Next Article in Journal
An Approximate GEMM Unit for Energy-Efficient Object Detection
Previous Article in Journal
Nonlinear Control Strategies for an Autonomous Wing-In-Ground-Effect Vehicle
Previous Article in Special Issue
Beam Allocation and Power Optimization for Energy-Efficiency in Multiuser mmWave Massive MIMO System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Energy-Constrained Design of Joint NOMA-Diversity Schemes with Imperfect Interference Cancellation

Department of Engineering and Architecture, University of Trieste, Via A. Valerio 10, 34127 Trieste, Italy
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(12), 4194; https://doi.org/10.3390/s21124194
Submission received: 6 May 2021 / Revised: 14 June 2021 / Accepted: 16 June 2021 / Published: 18 June 2021
(This article belongs to the Special Issue Energy-Efficient Resource Allocation for beyond 5G and IoT Systems)

Abstract

:
This study proposes a set of novel random access protocols combining Packet Repetition (PR) schemes, such as Contention Resolution Diversity Slotted Aloha (CRDSA) and Irregular Repetition SA (IRSA), with Non Orthogonal Multiple Access (NOMA). Differently from previous NOMA/CRDSA and NOMA/IRSA proposals, this work analytically derives the energy levels considering two realistic elements: the residual interference due to imperfect Interference Cancellation (IC), and the presence of requirements on the power spent for the transmission. More precisely, the energy-limited scenario is based on the relationship between the average available energy and the selected code modulation pair, thus being of specific interest for the implementation of the Internet of Things (IoT) technology in forthcoming fifth-generation (5G) systems. Moreover, a theoretical model based on the density evolution method is developed and numerically validated by extensive simulations to evaluate the limiting throughput and to explore the actual performance of different NOMA/PR schemes in energy-constrained scenarios.

1. Introduction

The design of an effective technique for handling a large amount of uncoordinated traffic is still an open issue both for Fifth and Sixth Generation (5G/6G) communication systems, whose final aim is the provisioning of a pervasive space/terrestrial scenario implementing the Internet of Things (IoT) paradigm [1,2,3,4]. Existing networks manage the distributed load by adopting the well known Slotted Aloha (SA) protocol [5], for which several extensions have been proposed [6,7,8,9,10,11,12,13]. The SA performance may be in fact significantly improved by introducing energy diversity and Interference Cancellation (IC), whose combination leads to the Non-Orthogonal Multiple Access (NOMA) approach [6,7,8]. In a NOMA scheme, each user randomly selects an energy level by knowing the allowed ones, but not knowing those selected by the other users. In particular, the levels are chosen so that, if at most L users send their packets in a given slot using different levels, all the packets can be decoded.
Beside NOMA, another approach exploits IC, but relying on Packet Repetition (PR), that is, considering the transmission of a certain number M of replicas of a generated packet [9,10,11,12,13]. The M value may be fixed, as in the Contention Resolution Diversity SA (CRDSA) scheme [9], where M = 2 , or may be a Random Variable (RV), as in the Irregular Repetition SA (IRSA) protocol [10]. The basic mechanism allowing packet diversity to properly operate relies on the possibility, still enabled by IC, that the packets transmitted in an uncollided slot may be successfully detected and then used to remove their replicas present in other slots. Even if the repetition-based solutions have been further extended to include priority [11], load control [12], and coding [13], the recent introduction of the IRSA algorithm in the DVB-RCS2 standard [14] has made this latter strategy a more immediate candidate for managing the random access procedure in 5G/6G networks.
Rather than being alternative, the NOMA and PR approaches are instead complementary. Accordingly, some proposals have explored the joint usage of energy and packet diversity [15], while specific investigations for the NOMA/CRDSA and NOMA/IRSA schemes have been considered [16,17,18]. These latter studies have proved the reciprocal benefits among NOMA and PR, but their joint applicability in a real network requires a further deepening of some practical aspects. The first one concerns the reception criterion, which usually relies on the simplified erasure model and not on the more realistic capture one [19,20,21]. The second aspect involves the assumption of perfect IC, which does not occur in an actual receiver [22,23,24,25,26], and leads to two main consequences, related to the need of increasing the energy separation to allow the decoding of packets using different levels. Firstly, the imperfect IC may reduce the achievable performance, which also depends on the available energy. In a PR scheme, the energy requirements are more severe, the number of packets that have been detected in other slots being unpredictable, but the residual energy of which may prevent the correct detection of packets in the imperfectly cleaned slots. As a second consequence, imperfect IC may prevent the complete successful delivery of the packets, which may be instead assumed in a PR scheme when the total load lies below a given threshold [9,10]. A further aspect that is often neglected in the analysis of NOMA-based protocols concerns the control of the power consumption [27,28,29], representing a relevant issue for 5G/6G networks, which are expected to be developed in agreement with the green communications paradigm.
In agreement with the above discussion, this paper presents the design of energy-constrained NOMA/CRDSA and NOMA/IRSA schemes able to sustain a desired level of imperfect IC. To this aim, a parameterized model is derived to evaluate the energy levels according to the PR scheme, the amount of residual interference, and the available average energy. To check the benefits of the conceived solution, a theoretical method, validated by extensive simulations, is developed to estimate the throughput and determine the conditions at which the limiting performance, obtained with perfect IC, is approached with imperfect IC. Besides, the proposed design is also tested in the presence of a Quadrature Phase-Shift Keying (QPSK) modulation and adopting a discretized set of channel code rates to consider the realistic situation in which a limited set of transmission modes is available. In particular, the key contributions of the presented study are:
  • The development and evaluation of an energy design method for joint NOMA/PR schemes able to sustain a desired level of imperfect IC;
  • The derivation of a parameterized model to assess the energy thresholds at which the capability of sustaining an imperfect IC improves significantly;
  • The testing of the proposed design in the presence of a QPSK modulation by adopting a discretized set of channel code rates with the aim of verifying its usefulness in realistic scenarios.
The paper is organized as follows. Section 2 introduces the system model. Section 3 presents the energy level design. Section 4 describes the throughput analysis. Section 5 discusses the numerical results. Finally, Section 6 summarizes the most relevant conclusions.

2. System Model

Consider a distributed wireless network in which H contending users send packets to a common destination. The packet arrival is described by a Poisson process and the time domain is subdivided into Random Access Frames (RAFs) consisting of K slots of identical duration. In such a scenario, the input offered load G that should be managed by the network can be expressed (in packets per slot) as:
G = χ H K ,
where 0 χ 1 is the activation probability, namely, the probability that a user generates a packet in a frame. The transmission in the RAF of each packet is carried out by adopting an SA-based random access scheme combining energy diversity (i.e., NOMA) with packet diversity (i.e., CRDSA, IRSA, …).
Consider first energy diversity. To this aim, identify by L the total number of available power levels and define as E l / N 0 the energy E l used by the l-th ( l = 1 , , L ) NOMA level normalized to the noise spectral density N 0 . Besides, assume, for generality, that the l-th level may be related to a channel code rate r l , thus enabling one to define the vector r = [ r 1 , , r L ] of the code rates associated to all the L levels. When a bi-dimensional modulation is chosen to transmit a packet, the corresponding vector of the selected rates (expressed in information bits/symbol) is given by R = 2 r . When the Shannon bound is assumed, the vector of the Signal-to-Noise Ratio (SNR) thresholds α = [ α 1 , , α L ] required to sustain the rates R can be evaluated by inverting the Shannon bound itself, thus obtaining:
α = 2 R 1 ,
in which the element-wise power function is used to compact the notation. When, instead, a Quadrature Phase-Shift Keying (QPSK) modulation is adopted, the vector of the SNR thresholds can be derived by inverting the expression calculated in [30]. This yields:
α = 2 1 a 1 a 3 log 1 R 2 1 a 2 ,
where a 1 1.286 , a 2 0.931 , and a 3 0.010 are proper coefficients. Assume min ( α ) 1 , so that, for a given energy level, only one successful packet reception is allowed.
Now, let us introduce, in addition to energy diversity, packet diversity. Accordingly, in each RAF, a generic user can send at most one packet that can be repeated M times. When just energy diversity is adopted, and hence packet diversity is not considered, we necessarily have M = 1 . Otherwise, if packet diversity is introduced, M = 2 replicas are employed when the CRDSA scheme is used, while, when the IRSA one is adopted, M becomes a RV having a Probability Density Function (PDF) that can be optimized through the density evolution method. In summary, when a packet must be transmitted, the source can in general select the M value, the relative energy levels, and the M slots of the RAF in which the M replicas have to be inserted.
The main protocol operations can be inferred from Figure 1, in which E i , j represents the energy selected by the user i for its j-th attempt. More precisely, in the reported situation, user 1 chooses the energy level 1 for its first attempt, and the energy level 2 for the second one. We have a collision in the first and in the second slot, since both users choose the same energy level. In the third slot, instead, the transmitters choose different energy levels, thus, according to the NOMA rules, their packets can be successfully decoded by starting from the higher energy one. In this way, the contribution of users 1 and 3 may be (partly) removed from the other slots, hence allowing the correct detection of packet 2 as well by assuming that the remaining interference is within the design threshold. Observe that the adoption of repetition schemes has the advantage, from the user’s viewpoint, of guaranteeing the complete packet delivery up to a certain load, avoiding the need of further retransmissions. This has a positive impact both on system complexity and delay. The joint adoption of repetitions and power diversity allows one to increment the sustainable load. However, the adoption of power diversity may lead to a significant increase of energy consumption, which makes also more critical the impact of imperfect IC on the performance. Therefore, a suitable energy design is required to achieve the joint benefits of repetitions and power diversity, without negative effects on energy consumption and performance.

3. Energy Level Design

When energy and packet diversity are jointly employed, the design of the energy levels should be extended with respect to the typical one adopted for the pure NOMA scheme [6]. Moreover, within this design, two further aspects should be carefully considered. The first one concerns the power consumption, since modern communication systems cannot neglect the importance of energy saving. The addressing of such a problem leads to a different perspective in imposing the mathematical constraints on the energy levels, thus moving from the usual requirement on the maximum peak energy [18] to a more suitable one on the average spent energy. For a proper design of the access algorithm, it is hence useful to rely on the average SNR referred to a packet, which can be expressed as:
E av N 0 = E [ M ] Γ ,
where E [ M ] denotes the average number of replicas of a packet and:
Γ = 1 N 0 L l = 1 L E l ,
represents the average SNR referred to a single replica. The main scope of this paper is to investigate the effects of the available average energy E av assuming an equally likely energy distribution [8].
The second aspect that should be taken into account in the energy design of a joint NOMA/PR scheme involves the nonidealities of the decoding IC-based process, and in particular the residual interference actually present in a practical receiver due to imperfect cancellation. To ensure the proper algorithm operations in this realistic situation, thus accounting for imperfect IC, limited average energy, and joint power/packet diversity, we propose an energy level design in which the following condition must be met:
E l N 0 1 + i = 1 l 1 E i N 0 + ϵ N 1 L Γ + i = l + 1 L E i N 0 + N 2 E L N 0 α l , l = 1 , , L ,
where 0 ϵ < 1 represents the fraction of the interference remaining after IC ( ϵ = 1 is not considered since it would imply no IC), N 1 0 denotes the number of sustainable cancelled transmissions per energy level derived from packet diversity, and N 2 0 identifies the number of further highest energy sustainable cancelled transmissions. This latter parameter acts as a margin that a designer can introduce to increase the robustness of the decoding process. The condition in (6), which must hold in the slot occupied by a replica to enable its decoding, accounts for the lower (not cancelled) energy levels, and for the residual interference (terms within the round bracket) due to the other (cancelled) replicas deriving from repetition schemes (replicas that are correctly decoded in other slots), and to the higher (cancelled) energy levels in the same slot. By assuming N 2 > 0 , a large number of further lower energy cancelled transmissions deriving from repetitions may be sustained, if less than N 1 + N 2 highest energy cancelled transmissions are present. Note that (6) can be applied also to basic NOMA with imperfect IC, for which N 1 = N 2 = 0 , and, furthermore, to basic NOMA with perfect IC, for which ϵ = 0 . From condition (6), the limiting normalized energies may be determined as:
E L N 0 = α L 1 + L Γ 1 + ϵ N 1 1 + α L 1 ϵ N 2 ,
E L 1 N 0 = 1 + α L ϵ α L 1 1 + α L 1 1 + L Γ 1 + ϵ N 1 1 + α L 1 ϵ N 2 ,
and so on for the other lower levels. Under the equally likely energy hypothesis, the above equations may be suitably manipulated to evaluate each normalized level, hence obtaining, after some algebra, the normalized energies in a compact form as:
E l N 0 = ϕ ψ θ l , l = 1 , , L ,
where:
ϕ = 1 + L Γ 1 + ϵ N 1 ,
ψ = 1 + α L 1 ϵ N 2 ,
θ l = 1 + α L δ l i = l + 1 L + 1 β i , l = 1 , , L ,
with:
δ l = α l 1 + α l , l = 1 , , L ,
β l = 1 + ϵ α l 1 + α l l = 1 , , L 1 l = L + 1 ,
in which the index L + 1 is introduced for mathematical purposes. Note that, being 0 ϵ < 1 , we have 0 < 1 / ( 1 + α l ) β l < 1 for l = 1 , , L . As a further remark regarding this derivation, it is worth observing that (9) represents a general purpose relationship among energies, in which θ l depends on α and ϵ only, while ϕ and ψ , respectively, depend also on N 1 and N 2 . Actually, a simplified energy design might be given by:
E l N 0 = ξ θ l , l = 1 , . . . , L ,
in which the constant ξ can be determined once the energy probabilities, the transmission scheme, and the average SNR are set. However, the adoption of (9) allows one to relate the energy to the sustainable cancelled patterns, and is, therefore, much more suitable for assessing the performance achievable by a joint NOMA/PR scheme.
In a conventional system, the design parameters are: ϵ (the fraction of interference remaining after IC, dependent on the quality of the receiver), α (the selected rates), N 1 (the number of cancelled interferers per energy level deriving from repetitions that must be sustained), and N 2 (the number of further highest energy cancelled interferers deriving from repetitions that must be sustained). Therefore, after the evaluation of ψ by (11), one has to derive Γ , which is necessary to evaluate ϕ in (10). This latter operation can be carried out by substituting (9) and (10) in (4)–(5), and then by solving for Γ , thus obtaining:
Γ = l = 1 L θ l L ψ 1 + ϵ N 1 l = 1 L θ l ,
which allows the calculation of ϕ by (10) and the subsequent evaluation of the normalized energies by (9). If all levels are associated to the same modulation and code rate, we have R l = R and hence α l = α for l = 1 , , L . By consequence, from (14), we obtain:
β l = β = 1 + ϵ α 1 + α , l = 1 , , L ,
which may be usefully inverted as:
α = 1 β β ϵ .
The adoption of an identical α value simplifies the expressions in (12) and (16), which, by (11) and (18), respectively, become:
θ l = 1 β β ϵ β L l , l = 1 , , L ,
and:
Γ = 1 β L L 1 ϵ 1 + N 2 1 β 1 + ϵ N 1 1 β L .
Concerning this latter formula, one may observe that, since Γ must be positive and β is positive and lower than one, the quantity within the brace must be not negative. This provides the following limiting condition on N 1 :
N 1 β L ϵ 1 + N 2 1 β 1 β L ϵ ,
which determines a limit on the maximum IC capability and, in turn, on the throughput.
In some application scenarios characterized by power saving constraints, the average energy, and hence the average SNR, may be considered as a given parameter, in place of the α one adopted in conventional systems based on the rate to support. In these energy-constrained random access networks, (20) may be exploited to evaluate the required α value, given Γ and the other design parameters ϵ , N 1 , and N 2 . To this aim, (20) can be manipulated to derive a polynomial equation in the unknown β as:
β L + a β b = 0 ,
where:
a = L Γ ϵ N 2 1 + L Γ 1 + ϵ N 1 ,
b = 1 + ϵ L Γ 1 + N 1 + N 2 1 + L Γ 1 + ϵ N 1 .
In general, this equation must be solved numerically, but, in many common situations, such as for L 4 or N 2 = 0 , closed-form expressions may be derived. This significantly limits the computational complexity of the design process, making simpler the overall implementation of the derived joint NOMA/PR schemes. Once the β value is obtained (analytically or numerically), one may calculate the corresponding rate α by (18). For example, when N 2 = 0 , one can easily obtain α = ( 1 b 1 L ) / ( b 1 L ϵ ) .
In summary, the main characteristic of the proposed energy design strategy for NOMA/PR schemes consists in enabling the evaluation of the energy levels given the required rates, when power saving is not of concern, or, conversely, the calculation of the rates given the energy levels for power-limited systems.

4. Throughput Evaluation

The throughput achievable by a joint power/packet diversity algorithm may be theoretically determined moving from the density evolution method [10]. To this aim, recalling the assumed Poisson arrival process, firstly evaluate the probability of generating i packets as a function of the input offered load G as:
ρ i ( G ) = E [ M ] G i 1 i 1 ! exp E [ M ] G , i = 1 , 2 ,
where the term E [ M ] G takes into account that, in the presence of a PR scheme, each generated packet produces, on average, E [ M ] replicas. Now, to apply density evolution, consider the relationship between the unsolved contentions and the unknown packets (see [10] for the detailed derivation):
λ ( q , G ) = 1 E [ M ] M = 1 max ( M ) M Λ M p q , G M 1 ,
in which q denotes the probability that a replica is still unknown at the certain stage of the IC process, Λ ( M ) is the PDF of M, and:
p ( q , G ) = 1 i = 1 + ρ i ( G ) t = 0 i 1 w i , t i 1 t 1 q t q i 1 t ,
represents the probability that a contention in a generic slot is still unresolved. In particular, in (26), w i , t identifies the probability of successfully decoding a replica in a slot with i contending ones, t of which have been canceled because they have been correctly decoded in other slots. In ideal conditions, that is, with perfect IC ( ϵ = 0 ), we have w i , t = w i t , 0 , whose corresponding approximate expression has been derived in ([27], eq. 18). In such a case, the maximum throughput G max may be obtained by determining the maximum G value for which the inequality q > λ becomes satisfied for 0 < q 1 . Observe that, in an asymptotic scenario, that is, for K , all the packets are successfully delivered if the throughput is lower than G max . This condition may be reasonably approached when RAFs composed by a sufficiently large number of slots are selected.
In unideal conditions, that is, with imperfect IC ( ϵ > 0 ), w i , t may be determined as a function of N 1 and N 2 for a given set of parameters. For example, w i , i 1 = 1 for i < N 1 + N 2 + 1 , being this limit the guaranteed IC capability. In a more general condition, we have w i , t < w i t , 0 , being the main performance reduction due to the replicas associated to the lower energy levels, which cannot sustain the partially cancelled energy of the replicas associated to the higher energy levels. For the developed energy design, the w i , t values may be exhaustively evaluated. However, with partial IC, the density evolution approach cannot be directly used as in [10] to assess the limiting performance. In fact, the full packet delivery is not feasible, given that the density evolution analysis relays on the hypothesis w i , i 1 = 1 , which cannot be achieved for i values exceeding a threshold dependent on the parameter set. Hence, the condition q > λ cannot be guaranteed for very low q values. Actually, the achievable throughput depends on energy, and, as a consequence, on N 1 and N 2 for a given scenario (access algorithm, ϵ value, number of energy levels). A general treatise would require a modification of the density evolution approach. This task is out of the scope of this paper, which focuses on the energy requirements that allow the access algorithm to approach its limiting performance, thus ensuring the almost complete delivery of the packets within the maximum throughput for sufficiently large K values. To deal with this specific problem one may exploit the fact that, by progressively increasing the N 1 and N 2 values, the limiting throughput G max may be approached when the condition q > λ is guaranteed for q 0 < q 1 with a sufficiently low q 0 value, which in this study is selected equal to 0.05 . Note that this latter achievement is guaranteed for ϵ < ϵ , that is, for all residual fractions of interference ϵ lower than the design value ϵ . This implies that, if the receiver has IC capabilities better than those assumed during the design, it can sustain a certain fluctuation of the energy level, deriving, for example, from fading.
The conceived throughput estimation is applied to the NOMA/CRDSA and NOMA/IRSA algorithms, which are of main interest because of the implementation of the CRDSA and IRSA schemes in last generation satellite systems [14]. In particular, for the NOMA/CRDSA algorithm, we simply have Λ ( 2 ) = 1 and Λ ( M ) = 0 for M 2 [9], since M is deterministic. In the NOMA/IRSA case, instead, M is a RV, whose PDF have been determined in [18] assuming max ( M ) = 8 . For this protocol, named NOMA/IRSA-8 from now on, the energy requirements are very severe and the limiting performance may be approached just using a very large number of slots. Hence, in this paper, we also adopt a simpler version characterized by max ( M ) = 3 , named NOMA/IRSA-3, which allows a more quick identification of the energy required to approach G max . Table 1 summarizes the parameters adopted for these two schemes.

5. Results

As a first set of results, Table 2 reports the achievable limiting throughput and the required average SNR in the presence of perfect IC ( ϵ = 0 ) for the three algorithms under investigation (NOMA/CRDSA, NOMA/IRSA-3, NOMA/IRSA-8). The values are obtained assuming R = 1 information bits per symbol, using the Shannon model (for which also α = 1 ), and selecting the parameters in Table 1. In particular, Table 2 shows that, for a given scheme, the increase of the number of levels provides, as expected, a higher throughput, but at the cost of an increased average energy (higher power consumption). Throughput improvements may be also obtained, for a given L value, by increasing the level of packet diversity, still spending a higher energy.
To begin the exploration of the performance under imperfect IC when the Shannon bound is adopted, consider Figure 2 and Figure 3, which report, for ϵ = 0.05 , L = 3 , K = 100 , and R = 1 information bits per symbol, the throughput for the NOMA/IRSA-3 (Figure 2a) and the NOMA/IRSA-8 (Figure 3a) schemes, together with the corresponding success probabilities (Figure 2b and Figure 3b).
Beside the analytical plot representing the limiting performance (dash-dotted line) and the perfect IC case (dotted line with circle marker), each figure shows a set of simulated curves derived by selecting different N 1 and N 2 values. Both analysis and simulations are implemented in Matlab. In particular, the simulations are carried out by generating the Poisson traffic for a given load G, assigning to each packet the proper M and energy values, and then randomly locating the replicas in the RAF. Each simulated point is calculated by averaging the results obtained from N sim = 10,000 RAF realizations. From these figures one may observe that, for NOMA/IRSA-3, the limiting performance is approached using N 1 = 1 and N 2 = 1 , while, for NOMA/IRSA-8, higher values would be required. Besides, for a given ( N 1 , N 2 ) pair, the performance of NOMA/IRSA-8 is comparable to that of NOMA/IRSA-3, despite the higher energy level and the higher limiting performance of the first scheme. Similar arguments hold also for K = 1000 , that is, when longer RAFs are considered, as it may be noticed from Figure 4 and Figure 5.
According to the above discussion, let us now focus on the relationship between the sustainable rate and the available energy. More precisely, consider the minimum threshold α = 1 , achievable by selecting the minimum average SNR ( E av / N 0 ) min , and the maximum sustainable threshold α max , obtainable from (22) and (18) when E av / N 0 and hence Γ . These parameters, together with the maximum sustainable rate R max , derived by (2) for the Shannon bound and by (3) for the QPSK modulation, are reported in Table 3 for each of the analyzed scenarios, that is, when the access algorithm and the parameters L, ϵ , N 1 , and N 2 are identified. In this table, the ( N 1 , N 2 ) pairs are properly selected according to the method explained in the previous section, which allows the analyzed algorithms to approach G max for a sufficiently large K value. It is worth to observe, firstly, that ( E av / N 0 ) min and α max do not depend from the chosen modulation bound, and, secondly, that all the values in the table have been calculated in closed-form, since all the involved scenarios are characterized by L 4 and/or N 2 = 0 , thus enabling to analytically solve (22). Among the values in the table, let us start by considering those corresponding to ( E av / N 0 ) min for NOMA/IRSA-3 and ϵ = 0.025 without constraints on the code rate and on the modulation complexity, hence allowing the usage of all the rates complying with α > 1 . The throughput achievable in these scenarios for different values of L is reported in Figure 6a for the Shannon bound and in Figure 6b for the QPSK modulation. More precisely, Figure 6a interestingly reveals that the simple IRSA-3 algorithm ( L = 1 ), in which NOMA is not adopted, may anyway achieve a satisfactory performance, close or, in some cases, even better than that provided by the combined schemes. This is due to its low energy requirements and to the possibility of using complex modulations, which are implicitly available when the Shannon bound is assumed. A realistic setting involving the QPSK modulation ( R 2 ) modifies the previous conclusion, putting into evidence that the increase of the number of energy levels enables the NOMA/IRSA-3 scheme to better exploit its higher sustainable load.
A more general set of results is reported in Figure 7, which shows the achievable throughput, that is, the maximum throughput calculated over all the available L values for NOMA/IRSA-3, NOMA/CRDSA, pure NOMA, and SA when the Shannon bound (Figure 7a) and the QPSK modulation (Figure 7b) are adopted. The performance of the pure NOMA algorithm ( M = 1 and L > 1 ) is shown separately from that of the SA one ( M = L = 1 ), since the latter does not use IC and, by consequence, does not depend on ϵ . When the Shannon bound is adopted (i.e., R > 1 ), thus no limitations on the code rate and on the modulation complexity are present, the simple SA, despite its low sustainable rate, is able to achieve an interesting performance by exploiting its very low energy requirements. When QPSK modulation is instead assumed, the repetition schemes perform significantly better and are definitely preferable. However, despite the specific modulation model, the algorithms adopting repetition schemes, that is, NOMA/IRSA and NOMA/CRDSA (even in their base version with L = 1 ), allow the transmitters to deliver all their packets in a sufficiently long RAF, while pure NOMA (including SA) necessarily requires retransmissions in successive RAFs to recover the failed attempts.
To make the presented discussion more adherent to a practical context, consider now that the code rate r l for the l-th energy level can be selected in a finite set R { 1 / 2 , 2 / 3 , 3 / 4 , 5 / 6 } , whose corresponding average SNRs referred to a single replica may be determined by (16). The resulting achievable throughput is reported in Figure 8, which is obtained for ϵ = 0.025 when the QPSK modulation is used. In particular, Figure 8a refers to the scenario in which a single code rate is adopted by all the energy levels (i.e., r l = r R for l = 1 , , L ), while Figure 8b refers to the scenario in which a double code rate is allowed, since a higher code rate may be used by the lowest energy level for compensation (i.e., r l = r R for l = 2 , , L and r r 1 R ). Both subfigures reveal that, in a discrete-rate situation, the algorithms that offer the best performance are influenced by the available energy. Besides, observe that all the results in Figure 8 are bounded by those in Figure 7b. A more specific view, referred to the NOMA/IRSA-3 scheme, is available in Table 4, which lists a suitable combination of rates and the corresponding limiting performance. Finally, a complete evaluation, considering the multi-rate design for different ϵ values is shown in Figure 9. From this figure, we may infer that just the multi-rate design allows one to approach the continuous throughput curve, and that the distinction about the performance of the different algorithms becomes clearer. In particular, the throughput improvement deriving from the repetition schemes strongly depends on the residual amount of interference remaining after the IC process.

6. Conclusions

The joint adoption of NOMA and packet diversity in the presence of imperfect IC and constraints on the average available energy has been investigated. A suitable energy design allows one to achieve the benefits of repetitions and power diversity, without negative effects on energy consumption, which may affect the user’s experience. The relationship between the energy levels and the rates sustainable by the system has been theoretically derived to enable the design of both rate-based and energy-constrained random access networks. Besides, a throughput analysis moving from the density evolution approach has been developed to identify the limiting performance of NOMA/CRDSA and NOMA/IRSA schemes.
The obtained results have shown that the NOMA/PR strategy allows significant throughput improvements with respect to the pure NOMA and PR algorithms, but have confirmed also that the residual interference may severely affect the performance of solutions previously conceived assuming perfect IC. A comparison carried out considering an ideal Shannon model and a more realistic QPSK modulation in a practical scenario characterized by discretized code rates has revealed that, in the first case, the basic SA scheme is competitive with the more sophisticated NOMA/PR ones, while, in the second case, the joint usage of energy and packet diversity is highly preferable. To exploit this capability, some possible code rate combinations have been explored by taking into account different levels of cancelled interference. This has more clearly put into evidence the applicability of the developed energy design, which may hence represent a useful tool for introducing energy saving in next-generation satellite and terrestrial systems, while maintaining a satisfactory performance for the corresponding random access channels.
Current research efforts are devoted to deepen the behavior of the NOMA/PR schemes in the low SNR regime, in which the correct detection of more than one packet in a single attempt is possibile. The modifications of the energy design in these situations is one of the activities carried out in the present research activity.

Author Contributions

F.B.: conceptualization, software and original draft preparation, G.B.: review and editing, F.V.: review and editing, M.C.: conceptualization, writing and validation. All authors have read and agreed to the published version of the manuscript.

Funding

This research was partly funded by the Italian Ministry of University and Research (MIUR) within the project FRA 2021 (University of Trieste, Italy), entitled “Interference modeling in ultra-dense 5G/6G networks.”

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
CRDSAContention Resolution Diversity SA
ICInterference Cancellation
IoTInternet of Things
IRSAIrregular Repetition SA
NOMANon-Orthogonal Multiple Access
QPSKQuadrature Phase-Shift Keying
PDFProbability Density Function
PRPacket Repetition
RAFRandom Access Frame
RVRandom Variable
SASlotted Aloha
SNRSignal to Noise Ratio

References

  1. Andrews, J.G.; Buzzi, S.; Choi, W.; Hanly, S.V.; Lozano, A.; Soong, A.C.K.; Zhang, J.C. What will 5G be? IEEE J. Sel. Areas Commun. 2014, 32, 1065–1082. [Google Scholar] [CrossRef]
  2. Sanchez-Aguero, V.; Vidal, I.; Valera, F.; Nogales, B.; Mendes, L.L.; Damascena Dias, W.; Carvalho Ferreira, A. Deploying an NFV-based experimentation scenario for 5G solutions in underserved areas. Sensors 2021, 21, 1897. [Google Scholar] [CrossRef]
  3. Babich, F.; Comisso, M. Impact of segmentation and capture on slotted Aloha systems exploiting interference cancellation. IEEE Trans. Veh. Technol. 2019, 68, 2878–2892. [Google Scholar] [CrossRef] [Green Version]
  4. Giordani, M.; Zorzi, M. Non-terrestrial networks in the 6G era: Challenges and opportunities. IEEE Netw. 2021, 35, 244–251. [Google Scholar] [CrossRef]
  5. Roberts, L.G. ALOHA packet systems with and without slots and capture. ACM SIGCOMM Comput. Commun. Rev. 1975, 5, 28–42. [Google Scholar] [CrossRef]
  6. Xu, C.; Ping, L.; Wang, P.; Chan, S.; Lin, X. Decentralized power control for random access with successive interference cancellation. IEEE J. Sel. Areas Commun. 2013, 31, 2387–2395. [Google Scholar] [CrossRef]
  7. Marques da Silva, M.; Dinis, R. Power-ordered NOMA with massive MIMO for 5G systems. Appl. Sci. 2021, 11, 3541. [Google Scholar] [CrossRef]
  8. Shin, W.; Vaezi, M.; Lee, B.; Love, D.J.; Lee, J.; Poor, H.V. Non-orthogonal multiple access in multi-cell networks: Theory, performance, and practical challenges. IEEE Commun. Mag. 2017, 55, 176–183. [Google Scholar] [CrossRef] [Green Version]
  9. Casini, E.; De Gaudenzi, R.; del Rio Herrero, O. Contention resolution diversity slotted ALOHA (CRDSA): An enhanced random access scheme for satellite access packet networks. IEEE Trans. Wirel. Commun. 2007, 6, 1408–1419. [Google Scholar] [CrossRef]
  10. Liva, G. Graph-based analysis and optimization of contention resolution diversity slotted ALOHA. IEEE Trans. Commun. 2011, 59, 477–487. [Google Scholar] [CrossRef]
  11. Toni, L.; Frossard, P. Prioritized random MAC optimization via graph-based analysis. IEEE Trans. Commun. 2015, 63, 5002–5013. [Google Scholar] [CrossRef] [Green Version]
  12. Fei, C.; Jiang, B.; Xu, K.; Wang, L.; Zhao, B. An intelligent load control-based random access scheme for space-based Internet of Things. Sensors 2021, 21, 1040. [Google Scholar] [CrossRef] [PubMed]
  13. Paolini, E.; Liva, G.; Chiani, M. Coded slotted ALOHA: A graph-based method for uncoordinated multiple access. IEEE Trans. Inf. Theory 2015, 61, 6815–6832. [Google Scholar] [CrossRef] [Green Version]
  14. Sec. Gener. DVB Interact. Satellite Syst. (DVB-RCS2): Lower Layers for Satellite Std, ETSI EN 301 545-2 V1.2.1. 2014. Available online: https://www.etsi.org/deliver/etsi_en/301500_301r599/30154502/01.02.01_60/en_30154502v010201p.pdf (accessed on 17 June 2021).
  15. Choi, J. NOMA-based random access with multichannel ALOHA. IEEE J. Sel. Areas Commun. 2017, 35, 2736–2743. [Google Scholar] [CrossRef] [Green Version]
  16. Clazzer, F.; Munari, A.; Liva, G.; Lazaro, F.; Stefanovic, C.; Popovski, P. From 5G to 6G: Has the time for modern random access come? arXiv 2019, arXiv:1903.03063. [Google Scholar]
  17. Alvi, S.; Durrani, S.; Zhou, X. Enhancing CRDSA with transmit power diversity for machine-type communication. IEEE Trans. Veh. Technol. 2018, 8, 7790–7794. [Google Scholar] [CrossRef]
  18. Shao, X.; Sun, Z.; Yang, M.; Gu, S.; Guo, Q. NOMA-based irregular repetition slotted ALOHA for satellite networks. IEEE Commun. Lett. 2019, 23, 624–627. [Google Scholar] [CrossRef]
  19. Corrado, R.; Comisso, M.; Babich, F. On the impact of the video quality assessment in 802.11e ad-hoc networks using adaptive retransmissions. In Proceedings of the 2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET), Piran, Slovenia, 2–4 June 2014; pp. 47–54. [Google Scholar] [CrossRef]
  20. Amezcua Valdovinos, I.; Figueroa Milla´n, P.E.; Pe´rez-Di´az, J.A.; Vargas-Rosales, C. Distributed channel ranking scheduling function for dense industrial 6TiSCH networks. Sensors 2021, 21, 1593. [Google Scholar] [CrossRef] [PubMed]
  21. Babich, F.; Comisso, M. Multi-packet communication in heterogeneous wireless networks adopting spatial reuse: Capture analysis. IEEE Trans. Wirel. Commun. 2013, 12, 5346–5359. [Google Scholar] [CrossRef]
  22. Zanella, A.; Zorzi, M. Theoretical analysis of the capture probability in wireless systems with multiple packet reception capabilities. IEEE Trans. Commun. 2012, 60, 1058–1071. [Google Scholar] [CrossRef]
  23. Buttazzoni, G.; Babich, F.; Vatta, F.; Comisso, M. Geometrical synthesis of sparse antenna arrays using compressive sensing for 5G IoT applications. Sensors 2020, 20, 350. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  24. Amer, A.; Ahmad, A.-M.; Hoteit, S. Resource allocation for downlink full-duplex cooperative NOMA-based cellular system with imperfect SI cancellation and underlaying D2D communications. Sensors 2021, 21, 2768. [Google Scholar] [CrossRef]
  25. Comisso, M.; Palese, G.; Babich, F.; Vatta, F.; Buttazzoni, G. 3D multi-beam and null synthesis by phase-only control for 5G antenna arrays. Electronics 2019, 8, 656. [Google Scholar] [CrossRef] [Green Version]
  26. Islam, S.M.R.; Avazov, N.; Dobre, O.A.; Kwak, K. Power-domain non-orthogonal multiple access (NOMA) in 5G systems: Potentials and challenges. IEEE Commun. Surv. Tut. 2017, 19, 721–742. [Google Scholar] [CrossRef] [Green Version]
  27. Babich, F.; Buttazzoni, G.; Vatta, F.; Comisso, M. Energy-constrained uncoordinated multiple access for next-generation networks. IEEE Open J. Commun. Soc. 2020, 1, 1808–1819. [Google Scholar] [CrossRef]
  28. Fanti, A.; Schirru, L.; Casu, S.; Lodi, M.B.; Riccio, G.; Mazzarella, G. Improvement and testing of models for field level evaluation in urban environment. IEEE Trans. Antennas Propag. 2020, 68, 4038–4047. [Google Scholar] [CrossRef]
  29. El-Saleh, A.A.; Shami, T.M.; Nordin, R.; Alias, M.Y.; Shayea, I. Multi-objective optimization of joint power and admission control in cognitive radio networks using enhanced swarm intelligence. Electronics 2021, 10, 189. [Google Scholar] [CrossRef]
  30. Babich, F.; Soranzo, A.; Vatta, F. Useful mathematical tools for capacity approaching codes design. IEEE Commun. Lett. 2017, 21, 1949–1952. [Google Scholar] [CrossRef]
Figure 1. Protocol operation example.
Figure 1. Protocol operation example.
Sensors 21 04194 g001
Figure 2. Performance as a function of the channel load for NOMA/IRSA-3 with K = 100 , L = 3 , and R = 1 information bits per symbol: (a) throughput, (b) success probability.
Figure 2. Performance as a function of the channel load for NOMA/IRSA-3 with K = 100 , L = 3 , and R = 1 information bits per symbol: (a) throughput, (b) success probability.
Sensors 21 04194 g002
Figure 3. Performance as a function of the channel load for NOMA/IRSA-8 with K = 100 , L = 3 , and R = 1 information bits per symbol: (a) throughput, (b) success probability.
Figure 3. Performance as a function of the channel load for NOMA/IRSA-8 with K = 100 , L = 3 , and R = 1 information bits per symbol: (a) throughput, (b) success probability.
Sensors 21 04194 g003
Figure 4. Throughput and success probability as a function of the channel load for K = 1000 , L = 3 , and R = 1 information bits per symbol: (a) NOMA/IRSA-3, (b) NOMA/IRSA-8.
Figure 4. Throughput and success probability as a function of the channel load for K = 1000 , L = 3 , and R = 1 information bits per symbol: (a) NOMA/IRSA-3, (b) NOMA/IRSA-8.
Sensors 21 04194 g004
Figure 5. Throughput and success probability as a function of the channel load for K = 1000 , L = 2 , and R = 1 information bits per symbol: (a) NOMA/CRDSA, (b) NOMA/IRSA-3.
Figure 5. Throughput and success probability as a function of the channel load for K = 1000 , L = 2 , and R = 1 information bits per symbol: (a) NOMA/CRDSA, (b) NOMA/IRSA-3.
Sensors 21 04194 g005
Figure 6. Throughput as a function of the available average SNR for ϵ = 0.025 : (a) Shannon bound, (b) QPSK modulation.
Figure 6. Throughput as a function of the available average SNR for ϵ = 0.025 : (a) Shannon bound, (b) QPSK modulation.
Sensors 21 04194 g006
Figure 7. Maximum throughput as a function of the available average SNR for ϵ = 0.025 : (a) Shannon bound, (b) QPSK modulation.
Figure 7. Maximum throughput as a function of the available average SNR for ϵ = 0.025 : (a) Shannon bound, (b) QPSK modulation.
Sensors 21 04194 g007
Figure 8. Throughput as a function of the available average SNR for ϵ = 0.025 and a discrete set of code rates adopting the QPSK modulation: (a) single code rate, (b) double code rate.
Figure 8. Throughput as a function of the available average SNR for ϵ = 0.025 and a discrete set of code rates adopting the QPSK modulation: (a) single code rate, (b) double code rate.
Sensors 21 04194 g008
Figure 9. Throughput as a function of the available average SNR for different ϵ values assuming the QPSK modulation and a discrete set of code rates.
Figure 9. Throughput as a function of the available average SNR for different ϵ values assuming the QPSK modulation and a discrete set of code rates.
Sensors 21 04194 g009
Table 1. PDF of the number M of replicas as a function of the number L of energy levels for the considered NOMA/IRSA schemes.
Table 1. PDF of the number M of replicas as a function of the number L of energy levels for the considered NOMA/IRSA schemes.
LNOMA/IRSA-3NOMA/IRSA-8
M M
232348
10.1790.8210.51120.2660 0.2228
20.4080.5920.66070.1605 0.1788
30.5190.4810.74390.09060.01560.1499
40.5810.4190.79470.0470 0.1583
50.6180.3820.8370 0.1630
Table 2. Limiting throughput G max and required SNR E av / N 0 as a function of the number L of energy levels in ideal conditions for R = 1 information bits/symbol and assuming the Shannon bound.
Table 2. Limiting throughput G max and required SNR E av / N 0 as a function of the number L of energy levels in ideal conditions for R = 1 information bits/symbol and assuming the Shannon bound.
LCRDSANOMA/IRSA-3NOMA/IRSA-8
G max E av / N 0 [dB] G max E av / N 0 [dB] G max E av / N 0 [dB]
10.553.010.824.500.945.57
21.004.771.295.901.436.86
31.466.691.697.631.868.48
41.868.752.079.582.2710.51
52.2310.932.4311.692.6612.66
Table 3. Relationship between energy requirement and sustainable rate for different scenarios.
Table 3. Relationship between energy requirement and sustainable rate for different scenarios.
L ϵ N 1 N 2 ( E av / N 0 ) min [dB] α max R max [Information Bits/Symbol]
NOMA/CRDSANOMA/IRSA-3ShannonQPSK
10.05403.985.475.002.581.90
2 217.488.601.681.421.32
3 1113.0614.001.151.101.06
10.025403.474.9610.003.461.99
2 215.927.052.591.841.61
3 118.829.751.611.381.29
4 1013.5214.341.191.131.09
10.01403.194.6825.004.702.00
2 215.206.324.402.431.86
3 117.428.362.431.781.57
4 1010.1010.931.711.441.34
5 1014.6815.441.221.151.10
Table 4. Discrete code rate/energy level designs for the NOMA/IRSA-3 scheme with ϵ = 0.025 .
Table 4. Discrete code rate/energy level designs for the NOMA/IRSA-3 scheme with ϵ = 0.025 .
L r 1 r 2 r 3 r 4 R [Information Bits/Symbol] G max S E av / N 0 [dB]
11/2 1.000.820.825.18
21/21/2 1.001.291.297.39
22/31/2 1.171.291.509.57
31/21/21/2 1.001.691.6910.34
22/32/3 1.331.291.7212.26
32/31/21/2 1.111.691.8813.06
41/21/21/21/21.002.072.0715.81
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Babich, F.; Buttazzoni, G.; Vatta, F.; Comisso, M. Energy-Constrained Design of Joint NOMA-Diversity Schemes with Imperfect Interference Cancellation. Sensors 2021, 21, 4194. https://doi.org/10.3390/s21124194

AMA Style

Babich F, Buttazzoni G, Vatta F, Comisso M. Energy-Constrained Design of Joint NOMA-Diversity Schemes with Imperfect Interference Cancellation. Sensors. 2021; 21(12):4194. https://doi.org/10.3390/s21124194

Chicago/Turabian Style

Babich, Fulvio, Giulia Buttazzoni, Francesca Vatta, and Massimiliano Comisso. 2021. "Energy-Constrained Design of Joint NOMA-Diversity Schemes with Imperfect Interference Cancellation" Sensors 21, no. 12: 4194. https://doi.org/10.3390/s21124194

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop