ArticlePDF Available

Rate-Splitting Multiple Access Aided Mobile Edge Computing With Randomly Deployed Users

Authors:

Abstract and Figures

In this paper, a rate-splitting multiple access (RSMA) scheme is proposed to aid a mobile edge computing (MEC) system where multiple randomly deployed users offload their computation tasks to a MEC server. Considering that users are divided into the center and edge groups, a cognitive radio (CR)-inspired rate-splitting is designed to enable the paired users to simultaneously offload to MEC server. Under the CR principles, the rate-splitting parameters are jointly designed to attain the maximum achievable rate for the secondary user, meanwhile maintaining the primary user's offloading performance same as in orthogonal multiple access. For the case of the paired users with fixed locations, we derive a closed-form expression for the successful computation probability (SCP) achieved by the RSMA-aided MEC (RSMA-MEC) scheme and formulate a SCP maximization problem to obtain the optimal offloading parameters. To reveal the impact of the user locations on the offloading performance of the RSMA-MEC system, various distance-based user pairing schemes are investigated by invoking stochastic geometry techniques. We provide closed-form expressions for the SCPs achieved by the user pairing schemes to characterize the offloading performance. Pros and cons of the user locations to maximize the SCP are highlighted. Simulation results verify the accuracy of the analytical results and clarify the superior offloading performance achieved by the RSMA-MEC scheme, which attains a higher SCP than the existing schemes.
Content may be subject to copyright.
1
Rate-Splitting Multiple Access Aided Mobile Edge
Computing with Randomly Deployed Users
Pengxu Chen, Hongwu Liu, Yinghui Ye, Liang Yang, Kyeong Jin Kim, and Theodoros A. Tsiftsis
Abstract—In this paper, a rate-splitting multiple access
(RSMA) scheme is proposed to aid a mobile edge computing
(MEC) system where multiple randomly deployed users offload
their computation tasks to a MEC server. Considering that users
are divided into the center and edge groups, a cognitive radio
(CR)-inspired rate-splitting is designed to enable the paired users
to simultaneously offload to MEC server. Under the CR princi-
ples, the rate-splitting parameters are jointly designed to attain
the maximum achievable rate for the secondary user, meanwhile
maintaining the primary user’s offloading performance same as
in orthogonal multiple access. For the case of the paired users
with fixed locations, we derive a closed-form expression for the
successful computation probability (SCP) achieved by the RSMA-
aided MEC (RSMA-MEC) scheme and formulate a SCP maxi-
mization problem to obtain the optimal offloading parameters.
To reveal the impact of the user locations on the offloading
performance of the RSMA-MEC system, various distance-based
user pairing schemes are investigated by invoking stochastic
geometry techniques. We provide closed-form expressions for
the SCPs achieved by the user pairing schemes to characterize
the offloading performance. Pros and cons of the user locations
to maximize the SCP are highlighted. Simulation results verify
the accuracy of the analytical results and clarify the superior
offloading performance achieved by the RSMA-MEC scheme,
which attains a higher SCP than the existing schemes.
Index Terms—Rate-splitting multiple access (RSMA), cognitive
radio (CR), mobile edge computing (MEC), stochastic geometry.
I. INTRODUCTION
With the proliferation of real-time services, e.g., augmented
reality, virtual reality, intelligent robots, and autonomous driv-
ing, plenty of user equipments (UEs) are suffering from ever-
increasing computing pressures. As a promising solution for
latency-critical and computation-intensive applications, mobile
edge computing (MEC) enables UEs to offload their tasks to
edge servers for nearby processing, which boosts computing-
performance and reduces network-latency over centralized
remote cloud processing [1], [2]. By integrating computing,
storage, and networking resource at MEC servers or base-
stations (BSs), the sixth generation (6G) of wireless networks
P. Chen and H. Liu are with the School of Information Science and
Electrical Engineering, Shandong Jiaotong University, Jinan 250357, China
(e-mail: cpx17863275219@163.com, liuhongwu@sdjtu.edu.cn).
Y. Ye is with Shaanxi Key Laboratory of Information Communication
Network and Security, Xi’an University of Posts & Telecommunications,
Xi’an 710061, China (e-mail: connectyyh@126.com).
L. Yang is with College of Computer Science and Electronic Engineering,
Hunan University, Changsha 410082, China, (e-mail: liangy@hnu.edu.cn).
K. J. Kim is with Mitsubishi Electric Research Laboratories, Cambridge,
MA 02139 USA (e-mail: kkim@merl.com).
T. A. Tsiftsis is with the School of Intelligent Systems Sci-
ence and Engineering, Jinan University, Zhuhai 519070, China (e-mail:
theo tsiftsis@jnu.edu.cn).
is envisioned to provide benefits of ultra-low latency, ultra-
high bandwidth, and trusted computing for heterogeneous
applications [3].
A. Technical Literature Review
Offloading from massive UEs to MEC servers significantly
intensifies spectrum scarcity. Thus, wireless resource blocks
need to be utilized efficiently and suitable multiple access
schemes are required to attain high spectral efficiency (SE)
and guarantee quality of service (QoS) for MEC networks [4].
Towards that end, non-orthogonal multiple access (NOMA)
has been used in MEC networks to achieve enormous potential
benefits, including offloading latency minimization, energy
efficiency (EE) improvement, and computation successful rate
maximization [5]–[11]. On the other hand, applications of
cognitive radio (CR) techniques have established a significant
and ever-expanding field in wireless communications to in-
crease spectrum utilization and facilitate coexistence between
licensed and unlicensed transmissions in either the overlay or
underlay spectrum access mode. Thus, the integration of CR
techniques will be beneficial to future 6G wireless commu-
nications in developing spectrum agile multiple access and
corresponding MEC networks. To alleviate spectrum scarcity
of NOMA-aided MEC (NOMA-MEC) networks, CR tech-
niques have been widely applied in [6]–[11], where the QoS
requirements of the primary users (PUs) can be guaranteed by
intelligently controlling access parameters such as frequency
band and power level of the secondary users (SUs) [12].
However, as an essential component of NOMA receivers,
the decoding order of successive interference cancellation
(SIC) has a great impact on detection performance [13]–[15].
Taking into account channel state information (CSI) and QoS
requirements, several works on SIC processing have been
proposed to improve the system performance of NOMA-MEC
networks [10], [16]. To ensure power-level diversity required
for successful SIC processing, user scheduling and power
control strategies are needed in uplink NOMA networks [17].
As a multiple access strategy for future wireless com-
munications, rate-splitting multiple access (RSMA) was in-
vestigated for non-orthogonal transmission, interference man-
agement, and rate maximization [18]–[20]. Due to the high
SE/EE, reliability, and robustness for downlink and uplink
multiuser transmissions, RSMA has been regarded as a
promising enabling technology for the 6G wireless networks
[21]–[25]. In downlink RSMA, inter-user interference can
be partially decoded and partially treated as noise, which
not only balances the decoding performance and complexity,
2
but also provides flexibility to bridge NOMA and space
division multiple access (SDMA) [26]–[29] (see also [30]
and references therein). In [31], a more general downlink
rate-splitting framework was proposed for the multiple-input
multiple-output (MIMO) system with imperfect CSI at the
transmitter by exploiting the channel second-order statistics.
Compared to NOMA and SDMA, splitting messages according
to a priority strategy is beneficial to control power-domain
interference effectively and achieve a higher SE for downlink
transmission [26], [28], [32]. In [33], intelligent reflecting
surfaces (IRSs) were applied to aid the downlink RSMA
system, which achieved an enhanced outage performance
compared to IRS-aided downlink NOMA system. The RSMA-
assisted downlink transmission framework for cell-free mas-
sive machine-type communications was proposed in [34]. In
contrast to downlink RSMA, the split signal streams from
all users are fully decoded at the BS receiver using SIC in
uplink RSMA [20], [35]–[38]. Compared to uplink NOMA
with SIC processing, the benefit of applying uplink RSMA
is to achieve the full capacity region of multiple access
channels (MACs) [35]. However, the applications of RSMA
for uplink MACs are still in their infancy. Since the split signal
streams of all uplink users significantly increase the detection
complexity at the receiver, the optimal performance of uplink
RSMA strongly depends on the rate-splitting parameters and
the SIC decoding order at the receiver [20]. In [38], a rate-
splitting scheme was proposed to reduce user scheduling
complexity for an uplink NOMA system, in which the split
signal streams can be successively decoded even with the
same received power-level. In [39], two rate-splitting schemes
were proposed for an uplink NOMA system to improve user
fairness and outage performance. Considering the partial rate
constraints among users, the sum-rate was maximized by
applying uplink RSMA [20]. With the aid of minimum mean
square error (MMSE)-based SIC, uplink RSMA was used to
guarantee max-min user fairness in a single-input multiple-
output (SIMO) NOMA system [37]. For physical layer net-
work slicing, uplink RSMA was used to realize ultra-reliable
and low-latency (URLLC) and enhanced mobile broadband
communications (eMMB) [40]. In the aerial networks, up-
link RSMA was applied for enhancing the communication
reliability, reducing interference, and improving the weighted
sum-rate performance, respectively [19], [41], [42]. Moreover,
combining beamforming with uplink RSMA, the benefit of
RSMA was exploited for satellite communications [43], [44].
For uplink user cooperation, cooperative RSMA was proposed
in [45]. In [46], outage performance was analyzed for a
two-user uplink RSMA system considering all possible SIC
decoding order. Also, uplink rate-splitting was applied for
device-to-device cooperation in fog radio access networks
[47].
B. Motivations and Contributions
Although NOMA-MEC has enabled multiple UEs to offload
their tasks simultaneously to a BS, the adopted NOMA with
SIC cannot achieve the full capacity region of uplink MACs,
which constrains the system performance of NOMA-MEC
networks. On the other hand, to achieve full capacity region of
uplink MACs, exhaustive search was required to determine the
optimal SIC decoding order and transmit power allocation in
uplink RSMA [20], [37], which prohibits using uplink RSMA
from latency-critical MEC applications. To apply RSMA for
uplink MACs, the effective interference management and the
low-complexity SIC processing are imminent. In [48], a CR-
inspired rate-splitting scheme was proposed to maximize the
achievable rate of a SU, meanwhile maintaining the PU’s
outage performance same as in orthogonal multiple access
(OMA).
Motivated by the capacity region achieved by uplink RSMA
and CR-inspired rate-splitting, which avoids exhaustive search
to determine the optimal rate-splitting parameters, we propose
a RSMA-aided MEC (RSMA-MEC) scheme to increase the
successful computation probability (SCP) and reduce offload-
ing latency in a MEC system, which consists of a single
MEC server and multiple randomly deployed users. Since the
user locations significantly impact their channel conditions,
a reasonable and practical location modeling is essential to
evaluate the system performance. Therefore, we assume that
the locations of randomly deployed users follow a homoge-
neous Poisson Point Process (HPPP) [49]. Considering that
user locations and associated inter-user interference affect
transmission reliability, we divide users into a center group
and an edge group to form a two-user CR-inspired RSMA
and apply it to assist MEC 1. Specifically, from the center
group or the edge group, a user is selected as the PU. Then,
a user from the other group is selected as the SU. To reveal
the impact of user locations on the system performance of the
RSMA-MEC system, we consider various distance-based user
pairing schemes. When the PU and SU are randomly selected
from the center and edge groups (or from the edge and center
groups), respectively, the user pairing scheme is named by
RCRE (or RERC). To ensure that the PU can tolerate a relative
high interference-temperature, the nearest user in the center
group or the edge group is preferred to be selected as the PU.
Accordingly, when the nearest user in the center group (or the
edge group) is selected as the PU, the user pairing schemes
that choose the nearest and farthest users in the other group
as the SU are named by NCNE and NCFE (or NENC and
NEFC), respectively.
The main contributions of this paper are summarized as
follows:
An RSMA-MEC scheme is proposed to assist randomly
deployed users to offload their tasks to the MEC server.
In the proposed RSMA-MEC scheme, the paired two
users are treated as the PU and SU, respectively, and
the CR-inspired rate-splitting is conducted at the SU,
which allows the PU and SU to simultaneously offload
to the MEC server and avoids the deterioration of the
1Although uplink RSMA can accommodate more than two users for
simultaneous transmissions, multiple users in each user-pair results in an
increased SIC processing complexity and the prolonged decoding delay,
which is not preferable for the considered delay-critical MEC system. To
accommodate more than two users in each user-pair, advanced SIC techniques
with low complexity and ultra-low decoding delay are required in the future
works.
3
PU’s offloading. Towards that end, the optimal power
allocation factor, rate-splitting factor, and SIC decoding
order are jointly designed under the CR principles, which
maximizes the achievable rate for the SU.
In the case of the fixed user locations, we derive a
closed-form expression for the SCP achieved by the
RSMA-MEC scheme for the MEC system. Subject to the
constraints of latency budget and computation capability,
a SCP maximization problem is formulated. Then, we
obtain the closed-form expression for the optimal offload-
ing time and task-offloading factor, which can achieve the
allowed maximum SCP for the MEC system. In addition,
the obtained optimal offloading parameters can be used
to reduce the offloading latency for the MEC system.
The analytical expressions for the SCPs of various user
pairing schemes are derived. With the obtained optimal
offloading parameters, simulation results are presented
to verify the derived analytical expressions and reveal
the impact of user pairing on the SCP for the RSMA-
MEC system. Particularly, the NCNE and NENC are
the best schemes to achieve the maximum SCP when
the PU is selected from the center and edge groups,
respectively, while RCRE and RERC are the most light-
weight schemes when the PU is selected from the center
and edge groups, respectively. Compared to the existing
NOMA-MEC scheme, the superior SCP performance of
the proposed RSMA-MEC scheme is verified by simula-
tion results.
The remainder of this paper is organized as follows: Section
II presents the RSMA-MEC system model. In Section III,
the CR-inspired rate-splitting scheme is presented. In Section
IV, the SCP achieved by the RSMA-MEC scheme is derived
and the optimal offloading parameters are obtained by solving
the formulated SCP maximization problem. In Section V,
various distance-based user pairing schemes are studied. In
Section VI, simulation results are presented to corroborate the
superior performance of the proposed RSMA-MEC scheme,
and Section VII summarizes this work.
II. SY ST EM MO DE L
The considered RSMA-MEC system consists of a MEC
server and multiple randomly deployed users who want to
offload their computation tasks to the MEC server. We assume
that each user is equipped with a single antenna to offload data
to the MEC sever, which is integrated at a BS equipped with
a single receive-antenna. The coverage area of the BS, also
the coverage of the MEC server, is represented by a disk with
radius RE, as depicted in Fig. 1. The MEC server is located
in the center of the disk and serves the randomly deployed
users within the coverage area. Moreover, the coverage area
of the MEC server is divided into two regions distinguished
by a radius RC. Accordingly, the users located in the disk
with radius RCform the center group and the users located in
the remaining region within the coverage area form the edge
group. We assume that the locations of the users in the center
group (the edge group) follow a HPPP with a density µΦC
(µΦE), [50], [51].
h
a
h
b
R
C
R
E
Ua and Ub offload the partial
tasks to the MEC server a nd then
compute the remaining tasks.
MEC server

t
1
ė
0
Parameters
determination
t
4
ė
0
Results
downloading
t
2
Task offloading by Ua and
Ub
t
3
Task computing at
Ua, Ub, and the MEC
server
center user
edge user
T
U
b
U
a
Fig. 1. The RSMA-MEC System Model.
To assist task offloading from multiple users to the MEC
server, multiple user-pairs can be formed with each pair
consisting of one user selected from the center group and
another one selected from the edge group 2. In this paper,
we consider the distance-based user pairing, i.e., two users
are paired by using their distances to the MEC server, which
can be obtained from CSI statistics. Through allocating the
orthogonal time/frequency resource blocks to different user-
pairs and applying the two-user uplink RSMA within each
pair, which prevents excessive inter-user interference in each
pair, simultaneous offloading from multiple users to the MEC
server can be realized. Without loss of generality, we first
consider RSMA-MEC offloading within one user-pair, in
which the paired users are denoted by Uaand Ub, respectively.
Moreover, we assume that each user is equipped with a single-
core CPU or a less powerful multi-core CPU and works in
either the transmission mode or the computation mode [5].
For the user Uk(k {a, b}), its computation tasks contain
the data of Mkbits, which are bit-wise independent and can
be arbitrarily segmented into sub-tasks. Constrained by the
limited computing capability, each user may not be able to
compute all the tasks by itself within the latency budget T,
which is assumed to be less than the coherence time of channel
fading. Therefore, the paired users perform uplink RSMA to
offload a portion of their tasks of ηkMkbits to the MEC server
and then compute the remaining tasks of (1 ηk)Mkbits by
themselves, where ηk(0 ηk1) is the task offloading
factor of Uk.
In the considered RSMA-MEC system, an entire computa-
tion period consists of four time phases as depicted in Fig.
1. In the first time phase of the computation period, t1, the
2When multiple systems are considered for uplink RSMA, a new cooper-
ating or co-existing system model is required to realize simultaneous uplink
transmissions and interference management. For this new system model, we
need to conduct extensive investigations for developing a new CR-inspired
uplink RSMA and extending our employed HPPP model by incorporating
interference management.
4
offloading and rate-splitting parameters are determined for the
paired users. After that, Uaand Uboffload their tasks to the
MEC server using uplink RSMA in the second time phase t2.
In the third time phase t3, the successfully offloaded tasks are
computed at the MEC server, meanwhile Uaand Ubcompute
their remaining tasks locally. In this paper, we assume that
the MEC server begins its computation immediately after the
completion of the offloading, i.e., there is no queue delay
at the MEC server. In the last time phase t4, the computed
results of the offloaded tasks are fed back to Uaand Ub,
respectively. As it will be shown in the next subsection, since
the optimal rate-splitting parameters are determined using
the simple closed-form expressions, the consumed time t1
for the rate-splitting parameter determination can be ignored.
Considering that the data size of the download results is small
enough [52], t4can be neglected compared to t2and t3
[5], [53]–[55]. Thus, the considered offloading-computation
scenario mainly consists of the task offloading phase t2, in
which Uaand Uboffload partial tasks to the MEC server,
and the task execution phase t3, in which Ua,Ub, and MEC
server compute their respective tasks simultaneously. Given
the offloading-computation latency budget T, which is less
than the channel coherence interval, the computation period
satisfies t2+t3T.
A. Task Offloading Phase
In this subsection, the operations of Ua,Ub, and the MEC
server in the task offloading phase are presented.
The channel fading from Ukto the MEC server is denoted
by khk, where hkdenotes the small-scale fading coefficient,
which is modeled as independent and identically distributed
(i.i.d.) circular symmetric complex Gaussian (CSCG) random
variables with zero mean and unit variance. kis the distance-
related path-loss component determined by k(1 + dv
k)1
with dkdenoting the distance from Ukto the MEC server and
vdenoting the path-loss exponent. In this study, the bounded
path loss model is considered to ensure that the path loss is
always greater than one for any distance, i.e., 1 + dv
k>1.
Moreover, we assume that the users are fixed or have low
mobility. Then, quasi-static fading is adopted in the system
model, which indicates that the channel fading coefficient
hkkeeps constant within the entire computation period and
can change from one computation period to another one. In
addition, we assume perfect CSI to evaluate the theoretical
system performance achieved by the RSMA-MEC scheme
[11], [14], [39].
In the two-user uplink RSMA, Ubsplits its message signal
˜xbinto two sub-messages ˜xb,1and ˜xb,2. Without loss of gen-
erality, we assume that the message signals, {˜xb,˜xb,1,˜xb,2},
are independently encoded using independent Gaussian codes
to generate the transmit signals, {xb, xb,1, xb,2}, respectively.
For Ua, the transmit signal is denoted by xa. We assume all
the transmit signals have the unit power in expectation. For
each transmission block, the received signal at the MEC server
can be expressed as:
yMEC =pPaahaxa+pαPbbhbxb,1
+p(1 α)Pbbhbxb,2+w, (1)
where Pkis the transmit power of Uk,wis the complex
additive white Gaussian noise at the MEC server with zero
mean and variance σ2, and αis the power allocation factor
satisfying 0α1.
To attain the allowed maximum achievable rate for Ua,
SIC with the decoding order xb,1xaxb,2is utilized
at the MEC server. To reveal the theoretical performance of
the proposed RSMA-MEC scheme, we assume perfect SIC in
this study as those in [11], [14]. In general, all possible SIC
decoding orders at the MEC server can be classed into three
types as follows: xb,1xb,2xa,xaxb,1xb,2, and
xb,1xaxb,2. By using the logarithmic product law, it
can be shown that the achievable rates of Uaand Ubobtained
by applying xb,1xb,2xa(xaxb,1xb,2) equal to
those of applying xbxa(xaxb). In such a case, the SIC
processing in the considered RSMA-MEC system is equivalent
to that of a two-user uplink NOMA system. Consequently, the
decoding order xb,1xaxb,2is adopted in this paper to
generate robustness with respect to different CSI conditions,
as it will be shown in Section III.
Let ρaPaa
σ2and ρbPbb
σ2denote the equivalent transmit
signal-to-noise ratios (SNRs) of Uaand Ub, respectively, the
received signal-to-interference-plus-noise-ratios (SINRs) and
SNR for decoding xb,1,xa, and xb,2are given by
γb,1=αρb|hb|2
ρa|ha|2+ (1 α)ρb|hb|2+ 1,(2)
γa=ρa|ha|2
(1 α)ρb|hb|2+ 1,(3)
and
γb,2= (1 α)ρb|hb|2,(4)
respectively. Then, the task bits that can be offloaded via the
transmissions of xaand xb(or xb,1and xb,2) are given by
¯
Ra=t2BRaand ¯
Rb=¯
Rb,1+¯
Rb,2=t2B(Rb,1+Rb,2),(5)
where Ra= log2(1 + γa),Rb,1= log2(1 + γb,1), and
Rb,2= log2(1 + γb,2)denote the achievable rates for Uaand
Ubto transmit xa,xb,1, and xb,2, respectively, and Bis the
bandwidth of the frequency band allocated to Uaand Ub.
Corresponding to the transmissions of xa,xb,1, and xb,2,
the target offloading tasks are defined as ˆ
RaηaMa,ˆ
Rb,1
βηbMb, and ˆ
Rb,2(1 β)ηbMb, respectively, where βis the
rate-splitting factor satisfying 0β1. If xa,xb,1, and xb,2
are decoded successfully, the total number of task bits to be
computed at the MEC server can be expressed as:
MMEC =ˆ
Ra+ˆ
Rb,1+ˆ
Rb,2=ηaMa+ηbMb.(6)
B. Task Execution Phase
We consider a hybrid offloading scenario that includes
partial offloading (0< ηk<1), fully local computation
(ηk= 0) and complete offloading (ηk= 1) [50]. In the task
execution phase, Uaand Ubcompute the task bits (1ηa)Ma
and (1 ηb)Mb, respectively, meanwhile the MEC server
computes the task bits MMEC .
5
The computation capabilities of each user and the MEC
server are denoted by fuser and fMEC , respectively, which
represent the corresponding CPU frequencies, respectively.
Denoting the number of the CPU cycles required for com-
puting one task bit by CCPU , if MkCCPU
fuser T, a user can
compute all of its tasks locally. Otherwise, the time required
for carrying out the local computation can be written as:
tUk
3=(1 ηk)MkCCPU
fuser
,(7)
To indicate the computation capability difference between the
MEC server and users, we assume fMEC =Nfuser with N >
1. Then, the execution time for the offloaded tasks MMEC can
be written as:
tMEC
3=MMEC CCPU
fMEC
=MMEC CCPU
Nfuser
.(8)
Considering the computation capability difference between the
MEC server and users, the time duration of the task execution
phase can be expressed as:
t3= max ntUk
3, tMEC
3o
= max (1 ηk)MkCCPU
fuser
,MMEC CCPU
Nfuser .(9)
III. CR-INSPIRED RATE-SPLITTING
In the considered RSMA-MEC system, Uaand Ubshare
the same time/frequency resource block on the premise that
they do not introduce intolerable interference to each other.
Inspired by the CR principles [48], we treat Uaand Ubas
the PU and SU, respectively, and design a CR-inspired rate-
splitting to realize the two-user uplink RSMA. In the operation
of the CR-inspired rate-splitting, the offloading from the SU
to the MEC server is allowed only when the PU’s offloading
performance can be guaranteed to be the same as in OMA. In
other words, the delay-limited task offloading of the PU cannot
deteriorate compared to the scenario in which the PU occupies
the time/frequency resource block alone. In this section, we
elaborate the design principle, operations, and optimal rate-
splitting parameters of the CR-inspired rate-splitting.
The CR-inspired rate-splitting aims to attain the allowed
maximum achievable rate for the SU, meanwhile maintaining
the PU’s SCP the same as in OMA. To prevent error propa-
gation in SIC with the decoding order xb,1xaxb,2, the
successful detections of xb,1and xaare required. Further, the
signal xacan be detected successfully only when the following
constraints are satisfied, i.e.,
¯
Rb,1ˆ
Rb,1and ¯
Raˆ
Ra.(10)
When ¯
Rb,1ˆ
Rb,1, to ensure that the PU’s offloading does
not deteriorate during SIC with the decoding order xaxb,2,
an interference threshold τis determined as [48]:
τ= max 0,ρa|ha|2
εa1,(11)
where εa2
ηaMa
t2B1. This interference threshold can be
computed at the MEC server and broadcasted to the SU prior
to offloading. Recalling the expressions for γaand ¯
Rain
Section II, if (1 α)ρb|hb|2τ, we have the following
relationships:
Pr ¯
Raˆ
Ra= Pr t2Blog21 + ρa|ha|2
(1α)ρb|hb|2+1 ˆ
Ra
Pr t2Blog21 + ρa|ha|2
τ+1 ˆ
Ra
(a)
=Pr t2Blog21 + ρa|ha|2ˆ
Ra,(12)
where the equality in step (a) holds due to the fact
Pr ρa|ha|2
τ+1 εa= Pr ρa|ha|2εaconsidering that the
interference threshold is designed to tolerate any interfer-
ence whose power is less than or equal to τ[14], [16]. In
other words, if the received power of the interference signal
p(1 α)Pbbhbxb,2satisfies (1 α)ρb|hb|2τunder the
condition of Pr ¯
Rb,1ˆ
Rb,1= 1, the PU can offload
its tasks of ηaMabits successfully to the MEC server with
the same probability as that the PU occupies the allocated
time/frequency resource block alone. Thus, by assuming that
Pr ¯
Rb,1ˆ
Rb,1= 1 is guaranteed during the offloading, as it
will be explained later in this section, the successful detection
of xacan be guaranteed if τ > 0and (1 α)ρb|hb|2τ.
The procedure of the CR-inspired rate-splitting can be
summarized as follows. First, the PU feeds back its CSI and
Pato the MEC server after estimating the CSI. Second, the
MEC server calculates τaccording to (11) and broadcasts it
to the SU in t1. Last, the SU compares τto its CSI and
determines the optimal rate-splitting parameters. With respect
to all possible CSI realizations, the operation of the CR-
inspired rate-splitting and associated optimal αand βare
jointly designed as follows:
Case I: 0< ρb|hb|2τ. In this case, the maximum
interference power-level caused by the SU’s offloading is not
greater than the interference threshold τ. Thus, the SU can
allocate all of Pbto transmit its signal. To maximize the
offloaded task-bits ¯
Rb=t2B(Rb,1+Rb,2)for the SU, all
of Pbshould be allocated to transmit xb,2, which is decoded
at the last stage of SIC without suffering from interference,
such that ¯
Rb=t2BRb,2is maximized. Consequently, there is
no power allocated to transmit xb,1.
As a result, the CR-inspired rate-splitting sets xb,2=xbin
Case I and the optimal rate-splitting parameters are given by
α= 0 and β= 0.(13)
Since rate-splitting is not performed at the SU in Case I, the
SIC decoding order xb,1xaxb,2degrades to xaxb.
Then, the maximum task-bits that can be offloaded to the MEC
server by Uaand Ubin Case I can be expressed as
¯
R(I)
a=t2Blog21 + ρa|ha|2
ρb|hb|2+ 1,(14)
and
¯
R(I)
b=t2Blog21 + ρb|hb|2,(15)
respectively.
Case II: 0< τ < ρb|hb|2. In this case, the interference
resulted by the transmission of xb,2will surpass τif all Pb
6
is allocated to its transmission. Therefore, the transmit power
for the transmission of xb,2should satisfy (1α)ρb|hb|2τ.
To maximize the offloaded task-bits ¯
Rb=t2B(Rb,1+Rb,2),
Rb,2= log2(1 + γb,2)should be maximized firstly subject to
the constraint Rb,2log2(1 + τ). Obviously, the maximum
Rb,2= log2(1 + τ)is achieved by setting γb,2=τ. Then, the
optimal power allocation factor in this case can be computed
as:
α= 1 τ
ρb|hb|2.(16)
Substituting the above αinto (2), the maximum offloaded
task-bits corresponding to the transmission of xb,1is given
by ¯
Rb,1=t2Blog21 + ρb|hb|2τ
ρb|hb|2+τ+1 . Then, the maximum
task-bits that can be offloaded by Uaand Ubin this case can
be expressed as
¯
R(II)
a=t2Blog21 + ρa|ha|2
τ+ 1 ,(17)
and
¯
R(II)
b=t2Blog21+ ρb|hb|2τ
ρa|ha|2+τ+ 1+t2Blog2(1+τ),
(18)
respectively.
Since the received SINR/SNR γa(α)and γb,2(α)provide
the necessary conditions for the successful detection of xaand
xb,2in SIC processing xb,1xaxb,2, only the failure
detection of xb,1can result in error propagation in SIC. To
avoid error propagation in SIC resulted by the failure detection
of xb,1,¯
R(II)
b,1ˆ
Rb,1needs to be satisfied to ensure the suc-
cessful detection of xb,1or equivalently ¯
R(II)
bˆ
Rb=ηbMb.
Otherwise, both the PU and SU encounter outage. In the
CR-inspired rate-splitting, we set the target offloading task
ˆ
Rb,2=t2Blog2(1 + τ)for the transmission of xb,2. Recalling
ˆ
Rb,2= (1 β)ηbMb, the optimal rate-splitting factor in Case
II is obtained by solving t2Blog2(1 + τ) = (1 β)ηbMb,
which is given by
β= 1 t2Blog2(1 + τ)
ηbMb
.(19)
As a result, only when Pr( ¯
Rb,1ˆ
Rb,1) = 1, i.e., ¯
Rb,1
ˆ
Rb,1(β)always holds true, the SU is allowed to offload its
tasks using rate-splitting; Otherwise, the SU keeps silence in
Case II. Even if the SU does not offload in Case II, the PU
can offload the task bits ¯
R(II)
a=t2Blog2(1 + ρa|ha|2).
Case III: τ= 0. In this case, the PU cannot successfully
offload its task of ηaMabits to the MEC server due to a weak
channel gain. We assume that the PU does not aware its weak
channel gain and still transmits to offload. Then, the SU will
allocate all Pbto transmit xb,1=xbwith the aim of avoiding
error propagation resulted by the failure detection of xa. Thus,
the optimal rate-splitting parameters are given by
α= 1 and β= 1,(20)
respectively, and the SIC decoding order xb,1xaxb,2
degrades to xbxa. In Case III, the maximum task-bits that
can be offloaded by Uaand Ubare given by
¯
R(III)
a=t2Blog2(1 + ρa|ha|2)(21)
and
¯
R(III)
b=t2Blog21 + ρb|hb|2
ρa|ha|2+ 1,(22)
respectively.
Remark 1: In Cases I and III, the PU and SU perform the
offloading in the same way as that in the two-user NOMA-
MEC system. Therefore, the PU and SU will achieve the same
offloading performance as those in the two-user NOMA-MEC
system when Cases I and III occur. In Case II, the SU adjusts
its rate-splitting parameters flexibly to maximize the offloaded
task-bits, whereas the PU can successfully offload the task-
bits ηaMato the MEC server within the latency budget T,
just as it operates in OMA with delay-limited transmissions.
In Cases I and III, the optimal rate-splitting parameters are
binary. In Case II, the closed-form expressions for the optimal
rate-splitting parameters are presented in (16) and (19), which
can be easily computed at the SU. Therefore, the time phase
t1spent to find the optimal rate-splitting parameters is much
smaller than t2and t3, which justifies ignoring the time phase
t1in the considered RSMA-MEC system.
IV. SC P AN ALYS IS A ND MAXIMIZATION WITH FIXE D PU
AN D SU
In this section, a closed-form expression is derived for the
SCP achieved by the RSMA-MEC scheme considering that
the PU and SU have the fixed locations. Then, the optimal
offloading parameters are determined by solving the SCP
maximization problem.
A. SCP Analysis
For the considered RSMA-MEC system, when MkCCPU
fuser >
T,k {a, b}, the SCP is defined as the probability of the event
that all the offloaded tasks are successfully computed at the
MEC server and all the remaining tasks are successfully and
locally computed at the paired users within the latency budget
T. When max tUa
3, tUb
3, tMEC
3> t3, the SCP is obviously
zero. Under the condition of max tUa
3, tUb
3, tMEC
3t3, the
SCP can be expressed as:
Ps=P(I)
s+P(II)
s+P(III)
s,(23)
where
P(I)
s= Pr n0< ρb|hb|2τ, ¯
R(I)
aηaMa,¯
R(I)
bηbMbo,
(24)
P(II)
s= Pr n0< τ < ρb|hb|2,¯
R(II)
aηaMa,¯
R(II)
bηbMbo,
(25)
and
P(III)
s= Pr nτ=0,¯
R(III)
aηaMa,¯
R(III)
bηbMbo,(26)
represent the SCP achieved by the RSMA-MEC scheme in
Cases I, II, and III, respectively. In other words, if the fixed PU
and SU offload tasks to the MEC server, both of their offloaded
task bits should be successfully decoded at the MEC server
7
during t2, meanwhile, the MEC server executes all the received
task bits and the PU and SU execute their own remaining task
bits successfully during t3.
Theorem 1: When the PU and SU have the fixed locations,
the SCP achieved by the RSMA-MEC scheme is given by
Ps=
ρaeεb
ρbεa(1+εb)
ρa
ρaρbρbeεa
ρaεb(1+εa)
ρb
ρaρb
,
if max tUa
3, tUb
3, tMEC
3t3,
0,otherwise,
(27)
where εb2
ηbMb
t2B1.
Proof: See Appendix A.
Remark 2: For the RSMA-MEC system containing the fixed
PU and SU, Theorem 1 provides a closed-form expression for
the SCP, which involves only the CSI statistics and offloading
parameters, so that the SCP can be easily computed. In
addition, the results in Theorem 1 offer a possibility to obtain
the optimal offloading parameters that achieve the allowed
maximum SCP without involving instantaneous CSI.
Remark 3: When MkCCPU
fuser T, both Uaand Ubcan
successfully compute their own tasks locally within the latency
budget, so that we have Ps= 1. In such a case, the optimal
offloading parameters can determined by η
a=η
b= 0,t
2= 0
and t
3=MkCCPU
fuser . As a result, rate-splitting is not conducted
when MkCCPU
fuser T.
B. SCP Maximization
In the considered RSMA-MEC system, offloading from the
paired users occurs when MkCCPU
fuser > T . Accordingly, the SCP
maximization problem can be formulated as:
P0: max
t2,t3abPs
C1:MkCCPU
fuser
> T, k {a, b},
C2:t2>0, t3>0, t2+t3T, (28)
C3: 0 < ηa<1,0< ηb<1.
Since the objective function Psin non-convex, the SCP
maximization problem is a non-convex problem, which cannot
be solved using the existing standard algorithms. However,
with the aid of the expression in (27), we have the following
proposition.
Proposition 1: When the PU and SU have the fixed loca-
tions, the maximum SCP can be achieved when t2+t3=T
and tUa
3=tUb
3=tMEC
3=t3are satisfied.
Proof: Using the monotonicity of Pswith respect to t2,
ηa, and ηb, the results in Proposition 1 can be proved by
contradiction.
Remark 4: The results in Proposition 1 indicate that the
maximum SCP can be achieved only if all the computation
capabilities of the MEC server, Ua, and Ubare fully exploited
during the task execution phase t3. Consequently, the MEC
server, Ua, and Ubcompute the task-bits as much as possible,
which results in the shortest duration for t3and also ensures
that the maximum SCP can be achieved.
Based on the results in Proposition 1, we can obtain the
optimal offloading parameters that maximize the SCP as in
the following corollary.
Corollary 1: When the PU and SU have the fixed locations,
the optimal offloading parameters that maximize the SCP are
given by
η
a=(N+ 1)MaMb
(N+ 2)Ma
,(29)
η
b=(N+ 1)MbMa
(N+ 2)Mb
,(30)
t
2=T(Ma+Mb)CCPU
(N+ 2)fuser
,(31)
t
3=(Ma+Mb)CCPU
(N+ 2)fuser
.(32)
Proof: Substituting the condition tUa
3=tUb
3=tMEC
3=t3,
which guarantees that the maximum SCP is achievable, into
(7) and (8), we obtain the expressions (29) and (30). Then, t
3
is obtained by using (29) and (30), so does t
2.
Remark 5: The results in Corollary 1 provide several
insights on the optimal offloading and SCP maximization as
explained in the following. First, the offloading parameters
depend on the computation capabilities of the nodes, task-
bits, and latency budget, being irrespective of the paired user
locations. Thus, the results in Corollary 1 are immediately
applicable to the RSMA-MEC system containing the randomly
deployed users no matter where are the locations. Second, the
expressions of (29) and (30) indicate that more task bits should
be offloaded if the MEC server has a stronger computation
capability and vice versa. With the obtained t
2and t
3in (31)
and (32), not only the maximum SCP can be achieved, but
also paving a way to reduce the latency budget. For example,
by fixing the offloading time t2with the given Maand Mb,
the task computing time t3decreases with the increasing of
either fuser or N. Further, the constraints 0< η
a<1and
0< η
b<1indicate that 1
N<Ma
Mb< N + 1, which
requires a comparable tasks for the paired users. Considering
t2>0, the allowed maximum task bits to be computed by
the RSMA-MEC scheme satisfies Ma+Mb<(N+2)fuserT
CCPU
.
As N ,η
aand η
bapproach one, which means that
complete offloading is preferable if the MEC server has an
extremely strong computation power. In practice, since Nis
a finite number, partial offloading is conducted.
Remark 6: As Pa
σ2 and Pb
σ2 , asymptotic
expressions for P(I)
sand P(II)
sin the high SNR region can
be derived as
P(I)
s=1
1 + εa1+dv
a
1+dv
b
and P(II)
s=εa
εa+1+dv
b
1+dv
a
,(33)
respectively, which results in P(I)
s+P(II)
s= 1 in the high SNR
region. In addition, we have P(III)
s= 0 for Case III. Thus, the
8
SCP approaches one as Pa
σ2 and Pb
σ2 . As a result,
the optimal offloading parameters can be summarized as:
(η
a, η
b, t
2, t
3)=
0,0,0,MkCCPU
fuser ,MkCCPU
fuser T,
shown in Corollary 1,MkCCPU
fuser
>T.
(34)
Substituting (34) into (27), the achieved maximum SCP can
be written as
P
s=ρaeε
b
ρbε
a(1+ε
b)
ρa
ρaρbρbeε
a
ρaε
b(1+ε
a)
ρb
ρaρb
,(35)
where ε
k
2
η
kMk
t
2B1,MkCCPU
fuser
> T,
0,otherwies.
V. DISTANCE-BA SE D USE R PAIRING
As indicated by the SCP expression in (27), the locations of
the paired users have a great impact on the SCP. In this section,
we investigate the distance-based user pairing for the RSMA-
MEC system where multiple users are randomly deployed.
According to the operation of the CR-inspired rate-splitting in
Case II, we know that with a higher interference threshold τ
allowed by the PU, a higher achievable rate can be attained
by the SU. Since a higher interference threshold is related
to a shorter distance from a near user to the MEC server,
the nearest user to the MEC server in the center group or
edge group is preferred to be selected as the PU. Once the
nearest user in the center group is selected as the PU, we
consider two user pairing schemes, namely, the NCNE and
NCFE schemes, in which the nearest user and the farthest
user in the edge group are respectively selected as the SU.
Similarly, if the nearest user in the edge group is selected
as the PU, we consider the NENC and NEFC schemes, in
which the nearest user and farthest user in the center group are
respectively selected as the SU. For the purpose of comparison,
we also consider the RCRE (RERC) scheme, in which the PU
and SU are randomly selected from the center and edge groups
(the edge and center groups), respectively. Once the PU and
SU are selected, the CR-inspired rate-splitting is conducted by
the paired users to aid their offloading.
Let Ξ {RCRE,RERC,NCNE,NCFE,NENC,NEFC}
denote the user pairing scheme, the probability density func-
tions (PDFs) of the distance from the selected PU and SU to
the MEC are denoted by fΞ
PU (x)and fΞ
SU (y), respectively. With
the derived optimal rate-splitting parameters and the optimal
offloading parameters, the SCP achieved by the user pairing
scheme Ξcan be expressed as:
PΞ
s=ZZ Ps|x,y fΞ
PU (x)fΞ
SU (y)dxdy. (36)
Since PΞ
s= 0 if max tUa
3, tUb
3, tMEC
3> t3, we only consider
PΞ
sfor max tUa
3, tUb
3, tMEC
3t3in this section.
A. RCRE Scheme
In this subsection, we investigate the impact of the RCRE
scheme on the SCP for the considered RSMA-MEC system.
In the RCRE scheme, the PU and SU are randomly selected
from the center and edge groups, respectively. Since the paired
users are randomly selected, the RCRE scheme provides each
user a fair opportunity to offload the task-bits to the MEC
server.
Since the locations of users follow the HPPP, fRCRE
PU (x)
and fRCRE
SU (y)can be respectively expressed as:
fRCRE
PU (x) = (2x
R2
C
,0xRC,
0,otherwise; (37a)
fRCRE
SU (y) = (2y
R2
ER2
C
, RCyRE,
0,otherwise.(37b)
By substituting (37a) and (37b) into (36), the SCP achieved
by the RCRE scheme can be derived as
PRCRE
s=ZRE
RCZRC
0
ρaeεb
ρbεa(1+εb)
ρaρbeεa
ρaεb(1+εa)
ρb
ρaρb
xdx
×4
R2
C(R2
ER2
C)ydy, (38)
where ρa=Pa
(1+xv)σ2and ρb=Pb
(1+yv)σ2.
It is difficult to derive an exact closed-form expression
for the SCP PRCRE
s. Alternatively, we use the Chebyshev-
Gaussian quadrature to obtain an approximation for PRCRE
s
as follows:
PRCRE
s
N1
X
i=1
2ωip1ϕ2
isi
RC(R2
ER2
C)
×ZRE
RC
ρaeεb
ρbεa(1+εb)
ρaρbeεa
ρaεb(1+εa)
ρb
ρaρb
ydy
N1
X
i=1
ωip1ϕ2
isi
RC(RE+RC)
N2
X
j=1
ϖjq1φ2
jzj
×ρaeεb
ρbεa(1+εb)
ρaρbeεa
ρaεb(1+εa)
ρb
ρaρb
,(39)
where N1and N2are the parameters that determine the
trade-off between complexity and accuracy for the Chebyshev-
Gaussian quadrature-based approximation, ωi=π
N1,ϕi=
cos 2i1
2N1π,si=RC
2(ϕi+ 1),ϖj=π
N2,φj= cos 2j1
2N2π,
zj=RERC
2φj+RE+RC
2,ρa=Pa
(1+siv)σ2, and ρb=
Pb
(1+zjv)σ2.
B. NCFE Scheme
Selecting a near user as the PU not only provides a high
interference threshold for the SU’s rate-splitting, but also
enables the PU itself to offload more task-bits to the MEC
server. In this subsection, we derive the expression for the
SCP achieved by the NCFE scheme, in which the PU is the
9
nearest user in the center group, while the SU is the farthest
user in the edge group.
With respect to the homogeneous PPPs, we first derive
the cumulative distribution functions (CDFs) for the distances
of the PU and SU selected by the NCFE scheme, then we
derive the corresponding PDFs. The distances from the nusers
in the center group to the MEC server can be written as
{x1, x2,·· · , xn}. For the distance of the selected PU, who
is the nearest user in the center group subject to 0< x RC,
the CDF can be expressed as
FNCFE
PU (x) = P(xxi)
P(|C| 1) =1P(x>xi)
1P(|C|= 0)
=1eπµΦCx2
1eπµΦCR2
C
,(40)
where i {1,2, ..., n}and |C|represents the number of users
in the center group. Otherwise, FNCFE
PU (x) = 0.
Similarly, the distances from the musers in the edge group
to the MEC server are expressed as {y1, y2, ..., ym}. In the
NCFE scheme, the farthest user in the edge group is selected
as the SU, whose distance satisfies RCyREand the
corresponding CDF is given by
FNCFE
SU (y) = P(yjy)
P(|E| 1) =1P(yj>y)
1P(|E|= 0)
=eπµΦE(R2
Ey2)
1eπµΦE(R2
ER2
C),(41)
where j {1,2, ..., m}and |E|represents the number of users
in the edge group. Otherwise, FNCFE
SU (y)=0. Then, we can
derive the PDFs by taking derivatives of the CDFs and we get
the following expressions:
fNCFE
PU (x) =
2πµΦCxeπµΦCx2
1eπµΦCR2
C,0xRC,
0,otherwise;
(42a)
fNCFE
SU (y) =
2πµΦEyeπµΦE(R2
Ey2)
1eπµΦE(R2
ER2
C), RCyRE,
0,otherwise.
(42b)
By substituting (42) into (36), the SCP achieved by the
NCFE scheme can be evaluated as:
PNCFE
s=λ
ZRE
RCZRC
0
ρaeεb
ρbεa(1+εb)
ρaρbeεa
ρaεb(1+εa)
ρb
ρaρb
×4eπµΦCx2xdx ×eπµΦE(R2
Ey2)ydy, (43)
where ρaand ρbare the same as those for the expression (38)
and λ=π2µΦCµΦE
1eπµΦCR2
C1eπµΦE(R2
ER2
C).
By using Chebyshev-Gaussian quadrature, we obtain the
approximation for the SCP as follows:
PNCFE
sRC(RERC)λ
×
N1
X
i=1
ωi
q1ϕ2
isi
N2
X
j=1
ϖjq1φ2
jzjeπµΦE(R2
Ezj2)
×ρaeεb
ρbεa(1+εb)
ρaρbeεa
ρaεb(1+εa)
ρb
ρaρb
eπµΦCsi2
.
(44)
C. NCNE Scheme
In the NCNE scheme, the nearest users in the center and
edge groups are respectively selected as the PU and SU,
respectively. For the selected PU, the PDF of its distance is
the same as that in (42a). For the SU, its distance satisfies
RCyREand the corresponding CDF is given by
FNCNE
SU (y) = P(yyj)
P(|E| 1) =1P(y > yj)
1P(|E|= 0)
=1eπµΦE(y2R2
C)
1eπµΦE(R2
ER2
C).(45)
By taking the derivative of (45), the corresponding PDF can
be evaluated as:
fNCNE
SU (y) =
2πµΦEyeπ µΦE(y2R2
C)
1eπµΦE(R2
ER2
C), RCyRE,
0,otherwise.
(46)
By submitting (42a) and (46) into (36), the SCP of NCNE
scheme can be derived as
PNCNE
s=λ
ZRE
RCZRC
0
ρaeεb
ρbεa(1+εb)
ρaρbeεa
ρaεb(1+εa)
ρb
ρaρb
×4eπµΦCx2xdx ×eπµΦE(y2R2
C)ydy. (47)
Then, applying the Chebyshev-Gaussian quadrature, the SCP
achieved by the NCNE scheme is approximated as:
PNCNE
sRC(RERC)λ
×
N1
X
i=1
ωi
q1ϕ2
isi
N2
X
j=1
ϖjq1φ2
jzjeπµΦE(zj2R2
C)
×ρaeεb
ρbεa(1+εb)
ρaρbeεa
ρaεb(1+εa)
ρb
ρaρb
eπµΦCsi2
.
(48)
D. PU from Edge Group
For the CR-inspired rate-splitting, the PU can be selected
from the edge group. To attain a relative high interference
threshold, we also consider to select the nearest user in the
edge group to the MEC server as the PU. Then, the nearest and
farthest users in the center group are respectively selected as
the SU, which are denoted by the NENC and NEFC schemes,
respectively. For the purpose of comparison, we also consider
the RERC scheme, in which the PU and SU are randomly
selected from the edge and center groups, respectively.
By applying the similar procedures as those in the previous
subsections, closed-form expressions for the approximated
10
1 2 3 4 5 6 7 8 9 10 11
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
RSMA, Ana
RSMA, Sim
NOMA
Complete offloading with RSMA, Ana
Complete offloading with RSMA, Sim
Complete offloading with NOMA
Full local computation
Fig. 2. Psversus task data size (Pa=Pb= 10 dBm).
SCPs achieved by the RERC, NENC, and NEFC schemes can
be obtained as follows:
PRERC
s
N1
X
i=1
2ωip1ϕ2
isi
RC(R2
ER2
C)
×ZRE
RC
ρaeεb
ρbεa(1+εb)
ρaρbeεa
ρaεb(1+εa)
ρb
ρaρb
ydy
N1
X
i=1
ωip1ϕ2
isi
RC(RE+RC)
N2
X
j=1
ϖjq1φ2
jzj
×ρaeεb
ρbεa(1+εb)
ρaρbeεa
ρaεb(1+εa)
ρb
ρaρb
,
(49)
PNENC
sλRC(RERC)
×
N1
X
i=1
ωi
q1ϕ2
isi
N2
X
j=1
ϖjq1φ2
jzjeπµΦE(R2
Ezj2)
×ρaeεb
ρbεa(1+εb)
ρaρbeεa
ρaεb(1+εa)
ρb
ρaρb
eπµΦCsi2,
(50)
and
PNEFC
sλRC(RERC)
×
N1
X
i=1
ωi
q1ϕ2
isi
N2
X
j=1
ϖjq1φ2
jzjeπµΦE(zj2R2
C)
×ρaeεb
ρbεa(1+εb)
ρaρbeεa
ρaεb(1+εa)
ρb
ρaρb
×eπµΦC(R2
Csi2),(51)
where ρa=Pa
(1+zjv)σ2and ρb=Pb
(1+siv)σ2.
Remark 7: Since the optimal rate-splitting parameters de-
signed in Section III do not rely on a specific user pairing
scheme, they can be applied straightforwardly in all the consid-
ered user pairing schemes to maximize the SCPs. In addition,
0 5 10 15 20 25 30 35
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
RSMA, Ana
RSMA, Sim
NOMA
Complete offloading with RSMA
Complete offloading with NOMA
(a) Psversus transmit power
0 5 10 15 20 25 30 35
0
1
2
3
4
5
6
7
RSMA
NOMA
Complete offloading with RSMA
Complete offloading with NOMA
(b) Average throughput versus transmit power
Fig. 3. SCP and average throughput versus transmit power with various PU’s
locations (Pa=Pb).
the optimal offloading parameters provided in Corollary 1 are
independent of the user locations. Thus, for all the considered
user pairing schemes, these optimal offloading parameters can
also be applied straightforwardly to maximize the SCPs.
VI. SIMULATION RESU LTS
In this section, the simulation results are presented to
characterize the system performance achieved by the RSMA-
MEC scheme and to verify the accuracy of the derived
analytical expressions. Unless otherwise stated, the following
system parameters are used in the simulation: B= 1 MHz,
CCPU = 1000 cycles/bit, N= 5,T= 10 ms, υ= 4,
fuser = 0.5GHz, and σ2= 109W. For the purpose
of comparison, the offloading performance achieved by the
NOMA-MEC scheme [50] is also provided. In the following
figures, Ana” and “Sim” represent the results obtained via the
analytical expressions and simulations, respectively.
A. SCP performance with the fixed PU and SU
In this subsection, the impacts of various system parameters
on the SCP are investigated for the case in which the paired
users (PU and SU) have the fixed locations.
In Fig. 2, we compare the SCP achieved by the RSMA-
MEC scheme with that of the NOMA-MEC scheme [50] for
11
0 5 10 15 20 25 30
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
RSMA
RSMA, PU and SU
exchange locations
Fig. 4. Psversus transmit power with various task lengths (Pa=Pb).
different task data size settings. Specifically, we set da= 5 m
and Ma= 20 kbits, Mbvaries from 1 kbits to 11 kbits in the
simulation. As revealed by the curves in Fig. 2, the analytical
results match the simulation results well, which verifies the
accuracy of the analytical results in Theorem 1. It can also be
observed that the SCP achieved by the RSMA-MEC scheme
decreases with the increasing of Mbdue to the decreasing of
offloading time t2. However, the SCP achieved by the RSMA-
MEC scheme is still higher than that of the NOMA-MEC
scheme for various task data size and db. For the complete
offloading, the SCP performance obtained by the RSMA-MEC
scheme is also better than that obtained by the NOMA-MEC
scheme. This is because the RSMA-MEC scheme can take full
advantage of the PU’s τto obtain a higher achievable rate for
the SU. For the considered task data size of the PU in Fig. 2,
the SCP of the fully local computation scheme is always zero
as shown in this figure.
In Fig. 3, we plot the SCP and average throughput against
the transmit power considering different locations of PU. We
set db= 30 m, Ma= 18 kbits, and Mb= 11 kbits in
the simulation. Specifically, the average throughput of Uk
is calculated by Ck=ˆ
RkPs. The curves in Fig. 3(a) also
verify the accuracy of the derived theoretical expression for
the SCP. As shown in this subplot, for each location of PU,
the SCP of the proposed RSMA-MEC scheme increases with
the increasing of the transmit power. This is because a higher
transmit power leads to a higher ρa(ρb), resulting in a larger
Ps, as expected in (35). It can also be seen from Fig. 3(a) that
the shorter da, the greater the SCP is, because that a shorter
dacan bring a larger ρa. For the considered task data size,
the complete offloading scheme always achieves Ps= 0. In
Fig. 3(b), we evaluate the average throughput achieved by Ub,
i.e., Cb, to verify the superior performance of the proposed
RSMA-MEC scheme. With the increasing of the transmit
power, the curves of Cbfirst increase monotonically. After the
transmit power surpasses a large value, the values of Cbalmost
converge to ˆ
Rb, which benefits from the large SCP achieved
by the RSMA-MEC scheme. Moreover, the curves in Fig. 3
clarify that the proposed RSMA-MEC scheme outperforms the
NOMA-MEC scheme in terms of Psand Cbin the middle and
0.5 0.6 0.7 0.8 0.9 1 1.1 1.2 1.3 1.4 1.5
0.9
0.92
0.94
0.96
0.98
1
5
6
7
8
9
10
Latency (ms)
(a) N=5
0.5 0.6 0.7 0.8 0.9 1 1.1 1.2 1.3 1.4 1.5
0.9
0.92
0.94
0.96
0.98
1
7
8
9
10
Latency (ms)
(b) N=10
Fig. 5. The way to reduce latency.
high transmit power regions, which verifies that the proposed
RSMA-MEC scheme can exploit the transmit power more
efficiently than the NOMA-MEC scheme.
Fig. 4 demonstrates the SCP against the transmit power for
various combinations of the task data size. In the simulation,
we set da= 6 m and db= 30 m and consider the opposite
scenario with da= 30 m and db= 6 m. As indicated by
the curves in Fig. 4, for each combination of the task data
size, the SCP achieved by the RSMA-MEC scheme increases
with the increasing of the transmit power. Besides, a smaller
task data size can achieve a larger Psdue to the fact that a
larger t2is resulted by a smaller Maor Mbaccording to (31),
while Psincreases monotonically with the increasing of t2.
For the scenario where the far user is a PU, the SCP decreases.
This is because a larger distance of PU achieves a smaller
τaccording to (11), which results the frequent occasions of
Case I. Accordingly, the achievable rate of the SU decreases,
which results in a decreased Ps. Futher, we can see that the
SCPs achieved by in two contrary scenarios are the same when
Ma=Mb, as expected in (35).
The curves in Fig. 5 indicate the way to reduce latency.
In this figure, the system parameters are set as da= 5 m,
db= 25 m, Ma= 12 kbits, Mb= 10 kbits, and Pa=
Pb. Accordingly, the offloading time t2= 10 (Ma+Mb)C
(N+2)fuser is
12
0 5 10 15 20 25 30
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
RSMA
NOMA
RSMA with fixed =0.75
RSMA with fixed =0.85
RSMA with fixed =0.95
Complete offloading, RSMA
Complete offloading, NOMA
Full local computation
Fig. 6. Impact of offloading factor on Ps(Pa=Pb).
6 8 10 12 14 16 18
10-3
10-2
10-1
100
RSMA
NOMA
Fig. 7. (1 Ps)versus latency budget.
fixed, i.e., t2= 10 (10×103+8×103)×103
(N+2)5×108where N {5,10},
while t3is computed by (32). Thus, the way to reduce T=
t2+t3is to reduce t3. As shown by the curves in Fig. 5(a),
where the left vertical axis represents Psand the right vertical
axis represents the latency T. As fuser increases, the latency
Tdecreases due to the decreasing of t3, whereas Pskeeps
constant due to that t2,η
a, and η
bremain constant. It can be
seen in Fig. 5(b) that the increasing of Pscomes at the cost
of a higher latency due to a greater offloading factor and a
longer offloading time resulted by an increased N.
Fig. 6 shows the SCP versus the transmit power (Pa=Pb)
under various offloading factors. Specifically, we set da= 10
m, db= 25 m, and Ma=Mb= 10 kbits. In the simulation,
the optimal offloading factors are given by (35). For the
fixed offloading factors, we set ηa=ηb=η= 0.75,
ηa=ηb=η= 0.85, and ηa=ηb=η= 0.95, respectively.
For the considered offloading schemes, the proposed RSMA-
MEC scheme obtains the best SCP performance, which verifies
the results in Corollary 1. Compared to the NOMA-MEC
scheme, a higher SCP is observed to be achieved by the
RSMA-MEC scheme.
To clearly see how the SCP varies as the latency budget in-
creases, we employ the failed computation probability (1−Ps)
to highlight the simulation results in Fig. 7, in which we set
1.5 2 2.5 3 3.5 4 4.5
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Fig. 8. Psversus distance ratio db
da(da= 15 m).
da= 6 m, db= 30 m, and Ma=Mb= 10 kbits. From
the curves of Fig. 7, we can see that the failed computation
probability decreases with the growth of the latency budget
T. The reason for this phenomenon is that when Tincreases,
the paired users can spend more time to offload according
to Corollary 1, thereby increasing the SCP, as discussed in
Remark 5. For any given T, the failed computation proba-
bility becomes lower as transmit power increases, which is
consistent with the previous simulation results.
In Fig. 8, we plot the SCP versus various distance ratio,
db
da, under different transmit powers. The task length and the
distance the PU to the MEC server are set as Ma= 13
kbits, Mb= 10 kbits and da= 15 m in this simulation. As
revealed by the curves in this figure, the SCP of the proposed
RSMA-MEC scheme decreases steadily with the increasing of
db, whereas the NOMA-MEC scheme first increases its SCP
and then decreases it. This is because a larger dbleads to
a smaller ρb, which results in a reduced SCP. The reason for
the phenomenon that Psof our proposed RSMA-MEC scheme
is higher than that of the NOMA-MEC scheme is explained
as follows. When Case I occurs, the SCP performance of
our proposed RSMA-MEC scheme keeps the same as that
of the NOMA-MEC scheme. For the occurrences of Case
II, the RSMA-MEC scheme ensures the offloading of PU
while maximizing the achievable rate of SU, which is the
superiority of the proposed RSMA-MEC scheme over the
NOMA-MEC scheme. In summary, for the considered db,
the SCP performance of the proposed RSMA-MEC scheme is
always better than that achieved by the NOMA-MEC scheme.
B. SCP Performance Achieved by User Pairing Schemes
In this subsection, we investigate the impact of the user
pairing schemes on the SCP performance in the MEC system
containing randomly deployed users. Unless otherwise stated,
we set µΦC=µΦE= 0.005,RE= 40 m, Ma= 15 kbits,
and Mb= 10 kbits in the simulation. In particular, we set
RC=q1
2REsuch that the number of the active users in the
center group is the same as that in the edge group on average.
To reveal the impact of the Gaussian Chebyshev parameters
on the accuracy of the approximated SCP, we plot the accuracy
13
5 10 15 20 25 30 35 40 45
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
NCNE
NCFE
RCRE
NENC
NEFC
RERC
Fig. 9. The accuracy of the Chebyshev-Gaussian quadrature-based approxi-
mation versus N1(N2=N1,Pa=Pb= 15 dBm).
of the approximated SCPs (39), (44), (48), (49), (50), and (51)
in terms of N1, as shown in Fig. 9. Specifically, the accuracy
of the approximated SCP for the user pairing scheme Ξis
calculated by AΞ= 1 |(PΞ
s,Ana−P Ξ
s,Sim)|
PΞ
s,Sim
, where PΞ
s,Ana and
PΞ
s,Sim are the approximated SCP value and simulated SCP
value of the user pairing scheme Ξ, respectively. It can be
seen from Fig. 9, the accuracy of these approximated results
increases with the increasing of N1and approaches the perfect
accuracy (AΞ= 1) when N1=N225.
In Fig. 10, we plot Psagainst the transmit power (Pa=
Pb) for all the considered user pairing schemes. As can be
seen from this figure, the approximated expressions obtained
by Chebyshev-Gaussian quadrature, i.e., (39), (44), (48), (49),
(50), and (51), exactly match with the simulation results. Also,
the Gaussian Chebyshev parameters are set as N1=N2=
25 and the corresponding approximation accuracy has already
been verified by Fig. 9. We can see that the SCP increases with
the increasing of the transmit power for all the considered user
pairing schemes. Besides, one can also see from Fig. 10 that
the NCNE scheme achieves the highest SCP among all the
user pairing schemes. In addition, the NCFE scheme achieves a
higher SCP than the NEFC scheme. For the NCNE and NENC
schemes containing the small path loss, the PU selected from
the center group yields a higher SCP than the PU selected
from the edge group. For the random user pairing schemes,
the PU selected from the center group also achieves a higher
SCP than the PU selected from the edge group. For the NEFC
scheme, the distance between the PU and the SU is shorter
than those of the other user pairing schemes, which results in
the lowest SCP in the low transmit power region. However,
the SCP achieved by the NEFC scheme is still higher than that
of the RERC scheme in the middle and high transmit power
regions. In summary, the user pairing schemes that select PU
from the center group can attain the SCP performance gain
over those select the PU from the edge group.
To compare the SCP performance of the RSMA-MEC
scheme with that of the NOMA-MEC scheme for different
user pairing schemes, we plot the SCP versus transmit power
in Fig. 11 and Fig. 12.
0 5 10 15 20 25 30
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
NCNE, Ana
NENC, Ana
RCRE, Ana
RERC, Ana
NCFE, Ana
NEFC, Ana
Markers: simulation results
Fig. 10. Psachieved by RSMA-MEC with various user pairing schemes.
0 5 10 15 20 25 30
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
RSMA with RCRE, Ana
RSMA with RCRE, Sim
RSMA with NCFE, Ana
RSMA with NCFE, Sim
RSMA with NCNE, Ana
RSMA with NCNE, Sim
NOMA with RCRE
NOMA with NCFE
NOMA with NCNE
Fig. 11. Pscomparison between RSMA-MEC and NOMA-MEC with various
user pairing schemes (PU is a center group user).
In Fig. 11, the user pairing schemes performed by the
RSMA-MEC scheme are compared with the NOMA-MEC
scheme when the PU is selected from the center group. As
shown by the curves in Fig. 11, the theoretical results match
the simulation results well. It can be seen from the Fig. 11, the
RSMA-MEC scheme outperforms the NOMA-MEC scheme
when different user pairings are realized. For the RSMA-MEC
scheme, both the NCNE and NCFE user pairings achieve a
higher SCP than the RCRE user paring. Further, the NCFE
user pairing outperforms the RCRE user pairing for any given
transmit power. For the NOMA-MEC scheme, the NCNE user
pairing achieves a better SCP performance than the RCRE and
NCFE user pairings in the low and middle transmit power
regions, whereas the NCFE user pairing achieves the highest
SCP compared with the RCRE and NCNE user pairings in the
high transmit power region.
In Fig. 12, we consider the scenario where the PU is selected
from the edge group. Similar to the results in Fig. 11, the
RSMA-MEC scheme achieves a higher SCP than the NOMA-
MEC scheme when different user pairings are realized.For
the RSMA-MEC scheme, the NENC yields the best SCP
performance compared to the RERC and NEFC. Furthermore,
the RERC user pairing outperforms the NEFC user pairing
in the low transmit power region. However, the NEFC user
14
0 5 10 15 20 25 30
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
RSMA with RERC
RSMA with NEFC
RSMA with NENC
NOMA with RERC
NOMA with NEFC
NOMA with NENC
Fig. 12. Pscomparison between RSMA-MEC and NOMA-MEC with various
user pairing schemes (PU is an edge group user)
pairing achieves a higher SCP than the RERC user pairing
in the middle and high transmit power regions. In summary,
whether the PU is selected from the center group or the edge
group, the RSMA-MEC scheme always achieves a higher SCP
than the NOMA-MEC scheme for the considered user pairing
schemes.
In Fig. 13, we plot the SCP versus RE
RCfor the user pairing
schemes considering that the PU is selected from the center
group. In the first subplot, REis fixed as 50 m and the radius
of the center group RCcan vary. It can be seen from the curves
of the first subplot, RCcan affect the SCP achieved by the
NCNE and RCRE schemes, whereas the impact of RCon the
SCP is negligible for the NCFE scheme. As RCdecreases, the
NCNE scheme has more choices to select a SU with a shorter
db, whereas the RCRE scheme has more choices to select a
PU with a smaller path loss to improve the SCP. In the second
subplot, RCis fixed as 16 m and the disk’s radius REcan vary.
We can observe that the SCP achieved by the RCRE and NCFE
schemes decreases considerably with the increasing of RE
RC,
whereas the NCNE scheme always achieves the SCP closing to
1. There are several reasons for this phenomenon. Considering
that the range of the edge group increases with the increasing
of RE, the NCFE scheme may choose the SUs with a larger
db, so does the RCRE scheme, which results in a severe path
loss. Considering that the NCNE scheme selects the nearest
users in the center and edge groups, respectively, the change
of REdoes not affect the SCP performance. In a nutshell, no
matter what ranges the center and edge groups are, the RSMA-
MEC scheme with different user pairings always surpasses the
NOMA-MEC with the corresponding user pairings when the
PU is selected from the center group.
The curves in Fig. 14 reveal that the RSMA-MEC scheme
achieves a higher SCP than the NOMA-MEC scheme when
the PU is selected from the edge group. From the first subplot
of Fig. 14, we can see that the decreasing of RCenhances the
SCP performance for the RERC, NEFC, and NENC schemes.
It can be seen from the second subplot of Fig. 14, the SCP
achieved by the RERC scheme decreases considerably with
the increasing of RE
RC, whereas the NENC and NEFC schemes
always achieve a higher SCP performance. Further, the NENC
2345
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
2345
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
RSMA with RCRE
RSMA with NCFE
RSMA with NCNE
NOMA with RCRE
NOMA with NCFE
NOMA with NCNE
Fig. 13. Psversus RE
RC(PU is a center group user, Pa=Pb= 13 dBm).
2345
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
2345
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
RSMA with RERC
RSMA with NEFC
RSMA with NENC
NOMA with RERC
NOMA with NEFC
NOMA with NENC
Fig. 14. Psversus RE
RC(PU is an edge group user, Pa=Pb= 13 dBm).
outperforms the NEFC for the considered RC. The results in
Figs. 13 and 14 can be summarized as follows. First, the SCP
performance achieved by the RCRE and RERC schemes is
sensitive to RCand RE. Second, RCseverely affects the SCPs
achieved by the NCNE, NENC, and NEFC schemes. Last, RE
can significantly affect the SCP achieved by the NCFE scheme.
VII. CONCLUSIONS
In this paper, we have proposed an RSMA-MEC scheme
to enhance the offloading performance for a MEC system
consisting of a single MEC server and multiple randomly
deployed users. To enable simultaneous offloading from the
paired users to the MEC server, a CR-inspired rate-splitting
has been designed with the aim of maximizing the SU’s
achievable rate, meanwhile maintaining the PU’s offloading
performance same as in OMA. For the case of the fixed
user locations, we have derived the closed-form expression for
the SCP achieved by the RSMA-MEC scheme. The optimal
offloading parameters have been obtained by solving the
SCP maximization problem. Taking into account the user
locations, various user pairing schemes have been applied to
realize the uplink RSMA-aided offloading. We have derived
closed-form expressions for the SCPs achieved by the user
15
pairing schemes by invoking stochastic geometry techniques,
which characterizes the offloading performance of the RSMA-
MEC system. Simulation results have verified the superior
offloading performance achieved by the RSMA-MEC scheme
and revealed pros and cons of the user locations on maximizing
the SCP. Compared to the existing NOMA-MEC scheme,
simulations results have verified that the RSMA-MEC scheme
achieves a better SCP performance.
APPENDIX A: A P ROO F OF TH EO RE M 1
To derive closed-form expression for the SCP, we evaluate
P(I)
s,P(II)
s, and P(III)
s, respectively.
Corresponding to Case I, P(I)
scan be expressed as:
P(I)
s= Pr |ha|2>εa(1 + ρb|hb|2)
ρa
,|hb|2>εb
ρb.(52)
Considering that |hi|2(i=a, b) follows exponential distribu-
tion, P(I)
scan be evaluated as:
P(I)
s=Z
εb
ρbZ
εa(1+ρby)
ρa
exeydxdy =ρaeεb
ρbεa(1+εb)
ρa
ρbεa+ρa
,(53)
where εb2
ηbMb
t2B1.
Corresponding to Case II, P(II)
scan be evaluated as:
P(II)
s= Pr |ha|2>εa
ρa
,|hb|2>ρa|ha|2ε1
a1
ρb
,
|hb|2εa+εb+εaεbρa|ha|2
ρb
= Pr |ha|2>εa(1 + εb)
ρa
,|hb|2>ρa|ha|2ε1
a1
ρb
+ Pr εa
ρa
<|ha|2<εa(1 + εb)
ρa
,
|hb|2>εa+εb+εaεbρa|ha|2
ρb
=Z
εa(1+εb)
ρaZ
ρaε1
ay1
ρb
exeydxdy
+Z
εa(1+εb)
ρa
εa
ρaZ
εa+εb+εaεbρay
ρb
exeydxdy
=
ρb eεb
ρbεa(1+εb)
ρaeεa
ρaεb(1+εa)
ρb!
ρaρb
+ρbεaeεb
ρbεa(1+εb)
ρa
ρbεa+ρa
.(54)
Considering that τ= 0 in Case III, we have Pr R(III)
a
ηaMa= 0, which results in P(III)
s= 0. Then, it is readily
arrived at (27) by combining the derived P(I)
s,P(II)
s, and
P(III)
s.
REFERENCES
[1] P. Mach and Z. Becvar, “Mobile edge computing: A survey on architec-
ture and computation offloading, IEEE Commun. Surv. Tuts., vol. 19,
no. 3, pp. 1628–1656, 2017.
[2] D. Liu, B. Chen, C. Yang, and A. F. Molisch, “Caching at the wireless
edge: design aspects, challenges, and future directions,” IEEE Commun.
Mag., vol. 54, no. 9, pp. 22–28, 2016.
[3] Z. Zhang, Y. Xiao, Z. Ma, M. Xiao, Z. Ding, X. Lei, G. K. Karagiannidis,
and P. Fan, “6G wireless networks: Vision, requirements, architecture,
and key technologies, IEEE Veh. Technol. Mag., vol. 14, no. 3, pp.
28–41, 2019.
[4] Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan, and L. Hanzo,
“Nonorthogonal multiple access for 5G and beyond,” Proc. IEEE, vol.
105, no. 12, pp. 2347–2381, Dec. 2017.
[5] Y. Ye, G. Lu, R. Q. Hu, and L. Shi, “On the performance and optimiza-
tion for MEC networks using uplink NOMA,” in Proc. 2019 IEEE Int.
Conf. Commun. Workshops (ICC Workshops), Shanghai, China, 20-24
May 2019, pp. 1–6.
[6] F. Jia, H. Zhang, H. Ji, and X. Li, “Distributed resource allocation and
computation offloading scheme for cognitive mobile edge computing
networks with NOMA,” in Proc. IEEE/CIC Int. Conf. Commun. China
(ICCC), Beijing, China, 16-18 Aug. 2018, pp. 553–557.
[7] A. Chen, Z. Yang, B. Lyu, and B. Xu, “System delay minimization for
NOMA-based cognitive mobile edge computing, IEEE Access, vol. 8,
pp. 62 228–62 237, 2020.
[8] C. T. Nguyen, Q.-V. Pham, H.-G. T. Pham, N.-N. Dao, and W.-J. Hwang,
“Computation offloading in cognitive radio NOMA-enabled multi-access
edge computing systems,” IET Commun., vol. 14, no. 19, pp. 3404–3409,
2020.
[9] Y. Cheng, Z. Liu, Q. Chen, and C. Liang, “A delay-aware edge
computing and power control scheme in NOMA-enabled cognitive radio
networks,” in Proc. 2019 IEEE 90th Veh. Technol. Conf. (VTC2019-Fall),
Honolulu, HI, USA, 22-25 Sept. 2019, pp. 1–5.
[10] D. Wang, F. Zhou, W. Lin, Z. Ding, and N. Al-Dhahir, “Cooperative
hybrid nonorthogonal multiple access-based mobile-edge computing in
cognitive radio networks, IEEE Trans. Cogn. Commun. Netw., vol. 8,
no. 2, pp. 1104–1117, 2022.
[11] Y. Sun, Z. Ding, and X. Dai, “A new design of hybrid SIC for improving
transmission robustness in uplink NOMA,” IEEE Trans. Veh. Technol.,
vol. 70, no. 5, pp. 5083–5087, 2021.
[12] Y.-C. Liang, K.-C. Chen, G. Y. Li, and P. Mahonen, “Cognitive radio
networking and communications: an overview,” IEEE Trans. Veh. Tech-
nol., vol. 60, no. 7, pp. 3386–3407, 2011.
[13] K. Higuchi and Y. Kishiyama, “Non-orthogonal access with random
beamforming and intra-beam SIC for cellular MIMO downlink, in Proc.
2013 IEEE 78th Veh. Tech. Conf. (VTC2013-Fall), Las Vegas, NV, US,
2-5 Sep. 2013, pp. 1–5.
[14] Z. Ding, R. Schober, and H. V. Poor, “A new QoS-guarantee strategy for
NOMA assisted semi-grant-free transmission,” IEEE Trans. Commun.,
vol. 69, no. 11, pp. 7489–7503, 2021.
[15] ——, “Unveiling the importance of SIC in NOMA systems—Part I:
State of the art and recent findings,” IEEE Commun. Lett., vol. 24, no. 11,
pp. 2378–2382, Nov. 2020.
[16] ——, “Unveiling the importance of SIC in NOMA systems—Part II:
New results and future directions,” IEEE Commun. Lett., vol. 24, no. 11,
pp. 2373–2377, Nov. 2020.
[17] N. Zhang, J. Wang, G. Kang, and Y. Liu, “Uplink nonorthogonal multiple
access in 5G systems,” IEEE Commun. Lett., vol. 20, no. 3, pp. 458–461,
2016.
[18] Y. Mao, B. Clerckx, and V. O. Li, “Rate-splitting for multi-antenna
non-orthogonal unicast and multicast transmission,” in Proc. 2018 IEEE
19th Int. Workshop on Signal Process. Adv. Wireless Commun. (SPAWC),
2018, pp. 1–5.
[19] M. Z. Hassan, G. Kaddoum, and O. Akhrif, “Interference management
in cellular-connected internet-of-drones networks with drone-pairing and
uplink rate-splitting multiple access,” IEEE Internet Things J., pp. 1–19,
2022, Under Publication.
[20] Z. Yang, M. Chen, W. Saad, W. Xu, and M. Shikh-Bahaei, “Sum-
rate maximization of uplink rate splitting multiple access (RSMA)
communication,” IEEE Trans. Mob. Comput., vol. 21, no. 7, pp. 2596–
2609, 2022.
[21] B. Clerckx, H. Joudeh, C. Hao, M. Dai, and B. Rassouli, “Rate splitting
for MIMO wireless networks: a promising PHY-layer strategy for LTE
evolution, IEEE Commun. Mag., vol. 54, no. 5, pp. 98–105, May 2016.
[22] H. Joudeh and B. Clerckx, “Rate-splitting for max-min fair multigroup
multicast beamforming in overloaded systems, IEEE Trans. Wireless
Commun., vol. 16, no. 11, pp. 7276–7289, Nov. 2017.
[23] A. R. Flores, B. Clerckx, and R. C. de Lamare, “Energy efficiency
of rate-splitting multiple access, and performance benefits over SDMA
and NOMA,” in Proc. 2018 15th Int. Symp. Wireless Commun. Syst.
(ISWCS), Lisbon, Portugal, 28-31 Aug. 2018, pp. 1–6.
16
[24] Y. Mao, B. Clerckx, and V. O. K. Li, “Rate-splitting multiple access
for coordinated multi-point joint transmission,” in Proc. 2019 IEEE Int.
Conf. Commun. Workshops (ICC Workshops), Shanghai, China, 20-24
May 2019, pp. 1–6.
[25] A. Mishra, Y. Mao, O. Dizdar, and B. Clerckx, “Rate-splitting multiple
access for 6g—Part I: Principles, applications and future works,” IEEE
Commun. Lett., vol. 26, no. 10, pp. 2232–2236, 2022.
[26] Y. Mao, B. Clerckx, and V. O. K. Li, “Rate-splitting multiple access
for downlink communication systems: Bridging, generalizing and out-
performing SDMA and NOMA,” EURASIP J. Wireless Commun. Netw.,
vol. 16, no. 11, pp. 7276–7289, Nov. 2018.
[27] H. Joudeh and B. Clerckx, “Sum-rate maximization for linearly precoded
downlink multiuser MISO systems with partial CSIT: A rate-splitting
approach,” IEEE Trans. Commun., vol. 64, no. 11, pp. 4847–4861, 2016.
[28] B. Clerckx, Y. Mao, R. Schober, and H. V. Poor, “Rate-splitting unifying
SDMA, OMA, NOMA, and multicasting in MISO broadcast channel:
A simple two-user rate analysis,” IEEE Wireless Commun. Lett., vol. 9,
no. 3, pp. 349–353, 2020.
[29] O. Dizdar, Y. Mao, W. Han, and B. Clerckx, “Rate-splitting multiple
access: A new frontier for the PHY layer of 6G,” in Proc. 2020 IEEE
92nd Veh. Technol. Conf. (VTC2020-Fall), Victoria, BC, Canada, 18
Nov.-16 Dec. 2020, pp. 1–7.
[30] Y. Mao, O. Dizdar, B. Clerckx, R. Schober, P. Popovski, and H. V.
Poor, “Rate-splitting multiple access: Fundamentals, survey, and future
research trends,” IEEE Commun. Surv. Tutor., vol. 24, no. 4, pp. 2073–
2126, 2022.
[31] M. Dai, B. Clerckx, D. Gesbert, and G. Caire, A rate splitting
strategy for massive MIMO with imperfect CSIT, IEEE Trans. Wireless
Commun., vol. 15, no. 7, pp. 4611–4624, July 2016.
[32] B. Clerckx, Y. Mao, R. Schober, E. A. Jorswieck, D. J. Love, J. Yuan,
L. Hanzo, G. Y. Li, E. G. Larsson, and G. Caire, “Is NOMA efficient
in multi-antenna networks? a critical look at next generation multiple
access techniques,” IEEE Open J. Commun. Soc., vol. 2, pp. 1310–1343,
2021.
[33] A. Bansal, K. Singh, B. Clerckx, C.-P. Li, and M.-S. Alouini, “Rate-
splitting multiple access for intelligent reflecting surface aided Multi-
User communications,” IEEE Trans. Veh. Technol., vol. 70, no. 9, pp.
9217–9229, 2021.
[34] A. Mishra, Y. Mao, L. Sanguinetti, and B. Clerckx, “Rate-splitting
assisted massive machine-type communications in cell-free massive
MIMO,” IEEE Commun. Lett., vol. 26, no. 6, pp. 1358–1362, 2022.
[35] B. Rimoldi and R. Urbanke, “A rate-splitting approach to the Gaussian
multiple-access channel,” IEEE Trans. Inf. Theory, vol. 42, no. 2, pp.
364–375, Mar. 1996.
[36] Y. Zhu, Z. Zhang, X. Wang, and X. Liang, “A low-complexity non-
orthogonal multiple access system based on rate splitting,” in Proc.
2017 9th Int. Conf. Wireless Commun. Signal Process. (WCSP), Nanjing,
China, 11-13 Oct. 2017, pp. 1–6.
[37] J. Zeng, T. lv, W. Ni, R. Liu, N. C. Beaulieu, and Y. J. G. Fan, “Ensuring
max-min fairness of UL SIMO-NOMA: A rate splitting approach,” IEEE
Trans. Veh. Technol., vol. 68, no. 11, pp. 11 080–11 093, Nov. 2019.
[38] Y. Zhu, X. Wang, Z. Zhang, X. Chen, and Y. Chen, “A rate-splitting non-
orthogonal multiple access scheme for uplink transmission,” in Proc.
2017 9th Int. Conf. Wireless Commun. Signal Process. (WCSP), Nanjing,
China, 11-13 Oct. 2017, pp. 1–6.
[39] H. Liu, T. A. Tsiftsis, K. J. Kim, K. S. Kwak, and H. V. Poor,
“Rate splitting for uplink NOMA with enhanced fairness and outage
performance,” IEEE Trans. Wireless Commun., vol. 19, no. 7, pp. 4657–
4670, Jul. 2020.
[40] E. J. D. Santos, R. D. Souza, and J. L. Rebelatto, “Rate-splitting multiple
access for URLLC uplink in physical layer network slicing with eMBB,”
IEEE Access, vol. 9, pp. 163 178–163 187, 2021.
[41] T. P. Truong, N.-N. Dao, and S. Cho, “HAMEC-RSMA: Enhanced aerial
computing systems with rate splitting multiple access,” IEEE Access,
vol. 10, pp. 52 398–52 409, 2022.
[42] W. Jaafar, S. Naser, S. Muhaidat, P. C. Sofotasios, and
H. Yanikomeroglu, “Multiple access in aerial networks: From
orthogonal and non-orthogonal to rate-splitting,” IEEE Open J. Veh.
Technol., vol. 1, pp. 372–392, Oct. 2020.
[43] H. Kong, M. Lin, Z. Wang, J.-Y. Wang, W.-P. Zhu et al., “Performance
analysis for rate splitting uplink NOMA transmission in high throughput
satellite systems,” IEEE Wireless Commun. Lett., vol. 11, no. 4, pp. 816–
820, Apr. 2022.
[44] H. Kong, Z. Wang, M. Lin, Z. Lin, and J.-Y. Wang, “Beamforming and
power allocation for uplink NOMA transmission in multibeam satellite
communications with rate splitting,” in Proc. 2021 13th Int. Symp.
Antennas Propag. EM Theory (ISAPE), Zhuhai, China, 1-4 Dec. 2021,
pp. 1–3.
[45] O. Abbasi and H. Yanikomeroglu, “Rate-splitting and NOMA-enabled
uplink user cooperation,” in Proc. 2021 IEEE Wireless Commun. Netw.
Conf. Workshops (WCNCW), Nanjing, China, 29-29 Mar. 2021, pp. 1–6.
[46] S. A. Tegos, P. D. Diamantoulakis, and G. K. Karagiannidis, “On the
performance of uplink rate-splitting multiple access,” IEEE Commun.
Lett., vol. 26, no. 3, pp. 523–527, 2022.
[47] M. Z. Hassan, M. J. Hossain, J. Cheng, and V. C. M. Leung, “Device-
clustering and rate-splitting enabled device-to-device cooperation frame-
work in fog radio access network,” IEEE Trans. Green Commun. Netw.,
vol. 5, no. 3, pp. 1482–1501, 2021.
[48] H. Liu, Z. Bai, H. Lei, G. Pan, K. J. Kim et al., “A new rate splitting
strategy for uplink CR-NOMA systems,” IEEE Trans. Veh. Technol.,
vol. 71, no. 7, pp. 7947–7951, July 2022.
[49] M. Haenggi, Stochastic Geometry for Wireless Networks. Cambridge,
U.K.: Cambridge Univ. Press, 2012.
[50] Y. Ye, R. Q. Hu, G. Lu, and L. Shi, “Enhance latency-constrained
computation in MEC networks using uplink NOMA,” IEEE Trans.
Commun., vol. 68, no. 4, pp. 2409–2425, 2020.
[51] Z. Zhang and R. Q. Hu, “Uplink non-orthogonal multiple access with
fractional power control, in Proc. 2017 IEEE Wireless Commun. Netw.
Conf. (WCNC), San Francisco, CA, USA, 19-22 Mar. 2017, pp. 1–6.
[52] Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, A survey
on mobile edge computing: The communication perspective, IEEE
Commun. Surv. Tuts., vol. 19, no. 4, pp. 2322–2358, 2017.
[53] A. Kiani and N. Ansari, “Edge computing aware NOMA for 5G
networks,” IEEE Internet Things J., vol. 5, no. 2, pp. 1299–1306, Apr.
2018.
[54] Z. Ding, J. Xu, O. A. Dobre, and H. V. Poor, “Joint power and time
allocation for NOMA–MEC offloading,” IEEE Trans. Veh. Technol.,
vol. 68, no. 6, pp. 6207–6211, 2019.
[55] Z. Ding, P. Fan, and H. V. Poor, “Impact of non-orthogonal multiple
access on the offloading of mobile edge computing,” IEEE Trans.
Commun., vol. 67, no. 1, pp. 375–390, Jan. 2019.
... Due to the advantages of uplink RSMA compared to uplink NOMA as shown in [16]- [18], RSMA can be also adopted in MEC systems to further improve computation offloading performance. However, only a few works focused on RSMAassisted MEC systems [19]- [22]. Specifically, in [19], an unmanned aerial vehicle (UAV) aided MEC system with a UAV and two access points (APs) was considered, and the UAV was assumed to use RSMA for transmitting collected data from devices to the APs for computing. ...
... In [21], a downlink MEC system with multiple UAVs acting as MEC servers and multiple base stations (BSs) connecting to a central cloud was considered, and RSMA was adopted for transmitting users' messages from the UAVs and the BSs to users. In [22], an MEC system with a group of center users and edge users was considered, and the successful computation probability achieved by the RSMA was derived in closed-form. Note that the works in [19], [21] applied downlink RSMA in MEC systems, while the works in [20], [22] applied uplink RSMA. ...
... In [22], an MEC system with a group of center users and edge users was considered, and the successful computation probability achieved by the RSMA was derived in closed-form. Note that the works in [19], [21] applied downlink RSMA in MEC systems, while the works in [20], [22] applied uplink RSMA. ...
Preprint
Rate splitting multiple access (RSMA) provides a flexible transmission framework that can be applied in mobile edge computing (MEC) systems. However, the research work on RSMA-assisted MEC systems is still at the infancy and many design issues remain unsolved, such as the MEC server and channel allocation problem in general multi-server and multi-channel scenarios as well as the user fairness issues. In this regard, we study an RSMA-assisted MEC system with multiple MEC servers, channels and devices, and consider the fairness among devices. A max-min fairness computation offloading problem to maximize the minimum computation offloading rate is investigated. Since the problem is difficult to solve optimally, we develop an efficient algorithm to obtain a suboptimal solution. Particularly, the time allocation and the computing frequency allocation are derived as closed-form functions of the transmit power allocation and the successive interference cancellation (SIC) decoding order, while the SIC decoding order is obtained heuristically, and the bisection search and the successive convex approximation methods are employed to optimize the transmit power allocation. For the MEC server and channel allocation problem, we transform it into a hypergraph matching problem and solve it by matching theory. Simulation results demonstrate that the proposed RSMA-assisted MEC system outperforms current MEC systems under various system setups.
... Therefore, an RSMA-aided MEC scheme was introduced in [48] to enhance the successful computation probability and reduce offloading latency within a MEC system consisting of a single MEC server and multiple randomly distributed users. Each user pair is assigned to different orthogonal time/frequency resource blocks based on distance and employs two-user uplink RSMA, eliminating interuser interference within each pair. ...
Preprint
Full-text available
This paper focuses on the latest research and innovations in fundamental next-generation multiple access (NGMA) techniques and the coexistence with other key technologies for the sixth generation (6G) of wireless networks. In more detail, we first examine multi-access edge computing (MEC), which is critical to meeting the growing demand for data processing and computational capacity at the edge of the network, as well as network slicing. We then explore over-the-air (OTA) computing, which is considered to be an approach that provides fast and efficient computation of various functions. We also explore semantic communications, identified as an effective way to improve communication systems by focusing on the exchange of meaningful information, thus minimizing unnecessary data and increasing efficiency. The interrelationship between machine learning (ML) and multiple access technologies is also reviewed, with an emphasis on federated learning, federated distillation, split learning, reinforcement learning, and the development of ML-based multiple access protocols. Finally, the concept of digital twinning and its role in network management is discussed, highlighting how virtual replication of physical networks can lead to improvements in network efficiency and reliability.
... RSMA can provide significant gains in terms of massive connectivity [7], ergodic rate [8], user fairness and outage probability [9]. A cognitive radio (CR)-inspired RSMA-MEC scheme was designed in [10], which outperformed its NOMA counterpart in terms of successful offload probability. Furthermore, in [11], [12], an RSMA-based slicing was studied for one eMBB and multiple mMTC users, and for one eMBB and multiple URLLC users, respectively. ...
Article
Full-text available
Network slicing via next-generation multiple access techniques and multi-access edge computing (MEC) are considered key enablers for meeting the heterogeneous quality of service requirements of the sixth-generation (6G) networks. Thus, in this work, we investigate the coexistence of further enhanced mobile broadband (feMBB) and ultra-massive machine-type communications (umMTC) devices in a quasi-isolated (QI) heterogeneous uplink MEC network, where users of both services share the same resources, interfering with each other. The feMBB users can partially offload their data to the MEC server utilizing the rate-splitting multiple access (RSMA) protocol, while the umMTC users perform only full offloading. We formulate and optimally solve the problem of maximizing the number of umMTC devices subject to data processing time and data rate constraints by adjusting both the decoding order of the users and the power splitting factor of the RSMA, while a closed-form expression for the optimal partial offloading factor of the feMBBs devices is derived. Simulation results verify that utilizing the RSMA protocol, the QI MEC network has the potential to support more umMTC devices compared to the isolated one.
... With the benefits of MEC, the authors of [27] utilized a CR-inspired RMSA scheme to allow SU to offload tasks to the MEC server with a dynamic rate splitting factor while ensuring no interference to the offloading performance of PU. In [28], the authors investigated the impact of user locations on the performance of a MEC system using RSMA. They derived a closed-form expression for the successful computation probability in the presence of randomly deployed users, which enabled them to analyze the effects of user locations on offloading performance. ...
Article
Full-text available
Rate-splitting multiple access (RSMA) has recently received attention due to its benefits in both spectral and energy efficiencies. In this paper, we propose a hybrid RSMA-time-division multiple access (TDMA) scheme for a mobile edge computing (MEC) system, where two edge users need to offload their task data to a MEC server. In the proposed scheme, the offloading time is divided into two time phases. Specifically, we design a cognitive radio (CR)-inspired RSMA scheme, in which two users, namely the primary user and secondary user, offload their task data to the MEC server in the first time phase, while only a single user can offload task data in the second time phase. With the aim of minimizing the overall offloading delay, we formulate the offloading delay minimization problem subject to the transmit power and total energy constraints. We transform the original fractional programming non-convex problem to a convex one by using the Dinkelbach transform and propose Dinkelbach and Newton iterative algorithms to determine the optimal transmit power allocation. Specifically, we establish the optimization criteria for the three offloading schemes and derive the corresponding closed-form expressions for the optimal power allocation. Compared to the existing offloading schemes, the numerical results show that the proposed hybrid RSMA-TDMA scheme in scenarios where having a limited energy budget is superior in offloading delay compared to other offloading schemes and the sum offloading delay tends to a constant with the increase in the energy budget.
Article
The rapid advancement of wireless communication and artificial intelligence (AI) has led to a plethora of emerging applications that require exceptional connectivity, minimal latency, and substantial computing resources. The widespread adoption of cloud-edge intelligence is propelling the development of future networks capable of supporting intelligent computing. Mobile edge computing (MEC) technology facilitates the movement of computing resources and storage to the network’s edge, enabling cost-effective offloading of computational tasks for related applications which needs for reduced latency and improved energy efficiency. However, the offloading efficiency is hindered by limitations of wireless transmission capacity. This paper aims to address this issue by integrating reconfigurable intelligent surfaces (RISs) into a cell-free network within an intelligent cloud-edge system. The core idea is to strategically deploy passive RISs around base stations (BSs) to reconstruct the transmission channel and improve the corresponding capacity. Subsequently, we formulate an optimal problem involving joint beamforming for RISs and BSs, which is characterized by non-convexity and complexity. To tackle this challenge, we employ an alternating optimization scheme to ensure the effectiveness of joint beamforming. In particular, deep reinforcement learning (DRL) is leveraged to reduce the computational complexity involved in optimizing task offloading. Additionally, Lyapunov optimization is utilized to model the latency queue and improve the learning efficiency of the offloading framework. We conduct comprehensive evaluations on the wireless system’s capacity, average latency, and energy consumption, considering the integration of RIS with the DRL offloading framework. Experimental results demonstrate that our proposed scheme achieves superior efficiency and robustness.
Article
The increasing number of connected devices in machine-type applications, such as the Internet of Things (IoT), leads to the coexistence of heterogeneous services in Beyond 5G (B5G) networks, where users with diverse requirements share physical resources. In this paper, we apply a channel allocation method to assign Grant-Based (GB) users to channels. This method, named Max-Matching Diversity (MMD), leads to a frequency diversity gain that equals the number of available channels, reducing the outage of GB users. In the same network resource that serves a GB user, one Grant-Free (GF) user is allocated through a distributed contention protocol that considers the Quality-of-Service (QoS) of the GB user, performing the pairing that causes the minimum interference, so that the presence of a GF user is transparent to the GB user. Both users admitted to the same physical resource operate in either Non-Orthogonal Multiple Access (NOMA) or Rate-Splitting Multiple Access (RSMA), depending on the channel gains. Exact expressions for the outage probability of this Semi-Grant-Free (SGF) system are provided and compared to simulation results, showing that the SGF transmissions with MMD-aided GB users strategy reduces the outage and increases the achievable rate of both users.
Article
With the rapid proliferation of smart devices in wireless networks, more powerful technologies are expected to fulfill the network requirements of high throughput, massive connectivity, and diversify quality of service. To this end, rate splitting multiple access (RSMA) is proposed as a promising solution to improve spectral efficiency and provide better fairness for the next-generation mobile networks. In this paper, the outage performance of uplink RSMA transmission with randomly deployed users is investigated, taking both user scheduling schemes and power allocation strategies into consideration. Specifically, the greedy user scheduling (GUS) and cumulative distribution function (CDF) based user scheduling (CUS) schemes are considered, which could maximize the rate performance and guarantee scheduling fairness, respectively. Meanwhile, we re-investigate cognitive power allocation (CPA) strategy, and propose a new rate fairness-oriented power allocation (FPA) strategy to enhance the scheduled users’ rate fairness. By employing order statistics and stochastic geometry, an analytical expression of the outage probability for each scheduling scheme combining power allocation is derived to characterize the performance. To get more insights, the achieved diversity order of each scheme is also derived. Theoretical results demonstrate that both GUS and CUS schemes applying CPA or FPA strategy can achieve full diversity orders, and the application of CPA strategy in RSMA can effectively eliminate the secondary user’s diversity order constraint from the primary user. Simulation results corroborate the accuracy of the analytical expressions, and show that the proposed FPA strategy can achieve excellent rate fairness performance in high signal-to-noise ratio region.
Article
Full-text available
Aerial networks have been widely considered a crucial component for ubiquitous coverage in the next-generation mobile networks. In this scenario, mobile edge computing (MEC) and rate splitting multiple access (RSMA) are potential technologies, which are enabled at aerial platforms for computation and communication enhancements, respectively. Motivated from this vision, we proposed a high altitude platform-mounted MEC (HAMEC) system in such an RSMA environment, where aerial users (e.g., unmanned aerial vehicles) can efficiently offload their tasks to the HAMEC for external computing acquisition. To this end, a joint configuration of key parameters in HAMEC and RSMA (referred to as HAMEC-RSMA) such as offloading decision, splitting ratio, transmit power, and decoding order was optimally designed for a processing cost minimization in terms of response latency and energy consumption. Subsequently, the optimization problem was transformed into a reinforcement learning model, which is solvable using the deep deterministic policy gradient (DDPG) method. To improve the training exploration of the algorithm, we employed parameter noises to the DDPG algorithm to enhance training performance. Simulation results demonstrated the efficiency of the HAMEC-RSMA system with superior performances compared to benchmark schemes.
Article
Full-text available
In uplink non-orthogonal multiple access (NOMA) channels, the existing cooperative successive interference cancellation (SIC) and power control (PC) schemes lack the capability of achieving the full capacity region, which restricts the outage performance of uplink NOMA users. For the uplink cognitive radio inspired NOMA system, we propose a new rate splitting (RS) strategy to maximize the achievable rate of the secondary user without deteriorating the primary user's outage performance. Based on the interference threshold and its own channel gain, the secondary user adaptively conducts RS, transmit power allocation and SIC, which utilizes the transmit power efficiently. The closed-form expression for the outage probability is derived for the secondary user. Numerical results show that the proposed RS scheme achieves the best outage performance for the secondary user among the existing cooperative SIC and PC schemes.
Article
Full-text available
This letter focuses on integrating rate-splitting multiple-access (RSMA) with time-division-duplex Cell-free Massive MIMO (multiple-input multiple-output) for massive machine-type communications. Due to the large number of devices, their sporadic access behaviour and limited coherence interval, we assume a random access strategy with all active devices utilizing the same pilot for uplink channel estimation. This gives rise to a highly pilot-contaminated scenario, which inevitably deteriorates channel estimates. Motivated by the robustness of RSMA towards imperfect channel state information, we propose a novel RSMA-assisted downlink transmission framework for cell-free massive MIMO. On the basis of the downlink achievable spectral efficiency of the common and private streams, we devise a heuristic common precoder design and propose a novel max-min power control method for the proposed RSMA-assisted scheme. Numerical results show that RSMA effectively mitigates the effect of pilot contamination in the downlink and achieves a significant performance gain over a conventional cell-free massive MIMO network.
Article
Full-text available
The use of new multiple access schemes emerges as a necessity in order to efficiently cope with the massive connectivity, reliability and high throughput requirements of the next generation Internet of Things. In this paper, we study the performance of an uplink rate-splitting multiple access (RSMA) network with two sources, in terms of outage probability and throughput. Specifically, we derive closed-form expressions for the outage probability of the transmitted messages and then, we utilize them to derive the throughput of the sources in a random access network with a medium access control protocol based on slotted ALOHA and RSMA.
Article
This letter investigates the return link performance of a high throughput satellite system, where the feeder link uses free-space optical technology while the user link employs radio frequency transmission. Based on the statistical channel state information, we first propose a scheme for combining rate splitting uplink non-orthogonal multiple access with beamforming in the user link to improve the spectral efficiency. Then, by assuming that the user link undergoes the shadowed-Rician fading while the feeder link experiences Málaga turbulence fading with nonzero-boresight pointing error, we derive a closed-form average throughput expression of the system with the proposed scheme. Finally, simulation results are provided to demonstrate the correctness of our theoretical analysis and the superiority of our proposed scheme to some previous works.
Article
Rate-splitting multiple access (RSMA) has emerged as a novel, general, and powerful framework for the design and optimization of non-orthogonal transmission, multiple access (MA), and interference management strategies for future wireless networks. By exploiting splitting of user messages as well as non-orthogonal transmission of common messages decoded by multiple users and private messages decoded by their corresponding users, RSMA can softly bridge and therefore reconcile the two extreme interference management strategies of fully decoding interference and treating interference as noise. RSMA has been shown to generalize and subsume as special cases four existing MA schemes, namely, orthogonal multiple access (OMA), physical-layer multicasting, space division multiple access (SDMA) based on linear precoding (currently used in the fifth generation wireless network–5G), and non-orthogonal multiple access (NOMA) based on linearly precoded superposition coding with successive interference cancellation (SIC). Through information and communication theoretic analysis, RSMA has been shown to be optimal (from a Degrees-of-Freedom region perspective) in several transmission scenarios. Compared to the conventional MA strategies used in 5G, RSMA enables spectral efficiency (SE), energy efficiency (EE), coverage, user fairness, reliability, and quality of service (QoS) enhancements for a wide range of network loads (including both underloaded and overloaded regimes) and user channel conditions. Furthermore, it enjoys a higher robustness against imperfect channel state information at the transmitter (CSIT) and entails lower feedback overhead and complexity. Despite its great potential to fundamentally change the physical (PHY) layer and media access control (MAC) layer of wireless communication networks, RSMA is still confronted with many challenges on the road towards standardization. In this paper, we present the first comprehensive tutorial on RSMA by providing a survey of the pertinent state-of-the-art research, detailing its architecture, taxonomy, and various appealing applications, as well as comparing with existing MA schemes in terms of their overall frameworks, performance, and complexities. An in-depth discussion of future RSMA research challenges is also provided to inspire future research on RSMA-aided wireless communication for beyond 5G systems.
Article
This letter is the first part of a three-part tutorial focusing on rate-splitting multiple access (RSMA) for 6G. As Part I of the tutorial, the letter presents the basics of RSMA and its applications in light of 6G. To begin with, we first delineate the design principle and basic transmission frameworks of downlink and uplink RSMA. We then illustrate the applications of RSMA for addressing the challenges of various potential enabling technologies and use cases, consequently making it a promising next generation multiple access (NGMA) scheme for future networks such as 6G and beyond. We briefly discuss the challenges of RSMA and conclude the letter. In continuation of Part I, we will focus on the interplay of RSMA with integrated sensing and communication, and reconfigurable intelligent surfaces, respectively in Part II and Part III of this tutorial.
Article
In order to efficiently compute the primary data and support the secondary quality-of-service (QoS) requirement, we propose a cooperative hybrid non-orthogonal multiple access (NOMA) scheme for mobile edge computing (MEC) assisted cognitive radio networks. In the proposed scheme, the primary computation task is securely offloaded to the secondary base station, and the hybrid NOMA technique is adopted to provide secondary spectrum access and secure the primary offloading simultaneously. The weighted energy consumption minimization problem for both the primary and secondary systems is first studied under the constraints of the primary system's secure outage probability and the secondary system's QoS requirements, and a two-stage algorithm is proposed to derive the optimal power, time slot and computation task allocation. To motivate the secondary system's cooperation, we optimally allocate the transmit power, time slot and computation task, such that the average secondary system's rate is maximized under the primary system's security requirement, and we derive closed-form expressions for the optimal resource allocations. Numerical results demonstrate the performance superiority of the proposed scheme compared with the full-offloading scheme in terms of the energy consumption and the average secondary rate.
Article
Interference management is a key challenge for cellular-connected Internet of Drones (IoD) networks that employ multiple cellular-connected hovering drones for data acquisition in surveillance and monitoring applications. This article proposes a novel resource optimization framework for managing interference in cellular-connected IoD networks. Specifically, the envisioned system divides the set of transmitting drones into distinct drone pairs, where the paired drones simultaneously transmit over the same radio resource blocks (RRBs). Each drone pair is assigned a set of orthogonal RRBs for data transmission, where these RRBs are shared with the terrestrial cellular network as well. An uplink rate-splitting multiple access scheme is employed to mitigate the interdrone interference at the drone pairs, and an RRB pricing method is exploited to control the interference between the aerial and cellular communication links. Our goal is to maximize the uplink capacity of the IoD network while reducing interference over the shared RRBs between the IoD and cellular networks. Toward this goal, a joint optimization of the drones’ transmit power allocation, drone pairing, and RRB scheduling among the drone pairs is presented. In order to obtain an efficient suboptimal solution, an iterative optimization is devised. Particularly, the presented joint optimization problem is decomposed into three subproblems for transmit power allocation, drone pairing and RRB scheduling, and RRB price update. By solving theses subproblems iteratively, a convergent rate-splitting-empowered resource allocation and clustering for interference management (REACT) algorithm is proposed. Extensive simulations are conducted to verify the effectiveness of the proposed REACT algorithm over several benchmark schemes.