You are on page 1of 5

Performance Analysis of NOMA Beamforming Multiple Users

Relay Systems
Hoang Duc
. Vinh Pham Thanh
. Hiep Tran Manh
. Hoang
Vietnam post Le Quy Don Technical University Telecommunication University
Ha Noi, Viet Nam. Ha Noi, Viet Nam. Nha Trang, Viet Nam.
Email: vinhhd01062016@gmail.com phamthanhhiep@gmail.com tranmanhhoang@tcu.edu.vn

Vu Van
. Son
Le Quy Don Technical University
Ha Noi, Viet Nam.
sontlc246@gmail.com

Abstract—In order to improve performance of multiple users authors investigated both downlink and uplink of NOMA sys-
(MUs) systems, several relays are deployed to help a base station tems. The dynamic power allocation with undertaking QoS for
(BS) decode and forward signals to end users. We propose different users was proposed. Based on the obtained result, the
that the BS utilize a beamforming approach to transmit its
signal to relays, and then relays forward the received signals authors concluded that the proposed dynamic power allocation
to users by non-orthogonal multiple access (NOMA) scheme. can provides more whippiness to fairness performance of all
The system performance is shown through a close-form out- users. The outage performance and ergodic capacity were
age probability over Rayleigh fading channel with assumption discussed in [9], the authors have analyzed the NOMA system
of perfect successive interference cancellation. The calculation under condition of fairness of quality for users. In [10], the
results are compared with simulation results to verify our
theoretical analysis. Furthermore, the proposed combination of authors discussed on NOMA scheme aspect of cognitive radio,
NOMA and beamforming method is compared with orthogonal in which the power allocation coefficient is chosen to satisfy
multiple access method and an impact of imperfect channel state the predefined requirements of user QoS. The authors in [11]
information on the system performance is also discussed. and [12] proposed the NOMA multiple input multiple output
Index Terms—Non-orthogonal multiple access, close-form out- (MIMO) multiple users (MUs) systems and the results shown
age probability, Successive interference cancellation.
that the performance is improved in case MUs are gathered
into a cluster.
I. I NTRODUCTION
According to applying NOMA technology, the bandwidth
The main technique of NOMA is to use power domain for efficiency of MUs systems is improved, and then the through-
multiple access which adopt superposition codes at a transmit- put is enhanced. These characteristics lead to the fact that
ter and successive interference cancellation (SIC) method to NOMA technology is suitable for MUs system. Furthermore,
detect the desired signals at receivers [1]. While decoding the the NOMA technology is providing an ultrahigh connectivity
received signal, the SIC disposes of superimposed symbols, for many billions of electronic devices by using the non-
and removes the inter-user interference. In downlink NOMA orthogonal properties. Especially, the design for NOMA sys-
scenario, less transmit power is allocated to the users that have tems has a low-complexity when comparing with other multi-
better channel condition, whereas more transmit power is allo- ple access methods such as: multi-user shared access (MUSA),
cated to the users that have worse channel conditions [2], [3]. pattern-division multiple access (PDMA) and sparse-code mul-
The purpose of this strategy is to achieve a balance between tiple access (SCMA) [13].
system throughput and fairness of users [4]. Moreover, NOMA In order to improve performance of MUs systems, several
systems allocate transmit power based on priority of users, relays are deployed to help a base station (BS) decode and
users with higher priority are allocated more power [5], [6]. forward signals to end users. We propose that the BS utilize
Different to orthogonal multiple access (OMA) scheme in a beamforming approach to transmit its signal to relays, and
which multiple users share radio resources, either in time, then relays forward the received signals to users by NOMA
frequency or code, the NOMA system offers better fairness technology. The contributions of the paper are summarized as
of users, even for the users with weak channel gain. The follows.
researches of NOMA are focusing on performance of NOMA • We propose combination of beamforming at the BS and
aspect of different scenarios and summarized as follows. In [7], NOMA technology at the relay to improve the perfor-
the authors investigated a NOMA downlink system, where all mance of downlink MUs MIMO relay systems, and the
users locate randomly, and derived the close-form expressions performance of system is analyzed theoretically.
of outage probability as well as ergodic capacity. In [8], the • The close-form expression of outage probability is de-
rived in order to evaluate the system performance. The B. Received signals of users
mathematical result is compared with simulation result to Assuming that, the minimum mean squared error (MMSE)
confirm the close-form expressions. is utilized, the channel matrix and the channel coefficient are
The rest of the paper is organized as follows. Section II denoted by hm and gn , respectively. In addition, ⌦A with
presents the system model of downlink MUs NOMA relay A 2 {SRm , Rm Dn } is the channel gain norm of the hm .
system. The performance analysis is given in Section III. To keep a balance between complexity of implementation
Numerical results are presented in Section IV. Finally, the and performance of system, we use zero-force beamforming
Section V concludes the work. (ZFBF) at the BS. We design a weight wm for the mth cluster
to mitigate the interference from the other clusters.
wm can be represented as the projection of hm in the
II. D OWNLINK MU RELAY SYSTEMS
null space of the interference channels related to the mth
cluster, therefore in order to maximize the channel gain while
A. System Model
canceling the inter-cluster interference. Mathematically, wm is
given as
⇧m hm
wm = , (1)
k⇧m hm k
where ⇧m = IN Hm (HH
m Hm )
1
HH
m and the matrix Hm is
given as

User 1
Hm = [h1 , h2 , · · · , hm 1 , hm+1 , · · · , hM ]T . (2)
Consequently, Hm has one dimension greater than zero, end
User 1 then the signals can be transmitted to the relay.
hH
m wj = 0, 8m 6= j. (3)

User 1 Hence the signals are intended to the mth cluster is given
by
N p
X
xS,m = wm an PS xn , (4)
n=1
User 1
where PS = E{|xS,m |2 }, an denotes the power allocation
PN
BS coefficient for the (n)th user and n=1 an = 1.
The M ⇥ 1 vector xS is broadcast over single cell to the all
relays. The received signal at the relays can be given as
Fig. 1. System model of downlink MUs relay systems N p
X M p
X
yR = hm wm an PS xS,m + hm wj ak PS xS +nm,n ,
The system model of downlink MUs relay systems is |
n=1
{z } |
m=1
{z }
depicted in Fig.1, the relays (R) are located between a base mth beam other beams
station (BS) and users to forward signals of BS to users. Users (5)
are grouped into several clusters, and one relay serves one where xS = [xS,1 , · · · , xS,m 1 , xS,m+1 , · · · , xS,M ]T .
cluster. The direct link from the BS to each user is unavailable We assume that beamforming is perfect, the received signal
due to far distance and showing fading. We assume that the of the mth relay is given as
BS and every relay are configured with Nt and Nr antennas,
N p
X
respectively. The number of clusters equals the number of
relays as M , and the number of users in every cluster is ym,R = hm wm an PS xm + nm,n
n=1
N . According to the NOMA technology and DF protocol, N
the SIC is performed at the relay and users to remove the p X p
= hm wm an PS xm + hm wm am,i PS xm,i
inter-user interference (IUI). xS,m = [xm,1 , · · · , xm,N ]T with | {z }
i=n+1
m 2 [1, . . . , M ], n 2 [1, . . . , N ] and E{|xS,m |2 } = 1 denotes desired signal of (m, n)th user | {z }
the transmit signals of the BS for all the users in the mth interference of other user
n
X1
cluster, and before transmitting to the relay, it is multiplied p
+ hm wm ⇠1 am,k PS xm,k +nm , (6)
by a Nt ⇥ 1 beamforming vector wm , which is assumed to
k=1
be normalize kwm k2 = 1 in order to cancel the inter-cluster | {z }
interference. interference of imperfect SIC
2r
where nm = [n1 , · · · , nN ] 2 C1⇥N with nm ⇠ CN (0, m 2
) where th = 2 1 ↵ 1.
is an i.i.d additive white Gaussian noise (AWGN)Pn 1 pat the mth From SNR equations is given in (8) and (9) we have the
relay. In case of perfect SIC, the term hm wm k=1 ak PS xk outage probability in case of perfect SIC as in (13), it is shown
equals to zero. in the top of the next page.
After receiving the signals, the relays re-encode and forward Now, let us denote, X = |hm wm |2 and Y = |gn |2 for
the signal to the users. The received signal of the nth user in notational convenience.
the mth cluster (hereafter called (m, n)th user) is represented Hence the cumulative distribution function (CDF) and prob-
as follows. ability density function (PDF) of X and Y are given as

p XN p ⇣ x ⌘K
X1 1 ⇣ x ⌘k
y Dn = gn bn PR xm + gn bi PR xi FX (x) = 1 exp ,
| {z } i=n+1 (1 ⇢)⌦SR k! (1 ⇢)⌦SR
| {z } k=0
desired signal of (n)th user
interference of other user (14)
Xn 1 p
+ ⇠2 bk PR gn xk +wDn . (7)
| k=1
{z } xK 1 ⇣ x ⌘
interference of imperfect SIC fX (x) = K
exp . (15)
(K)[(1 ⇢)⌦SR ] (1 ⇢)⌦SR
With assumption of |g1 |2 <, · · · , < |gN |2 , the SIC process-
Based on the ordered statistics, the PDF of channel gain
ing removes the interference from the other users which have
|gn |2 can be written as [14, eq, (6.58)].
stronger power, i.e., the interference of (k = 1, . . . , n 1)th
users is removed. The signal to interference plus noise ratio fY (y) = N f|gj |2 (x)[F|gj |2 (y)]N 1
. (16)
(SINR) of (m, n)th user at the mth relay and at the end user
is denoted by Rn and Dn , respectively. From (6), we have where
1 ⇣ y ⌘
f|gj |2 (y) = exp , (17)
PS an |hm wm |2 (1 ⇢)⌦RDj (1 ⇢)⌦RDj
Rn = PN . (8)
i=n+1 PS ai |hm wm |2 + 2
R,n ⇣ ⌘
y
From (7), when (bi < bn ) the SINR of the (m, n)th user at F|gj |2 (y) = 1 exp . (18)
(1 ⇢)⌦RDj
the end user under the case of perfect SIC can be given as
After performing some manipulations and simplifications, we
PR bn |gn |2
Dn = PN . (9) have the PDF of |gn |2 on the second hop as
2 2
i=n+1 bi PR |gn | + D,n
XN ✓ ◆ ✓ ◆
Noted that, for the DF protocol, the end-to-end SINR of N ( 1)j 1 j jx
fY (y) = exp .
the (m, n)th user is the minimal value between the two hops j=1
j (1 ⇢)⌦RDj (1 ⇢)⌦RDj
BS ! Rm and Rm ! Dn , it means (19)
e2e = min( Rn , Dn ). (10) From (19) the CDF of Y is given by
N ✓ ◆
" ✓ ◆#
III. P ERFORMANCE A NALYSIS X N j 1 jx
A. Outage Probability FY (y) = ( 1) 1 exp .
j=1
j (1 ⇢)⌦RDj
In this section, the outage probability (OP) of the considered (20)
(m, n)th user is derived, the OP is defined as the probability
that makes the transmission rate of the system fall below According to the properties of CDF is that, FY (1) = 1.
the minimum required data rate. Let r1 , rn (bit/s/Hz) is the We
PN canN let y j ! 1 into (20), lead to have result as
minimum required data rate from BS ! Rm and Rm ! Dn , j=1 j ( 1) 1
= 1. Thus, we can rewrite (20) as
respectively. For simply, we set r1 = rn = r, thus the OP of
N ✓ ◆
X ✓ ◆
the system is calculated as N jy
FY (y) = 1 ( 1)j 1
exp .
j (1 ⇢)⌦RDj
h1 ↵ ⇣ ⌘i j=1
OPDn = Pr log2 1 + e2e (21)
⇣ 2 ⌘
= Pr < 21
2r
↵ 1 (11) Base on CDFs and PDFs of both hop, we derive the outage
e2e
probability.
Substitute e2e in (10) into (11) we have OP of nth user in From (13) we can rewrite as
mth cluster as ! !
2
h i 2
th R th D,n
OPDn = Pr min( Rn , Dn ) < th OPDn =1 Pr X Pr Y
PS (an th ã) PR (bn th b̃)
⇣ ⌘ h ih i
= 1 Pr Rn th , Dn th , (12) =1 1 FX (x) 1 FY (y) (22)
!
PS an |hm wm |2 PR bn |gn |2
OPDn = 1 Pr PN th , PN th , (13)
i=n+1 PS ai |hm wm |2 + 2
R i=n+1 bi PR |gn |
2 + 2
D,n

2 2
where x = PS (anth Rth ã) and y = P (b D,n b̃) with ã =
th

R n th 0
PN PN 10
a
i=n+1 i and b̃ = b
i=n+1 i . The = has the mean that,
the an > th ã and bn > th b̃ need to satisfy. Otherwise,
an  th ã and bn  th b̃ the outage always occurs, because,
−1
we only consider the X, Y 2 (0, 1). Hence the allocated 10

power for Dn is more than the others.

Outage Probability
To get the close-form for (22) we replace CDF from (14)
and (21) into (22). Finally we have the outage probability 10
−2
ΩSR = ΩRU = 1
expression as 1
ΩRU = 3, ΩRU = 6
2 3
ρ = 0.05
h ⇣ x ⌘KX1 1 ⇣ x ⌘k i
OPDn = 1 exp 10
−3
(1 ⇢)⌦SR k! (1 ⇢)⌦SR
k=0 Analysis
hX N ✓ ◆ ✓ ◆i User 1− Sim
N jy User 2− Sim
⇥ ( 1)j 1 exp . User 3− Sim

j=1
j (1 ⇢)⌦RDj −4
OMA − Sim
10
0 5 10 15 20 25 30 35 40
(23) Average SNR [dB]

IV. N UMERICAL R ESULTS


Fig. 2. Outage probability versus SNRs of each user with a1 = 0.6, a2 =
In this section, the numerical results are provided to analyze 0.3, a3 = 0.1
the performance of the NOMA beamforming relay system
in the term of outage probability. The simulation parame- 0

ters are set as follows. The threshold data rates of Dn are 10

r1 = r2 = r3 = 1 [b/s/Hz]. The number of relays is ρ=1


M = 3, and each cluster has three users which are served
instantaneous by one relay. The power allocation coefficient 10
−1

of the (m,P n)th user


p an = (N n + 1)/µ, where µ is chosen
N
such that n=1 an PS = 1. To simplify the system design
Outage Probability

and settings, we assume that the power allocation coefficient ρ = 0, 0.2, 0.4, 0.6, 0.8, 0.9
at the BS and the relay are the same.
−2
10
ΩSR = ΩRU = 1
In Fig.2, we present the outage probability of each user 1
ΩRU = 3, ΩRU = 6
versus SNR in dB. The performance of the third user is the best 2 3

although the power allocated for the third user is the lowest. 10
−3

The reason is, the third user is the closest to the relay, i.e., the
channel gain between the relay and the third user is the largest.
Furthermore, the IUI at the third user is completely canceled User2 − Imperfect SIC − Sim
Analysis
by SIC processing, the IUI at the other users is still remained. 10
−4

0 5 10 15 20 25 30 35 40
From the results, we can see that the analytical results perfectly Average SNRs [dB]

match the simulation results, and compared with orthogonal


multiple access (OMA) system, the performance of first and Fig. 3. Outage probability versus average SNR with difference the correlation
second users is lower, whereas the performance of third user coefficient and a1 = 0.6, a2 = 0.3, a3 = 0.1, ⇠1 = ⇠2 = 0.05.
is higher.
The effects of channel estimation error on the system outage
probability is illustrated in Fig.3. The term of correlation V. C ONCLUSIONS
coefficient ⇢, 0  ⇢  1, indicates the correlation coefficient In this paper, the combination of NOMA and beamforming
of true channel state information (CSI) and error CSI, the was proposed for downlink MU systems, and the performance
smaller ⇢ is, the closer the estimated CSI and the true CSI are. of the system was analyzed theoretically based on Rayleigh
The curves show that when the ⇢ increases, it means that the distribution. The close-form expression of outage probability
estimation error increases, the outage performance is worse, is derived and compared with the simulation result. The perfect
especially, when ⇢ = 1 the system is always outage. match between calculation results and simulation results veri-
fied the theoretical analysis method. Furthermore, the proposed
combination of NOMA and beamforming was compared with
the OMA system, and the advantage each method was dis-
cussed. The imperfect CSI was taken into consideration, and
the impact of CSI on the system performance was analyzed.
However, the imperfect beamforming and the imperfect SIC
should be discussed, we leave this issue for our future works.
R EFERENCES
[1] W. Han, J. Ge, and J. Men, “Performance Analysis for NOMA Energy
Harvesting Relaying Networks with Transmit Antenna Selection and
Maximal-Ratio Combining over Nakagami-m Fading,” IET Commun.,
vol. 10, no. 18, pp. 2687–2693, Dec. 2016.
[2] L. Lv, J. Chen, and Q. Ni, “Cooperative Non-Orthogonal Multiple
Access in Cognitive Radio,” IEEE Commun. Lett., vol. 20, no. 10, pp.
2059–2062, Oct. 2016.
[3] M. F. Kader, M. B. Shahab, and S. Y. Shin, “Cooperative Spec-
trum Sharing with Energy Harvesting Best Secondary User Selection
and Non-Orthogonal Multiple Access,” in Proc. of 2017 International
Conference on Computing, Networking and Communications (ICNC):
Wireless Communications. IEEE, Jan. 2017, pp. 46–51.
[4] S. Emam and M. Çelebi, “Non-orthogonal multiple access protocol for
overlay cognitive radio networks using spatial modulation and antenna
selection,” AEU-International Journal of Electronics and Communica-
tions, vol. 86, pp. 171–176, 2018.
[5] P. Deng, B. Wang, W. Wu, and T. Guo, “Transmitter Design in MISO-
NOMA System with Wireless-Power Supply,” IEEE Commun. Lett., Feb.
2018.
[6] W. Shin, M. Vaezi, B. Lee, D. J. Love, J. Lee, and H. V. Poor, “Non-
orthogonal multiple access in multi-cell networks: Theory, performance,
and practical challenges,” IEEE Commun. Mag., vol. 55, no. 10, pp.
176–183, Oct. 2017.
[7] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, “On the performance of
non-orthogonal multiple access in 5G systems with randomly deployed
users,” IEEE Signal Process. Lett., vol. 21, no. 12, pp. 1501–1505, Dec.
2014.
[8] Z. Yang, Z. Ding, P. Fan, and N. Al-Dhahir, “A general power allocation
scheme to guarantee quality of service in downlink and uplink NOMA
systems,” IEEE Trans. Commun., vol. 15, no. 11, pp. 7244–7257, Nov.
2016.
[9] S. Timotheou and I. Krikidis, “Fairness for non-orthogonal multiple
access in 5G systems,” IEEE Signal Process. Lett., vol. 22, no. 10, pp.
1647–1651, Oct. 2015.
[10] Z. Ding, P. Fan, and H. V. Poor, “Impact of user pairing on 5G
nonorthogonal multiple-access downlink transmissions,” IEEE Trans.
Veh. Technol., vol. 65, no. 8, pp. 6010–6023, Sep. 2016.
[11] Z. Ding, F. Adachi, and H. V. Poor, “The application of MIMO to
non-orthogonal multiple access,” IEEE Trans. Commun., vol. 15, no. 1,
pp. 537–552, Jan. 2016.
[12] M. Zeng, A. Yadav, O. A. Dobre, G. I. Tsiropoulos, and H. V. Poor,
“Capacity comparison between MIMO-NOMA and MIMO-OMA with
multiple users in a cluster,” IEEE J. Sel. Areas Commun., vol. 35, no. 10,
pp. 2413–2424, Oct. 2017.
[13] L. Dai, B. Wang, Y. Yuan, S. Han, C.-L. I, and Z. Wang, “Non-
Orthogonal Multiple Access for 5G: Solutions, Challenges, Opportuni-
ties, and Future Research Trends,” IEEE Commun. Mag., vol. 53, no. 9,
pp. 74–81, Sep. 2015.
[14] S. Miller and D. Childers, Probability and random processes: With
applications to signal processing and communications. Academic Press,
2012.

You might also like