improve its performance by increasing the number of transmit antennas at the BS.


Entropy ◽  
2021 ◽  
Vol 23 (11) ◽  
pp. 1484
Author(s):  
Tong Zhang ◽  
Gaojie Chen ◽  
Shuai Wang ◽  
Rui Wang

In this article, the sum secure degrees-of-freedom (SDoF) of the multiple-input multiple-output (MIMO) X channel with confidential messages (XCCM) and arbitrary antenna configurations is studied, where there is no channel state information (CSI) at two transmitters and only delayed CSI at a multiple-antenna, full-duplex, and decode-and-forward relay. We aim at establishing the sum-SDoF lower and upper bounds. For the sum-SDoF lower bound, we design three relay-aided transmission schemes, namely, the relay-aided jamming scheme, the relay-aided jamming and one-receiver interference alignment scheme, and the relay-aided jamming and two-receiver interference alignment scheme, each corresponding to one case of antenna configurations. Moreover, the security and decoding of each scheme are analyzed. The sum-SDoF upper bound is proposed by means of the existing SDoF region of two-user MIMO broadcast channel with confidential messages (BCCM) and delayed channel state information at the transmitter (CSIT). As a result, the sum-SDoF lower and upper bounds are derived, and the sum-SDoF is characterized when the relay has sufficiently large antennas. Furthermore, even assuming no CSI at two transmitters, our results show that a multiple-antenna full-duplex relay with delayed CSI can elevate the sum-SDoF of the MIMO XCCM. This is corroborated by the fact that the derived sum-SDoF lower bound can be greater than the sum-SDoF of the MIMO XCCM with output feedback and delayed CSIT.


2014 ◽  
Vol 62 (24) ◽  
pp. 6391-6401 ◽  
Author(s):  
Fengchao Zhu ◽  
Feifei Gao ◽  
Minli Yao ◽  
Hongxing Zou

Author(s):  
Ngo Tan Vu Khanh

The skyrocketing growth in the number of Internet of Things (IoT) devices will certainly pose a huge traffic demand for fifth-generation (5G) wireless networks and beyond. In-band full-duplex (IBFD), which is theoretically expected to double the spectral efficiency of a half-duplex (HD) wireless channel and to connect more devices, has been considered as a promising technology to accelerate the development of IoT. To exploit the full potential of IBFD, the key challenge is how to handle network interference (including self-interference, co-channel interference and multiuser interference) more effectively. In this paper, we propose a simple yet efficient user grouping method, where a base station (BS) serves strong downlink users and weak uplink users and vice versa in different frequency bands, mitigating severe network interference. We aim to maximize a minimum rate among all users subject to bandwidth and power constraints, which is formulated as a highly nonconvex optimization problem. By leveraging inner approximation framework, we develop a very efficient iterative algorithm to solve this problem, which guarantees at least a local optimal solution. Numerical results are provided to show not only the benefit of using full-duplex raido at BS, but also the advantage of the proposed user grouping method.


Electronics ◽  
2022 ◽  
Vol 11 (2) ◽  
pp. 172
Author(s):  
Jiahao Zhang ◽  
Fangmin He ◽  
Wei Li ◽  
Yi Li ◽  
Qing Wang ◽  
...  

Increased demand for higher spectrum efficiency, especially in the space-limited chip, base station, and vehicle environments, has spawned the development of full-duplex communications, which enable the transmitting and receiving to occur simultaneously at the same frequency. The key challenge in this full-duplex communication paradigm is to reduce the self-interference as much as possible, ideally, down to the noise floor. This paper provides a comprehensive review of the self-interference cancellation (SIC) techniques for co-located communication systems from a circuits and fields perspective. The self-interference occurs when the transmitting antenna and the receiving antenna are co-located, which significantly degrade the system performance of the receiver, in terms of the receiver desensitization, signal masking, or even damage of hardwares. By introducing the SIC techniques, the self-interference can be suppressed and the weak desired signal from the remote transmitter can be recovered. This, therefore, enables the full-duplex communications to come into the picture. The SIC techniques are classified into two main categories: the traditional circuit-domain SICs and the novel field-domain SICs, according to the method of how to rebuild and subtract the self-interference signal. In this review paper, the field-domain SIC method is systematically summarized for the first time, including the theoretical analysis and the application remarks. Some typical SIC approaches are presented and the future works are outlooked.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 72761-72769 ◽  
Author(s):  
Jian-Feng Li ◽  
Duo-Long Wu ◽  
Gary Zhang ◽  
Yan-Jie Wu ◽  
Chun-Xu Mao

Sign in / Sign up

Export Citation Format

Share Document