CN113056027A - Authorization-free access method in communication - Google Patents

Authorization-free access method in communication Download PDF

Info

Publication number
CN113056027A
CN113056027A CN202110134805.5A CN202110134805A CN113056027A CN 113056027 A CN113056027 A CN 113056027A CN 202110134805 A CN202110134805 A CN 202110134805A CN 113056027 A CN113056027 A CN 113056027A
Authority
CN
China
Prior art keywords
active
user
area
users
modulation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110134805.5A
Other languages
Chinese (zh)
Other versions
CN113056027B (en
Inventor
王磊
黄博文
郑宝玉
崔景伍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Nanyou Communication Network Industry Research Institute Co ltd
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Nanyou Communication Network Industry Research Institute Co ltd
Nanjing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Nanyou Communication Network Industry Research Institute Co ltd, Nanjing University of Posts and Telecommunications filed Critical Nanjing Nanyou Communication Network Industry Research Institute Co ltd
Priority to CN202110134805.5A priority Critical patent/CN113056027B/en
Publication of CN113056027A publication Critical patent/CN113056027A/en
Application granted granted Critical
Publication of CN113056027B publication Critical patent/CN113056027B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0036Systems modifying transmission characteristics according to link quality, e.g. power backoff arrangements specific to the receiver
    • H04L1/0038Blind format detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0045Arrangements at the receiver end
    • H04L1/0047Decoding adapted to other signal detection operation
    • H04L1/0048Decoding adapted to other signal detection operation in conjunction with detection of multiuser or interfering signals, e.g. iteration between CDMA or MIMO detector and FEC decoder
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/32Carrier systems characterised by combinations of two or more of the types covered by groups H04L27/02, H04L27/10, H04L27/18 or H04L27/26
    • H04L27/34Amplitude- and phase-modulated carrier systems, e.g. quadrature-amplitude modulated carrier systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an authorization-free access method in communication, which is characterized in that user side equipment shares a CTU (communication terminal unit) through a soft SIM (subscriber identity module) card, wherein the CTU means a competitive transmission unit; user terminal equipment adopts a CTU self-competition mode to strive for uplink resources; and carrying out authorization-free transmission on the user terminal equipment by using an FQAM (quadrature amplitude modulation) modulation scheme, and acquiring the number of active users by using the FQAM modulation scheme. The scheme has the advantages of reducing the signaling load of the access network and the core network and having low complexity.

Description

Authorization-free access method in communication
Technical Field
The invention relates to the technical field of mobile communication, in particular to an authorization-free access method in communication.
Background
With the development of networks and communications, 4G has not been able to satisfy various devices, services and people's demands for networks, and fifth generation mobile communication systems have been used. The 5G is not a brand-new technology, and business expansion and other functions are perfected on the basis of the 4G. The 5G has the characteristics of super high speed, low power consumption, super low time delay, high reliability and the like. Due to the development of the characteristics, the 5G can meet the technologies of the Internet of things, virtual reality and the like, and the vision of 'everything interconnection' is really realized. A key and fundamental technology developed for wireless communication is the multiple access scheme of users in the channel. The introduction, development, and ultimately maturity of each generation of mobile communication systems is not open to multiple access technologies. FDMA from 1G, OFDM up to 4G, and to the current 5G NOMA (Non-orthogonal Multiple Access, NOMA) technologies, iterative updating of technologies is followed by a continuous pursuit of lower latency, more Access, more reliable connections, and faster speeds.
Compared with 4G, 5G needs to solve the requirement of 1000 times and more larger capacity, 10-100 times of large-scale equipment connection, 5-15 times of frequency spectrum efficiency improvement, and the problem of frequency spectrum scarcity and the like. If the 4G OFDM multiple access technology is also used in 5G, the problems of multipath fading resistance, high sensitivity to carrier frequency offset, large side lobe generated by the adopted baseband waveform, and the like will be faced.
Therefore, a new multiple access technology with higher spectrum utilization, stronger access capability and larger system capacity is urgently needed by 5G.
Disclosure of Invention
The invention aims to overcome the defects in the prior art and provide an authorization-free access method in communication, which can reduce the signaling plane load of an access network and a core network.
In order to achieve the purpose, the invention is realized by adopting the following technical scheme:
the invention provides an authorization-free access method in communication, which is characterized by comprising the following steps: sharing a CTU (communication terminal unit) by user side equipment through a soft SIM (subscriber identity module) card, wherein the CTU means a competition transmission unit; user terminal equipment adopts a CTU self-competition mode to strive for uplink resources; and carrying out authorization-free transmission on the user terminal equipment by using an FQAM (quadrature amplitude modulation) modulation scheme, wherein the FQAM modulation scheme comprises the quantity of the acquired active users.
Further, the method for acquiring the number of active users comprises: the modulation mode and the coding parameter used in the active area of each unlicensed access area are predefined by the base station, and both the user and the base station know the modulation mode and the coding parameter; an expected average number of active sub-carriers over an active area for a given number of users is calculated and the number of active sub-carriers is estimated based on signals received in the active area.
Further, the method for the unlicensed access in communication further comprises the step of pre-configuring an unlicensed access area, wherein the pre-configured unlicensed access area is composed of a time-frequency block; blind detection of the number of active users is performed over a given unlicensed access area.
Further, the method for performing blind detection on the number of active users in a given unlicensed access region includes: the method comprises the steps that an authorization-free access area is divided into an active area and a data area; FQAM modulation detects whether a user is active in the active area; the data area can be adjusted according to the system requirement through the network; dividing available resource elements in an active region into U-Na/MFEach FSK subcarrier subset will represent one FQAM symbol, where NaRepresenting the number of resource elements in the active area.
Furthermore, when new data transmitted by the users arrives, each user selects any unauthorized access area for transmission; the user will use the modulation and coding parameters of the active region in the selected unlicensed access region; if the network is not defined, the user will use modulation and coding parameters in the data region based on the channel conditions and the required QoS, which refers to the underlying technology that the network can utilize.
Further, the method for performing blind detection on the number of active users in a given unlicensed access area includes the following steps: the base station will calculate the active subcarriers a (K, N) over the active area for a given number of usersa,MF) The expected average number of; the base station will estimate the number of active sub-carriers based on the signals received in the active area.
Further, the method can be used for preparing a novel materialThe method for performing blind detection on the number of active users in a given unlicensed access region comprises the following steps: estimating the number of active sub-carriers from the received user signal interfered by noise and comparing the estimated number of active sub-carriers with the expected number of active sub-carriers alpha (K, N)a,MF) A comparison is made and the number of active users is estimated accordingly.
Further, the base station transmits to the user: location and size of the unlicensed access regions, size of the active regions in each unlicensed access region, modulation and coding parameters for each active region, parameters for open loop power control, and the base station may set the modulation and coding parameters for each data region.
Further, the parameters for open loop power control include a path loss compensation factor, and an expected received power of the base station.
Compared with the prior art, the invention has the following beneficial effects: the invention uses the authorization-free transmission of FQAM to obtain the number of active users, thereby better obtaining demodulation.
Drawings
Fig. 1 is a diagram of a Contention Transmission Unit (CTU) definition of the present invention;
fig. 2 is a schematic diagram of CTU access regions for uplink contention based transmission according to the present invention;
FIG. 3 is a schematic representation of the present invention having M F4 sub-carriers and MQFQAM example graph for QAM 4;
FIG. 4 is an exemplary diagram of an unauthorized access-free physical resource of the present invention;
FIG. 5 is a schematic diagram of multi-user unlicensed data transmission of the present invention;
FIG. 6 is a flow chart of the unauthorized access and blind detection of user activity of the present invention
Fig. 7 is a schematic diagram of the average number of subcarriers in an FQAM symbol of the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby.
The idea of NOMA is that multiple users are allowed to use a uniform resource at the transmitting end, and the signals are separated at the receiving end to extract information of different users. Researchers have proposed many NOMA Access technologies, and many related technologies have been proposed by the national research units, including Multiple User Shared Access (MUSA) proposed by zhongxing communications, Pattern Division Multiple Access (PDMA) proposed by the telecommunications research institute, and Sparse Code Division Multiple Access (SCMA) proposed by hua ji. Under the premise of the same resource configuration, in a plurality of non-orthogonal multiple access schemes, the code book of the SCMA has the characteristic of low density, and various frequency modulation devices are added, so that the code book is easier to change, and the SCMA is more excellent in link performance than MUSA and PDMA. In addition, the SCMA is more suitable for 5G low-delay and large-capacity scenes by virtue of the characteristics of high overload, high throughput and the like.
In addition, the reason why the SCMA adopts the authorization-free mode for accessing the user to the base station is as follows: the essence is based on competition between users, which is more suitable for license exemption. For unlicensed uplink transmission, all users are first assigned different SCMA codebooks to complete non-orthogonal multiple access. Then, by using the sparse code word characteristic of the SCMA, the base station can separate the superposed signals into information of each independent user, and the SCMA uplink transmission capacity is greatly improved.
The process of the license-free transmission is as follows: users compete for uplink resources. In this process, the user randomly selects a contention unit for transmission, which would involve a means for blind detection for multiple users. For blind detection, idle users in the channel will send 0 codewords, while active users will send 1 codewords. The blind detector will perform iterative screening of the potential user list to gradually screen out the active users. In the process, the number of active users determines information such as a user list and the number of times of iteration. It is therefore crucial for the entire process of authorization exemption to preferentially obtain the number of active users, in which regard the number of active users in the authorization exempted zone is estimated according to the characteristics of the FQAM modulation.
In order to be able to support unlicensed multiple access for an uplink SCMA system, we must then determine the correct radio resources. As shown in fig. 1, the most basic resource for unlicensed transmission is called a Contention Transmission Unit (CTU), which is composed of time, frequency, SCMA codebook and pilot. We define a codebook J in one time-frequency resource. For each codebook, the L pilot sequences will be correlated with the codebook. Next, lxj is defined as the unique pilot sequence. Thus, there are a total of L × J Contention Transmission Units (CTUs) in the time-frequency resource. According to fig. 2, the assigned time-frequency resources of the codebook form the access area of the CTU. The size and number of access areas depends on many factors, such as the number of terminals and applications that are suitable for unlicensed multiple access. By utilizing the predefined CTU access area and the CTU allocation to the user equipment, the dynamic uplink authorization process of a SCMA access mode based on competition is eliminated.
In multicarrier communication, the available bandwidth of the system is divided into a set of N subcarriers (N ═ 1.., N }), and a user K ∈ K can transmit data to the base station by selecting the subcarriers. In the conventional QAM modulation scheme employed in current wireless communication systems, a user transmits symbols on all of the subcarriers allocated to it. On the other hand, the M system carries Q log2FQAM of (M) information bits by applying at MFOne subcarrier is selected from the subcarriers (representing the number of FSKs), and the subcarrier is subjected to M-ary QAM modulation. Therefore, the modulation order of the FQAM symbols may be changed from M to MFMQM represents and each FQAM symbolFAnd (4) subcarrier composition. In FIG. 3 is shown M F4 sub-carriers and MQAn example of a QAM constellation of 4. It is worth emphasizing that the sub-carriers selected in each transmission time depend on the incoming data, which is not pre-allocated. Let subcarrier D ═ { 1.. multidata., MFDenotes the u-th subset (i.e., the QAM modulation carrier set for each FSK subcarrier), where when | D | ═ MFFor transmitting the u-th FQAM symbol, the m-th subcarrier of this subset (QAM symbol)The corresponding carrier) will carry one QAM symbol with the remaining subcarriers being zero. Using log of input bit vectors2(MF) Selecting subcarrier index m E DuUsing other logs2(MQ) Bit-selective transmitted QAM symbols (a e a), where a is M with | a | >QThe QAM constellation of (1). FQAM is proposed for downlink transmission to improve the throughput of edge users. The research of FQAM mainly comes from practical application: the worst case distribution of additive noise is a gaussian distribution in terms of channel capacity. By having some subcarriers inactive in FQAM, the inter-cell interference will have a non-gaussian distribution, which will increase the channel capacity. The advantages of FQAM are more prominent in interference limited situations, such as cell edge users with inter-cell interference as the dominant factor.
In the unlicensed access method, a user transmits to a base station without a prior scheduling/grant permission of the base station. In order to achieve unlicensed access and avoid collisions between unlicensed access and conventional timed access, the network will pre-configure an unlicensed access area, as shown in fig. 4. Each unlicensed access area will consist of one time-frequency block. Multiple users may select the same time and frequency resources since the users may access the system without prior scheduling. Thus, the base station does not know in advance the number of users that are actually transmitting and that are transmitting on the unlicensed access area. Therefore, the base station must perform blind detection of the number of active/transmitting users over a given unlicensed access area.
In the proposed method, the unlicensed access area will be divided into two blocks as shown in fig. 5. The first area is called the active area. In which FQAM modulation is used to detect whether a user is active. The second area is called the data area, which can be adjusted by the network according to the system requirements, and therefore the data area is allowed to use any modulation scheme (FQAM, QAM, etc.). But we note that both areas will carry the user's data. However, the modulation used over the active region will help blindly detect the number of users transmitting over the unlicensed access region. This is achieved byIn addition, the unauthorized access area is essentially composed of only the active area, and the data area is only the regulatory function of the execution area. The available resource elements in the active region will be divided into U-Na/MFEach FSK subcarrier subset will represent one FQAM symbol, where N is equal to 1aIndicating the number of resource elements (i.e., the number of subchannels or subcarriers) in the active area.
The modulation scheme and coding parameters (i.e., M) used by the user in the active region of each unlicensed access region are designed to be used by the userF、MQCode rate, etc.) are predefined by the base station, both the user and the base station know the modulation scheme and coding parameters. To do this, the base station should transmit (e.g. by control broadcast) to the user: location and size of the unlicensed access regions, size of the active regions in each unlicensed access region, modulation and coding parameters for each active region, parameters for open loop power control (e.g., pathloss compensation factor, expected received power of the base station), modulation and coding parameters that the base station may set for each data region.
When new data transmitted by the users arrives, each user selects any unauthorized access area for transmission. The user will then use the modulation and coding parameters of the active area in the selected unlicensed access area. If the network is not defined, the user will use modulation and coding parameters in the data area based on the channel condition and the required QoS (Quality of Service), which means that a network can provide better Service capability for the specified network communication by using various basic technologies, and is a security mechanism of the network, which is a technology for solving the problems of network delay and congestion. The data transmitted in the active area includes: the modulation and coding information of the data region, its user ID (and other required identification information) and a small amount of data (depending on the active area size and modulation and coding scheme).
In the data transmitted on the data area, its user ID (if not included in the active area) and any other payload data may be included.
In order to blindly detect the number of active users in the unlicensed access area, the base station will perform the following steps:
first, the base station will calculate the active subcarriers α (K, N) over the active area for a given number of usersa,MF) Is expected to be the average number of cells. As shown later, the average number of active subcarriers is the active region (N) in addition to the number of active usersa) And MFIs a function of the number of resource elements in (1). Thus, this step can be done once and need not be performed at every transmission.
The base station will then estimate the number of active subcarriers (β) based on the signals received in the active area. As in FQAM, each user will activate one FQAM symbol, the number of active resource elements will depend on the number of transmitting users on the same unlicensed access region.
If there is no signal transmitted on a given subcarrier, the base station should receive gaussian noise (in some cases inter-cell interference) only on that subcarrier, which has a probability density function:
Figure BDA0002926456650000081
wherein is σ2Power noise per subcarrier.
On the other hand, if there is a transmission on a subcarrier (from one or more users), the base station will receive a user signal that is interfered with by noise. Conventional energy detection methods may be used to detect active subcarriers. Once the number of active subcarriers (β) is estimated, the base station will match it to the expected number of active subcarriers α (K, N)a,MF) A comparison is made and the number of active users is estimated accordingly.
Estimated number of users
Figure BDA0002926456650000082
Will be passed to the detection and decoding block (as shown in fig. 6) to retrieve the user data on the active area. For example, if the base station estimatesOnly one user is active and it will perform single user detection and channel decoding for one user. However, if the base station detects that two users are active, it will perform multi-user detection and then channel decode both users. The base station uses the information retrieved from the active area to detect and decode user data on the data area. If the base station successfully retrieves all user IDs from the active area, it will be able to send out: 1) ACK + ID for each user (whose data was successfully decoded), or 2 NACK + ID for each user (whose data was unsuccessfully decoded).
We provide the active sub-carriers alpha (K, N) over the active area for a given number of usersa,MF) Comprises the following steps: first, we get the average number of active subcarriers of all FQAM symbols and extend it to N by simple scalingaA resource element. Let n denote the number of active subcarriers in one FQAM symbol, i.e. MFThe number of subsets of subcarriers. Since each FQAM symbol is composed of MFM consisting of subcarriers and thus being activatableFSubcarrier not exceeding MFAlso, the number of active sub-carriers cannot be greater than the number of active users (users transmitting on the same subset of sub-carriers). Thus, there may be 1 to min (K, M) in each FQAM symbol depending on the number of users using the subcarrier subsetF) 1 < n < min (K, M)F)。
The general formula for the average number of active subcarriers per FQAM symbol is as follows:
Figure BDA0002926456650000091
wherein p (n | K, M)F) Is M assuming that K users are in the same sub-carrierFThe probability of transmission on a subset, i.e. the probability of one FQAM symbol having n active subcarriers.
For the case where only one user is transmitting (K ═ 1), we will have a probability of 1, i.e. using only one MFSub-carrier wave(i.e., p (n-1 | k-1, M)F1)), the desired average number of active subcarriers will therefore be α (K1, M)F) 1. For the case of two users, the probability of having one subcarrier active is given by the probability of both users selecting the same subcarrier. The probability of selecting sub-carrier by user is 1/MFAnd there is MFSub-carriers, so the probability will be:
Figure BDA0002926456650000092
similarly, the number n of two sub-carriers in active state is 2, which is equal to the probability that one user selects a sub-carrier and the second user selects a different sub-carrier:
Figure BDA0002926456650000101
thus, for the case of two users, the average number of active subcarriers per FQAM symbol would be:
Figure BDA0002926456650000102
the same derivation procedure can be followed to derive the average number of active subcarriers per FQAM symbol for different numbers of users, we provide the following examples (assuming MF≥4):
Figure BDA0002926456650000103
Figure BDA0002926456650000104
Figure BDA0002926456650000105
Figure BDA0002926456650000106
FIG. 7 shows MFThe expected average number of active sub-carriers relative to the number of active users, 4 and 8. By using Na/MFScaling (representing the number of FQAM symbols in the active area) the average number of active subcarriers can be summarized from one FQAM symbol to NaThe size of the active area. It is worth mentioning that the average number of active sub-carriers can be calculated off-line once and need not be performed at each transmission time. Furthermore, a higher number of active users may not have practical significance because even if the number of active users is determined, it is unlikely that the transmitted data will be successfully detected (due to the increase in inter-user interference).
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made in the above embodiments by those of ordinary skill in the art without departing from the principle and spirit of the present invention.

Claims (9)

1. An authorization-free access method in communication is characterized by comprising the following steps:
sharing a CTU (communication terminal unit) by user side equipment through a soft SIM (subscriber identity module) card, wherein the CTU means a competition transmission unit;
user terminal equipment adopts a CTU self-competition mode to strive for uplink resources;
and carrying out authorization-free transmission on the user terminal equipment by using an FQAM (quadrature amplitude modulation) modulation scheme, wherein the FQAM modulation scheme comprises the quantity of the acquired active users.
2. The method of claim 1, wherein the method of obtaining the number of active users comprises:
the modulation mode and the coding parameter used in the active area of each unlicensed access area are predefined by the base station, and both the user and the base station know the modulation mode and the coding parameter;
an expected average number of active sub-carriers over an active area for a given number of users is calculated and the number of active sub-carriers is estimated based on signals received in the active area.
3. The method according to claim 2, wherein the method further comprises pre-configuring an unlicensed access area, the pre-configured unlicensed access area being composed of one time-frequency block; blind detection of the number of active users is performed over a given unlicensed access area.
4. The method of claim 3, wherein the blind detection of the number of active users in a given unlicensed access region comprises:
the method comprises the steps that an authorization-free access area is divided into an active area and a data area; detecting whether a user is active in the active area by FQAM modulation; the data area can be adjusted according to the system requirement through the network;
dividing available resource elements in an active region into U-Na/MFEach FSK subcarrier subset will represent one FQAM symbol, where NaRepresenting the number of resource elements in the active area.
5. The method of claim 4, wherein each user selects any unauthorized access area for transmission when new data transmitted by the user arrives;
the user will use the modulation and coding parameters of the active region in the selected unlicensed access region; if the network is not defined, the user will use modulation and coding parameters in the data region based on the channel conditions and the required QoS, which refers to the underlying technology that the network can utilize.
6. The method of claim 5, wherein the method of blind detection of the number of active users in a given unlicensed access region comprises the following steps:
the base station will calculate the active subcarriers a (K, N) over the active area for a given number of usersa,MF) The expected average number of;
the base station will estimate the number of active sub-carriers based on the signals received in the active area.
7. The method of claim 6, wherein the method of blind detection of the number of active users in a given unlicensed access region comprises the following steps:
estimating the number of active sub-carriers from the received user signal interfered by noise and comparing the estimated number of active sub-carriers with the expected number of active sub-carriers alpha (K, N)a,MF) A comparison is made and the number of active users is estimated accordingly.
8. The method of claim 7, wherein the base station transmits to the user: location and size of the unlicensed access regions, size of the active regions in each unlicensed access region, modulation and coding parameters for each active region, parameters for open loop power control, and the base station may set the modulation and coding parameters for each data region.
9. The method of claim 8, wherein the parameters for open-loop power control comprise a path loss compensation factor and an expected received power of a base station.
CN202110134805.5A 2021-02-01 2021-02-01 Unlicensed access method in communication Active CN113056027B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110134805.5A CN113056027B (en) 2021-02-01 2021-02-01 Unlicensed access method in communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110134805.5A CN113056027B (en) 2021-02-01 2021-02-01 Unlicensed access method in communication

Publications (2)

Publication Number Publication Date
CN113056027A true CN113056027A (en) 2021-06-29
CN113056027B CN113056027B (en) 2023-11-17

Family

ID=76508429

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110134805.5A Active CN113056027B (en) 2021-02-01 2021-02-01 Unlicensed access method in communication

Country Status (1)

Country Link
CN (1) CN113056027B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140254544A1 (en) * 2013-03-08 2014-09-11 Futurewei Technologies, Inc. System and Method for Uplink Grant-Free Transmission Scheme
US20160219627A1 (en) * 2015-01-27 2016-07-28 Kelvin Kar Kin Au System and method for transmission in a grant-free uplink transmission scheme
GB201621509D0 (en) * 2016-12-16 2017-02-01 Samsung Electronics Co Ltd A method for detecting a number of active users in a communication system
US20170034845A1 (en) * 2015-07-27 2017-02-02 Futurewei Technologies, Inc. Link Adaptation In Grant-Free Multiple Access Systems
CN108811143A (en) * 2018-05-18 2018-11-13 哈尔滨工业大学 Uplink based on user activity is exempted to authorize the CTU distribution methods of SCMA

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140254544A1 (en) * 2013-03-08 2014-09-11 Futurewei Technologies, Inc. System and Method for Uplink Grant-Free Transmission Scheme
US20160219627A1 (en) * 2015-01-27 2016-07-28 Kelvin Kar Kin Au System and method for transmission in a grant-free uplink transmission scheme
US20170034845A1 (en) * 2015-07-27 2017-02-02 Futurewei Technologies, Inc. Link Adaptation In Grant-Free Multiple Access Systems
US20170318604A1 (en) * 2015-07-27 2017-11-02 Futurewei Technologies, Inc. Link adaptation in grant-free multiple access systems
CN107852722A (en) * 2015-07-27 2018-03-27 华为技术有限公司 Exempt to authorize the link circuit self-adapting in multiple access system
GB201621509D0 (en) * 2016-12-16 2017-02-01 Samsung Electronics Co Ltd A method for detecting a number of active users in a communication system
CN108811143A (en) * 2018-05-18 2018-11-13 哈尔滨工业大学 Uplink based on user activity is exempted to authorize the CTU distribution methods of SCMA

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
韩玉玺: "高阶SCMA系统关键技术研究", 《中国优秀博士学位论文全文数据库 信息科技辑》 *

Also Published As

Publication number Publication date
CN113056027B (en) 2023-11-17

Similar Documents

Publication Publication Date Title
CN108289018B (en) Method and equipment for transmitting reference signal
CN107786482B (en) Multi-terminal information receiving and sending method based on grid mapping and corresponding equipment
KR100539925B1 (en) Apparatus and method for sub-carrier alocation in ofdm system
CN102571141B (en) Base station device and communication method
CN1300952C (en) Wireless communicatoon device of using multiple transceiver antenna system and method thereof
CN108260215B (en) Low-density code NOMA (non-orthogonal multiple access) channel condition optimization resource allocation method
CN108990142A (en) A kind of transmission method of the multicarrier non-orthogonal multiple access system of low signaling overheads
Trivedi et al. Trigonometric transforms and precoding strategies for OFDM‐based uplink hybrid multi‐carrier nonorthogonal multiple access
CN112911711A (en) Resource allocation method of multi-carrier NOMA system
CN101742539A (en) Wireless resource allocation method and system
CN110234160A (en) A kind of downlink transmission method suitable for non-orthogonal multiple access system
US20200044897A1 (en) Wireless communication method, apparatus, and system
Sadr et al. Suboptimal rate adaptive resource allocation for downlink OFDMA systems
Kim et al. Performance enhancement using receive diversity with power adaptation in the NOMA system
CN109167748B (en) Partial maximum likelihood detection method based on energy sorting
CN106788893A (en) A kind of sparse Interleave Division Multiple Access method
Zeng et al. Downlink power allocation optimization in pattern division multiple access
CN101170532A (en) Reverse signal receiving and transmission method and device in OFDM system
CN113056027B (en) Unlicensed access method in communication
Lu et al. Adaptive radio resource allocation for multiple traffic OFDMA broadband wireless access system
WO2012019450A1 (en) Pairing method for multi-user multiple input multiple output system, data transmission method and devices thereof
US10050820B2 (en) Apparatus and method for modulation/demodulation for transmitting and receiving signal in wireless communication system
Parvathy Reduction of BER and PAPR for Fourier transform based in downlink NOMA-OFDM
CN103634256A (en) Baseband signal sidelobe power suppression and sidelobe power suppression method and device
CN111224764A (en) Physical layer security algorithm based on subcarrier power distribution scheme

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant