Professional Documents
Culture Documents
24, 2017.
Digital Object Identifier 10.1109/ACCESS.2017.2683531
ABSTRACT As a promising candidate non-orthogonal multiple access scheme for the fifth generation (5G)
wireless communication system, pattern division multiple access (PDMA) has received considerable atten-
tion recently. Using pattern matrix (G[2,3]
PDMA , as an example, is used in this paper), PDMA directly maps
the information bits of different users to radio resources, such as code, power, time and frequency, and
space resource. PDMA can meet the requirements of massive connectivity and higher spectral efficiency
for the 5G mobile network. In order to further improve transmission reliability and enhance the coverage,
an uplink cooperative PDMA (Co-PDMA) scheme with half-duplex decode and forward relay is proposed.
The analytical expressions of outage probability (OP) and sum data rate are derived to characterize the
performance of the proposed scheme. The results show that the proposed Co-PDMA scheme achieves
superior outage performance, with gains of 8 and 12 dB over the non- Co-PDMA and cooperative orthogonal
multiple access (Co-OMA), respectively, @ OP = 0.1. Besides, the scheme is found to outperform two other
schemes in terms of higher sum data rate and achieve an almost maximum 50% gain over Co-OMA when
every user has the same target data rate.
2169-3536
2017 IEEE. Translations and content mining are permitted for academic research only.
3860 Personal use is also permitted, but republication/redistribution requires IEEE permission. VOLUME 5, 2017
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
W. Tang et al.: Performance Analysis of Co-PDMA in Uplink Network
maximum transmit SNR for each user. In order to simplify where i and j denote the ith resource element (RE) and the
the computing expressions, we do same variable substitution jth user.
Z φ1 =e ub α3 γ . (34)
= Pr(Z1 < φ1 − z2 )fZ2 (z2 )dz2 According to (20), we can obtain the OPs of the three users
0
in the selected pair group
φ1
(φ1 −z2 )
Z
− α 1γ
ub
= 1 − ψe 1 µub
fZ2 (z2 )dz2 P1ub_out = 1 − Pr Ā1
0
φ1 Z φ1 = J1 − J2 , (35)
(φ1 −z2 )
Z
− 1
ub ub
= fZ2 (z2 )dz2 − ψe α1 γ µub fZ2 (z2 )dz2 , P2ub_out = 1 − Pr Ā1 Pr Ā2
|0 } |0 φ2
− µ1
{z {z }
J1 J2 = 1 − (1 − (J1 − J2 )) · e ub α2 γ (36)
(28) and
and J2 in (28) can be further expressed as ub ub ub
P3ub_out = 1 − Pr Ā1 Pr Ā2 Pr Ā3
Z φ1
(φ −z )
− α 1υ 1 µ 2 − µ1
φ2
− µ1
φ3
J2 = ψe 1 fZ2 (z2 )dz2 = 1 − (1 − (J1 − J2 )) · e ub α2 γ ·e ub α3 γ , (37)
0
α12 − α 1γ φ1
ρ ρα3
respectively.
= e 1 µub
ρ β−
2
+ The proof is completed.
α2 α3 φ1 + α1 /α3 α1
α1 ρβ − α 1γ φ1
B. OUTAGE BEHAVIOR FROM RELAY TO BS
+ e 1 µub
, (29) During the second time slot, we assume that all users are
α2 α3 γ µub
detected successively at the relay, then the recovered data
where, ρ and β is defined in Section I. Then, (25) is further
relay re-modulates will experience same path to BS (i.e.,
derived as
ij = h , i = 1, 2; j = 1, 2, 3.) So (12) can be further
hrb rb
ub
Pr(Ā1 ) = 1 − Pr(Z1 + Z2 < φ1 ) = 1 − (J1 − J2 ). (30) expressed as
rb
hrb 0
For user 2, according to (16) and (19), we have h
rb
H PDMA = , (38)
hrb 0 hrb
3
ub X ub ub ub
SINRub H
2 = P2 (h̃2 ) [N0 I N + Pi h̃i (h̃i )H ]−1 h̃2 and the users still pick the same pattern as the processing in
i=3 the first time slot.
H " #−1 Theorem 2: During the second time slot, at the BS, the OPs
hub hub
N0 0 of three users can be expressed as
= P2 12 2 12
0 0 N0 + P3 hub 0
1, if a < 0, 1 < 0 or
23
a < 0, 1 ≥ 0, x2 < 0
2
P2 hub 2
12
= α2 γ hub
= (31) 1
12
N0 x2 ,
exp −
µrb
and
if a< 0, 1≥ 0, x2> 0 and x1 < 0
n o
ub
2 < φ2
Pr(Ā2 ) = 1 − Pr SINRub 1 1
1 − exp − x1 + exp − x2 ,
µrb µrb
2
= 1 − Pr α2 υ hub < φ
if a < 0, 1 ≥ 0, x1 > 0
2
12
P1rb_out =
− µ1
φ2 0, if a > 0, 1 < 0 or
.
=e ub α2 γ (32)
a >0, 1 ≥0, x2 < 0
1
For user 3, according to (16) and (19), we have
x2 ,
1 − exp −
µ
ub H rb
ub
SINRub [N0 I N ]−1 h̃3
if a > 0, 1 ≥ 0, x2 > 0 and
x1 < 0
3 = P 3 h̃3
1 1
2
P3 hub x2 ,
exp − x1 − exp −
µrb µrb
23
=
N0
if a > 0, 1 ≥ 0, x1 > 0,
2
= α3 γ hub (33) (39)
23
rb rb
P2rb_out = 1 − Pr Ā1 Pr Ā2 and
φ φ
n o
rb
Pr(Ā2 ) = 1 − Pr SINRrb2 < φ2
− µ1 α 2γ − µ1 α 2γ
= 1−e rb 2 + P1rb_out ·e rb 2 (40)
2
= 1 − Pr α2 γ h < φ2
and rb
rb rb rb
P3rb_out = 1 − Pr Ā1 Pr Ā2 Pr Ā3 φ2
− µ1
− 1 2
φ
− 1 3
φ =e rb α2 γ . (46)
= 1 − 1 − P1rb_out · e µrb α2 γ · e µrb α3 γ . (41)
For user 3, according to (17) and (19), we have
Relevant variable symbols are defined in Section I and rb H rb
Section II. SINRrb
3 = P 3 h̃3 [N0 I N ]−1 h̃3
Proof: For user 1, according to (17) we have 2
3 P3 hrb 2
= = α3 γ hrb (47)
rb X rb rb rb
SINRrb H
1 = P1 (h̃1 ) [N0 I N + Pi h̃i (h̃i )H ]−1 h̃1 N0
i=2
rb 2 2 and
α1 γ h
α1 γ hrb
2 .
n o
rb
3 < φ3
= 2 + (42) Pr(Ā3 ) = 1 − Pr SINRrb
1 + α2 γ hrb 1 + α3 γ hrb
2
According to (19), we have = 1 − Pr α3 γ hrb < φ3
rb
Pr(Ā1 ) − µ1
φ3
( 2 2 ) =e rb α3 γ . (48)
α1 γ hrb α1 γ hrb
= 1 − Pr 2 + 2 < φ1 According to (20), we can obtain the outage probabilities
1 + α2 γ hrb 1 + α3 γ hrb
( 4 ) of the three users in the pair group as follows:
(α3 + α2 ) α1 γ 2 − α3 α2 γ 2 φ1 hrb
= 1 − Pr
rb
P1rb_out = 1 − Pr Ā1 = Pr {$ },
2
+ [2α1 γ − (α2 + α3 ) φ1 γ ] hrb − φ1 < 0 (49)
= 1 − Pr{$ }. (43)
rb rb
P2rb_out = 1 − Pr Ā1 Pr Ā2
After discussion under different conditions, we derive
φ2
− µ1
1, if a < 0, 1 < 0 or = 1 − (1 − Pr {$ }) · e rb α2 γ
a < 0, 1 ≥ 0, x2 < 0
φ2 φ2
− µ1 − µ1
rb α2 γ + P1rb_out · e rb α2 γ
1 = 1−e (50)
x2 ,
exp −
µrb
and
if a< 0, 1≥ 0, x2> 0 and x1 < 0
rb rb rb
P3rb_out = 1 − Pr Ā1 Pr Ā2 Pr Ā3
1 1
1 − exp − x1 + exp − x2 ,
µrb µrb φ2 φ3
1 1
− −
= 1 − (1 − Pr {$ }) · e µrb α2 γ · e µrb α3 γ
if a < 0, 1 ≥ 0, x1 > 0
Pr {$ } = φ φ
− 1 2 − 1 3
0, if a > 0, 1 < 0 or = 1 − 1 − P1rb_out · e µrb α2 γ · e µrb α3 γ . (51)
a >0, 1 ≥0, x2 < 0
The proof is completed.
1
x2 ,
1 − exp −
µ
rb
C. OUTAGE BEHAVIOR AFTER SELECTION COMBINING
if a > 0, 1 ≥ 0, x2 > 0 and
x1 < 0
According to the description in the section II, when selection
1 1
x2 , combining is used at BS, an outage event occurs if neither the
exp − x1 − exp −
µrb µrb
direct transmission nor the relaying transmission succeeds.
if a > 0, 1 ≥ 0, x1 > 0
So we have
(44) h i
Pr (A1 ) = Pr max SINRub 1
, SINR rb
1
< φ 1
Similarly, for user 2, according to (17) and (19), we have
3 = Pr SINR1 < φ1 Pr SINRrb
ub
1
< φ 1
rb X rb rb rb
SINRrb H
2 = P2 (h̃2 ) [N0 I N + Pi h̃i (h̃i )H ]−1 h̃2 ub 2 2
α1 υ h11 α1 υ hub
!
2 < φ1
i=3 12
= Pr 2 +
hrb
H
N0 0
−1 rb
h 1 + α2 υ hub21
1 + α3 υ hub32
= P2 rb 2 !
0 0 N0 + P3 h
0 α1 υ|hrb |2 α1 υ|hrb |2
· Pr + < φ1
1 + α2 υ|hrb |2 1 + α3 υ|hrb |2
rb 2
P2 h 2
= = α2 γ hrb (45)
N0 = (J1 − J2 ) · Pr {$ }, (52)
h i
Pr (A2 ) = Pr max SINRub 2
, SINRrb
2
< φ 2 Comparing (53), (54) and (59), we can see that the OP of
Co-OMA has the similar expression with Pr (A2 ) and Pr (A3 )
= Pr SINR2 < φ2 Pr SINRrb
ub
2
< φ2 since that the patterns of user 2 and user 3 are orthogonal.
For user 1, its signal
T are repeated mapped onto two REs with
2 2
= Pr α2 γ h21 < φ2 Pr α2 γ h < φ2
ub rb
pattern g1 = 1 1 , which can bring diversity gain to obtain
φ
φ
superior OP performance. When SIC receiver is used, the OPs
− µ1 α 2γ − µ1 α 2γ
= 1−e ub 2 1−e rb 2 (53) of user 2 and user 3 are derived as (56) and (57), in which
the user 1 with lower OP (i.e., better OP performance) can
and further reduce the OPs of user 2 and user 3. So we come
h i
Pr (A3 ) = Pr max SINRub , SINR rb
< φ into the conclusion that the average OP of the three users in
3 3 3
Co-PDMA system is superior to that of Co-OMA, which is
= Pr SINR3 < φ3 Pr SINRrb
ub
3
< φ 3 verified by the following simulation.
2 2
= Pr α3 γ hub < φ α γ < φ
rb IV. SUM DATA RATE
Pr
32 3 3 h 3
From the OP expressions derived earlier in this article, we can
φ φ
− µ1 α 3γ − µ1 α 3γ see that the OPs of the multiple users are directly proportional
= 1−e ub 3 1−e rb 3 . (54)
to their own targeted SINRs φi , i = o, 1, 2, 3, respectively,
According to (20), after selection combining the outage and also directly proportional to the targeted data rate r̂i
probability of the three users can be expressed as because of φi = 2r̂i − 1, then the achievable sum data rate
for non-cooperative PDMA and Co-PDMA can be shown as
P1out = Pr (A1 )
= 1 − (J1 − J2 ) · Pr {$ }, (55) Rd_sum = r̂1 1 − P1ub_out + r̂2 1 − P2ub_out
P2out = 1 − Pr Ā1 Pr Ā2
+ r̂3 1 − P3ub_out (60)
= 1 − (1 − Pr (A1 )) (1 − Pr (A2 )) (56)
and
and
Rr_sum = r̂1 1 − P1out + r̂2 1 − P2out + r̂3 1 − P3out
P3out
= 1 − Pr Ā1 Pr Ā2 Pr Ā3
(61)
= 1 − (1 − Pr(A1 )) (1 − Pr(A2 )) (1 − Pr (A3 )). (57)
respectively.
Then, the average OP of the three users can be expressed
For the PDMA pattern matrix G[2,3]
PDMA , the data from three
as
users are multiplied on two REs. In order to make fair com-
out
= P3out + P3out + P3out /3.
PPDMA_ave (58) parison between Co-OMA and Co-PDMA transmission, the
achievable sum data rate of Co-OMA on two REs is
In order to make comparison between Co-PDMA and
Ro_sum = 2 · r̂o 1 − Poout ,
conventional Co-OMA, we assure that the same REs carry (62)
the same target rate. For PDMA, there are three users mul-
tiplexing on two REs, so that for each user occupying one where r̂o is the TDR for the conventional Co-OMA.
RE in Co-OMA, its target date rate should satisfy r̂o = Rr_sum is the sum data rate of Co-PDMA and higher than
r̂1 + r̂2 + r̂3 /2. The OP of the user in Co-OMA is given
Rd_sum , the sum data rate of non-cooperative PDMA, since
as [13]: that after relay decoding and forwarding, the OP perfor-
h i mance will be further improved (P1out , P2out and P3out are
Poout = Pr max SINRub o , SINR rb
o < φ o lower than P1ub_out , P2ub_out and P3ub_out , respectively) Rr_sum
is also higher than Ro_sum since that the average OP of
= Pr SINRo < φo Pr SINRrb
ub
o < φo Co-PDMA is lower than that of Co-OMA and the TDR
satisfies 2r̂o = r̂1 + r̂2 + r̂3 .
2 2
= Pr αo γ hub < φ α γ < φ
rb
Pr
o o o h o o
V. NUMERICAL RESULTS
− 1 φo − 1 φo
= 1 − e µub αo γ 1 − e µrb αo γ , (59) In this section, the performance evaluations of Co-PDMA,
non-cooperative PDMA and Co-OMA in terms of OP and
where φo = 2r̂o − 1 is the target SINR for conventional sum data rate are presented by using Monte Carlo simulation.
Co-OMA. Without loss of generality, we normalize the distance between
From the OP expressions of Co-PDMA and Co-OMA, we all users and the BS to unity and let d be the normalized
can see that the target SINR or TDR have a great impact distance between all users and the relay. As a result, µub = 1
on the OP performance: lower TDR r̂i , i = 0, 1, 2, 3, and µur = d −ι , where ι is the path loss exponent. In the
or lower target SINR φi , i = 0, 1, 2, 3, brings supe- following simulation, we further assume d = 0.5 and ι = 2
rior OP performance according to (55), (56), (57) and (59). (Free-space model is used here) [14].
[3] B. Ren et al., ‘‘Advanced IDD receiver for PDMA uplink system,’’ in Proc. SHAOLI KANG was a Project Manager with the
IEEE/CIC Int. Conf. Commun. China (ICCC) Chengdu, China, Jun. 2016, China Academy of Telecommunications Technol-
pp. 1–6. ogy (CATT), focusing on Research and Develop-
[4] B. Ren, Y. Wang, X. Dai, K. Niu, and W. Tang, ‘‘Pattern matrix design of ment of TD-SCDMA, from 2000 to 2005. Then,
PDMA for 5G UL applications,’’ China Commun, vol. 13, pp. 159–173, she was with the Communication Center of Sys-
Jan. 2017. tem Research, University of Surrey, as a Research
[5] J. Zeng et al., ‘‘Pattern division multiple access (PDMA) for cellular future Fellow, where she was involved in projects from
radio access,’’ in Proc. IEEE Int. Conf. Wireless Commun. Signal Process.,
EPSRC and OFCOM and leading the Antenna and
Oct. 2015, pp. 1–5.
Propagation Club. In 2007, she was with CATT
[6] B. Wang, K. Wang, Z. Lu, T. Xie, and J. Quan, ‘‘Comparison study of
non-orthogonal multiple access schemes for 5G,’’ in Proc. IEEE Int. Symp. and acted as the Vice-Chief Engineer of TDD
Broadband Multimedia Syst. Broadcast., Ghent, Belgium, Jun. 2015, Research and Development Product Line, focusing on speeding up the stan-
pp. 1–5. dard and industrial progress of TDD technology. Since 2011, she has been
[7] CATT, Usage Scenarios of Non-Orthogonal Multiple Access, document involved in the Wireless Innovation Center and acted as the Head Expert,
R1-166466, 3GPP, Aug. 2016. leading the 5G research with CATT. She has authored over 20 papers and
[8] CATT, Discussion on Scenarios and Use Cases for Multiple Access, doc- holds 50 patents.
ument R1-164246, 3GPP, May 2016.
[9] I. Y. Abualhaol and M. S. Bawa’aneh, "Capacity analysis of cooper-
ative relay-based communication system,’’ in Proc. IEEE GCC Conf.
Exhibit. (GCC), Dubai, United Arab Emirates, Feb. 2011, pp. 21–24.
[10] A. B. Saleh, S. Redana, J. Hämäläinen, and B. Raaf, ‘‘On the cover-
age extension and capacity enhancement of inband relay deployments in
LTE-advanced networks,’’ J. Elect. Comput. Eng., vol. 2010, no. 894846,
pp. 1–12, 2010.
[11] Y.-W. P. Hong, W.-J. Huang, and C.-C. J. Kuo, Cooperative Communica-
tions and Networking. Cambridge, U.K.: Cambridge Univ. Press, 2009.
[12] D. Tse and P. Viswanath, Fundamentals of Wireless Communication,
Cambridge, U.K.: Cambridge Univ. Press, 2005.
[13] N. Zhang, J. Wang, G. Kang, and Y. Liu, ‘‘Uplink nonorthogonal multiple
access in 5G systems,’’ IEEE Commun. Lett., vol. 20, no. 3, pp. 458–461,
Mar. 2016.
[14] A. Goldsmith, Wireless Communication, Cambridge, U.K.:
Cambridge Univ. Press, 2005.