You are on page 1of 5

Channel Coding for NOMA Schemes with

A JD or SIC Receiver
Yushu Zhangl, Kewu Pengl,2, Senior Member, IEEE, Jian Songl,2, Fellow, IEEE and Yaqi Sunl
1 Electronic Engineering Department, Tsinghua University
Tsinghua National Laboratory for Information Science and Technology, Beijing 100084, P. R. China
2Shenzhen City Key Laboratory of Digital TV System, Shenzhen 518057, P. R. China
Email: zhang-ys15@mails.tsinghua.edu.cn.{pengkewu.jsong}@tsinghua.edu.cn.sun-yq13@mails.tsinghua.edu.cn

Abstract-In this paper, we investigate the impact of channel JD, which hinges largely upon the characteristics of channel
coding on two kinds of non-orthogonal multiple access (NOMA) codes. For single-user transmission schemes, conventional
schemes, either with a successive interference cancellation (SIC)
strong code, which is also referred to as single-user-oriented
receiver or with a joint decoding (JD) receiver. Firstly, the
information-theoretic individual achievable signal-to-noise ratio
(SU) code in this paper, is always chosen for its near-capacity
(SNR) regions of SIe and JD are analyzed. Then single-user­ capability over point-to-point single-access channel [9], [10].
oriented (SV) code and multi-users-oriented (MV) code are con­ And since there is only one user being decoded at a time in
sidered for SIe and JD, and the practical individual achievable SIC, it's intuitively reasonable to think that SU code can also
SNR regions of SIe and JD with these two kinds of channel codes provide near-capacity performance for NOMA schemes with
are obtained, which provides an intuitive way to evaluate system
performance under different channel conditions and transmission
SIe.
rates. Simulation results show that, the practical boundaries of However, for NOMA schemes with iterative multiuser de­
individual achievable SNR region of SIe generally He inside teetion (MUD) and decoding, SU code is demonstrated to face
the boundaries of JD, as predicted by the theoretical analysis.
the problem of capacity loss at the symmetrie working point
Moreover, SV code, which is capacity-approaching over point-to­
point channel, performs beUer than MV code for SIe, while the over Gaussian Gaussian multiple access channel (MAC) [11],
choice of channel codes for JD depends on transmission rates where users have the same received signal-to-noise ratios
and channel conditions. (SNRs) and transmission rates. Meanwhile, a code designed
Index Terms-Non-orthogonal multiple access, channel code, specifically for the symmetrie working point [11], [12], re­
successive interference cancellation, joint decoding, individual
ferred to as multi-user-oriented (MU) code in the foBowing,
achievable signal-to-noise ratio region
shows near-capacity performance at the symmetrie working
point.
I. INTRODUCTION
In this paper, the individual achievable SNR region [13]­
Non-orthogonal multiple access (NOMA), as a promising [15] of NOMA with SIC and JD over Gaussian MAC are
technology for the 5-th generation of cellular networks (5G), analyzed both theoretical and practically. With the SNRs inside
has captured lots of attention for its capability of increasing the individual achievable SNR region of a certain user, the user
system throughput and accomrnodating massive connectivi­ can be supported with the given transmission rate regardless
ty [1], [2]. For uplink NOMA, successive interference can­ of the success or failure of other users. Thus, the individual
cellation (SIC) and joint decoding (JD) are two well-known achievable SNR region provides an intuitive way to evaluate
decoding techniques, which have capacity-approaching capa­ the performance of NOMA under different channel conditions
bility from the viewpoint of network information theory [3]­ and transmission rates.
[6].
The theoretical individual achievable SNR regions of NO­
In SIC, the signal of one user is decoded by treating the
MA with SIC and JD are demonstrated first, then the practical
signals of other users as interferences, and subtracted from the
individual achievable SNR regions are abtained. SU code and
received signals if successfully decoded. In JD, the received
MU code are employed in NOMA schemes with SIC and JD
signals of aB active users are jointly decoded instead of
to analyze and compare the impact of different channel codes
successively decoded. Since the complexity of the optimal
on different NOMA schemes.
maximum a posteriori probability (MAP) joint decoder is
prohibitive, iterative JD receiver [7], [8], which performs The rest of the paper is organized as folIows. In Seetion 11,
iterative multiuser detection (MUD) and decoding, is adopted the channel model and NOMA schemes with SIC and JD are
to reduce the complexity at the receiver in practice. described. In Seetion III, the theoretical individual achievable
SNR regions are demonstrated. Then the practical individual
Our focus in this paper is on the practical performance of
achievable SNR regions of different NOMA schemes with
these two kinds of NOMA schemes either with SIC or with
different kinds of channel codes are obtained and compared
Correspondance Author: Kewu Peng (pengkewu@tsinghua.edu.cn) in Seetion IV. Seetion V outlines the conclusions.

978-1-5090-4372-9/17/$3l.00 ©2017 IEEE 1599


11. SYS T EM M O D EL
Infonnation
A. Channel Model bits I
We consider an uplink NOMA system, where K users trans­
Infonnation
mit signals block-by-block to a single receiver. For simplicity, bits 2
we mainly focus on symmetric users, which have identical
transmission rate Rand transmission power Pt. At the trans­
mitters, the information bits of each user are independently
encoded, interleaved and then modulated to symbols. The same r----------------------- ---,

constellation mapping and the same channel code are assumed 1


1
for all users, while the interleavers are different, which is the 1
idea of interleave-division multiple access (IDMA) [16]. 1
1
The symbols of all users are transmitted simultaneously and 1
Output I 1
share the same frequency resource, and discrete-time baseband 1
Output 2 1
equivalent model for a block with K active users is given as 1
K 1

LHkXk +Z,
1
Y (1) Channel State I
k=l
=

�!':��� I
Xk Hk
______________________ _

where and denote the transmitted complex symbol


Fig. I. System model of two-user-BlCM-ID.
and the complex channel gain of user k, respectively, Y
denotes the received complex symbol, and Z represents the
complex Gaussian noise with zero mean and variance of No.
The received SNR of User k over a given block is defined
as SNRk IHkI2Pt/No, and the received SNR vector is considered in the corresponding individual decoding process
denoted as (SN R1 , SNR2, ..., SN RK).
=

of the user.

B. NOMA with SIC Recently, several NOMA schemes with an iterative JD


receiver have been proposed. Sparse code multiple access [20]
A SIC receiver performs the decoding process of each user
maps several information bits to multi-dimensional sparse
successively. The strong user is first decoded by treating the
codeword and adopts an iterative multi-user message-passing
signals of other weaker users as Gaussian interferences, then
algorithm for MUD. In IDMA [16] systems, an elementary
the successfully decoded signal is recovered and subtracted
signal estimator (ESE) is proposed to simplify and enable the
from the received signals to facilitate the decoding processes
chip-by-chip MUD of numerous active users.
of the weaker users. Given a decoding order of users in SIC,
if one user cannot be decoded at a stage, the remaining users In this paper, another scheme called multi-user BICM­
also cannot be decoded. In this paper, all possible decoding ID (MU-BICM-ID) [11], [12] is chosen as an instantiation
orders, i.e., K! orders, will be considered, if a user cannot be of NOMA with JD. MU-BICM-ID combines BICM-ID with
decoded in any decoding order, the user is considered to fail. iterative MUD, and has been proved capable of approaching
Since there is only one user decoded at a time, single-user capacity-limit at the symmetric working point over Gaussian
bit-interleaved coded modulation with iterative demapping and MAC in previous works [11], [12].
decoding (BICM-ID) [17]-[19], which has been proved capa­
ble of approaching capacity-limit for single-user transmission, The system model of a two-user BICM-ID is shown in
can be adopted as coded modulation scheme for NOMA with Fig. 1, which consists of two ma jor parts, users' BICM
SIe. transmitters and an iterative JD receiver. At the receiver, the
symbol-by-symbol MAP multi-user detector and individual
C. NOMA with JD decoder of each user are all soft-in soft-out. The decoding
For NOMA with JD, the received signals of all users procedure can be summarized as folIows. First, the multi­
are decoded simultaneously at the receiver. A maximum a user detector calculates the extrinsic information for each user
posteriori probability (MAP) joint decoder, which uses the according to channel state information, received symbols and
constraints of all transmitted bits from all users over a block, a priori information. After de-interleaved, the output extrinsic
is optimal for JD. However, the computational complexity information from multi-user detector are sent to corresponding
grows exponentially with the user number and the codeword decoders as a priori information. Then the decoder of each user
length. As a result, an iterative JD receiver [7], [8], which calculates the extrinsic information independently according to
performs iterative MUD and decoding, is adopted in practical code constraint and a priori information. Finally, the extrinsic
systems. At an iterative JD receiver, the constraints of part of information from decoder of each user is fed back to multi-user
the transmitted symbols from all users are considered in MUD, detector after interleaved. Via performing the above procedure
and the constraints of all coded bits from a certain user are iteratively, the signals from two users can be decoded jointly.

1600
In. THEORETICAL INDIVIDUAL ACHIE VABLE SNR
A i --0-' ABCH : 51 JD
REGION
5
i
: --0-' HCDE : 5/0
r
In this section, we analyze theoretical individual achievable
SNR regions of SIC and JD over Gaussian MAC. There are
actually two kinds of achievable SNR regions [13], [14], 4
common achievable SNR region and individual achievable
SNR region. SNR vectors inside a common achievable SNR cr.N 3
region ensure the common success of all users, while the SNR Z
CJ)
vectors inside an individual achievable SNR region of a certain
2
user only ensure the success of that user regardless of the
success or failure of other users. H
For uplink NOMA, we concern more about the individual C /}IIl---- 0---- 0----------0----------0---------.
success or outage of each user and the individual achievable )lIJ/
SNR region. And K=2 is assumed for simplicity. Since we D /
o�����������������
E
focus on symmetric users, User 1 is taken as an example in o 2 4 5
the following discussions. The target transmission rates of two
symmetric users are both R (bit/symbol), and the received
SNRs of User 1 and Users 2 are denoted by SNR1 and Fig. 2. Boundaries of theoretical individual achievable SNR regions of User
SNR2, respectively. I at R=l bit/symbol. The left area of ABCD is the individual achievable SNR
For JD, the individual achievable SNR region of User 1, region of JD, and the upper left area of ABF and left area of BCDE are the
individual achievable SNR region of SIe.
SJD, consists of two areas [14], SJD = SlD U S�D. The
first area SlD contains SNR vectors (SNR1,SNR2) with
which both two users can be decoded successfuBy. SlD can

{ }.
IV. PR ACTICAL INDIVIDUAL ACHlEVABLE SNR REGION
be described as ANALYSIS
R::; IOg2(1+SNR1), The individual achievable SNR regions of practically coded
SiD= (SNR1,SNR2) R::; IOg2(1+SNR2), (2) NOMA schemes either with SIC and JD are obtained over
2R::; IOg2(1+SNRl +SNR2) Gaussian MAC in this section. And the individual achievable
SNR region over Gaussian MAC provides an intuitive way to
The second area S�D contains SNR vectors with which evaluate the performance of NOMA schemes with different
User 1 can be decoded successfully but User 2 fails. S�D

}
received SNRs, given target transmission rates and target
can be expressed as BLERs for users.
For example, for block-fading MAC, where the fading states
(SNRl,SNR2) tJ. SlD,

{
are time-invariant over a coding block but vary between differ­
S�D= (SNR1,SNR2) SNR1 . (3)
R::; log2(1 + ) ent blocks, the channel over one block is actually a Gaussian
I+SNR2 MAC, and the received SNRs of users sub ject to certain
For SIC, the individual achievable SNR region of User 1 distributions over different blocks. When there is no channel
also consists of two areas, SSIC=SrIC u S�IC. With SNR state information at the transmitters (CSIT), time-sharing and
vectors in SrIC, User 1 can be decoded after User 2 is decoded accurate power/rate control for each user over each block are
successfully. And with SNR vectors in S�IC, User 1 can be not applicable. It's important to analyze system performance of
decoded directIy by treating User 2 as Gaussian interference. NOMA schemes, given target transmission rates, with different
SrIC and S�IC are expressed as (4) and (5) respectively
SNR2 } received SNRs. Thus, individual achievable SNR region over
Gaussian MAC could help to predict the system performance

{
R::; 1og2(1+ ) over BF-MAC with no CSI T.
SrIC= (SNR1,SNR2) I+SNR1 ' , (4)
For NOMA schemes with an iterative JD receiver, User 1
R::; 10g2(I+SNRd fails if it cannot be decoded successfully after the given

{ I
S�IC= (SNR1,SNR2) R::; 10g2(1 +
1
!::�2 ) }. (5)
number of iterations between MUD and channel decoding.
For NOMA schemes with SIC, User 1 fails if it cannot be
decoded at any stage of any decoding order. With a received
The theoretical individual achievable SNR regions of User 1 SNR vector inside the individual achievable SNR region of
with SIC and JD, at R = 1 bit/symbol, are depicted in Fig. 2. User 1, User 1 can be supported at its target transmission
The upper right area of ABCH and the right area of HCDE rate with its block error rate (BLER) no larger than its target
are SlD and S�D, respectively, and the upper area of ABF and BLER.
the right area of GCDE are SrIC and S�IC, respectively. As In this paper, we consider two different kinds of channel
shown in Fig. 2, aB SNR vectors contained in SSIC are also codes, SU code and MU code. SU code refers to conven­
contained in SJD. tional strong code that are optimized for single-user working

1601
JD, MU code NOMA with JD, the boundary of individual achievable SNR
, JD SU code region of MU code, i.e., the designed LDPC code, is closer
sie MU code
,
5 jI to the theoretical boundary of JD near the symmetric working
SIC, SU code

point, where the difference between received SNRs of two
JD, theoretical
users are not significant. However, when the SNRs are quite
4 SIC, theoretical
different, the SU code, i.e. the LTE Turbo code, performs
beuer for NOMA with JD. This difference corresponds the
cl" 3 different optimized working points of two kinds of codes. For
Z NOMA with SIC, the boundary of individual achievable SNR
Cf)
region of SU code is always closer to the theoretical boundary
2 of SIC than the boundary of MU code, which is intuitively
reasonable since only one user is decoded at a time in SIC.
Then we consider the difference between individual achiev­
able SNR regions of two kinds of NOMA schemes, with a SIC
receiver or a JD receiver. Through the theoretical analysis in
Section III, the theoretical individual achievable SNR region
2 4 5
of SIC lies inside that of JD, given the target transmission
rates. As shown in Fig. 3, the practical boundaries of SIC
schemes still generally lie inside the practical boundaries of
Fig. 3. Boundaries of theoretical and practical individual achievable SNR JD schemes with the same code, except that SIC with MU
regions of User 1 at R=! bit/symbol.
code performs a IittIe beUer than JD with MU code when the
SNR of User 2 are too low to support the transmission rate
point and shows near capacity performance over point-to-point of itself, and thus User 2 has a negative effect on the joint
single-user channel. The rate-1/2 LTE Turbo code [21] is taken decoding process of two users.
as an example of SU code. MU code is defined as the code
optimized for symmetric working point, where multiple users
V. CONCLUSIONS
have the same transmission rates and same received SNRs.
And a rate-1I2 Raptor-like LDPC code [22] is designed and In this paper, we analyze the performance of two practically
chosen as an example of MU code. The parity check matrix coded NOMA schemes, with a SIC receiver or a JD receiver.
of Raptor-like code can be represented as Theoretical individual achievable SNR regions of SIC and JD

H =
[� �]) (6)
over Gaussian MAC are derived, then the practical individual
achievable SNR regions of SIC and JD with different channel
codes are obtained and analyzed. ResuIts show that, the
where 0 is a zero matrix, I is an identity matrix, A is the
practical boundaries of individual achievable SNR region of
pre-coding matrix and B is the extension matrix from Raptor­
SIC generally lie inside the boundaries of JD, as predicted
like code perspective. By carefully designing the variable node
by the theoretical analysis. As a capacity-approaching channel
degree distributions and the check node degree distributions
code over point-to-point channel, SU code is a better choice for
of A and B, we get AA(X) 0.97x2 + 0.03x, pA(X)
= =

NOMA schemes with SIC than MU code, which is optimized


0.67x22 + 0.33x21 , AB(X) 0.12x12 + 0.18x3 + 0.7x2 ,
=

towards symmetric working points of MAC. Meanwhile, for


pB(X) 0.15x5 + 0.85x4, where >.(.) and p(.) denote the
=

NOMA schemes with JD, SU code performs beuer when


variable and check node degree distribution functions, which
the received SNRs of users are quite different, and MU
are optimized via differential evolution algorithm.
code performs beuer when the received SNRs are close, i.e.,
The codeword length is 9600 for both rate-1I2 LTE Turbo
near the symmetric working points. Therefore, the choice
and the designed rate-1I2 LDPC. The maximum number of
of channel codes for NOMA schemes with JD depends on
MUD iterations is 12, and the total number of decoding
channel conditions and transmission rates.
iterations is 72 for the designed LDPC and 36 for LTE Turbo.
Perfect channel state information at the receiver is assumed.
Via simulation, the boundaries of practical individual achiev­ ACKNOW LED G EMENTS
able SNR regions of different NOMA schemes are obtained
at BLER=O.l, and the theoretical boundaries of individual The authors would Iike to thank the Science, Technol­
achievable SNR regions of JD and SIC are also shown as ogy and Innovation Commission of Shenzhen Municipality
references. (No.JCYJ20160331171115521), the National Basic Research
In Fig. 3, quadrature phase-shift keying (QPSK) modulation Program of China (973 Program) under Grant 20l2CB316000
is adopted for two users and the transmission rate R is and the Pro ject of Research on Near Space Communication
1 bit/symbol. First we consider the different impact of two Technology Based on High AItitude Platform Station (HAPS)
kinds of channel codes on practical NOMA schemes. For (Supported by State Grid Corporation of China, SGCC).

1602
REFERENCES national Wireless Communications and Mobile Computing Conference
(IWCMC). IEEE, 2015, pp. 852-856.
[I] l. Chih-Lin, C. RoweU, S. Han, Z. Xu, O. Li, and Z. Pan, "Toward green [13] L. Li, N. Jindal, and A. Ooldsmith, "Outage capacities and optimal
and soft: A 50 perspective," IEEE Commun. Mag., vol. 52, no. 2, pp. power allocation for fading multiple-access channels," IEEE Trans. In}:
66-73, 2014. Theory, vol. 51, no. 4, pp. 1326-1347, 2005.
[2] IMT-2020, "50 vision and requirements;' IMT-2020 (50) Promotion [14] R. Narasimhan, "Individual outage rate regions for fading multiple
Oroup, China, Tech. Rep., 2014. access channels," in Information Theory, 2007. ISIT 2007. IEEE In­
[3] A. EI Oamal and Y-H. Kim, Network Information Theory. Cambridge ternational Symposium on. IEEE, 2007, pp. 1571-1575.
university press, 2011. [15] A. Yedla, P. S. Nguyen, H. D. Pfister, and K. R. Narayanan, "Universal
[4] A. D. Wyner, "Recent results in the Shannon theory," IEEE Trans. In}: codes for the Oaussian MAC via spatial coupling;' in Communication,
Theory, vol. 20, no. I, pp. 2-10, 1974.
Control, and Computing (Allerton), 2011 49th Annual Allerton Confer­
[5] D. N. Tse and S. Y. Hanly, "Multiaccess fading channels. I. Polymatroid ence on. IEEE, 2011, pp. 1801-1808.
structure, optimal resource allocation and throughput capacities;' IEEE [16] L. Ping, L. Liu, K. Wu, and W. K. Leung, "lnterleave division multiple­
Trans. In}: Theory, vol. 44, no. 7, pp. 2796-2815, 1998.
access," IEEE Trans. Wireless Commun., vol. 5, no. 4, pp. 938-947,
[6] A. Ooldsmith, Wireless communications. Cambridge university press, 2006.
2005. [17] X. Li and J. Ritcey, "Bit-interleaved coded modulation with iterative
[7] J. Boutros and O. Caire, "Iterative multiuser joint decoding: Unified decoding using soft feedback;' Electronics Leiters, vol. 34, no. 10, pp.
framework and asymptotic analysis;' IEEE Trans. In}: Theory, vol. 48, 942-943, 1998.
no. 7, pp. 1772-1793, 2002. [18] S. Ten Brink, J. Speidei, and R.-H. Yan, "Iterative demapping and
[8] O. Caire, R. R. Muller, and T. Tanaka, "Iterative multiuser joint de­ decoding for multilevel modulation;' in Global Telecommunications
coding: Optimal power allocation and low-complexity implementation," Conference, 1998. GLOBECOM 1998. The Bridge to Global Integration.
IEEE Trans. In}: Theory, vol. 50, no. 9, pp. 1950-1973, 2004.
IEEE, vol. I. IEEE, 1998, pp. 579-584.
[9] Digital Video Broadcasting (DVB); second generation framing structure, [19] A. Chindapol and J. A. Ritcey, "Design, analysis, and performance
channel coding and modulation systems for Broadcasting, Interactive
evaluation for BICM-ID with square QAM constellations in Rayleigh
Services, News Gathering and other broadband satellite applications
fading channels;' IEEE 1. SeI. Areas Commun., vol. 19, no. 5, pp. 944-
(DVB-S2), ETSI EN 302 307 Std., Mar 2013.
957, 2001.
[10] Digital Video Broadcasting (DVB); Next generation broadcasling system [20] H. Nikopour and H. Baligh, "Sparse code multiple access;' in Personal
to handheld, physical layer specijication (DVB-NGH), ETSI EN 303 105
Indoor and Mobile Radio Communications (PIMRC), 2013 IEEE 24th
Std., Jun 2013. International Symposium on. IEEE, 2013, pp. 332-336.
[11] S. Chen, K. Peng, Y Zhang, and J. Song, "Near capacity LDPC coded [21] 3GPP TS 36.212 v10.3.0 - Evolved Universal Terrestrial Radio Access
MU-BICM-lD for 50;' in 2015 International Wireless Communications (E-UTRA); Multiplexing and channel coding (Release 10), 30PP ETSI
and Mobile Computing Conference (IWCMC). IEEE, 2015, pp. 1418-
Std., Sep 2011.
1423. [22] T.-Y Chen, D. Divsalar, and R. D. WeseI, "Protograph-based raptor­
[12] Y Zhang, K. Peng, S. Chen, and J. Song, "A capacity-approaching like LDPC codes with low thresholds," in 2012 IEEE International
multi-user BICM-lD scheme for multiple access channel;' in 2015 Inter- Conference on Communications (ICC). IEEE, 2012, pp. 2161-2165.

1603

You might also like