1. Introduction
Non-orthogonal multiple access (NOMA) is a key enabler in the design of future overloaded beyond-5G communication systems with many more designated users than available physical resources, precluding the conventional orthogonal multiple access (OMA) paradigm [
1,
2,
3,
4] (see also [
5] for a very recent technology review). The main potential appeal of NOMA over OMA stems from either supporting more simultaneous users or, in lieu, facilitating higher user throughputs when orthogonality is practically unsustainable. NOMA technologies generally comprise two main manifestations, power-domain NOMA and code-domain NOMA. Power-domain NOMA essentially relies on direct superposition of the transmitted signals, successive interference cancellation (SIC) at the receivers and appropriate power allocation to different users in order to achieve desired performance objectives [
1,
2,
6,
7]. Under the code-domain NOMA paradigm, the users’ signals are distinguished by different spreading signatures chosen to facilitate efficient multiuser detection (MUD) at the receivers (see, e.g., [
2,
8]). In particular, sparse NOMA, or low-density code-domain (LDCD) NOMA, has gained considerable interest in recent years due to its appealing attributes. Relying on sparse spreading signatures, sparse NOMA potentially facilitates enhanced spectral efficiency with practical receiver implementation based on sparsity exploiting iterative message passing algorithms (MPAs), similarly to the ones empowering the efficient decoding of low-density parity-check (LDPC) codes. The interested reader is referred to the insightful surveys [
1,
2] for details about the utilization of MPAs in NOMA, along with their concrete application for sparse NOMA [
9,
10,
11], including sparse-code multiple access (SCMA) [
12]. Different designs of sparse spreading signatures and their impact on MUD error-rate performance are discussed, e.g., in [
11,
13,
14] and references therein.
Transmission schemes
combining power-domain NOMA and SCMA were also recently proposed, e.g., in [
15,
16] for the cellular downlink channel and in [
17,
18,
19,
20,
21] for the uplink channel. Therein, the main objective is to identify efficient centralized algorithms for joint resource and power allocation, that attempt to maximize the SCMA achievable throughput under independent Rayleigh fading and certain simplifying assumptions (viz., independent Gaussian signaling over each utilized physical resource, full synchronization and perfect channel state information). Fairness and quality-of-service constraints may also be incorporated into the optimization algorithm (e.g., [
19,
20,
21]). The performance of the proposed algorithms is then evaluated by means of numerical simulations. More involved network configurations have also been considered recently, e.g., system models encompassing relays (see [
22] and references therein for an exhaustive literature survey). Relaying may either appear in the form of dedicated network elements, e.g., [
22,
23] or, alternatively, by means of user cooperation, e.g., [
24,
25,
26,
27]. In this framework, focusing on power-domain NOMA with SIC, the notion of virtual full-duplex (VFD) relaying [
28] has gained particular interest as means to circumvent the implementation challenges of true full-duplex operation; see, e.g., [
22,
25,
26,
27]. The impact of imperfect SIC and residual inter-relay interference in this framework was also recently considered in [
26].
Notwithstanding their great practical promise and potential, sparse NOMA techniques often pose serious analytical challenges and their information-theoretic performance limits are not easily tractable even in the simplest settings. Typically, tools from random matrix theory or statistical physics are harnessed for their analysis [
29,
30,
31,
32], while considering the asymptotic large-system limit, where both the number of users and the number of available resources grow large, while retaining a fixed ratio (see, e.g., [
33,
34,
35]). The obtained results typically yield
excellent approximations for the expected performance with finite (and quite moderate) system dimensions [
29,
30].
Sparse NOMA is dubbed:
regular when a
fixed (and finite) number of orthogonal resources is allocated to any designated user and each resource is used by a fixed number of users;
irregular when the respective numbers are random and only kept fixed on average [
33]. In the literature, one can also find a
partly regular version of the sparse NOMA setup where each user occupies a fixed number of resources and each resource is used by a random, yet fixed on average, number of users (or vice versa) [
34,
36].
In a recent line of works by the authors [
37,
38,
39], the particular manifestation of code-domain NOMA known as
regular sparse NOMA has been investigated and its asymptotic spectral efficiency has been derived in
closed form [
38,
39] (see
Section 2 for a precise characterization of the underlying asymptotic large-system limit and [
38,
39] for a discussion on what distinguishes this particular setting from previous analyses). Therein, a generic setup of a (non-fading) Gaussian vector multiple-access channel (MAC) with equal-power users was considered, representing the case of a single-cell uplink model with fully coordinated grant-based access, and the scheme was analytically proven to substantially decrease the gap to the ultimate capacity limit of overloaded systems. Furthermore, regular sparse NOMA was proven by the authors to outperform the dense code-domain NOMA alternative [
40,
41], along with its irregular and partly regular sparse counterparts [
33,
34]. Hence, regular sparse NOMA seems to exhibit a rare combination of information-theoretic superiority and
computational feasibility (dense code-domain NOMA is operationally equivalent to randomly spread code-division multiple access (RS-CDMA) [
40,
41], for which achieving the optimal spectral efficiency becomes
prohibitively complex in large systems [
42]). However, analyzing the merits of regular sparse NOMA beyond the generic equal-power Gaussian vector MAC setting is still a challenging, yet of utmost importance, open problem, which does not seem to lend itself to closed-form characterization, as in [
38,
39].
Motivated by this noteworthy challenge, the current paper takes a step further towards a generalization of the fundamental result of [
38,
39]. To this end, the focus remains on regular sparse NOMA within a single-cell Gaussian uplink (MAC) model, but the single-class information-theoretic analysis of [
37,
38,
39] is extended to a looser, yet more realistic, setting comprising
two user classes distinguished by their received powers. Again, the large-system limit is considered and our main contribution is the derivation of
closed-form bounds on the achievable class-rate (total throughput) region, which are both insightful and analytically tractable. An inner bound is first derived based on the standard conditional vector entropy power inequality (EPI) [
43]. A derivation of an outer bound follows, while relying on a recent strengthened version of the EPI by Courtade [
44,
45]. Both bounds are
tight with respect to the individual achievable class-throughput constraints and only differ in the achievable sum-rate (total throughput) constraint. The key tool in the derivations is a noise-split “trick”, that, when combined with the EPI, induces closed-form bounds expressed in terms of single-class achievable throughputs [
38,
39]. A simplified outer bound, which does not rely on the EPI, is then presented for load-symmetric settings (under some mild technical assumptions). This bound turns out to be tighter in certain cases. An in-depth elucidative investigation of the corresponding lower and upper bounds on the achievable sum rate in extreme-SNR regimes is also provided, which, by means of appropriate approximations [
41], identifies conditions under which the bounds are useful and a superior performance over dense code-domain NOMA is guaranteed. Conditions for attaining a relatively small gap to the ultimate performance limits are also discussed.
Our contribution provides valuable insights into the potential performance gains of regular sparse NOMA in several timely use cases of interest. One particular example represents a 5G-and-beyond scenario, where the two user classes respectively correspond, say, to low-complexity devices with stringent power constraints (e.g., Internet-of-Things applications) and to broadband users with higher transmit power capabilities. Another applicable use case is a single cell with users located at the extremes of either the cell center or the cell edge. Our analysis is also applicable to a compelling combination of power-domain NOMA [
2,
6] and code-domain NOMA, which has only recently started to attract attention in the literature [
15,
16,
17,
18,
19,
20,
21], as discussed above. Accordingly, the corner points of the achievable region bounds correspond to a SIC scheme between the two user classes, while incorporating near-optimal joint iterative decoding (MPA) within each class. In fact, by this interpretation, our analysis provides, in a sense, an
analytical benchmark for the setting considered in [
20] (see also [
18]), under the simplifying assumptions of non-fading channels and full symmetry among the users in each user class. Note that, in the
absence of fading, the corresponding regular SCMA achievable sum rate, while assuming independent Gaussian signaling over each utilized resource, trivially coincides with the Cover–Wyner sum capacity (see, e.g., [
43] and
Section 3.3). Hence, our analytical bounds quantify the gap from the ultimate performance limit induced by employing regular sparse spreading signatures and may serve as reference for practical schemes that aim to approach the sum-capacity limit using the SCMA paradigm, e.g., [
17,
18,
19,
20,
21]. Note that, in the presence of fading, characterizing the achievable rate region of the two-user-class system considered in this paper is still a formidable open problem yet to be explored; hence, a direct and explicit comparison with practical achievable sum rates reported in works, such as [
20], cannot be performed at this stage. Yet another applicable model is a two-cell interference network, where the two user classes represent, respectively, the local cell users and the users operating in the adjacent interfering cell. This may be further extended, e.g., to Wyner-type cellular models with single-cell processing [
46,
47,
48,
49].
This paper is organized as follows:
Section 2 describes the underlying system model and the random graph models employed to construct the regular sparse spreading signatures.
Section 3 presents a general statement of the class-throughput achievable region and the corresponding closed-form analytical inner and outer bounds.
Section 4 is devoted to a comparative extreme-SNR characterization of the lower and upper bounds on the total achievable sum rate. Illustrative numerical results are provided in
Section 5. Finally,
Section 6 ends this paper with some concluding remarks. Detailed proofs and some technical observations are deferred to the appendices.
2. System Model
Notation: We use boldface lower-case letters to denote vectors and boldface uppercase letters to denote matrices. denotes the -th entry of the matrix . denotes the transpose of , while denotes the corresponding conjugate (Hermitian) transpose. ⊗ denotes the Kronecker product. denotes the N-dimensional identity matrix. designates the distribution of a proper circularly symmetric complex Gaussian random vector with mean and covariance matrix . designates the probability distribution of a single mass at x. Equality in distribution is denoted by , stating that the distribution of the random variables on both sides of the equality sign is the same. denotes statistical expectation and designates that the expectation is taken with respect to the distribution of the random variable X. denotes differential entropy and denotes mutual information. For any , we use the notation . Base-2 logarithms are used throughout this paper unless otherwise stated (in which case the base of the logarithm is explicitly designated). For the sake of clarity, we use to denote the natural logarithm.
We consider a MAC, representing a single-cell uplink, where the users belong to either of two different classes distinguished by their received powers (henceforth referred to as “Class 1” and “Class 2”). Within each class, all users are assumed to be received at the same power level. The users’ signals are multiplexed over N shared orthogonal dimensions (resources), which may represent, e.g., orthogonal time–frequency slots. However, it is important to emphasize here that the setting is quite general and applies to any orthogonal coordinate system; therefore, the dimensions are, by no means, restricted to the time–frequency domain. Let and denote the number of users in Class 1 and Class 2, respectively, and let , denote the respective loads (users per resource). The total number of users is denoted by and the total system load reads .
Focusing on a generic non-fading Gaussian channel model, the
N-dimensional received signal at some arbitrary time instance reads
where
,
, is a
-dimensional complex vector comprising the coded symbols of the users in Class
i. Assuming Gaussian signaling, full symmetry, fixed powers and no cooperation among encoders corresponding to different users, the input vector
is distributed as
. The matrix
represents the
sparse signature matrix of Class-
i users, where the
kth column represents the spreading signature of user
k in Class
i. The non-zero entries of
designate the corresponding user-resource mapping, namely, user
k in Class
i occupies resource
n if
. Specifically, we adhere to the regular sparse NOMA paradigm [
37,
38,
39], where, for each Class
i,
, due to the sparsity of
, only a few of the users’ signals collide over any given orthogonal resource. The regularity assumption generally dictates that each column of
(respectively, row) has
exactly (respectively,
) non-zero entries. However, for notational simplicity, we assume henceforth that
, while noting that extension of the analysis to the case where
and
have a different fixed number of non-zero column entries is straightforward (hence omitted). Therefore,
d takes the role of the
system’s sparsity parameter. We assume here that
is chosen so that
,
, in order to avoid degenerate settings. The non-zero entries of
are assumed to be independent and identically distributed (i.i.d.), but may otherwise arbitrarily reside on the unit circle in the complex plane, in complete adherence to [
38,
39]. Thus, the normalization in (
1) ensures that the columns of
have unit norm. We also assume here that the signature matrices
and
are perfectly known at the receiving end and uniformly chosen, respectively, randomly and independently per each channel use and each user class
i, from the set of
-regular matrices. This assumption is only introduced here for the sake of concreteness and the setting, in fact, generalizes verbatim to the case where the signature matrix selection process is stationary and ergodic. Finally,
denotes the
N-dimensional circularly symmetric complex additive white-Gaussian-noise (AWGN) vector at the receiving end. Thus, the parameter
in (
1),
, designates the received signal-to-noise ratio (SNR) of each of the users in Class
i.
A key additional underlying assumption, which follows [
38,
39], is that the signature matrices
can be associated with the
adjacency matrices of certain random
-semiregular bipartite (factor) graphs
, with special properties to be stated next. To this end, we first introduce the following two definitions.
Definition 1 (Locally Tree-Like Graphs [
50,
51])
. Let denote the space of rooted isomorphism classes of rooted connected graphs. A sequence of random graphs , , in the space , with a root vertex chosen uniformly at random from the vertex set of , is said to converge locally (weakly) to a certain random rooted tree , if, for each , the sequence of balls with radius r (in graph distance) around converges in law to in the space . A more precise mathematical definition can be found, e.g., in [50,51]. Definition 2 (Bipartite Galton–Watson Tree (BGWT) [
50])
. A Galton–Watson tree (GWT) with degree
distribution is a rooted random tree obtained by a Galton–Watson branching process, where the root has offspring
distribution and all other genitors have offspring distribution F, where (assuming )A BGWT with degree distribution and parameter p is obtained from a Galton–Watson branching process with alternated
degree distribution. Namely, with probability p, the root has offspring distribution , all odd generation genitors have an offspring distribution G (related to analogously to F) and all even generation genitors (apart from the root) have an offspring distribution F. Similarly, with probability , the root has offspring distribution and the offspring distributions of all odd and even generation genitors are switched. See [50] for a more elaborate discussion. We now further assume that the random graphs associated with the signature matrices are locally tree-like and converge in the large-system limit to BGWTs having degree distribution and parameter as a weak limit, where . The term “large-system limit” refers here to the regime where while fixing , . We use henceforth the shorthand notation “” to designate this limiting regime.
From a practical perspective, it is important to note here that the aforementioned locally tree-like property is valid, e.g., for regular LDPC codes [
50,
52] and it essentially implies that, for large dimensions, short cycles are rare, which facilitates the use of iterative near-optimal multiuser detection algorithms (while applying MPAs over the underlying factor graphs). Moreover, the sparse signature matrices can in fact be constructed as weighted parity-check matrices of regular LDPC codes, which we, in fact, employ using Gallager’s construction [
53] to produce the finite dimensional simulation results in
Section 5 (see therein).
4. Extreme-SNR Characterization
To complement the analytical characterization of the achievable rate region by means of the bounds in Propositions 1–3, we focus on the achievable sum rate and provide, in this section, an in-depth investigation of the respective bounds in extreme-SNR regimes. Although all bounds take an explicit closed form, the corresponding expressions are still rather involved. Therefore, the main advantage of the extreme-SNR characterization is that, by means of certain simplifying approximations (appropriate for extreme SNRs), it leads to valuable insights that are otherwise hard to obtain, as is shown in the sequel. In particular, this characterization demonstrates the impact of the parameters
used in Propositions 1 and 2 on the tightness of the respective lower and upper bounds on the achievable sum rate. For symmetric settings (see
Section 3.4), it further allows us to identify which of the two upper bounds on the achievable sum rate stated in Propositions 2 and 3 is tighter; hence, the corresponding outer bound is more useful for characterizing the achievable region in extreme-SNR regimes. For the low-SNR regime, we specify conditions under which the former bound of Proposition 2 is tighter, while, for the high-SNR regime, it turns out that Proposition 3 generally provides a tighter bound in symmetric overloaded settings.
Our analysis examines the achievable sum rate as a function of
(the average SNR), as defined in (
19). Furthermore, without loss of generality, we assume henceforth that
for some
. This immediately implies (cf. (
19)) that
where
Starting with the low-SNR regime, the achievable sum rate is approximated as
where
denotes the low-SNR slope,
is the minimum system average
that enables reliable communications and
[
41]. The average SNR and
are related via
Let
denote the achievable sum rate expressed as a function of
in
nats/channel use per dimension. Then, the minimum
that enables reliable communications and the low-SNR slope read [
41]
where
and
denote the first and second derivatives at zero of
(note that (
22), (
24) and (
25) tacitly assume that the minimum
corresponds to the point of vanishing rate; a short discussion on this aspect is provided in
Appendix D).
Turning to the high-SNR regime, we approximate the achievable sum rate as [
41]
where
denotes the high-SNR slope (multiplexing gain) and
denotes the high-SNR power offset. Note that we use here a slightly different high-SNR approximation than the one originally proposed in [
41], in the sense that it relies on approximating the sum rate as a function of
(rather than
); consequently, the resulting high-SNR power offset differs by a
term when compared to [
41].
In the following sections, we employ the above approximations for the lower and upper bounds on the achievable sum rate and derive the corresponding extreme-SNR parameters. Specifically, we consider the sum-rate bounds in (
10) and (
12), which, when rewritten as functions of
, read
where we introduce the notation
For symmetric settings, we additionally rely on ([
38], Proposition 5; see also [
39], Proposition 4) for the extreme-SNR characterization of the sum-rate bound in (
14).
Furthermore, note that the
sum capacity (specifying the ultimate performance limit) is given by the sum-rate constraint in (
13), which, when expressed as a function of
, boils down to
Hence, the corresponding low-SNR parameters are
while the high-SNR parameters read
4.1. The low-SNR Regime
Starting with the sum-rate lower bound (
27), its low-SNR characterization is summarized in the following proposition.
Proposition 4. The low-SNR parameters of the asymptotic sum-rate lower bound (27) readwhere, as in Proposition 1, and . As implied by Proposition 4, the sum-rate lower bound optimization with respect to
(see
Section 3.2) takes a more explicit form in the low-SNR regime. Specifically, the low-SNR slope (
34) can be optimized by choosing
such that the denominator therein is minimized; namely, by setting
To demonstrate the usefulness of this observation, while simplifying the discussion, let us consider the symmetric setting where
. Then, the optimal choice for
reduces to
which yields
Substituting back into (
34), while accounting for the class-symmetry and setting
we obtain (following some algebra)
Note that
is strictly lower, for all
, than the corresponding low-SNR slope of the optimum spectral efficiency (total throughput) in a
single-class setting with load
and an SNR that equals
, as specified in Theorem 1, which reads ([
38], Proposition 5; see also [
39], Proposition 4)
In fact, (
40) also specifies the low-SNR slope of the sum-rate upper bound for the “symmetric construction”, as stated in Proposition 3 (cf. (
14)). Hence, (
39) and (
40) provide compact lower and upper bounds on the low-SNR slope of the achievable sum rate under class symmetry. Another interesting comparison is with the low-SNR slope of the maximum achievable sum rate with RS-CDMA, representing a practical manifestation of random
dense NOMA (see
Appendix G for a derivation of the RS-CDMA achievable region). For the symmetric setting, this slope reads (following (
A110), (
A114) and ([
41], Equation (147)))
which lets us conclude that
, as long as
hence, regular sparse NOMA is guaranteed to strictly outperform RS-CDMA in the low-SNR regime as long as (
42) is satisfied. Note, e.g., that setting
immediately implies that (
42) is satisfied for all
.
Turning to the sum-rate upper bound (
28), its low-SNR characterization is summarized in the following proposition.
Proposition 5. Let denote the setwhere, as in Proposition 2, and . Then, for , the low-SNR parameters of the asymptotic sum-rate upper bound (28) readFurthermore, the sum-rate upper bound (28) is not useful in the low-SNR regime for . Analogously to the characterization of the lower bound in Proposition 4, the low-SNR slope (
45) can be optimized by choosing
such that the denominator therein is maximized; namely, by setting
Note that, for
, the low-SNR slope
is strictly smaller than
(recall that
); hence, the upper bound (
28) is useful in this region of the parameters.
Additional insight can be gained by focusing again on the symmetric setting
. In such case, we obtain that the optimal choice for
simplifies to the following:
Note that, in fact, for
, the condition that specifies the set
simplifies to
. Then, rewriting the low-SNR slope (
45) as
we conclude that the sum-rate upper bound (
28) implied by Proposition 2 is
tighter in the low-SNR regime than the corresponding simple “symmetric construction“ bound in (
14), as long as there exists a pair of constants
such that (cf. (
40))
Note that the existence of such constants is not guaranteed for all choices of the underlying parameters. To see this, let
and let us recall that, since
, the ratio
must satisfy
. Then, (
49) can be rewritten as
or, equivalently,
where
and
Now, a careful examination of the constants
,
and
reveals that a
necessary condition for (
51) to hold is
That is, the sum-rate upper bound (
28) can be tighter than the corresponding “symmetric construction“ upper bound in (
14) only if
is relatively low. To determine
sufficiency, let us consider the polynomial
. Then, it can be verified that, subject to condition (
55), the coefficients
,
and
satisfy
Let
and
denote the roots of
, namely,
Then (noting that
),
and it turns out that, in addition to (
55), condition (
51) can only hold if the following additional conditions are satisfied:
4.2. The High-SNR Regime
As in
Section 4.1, we start with the sum-rate lower bound (
27) and derive its high-SNR characterization while focusing on the case where at least one of the two user classes is overloaded. For concreteness, we assume henceforth that
. Our main observations are summarized in the following proposition.
Proposition 6. Assume that . Then, the high-SNR parameters of the asymptotic sum-rate lower bound (27) readandwhere , , denotes the high-SNR power offset of a single-class
setting with load (corresponding to Theorem 1), which reads ([38], Proposition 5) Remark 1. Analogous results for the case where the load is constrained to satisfy , as well as the case where , can be straightforwardly derived following similar lines to the proof in Appendix E. The details are omitted for conciseness. Note also that, for the case where both
user classes are underloaded (i.e., ), the corresponding derivation indicates that the sum-rate lower bound is too loose in the high-SNR regime and fails to capture the correct high-SNR slope. Remark 2. As indicated by (60) and (61), in sheer contrast to the low-SNR regime, the high-SNR parameters of the sum-rate lower bound do not
depend on the parameter κ for . The high-SNR characterization of the sum-rate upper bound (
28) is summarized next.
Proposition 7. Assume that . Then, the high-SNR parameters of the asymptotic sum-rate upper bound (28) readandwhere , , are specified in (62). Remark 3. Note that, for , the high-SNR parameters of the sum-rate upper bound turn out to be independent of the choice of . Derivations along the lines of Appendix F reveal that, for , the sum-rate upper bound follows the correct high-SNR slope only if , namely, when the (overall) system operates in the underloaded (or fully loaded) regime, which is of lesser interest in the NOMA framework. Furthermore, the analysis shows that, for all other choices of and (expect for ), the sum-rate upper bound (28) becomes too loose for the high-SNR regime and does not capture the correct high-SNR slope. To gain more insight, let us consider the symmetric overloaded setting where
. In such case, the high-SNR slope equals unity for both the lower and upper sum-rate bounds, namely,
Turning to the high-SNR power offset, note that, in the symmetric overloaded setting, one obtains (cf. (
21))
while
Hence, we conclude, from (
61) and (
67), that
Similarly, considering the high-SNR power offset of the sum-rate upper bound (
64), we obtain
The difference between the offsets (
68) and (
69) specifies the horizontal gap (in logarithmic scale) between these lower and upper bounds on the achievable sum rate in the high-SNR regime. However, it is also insightful to compare
to the corresponding high-SNR power offset induced by the “symmetric construction” outer bound of Proposition 3 (see (
14)). This offset is simply given by (
62), while substituting
instead of
, and reads
Note that
which can be verified to always take on negative values for
and
(in fact, in such case,
is even strictly smaller than
(
32)). Hence, we conclude that the “symmetric construction” sum-rate upper bound is tighter in the high-SNR regime for symmetric settings, when
. This observation is corroborated by the numerical results presented in
Section 5.
5. Numerical Results
In this section, we present some numerical results that demonstrate the effectiveness of the inner and outer bounds derived in
Section 3 for assessing the potential performance gains of regular sparse NOMA. The focus here is on
overloaded settings (
), corresponding to use cases where NOMA is of particular interest, while noting that the bounds also generally apply to underloaded regimes. The sparsity parameter
d of the signature matrices was set throughout to
, since, as shown in [
38,
39], it induces the highest achievable individual (per class) throughputs for regular sparse NOMA. Our numerical investigation complements the
analytical observations of
Section 4, by considering more general SNR regimes.
Figure 1 depicts the inner and outer bounds on the achievable region (
8) in the large-system limit, for the case where
and
(cf. (
10) and (
12)). The corresponding noise-split parameters were set to
,
and
(these values were numerically verified to be close to optimal). The SNRs of the two user classes were fixed to
and
. The cautious reader should note that this choice for the noise split parameters
is, by no means, a contradiction to the condition specified in Proposition 5 for the usefulness of the outer bound (see (
43)). This is since Proposition 5 only applies to the low-SNR regime, while, in
Figure 1, the two SNRs
do not yield a low average SNR setting. In fact, it can be numerically verified that choosing
in the low-SNR regime, which falls outside the region
in (
43), leads to a very loose upper bound on the achievable sum rate, significantly higher than the corresponding Cover–Wyner sum-rate upper bound in (
13). Hence, this choice is not useful in the low-SNR regime as predicted by Proposition 5 (see also the discussion in
Section 4.1). The boundary of the inner bound is represented
Figure 1 by the dashed black line, while the boundary of the outer bound is designated by the dash–dotted black line. Note that the two bounds differ only in the sum-rate constraint, while sharing the class–individual rate constraints (which are characterized in full via Theorem 1, as discussed in
Section 3.1). To assess the tightness of the bounds,
Figure 1 also shows an estimation of the boundary of the achievable region (
8) for a regular sparse NOMA system with a large but
finite number of orthogonal dimensions
. Here, all rate constraints of the corresponding region were evaluated based on Monte Carlo (MC) simulations of 1000 sparse matrix realizations using Gallager’s construction for parity-check matrices of LDPC codes [
38,
39,
53] (let us recall that the main motivation for the derivation of the inner and outer bounds on the achievable region is the fact that an exact analytical asymptotic result for the sum-rate constraint of this region is
still lacking; hence, we resorted to MC simulations). The boundary of this region is represented by the solid blue line. Note that both inner and outer bounds are rather tight and provide a very good assessment of the achievable region (specifically, the limiting upper bound on the sum-rate constraint is higher than the simulated constraint by about only
, while the corresponding lower bound is lower by less than
).
Figure 1 also indicates that the asymptotic class–individual rate constraints provide an
extremely tight assessment of the corresponding throughputs in large finite-dimensional systems, as already shown in [
38,
39]. We further note that extensive numerical investigations indicate that the EPI-based bounds become tighter as the powers allocated to each class of users become more unbalanced, which stems from the nature of the EPIs. This observation is further demonstrated in the sequel.
For the sake of comparison,
Figure 1 also includes the achievable regions of two other system settings of interest. The first region corresponds to dense code-domain NOMA, represented here by RS-CDMA. The corresponding boundary of the achievable region in the large-system limit is designated by the solid green line (see (
A119) in
Appendix G). The second region corresponds to a setting where the signatures of individual users are taken as the columns of a
single regular sparse matrix, where each user occupies
resources and each resource is utilized by exactly
users. No regularity is imposed within either of the two classes of users and the signature columns are allocated to the users in each class uniformly at random. The induced signature matrices
and
for each class of users (after reordering of the columns) are therefore
no longer row-regular. The boundary of the corresponding achievable region, based on MC simulations (while fixing
), is designated by the solid purple line (referred to as ‘Single
’). Finally,
Figure 1 also shows the Cover–Wyner region (
13). The boundary of this region is designated by the solid red line.
A comparison of all achievable regions in
Figure 1 lets us conclude the following (with the aid of additional investigations omitted for conciseness): Irregularity induces a loss in the achievable rate region. This is clearly observed when comparing the achievable region with a
single regular sparse signature matrix construction (‘Single
’) and the MC-based achievable region with two separate regular constructions of the signature matrices for the two classes of users. The superiority of separate constructions is also observed for the
class–individual rate constraints when considering the inner bound (
10). Comparing the regular sparse construction in (
1) and dense code-domain NOMA (here, RS-CDMA), the MC simulation results indicate that the corresponding achievable region strictly includes the achievable region with dense code-domain NOMA, in full agreement with the analytical observations made in [
38,
39] with respect to single-class systems. Furthermore, when the class-powers are far enough apart, this even holds for the inner bound (
10), as shown in
Figure 1, implying that regular sparse NOMA indeed strictly outperformed dense code-domain NOMA (RS-CDMA) in this setting. Finally, considering the outer bound on the achievable region (
12),
Figure 1 shows that, for power-unbalanced settings, it provides a good assessment of the gap to the ultimate performance limits, as designated by the Cover–Wyner capacity region.
The impact of the SNR balance between the two classes of users is illustrated in
Figure 2. A load-symmetric setting is considered where
and the received SNR of Class 1 users was set to
. The received SNR of Class 2 users was set to
, where
. The figure depicts the sum-rate constraint of the rate region for the settings and bounds considered in
Figure 1 as a function of
. The lower and upper bounds, according to (
10) and (
12), were numerically optimized, respectively, by fine-tuning the values of
,
and
. In view of the load-symmetry in this example, the “symmetric construction” upper bound in (
14) is also included in the figure (designated by the dotted line). Similar conclusions to the ones discussed with respect to
Figure 1 can be reached. The tightness of all three bounds is clearly demonstrated in the low
region. In particular, note that a threshold value for
is observed, below which the sum-rate lower bound in (
10) already surpasses the dense code-domain NOMA achievable sum rate (thus guaranteeing the superiority of regular sparse NOMA). The results also indicate that the sum-rate upper bound in (
12) is meaningful and resides below the Cover–Wyner sum capacity, when
lies below a threshold (while, otherwise, it becomes too loose and ceases to be useful). Note that, in this load-symmetric setting, the simple “symmetric construction” upper bound in (
14) turns out to be the tightest for most values of
. In fact, by Jensen’s inequality, it also provides here a tight upper bound for the ‘Single
’ construction. However, neither of the two upper bounds (in (
12) or (
14)) is universally superior. Although
Figure 2 does not represent an extreme-SNR regime per se, the main observations
qualitatively corroborate the conclusions of the analytical examination in
Section 4.
Finally, the preceding observations are further corroborated in
Figure 3, where a setting with
,
and
is considered (similarly to
Figure 1). Here, the sum-rate constraints depicted in
Figure 2 (excluding the “symmetric construction” upper bound (
14)) are plotted as a function of the system average
(see (
19) and (
23)). The tightness of the derived bounds over a wide range of
values is clearly demonstrated, as well as the superior performance of regular sparse NOMA compared to dense code-domain NOMA (which yields lower sum rates for all
values). Again, the results are in full agreement with the conclusions of
Section 4 regarding extreme-SNR regimes.