ArticlePDF Available

BER Analysis for Uplink NOMA in Asymmetric Channels

Authors:

Abstract

The bit error rate (BER) analysis has been recognized as an effective approach to investigate the problems in nonorthogonal multiple access (NOMA) systems, such as inter-user interference (IUI) and error propagation. However, the impact of asymmetric channels on adaptive modulation and coding (AMC) will bring great challenges to the BER analysis of NOMA systems. In this letter, by exploiting the scaling characteristics of Euclidean distance, we disclose the boundary effect of asymmetric channels and derive the boundary value for paired users. In addition, we provide closed-form BER expressions for uplink NOMA users on both sides of the boundary value. Numerical results verify the existence of the boundary value and conform to our derivations.
IEEE COMMUNICATIONS LETTERS, VOL. 24, NO. 11, NOVEMBER 2020 2435
BER Analysis for Uplink NOMA in Asymmetric Channels
Fanbo Wei , Ting Zhou ,Member, IEEE, Tianheng Xu ,Member, IEEE,
and Honglin Hu ,Senior Member, IEEE
Abstract The bit error rate (BER) analysis has been recog-
nized as an effective approach to investigate the problems in non-
orthogonal multiple access (NOMA) systems, such as inter-user
interference (IUI) and error propagation. However, the impact of
asymmetric channels on adaptive modulation and coding (AMC)
will bring great challenges to the BER analysis of NOMA systems.
In this letter, by exploiting the scaling characteristics of Euclidean
distance, we disclose the boundary effect of asymmetric channels
and derive the boundary value for paired users. In addition,
we provide closed-form BER expressions for uplink NOMA users
on both sides of the boundary value. Numerical results verify the
existence of the boundary value and conform to our derivations.
Index Terms—Bit error rate, non-orthogon al multiple access,
asymmetric channels, boundary value.
I. INTRODUCTION
WITH the development of wireless networks, the demand
for spectrum resources is growing rapidly [1], [2].
In recent years, non-orthogonal multiple access (NOMA) has
been recognized as a promising candidate technique for next-
generation networks [3]. Particularly, NOMA improves the
capacity of wireless systems when serving a combination of
strong and weak users. Many studies have confirmed the supe-
rior ability of NOMA to improve spectral efficiency [4]–[6].
As a key performance indicator (KPI) of wireless networks,
the bit error rate (BER) has been fully analyzed for NOMA
systems [5]–[7]. Specifically, based on the pulse shaping
technique, the research in [6] presents a theoretical BER analy-
sis of QPSK modulation for Fast Fourier Transform-based
NOMA (FFT-NOMA). The closed-form BER expressions of
uplink NOMA applying QPSK constellation are provided
in [7]. However, in existing researches, BER analysis mainly
focuses on the users of the same modulation order. Most
existing studies do not take into consideration the practical
impact of asymmetric channels on NOMA scheme, where the
received signal-to-noise ratios (SNRs) of users are significantly
different. Hence, theoretical research that investigates the
BER performance of uplink NOMA schemes in asymmetric
channels is pressingly needed.
Manuscript received April 12, 2020; revised May 15, 2020; accepted June 8,
2020. Date of publication June 18, 2020; date of current version Novem-
ber 11, 2020. This work was supported by the National Key Research and
Development Program of China (No. 2018YFB1802300), the National Natural
Science Foundation of China (No. 61801461), and the Shanghai Munici-
pality of Science and Technology Commission Project (Nos. 19511103102,
19511104204). The associate editor coordinating the review of this letter and
approving it for publication was Z. Qin. (Corresponding author: Ting Zhou.)
Fanbo Wei is with the Shanghai Advanced Research Institute, Chinese
Academy of Sciences, Shanghai 201210, China, and also with the School of
Electronic, Electrical and Communication Engineering, University of Chinese
Academy of Sciences, Beijing 100049, China.
Ting Zhou, Tianheng Xu, and Honglin Hu are with the Shanghai Advanced
Research Institute, Chinese Academy of Sciences, Shanghai 201210, China
(e-mail: zhouting@sari.ac.cn).
Digital Object Identifier 10.1109/LCOMM.2020.3003274
In practical systems, uplink NOMA schemes tend to pair
users with significant differences in channel conditions and
allocate more power to strong users to minimize inter-user
interference (IUI) [8], [9]. Thus, the asymmetric channel
is considered to be a key feature of the uplink NOMA
scheme [10], [11]. In order to improve channel utilization in
asymmetric channels, adaptive modulation and coding (AMC)
should be considered for the NOMA users in asymmetric
channels [12]. Nevertheless, different modulations will greatly
increase the difficulty of successive interference cancellation
(SIC) decoding process, and eventually bring in serious error
propagation to NOMA systems. Accordingly, in order to
well control the error propagation effect, BER analysis for
uplink NOMA systems becomes an urgent need. In this letter,
we define the inter-user gap (namely IUG) which measures
the SNR difference between two users and investigate the
BER performance of an uplink NOMA scheme in asymmetric
channels. Our contributions can be summarized as follows:
Based on the scaling effect brought by different modu-
lations, the scaling of the weak user’s signals is mapped
to constellation diagram, which reflects the scaling of the
Euclidean distance between superimposed signals. Then,
the boundary effect in asymmetric channel is disclosed
and the boundary value for paired users is derived.
To better guide the implementation of AMC technique in
practical uplink NOMA systems, the exact closed-form
BER expressions are derived for two users with different
modulations.
Simulation results conform to our derivations and show
that the BER performance of the weak user achieves
remarkable gain when the IUG exceeds the boundary
value.
II. SYSTEM MODEL AND PROBLEM FORMULATION
We consider a typical uplink NOMA scheme with one
base station (BS) and two users. Define hias the channel
gain from the user-ito the BS, where i∈{1,2}is the
user index. Particularly, hican be expressed as hi=gi·
PL
1(Di),wherePL
1(Di)accounts for the path loss, and
Diaccounts for the distance from the user-ito the BS. Define
|gi|as the additive white Gaussian noise (AWGN) channel
gain. Without loss of generality, we assume that the NOMA
scheme has perfect synchronization and the channel gains
are perfectly known [13], [14]. Channel gains are sorted as
|h2|2>|h1|2[14]. The specific synchronization and channel
estimation can be referred to [15]–[17]. Due to the channel
difference, different modulations are needed for different users
to improve channel utilization. Considering there are many
combinations of modulations in practical NOMA systems,
we select the most classical modulations (user-1: BPSK
[18], [19], user-2: QPSK [6], [7]). Notations s1and s2
are the BPSK signal of user-1 and the QPSK signal of
1558-2558 © 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: Shanghai Advanced Research Institute CAS. Downloaded on July 21,2022 at 10:17:33 UTC from IEEE Xplore. Restrictions apply.
2436 IEEE COMMUNICATIONS LETTERS, VOL. 24, NO. 11, NOVEMBER 2020
Fig. 1. Illustration of the signal constellation for user-2: (a) the first state:
d1/β1<d
2; (b) the second state: d1/β2d2.
user-2 respectively. The received signal at the BS can be
expressed as
y=P1h1s1+P2h2s2+w
=P1g1·PL
1(D1)s1+P2g2·PL
1(D2)s2+w(1)
where Piand hirefer to the transmission power and the chan-
nel coefficient of users respectively, with P2|h2|2>P
1|h1|2.
Notation wis the AWGN with zero mean and variance σ2
w.
The SNRs of the paired users are defined as γ1=P1|h1|22
w
and γ2=P2|h2|22
w.
Fig. 1 illustrates the constellation points of user-2 with
the IUI of user-1. The orange circles denote user-2’s original
QPSK constellation points that are defined as cp(a1a2),where
a1,a2denotes the bits of user-2, and 2d2denotes the minimum
distance between constellation points. Due to the IUI from
user-1’s signals, each original QPSK constellation point is
transferred to two possible superimposed constellation points.
The superimposed constellation points are represented by
dotted circles in Fig. 1 and are defined as cp(a1a2,a
3),where
a3is the bit of user-1. Particularly, the minimum distance
between the superimposed constellation points is 2d1/β,
where 2d1is the minimum distance between the original
BPSK constellation points of user-1, and βis the IUG between
the paired users, i.e., β=γ21. Note that in this letter, d1
and d2are defined as: d1=1,d2=2/2respectively.
Since the minimum distance between the superimposed
constellation points is 2d1/β, it can be observed that there
are two states for the IUG β. Referring to Fig. 1 (a), the first
state can be expressed as:
d1/β1<d
2,i.e., β1>d
2
1/d2
2=2.(2)
For the original constellation point cp(10) in the first
state, both its superimposed constellation points cp(10,1) and
cp(10,0) are located in the correct decision region before the
AWGN is introduced. Other points also have similar situations.
On the other hand, since each received signal at the BS
experiences a distinct channel gain, the transmission power of
the users in uplink NOMA cannot be shared. Thus, the trans-
mission power may has a limited range from the perspective
of energy preserving [20]. Considering the possible effects of
this case and referring to Fig. 1 (b), the second state can be
expressed as:
d1/β2d2,i.e., 1
2d2
1/d2
2=2.(3)
In the second state, some superimposed constellation points
fall directly into the error decision region for the 1st bit a1
without the AWGN, such as cp(10,0) and cp(00,1) .Inthis
situation, the power of IUI from user-1’s signals exceeds that
of user-2’s signals in phase-dimension. Consequently, it will
bring an extremely strong interference when decoding a1of
user-2 during SIC process. It should be pointed out that this
case does not exist when users have the same modulation,
where the superimposed constellation points never exceed the
decision boundary before the noise is introduced [7]. However,
this case do exist in the combinations of different modulations.
According to the above analysis, d2
1/d2
2that is approximately
equal to 3 dB can be regarded as a boundary value for paired
users in such an asymmetric channel.
III. CLOSED-FORM BER EXPRESSIONS
In this section, we consider the above two states and derive
the closed-form BER expressions of user-2 and user-1.
A. The BER of User-2 Applying QPSK in Different States
Theorem 1: Using the QPSK modulation, the BER of user-2
(strong user) in state 1 has a closed-form formulation as
BERS1
2=1
21
2Qd2d1/β1
σw/2+1
2Qd2+d1/β1
σw/2
+Qd2
σw/2,(4)
where Q(x)=1/2π
xexp(u2/2)du denotes
Qfunction.
Proof: Let us start with the first bit a1in point cp(10).
As shown in Fig. 1 (a), both the superimposed constellation
points of cp(10) (cp(10,1) and cp(10,0)) are located in the
correct decision region for a1,andaxis-Qis the decision
boundary. Since the distances from cp(10,1) and cp(10,0)
to their decision boundaries are (d2+d1/β1)and (d2
d1/β1)respectively, a bit error will occur when the AWGN
exceeds (d2+d1/β1)or (d2d1/β1). Considering the
four possible cases (four dashed rectangles) in which a1is
decoded erroneously, the error probability of a1is given by
PS1
a1=1
4Pr d2d1
β1
<|w|+Prd2+d1
β1
<|w|
=1
2Qd2d1/β1
σw/2+Q(d2+d1/β1
σw/2).(5)
Since user-1’s symbols are 1-dimensional, the decoding of
a3does not interfere with the decoding of a2. The error
probability of a2is as follows
PS1
a2=1
2Pr (d2<|w|)=Qd2
σw/2.(6)
Authorized licensed use limited to: Shanghai Advanced Research Institute CAS. Downloaded on July 21,2022 at 10:17:33 UTC from IEEE Xplore. Restrictions apply.
WEI et al.: BER ANALYSIS FOR UPLINK NOMA IN ASYMMETRIC CHANNELS 2437
Therefore, in state 1, the BER expression of user-2 can be
derived as [21]
BERS1
2=1
2
2
k=1
PS1
ak.(7)
Using (5), (6), and (7), we obtain the previous equation (4).
Theorem 2. Using the QPSK modulation, the BER of user-
2 in state 2 is expressed as
BERS2
2=1
21
2Qd2d1/β2
σw/2+1
2Qd2+d1/β2
σw/2
+Qd2
σw/2.(8)
Proof: As shown in Fig. 1 (b), the point cp(10,0) falls
directly into the error decision region for a1in state 2. There-
fore, a1in cp(10,0) can only achieve the correct decoding
when the AWGN is less than d2d1/β2(0);otherwise,
a decoding error occurs. Accordingly, a1in cp(00,1) can only
be decoded correctly when the AWGN exceeds d1/β2d2.
Considering four dashed rectangles in Fig. 1 (b), the error
probability of a1in state 2 is given by
PS2
a1=1
4Pr d2d1
β2
<|w|+Prd2+d1
β2
<|w|.
(9)
Here, we have d2d1/β20, which can be regarded
as a sign of the increased interference in state 2. Since a2in
state 2 has the same error probability as in state 1, i.e.,
PS2
a2=P
S1
a2=1
2Pr(d2<|w|),(10)
the BER of user-2 in state 2 is obtained as
BERS2
2=1
2
2
k=1
PS2
ak.(11)
With (9), (10), and (11), we complete the proof. To obtain
further insight, we compare the theoretical BER of user-2 in
state 1 and state 2.
Lemma 1: For a given SNR, the theoretical BER perfor-
mance of user-2 in two states satisfies
BERS2
2>BER
S1
2.(12)
Proof: Please refer to Appendix A.
B. The BER of User-1 Applying BPSK in Different States
For simplicity, when a3is decoded after SIC process,
we assume that a2has been decoded correctly. Then only the
decoding result of a1would affect the decoding of a3. Hence
two cases need to be discussed while wrong decoding occurs at
a3: (I) a1is decoded correctly; (II) a1is decoded erroneously.
Theorem 3: Using the BPSK modulation, the BER of user-1
(weak user) in state 1 has a closed-form expression as
BERS1
1=P
S1
a3,I+P
S1
a3,II
=1
22Qd1/β1
σw/2Qd2+d1/β1
σw/2
+Q2d2+d1/β1
σw/2+Qd2d1/β1
σw/2
Q2d2d1/β1
σw/2,(13)
where PS1
a3,Iand PS1
a3,II represent the error probabilities of a3
in two different cases respectively.
Proof: For case I, we first consider the point cp(00,1)
in Fig. 1 (a). It can be observed that a1will be decoded
correctly when the AWGN goes beyond d1/β1d2.Further-
more, a wrong decoding will occur for a3when the AWGN
exceeds d1/β1. Hence for cp(00,1), the range of win case
Iisw>d
1/β1. Analogously, for cp(10,0), the range of w
in case I can be obtained as w<d1/β1. It can also be
inferred from Fig. 1 (a) that for cp(00,0) ,win case I satisfies
d2d1/β1<w<d1/β1.Forcp(10,1), the limitation
of win case I is represented as: d1/β1<w<d
1/β1+d2.
Considering the four dashed rectangles in Fig. 1 (a),
the error probability of a3in case I is given by
PS1
a3,I=1
4Pr d1
β1
<|w|
+Pr d1
β1
<|w|<d
2+d1
β1.(14)
However, the same approach does not apply to case II in
which the error propagation from user-2 is 2d2. Specifically,
for cp(00,1) as shown in Fig. 1 (a), a1will be decoded
erroneously when the AWGN is less than d1/β1d2.Inthis
situation, the distance from constellation point a3to its deci-
sion boundary will be changed from d1/β1to 2d2d1/β1.
Thus, there will exist wrong decoding for a3when the noise
goes beyond 2d2+d1/β1. Consequently, the range of win
case II is 2d2+d1/β1<w<d2+d1/β1. Meanwhile,
the ranges of win other superimposed constellation points is
obtained as w>2d2+d1/β1,w<2d2d1/β1,and
d2d1/β1<w<2d2d1/β1.
Therefore, the error probability of a3in case II is
represented by
PS1
a3,II =1
4Pr 2d2+d1
β1
<|w|
+Pr d2d1
β1
<|w|<2d2d1
β1.(15)
From (14) and (15), we obtain the previous equation (13).
Theorem 4. Using the BPSK modulation, the BER of user-1
in state 2 has a closed-form expression as
BERS2
1=P
S2
a3,I+P
S2
a3,II
=1
22Qd1/β2
σw/2Qd2+d1/β2
σw/2
+Q2d2+d1/β2
σw/2+Qd2d1/β2
σw/2
Q2d2d1/β2
σw/2.(16)
Proof: Similar to the proof of Theorem 3, the error prob-
ability of a3in case I can be obtained as follows
PS2
a3,I=1
4Pr d1
β2
<|w|
+Pr d1
β2
<|w|<d
2+d1
β2.(17)
For case II, the error probability of a3can also be
expressed as
Authorized licensed use limited to: Shanghai Advanced Research Institute CAS. Downloaded on July 21,2022 at 10:17:33 UTC from IEEE Xplore. Restrictions apply.
2438 IEEE COMMUNICATIONS LETTERS, VOL. 24, NO. 11, NOVEMBER 2020
Fig. 2. The BER performance of the users with different βin NOMAWOC C .
PS2
a3,II =1
4Pr 2d2+d1
β2
<|w|
+Pr d2d1
β2
<|w|<2d2d1
β2.(18)
Based on (17) and (18), we obtain the previous equa-
tion (16).Note that the derivation process of Theorem 1 to
Theorem 4 has superior compatibility. In addition to the
combination of BPSK and QPSK, similar derivations can be
further extended to other modulations (e.g., the combination
of QPSK and 16QAM).
IV. NUMERICAL RESULTS
In this section, the theoretical BER of an uplink NOMA
scheme and the existence of the boundary value are ver-
ified through simulation results. Simulations are designed
without and with channel coding (namely NOMAWOCC and
NOMAWCC ), which are implemented on AWGN channels.
Due to different modulations (user-1: BPSK, user-2: QPSK),
the distances from the original constellation points of two
users to their decision axes are d1=1and d2=2/2.
Thus, the boundary value that satisfies β=d2
1/d2
2=2
is approximated by 3 dB here. The state 1 corresponds to
β>3 dB in the simulations, while the state 2 corresponds to
β3dB.
Fig. 2 shows the BER performance of NOMAWOCC.For
different states, this figure shows a perfect match between
the numerical results and the theoretical analysis (4), (8),
(12), (13) and (16). For β=2.5 dB, when SNR exceeds
a certain value, here is an unexpected phenomenon that the
BER performance deteriorates with the increase of SNR. The
reason is that, in this state, some superimposed constellation
points fall into the wrong decision region directly without
AWGN. Consequently, the BER shows a growing trend when
SNR increases (the AWGN decreases). On the other hand, for
β=3.5 dB, since the IUI is greatly reduced, the decreasing
trend of BER with the increase of SNR is as expected.
For practical applications, the BER of NOMAWCC is illus-
trated in Fig. 3. This figure shows that for a given SNR,
the BER performance of user-2 (strong user) is improved with
theincreaseofβ. Such a phenomenon is reasonable, because
when βis increased, the distance from the superimposed
constellation points to the original constellation points will
be closer. Thus, it is easier to achieve correct decoding. For
Fig. 3. The BER performance of the users with different βin NOMAWCC .
Fig. 4. The BER performance of the users with different βin NOMAWCC .
user-1 (weak user), it can be observed that although the BER
performance of user-2 has been improved, the BER perfor-
mance of user-1 still deteriorates with the increase of SNR
when βequals 2.5 dB and 3 dB. This is because in the SIC
process, due to hard decision and hard reconstruction, user-2
can only provide very limited help for user-1 to handle error
propagation effect [22]. For β=3.5 or 4 dB, the BER of user-1
drops dramatically at high SNR environment. To accurately
describe this phenomenon, we further investigate the impact
of βon the BER performance of user-1, as shown in Fig. 4.
Note that the SNR of user-1 is set as 13 dB and βis set
in [2.5, 4.0] dB. It can be seen that there is no significant
improvement in the BER performance until βexceeds 3.0 dB.
Therefore, β=d2
1/d2
2=2that is approximately equal to 3 dB
can be considered as a boundary value.
V. C ONCLUSION
In this letter, we revealed the boundary value effect that
directly affects the BER performance of NOMA systems.
Moreover, we derived the closed-form BER expressions of
an uplink NOMA scheme in asymmetric channels. Numerical
results confirmed the existence of the boundary value and
verified our derivations. With the guidance of boundary value
effect, it could be promising to take into account a flexible
AMC mechanism for NOMA systems in future work.
APPENDIX
PROOF OF THE LEMMA 1
By Theorem 1 and Theorem 2, we obtain PS1
a2=P
S2
a2.
Therefore, we only use the error probability of a1in different
Authorized licensed use limited to: Shanghai Advanced Research Institute CAS. Downloaded on July 21,2022 at 10:17:33 UTC from IEEE Xplore. Restrictions apply.
WEI et al.: BER ANALYSIS FOR UPLINK NOMA IN ASYMMETRIC CHANNELS 2439
state PS1
a1and PS2
a1to compare the theoretical BER of user-2,
which can be formulated as
PS1
a1=1
2Qd2d1/β1
σw/2+Qd2+d1/β1
σw/2
=M(β1),(19)
PS2
a1=1
2Qd2d1/β2
σw/2+Qd2+d1/β2
σw/2
=N(β2),(20)
respectively. Furthermore, we define that x1(β)= d2d1/β
σw/2
and x2(β)=d2+d1/β
σw/2.SinceQfunction has the property
d(Q(x))
d(x)=1
2πexp 1
2x2=g(x),(21)
we have
d(M(β1))
d(β1)
=1
2d(x1(β1))
d(β1)g(x1(β1)) d(x2(β1))
d(β1)g(x2(β1))
=β3/2
1
4σw/2[g(x2(β1)) g(x1(β1))].(22)
As a result, β1and β2satisfy
β1>d
2
1/d2
2=2β2>1.(23)
Accordingly, we can find that |x1(β1)|<|x2(β1)|,and
g(x2(β1)) <g(x1(β1)). Using (22), the function M(β1)is
proved as a monotonically decreasing function of β1, and its
maximum value satisfies
Mmax <M(2) = 1
2[Q(0) + Q(2w)].(24)
Similarly, we have
d(N(β2))
d(β2)
=1
2d(x1(β2))
d(β2)g(x1(β2)) d(x2(β2))
d(β2)g(x2(β2))
=β3/2
2
4σw/2[g(x2(β2)) g(x1(β2))].(25)
Since |x1(β2)|<|x2(β2)|,wehaveg(x2(β2)) <g(x1(β2)).
Hence the function N(β2)is also a monotonically decreasing
function of β2, and it has a minimum value
Nmin =N(2) = 1
2[Q(0) + Q(2w)] >M
max.(26)
With the help of (26), we prove that
BERS2
2>BER
S1
2.(27)
REFERENCES
[1] T. Xu, T. Zhou, J. Tian, J. Sang, and H. Hu, “Intelligent spectrum
sensing: When reinforcement learning meets automatic repeat sensing
in 5G communications,” IEEE Wireless Commun., vol. 27, no. 1,
pp. 46–53, Feb. 2020.
[2] T. Zhou, T. Xu, L. Xiong, H. Hu, and B. Xu, “User-specific link
adaptation scheme for device-to-device network coding multicast,” IET
Commun., vol. 9, no. 3, pp. 367–374, Feb. 2015.
[3] Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan, and L. Hanzo,
“Non-orthogonal multiple access for 5G and beyond,” Proc. IEEE,
vol. 105, no. 12, pp. 2347–2381, Dec. 2017.
[4] Y. Huang, C. Zhang, J. Wang, Y. Jing, L. Yang, and X. You, “Signal
processing for MIMO-NOMA: Present and future challenges,” IEEE
Wireless Commun., vol. 25, no. 2, pp. 32–38, Apr. 2018.
[5] H. Haci, H. Zhu, and J. Wang, “Performance of non-orthogonal multiple
access with a novel asynchronous interference cancellation technique,”
IEEE Trans. Commun., vol. 65, no. 3, pp. 1319–1335, Mar. 2017.
[6] S.Baig,U.Ali,H.M.Asif,A.A.Khan,andS.Mumtaz,“Closed-
form BER expression for Fourier and wavelet transform-based pulse-
shaped data in downlink NOMA,” IEEE Commun. Lett., vol. 23, no. 4,
pp. 592–595, Apr. 2019.
[7] X. Wang, F. Labeau, and L. Mei, “Closed-form BER expressions of
QPSK constellation for uplink non-orthogonal multiple access,” IEEE
Commun. Lett., vol. 21, no. 10, pp. 2242–2245, Oct. 2017.
[8] M. Vaezi, Z. Ding, and H. V. Poor, Multiple Access Techniques for 5G
Wireless Networks and Beyond. Cham, Switzerland: Springer, 2018.
[9] F. Wei, T. Zhou, T. Xu, H. Hu, and X. Tao, A joint mechanism for fog-
relay networks based on NOMA and network coding,” in Proc. IEEE
Globecom Workshops (GC Wkshps), Dec. 2019, pp. 1–6.
[10] H. Zhang, Y. Qiu, K. Long, G. K. Karagiannidis, X. Wang, and
A. Nallanathan, “Resource allocation in NOMA-based fog radio access
networks,” IEEE Wireless Commun., vol. 25, no. 3, pp. 110–115,
Jun. 2018.
[11] F. Wei, T. Zhou, T. Xu, and H. Hu, “Modeling and analysis of two-way
relay networks: A joint mechanism using NOMA and network coding,”
IEEE Access, vol. 7, pp. 152679–152689, Oct. 2019.
[12] S. Kim, H. Kim, and D. Hong, “Joint power allocation and MCS
selection in downlink NOMA system,” in Proc. IEEE 29th Annu. Int.
Symp. Pers., Indoor Mobile Radio Commun. (PIMRC), Sep. 2018,
pp. 1–4.
[13] B. Jia, H. Hu, Y. Zeng, T. Xu, and H.-H. Chen, “Joint user pairing
and power allocation in virtual MIMO systems,” IEEE Trans. Wireless
Commun., vol. 17, no. 6, pp. 3697–3708, Jun. 2018.
[14] G. Liu, R. Wang, H. Zhang, W. Kang, T. A. Tsiftsis, and V. C. M. Leung,
“Super-modular game-based user scheduling and power allocation for
energy-efficient NOMA network,” IEEE Trans. Wireless Commun.,
vol. 17, no. 6, pp. 3877–3888, Jun. 2018.
[15] W. Zhang, F. Gao, S. Jin, and H. Lin, “Frequency synchronization
for uplink massive MIMO systems, IEEE Trans. Wireless Commun.,
vol. 17, no. 1, pp. 235–249, Jan. 2018.
[16] D. Fan, F. Gao, G. Wang, Z. Zhong, and A. Nallanathan, “Channel
estimation and transmission strategy for hybrid mmWave NOMA sys-
tems,” IEEE J. Sel. Topics Signal Process., vol. 13, no. 3, pp. 584–596,
Jun. 2019.
[17] H. Xie, F. Gao, S. Jin, J. Fang, and Y.-C. Liang, “Channel estimation
for TDD/FDD massive MIMO systems with channel covariance com-
puting,” IEEE Trans. Wireless Commun., vol. 17, no. 6, pp. 4206–4218,
Jun. 2018.
[18] E. C. Cejudo, H. Zhu, and O. Alluhaibi, “On the power allocation and
constellation selection in downlink NOMA,” in Proc. IEEE 86th Veh.
Technol. Conf. (VTC-Fall), Sep. 2017, pp. 1–5.
[19] X. Liu, Z. Chen, Y. Wang, F. Zhou, Y. Luo, and R. Q. Hu, “BER
analysis of NOMA-enabled visible light communication systems with
different modulations,” IEEE Trans. Veh. Technol., vol. 68, no. 11,
pp. 10807–10821, Nov. 2019.
[20] F. Fang, Z. Ding, W. Liang, and H. Zhang, “Optimal energy efficient
power allocation with user fairness for uplink MC-NOMA systems,”
IEEE Wireless Commun. Lett., vol. 8, no. 4, pp. 1133–1136, Aug. 2019.
[21] W. Webb and L. L. Hanzo, Modern Quadrature Amplitude Modulation:
Principles and Applications for Fixed and Wireless Communications.
Hoboken, NJ, USA: Wiley, 1994.
[22] I.-H. Lee and J.-B. Kim, “Average symbol error rate analysis for non-
orthogonal multiple access with M-Ary QAM signals in Rayleigh
fading channels,” IEEE Commun. Lett., vol. 23, no. 8, pp. 1328–1331,
Aug. 2019.
Authorized licensed use limited to: Shanghai Advanced Research Institute CAS. Downloaded on July 21,2022 at 10:17:33 UTC from IEEE Xplore. Restrictions apply.
... Synchronous UL-NOMA is studied while considering the two-user scenario [84], [85], [86], [87], [88], [89], [90] and arbitrary number of users [36], [91]. In [84], [85], [86], closed-form BER expressions are derived for SISO setup over AWGN channels, where imperfect SIC is assumed. ...
... Synchronous UL-NOMA is studied while considering the two-user scenario [84], [85], [86], [87], [88], [89], [90] and arbitrary number of users [36], [91]. In [84], [85], [86], closed-form BER expressions are derived for SISO setup over AWGN channels, where imperfect SIC is assumed. For example, both users use QPSK in [84], [85], whereas QPSK and BPSK are assigned to the near and far-users to account for channel asymmetry in [86]. ...
... In [84], [85], [86], closed-form BER expressions are derived for SISO setup over AWGN channels, where imperfect SIC is assumed. For example, both users use QPSK in [84], [85], whereas QPSK and BPSK are assigned to the near and far-users to account for channel asymmetry in [86]. Furthermore, accurate BER expressions over fading channels are derived for JMLD in [87], [88], where [87] considers SISO Rician channel and BPSK, while [88] considers single-input-multiple-output (SIMO) Rayleigh fading channel and QPSK. ...
Article
Full-text available
Non-orthogonal multiple access (NOMA) continues to receive enormous attention as a potential technique for improving the spectral efficiency (SE) of wireless networks. Although for several years most research efforts on the performance of NOMA systems focused on the ergodic sum-rate and outage probability, recent works have shifted towards error rate analysis of various NOMA configurations and designs. While the influx of publications on this topic is rich in lessons and innovations, the sheer volume of it makes it easy to get caught up in the details, so much so that one often loses sight of the overall picture. This paper serves as a survey on NOMA error rate analysis, painted in the large with bold and immediately recognizable strokes of insights to facilitate for the reader to understand and follow the up-to-date progress in this area. In addition to summarizing the principles of NOMA error rate analysis, this work aims to minimize redundancy and overlaps, identify research gaps, and outline future research directions.
... Cellular networks AWGN Not involved CSI based [24] 2019 Nakagami-m [25] 2020 Rician [26] 2018 Rayleigh [27] 2020 [28] [29] 2021 Rayleigh+PL Fixed location [30] AWGN+PL [31] 2019 Distance based [32] Rayleigh+PL [33] 2020 CSI based [34] α − η − µ Distance based [35] κ − µ [36] AWGN+PL CSI based [37] 2021 Rayleigh+PL [38] 2019 VLC systems VLC [39] 2020 Distance based [40] 2017 CSI based [41] 2022 Randomly Current work Cellular networks Rayleigh+PL Randomly Distance based analyses and studies on reliable communication with NOMA focus primarily on the framework design [17], [18], multi-user detection [19], [20], and resource allocation [21], [22]. For instance, the work [18] designed a downlink multiple-input multiple-output NOMA framework for the URLLC networks, and gave the critical condition of the optimal power allocation to achieve consistent latency and reliability between the receivers. ...
... As an example, when Acc = 10 −10 and α 0 = 0.2, the number of iterations I r is verified to be 6 as shown in Fig 3(a). For receiver 1 located in areas A 1<k<K , the optimal α 1 can be obtained by replacing the corresponding terms in (35) and (36) and then executing Algorithm 1. ...
... Note that equations(35) and(36) cannot be simplified, such as only the parts in brackets of (36) are considered, due to the nonlinear characteristics of the two BER expressions.4 As an example, (37) gives only item 3 and(41)gives only item 1, and the other terms can be derived in the same way. ...
Article
Full-text available
Non-orthogonal multiple access (NOMA) is regarded as a promising technology in achieving high capacity and massive connectivity. In this paper, the reliable transmission scheme of downlink NOMA systems is investigated. In particular, we divide the disc covered by the base station into several annular areas, where the receivers are randomly located following a uniform distribution. In this way, NOMA pairing is performed by randomly selecting receivers from two different areas. Firstly, we derive the closed-form expressions of bit error rate (BER) with quadrature phase-shift keying (QPSK) modulation, where the channel is modeled as small-scale Rayleigh fading and large-scale path loss. To achieve reliable communications, then, the BER performance of the receiver with the worst channel gain in each area is studied. Finally, an optimal power allocation algorithm is proposed, which obtains the minimum transmission power and optimal power allocation factor with a given BER constraint of all receivers. Extensive simulations demonstrate the accuracy of obtained BER expressions and the effectiveness of the proposed algorithm. These results provide valuable insight into realizing on reliable transmission of NOMA with randomly deployed receivers.
... In the studies focusing on the uplink NOMA two-user case [6]- [8], closed-form BER expressions have been derived for single input single output (SISO) setups over additive white Gaussian noise (AWGN) channels, considering SIC imperfections. For example, [6] and [7] considered both users employing quadrature phase shift keying (QPSK), while [8] assigned QPSK to the near-user and binary phase shift keying (BPSK) to the far-user to account for channel asymmetry. ...
... In the studies focusing on the uplink NOMA two-user case [6]- [8], closed-form BER expressions have been derived for single input single output (SISO) setups over additive white Gaussian noise (AWGN) channels, considering SIC imperfections. For example, [6] and [7] considered both users employing quadrature phase shift keying (QPSK), while [8] assigned QPSK to the near-user and binary phase shift keying (BPSK) to the far-user to account for channel asymmetry. Furthermore, BER expressions over fading channels have been derived for joint maximum likelihood decoding (JMLD) in [9], [10]. ...
Preprint
Full-text available
Non-orthogonal multiple access (NOMA) is widely recognized for its spectral and energy efficiency, which allows more users to share the network resources more effectively. This paper provides a generalized bit error rate (BER) performance analysis of successive interference cancellation (SIC)-based uplink NOMA systems under Rayleigh fading channels, taking into account error propagation resulting from SIC imperfections. Exact closed-form BER expressions are initially derived for scenarios with 2 and 3 users using quadrature phase shift keying (QPSK) modulation. These expressions are then generalized to encompass any arbitrary rectangular/square M-ary quadrature amplitude modulation (M-QAM) order, number of NOMA users, and number of BS antennas. Additionally, by utilizing the derived closed-form BER expressions, a simple and practically feasible power allocation (PA) technique is devised to minimize the sum bit error rate of the users and optimize the SIC-based NOMA detection at the base-station (BS). The derived closed-form expressions are corroborated through Monte Carlo simulations. It is demonstrated that these expressions can be effective for optimal uplink PA to ensure optimized SIC detection that mitigates error floors. It is also shown that significant performance improvements are achieved regardless of the users' decoding order, making uplink SIC-based NOMA a viable approach.
... Synchronous UL-NOMA is studied while considering the two-user scenario [84]- [90] and arbitrary number of users [36], [91]. In [84]- [86], closed-form BER expressions are derived for SISO setup over AWGN channels, where imperfect SIC is assumed. For example, both users use QPSK in [84], [85], whereas QPSK and BPSK are assigned to the near and far-users to account for channel asymmetry in [86]. ...
... In [84]- [86], closed-form BER expressions are derived for SISO setup over AWGN channels, where imperfect SIC is assumed. For example, both users use QPSK in [84], [85], whereas QPSK and BPSK are assigned to the near and far-users to account for channel asymmetry in [86]. Furthermore, accurate BER expressions over fading channels are derived for JMLD in [87], [88], where [87] considers SISO Rician channel and BPSK, while [88] considers singleinput-multiple-output (SIMO) Rayleigh fading channel and QPSK. ...
Preprint
Full-text available
div>Non-orthogonal multiple access (NOMA) has received an enormous attention in the recent literature due to its potential to improve the spectral efficiency of wireless networks. For several years, most of the research efforts on the performance analysis of NOMA were steered towards the ergodic sum rate and outage probability. More recently, error rate analysis of NOMA has attracted massive attention and sparked massive number of researchers whose aim was to evaluate the error rate of the various NOMA configurations and designs. Therefore, the large number of publications that appeared in a short time duration made highly challenging for the research community to identify the contribution of the different research articles. Therefore, this work aims at surveying the research work that considers NOMA error rate analysis and classifying the contributions of each work. Therefore, work redundancy and overlap can be minimized, research gabs can be identified, and future research directions can be outlined. Moreover, this work presents the principles of NOMA error rate analysis.</div
... The authors emphasized that their work could easily be applied to other fading channels to determine the SER. Wei et al 31 studied the boundary effect of asymmetric channels by using Euclidean distance. To this end, they derived closed-form SER expressions for an uplink NOMA system with two users, where one employed BPSK and the other QPSK modulations. ...
Article
Full-text available
This research presents a unified performance analysis methodology for the power domains of uplink non‐orthogonal multiple access (NOMA) system consisting of a base station and an arbitrary number of users over Rayleigh fading channels. The study derives exact closed‐form expressions for key performance metrics, such as outage probability (OP), symbol error rate (SER), outage capacity (OC), average channel capacity (AVC), and amount of fading, using binary phase shift keying (BPSK) and quadrature phase shift keying (QPSK) modulations. The analysis encompasses all necessary channel parameters for evaluating the performance of an uplink NOMA system. The theoretical and simulation results completely supported one another. Furthermore, the results were compared with experiments in the literature using similar parameters. The proposed system was determined to increase performance by 40% for OP, 62% for SER, and 4.74 times for AVC at SNR = 20 dB. Finally, this study introduced exact solutions that can significantly accelerate NOMA systems analysis by exploiting the information in the existing database for analytical design processes in communications theory.
... Since Y. Saito et al. proposed the NOMA protocol in cellular systems first [4], most of the studies have been devoted to the performance analysis and the improvement of downlink NOMA systems [5][6][7][8]. More recently, the focus is moving toward the analysis of uplink NOMA systems; user performance of uplink NOMA [9], uplink cooperative multipoint transmission [10], cooperative relay [11], and power control in uplink NOMA system [12][13][14]. ...
Article
Outage probability and capacity are the representative performance measures for the quality of service (QoS) in mobile cellular systems. Recently, power back-off scheme is proposed in uplink non-orthogonal multiple access (NOMA) systems. The power back-off scheme improves the performance of a near user, however, decreases that of a far user. In comparison, the scheme indicates the error floors with an outage probability of 2.4×〖10〗^(-1) and 9.1×〖10〗^(-2) with power back-off 5 dB and 10 dB, respectively under the specified condition. To address these drawbacks, we propose an equal average signal-to–interference plus noise ratio (SINR) scheme that derives the same average SINR from active users at the base station (BS) in uplink non-orthogonal multiple access (NOMA) systems. Numerical results show that required signal-to-noise ratio (SNR) for the outage probability of 1×〖10〗^(-3) of the near and far users are close enough within 1 dB, which means an outage balance between two users. And it is noticed that the outage probabilities in the proposed scheme decrease as the increase of the received SNR without error floors. Also, different from the power back-off scheme, we noticed that the capacities of the two users in the proposed scheme are coincident and increase with SNR. The outage probabilities and ergodic capacity of the near and far users are derived in closed-form expressions. The analytical results are conformed by Monte Carlo simulation.
... Error rate analysis of relay-based cognitive radio systems using NOMA is reported in [12] and [14], and that of noncognitive radio systems is considered in [25] and [30]. Analytical expressions for error rates under different modulation schemes in NOMA-based systems are derived in [31]- [34]. These works however do not analyze the error rate after dynamic power allocation. ...
Article
Full-text available
In this paper, the performance of a multicarrier underlay cognitive radio system is analyzed considering that the successive interference cancellation (SIC) method is used for detection. In the proposed system model, a multicarrier-based secondary user (SU) uses all the subcarriers of the primary user (PU) in underlay mode, guaranteeing the quality of service (QoS) to the primary system. The power allocation strategy is modified accordingly. With a fixed PU transmit power, power is allocated to the SU subcarriers to maximize its throughput while ensuring minimum throughput to PU. The system is analyzed for its performance considering an L-tap multipath Rayleigh fading channel. Analytical expression for outage probability at SU is derived in closed-form. Also, analytical expressions and closed-form approximations for average symbol error rates (SER) per subcarrier of PU and SU are obtained. The derived expressions are validated with the Monte-Carlo (MC) simulations. Further, the proposed scheme was implemented in an orthogonal frequency division multiplexing (OFDM)-based system with different detection schemes used at the receiver. SERs were compared through extensive simulations and it was noticed that SIC with channel estimation based on minimum-mean-squared-error (MMSE) often performed better than that based on least squares (LS) estimation. Observations reveal that the nominal error rates were achieved on the optimal choice of the parameters. The proposed system ensures sufficient throughput to SU, meanwhile eliminating the need for opportunistic sensing.
Article
With the rapid growth in the requirements of the Internet of Things (IoT), the scarcity of spectrum resources is becoming serious. Non-orthogonal multiple access (NOMA) and spectrum sensing offer the opportunity of addressing spectrum shortage to some extent. In particular, NOMA stably enables multiple users to share the same frequency band, while spectrum sensing dynamically detects the target spectrum utilization. However, due to the characteristics of NOMA, the application of spectrum sensing to the uplink IoT systems makes the process more complex, also brings the challenge of obtaining the target users’ states accurately from interfered multi-user signals. Meanwhile, the combination of NOMA and spectrum sensing does not reach the upper bound of spectrum utilization. Under the context, we are motivated to propose an adaptive NOMA-based spectrum sensing method for uplink IoT networks, which aims to flexibly and precisely identify the target frequency usage. The relationship among the threshold, the false-alarm probability, and the transmission willingness are derived in closed form. We also customize a sensing algorithm of the complete adaptive working mechanism. Numerical results clarify that the proposed method achieves stability under different SNRs and transmission willingness, while improves the system throughput which outperforms the existing technologies by 38.20%.
Article
Non-orthogonal multiple access (NOMA) is a promising technology for the next generation of wireless networks. However, maximizing energy efficiency (EE) for NOMA systems may cause unbearable near-far unfairness. In this letter, a novel fairness-aware energy-efficient power allocation for uplink NOMA systems with imperfect successive interference cancellation (SIC) is proposed. We first introduce a new metric called geometric energy efficiency (GEE), then a dynamic power allocation scheme is developed by maximizing the GEE. Numerical results show that the proposed power allocation scheme achieves at least a 15.1% EE gain over benchmarks while also providing better or comparable fairness performance.
Article
Full-text available
As a promising technology, non-orthogonal multiple access (NOMA) enhances spectral efficiency and system capacity by allocating the same resource to multiple users. Network coding (NC) has the advantages of compressing data and high spectral efficiency, and it plays a crucial role in two-way relay networks. However, conventional two-way relay networks suffer from throughput limitations due to the use of OMA scheme. In this paper, we utilize a hybrid concept to design a two-way relaying system (namely Hybrid-TWRS) which combines NOMA and NC. Furthermore, we investigate the size-mismatch problem caused by asymmetric channel in the NOMA scheme and propose a bit-match scheme and a symbol-match scheme based on the Hybrid-TWRS. Theoretical derivation and numerical results demonstrate that the proposed method distinctly outperforms both (i) traditional two-way relaying system with OMA in the uplink and NC in the downlink (namely NC-TWRS); and (ii) NOMA-based two-way relaying system (namely NOMA-TWRS).
Article
Full-text available
This paper presents a novel channel estimation and transmission strategy for millimeter wave (mmWave) nonorthogonal multiple access (NOMA) communication system with hybrid architecture. We first propose a general iterative index detection-based channel estimation algorithm (IDCEA) that can obtain both direction of arrival (DOA) and channel gain of each channel path. We then design an enhanced hybrid precoding scheme from the angle domain viewpoint to reduce the interbeam interferences. Next we investigate the multi-user scheduling and power allocation with the objective of maximizing the overall achievable rate. The problem turns to be non-convex and then we decompose it into two sub-problems which separately consider user scheduling and power allocation. The former is solved by a novel algorithm based on the many-to-one two sided matching theory while the latter is solved by an iterative optimization algorithm. Simulation results show that the proposed channel estimation and user scheduling can be better than traditional methods. Finally, numerical examples are provided to corroborate the proposed studies.
Book
Full-text available
This book presents comprehensive coverage of current and emerging multiple access, random access, and waveform design techniques for 5G wireless networks and beyond. A definitive reference for researchers in these fields, the book describes recent research from academia, industry, and standardization bodies. The book is an all-encompassing treatment of these areas addressing orthogonal multiple access and waveform design, non-orthogonal multiple access (NOMA) via power, code, and other domains, and orthogonal, non-orthogonal, and grant-free random access. The book builds its foundations on state of the art research papers, measurements, and experimental results from a variety of sources. Notably, it Includes orthogonal and non-orthogonal waveforms for 5G new radio and beyond: CP-OFDM, UF-OFDM, f-OFDM, WOLA, FBMC, and GFDM; Features NOMA via the power domain (fundamentals, clustering, power allocation, experimental trials, etc.) and the code and other domains (SCMA, IDMA, LDS-CDMA, PDMA, IGMA, RSMA, and RDMA); Outlines random access techniques (CSMA, CSMA/CD, ALOHA, slotted ALOHA, and LoRa), applications and use cases of 5G networks (eMBB, URLLC, mMTC, IoT, and V2V), as well as challenges and future directions in multiple access, random access, and waveform design.
Article
This letter investigates a symbol error rate (SER) performance of the downlink non-orthogonal multiple access (NOMA) scheme with symbol-level successive interference cancellation (SIC). Exact and closed-form expressions for average SERs of individual users are derived under Rayleigh fading channels considering imperfect SIC when the square quadrature amplitude modulation (QAM) symbols of two users are superposed and transmitted using NOMA. In addition, a power allocation criterion of NOMA is provided for the design of feasible QAM constellations when the modulation orders of two users are given.
Article
Spectrum sensing, which helps to resolve the coexistence issue and optimize spectrum efficiency, plays an important role in future wireless communication systems. However, the upcoming 5G communication involves diversified scenarios with different characteristics and diverse requirements. This tendency makes it difficult for spectrum sensing methods to flexibly serve various applications while maintaining satisfactory performance. Motivated by such a challenge, this article combines the reinforcement learning concept with spectrum sensing technique, seeking a feasible way to adaptively deploy spectrum sensing configurations so as to optimize system performance under multifarious scenarios in 5G communications. In this article, we first categorize several major optimization targets for spectrum sensing in future communications. Then we elaborate the full details of the proposed sensing technique. Three dedicated modes with respective optimization objectives are designed thereafter. Numerical results manifest that the proposed sensing technique has the capability of adapting to various scenarios, which is appealing in practice.
Article
The optimal energy efficient power allocation is investigated for the uplink multi-carrier non-orthogonal multiple access (MC-NOMA) system. Considering the user fairness, the power allocation is formulated as a maximization problem of the system weighted energy efficiency, which is defined as a ratio of the weighted sum rate to the total power consumption. By utilizing Dinkelbach algorithm and Lagrange dual decomposition approach, the optimal closed-form power allocation expressions are derived. The convergence and optimality of the proposed scheme can be proved. The simulation results demonstrate performance enhancement of the proposed algorithm compared to the existing works, i.e., the enhance water-filling scheme and orthogonal multiple access (OMA) system.
Article
Non-orthogonal multiple access (NOMA) technique is a strong candidate for 5G cellular networks that enables greater multiuser capacity and user fairness through the multiplexing in the power domain. The user data is pulse shaped using orthogonal frequency division multiplexing (OFDM) technique based on Fast Fourier Transform (FFT) for conventional NOMA. We propose a Discrete Wavelet Transform based pulse shaping technique for NOMA. We present a closed form expression of bit error rate (BER) for FFT-NOMA as well as Wavelet based NOMA (WNOMA) systems. Theoretical and simulation BER results show that WNOMA outperforms FFT-NOMA in additive white Gaussian noise.