Next Article in Journal
Turbulent Flow over Confined Backward-Facing Step: PIV vs. DNS
Previous Article in Journal
Numerical and Experimental Study of the Blade Profile of a Savonius Type Rotor Implementing a Multi-Blade Geometry
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Approximation of Capacity for Downlink Multi-User System with Combination of Precoding and NOMA Methods

1
Faculty of Radio-Electronic Engineering, Le Quy Don Technical University, 236 Hoang Quoc Viet, Ha Noi 100000, Vietnam
2
Faculty of Electronics and Telecommunications, Electric Power University, 238 Hoang Quoc Viet, Ha Noi 100000, Vietnam
3
Faculty of Wireless Communications, Telecommunications University, 101 Mai Xuan Thuong, Nha Trang 650000, Vietnam
*
Author to whom correspondence should be addressed.
Appl. Sci. 2021, 11(22), 10578; https://doi.org/10.3390/app112210578
Submission received: 27 August 2021 / Revised: 2 November 2021 / Accepted: 5 November 2021 / Published: 10 November 2021
(This article belongs to the Section Electrical, Electronics and Communications Engineering)

Abstract

:
Enhancing performance of downlink MU systems is an attractive and important research for future wireless systems. The non-orthogonal multiple access (NOMA) method was proposed to improve the performance of MU systems. In order to further improve the outage probability (OP) and ergodic capacity (EC) of downlink NOMA MU systems, we propose the combination of precoding and NOMA methods, and then the OP and EC of MU systems with our novel method are derived in scenarios of perfect and imperfect successive interference cancellation (SIC) scheme. Moreover, the closed-form expression of OP and EC for both scenarios is theoretically derived and compared with Monte Carlo simulations. The results show that, the analysis method is accurate, and the proposed combining precoding and NOMA can further enhance the performance of MU systems in comparing with the original orthogonal multiple access method.

1. Introduction

The fifth generation (5G) wireless networks is deployed for actualizing the full potential of the Internet of Things (IoT). The key idea of IoT is a large number of devices which connect to the internet, collect and share data together. As mentioned in [1], the big challenge in IoT implementation is to obtain reliable communication under the condition of low cost and limited spectrum. Owing to superior spectral efficiency of the non-orthogonal multiple access (NOMA), it is a promising multiple access technique for future wireless systems, especially the NOMA is considered to be applied to 5G mobile networks [2,3,4].
Being different to another orthogonal multiple access (OMA) method, such as code division multiple access (CDMA), frequency division multiple access (FDMA) and so on, the NOMA method uses the power domain for multiple access technique at transmitters, and it applies successive interference cancellation (SIC) method for detecting the desired signals at users site [5]. The SIC separates superimposed symbols and mitigates the inter-user interference while operating at users. In the downlink NOMA MU system, the users that has better channel conditions are provided by less transmit power, whereas the users that has worse channel conditions are allocated more transmit power [6,7]. This strategy can keep the balance between the performance of MU systems and the fairness of every user [8]. In the other hand, the NOMA MU system allocates transmit power based on priority of users, the user with higher priority is provided by more transmit power, whereas the user with lower priority is allocated less transmit power [9,10].
The previous researches on NOMA downlink MU systems are summarized as follows. In [11], Ding et al. investigated the simple NOMA downlink MU system, in which all users are located randomly, and the approximated expressions of outage probability (OP) and ergodic capacity (EC) of the system are derived. In [12], Yang et al. researched on downlink and uplink of MU NOMA systems. The authors proposed the dynamic power allocation based on QoS of different users was proposed. According to the obtained results, it is indicated that more whippiness to fairness performance of all users is provided based on the proposed dynamic power allocation method. The OP and EC were discussed under the condition of fairness of quality for the users in [13,14]. The authors in [15,16] analyzed the NOMA MU—MIMO systems, and shown that the performance of NOMA MU—MIMO systems is improved when MU are gathered into a cluster.
Throughout the previous works, the throughput and the bandwidth efficiency of NOMA systems are improved, furthermore, many billions electronic devices are provided an ultrahigh connectivity by the non-orthogonal property of NOMA technology. Moreover, comparing with another multiple access method such as: sparse-code multiple access, MU shared access, pattern-division multiple access, the NOMA MU systems has a low-complexity [3]. Therefore, the NOMA technology is suitable for downlink MU systems. On the other hand, the precoding in NOMA multiple input single output (MISO) systems was proposed and analyzed [17]. However, every cluster was assumed to consist of only two users, we are going to extend this work in order to propose a system that can serve more end-users. We have proposed and analyzed the dual hops MU system with precoding at the first hop and NOMA at the second hop in the short paper [18], and the combination of NOMA and beamforming for downlink MU systems in [19,20]. However, these systems were analyzed under assumption of perfect SIC, perfect channel state information (CSI), perfect beamforming, and completely decoding superposition signals. It is almost impossible in practical applications, therefore we are going to analyze the proposed system with combination of precoding and NOMA under the condition of imperfect SIC. Furthermore, the approximated equations of not only the outage probability but also the ergodic capacity are derived and compared in both scenarios: perfect and imperfect SIC. The contributions of this paper can be summarized as follows:
  • The downlink NOMA system with the base station (BS) of multiple antennas and the user of single antenna is analyzed. Multiple users become an one cluster according to their location and Zero-forcing based precoding is applied at the BS to mitigate the inter-cluster interference.
  • The approximated equations of OP and EC are derived for every user for evaluating the proposed method based on perfect and imperfect SIC. The proposed approximated expressions are verified by simulation results.
  • The EC of proposed method is calculated and compared with the OMA method to indicate the better one via both theoretical analysis and simulation in cases of perfect and imperfect SIC.
The organization of the rest of paper is as follows. Section 2 briefly depicts the downlink NOMA MU-MISO system and its channel model. The approximation of EC and OP is proposed in Section 3. The proposed method is evaluated by numerical results that are depicted in Section 4. Finally, the conclusion of paper is given in Section 5.
Notations: The notations which are used in this paper are denoted as: Bold upper letters are the matrices, whereas bold lower letters indicate the column vectors, the conjugate transpose operation is denoted by ( · ) H and ( · ) . A vector norm is denoted by · , whereas | · | denotes the absolute value. Furthermore, the E { · } and [ X ] T denote the average operator and the transpose matrix of X , respectively. f X ( · ) and F X ( · ) respectively denote the probability density function (PDF) and the cumulative distribution function (CDF).

2. System Model

The system model of downlink MU system with combination of precoding and NOMA is presented in Figure 1, the BS is equipped with M 2 antennas and zero-forcing based precoding (ZFBP) method to serve the M user clusters, while every user has only a single antenna because of its limited size. All users are simply clustered by user location tracking algorithms or spatial direction method such as Global Positioning System (GPS) technique. The number of users in every cluster, N, is assumed to be the same.
The precoding matrix w m according to ZFBP method is designed for the mth cluster in order to remove the inter-cluster interference as follows. The nth user in the mth cluster is called the ( m , n ) th user, and the channel matrix between the ( m , n ) th user and the BS is denoted by h m , n = [ h m , n , 1 , h m , n , 2 , , h m , n , M ] T C M × 1 with m { 1 , , M } and n { 1 , , N } . h m , n , i CN ( 0 , Ω m , n ) denotes the channel coefficient, and E { | h m , n , i | 2 } = Ω m , n is the variance of the channel gain. All channels are assumed to be quasi-static independent and identically distributed (i.i.d.) and block fading. For the purpose of maximizing the signal to noise ratio (SNR), the precoding matrix w m can be expressed as the projection of h m = [ h m , 1 , h m , 2 , , h m , N ] C M × N in the direction of interference user in the mth cluster. Mathematically, the precoding matrix w m is represented in Equation (1).
w m = B m h m B m h m ,
where B m = I N H m ( H m H H ) m 1 H m H , I N denotes a N × N identity matrix and the structure of channel matrix H m is given in detail as follows in Equation (2):
H m = [ h 1 , h 2 , , h m 1 , h m + 1 , , h M ] T .
We assume that the CSI and the precoding at the BS are perfect. Hence, we have h m H w j = 0 , m j . It means that, the ZFBP lets the complexity of the system be high. However, all users in the mth cluster don’t receive signals of user in the other clusters, they receive signals of all users in the same cluster. Consequently, the NOMA method should be applied to cancel the inter-user interference (IUI).
Based on the principle of NOMA method, all users are assumed to determine the order of decoding signal according to the channel gains. Without loss of generality, the distances between the BS and users are assumed to be sorted as d m , 1 > d m , 2 , , > d m , N , therefore, the channel gains of these users satisfies the following condition in Equation (3).
| w m h m , 1 | 2 | w m h m , 2 | 2 , , | w m h m , N | 2 .
Hence, according to the principle of NOMA, the power allocation coefficient of every user is sorted by Equation (4):
a m , 1 a m , 2 a m , N .
The superposition code which consists of signals of all users in the mth cluster is defined by x S , m = [ x m , 1 , , x m , N ] T , where x m , n denotes the signal of the ( m , n )th user, and is normalized with zero mean unit variance. The superposition code are multiplied by the precoding matrix, w m , at the output antenna following the principle of ZF method. The transmit power of all antennas of BS is fixed, E { | x S , m | 2 } = P S , the power allocation coefficient for the ( m , n ) th user is denoted by a m , n and satisfies condition n = 1 N a m , n = 1 . Therefore, the signal of mth cluster which is transmitted from every antenna of the BS, is described as follow in Equation (5):
x S , m = w m n = 1 N a m , n P S x m , n .
Let n m , n CN ( 0 , σ m , n 2 ) be an i.i.d additive white Gaussian noise (AWGN) at the ( m , n ) th user. In the case of perfect precoding, the received signal of the ( m , n ) th user includes the signal of all users in the mth cluster in Equation (6):
y m , n = h m , n w m i = 1 N a m , i P S x m , i + n m , n = h m , n w m a m , n P S x m , n desired signal of ( m , n ) th user + h m , n w m i = n + 1 N a m , i P S x m , i interference from the other users + h m , n w m k = 1 n 1 a m , k P S x m , k interference due to imperfect SIC + n m , n .
The term h m , n w m k = 1 n 1 a m , k P S x m , k is equal to zero in the case of perfect SIC.
As mentioned above, although the ZFBP can remove the inter-cluster interference, the intra-cluster interference meaning the interference between the users which are located in the same cluster, also called IUI, is still remained. Hence, we propose to apply the SIC technique to cancel the IUI. Owing to SIC principle, at receiver site, the interference of users whose channel gain is worse is deleted. According to above assumption of order, the ( m , n ) th user should remove the interference of the ( m , 1 ) , , ( m , n 1 ) th users. Let the signal to interference plus noise ratio (SINR) be denoted by γ , and the SINR of ( m , n ) th user is γ m , n , from Equation (6) we have Equation (7):
γ m , n = P S a m , n | h m , n w m | 2 i = n + 1 N P S a m , i | h m , n w m | 2 + σ m , n 2 .
Because the ( m , N ) th user apply the SIC processing to remove the interference signals of all users in the same cluster, the SNR of ( m , N ) th user is represented by Equation (8):
γ m , N = P S a m , N | h m , N w m | 2 σ m , N 2 .

3. Performance Analysis

3.1. OP of Perfect SIC

The MU-MISO system with our proposed combination of precoding and NOMA approaches has modeled in the previous section, in this section, we start analyzing the performance of system with deriving the outage probability of ( m , n ) th user. The data rate from the BS to every user which is denoted by r, is assumed to be the same in the sense of fairness of all users. Therefore, the outage event occurs when the instantaneous capacity between the BS and the user which is calculated by log 2 ( 1 + γ m , n ) , is below r. The OP is described as follows.
OP m , n = Pr γ m , n γ th .
where γ th = 2 r 1 denotes the outage threshold.
From Equation (7), we can rewrite Equation (9) by Equation (10):
OP m , n = Pr P S a m , n | h m , n w m | 2 i = n + 1 N P S a m , i | h m , n w m | 2 + σ m , n 2 γ th .
Let
b m , n = i = n + 1 N a m , i , X m , n = | w m h m , n | 2 ,
and then Equation (10) is rewritten as Equation (11):
OP m , n = Pr X m , n n : 1 ÷ N γ th P S a m , n γ th b m , n = θ i .
From Equation (11), we can recognize that the outage event always happens in case of a m , n γ th b m , n , thus, more transmit power should be allocated to users whose channel gains are weak.
The ordered variable X m , n of PDF function is represented by Equation (6.58) [21] in Equation (12):
f X m , n ( x ) = N ! ( N n ) ! ( n 1 ) ! j = 0 N n ( 1 ) j N n j f X k ( x k ) F X k ( x k ) n + j 1 ,
where Equations (13) and (14):
f X k ( x k ) = 1 Ω k exp x k Ω k ,
F X k ( x k ) = 1 exp x k Ω k .
Replacing Equations (13) and (14) into Equation (12), and then using the approximation of binomial expansion, the PDF function for the SINR of ( m , n ) th user is obtained. Owing to the definition of OP, e.g., OP = 0 θ f X m , n ( x ) d x , the approximation of OP of the ( m , n ) th user is depicted by Equation (15):
OP m , n = N ! ( N n ) ! ( n 1 ) ! k = 0 N n ( 1 ) k n + k N n k 1 exp θ P S Ω m , k n + k ,
with k n N , θ = max i = 1 : N { θ i = γ th ( a m , n γ th b m , n ) } .

3.2. EC of Perfect SIC

In this section, we are going to derive the approximated expression of data rate of MU NOMA system, which is defined as the total rate of all users which are served. The instantaneous data rate based on the Claude Shannon theory of ( m , n ) th user is represented by Equation (16):
R m , n = log 2 1 + P S a m , n | w m h m , n | 2 i = n + 1 N P S a m , i | w m h m , n | 2 + σ m , n 2 , = log 2 1 + | w m h m , n | 2 ρ i = n + 1 N a m , i + a m , n log 2 1 + i = n + 1 N ρ a m , i | w m h m , n | 2 ,
here ρ = P S σ m , n 2 .
From Equation (16), the EC of the ( m , n ) th user is calculated as in Equation (17):
R ¯ m , n = E { R m , n } = E log 2 1 + | w m h m , n | 2 ρ i = n + 1 N a m , i + a m , n E log 2 1 + i = n + 1 N ρ a m , i | w m h m , n | 2 .
The first expectation of a random variable X is defined by Equation (18):
E [ log 2 ( 1 + X ) ] = 0 log 2 ( 1 + x ) f X ( x ) d x ,
where f X ( x ) is PDF of X with X { X , Y } and
X = P S | w m h m , n | 2 , Y = i = n + 1 N P S a m , i | w m h m , n | 2 .
Using the integration-by-parts method we can rewrite Equation (17) as Equation (19):
R ¯ m , n = 1 ln 2 0 1 F X x 1 + x d x 1 ln 2 0 1 F Y y 1 + y d y ,
where the F X ( x ) and F Y ( y ) are the CDFs of the random variables X and Y, respectively. From Equation (19) and above suppositions, the EC depicted as Equation (20):
R ¯ m , n = n = 1 N N n ( 1 ) n 1 ln 2 J 1 ( x ) n = 1 N N n ( 1 ) n 1 ln 2 0 1 1 + y exp y i = n + 1 N ρ a m , i Ω m , n d y ,
where Equation (21):
J 1 ( x ) = 0 1 1 + x exp x ρ i = n + 1 N a m , i + a m , n Ω m , n d x .
To solve Equation (20), the following equation is applied Equation (3.352.4) [22] in Equation (22):
0 1 x + α exp ( μ x ) d x = exp ( α μ ) Ei ( μ β ) ,
with α = β = 1 and Ei ( x ) = x exp ( t ) x t d t denotes the exponential integral function [22]. And then, the approximated expression of the EC of ( m , n ) th user is given in Equation (23).
R ¯ m , n = n = 1 N N n ( 1 ) n 1 ln 2 exp 1 ρ i = n + 1 N a m , i + a m , n Ω m , n Ei 1 ρ i = n + 1 N a m , i + a m , n Ω m , n n = 1 N N n ( 1 ) n 1 ln 2 exp 1 i = n + 1 N ρ a m , i Ω m , n Ei 1 i = n + 1 N ρ a m , i Ω m , n .
Finally, the EC of the mth cluster is the sum of EC of all users in this cluster Equation (24):
R ¯ m = n = 1 N R ¯ m , n .

3.3. OP of Imperfect SIC

Up to now, the MU MISO system with the proposed method has been analyzed based on the assumption of perfect SIC, however, in practice, it is very difficult to achieve the ideal SIC. The imperfect SIC causes the error in decoding the received superposition code at users. Investigation of imperfect SIC concerns in designing NOMA system, therefore we analyze the proposed method in case of imperfect SIC hereafter.
The term of h m , n w m k = 1 n 1 a k P S x n 1 in Equation (6) depends on the quality of SIC operation, and it is unequals to zero in the case of imperfect SIC. Thus, the instantaneous SINR and the OP of the ( m , n ) th user in this case are respectively represented in Equations (25) and (26), where Δ k = ξ k = 1 n 1 a k P S is the remained power of interference signal and ξ presents the quality coefficient of SIC operation.
γ m , n i m p S I C = P S a m , n | h m , n w m | 2 i = n + 1 N P S a m , i | h m , n w m | 2 + | h m , n w m | 2 ξ k = 1 n 1 a k P S + σ m , n 2 ,
OP m , n i m p S I C = Pr γ m , n i m p S I C γ th = Pr P S a m , n | h m , n w m | 2 ( i = n + 1 N P S a m , i + Δ k ) | h m , n w m | 2 + σ m , n 2 γ th .
Based on the order of channel gains of the users which is represented as in Equation (3) and from Equation (26) we can rewrite the OP of the ( m , n ) th user as in Equation (27):
OP m , n i m p S I C = 1 Pr X m , n n : 1 ÷ N > γ th P S a m , n γ th b k = α k ,
where b k = i = n + 1 N P S a m , i + Δ k , k { n : 1 ÷ N } , and
α k = max n : 1 ÷ N γ th P S a m , n γ th b k , k { n < k < N } .
As shown in Equation (27), the outage always occurs if P S a m , n < γ th b k , it means that the transmit power which is allocated to the ( m , n ) th user, should be large enough. Furthermore, the PDF function of X m , n is depicted by Equation (6.58) [21] in Equation (28):
f X m , n ( x ) = N ! ( N n ) ! ( n 1 ) ! f X k ( x k ) F X k ( x k ) n 1 1 F X k ( x k ) N n = N ! ( N n ) ! ( n 1 ) ! j = 0 N n ( 1 ) j N n j f X k ( x k ) F X k ( x k ) n + j 1 .
Using Equation (28), we can rewrite the OP in the case of imperfect SIC as follows in Equation (29):
OP m , n i m p S I C = N ! ( N n ) ! ( n 1 ) ! k = 0 N n ( 1 ) k n + k N n k 1 exp α k P S Ω m , n n + k .
where n k N .

3.4. EC of Imperfect SIC

From the instantaneous SINR given in Equation (25), we have the instantaneous capacity of the ( m , n ) th user is represented by Equation (30):
R m , n i m p S I C = log 2 1 + γ m , n i m p S I C = log 2 1 + P S a m , n | h m , n w m | 2 ( i = n + 1 N P S a m , i + Δ k ) | h m , n w m | 2 + σ m , n 2 , = log 2 [ ( i = n + 1 N P S a m , i + Δ k ) + P S a m , n ] | h m , n w m | 2 + σ m , n 2 ( i = n + 1 N P S a m , i + Δ k ) | h m , n w m | 2 + σ m , n 2 ,
where Δ k = ξ k = 1 n 1 a k P S . From Equation (30), we can rewrite the EC as Equation (31).
R ¯ m , n i m p S I C = E log 2 [ ( i = n + 1 N ρ a m , i + Δ k σ m , n 2 ) + ρ a m , n ] | h m , n w m | 2 + 1 E log 2 i = n + 1 N ρ a m , i + Δ k σ m , n 2 | h m , n w m | 2 + 1 .
Let
Z 1 = i = n + 1 N ρ a m , i + Δ k σ m , n 2 + ρ a m , n | h m , n w m | 2 , Z 2 = i = n + 1 N ρ a m , i + Δ k σ m , n 2 | h m , n w m | 2 ,
using integration-by-parts method and Equation (18), the R ¯ m , n i m p S I C is rewritten as follows in Equation (32):
R ¯ m , n i m p S I C = 1 ln 2 0 1 F Z 1 z 1 1 + z 1 d z 1 Q 1 1 ln 2 0 1 F Z 2 z 2 1 + z 2 d z 2 Q 2 .
Note that, according to the Equations (7)–(14) [23] the CDFs of Z 1 and Z 2 can be given as Equation (33):
F Z u ( z ) = 1 n = 1 N N n ( 1 ) n 1 exp n z u Ω m , n ,
with u { 1 , 2 } .
The functions Q 1 and Q 2 are calculated by replacing the CDF in Equation (33) into Equation (32). In Equations (34) and (35):
Q 1 = n = 1 N N n ( 1 ) n 1 ln 2 0 1 1 + z 1 exp z 1 Ξ 1 Ω m , n d z 1 ,
where Ξ 1 = i = n + 1 N ρ a m , i + Δ k σ m , n 2 + ρ a m , n .
Q 2 = n = 1 N N n ( 1 ) n 1 ln 2 0 1 1 + z 2 exp z 2 Ξ 2 Ω m , n d z 2
where Ξ 2 = i = n + 1 N ρ a m , i + Δ k σ m , n 2 . Using Equation (22), we can obtain Q 1 and Q 2 as in Equations (36) and (37):
Q 1 = n = 1 N N n ( 1 ) n 1 ln 2 exp 1 Ξ 1 Ω m , n Ei 1 Ξ 1 Ω m , n ,
Q 2 = n = 1 N N n ( 1 ) n 1 ln 2 exp 1 Ξ 2 Ω m , n Ei 1 Ξ 2 Ω m , n .
Finally, replace Q 1 and Q 2 into Equation (32), we can obtain the EC of the ( m , n ) th user, and then the EC of mth cluster in case of imperfect SIC.
The result of our paper investigated the performance of the considered NOMA system in derivate the closed-form expressions of outage probability and ergodic capacity of each cluster. Based on the total of users, the number of users in each cluster N, and the number of clusters, M of the system can be varied. The derived expressions can not apply to another system.

4. Numerical Results

This section provide numerical results of OP and EC of the proposed combining precoding and NOMA approaches for downlink MU MISO systems. The result of proposed method is compared to the conventional method to validate the derived theoretical analysis in both perfect and imperfect SICs. In most of published works, they indicated that the performance of system is deteriorated when the number of users is more than three because of remained IUI. Configurations and parameters of the system are explained as follows. The channel between the BS and each user follows the Rayleigh distribution. We perform 10 6 independent trials for each Monte-Carlo simulation. In this system, we assume that the terminals are stationary, thus only small-scale fading impacts on the system performance. The average channel gains are modeled as Ω m , 1 = E { | h m , 1 | 2 } , Ω m , 2 = E { | h m , 2 | 2 } and Ω m , 3 = E { | h m , 3 | 2 } . And, the average channel gains of users are chosen as Ω m , 1 = 1 , Ω m , 2 = 2 , Ω m , 3 = 3 . Furthermore, unless otherwise stated, the data rate threshold is set at 1 bit/s/Hz. Consequently, we assume that the number of user in every cluster is three, and the precoding at the BS for each cluster is perfect. The power allocation coefficient is calculated by a n = N n + 1 ψ , with ψ = N ( N + 1 ) 2 to make sure that n = 1 N a i = 1 .
In Figure 2, we investigated the total EC under the impact of the power allocation coefficient of User 1, a 1 , with different values of SNR. We can recognize that, the total EC reaches the maximal value when a 1 = 0.7 in all cases of considered SNR. The User 1 is the farthest from the BS, thus the largest transmit power should be assigned to the User 1 for ensuring the fairness. From the result of this figure, a 1 = 0.7 , a 2 = 0.2 and a 3 = 0.1 are ultilized for further analyzing.
In Figure 3, we present the theoretical and simulation results of OP versus SNR for two cases perfect and imperfect SIC with a 3 = 0.1 , a 2 = 0.2 and a 1 = 0.7 . Although the transmit power of the third user is the lowest, its OP is the lowest. It is explained as, the third user is the nearest from the BS, hence its channel gain is the largest. In addition, the third user applies the SIC processing to cancel interference of all other users, whereas, the first user detects its own signal without SIC operation, and the second user performs the SIC operation to remove the signal of user 1 only and considers the signal of third user as interference. Therefore, its received SNR is much higher than the received SINR of the others. The OP of the first user is the same in two cases because the first user does not employ SIC operation. Moreover, the accuracy between theoretical and simulation results verifies the proposed theoretical analysis in both perfect and imperfect SIC schemes.
Figure 4 represents the OP of the first user when the required data rate is changed, i.e., r = 1, 2, and 3 bit per symbol, these required data rates respectively correspond to BPSK, QPSK and 8-PSK modulations. The OP of the first user is represented, the case of others is similar. As shown in Figure 4, the OP is increased when the required data rate increases, and the Monte Carlo simulation guarantees the correctness of the theoretical results. For the same value of OP, the difference of SNR of BPSK modulation from QPSK and 8-PSK modulations is respectively 3 dB and 5 dB. It means that, increasing the number of information bits in every symbol lets the potential detection of information bit of users reduce. Thus, the NOMA system should to select the reasonable modulations scheme according to the system model.
Figure 5 illustrates the EC of the first and the third users in term of perfect and imperfect SIC to investigate an impact of quality of SIC process on the performance of users. We can recognize that the EC of the third user in the case of perfect SIC outperforms its capacity of imperfect SIC, whereas the EC of the first user is fixed for both cases. The reason is the same as explained above, the first user does not apply the SIC operation to cancel the interference, it considers the signal of other users as the interference signal. Moreover, the EC of the third user in perfect SIC is much higher than the EC of the first user, however it is rapidly decreased when the ξ increases, and it trends to be lower than that of the first user when the ξ becomes higher. It can be said that, the impact of imperfect SIC on the user close to the BS is high, the EC of the nearer user decreases more rapidly in the case of imperfect SIC. Because the quality of SIC significantly affects the performance of users, designing high quality of SIC operation at the receiver is important for NOMA systems.
The EC of the first and the second users in terms of perfect and imperfect SIC is demonstrated in Figure 6. The EC of the first user is higher than that of the second user in both perfect and imperfect SIC. Especially in the case of imperfect SIC, the EC of the second user decreases significantly whereas the EC of the first user is unchanged. This result also demonstrates the saturation of EC in the high SNR region. The reason is, in the high SNR region, the power level of designed signal is high, however the power level of remained interference signal after imperfect SIC operation is also higher. Therefore, the SINR as well as the EC is saturated.
Our proposed method is compared with OMA method in Figure 7 for the both cases perfect and imperfect SIC with ξ = 0.01 and BPSK modulation. Similar to our proposed method, the conventional OMA method is also combined with the beamforming method to cancel the infer-beam interference. As shown in Figure 7, in the case of perfect SIC, the proposed method outperforms the conventional OMA method because of higher spectrum efficiency of NOMA method [24]. However, the proposed method is significantly affected by the remained interference signal due to the imperfect SIC, the total EC of proposed method therefore becomes lower than that of conventional OMA method when the SNR is over 20 dB, it is the trade-off of our proposed method.

5. Conclusions

We have analyzed a MU MISO downlink systems with combining precoding and NOMA approaches, and proposed the OP as well as EC calculation method for all users. Furthermore, the approximation of OP and EC is derived in both perfect and imperfect SIC schemes. The proposed method was compared with the conventional OMA method, and the numerical result indicated that the combining precoding and NOMA approach outperforms the conventional OMA method in case of perfect SIC. Whereas in case of imperfect SIC, the total EC of proposed method decreases and becomes lower than that of conventional OMA method when the SNR is high. Moreover, the theoretical analysis was verified by simulation in both cases of perfect and imperfect SIC.
The ZFBP method was equipped to remove the inter-cluster interference, however, the performance of system was analyzed under the assumption of perfect implementation of ZFBP, and thus the inter-cluster interference was removed clearly. The analysis of system performance under the assumption of imperfect ZFBP will be proposed in our future works. Moreover, another precoding method will be taken into consideration to further improve the performance of downlink MU systems.

Author Contributions

Conceptualization, P.T.H.; methodology, V.V.S.; software, T.M.H.; validation, V.V.S. and T.M.H.; formal analysis, N.T.P. and N.L.C.; investigation, T.M.H.; resources, N.T.P.; data curation, N.T.P.; writing—original draft preparation, V.V.S.; writing—review and editing, N.T.P. and N.L.C.; visualization, V.V.S.; supervision, T.M.H.; project administration, P.T.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.04-2017.311.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare that there is no conflict of interest regarding the publication of this paper.

Abbreviations

The following abbreviations are used in this manuscript:
BSBase station
IUIInter-user interference
MUMultiple users
MIMOMultiple input multiple output
MISOMultiple input single output
NOMANon orthogonal multiple access
OMAOrthogonal multiple access
SICSuccessive interference cancellation
SINRSignal to interference plus noise ratio
SNRsignal to noise ratio
ZFBFZero forcing beamforming

References

  1. Benjebbour, A.; Saito, K.; Li, A.; Kishiyama, Y.; Nakamura, T. Non-Orthogonal Multiple Access (NOMA): Concept and Design. In Signal Processing for 5G: Algorithms and Implementations; Wiley-IEEE Press: Hoboken, NJ, USA, 2016; pp. 143–168. [Google Scholar]
  2. Wang, Y.; Ren, B.; Sun, S.; Kang, S.; Yue, X. Analysis of Non-Orthogonal Multiple Access for 5G. China Commun. 2016, 13 (Suppl. 2), 52–66. [Google Scholar] [CrossRef]
  3. Dai, L.; Wang, B.; Yuan, Y.; Han, S.; Chih-Lin, I.; Wang, Z. Non-Orthogonal Multiple Access for 5G: Solutions, Challenges, Opportunities, and Future Research Trends. IEEE Commun. Mag. 2015, 53, 74–81. [Google Scholar] [CrossRef]
  4. Liu, Y.; Qin, Z.; Elkashlan, M.; Ding, Z.; Nallanathan, A.; Hanzo, L. Non-orthogonal Multiple Access for 5G and Beyond. Proc. IEEE 2017, 105, 2347–2381. [Google Scholar] [CrossRef] [Green Version]
  5. Han, W.; Ge, J.; Men, J. Performance Analysis for NOMA Energy Harvesting Relaying Networks with Transmit Antenna Selection and Maximal-Ratio Combining over Nakagami-m Fading. IET Commun. 2016, 10, 2687–2693. [Google Scholar] [CrossRef]
  6. Lv, L.; Chen, J.; Ni, Q. Cooperative Non-Orthogonal Multiple Access in Cognitive Radio. IEEE Commun. Lett. 2016, 20, 2059–2062. [Google Scholar] [CrossRef] [Green Version]
  7. Kader, M.F.; Shahab, M.B.; Shin, S.Y. Cooperative Spectrum Sharing with Energy Harvesting Best Secondary User Selection and Non-Orthogonal Multiple Access. In Proceedings of the 2017 International Conference on Computing, Networking and Communications (ICNC): Wireless Communications, Silicon Valley, CA, USA, 26–29 January 2017; pp. 46–51. [Google Scholar]
  8. Emam, S.; Çelebi, M. Non-orthogonal multiple access protocol for overlay cognitive radio networks using spatial modulation and antenna selection. AEU-Int. J. Electron. Commun. 2018, 86, 171–176. [Google Scholar] [CrossRef]
  9. Deng, P.; Wang, B.; Wu, W.; Guo, T. Transmitter Design in MISO-NOMA System with Wireless-Power Supply. IEEE Commun. Lett. 2018, 22, 844–847. [Google Scholar] [CrossRef]
  10. Shin, W.; Vaezi, M.; Lee, B.; Love, D.J.; Lee, J.; Poor, H.V. Non-orthogonal multiple access in multi-cell networks: Theory, performance, and practical challenges. IEEE Commun. Mag. 2017, 55, 176–183. [Google Scholar] [CrossRef] [Green Version]
  11. Ding, Z.; Yang, Z.; Fan, P.; Poor, H.V. On the performance of non-orthogonal multiple access in 5G systems with randomly deployed users. IEEE Signal Process. Lett. 2014, 21, 1501–1505. [Google Scholar] [CrossRef] [Green Version]
  12. Yang, Z.; Ding, Z.; Fan, P.; Al-Dhahir, N. A general power allocation scheme to guarantee quality of service in downlink and uplink NOMA systems. IEEE Trans. Commun. 2016, 15, 7244–7257. [Google Scholar] [CrossRef]
  13. Timotheou, S.; Krikidis, I. Fairness for non-orthogonal multiple access in 5G systems. IEEE Signal Process. Lett. 2015, 22, 1647–1651. [Google Scholar] [CrossRef] [Green Version]
  14. Ding, Z.; Fan, P.; Poor, H.V. Impact of user pairing on 5G nonorthogonal multiple-access downlink transmissions. IEEE Trans. Veh. Technol. 2016, 65, 6010–6023. [Google Scholar] [CrossRef]
  15. Ding, Z.; Adachi, F.; Poor, H.V. The application of MIMO to non-orthogonal multiple access. IEEE Trans. Commun. 2016, 15, 537–552. [Google Scholar] [CrossRef] [Green Version]
  16. Zeng, M.; Yadav, A.; Dobre, O.A.; Tsiropoulos, G.I.; Poor, H.V. Capacity comparison between MIMO-NOMA and MIMO-OMA with multiple users in a cluster. IEEE J. Sel. Areas Commun. 2017, 35, 2413–2424. [Google Scholar] [CrossRef]
  17. Choi, J. Minimum power multicast beamforming with superposition coding for multiresolution broadcast and application to NOMA systems. IEEE Trans. Commun. 2015, 63, 791–800. [Google Scholar] [CrossRef]
  18. Hiep, P.T.; Hoang, T.M. Non-orthogonal multiple access and beamforming for relay network with RF energy harvesting. ICT Express 2019, 6, 11–15. [Google Scholar] [CrossRef]
  19. Vinh, H.D.; Son, V.V.; Hoang, T.M.; Hiep, P.T. Proposal of Combination of NOMA and Beamforming Methods for Downlink Multi-users systems. In Proceedings of the 3rd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom), Hanoi, Vietnam, 21–22 March 2019. [Google Scholar]
  20. Mukkavilli, K.K.; Sabharwal, A.; Erkip, E.; Aazhang, B. On beamforming with finite rate feedback in multiple-antenna systems. IEEE Trans. Inf. Theory 2003, 49, 2562–2579. [Google Scholar] [CrossRef] [Green Version]
  21. Miller, S.; Childers, D. Probability and Random Processes: With Applications to Signal Processing and Communications; Academic Press: Cambridge, MA, USA, 2012. [Google Scholar]
  22. Zwillinger, D. Table of Integrals, Series, and Products; Elsevier: Amsterdam, The Netherlands, 2014. [Google Scholar]
  23. Papoulis, A.; Pillai, S.U. Probability, Random Variables, and Stochastic Processes; Tata McGraw-Hill Education: Berkshire, UK, 2002. [Google Scholar]
  24. Chen, Z.; Ding, Z.; Dai, X.; Zhang, R. An optimization perspective of the superiority of NOMA compared to conventional OMA. IEEE Trans. Signal Process. 2017, 65, 5191–5202. [Google Scholar] [CrossRef]
Figure 1. System Model.
Figure 1. System Model.
Applsci 11 10578 g001
Figure 2. The total EC of the system of the considered NOMA system with different SNR.
Figure 2. The total EC of the system of the considered NOMA system with different SNR.
Applsci 11 10578 g002
Figure 3. OP in term of perfect and imperfect SIC with residual of coefficient ξ = 0.05 .
Figure 3. OP in term of perfect and imperfect SIC with residual of coefficient ξ = 0.05 .
Applsci 11 10578 g003
Figure 4. OP of the first user with different data rates.
Figure 4. OP of the first user with different data rates.
Applsci 11 10578 g004
Figure 5. Comparing the EC of the first and the third users for perfect and imperfect SIC with ξ = 0.01 .
Figure 5. Comparing the EC of the first and the third users for perfect and imperfect SIC with ξ = 0.01 .
Applsci 11 10578 g005
Figure 6. Comparing the EC of the first and the second users in two cases perfect and imperfect SIC with ξ = 0.01 .
Figure 6. Comparing the EC of the first and the second users in two cases perfect and imperfect SIC with ξ = 0.01 .
Applsci 11 10578 g006
Figure 7. Comparing total EC of 3 users of proposed method with OMA method in the case of BPSK modulation.
Figure 7. Comparing total EC of 3 users of proposed method with OMA method in the case of BPSK modulation.
Applsci 11 10578 g007
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Son, V.V.; Cuong, N.L.; Phuong, N.T.; Hoang, T.M.; Thanh Hiep, P. Approximation of Capacity for Downlink Multi-User System with Combination of Precoding and NOMA Methods. Appl. Sci. 2021, 11, 10578. https://doi.org/10.3390/app112210578

AMA Style

Son VV, Cuong NL, Phuong NT, Hoang TM, Thanh Hiep P. Approximation of Capacity for Downlink Multi-User System with Combination of Precoding and NOMA Methods. Applied Sciences. 2021; 11(22):10578. https://doi.org/10.3390/app112210578

Chicago/Turabian Style

Son, Vu Van, Nguyen Le Cuong, Nguyen Thu Phuong, Tran Manh Hoang, and Pham Thanh Hiep. 2021. "Approximation of Capacity for Downlink Multi-User System with Combination of Precoding and NOMA Methods" Applied Sciences 11, no. 22: 10578. https://doi.org/10.3390/app112210578

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop