Next Article in Journal
Stress Estimation Using Biometric and Activity Indicators to Improve QoL of the Elderly
Previous Article in Journal
MALS-Net: A Multi-Head Attention-Based LSTM Sequence-to-Sequence Network for Socio-Temporal Interaction Modelling and Trajectory Prediction
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Analysis of Multihop Full-Duplex NOMA Systems with Imperfect Interference Cancellation and Near-Field Path-Loss

1
Communication and Signal Processing Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City 756000, Vietnam
2
Faculty of Automotive Engineering, School of Engineering and Technology, Van Lang University, Ho Chi Minh City 710000, Vietnam
3
Faculty of Electrical Engineering and Computer Science, VSB—Technical University of Ostrava, 70800 Ostrava, Czech Republic
4
Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City 756000, Vietnam
5
Posts and Telecommunications Institute of Technology, Ho Chi Minh City 710000, Vietnam
6
Science and Technology Application for Sustainable Development Research Group, Ho Chi Minh University of Transport, Ho Chi Minh City 717000, Vietnam
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(1), 524; https://doi.org/10.3390/s23010524
Submission received: 25 November 2022 / Revised: 22 December 2022 / Accepted: 27 December 2022 / Published: 3 January 2023
(This article belongs to the Section Communications)

Abstract

:
Outage probability (OP) and potential throughput (PT) of multihop full-duplex (FD) nonorthogonal multiple access (NOMA) systems are addressed in the present paper. More precisely, two metrics are derived in the closed-form expressions under the impact of both imperfect successive interference cancellation (SIC) and imperfect self-interference cancellation. Moreover, to model short transmission distance from the transmit and receive antennae at relays, the near-field path-loss is taken into consideration. Additionally, the impact of the total transmit power on the performance of these metrics is rigorously derived. Furthermore, the mathematical framework of the baseline systems is provided too. Computer-based simulations via the Monte Carlo method are given to verify the accuracy of the proposed framework, confirm our findings, and highlight the benefits of the proposed systems compared with the baseline one.

1. Introduction

Non-orthogonal multiple access (NOMA) along with other advanced technologies such as deep learning [1,2,3], reconfigurable intelligent surfaces (RISs) [4,5,6,7], and tools from stochastic geometry (SG) [8,9,10,11] have been considered key-driven technologies for cellular networks beyond 5G, i.e., 5G-Advanced. More precisely, by allowing simultaneous transmit multiple signals within the same resource blocks (frequency and time) via different power levels and/or codes, NOMA can significantly enhance the spectral efficiency (SE) of the networks [12,13]. Additionally, NOMA can effortlessly combine with other techniques to further enhance system performance. One of the favorite combinations is to deploy full-duplex (FD) communications [14,15]. In fact, by concurrently transmitting and receiving signals, FD communications, theoretically, doubly improve spectral efficiency [16]. Although both FD and NOMA greatly facilitate the SE of the wireless networks, they suffer from the low signal-to-interference-plus-noise ratio (SINR) owing to strong self-interference [17,18]. Hence, to truly attain benefits from both NOMA and FD, ameliorating the SINR is mandatory, one of the promising solutions is to utilize multihop communications that improve the SINR by shortening the transmission distance [19,20]. Particularly, if the transmission distance is compressed, the intended signals are improved while the self-interference does not remarkably change thus scaling up the SINR. As a consequence, the present paper investigates the performance of the multihop NOMA systems with the help of FD relaying.
The performance of multihop, FD, and NOMA systems was studied widely in [21,22,23,24,25,26,27]. Xu and others proposed three solutions, namely, stochastic algorithm, two-stage greedy randomized adaptive search, and two-stage stochastic sample to maximize sum-rate by jointly optimizing the channel and power allocation [21]. The outage probability (OP) and ergodic capacity of the NOMA systems combined with full-duplex relaying were derived in [22]. It, however, does not take into account the imperfect successive interference cancellation (SIC) as well as the impact of the near-field path-loss in full-duplex relaying. The closed-form expression of the coverage probability (Pcov) of multiple-input multiple-output (MIMO) cellular networks was given in [23]. Authors in [24] studied the NOMA-enabled unmanned aerial vehicle (UAV) systems under the impact of hardware impairment. More precisely, they derive the OP in the effective computation form. However, they do not consider full-duplex relaying as well as multihop communications that significantly enhance the system spectral efficiency. The combination of NOMA and FD relaying was derived in [26]. To be more specific, the authors derived the OP of the considered networks. They, however, employ the dual-hop relaying and amplify-and-forward (AF) protocol at relay while in the present work, multihop and decode-and-forward (DF) protocol is used. Mujtaba and others in [27] provided a comprehensive discussion about the cooperative power-based NOMA systems in both AF and DF protocols.
The works in [28,29,30,31,32] studied the performance of the full-duplex relaying. In particular, Tan and other authors in [28] addressed the OP and SE of the full-duplex relaying under two relay selection schemes, namely, partial relay selection (PRS) and full relay selection (FRS). The results unveil that the symbol error rate (SER) of the FRS scheme dramatically facilitates. Nevertheless, they do not apply the near-field path-loss that is much more important in FD-enabled communications. The two-way half-duplex relaying with the direct link was studied in [29]. A tractable closed-form expression of the Pcov in Poisson cellular networks was given in [30]. Their outcomes illustrate that the Pcov based on signal-to-interference-plus-noise ratio can be accurately approximated by the proposed definition which is a joint probability of signal-to-interference ratio (SIR) and signal-to-noise ratio (SNR). The statistics of 5G massive MIMO exposure were conducted in [31]. The combination of FD with simultaneous wireless information and power transfer (SWIPT) in wireless sensor networks (WSNs) was investigated in [32]. They, nonetheless, do not use NOMA technique to boost up the SE. The combination of FD relaying SWIPT was studied in [33] over nonidentical Rayleigh fading. They, again, do not apply either NOMA or multihop communications.
The performance of multihop communications was studied extensively in [33,34,35,36,37,38,39]. Alnawafa and other authors in [34] proposed a novel routing algorithm that dramatically improves the lifespan, stability, and throughput of the networks compared with the state-of-the-art. Meanwhile, Thanh and others in [35] derived closed-form expressions many ergodic capacities of the multihop DF systems. On the other hand, the secrecy performance of multihop transmission in cluster networks was addressed in [36]. However, they simply considered multihop networks not combining with other advanced techniques such as NOMA and/or full-duplex relaying. Authors in [37] also investigated the secrecy performance of nonlinear SWIPT systems. They, nonetheless, focus on minimizing the total transmission in downlink and uplink power consumption instead of deriving the OP and system throughput. The Pcov performance of SWIPT-enabled cellular networks was derived in [38]. Unfortunately, they do not consider the near-field path-loss and concentrate on the throughput of the networks. Tin and others in [39] investigated the transmit antenna selection (TAS) and selection combining (SC) of multihop transmission in cognitive WSNs under the impact of hardware impairment.
These above-mentioned works either study each technique separately or combine two techniques instead of considering all three technologies. More importantly, they do not take into account the impact of imperfect SIC which is more important and align with the practical employment of NOMA technique. Regarding the FD relaying, they all skip the influences of near-field path-loss which is not true in FD relaying. As a consequence, different from the above-mentioned works, the present paper, investigates the performance of the combination of these techniques suffering from the imperfection of SIC and self-interference at the relay. More precisely, the main contributions and novelties of the present manuscript are given as follows:
  • We take into account the impact of the imperfect interference cancellation (IC) at all receivers. We consider the near-field path-loss at relays to better capture the short transmission distance from the transmit and receive antennae at the relay.
  • We take into account the interhop interference and self-interference at all relays due to the full-duplex protocol. It, as a consequence, makes the mathematical framework more complicated compared with half-duplex relaying where the orthogonal transmission between hops is employed.
  • We derive closed-form expressions of the OP and potential throughput (PT) of the considered systems.
  • We unveil the impact of the total transmit power on the performance of both OP and PT by employing rigorously mathematical frameworks instead of numerical computations.
  • We provide remarks to highlight the influence of elements in the OP framework.
  • We also derive the mathematical framework of the baseline system to highlight the advantage of the proposed system.
  • We supply numerical results via the Monte Carlo method to verify the accuracy of the derived mathematical framework.
The remainder of this paper is organized as follows: The system model is given in Section 2. The derivation of key performance metrics, e.g., the OP, and the PT, is provided in Section 3. Numerical results are presented in Section 4. Section 5 concludes the paper.

2. System Model

Let us consider a multi-hop NOMA system comprising of a source node denoted by ( S 0 ) , M relay nodes denoted by ( R m ) , m 1 , , M , and 2 destinations denoted by D 1 and D 2 , as shown in Figure 1. We assume that the source and destinations are equipped with a single antenna while all relay nodes are equipped with two antennae (The considered networks can be applied in several IoT networks, such as Industrial IoT networks [40] and Healthcare IoT systems [41], etc.). As a result, all relays are operated in the full-duplex mode while others are operated in the half-duplex mode. Additionally, thanks to the FD communications, the whole transmission solely takes place in one time slot. Relays employ decode-and-forward protocol instead of amplify-and-forward thanks to its higher performance [42].

2.1. Channel Modelling

In the present work, all transmissions are subjected to both small-scale fading and path-loss.

2.1.1. Small-Scale fading

Let us denote h u , v as the channel coefficient from node u ( S 0 ) , ( R 1 ) , , ( R M ) to node v ( R 1 ) , , ( R M ) , D 1 , D 2 and is followed by a complex Gaussian distribution with zero mean and ω u , v variance. In the present work, the pilot-based channel estimation is employed to estimate the channel state information (CSI). Particularly, for each hop, a predefined pilot sequence is periodically sent by the transmitter to the receiver to estimate the CSI. The receiver is then sent back this information to the transmitter via a high-accuracy feedback channel. By using this channel estimation method, the multihop communications is decoupled into several conventional single-hop communications [43]. Moreover, we consider the block flat fading that the channel coefficient remains constant for the whole time slot and changes independently between time slots. As a result, the CSI at the transmitters is assumed to be perfect.

2.1.2. Path-Loss

In the present paper, we take into account both near-field and far-field path-loss rather than solely far-field path-loss like works in the literature. The rationale behind such an application is that in FD relaying, the transmission distance between the transmit and receive antennae is probably smaller than the Rayleigh distance (RD), thus the received power at the receive antenna is dominated by the near-field propagation.

Far-Field Path-Loss

The far-field path-loss between node u ( S 0 ) , ( R 1 ) , , ( R M ) and node
v ( R 1 ) , , ( R M ) , D 1 , D 2 denoted by ς u , v F is formulated as follows [44,45]
ς u , v F = 4 G T G R K 0 2 d u , v η ,
where K 0 = 2 π λ and λ = c f c are the wave number and wavelength, f c (in [Hz]) is the carrier frequency, and c = 3 × 10 8 [m/s] is the speed of light, G T , G R are the transmit and receive antenna gain, and η is the path-loss exponent. The main notations and mathematical symbols used in the paper is provided in Table 1.

Near-Field Path-Loss

Considering the self-interference channel at the relay, it is obvious that both transmit and receive antennae colocate at the same hardware. As a result, the near-field path-loss is necessary to accurately model the propagation of the electromagnetic wave. In fact, in near-field communications, the behavior of the electric and magnetic fields is dissimilar, thus it requires different link equations for each type of antenna. For the electric antenna such as a dipole, the near-field path-loss is formulated as follows [46]:
ς m N = 4 G T G R 1 K 0 2 d m 2 1 K 0 4 d m 4 + 1 K 0 6 d m 6 1 .
The transition from near-field to far-field path-loss is identified via the Rayleigh distance which is given below [47].
d R D = 2 L 2 λ ,
where L is the maximum size of the receiving antenna. Particularly, if d m > d R D , (1) is employed to compute the path-loss, otherwise, (2) is used.

2.2. Signal-to-Interference-Plus-Noise Ratios (SINRs)

The received signals at the ( R m ) th relay node with m 1 , , M are formulated as follows:
y ( R m ) = h m 1 , m ς m 1 , m F 1 / 2 α 1 P m 1 x 1 + α 2 P m 1 x 2 + P m h m , m r m ς m N 1 / 2 + t = 0 m 2 h t , m ς t , m F 1 / 2 α 1 P t x ˜ 1 , t + α 2 P t x ˜ 2 , t + z = m + 1 M 1 h z , m ς z , m F 1 / 2 α 1 P z x ˜ ˜ 1 , z + α 2 P z x ˜ ˜ 2 , z + n m ,
where n m is the additive white Gaussian noise (AWGN) at the ( R m ) th relay; α 1 and α 2 with α 1 + α 2 = 1 , α 2 > α 1 , are the coefficients of power allocated for D 1 and D 2 , respectively. P m is the transmit power of the ( R m ) th relay and P 0 is the transmit power of source node. Here, we consider the equal power allocation, thus, P m = P 0 = P = P tot / ( M + 1 ) , m ; P tot is the total transmit power of the whole network. x a , a 1 , 2 , is the signal of interest of D 1 and D 2 transmitted by the ( R m 1 ) th relay or source nodes; x ˜ ˜ a , z is the transmitted signals for D a from node ( R z ) to node ( R M ) ; and x ˜ a , t is the novel signals for D 1 and D 2 from predecessor nodes, i.e., ( S 0 ) ( R m 1 ) . We assume that E x a 2 = E x ˜ a , t 2 = E x ˜ ˜ a , z 2 = 1 , z , a , t . r m is the residual signals for D a , a 1 , 2 , at the ( R m ) th relay after both active and passive cancellation (Passive cancellation can be done by appropriately placing the transmit and receive antenna, i.e., at the two sides of the devices while active cancellation can be employed by using analog and digital SIC circuits [18]) and E r m 2 = τ m = τ , m .

2.2.1. Perfect Interference Cancellation (PIC)

In this section, we consider the scenario where the successive interference cancellation at relays and destinations is perfect. Additionally, the interference from the successor relays to its processors is canceled out too. The rationale behind this assumption is that since node ( R m ) has successfully decoded x 1 and x 2 thus it is able to subtract the interference signals from its processors. Hence, the received signals in (4) are then reformulated as follows:
y R m P = h m 1 , m ς m 1 , m F 1 / 2 α 1 P m 1 x 1 + α 2 P m 1 x 2 + P m h m , m r m ς m N 1 / 2 + t = 0 m 2 h t , m ς t , m F 1 / 2 α 1 P t x ˜ 1 , t + α 2 P t x ˜ 2 , t + n m .
The instantaneous SINR at the ( m ) th relay to decode x a denoted by γ ( R m ) x a , P , a 1 , 2 , is then given as
γ ( R m ) x 1 , P = α 1 h m 1 , m 2 Φ m 1 ς m 1 , m F α 2 h m 1 , m 2 Φ m 1 ς m 1 , m F + τ m Φ m ς m N h m , m 2 + t = 0 m 2 h t , m 2 Φ t ς t , m F + 1 γ ( R m ) x 2 , P = α 2 h m 1 , m 2 Φ m 1 ς m 1 , m F τ m Φ m ς m N h m , m 2 + t = 0 m 2 h t , m 2 Φ t ς t , m F + 1 ,
where Φ m = P m / σ m 2 = Φ = P / σ 2 , m , is the average transmit-power-to-noise-ratio; σ 2 is the noise variance of AWGN and is given as σ m 2 = σ 2 = 174 + NF + 10 log Bw , m ; where NF [in dB] is the noise figure; and Bw [in Hz] is the transmission bandwidth. On the other hand, the received signals at node D a , a 1 , 2 , is computed as:
y D a P = h M , D a ς M , D a F 1 / 2 α 1 P M x 1 + α 2 P M x 2 + t = 0 M 1 ς t , D a F 1 / 2 h t , D a α 1 P t x ˜ 1 + α 2 P t x ˜ 2 + n D a ,
where h M , D a is the channel coefficient from node ( R M ) to the ath destination. The instantaneous SINR at D 1 and D 2 to detect x 1 and x 2 , is then computed as
γ D 1 x 1 , P = α 1 Φ M ς M , D 1 F h M , D 1 2 α 2 Φ M ς M , D 1 F h M , D 1 2 + t = 0 M 1 Φ t ς t , D 1 F h t , D 1 2 + 1 , γ D 2 x 2 , P = α 2 Φ M ς M , D 2 F h M , D 2 2 t = 0 M 1 Φ t ς t , D 2 F h t , D 2 2 + 1 .
In the present work, we adopt the decode-and-forward protocol [15], the end-to-end (e2e) SINR to decode x a denoted by γ e 2 e a , P , a 1 , 2 , is then given as follows:
γ e 2 e 1 , P = min min m = 1 , 2 , , M α 1 h m 1 , m 2 Φ m 1 ς m 1 , m F α 2 h m 1 , m 2 Φ m 1 ς m 1 , m F + τ m Φ m ς m N h m , m 2 + t = 0 m 2 h t , m 2 Φ t ς t , m F + 1 , α 1 Φ M ς M , D 1 F h M , D 1 2 α 2 Φ M ς M , D 1 F h M , D 1 2 + t = 0 M 1 Φ t ς t , D 1 F h t , D 1 2 + 1 , γ e 2 e 2 , P = min min m = 1 , 2 , , M α 2 h m 1 , m 2 Φ m 1 ς m 1 , m F τ m Φ m ς m N h m , m 2 + t = 0 m 2 h t , m 2 Φ t ς t , m F + 1 , α 2 Φ M ς M , D 2 F h M , D 2 2 t = 0 M 1 Φ t ς t , D 2 F h t , D 2 2 + 1 .

2.2.2. Imperfect Interference Cancellation (IIC)

Under the imperfect interference cancellation (IIC) scheme, all the assumptions made in Section 2.2.1 are abolished. Particularly, the imperfect SIC is applied at both relays and destinations and the interference from successor relays is taken into consideration too. Hence, from (4), the SINRs at ( R m ) -th relay under the IIC scheme is rewritten as follows:
γ ( R m ) x 1 , I = α 1 h m 1 , m 2 Φ m 1 ς m 1 , m F α 2 h m 1 , m 2 Φ m 1 ς m 1 , m F + τ m Φ m ς m N h m , m 2 + t = 0 , t m 1 , m M 1 h t , m 2 Φ t ς t , m F + 1 γ ( R m ) x 2 , I = α 2 h m 1 , m 2 Φ m 1 ς m 1 , m F ϵ m α 1 h m 1 , m 2 Φ m 1 ς m 1 , m F + τ m Φ m ς m N h m , m 2 + t = 0 , t m 1 , m M 1 h t , m 2 Φ t ς t , m F + 1 ,
where ϵ m 0 , 1 , m is the residue of the imperfect SIC. If ϵ m = 0 then we return to the perfect cancellation case. Direct inspection (10) and (6), it is certain that the SINR of IIC is consistently smaller than the PIC, i.e., γ ( m ) x a , I γ ( m ) x a , P . Although y D 1 is the same for both PIC and IIC schemes, y D 2 is not convergent. More precisely, the SINR at D a to detect the x a signals under imperfect IC is written as
γ D 1 x 1 , I = α 1 Φ M ς M , D 1 F h M , D 1 2 α 2 Φ M ς M , D 1 F h M , D 1 2 + t = 0 M 1 Φ t ς t , D 1 F h t , D 1 2 + 1 , γ D 2 x 2 , I = α 2 Φ M ς M , D 2 F h M , D 2 2 ϵ D 2 α 1 Φ M ς M , D 1 F h M , D 1 2 + t = 0 M 1 Φ t ς t , D 2 F h t , D 2 2 + 1 .
Finally the e2e SINRs to decode x a under the IIC scheme is given as
γ e 2 e 1 , I = min min m = 1 , 2 , , M α 1 h m 1 , m 2 Φ m 1 ς m 1 , m F α 2 h m 1 , m 2 Φ m 1 ς m 1 , m F + τ m Φ m ς m N h m , m 2 + t = 0 , t m 1 , m M 1 h t , m 2 Φ t ς t , m F + 1 , α 1 Φ M ς M , D 1 F h M , D 1 2 α 2 Φ M ς M , D 1 F h M , D 1 2 + t = 0 M 1 Φ t ς t , D 1 F h t , D 1 2 + 1 , γ e 2 e 2 , I = min min m = 1 , 2 , , M α 2 h m 1 , m 2 Φ m 1 ς m 1 , m F ϵ m α 1 h m 1 , m 2 Φ m 1 ς m 1 , m F + τ m Φ m ς m N h m , m 2 + t = 0 , t m 1 , m M 1 h t , m 2 Φ t ς t , m F + 1 , α 2 Φ M ς M , D 2 F h M , D 2 2 ϵ D 2 α 1 Φ M ς M , D 1 F h M , D 1 2 + t = 0 M 1 Φ t ς t , D 2 F h t , D 2 2 + 1 .

3. Performance Analysis and Trends

In the present work, we address the performance of two vital metrics, namely, the outage probability and the potential throughput. The former calculates the probability that the instantaneous e2e SINR of both destinations is below the predefined threshold, the latter, on the other hand, computes the potential throughput of the whole network. Mathematical speaking, these metrics can be formulated as follows [48]:
OP a w = Pr log 2 1 + γ e 2 e a , w R a , w P , I PT = a = 1 2 log 2 1 + R a 1 O P a .
Here, Pr . is the probability operator, log . is the logarithm function, and R a is the expected rate of the ath destination. To compute the OP and PT, the following Theorem is useful and is given as follows:
Theorem 1.
Considering a set of N independently and non-identically distributed (i.n.i.d.) exponential random variables (RVs) with scale δ n , i.e., X n , n 1 , , N , the moment generating function (MGF) of summation of these RVs, i.e., S = n = 1 N X n denoted by M S s are then given by [49]
M S s = i = 1 N 1 1 + s δ i .
Proof. 
The proof is given in Appendix A. □
Having obtained the MGF of the sum of M i.n.i.d. exponential RVs, the OP of D a , a 1 , 2 under both PIC and IIC schemes are given in Theorems 2 and 3 as follows:
Theorem 2.
Let us represent the e2e SINR to decode x 1 and x 2 under the PIC scheme as γ e 2 e 1 , P = min i 1 , , M , D 1 W i = a i X i b i X i + t = 1 N i c t , i Y t , i + d i and γ e 2 e 2 , P = min i 1 , , M , D 2 Z i = a i X i t = 1 N i c t , i Y t , i + d i , where a i , b i , c t , i , d i are real numbers, N i is a positive integer, X i and Y t , i are independently exponential RVs with distinct parameters, and W i , Z i , i are independent of each other. The OP of the ath destination denoted by OP a P , a 1 , 2 , is represented in an unified expression and is given by
OP a P = 1 H ( Δ a ) exp λ a ς M , D a F Φ ω M , D a l = 1 M 1 + λ a ς M , D a F ω l 1 , D a ς l 1 , D a F ω M , D a 1 z = 1 M exp f a z × i = 1 M 1 + τ i ω i , i Φ ς i N 1 m = 2 M o = 2 m 1 + f a m Φ ς o 2 , m F ω o 2 , m 1 ,
where λ a = γ th a Δ a , Δ 1 = α 1 α 2 γ th 1 and Δ 2 = α 2 , f a x = λ a ς x 1 , x F Φ x 1 ω x 1 , x , γ th a = 2 R a 1 , exp . is the exponential function and H . is the Heaviside function.
Proof. 
The proof is available at Appendix B. □
Remark 1.
Direct inspection (15) we observe that the impact of the interference at D a and relays on OP are given by the terms l = 1 M 1 + λ a ς M , D a F ω l 1 , D a ς l 1 , D a F ω M , D a 1 and m = 2 M o = 2 m 1 + f a m Φ ς o 2 , m F ω o 2 , m 1 while the influence of the self-interference at relays is given by i = 1 M 1 + τ i ω i , i Φ ς i N 1 .
Theorem 3.
Let us represent the e2e SINR to decode x a , a 1 , 2 , under the IIC scheme as γ e 2 e a , P = min i 1 , , M , D a U i = a i X i b i X i + t = 1 N i c t , i Y t , i + d i where a i , b i , c t , i , d i are real numbers, N i is a positive integer, X i and Y t , i are independently exponential RVs with distinct parameters, and U i , i are independent of each other. The OP of the ath destination denoted by OP a I , a 1 , 2 , is given by
OP 1 I = 1 H ( Δ 1 ) exp λ 1 ς M , D 1 F Φ ω M , D 1 m = 2 M 1 exp f 1 m 1 + f 1 m τ m ω m , m Φ m ς m N 1 × z = 0 , z m 1 , m M 1 1 + f 1 m Φ ς z , m F ω z , m 1 l = 1 M 1 + λ 1 ς M , D 1 F ω l 1 , D 1 ς l 1 , D 1 F ω M , D 1 1 OP 2 I = 1 H Δ 2 H ( Δ 3 ) exp λ 2 ς M , D 2 F Φ ω M , D 2 m = 1 M exp f 3 m 1 + f 3 m τ m ω m , m Φ m ς m N 1 × z = 0 , z m 1 , m M 1 + f 3 m Φ ς z , m F ω z , m 1 l = 1 M 1 + λ 2 ς M , D 2 F ω l 1 , D 2 ς l 1 , D 2 F ω M , D 2 1 × 1 + λ 2 ϵ D 2 α 1 ς M , D 2 F ω M , D 1 ς M , D 1 F ω M , D 2 1 ,
where Δ 3 = α 2 ϵ α 1 γ th 2 , υ = γ th 2 Δ 3 and f 3 x = υ ς x 1 , x F Φ x 1 ω x 1 , x .
Proof. 
The proof is available at Appendix C. □
The potential throughput of the whole networks is then straightforwardly computed by substituting OP a w , w P , I , a 1 , 2 , in (15), (16) into (13).

3.1. Performance Trends

The behaviors of the considered metrics with respect to a key parameter are revealed in this section. Particularly, the impact of P tot on the performance of OP and PT is given in the following Proposition.
Proposition 1.
The OP monotonically decreases with respect to the total transmit power while the PT simply increases with this parameter.
Proof. 
The proof is available at Appendix D. □

3.2. Performance of Baseline System

In this section, we provide the closed-form expression of the single-hop communications from ( S 0 ) to D 1 and D 2 without the assistance of relays. The OP of D a under the baseline system denoted by OP a bas is then computed as follows:
OP a bas = 1 exp σ 2 λ a P tot ς 0 , D a F .
To ensure a fair comparison, the transmit power of the source node is fully allocated and is equal to P tot .

4. Simulation Results

In this section, we provide numerical results to verify the accuracy of the proposed mathematical framework as well as to unveil the behaviors of the considered metrics as a function of some key parameters. Unless otherwise stated, the following parameters are adopted which are based on the narrowband IoT (NB-IoT) networks: M = 3 , Bw = 500 kHz, η = 3.75 , f c = 2.1 GHz, NF = 6 dB, P tot = 30 dBm, R 1 = R 2 = R = 0.075 [bits/s/Hz]; α 1 = 0.6 ; α 2 = 1 α 1 = 0.4 , G T = G R = 0 dB, ϵ = 0.01 , d R , R = 0.5 [m], L = 0.3 [m], ω = 1, and τ = −100 dB. The position of source node is at ( 0 , 0 ) [m], the positions of D 1 and D 2 are ( 1200 , 20 ) and ( 1200 , 20 ) , respectively. We assume that all relay nodes are located on a straight line and equally separated, their locations are then given as ( 300 , 0 ) , ( 600 , 0 ) , and ( 900 , 0 ) .
Figure 2 and Figure 3 illustrates the performance of the OP and PT with respect to the expected rate R 1 = R 2 = R . We observe that there is a good agreement between the derived mathematical framework and the Monte Carlo simulations for all schemes. The OP of D 1 under the PIC scheme denoted by “Pro-Perfect-D1” is better than the OP of D 2 denoted by “Pro-Perfect-D2” when R is relatively small. However, when OP is approaching 1, the OP of D 2 is better. We observe a similar trend for the IIC and baseline system. It is certain that under the IIC scheme, the OP performance will obviously be worse than the PIC. More precisely, the OP of D a , a 1 , 2 under the IIC denoted by “Pro-Imperfect-D a ” is higher the curve “Pro-Perfect-D a ” approximately 0.1 when R is around 0.3. Nonetheless, the OP of the IIC scheme is still better than the baseline system (denoted by “Base-D1” and “Base-D2”). Particularly, the OP under the baseline system already reaches 1 when R is around 0.3 while the OP of the PIC only reaches 1 when R is slightly below 1. Regarding the PT, we also observe a big gap between the proposed systems and the baseline one. Moreover, the PT is a unimodal function concerning the expected rate. It can be straightforwardly explained that when R is fairly small the PT is dominated by the term log 2 ( 1 + R ) so PT is increasing and when R is getting bigger the impact of OP becomes the major player thus PT decreases and approaches zero when R 1 .
Figure 4 and Figure 5 investigates the influences of P tot on the performance of OP and PT. This figure confirms again that the proposed mathematical framework is consistently aligned with computer-based simulation results. Furthermore, it also verifies the statements in Proposition 1 that increasing P tot monotonically declines the OP and raises the PT. It is interesting to point out that the proposed system (even under the PIC scheme) does not substantially outperform its counterpart. In fact, the proposed network provides better performance when the transmit power is small, moderate, and worse when P tot 1 . The rationale behind this phenomenon is that when the system is under a high transmit power regime, both destinations are able to successfully decode signals without the help of relays. Nonetheless, under the proposed system, there always exists self-interference at relays and the interinterference between hops thus degrading the system. On the other hand, when the transmit power is either small or moderate, the OP of the baseline system underperforms the proposed one owing to the long transmission distance. Figure 5 shows the performance of PT concerning P tot . We see that it has a reverse trend compared with the OP that monotonically increases with P tot . It is clear that in order to get the nonzero PT, the baseline system requires P tot is greater than 25 dBm while the proposed system solely demands the P tot is greater than 10 dBm for the worst scenario (all-hop interference).
The influences of the near-field path-loss are conducted in Figure 6 and Figure 7. Particularly, we see that increasing the transmit distance between the transmit and receive antennae at the relay will monotonically decrease the OP and increase the PT. It can be explained straightforwardly from (2) that increasing d R R , the impact of two terms that are the power of 4 and 6 of the transmission distance approach zeros faster than the power of 2. Hence, the near-field path-loss gradually becomes the large-scale path-loss. It is expected that the baseline curves are constant with the changes in the self-interference transmission distance. Under the current setup, the proposed system substantially outperforms the baseline one unless d R R < 0.2 .
The impact of α 1 on the performance of both metrics is given in Figure 8 and Figure 9. It is certain that increasing α 1 is beneficial for D 1 , it, however, will be harmful to D 2 regardless of the utilized schemes and IC conditions. Nevertheless, the increase and decrease paces are different. We observe that the OP 2 dramatically increases while the decrease of OP 1 is moderate. Similar trends are observed for the baseline system. Figure 9 illustrates the influences of α 1 on the performance of potential throughput of the whole networks. Specifically, scaling up α 1 degrades the performance of the considered networks as well as the baseline ones. Additionally, we observe a quite big gap between the proposed networks and the nonrelaying systems regardless of the conditions of the interference cancellation.
Figure 10 and Figure 11 addresses the influences of the number of relays on the performance of two metrics. It is evident that the baseline curves are constant with M . Regarding the considered networks, we observe that the OP quickly decreases when M is small, i.e., M 3 for both scenarios. It then slowly decreases followed by slight increases when M > 8 for the PIC. Regarding the IIC, the OP remains constant for M = 3 and M = 4 . It then dramatically increases when M 5 . The behavior of PT, contrarily, experiences a reverse trend with OP that it starts increasing until the peak then steadily declines, and the PIC, of course, achieves higher throughput than IIC.
Figure 12 depicts the performance of the OP of D 1 under the impact of imperfect interference cancellation, hardware impairment, and imperfect channel estimation with respect to R. More precisely, we adopt the imperfect channel state information (ICSI) as in [50] that the channel coefficient of a generic link between transmitter u and receiver v is modelled as h ˜ u , v = ρ h u , v + 1 ρ 2 w u , v , where h ˜ u , v is the estimated version of h u , v and w u , v is a complex Gaussian RV with zero mean and the same variance as h u , v . Here ρ 0 , 1 is the correlation coefficient and is computed by J 0 2 π f D ψ , where J 0 . is the zeroth-order Bessel function of the first kind, f D = v r cos ( ν ) f c / c is the Doppler shift, ν is the angle between wave propagation and motion direction, v r is the relative velocity of receiver, and ψ is the feedback delay. In Figure 12, we select v r = 60 , 90 , 120 km/h, ν = 60 and ψ = 0.5 ms [51]. The curves denoted by “Simu Imperfect + HI + ICSI” are plotted by assuming that all imperfect factors, i.e., interference cancellation, hardware impairment (HI), and ICSI are imposed on the system while the curves denoted by “Theo Imperfect” are the IIC scheme. Regarding the hardware impairment, the HI model in [52] is taken into account where the transmit signals are impaired by an additive noise which follows a circularly symmetric complex Gaussian distribution with zero-mean and variance P ϖ , ϖ 0 , 1 . In this figure, we choose ϖ = 0.075 as like in [52]. From Figure 12, it is expected that OP under the influences of imperfect interference cancellation, hardware impairment, and imperfect channel state information have similar behaviors as case only imperfect interference cancellation but got worse performance. One of the most effective solutions to overcome such harmful effects is to increase the transmit power as shown in Figure 4. We see that the impact of HI is minor compared with the imperfect CSI. Furthermore, the higher the ρ , the better the OP.
Figure 13 unveils the performance of the PT as a function of R under different schemes, i.e., full-duplex, half-duplex, state-of-the-art [53], and baseline systems. More precisely, for the line denoted by “Simu Pro-Imperfect Half”, all relays operate at half-duplex protocol where relays can only either transmit or receive signals at each time slot thus, the whole transmission takes place in M + 1 time slots. To make a fair comparison, all relays still employ two antennae and both transmit and receive diversity schemes are deployed such as maximal ratio transmission (MRT) and maximal ratio combining (MRC) to maximize its performance. Additionally, the self-interference and interhop interference are also removed. Regarding the line denoted by “Simu Ref. [53]”, we consider a dual-hop FD NOMA networks with a help of a single DF relay in [53]. In their work, both source and destinations are equipped with multiple antennae thus, both MRT and MRC are used to maximize the system performance. The remaining curves are given by (13), (16) and (17). It is no doubt that our proposed scheme achieves the highest PT followed by the scheme in [53], half-duplex and the lowest one is the baseline system. Although the half-duplex protocol enjoys free interhop interference and self-interference at the relay, requiring several time slots to forward information significantly scales down its throughput. As for the scheme in [53], it benefits from a favorable channel gain thanks to transmit and receive diversity techniques, it, however, suffers from a long transmission distance. As a result, the performance still underperforms the proposed scheme.

5. Conclusions

The performance of the multi-hop FD NOMA systems was addressed in this paper. More precisely, we derived the OP and PT in the closed-form expressions for two cases, perfect and imperfect IC. Moreover, we also derived the behaviors of these metrics with respect to an important parameter, namely, the total transmit power. The results unveiled that OP and PT have a contrary trend. We also identified that when the transmit power goes without bound, the baseline system outperforms the proposed one. The ongoing extension of the current work is to take into account the impact of the imperfect hardware and imperfect CSI by deriving mathematical frameworks in order to comprehensively address the performance of the considered networks.

Author Contributions

L.-T.T. and T.N.N. proposed the idea and wrote the manuscript. V.-D.P. and Q.-S.N. derived the mathematical framework and proofread the manuscript. N.-T.N. was in charge of data curation and software. M.V. was in charge of funding acquisition and project administration. T.T.D. and P.T.T. conducted the numerical results and proofread the paper. All authors have read and agreed to the published version of the manuscript.

Funding

This research was financially supported by Van Lang University, Vietnam. Additionally, the research leading to these results was supported by the Ministry of Education, Youth and Sports of the Czech Republic under the grant SP2022/5 and e-INFRA CZ (ID:90140).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Proof of Proposition 1

In this section, the MGF of the sum of N i.n.i.d. exponential RVs are derived. Let us begin with the definition of the MGF as follows:
M S s = E exp s i = 1 N X i = x 1 = 0 x N = 0 exp s i = 1 N x i f X 1 , . . . X N x 1 , . . . , x N d x 1 . . . d x N = a i = 1 N x i = 0 exp s x i f X i x i d x i = b i = 1 N x i = 0 exp s i = 1 N x i 1 δ i exp x i δ i d x i = i = 1 N 1 1 + s δ i ,
where E . is the expectation operator, a is held by employing the independent properties of N RVs, b is obtained by substituting the probability density function (PDF) of RV X i , the last equation is derived by computing the integration and we finish the proof here.

Appendix B. Proof of Theorem 2

In this section, the outage probability of D a , a 1 , 2 , under the perfect interference cancellation is derived. Let us begin with OP 1 as follows:
OP 1 P = Pr log 2 1 + γ e 2 e 1 , P R 1 = a 1 Ξ 1 Ξ 2 Ξ 3 , Ξ 1 = m = 2 M Pr α 1 h m 1 , m 2 Φ m 1 ς m 1 , m F α 2 h m 1 , m 2 Φ m 1 ς m 1 , m F + τ m Φ m ς m N h m , m 2 + t = 0 m 2 h t , m 2 Φ t ς t , m F + 1 γ th 1 , Ξ 2 = Pr α 1 h 0 , 1 2 Φ 0 ς 0 , 1 F α 2 h 0 , 1 2 Φ 0 ς 0 , 1 F + τ 1 Φ 1 ς 1 N h 1 , 1 2 + 1 γ th 1 , Ξ 3 = Pr α 1 Φ M ς M , D 1 F h M , D 1 2 α 2 Φ M ς M , D 1 F h M , D 1 2 + t = 0 M 1 Φ t ς t , D 1 F h t , D 1 2 + 1 γ th 1 ,
where a is obtained due to the independence of terms in γ e 2 e 1 , P . Ξ 1 is computed as
Ξ 1 = m = 2 M Pr α 1 h m 1 , m 2 Φ m 1 ς m 1 , m F α 2 h m 1 , m 2 Φ m 1 ς m 1 , m F + τ m Φ m ς m N h m , m 2 + t = 0 m 2 h t , m 2 Φ t ς t , m F + 1 γ th 1 = H ( Δ 1 ) m = 2 M exp f 1 m x = 0 y = 0 exp f 1 m τ m Φ m ς m N x exp f 1 m y × f X = h m , m 2 x f Y = t = 0 m 2 h t , m 2 y d x d y = a H ( Δ 1 ) m = 2 M exp f 1 m M X f 1 m τ m Φ m ς m N M Y f 1 m Φ t ς t , m F = b H ( Δ 1 ) m = 2 M exp f 1 m 1 + f 1 m τ m ω m , m Φ m ς m N 1 o = 2 m 1 + f 1 m Φ o 2 ς o 2 , m F ω o 2 , m 1 .
where λ a = γ th a Δ a , Δ 1 = α 1 α 2 γ th 1 and Δ 2 = α 2 , f a x = λ a ς x 1 , x F Φ ω x 1 , x , γ th a = 2 R a 1 , a is attained by utilizing the definition of MGF function while b is held by employing the outcome of Theorem 1. Similarly, we can straightforwardly derive Ξ 2 and Ξ 3 by utilizing the same approach as Ξ 1 and are given as follows:
Ξ 2 = Pr α 1 h 0 , 1 2 Φ 0 ς 0 , 1 F α 2 h 0 , 1 2 Φ 0 ς 0 , 1 F + τ 1 Φ ς 1 N h 1 , 1 2 + 1 γ th 1 = H Δ 1 exp f 1 1 1 + f 1 1 τ 1 ω 1 , 1 Φ 1 ς 1 N 1 , Ξ 3 = Pr α 1 Φ M ς M , D 1 F h M , D 1 2 α 2 Φ M ς M , D 1 F h M , D 1 2 + t = 0 M 1 Φ t ς t , D 1 F h t , D 1 2 + 1 γ th 1 = H Δ 1 exp λ 1 ς M , D 1 F Φ ω M , D 1 l = 1 M 1 + λ 1 ς M , D 1 F ω l 1 , D 1 ς l 1 , D 1 F ω M , D 1 1 .
Having obtained Ξ 1 , Ξ 2 , and Ξ 3 the OP 1 P under the perfect interference cancellation in (A2) is rewritten as
OP 1 P = 1 H ( Δ 1 ) exp λ 1 ς M , D 1 F Φ ω M , D 1 l = 1 M 1 + λ 1 ς M , D 1 F ω l 1 , D 1 ς l 1 , D 1 F ω M , D 1 1 z = 1 M exp f 1 z × i = 1 M 1 + τ i ω i , i Φ ς i N 1 m = 2 M o = 2 m 1 + f 1 m Φ ς o 2 , m F ω o 2 , m 1 .
Now, let us derive the mathematical framework of OP 2 P that is given as
OP 2 P = Pr log 2 1 + γ e 2 e 2 , P R 2 = 1 Ξ 4 Ξ 5 Ξ 6 , Ξ 4 = Pr α 2 h 0 , 1 2 Φ 0 ς 0 , 1 F τ 1 Φ 1 ς 1 N h 1 , 1 2 + 1 γ th 2 Ξ 5 = Pr α 2 Φ M ς M , D 2 F h M , D 2 2 t = 0 M 1 Φ t ς t , D 2 F h t , D 2 2 + 1 γ th 2 Ξ 6 = m = 2 M Pr α 2 h m 1 , m 2 Φ m 1 ς m 1 , m F τ m Φ m ς m N h m , m 2 + t = 0 m 2 h t , m 2 Φ t ς t , m F + 1 γ th 2 ,
where the computation of Ξ 4 , Ξ 5 , Ξ 6 is similar to Ξ 1 thus, it is omitted here. Finally, by unifying the mathematical framework of both OP, we attain (15) and close the proof here.

Appendix C. Proof of Theorem 3

The OP performance under the IIC scheme is computed as follows:
OP 1 I = Pr log 2 1 + γ e 2 e 1 , I R 1 = a 1 Ψ 1 Ξ 3 , Ψ 1 = m = 1 M Pr α 1 h m 1 , m 2 Φ m 1 ς m 1 , m F α 2 h m 1 , m 2 Φ m 1 ς m 1 , m F + τ m Φ m ς m N h m , m 2 + t = 0 , t m 1 , m M 1 h t , m 2 Φ t ς t , m F + 1 γ th 1 = H ( Δ 1 ) m = 2 M 1 exp f 1 m x = 0 z = 0 exp f 1 m τ m Φ m ς m N x × exp f 1 m Φ ς z , m F z f X = h m , m 2 x f Z = z = 0 , z m 1 , m M 1 h z , m 2 z d x d z = a H ( Δ 1 ) m = 2 M 1 exp f 1 m M X f 1 m τ m Φ ς m N M Z f 1 m Φ ς z , m F = b H ( Δ 1 ) m = 2 M 1 exp f 1 m 1 + f 1 m τ m ω m , m Φ m ς m N 1 × z = 0 , z m 1 , m M 1 1 + f 1 m Φ z ς z , m F ω z , m 1 .
Similarly, the OP 2 I is then computed as follows:
OP 2 I = Pr log 2 1 + γ e 2 e 2 , I R 2 = a 1 Ψ 2 Ψ 3 , Ψ 2 = m = 1 M Pr α 2 h m 1 , m 2 Φ m 1 ς m 1 , m F ϵ m α 1 h m 1 , m 2 Φ m 1 ς m 1 , m F + τ m Φ m ς m N h m , m 2 + t = 0 , t m 1 , m M 1 h t , m 2 Φ t ς t , m F + 1 γ th 2 = H ( Δ 3 ) m = 1 M exp f 3 m x = 0 z = 0 exp f 3 m τ m Φ m ς m N x × exp f 3 m z Φ ς z , m F f X = h m , m 2 x f Z = z = 0 , z m 1 , m M 1 h z , m 2 z d x d z = a H ( Δ 3 ) m = 1 M exp f 3 m 1 + f 3 m τ m ω m , m Φ m ς m N 1 × z = 0 , z m 1 , m M 1 + f 3 m Φ z ς z , m F ω z , m 1 Ψ 3 = Pr α 2 Φ M ς M , D 2 F h M , D 2 2 ϵ D 2 α 1 Φ M ς M , D 1 F h M , D 1 2 + t = 0 M 1 Φ t ς t , D 2 F h t , D 2 2 + 1 γ th 2 = H Δ 2 1 + λ 2 ϵ D 2 α 1 ς M , D 2 F ω M , D 1 ς M , D 1 F ω M , D 2 1 exp λ 2 ς M , D 2 F Φ ω M , D 2 l = 1 M 1 + λ 2 ς M , D 2 F ω l 1 , D 2 ς l 1 , D 2 F ω M , D 2 1
where Δ 3 = α 2 ϵ m α 1 γ th 2 , υ = γ th 2 Δ 3 and f 3 x = υ ς x 1 , x F Φ x 1 ω x 1 , x .

Appendix D. Proof of Proposition 1

In this appendix, we are going to derive the behaviors of OP with respect to the total transmit power. Particularly, we first derive the OP a P as a function of P tot . Let us rewrite it explicitly as a function of Φ = P tot σ 2 ( M + 1 ) = P σ 2 = x as follows:
OP a P x = 1 V 1 exp λ a ς M , D a F x ω M , D a v = 1 M exp f a v , x ,
where V 1 = H ( Δ a ) i = 1 M 1 + τ i ω i , i 1 ς i N 1 × m = 2 M o = 2 m 1 + f a m 1 ς o 2 , m F ω o 2 , m 1 l = 1 M 1 + λ a ς M , D a F ω l 1 , D a ς l 1 , D a F ω M , D a 1 . Let us take the first-order derivative of OP a P with respect to x as follows:
OP a x = V 1 x 2 v = 1 M exp f a v , x exp λ a ς M , D a F x ω M , D a λ a ς M , D a F ω M , D a + v = 1 M λ a ς v 1 , v F ω v 1 , v < 0 .
From (A10), it is obvious that OP is a monotonic decrease function with respect to x. Direct inspection (13), it is obvious that the impact of P tot on the PT relied only on the OP thus, PT monotonically increases with P tot . Direct inspection (16), we observe that the framework of OP a I with respect to P tot is similar to the OP a P , thus, it has the same trend as OP a P so we skip the derivation and finish the proof here.

References

  1. Tu, L.T.; Bradai, A.; Ahmed, O.B.; Garg, S.; Pousset, Y.; Kaddoum, G. Energy Efficiency Optimization in LoRa Networks—A Deep Learning Approach. IEEE Intell. Transp. Syst. 2022. Early access. [Google Scholar]
  2. Kim, M.; Lee, W.; Cho, D.-H. Deep Scanning—Beam Selection Based on Deep Reinforcement Learning in Massive MIMO Wireless Communication System. Electronics 2020, 9, 1844. [Google Scholar] [CrossRef]
  3. Lee, T.; Jo, O.; Shin, K. CoRL: Collaborative Reinforcement Learning-Based MAC Protocol for IoT Networks. Electronics 2020, 9, 143. [Google Scholar] [CrossRef]
  4. Van Chien, T.; Tu, L.T.; Chatzinotas, S.; Ottersten, B. Coverage Probability and Ergodic Capacity of Intelligent Reflecting Surface-Enhanced Communication Systems. IEEE Commun. Lett. 2021, 25, 69–73. [Google Scholar] [CrossRef]
  5. Tran, P.T.; Nguyen, B.C.; Hoang, T.M.; Nguyen, T.N. On Performance of Low-Power Wide-Area Networks with the Combining of Reconfigurable Intelligent Surfaces and Relay. IEEE Trans. Mobile Comput. 2022. Early Access. [Google Scholar] [CrossRef]
  6. Van Chien, T.; Papazafeiropoulos, A.K.; Tu, L.T.; Chopra, R.; Chatzinotas, S.; Ottersten, B. Outage Probability Analysis of IRS-Assisted Systems Under Spatially Correlated Channels. IEEE Wirel. Commun. Lett. 2021, 10, 1815–1819. [Google Scholar] [CrossRef]
  7. Nguyen, T.N.; Thang, N.N.; Nguyen, B.C.; Hoang, T.M.; Tran, P.T. Intelligent-Reflecting-Surface-Aided Bidirectional Full-Duplex Communication System With Imperfect Self-Interference Cancellation and Hardware Impairments. IEEE Syst. J. 2022. Early Access. [Google Scholar] [CrossRef]
  8. Anwar, A.; Seet, B.-C.; Ding, Z. Non-Orthogonal Multiple Access for Ubiquitous Wireless Sensor Networks. Sensors 2018, 18, 516. [Google Scholar] [CrossRef] [PubMed]
  9. Di Renzo, M.; Zappone, A.; Lam, T.T.; Debbah, M. System-Level Modeling and Optimization of the Energy Efficiency in Cellular Networks—A Stochastic Geometry Framework. IEEE Trans. Wirel. Commun. 2018, 17, 2539–2556. [Google Scholar] [CrossRef]
  10. Renzo, M.D.; Zappone, A.; Lam, T.T.; Debbah, M. Spectral-Energy Efficiency Pareto Front in Cellular Networks: A Stochastic Geometry Framework. IEEE Wirel. Commun. Lett. 2019, 8, 424–427. [Google Scholar] [CrossRef]
  11. Wang, Q.; Zhou, Y. Modeling and Performance Analysis of Large-Scale Backscatter Communication Networks with Directional Antennas. Sensors 2022, 22, 7260. [Google Scholar] [CrossRef]
  12. Sadat, H.; Abaza, M.; Mansour, A.; Alfalou, A. A Survey of NOMA for VLC Systems: Research Challenges and Future Trends. Sensors 2022, 22, 1395. [Google Scholar] [CrossRef]
  13. Nguyen, T.-T.; Nguyen, S.Q.; Nguyen, P.X.; Kim, Y.-H. Evaluation of Full-Duplex SWIPT Cooperative NOMA-Based IoT Relay Networks over Nakagami-m Fading Channels. Sensors 2022, 22, 1974. [Google Scholar] [CrossRef]
  14. Lee, J.-H.; Song, J. Full-Duplex Relay for Millimeter Wave Vehicular Platoon Communications. Sensors 2020, 20, 6072. [Google Scholar] [CrossRef] [PubMed]
  15. Nguyen, T.N.; Tu, L.T.; Tran, D.H.; Phan, V.D.; Voznak, M.; Chatzinotas, S.; Ding, Z. Outage Performance of Satellite Terrestrial Full-Duplex Relaying Networks with Co-Channel Interference. IEEE Wireless Commun. Lett. 2022, 17, 1478–1482. [Google Scholar] [CrossRef]
  16. Tu, L.-T.; Bradai, A.; Pousset, Y.; Aravanis, A.I. On the Spectral Efficiency of LoRa Networks: Performance Analysis, Trends and Optimal Points of Operation. IEEE Trans. Commun. 2022, 70, 2788–2804. [Google Scholar] [CrossRef]
  17. Shayovitz, S.; Krestiantsev, A.; Raphaeli, D. Low-Complexity Self-Interference Cancellation for Multiple Access Full Duplex Systems. Sensors 2022, 22, 1485. [Google Scholar] [CrossRef]
  18. Zhang, J.; He, F.; Li, W.; Li, Y.; Wang, Q.; Ge, S.; Xing, J.; Liu, H.; Li, Y.; Meng, J. Self-Interference Cancellation: A Comprehensive Review from Circuits and Fields Perspectives. Electronics 2022, 11, 172. [Google Scholar] [CrossRef]
  19. Jin, R.; Fan, X.; Sun, T. Centralized Multi-Hop Routing Based on Multi-Start Minimum Spanning Forest Algorithm in the Wireless Sensor Networks. Sensors 2021, 21, 1775. [Google Scholar] [CrossRef]
  20. Nguyen, Q.S.; Kong, H.Y. Exact outage analysis of the effect of co-channel interference on secured multi-hop relaying networks. Int. J. Electron. 2016, 103, 1822–1838. [Google Scholar] [CrossRef]
  21. Xu, Z.; Petrunin, I.; Li, T.; Tsourdos, A. Efficient Allocation for Downlink Multi-Channel NOMA Systems Considering Complex Constraints. Sensors 2021, 21, 1833. [Google Scholar] [CrossRef]
  22. Toan, H.V.; Hoang, T.M.; Duy, T.T.; Dung, L.T. Outage Probability and Ergodic Capacity of a Two-User NOMA Relaying System with an Energy Harvesting Full-Duplex Relay and Its Interference at the Near User. Sensors 2020, 20, 6472. [Google Scholar] [CrossRef]
  23. Tu, L.-T.; Renzo, M.D.; Coon, J.P. System-Level Analysis of SWIPT MIMO Cellular Networks. IEEE Commun. Lett. 2016, 20, 2011–2014. [Google Scholar]
  24. Duc, C.H.; Nguyen, S.Q.; Le, C.-B.; Khanh, N.T.V. Performance Evaluation of UAV-Based NOMA Networks with Hardware Impairment. Electronics 2022, 11, 94. [Google Scholar] [CrossRef]
  25. Tin, P.T.; Phan, V.-D.; Nguyen, T.N.; Tu, L.-T.; Minh, B.V.; Voznak, M.; Fazio, P. Outage Analysis of the Power Splitting Based Underlay Cooperative Cognitive Radio Networks. Sensors 2021, 21, 7653. [Google Scholar] [CrossRef] [PubMed]
  26. Nguyen, B.C.; Tran, M.H.; Tran, P.T.; Nguyen, T.N. Outage probability of NOMA system with wireless power transfer at source and full-duplex relay. AEU—Int. J. Electron. Commun. 2020, 116, 152957. [Google Scholar] [CrossRef]
  27. Ghous, M.; Hassan, A.K.; Abbas, Z.H.; Abbas, G.; Hussien, A.; Baker, T. Cooperative Power-Domain NOMA Systems: An Overview. Sensors 2022, 22, 9652. [Google Scholar] [CrossRef]
  28. Nguyen, T.N.; Duy, T.T.; Tran, P.T.; Voznak, M.; Li, X.; Poor, H.V. Partial and Full Relay Selection Algorithms for AF Multi-Relay Full-Duplex Networks With Self-Energy Recycling in Non-Identically Distributed Fading Channels. IEEE Trans. Veh. Technol. 2022, 71, 6173–6188. [Google Scholar] [CrossRef]
  29. Tin, P.T.; Nguyen, T.N.; Tran, M.; Trang, T.T.; Sevcik, L. Exploiting Direct Link in Two-Way Half-Duplex Sensor Network over Block Rayleigh Fading Channel: Upper Bound Ergodic Capacity and Exact SER Analysis. Sensors 2020, 20, 1165. [Google Scholar] [CrossRef]
  30. Renzo, M.D.; Lam, T.T.; Zappone, A.; Debbah, M. A Tractable Closed-Form Expression of the Coverage Probability in Poisson Cellular Networks. IEEE Wirel. Commun. Lett. 2019, 8, 249–252. [Google Scholar] [CrossRef]
  31. Al Hajj, M.; Wang, S.; Thanh Tu, L.; Azzi, S.; Wiart, J. A Statistical Estimation of 5G Massive MIMO Networks’ Exposure Using Stochastic Geometry in mmWave Bands. Appl. Sci. 2020, 10, 8753. [Google Scholar] [CrossRef]
  32. Tin, P.T.; Nguyen, T.N.; Tran, D.-H.; Voznak, M.; Phan, V.-D.; Chatzinotas, S. Performance Enhancement for Full-Duplex Relaying with Time-Switching-Based SWIPT in Wireless Sensors Networks. Sensors 2021, 21, 3847. [Google Scholar] [CrossRef]
  33. Nguyen, T.N.; Tran, D.H.; Phan, V.D.; Voznak, M.; Chatzinotas, S.; Ottersten, B.; Poor, H.V. Throughput Enhancement in FD- and SWIPT-Enabled IoT Networks Over Nonidentical Rayleigh Fading Channels. IEEE Int. Things J. 2022, 9, 10172–10186. [Google Scholar] [CrossRef]
  34. Alnawafa, E.; Marghescu, I. New Energy Efficient Multi-Hop Routing Techniques for Wireless Sensor Networks: Static and Dynamic Techniques. Sensors 2018, 18, 1863. [Google Scholar] [CrossRef] [PubMed]
  35. Tu, L.-T.; Bao, V.N.Q.; Duy, T.T. Capacity analysis of multi-hop decode-and-forward over Rician fading channels. In Proceedings of the 2014 IEEE ComManTel, Da Nang, Vietnam, 27–29 April 2014; pp. 134–139. [Google Scholar]
  36. Tran, T.D.; Kong, H. Secrecy Performance Analysis of Multihop Transmission Protocols in Cluster Networks. Wirel. Pers. Commun. 2015, 82, 2505–2518. [Google Scholar]
  37. Viet Tuan, P.; Ngoc Son, P.; Trung Duy, T.; Nguyen, S.Q.; Ngo, V.Q.B.; Vinh Quang, D.; Koo, I. Optimizing a Secure Two-Way Network with Non-Linear SWIPT, Channel Uncertainty, and a Hidden Eavesdropper. Electronics 2020, 9, 1222. [Google Scholar] [CrossRef]
  38. Lam, T.T.; Renzo, M.D.; Coon, J.P. System-level analysis of receiver diversity in SWIPT-enabled cellular networks. J. Commun. Netw. 2016, 18, 926–937. [Google Scholar] [CrossRef]
  39. Tin, P.T.; Minh Nam, P.; Trung Duy, T.; Tran, P.T.; Voznak, M. Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection. Sensors 2019, 19, 1160. [Google Scholar] [CrossRef] [PubMed]
  40. Yamamoto, T.; Okada, Y. Multi-Hop Wireless Network for Industrial IoT. SEI Technical Review. 8-11. 2018. Available online: https://sumitomoelectric.com/sites/default/files/2022-01/download_documents/86-02.pdf (accessed on 26 December 2022).
  41. Kim, T.-Y.; Youm, S.; Jung, J.-J.; Kim, E.-J. Multi-Hop WBAN Construction for Healthcare IoT Systems. In Proceedings of the 2015 International Conference on Platform Technology and Service, Jeju, Republic of Korea, 26–28 January 2015; pp. 27–28. [Google Scholar] [CrossRef]
  42. Levin, G.; Loyka, S. Amplify-and-forward versus decode-and-forward relaying: Which is better? Int. Zur. Semin. Commun. (IZS) 2012, 5348–5352. [Google Scholar] [CrossRef]
  43. Wang, R.; Wang, P. Fundamental Properties of Wireless Relays and Their Channel Estimation. In Encyclopedia of Wireless Networks; Shen, X., Lin, X., Zhang, K., Eds.; Springer: Cham, Switzerland, 2020. [Google Scholar] [CrossRef]
  44. Lam, T.T.; Di Renzo, M. On the Energy Efficiency of Heterogeneous Cellular Networks With Renewable Energy Sources—A Stochastic Geometry Framework. IEEE Trans. Wirel. Commun. 2020, 19, 6752–6770. [Google Scholar] [CrossRef]
  45. Aravanis, A.I.; Tu Lam, T.; Muñoz, O.; Pascual-Iserte, A.; Di Renzo, M. A tractable closed form approximation of the ergodic rate in Poisson cellular networks. J. Wirel. Commun. Netw. 2019, 2019, 187. [Google Scholar] [CrossRef]
  46. Schantz, H.G. Near field propagation law & a novel fundamental limit to antenna gain versus size. In Proceedings of the 2005 IEEE Antennas and Propagation Society International Symposium, Washington, DC, USA, 3–8 July 2005; Volume 3A, pp. 237–240. [Google Scholar] [CrossRef]
  47. Fu, X.; Peng, R.; Liu, G.; Wang, J.; Yuan, W.; Kadoch, M. Channel Modeling for RIS-Assisted 6G Communications. Electronics 2022, 11, 2977. [Google Scholar] [CrossRef]
  48. Nguyen, T.N.; Nguyen, V.S.; Nguyen, H.G.; Tu, L.T.; Van Chien, T.; Nguyen, T.H. On the Performance of Underlay Device-to-Device Communications. Sensors 2022, 22, 1456. [Google Scholar] [CrossRef]
  49. Nguyen, T.H.; Jung, W.-S.; Tu, L.T.; Chien, T.V.; Yoo, D.; Ro, S. Performance Analysis and Optimization of the Coverage Probability in Dual Hop LoRa Networks With Different Fading Channels. IEEE Access 2020, 8, 107087–107102. [Google Scholar] [CrossRef]
  50. Suraweera, H.A.; Smith, P.J.; Shafi, M. Capacity Limits and Performance Analysis of Cognitive Radio With Imperfect Channel Knowledge. IEEE Trans. Veh. Technol. 2010, 59, 1811–1822. [Google Scholar] [CrossRef]
  51. Tu, L.-T.; Nguyen, T.N.; Duy, T.T.; Tran, P.T.; Voznak, M.; Aravanis, A.I. Broadcasting in Cognitive Radio Networks: A Fountain Codes Approach. IEEE Trans. Veh. Technol. 2022, 71, 11289–11294. [Google Scholar] [CrossRef]
  52. Duy, T.T.; Duong, T.Q.; da Costa, D.B.; Bao, V.N.Q.; Elkashlan, M. Proactive Relay Selection With Joint Impact of Hardware Impairment and Co-Channel Interference. IEEE Trans. Commun. 2015, 63, 1594–1606. [Google Scholar] [CrossRef]
  53. Toka, M.; Guven, E.; Kurt, G.K.; Kucur, O. Performance Analyses of MRT/MRC in Dual-Hop NOMA Full-Duplex AF Relay Networks with Residual Hardware Impairments. arXiv 2021. [Google Scholar] [CrossRef]
Figure 1. The considered multi-hop FD NOMA networks.
Figure 1. The considered multi-hop FD NOMA networks.
Sensors 23 00524 g001
Figure 2. Outage probability vs. R under all schemes. Solid lines are plotted by employing (15)–(17) while markers are Monte Carlo simulation.
Figure 2. Outage probability vs. R under all schemes. Solid lines are plotted by employing (15)–(17) while markers are Monte Carlo simulation.
Sensors 23 00524 g002
Figure 3. Potential throughput vs. R under all schemes. Solid lines are plotted by employing (13) while markers are Monte Carlo simulation.
Figure 3. Potential throughput vs. R under all schemes. Solid lines are plotted by employing (13) while markers are Monte Carlo simulation.
Sensors 23 00524 g003
Figure 4. Outage probability vs. P tot under all schemes. Solid lines are plotted by employing (15)–(17) while markers are Monte Carlo simulation.
Figure 4. Outage probability vs. P tot under all schemes. Solid lines are plotted by employing (15)–(17) while markers are Monte Carlo simulation.
Sensors 23 00524 g004
Figure 5. Potential throughput vs. P tot under all schemes. Solid lines are plotted by employing (13) while markers are Monte Carlo simulation.
Figure 5. Potential throughput vs. P tot under all schemes. Solid lines are plotted by employing (13) while markers are Monte Carlo simulation.
Sensors 23 00524 g005
Figure 6. Outage probability vs. d m , m under all schemes. Solid lines are plotted by employing (15)–(17) while markers are Monte Carlo simulation.
Figure 6. Outage probability vs. d m , m under all schemes. Solid lines are plotted by employing (15)–(17) while markers are Monte Carlo simulation.
Sensors 23 00524 g006
Figure 7. Potential throughput vs. d m , m under all schemes. Solid lines are plotted by employing (13) while markers are Monte Carlo simulation.
Figure 7. Potential throughput vs. d m , m under all schemes. Solid lines are plotted by employing (13) while markers are Monte Carlo simulation.
Sensors 23 00524 g007
Figure 8. Outage probability vs. α 1 under all schemes. Solid lines are plotted by employing (15)–(17) while markers are Monte Carlo simulation.
Figure 8. Outage probability vs. α 1 under all schemes. Solid lines are plotted by employing (15)–(17) while markers are Monte Carlo simulation.
Sensors 23 00524 g008
Figure 9. Potential throughput vs. α 1 under all schemes. Solid lines are plotted by employing (13) while markers are Monte Carlo simulation.
Figure 9. Potential throughput vs. α 1 under all schemes. Solid lines are plotted by employing (13) while markers are Monte Carlo simulation.
Sensors 23 00524 g009
Figure 10. Outage probability vs. M under all schemes. Solid lines are plotted by employing (15)–(17) while markers are Monte Carlo simulation.
Figure 10. Outage probability vs. M under all schemes. Solid lines are plotted by employing (15)–(17) while markers are Monte Carlo simulation.
Sensors 23 00524 g010
Figure 11. Potential throughput vs. M under all schemes. Solid lines are plotted by employing (13) while markers are Monte Carlo simulation.
Figure 11. Potential throughput vs. M under all schemes. Solid lines are plotted by employing (13) while markers are Monte Carlo simulation.
Sensors 23 00524 g011
Figure 12. Outage probability vs. R under the impact of imperfect interference cancellation, hardware impairment (HI), and imperfect channel state information (ICSI). Solid lines are plotted by employing (16) while markers are Monte Carlo simulation.
Figure 12. Outage probability vs. R under the impact of imperfect interference cancellation, hardware impairment (HI), and imperfect channel state information (ICSI). Solid lines are plotted by employing (16) while markers are Monte Carlo simulation.
Sensors 23 00524 g012
Figure 13. Potential throughput vs. R with various schemes, full-duplex, half-duplex, state-of-the-art [53], and baseline system. Markers are plotted by employing (13) while solid lines are Monte Carlo simulation.
Figure 13. Potential throughput vs. R with various schemes, full-duplex, half-duplex, state-of-the-art [53], and baseline system. Markers are plotted by employing (13) while solid lines are Monte Carlo simulation.
Sensors 23 00524 g013
Table 1. Main notations and mathematical symbols.
Table 1. Main notations and mathematical symbols.
SymbolDefinition
E . , Pr . Expectation and probability operators
h u , v Channel coefficient between transmitter u and receiver v
ς u , v F Far-field path-loss between transmitter u and receiver v
ς m N Near-field path-loss between of the R m relay
K 0 , cPath-loss constant, speed of light
v, f c , η Wavelength, carrier frequency, path-loss exponent
d u , v Transmission distance from node u to node v
P tot Total transmit power of the whole networks
P m , P 0 Transmit power of the R m relay and source node
α 1 , α 2 Coefficients of power allocation for D 1 and D 2
L, M Maximum size of the received antenna & number of relays
d R D , G T , G R Rayleigh distance, transmit and receive antennae gain
R a , a 1 , 2 Targeted rate of D a destination
ε v Residue of the imperfect SIC at v receiver
r m Residue of the self-interference cancellation at R m relay
x a , x ˜ a , x ˜ ˜ a Intended signals for D a sent by R m 1 , R z and R t relays
y R m , y D a Received signals at the R m relay and D a destination
n m , n D a AWGN noise at the R m relay and D a destination
σ 2 Noise variance at all the receiver
NF, BwNoise figure, transmission bandwidth
Φ , H . Average transmit-power-to-noise-ratio and Heaviside function
ω u , v Variance of small-scale fading from transmitter u to receiver v
exp . , log . Exponential and logarithm functions
max . , min . Maximum and minimum functions
F X x Cumulative distribution function (CDF) of RV X
F ¯ X x Complementary Cumulative distribution function (CCDF) of RV X
M X x Moment generating function (MGF) of RV X
f X x Probability density function (PDF) of RV X
OP a w Outage probability of the D a destination under w scheme
PT w Potential throughput of the whole networks under w scheme
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Tu, L.-T.; Phan, V.-D.; Nguyen, T.N.; Tran, P.T.; Duy, T.T.; Nguyen, Q.-S.; Nguyen, N.-T.; Voznak, M. Performance Analysis of Multihop Full-Duplex NOMA Systems with Imperfect Interference Cancellation and Near-Field Path-Loss. Sensors 2023, 23, 524. https://doi.org/10.3390/s23010524

AMA Style

Tu L-T, Phan V-D, Nguyen TN, Tran PT, Duy TT, Nguyen Q-S, Nguyen N-T, Voznak M. Performance Analysis of Multihop Full-Duplex NOMA Systems with Imperfect Interference Cancellation and Near-Field Path-Loss. Sensors. 2023; 23(1):524. https://doi.org/10.3390/s23010524

Chicago/Turabian Style

Tu, Lam-Thanh, Van-Duc Phan, Tan N. Nguyen, Phuong T. Tran, Tran Trung Duy, Quang-Sang Nguyen, Nhat-Tien Nguyen, and Miroslav Voznak. 2023. "Performance Analysis of Multihop Full-Duplex NOMA Systems with Imperfect Interference Cancellation and Near-Field Path-Loss" Sensors 23, no. 1: 524. https://doi.org/10.3390/s23010524

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop