Introduction To 5G Technologies
Introduction To 5G Technologies
Introduction To 5G Technologies
Broadband Cloud
Big Data
(Wired/ Computing
Wireless)
Internet Smart Internet
Smart
Smart Terminals
Terminals
M2M……
M2M……
— Ubiquitous Network
— Ubiquitous Connection
— Ubiquitous Computing
— Ubiquitous Data
Radio transmission
technologies
Huge capacity
Performance challenges
Evolution of the 5G
network architecture
High mobility
Higher frequency
(mmW)
© ZTE Corporation. All rights © ZTE Corporation. All rights 3
reserved. reserved.
> For Internal Use
Dense deployment of 10
macro base stations (with site
Outdoor spacing of 200 m) and 80 pico
cells (covering 5000m2 with
site spacing of 75 m)
Large Outdoor
2 10000
Gathering
(Mbps/Hz/Km2) (bps/Hz/Cell) 10 – 50bps/Hz/Cell
Total traffic: 900Gbps BW BW
Area: 0.44 km2
The cell spectrum efficiency can be improved by 5 to 15 times compared with that
of 4G (*not yet agreed between the requirement group and the technical group)
© ZTE Corporation. All rights 4
© ZTE Corporation. All rights
reserved. reserved.
> For Internal Use
Applicable Technologies
• Homogeneous macro network: massive MIMO + NOMA + D2D, applicable for
outdoor transmission
Applicable Technologies
• Ultra-dense indoor femto cells. The inter-femto interference can be reduced due to
the loss through walls.
• Communication technologies for high frequency bands
Service Network
Massive
YYYY…YYYY
YYYY…YYYY
RU
YYYY…YYYY MIMO RU
YYYY…YYYY RU
D-RAN
RU
10
© ZTE Corporation. All rights © ZTE Corporation. All rights
reserved. reserved.
> For Internal Use
1 2 3
Network Architecture Key Technologies for Open Platform with Open
with Open Capabilities Network Capabilities Capabilities
Evolved network architecture Perception, convergence and Privacy protection
that supports open network analysis of RAN and CN technologies for user and
capabilities information service information
Interworking of the open Acquisition and analysis of user Orchestration of open
network capabilities between perception information network capabilities,
different operator networks Network control and scheduling modeling of services and
Design of southbound and policies and open network information, and hosting of
northbound APIs capabilities based on network services
Open network capabilities information, user perception Security control related to
based on the big data information and service open network capabilities
technology requirements 11
• A large number of data flows can be multiplexed with low interference between them,
greatly improving the average sum of the existing cellular network and the spectrum
efficiency at the edge of a cell.
• Not sensitive to co-channel interference, reducing the complexity of network planning as
well as the interworking among base stations.
• Large array gain, lowering the transmit power, reducing energy consumption of base
stations, and achieving green communication.
• Large diversity gain, ensuring good channel quality within the frequency band and
simplifying the complexity of BS resource management
© ZTE Corporation. All rights
reserved.
12 and allocation.
Key Technologies for Study
• Network Architecture
More applicable to multi-user and large-data-traffic scenarios.
More applicable to heterogeneous networks.
• Control Channel
The control channel (especially the downlink broadcast channel) is poorer than the service channel
in performance.
The system coverage is subject to the broadcast channel, thus having an impact on the actual
network plan.
• RS
The CSI-RS overhead is multiplied.
• CSI
The codebook with relatively little overhead is used to quantify channel coefficients.
• Antenna Topology
The antenna array elements are greatly increased and thus need to be extended to a two-
dimensional plane/surface or a three-dimensional array.
The size of the antenna that meets the need for isolation is relatively large.
Multiple antennas can be used for higher frequency bands (>5GHz).
• User tracing
– How to trace a user if there is no direct
path between the user and the base
station?
– Answer: according to the path that has
the strongest reflection.
User
• Channel information feedback
– The following technologies are required:
rapid and precise beam targeting,
channel estimate and feedback
Base Station
– Multiple Access
• Non-orthogonal multiple access (NOMA and FTN)
– Receiver
• Optimizes the existing or new waveforms for MIMO transmission
• Supports full-duplex transmission of a short-distance radio link,
for example, Macro – Small Cell Backhaul
Communications
• Increases the cell edge user throughput.
• Maintains the high user throughput close to a base station.
• Ensures the maximal sum capacity of the system during uplink access.
Uplink Access Downlink Broadcast
Orthogonal
Broadcast
Non-orthogonal Access 20dB 0dB
Orthogonal Access
BS UE2
UE1
Maximal Uplink UE2 (Close to UE1 (Away Downlink UE2 (Close to UE1 (Away
Sum Capacity the BS) from the BS) Throughput the BS) from the BS)
Orthogonal
6.66b/s/Hz 0.065b/s/Hz Orthogonal Access 1b/s/Hz 0.9b/s/Hz
Access
Non-Orthogonal Non-Orthogonal
5.67b/s/Hz 1 b/s/Hz 3b/s/Hz 0.9b/s/Hz
Access Access
© ZTE Corporation. All rights © ZTE Corporation. All rights
reserved. reserved.
Capacity Limit Achieved by the Combination of NOMA and
> For Internal Use
• Downlink Broadcast
The BS uses the superposition coding method to overlap information of multiple UEs.
The UE close to the BS should perform SIC:
Demodulate and decode the information about UEs away from the BS, subtract it, and
demodulate and decode its own information.
It is considered that the SIC process performed by the UE close to the BS causes no
error propagation.
A UE away from the BS does not need to perform SIC because it only demodulates
and decodes its own information.
To improve the performance of UEs away from the BS, most of the power is usually
allocated to these UEs while a small amount of power is left for UEs close to the BS.
However, the channels for UEs close to the BS have good performance, thus
contributing to high user throughput for these UEs.
© ZTE Corporation. All rights © ZTE Corporation. All rights
reserved. reserved.
> For Internal Use
• The design of non-orthogonal access and multiple UEs using the common
channel has low requirements on synchronous access.
Interference between UEs exists, and the BS uses the SIC process to demodulate and decode
the information about the users.
The unsynchronized access generally does not aggravate interference between UEs.
The UE can simplify the processing of synchronous access to reduce power consumption and
complexity.
Especially applicable to scenarios like D2D and M2M.
The SIC process performed by the BS is more complicated.
Communications
• The waveform of the FBMC sub-carrier is more gradual than the square wave of OFDM.
The FBMC signal has much less out-of-band energy leakage than OFDM, and thus has
higher spectrum efficiency.
• The FBMC technology separates sub-carriers through filters:
The time-frequency orthogonality can be achieved without cycle prefix (CP) protection,
and the efficiency and the degrees of freedom in the time domain are high.
As an access technology for the multi-user scenario, FBMC has a lower requirement on
synchronous access and does not require the latencies of users to be within the same
CP, thus having a better performance.
• FBMC can match different time-frequency dispersive channels through shaping filters.
Optimal performance under the time-frequency dispersive channel can be achieved
with the FBMC technology.
OFDM
FBMC
Problems of FBMC
• It is more complicated to implement FBMC than OFDM
FBMC can be implemented based on polyphase filters to reduce the
complexity.
Metro
Airport/Stadium
Ultra-dense and
overlapped coverage
of as many as 5*20 DAS likelihood
cells deployment
How to get Good user Built and managed by
approval from the experience multiple operators??
property owner is with no
the key perception of
How to derive new fragmented
commercial time is the key.
models
√
separation of control over CP and UP, and service type based
mobility management for multiple connections.
Differentiated anchor (GW) locations and network
virtualization
Detection, avoidance, control and coordination of macro-
micro and micro-micro interference between different
frequencies.
+ +
Simplified deployment and OAM, enhanced SON and
appropriate performance
Flexible and configurable set of backhaul solutions
Evidence of the value in the market 5G UDN is not simply the production of the Small
Quality services with low communication cost and the Cell device. Instead, integrated solutions should be
consideration of new business models and clients are the proposed according to different scenarios to provide
keys to increasing the value in the market. Attention should small cell devices together with gateways that are
be paid to the location-based service platform, IT-based
deployed at the edge of the network and to
Internet platform services, and DPI-based pipe services with
differentiated QoS. coordinate with the back-end cloud-based network.
© ZTE Corporation. All rights
reserved.
Key Technologies for UDN
f
(The remain camped and roaming handover control
functionalities may be more important than the handover Inter-cell user1
Interference
support functionality.) f
CoMP-NIC, Inter-BS MIMO
Interference control mechanism for the control plane – NCT
Advance receiver NAICS
off
data1
data2
W u ct
M e
onn
ANDSF C
d r
f l oa se
Of ut U ion
o t User Plane Control Plane
i th cep
w er
EAP-SIM/AKA
MAC Authentication
P
Non Super
Cell
n
t io Networking
a r
ntic Use
e
uth out tion
A ith ep
w erc
P
Super Cell
Networking
1) Mobility: Low mobility 1) Mobility: Low mobility 1) Mobility: On-board or low mobility
2) Extremely large quantity 2) Large quantity 2) Large quantity
3) Low latency (<10ms) 3) Low latency (<10ms) 3) Very low latency (1ms)
4) Small and large data traffic 4) Small and large data traffic 4) Small and large data traffic
5) Reliability: Very high 5) Reliability: High / Very high (security 5) Reliability: Very high
6) Power consumption: Low and protection) 6) Power consumption: Very low
7) Security: High 6) Power consumption: Low 7) Security: Very high
8) Scenario: Unicast, multicast 7) Security: Very high 8) Scenario: Emergencies
8) Scenario: Ad-hoc networks with the
self healing capability
High density – More than 300,000 terminals access the network from each access point
Small data – Most of the MMC services require small data traffic and low bandwidth
High QoS requirement – MMC services (for example, telemedicine, finance, and
surveillance) have a higher requirement on QoS.
High Security
Authentication of terminal IDs to stop pseudo terminals from accessing the network
Reliable end-to-end data security to ensure the integrity and confidentiality of the data
Resistant to highly aggressive network attacks
Conclusion
The emergence of the Mobile Internet and M2M creates five technical
challenges.