CROSS-REFERENCE TO RELATED APPLICATION
This application claims priority from the Chinese patent application 202310278443.6 filed Mar. 21, 2023, the content of which is incorporated herein in the entirety by reference.
TECHNICAL FIELD
The present disclosure relates to the field of communication technologies and in particular to a user-distinguished finite-field resource construction method and a finite-field multiple access system.
BACKGROUND
The multiple access technology has always been one of the core technologies in the wireless communication field. The multiple access can support multiple user transmissions at the same time. Usually, at transmitter, different physical resources (for example, time-domain resource, frequency-domain resource, code-domain resource and space-domain resource) or their permutations and combinations are allocated to different users; then, at receiver, users are separated and detected based on resource allocation.
The traditional multiple access technology usually employs the classical physical resources (for example, time-domain, frequency-domain, code-domain and space-domain) and these physical resources are usually defined on a complex field. Today, due to shortage of physical-layer resources, how to further serve more users and improve user performance at the same tine has become a new challenge for us.
SUMMARY
The present disclosure aims to solve the problem of limitation of the multiple access resources in the current communication field.
There is provided user-distinguished finite-field resource construction method, wherein the construction method is a basic-field resource construction method and comprises the following steps:
- let GF(p) be a prime field, and p−1 nonzero elements in the field are divided into (p−1)/2 mutually-disjoint element pairs EP, wherein each EP comprises two elements, k and additive inverse p−k in the field, and the element pair (k, p−k) is referred to as additive inverse element pair AIEP; such division is denoted as P;
- let J be a positive integer not greater than (p−1)/2, namely, 1≤J≤(p−1)/2; let C1, C2, . . . , CJ be J AIEPs in the P, and thus Cj=(tj, p−tj); wherein 1≤j≤J, 1≤tj≤p; tj is a nonzero element in GF(p), and C refers to a set {C1, C2, . . . , CJ};
- let (u1, u2, . . . , uJ) be one J tuple on GF(p), wherein uj is one element in Cj; and thus the J tuple (u1, u2, . . . , uJ) is one element in Cartesian product C1×C2× . . . ×CJ; the mod p of each element and τ=⊕j=1Juj in the tuple are referred to as finite-field sum-pattern (FFSP) of the J tuple; wherein ⊕ represents modular addition operation;
- the J tuple(p−u1, p−u2, . . . , p−uJ) is also one element in Cartesian product and its sum pattern is p−τ=p−⊕j=1Juj; if the sum pattern of the (u1, u2, . . . , uJ) is 0, the sum pattern of the (p−u1, p−u2, . . . , p−uJ) is also 0;
- let (u1, u2, . . . , uJ) and (u1′, u2′, . . . , uJ′) be two J tuples in C1×C2× . . . ×CJ; if ⊕j=1Juj≠⊕j=1Juj′, one sum pattern uniquely specifies one J tuple in C1C2× . . . ×CJ, namely,
- is one one-to-one mapping;
- given one sum pattern τ=⊕j=1Juj, a corresponding J tuple (u1, u2, . . . , uJ) is uniquely restored; the C1C2× . . . ×C1 is said to have a unique sum pattern mapping structure USPM, and J≤log2(p−1);
- for the set C={C1, C2, . . . , CJ} formed by J AIEPs, if the set has a USPM structure, the set serves as a finite-field resource in multiple access communication;
- in one multiple access communication system, J AIEPs are assigned to J users; if each user respectively transmits a corresponding AIEP symbol, a transmitter collects J transmission symbols, obtains finite-field sum-pattern (FFSP) τ=⊕j=1Juj and sends the sum pattern over a multiple access channel; the J transmission symbols are restored uniquely and unambiguously by the sum pattern τ;
- if each J tuple is seen as codewords of J users, the set C=C1×C2× . . . ×CJ forms one J user code totaling 2J codewords in GF(p); C=C1C2× . . . ×CJ is said to be one AIEP code uniquely decodable by the J users in GF(p), which is denoted as J user UDAIEP code; when this code is used in a J user multiple access communication system, the symbol sent by the j-th user corresponds to the j-th component uj of the codewords.
There is provided a user-distinguished finite-field resource construction method, wherein the construction method is an extension-field resource construction method, and comprises the following steps:
- based on the constructed basic-field resource, GF(pm) is an extension field of the GF(p), m is an integer, and an m-order primitive polynomial of the GF(pm) is expressed as:
- in this field, there are a total of pm elements, and g0, g1, . . . , gm are elements in the GF(p);
- let α be a primitive element of the GF(pm); thus, the elements in the field are represented as 0, 1, α,α2, . . . , αpm−2; each element is expressed by a linear combination of α0=1, α,α2, . . . am-1, and coefficients of the linear combinations all belong to the GF(p), namely,
- wherein the coefficient of the linear combination αj=αj,0, aj,1, aj,2 , . . . , aj,m-1 is an element in the GF(p);
- from the above formula, it is seen that αj is expressed uniquely by the m tuple (aj,0, aj,1, . . . , aj,m-1); thus, a sum of two elements in the extension field is expressed as:
- the corresponding m tuple is expressed as:
- for 0≤i<m, if (aj,i,ak,i) is an additive inverse pair on the GF(p), namely, aj,i+ak,i=0, then, αj+αk=0, namely, (αj,αk) is one AIEP on the GF(pm); if (aj,i,ak,i) is a nonzero AIEP on the GF(p), then αi(aj,i,ak,i)□(aj,iαi,ak,iαi) is one AIEP on the GF(pm);
- let C=(C1, C2, . . . , CJ) be an AIEP set on the GF(p), and have a USPM structure; let Cj=(tj, p−tj), and use ψi(tj, p−tj) to represent an AIEP on the GF(pm): αiCj=(tjαi, (p−tj)αi), thus, Ψi={ψi(t1, p−t1), ψi(t2, p−t2), . . . , ψi(tJ, p−tJ} is an AIEP set with the USPM structure on the GF(pm); the Cartesian product of the elements in the Ψi forms a J user UDAIEP code containing 2J codewords on the GF(pm); for i=0, 1, . . . , m−1, m J user UDAIEP codes are constructed, and Ψ0, Ψ1, . . . , Ψm-1 are mutually disjoint;
- the elements in the AIEP pair ψi(tj, p−tj)=(tjαi, (p−tj)αi) are expressed by the m tuple in the following form; in the m tuple, tj and p−tj appear at the i-th position with other positions being zero, namely:
- wherein Ψ0, Ψ1, . . . , Ψm-1 defines m orthogonal UDAIEPs corresponding to J users;
- Ψ□Ψ0∪Ψ1∪ . . . ∪Ψm-1 forms one Jm user orthogonal UDAIEP code containing 2Jm codewords on the GF(pm).
There is provided a downlink transmission method using a finite-field resource, wherein by using as a finite field the basic-field resource constructed using the user-distinguished finite-field resource construction method or the extension-field resource constructed using the user-distinguished finite-field resource construction method, downlink transmission is achieved, which comprises the following specific steps:
- the basic-field resource or extension-field resource of the finite field is used as a multiple access resource, the finite field is GF(p), and p>2; thus, the number of users supported by a finite-field multiple access system is J≤└log 2(p−1)┘, and based on the process of constructing the basic-field resource or extension-field resource, the J user UDAIEP code, i.e. C1, C2, . . . , CJ is constructed as a multiple access resource and the user j is assigned a codebook Cj;
- let k be a positive number, and b=(bj,0, bj,1, . . . , bj,k, . . . bj,K-1) is a raw information sequence sent to the j-th user, where bj,k∈GF(2); during sending, one UDAIEP, i.e. Cj, is assigned to the user j, the bit bj,k is mapped into uj,k, wherein uj,k∈Cj; the mapping is a mapping from a binary field to a non-binary field; this process is expressed using the function FB2NB, i.e. uj,k=FB2NB(bj,k); the sequence bj sent to the user j is mapped to generate a sequence denoted as uj=(uj,0, uj,1, . . . , uj,k, . . . , uj,K), and then the J tuple (u0,k, u1,k, . . . , uJ,k) is one codeword of the J user UDAIEP code;
- J sequences sent by performing multiplexing: symbols on the corresponding positions of multiple user information sequences are added up on the GF(p); an obtained result is denoted as u=(u0, u1, . . . , uk, . . . uK-1), wherein uk=⊕j=1Juj,k; the multiplexed sequence u is finite-field sum-pattern (FFSP) of the J user UDAIEP code C;C is uniquely decodable, and the J sequences u1, u2, . . . , uJ are decoded symbol-wise from u without ambiguity, and the process of decoding the J sequences symbol-wise is denoted as FNB2B;
- in a downlink system, a sequence w prior to channel encoding is obtained based on the sequence u, and a (N,K) linear block code on GF(Q) is used as a channel encoding v; then the symbols are mapped to a complex field, and then OFDM transmission process is performed;
- finally, the sequence of each user is decoded symbol-wise by using an OFDM receiver.
Furthermore, a process of obtaining the sequence w prior to channel encoding based on the sequence u comprises:
- if p and Q are unequal, mapping the sequence u symbol-wise to the sequence w and then performing encoding;
- if p and Q are equal, directly using the sequence u as the sequence w and then performing encoding is.
Furthermore, when p and Q are unequal, t=┌log2(p−1)┐ and Q=2t are set.
Furthermore, symbol-wise decoding the sequence of each user by using the OFDM receiver comprise the following steps:
- the receiver is a reverse process: firstly, a guard interval is removed, and then FFT transform, FDE and parallel-serial conversion are performed to obtain a complex field signal y, and then a restored sequence {circumflex over (v)} is obtained through transform from the complex field to the finite field, and then a sequence ŵ is obtained through channel decoding, and then the sequence is symbol-wise mapped from the GF(Q) to the GF(q), which is completely opposite to the mapping of the transmitter; further, a sequence û is obtained; if û=u, the sequence of each user is decoded symbol-wise.
There is provided an uplink transmission method using a finite-field resource, wherein by using as a finite field the extension-field resource constructed using the user-distinguished finite-field resource construction method, uplink transmission is achieved, which comprises the following specific steps:
- the extension-field resource is used as a multiple access resource, and based on GF(2m), the basic field is GF(2), which only has one element pair (0,1); using the element pair, m orthogonal UDEPs are constructed on the GF(2m):
- if the system supports at most J users, the user J is assigned EP ψj-1(0,1);
- let K be an integer, and bj=(bj,0, bj,1, . . . , bj,k, . . . , bj,K-1) is binary information sequence sent by the user j; the transmitter firstly maps the sequence symbol-wise from the GF(2) to the non-binary field GF(2m) to generate a sequence uj, i.e. uj,k=FB2NB(bj,k), wherein uj,k∈GF(2m); this mapping relationship is determined by EP ψj-1(0,1) assigned to the user j, and uj,k is expressed by a binary m tuple, uj,k=(uj,k,0, uj,k,1, . . . , uj,k,i, . . . , uj,k,m-1), wherein,
- by adding the (N, K) linear block code W, channel encoding is performed on the sequence uj to generate a sequence vj, wherein W is a code on the GF(2m), and a generated matrix G is K×N dimensions; after encoding, there is:
- and vj,n∈GF(2m); and vj,n is expressed by using a binary m tuple
- u=⊕j=1Juj is defined as finite-field sum-pattern (FFSP) of the raw information sequence, and u=(u0, u1, . . . , uk, . . . , uK-1), uk=⊕j=1Juj,k; v=⊕j=1Jvj is defined as finite-field sum-pattern (FFSP) of the encoded information sequence, and v=(v0, v1, . . . , vn, . . . , vN-1), wherein vn=⊕j=1Jvj,n;
- then, modulation is performed using BPSK to obtain a complex-field vector xj∈x1×Nm, xj=(xj,0, xj,1, . . . , xj,n, . . . , xj,N-1), xj,n=(xj,n,0, xj,n,1, . . . , xj,n,i, . . . , xj,n,m-1), and xj,n,1=2vj,n,i−1; this mapping relationship is denoted as FF2C, that is, a mapping from the finite field to a complex field; then xj is sent to AWGN multiple access channel;
- at the receiver, the received complex-field signal vector y∈□1×Nm is a result of superimposition of the signals sent by J users through the channel, namely,
- wherein z is noise, r is finite-field sum-pattern (FFSP) of the complex-field modulation signal sequence x1, x2, . . . , xJ, which is composed of N m tuples, and written as r=(r0, r1, . . . , rn, . . . , rN-1), wherein r=(rn,0, rn,1, . . . , rn,i, . . . rn,m-1);
- in the first step of decoding reception, by using a conversion function FC2F from the complex field to the finite field, the complex-field signal is converted into a vector on the GF(2m), FC2F(r)=v=(v0, v1, . . . , vn, . . . , vN-1) is composed of N m tuples, and the n-th element is expressed as vn=(vn,0, vn,1, . . . , vn,i, . . . , vn,m-1), wherein,
- next, ŷ=FC2F(r)+z is constructed and then input into a decoder decoding restoration sequence {circumflex over (v)} of the channel encoding W;
- an on-field inverse mapping FNB2B is made by the part corresponding to the transmitter to restore the raw sequence {circumflex over (b)}1, {circumflex over (b)}2, . . . {circumflex over (b)}J, sent by each user.
Furthermore, the FC2F has the following characteristics:
- (1) the value of rn,i obtained by BPSK modulation is:
- (2) the value of vn,i∈GF(2) is only (0)2 or (1)2 corresponding to the value Ω of the rn,i, the value of the vn,i is Ωv={0, 1, 0, 1 . . . }, that is: if rn,i=−J, then vn,i=0; if rn,i=−J+2, then vn,i=1.
Furthermore, in a process that ŷ is constructed and then input into the decoder decoding restoration sequence {circumflex over (v)} of the channel encoding W, if soft decoding is used, a prior probability of the rn,i prior probability distribution is
There is provided a finite-field multiple access system, wherein a finite-field resource in the system is the extension-field resource constructed using the user-distinguished finite-field resource construction method; a downlink in the system performs downlink transmission using the downlink transmission method using the finite-field resource; an uplink in the system performs uplink transmission using the uplink transmission method using the finite-field resource.
There are the following beneficial effects.
1. The present disclosure provides a novel resource, a finite-field resource, which changes the design method of the current traditional multiple access, improving the design flexibility of the multiple access. The present disclosure is not only applicable to multiple scenarios but also capable of solving in a better way the problem of limitation of the multiple access resource in the communication field. In the finite-field-based downlink multiple access system, each user can obtain channel time diversity and frequency diversity gain at the same time, effectively improving the system reliability; in the finite-field-based uplink multiple access system, the characteristics of the superimposed signals can be fully utilized to more flexibly achieve signal detection and user distinguishing while having the same error rate performance as the classical time division multiple access.
The present disclosure provides a novel multiple access mode based on finite-field resource, which is applicable to downlink multiple access and uplink multiple access. Further, the finite-field multiple access technology provided in the present disclosure further can be compatible with the current classical multiple access theory.
BRIEF DESCRIPTIONS OF THE DRAWINGS
FIG. 1 is a block diagram of a downlink transmission system.
FIG. 2 is a block diagram of an uplink transmission system.
FIG. 3 is a structural schematic diagram of codewords in embodiment 2.
FIG. 4 is a comparison diagram of FFMA downlink system and OFDMA system.
FIG. 5 is a performance simulation diagram of FFMA downlink system.
FIG. 6 is a diagram of the implementation of the present disclosure in one embodiment.
FIG. 7 is a performance plot of the present disclosure applied into uplink massive multiple-access transmission scenario.
DETAILED DESCRIPTIONS OF EMBODIMENTS
The present disclosure provides a novel multiple access resource defined as a finite-field multiple access resource and based on the finite-field resource, designs a multiple-user uplink multiple access system and a multiple-user downlink multiple access system.
Implementation 1
This Implementation is a user-distinguished finite-field resource construction method, which is a user-distinguished finite-field resource construction method in a finite-field multiple access system. When the finite-field resource is used, each user sending a binary sequence is assigned one codebook marking symbols that 0 and 1 are respectively mapped into a finite field. The transmitter sends a corresponding finite-field symbol sequence. At the receiver, based on the received finite-field symbols, a finite-field symbol sent by each user can be determined uniquely and thus, a binary symbol sent by each user can be decoded.
The user-distinguished finite-field resource construction method in the finite-field multiple access system described in this Implementation can construct a basic-field resource separately or construct an extension-field resource based on the constructed basic-field resource, which is described below in details.
Basic-Field Resource
- let GF(p) be a prime field, and p−1 nonzero elements in the field are divided into (p−1)/2 mutually-disjoint element pairs EP, wherein each EP comprises two elements, k and additive inverse p−k in the field, and the element pair (k, p−k) is referred to as additive inverse element pair AIEP; such division is denoted as P;
- let J be a positive integer not greater than (p−1)/2, namely, 1≤J≤(p−1)/2; let C1, C2, . . . , CJ be J AIEPs in the P, and thus Cj=(tj, p−tj); wherein 1≤j≤J, 1≤tj≤p; tj is a nonzero element in GF(p), and C refers to a set {C1, C2, . . . , CJ};
- let (u1, u2, . . . , uJ) be one J tuple on GF(p), wherein uj is one element in Cj; and thus the J tuple (u1, u2, . . . , uJ) is one element in Cartesian product C1C2× . . . ×CJ; the mod p (mod operation) of each element and τ=⊕j=1Juj in the tuple are referred to as finite-field sum-pattern (FFSP) of the J tuple; wherein ⊕ represents modular addition operation;
- the J tuple(p−u1, p−u2, . . . , p−uJ) is also one element in Cartesian product and its sum pattern is p−τ=p−⊕j=1Juj; if the sum pattern of the (u1, u2, . . . , uJ) is 0, the sum pattern of the (p−u1, p−u2, . . . , p−uJ) is also 0;
- let (u1, u2, . . . , uJ) and (u1′, u2′, . . . , uJ′) be two J tuples in C1C2× . . . ×CJ; if ⊕j=1Juj≠⊕j=1Juj′, one sum pattern uniquely specifies one J tuple in C1C2× . . . ×CJ namely,
- is one one-to-one mapping;
- in this example, given one sum pattern τ=⊕j=1Juj, we can uniquely restore a corresponding J tuple (u1, u2, . . . , uJ); the C1C2× . . . ×CJ is said to have a unique sum pattern mapping structure USPM, and at this time, J≤log2(p−1);
- for the set C={C1, C2, . . . , CJ} formed by J AIEPs, if the set has a USPM structure, the set serves as a finite-field resource in multiple access communication;
- in one multiple access communication system, J AIEPs are assigned to J users; if each user respectively transmits a corresponding AIEP symbol, a transmitter collects J transmission symbols, obtains finite-field sum-pattern (FFSP) τ=⊕j=1Juj and sends the sum pattern over a multiple access channel; the J transmission symbols are restored uniquely and unambiguously by the sum pattern τ;
- if each J tuple is seen as codewords of J users, the set C=C1C2× . . . ×CJ forms one J user code totaling 2J codewords in GF(p); C=C1C2× . . . ×CJ is said to be one AIEP code uniquely decodable by the J users in GF(p), which is denoted as J user UDAIEP code; when this code is used in a J user multiple access communication system, the symbol sent by the j-th user corresponds to the j-th component uj of the codewords.
Extension-Field Resource
- based on the above basic-field resource, m is one integer, GF(pm) is an extension field of the GF(p), and an m-order primitive polynomial of the GF(pm) is expressed as:
- in this field, there are a total of pm elements, and g0, g1, . . . , gm are elements in the GF(p);
- let α be a primitive element of the GF(pm); thus, the elements in the field are represented as 0, 1, α,α2, . . . , αpm-2; each element is expressed by a linear combination of α0=1, α,α2, . . . am-1, and coefficients of the linear combinations all belong to the GF(p), namely,
- wherein the coefficient of the linear combination αj=aj,0, aj,1, aj,2, . . . , aj,m-1 is an element in the GF(p);
- from the above formula, it is seen that αj is expressed uniquely by the m tuple (aj,0, aj,1, . . . , aj,m-1); thus, a sum of two elements in the extension field is expressed as:
- the corresponding m tuple is expressed as:
- for 0≤i<m, if (aj,i,ak,i) is an additive inverse pair on the GF(p), namely, aj,i+ak,i=0, then, αj+αk=0, namely, (αj,αk) is one AIEP on the GF(pm); if (aj,i,ak,i) is a nonzero AIEP on the GF(p), then αi (aj,i,ak,i)□(aj,iαi,ak,iαi) is one AIEP on the GF(pm);
- let C=(C1, C2, . . . , CJ) be an AIEP set on the GF(p), and have a USPM structure; let Cj=(tj, p−tj), and use ψi(tj, p−tj) to represent an AIEP on the GF(pm): αiCj=(tjαi, (p−tj)αi), thus, Ψi={ψi(t1, p−t1), ψi(t2, p−t2), . . . , ψi(tJ, p−tJ} is an AIEP set with the USPM structure on the GF(pm); the Cartesian product of the elements in the Ψi forms a J user UDAIEP code containing 2J codewords on the GF(pm); for i=0, 1, . . . , m−1, m J user UDAIEP codes are constructed, and Ψ0, Ψ1, . . . , Ψm-1 are mutually disjoint;
- the elements in the AIEP pair Ψi(tj, p−tj)=(tjαi, (p−tj)αi) are expressed by the m tuple in the following form; in the m tuple, tj and p−tj appear at the i-th position with other positions being zero, namely:
- wherein Ψ0, Ψ1, . . . , Ψm-1 defines m orthogonal UDAIEPs corresponding to J users;
- Ψ□Ψ0 ÅΨ1∪ . . . ∪Ψm-1 forms one Jm user orthogonal UDAIEP code containing 2Jm codewords on the GF(pm).
Implementation 2
This Implementation is a downlink transmission method using a finite-field resource, wherein by using as a finite field the basic-field resource or the extension-field resource constructed using the user-distinguished finite-field resource construction method in the Implementation 1, downlink transmission is achieved, which comprises the following specific steps:
- the basic-field resource or extension-field resource of the finite field is used as a multiple access resource, the finite field is GF(p), and p>2; thus, the number of users supported by a finite-field multiple access system is J≤└log 2(p−1)┘, and based on the process of constructing the basic-field resource or extension-field resource, the J user UDAIEP code, i.e. C1, C2, . . . , CJ is constructed as a multiple access resource and the user j is assigned a codebook Cj; the system block diagram is as shown in FIG. 1;
- let k be a positive number, and bj=(bj,0, bj,1, . . . , bj,k, . . . , bj,K-1) is a raw information sequence sent to the j-th user, where bj,k∈GF(2); during sending, one UDAIEP, i.e. Cj, is assigned to the user j, the bit bj,k is mapped into uj,k, wherein uj,k∈Cj; the mapping is a mapping from a binary field to a non-binary field; this process is expressed using the function FB2NB, i.e. uj,k=FB2NB(bj,k); the sequence bj sent to the user j is mapped to generate a sequence denoted as uj=(uj,0, uj,1, . . . , uj,k, . . . , uj,K-1), and then the J tuple (u0,k, u1,k, . . . , uJ,k) is one codeword of the J user UDAIEP code;
- J sequences sent by performing multiplexing: symbols on the corresponding positions of multiple user information sequences are added up on the GF(p); an obtained result is denoted as u=(u0, u1, . . . , uk, . . . uK-1), wherein uk=⊕j=1Juj,k; it can be seen that the multiplexed sequence u is finite-field sum-pattern (FFSP) of the J user UDAIEP code C;C is uniquely decodable, and the J sequences u1, u2, . . . , uJ are decoded symbol-wise from u without ambiguity, and the process of decoding the J sequences symbol-wise is denoted as FNB2B;
- in a downlink system, as shown in FIG. 1, a (N,K) linear block code M on GF(Q) is used as a channel encoding; and a generated matrix is G; when p and Q are equal, the mapping from GF(p) to GF(Q) as shown in FIG. may not be used, and otherwise, the sequence u may be mapped symbol-wise to generate a sequence w as shown by Fq2Q in FIG: wk=Fq2Q(uk); then, encoding is performed using the channel encoding M, v=wG; then the symbols are mapped to a complex field, and subsequently, standard OFDM transmission process is performed, namely, serial-parallel conversion and IFFT are performed, and then transmission is performed together with cyclic prefix to the attenuating channel.
For simplification of calculation, when p and Q are unequal, t=┌log2(p−1)┐ and Q=2t are set; one-to-one correspondence of elements in two fields is constructed randomly to ensure the elements in GF(p) can be in one-to-one correspondence with the elements in GF(Q). If p−1=2t, there is a simpler mapping. Let α be a primitive element of GF(2m), and thus wk=Fq2Q (uk)=αuk-2, wherein α−1=0 is defined.
The receiver is a reverse process: firstly, it is a standard OFDM receiver; namely, a guard interval is removed, and then FFT transform, FDE and parallel-serial conversion are performed to obtain a complex field signal y, and then a restored sequence {circumflex over (v)} is obtained through transform from the complex field to the finite field, and then a sequence ŵ is obtained through channel decoding, and then the sequence is symbol-wise mapped from the GF(Q) to the GF(q), which is denoted as FQ and completely opposite to the mapping of the transmitter; further, a sequence û is obtained; if û=u, the sequence of each user can be decoded symbol-wise because the finite-field code 0 in the present disclosure is uniquely decodable.
Implementation 3
This Implementation is an uplink transmission method using a finite-field resource, wherein by using as a finite field the extension-field resource constructed using the user-distinguished finite-field resource construction method in the Implementation 1, uplink transmission is achieved, which comprises the following specific steps:
- the extension-field resource is used as a multiple access resource, and based on GF(2m), the basic field is GF(2); in this solution, the basic field only has one element pair (0,1); using the element pair, m orthogonal UDEPs are constructed on the GF(2m):
- if the system supports at most J users, the user J is assigned EP ψj-1(0,1); the system block diagram is as shown in FIG. 2;
- let K be an integer, and bj=(bj,0, bj,1, . . . , bj,k, . . . , bj,K-1) is a binary information sequence sent by the user j; the transmitter firstly maps the sequence symbol-wise from the GF(2) to the non-binary field GF(2m) to generate a sequence uj, i.e. uj,k=FB2NB(bj,k), wherein uj,k∈GF(2m); this mapping relationship is determined by EP ψj-1(0,1) assigned to the user j, and uj,k is expressed by a binary m tuple, uj,k=(uj,k,0, uj,k,1, . . . , uj,k,i, . . . , uj,k,m-1), wherein,
- by adding the (N, K) linear block code W, channel encoding is performed on the sequence uj to generate a sequence vj, wherein W is a code on the GF(2m), and a generated matrix G is K×N dimensions; after encoding, there is:
- and vj,n∈GF(2m); and vj,n is expressed by using a binary m tuple
- u=⊕j=1Juj is defined as finite-field sum-pattern (FFSP) of the raw information sequence, and u=(u0, u1, . . . , uk, . . . , uK-1), uk=⊕j=1Juj,k; v=⊕j=1Jvj is defined as finite-field sum-pattern (FFSP) of the encoded information sequence, and v=(v0, v1, . . . , vn, . . . , vN-1) wherein vn=⊕j=1Jvj,n, v=uG;
- then, modulation is performed using BPSK to obtain a complex-field vector xj∈□1×Nm, xj=(xj,0, xj,1, . . . , xj,n, . . . , xj,N-1), xj,n=(xj,n,0, xj,n,1, . . . , xj,n,i, . . . , xj,n,m-1), and xj,n,1=2vj,n,i−1; this mapping relationship is denoted as FF2C, that is, a mapping from the finite field to a complex field; then xj is sent to AWGN multiple access channel;
- at the receiver, the received complex-field signal vector y∈□1×Nm is a result of superimposition of the signals sent by J users through the channel, namely,
- wherein z is noise, r is finite-field sum-pattern (FFSP) of the complex-field modulation signal sequence x1, x2, . . . , xJ, which is composed of N m tuples, and written as r=(r0, r1, . . . , rn, . . . , rN-1), wherein rn=(rn,0, rn,1, . . . , rn,i . . . , rn,m-1);
- in the first step of decoding reception, by using a conversion function FC2F from the complex field to the finite field, the complex-field signal is converted into a vector on the GF(2m), FC2F(r)=v=(v0, v1, . . . , vn, . . . , vN-1) is composed of N m tuples, and the n-th element is expressed as vn=(vn,0, vn,1, . . . , vn,i, . . . , vn,m-1), wherein,
The FC2F has the following characteristics:
- (1) the value of rn,i obtained by BPSK modulation is:
- (2) the value of vn,i∈GF(2) is only (0)2 or (1)2 corresponding to the value Q of the rn,i, the value of the vn,i, is Ωv={0, 1, 0, 1 . . . }, that is: if rn,i=−J, then vn,i=0; if rn,i=−J+2, then vn,i=1, and so on.
Thus, FC2F can be determined.
Next, ŷ=FC2F(r)+z is constructed and then input into the decoder decoding restoration sequence {circumflex over (v)} of the channel encoding W; if soft decoding is used, a rn,i prior probability distribution for improving decoding performance is provided herein. The value of corresponding to rn,i is Ω, and the prior probability is
An on-field inverse mapping FNB2B (each user is assigned a unique EP and thus the sequence sent by each user can be determined symbol-wise) is made by the part corresponding to the transmitter to restore the raw sequence {circumflex over (b)}1, {circumflex over (b)}2, . . . , {circumflex over (b)}J sent by each user.
Implementation 4
This Implementation is a finite-field multiple access system. In this Implementation, a finite-field resource in the system is the extension-field resource constructed using the user-distinguished finite-field resource construction method in the Implementation 1; a downlink in the system performs downlink transmission using the downlink transmission method using the finite-field resource in the Implementation 2; an uplink in the system performs uplink transmission using the uplink transmission method using the finite-field resource in the Implementation 3.
EMBODIMENTS
Embodiment 1: Unique Decodable Code Construction Based on the Finite Field
- (1) If p=5, two AIEPs may be obtained, C1=(1,4), C2=(2,3), and C1×C2 forms a two-user UDAIEP code.
- (2) If p=17, eight AIEPs may be obtained: (1,16) (2,15) (3,14) (4,13) (5,12) (6,11) (7,10) (8,9), and at most four AIEPs may be selected therefrom and their Cartesian product can be used as the 4-user UDAIEP code.
Embodiment 2: Unique Decodable Code Construction Based on the Extension Field of the Finite Field
Let p=5 and m=6; considering the extension field GF(56) of GF(5), in the example 1, two AIEPs may be constructed in GF(5): C1=(1,4) and C2=(2,3); their Cartesian product forms a 2-user UDAIEP code on GF(5); based on this, 12 GF(56)-based UDAIEP codes can be constructed as follows:
They are divided into 6 orthogonal groups. The Cartesian products of the 6 groups give 6 orthogonal 2-user UDAIEP codes Ψ0, Ψ1, Ψ2, Ψ3, Ψ4, Ψ5. They are combined to form one 12-user UDAIEP code containing 212=4096 codewords, with the structure as shown in FIG. 3.
Embodiment 3: Detection of the Downlink Receiver
Given the finite field GF(24), the number of users J=4 and the sequence length K=1, let the sequence sent by each user be b1=(1)2, b2=(0)2, b3 (1)2, b3 (1)2, and there are:
The received complex-field sum pattern is
Since J=4, there are Ω={−4, −2, 0, +2, +4} and Q1={0, 1, 0, 1, 0}, namely, FC2F(−4)=(0)2, FC2F(−2)=(1)2, FC2F(0)=(0)2, FC2F(+2)=(1)2, FC2F(4)=(0)2, and thus v=FC2F(r)=(1, 0, 1, 1)2. Then, by FNB2B mapping, {circumflex over (b)}1=(1)2, {circumflex over (b)}2=(0)2, {circumflex over (b)}3=(1)2, {circumflex over (b)}4 (1)2 can be decoded.
Embodiment 4: Uplink and Downlink System
Let α be a primitive element of GF(73), and a basic matrix of 4×12 shown below is constructed on GF(73):
Then, each element in the basic matrix is replaced using CPM of 72×72 dimensions (the position of 1 in the binary CPM is replaced with the element in GF(24), and thus, it is required to construct a mapping of the nonzero element in B(4,12) to GF(24) which can be selected randomly to ensure one-to-one mapping), and thus a matrix Hq(4,12) of 288×864 can be generated. The elements in the matrix are all on GF(24), and the matrix is used as a check matrix of the channel encoding of the uplink and downlink system. The code length of the corresponding code is N=864 and the information bit length is K=576.
In the downlink, based on GF(17), the finite-field resource (shown in example 1) is constructed. The number of the supported users is J=4, the channel is a frequency-selective channel, the cyclic prefix number Ng is set to 16, the subcarrier number is set to 64 and 256, and the path number L is respectively set to 4 and 16. Furthermore, compared with the equivalent OFDMA system, the result is as shown in FIG. 4, which proves that the FFMA system is improved in performance.
In the uplink, the finite-field resource is obtained using GF(24), and the maximum number of the users supported by the system is J=4, and matches the above designed channel encoding to save one field transform. The simulation result is as shown in FIG. 5, where case1 represents that we use the prior probability recommended by the present disclosure and the case2 represents that we uses the generated matrix of the system form in encoding, reducing interference between multiple users, achieving better performance. We can see from the FIG that the FFMA downlink system has an improvement in performance.
The computation examples of the present disclosure are only computation models and computation flows for detailing the present disclosure rather than limitations to the embodiments of the present disclosure. Those skilled in the arts can also make other changes or variations of different forms on the basis of the above descriptions and cannot exhaust all embodiments herein. Those obvious changes or variations derived from the technical solutions of the present disclosure shall all fall within the scope of protection of the present disclosure.
The present disclosure can be applied in multiple access direction application: This disclosure provides new orthogonal resources finite field resources. Different from other orthogonal resources, the finite field resources are kinds of virtual resources capable of distinguishing users by using the properties of finite fields, and can be used as a novel multiple access technique.
Further, the present disclosure can be applied in Network layer direction application: The finite field resources provided by the present invention are capable of distinguishing users, assisting in network layer research, and integrating the network routing protocol, network coding and finite field resources to further improve the transmission efficiency.
Further, the present disclosure can be applied in Ultra-large-scale machine-type communication application: Ultra-large-scale machine-type communication is one of the application scenarios of 6G. This patent can be used as a multiple access technique in this scenario to facilitate short-packet communication among massive users. Compared with the existing multiple access techniques, it can better reduce interference among users, making the symbol error rate of each user closer to that of a single-user operating system, and featuring lower decoding complexity.
Further, the present disclosure can be applied in anti-interference technology application: Traditional multi-channel interference cancellation technology performs signal processing by using a method of recovering and cancelling each channel of signal. In the Finite Field Multiple Access (FFMA) technique provided herein, multi-channel signals are considered as a whole, and information is distinguished in a finite field.
Further, the present disclosure can be applied in multi-antenna transmission application: the feature of distinguishing users (or data streams) of the finite field can be applied to a multi-antenna scenario, to implement a novel multi-antenna transmission technology.
As shown in FIG. 6, on the receiver side, the min-sum algorithm (MSA) is adopted, and a field-programmable gate array (FPGA) is employed to implement the solution, with specific implementation shown in the block diagram below, including a control module (Controller), a check node processing unit (CPU), a variable node processing unit (VPU), an intrinsic random access memory (Intrinsic RAM), and a log-likelihood ratio random access memory (LLR RAM).
Further, the proposed Finite-field multiple-access (FFMA) technique can be applied into multiple-access scenario, network scenario (such as digital twin, virtual reality, and etc.), ultra massive machine type communications (um-MTC), and etc. The proposed FFMA technique can solve the multiuser interference (MUI) issue with a low detection complexity.
The proposed FFMA have been applied into uplink massive multiple-access transmission scenario, which providing a better bit error rate (BER) performance than the classical multiple-access system, as shown in FIG. 7.
When the proposed FFMA-TDMA is compared with the classical TDMA systems, when the number of. users is small, e.g., J=1, the TDMA with repetition code can provide much better PUER performance, since the coding gain is around 27.78 dB. However, for a large number of arrival users, e.g., J≥100, the proposed FFMA-TDMA systems provide much better PUER performance. When Pb=10−5 and J=300, the FFMA-TDMA system can provide about 6 dB coding gain than the TDMA system, verifying the proposed FFMA system can improve the PUER performance for a massive users scenario.
The present disclosure can be implemented with a hardware in different applications. The hardware can comprise, but not limited to, a processor, a memory, a circuitry, or any other forms to store the application.
The applications of the present disclosure are only for detailing the present disclosure rather than limitations to the embodiments of the present disclosure. Those skilled in the arts can also make other changes or variations of different forms on the basis of the above descriptions and cannot exhaust all embodiments herein. Those obvious changes or variations derived from the technical solutions of the present disclosure shall all fall within the scope of protection of the present disclosure.