I Introduction
To enhance spectrum efficiency and massive connectivity, non-orthogonal multiple access (NOMA) [1, 2] has been identified as one of the key technologies for the fifth generation (5G) networks. The pivotal feature of NOMA is its capability of sharing the same physical resource element (RE), where multiple users’ signals are linearly superposed over different power levels by using the superposition coding scheme. To get the desired signal, multi-user detection algorithm [3], i.e., successive interference cancellation (SIC) or message passing algorithm (MPA) is carried out at the receiver.
More particularly, based on spreading signature of multiple access (MA), NOMA schemes can be divided into two categories: power-domain NOMA (PD-NOMA) and code-power NOMA (CD-NOMA). In [4]
, two evaluation metrics of PD-NOMA networks including outage probability and ergodic rate have been proposed, where the outage behaviors of users and ergodic rate have been discussed by applying stochastic geometry. From a practical perspective, the authors in
[5] studied the performance of PD-NOMA for the two-user case with imperfect channel state information (CSI), where the closed-form expressions of outage probability were derived. When NOMA users have similar channel conditions, the authors of [6] proposed a PD-NOMA based multicast-unicast scheme and verified that the spectral efficiency of PD-NOMA based multicast-unicast scheme is higher than that of orthogonal multiple access (OMA) based one.As a further advance, CD-NOMA is viewed as a special extension of PD-NOMA, in which the data streams of multiple users are directly mapped into multiple REs (or subcarriers ) through the sparse matrix/codebook or low density spread sequence. Actually, CD-NOMA mainly include sparse code multiple access (SCMA), pattern division multiple access (PDMA), multi-user sharing access (MUSA), etc. In [7], the authors proposed a sub-optimal design approach to design the sparse codebook of SCMA. On the condition of the fixed sparse pattern matrix, the authors of [8] evaluated the link level performance of PDMA and confirmed that PDMA can achieve the higher spectrum efficiency than OMA. In [9], MUSA is capable of adopting a grant-free scheme to support Internet of Things (IoT) scenario. However, up to now, there is no work investigating the performance of the unified NOMA framework.
Driven by this, we investigate the outage performance of the unified NOMA framework by invoking stochastic geometry. Since the detection of NOMA users mainly depend on efficient SIC schemes, both imperfect SIC (ipSIC) and perfect SIC (pSIC) are taken into considered. We derive the exact expressions of outage probability for a pair of NOMA users (i.e., the -th user and -th user) in the unified framework. To obtain deep insights, we further derive the asymptotic outage probability of two users and attain the corresponding diversity orders. Due to the impact of residual interference (RI), the outage behavior of the -th user with ipSIC for CD/PD-NOMA (CD-NOMA and PD-NOMA) converges to an error floor. Furthermore, we confirm that the outage behavior of CD-NOMA is superior to that of PD-NOMA. Additionally, we analyze system throughput for CD/PD-NOMA in the delay-limited transmission.
Ii Network Model
Ii-a Network Descriptions
Consider a unified NOMA downlink transmission scenario, where a base station (BS) transmits the information to randomly users. The BS directly maps the data streams of multiple users into subcarriers or REs by utilizing one sparse spreading matrix , in which there are a few number of non-zero entries within it and satisfies the relationship . For simplicity, we assume that the BS and NOMA users are equipped with a single antenna, respectively. Assuming that the BS is located at the center of circular cluster denoted as , with radius and the
NOMA users are uniformly distributed within circular cluster
[10]. To facilitate analysis, we assumed that users are divided into orthogonal pairs, in which the distant user and the nearby user can be distinguished based on their disparate channel conditions. Furthermore, each pair of users is randomly selected to carry out the NOMA protocol [4, 11]. A bound pass model is employed to model the channel coefficients in networks from the BS to users. Meanwhile, these wireless links are disturbed by additive white Gaussian noise (AWGN) with mean power . Without loss of generality, the effective channel gains between the BS and users are sorted as [12, 13] with the assistance of order statistics. In this paper, we focus on the -th user paired with the -th user for NOMA transmission.Ii-B Signal Model
Regarding the unified NOMA downlink transmission scenario, the BS transmits the superposed signals to multiple users, where the data stream of each user spreads over one column of sparse matrix. Hence the observation at the -th user over subcarriers is given by
(1) |
where , and are the normalized unity power signals for the -th and -th users, respectively, i.e, . We assume the fixed power allocation coefficients satisfy the condition that with , which is for fairness considerations.
denotes the normalized transmission power at BS. The sparse indicator vector of the
-th user is denoted by , which is one column of . More specifically, is the subcarrier index, where indicates the signals are mapped into the corresponding RE, otherwise, . Let denotes the channel vector between the BS and -th user occupying subcarriers with , where is the Rayleigh fading channel gain between the BS and -th user occupying the -th subcarrier, is a frequency dependent factor, is the path loss exponent and is the distance from BS to -th user. denotes the AWGN.To maximize the output SNRs and diversity orders, we employ the maximal ratio combiner (MRC) at the -th user over subcarriers. Let , and then the received signal at the -th user can be written as
(2) |
Based on aforementioned assumptions, the signal-plus-interference-to-noise ratio (SINR) at the -th user to detect the -th user’s signal is given by
(3) |
where denotes the transmit SNR. For the sake of simplicity, assuming that and have the same column weights for .
By applying SIC [14], the SINR of the -th user, who needs to decode the information of itself is given by
(4) |
where and denote the pSIC and ipSIC operations, respectively. Note that denotes the RI channel vector at subcarriers with .
The SINR of the -th NOMA user to decode the information of itself can be expressed as
(5) |
Iii Performance evaluation
In this section, the outage probability for a pair of NOMA users is selected as a metric to evaluate the performance of the unified downlink NOMA networks.
Iii-a The outage probability of the -th user
The outage event of the -th user is that the -th user cannot detect its own information. Hence the outage probability of the -th user for CD-NOMA can be expressed as
(6) |
where and is the target rate of the -th user. The following theorem provides the outage probability of the -th user.
Theorem 1.
The outage probability of the -th user for CD-NOMA is given by
(7) |
where with , , , , , and is a parameter to ensure a complexity-accuracy tradeoff.
Proof.
See Appendix A. ∎
Corollary 1.
For the special case with , the outage probability of the -th user for PD-NOMA is given by
(8) |
Iii-B The outage probability of the -th user
As stated in [4, 15], the outage for the -th user can happen in the following two cases : 1) The -th user cannot decode the message of the -th user; and 2) The -th user can decode the message of the -th user, then carries out SIC operations, but cannot decode the information of itself. Hence the outage probability of the -th user can be expressed as
(9) |
where with being the target rate at the -th user to detect the -th user. The following theorem provides the outage probability of the -th user with ipSIC for CD-NOMA.
Theorem 2.
The outage probability of the -th user with ipSIC for CD-NOMA is given by (10), where , and .
(10) |
Proof.
See Appendix B. ∎
Substituting into (10), the outage probability of the -th user with pSIC for CD-NOMA is given by
(11) |
Corollary 2.
For the special case with , the outage probability of the -th user with ipSIC for PD-NOMA is given by
(12) |
Substituting into (2), the outage probability of the -th user with pSIC for PD-NOMA is given by
(13) |
Iii-C Diversity Order Analysis
To obtain deep insights, diversity order analysis is present, which highlights the slope of the curves for outage probabilities varying with the SNRs. The definition of diversity order is given by
(14) |
where denotes the asymptotic outage probability at high SNR region.
Corollary 3.
The asymptotic outage probability of the -th user for CD-NOMA is given by
(15) |
For the special case with , the asymptotic outage probability of the -th user for PD-NOMA is given by
(16) |
Remark 1.
Corollary 4.
The asymptotic outage probability of the -th user with ipSIC for CD-NOMA is given by
(17) |
Substituting into (4), the asymptotic outage probability of the -th user with pSIC for CD-NOMA is given by
(18) |
Remark 2.
Corollary 5.
For the special case with , the asymptotic outage probability of the -th user with ipSIC for PD-NOMA is given by
(19) |
Substituting into (5), the asymptotic outage probability of the -th user with pSIC for PD-NOMA is given by
(20) |
Iii-D Throughput Analysis
In this subsection, the system throughput of the unified NOMA framework is characterized in delay-limited transmission mode. In this mode, the BS transmits information at a constant rate , which is subject to the effect of outage probability. Hence the system throughput of CD/PD-NOMA with ipSIC/pSIC is given by
(21) |
where , . and are given by (1) and (8), respectively. , , and are given by (10) and (III-B), (2) and (III-B), respectively.
Iv Numerical Results
In this section, simulation results are presented to verify the analytical results derived in the above sections. In this unified framework considered, we assume the power allocation coefficients of a pair of users are and , respectively. The target rates are set to be BPCU, where BPCU is short for bit per channel use. Setting the pathloss exponent to be and the system carrier frequency is equal to GHz. The complexity-vs-accuracy tradeoff parameter is set to be . Without loss of generality, the OMA is selected to be a benchmark for comparison purposes. Note that NOMA users with low target data rate can be applied to the IoT scenarios, which require low energy consumption, small packet service and so on.
Fig. 1 plots the outage probability of a pair of NOMA users (the -th and -th user) versus the transmit SNR with pSIC/pSIC, where . The exact analytical curves for the outage probability of the -th user is plotted according to (1). Furthermore, the exact analytical curves for the outage probability of the -th user with ipSIC/pSIC are plotted based on (10) and (III-B), respectively. Obviously, the exact outage probability curves match perfectly with the Monte Carlo simulations results. We observed that the outage behavior of conventional OMA is inferior to the -th user with pSIC and superior to the -th user. This is due to the fact that NOMA is capable of providing better fairness since multiple users are served simultaneously, which is the same as the conclusions in [4, 16].
Additionally, as can be seen from Fig. 1, the dashed curves represent the asymptotic COP of the -th user and -th user with pSIC, which can be obtained by numerically evaluating (15) and (18). One can observe that the asymptotic outage probabilities are approximated to the analytical results in the high SNR region. The dotted curves represent the asymptotic outage probabilities of the -th user with ipSIC, which are calculated from (4), respectively. It is shown that the outage performance of the -th user converges to an error floor and obtain zero diversity order. Due to the influence of RI, the outage behavior of the -th user with ipSIC is inferior to OMA. This is because that the RI signal from imperfect cancellation operation is the dominant impact factor. With the value of RI increasing from dB to dB, the outage behavior of the -th user is becoming more worse and deteriorating. Hence the design of effective multiuser receiver algorithm is significant to improve the performance of NOMA networks in practical scenario.
Fig. 2 plots the outage probability versus SNR with the different number of subcarriers (i.e., and ). For the special case with , the unified framework of NOMA becomes PD-NOMA. The exact outage probability curve of the -th user for PD-NOMA is plotted according to (8). The exact outage probability curves of the -th user with ipSIC/pSIC are given by Monte Carlo simulations and precisely match with the analytical expressions, which have been derived in (2) and (III-B), respectively. The asymptotic outage probabilities of this pair of users for PD-NOMA are also approximated with the analytical results in the high SNR region. We observe that CD-NOMA has a more steep slope and can provide better outage performance than PD-NOMA. This is due to the fact that CD-NOMA is capable of achieving the higher diversity orders.
Fig. 3 plots the outage probabilities versus SNR for different user target rates. We observe that with increasing target rates, the lower outage probabilities are achieved. This is due to the fact that the achievable rates are directly related to the target SNRs. It is beneficial to detect the superposed signals for the selected user pairing with smaller target SNRs. It is worth pointing out that the impact of practical scenario parameter frequency dependent factor has been taken into account in the unified NOMA framework. Furthermore, the incorrect choice of and will lead to the improper outage behavior for the unified framework.
Fig. 4 plots the system throughput versus SNR in the delay-limited transmission mode. The solid black curves represent throughput of CD/PD-NOMA with ipSIC/pSIC, which can be obtained from (21). The dash-dotted blue curves represent throughput of CD-NOMA and PD-NOMA with ipSIC for the different values of RI. We observe that CD-NOMA attains a higher throughput compared to PD-NOMA, since CD-NOMA has the smaller outage probabilities. This is due to that CD-NOMA is capable of attaining the larger diversity order than that of PD-NOMA. Another observation is that increasing the values of RI from dB to dB will reduce the system throughput in high SNR region. This is because that CD/PD-NOMA converge to the error floors in the high SNR region.
V Conclusions
This paper has investigated the outage performance of a unified NOMA framework insightfully by invoking stochastic geometry. The exact expressions for outage probability of a pair of users with ipSIC/pSIC have been derived. It has been observed that the diversity orders of the -th user for CD/PD-NOMA are and , respectively. However, due to the influence of RI, the diversity orders achieved by the -th user with ipSIC are zeros for CD/PD-NOMA. On the basis of analytical results, we observed that the outage behaviors of CD-NOMA is superior to that of PD-NOMA. Additionally, the system throughput of CD/PD-NOMA with ipSIC/pSIC has been discussed in the delay-limited transmission mode.
Appendix A: Proof of Theorem 1
The proof starts by assuming and have the same column weights for . That is to say that and follow the same distribution. Hence based on (5), the expression for outage probability of the -th user is rewritten as
(A.1) |
where . It is observed that
is subject to a Gamma distribution with the parameters of
. The corresponding CDF of is given by .In addition, on the basis of order statistics [12], the CDF of the sorted channel gains between the BS and users over subcarriers has a specific relationship with the unsorted channels, which can be expressed as follows:
(A.2) |
where denotes the CDF of unsorted channels for the -th user. Due to the assumption of homogeneous PPPs [10] for randomly users and applying polar coordinate conversion, the CDF is given by
(A.3) |
Obviously, it is difficult to obtain effective insights from the above integral. We employ the Gaussian-Chebyshev quadrature to provide an approximation of (A.3) and rewrite it as follows:
(A.4) |
Substituting (A.4) and (A.2) into (A.1), we can obtain (1) and complete the proof.
Appendix B: Proof of Theorem 2
Denote and , respectively. Substituting (3) and (4) into (III-B), the COP of can be expressed as
(B.1) |
where , with and . Noting that is also subjective to a Gamma distribution with the parameters of and the corresponding PDF is give by
(B.2) |
After some mathematical manipulations, is calculated as
(B.3) |
where and . Similar to the proving process of (A.1), based on (B.2), can be given by
(B.4) |
Substituting (Appendix B: Proof of Theorem 2) and (Appendix B: Proof of Theorem 2) into (Appendix B: Proof of Theorem 2), we can obtain (10) and complete the proof.
References
- [1] Y. Cai, Z. Qin, F. Cui, G. Y. Li, and J. A. McCann, “Modulation and multiple access for 5G networks,” IEEE Commun. Surveys. Tutorials, vol. PP, no. 99, pp. 1–1, 2017.
- [2] Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan, and L. Hanzo, “Nonorthogonal multiple access for 5G and beyond,” Proceedings of the IEEE, vol. 105, no. 12, pp. 2347–2381, Dec. 2017.
- [3] T. M. Cover and J. A. Thomas, Elements of information theory, 6th ed., Wiley and Sons, New York, 1991.
- [4] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, “On the performance of non-orthogonal multiple access in 5G systems with randomly deployed users,” IEEE Signal Process. Lett., vol. 21, no. 12, pp. 1501–1505, Dec. 2014.
- [5] Z. Yang, Z. Ding, P. Fan, and G. K. Karagiannidis, “On the performance of non-orthogonal multiple access systems with partial channel information,” IEEE Trans. Commun., vol. 64, no. 2, pp. 654–667, Feb. 2016.
- [6] Z. Ding, Z. Zhao, M. Peng, and H. V. Poor, “On the spectral efficiency and security enhancements of noma assisted multicast-unicast streaming,” IEEE Trans. Commun., vol. 65, no. 7, pp. 3151–3163, Jul. 2017.
- [7] H. Nikopour and H. Baligh, “Sparse code multiple access,” in Proc. IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), London, UK, Sep. 2013, pp. 332–336.
- [8] S. Chen, B. Ren, Q. Gao, S. Kang, S. Sun, and K. Niu, “Pattern division multiple access PDMA - A novel nonorthogonal multiple access for fifth-generation radio networks,” IEEE Trans. Veh. Technol., vol. 66, no. 4, pp. 3185–3196, Apr. 2017.
- [9] Z. Yuan, G. Yu, W. Li, Y. Yuan, X. Wang, and J. Xu, “Multi-user shared access for internet of things,” in Proc. IEEE Vehicular Technology Conference (VTC Spring), Nanjing, CHN, May. 2016, pp. 1–5.
- [10] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo, “Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks,” IEEE Trans. Wireless Commun., vol. 16, no. 3, pp. 1656–1672, Mar. 2017.
- [11] Y. Liu, Z. Qin, M. Elkashlan, A. Nallanathan, and J. A. McCann, “Non-orthogonal multiple access in large-scale heterogeneous networks,” IEEE J. Sel. Areas Commun., vol. 35, no. 12, pp. 2667–2680, Dec. 2017.
- [12] H. A. David and H. N. Nagaraja, Order Statistics, 3rd ed. New York: John Wiley, 2003.
- [13] J. Men and J. Ge, “Non-orthogonal multiple access for multiple-antenna relaying networks,” IEEE Commun. Lett., vol. 19, no. 10, pp. 1686–1689, Oct. 2015.
- [14] Z. Ding, Y. Liu, J. Choi, Q. Sun, M. Elkashlan, C.-L. I, and H. V. Poor, “Application of non-orthogonal multiple access in LTE and 5G networks,” IEEE Commun. Mag., vol. 55, no. 2, pp. 185–191, Feb. 2017.
- [15] Y. Liu, Z. Ding, M. Elkashlan, and H. V. Poor, “Cooperative non-orthogonal multiple access with simultaneous wireless information and power transfer,” IEEE J. Sel. Areas Commun., vol. 34, no. 4, pp. 938–953, Apr. 2016.
- [16] X. Yue, Y. Liu, S. Kang, and A. Nallanathan, “Performance analysis of NOMA with fixed gain relaying over Nakagami- fading channels,” IEEE Access, vol. 5, pp. 5445–5454, Mar. 2017.