亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        Unsourced Multiple Access for 6G Massive Machine Type Communications

        2022-03-31 07:32:20YuanjieLiJinchengDaiZhongweiSiKaiNiuChaoDongJiaruLinSenWangYifeiYuan
        China Communications 2022年3期

        Yuanjie Li,Jincheng Dai,Zhongwei Si,*,Kai Niu,Chao Dong,Jiaru Lin,Sen Wang,Yifei Yuan

        1 Key Laboratory of Universal Wireless Communications,Beijing University of Posts and Telecommunications,Beijing 100876,China

        2 China Mobile Research Institute,Beijing 100053,China

        *The corresponding author,email: sizhongwei@bupt.edu.cn

        Abstract: Unsourced multiple access (UMA) is a multi-access technology for massive,low-power,uncoordinated,and unsourced Machine Type Communication (MTC) networks.It ensures transmission reliability under the premise of high energy efficiency.Based on the analysis of the 6G MTC key performance indicators (KPIs) and scenario characteristics,this paper summarizes its requirements for radio access networks.Following this,the existing multiple access models are analyzed under these standards to determine UMA’s advantages for 6G MTC according to its design characteristics.The critical technology of UMA is the design of its multiple-access coding scheme.Therefore,the existing UMA coding schemes from different coding paradigms are further summarized and compared.In particular,this paper comprehensively considers the energy efficiency and computational complexity of these schemes,studies the changes of the above two indexes with the increase of access scale,and considers the trade-off between the two.It is revealed by the above analysis that some guiding rules of UMA coding design.Finally,the open problems and potentials in this field are given for future research.

        Keywords: unsourced multiple access; machine type communications; 6G; massive random access; uncoordinated

        I.INTRODUCTION

        With the freeze of 3GPP Rel-16 [1],5G technology has entered a relatively mature stage.At this time,both academia and industry are looking forward to the 6G visions and potential technologies [2,3].Among them,MTC(Machine Type Communication)is a critical scenario in the consensus of the evolution from 5G to 6G.Compared with 5G,6G MTC network puts forward very challenging KPIs(Key Performance Indicators) [4].Under the short packet transmission setup,the requirements of reduced delay,increased connection density,and improved connection reliability will bring challenges to the existing multiple access technology,associated with the transmission model,scheduling mechanism,and resource management.Therefore,multiple access technologies need breakthroughs to meet the higher standard of 6G future networks.

        Unsourced multiple access (UMA) is proposed in this context,which satisfies the evolution trend of the mobile communication system.It improves efficiency by removing coordination center.At the same time,superposition coding is used to design the unsourced codebook to counter the increased multi-user interference.In section 2.1,the analysis,KPIs,and prospects of 6G MTC application scenarios are summarized in detail.Meanwhile,the existing multiple access modes are classified into three categories in section 2.2: coordinated,grant-free,and unsourced multiple access.Based on its design principle and characteristics,the competitive advantages of UMA in the 6G MTC network compared with the other two modes are explained.

        In terms of surveys in this area,[5] discussed the technical background and basic concepts of UMA.In the massive access scenario,coordinated access is a comparison scheme,and the theoretical foundation and basic design scheme are introduced.However,since Polyanskiy proposed the basic concept [6] and basic coding scheme[7]in 2017,there have been rich related research results in this field.Especially in the terms of coding schemes design,some advanced and innovative schemes have been proposed recently.Therefore,it’s necessary to make a comprehensive summary of the existing UMA coding schemes and figure out some basic paradigms,ideas,and criteria of design.Section 3.2 is based on such considerations in the comparative analysis.At the same time,we sorted out the existing coding paradigms in the table and introduced in detail the encoding and decoding structures of the three state-of-art schemes in section 3.2 for further analysis and comparison.

        The basic evaluation criterion for UMA coding schemes is that the minimum required SNR (Signalto-Noise Ratio),i.e.SNR threshold,under the increase of the number of active users when the packet loss rate and the total access frame length are guaranteed.Most of the works are also aimed at designing coding schemes as close to the performance world as possible.Therefore,in section 3.3,this paper makes a comprehensive comparison of curves of the energy efficiency with the number of users of existing solutions,analyzes the advantages and disadvantages of various coding patterns,and how to approach the performance world through coding optimization.However,the complexity problem has been less analyzed,but it has an important impact on the implementation and delay of processing.Therefore,this paper constructs the complexity analysis framework of UMA coding mode takes FLOPf (float point operations per frame)as the basic merit,compares the complexity difference of different schemes under typical setups,and obtains the trade-off between them and the system energy efficiency index.

        Based on the above analysis,we summarize underachieved in terms of the performance and complexity objectives of the existing solutions as a guide for future research.At the same time,the coding scheme design in fading channel and the asynchronous condition is not enough,which is very important for the practical application of UMA.The combination of MIMO and UMA will also be a rich and potential research site.Finally,as UMA simplifies the design of empty ports,its security needs to be solved by some physical layer security technologies.

        II.SCENARIO AND TECHNOLOGY BACKGROUND

        2.1 Scenario Evolution of Machine Type Communication

        Since 5G,MTC has joined in the evolution process of the mobile communication system as a parallel application scenario with URLLC and eMBB(enhanced Mobile BroadBand) [8].MTC mainly focuses on human-machine or machine-machine communication[9]services in industrial or social scenarios,generally transmitting interactive control information and data report of sensors[10].The standardization of NB-IoT(NarrowBand-Internet of Things)technology[11]has been realized in 5G.With the gradual maturation of 5G MTC,6G MTC sets higher KPIs and has richer vertical application scenarios,which can be regarded as the individual evolution or joint fusion among the three typical 5G scenarios[12].

        According to[13],the 6G MTC network mainly has three types access flows: Massive MTC traffic[4],vehicle to anything (V2X) traffic [14,15],and Industry 4.0[16]interactive information.Among them,the concept of massive MTC Traffic is the transition from m-MTC(massive Machine Type Communications)in the 5G era to the um-MTC (ultra massive-Machine Type Communications) scenario [4],with increasing number of devices in the MTC network.Connection density increases from 106to 107connections/km2[17].In the future,there will be vast sensors,wearable and automotive devices adding to MTC networks[18],with generally the payload of 40 to 120 bytes per packet[19].It’s essential to adapt to the carrying demand of pervasive connectivity.V2X network corresponds to the evolution from URLLC (Ultra-Reliable Low Latency Communications) to SURLLC(Super Ultra-Reabliable Low Latency Comminications)[20].Intelligent medical applications and information transmission of the Internet of vehicles put forward higher demands in terms of high reliability and immediacy.Air-interface latency needs to be reduced from 1msto 0.1ms[21],and the reliability and accessibility of devices in the network needs to be improved from 99.999%to 99.9999%[22]to guarantee the high reliability and precision control interaction of rapid response between guarantor and machine or between machine and machine [23].On the premise of deep integration of intelligence,the industrial 4.0 network should realize multiple requirements of real-time transmission,control,calculation,and interaction,as well as automatic robot production line and superlarge scale sensor control network[24].Therefore,the URLLC network needs to evolve to MURLLC (massive URLLC) [19],that is,on the premise of ensuring low latency and high reliability of data transmission,connecting to a large number of industrial equipments.In addition to these traditional KPI evolutions,the 6G MTC network has many new KPIs[13].Considering the battery life and capacity of the devices,the energy consumption needs to be controlled at ultralow level.And the connction set-up time is under 1ms[25].For Instance,The scale of the network will be more flexible,and the access process will be more flexible and diverse.Furthermore,6G MTC will pay more attention to the segmentation needs of vertical fields[26].

        By comprehensively considering the above network characteristics and KPIs,we can summarize the specific requirements of the 6G MTC network for multiple access technology.First,the MA technology should adapt to the large-scale uplink burst short packet simultaneous transmission demand.The access load is high,and the base station needs to deal with strengthened multi-user interference in limited resources.Secondly,the air delay of the network needs to be under control,and the transmission process to be kept concise.In delay-sensitive scenarios,excessive signaling interactions may reduce transmission efficiency.The network should support unauthorized or passive access to terminals.At the same time,the packet loss rate of the system should be effectively controlled.Sensor and industrial control networks may not have higher data rate requirements for communication links than high-bandwidth high-speed communication scenarios but demand stable and lowerror transmission.Finally,the MA technology has to maintain low power consumption with low computational complexity at the transmitter end.Many devices in the MTC network have limited battery capacity and computing power,which determines that the processing at the transmitter side is not too complex and frequent.In addition,on-demand access should be supported so that the devices can turn to idle state with ultra-low power consumption when not transmitting data,and reliable transmission can be achieved with low power to ensure high energy efficiency.

        2.2 Multiple Access Techniques for MTC

        In this subsection,we will compare and analyze three existing multiple access modes,cooperative multiple access,grant-free access,and unsourced multiple access,and show the evolution trend of access technology in the development of mobile communication systems.In particular,we will focus on the UMA in agreement with the requirements of the 6G MTC communication scenario summarized in the previous section,and explain its advantages and prospects compared with the other two.The comparison of the three multiple access models is depicted in figure 1.

        2.2.1 Coordinated Multiple Access

        Coordinated multiple access(CMA)is the mainstream multiple access mode in 5G and before.From 1G to 4G,F(xiàn)DMA(Frequency Division Multiple Access),TDMA(Time Division Multiple Access),Time Division Multiple Access,CDMA (Code Division Multiple Access),and OFDMA(Orthogonal Frequency Division Multiple Access,Orthogonal frequency division multiple access(OFDM)these are the core multiple access technologies of the ages[27,28].They all belong to the large category of Orthogonal Multiple Access(OMA).When it comes to 5G,non-orthogonal multiple access(NOMA)enhances the capacity region boundary [29].Different NOMA technologies such as power domain NOMA [30],code domain NOMA[31],bit domain NOMA[32]are developed with different approaches of multiplexing.

        The core idea of CMA is to utilize resource allocation,power control,or codebook adjustment among users through the cooperative process to maximize the sum rate of users according to the quality of subchannels.This function is accomplished by the coordination center at the base station side.Thus,every time the devices start the data transmission with standard RACH(Random Access CHannel)procedure exchanging signaling with coordination center,including preamble based grant acquisition and radio resource control connection(RRC)setup[33].

        Figure 1. RACH features of coordinated,grant-free and unsourced multiple access.

        2.2.2 Grant-Free Multiple Access

        Concerning the delay and transmission efficiency,if the RACH process-based CMA is used in the MTC scenario,transmission delay caused by exchanging signaling,processing delay of decoding and coordination signals makes it difficult for the system to meet the strict air interface latency requirement.Grantfree access is an MA method to modify the traditional RACH grant process and reduce the overhead cost [34].Specifically,it can be implemented in two ways.One of them only performs the complete RACH process at the initial access stage but does not interact with the RRC messages during the consecutive transmissions [35].That is,the dynamic resource allocation process is canceled,adapting semi-static RRC.Therefore,it supports both OMA and NOMA modes,and NB-IoT can also turn to the grant-free style.

        The other one is a step further with a RACH-less style.The coordination center only informs the user of the available resource configuration set,and the user directly selects one of them for uplink transmission ˙Because the choice of resources from different users may collide,the NOMA approach is the only option under this model.[34] introduces MA signature[36] and Compressed Sensing (CS) [37] based methods directly evolving from corresponding coordinated NOMA technologies.The coordination center allocates optimized signature sets and spread spectrum sequence sets,and the BS separates collided users by blind detection and decoding.

        2.2.3 Unsourced Multiple Access

        When the MTC scenario and KPI requirements evolve to 6G (as described in section 2.1),the access models based on traditional NOMA may encounter the bottleneck.In theory,Polyanskiy pointed out in [6]that under the sharp increase of active users,the average channel capacity of users converges to zero even though the sum rate is increasing.In other words,the CMA and NOMA based on sum-rate optimization can not guarantee the connection reliability of each user.On the other hand,although the traditional NOMA technologies support the 2-step RACH in grant-free access,it is challenging to meet the low delay short packet transmission requirements due to the signaling overhead and delay caused by the coordination process.So the grant-free modification of CMA is still not enough for 6G MTC networks.

        As shown in figure 2,the UMA changes grantfree to uncoordinated access.The coordination center,together with the resource allocation process,is removed.All users use a common codebook to send their packets randomly,and the collision occurs randomly in the channel.It only matters whether the packets are decoded correctly while the receiver ignores the source of them.Therefore,the optimization goal of the system changes from sum-rate to Per-User Probability of Error (PUPE),i.e.the average packet loss rate of each user.As a result,the user can transmit packets directly when needed,without any signaling exchange in the channel,also known as 1-step RACH.Due to this feature,it’s named as unsourced multiple access.

        An essential presumption of UMA is that only a relatively small group of users turn active simultaneously.The total number of usersKcan go infinite,while the number of active usersKaalways keeps limited,i.e.,the active proportionμ=Ka/Kremains nearly constant.The minimum active duration can be set as the length of transmission framen,in which theseKausers collide.That is to say,it is timedivision on a large scale,and code division on a small scale orμis the mean of Poisson arriving stream per access frame at the BS side.Considering these,Kagenerally ranges from 50 to 300.

        Due to the short packet traffic feature and limited active proportion assumption,the frame lengthnis constrained in the range from 30,000 to 120,000.A certain amount of tolerated errors can keep the rate of each user sub-channel from going to zero,according to finite blocklength coding theorem [38].Inspired by this,Polyanskiy figured out the upper bound of PUPE.The numerical theoretical performance under this framework in [6] reveals that traditional NOMA fails after active users increase to more than 150,causing the rapid increase of SNR required by PUPE.The SNR required by UMA in 1-step RACH is lower than that required by OMA in full RACH to keep the same PUPE in higher user cases.UMA can support massive users and maintain lower access delay and power consumption than CMA and grant-free access,which is more competitive for 6G MTC.

        III.CODING SCHEMES OF UNSOURCED MULTIPLE ACCESS

        3.1 Designing Paradigms

        Figure 2. Transmission behavior comparison among multiple access models for MTC.

        Although in [6] Polyanskiy presented the theoretical performance bound of UMA,the design of a concrete realizable coding scheme is still an open problem.In general,the overall problem ofKaunsourced users each transmittingkbits on sharednorthogonal resources can be broken down into the following three main factors: 1.Cancellation of multi-user interference; 2.Blind detection under common codebook for unsourced features;3.Random transmission structure design associated with parameter optimization.For factor 1,a superposition-based multi-access code is required to resolve the collision in the Gaussian Multiple Access Channel (GMAC).There are plenty of solutions in traditional coordinated NOMA coding regimes,some of which can be extended to the uncoordinated scenario,but with necessary modifications for blind detection,as a matter of factor 2.Moreover,the basic multi-access code is enhanced for the concern of performance or complexity.In UMA,the collision pattern of coded packets is not deterministic.However,specific coding structures such as uncoordinated random CDMA [39] or time-division slotted ALOHA [40] can determine the distribution characteristics of packet collisions,which is related to their coding parameters.For factor 3,it is vital to associate the overall optimization of PUPE with the adjustment of specific parameters under these transmission structures to guide the deployment of these coding schemes.Therefore,we will summarize the various UMA coding schemes in these three aspects in the following subsections.

        3.1.1 Basic Superposition Multi-Access Code

        Collision-resolving can be modeled as the problem of solving linear equations.BCH MA code is designed inGF(2k) under this regime [41].According to the arithmetic character of its parity check matrix,the linear combination of no more thanTcolumns can always be de-mapped to the selected components.Thus,each user’skinformation bits are mapped to the 2k-1 column vectors of lengthKTwith the rate 1/T.The result of superposition can be regarded as a syndrome,so the decoder is the same as BCH Forward Error Correction (FEC) code,using Berlekamp-Massey algorithm[42]to iteratively resolve the exponentials of error polynomial,i.e.,the column index of each syndrome component.

        Compressed sensing MA code models this problem in the real or complex field.For anyT-sparse random matrix satisfying restricted isometry property(RIP)constraintNs >CTln(2k/T)(Cis some constant),the superposition of no more thanTcolumns are resolvable [43].The decoding of CS MA code is the problem of support set recovery.Greedy algorithm Orthogonal Matching Pursuit(OMP),minimization methodl1-LASSO(Least Absolute Shrinkage and Selection Operator)with threshold,and message passing based method AMP(Approximate Message Passing)are effective choices[44].Moreover,the CS MA code directly maps thekinformation bits toNssymbols.Due to the spreading gain,there is no need for an extra FEC code.

        From the superposition coding perspective,there are other pathways.Spatially coupled LDPC(SC-LDPC)[45] encodes each user bits with a common original LDPC(Low Density Parity Check)and then permutes the codewords with different patterns before superposition.Moreover,IDMA [46] is the more generalized interleaver-based coding scheme,consisting of a low rate FEC (usually generated by repetition of an original FEC code)and a user-determining interleaver.Since the superposition of permuted codewords can be transformed as the extension of the factor graph,both of them can be decoded with turbo-like iterative Soft-Input-Soft-Output(SISO)structure[47]or multi-layer Belief Propagation(BP)on extended factor graph[48].

        Polar MA code is designed based on list decoding with Successive Interference Cancellation(SIC)structure [49].Information bits of each user is appended with Cyclic Redundancy Check(CRC)bits before polar encoding to enable the Tal-Vardy’s Successive Cancellation List(SCL)decoding[50,51]at the receiver end.Due to the polarization effect,different codewords of polar code have different transmission qualities.The interference from other users is treated as noise (TIN),so the superposition of polar codewords can be decoded successively.The output of the list decoder that passes the CRC check is recovered as the information bits of one of the users,which is then remapped for SIC.Thus,all the information from different users can be recovered successively under this TIN-SIC iteration[52].

        3.1.2 Enhancement and Modification for Unsourced Scenario

        Most of the above mentioned MA codes work successfully in traditional MA modes,while various degrees of modification or enhancement are required for them to adapt to the uncoordinated GMAC scenario.Although in theory Bose-Chaudhuri-Hocquenghem(BCH) MA code is capable of resolving collisions,the arithmetic character of the transmitted syndrome can be easily corrupted by noise.All of the decoding results would be wrong if any bit of the syndrome changes.To ensure the transmission under AWGN,a linear FEC is successively concatenated to it.BCH MA code is utilized as the basic outer code with a inner FEC in Concatenated Code(CC)scheme[7],which is the first UMA coding scheme proposed by Polyanskiy and Ordenlitch.

        While for CS MA codes,the main problem lies in complexity.Under the basic setup fork= 100,the column size of sensing matrix should be at least 2100,causing unacceptable storage and decoding complexity costs.Coded Compressed Sensing(CCS)[53]adopts the spirit of divide and conquer,splitting the chunk of information bits into sub-blocks,each encoded with the downsized sensing matrix.Meanwhile,to stitch these sub-blocks together for every user separately,additional tree code [54] bits is added to each sub-block to introduce successive parity check relationship.The tree decoder is appended to per-block CS decoder to validate the association between subblocks.Moreover,to further reduce the decoding complexity of CS MA code,a structured sensing matrix design with according enhanced AMP algorithm is proposed under CCS scheme by[55].

        IDMA requires user-specific interleavers to separate different user-palyloads,which can’t be preconfigured by coordination center in UMA.To preserve common codebook feature,the interleaver pattern of IDMA in UMA is determined by part of the user information bits for randomization and efficiency.The transmitted packet should contain two parts,the IDMA codeword and the according coded pilot that usually mapped by CS code.The decoder first detect the coded pilot to complete the expansion of superpositioned factor graph and then start the iterative decoding process.Eventually the IDMA decoding results of pilot and IDMA codeword are stitched together at the end of each decoding branch individually.[56] designed a CS pilot based coding structure for SC-LDPC to identify users,enabling the BP and SIC procedure at the receiver end.Besides,in sparse IDMA scheme [57]the pilot part determines not only the interleaver pattern,but also the repetition rate of each user’s FEC,introducing irregular superpostion pattern and reducing collision among symbols with zero-padding.

        The leveraging of polar MA codes is mainly based on spreading techniques.Since the decoding process begins in TIN mode,appending random[58]or sparse spreading[59]after polar MA encoder can bring coding gain and reduce the interference.Meanwhile,the spreading sequence can be detected and equalized during SIC process to help the start of list decoding.

        3.1.3 Transmission Structure Design

        From the universal view,the transmission structure of UMA can be modeled as a GMAC ofKausers withk-bit input andn-bit codeword each by superposition,depicted as figure 3-c).This works for the design of polar random spreading[58]and sparse spreading[59]schemes,as long as the sparse IDMA[57]scheme taking nearly allnbits to construct an ultra low rate code with only one pilot,while it is not suitable for most of the remaining schemes.For instance,Designing a CCS code directly of 100 info-length and 30,000 codelength would be difficult and ineffective.Except for the direct spreading structure,there are two important intermediate ones,the T-Fold ALOHA[7]and T-Fold RSA[60](Repetition Slotted ALOHA).

        In T-Fold ALOHA,the totalnresources are divided intoVslots of length ˉn=n/Veach.Kausers randomly choose one and only one slot to transmit coded packets,which is uniformly distributed,as shown in figure 3-a).The number of collided packets on each slot follows a binomial distribution withKatimes of experiments and probability 1/Vfor each,i.e.,L ~B(Ka,1/V).Thus,“T-Fold”means to control the probability of the number of users superimposed on any slotLunder the collision thresholdT.In other words,the required capability of collision resolving of MA codes under T-Fold ALOHA is at mostT.CollisionLis positively correlated with the number of usersKaand negatively with the number of slotsV.To ensureP(L >T)→0,it’s necessary to reduce ˉnwhenKaincreases.With the same codelength ˉn,as analyzed before,the SNR requirement of MA codes increases with the increase ofT.Therefore,the trade-off among these coding parameters is the optimization problem for bound approaching under the T-Fold ALOHA structure.Most single slot MA schemes such as BCH-based CC[7],IDMA based schemes[57],SPARC[61,62]adopt this structure.

        As for T-Fold RSA,part or all users repeat their packets for certain or random times,introducing diversity gain through packet coding and enabling packetlevel SIC at the receiver.This is proposed in a series of Liva’s articles[63-65]studying the optimization of packet degree distribution for random access,proving that the irregular repeated packet coding IRSA(Irregular Repetition Slotted ALOHA)outperforms the regular CRDSA(Contention Resolution Diversity Slotted ALOHA).As shown in figure 3-b),given the transmitting degree polynomialλ(x),L ~B(λ′(1)Ka,1/V),i.e.the distribution ofLis controlled byλ(x).Like T-Fold ALOHA,this multi-slot coding scheme has a collision threshold ofTfor MA code within one slot.However,for the cases ofL >T,the chances are that there exist successfully decoded replicas on other slots thatL ≤T.After SIC,some threshold exceeding cases can be reduced underTfor MA decoding.This process is similar to the decoding of LDPC under BEC(Binary Erasure Channel),and the analysis tool can also be applied to the optimization ofλ(x).In[66],the degree of repetition and T-Fold MA code are optimized by modified DE iteration and FBL Bound.Especially for UMA,the number of packet repetitions is given by a local random number generator following optimalλfor each user.The parameter optimization of the CCS scheme with splitting[53]can be regarded as T-Fold CRDSA in terms of parameter optimization,although the multiple packets are not replicas.SC-LDPC with SIC[56]and Polar-IRSA[67]are designed under T-Fold IRSA.

        Figure 3. Transmission structures of unsourced multiple access.

        To conclude,the existing coding schemes can be categorized by the above three determining paradigms.Table 1 gives a summary of mentionable solutions in published works.

        Table 1. The existing UMA coding schemes.

        3.2 State-of-Art Coding Schemes

        In this subsection,the detailed transmitter and receiver structures of three selected typical coding schemes of UMA in table 1 are introduced.Sparse IDMA utilizes the enhanced IDMA as MA code and T-Fold ALOHA as transmission structure.CCS uses CS for MA code with tree code for splitting and stitching under the T-Fold CRDSA.Polar spreading combines polar MA code with direct spreading.All of them are two-level concatenated code in some sense and representative in their respective categories.Without loss of generality,the sketches in figure 4-6 of each are simplified as two-user GMAC.

        The system structure of sparse IDMA [57] is presented in figure 4.As mentioned in 3.1,sparse IDMA is designed based on IDMA with pilot,adding random irregular repetition within IDMA superposition coding sctructure.The information bitswifrom useriof lengthkis splitted into two parts,wsiwith lengthksandwciwith lengthkc.wsiis coded byNs ×2ksCS matrix for pilotxsi,also as the seed of pseudo-random number generator to determine number of repetition following certain degree distributionαi(wci)~λ(x)and the index of interleaver patternfi ∈F.wciis first sent to LDPC encoder with rateRL,the BPSK modulated codeword of which is denoted byui.Anduiis then repeatedαitimes and zero-padded to the length ofNc,to generate sparsely spread codeworduri.The BPSK modulated symbol sequenceuriis interleaved byxci=fi(uri).Finallyxsiandxciare stitched together to form the coded symbol packetxiof one slot length ˉn=Ns+Nc.Forv1andv2colliding in one slot,their pilot partsxs1andxs2and IDMA codedword partsxc1andxc2collide in the channel individually.Under thisT-Fold ALOHA structure,the row and column size of CS pilot encoder and IDMA coding setupRLtogether withλ(x)are the main parameters to be optimized to guarantee the “T-Fold” condition.The encoding process is performed in parallel,while the decoding is serial.The factor graph of superimposed LDPC code is reconstructed by recovering the support set of pilotsfromusing algorithms like OMP.Then through BP iteration on this 2-layerL-branch irregular factor graph,the IDMA information bitsis recovered at variable nodes of each branch[48].Due to the bijective relationship between branches and patterns,the decodedandare stitched again to form the final resultof detection.

        Unlike sparse IDMA,CCS [53] is a multi-packet coding scheme.wiis splitted intoJsub-blockswith indexjand lengthk(j)for tree coding.Except the first heading sub-block,all the following sub-blocks are appended with-bit tree code parity checkto output coded sub-blockswith equal length.Then,each tree coded subblockis sent to the sameNs×2GCS encoder to generate spreading codeword,transmitted on consecutively randomly chosen slotv.Therefore,each user encoder hasJparallel coded packets,utilizing theT-CRDSA transmission structure withJdiversity.

        Figure 4. System structure of sparse IDMA.

        The CS encoder has to ensureT-sparse resolvability and the tree encoder is designed to stitchJsub-blocks together.The decoder is the mirrored reverse of the encoder.With CS decoding slot-by-slot,theLvsuperimposed packetsyvon each slotvare first recovered as support set and then remapped as sub-blocksof tree codeword.Then from the first uncoded anchor sub-blockof each useri,the parity check relationship between the neighbor slots are validated.One survive path is selected fromLvpaths on each stage.Thus,the decoding process for each user is to find a surviving path on a depth-Jtree with depth-first style.TheseJ ×Kasub-blocks are finally threaded asKarecovered information chunksof each user.

        The coding structure of the polar spreading scheme[58] features a two-stage bit-level spreading style.Similar to the pilot encoding of sparse IDMA,the spreading sequencesiis determined bywsi,a part of information bit sequencewi.Through hash mappingg(·),ssi=djis selected from the sequence setDby the indexj=g(wsi).However,the polar coded and modulated codeworduiis not transmitted in parallel withsias in sparse IDMA,but directly spread by it.The Kronecker productxi=ui ?sifromKausers are superimposed in the channel to generate receiving signaly.Under direct spreading structure,thendegrees of freedom of the channel are used as one codeword.The aim of spreading sequence design is minimizing user interference and maximizing spreading gain,with random spreading for pursuit of performance and sparse spreading reducing the complexity.At the receiver,the decoding process is performed in an iterative SIC style.At the start of thet-th iteration,with blind sequence detection,the subsetof the set of sequencesDused by all theKausers is identified.In [58],a segmented energy detector for random spreading is introduced.Then an Minimum Mean Square Equalizer (MMSE) [69] based onis performed to produce de-spread soft symbol sequencesas in random CDMA.Under polar SCL decoding,each decoding resultofis checked by CRC to verify its correctness [70].The set of user index that passes the validation is denoted asE.The decoded sequenceswithi ∈Eare remapped to code chipsand then subtracted from the receiving signaly.The input of next iteration isDuring each iteration,there are new candidates adding to the successively decoded setE.Until|E|=Ka,the iteration is terminated,i.e.all the user informationis decoded.

        Figure 5. System structure of CCS.

        3.3 Comparison and Evaluation of UMA Coding Schemes

        This section gives some analytical and evaluative reviews among the existing coding schemes after introducing them.We focus on two main aspects,the energy efficiency performance and corresponding computing complexity at the receiver end under the same setup of packet traffic loads and error requirements.

        3.3.1 Energy Efficiency Performance Evaluation

        As the analytic system established by Polyanskiy in his achievability bound research[6],the general evaluation of the performance of UMA coding schemes is the SNR threshold vs.number of usersKacurve,which is the reflection of system energy efficiency.The SNR threshold is the minimum requiredEb/N0to keep the PUPE of the user payloads below a certain level?,under the condition that the number of active usersKaand the total degrees of freedom of the channelnis limited.With givenn,k,and?,the SNR threshold rises to counter the strengthening of user interference brought by more active usersKa.The bound of SNR threshold under random coding as the best achievable performance is given in[6]as depicted in figure 7,which is the approaching target of UMA coding scheme design.

        As summarized in Table 1,the compared schemes can be categorized by their transmission structure in three groups.Under the T-Fold ALOHA structure,the BCH MA code-based CC scheme[7]is worst in performance.It is mainly because of the vulnerability to errors of BCH MA code,relying on the BLER of the short FEC(Forward Error Correction)inner code.Moreover,the maintenance of “T-Fold” whenKaincrease is realized by the rapid rising of BCH code length.Thus,the curve has a large gap of 10 dB from the bound and a sharp tangent in the growth trend.

        Table 2. Computational complexity comparison of UMA coding schemes.

        Figure 6. System structure of polar-RS.

        As for CS-based schemes,the CCS-SIC [53]has significant improvement against the CC scheme.Compressed sensing directly maps user information to the complex signal domain and handles the user interference by resolving support set recovery under noise,which improves system energy efficiency.Meanwhile,the tree code is also effective enough to enable downsized CS coding and sub-block stitching without much loss of code rate.The CCS-eAMP[55]adjusts the serial structure of CS AMP decoding and tree decoding,inserts the tree parity check into the CS decoding process between adjacent slots,enables pre-pruning operation on the tree structure,and reduces the range of support set to improve the decoding efficiency.Therefore,this enhanced decoding structure has almost 2dB gain compared with the standard CCS-SIC scheme under lowerKacases.However,The overall SNR threshold curves of the CCS systems increase rapidly.In order to ensure the sparsity condition,the number of collisionsLvon a single slot needs to be controlled.Therefore,whenVincreases and ˉnbecomes shorter,the CS performance deteriorates rapidly.The depth and breadth of the code tree expand simultaneously,causing higher error rates while stitching.

        The sparse IDMA [57] has the best performance among all T-Fold ALOHA schemes.Due to the irregular spreading of low rate FEC bits within each packet,the BP iteration effectively canceled the user interference on the optimized superposition factor graph structure.The relatively slow increase of SNR is introduced by the reduced degrading effect of sparse IDMA.However,it still has 5dB gap underKa=200 setup.Since the collisions increase rapidly withKa,to keep the “T-Fold” feature,Vneeds to increase whileˉnto decrease.The gain caused by irregular repetition gradually weakens with shortened code length.

        Compared with T-Fold ALOHA schemes,the TFold IRSA design relaxes the requirement for collision toleranceTis relaxed through package-level SIC enabled by optimized transmission diversity gainλ(x) under the sameKa,to lower the SNR threshold.Within this category,the main differences between the two IRSA schemes,the SC-LDPC+SIC[56]and polar-IRSA[67],are the choice of basic MA code and gain of coding parameter optimization.Polar MA code under SC list decoding has better collision toleranceTthan SC-LDPC.The curve of SC-LDPC+SIC is attained underT= 4 while the polar-IRSA is underT= 8.Compared with sparse IDMA in the Tfold ALOHA model,this scheme is still limited in its ability to counter user growth,indicating that the joint optimization between basic MA code and the irregular packet diversity needs to be further enhanced.

        Finally,the two most effective coding schemes are polar-random spreading (polar-RS [58]) and polar-sparse spreading(polar-SS[59])utilizing direct spreading technique.The SNR threshold of polar-RS is very close to the bound under lowKacases and most close over the existing schemes.As a complexity-reduced version of polar-RS,the polar-SS maintains the performance advantage with slight degradation.All the performance curves of these above mentioned are synthetically compared in figure 7.

        Figure 7. Ka vs Eb/N0 curves at PUPE=0.1 for the setup k =100 bits and n=30,000.

        3.3.2 Computational Complexity Analysis

        Due to the unsourced uplink feature of UMA,the complexity of the whole system mainly concentrates on the decoding process of the receiver.From the perspective of the coding paradigm,each factor in subsection 3.1 can affect the complexity of the decoding algorithm.Direct spreading and T-Fold IRSA transmission structure need to receive the full length-nframe and perform the overall packet decoding or chip decoding SIC process.However,the T-Fold ALOHA mode can be used for independent slot decoding and has more significant advantages in a processing delay.The choice of basic MA code determines the complexity of single packet decoding.BCH with Berlekamp-Massey algorithm performs decoding onGF(2k) and has the lowest complexity.The AMP decoding algorithm contributes the most complexity of CS-based schemes.The factor graph size increases with the size parameters of sensing matrixNsand 2G.As for tree coding,its complexity is about the same as the depth-Jfirst traversal process on the sub-block parity check tree.The decoding of sparse IDMA consists of two stages,the AMP decoding of the pilot and BP decoding on the expanded factor graph,both of which are iterative message-passing algorithms.The energy detector and MMSE expenses the most computational cost of the polar-RS scheme because of the blind detection on the large dimension of random spreading.

        Figure 8. Ka vs.FLOPf curves at PUPE=0.1 for the setup k =100 bits and n=30,000.

        For the above four mentioned typical coding schemes,table 2 gives a detailed computational complexity as the function of coding parameters.Note that the measure of computational complexity,the FLOPf(floating-point operations per frame),is based on the expected total floating-point calculation of decoding all the user packets in one access frame of lengthn.This definition and granularity of complexity guarantee fairness when it comes to different coding schemes.Moreover,under this framework,we substitute the optimized parameters in [7,68,57,58] to get theKavs.FLOPf curves of each coding scheme.For these encoding schemes in figure 8,the primary trend in computational complexity is to increase as the number of users increases,but there are vast orders of magnitude differences among them.Since their SNR threshold varies widely,it is necessary to compare the complexity cost of energy efficiency gain or tradeoff relationship between these two evaluation merits among different coding schemes.

        In figure 9,the number of users is fixed at medium load setupKa=150.Comparing CC and CCS-AMP,it is clear that the SNR threshold is reduced by about 10dB while the complexity increases by only one order of magnitude.However,going from CCS-AMP to Sparse IDMA costs more than an order of magnitude of complexity for an efficiency gain of only 1.4dB.The 1.2dB performance improvement from Sparse IDMA to Polar- RS requires another two orders of magnitude of complexity.This phenomenon indicates that the closer it gets to the bound,the more complexity it needs to pay for marginal leverage of the performance.The comprehensive analysis of these existing coding schemes shows that some are energy-efficient enoughto approach the ideal bound at low user cases.However,the complexity cost of these solutions is too high,so a better trade-off between complexity and performance is needed.Meanwhile,there is still a big gap between the energy efficiency and the performance of the existing solutions under high user numbers,and the design needs to be further optimized to cancel the fierce multi-user interference.

        IV.OPEN ISSUES AND RESEARCH POTENTIALS

        4.1 Bound Approaching Coding Scheme Design

        In terms of performance,lowering the SNR threshold is the permanent focal point of UMA code design,which is vital for the low-power feature of devices in MTC Networks.In addition to the existing schemes adapted from traditional with modification in various degrees.Besides,although the performance curves of some existing schemes are pretty close to the achievability bound at low load cases,they diverge from the bound quickly whenKabecomes higher.The optimization of code design to narrow the gap,especially in the highKaregion,remains to be done.The following competitive coding scheme is expected to tackle the increase of multi-user interference whenKagrows to have a better tangent at theKa-SNR curve.

        Figure 9. Performance and computational complexity comparison at Ka = 150,PUPE=0.1 for the setup k = 100 bits and n=30,000.

        4.2 Complexity Reduction

        According to the analysis in section 3.3.2,the cost of complexity for performance improvement increases rapidly.Although the computational resources are assumed to be abundant at the receiver side,the complexity problem is always a genuine concern for manufactures and operators when it comes to deployment.The access points (AP) in MTC network should be low-cost and simple for massive deployment.As the analysis shows,the complexity problem relies on decoding algorithms and the coding scheme’s overall design.Existing schemes have already considered the realization complexity in their design,but this is not enough.The trade-off between performance and complexity is another essential work excepted from the competition of extreme performance.

        4.3 Practical Propagation Conditions: Fading&Asynchronous

        The mainstream research results in this field focus on the coding design under the GAMC channel,while few consider the implementation under the more realistic propagation models.The problems that we must tackle are practically the block fading characteristics on different user packets and the synchronization between blocks caused by unscheduled features,which is typical for MTC scenarios.[71] gives the approximate performance bound for fading channels and an ideal coding and decoding framework.[72] preliminarily considers the influence of block misalignments in the case of asynchronous and fading channels.The coding scheme design with performance advantages in asynchronous and fading channels is also an important work to consider for promoting the application and standardization process of UMA for MTC.Blind equalization,channel estimation,and the corresponding coding structures are the main techniques to be developed.

        4.4 MIMO UMA

        Massive MIMO has become the key technology in the 5G system and will be evolving to 6G.MIMO can introduce more diversity gain by multiple antennas,and joint space-time code design can increase the degree of freedom in the system.At present,[73,74]combines UMA coding scheme with MIMO,but their optimization for energy efficiency and MIMO fading channels are still insufficient.The capacity gain of MIMO has been widely studied,but its effect on the PUPE under UMA is not clarified.With distributed MIMO [75]deployed in uplink transmission,the design of twodimensional time-space transmission structure and the maximization of multi-antenna diversity coding gain are two crucial research focuses.The existing results of blind detection[76],multi-user MIMO design[77],and pilot coding design [78] in the MIMO field can provide more research ideas for the design of UMA.

        4.5 Physical Layer Security

        The 1-step access process of the UMA system does not identify and authenticate user data packets under MTC scenarios.In some MTC network operations,it is necessary to check the identity and behavior legitimacy of access devices,e.g.security sensor data transmission.The total openess of air-interface may encounter malicious attacks.In addition,the passive data packet may have eavesdropped because of the openness of the air interface and the universality of the codebook.Therefore,it is necessary to introduce some low-complexity physical layer security [79] technologies to the code of the UMA on the sending end and add the packet decryption process on the receiving end to ensure the secure and effective transmission of short packets.

        ACKNOWLEDGEMENT

        This work was supported by National Natural Science Foundation of China under Grant 61971062,Grant 92067202,Grant 62071058,Grant 62001049,Beijing Natural Science Foundation under Grant 4222012,and Beijing University of Posts and Telecommunications-China Mobile Research Institute Joint Innovation Center.

        深夜福利国产| 99亚洲男女激情在线观看| 亚洲人成无码www久久久| 曰韩无码二三区中文字幕 | 日日av拍夜夜添久久免费 | 日韩精品无码久久久久久| 欧美日韩亚洲国产无线码| 高清国产亚洲精品自在久久| 国产乡下妇女做爰| 欧美人与动人物牲交免费观看久久| 内射囯产旡码丰满少妇| 欧洲亚洲第一区久久久| 欧美在线Aⅴ性色| 亚洲色图在线免费观看视频| …日韩人妻无码精品一专区| 国产涩涩视频在线观看| 青春草国产视频| 一区二区三无码| 蜜桃网站免费在线观看视频| 亚洲国产果冻传媒av在线观看| 色欲人妻综合网| 色综合久久精品中文字幕| 久久狼人国产综合精品| 亚洲av无码一区二区三区网址| 高潮迭起av乳颜射后入| 特级毛片a级毛片在线播放www | 把插八插露脸对白内射| 国内精品91久久久久| 国产不卡在线观看视频| 欧美午夜刺激影院| 亚洲AV无码国产永久播放蜜芽| 国产91大片在线观看| 亚洲av成人无码久久精品老人| 亚洲精品国偷自产在线99正片| 麻豆国产AV网站| 开心五月激情五月五月天| 国产亚洲精品成人aa片新蒲金| 欧美精品免费观看二区| 二区三区亚洲精品国产| 人妻精品一区二区三区蜜桃| 婷婷久久香蕉五月综合加勒比|