Next Article in Journal
An IoT-Based Gamified Approach for Reducing Occupants’ Energy Wastage in Public Buildings
Next Article in Special Issue
Trellis Tone Modulation Multiple-Access for Peer Discovery in D2D Networks
Previous Article in Journal
Flow Control in Wells Turbines for Harnessing Maximum Wave Power
Previous Article in Special Issue
Non-Orthogonal Multiple Access for Ubiquitous Wireless Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Analysis of Diversity-Controlled Multi-User Superposition Transmission for 5G Wireless Networks

1
Department of Electronics Engineering, Chungnam National University, Daejeon 34134, Korea
2
Division of Electrical Engineering, Hanyang University, Ansan 15588, Korea
*
Authors to whom correspondence should be addressed.
Sensors 2018, 18(2), 536; https://doi.org/10.3390/s18020536
Submission received: 31 December 2017 / Revised: 25 January 2018 / Accepted: 7 February 2018 / Published: 10 February 2018
(This article belongs to the Special Issue Non-Orthogonal Multi-User Transmissions for 5G Networks)

Abstract

:
In this paper, we propose a novel low-complexity multi-user superposition transmission (MUST) technique for 5G downlink networks, which allows multiple cell-edge users to be multiplexed with a single cell-center user. We call the proposed technique diversity-controlled MUST technique since the cell-center user enjoys the frequency diversity effect via signal repetition over multiple orthogonal frequency division multiplexing (OFDM) sub-carriers. We assume that a base station is equipped with a single antenna but users are equipped with multiple antennas. In addition, we assume that the quadrature phase shift keying (QPSK) modulation is used for users. We mathematically analyze the bit error rate (BER) of both cell-edge users and cell-center users, which is the first theoretical result in the literature to the best of our knowledge. The mathematical analysis is validated through extensive link-level simulations.

1. Introduction

Fifth generation (5G) wireless networks are expected to support higher spectral efficiency, lower end-to-end latency, and more connection nodes [1]. In accordance with this trend, many promising techniques are being considered [2]. Among them, a non-orthogonal multiple access (NOMA) technique has been proposed to improve the spectral efficiency of the 5G network [3]. The basic idea of the NOMA technique is to serve multiple users at the same time-frequency-space resource block via power domain or code domain multiplexing [4]. It has been known that the NOMA technique increases the spectrum efficiency and efficiently accommodates a massive number of nodes in cellular networks [5,6].
As noted before, the NOMA techniques are, in general, classified into two categories: code-domain NOMA and power-domain NOMA [7]. With the code-domain NOMA techniques, a codeword is allocated to each user and a near optimal multi-user detection algorithm, such as a message passing algorithm, is used at the receiver. The code-domain NOMA techniques include trellis-coded multiple access (TCMA), interleave-division multiple access (IDMA), low-density signature (LDS) sequence-based code division multiple access (CDMA), sparse-code multiple access (SCMA), pattern-division multiple access (PDMA), multi-user shared access (MUSA), etc. [8]. On the other hand, with the power domain NOMA techniques, multiple users are served within a given time-frequency-space resource block by using superposition coding (SC) at the transmitter and successive interference cancellation (SIC) at the receivers, respectively, which has recently been proposed in 3GPP LTE [3].
Multi-user superposition transmission (MUST) is a special case of the NOMA techniques, which has been studied in 3GPP LTE standards [9]. Various NOMA techniques have been proposed and studied, focusing on multi-user non-orthogonal transmission schemes, receiver designs, and related signaling strategies in [9]. The MUST techniques are divided into three categories according to adaptive power control and bit-labeling at the transmitter side as shown in Table 1. The adaptive power ratio on each component constellation is utilized in MUST categories 1 and 2, and Gray-mapped composite constellation is adopted in MUST categories 2 and 3. The MUST techniques typically assume asymmetric downlink scenarios consisting of active cell-edge and cell-center users. At the receiver side, the cell-center user with higher received signal power decodes a super-imposed signal with SIC, while the cell-edge user with lower received signal power decodes the super-imposed signal by treating the interference signal as noise. To implement SIC at the cell-center user, codeword-level (channel coding block) SIC results in better performance than symbol-level SIC, but the signaling overhead and implementation complexity of the codeword-level SIC is much higher that of the symbol-level SIC [10,11]. Thus, the codeword-level SIC may not be suitable in the cellular downlink, especially when the low-cost and low-power user terminals/devices are considered.
Recently, several receiver designs of the NOMA techniques, including codeword-level SIC and symbol-level SIC, have been compared with each other. In particular, a log-likelihood ratio (LLR)-based low-complexity receiver design was proposed [12]. Although the LLR-based receiver design does not include the codeword-level SIC operation which accompanies high implementation complexity, it can still achieve similar performance to the codeword-level SIC receiver as well as the ideal SIC receiver. However, the performance of the proposed technique was evaluated only through link-level simulations. In addition, another low-complexity MUST technique was proposed in [13], where a NOMA transmitter sends signals to a single cell-center user over multiple (frequency) resource blocks, each of which is also occupied by a cell-edge user. Thus, the cell-center user can obtain the frequency diversity, and we call this scheme diversity-controlled MUST technique in this paper. However, in [13], the rate outage performance was mathematically analyzed when there exist only two cell-edge users and each user is equipped with a single receive antenna.
In this paper, we extend the diversity-controlled MUST technique to the case where multiple cell-edge users are multiplexed with a single cell-center user and each user is equipped with multiple antennas. Henceforth, we define the user with a higher signal-to-noise ratio (SNR) as MUST-based user equipment (UE) and the user with a lower SNR as MUST-enhanced UE since the received SNR depends on not only the location of users but also the allocated power in the diversity-controlled MUST technique. In general, cell-center users become the MUST-based UEs and cell-edge users become the MUST-enhanced UEs. In particular, we derive the closed-form expressions on the bit error rate (BER) of both MUST-based UEs and MUST-enhanced UEs in Rayleigh fading channels for a given power allocation ratio. Based on the mathematical analysis, we also optimize the power allocation ratio on the component constellation to minimize the power consumption at the NOMA transmitter for given BER requirements. The mathematical analysis is validated via link-level simulations.
The remainder of the paper is organized as follows. In Section 2, the system model is described; in Section 3, we explain the overall procedures of both the transmitter and receiver with the proposed diversity-controlled MUST technique in detail and derive the BER of the proposed technique; in Section 4, we formulate an optimization problem of the power allocation ratio to minimize the power consumption at the NOMA transmitter; simulation results are shown in Section 5; finally, conclusions are drawn in Section 6.

2. System Model

We consider a downlink cellular network consisting of a single base station (BS), a single MUST-enhanced UE, and N MUST-based UEs. We assume that the BS is equipped with a single transmit antenna but each user is equipped with N r antennas. Hence, the wireless channel from the BS to each user is modeled as a single-input multiple-output (SIMO) channel. We consider that the orthogonal frequency division multiple access (OFDMA) and the system bandwidth are assumed to be equally divided into N sub-carriers for simplicity.
At the BS, a composite modulation symbol is generated by superposing two signals of an MUST-based UE and an MUST-enhanced UE. We adopt the MUST category 2 when generating the composite symbol, and thus the power ratio between two component signals can be adaptively adjusted and Gray-mapping is used for bit-labeling. An adaptive power allocation coefficient, α ( 0 < α < 0.5 ) , is introduced to determine powers of the two signals. Hence, the α value needs to be carefully adjusted, depending on the channel conditions of users. Each superposed signal is transmitted to both the MUST-based UE and the MUST-enhanced UE over a certain sub-band. Figure 1 shows an example of a composite constellation of the MUST technique with quadrature phase shift keying (QPSK) modulation for both users. The blue dots represent QPSK constellation points of the MUST-based UE whose power is equal to 1 α and the red dots around each blue dot represent the composite constellation points, consisting of QPSK constellations of both MUST-based and MUST-enhanced UEs, whose power is equal to 1. As shown in Figure 1, α indicates the power portion that is allocated to the MUST-enhanced UE. As noted before, the signal of the MUST-enhanced UE is transmitted over multiple frequency bands (sub-carriers), while the signal of the MUST-based UE is sent over a single frequency band (sub-carrier) with the diversity-controlled MUST technique [13].
At the MUST-based UE, the received signal is decoded by treating the signal of the MUST-enhanced UE as noise. On the other hand, at the MUST-enhanced UE, the received signal is obtained after the symbol-level SIC operation for each frequency band. Then, the obtained signals over multiple frequency bands (sub-carriers) are combined to obtain the frequency diversity gain.

3. Diversity-Controlled MUST Technique

In Section 3.1, we explain the transmitter design of the proposed diversity-controlled MUST technique including the bit-labeling and the power allocation at the BS. In Section 3.2 and Section 3.3, we explain the receiver designs for the MUST-based UE and the MUST-enhanced UE and mathematically analyze the BER of the two types of UEs, respectively.

3.1. Transmitter Design at the BS

Figure 2 shows the overall structure of the transmitter at the BS in the proposed diversity-controlled MUST technique. Bit-streams b B i = b B . 1 i , , b B . j i , , b B . m i and b E = b E . 1 , , b E . j , , b E . m enter to the BS, where M denotes the modulation order, i.e., m = log 2 M . Bit-streams b B i and b E denote the bit-streams for the i-th MUST-based UE i { 1 , 2 , , N } and the MUST-enhanced UE, respectively. The term j indicates the j-th bit in an M-QAM symbol. According to the bit-labeling rule (Gray-mapping) of the MUST category 2, the bits of the MUST-enhanced UE are coded by the following function, G ( · ) :
G b E . j , b B . j i = b E . j b B . j i = b E . j i ,
where ⊕ denotes a bitwise XOR operator. The Gray-mapped bit-streams b B i and b E i are then modulated by M-QAM. The modulated symbols to be sent via the i-th sub-carrier for the MUST-based UE and the MUST-enhanced UE are denoted by x B . i and x E . i , respectively. The x B . i and x E . i are assigned power by 1 α and α , respectively. In this paper, we assume that α is the same value for all i. Thus, the super-imposed signal in the i-th sub-carrier, s i , is given by
s i = 1 α x B . i + α x E . i ,
where E [ | x B . i | 2 ] = E [ | x E . i | 2 ] = 1 . Thus, E [ | s i | 2 ] = 1 .

3.2. Receiver Design at an MUST-Based UE

Figure 3 shows the overall structure of the proposed receiver at the MUST-based UE. Recall that the signal of the i-th MUST-based UE is assumed to be sent via the i-th OFDM sub-carrier. Then, the received signal of the i-th MUST-based UE with N r antennas is given by
y B . i = h B . i ( i ) E s i + w B . i ,
where E indicates the transmit power of s i and h B . i ( i ) C N r × 1 denotes the wireless channel vector from the BS to the i-th MUST-based UE. We assume that E is a fixed value over frequencies but it can be adaptively controlled to satisfy a certain performance requirement. We assume that each element of h B . i ( i ) follows identically and independently distributed (i.i.d.) complex-valued normal Gaussian distribution, i.e., h B . i ( i ) CN ( 0 , I N r × N r ) , where I N r × N r indicates the identity matrix of dimension N r . Furthermore, w B . i C N r × 1 denotes the additive white Gaussian noise (AWGN) vector at the i-th MUST-based UE, i.e., w B . i CN ( 0 , N 0 I N r × N r ) , where N 0 indicates the power spectral density of the Gaussian noise.
With maximum ratio combining, the received signal vector at the MUST-based UE can be represented as
y ¯ B . i = h B . i ( i ) H y i = h B . i ( i ) 2 E s i + h B . i ( i ) H w B . i = h B . i ( i ) 2 E α 1 x B . i + α x E . i + h B . i ( i ) H w B . i ,
where A H denotes the conjugate transpose matrix of A . Let W B . i h B . i ( i ) H w B . i . Then, due to properties of the circular symmetric Gaussian random vector [11], W B . i can be represented by
W B . i CN 0 , N 0 .
Assuming that α < 0.5 , x B . i determines the signs of s i as shown in Figure 1. In other words, S g n x B . i and S g n x B . i equal to S g n s i and S g n s i , respectively, where S g n ( · ) denotes the sign function. If b B . 1 i = 1 , then
( s i ) 1 2 1 α α , 1 2 1 α + α : = { d 1 , d 2 }
according to the transmitter design. Thus, the decoding function for b B . j i from y ¯ B . i is given as:
b ^ B . 1 i , b ^ B . 2 i = M 1 S g n ( ( y ¯ B . i ) ) , S g n ( ( y ¯ B . i ) ) ,
where b ^ B . 1 i and b ^ B . 2 i denote the estimated bits for b B . 1 i and b B . 2 i , respectively. M 1 ( · ) represents the QPSK demodulation function.
Table 2 summarizes the computation complexity of the proposed receiver at the MUST-based UE in terms of the complex number of operations.

3.3. Performance Analysis of the MUST-Based UE

Without loss of generality, the error probability of the MUST-based UE for given h B . i ( i ) is represented as:
P b . B = Pr b ^ B . 1 i = 0 | b B . 1 i = 1 , h B . i ( i ) = d { d 1 , d 2 } Pr ( s i ) = d | b B . 1 i = 1 Pr ( y ¯ B . i ) | ( s i ) = d , h B . i ( i ) = d { d 1 , d 2 } 1 2 0 1 2 π N 0 2 E h B . i ( i ) 2 exp ( x d ) 2 2 N 0 2 E h B . i ( i ) 2 d x = d { d 1 , d 2 } 1 2 2 E N 0 h B . i ( i ) 2 d 1 2 π exp x 2 2 d x = d { d 1 , d 2 } 1 2 Q 2 ρ h B . i ( i ) 2 d 2 ,
where ρ E N 0 indicates the transmit SNR at the BS.
The average BER of the MUST-based UE can be obtained by integrating Equation (7) over the random variable (RV) h B . 1 ( i ) 2 . Note that the RV h B . 1 ( i ) 2 follows the Chi-square distribution with 2 N r degrees-of-freedom (DoF) [11], i.e., Z i h B . i ( i ) 2 χ 2 N r 2 .
Then, the average BER of the MUST-based UE is given as:
P ¯ b . B = 0 P b . B f Z i ( z i ) d z i = 0 d { d 1 , d 2 } 1 2 Q 2 ρ z i d 2 f Z i ( z i ) d z i = 1 2 d { d 1 , d 2 } Q 2 ρ z i d 2 1 N r 1 ! z i N r 1 exp z i d z i = d { d 1 , d 2 } 1 d 2 ρ 1 + d 2 ρ N r i = 0 N r 1 N r 1 + i i 1 2 N r + 1 + i 1 + d 2 ρ 1 + d 2 ρ i ,
where d 1 and d 2 are defined in Equation (5).

3.4. Receiver Design at an MUST-Enhanced UE

Figure 4 shows the overall structure of the proposed receiver at the MUST-enhanced UE. Unlike the signals at the MUST-based UEs, the signal of the MUST-enhanced UE is superposed over N MUST-based signals since it is repeatedly sent over N OFDM sub-carriers. Thus, in order for the MUST-enhanced UE to obtain full diversity gain, we need to combine all the signals over N OFDM sub-carriers and in N r receive antennas. The received signal at the MUST-enhanced UE is given by
Y E = H E E d i a g s + W E ,
where Y E y E ( 1 ) y E ( 2 ) y E ( N ) C N r × N . A vector y E ( i ) denotes the signal vector received at the i-th OFDM sub-carrier of the MUST-enhanced UE. A matrix H E h E ( 1 ) h E ( 2 ) h E ( N ) C N r × N denotes the wireless channel matrix from the BS to the MUST-enhanced UE, where each element follows i.i.d. complex-valued normal Gaussian distribution and h E ( i ) denotes the channel vector of the s i transmitted over the i-th OFDM sub-carrier. A matrix d i a g ( s ) indicates the diagonal matrix whose diagonal elements form the vector s . In addition, s s 1 s 2 s N C 1 × N indicates the transmit signal vector. A matrix W E = w E ( 1 ) w E ( 2 ) w E ( N ) C N r × N represents the additive white Gaussian noise matrix whose element is a zero mean complex Gaussian RV with N 0 variance, and w E ( i ) denotes the noise vector in the received signal vector over the i-th OFDM sub-carrier. Each column of Y E can be separated and dealt with independently over N sub-carriers. Then, the received signal vector over the i-th sub-carrier at the MUST-enhanced UE is given by
y E ( i ) = h E ( i ) E s i + w E ( i ) .
Similarly to y ¯ B . i , after MRC, the received signal vector in the i-th sub-carrier at the MUST-enhanced UE is given by
y ¯ E ( i ) = h E ( i ) 2 E α 1 x B . i + α x E . i + h E ( i ) H w E ( i ) .
The receiver of the MUST-enhanced UE first detects x B . i like the receiver operation of the MUST-based UE, and then removes x ^ B . i from the y ¯ E ( i ) , which is called symbol-level SIC operation in the literature. Considering the Gray-mapping function G · , Equation (11) can be rewritten as:
y ˜ E ( i ) = y ¯ E ( i ) h E ( i ) 2 E 1 α S g n y ¯ E ( i ) SIC · S g n y ¯ E ( i ) Gray - demapping + j y ¯ E ( i ) h E ( i ) 2 E 1 α S g n y ¯ E ( i ) SIC · S g n y ¯ E ( i ) Gray - demapping .
By summing Equation (12) over N sub-carriers, the final received signal for the MUST-enhanced UE can be obtained as follows:
y c o m b = i = 1 N y ˜ E ( i ) .
If the SIC is successfully executed in Equation (12), then y ˜ E ( i ) is given by
y ˜ E ( i ) = h E ( i ) 2 E α x E + h E ( i ) H w E ( i ) ,
where x E is the QPSK symbol mapped from the information bit pair b E . 1 , b E . 2 . In addition, with the perfect SIC, the final received signal for the MUST-enhanced UE can be obtained as follows:
y c o m b = i = 1 N y ˜ E ( i ) = Tr H E H H E E α x E + i = 1 N h E ( i ) H w E ( i ) ,
where Tr · denotes the trace operator of the matrix. Let W c o m b i = 1 N h E ( i ) H w E ( i ) and then W c o m b can be written as:
W c o m b CN 0 , N · N 0 .
The information bit pair b E . 1 , b E . 2 can be decoded by the sign of y c o m b as follows:
b ^ E . 1 , b ^ E . 2 = M 1 S g n ( ( y c o m b ) ) , S g n ( ( y c o m b ) ) ,
where b ^ E . 1 and b ^ E . 2 denote the estimates of b E . 1 and b E . 2 , respectively.
Table 3 summarizes the computation complexity of the proposed receiver at the MUST-enhanced UE in terms of the complex number of operations. Basically, the computational complexity at the MUST-enhanced UE is larger than that at the MUST-based UE because of the symbol-level SIC operation and the signal transmission over multiple sub-carriers.

3.5. Performance Analysis of the MUST-Enhanced UE

The error events of the MUST-enhanced UE happen with the following two cases:
  • Incorrect detection of both the symbol x E . i and the bit b B . 1 .
  • Accurate detection of the symbol x E . i but incorrect detection of the bit b B . 1 .
Thus, the BER of the MUST-enhanced UE is given as:
P b . E = Pr b ^ B . 1 i , b ^ B . 2 i b B . 1 i , b B . 2 i , b ^ E . 1 b E . 1 + Pr b ^ B . 1 i , b ^ B . 2 i = b B . 1 i , b B . 2 i , b ^ E . 1 b E . 1 = Pr b ^ B . 1 i , b ^ B . 2 i b B . 1 i , b B . 2 i Pr b ^ E . 1 b E . 1 b ^ B . 1 i , b ^ B . 2 i b B . 1 i , b B . 2 i   + Pr b ^ B . 1 i , b ^ B . 2 i = b B . 1 i , b B . 2 i Pr b ^ E . 1 b E . 1 b ^ B . 1 i , b ^ B . 2 i = b B . 1 i , b B . 2 i .
Since the error probability of decoding b B . 1 i , b B . 2 i is close to zero at high SNR values, we can obtain the lower bound of the BER by assuming that the decoding on b B . 1 i , b B . 2 i is always correct:
P b . E Pr b ^ E . 1 b E . 1 b ^ B . 1 i , b ^ B . 2 i = b B . 1 i , b B . 2 i P b . E L B .
Without loss of generality, the lower bound of the BER of the MUST-enhanced UE with this assumption for a given H E is obtained as:
P b . E L B = Pr b ^ E . 1 = 0 b E . 1 = 1 , b ^ B . 1 i , b ^ B . 2 i = b B . 1 i , b B . 2 i , H E = Pr y c o m b 0 b E . 1 = 1 , b ^ B . 1 i , b ^ B . 2 i = b B . 1 i , b B . 2 i , H E = Pr y c o m b 0 x E = 1 , b ^ B . 1 i , b ^ B . 2 i = b B . 1 i , b B . 2 i , H E = 0 1 2 π N 0 2 E α Tr H E H H E exp x 1 2 2 N 0 2 E α Tr H E H H E d x = 2 E N 0 α Tr H E H H E 1 2 π exp x 2 2 d x = Q 2 ρ α Tr H E H H E .
We define an RV as follows:
Z Tr H E H H E χ 2 N · N r 2 .
Then, the lower bound of the average BER of the MUST-enhanced UE is given by
P ¯ b . E L B = 0 P b . E L B f Z z d z = 0 Q 2 ρ α z 1 N r · N 1 ! z N r · N 1 exp ( z ) d z = 1 ρ α 1 + ρ α N r · N k = 0 N r · N 1 N r · N 1 + k k 1 2 N r + k 1 + ρ α 1 + ρ α k .

4. Optimal α for Minimizing Power Consumption

In Equations (8) and (22), the power allocated to each user’s signal determines its point-to-point BER performance. Of cause, using a lot of power may guarantee the BER requirements of the users. However, the available energy of the BS is limited in general, and thus it is necessary to use the power efficiently. This can be accomplished by transmitting the signal with the minimum power at the BS while satisfying the required BER performance of each user. For given BER requirements for users, there exists the optimal power allocation coefficient, α , to minimize the required energy, E , at the BS. In general, the BER performance of the MUST-enhanced UE becomes improved as α increases for a given E , while that of the MUST-based UE becomes improved as α decreases for a given E . Thus, there exists a trade-off between the BER performances of the MUST-based UE and the MUST-enhanced UE according to α .
In this section, we formulate the optimization problem to minimize the power consumption at the BS for given BER requirements for users. E B α , P b . B r e q is defined as the required power at the BS to satisfy the BER requirement of the MUST-based UE P b . B r e q for a given α . Similarly, E E α , P b . E r e q is defined as the required power at the BS to satisfy the BER requirement of the MUST-enhanced UE P b . E r e q for a given α . Then, the optimal power allocation coefficient to minimize the power consumption of the BS is given as:
α = arg α min max E B α , P b . B r e q , E E α , P b . E r e q s . t . 0 < α < 0 . 5 .
The optimization problem shown in Equation (23) can be solved easily as follows. For given BER requirements P b . B r e q and P b . E r e q , E B α , P b . B r e q is a monotonically increasing function α , while E E α , P b . E r e q is a monotonically decreasing function of α since α denotes the power portion allocated to the MUST-enhanced UE. Thus, the optimal power allocation coefficient α can be obtained by solving the following equation:
E B α , P b . B r e q = E E α , P b . E r e q .

5. Simulation Results

In this section, we show the performance of the proposed diversity-controlled MUST technique. In particular, we evaluate the average BER performances of both the MUST-based UE and the MUST-enhanced UE. We show the minimum required power at the BS for satisfying the BER requirement according to α . In all link-level simulations, we utilize QPSK modulation and Rayleigh fading channels.
Figure 5 shows the BER performance of the proposed diversity-controlled MUST technique for varying SNR values when α = 0.05 , N = 2 , 4 , 8 , 16 , and N r = 2 . In the figure, lines represent the analytical results obtained from Equations (8) and (22), while symbols represent link-level simulation results. The mathematical analysis derived in this paper matches well with the computer simulations over all SNR values. As N increases, the BER performance of the MUST-enhanced UE becomes improved due to the frequency diversity. Note that the lower bound of the average BER of the MUST-enhanced UE in Equation (22) is almost the same as the computer simulation especially when the SNR is high. The BER performance of the MUST-based UE is better than that of the MUST-enhanced UE in low SNR values due to the larger power allocation to the MST-based UE. On the other hand, it becomes worse than the BER of the MUST-enhanced UE for high SNR values due to the diversity gain of the MUST-enhanced UE.
Figure 6 shows the BER performance of the proposed diversity-controlled MUST technique for varying SNR values when α = 0.05 , N = 2 , and N r = 1 , 2 , 4 . Figure 5 shows the BER performance according to the number of frequencies used for the MUST-enhanced UE for a given number of receive antennas at UEs, but Figure 6 shows BER performance according to the number of receive antennas at UEs for a given number of frequencies used for the MUST-enhanced UE. The performance tendencies in both Figure 5 and Figure 6 are quite similar. The diversity order of the MUST-based UE is approximately equal to N r , while that of the MUST-enhanced UE is approximately equal to N · N r .
Figure 7 shows the transmit SNR at the BS over varying α where the transmit power of the BS is adapted to satisfy the BER requirements when N = 2 and N r = 2 . We assume that P b . B r e q = 5 × 10 4 and P b . E r e q . = 10 4 . As expected, the required SNR for the MUST-based UE decreases as α increases, while that for the MUST-enhanced UE increases as α increases. In this figure, the optimal α is equal to 0.06 and the minimum required SNR is equal to 21 dB.

6. Conclusions

In this paper, we proposed a generalized diversity-controlled MUST technique for 5G downlink cellular networks, which can be easily implemented with low complexity. We mathematically analyzed the BER performance of the proposed diversity-controlled MUST technique in Rayleigh fading environments where the BS is equipped with a single antenna but each user is equipped with multiple antennas. To the best of our knowledge, this is the first time that the closed-form solution on the BER of the diversity-controlled MUST technique has been obtained even though there are several link-level simulation results in the literature. The mathematical analysis was validated via extensive link-level simulations with various system parameters. Furthermore, based on the mathematical analysis, the optimal power allocation framework was considered to minimize the power consumption at the BS for given BER requirements. We leave the case of multiple antennas at the BS for further study.

Acknowledgments

This work was supported in part by the Basic Science Research Program through the NRF funded by the Ministry of Science and ICT (NRF-2016R1A2B4014834) and in part by the NRF grant funded by the Korea government (MSIT)(NRF-2017K1A3A1A19071179).

Author Contributions

J.S. Yeom and E. Chu performed computer simulations; B.C. Jung created the basic idea and designed the experiments; H. Jin mathematically analyzed the proposed technique; J.S. Yeom, E. Chu, B.C. Jung, and H. Jin wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest. The founding sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results.

References

  1. ITU-R. Framework and Overall Objectives of the Future Development of IMT for 2020 and Beyond; Recommendation M.2083; International Telecommunication Union: Geneva, Switzerland, 2015. [Google Scholar]
  2. Andrews, J.G.; Buzzi, S.; Choi, W.; Hanly, S.V.; Lozano, A.; Soong, A.C.K.; Zhang, J.C. What will 5G be? IEEE J. Sel. Areas Commun. 2014, 32, 1065–1082. [Google Scholar] [CrossRef]
  3. Ding, Z.; Liu, Y.; Choi, J.; Sun, Q.; Elkashlan, M.; Chih-Lin, I.; Poor, H.V. Application of non-orthogonal multiple access in LTE and 5G networks. IEEE Commun. Mag. 2017, 55, 185–191. [Google Scholar] [CrossRef]
  4. Wang, P.; Xiao, J.; Li, P. Comparison of orthogonal and non-orthogonal approaches to future wireless cellular systems. IEEE Veh. Technol. Mag. 2006, 1, 4–11. [Google Scholar] [CrossRef]
  5. Chih-Lin, I.; Han, S.; Xu, Z.; Wang, S.; Sun, Q.; Chen, Y. New paradigm of 5G wireless internet. IEEE J. Sel. Areas Commun. 2016, 34, 474–482. [Google Scholar]
  6. Ali, S.; Hossain, E.; Kim, D.I. Non-orthogonal multiple access (NOMA) for downlink multiuser MIMO Systems: User clustering, beamforming, and power allocation. IEEE Access 2017, 5, 565–577. [Google Scholar] [CrossRef]
  7. Dai, L.; Wang, B.; Yuan, Y.; Han, S.; Chih-lin, I.; Wang, Z. Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends. IEEE Commun. Mag. 2015, 53, 74–81. [Google Scholar] [CrossRef]
  8. Liu, Y.; Qin, Z.; Elkashlan, M.; Ding, Z.; Nallanathan, A.; Hanzo, L. Nonorthogonal multiple access for 5G and beyond. Proc. IEEE 2017, 105, 2347–2381. [Google Scholar] [CrossRef]
  9. 3GPP. Study on Downlink Multiuser Superposition Transmission (MUST) for LTE (Release 13); 3GPP: Valbonne, France; Available online: http://www.tech-invite.com/3m36/tinv-3gpp-36-859.html (accessed on 10 February 2018).
  10. 3GPP. Study on Scenarios and Requirements for Next Generation Access Technologies (Release 14); 3GPP TR 38.913 (v0.2.0); 3GPP: Valbonne, France, 2016. [Google Scholar]
  11. Tse, D.; Viswanath, P. Fundamentals of Wireless Communication; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
  12. Yan, C.; Harada, A.; Benjebbour, A.; Lan, Y.; Li, A.; Jiang, H. Receiver design for downlink non-orthogonal multiple access (NOMA). In Proceedings of the 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), Glasgow, UK, 11–14 May 2015. [Google Scholar]
  13. Herath, S.; Haghighat, A. Non-orthogonal multiple access with sub-constellation alignment. In Proceedings of the 2016 50th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, 6–9 November 2016. [Google Scholar]
Figure 1. Example of the composite constellation of the MUST technique with quadrature phase shift keying (QPSK) modulation.
Figure 1. Example of the composite constellation of the MUST technique with quadrature phase shift keying (QPSK) modulation.
Sensors 18 00536 g001
Figure 2. Transmitter design of the diversity-controlled MUST technique.
Figure 2. Transmitter design of the diversity-controlled MUST technique.
Sensors 18 00536 g002
Figure 3. Receiver structure at the MUST-based UE with the diversity-controlled MUST technique.
Figure 3. Receiver structure at the MUST-based UE with the diversity-controlled MUST technique.
Sensors 18 00536 g003
Figure 4. Receiver structure at the MUST-enhanced UE with the diversity-controlled MUST technique.
Figure 4. Receiver structure at the MUST-enhanced UE with the diversity-controlled MUST technique.
Sensors 18 00536 g004
Figure 5. BER performance of the proposed MUST technique for varying SNR values when α = 0.05 , N = 2 , 4 , 8 , 16 , and N r = 2 .
Figure 5. BER performance of the proposed MUST technique for varying SNR values when α = 0.05 , N = 2 , 4 , 8 , 16 , and N r = 2 .
Sensors 18 00536 g005
Figure 6. BER performance of the proposed MUST technique for varying SNR values when α = 0.05 , N = 2 , and N r = 1 , 2 , 4 .
Figure 6. BER performance of the proposed MUST technique for varying SNR values when α = 0.05 , N = 2 , and N r = 1 , 2 , 4 .
Sensors 18 00536 g006
Figure 7. Required transmission power at BS according to α when N = 2 and N r = 2 .
Figure 7. Required transmission power at BS according to α when N = 2 and N r = 2 .
Sensors 18 00536 g007
Table 1. Characteristics of MUST Techniques in 3GPP LTE Systems.
Table 1. Characteristics of MUST Techniques in 3GPP LTE Systems.
Power Ratio of SignalBit-Labeling
MUST Category 1adaptivenon-Gray mapping
MUST Category 2adaptiveGray mapping
MUST Category 3N/AGray mapping
Table 2. Computation complexity of the receiver at the MUST-based UE.
Table 2. Computation complexity of the receiver at the MUST-based UE.
Number of MultipliersNumber of AddersNumber of Comparators
MUST-based UE N r N r 1 1
Table 3. Computation complexity of the receiver at the MUST-enhanced UE.
Table 3. Computation complexity of the receiver at the MUST-enhanced UE.
Number of MultipliersNumber of AddersNumber of Comparators
MUST-enhanced UE 2 N N r 2 N ( N r 1 ) N + 1

Share and Cite

MDPI and ACS Style

Yeom, J.S.; Chu, E.; Jung, B.C.; Jin, H. Performance Analysis of Diversity-Controlled Multi-User Superposition Transmission for 5G Wireless Networks. Sensors 2018, 18, 536. https://doi.org/10.3390/s18020536

AMA Style

Yeom JS, Chu E, Jung BC, Jin H. Performance Analysis of Diversity-Controlled Multi-User Superposition Transmission for 5G Wireless Networks. Sensors. 2018; 18(2):536. https://doi.org/10.3390/s18020536

Chicago/Turabian Style

Yeom, Jeong Seon, Eunmi Chu, Bang Chul Jung, and Hu Jin. 2018. "Performance Analysis of Diversity-Controlled Multi-User Superposition Transmission for 5G Wireless Networks" Sensors 18, no. 2: 536. https://doi.org/10.3390/s18020536

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop