Next Article in Journal
A Bounded Measure for Estimating the Benefit of Visualization (Part I): Theoretical Discourse and Conceptual Evaluation
Previous Article in Journal
Breaking Barriers in Emerging Biomedical Applications
Previous Article in Special Issue
Optimization Algorithms for Joint Power and Sub-Channel Allocation for NOMA-Based Maritime Communications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Beyond Equal-Power Sparse NOMA: Two User Classes and Closed-Form Bounds on the Achievable Region †

by
Benjamin M. Zaidel
1,*,
Ori Shental
2 and
Shlomo Shamai (Shitz)
3
1
The Alexander Kofkin Faculty of Engineering, Bar-Ilan University, Ramat-Gan 5290002, Israel
2
Qualcomm Inc., 5775 Morehouse Drive, San Diego, CA 92121, USA
3
Department of Electrical and Computer Engineering, Technion—Israel Institute of Technology, Haifa 3200003, Israel
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in Zaidel, B. M.; Shental, O.; Shamai (Shitz), S. Bounding the Achievable Region of Sparse NOMA. In Proceedings of the 2020 IEEE International Symposium on Information Theory (ISIT), Los Angeles, CA, USA, 21–26 June 2020; pp. 3043–3048.
Entropy 2022, 24(2), 227; https://doi.org/10.3390/e24020227
Submission received: 13 December 2021 / Revised: 26 January 2022 / Accepted: 28 January 2022 / Published: 31 January 2022

Abstract

:
Non-orthogonal multiple access (NOMA) is a promising technology for future beyond-5G wireless networks, whose fundamental information-theoretic limits are yet to be fully explored. Considering regular sparse code-domain NOMA (with a fixed and finite number of orthogonal resources allocated to any designated user and vice versa), this paper extends previous results by the authors to a setting comprising two classes of users with different power constraints. Explicit rigorous closed-form analytical inner and outer bounds on the achievable rate (total class throughput) region in the large-system limit are derived and comparatively investigated in extreme-SNR regimes. The inner bound is based on the conditional vector entropy power inequality (EPI), while the outer bound relies on a recent strengthened version of the EPI. Valuable insights are provided into the potential performance gains of regular sparse NOMA in practically oriented settings, comprising, e.g., a combination of low-complexity devices and broadband users with higher transmit power capabilities, or combinations of cell-edge and cell-center users. The conditions for superior performance over dense code-domain NOMA (taking the form of randomly spread code-division multiple access), as well as a relatively small gap to the ultimate performance limits, are identified. The proposed bounds are also applicable for the analysis of interference networks, e.g., Wyner-type cellular models.

1. Introduction

Non-orthogonal multiple access (NOMA) is a key enabler in the design of future overloaded beyond-5G communication systems with many more designated users than available physical resources, precluding the conventional orthogonal multiple access (OMA) paradigm [1,2,3,4] (see also [5] for a very recent technology review). The main potential appeal of NOMA over OMA stems from either supporting more simultaneous users or, in lieu, facilitating higher user throughputs when orthogonality is practically unsustainable. NOMA technologies generally comprise two main manifestations, power-domain NOMA and code-domain NOMA. Power-domain NOMA essentially relies on direct superposition of the transmitted signals, successive interference cancellation (SIC) at the receivers and appropriate power allocation to different users in order to achieve desired performance objectives [1,2,6,7]. Under the code-domain NOMA paradigm, the users’ signals are distinguished by different spreading signatures chosen to facilitate efficient multiuser detection (MUD) at the receivers (see, e.g., [2,8]). In particular, sparse NOMA, or low-density code-domain (LDCD) NOMA, has gained considerable interest in recent years due to its appealing attributes. Relying on sparse spreading signatures, sparse NOMA potentially facilitates enhanced spectral efficiency with practical receiver implementation based on sparsity exploiting iterative message passing algorithms (MPAs), similarly to the ones empowering the efficient decoding of low-density parity-check (LDPC) codes. The interested reader is referred to the insightful surveys [1,2] for details about the utilization of MPAs in NOMA, along with their concrete application for sparse NOMA [9,10,11], including sparse-code multiple access (SCMA) [12]. Different designs of sparse spreading signatures and their impact on MUD error-rate performance are discussed, e.g., in [11,13,14] and references therein.
Transmission schemes combining power-domain NOMA and SCMA were also recently proposed, e.g., in [15,16] for the cellular downlink channel and in [17,18,19,20,21] for the uplink channel. Therein, the main objective is to identify efficient centralized algorithms for joint resource and power allocation, that attempt to maximize the SCMA achievable throughput under independent Rayleigh fading and certain simplifying assumptions (viz., independent Gaussian signaling over each utilized physical resource, full synchronization and perfect channel state information). Fairness and quality-of-service constraints may also be incorporated into the optimization algorithm (e.g., [19,20,21]). The performance of the proposed algorithms is then evaluated by means of numerical simulations. More involved network configurations have also been considered recently, e.g., system models encompassing relays (see [22] and references therein for an exhaustive literature survey). Relaying may either appear in the form of dedicated network elements, e.g., [22,23] or, alternatively, by means of user cooperation, e.g., [24,25,26,27]. In this framework, focusing on power-domain NOMA with SIC, the notion of virtual full-duplex (VFD) relaying [28] has gained particular interest as means to circumvent the implementation challenges of true full-duplex operation; see, e.g., [22,25,26,27]. The impact of imperfect SIC and residual inter-relay interference in this framework was also recently considered in [26].
Notwithstanding their great practical promise and potential, sparse NOMA techniques often pose serious analytical challenges and their information-theoretic performance limits are not easily tractable even in the simplest settings. Typically, tools from random matrix theory or statistical physics are harnessed for their analysis [29,30,31,32], while considering the asymptotic large-system limit, where both the number of users and the number of available resources grow large, while retaining a fixed ratio (see, e.g., [33,34,35]). The obtained results typically yield excellent approximations for the expected performance with finite (and quite moderate) system dimensions [29,30].
Sparse NOMA is dubbed: regular when a fixed (and finite) number of orthogonal resources is allocated to any designated user and each resource is used by a fixed number of users; irregular when the respective numbers are random and only kept fixed on average [33]. In the literature, one can also find a partly regular version of the sparse NOMA setup where each user occupies a fixed number of resources and each resource is used by a random, yet fixed on average, number of users (or vice versa) [34,36].
In a recent line of works by the authors [37,38,39], the particular manifestation of code-domain NOMA known as regular sparse NOMA has been investigated and its asymptotic spectral efficiency has been derived in closed form [38,39] (see Section 2 for a precise characterization of the underlying asymptotic large-system limit and [38,39] for a discussion on what distinguishes this particular setting from previous analyses). Therein, a generic setup of a (non-fading) Gaussian vector multiple-access channel (MAC) with equal-power users was considered, representing the case of a single-cell uplink model with fully coordinated grant-based access, and the scheme was analytically proven to substantially decrease the gap to the ultimate capacity limit of overloaded systems. Furthermore, regular sparse NOMA was proven by the authors to outperform the dense code-domain NOMA alternative [40,41], along with its irregular and partly regular sparse counterparts [33,34]. Hence, regular sparse NOMA seems to exhibit a rare combination of information-theoretic superiority and computational feasibility (dense code-domain NOMA is operationally equivalent to randomly spread code-division multiple access (RS-CDMA) [40,41], for which achieving the optimal spectral efficiency becomes prohibitively complex in large systems [42]). However, analyzing the merits of regular sparse NOMA beyond the generic equal-power Gaussian vector MAC setting is still a challenging, yet of utmost importance, open problem, which does not seem to lend itself to closed-form characterization, as in [38,39].
Motivated by this noteworthy challenge, the current paper takes a step further towards a generalization of the fundamental result of [38,39]. To this end, the focus remains on regular sparse NOMA within a single-cell Gaussian uplink (MAC) model, but the single-class information-theoretic analysis of [37,38,39] is extended to a looser, yet more realistic, setting comprising two user classes distinguished by their received powers. Again, the large-system limit is considered and our main contribution is the derivation of closed-form bounds on the achievable class-rate (total throughput) region, which are both insightful and analytically tractable. An inner bound is first derived based on the standard conditional vector entropy power inequality (EPI) [43]. A derivation of an outer bound follows, while relying on a recent strengthened version of the EPI by Courtade [44,45]. Both bounds are tight with respect to the individual achievable class-throughput constraints and only differ in the achievable sum-rate (total throughput) constraint. The key tool in the derivations is a noise-split “trick”, that, when combined with the EPI, induces closed-form bounds expressed in terms of single-class achievable throughputs [38,39]. A simplified outer bound, which does not rely on the EPI, is then presented for load-symmetric settings (under some mild technical assumptions). This bound turns out to be tighter in certain cases. An in-depth elucidative investigation of the corresponding lower and upper bounds on the achievable sum rate in extreme-SNR regimes is also provided, which, by means of appropriate approximations [41], identifies conditions under which the bounds are useful and a superior performance over dense code-domain NOMA is guaranteed. Conditions for attaining a relatively small gap to the ultimate performance limits are also discussed.
Our contribution provides valuable insights into the potential performance gains of regular sparse NOMA in several timely use cases of interest. One particular example represents a 5G-and-beyond scenario, where the two user classes respectively correspond, say, to low-complexity devices with stringent power constraints (e.g., Internet-of-Things applications) and to broadband users with higher transmit power capabilities. Another applicable use case is a single cell with users located at the extremes of either the cell center or the cell edge. Our analysis is also applicable to a compelling combination of power-domain NOMA [2,6] and code-domain NOMA, which has only recently started to attract attention in the literature [15,16,17,18,19,20,21], as discussed above. Accordingly, the corner points of the achievable region bounds correspond to a SIC scheme between the two user classes, while incorporating near-optimal joint iterative decoding (MPA) within each class. In fact, by this interpretation, our analysis provides, in a sense, an analytical benchmark for the setting considered in [20] (see also [18]), under the simplifying assumptions of non-fading channels and full symmetry among the users in each user class. Note that, in the absence of fading, the corresponding regular SCMA achievable sum rate, while assuming independent Gaussian signaling over each utilized resource, trivially coincides with the Cover–Wyner sum capacity (see, e.g., [43] and Section 3.3). Hence, our analytical bounds quantify the gap from the ultimate performance limit induced by employing regular sparse spreading signatures and may serve as reference for practical schemes that aim to approach the sum-capacity limit using the SCMA paradigm, e.g., [17,18,19,20,21]. Note that, in the presence of fading, characterizing the achievable rate region of the two-user-class system considered in this paper is still a formidable open problem yet to be explored; hence, a direct and explicit comparison with practical achievable sum rates reported in works, such as [20], cannot be performed at this stage. Yet another applicable model is a two-cell interference network, where the two user classes represent, respectively, the local cell users and the users operating in the adjacent interfering cell. This may be further extended, e.g., to Wyner-type cellular models with single-cell processing [46,47,48,49].
This paper is organized as follows: Section 2 describes the underlying system model and the random graph models employed to construct the regular sparse spreading signatures. Section 3 presents a general statement of the class-throughput achievable region and the corresponding closed-form analytical inner and outer bounds. Section 4 is devoted to a comparative extreme-SNR characterization of the lower and upper bounds on the total achievable sum rate. Illustrative numerical results are provided in Section 5. Finally, Section 6 ends this paper with some concluding remarks. Detailed proofs and some technical observations are deferred to the appendices.

2. System Model

Notation: We use boldface lower-case letters to denote vectors and boldface uppercase letters to denote matrices. [ M ] i j denotes the ( i , j ) -th entry of the matrix M . M T denotes the transpose of M , while M denotes the corresponding conjugate (Hermitian) transpose. ⊗ denotes the Kronecker product. I N denotes the N-dimensional identity matrix. C N ( μ , Σ ) designates the distribution of a proper circularly symmetric complex Gaussian random vector with mean μ and covariance matrix Σ . δ x designates the probability distribution of a single mass at x. Equality in distribution is denoted by = d , stating that the distribution of the random variables on both sides of the equality sign is the same. E · denotes statistical expectation and E X · designates that the expectation is taken with respect to the distribution of the random variable X. h ( · ) denotes differential entropy and I ( · ; · ) denotes mutual information. For any ϵ ( 0 , 1 ) , we use the notation ϵ ¯ 1 ϵ . Base-2 logarithms are used throughout this paper unless otherwise stated (in which case the base of the logarithm is explicitly designated). For the sake of clarity, we use ln ( · ) to denote the natural logarithm.
We consider a MAC, representing a single-cell uplink, where the users belong to either of two different classes distinguished by their received powers (henceforth referred to as “Class 1” and “Class 2”). Within each class, all users are assumed to be received at the same power level. The users’ signals are multiplexed over N shared orthogonal dimensions (resources), which may represent, e.g., orthogonal time–frequency slots. However, it is important to emphasize here that the setting is quite general and applies to any orthogonal coordinate system; therefore, the dimensions are, by no means, restricted to the time–frequency domain. Let K 1 and K 2 denote the number of users in Class 1 and Class 2, respectively, and let β i K i / N , i = 1 , 2 denote the respective loads (users per resource). The total number of users is denoted by K K 1 + K 2 and the total system load reads β K / N = β 1 + β 2 .
Focusing on a generic non-fading Gaussian channel model, the N-dimensional received signal at some arbitrary time instance reads
y = snr 1 d A 1 x 1 + snr 2 d A 2 x 2 + z ,
where x i , i = 1 , 2 , is a K i -dimensional complex vector comprising the coded symbols of the users in Class i. Assuming Gaussian signaling, full symmetry, fixed powers and no cooperation among encoders corresponding to different users, the input vector x i is distributed as x i CN ( 0 , I K i ) . The matrix A i represents the N × K i sparse signature matrix of Class-i users, where the kth column represents the spreading signature of user k in Class i. The non-zero entries of A i designate the corresponding user-resource mapping, namely, user k in Class i occupies resource n if [ A i ] n k 0 . Specifically, we adhere to the regular sparse NOMA paradigm [37,38,39], where, for each Class i, i = 1 , 2 , due to the sparsity of A i , only a few of the users’ signals collide over any given orthogonal resource. The regularity assumption generally dictates that each column of A i (respectively, row) has exactly d i 2 N + (respectively, β i d i ) non-zero entries. However, for notational simplicity, we assume henceforth that d 1 = d 2 = d , while noting that extension of the analysis to the case where A 1 and A 2 have a different fixed number of non-zero column entries is straightforward (hence omitted). Therefore, d takes the role of the system’s sparsity parameter. We assume here that β i is chosen so that β i d 2 N + , i = 1 , 2 , in order to avoid degenerate settings. The non-zero entries of A i are assumed to be independent and identically distributed (i.i.d.), but may otherwise arbitrarily reside on the unit circle in the complex plane, in complete adherence to [38,39]. Thus, the normalization in (1) ensures that the columns of 1 d A i have unit norm. We also assume here that the signature matrices A 1 and A 2 are perfectly known at the receiving end and uniformly chosen, respectively, randomly and independently per each channel use and each user class i, from the set of ( β i d , d ) -regular matrices. This assumption is only introduced here for the sake of concreteness and the setting, in fact, generalizes verbatim to the case where the signature matrix selection process is stationary and ergodic. Finally, z CN ( 0 , I N ) denotes the N-dimensional circularly symmetric complex additive white-Gaussian-noise (AWGN) vector at the receiving end. Thus, the parameter snr i in (1), i = 1 , 2 , designates the received signal-to-noise ratio (SNR) of each of the users in Class i.
A key additional underlying assumption, which follows [38,39], is that the signature matrices A i i = 1 , 2 can be associated with the adjacency matrices of certain random ( β i d , d ) -semiregular bipartite (factor) graphs A i i = 1 , 2 , with special properties to be stated next. To this end, we first introduce the following two definitions.
Definition 1
(Locally Tree-Like Graphs [50,51]). Let G denote the space of rooted isomorphism classes of rooted connected graphs. A sequence of random graphs G n , n 1 , in the space G , with a root vertex v n chosen uniformly at random from the vertex set of G n , is said to converge locally (weakly) to a certain random rooted tree ( T , o ) , if, for each r 0 , the sequence of balls B r G n ( v n ) with radius r (in graph distance) around v n converges in law to B r T ( o ) in the space G . A more precise mathematical definition can be found, e.g., in [50,51].
Definition 2
(Bipartite Galton–Watson Tree (BGWT) [50]). A Galton–Watson tree (GWT) with degree distribution F * is a rooted random tree obtained by a Galton–Watson branching process, where the root has offspring distribution F * and all other genitors have offspring distribution F, where (assuming k k F * ( k ) < )
F ( k 1 ) = k F * ( k ) k k F * ( k ) , k 1 .
A BGWT with degree distribution ( F * , G * ) and parameter p is obtained from a Galton–Watson branching process with alternated degree distribution. Namely, with probability p, the root has offspring distribution F * , all odd generation genitors have an offspring distribution G (related to G * analogously to F) and all even generation genitors (apart from the root) have an offspring distribution F. Similarly, with probability 1 p , the root has offspring distribution G * and the offspring distributions of all odd and even generation genitors are switched. See [50] for a more elaborate discussion.
We now further assume that the random graphs A i i = 1 , 2 associated with the signature matrices are locally tree-like and converge in the large-system limit to BGWTs having degree distribution ( δ β i d , δ d ) and parameter 1 1 + β i as a weak limit, where i = 1 , 2 . The term “large-system limit” refers here to the regime where N , K 1 , K 2 while fixing K i / N = β i , i = 1 , 2 . We use henceforth the shorthand notation “ N ” to designate this limiting regime.
From a practical perspective, it is important to note here that the aforementioned locally tree-like property is valid, e.g., for regular LDPC codes [50,52] and it essentially implies that, for large dimensions, short cycles are rare, which facilitates the use of iterative near-optimal multiuser detection algorithms (while applying MPAs over the underlying factor graphs). Moreover, the sparse signature matrices can in fact be constructed as weighted parity-check matrices of regular LDPC codes, which we, in fact, employ using Gallager’s construction [53] to produce the finite dimensional simulation results in Section 5 (see therein).

3. The Achievable Rate Region

3.1. Preliminaries

For the sake of completeness, we first review the main result of [38,39] (adapted to the current system model), which constitutes the basis for the analysis in the sequel. Let us consider a single-class channel model (cf. ( 1)) as follows:
y = snr i d A i x i + z , i = 1 , 2 .
Theorem 1
([38], Theorem 3). Let A i , i = 1 , 2 , be a sparse random N × K i matrix with exactly 2 d N + < (respectively, 2 β i d N + < ) non-zero entries in each column (respectively, row), independent and identically arbitrarily distributed over the unit circle in C . Assume that the ( β i d , d ) -semiregular bipartite graph A i associated with A i is locally tree-like with the limiting properties specified in Section 2. Let α d 1 d and γ i β i d 1 d , i = 1 , 2 . Further, let β ˜ i α γ i and ζ i β i d γ i , i = 1 , 2 . Then, the normalized conditional input–output mutual information
1 N I ( x i ; y | A i ) = 1 N E { log det ( I N + snr i d A i A i ) } , i = 1 , 2 ,
converges, as N , to
C i ( snr i ) C opt ( snr i , β i , d ) = ( β i 1 ) log 1 + α snr i 1 4 F ( γ i snr i , β i ˜ ) C i = = + β i ( d 1 ) + 1 2 log 1 + ( γ i + α ) snr i 1 4 F ( γ i snr i , β i ˜ ) = β i ( d 1 ) 1 2 log ( 1 + β i d snr i ) 2 G ( γ i snr i , ζ i , β ˜ i ) , i = 1 , 2 ,
where (cf. [40])
F ( x , z ) x ( 1 + z ) 2 + 1 x ( 1 z ) 2 + 1 2 ,
and, for x , y , z R + , y ( 1 + z ) 2 ,
G ( x , y , z ) y ( 1 z ) 2 x ( 1 + z ) 2 + 1 y ( 1 + z ) 2 x ( 1 z ) 2 + 1 y ( 1 z ) 2 y ( 1 + z ) 2 2 .
Let R i denote the normalized spectral efficiency (total throughput) in bit/sec/Hz of the users in Class i, i = 1 , 2 . Let R denote the achievable region of rate pairs ( R 1 , R 2 ) for the channel (1). Then, by the standard properties of the MAC capacity region (e.g., [43]), it follows that
R = { ( R 1 , R 2 ) : R 1 1 N I ( x 1 ; y | x 2 , A i i = 1 , 2 ) , R 2 1 N I ( x 2 ; y | x 1 , A i i = 1 , 2 ) , R 1 + R 2 1 N I ( x 1 , x 2 ; y | A i i = 1 , 2 ) } .
In the large-system limit, the two constraints on the (class) individual rates can be characterized explicitly and in closed form by means of Theorem 1. Namely, the two bounds converge to the following limits:
1 N I ( x i ; y | x j , A i i = 1 , 2 ) N ; i , j = 1 , 2 ; i j C i ( snr i ) .
Note that C i ( snr i ) specifies, in the large-system limit, the normalized spectral efficiency with optimum processing in bit/sec/Hz of the users in Class i, given the signals transmitted by the users in Class j, j i [38,39]. However, unfortunately, a corresponding limiting result for the maximum achievable sum rate 1 N I ( x 1 , x 2 ; y | A i i = 1 , 2 ) is still missing. Furthermore, the limit does not seem amenable to closed-form characterization. Therefore, we proceed, in the following sections, by deriving closed-form analytical lower and upper bounds on this quantity in the large-system limit. These bounds produce, in turn, corresponding inner and outer bounds on the achievable region R which, as implied by (9), are tight in their individual rate constraints.

3.2. Inner Bound

Proposition 1.
Let us fix κ 1 = κ ( 0 , 1 ) , κ 2 = κ ¯ , and let R ib be defined as
R ib = { ( R 1 , R 2 ) : R 1 C 1 ( snr 1 ) , R 2 C 2 ( snr 2 ) , R 1 + R 2 log κ 1 2 C 1 snr 1 κ 1 + κ 2 2 C 2 snr 2 κ 2 } .
Then, the rate region R ib is achievable for the channel (1) in the large-system limit, as N .
Proof. 
See Appendix A. □
As shown in Appendix A, the parameter κ is introduced by a noise-split step required for applying Theorem 1 (see (A2)). The inner bound (10) can then be tightened by maximizing the sum-rate constraint over κ ( 0 , 1 ) (which can be easily accomplished, e.g., by a straightforward grid-search over ( 0 , 1 ) ). As a simple example, consider the extreme case where the receive SNR of either of the user classes vanishes. In such case, the optimized sum-rate constraint can be set arbitrarily close to the actual achievable sum rate. Specifically, assume, without loss of generality, that snr 2 0 (with snr 1 and κ fixed). Clearly, in such case, the achievable throughput of Class 2 users trivially satisfies R 2 0 . The sum-rate constraint in (10) then approaches the limit
log κ 1 2 C 1 snr 1 κ 1 + κ 2 2 C 2 snr 2 κ 2 snr 2 0 log κ 2 C 1 snr 1 κ + 1 κ κ 1 C 1 snr 1 ,
which is indeed the maximum achievable sum rate in this extreme setting. In fact, the optimization with respect to κ turns out to be rather crucial, since poor choices of κ may lead to cases where not all rate constraints in (10) are active and the inner bound no longer specifies a pentagon in the ( R 1 , R 2 ) -plane. As indicated by numerical investigations, this may occur in underloaded settings, which are of lesser interest in view of the expected use cases of the underlying NOMA setting.

3.3. Outer Bound

Proposition 2.
Let us fix μ 1 , μ 2 ( 0 , 1 ) such that μ 3 1 μ 1 μ 2 > 0 , let μ ¯ 1 1 μ 1 , μ ¯ 2 1 μ 2 , and let R ob satisfy
R ob = { ( R 1 , R 2 ) : R 1 C 1 ( snr 1 ) , R ob = { ( R 2 C 2 ( snr 2 ) , R ob = { ( R 1 + R 2 log μ ¯ 1 μ ¯ 2 2 C 1 ( snr 1 μ ¯ 2 ) + C 2 ( snr 2 μ ¯ 1 ) μ 1 μ 2 2 C 1 ( snr 1 μ 1 ) + C 2 ( snr 2 μ 2 ) log μ 3 } .
Then, the rate region R ob includes the achievable region for the channel (1) in the large-system limit, as N .
Proof. 
See Appendix B. □
Analogously to the proof of Proposition 1, a noise-split step introducing the parameters μ 1 , μ 2 is required for the applicability of Theorem 1 (see (A13)–(A15)) and the outer bound (12) can be tightened by minimizing the sum-rate constraint over the choice of μ 1 , μ 2 ( 0 , 1 ) , while satisfying 1 μ 1 μ 2 > 0 . Here as well, a proper choice of μ 1 and μ 2 is crucial, as, otherwise, the sum-rate constraint may turn out too loose and become inactive.
To obtain more insight, it is also useful to consider the Cover–Wyner region, specifying the ultimate MAC capacity region (without any random-spreading constraint). In the current setting, the Cover–Wyner region reads [40]
R CW = { ( R 1 , R 2 ) : R 1 log ( 1 + β 1 snr 1 ) , R 2 log ( 1 + β 2 snr 2 ) , R 1 + R 2 log ( 1 + β 1 snr 1 + β 2 snr 2 ) } ,
and constitutes a trivial outer bound on the achievable region. A comparison to (13) can thus be used to identify settings where the outer bound of Proposition 2 is indeed useful. Note that (13) is also, in fact, the achievable region with a corresponding idealized SCMA scheme, where each user transmits independent Gaussian symbols over each of the utilized orthogonal resources; see, e.g., [20].

3.4. Alternative Outer Bound for Symmetric Loading

To complete the characterization of the achievable region, we further introduce an alternative outer bound, which applies to a particular symmetric construction of the signature matrices (henceforth dubbed, for conciseness, “symmetric construction”). The bound relies on a simple upper bound on the maximum achievable sum rate 1 N I ( x 1 , x 2 ; y | A i i = 1 , 2 ) . Let us consider the case where K 1 = K 2 = K 2 and thus β 1 = β 2 = β 2 . With some abuse of notation, let us assume now that, in addition to the underlying assumptions of Theorem 1, the signature matrices A 1 and A 2 are constructed such that the N × K matrix A [ A 1 A 2 ] can be associated with the adjacency matrix of a locally tree-like ( β d , d ) -semiregular bipartite graph A (see Definitions 1 and 2). Additionally, let A have a BGWT with degree distribution ( δ β d , δ d ) and parameter 1 1 + β as a weak limit. Analogously to Section 2, we assume here that the pair of matrices ( A 1 , A 2 ) is randomly chosen uniformly and independently per each channel use from the set of matrices satisfying the above properties. Then, the following proposition holds.
Proposition 3.
Let the two user classes have equal sizes, corresponding each to a load β 2 . Let the signature matrices A 1 and A 2 be chosen according to the “symmetric construction”. Let R sym ob be defined as
R sym ob = { ( R 1 , R 2 ) : R 1 C opt ( snr 1 , β 2 , d ) , R 2 C opt ( snr 2 , β 2 , d ) , R 1 + R 2 C opt ( snr 1 + snr 2 2 , β , d ) } ,
where C opt ( · , · , d ) is specified in (5). Then, the rate region R sym ob includes the achievable region for the channel (1) in the large-system limit, as N .
Proof. 
Focusing on the sum-rate constraint, the underlying assumptions of the “symmetric construction” imply that the maximum achievable sum rate satisfies
1 N I ( x 1 , x 2 ; y | A i i = 1 , 2 ) = 1 N E log det I N + snr 1 d A 1 A 1 + snr 2 d A 2 A 2 = 1 N E log det I N + A ( D I K 2 ) A = ( a ) 1 N E A , Π log det I N + A Π D Π T I K 2 A ,
where
D = 1 d snr 1 0 0 snr 2 ,
Π is a random permutation matrix satisfying
Π = I 2 w . p . 1 2 , 0 1 1 0 w . p . 1 2 ,
and ( a ) follows by symmetry with respect to A 1 and A 2 . Next, applying Jensen’s inequality, while relying on the convexity of the log det ( · ) function, we obtain
1 N I ( x 1 , x 2 ; y | A i i = 1 , 2 ) 1 N I ( x 1 , x 2 ; y = 1 N E A E Π log det I N + A Π D Π T I K 2 A | A = A 1 N I ( x 1 , x 2 ; y 1 N E A log det I N + A E Π Π D Π T I K 2 A 1 N I ( x 1 , x 2 ; y = 1 N E A log det I N + snr av d A A 1 N I ( x 1 , x 2 ; y N C opt ( snr av , β , d ) ,
where we define the average SNR as
snr av β 1 β snr 1 + β 2 β snr 2 ,
yielding snr av = snr 1 + snr 2 2 for the “symmetric construction”. The limit in (18) follows from Theorem 1. Combining (18) with (9) finally yields (14), which completes the proof. □

4. Extreme-SNR Characterization

To complement the analytical characterization of the achievable rate region by means of the bounds in Propositions 1–3, we focus on the achievable sum rate and provide, in this section, an in-depth investigation of the respective bounds in extreme-SNR regimes. Although all bounds take an explicit closed form, the corresponding expressions are still rather involved. Therefore, the main advantage of the extreme-SNR characterization is that, by means of certain simplifying approximations (appropriate for extreme SNRs), it leads to valuable insights that are otherwise hard to obtain, as is shown in the sequel. In particular, this characterization demonstrates the impact of the parameters κ , μ 1 , μ 2 used in Propositions 1 and 2 on the tightness of the respective lower and upper bounds on the achievable sum rate. For symmetric settings (see Section 3.4), it further allows us to identify which of the two upper bounds on the achievable sum rate stated in Propositions 2 and 3 is tighter; hence, the corresponding outer bound is more useful for characterizing the achievable region in extreme-SNR regimes. For the low-SNR regime, we specify conditions under which the former bound of Proposition 2 is tighter, while, for the high-SNR regime, it turns out that Proposition 3 generally provides a tighter bound in symmetric overloaded settings.
Our analysis examines the achievable sum rate as a function of snr av (the average SNR), as defined in (19). Furthermore, without loss of generality, we assume henceforth that snr 2 = α ˜ snr 1 for some α ˜ ( 0 , 1 ) . This immediately implies (cf. (19)) that
snr 1 = χ snr av , snr 2 = α ˜ χ snr av ,
where
χ β β 1 + α ˜ β 2 .
Starting with the low-SNR regime, the achievable sum rate is approximated as
C sum S 0 3   dB E b N 0 | dB E b N 0 min | dB ,
where S 0 denotes the low-SNR slope, E b N 0 min is the minimum system average E b N 0 that enables reliable communications and 3   dB 10 log 10 2 [41]. The average SNR and E b N 0 are related via
β snr av = C sum ( snr av ) E b N 0 .
Let C sum ( snr av ) denote the achievable sum rate expressed as a function of snr av in nats/channel use per dimension. Then, the minimum E b N 0 that enables reliable communications and the low-SNR slope read [41]
E b N 0 min = β ln 2 C ˙ sum ( 0 ) ,
S 0 = 2 C ˙ sum ( 0 ) 2 C ¨ sum ( 0 ) ,
where C ˙ sum ( 0 ) and C ¨ sum ( 0 ) denote the first and second derivatives at zero of C sum ( snr av ) (note that (22), (24) and (25) tacitly assume that the minimum E b N 0 corresponds to the point of vanishing rate; a short discussion on this aspect is provided in Appendix D).
Turning to the high-SNR regime, we approximate the achievable sum rate as [41]
C sum ( snr av ) S log snr av L ,
where S denotes the high-SNR slope (multiplexing gain) and L denotes the high-SNR power offset. Note that we use here a slightly different high-SNR approximation than the one originally proposed in [41], in the sense that it relies on approximating the sum rate as a function of snr av (rather than E b N 0 ); consequently, the resulting high-SNR power offset differs by a log β term when compared to [41].
In the following sections, we employ the above approximations for the lower and upper bounds on the achievable sum rate and derive the corresponding extreme-SNR parameters. Specifically, we consider the sum-rate bounds in (10) and (12), which, when rewritten as functions of snr av , read
C sum lb ( snr av ) = log κ 1 2 C 1 ( χ snr av κ 1 ) + κ 2 2 C 2 ( α ˜ χ snr av κ 2 ) ,
C sum ub ( snr av ) = log μ ¯ 1 μ ¯ 2 μ ¯ 12 2 C 1 ( χ snr av μ ¯ 2 ) + C 2 ( α ˜ χ snr av μ ¯ 1 ) μ 1 μ 2 μ ¯ 12 2 C 1 ( χ snr av μ 1 ) + C 2 ( α ˜ χ snr av μ 2 ) ,
where we introduce the notation
μ ¯ 12 1 μ 1 μ 2 = μ 3 .
For symmetric settings, we additionally rely on ([38], Proposition 5; see also [39], Proposition 4) for the extreme-SNR characterization of the sum-rate bound in (14).
Furthermore, note that the sum capacity (specifying the ultimate performance limit) is given by the sum-rate constraint in (13), which, when expressed as a function of snr av , boils down to
C sum CW ( snr av ) = log ( 1 + β snr av ) .
Hence, the corresponding low-SNR parameters are
E b N 0 min CW = ln 2 , S 0 CW = 2 ,
while the high-SNR parameters read
S CW = 1 , L CW = log β .

4.1. The low-SNR Regime

Starting with the sum-rate lower bound (27), its low-SNR characterization is summarized in the following proposition.
Proposition 4.
The low-SNR parameters of the asymptotic sum-rate lower bound (27) read
E b N 0 min lb = ln 2 ,
S 0 lb = 2 1 + d 1 d ( β 1 + α ˜ β 2 ) 2 · β 1 κ 1 + α ˜ 2 β 2 κ 2 ,
where, as in Proposition 1, κ 1 = κ ( 0 , 1 ) and κ 2 = κ ¯ .
Proof. 
See Appendix C. □
As implied by Proposition 4, the sum-rate lower bound optimization with respect to κ (see Section 3.2) takes a more explicit form in the low-SNR regime. Specifically, the low-SNR slope (34) can be optimized by choosing κ ( 0 , 1 ) such that the denominator therein is minimized; namely, by setting
κ = κ opt L arg min κ ( 0 , 1 ) β 1 κ + α ˜ 2 β 2 1 κ .
To demonstrate the usefulness of this observation, while simplifying the discussion, let us consider the symmetric setting where β 1 = β 2 = β 2 . Then, the optimal choice for κ reduces to
arg min κ ( 0 , 1 ) 1 κ + α ˜ 2 1 κ ,
which yields
κ opt L = 1 1 + α ˜ , α ˜ ( 0 , 1 ) .
Substituting back into (34), while accounting for the class-symmetry and setting
κ 1 = 1 1 + α ˜ , κ 2 = 1 κ 1 = α ˜ 1 + α ˜ ,
we obtain (following some algebra)
S 0 lb = 2 β d β d + 2 ( d 1 ) .
Note that S 0 lb is strictly lower, for all d 2 , than the corresponding low-SNR slope of the optimum spectral efficiency (total throughput) in a single-class setting with load β and an SNR that equals snr av , as specified in Theorem 1, which reads ([38], Proposition 5; see also [39], Proposition 4)
S 0 SC = 2 β d d ( β + 1 ) 1 = 2 β d β d + d 1 .
In fact, (40) also specifies the low-SNR slope of the sum-rate upper bound for the “symmetric construction”, as stated in Proposition 3 (cf. (14)). Hence, (39) and (40) provide compact lower and upper bounds on the low-SNR slope of the achievable sum rate under class symmetry. Another interesting comparison is with the low-SNR slope of the maximum achievable sum rate with RS-CDMA, representing a practical manifestation of random dense NOMA (see Appendix G for a derivation of the RS-CDMA achievable region). For the symmetric setting, this slope reads (following (A110), (A114) and ([41], Equation (147)))
S 0 RS = 2 1 + 2 ( 1 + α ˜ 2 ) β 1 + α ˜ 2 = 2 β β + 2 ( 1 + α ˜ 2 ) 1 + α ˜ 2 ,
which lets us conclude that S 0 lb > S 0 RS , as long as
d 1 d < 1 + α ˜ 2 1 + α ˜ 2 ,
hence, regular sparse NOMA is guaranteed to strictly outperform RS-CDMA in the low-SNR regime as long as (42) is satisfied. Note, e.g., that setting d = 2 immediately implies that (42) is satisfied for all α ˜ ( 0 , 1 ) .
Turning to the sum-rate upper bound (28), its low-SNR characterization is summarized in the following proposition.
Proposition 5.
Let D denote the set
D μ 1 , μ 2 : μ 1 , μ 2 ( 0 , 1 ) , 1 μ 1 μ 2 > 0 , ( μ 1 μ 2 ) β 1 μ 1 μ ¯ 2 α ˜ 2 β 2 μ 2 μ ¯ 1 > 0 ,
where, as in Proposition 2, μ ¯ 1 1 μ 1 and μ ¯ 2 1 μ 2 . Then, for ( μ 1 , μ 2 ) D , the low-SNR parameters of the asymptotic sum-rate upper bound (28) read
E b N 0 min ub = ln 2 ,
S 0 ub = 2 1 + ( μ 1 μ 2 ) ( d 1 ) d ( β 1 + α ˜ β 2 ) 2 β 1 μ 1 μ ¯ 2 α ˜ 2 β 2 μ 2 μ ¯ 1 .
Furthermore, the sum-rate upper bound (28) is not useful in the low-SNR regime for ( μ 1 , μ 2 ) D .
Proof. 
See Appendix D. □
Analogously to the characterization of the lower bound in Proposition 4, the low-SNR slope (45) can be optimized by choosing ( μ 1 , μ 2 ) such that the denominator therein is maximized; namely, by setting
( μ 1 , μ 2 ) = ( μ 1 , opt U , μ 2 , opt U ) arg max ( μ 1 , μ 2 ) D ( μ 1 μ 2 ) β 1 μ 1 μ ¯ 2 α ˜ 2 β 2 μ 2 μ ¯ 1 .
Note that, for ( μ 1 , μ 2 ) D , the low-SNR slope S 0 ub is strictly smaller than S 0 CW = 2 (recall that d 2 ); hence, the upper bound (28) is useful in this region of the parameters.
Additional insight can be gained by focusing again on the symmetric setting β 1 = β 2 = β 2 . In such case, we obtain that the optimal choice for ( μ 1 , μ 2 ) simplifies to the following:
( μ 1 , μ 2 ) = arg max ( μ 1 , μ 2 ) D 2 ( μ 1 μ 2 ) ( d 1 ) β d ( 1 + α ˜ ) 2 1 μ 1 μ ¯ 2 α ˜ 2 μ 2 μ ¯ 1 = arg max ( μ 1 , μ 2 ) D ( μ 1 μ 2 ) 1 μ 1 μ ¯ 2 α ˜ 2 μ 2 μ ¯ 1 .
Note that, in fact, for β 1 = β 2 = β 2 , the condition that specifies the set D simplifies to ( μ 1 μ 2 ) 1 μ 1 μ ¯ 2 α ˜ 2 μ 2 μ ¯ 1 > 0 . Then, rewriting the low-SNR slope (45) as
S 0 ub = 2 1 + 2 ( μ 1 μ 2 ) ( d 1 ) β d ( 1 + α ˜ ) 2 1 μ 1 μ ¯ 2 α ˜ 2 μ 2 μ ¯ 1 = 2 β d β d + ( d 1 ) · 2 ( μ 1 μ 2 ) ( 1 + α ˜ ) 2 1 μ 1 μ ¯ 2 α ˜ 2 μ 2 μ ¯ 1 ,
we conclude that the sum-rate upper bound (28) implied by Proposition 2 is tighter in the low-SNR regime than the corresponding simple “symmetric construction“ bound in (14), as long as there exists a pair of constants ( μ 1 , μ 2 ) D such that (cf. (40))
2 ( μ 1 μ 2 ) ( 1 + α ˜ ) 2 1 μ 1 μ ¯ 2 α ˜ 2 μ 2 μ ¯ 1 > 1 .
Note that the existence of such constants is not guaranteed for all choices of the underlying parameters. To see this, let τ μ 2 μ 1 and let us recall that, since 1 μ 1 μ 2 > 0 , the ratio τ must satisfy 0 < τ < 1 μ 1 1 . Then, (49) can be rewritten as
2 ( 1 τ ) ( 1 + α ˜ ) 2 1 1 τ μ 1 α ˜ 2 τ ( 1 μ 1 ) > 1 ,
or, equivalently,
A τ 2 + B τ + C τ ( 1 τ μ 1 ) ( 1 μ 1 ) ( 1 + α ˜ ) 2 > 0 ,
where τ ( 1 τ μ 1 ) ( 1 μ 1 ) ( 1 + α ˜ ) 2 > 0 and
A = ( 1 + α ˜ ) 2 μ 1 2 + ( 3 α ˜ ) ( 1 + α ˜ ) μ 1 2 ,
B = ( 1 + α ˜ ) ( 3 α ˜ 1 ) μ 1 + ( 1 α ˜ ) 2 ,
C = 2 α ˜ 2 .
Now, a careful examination of the constants A , B and C reveals that a necessary condition for (51) to hold is
0 < α ˜ < 3 2 2 0.1716 .
That is, the sum-rate upper bound (28) can be tighter than the corresponding “symmetric construction“ upper bound in (14) only if α ˜ is relatively low. To determine sufficiency, let us consider the polynomial P ( τ ) A τ 2 + B τ + C . Then, it can be verified that, subject to condition (55), the coefficients A , B and C satisfy
A < 0 , B > 0 , C < 0 , μ 1 ( 0 , 1 ) , 0 < α ˜ < 3 2 2 .
Let τ 1 and τ 2 denote the roots of P ( τ ) , namely,
τ 1 = B + B 2 4 A C 2 A , τ 2 = B B 2 4 A C 2 A .
Then (noting that B 2 4 A C > 0 ),
τ 1 < τ 2 , μ 1 ( 0 , 1 ) , 0 < α ˜ < 3 2 2 ,
and it turns out that, in addition to (55), condition (51) can only hold if the following additional conditions are satisfied:
τ 1 < τ < τ 2 , If τ 2 < 1 μ 1 1 , τ 1 < τ < 1 μ 1 1 , If τ 1 < 1 μ 1 1 < τ 2 .

4.2. The High-SNR Regime

As in Section 4.1, we start with the sum-rate lower bound (27) and derive its high-SNR characterization while focusing on the case where at least one of the two user classes is overloaded. For concreteness, we assume henceforth that β 1 > 1 . Our main observations are summarized in the following proposition.
Proposition 6.
Assume that β 1 > 1 . Then, the high-SNR parameters of the asymptotic sum-rate lower bound (27) read
S lb = 1
and
L lb = L , 1 + L , 2 log 2 L , 1 + 1 α ˜ 2 L , 2 log α ˜ χ , β 2 1 L , 1 log χ , 2 d β 2 < 1
where L , i , i = 1 , 2 , denotes the high-SNR power offset of a single-class setting with load β i (corresponding to Theorem 1), which reads ([38], Proposition 5)
L , i = 1 β i 1 log ( 1 β i ) ( d 1 ) log 1 1 d , β i < 1 ( d 1 ) log 1 1 d , β i = 1 ( β i 1 ) log ( β i 1 ) β i log β i ( β i d 1 ) log 1 1 β i d , β i > 1 .
Proof. 
See Appendix E. □
Remark 1.
Analogous results for the case where the load β 2 is constrained to satisfy β 2 > 1 , as well as the case where β 1 = β 2 = 1 , can be straightforwardly derived following similar lines to the proof in Appendix E. The details are omitted for conciseness. Note also that, for the case where both user classes are underloaded (i.e., 2 d β 1 , β 2 < 1 ), the corresponding derivation indicates that the sum-rate lower bound is too loose in the high-SNR regime and fails to capture the correct high-SNR slope.
Remark 2.
As indicated by (60) and (61), in sheer contrast to the low-SNR regime, the high-SNR parameters of the sum-rate lower bound do not depend on the parameter κ for β 1 > 1 .
The high-SNR characterization of the sum-rate upper bound (28) is summarized next.
Proposition 7.
Assume that β 1 , β 2 > 1 . Then, the high-SNR parameters of the asymptotic sum-rate upper bound (28) read
S ub = 1 ,
and
L ub = L , 1 + L , 2 log ( β 1 d 1 ) α ˜ β 1 ( β 1 1 ) + β 2 d 1 β 2 ( β 2 1 ) · χ d ,
where L , i , i = 1 , 2 , are specified in (62).
Proof. 
See Appendix F. □
Remark 3.
Note that, for β 1 , β 2 > 1 , the high-SNR parameters of the sum-rate upper bound turn out to be independent of the choice of μ 1 , μ 2 . Derivations along the lines of Appendix F reveal that, for 2 d β 1 , β 2 < 1 , the sum-rate upper bound follows the correct high-SNR slope only if β 1 + β 2 1 , namely, when the (overall) system operates in the underloaded (or fully loaded) regime, which is of lesser interest in the NOMA framework. Furthermore, the analysis shows that, for all other choices of β 1 and β 2 (expect for β 1 , β 2 > 1 ), the sum-rate upper bound (28) becomes too loose for the high-SNR regime and does not capture the correct high-SNR slope.
To gain more insight, let us consider the symmetric overloaded setting where β 1 = β 2 = β 2 > 1 . In such case, the high-SNR slope equals unity for both the lower and upper sum-rate bounds, namely,
S lb = S ub = 1 .
Turning to the high-SNR power offset, note that, in the symmetric overloaded setting, one obtains (cf. (21))
χ = 2 1 + α ˜ ,
while
L , 1 = L , 2 = β 2 2 log ( β 2 ) β 2 log ( β ) ( β d 2 2 ) log 1 2 β d + 1 .
Hence, we conclude, from (61) and (67), that
L lb = L , 1 1 = β 2 2 log ( β 2 ) β 2 log β ( β d 2 2 ) log 1 2 β d .
Similarly, considering the high-SNR power offset of the sum-rate upper bound (64), we obtain
L ub = 2 L , 1 + log ( β 2 ) log 1 2 β d 2 = ( β 1 ) log ( β 2 ) β log ( β ) ( β d 1 ) log 1 2 β d .
The difference between the offsets (68) and (69) specifies the horizontal gap (in logarithmic scale) between these lower and upper bounds on the achievable sum rate in the high-SNR regime. However, it is also insightful to compare L ub to the corresponding high-SNR power offset induced by the “symmetric construction” outer bound of Proposition 3 (see (14)). This offset is simply given by (62), while substituting β instead of β i , and reads
L , sym ub = ( β 1 ) log ( β 1 ) β log β ( β d 1 ) log 1 1 β d .
Note that
L ub L , sym ub = ( β 1 ) log β 2 β 1 + ( β d 1 ) log β d 1 β d 2 ,
which can be verified to always take on negative values for β > 2 and d 2 (in fact, in such case, L ub is even strictly smaller than L CW (32)). Hence, we conclude that the “symmetric construction” sum-rate upper bound is tighter in the high-SNR regime for symmetric settings, when β 1 = β 2 > 1 . This observation is corroborated by the numerical results presented in Section 5.

5. Numerical Results

In this section, we present some numerical results that demonstrate the effectiveness of the inner and outer bounds derived in Section 3 for assessing the potential performance gains of regular sparse NOMA. The focus here is on overloaded settings ( β 1 , β 2 > 1 ), corresponding to use cases where NOMA is of particular interest, while noting that the bounds also generally apply to underloaded regimes. The sparsity parameter d of the signature matrices was set throughout to d = 2 , since, as shown in [38,39], it induces the highest achievable individual (per class) throughputs for regular sparse NOMA. Our numerical investigation complements the analytical observations of Section 4, by considering more general SNR regimes.
Figure 1 depicts the inner and outer bounds on the achievable region (8) in the large-system limit, for the case where β 1 = 1.5 and β 2 = 2 (cf. (10) and (12)). The corresponding noise-split parameters were set to κ = 0.9 , μ 1 = 0.05 and μ 2 = 0.9 (these values were numerically verified to be close to optimal). The SNRs of the two user classes were fixed to snr 1 = 15   dB and snr 2 = 5   dB . The cautious reader should note that this choice for the noise split parameters ( μ 1 , μ 2 ) is, by no means, a contradiction to the condition specified in Proposition 5 for the usefulness of the outer bound (see (43)). This is since Proposition 5 only applies to the low-SNR regime, while, in Figure 1, the two SNRs do not yield a low average SNR setting. In fact, it can be numerically verified that choosing ( μ 1 , μ 2 ) = ( 0.05 , 0.9 ) in the low-SNR regime, which falls outside the region D in (43), leads to a very loose upper bound on the achievable sum rate, significantly higher than the corresponding Cover–Wyner sum-rate upper bound in (13). Hence, this choice is not useful in the low-SNR regime as predicted by Proposition 5 (see also the discussion in Section 4.1). The boundary of the inner bound is represented Figure 1 by the dashed black line, while the boundary of the outer bound is designated by the dash–dotted black line. Note that the two bounds differ only in the sum-rate constraint, while sharing the class–individual rate constraints (which are characterized in full via Theorem 1, as discussed in Section 3.1). To assess the tightness of the bounds, Figure 1 also shows an estimation of the boundary of the achievable region (8) for a regular sparse NOMA system with a large but finite number of orthogonal dimensions N = 30 . Here, all rate constraints of the corresponding region were evaluated based on Monte Carlo (MC) simulations of 1000 sparse matrix realizations using Gallager’s construction for parity-check matrices of LDPC codes [38,39,53] (let us recall that the main motivation for the derivation of the inner and outer bounds on the achievable region is the fact that an exact analytical asymptotic result for the sum-rate constraint of this region is still lacking; hence, we resorted to MC simulations). The boundary of this region is represented by the solid blue line. Note that both inner and outer bounds are rather tight and provide a very good assessment of the achievable region (specifically, the limiting upper bound on the sum-rate constraint is higher than the simulated constraint by about only 3 % , while the corresponding lower bound is lower by less than 2 % ). Figure 1 also indicates that the asymptotic class–individual rate constraints provide an extremely tight assessment of the corresponding throughputs in large finite-dimensional systems, as already shown in [38,39]. We further note that extensive numerical investigations indicate that the EPI-based bounds become tighter as the powers allocated to each class of users become more unbalanced, which stems from the nature of the EPIs. This observation is further demonstrated in the sequel.
For the sake of comparison, Figure 1 also includes the achievable regions of two other system settings of interest. The first region corresponds to dense code-domain NOMA, represented here by RS-CDMA. The corresponding boundary of the achievable region in the large-system limit is designated by the solid green line (see (A119) in Appendix G). The second region corresponds to a setting where the signatures of individual users are taken as the columns of a single regular sparse matrix, where each user occupies d = 2 resources and each resource is utilized by exactly β d = ( β 1 + β 2 ) d users. No regularity is imposed within either of the two classes of users and the signature columns are allocated to the users in each class uniformly at random. The induced signature matrices A 1 and A 2 for each class of users (after reordering of the columns) are therefore no longer row-regular. The boundary of the corresponding achievable region, based on MC simulations (while fixing N = 30 ), is designated by the solid purple line (referred to as ‘Single A ’). Finally, Figure 1 also shows the Cover–Wyner region (13). The boundary of this region is designated by the solid red line.
A comparison of all achievable regions in Figure 1 lets us conclude the following (with the aid of additional investigations omitted for conciseness): Irregularity induces a loss in the achievable rate region. This is clearly observed when comparing the achievable region with a single regular sparse signature matrix construction (‘Single A ’) and the MC-based achievable region with two separate regular constructions of the signature matrices for the two classes of users. The superiority of separate constructions is also observed for the class–individual rate constraints when considering the inner bound (10). Comparing the regular sparse construction in (1) and dense code-domain NOMA (here, RS-CDMA), the MC simulation results indicate that the corresponding achievable region strictly includes the achievable region with dense code-domain NOMA, in full agreement with the analytical observations made in [38,39] with respect to single-class systems. Furthermore, when the class-powers are far enough apart, this even holds for the inner bound (10), as shown in Figure 1, implying that regular sparse NOMA indeed strictly outperformed dense code-domain NOMA (RS-CDMA) in this setting. Finally, considering the outer bound on the achievable region (12), Figure 1 shows that, for power-unbalanced settings, it provides a good assessment of the gap to the ultimate performance limits, as designated by the Cover–Wyner capacity region.
The impact of the SNR balance between the two classes of users is illustrated in Figure 2. A load-symmetric setting is considered where β 1 = β 2 = 2 and the received SNR of Class 1 users was set to snr 1 = 10   dB . The received SNR of Class 2 users was set to snr 2 = α ˜ snr 1 , where α ˜ ( 0 , 1 ) . The figure depicts the sum-rate constraint of the rate region for the settings and bounds considered in Figure 1 as a function of α ˜ . The lower and upper bounds, according to (10) and (12), were numerically optimized, respectively, by fine-tuning the values of κ , μ 1 and μ 2 . In view of the load-symmetry in this example, the “symmetric construction” upper bound in (14) is also included in the figure (designated by the dotted line). Similar conclusions to the ones discussed with respect to Figure 1 can be reached. The tightness of all three bounds is clearly demonstrated in the low α ˜ region. In particular, note that a threshold value for α ˜ is observed, below which the sum-rate lower bound in (10) already surpasses the dense code-domain NOMA achievable sum rate (thus guaranteeing the superiority of regular sparse NOMA). The results also indicate that the sum-rate upper bound in (12) is meaningful and resides below the Cover–Wyner sum capacity, when α ˜ lies below a threshold (while, otherwise, it becomes too loose and ceases to be useful). Note that, in this load-symmetric setting, the simple “symmetric construction” upper bound in (14) turns out to be the tightest for most values of α ˜ . In fact, by Jensen’s inequality, it also provides here a tight upper bound for the ‘Single A ’ construction. However, neither of the two upper bounds (in (12) or (14)) is universally superior. Although Figure 2 does not represent an extreme-SNR regime per se, the main observations qualitatively corroborate the conclusions of the analytical examination in Section 4.
Finally, the preceding observations are further corroborated in Figure 3, where a setting with β 1 = 1.5 , β 2 = 2 and snr 2 = 0.1 × snr 1 is considered (similarly to Figure 1). Here, the sum-rate constraints depicted in Figure 2 (excluding the “symmetric construction” upper bound (14)) are plotted as a function of the system average E b N 0 (see (19) and (23)). The tightness of the derived bounds over a wide range of E b N 0 values is clearly demonstrated, as well as the superior performance of regular sparse NOMA compared to dense code-domain NOMA (which yields lower sum rates for all E b N 0 values). Again, the results are in full agreement with the conclusions of Section 4 regarding extreme-SNR regimes.

6. Conclusions

We investigate, in this paper, the achievable rate region in the large-system limit of regular sparse NOMA with two user classes. The analytical challenges induced by the underlying random matrix model were circumvented by deriving closed-form inner and outer bounds on the achievable region. These bounds provide a valuable assessment of the potential performance gains of regular sparse NOMA in use cases of interest beyond the equal-power setting previously considered in [38,39]. The superiority of regular sparse NOMA compared with highly complex dense alternatives is demonstrated. The analytical characterization of the bounds in extreme-SNR regimes further elucidates their usefulness, while exhibiting the benefits of their closed-form expressions.
It is important to recall, at this point, that regular sparse NOMA requires fully coordinated signatures (to retain the regular structure of the signature matrices); therefore, it might be inapplicable to massive connectivity use cases with sporadic user activity, where such coordination cannot be practically accomplished. Hence, to complement the current analysis, a similar setting with two mixed classes of users, where one class employs regular sparse NOMA and the second class employs random dense NOMA, was recently considered in [54]. For this representation of a mixture of fully coordinated and lightly coordinated users, the achievable region was completely and rigorously characterized using fundamental tools from free probability theory [30,55]. Potential extensions of both lines of work to account for multiple user classes and multicell networks, as well as the impact of fading and additional channel impairments, are the subject of current and future planned investigations.

Author Contributions

Conceptualization, B.M.Z., O.S. and S.S.; methodology, B.M.Z., O.S. and S.S.; software, B.M.Z. and O.S.; validation, B.M.Z. and O.S.; formal analysis, B.M.Z., O.S. and S.S.; investigation, B.M.Z., O.S. and S.S.; writing—original draft preparation, B.M.Z.; writing—review and editing, B.M.Z., O.S. and S.S.; visualization, B.M.Z. and O.S.; supervision, B.M.Z., O.S. and S.S.; project administration, B.M.Z. and S.S.; funding acquisition, B.M.Z. and S.S. All authors have read and agreed to the published version of the manuscript.

Funding

The work of B. M. Zaidel and S. Shamai (Shitz) was supported by the ISRAEL SCIENCE FOUNDATION (grant No. 1897/19).

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AWGNAdditive white Gaussian noise
BGWTBipartite Galton–Watson tree
CDMACode-division multiple access
EPIEntropy power inequality
GWTGalton–Watson tree
i.i.d.Independent identically distributed
LDCDLow-density code-domain
LDPCLow-density parity-check
MACMultiple access channel
MCMonte Carlo
MPAMessage-passing algorithm
MUDMultiuser detection
NOMANon-orthogonal multiple access
RHSRight-hand side
RSRandomly spread
SICSuccessive interference cancellation
SNRSignal-to-noise ratio

Appendix A. Proof of Proposition 1

By the fundamental properties of mutual information, the sum-rate constraint in (8) can be decomposed as
1 N I ( x 1 , x 2 ; y | A i i = 1 , 2 ) = 1 N h ( y | A i i = 1 , 2 ) 1 N h ( y | x 1 , x 2 , A i i = 1 , 2 ) = 1 N h ( y | A i i = 1 , 2 ) 1 N h ( z ) = 1 N h ( y | A i i = 1 , 2 ) log ( π e ) .
Now, let us fix κ ( 0 , 1 ) and let κ 1 = κ , κ 2 = κ ¯ = 1 κ . Then, the channel output y (cf. (1)) is statistically equivalent to
y ˜ = snr 1 d A 1 x 1 + z ˜ 1 + snr 2 d A 2 x 2 + z ˜ 2 = w 1 + w 2 ,
where z ˜ 1 C N ( 0 , κ 1 I N ) , z ˜ 2 C N ( 0 , κ 2 I N ) and z ˜ 1 and z ˜ 2 are independent. The vectors
w i snr i d A i x i + z ˜ i , i = 1 , 2 ,
are thus statistically independent conditional on the signature matrices A i i = 1 , 2 and have a corresponding multivariate complex Gaussian density. Hence, since
1 N h ( y | A i i = 1 , 2 ) = 1 N h ( y ˜ | A i i = 1 , 2 ) ,
it follows, by the conditional EPI [43] and (A2), that
2 1 N h ( y | A i i = 1 , 2 ) = 2 1 N h ( y ˜ | A i i = 1 , 2 ) 2 1 N h ( w 1 | A i i = 1 , 2 ) + 2 1 N h ( w 2 | A i i = 1 , 2 ) 2 h N ib .
Considering the exponential terms on the right-hand side (RHS) of the inequality in (A5), we have
1 N h ( w i | A i i = 1 , 2 ) = 1 N E log ( π e ) N det κ i I N + snr i d A i A i = log ( π e ) + log κ i + 1 N E log det I N + snr i / κ i d A i A i N ( a ) log ( π e ) + log κ i + C i ( snr i κ i ) , i = 1 , 2 ,
where ( a ) follows from Theorem 1 (note that the introduction of the parameter κ in the open interval ( 0 , 1 ) , as part of the noise-split step (A2), is necessary for the applicability of Theorem 1). Then, considering the large-system limit and substituting (A6) back into (A5), while relying on the continuity of the exponential and logarithmic functions, we obtain the following lower bound:
1 N h ( y | A i i = 1 , 2 ) h N ib N log ( π e ) + log κ 1 2 C 1 ( snr 1 κ 1 ) + κ 2 2 C 2 ( snr 2 κ 2 ) .
Further denoting
R N , sum ib h N ib log ( π e ) ,
we thus finally conclude that the normalized mutual information (A1) can be lower-bounded as
1 N I ( x 1 , x 2 ; y | A i i = 1 , 2 ) R N , sum ib N log κ 1 2 C 1 ( snr 1 κ 1 ) + κ 2 2 C 2 ( snr 2 κ 2 ) ,
which, when combined with (9), yields (10). This completes the proof of the proposition.

Appendix B. Proof of Proposition 2

Analogously to the proof of Proposition 1 in Appendix A, we aim to upper-bound the sum-rate constraint in (8). Towards this end, we employ a strengthened version of the EPI, recently derived in [45] (see also [44]), which is adapted here to the complex setting.
Theorem A1
([45], Corollary 2). Suppose that x and w are random vectors in C N , conditionally independent given Q; moreover, suppose that w is conditionally Gaussian given Q. Define y = x + w . For any v satisfying x y v | Q ,
2 1 N ( h ( y | Q ) I ( x ; v | Q ) ) 2 1 N ( h ( x | Q ) I ( y ; v | Q ) ) + 2 1 N h ( w | Q ) .
Theorem A1 immediately implies the following conditional EPI for three random summands (one of which is Gaussian).
Corollary A1
([45], Theorem 3). Let x , y and w be three random vectors in C N , conditionally independent given Q, with finite second moments. Moreover, conditional on Q, let w be distributed as C N ( 0 , Σ ) . Then,
2 1 N ( h ( x + w | Q ) + h ( y + w | Q ) ) 2 1 N ( h ( x | Q ) + h ( y | Q ) ) + 2 1 N ( h ( x + y + w | Q ) + h ( w | Q ) ) .
Proof. 
The Corollary follows from Theorem A1 by letting v = x + y + w and rearranging the exponents [45]. □
Now, let us fix μ 1 , μ 2 ( 0 , 1 ) , such that
μ 3 1 μ 1 μ 2 > 0 ,
and let us consider the following three independent random vectors:
x ˇ snr 1 d A 1 x 1 + z ˇ 1 ,
y ˇ snr 2 d A 2 x 2 + z ˇ 2 ,
w ˇ z ˇ 3 ,
where z ˇ j C N ( 0 , μ j I N ) , j = 1 , 2 , 3 , are independent complex Gaussian vectors, independent also of x 1 , x 2 and A i i = 1 , 2 . Note that x ˇ , y ˇ and w ˇ are independent conditional on the signature matrices A i i = 1 , 2 as well. Then, observing that
y = d x ˇ + y ˇ + w ˇ
hence,
2 1 N h ( y | A i i = 1 , 2 ) = 2 1 N h ( x ˇ + y ˇ + w ˇ | A i i = 1 , 2 ) ,
Theorem A1 and Corollary A1 can be applied to yield the upper bound
2 1 N h ( y | A i i = 1 , 2 ) 2 h N ub 2 1 N h ( w ˇ ) ( 2 1 N h ( x ˇ + w ˇ | A i i = 1 , 2 ) + 1 N h ( y ˇ + w ˇ | A i i = 1 , 2 ) 2 h N ub 2 1 N h ( w ˇ ) ( 2 1 N h ( x ˇ + w ˇ | A i i = 1 , 2 ) 2 1 N h ( x ˇ | A i i = 1 , 2 ) + 1 N h ( y ˇ | A i i = 1 , 2 ) ) ,
where A i i = 1 , 2 take the role of Q and all differential entropies are neither nor −∞ by construction.
Starting with the Gaussian vector w ˇ , its normalized differential entropy reads
1 N h ( w ˇ ) = log ( π e ) + log μ 3 .
Next, considering each exponential term inside the parentheses in the RHS of (A18), we obtain, for the first term,
1 N h ( x ˇ + w ˇ | A i i = 1 , 2 ) = 1 N E log ( π e ) N det ( μ 1 + μ 3 ) I N + snr 1 d A 1 A 1 h ( x ˇ + w ˇ ) = ( a ) 1 N E log ( π e ) N det μ ¯ 2 I N + snr 1 d A 1 A 1 h ( x ˇ + w ˇ ) = log ( π e ) + log μ ¯ 2 + 1 N E log det I N + snr 1 / μ ¯ 2 d A 1 A 1 h ( x ˇ + w ˇ ) N ( b ) log ( π e ) + log μ ¯ 2 + C 1 opt ( snr 1 μ ¯ 2 ) ,
where ( a ) is due to (A12) and ( b ) follows from Theorem 1. Treating the remaining terms in an analogous manner, we obtain
1 N h ( y ˇ + w ˇ | A i ) N log ( π e ) + log μ ¯ 1 + C 2 ( snr 2 μ ¯ 1 ) ,
1 N h ( x ˇ | A i ) N log ( π e ) + log μ 1 + C 1 ( snr 1 μ 1 ) ,
1 N h ( y ˇ | A i ) N log ( π e ) + log μ 2 + C 2 ( snr 2 μ 2 ) .
Then, substituting (A19)–(A23) back into (A18), it follows, by continuity (with the aid of some algebra), that
1 N h ( y | { A i } i = 1 , 2 ) h N ub N log ( π e ) log μ 3 + log μ ¯ 1 μ ¯ 2 2 C 1 ( snr 1 μ ¯ 2 ) + C 2 ( snr 2 μ ¯ 1 ) μ 1 μ 2 2 C 1 ( snr 1 μ 1 ) + C 2 ( snr 2 μ 2 ) .
Finally, denoting
R N , sum ub h N ub log ( π e ) ,
we conclude that
1 N I ( x 1 , x 2 ; y | A i i = 1 , 2 ) R N , sum ub N log μ ¯ 1 μ ¯ 2 2 C 1 ( snr 1 μ ¯ 2 ) + C 2 ( snr 2 μ ¯ 1 ) μ 1 μ 2 2 C 1 ( snr 1 μ 1 ) + C 2 ( snr 2 μ 2 ) log μ 3 ,
which, together with (9), yields (12). This completes the proof of Proposition 2.

Appendix C. Proof of Proposition 4

Let C sum lb ( snr av ) denote the lower bound on the achievable sum rate (27), when expressed in nats/channel use per dimension as a function of snr av . Then,
C sum lb ( snr av ) = ln κ 1 e C 1 ( χ snr av κ 1 ) + κ 2 e C 2 ( α ˜ χ snr av κ 2 ) ,
where we use C i · to denote the function C i · converted to nats/channel use, i = 1 , 2 (cf. (5)). The minimum E b N 0 that enables reliable communications and the low-SNR slope of the sum-rate lower bound then read (cf. (24)–(25))
E b N 0 min lb = β ln 2 C ˙ sum lb ( 0 ) , S 0 lb = 2 C ˙ sum lb ( 0 ) 2 C ¨ sum lb ( 0 ) .
Starting with the first derivative of (A27), we obtain
C ˙ sum lb ( snr av ) = κ 1 e C 1 ( χ snr av κ 1 ) d d snr av C 1 ( χ snr av κ 1 ) + κ 2 e C 2 ( α ˜ χ snr av κ 2 ) d d snr av C 2 ( α ˜ χ snr av κ 2 ) κ 1 e C 1 ( χ snr av κ 1 ) + κ 2 e C 2 ( α ˜ χ snr av κ 2 ) ,
which, using the fact that C i 0 = 0 and recalling that κ 1 + κ 2 = 1 , yields
C ˙ sum lb ( 0 ) = χ C ˙ 1 0 + α ˜ C ˙ 2 0 .
Now, as shown in [38,39] (see the proof of Theorem 3 therein), the asymptotic normalized spectral efficiency C i snr i , i = 1 , 2 (cf. (5) and (9)), coincides with the Shannon transform of the asymptotic empirical eigenvalue distribution of 1 d A i A i , whose density reads ([38], Theorem 2) (see also [39])
ρ ( λ , β i , d ) = [ 1 β i ] + δ ( λ ) + β i d 2 π [ λ λ i ] + [ λ i + λ ] + λ ( β i d λ ) ,
where λ i ± = ( α ± γ i ) 2 , i = 1 , 2 , δ ( λ ) is a unit point mass at λ = 0 and [ z ] + max { 0 , z } . Let F be a probability distribution defined on R + . The Shannon transform V F of F is defined for x R + as V ( x ) R + log ( 1 + x λ ) d F ( λ ) [30], Definition 3.2 (see also [29], Definition 2.12). Hence, the derivative at zero C ˙ i 0 , i = 1 , 2 , reads
C ˙ i ( 0 ) = d d snr av β i d 2 π λ i λ i + ln ( 1 + snr av λ ) ( λ λ i ) ( λ i + λ ) λ ( β i d λ ) d λ | snr av = 0 = β i .
Thus, we conclude, from (A30) and (21), that
C ˙ sum lb ( 0 ) = χ ( β 1 + α ˜ β 2 ) = β .
Turning to the second derivative, we have
C ¨ sum lb ( snr av ) = d d snr av κ 1 e C 1 ( χ snr av κ 1 ) d d snr av C 1 ( χ snr av κ 1 ) κ 1 e C 1 ( χ snr av κ 1 ) + κ 2 e C 2 ( α ˜ χ snr av κ 2 ) = + d d snr av κ 2 e C 2 ( α ˜ χ snr av κ 2 ) d d snr av C 2 ( α ˜ χ snr av κ 2 ) κ 1 e C 1 ( χ snr av κ 1 ) + κ 2 e C 2 ( α ˜ χ snr av κ 2 ) = κ 1 e C 1 ( χ snr av κ 1 ) d d snr av C 1 ( χ snr av κ 1 ) + κ 2 e C 2 ( α ˜ χ snr av κ 2 ) d d snr av C 2 ( α ˜ χ snr av κ 2 ) 2 κ 1 e C 1 ( χ snr av κ 1 ) + κ 2 e C 2 ( α ˜ χ snr av κ 2 ) 2 .
Since the denominators of all three terms in (A34) approach unity as snr av 0 , we focus on the numerators. Starting with the first term, note that
d d snr av κ 1 e C 1 ( χ snr av κ 1 ) d d snr av C 1 ( χ snr av κ 1 ) snr av 0 κ 1 χ κ 1 C ˙ 1 0 2 + κ 1 χ κ 1 2 C ¨ 1 0 = χ 2 κ 1 C ˙ 1 0 2 + C ¨ 1 0 .
Next, similarly to (A32), we obtain, for i = 1 , 2 ,
C ¨ i ( 0 ) = d 2 d snr av 2 β i d 2 π λ i λ i + ln ( 1 + snr av λ ) ( λ λ i ) ( λ i + λ ) λ ( β i d λ ) d λ | snr av = 0 = β i ( d ( 1 + β i ) 1 ) d ,
yielding
d d snr av κ 1 e C 1 ( χ snr av κ 1 ) d d snr av C 1 ( χ snr av κ 1 ) snr av 0 χ 2 κ 1 · β 1 ( d 1 ) d .
In a completely analogous manner, the numerator of the second term in (A34) takes the following form as snr av 0 :
d d snr av κ 2 e C 2 ( α χ snr av κ 2 ) d d snr av C 2 ( α χ snr av κ 2 ) snr av 0 α ˜ 2 χ 2 κ 2 · β 2 ( d 1 ) d .
Substituting (A37) and (A38) back into (A34), while taking the limit snr av 0 , we finally obtain with the aid of (A33) and (21),
C ¨ sum lb ( 0 ) = χ 2 κ 1 · β 1 ( d 1 ) d α ˜ 2 χ 2 κ 2 · β 2 ( d 1 ) d β 2 = β 2 1 + d 1 d ( β 1 + α ˜ β 2 ) 2 · β 1 κ 1 + α ˜ 2 β 2 κ 2 .
The proof of Proposition 4 is then completed by substituting (A33) and (A39) back into (A28).

Appendix D. Proof of Proposition 5

Following similar steps to the proof in Appendix C, while retaining the notation therein, let C sum ub ( snr av ) denote the sum-rate upper bound (28) in nats/channel use per dimension. Then,
C sum ub ( snr av ) = ln μ ¯ 1 μ ¯ 2 e C 1 ( χ snr av μ ¯ 2 ) + C 2 ( α ˜ χ snr av μ ¯ 1 ) μ 1 μ 2 e C 1 ( χ snr av μ 1 ) + C 2 ( α ˜ χ snr av μ 2 ) ln μ ¯ 12 .
It is important to note, at this point, that, in contrast to the sum-rate lower bound (27), the sum-rate upper bound (A40) may exhibit a bowl-shaped form when plotted as a function of E b N 0 in dB (see, e.g., the discussion in ([56], p. 1341)). This behavior depends on the system load parameters and the particular choice of the constants μ 1 and μ 2 . That said, insights on the low-SNR characteristics of this upper bound can still be obtained by deriving its low-SNR parameters. One should only bear in mind that the value of E b N 0 corresponding to snr av 0 does not necessarily represent the minimum E b N 0 above which the upper bound is positive. In fact, the latter may be attained at a lower E b N 0 , as discussed in [56]. In such case, the low-SNR slope turns out to be negative, as shall be made clear in the sequel.
The low-SNR parameters of C sum ub ( snr av ) are given by
E b N 0 0 ub = β ln 2 C ˙ sum ub ( 0 ) ,
S 0 ub = 2 C ˙ sum ub ( 0 ) 2 C ¨ sum ub ( 0 ) ,
with the subscript · 0 in (A41) designating E b N 0 that corresponds to snr av 0 . Hence, we proceed by taking the first derivative of C sum ub ( snr av ) ,
C ˙ sum ub ( snr av ) = μ ¯ 1 μ ¯ 2 e C 1 ( χ snr av μ ¯ 2 ) + C 2 ( α ˜ χ snr av μ ¯ 1 ) d d snr av C 1 ( χ snr av μ ¯ 2 ) + d d snr av C 2 ( α ˜ χ snr av μ ¯ 1 ) μ ¯ 1 μ ¯ 2 e C 1 ( χ snr av μ ¯ 2 ) + C 2 ( α ˜ χ snr av μ ¯ 1 ) μ 1 μ 2 e C 1 ( χ snr av μ 1 ) + C 2 ( α ˜ χ snr av μ 2 ) = μ 1 μ 2 e C 1 ( χ snr av μ 1 ) + C 2 ( α ˜ χ snr av μ 2 ) d d snr av C 1 ( χ snr av μ 1 ) + d d snr av C 2 ( α ˜ χ snr av μ 2 ) μ ¯ 1 μ ¯ 2 e C 1 ( χ snr av μ ¯ 2 ) + C 2 ( α ˜ χ snr av μ ¯ 1 ) μ 1 μ 2 e C 1 ( χ snr av μ 1 ) + C 2 ( α ˜ χ snr av μ 2 ) ,
which, letting snr av 0 and using (A32), yields
C ˙ sum ub ( 0 ) = μ ¯ 1 μ ¯ 2 χ μ ¯ 2 C ˙ 1 ( 0 ) + α ˜ χ μ ¯ 1 C ˙ 2 ( 0 ) μ 1 μ 2 χ μ 1 C ˙ 1 ( 0 ) + α ˜ χ μ 2 C ˙ 2 ( 0 ) μ ¯ 1 μ ¯ 2 μ 1 μ 2 = χ ( β 1 + α ˜ β 2 ) = β .
Therefore, it is concluded, from (A41), that, as snr av 0 (implying C sum ub ( snr av ) 0 ), the corresponding E b N 0 approaches
E b N 0 0 ub = ln 2 ,
which, as said, does not necessarily correspond to the minimum E b N 0 above which the sum-rate upper bound is positive.
To derive the slope of the sum-rate upper bound at snr av 0 , we take the second derivative of C sum ub ( snr av ) . From (A43), we obtain
C ¨ sum ub ( snr av ) = C ¨ sum ub d d snr av μ ¯ 1 μ ¯ 2 e C 1 ( χ snr av μ ¯ 2 ) + C 2 ( α ˜ χ snr av μ ¯ 1 ) d d snr av C 1 ( χ snr av μ ¯ 2 ) + d d snr av C 2 ( α ˜ χ snr av μ ¯ 1 ) μ ¯ 1 μ ¯ 2 e C 1 ( χ snr av μ ¯ 2 ) + C 2 ( α ˜ χ snr av μ ¯ 1 ) μ 1 μ 2 e C 1 ( χ snr av μ 1 ) + C 2 ( α ˜ χ snr av μ 2 ) C ¨ sum ub d d snr av μ 1 μ 2 e C 1 ( χ snr av μ 1 ) + C 2 ( α ˜ χ snr av μ 2 ) d d snr av C 1 ( χ snr av μ 1 ) + d d snr av C 2 ( α ˜ χ snr av μ 2 ) μ ¯ 1 μ ¯ 2 e C 1 ( χ snr av μ ¯ 2 ) + C 2 ( α ˜ χ snr av μ ¯ 1 ) μ 1 μ 2 e C 1 ( χ snr av μ 1 ) + C 2 ( α ˜ χ snr av μ 2 ) C ¨ sum ub μ ¯ 1 μ ¯ 2 e C 1 ( χ snr av μ ¯ 2 ) + C 2 ( α ˜ χ snr av μ ¯ 1 ) d d snr av C 1 ( χ snr av μ ¯ 2 ) + d d snr av C 2 ( α ˜ χ snr av μ ¯ 1 ) C ¨ sum ub μ 1 μ 2 e C 1 ( χ snr av μ 1 ) + C 2 ( α ˜ χ snr av μ 2 ) d d snr av C 1 ( χ snr av μ 1 ) + d d snr av C 2 ( α ˜ χ snr av μ 2 ) 2 C ¨ sum ub · μ ¯ 1 μ ¯ 2 e C 1 ( χ snr av μ ¯ 2 ) + C 2 ( α ˜ χ snr av μ ¯ 1 ) μ 1 μ 2 e C 1 ( χ snr av μ 1 ) + C 2 ( α ˜ χ snr av μ 2 ) 2 .
In view of (A44), the last term in (A46) converges to β 2 as snr av 0 , while the denominators of the first two terms converge to μ ¯ 12 . Therefore, it is left to calculate the limit of the respective numerators at snr av 0 . Starting with the first term in (A46), we have
d d snr av μ ¯ 1 μ ¯ 2 e C 1 ( χ snr av μ ¯ 2 ) + C 2 ( α ˜ χ snr av μ ¯ 1 ) d d snr av C 1 ( χ snr av μ ¯ 2 ) + d d snr av C 2 ( α ˜ χ snr av μ ¯ 1 ) d d snr av = snr av 0 A ub ,
where
A ub = μ ¯ 1 χ 2 μ ¯ 2 ( C ˙ 1 ( 0 ) ) 2 + C ¨ 1 ( 0 ) + μ ¯ 2 α ˜ 2 χ 2 μ ¯ 1 ( C ˙ 2 ( 0 ) ) 2 + C ¨ 2 ( 0 ) + 2 α ˜ χ 2 C ˙ 1 ( 0 ) C ˙ 2 ( 0 ) .
Relying on (A32) and (A36), we then finally obtain (following some algebra)
A ub = μ ¯ 1 χ 2 μ ¯ 2 β 1 ( d 1 ) d μ ¯ 2 α ˜ 2 χ 2 μ ¯ 1 β 2 ( d 1 ) d + 2 α ˜ χ 2 β 1 β 2 .
Similarly, the numerator of the second term in (A46) reads
d d snr av μ 1 μ 2 e C 1 ( χ snr av μ 1 ) + C 2 ( α ˜ χ snr av μ 2 ) d d snr av C 1 ( χ snr av μ 1 ) + d d snr av C 2 ( α ˜ χ snr av μ 2 ) d d snr av = snr av 0 B ub ,
where
B ub = μ 2 χ 2 μ 1 ( C ˙ 1 ( 0 ) ) 2 + C ¨ 1 ( 0 ) + μ 1 α ˜ 2 χ 2 μ 2 ( C ˙ 2 ( 0 ) ) 2 + C ¨ 2 ( 0 ) + 2 α ˜ χ 2 C ˙ 1 ( 0 ) C ˙ 2 ( 0 ) .
Similarly to (A49), this yields
B ub = μ 2 χ 2 μ 1 β 1 ( d 1 ) d μ 1 α ˜ 2 χ 2 μ 2 β 2 ( d 1 ) d + 2 α ˜ χ 2 β 1 β 2 .
Finally, substituting (A49) and (A52) into (A46) while taking snr av 0 , we obtain
C ¨ sum ub ( 0 ) = A ub B ub μ ¯ 12 β 2 = β 2 1 + ( μ 1 μ 2 ) ( d 1 ) d ( β 1 + α ˜ β 2 ) 2 β 1 μ 1 μ ¯ 2 α ˜ 2 β 2 μ 2 μ ¯ 1 .
Hence, we conclude, from (A42), that the low-SNR slope is given by
S 0 ub = 2 1 + ( μ 1 μ 2 ) ( d 1 ) d ( β 1 + α ˜ β 2 ) 2 β 1 μ 1 μ ¯ 2 α ˜ 2 β 2 μ 2 μ ¯ 1 .
Note that setting μ 1 = μ 2 yields S 0 ub = 2 , which is the low-SNR slope of the single-user AWGN channel, as well as the Cover–Wyner sum capacity. Furthermore, let D denote the set
D μ 1 , μ 2 : μ 1 , μ 2 ( 0 , 1 ) , 1 μ 1 μ 2 > 0 , ( μ 1 μ 2 ) β 1 μ 1 μ ¯ 2 α ˜ 2 β 2 μ 2 μ ¯ 1 > 0 .
Then, recalling that d 2 (see Section 2), the low-SNR slope (A54) is positive and lower than 2 as long as ( μ 1 , μ 2 ) D . Hence, for the sum-rate upper bound (28) to be useful, the parameters μ 1 , μ 2 should be restricted in the low-SNR regime only to the set D . The fact that the low-SNR slope is positive over D immediately implies that (A45) is indeed the minimum E b N 0 over which the upper bound is positive in this setting. This completes the proof of Proposition 5. We further note that, for ( μ 1 μ 2 ) D , the low-SNR slope may turn out negative and it may exhibit discontinuity if μ 1 and μ 2 are chosen so that
1 + ( μ 1 μ 2 ) ( d 1 ) d ( β 1 + α ˜ β 2 ) 2 β 1 μ 1 μ ¯ 2 α ˜ 2 β 2 μ 2 μ ¯ 1 = 0 .
The bound is obviously not useful in this regime.

Appendix E. Proof of Proposition 6

Let R ( snr av ) denote an achievable rate in bit/sec/Hz expressed as a function of snr av . Let us recall that the high-SNR approximation of R ( snr av ) reads
R ( snr av ) S log snr av L , snr av 1 ,
where S denotes the high-SNR slope and L denotes the high-SNR power offset. Then, for any constant a > 0 , R ( a · snr av ) can be characterized for snr av 1 as
R ( a · snr av ) S log ( a · snr av ) L = S log snr av ( L log a ) .
Hence, any scaling of snr av by a factor a > 0 corresponds to a shift in the high-SNR power offset by ( log a ) .
Rewriting the lower bound on the achievable sum rate (27), we obtain
C sum lb ( snr av ) = C 2 ( α ˜ χ snr av κ ¯ ) + log 1 + κ 2 C 1 ( χ snr av κ ) C 2 ( α ˜ χ snr av κ ¯ ) 1 ,
where we use the identities κ 1 = κ and κ 2 = κ ¯ = 1 κ . Let S , i and L , i , i = 1 , 2 , denote the high-SNR parameters characterizing C i ( · ) as in ([38], Proposition 5; see also [39], Proposition 4). Specifically, for i = 1 , 2 ,
S , i = min ( β i , 1 ) ,
and L , i is given in (62). Then, the term outside the logarithm in (A59) can be approximated for snr av as
C 2 ( α ˜ χ snr av κ ¯ ) = S , 2 log snr av L , 2 log α ˜ χ κ ¯ + o ( 1 ) .
Therefore, it is left to examine the different term in the exponent inside the logarithm in (A59), which we denote as
Δ ( snr av ) C 1 χ snr av κ C 2 ( α ˜ χ snr av κ ¯ ) .
Note that, accordingly, the sum-rate lower-bound (A59) can be compactly rewritten as
C sum lb ( snr av ) = C 2 ( α ˜ χ snr av κ ¯ ) + log 1 + κ 2 Δ ( snr av ) 1 .
We thus proceed with the analysis of (A63), while distinguishing among three possible cases and relying on the observations made in Appendix H.

Appendix E.1. Case I: β 1,β 2 >1

Using (A133), we obtain, for snr av ,
C 1 ( χ snr av κ ) = log snr av + log χ κ L , 1 + κ ( β 1 d 1 ) log e β 1 d ( β 1 1 ) χ 1 snr av + o ( 1 snr av ) ,
where L , 1 should be interpreted here as the corresponding expression in (62) for β 1 > 1 . Similarly, we obtain
C 2 ( α ˜ χ snr av κ ¯ ) = log snr av + log α ˜ χ κ ¯ L , 2 + κ ¯ ( β 2 d 1 ) log e β 2 d ( β 2 1 ) α ˜ χ 1 snr av + o ( 1 snr av ) .
The substitution back into (A62) then yields
Δ ( snr av ) = log κ ¯ α ˜ κ + L , 2 L , 1 + C 1 log e · 1 snr av + o ( 1 snr av ) ,
where
C 1 κ ( β 1 d 1 ) β 1 d ( β 1 1 ) κ ¯ ( β 2 d 1 ) β 2 d ( β 2 1 ) α ˜ · 1 χ .
Hence, for snr av , it can be shown (following some algebra) that
2 Δ ( snr av ) = κ ¯ α ˜ κ 2 L , 2 L , 1 1 + C 1 1 snr av + o ( 1 snr av ) ,
log 1 + κ 2 Δ ( snr av ) 1 = log k 1 + κ ¯ α ˜ k 1 2 L , 2 L , 1 C 1 log e · 1 snr av + o ( 1 snr av ) ,
where
k 1 1 + κ ¯ α ˜ 2 L , 2 L , 1 κ = κ ¯ 1 + 1 α ˜ 2 L , 2 L , 1 ,
and, finally (cf. (A63)),
C sum lb ( snr av ) = log snr av + log α ˜ χ κ ¯ L , 2 + log k 1 + o ( 1 ) .
This lets us conclude that the high-SNR slope of the sum-rate lower bound reads
S lb = 1 ,
and the respective high-SNR power offset satisfies
L lb = L , 2 log α ˜ χ κ ¯ log k 1 .
Using (A70), we finally conclude that
L lb = L , 1 + L , 2 log 2 L , 1 + 1 α ˜ 2 L , 2 log ( α ˜ χ ) .

Appendix E.2. Case II: β 1 >1,β 2 =1

Using (A126), we obtain, for snr av ,
C 2 ( α ˜ χ snr av κ ¯ ) = log snr av + log α ˜ χ κ ¯ L , 2 + 2 ( d 1 ) κ ¯ d α ˜ χ log e · 1 snr av + o ( 1 snr av ) .
Combining (A75) with (A64) and substituting back into (A62), we obtain (while considering only small terms of leading order)
Δ ( snr av ) = log κ ¯ α ˜ κ + L , 2 L , 1 + C 2 log e · 1 snr av + o ( 1 snr av ) ,
where
C 2 2 ( d 1 ) κ ¯ d α ˜ χ .
This yields, for snr av ,
2 Δ ( snr av ) = κ ¯ α ˜ κ 2 L , 2 L , 1 1 + C 2 1 snr av + o ( 1 snr av ) ,
log 1 + κ 2 Δ ( snr av ) 1 = log k 2 + κ ¯ α ˜ k 2 2 L , 2 L , 1 C 2 log e · 1 snr av + o ( 1 snr av ) ,
where
k 2 κ ¯ 1 + 1 α ˜ 2 L , 2 L , 1 ,
and, finally,
C sum lb ( snr av ) = log snr av + log α ˜ χ κ ¯ L , 2 + log k 2 + o ( 1 ) .
Note that, although k 2 apparently takes the same form as k 1 in (A70), these two constants are not identical, since L , 2 differs for β 2 = 1 (cf. (62)); to emphasize this, we use a different notation.
Therefore, we conclude that the high-SNR slope of the sum-rate lower bound satisfies
S lb = 1 ,
and the high-SNR power offset is given by
L lb = L , 2 log α ˜ χ κ ¯ log k 2 .
Using (A80), we then obtain
L lb = L , 1 opt + L , 2 opt log 2 L , 1 + 1 α ˜ 2 L , 2 log ( α ˜ χ ) .

Appendix E.3. Case III: β 1 >1,2 d≤β 2 <1

For 2 d β 2 < 1 , we start from (A140) and obtain, for snr av ,
C 2 opt ( α ˜ χ snr av κ ¯ ) = β 2 log snr av + β 2 log α ˜ χ κ ¯ β 2 L , 2 + κ ¯ β 2 3 ( d 1 ) log e d ( 1 β 2 ) α ˜ χ 1 snr av + o 1 snr av .
Using (A64) and substituting back into (A62), we then obtain
Δ ( snr av ) = ( 1 β 2 ) log snr av + log κ ¯ β 2 χ 1 β 2 α ˜ β 2 κ + β 2 L , 2 L , 1 = + C 3 log e · 1 snr av + o 1 snr av ,
where
C 3 κ ( β 1 d 1 ) β 1 d ( β 1 1 ) κ ¯ β 2 3 ( d 1 ) d ( 1 β 2 ) α ˜ 1 χ .
This yields
2 Δ ( snr av ) = snr av 1 β 2 κ ¯ β 2 χ 1 β 2 α ˜ β 2 κ 2 β 2 L , 2 L , 1 1 + C 3 1 snr av + o 1 snr av ,
log 1 + κ 2 Δ ( snr av ) 1 log 2 = ( 1 β 2 ) log snr av + β 2 L , 2 L , 1 + log χ 1 β 2 κ ¯ β 2 α ˜ β 2 + o ( 1 ) ,
hence,
C sum lb ( snr av ) = log snr av L , 1 + log 2 χ + o ( 1 ) .
We finally conclude that the high-SNR slope for β 1 > 1 and 2 d β 2 < 1 reads
S lb = 1 ,
while the high-SNR power offset reads
L lb = L , 1 log χ .

Appendix F. Proof of Proposition 7

Starting from (28), we obtain, following some algebra,
C sum ub ( snr av ) = C 1 ( χ snr av μ ¯ 2 ) + C 2 ( α ˜ χ snr av μ ¯ 1 ) = + log 1 μ 1 μ 2 μ ¯ 12 2 C 1 ( χ snr av μ 1 ) C 1 ( χ snr av μ ¯ 2 ) + C 2 ( α ˜ χ snr av μ 2 ) C 2 ( α ˜ χ snr av μ ¯ 1 ) 1 .
Next, relying on (A58), (A60) and (62), we conclude that the terms outside the logarithm in (A93) can be approximated, for snr av , as
C 1 ( χ snr av μ ¯ 2 ) + C 2 ( α ˜ χ snr av μ ¯ 1 ) = S , 1 + S , 2 log snr av = S , 1 L , 1 log χ S , 2 L , 2 log ( α ˜ χ ) = S , 1 log 2 μ ¯ 2 S , 2 log 2 μ ¯ 1 + o ( 1 ) .
Our next step is to investigate the different terms in the exponent inside the logarithm in (A93), which we compactly denote as
Δ 1 ( snr av ) C 1 ( χ snr av μ 1 ) C 1 ( χ snr av μ ¯ 2 ) ,
Δ 2 ( snr av ) C 2 ( α ˜ χ snr av μ 2 ) C 2 ( α ˜ χ snr av μ ¯ 1 ) .
Focusing on β 1 , β 2 > 1 , we resort to Appendix H and obtain, from (A133), that, for snr av ,
Δ 1 ( snr av ) | β 1 > 1 = log μ ¯ 2 μ 1 + ( μ 1 μ ¯ 2 ) ( β 1 d 1 ) log e β 1 d ( β 1 1 ) χ 1 snr av + o ( 1 snr av ) ,
Δ 2 ( snr av ) | β 2 > 1 = log μ ¯ 1 μ 2 + ( μ 2 μ ¯ 1 ) ( β 2 d 1 ) log e β 2 d ( β 2 1 ) α ˜ χ 1 snr av + o ( 1 snr av ) .
This yields
Δ 1 ( snr av ) + Δ 2 ( snr av ) = log μ ¯ 1 μ ¯ 2 μ 1 μ 2 β 1 d 1 β 1 ( β 1 1 ) + β 2 d 1 β 2 ( β 2 1 ) α ˜ μ ¯ 12 log e d χ 1 snr av + o ( 1 snr av ) ,
hence, for snr av ,
2 Δ 1 ( snr av ) + Δ 2 ( snr av ) = μ ¯ 1 μ ¯ 2 μ 1 μ 2 1 K 1 μ ¯ 12 1 snr av + o ( 1 snr av ) ,
where we used the approximation e x 1 + x , x 1 and
K 1 β 1 d 1 β 1 ( β 1 1 ) + β 2 d 1 β 2 ( β 2 1 ) α ˜ · 1 d χ .
Next, considering the log ( · ) term in (A93), it is concluded (following some algebra) that, for snr av ,
log 1 μ 1 μ 2 μ ¯ 12 2 Δ 1 ( snr av ) + Δ 2 ( snr av ) 1 = log snr av + log ( μ ¯ 1 μ ¯ 2 K 1 ) + o ( 1 ) .
Combining (A102), (A94) and (A93), while recalling that S , 1 = S , 2 = 1 for β 1 , β 2 > 1 (cf. (A60)), we obtain, for snr av ,
C sum ub ( snr av ) = 2 log snr av L , 1 opt log χ L , 2 opt log ( α ˜ χ ) log ( μ ¯ 1 μ ¯ 2 ) log snr av + log ( μ ¯ 1 μ ¯ 2 ) + log K 1 + o ( 1 ) = log snr av L , 1 log χ L , 2 log ( α ˜ χ ) + log K 1 + o ( 1 ) .
Hence, for β 1 , β 2 > 1 , the high-SNR slope of the sum-rate upper bound (A93) (equivalently, (28)) reads
S ub = 1 ,
while the high-SNR power offset satisfies
L ub = L , 1 + L , 2 log ( α ˜ χ 2 K 1 ) .
Finally, noting that
α ˜ χ 2 K 1 = ( β 1 d 1 ) α ˜ β 1 ( β 1 1 ) + β 2 d 1 β 2 ( β 2 1 ) · χ d ,
we obtain (64), which completes the proof.

Appendix G. RS-CDMA: Achievable Region for Two User Classes

In this appendix, we derive the achievable region for RS-CDMA in the large-system limit following the analysis in [41]. The system model for RS-CDMA can still be described via (1), where we now assume that the entries of the signature matrices are i.i.d. random variables with zero mean, unit variance and finite fourth moment. We also set d = N to comply with the setting considered in [41]. Referring to (8) and starting with the individual rate constraints, we have, from ([41], Section IV), that
1 N I ( x 1 ; y | x 2 , A i i = 1 , 2 ) N C RS ( β 1 , snr 1 )
1 N I ( x 2 ; y | x 1 , A i i = 1 , 2 ) N C RS ( β 2 , snr 2 ) ,
where
C RS ( β i , snr i ) = β i log 1 + snr i 1 4 F ( snr i , β i ) β log ( 1 + log 1 + β i snr i 1 4 F ( snr i , β i ) log e 4 snr i F ( snr i , β i ) , i = 1 , 2 ,
and F ( · , · ) is defined in (6) [40].
To proceed with the analysis of the sum-rate constraint in (8), we introduce the probability mass function (pmf) as
p ( g ) = β 1 β 1 + β 2 = β 1 β , g = snr 1 snr av , β 2 β 1 + β 2 = β 2 β , g = snr 2 snr av ,
where, as in (19),
snr av β 1 β snr 1 + β 2 β snr 2 .
Then, in the large-system limit, while relying on the strong law of large numbers (SLLN), the received signal in (1) is well represented by
y = snr av N A RS G x + z ,
where the N × K matrix A RS = [ A 1 A 2 ] has i.i.d. zero-mean entries with unit variance and finite fourth moment, G = diag g 1 , , g K is a diagonal random matrix with i.i.d. entries distributed according to (A110), x C N ( 0 , I K ) denotes the input vector comprising both classes of users and z C N ( 0 , I N ) denotes the AWGN. Next, by ([41], Theorem IV.1), we have
1 N I ( x 1 , x 2 ; y | A i i = 1 , 2 ) N C RS sum ,
where
C RS sum = C RS mmse + log 1 η RS + ( η RS 1 ) log e ,
C RS mmse = β 1 log 1 + snr 1 η RS + β 2 log 1 + snr 2 η RS ,
and η RS is the positive solution to
η RS + β 1 η RS snr 1 1 + η RS snr 1 + β 2 η RS snr 2 1 + η RS snr 2 = 1 .
The explicit dependence of C RS sum , C RS mmse and η RS on β i , snr i i = 1 , 2 was omitted here for notational simplicity. Note that (A116) boils down to the 3rd order polynomial equation
a 3 η RS 3 + a 2 η RS 2 + a 1 η RS + a 0 = 0 ,
where
a 3 = snr 1 snr 2 ,
a 2 = snr 1 snr 2 β 1 + β 2 1 + snr 1 + snr 2 ,
a 1 = β 1 1 snr 1 + β 2 1 snr 2 + 1 ,
a 0 = 1 .
Combining (A107), (A108) and (A113), we finally conclude that the achievable rate region for RS-CDMA in the large-system limit reads
R RS = { ( R 1 , R 2 ) : R 1 C RS ( β 1 , snr 1 ) , R 2 C RS ( β 2 , snr 2 ) , R 1 + R 2 C RS sum } .

Appendix H. The High-SNR Regime: Some Fundamental Observations

In this appendix, we pursue a somewhat refined high-SNR approximation of C opt ( snr , β , d ) , as given by (5) (we omit subscripts in the following since the analysis holds for either i = 1 or i = 2 ). The observations made here serve as a fundamental tool for the high-SNR analysis of the sum-rate lower and upper bounds of Propositions 1 and 2 (see Appendices Appendix E and Appendix F, respectively).

Appendix H.1. β = 1

We start by considering the case where β = 1 ; hence, (cf. Theorem 1) α = γ , β ˜ = 1 and ζ = d α , yielding
C opt ( snr , 1 , d ) = d 2 log 1 + 2 α snr 1 4 F ( α snr , 1 ) d 2 2 log ( 1 + d snr ) 2 G ( α snr , d α , 1 ) .
Note that
F ( α snr , 1 ) = 4 α snr + 1 1 2 = 2 α snr 2 4 α snr + 1 α snr + 1 α snr ,
while
G ( α snr , d α , 1 ) = d 4 α snr + 1 d 4 α d d 4 α 2 = d ( 4 α snr + 1 ) 1 d 4 α d 4 α snr + 1 d d 4 α 2 .
Substituting (A121) back into the first logarithmic term in (A120) yields (following some algebra)
log 1 + 2 α snr 1 4 F ( α snr , 1 ) = log snr + log α + log 1 + 4 α snr + 1 2 α snr 1 2 α snr = log snr + log 1 + 1 α snr 1 + 4 α snr + 1 2 α snr 1 2 α snr snr log snr + log 1 1 d + d log e d 1 1 snr + o ( 1 snr ) ,
where we use the following approximation:
log ( 1 + x ) = log x + log ( 1 + 1 x ) log x + log e x + o ( 1 x ) , x 1 .
Similarly, using (A122), we obtain, for the second logarithmic term in (A120),
log ( 1 + d snr ) 2 G ( α snr , d α , 1 ) = 2 log ( 1 + d snr ) log ( 4 α snr + 1 ) 2 log d + 2 = 2 log 1 d 2 d 4 α snr + 1 snr log snr log 1 1 d + ( d 2 ) log e d ( d 1 ) 1 snr + o ( 1 snr ) .
Substituting the above high-SNR approximations back into (A120), we finally obtain
C opt ( snr , 1 , d ) snr log snr + ( d 1 ) log 1 1 d + 2 d 1 log e d 1 snr + o ( 1 snr ) .

Appendix H.2. β > 1

For β > 1 , we investigate C opt ( snr , β , d ) by directly considering its integral form (see [39], ([38], Theorems 2 and 3), (A31) and the corresponding discussion and notation in Appendix C)
C opt ( snr , β , d ) = 0 log ( 1 + snr λ ) ρ ( λ , β , d ) d λ ,
where
ρ ( λ , β , d ) = [ 1 β ] + δ ( λ ) + β d 2 π [ λ λ ] + [ λ + λ ] + λ ( β d λ ) .
Note that, for β > 1 , the density ρ ( λ , β , d ) has a finite strictly positive support ( λ , λ + ) ; hence, C opt ( snr , β , d ) can be equivalently expressed as
C opt ( snr , β , d ) = λ λ + log ( snr λ ) ρ ( λ , β , d ) d λ + λ λ + log ( 1 + 1 snr λ ) ρ ( λ , β , d ) d λ = log snr + λ λ + log ( λ ) ρ ( λ , β , d ) d λ + λ λ + log ( 1 + 1 snr λ ) ρ ( λ , β , d ) d λ .
Therefore, we approximate C opt ( snr , β , d ) in the high-SNR regime as
C opt ( snr , β , d ) = log snr + λ λ + log ( λ ) ρ ( λ , β , d ) d λ + log e snr λ λ + 1 λ ρ ( λ , β , d ) d λ + o ( 1 snr ) .
The two integrals in (A130) can be solved in closed form and read
λ λ + log ( λ ) ρ ( λ , β , d ) d λ = ( β 1 ) log ( β 1 ) + β log β + ( β d 1 ) log 1 1 β d ,
λ λ + 1 λ ρ ( λ , β , d ) d λ = β d 1 β d ( β 1 ) .
Hence, we conclude that
C opt ( snr , β , d ) snr log snr ( β 1 ) log ( β 1 ) + β log β + ( β d 1 ) log 1 1 β d C opt ( snr , 1 , d ) snr + ( β d 1 ) log e β d ( β 1 ) 1 snr + o ( 1 snr ) , β > 1 .

Appendix H.3. 2 d≤ β < 1

Using the subscript ( · ) u to designate quantities corresponding to an underloaded setting ( β < 1 ), we start by noting that, in the underloaded regime, C u opt ( snr , β , d ) can be shown to satisfy the relation
C u opt ( snr , β , d ) = β C opt ( β snr , β ol , d ol ) ,
where we additionally define β ol 1 β and d ol β d . Here, C opt ( β snr , β ol , d ol ) specifies the achievable throughput in an overloaded single-class setting with the corresponding parameters (see the discussion in Section 3.1). Hence, C u opt ( snr , β , d ) can be expressed in an integral form as
C u opt ( snr , β , d ) = β 0 log ( 1 + β snr λ ol ) ρ ( λ ol , β ol , d ol ) d λ ol ,
where ρ ( λ ol , β ol , d ol ) is as in (A128) with the obvious change in parameters. Since β ol > 1 , the density ρ ( λ ol , β ol , d ol ) has a finite strictly positive support and C u opt ( snr , β , d ) can be equivalently rewritten as
C u opt ( snr , β , d ) = β λ ol λ ol + log ( snr β λ ol ) ρ ( λ ol , β ol , d ol ) d λ ol = + β λ ol λ ol + log ( 1 + 1 snr β λ ol ) ρ ( λ ol , β ol , d ol ) d λ ol = β log snr + β λ ol λ ol + log ( β λ ol ) ρ ( λ ol , β ol , d ol ) d λ ol log snr + β λ ol λ ol + log ( 1 + 1 snr β λ ol ) ρ ( λ ol , β ol , d ol ) d λ ol .
Hence, we approximate C u opt ( snr , β , d ) in the high-SNR regime as
C u opt ( snr , β , d ) = β log snr + β λ ol λ ol + log ( β λ ol ) ρ ( λ ol , β ol , d ol ) d λ ol log snr + β log e snr λ ol λ ol + 1 β λ ol ρ ( λ ol , β ol , d ol ) d λ ol + o ( 1 snr ) .
The two integrals in (A137) can be solved in closed form, yielding
λ ol λ ol + log ( β λ ol ) ρ ( λ ol , β ol , d ol ) d λ ol = ( d 1 ) log 1 1 d 1 β 1 log ( 1 β ) ,
λ ol λ ol + 1 β ol λ ol ρ ( λ ol , β ol , d ol ) d λ = β 2 ( d 1 ) d ( 1 β ) ,
and the high-SNR approximation for C u opt ( snr , β , d ) thus reads
C u opt ( snr , β , d ) snr β log snr + ( d 1 ) log 2 1 1 d 1 β 1 log ( 1 β ) log snr + β 3 ( d 1 ) log e d ( 1 β ) 1 snr + o 1 snr .

References

  1. Ding, Z.; Lei, X.; Karagiannidis, G.J.; Schober, R.; Yuan, J.; Bhargava, V.K. A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends. IEEE J. Sel. Areas Commun. 2017, 35, 2181–2195. [Google Scholar] [CrossRef] [Green Version]
  2. Dai, L.; Wang, B.; Ding, Z.; Wang, Z.; Chen, S.; Hanzo, L. A Survey of Non-Orthogonal Multiple Access for 5G. IEEE Commun. Surv. Tutor. 2018, 20, 2294–2323. [Google Scholar] [CrossRef] [Green Version]
  3. Makki, B.; Chitti, K.; Behravan, A.; Alouini, M.S. A Survey of NOMA: Current Status and Open Research Challenges. IEEE Open Commun. Soc. 2020, 1, 179–189. [Google Scholar] [CrossRef] [Green Version]
  4. Yuan, Y.; Wang, S.; Wu, Y.; Poor, H.V.; Ding, Z.; You, X.; Hanzo, L. NOMA for Next-Generation Massive IoT: Performance Potential and Technology Directions. IEEE Commun. Mag. 2021, 59, 115–121. [Google Scholar] [CrossRef]
  5. Dangi, R.; Lalwani, P.; Choudhary, G.; You, I.; Pau, G. Study and Investigation on 5G Technology: A Systematic Review. Sensors 2022, 22, 26. [Google Scholar] [CrossRef]
  6. Maraqa, O.; Rajasekaran, A.S.; Al-Ahmadi, S.; Yanikomeroglu, H.; Sait, S.M. A Survey of Rate-Optimal Power Domain NOMA With Enabling Technologies of Future Wireless Networks. IEEE Commun. Surv. Tutor. 2020, 22, 2192–2235. [Google Scholar] [CrossRef]
  7. Iswarya, N.; Jayashree, L.S. A Survey on Successive Interference Cancellation Schemes in Non-Orthogonal Multiple Access for Future Radio Access. Wirel. Pers. Commun. 2021, 120, 1057–1078. [Google Scholar] [CrossRef]
  8. Jamali, M.H.; Mahdavifar, H. Massive Coded-NOMA for Low-Capacity Channels: A Low-Complexity Recursive Approach. IEEE Trans. Commun. 2021, 69, 3664–3681. [Google Scholar] [CrossRef]
  9. Hoshyar, R.; Wathan, F.P.; Tafazolli, R. Novel Low-Density Signature for Synchronous CDMA Systems Over AWGN Channel. IEEE Trans. Signal Process. 2008, 56, 1616–1626. [Google Scholar] [CrossRef] [Green Version]
  10. Hoshyar, R.; Razavi, R.; Al-Imari, M. LDS-OFDM an Efficient Multiple Access Technique. In Proceedings of the 2010 IEEE 71st Vehicular Technology Conference, Taipei, Taiwan, 16–19 May 2010; pp. 1–5. [Google Scholar] [CrossRef]
  11. Qi, T.; Feng, W.; Chen, Y.; Wang, Y. When NOMA Meets Sparse Signal Processing: Asymptotic Performance Analysis and Optimal Sequence Design. IEEE Access 2017, 5, 18516–18525. [Google Scholar] [CrossRef]
  12. Nikopour, H.; Baligh, H. Sparse Code Multiple Access. In Proceedings of the 2013 IEEE 24th International Symposium on Personal, Indoor and Mobile Radio Communications, London, UK, 8–11 September 2013; pp. 332–336. [Google Scholar] [CrossRef]
  13. Van de Beek, J.; Popović, B.M. Multiple Access with Low-Density Signatures. In Proceedings of the 2009 IEEE GLOBECOM, Honolulu, Hawaii, 30 November–4 December 2009. [Google Scholar]
  14. Millar, G.; Kulhandjian, M.; Alaca, A.; Alaca, S.; D’Amours, C.; Yanikomeroglu, H. Low-Density Spreading Design Based on an Algebraic Scheme for NOMA Systems. IEEE Wireless Commun. Lett. 2022. [Google Scholar] [CrossRef]
  15. Moltafet, M.; Mokari, N.; Javan, M.R.; Saeedi, H.; Pishro-Nik, H. A New Multiple Access Technique for 5G: Power Domain Sparse Code Multiple Access (PSMA). IEEE Access 2018, 6, 747–759. [Google Scholar] [CrossRef]
  16. Sharma, S.; Deka, K.; Bhatia, V.; Gupta, A. Joint Power-Domain and SCMA-Based NOMA System for Downlink in 5G and Beyond. IEEE Commun. Lett. 2019, 23, 971–974. [Google Scholar] [CrossRef]
  17. Li, Z.; Chen, W.; Wei, F.; Wang, F.; Xu, X.; Chen, Y. Joint Codebook Assignment and Power Allocation for SCMA Based on Capacity With Gaussian Input. In Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, Chengdu, China, 27–29 July 2016; pp. 1–6. [Google Scholar]
  18. Balasubramanya, N.M.; Gupta, A.; Sellathurai, M. Combining Code-domain and Power-domain NOMA for Supporting Higher Number of Users. In Proceedings of the 2018 IEEE GLOBECOM, Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar]
  19. Evangelista, J.V.C.; Sattar, Z.; Kaddoum, G.; Chaaban, A. Fairness and Sum-Rate Maximization via Joint Subcarrier and Power Allocation in Uplink SCMA Transmission. IEEE Trans. Wireless Commun. 2019, 18, 5855–5867. [Google Scholar] [CrossRef]
  20. Quan, C.; Yadav, A.; Geng, B.; Varshney, P.K.; Poor, H.V. A Novel Spectrally-Efficient Uplink Hybrid-Domain NOMA System. IEEE Commun. Lett. 2020, 24, 2609–2613. [Google Scholar] [CrossRef]
  21. Yadav, A.; Quan, C.; Varshney, P.K.; Poor, H.V. On Performance Comparison of Multi-Antenna HD-NOMA, SCMA, and PD-NOMA Schemes. IEEE Wireless Commun. Lett. 2021, 10, 715–719. [Google Scholar] [CrossRef]
  22. Kim, Y.B.; Yamazaki, K.; Jung, B.C. Virtual Full-Duplex Cooperative NOMA: Relay Selection and Interference Cancellation. IEEE Trans. Wirel. Commun. 2019, 18, 5882–5893. [Google Scholar] [CrossRef]
  23. Ding, Z.; Dai, H.; Poor, H.V. Relay Selection for Cooperative NOMA. IEEE Wireless Commun. Lett. 2016, 5, 416–419. [Google Scholar] [CrossRef] [Green Version]
  24. Zhang, L.; Liu, J.; Xiao, M.; Wu, G.; Liang, Y.C.; Li, S. Performance Analysis and Optimization in Downlink NOMA Systems with Cooperative Full-Duplex Relaying. IEEE J. Sel. Areas Commun. 2017, 35, 2398–2412. [Google Scholar] [CrossRef]
  25. Liau, Q.Y.; Leow, C.Y. Cooperative NOMA System with Virtual Full Duplex User Relaying. IEEE Access 2019, 7, 2502–2511. [Google Scholar] [CrossRef]
  26. Jose, J.; Shaik, P.; Bhatia, C. VFD-NOMA under Imperfect SIC and Residual Inter-Relay Interference Over Generalized Nakagami-m Fading Channels. IEEE Commun. Lett. 2021, 25, 646–650. [Google Scholar] [CrossRef]
  27. Jose, J.; Shaik, P.; Bhatia, V. Performance of Cooperative NOMA with Virtual Full-Duplex based DF Relaying in Nakagami-m Fading. In Proceedings of the VTC-Spring 2021—2021 IEEE 93rd Vehicular Technology Conference, Helsinki, Finland, 25–28 April 2021; pp. 1–6. [Google Scholar] [CrossRef]
  28. Hong, S.N.; Caire, G. Virtual Full-Duplex Relaying With Half-Duplex Relays. IEEE Trans. Inf. Theory 2015, 61, 4700–4720. [Google Scholar] [CrossRef]
  29. Tulino, A.M.; Verdú, S. Random Matrix Theory and Wireless Communications. Found. Trends Commun. Inf. Theory 2004, 1, 1–182. [Google Scholar] [CrossRef]
  30. Couillet, R.; Debbah, M. Random Matrix Methods for Wireless Communications; Cambridge University Press: Cambridge, UK, 2011. [Google Scholar]
  31. Nishimori, H. Statistical Physics of Spin Glasses and Information Processing: An Introduction; Oxford University Press: Oxford, UK, 2001. [Google Scholar]
  32. Mézard, M.; Montanari, A. Information, Physics, and Computation; Oxford University Press: Oxford, UK, 2009. [Google Scholar]
  33. Yoshida, M.; Tanaka, T. Analysis of Sparsely-Spread CDMA via Statistical Mechanics. In Proceedings of the 2006 IEEE International. Symposium of Information Theory (ISIT), Seatle, Washington, 11–15 June 2006; pp. 2378–2382. [Google Scholar] [CrossRef]
  34. Ferrante, G.C.; Di Benedetto, M.G. Spectral Efficiency of Random Time-Hopping CDMA. IEEE Trans. Inf. Theory 2015, 61, 6643–6662. [Google Scholar] [CrossRef] [Green Version]
  35. Asgharimoghaddam, H.; Kaleva, J.; Tölli, A. Capacity Approaching Low Density Spreading in Uplink NOMA via Asymptotic Analysis. IEEE Trans. Commun. 2021, 69, 1635–1647. [Google Scholar] [CrossRef]
  36. Le, M.T.P.; Ferrante, G.C.; Caso, G.; Di Benedetto, M.G. On Information-Theoretic Limits of Code-Domain NOMA for 5G. IET Commun. 2018, 12, 1864–1871. [Google Scholar] [CrossRef]
  37. Shental, O.; Zaidel, B.M.; Shamai (Shitz), S. Low-Density Code-Domain NOMA: Better Be Regular. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 25–30 June 2017; pp. 2633–2637. [Google Scholar]
  38. Zaidel, B.M.; Shental, O.; Shamai (Shitz), S. Sparse NOMA: A Closed-Form Characterization. In Proceedings of the 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–23 June 2018; pp. 1106–1110. [Google Scholar]
  39. Zaidel, B.M.; Shental, O.; Shamai (Shitz), S. Regular Sparse NOMA: Ultimate Performance in Closed Form. IEEE J. Sel. Areas Inf. 2022. submitted for publication. [Google Scholar]
  40. Verdú, S.; Shamai (Shitz), S. Spectral Efficiency of CDMA with Random Spreading. IEEE Trans. Inf. Theory 1999, 45, 622–640. [Google Scholar] [CrossRef]
  41. Shamai (Shitz), S.; Verdú, S. The Impact of Frequency-Flat Fading on the Spectral Efficiency of CDMA. IEEE Trans. Inf. Theory 2001, 47, 1302–1327. [Google Scholar] [CrossRef]
  42. Hu, J.; Duman, T.M. Graph-Based Detection Algorithms for Layered Space-Time Architectures. IEEE J. Sel. Areas Commun. 2008, 26, 269–280. [Google Scholar]
  43. El Gamal, A.; Kim, Y.H. Network Information Theory; Cambridge University Press: Cambridge, UK, 2011. [Google Scholar]
  44. Courtade, T.A. Strengthening the Entropy Power Inequality. In Proceedings of the 2016 IEEE International Symposium on Information Theory (ISIT), Barcelona, Spain, 10–15 July 2016; pp. 2294–2298. [Google Scholar]
  45. Courtade, T.A. A Strong Entropy Power Inequality. IEEE Trans. Inf. Theory 2018, 64, 2173–2192. [Google Scholar] [CrossRef]
  46. Wyner, A.D. Shannon-Theoretic Approach to a Gaussian Cellular Multiple-Access Channel. IEEE Trans. Inf. Theory 1994, 40, 1713–1727. [Google Scholar] [CrossRef]
  47. Zaidel, B.M.; Shamai (Shitz), S.; Verdú, S. Multi-Cell Uplink Spectral Efficiency of Coded DS-CDMA with Random Signatures. IEEE J. Sel. Areas Commun. 2001, 19, 1556–1569. [Google Scholar] [CrossRef]
  48. Somekh, O.; Zaidel, B.M.; Shamai (Shitz), S. Sum Rate Characterization of Joint Multiple Cell-Site Processing. IEEE Trans. Inf. Theory 2007, 53, 4473–4497. [Google Scholar] [CrossRef] [Green Version]
  49. Simeone, O.; Levy, N.; Sanderovich, A.; Somekh, O.; Zaidel, B.M.; Poor, H.V.; Shamai (Shitz), S. Cooperative Wireless Cellular Systems: An Information-Theoretic View. Found. Trends Commun. Inf. Theory 2012, 8, 1–177. [Google Scholar] [CrossRef]
  50. Bordenave, C.; Lelarge, M. Resolvent of Large Random Graphs. Random Struct. Alg. 2010, 37, 332–352. [Google Scholar] [CrossRef] [Green Version]
  51. Dembo, A.; Montanari, A.; Sun, N. Factor Models on Locally Tree-Like Graphs. Ann. Probab. 2013, 41, 4162–4213. [Google Scholar] [CrossRef]
  52. Richardson, T.; Urbanke, R. Modern Coding Theory; Cambridge University Press: Cambridge, UK, 2008. [Google Scholar]
  53. Gallager, R.G. Low-Density Parity-Check Codes; MIT Press: Cambridge, MA, USA, 1963. [Google Scholar]
  54. Zaidel, B.M.; Shamai (Shitz), S. Sparse and Dense: An Achievable Region for Code-Domain NOMA with Mixed Users. In Proceedings of the 2021 IEEE International Symposium on Information Theory (ISIT), Melbourne, Australia, 12–20 June 2021; pp. 2942–2947. [Google Scholar]
  55. Mingo, J.A.; Speicher, R. Free Probability and Random Matrices; Springer: New York, NY, USA, 2017. [Google Scholar]
  56. Verdú, S. Spectral Efficiency in the Wideband Regime. IEEE Trans. Inf. Theory 2002, 48, 1319–1343. [Google Scholar] [CrossRef]
Figure 1. Achievable regions for snr 1 = 15   dB , snr 2 = 5   dB , d = 2 , β 1 = 1.5 and β 2 = 2 .
Figure 1. Achievable regions for snr 1 = 15   dB , snr 2 = 5   dB , d = 2 , β 1 = 1.5 and β 2 = 2 .
Entropy 24 00227 g001
Figure 2. Achievable sum rate for snr 1 = 10   dB , snr 2 = α ˜ snr 1 ( α ˜ ( 0 , 1 ) ), d = 2 , β 1 = 2 and β 2 = 2 . Bounds are plotted for numerically optimized κ , μ 1 , μ 2 .
Figure 2. Achievable sum rate for snr 1 = 10   dB , snr 2 = α ˜ snr 1 ( α ˜ ( 0 , 1 ) ), d = 2 , β 1 = 2 and β 2 = 2 . Bounds are plotted for numerically optimized κ , μ 1 , μ 2 .
Entropy 24 00227 g002
Figure 3. Achievable sum rate for snr 2 = 0.1 × snr 1 , d = 2 , β 1 = 1.5 and β 2 = 2 . Bounds are plotted for numerically optimized κ , μ 1 , μ 2 .
Figure 3. Achievable sum rate for snr 2 = 0.1 × snr 1 , d = 2 , β 1 = 1.5 and β 2 = 2 . Bounds are plotted for numerically optimized κ , μ 1 , μ 2 .
Entropy 24 00227 g003
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zaidel, B.M.; Shental, O.; Shamai, S. Beyond Equal-Power Sparse NOMA: Two User Classes and Closed-Form Bounds on the Achievable Region. Entropy 2022, 24, 227. https://doi.org/10.3390/e24020227

AMA Style

Zaidel BM, Shental O, Shamai S. Beyond Equal-Power Sparse NOMA: Two User Classes and Closed-Form Bounds on the Achievable Region. Entropy. 2022; 24(2):227. https://doi.org/10.3390/e24020227

Chicago/Turabian Style

Zaidel, Benjamin M., Ori Shental, and Shlomo Shamai (Shitz). 2022. "Beyond Equal-Power Sparse NOMA: Two User Classes and Closed-Form Bounds on the Achievable Region" Entropy 24, no. 2: 227. https://doi.org/10.3390/e24020227

APA Style

Zaidel, B. M., Shental, O., & Shamai, S. (2022). Beyond Equal-Power Sparse NOMA: Two User Classes and Closed-Form Bounds on the Achievable Region. Entropy, 24(2), 227. https://doi.org/10.3390/e24020227

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop