Next Article in Journal
Improvement of Frequency Responses of MSBL-Based Approximate Fractional-Order Derivative Operator and Its Digital Realization with FPGA
Previous Article in Journal
Evaluation of the Interactions of Multiple Inverter-Based Resources Using 2DOF Elastic Energy Equivalent System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Content-Centric Clustering and Power-Diverse Allocation in Downlink Network-Coded Multiple Access System

Air Force Engineering University, Xi’an 710038, China
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(22), 4477; https://doi.org/10.3390/electronics14224477
Submission received: 24 October 2025 / Revised: 10 November 2025 / Accepted: 12 November 2025 / Published: 17 November 2025

Abstract

Aiming to boost the throughput performance in mobile networks, network-coded multiple access (NCMA) has been proposed as a new framework in non-orthogonal multiple access (NOMA). Normally, user-centric design is adopted in NCMA to allocate the same power to different users. However, devices and the corresponding messages may have different quality-of-service (QoS) requirements (such as delay or throughput) due to the potential content diversity in Internet of Things (IoT) networks. In this paper, we present a power-diverse NCMA (PD-NCMA) system. In particular, a two-stage framework in NCMA downlink is adopted. Based on the throughput requirement of content, messages are given different levels, and content-centric clustering is solved dynamically in the first stage. Then, power allocation in each cluster is realized in the second stage. Numerical results demonstrate the feasibility of the proposed PD-NCMA, and the throughput of PD-NCMA significantly outperforms the traditional NCMA system.

1. Introduction

With the increasing number of mobile devices and data traffic connections, spectrum resources are becoming increasingly scarce [1]. To cope with the ever-growing demands for wireless capacity, non-orthogonal multiple access (NOMA) [2,3] is proposed and regarded as one of the promising spectrally efficient methods in sixth-generation (6G) wireless networks [4]. The typical NOMA technologies allow multiple users to share the same resource block with varied power, increasing the spectrum efficiency of the communication system [5]. As a representative of code-domain NOMA, sparse code multiple access (SCMA) [6] also exhibits excellent performance in the uplink with sporadic traffic. In addition, NOMA has also achieved performance improvement in low-latency [7] and -security [8] areas. Aiming to further enhance throughput performance, a new NOMA architecture named network-coded multiple access (NCMA) [9] is proposed. Unlike the conventional NOMA, which utilizes successive interference cancellation (SIC), NCMA combines physical layer network coding (PNC) [10] with multiuser decoding (MUD) to perform parallel decoding [11].
The original power-balanced NCMA (PB-NCMA) scheme [9] only considered low-order modulation and could only be utilized in uplink scenarios, which limited the deployment of NCMA. In [12], an enhanced symbol-level decoder, which retains the inter-correlation information among bits, was proposed to generalize PB-NCMA to high-order modulation. In addition, ref. [12] also pointed out that the phase rotation caused by channels has a severe impact on the PB-NCMA system. By adopting rate-diverse design, ref. [13] significantly improved throughput performance in uplink PB-NCMA. Furthermore, ref. [13] extended PB-NCMA to a three-user system to demonstrate multiuser performance. Nevertheless, this method increases the state of the PNC decoder and requires devices to adjust continually to accommodate more users [14], which is not conducive to multiuser NCMA. In [15], PB-NCMA was first extended to downlink communication, and artificially added phase rotation, referred to as phase rotation NCMA (PR-NCMA), was used to further boost throughput. Experimental results demonstrated the robustness of PB-NCMA and PR-NCMA designs in downlink systems. In order to improve the communication performance of remote users, ref. [16] put forth a NCMA-based coordinated direct and relay transmission (CDRT) method.
Despite the extensive research conducted on NCMA systems, downlink scenarios remain relatively underexplored in the existing literature. Furthermore, most prior studies adopt a user-centric, power-balanced design approach that assumes uniform user requirements. However, such an approach overlooks the inherent diversity in content and service demands [17,18,19], such as the practical downlink sensor networks, where some devices require extensive control data while others operate with minimal information [17]. Moreover, video users demand significantly higher throughput than voice users in cellular networks [19]. Traditional user-centric methods may not achieve maximum throughput performance.
In this paper, we propose a power-diverse design in NCMA multiuser downlink, referred to as PD-NCMA. More precisely, we consider a content-centric dynamic multiuser framework with two stages. In the first stage, users are grouped dynamically according to the content levels. Different from conventional PB-NCMA [12] and PR-NCMA [15], power-diverse design is adopted in the second stage since it improves MUD performance dramatically, which is critical to boost throughput. We compare several NCMA algorithms in Table 1.
The main contributions of this paper are summarized as follows:
  • We propose a power-diverse downlink NCMA framework that exploits content heterogeneity to improve throughput without requiring channel-state information.
  • Content-centric clustering followed by priority-driven power allocation is introduced in this paper, which enhances the MUD and throughput performance. The proposed scheme achieves higher throughput than existing PB-NCMA and PR-NCMA schemes in low-to-medium Signal-to-Noise Ratio (SNR) regions.
The rest of this paper is structured as follows. The multiuser NCMA downlink structure is presented in Section 2. In Section 3, dynamic clustering and power allocation design in PD-NCMA are introduced. Comprehensive simulation results will be assessed in Section 4, followed by the conclusion in Section 5.

2. Multiuser NCMA Downlink System

2.1. System Model

Consider the downlink system consisting of M users and 1 base station (BS) in Figure 1. M user devices are divided into N clusters. Notice that users and the BS can be considered sensor devices and control nodes or other equipment, respectively. Here we adopt a general description (user, BS, etc.) to introduce the system structure. It is worth noting that since the energy and efficiency performance of user equipment in downlink is much weaker than that of the BS, the number of users in one cluster needs to be further limited [20]. In addition, users are usually grouped pairwise to ensure decoding complexity in the NCMA system [21]. Thus, we adopt the same configuration. Each cluster contains two or one user (in general, two users per group is the recommended configuration, but when the number of users is odd, one user will be grouped separately), while each device only can be in one cluster. Thus, N = M 2 , where is the ceil operator. We assume that the total power budget of the BS is P T , and the power among clusters is equal. Consequently, the power of cluster i satisfies i = 1 N P i = P T . Additionally, frequency blocks are orthogonally occupied by clusters. Therefore, the impact among clusters is negligible and conventional NCMA (or the proposed PD-NCMA) method can be adopted in any cluster.

2.2. Information Processing of PD-NCMA

Without the loss of generality, a random cluster i ( i = 1 , 2 , , N ) is selected to describe the PD-NCMA scheme. Different user devices are represented by A and B, respectively. As depicted in Figure 2, complete PD-NCMA downlink propagation includes both PHY layer and MAC layer processing. The MAC layer large message for user s ( s { A , B } ) in cluster i is denoted by M i s . The Reed–Solomon (RS) code (other advanced erasure channel codes (such as fountain codes) are also possible at the NCMA MAC layer) is used at the MAC layer to encode message M i s into multiple packets C i j s where j = 1 , 2 , :
C i s = G M i s = [ C i 1 s , C i 2 s , , C i j s ] T .
Notice that G represents the invertible generator matrix [22] for the RS code, and C i s is the set of multiple packets C i j s . C i j s further channel-coded into V i j s and modulated into X i j s at the PHY layer. Both user devices utilize the same modulation order, and the same convolutional code is adopted as for the PHY layer channel codes. Unlike PB-NCMA and PR-NCMA, the proposed PD-NCMA allocates varying power to the underlying signals X i j s of two users without channel information (Dynamic clustering and power allocation will be further discussed in Section 3). The power assigned to user s in cluster i is denoted by P i s , and the superposed signal of { X i j A , X i j B } can be expressed as
X i j A B = P i A X i j A + P i B X i j B .
NCMA superposed signals X i j A B are then broadcast to users A and B continuously. At the receiver of user s in cluster i, the received signal is
Y i j s = H i j s X i j A B + W i j s ,
where H i j s is the downlink channel gain from the BS to user s, and W i j s is complex Gaussian noise. Both MUD and PNC detectors are equipped at the PHY layer to decode C i j A , C i j B , and C i j A C i j B . Notice that C i j A C i j B is the bit-wise exclusive OR (XOR) of C i j A and C i j B . A detailed derivation of the PNC and MUD detectors was introduced in [15]. After the bridging operation and MAC layer RS decoding of { C i j A C i j B , C i j A , C i j B } , each user can recover the original large message M i s after receiving enough C i j s . We focus on an example to explain the bridging operation. Figure 3 demonstrates the decoding outcomes in 5 continuous parts. In the third section, C i 3 A and C i 3 A C i 3 B are decoded by the MUD detector and PNC detector, respectively. Hence, PHY layer bridging [9], which utilizes the complementary XOR packet C i 3 A C i 3 B and C i 3 A , can be applied to recover C i 3 B . Since an L = 3 RS code is considered in the MAC layer to encode the original message into multiple packets, users need only L = 3 packets to recover the message. As a result, user B can recover M i B completely. This operation also means that the native packets C i 4 B and C i 5 B can be decoded synchronously based on re-encoding the recovered MAC layer message M i B , whereupon the original lone PNC packet C i 4 A C i 4 B can be utilized to recover C i 4 A with C i 4 B . This operation is known as MAC layer bridging [9]. As a result, user A now possesses enough native packets C i j A , j = 3 , 4 , 5 , to recover M i A .
The proposed system employs complex-field superposition, where modulated signals are added in the wireless channel. Then, the Galois Field (GF) in Figure 3 enables efficient packet-level recovery without retransmission. This two-layer approach is standard in NCMA architecture [13,15] and not an inconsistency.

3. Dynamic Clustering and Power Allocation Design in PD-NCMA

In the traditional NOMA system, devices with better channel conditions will be allocated less power. The main purpose of this user-centric design is to maximize the sum rate. Therefore, it requires that the channel conditions of user devices in one cluster are sufficiently different. In practice, due to potential content diversity [17,18,19], user equipment and the corresponding messages may have different priorities. Notice that such content priorities are often defined with specific requirements. For example, in a BS-centric downlink network, devices receiving large-capacity data (such as video) will be sent much higher priorities than the devices receiving text messages to ensure the throughput requirements.
Different from the traditional NCMA system, we consider a content-centric design in PD-NCMA. Device clustering is solved first, and power allocation will be adjusted dynamically based on message priority. In addition, we will allocate more power to users with higher priorities to ensure their communication performance. In other words, users in our scheme need to have priority differences within each cluster. This design ensures that power allocation aligns with service demands rather than channel states, which is particularly advantageous in Internet of Things (IoT) scenarios with diverse QoS requirements.

3.1. Content-Centric Clustering

Due to the potential diversity of the content being transmitted, the BS sorts all M user devices in descending order of their throughput requirements. Then, the BS assigns different message priorities to users according to the sorted results. Devices with high throughput requirements will be set much higher priorities. The sorted results are denoted by r 1 r 2 r M , where
r m = M m + 1 , m = 1 , 2 , , M
represents message priority, i.e., r 1 = M and r M = 1 denote the highest and lowest message priority, respectively. In order to ensure priority difference within clusters and allocate more power to high-priority messages, we propose two differentiation clustering methods.
  • Method 1: User device with message priority r m forms a cluster with r M m + 1 , m = 1 , 2 , , M . (i.e., the user device with the highest message priority r 1 forms a cluster with the lowest one r M ). If M is an even number, user devices are clustered pairwise. Nevertheless, a device with the priority r M + 1 2 forms a single-user cluster if M is an odd number.
  • Method 2: Two cases are considered in Method 2. If M is an even number, users are first sorted and divided into 2 groups. Group 1 and group 2 are denoted as { r 1 , r 2 , , r M 2 } and { r M 2 + 1 , r M 2 + 2 , , r M } , respectively. Then, a user device with message priority r i forms a cluster with r M 2 + i , i = 1 , 2 , , M 2 (i.e., the user device with message priority r 1 forms a cluster with r M 2 + 1 ). If M is an odd number, users are first sorted and divided into 2 groups: { r 1 , r 2 , , r M 1 2 } and { r M + 3 2 , r M + 5 2 , , r M } . Then, a user device with message priority r m forms a cluster with r M + 1 + 2 m 2 , m = 1 , 2 , , M 1 2 . Furthermore, a device with priority r M + 1 2 forms a single user cluster.
Figure 4 demonstrates the clustering results for a six-user system under two schemes. According to the sorting result, user 1 is configured with the highest message priority r 1 = 6 , since it posses the highest throughput requirement. The priorities of other users are analogous. User devices then cluster according to the proposed clustering schemes. In a nutshell, the intuitive motivation behind clustering methods is to allocate varying power to users in each cluster and make the power difference large enough. This is because our power allocation in the second stage is related to message priority, so we need to cluster users according to the corresponding priority in the first stage.

3.2. Dynamic Power Allocation

Consider the power allocation problem in cluster i; we assume that the user with higher message priority is A and the other is B. The message priorities of A and B can be denoted as r i A and r i B , respectively.
Since users within each cluster have differrent message priorities, we adopt a priority-based power allocation strategy. Users in each cluster will be allocated power based on their priorities as follows:
P i s = r i s r i A + r i B P i ,
where s { A , B } , i = 1 , 2 , , N , P i represents the total power of cluster i. The superiority of the considered power allocation method is that more power can be allocated to high-priority users to ensure communication performance. Meanwhile, the performance of low-priority user is not significantly degraded thanks to the PNC and bridging operation in NCMA (More details will be illustrated in simulation results). Without the loss of generality, a user will be assigned the total power of one cluster if it forms a single user cluster.

3.3. PHY Layer Processing and Union Bound

As depicted in Figure 5, the received signal is fed into PNC and MUD decoders simultaneously to decode C i j A , C i j B and C i j A C i j B .
First, let us focus on PNC decoder processing. Y i j S passes through the PNC demodulator to get XOR bits V i j A V i j B . Notice that both PNC and MUD demodulators adapt the maximum a posteriori (MAP) method, which is derived in detail in [15]. Then, the standard Viterbi decoder is adopted after the demodulator to obtain packets C i j A C i j B .
Suppose that the superposed constellation point X i j A B = x k is sent ( X i j A B is defined in (2)). Thus, the superposed result at the receiver can be denoted as y k = x k + w , where w is the complex Gaussian noise with variance N 0 . Similarly to the analysis method in [15], we adopt the unit channel gain to explain the symbol error rate (SER) in simple terms. The SER for the PNC decoder can be expressed as
P e P N C x k l = 1 , l k ( x k ) x l K P y k x l < y k x k = l = 1 , l k ( x k ) x l K P w + x k x l < w = l = 1 , l k ( x k ) x l K P w > d k l 2 l = 1 , l k ( x k ) x l K Q d k l 2 N 0 ,
where K denotes all possible superposed constellation points (e.g., for QPSK, K = 16 ). is the PNC mapping operation in [12]. d k l represents the Euclidean distance between superposed constellation points x k and x l . In consequence, the union bound can be derived by summing over all possible x k :
P e P N C = k = 1 K P x k P e P N C x k 1 K k = 1 K l = 1 , l k ( x k ) x l K Q d k l 2 N 0 .
As for the MUD decoder, it follows a similar process to the PNC decoder. Y i j S passes through the MUD demodulator to get coded bits V i j A and V i j B . Then, two standard Viterbi decoders are adopted after the MUD demodulator to obtain packets C i j A and C i j B for user A and user B, respectively. Similarly, the SER of the MUD decoder can be expressed as
P e M U D x k l = 1 , l k Ω ( x k ) Ω x l K Q d k l 2 N 0 ,
where Ω is the MUD demodulation operation. Furthermore, the SER union bound of the MUD decoder is defined as
P e M U D = k = 1 K P x k P e M U D x k 1 K k = 1 K l = 1 , l k Ω ( x k ) Ω x l K Q d k l 2 N 0 .
The detailed results of the SER union bound will be demonstrated in Section 4.

3.4. Throughput Analysis

The overall throughput for the NCMA system in each simulation is defined as
T h = i = 1 N ( T h i A + T h i B ) = i = 1 N ( L A × N A S A + L B × N B S B ) ,
where L A ( L B ) is the theoretical number of small packets for user A (or B) to recover one MAC layer message. Thus, L A ( L B ) is equal to the RS code parameter L. N A ( N B ) represents the total number of MAC layer messages for user A (or B). S A ( S B ) denotes the total actual number of small packets for user A (or B) to recover all MAC layer messages.

3.5. Complexity Analysis

The computational complexity comes from two parts. In terms of device clustering, the quick-sort algorithm is adopted to sort users, and the corresponding computational complexity is O ( M l o g 2 M ) . As for power allocation, computational complexity is mainly determined by (5), that is, a small amount of multiplication and addition. Compared with the device clustering part, computational complexity caused by power allocation is negligible. Hence the computational complexity of the algorithm is determined by quick sort O ( M l o g 2 M ) , where M represents the total number of users. Obviously, the proposed method has low computational complexity.
Notice that the computational complexity of the PHY layer is also important to NCMA. The received signal is first fed into PNC and MUD decoders to obtain the soft information. According to the LLR analysis in [15], the computational complexity of the decoder is determined by the modulation orders. If both user A and user B in one cluster adopt M-order modulation (e.g., M = 4 corresponding to QPSK), the complexity is O ( M 2 ) . Then the Viterbi decoder is adopted after decoders to obtain packets. The complexity of Viterbi decoding is mainly determined by the constraint length K of the convolutional code and the number of states S, where S = 2 K 1 . Its computational complexity is O ( S N ) , where N is the length of the received sequence.

4. Simulation Results

In the following experiments, we illustrate numerical results of the proposed PD-NCMA. We compare PD-NCMA with PB-NCMA [13] and PR-NCMA [15]. Notice that we adopt PD-NCMA-1 and PD-NCMA-2 to denote the proposed design, since we consider two different clustering methods in previous section. Similarly, PR-NCMA-1 and PR-NCMA-2 are introduced to represent the PR-NCMA scheme with phase rotations of 25° and 45°, respectively. A phase rotation of 25° is considered, since it was empirically optimized in [13] for PR-NCMA-1 to maximize the minimum Euclidean distance of superimposed constellations and improve decoding reliability. To enable a more comprehensive comparison of PR-NCMA, we additionally include 45° as a comparative parameter for PR-NCMA-2. We summarize the simulation schemes as follows:
  • PB-NCMA [13]: Conventional NCMA method with a power-balanced design.
  • PR-NCMA-1 [15]: Phase rotation-based NCMA method with a relative phase offset of 25°.
  • PR-NCMA-2 [15]: Phase rotation-based NCMA method with a relative phase offset of 45°.
  • PD-NCMA-1: Proposed power-diverse NCMA scheme with Clustering Method 1.
  • PD-NCMA-2: Proposed power-diverse NCMA scheme with Clustering Method 2.
Furthermore, in Section 4.3, we also derive a specific power allocation coefficient by simulating union bounds and cluster throughput rather than the proposed content-centric design to further demonstrate the performance improvement of power-diverse method.
We consider a NCMA downlink system with 6 users in a Rayleigh channel. The channel coefficients H i j s are randomly generated according to the distribution H i j s CN ( 0 , 1 ) in each independent simulation. All user devices share the same RS code parameter L = 8 . Additionally, the [ 133 ,   171 ] 8 convolutional code is adopted for all users. Power among clusters is equal. All results are averaged over 6000 Monte Carlo simulations. For the BER performance of the MUD decoder, each simulation is averaged from user A (or B) of all clusters. Since the PNC decoder decodes the XOR packets, each simulation of the PNC decoder is averaged from both user A and B across all clusters.

4.1. BER Performance of PNC and MUD Decoders

First, let us focus on the MUD performance of high-priority users in each cluster. It can be seen from Figure 6 that PD-NCMA and PR-NCMA significantly outperform PB-NCMA. The conventional PB-NCMA can hardly work since the superposition of the same constellation points of user A and B seriously affects the MUD detector. By introducing phase rotation artificially, PR-NCMA alleviates the constellation points’ superposition and improves MUD performance effectively. Besides, the proposed content-centric PD-NCMA adopts a differentiated power configuration. Users with high message priority are allocated more power to boost MUD performance. It is obvious that PD-NCMA-2 is fully ahead of other algorithms, which also reveals that content-centric design improves performance significantly. Nevertheless, PD-NCMA-1 is inferior to PD-NCMA-2 and PR-NCMA at high SNRs since Method 1 in clustering leads to an inconspicuous power difference between users with similar priorities (i.e., user 3 and user 4 in Figure 4). Fortunately, the proposed PD-NCMA-1 still fully outperforms PB-NCMA.
Figure 7 demonstrates the BER performance of the MUD decoder of user B. Since user B is the low-priority user within each cluster, the MUD performance of PD-NCMA-1 is obviously inferior to that of PR-NCMA. However, due to a better power differential clustering design, PD-NCMA-2 shows nearly the same performance as PR-NCMA-1, even surpassing PR-NCMA-2 at high SNRs. In addition, the performance of the proposed PD-NCMA is still much better than that of PB-NCMA.
In Figure 8, the PNC performances of PD-NCMA and PR-NCMA both show degradation, since the minimum distance of different XOR constellations is reduced. Nevertheless, due to the huge improvement in MUD, the performance degradation of the the PNC decoder has a negligible impact on overall performance. This can also be verified in throughput simulation.

4.2. Packets Number Comparison

Figure 9 illustrates the number of packets required to correctly recover message M i A . Notice that we adopt L = 8 in the RS code; thus, the minimum number of packets to decode the message is 8. It can clearly been seen that both PR-NCMA and PD-NCMA can reach this lower bound in high-SNR ranges. Furthermore, PD-NCMA is fully ahead of other methods in low-SNR ranges, since the power-diverse design improves MUD performance significantly (Figure 6).
In Figure 10, we compare the number of packets required to correctly recover message M i B . Interestingly, it is observed that PD-NCMA-2 is still ahead of the other methods in low-SNR ranges, in sharp contrast to the common belief that PR-NCMA-1 should outperform PD-NCMA-2 because of better MUD performance in Figure 7. This observation is because the bridging operations in both the PHY and MAC layer utilize the correctly decoded M i A to boost the M i B decoding. Therefore, M i B decoding will be promoted by the performance of M i A decoding, even if M i B is allocated less power.
Considering user B (low-power user) in cluster i, we first derive a specific value of power allocation by simulating union bounds and cluster throughput rather than priority. Notice that P i A + P i B = P i = 2 is adopted. As a consequence, P i A can be determined when P i B is obtained. Notice that it can also start with user A to get P i A first. Furthermore, P i B = P i P i A = 2 P i A .

4.3. SER Union Bound and Throughput Performance

Figure 11 demonstrates the SER union bound of the MUD and PNC decoder under different P i B . It is worth noting that although PNC and MUD have almost the same SER union bound formulas (refer to (7) and (9)), their results are still quite different. P e P N C decreases gradually with the increase in power, while P e M U D decreases first and then increases. The main reason for this phenomenon is that the mapping operation of PNC is different from that of MUD Ω , which leads to different Euclidean distance statistics of superimposed constellation points (more details about mapping operation analyses can be found in [12]). Hence, it can be seen from Figure 11 that the specific value of P i B should be between 0.6 and 1.
Then, we determine the specific value according to the throughput results within the cluster. From Figure 12, we can see that the throughput has a relatively stable performance between 0.69 and 0.75. Hence, we set P i B = 0.72 as the specific value to get better throughput performance. At this point, we have completed power allocation without considering priority. We refer to this approach as PD-NCMA-SV, and it is adopted in each cluster to further compare the overall throughput. Notice that PD-NCMA-SV adopts the same random grouping strategy as PB-NCMA and PR-NCMA; the only difference lies in power allocation.
As shown in Figure 13, the overall throughput performance of PD-NCMA-2 is much higher than that of PB-NCMA and PR-NCMA, especially at low- and medium-SNR ranges. PD-NCMA-1 exhibits similar performance but with reduced performance at high SNRs. The main reason for these results is due to the performance variation in the MUD decoder (Figure 6 and Figure 7). As for PD-NCMA-1, despite its suboptimal performance relative to PD-NCMA-2, it serves an important analytical purpose. It demonstrates that power diversity alone (via extreme priority pairing) yields throughput gains over PB-NCMA, while also revealing that a balanced clustering design is critical for maximizing these benefits. This comparison validates that both the clustering methodology and power allocation strategy contribute to PD-NCMA’s overall performance.
The total throughput of PD-NCMA-SV is still far ahead of PB-NCMA and PR-NCMA, even without considering the content-centric design. It indicates that the performance gain from power allocation in NCMA can not be neglected. However, PD-NCMA-SV needs to find an appropriate value based on the union bound and cluster throughput performance, which vary with SNRs. Therefore, PD-NCMA-SV cannot guarantee global optimality. However, in terms of overall throughput performance, NCMA based on power allocation is clearly far ahead of conventional algorithms. Overall, PD-NCMA can boost throughput dramatically.
To verify the generalization performance of the proposed algorithm, we repeated the simulation with 6, 60 and 300 nodes while keeping the same RS code ( L = 8 ). As shown in Figure 14, the average throughput gain of PD-NCMA-2 over PR-NCMA-1 18–22% at 8 dB at the scenario of 300 users, which indicates that the algorithm remains applicable in large-scale user scenarios.
Besides, we have performed a comparative simulation of the PD-NCMA method under both the Rayleigh and Rician channels in Figure 15, where the Rician factor K = 5 is adopted. Other simulation parameters remain unchanged. The proposed algorithm can operate under different channels.
In a single-user cluster, the user has a full power budget and is not affected by superposed constellation points. Its BER and the number of packets required for correct reception will be better than those of paired users. Therefore, its performance will not become a bottleneck for the overall system. Relying on higher power, the MUD detector will exhibit excellent decoding performance in the low-SNR region. We conducted the following simulation.
Figure 16 shows the comparison of BER performance between the user assigned higher power in a normal cluster of PD-NCMA and the user occupying full power. It is obvious that due to the advantage in power, the BER performance of the single user is significantly improved. Similar results can also be observed from the number of required packets to correctly decode the message.
Figure 17 demonstrates the number of packets required to correctly recover the message. In the low-SNR region, the single user requires fewer packets due to the gain brought by occupying the full power. However, thanks to the PHY and MAC layer bridging operations, starting from 8 dB, the performance of both parties basically approaches the lower limit value of the RS code specified in the simulation parameters. We also compared the performance between 5, 6, and 7 users.
As can be seen from Figure 18, the final throughput of systems with different numbers of users approaches the upper limit value. In the low-SNR region, the difference in performance is relatively small.

5. Conclusions

In this paper, we have addressed a critical limitation of conventional NCMA systems by proposing a power-diverse, content-centric framework for downlink multiuser scenarios. The proposed PD-NCMA scheme dynamically clusters users based on message priorities and allocates power proportionally to throughput demands. Our priority-based strategy successfully boosts critical messages while leveraging NCMA’s bridging operations to safeguard low-priority users. Monte Carlo simulations validate that PD-NCMA outperforms PB-NCMA and PR-NCMA, achieving up to 30% reduction in decoding packets. The overall system throughput is also superior to other algorithms. Future work could be generalized to clusters using hierarchical grouping, integrate adaptive modulation and coding for dynamic environments, employ reinforcement learning for real-time priority-power optimization, prototype on SDR platforms for latency validation, and investigate energy–throughput trade-offs for battery-powered IoT devices. These directions will enhance the applicability of PD-NCMA.

Author Contributions

Conceptualization, Q.L.; Methodology, Q.L.; Software, X.X.; Validation, J.D.; Formal analysis, C.L.; Investigation, Q.L.; Resources, X.X.; Data curation, X.X.; Writing—original draft, J.D.;Writing—review & editing, Q.L. and J.D.; Visualization, Q.L.; Supervision, X.X.; Project administration, J.D.; Funding acquisition, J.D. and C.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Mondal, S.; Bepari, D.; Chandra, A.; Singh, K.; Li, C.P.; Ding, Z. A Comprehensive Survey on NOMA-Based Backscatter Communication for IoT Applications. IEEE Internet Things J. 2025, 12, 18929–18953. [Google Scholar] [CrossRef]
  2. Tusha, A.; Arslan, H. Interference Burden in Wireless Communications: A Comprehensive Survey from PHY Layer Perspective. IEEE Commun. Surv. Tutor. 2025, 27, 2204–2246. [Google Scholar] [CrossRef]
  3. Chen, J.; Xiao, Y.; Lei, X.; Ding, Y.; Niu, H.; Liu, K.; Zhong, Y.; Yang, S.; Fusco, V.; Xiang, W. A Survey on Directional Modulation: Opportunities, Challenges, Recent Advances, Implementations, and Future Trends. IEEE Internet Things J. 2025, 12, 32581–32615. [Google Scholar] [CrossRef]
  4. Wang, X.; Chen, H.; Tan, F. Hybrid OMA/NOMA Mode Selection and Resource Allocation in Space-Air-Ground Integrated Networks. IEEE Trans. Veh. Technol. 2024, 74, 699–713. [Google Scholar] [CrossRef]
  5. Khan, M.S.; Jangsher, S.; Qureshi, H.K.; Hassan, S.A.; Mumtaz, S.; Al-Dweik, A. Edge Users Spectrum Efficiency Maximization Using Spatially Aligned Carrier Aggregated NOMA in Dense Multi-Cell Networks. IEEE Trans. Veh. Technol. 2025, 74, 6138–6152. [Google Scholar] [CrossRef]
  6. Miuccio, L.; Panno, D.; Riolo, S. An Energy-Efficient DL-Aided Massive Multiple Access Scheme for IoT Scenarios in Beyond 5G Networks. IEEE Internet Things J. 2023, 10, 7936–7959. [Google Scholar] [CrossRef]
  7. Nie, D.; Yu, W.; Foh, C.H.; Ni, Q. A NOMA-Enhanced Two-Step RACH Procedure for Low-Latency Access in 5G Networks. IEEE Internet Things J. 2025, 12, 11568–11580. [Google Scholar] [CrossRef]
  8. Li, J.; Zheng, L.; Dang, S.; Chen, X.; Wen, M.; Peng, Y. Composition Index Modulation for Physical Layer Security in NOMA Networks. IEEE Trans. Veh. Technol. 2025, 74, 6868–6872. [Google Scholar] [CrossRef]
  9. Lu, L.; You, L.; Liew, S.C. Network-Coded Multiple Access. IEEE Trans. Mob. Comput. 2014, 13, 2853–2869. [Google Scholar] [CrossRef]
  10. Zhang, S.; Liew, S.C.; Lam, P.P. Hot Topic: Physical-Layer Network Coding. In Proceedings of the 12th Annual International Conference on Mobile Computing and Networking, Los Angeles, CA, USA, 23–29 September 2006; Voluem 8, pp. 358–365. [Google Scholar]
  11. You, L.; Liew, S.C.; Lu, L. Network-Coded Multiple Access II: Toward Real-Time Operation With Improved Performance. IEEE J. Sel. Areas Commun. 2015, 33, 264–280. [Google Scholar] [CrossRef]
  12. Pan, H.; Lu, L.; Liew, S.C. Network-Coded Multiple Access with High-Order Modulations. IEEE Trans. Veh. Technol. 2017, 66, 9776–9792. [Google Scholar] [CrossRef]
  13. Pan, H.; Lu, L.; Liew, S.C. Practical Power-Balanced Non-Orthogonal Multiple Access. IEEE J. Sel. Areas Commun. 2017, 35, 2312–2327. [Google Scholar] [CrossRef]
  14. Pan, H.; Lu, L.; Liew, S.C. Multiuser rate-diverse network-coded multiple access. In Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 25–30 June 2017; pp. 2398–2402. [Google Scholar]
  15. Pan, H.; Liew, S.C.; Liang, J.; Shao, Y.; Lu, L. Network-Coded Multiple Access on Unmanned Aerial Vehicle. IEEE J. Sel. Areas Commun. 2018, 36, 2071–2086. [Google Scholar] [CrossRef]
  16. Pan, H.; Liang, J.; Liew, S.C. Practical NOMA-Based Coordinated Direct and Relay Transmission. IEEE Wirel. Commun. Lett. 2021, 10, 170–174. [Google Scholar] [CrossRef]
  17. Chen, Q.; Wang, W.; Yu, F.R.; Tao, M.; Zhang, Z. Content Caching Oriented Popularity Prediction: A Weighted Clustering Approach. IEEE Trans. Wirel. Commun. 2021, 20, 623–636. [Google Scholar] [CrossRef]
  18. Zhang, Z.; Tao, M. Deep Learning for Wireless Coded Caching with Unknown and Time-Variant Content Popularity. IEEE Trans. Wirel. Commun. 2021, 20, 1152–1163. [Google Scholar] [CrossRef]
  19. Tao, M.; Chen, E.; Zhou, H.; Yu, W. Content-Centric Sparse Multicast Beamforming for Cache-Enabled Cloud RAN. IEEE Trans. Wirel. Commun. 2016, 15, 6118–6131. [Google Scholar] [CrossRef]
  20. Shao, X.; Yang, C.; Chen, D.; Zhao, N.; Yu, F.R. Dynamic IoT Device Clustering and Energy Management with Hybrid NOMA Systems. IEEE Trans. Ind. Inform. 2018, 14, 4622–4630. [Google Scholar] [CrossRef]
  21. Pan, H.; Liang, J.; Liew, S.C.; Leung, V.C.; Li, J. Timely Information Update with Nonorthogonal Multiple Access. IEEE Trans. Ind. Inform. 2021, 17, 4096–4106. [Google Scholar] [CrossRef]
  22. Tse, D.; Viswanath, P. Fundamentals of Wireless Communications; Cambridge University Press: Cambridge, UK, 2005. [Google Scholar]
Figure 1. The NCMA downlink structure.
Figure 1. The NCMA downlink structure.
Electronics 14 04477 g001
Figure 2. Information processing of PD-NCMA downlink in cluster i.
Figure 2. Information processing of PD-NCMA downlink in cluster i.
Electronics 14 04477 g002
Figure 3. An example for NCMA bridging and decoding in cluster i; L = 3 is considered for RS code.
Figure 3. An example for NCMA bridging and decoding in cluster i; L = 3 is considered for RS code.
Electronics 14 04477 g003
Figure 4. An example of two clustering methods.
Figure 4. An example of two clustering methods.
Electronics 14 04477 g004
Figure 5. PNC and MUD decoders in PHY layer.
Figure 5. PNC and MUD decoders in PHY layer.
Electronics 14 04477 g005
Figure 6. MUD performance for user A.
Figure 6. MUD performance for user A.
Electronics 14 04477 g006
Figure 7. MUD performance for user B.
Figure 7. MUD performance for user B.
Electronics 14 04477 g007
Figure 8. PNC performance.
Figure 8. PNC performance.
Electronics 14 04477 g008
Figure 9. Required Packets number to correctly decode M i A .
Figure 9. Required Packets number to correctly decode M i A .
Electronics 14 04477 g009
Figure 10. Required Packets number to correctly decode M i B .
Figure 10. Required Packets number to correctly decode M i B .
Electronics 14 04477 g010
Figure 11. SER union bound.
Figure 11. SER union bound.
Electronics 14 04477 g011
Figure 12. Throughput for cluster i.
Figure 12. Throughput for cluster i.
Electronics 14 04477 g012
Figure 13. Total system throughput performance.
Figure 13. Total system throughput performance.
Electronics 14 04477 g013
Figure 14. The system throughput of different user numbers.
Figure 14. The system throughput of different user numbers.
Electronics 14 04477 g014
Figure 15. The system throughput of different channels.
Figure 15. The system throughput of different channels.
Electronics 14 04477 g015
Figure 16. BER performance.
Figure 16. BER performance.
Electronics 14 04477 g016
Figure 17. Required packets number to correctly decode message.
Figure 17. Required packets number to correctly decode message.
Electronics 14 04477 g017
Figure 18. The system throughput performance.
Figure 18. The system throughput performance.
Electronics 14 04477 g018
Table 1. Comparison of several NCMA algorithms.
Table 1. Comparison of several NCMA algorithms.
AlgorithmPB-NCMA [12]PR-NCMA [15]PD-NCMA
ClusteringUser-centricUser-centricContent-centirc
Power allocationEqualEqualPriority-based
Key enhancementNonePhase rotationPower-diverse
PerformanceBaseline20% improvement30–50% improvement
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, Q.; Xiang, X.; Dang, J.; Li, C. Content-Centric Clustering and Power-Diverse Allocation in Downlink Network-Coded Multiple Access System. Electronics 2025, 14, 4477. https://doi.org/10.3390/electronics14224477

AMA Style

Li Q, Xiang X, Dang J, Li C. Content-Centric Clustering and Power-Diverse Allocation in Downlink Network-Coded Multiple Access System. Electronics. 2025; 14(22):4477. https://doi.org/10.3390/electronics14224477

Chicago/Turabian Style

Li, Qiao, Xin Xiang, Jiahao Dang, and Chunhui Li. 2025. "Content-Centric Clustering and Power-Diverse Allocation in Downlink Network-Coded Multiple Access System" Electronics 14, no. 22: 4477. https://doi.org/10.3390/electronics14224477

APA Style

Li, Q., Xiang, X., Dang, J., & Li, C. (2025). Content-Centric Clustering and Power-Diverse Allocation in Downlink Network-Coded Multiple Access System. Electronics, 14(22), 4477. https://doi.org/10.3390/electronics14224477

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop