Professional Documents
Culture Documents
May 9, 2019.
Digital Object Identifier 10.1109/ACCESS.2019.2912661
INDEX TERMS Non-orthogonal multiple access, truncated ARQ, relay selection, superposition coding,
interference cancelation.
two dual relay selection schemes with fixed or dynamic performance gains can be achieved by integrating the coop-
power allocation [22]. Yu et al. proposed a two-phase coop- erative T-ARQ into the NOMA system. Inspired by this fact,
erative relaying based NOMA protocol, wherein a decodable we study a multi-relay scenario to improve the throughput
relay is selected to forward the far-user’s signal. The relay of NOMA system by jointly considering the cooperative
transmission can not only help the far-user to decode its T-ARQ and the best relay selection based on the DF relaying
desired data, but also help the near-user cancel the inter- protocol.
ference for the data decoding [23]. Using the partial relay In this work, we propose a cooperative T-ARQ based
selection, Lee et al. derived close-form outage probabilities NOMA scheme by selecting the best relay, where the trans-
and revealed that the performance gain can be enhanced with mission process consists of the broadcast phase and the coop-
more relays deployed [24]. If the near-user is powered by erative T-ARQ phase. In the broadcast phase, an access point
energy harvesting (EH), a best-near best-far user selection (AP) linearly combines the signals of both far-user U2 and
scheme was proposed in [25], which shows that the diver- near-user U1 using the superposition coding technique, and
sity order depends on the number of far users rather than then broadcasts it over the given channel. All the terminals
that of near users. Based on the users’ distances towards including U1 , U2 , and relays try to decode the signal of U2
the base station, Liu et al. proposed three user selection firstly. If U1 or any relay can successfully decode the signal
schemes and proved that the diversity gain is the same as of U2 , it will cancel this signal from the received composite
that of conventional cooperative system without EH [26]. signal using the successive interference cancellation (SIC)
In cognitive radio networks, a decodable secondary user (SU) technique and then decode the signal of U1 . The relays that
can be selected to transmit the superimposed signal to pri- can correctly decode the signals of U1 and U2 are classi-
mary user and unsuccessful SUs [27]. Three SU scheduling fied into the decoding sets D1 and D2 , respectively. Since
methods were proposed in [28] under the condition of no some relays may correctly decode the signals of both users,
instantaneous channel state information (CSI), partial CSI, D1 and D2 could have common elements. In the coopera-
and full CSI, respectively. For the secure relaying, tive T-ARQ phase, the selected relay from D1 or D2 will
Li et al. aimed to maximize the achievable secrecy sum rate retransmit the signals if U1 or U2 erroneously decodes their
under the transmit power and EH constraints when the eaves- desired data. Otherwise, if both U1 and U2 can correctly
dropper is with/without CSI [29]. Yang et al. investigated the decode their desired data in the broadcast phase, there is
secrecy outage probability and average secrecy capacity in no data retransmission and AP will continue to transmit a
presence of co-channel interference [30]. new signal. We analyze the system throughput considering
Choi combined hybrid automatic repeat-request (H-ARQ) various decoding statuses of U1 , U2 , and relays. The time
with NOMA and showed that the outage probabil- division multiple access scheme with relay selection and
ity decreases dramatically with more retransmissions T-ARQ (TDMA-RT) and the proposed scheme with imper-
performed [31]. Li et al. proposed an enhanced fect CSI are also presented as the benchmarks for the com-
H-ARQ algorithm for the multiple-input multiple-output parison. Extensive numerical results show that our proposed
system by adopting the power allocation, user pairing, and scheme can achieve a much higher throughput than the
precoding techniques [32]. Cai et al. studied the outage TDMA-RT scheme.
probability and diversity order for individual users by using The rest of this paper is organized as follows: Section II
the H-ARQ with chase combining [33]. For the large-scale illustrates the system model. Section III explains the trans-
device-to-device network, Shi et al. proposed an interference- mission process and the achievable rate. Section IV analyzes
aware H-ARQ based NOMA scheme and revealed that the the system throughput for various decoding statues. Numeri-
temporally and spatially correlated interferences can degrade cal and simulation results are presented in Section V. Finally,
the outage performance [34]. Longer delay will be introduced Section VI concludes this paper.
for a larger number of retransmissions, which can hardly
satisfy the low-latency requirement of 5G communications. II. SYSTEM MODEL
Therefore, the truncated ARQ (T-ARQ) with limited retrans- We consider a network as shown in Fig. 1, which con-
mission is preferred [35], and it is shown that the relaying sists an AP, a near-user U1 , a far-user U2 , and K relays.
NOMA with T-ARQ can greatly outperform the conventional U1 is close to AP and U2 is far away from AP. The aver-
OMA scheme in terms of throughput. age channel condition between AP and U1 is better than
that between AP and U2 . In practice, AP can represent a
B. MOTIVATION AND CONTRIBUTION broadcast tower of the next generation broadcasting wire-
In the NOMA system, the information of different users can less network (NGB-W), which can provide the signals of
be transmitted simultaneously over the same spectrum in mobile TV, public Wi-Fi, or telecommunication services
the same time slot. In the T-ARQ system, the data will be using the NOMA protocol. U1 , U2 , and relays may have
retransmitted only when the original transmission fails and different quality of service (QoS) requirements. By exploiting
the limited retransmission can reduce the delay. Thus, the two the cooperative and retransmission diversity achieved in both
schemes can both improve the communication efficiency space and time domains, the data can be transmitted more
by causing less latency. However, it is not clear how much reliably.
FIGURE 1. The cooperative T-ARQ based NOMA with relay selection. B. CASE 2: U1 CORRECTLY DECODES s1 ;
U2 ERRONEOUSLY DECODES s2
In the broadcast phase, U1 correctly decodes s1 by suc-
The transmission process can be divided into two phases: cessfully decoding and canceling s2 . But, U2 erroneously
broadcast phase and cooperative T-ARQ phase. The opera- decodes s2 . If D2 6 = ∅, a relay from D2 will be selected
tions in these two phases are illustrated as follows: to retransmit s2 to U2 in the cooperative T-ARQ phase.
In the broadcast phase, AP linearly combines the signals U2 combines the signals received in the two time blocks using
of U1 and U2 using the superposition coding technique and the maximal-ratio combining (MRC) technique to further
then broadcasts it over the wireless channel. The fraction of decode s2 ; Otherwise, if D2 = ∅, no relay can be selected
power allocated to the signal s2 of U2 is denoted as θ and the for the retransmission of s2 , so the outage event occurs to U2 .
remaining fraction (1 − θ ) is allocated to the signal s1 of U1 .
Each terminal should firstly decode the signal of U2 , and then C. CASE 3: U1 ERRONEOUSLY DECODES s1 ; U2
decode the signal of U1 after cancelling the signal of U2 . With CORRECTLY DECODES s2
this decoding order, we can set θ > 0.5. In the broadcast In the broadcast phase, U2 correctly decodes s2 , but
phase, all the relays in the cooperative region can overhear U1 erroneously decodes s1 . Considering whether U1 correctly
and try to decode the signals of U2 and U1 . The relays that decodes and cancels s2 or not, we have two subcases illus-
can correctly decode s2 and s1 are classified into the decoding trated as follows:
set D2 and D1 , respectively. Here, D2 and D1 may contain
the same relays. The number of decodable relays in D2 is no 1) SUBCASE 3A (U1 CORRECTLY DECODES s2 BUT
less than that of D1 , because each relay decodes s2 first, and ERRONEOUSLY DECODES s1 ; U2 CORRECTLY
decodes s1 only after correctly decoding and cancelling s2 . DECODES s2 )
If U1 or U2 correctly decodes its desired data in the broad-
In the broadcast phase, U1 correctly decodes s2 and cancels it
cast phase, an acknowledgement (ACK) frame is fed back;
from the received composite signal, but erroneously decodes
Otherwise, the negative acknowledgement (NACK) frame is
s1 from the remaining signal. The transmission process can
released to notify the relays for a retransmission. We assume
be divided into two situations based on whether there exist
that the ACK and NACK frames are error-free and the latency
decodable relays in D1 or not.
is negligible [36], [37].
• If D1 6 = ∅, a relay from D1 is selected to retransmit s1
In the cooperative T-ARQ phase, if either U1 or U2 or both
of them fail in decoding their desired data, a best relay from to U1 in the cooperative T-ARQ phase. U1 combines
D1 or D2 will be selected to retransmit s1 or s2 . Otherwise, the signals received in the two time blocks using the
if both U1 and U2 correctly decode their desired data, new MRC technique, and then tries to decode s1 again.
• If D1 = ∅, there is no available relay for the retransmis-
signals will be transmitted by AP in the following blocks.
In our system, for either user, the maximum retransmission sion of s1 , so the outage event occurs to U1 .
attempts of respective signal from the best relay is set as
one by considering the delay-limited requirement of users. 2) SUBCASE 3B (U1 ERRONEOUSLY DECODES s2 ;
That is, a packet will be discarded if it is still incorrectly U2 CORRECTLY DECODES s2 )
received by the user after one retransmission. This assump- Given that U1 erroneously decodes s2 in the broadcast phase,
tion is suitable for real-time traffics, e.g., the transmitted considering the decoding statuses of relays, there are two
data may be audio or video signals, which can tolerate some situations:
packet loss, but require very small packet delays. In fact, • If D2 6 = ∅, a relay from D2 is selected to retransmit s2
increasing the number of retransmissions can only marginally to U1 . Combining the signals from AP and the best relay
increase the system performance compared with the one-time by MRC technique, U1 tries to decode s2 again. In this
subcase, there are still two decoding statuses for U1 of s1 towards U1 in the next time block. Otherwise,
stated as follows: if U1 erroneously decodes s1 and D1 6 = ∅, a best
- If U1 correctly decodes s2 , then it will try to decode relay from D1 is selected to retransmit s1 for U1 ;
s1 by canceling s2 . If U1 correctly decodes s1 , Otherwise, if D1 = ∅, no relay can be selected
a new signal will be sent by AP in the next time for the retransmission of s1 , and thus U1 fails to
block. If U1 erroneously decodes s1 and D1 6 = ∅, decode s1 finally.
a relay from D1 is selected to retransmit s1 to U1 ; - If U1 still erroneously decodes s2 after the retrans-
Otherwise, if D1 = ∅, no relay can be selected to mission of s2 , the outage event occurs to U1 , as it
retransmit s1 , so the outage event occurs to U1 . cannot cancel s2 for the further decoding of s1 .
- If U1 still fails in decoding s2 , the outage event • If D2 = ∅, no relay from D2 is available for the
occurs to U1 . Since the signal s2 cannot be correctly retransmission of s2 , so the outage event occurs to both
decoded and canceled, U1 cannot decode s1 . U1 and U2 . In this case, AP will send a new signal to U1
• If D2 = ∅, no relay is available for the retransmission and U2 in the next time block.
of s2 , so the outage event occurs to U1 . In this case, If U2 erroneously decodes s2 in the broadcast phase,
AP will transmit a new signal in the next time block. it will listen the signal of s2 retransmitted from the selected
relay towards U1 in the cooperative T-ARQ phase and then
D. CASE 4: U1 ERRONEOUSLY DECODES s1 ; decode s2 again by using the MRC technique.
U2 ERRONEOUSLY DECODES s2 Since we consider the data packet transmission in each
In this case, both U1 and U2 erroneously decode their desired time block, our proposed NOMA with cooperative T-ARQ is
signal, based on whether U1 correctly decodes s2 or not in the actually delay-limited. In a time block, AP will first broadcast
broadcast phase, two subcases are summarized as follows. the superimposed signal to both the near-user and the far-user
with a fixed transmission rate. Meanwhile, all the relay nodes
1) SUBCASE 4A (U1 CORRECTLY DECODES s2 BUT will overhear the transmission and try to decode the signals of
ERRONEOUSLY DECODES s1 ; U2 ERRONEOUSLY both users. When the data decoding is not successful at either
DECODES s2 ) the near-user or the far-user, a suitable relay will be selected
In the broadcast phase, if U1 successfully decodes and can- to retransmit the data packet according to various decoding
cels s2 but erroneously decodes s1 , while U2 erroneously cases of both users. Since only one-time retransmission is
decodes s2 , the operations in the cooperative T-ARQ phase permissible, the longest time delay of one data packet is
can be summarized as follows: two-block.
• If D2 6 = ∅ and D1 6 = ∅, a relay from D1 is selected to
III. TRANSMISSION PROCESS AND ACHIEVABLE RATE
retransmit s1 to U1 and then a relay from D2 is selected
A. BROADCAST PHASE
to retransmit s2 to U2 in the successive time blocks.
• If D2 6 = ∅ and D1 = ∅, no relay is available for the
In the broadcast phase, AP sends a superimposed signal to U1 ,
retransmission of s1 to U1 , so the outage event occurs U2 , and all the relays. The received signals at U1 , U2 , and Ri
to U1 , while a relay from D2 is selected to retransmit s2 (i = 1, · · ·, K ) can be expressed as
p
to U2 .
p
y(1)
u1 = h au1 (1 − θ )P t s1 + θP t s2 + ω u1 ,
• If D2 = ∅, which means D1 = ∅ also, no relay is p p
available for the retransmission of s2 , so the outage event y(1)
u2 = hau2 (1 − θ )Pt s1 + θPt s2 + ωu2 ,
occurs to U1 and U2 . In this condition, AP will send a p p
new signal in the next time block. y(1)
ri = hari (1 − θ)Pt s1 + θ Pt s2 + ωri , (1)
where hau1 , hau2 and hari represent the channel coefficient
2) SUBCASE 4B (U1 ERRONEOUSLY DECODES s2 ; U2
from AP to U1 , U2 and Ri , respectively. Pt is the transmit
ERRONEOUSLY DECODES s2 )
power of AP. θ is the fraction of power allocated to s2 and the
Both U1 and U2 erroneously decode s2 in the broadcast phase, remaining (1 − θ ) fraction of power is allocated to s1 . ωu1 ,
the retransmission will occur only when there exist decodable ωu2 , ωri ∼CN 0, σ 2 denote the additive white Gaussian
relays in D2 , illustrated as follows: noise (AWGN) at U1 , U2 and Ri , respectively. The signals
• If D2 6 = ∅, a relay from D2 with the most favorable are assumed to have unit power, i.e., E{|s1 |2 } = E{|s2 |2 } = 1.
channel condition towards U1 is selected to retransmit As done in many existing works, such as [18]–[21],
s2 for U1 . Meanwhile, U2 can also overhear this signal. we assume that each receiver knows the exact channel state
Both U1 and U2 will combine the signals from AP information (CSI) between the transmitter and itself for the
and the best relay in the two time blocks using the coherent decoding. The related CSI can be obtained through
MRC technique and decode s2 again. the pilot training, where the transmitter can broadcast a pre-
- If U1 correctly decodes s2 after the retransmission, defined pilot signal at the first beginning of each time block,
then it will try to decode s1 by canceling s2 . If U1 then all the receivers will try to estimate the CSI based on the
correctly decodes s1 , there is no retransmission received pilot signal. Since the duration of pilot training is
much shorter than the duration of data transmission, the time retransmit s1 or s2 . The index of the best relay is given
overhead of CSI estimation is neglected in our performance as:
analysis. After obtaining the CSI, each receiver can perform
the successive interference cancelation to retrieve the desired b1 = arg max |hrm u1 |2 and b2 = arg max |hrn u1 |2 . (5)
m∈D1 n∈D2
data.
Since the received signal s2 is much stronger, U1 and all the The received signals at U1 are respectively given by
relays try to decode s2 firstly by treating s1 as interference.
p
u1 ,s1 = hrb1 u1 Pr s1 + ωu1 , Rb1 selected,
y(2)
The achievable rate of s2 at U1 and Ri are denoted as Cus12 and p
Crsi2 , respectively, given by u1 ,s2 = hrb2 u1 Pr s2 + ωu1 , Rb2 selected.
y(2) (6)
Substituting the results of (16) into (15), the throughput of Substituting (65) and (19) into (18), we can obtain the
Case 1 can be obtained. result of φ21 .
In Case 2, U1 can correctly decode s1 after decoding and The term φ22 in (17) can be derived as
cancelling s2 , but U2 fails to retrieve s2 in the broadcast
K
phase (i.e., C occurs). There are three subcases based on X K
φ22 = exp(−9) exp (−n11 )
the decoding statuses of relays and U2 . The total system n
n=1
throughput considering both U1 and U2 in Case 2 is given as K −n
× 1−exp (−11 )
Q1 (E1 ). (20)
V1 + V2
T2 = Pr(A2 , A1 )Pr(B2 , C , F )
2 | {z } The term φ23 in (17) can be derived as
φ21
K
φ23 = exp(−9) 1−exp (−11 ) 1−exp(−8) .
V1 (21)
+ Pr(A2 , A1 )Pr(B2 , C , F )
2 | {z }
φ22 Plugging the results of (18), (20), and (21) into (17),
+V1 Pr(A2 , A1 )Pr(B 2 )Pr(C ) . (17) the throughput of Case 2 can be obtained.
| {z }
φ23
B. THROUGHPUT OF CASE 3
1
We incorporate the pre-factor before the transmission rate
2 In Case 3, U1 erroneously decodes s1 , while U2 successfully
when either s1 or s2 is retransmitted from the best relay to decodes s2 in the broadcast phase. Based on the decoding
either of user. Because, two time blocks are used for the data statuses of s2 and s1 at U1 , the throughput of Case 3 can be
transmission of both users. expressed as
• If D2 6 = ∅ (Event B2 occurs), the best relay from D2
will be selected to retransmit s2 in the next time block. T3 = T3a + T3b , (22)
U2 combines the signals from both phases in two time
blocks and then tries to decode s2 again. There are two where T3a and T3b represent the throughput of Subcase 3a
possible outcomes: and Subcase 3b, respectively.
- U2 correctly decodes s2 (i.e., Event F occurs).
A new data packet will be sent from AP in the 1) THROUGHPUT OF SUBCASE 3A
next time block. The throughput is expressed as the In Subcase 3a, U1 correctly decodes s2 but erroneously
first line of Eq. (17), where, where we use the pre- decodes s1 in the broadcast phase, i.e., Events A2 and A1
ξ2 σ 2 ξ1 σ 2
factor 12 before V1 +V2 to represent that the spectral occur and the constraint [θ−ξ2 (1−θ )]Pt `au1 < (1−θ )Pt `au1
efficiency is half due to the extra time block used for should be satisfied. Otherwise, the throughput of Subcase 3a
the retransmission. is zero. In the following time block, if D1 6 = ∅, U1 requires
- U2 still fails to decode s2 (i.e., Event F occurs). the retransmission of s1 from a selected relay, based on
AP will transmit a new superimposed signal in the whether U1 correctly decodes s1 or not after retransmis-
following time block. The throughput is expressed sion (i.e., D or D happens), the expressions of data suc-
as the second line of Eq. (17), where the pre-factor cess probability are denoted as φ311 Pr(C ) and φ312 Pr(C ),
1 respectively. Otherwise, if D1 = ∅ or D2 = ∅, no relay
2 before V1 is used to represent that only the data
of near-user is successfully transmitted in two time can retransmit s1 for U1 and the expressions of data suc-
blocks. cess probabilities are given as φ321 Pr(C ) and φ322 Pr(C ),
• If D2 = ∅ (Event B 2 occurs), no relay can be selected respectively. The throughput of Subcase 3a can be expressed
for the retransmission of s2 , so the outage event occurs as
to U2 . The throughput is expressed as the third line
of Eq. (17), where the pre-factor 1 before V1 is used V1+V2 V2
to represent that the data of near-user is successfully T3a = Pr(A2 , A1 , B1 , D)+ Pr(A2 , A1 , B1 , D)
2 | {z } 2 | {z }
transmitted in one time block. φ311 φ312
The term φ21 in (17) can be expressed as
where the first probability is derived in (67) in Appendix A and φ342 , respectively. If |D2 | = 0 or |D1 | = 0, no relay
and the second probability is calculated as is available to retransmit signal for U1 , then the expressions
of success probability regarding to Event D and D are
Pr A2 , A1 , D |D1 | = m
denoted as φ351 and φ352 . Denoted as T3b , the throughput of
ξ2 σ 2 Subcase 3b is expressed as
= exp −
[θ −ξ2 (1−θ)]Pt `au1
ξ1 σ 2 V1 +V2 V2
Pr(A2 , A1 , B2 , E )+ Pr(A2 , B2 , E )
T3b =
−exp − −Q2 (E2 ), (25) 2 2 |
(1−θ )Pt `au1
| {z } {z }
φ331 φ332
ξ2 σ 2 V1 +V2
, ξ1 σ
2
where the integral range is E2 = [θ−ξ2 (1−θ)]P t `au1 (1−θ)Pt `au1
+ Pr(A2 , A 1 , B2 , B1 , E , D)
3 | {z }
and Q2 (E) is given in (68) in Appendix A. φ341
Substituting (67) and (25) into (24), the result of φ311 can V2
be obtained. + Pr(A2 , A 1 , B2 , B1 , E , D)
3 |
The term φ312 in (23) can be expressed as
{z }
φ342
K V2
X + Pr(A2 , A 1 , B2 , B 1 , E )
φ312 = Pr(|D1 | = m)Pr A2 , A1 , D ||D1 | = m , (26)
2 | {z }
m=1 φ351
where Pr A2 , A1 , D ||D1 | = m = Q2 (E2 ), substituting (67)
+ V2 Pr(A2 , B 2 ) Pr(C ). (30)
into (26), the result of φ312 can be obtained. | {z }
The summation of φ321 and φ322 in (23) can be expressed φ352
where the joint probability of Event B2 and B1 is derived where T4a and T4b represent the throughput of Subcase 4a
in (71) in Appendix A. The second probability in (34) can be and Subcase 4b, respectively.
calculated as
1) THE THROUGHPUT OF SUBCASE 4A
Pr A2 , A 1 , B2 , B1 , E , D |D2 | = n, |D1 | = m
In Subcase 4a, U1 correctly decodes s2 but erroneously
= 1−exp(−)−Q2 (E5 )−Q3 (E5 )−Q4 (E5 ), (35) decodes s1 , while U2 erroneously decodes s2 . If D1 6= ∅,
ξ2 σ 2 ξ1 σ 2
a best relay is selected to retransmit s1 for U1 in the next time
wherein = min [θ−ξ2 (1−θ )]Pt `au , (1−θ )Pt `au , the function
1 1 block. After the retransmission of s1 , a best relay in D2 will
Q4 (E) is given in (72) in Appendix A and the integral range be selected to retransmit s2 for U2 . Based on the decoding
is E5 = (0, ). statuses of U1 and U2 , Event D (or D) and Event F (or F )
Substituting (71) and (35) into (34), we can obtain the will occur, where the corresponding data success probabilities
result of φ341 . are denoted as φ411 , φ412 , or φ413 , respectively. If D1 = ∅,
The term φ342 in (30) is expressed as no relay can resend s1 , i.e., Event B 1 happens, and the
ξ2 σ 2 ξ1 σ 2
K X
X n expression is given as φ42 . If [θ −ξ2 (1−θ )]Pt `au1 < (1−θ )Pt `au1 ,
φ342 = Pr {|D2 | = n, |D1 | = m} the throughput of Subcase 4a is expressed as
n=1 m=1
V1 +V2
Pr(A2 , A1 , B2 , B1 , D, C , F )
×Pr A 2 , E , A 1 , D |D2 | = n, |D1 | = m , T4a =
(36) 3 | {z }
φ411
where the second probability can be derived as
V1
+ Pr(A2 , A1 , B2 , B1 , D, C , F )
Pr A 2 , E , A 1 , D |D2 | = n, |D1 | = m
3 | {z }
φ412
= Q2 (E5 ) − Q4 (E5 ). (37)
V2
Substituting (71) and (37) into (36), we can obtain the result + Pr(A2 , A1 , B2 , B1 , D, C , F )
3 |
of φ342 .
{z }
φ413
If 11 < 13 , the φ351 in (30) can be derived as
V2
K + Pr(A2 , A1 , B2 , B 1 , C , F ) . (41)
X 2 |
φ351 =
{z }
Pr {|D2 | = n, |D1 | = 0} φ42
n=1
The term φ411 in (41) can be expressed as
×Pr A 2 , E , A 1 |D2 | = n, |D1 | = 0
n
K X
K X
X K φ411 = Pr(|D2 | = n, |D1 | = m)
= exp(−n11 )[1−exp(−11 )]K −n
n n=1 m=1
n=1
×Pr A2 , A1 , D, C , F |D2 | = n, |D1 | = m ,
×[1−exp(−13 )]n 1−exp (−)−Q3 (E5 ) .
(38) (42)
where the second probability is derived as are denoted as φ441 , φ442 , and φ443 . Otherwise, if |D1 | = 0,
no relay can resend s1 for U1 and the expression of success
Pr A2 , A1 , D, C , F |D2 | = n, |D1 | = m
probability is denoted as φ451 . If U1 fails to decode s2 after
ξ2 σ 2
the retransmission, the expression is denoted as φ452 . The
= Q1 (E1 ) exp − throughput of Subcase 4b can be expressed as (50), as shown
[θ − ξ2 (1 − θ )]Pt `au1
at the top of the next page.
ξ1 σ 2
−exp − − Q2 (E2 ) . (45) The term φ431 in (50) is given by
(1 − θ )Pt `au1
K
Substituting (71) and (45) into (44), the term φ412 can be
X
φ431= Pr{|D2 |=n}Pr(A2 , A1 , E , C , G |D2 |=n).
(51)
obtained. n=1
The term φ413 in (41) can be derived as
ξ2 σ
> (1−θξ)P
1σ
2 2
K X
X n If [θ−ξ2 (1−θ)]P t `au1 t `au1
, the second probability can be
φ413 = Pr(|D2 | = n, |D1 | = m) derived as
n=1 m=1
Pr(A2 , A1 , E , C , G |D2 | = n)
×Pr A2 , A1 , D, C , F |D2 | = n, |D1 | = m ,
!
(46) ξ2 σ 2
= exp − ϒ(E1 )
Pr `rb2 u2
where the second probability can be calculated as
ξ1 σ 2
Pr A2 , A1 , D, C , F |D2 | = n, |D1 | = m
× exp − − Q3 (E3 )
(1−θ )Pt `au1
= [1 − exp(−8) − Q1 (E1 )]Q2 (E2 ). (47)
ξ2 σ 2
Substituting (71) and (47) into (46), the term φ413 can be −exp − . (52)
[θ − ξ2 (1−θ )]Pt `au1
obtained.
The term φ42 in (41) is expressed as where the function ϒ(E) is given in Appendix A.
K
Substituting (65) and (52) into (50), the result of φ431 is
φ42 =
X
Pr(|D2 | = n, |D1 | = 0) obtained.
The term φ432 in (50) is expressed as
n=1
×Pr A2 , A 1 , C , F |D2 | = n, |D1 | = 0 .
K
X
φ432 = Pr{|D2 | = n}
(48)
n=1
If 11 < 13 , the joint probability of B2 and B 1 is derived ×Pr(A2 , A1 , E , C , G |D2 | = n).
(53)
in (69) and the second probability in (48) can be derived
ξ2 σ 2 ξ1 σ 2
as If [θ −ξ2 (1−θ )]Pt `au1 > (1−θ)Pt `au1 , the second probability can
be calculated as
Pr A2 , A 1 , C , F |D2 | = n, |D1 | = 0
Pr(A2 , A1 , E , C , G |D2 | = n)
= [1 − exp(−8) − Q1 (E1 )]
ξ2 σ 2
" ! #
× exp − ξ2 σ 2
[θ − ξ2 (1 − θ )]Pt `au1 = 1 − exp(−8) − exp − ϒ(E1 )
Pr `rb2 u2
ξ1 σ 2
−exp − . (49)
(1 − θ )Pt `au1 ξ1 σ 2
× exp − − Q3 (E3 )
Substituting (69) and (49) into (48), φ42 is obtained. (1 − θ)Pt `au1
Plugging the results of φ411 , φ412 , φ413 , and φ421 into (41),
ξ2 σ 2
the throughput of Subcase 4a, i.e., T4a can be obtained. −exp − . (54)
[θ − ξ2 (1 − θ )]Pt `au1
2) THROUGHPUT OF SUBCASE 4B Substituting (65) and (54) into (53), the result of φ432 is
In Subcase 4b, both U1 and U2 erroneously decode s2 in the obtained.
broadcast phase. If D2 6 = ∅, a best relay is selected to resend The term φ441 in (50) can be expressed as
s2 to U1 and meanwhile U2 overhears the signal. Both users K n
try to decode s2 again by using the MRC technique. If U1 cor- V1 +V2 X X
φ441 = Pr(|D2 | = n, |D1 | = m)
rectly decodes s2 and then can decode s1 directly (i.e., Event 3
n=1 m=1
A1 happens), the expressions are given as φ431 and φ432 .
×Pr A2 , A 1 , E , D, C , G |D2 | = n, |D1 | = m ,
When Event A 1 occurs and then the best relay from D1 will
retransmit s1 , which the expressions of success probability (55)
V1 + V2 V1
T4b = Pr(A2 , A1 , B2 , E , C , G )+ Pr(A2 , A1 , B2 , E , C , G )
2 | {z } 2| {z }
φ431 φ432
V1 + V2 V1
+ Pr(A2 , A 1 , B2 , B1 , E , D, C , G )+ Pr(A2 , A 1 , B2 , B1 , E , D, C , G )
3 | {z } 3| {z }
φ441 φ442
V2 V2 V2
+ Pr(A2 , A 1 , B2 , B1 , E , D, C , G )+ Pr(A2 , A 1 , B2 , B 1 , E , C , G )+ Pr(A2 , B2 , E , C , G ) . (50)
3 | {z } 2 | {z } 2 | {z }
φ443 φ451 φ452
where the second probability can be calculated as If 11 < 13 , the term φ451 in (50) can be derived as
K
Pr A2 , A 1 , E , D, C , G |D2 | = n, |D1 | = m
V1 +V2 X
φ451 = Pr {|D2 | = n, |D1 | = 0}
! 2
ξ2 σ 2 n=1
= exp − ϒ(E1 )
Pr `rb2 u2 ×Pr A 2 , E , A 1 , C , G |D2 | = n, |D1 | = 0 ,
Substituting (71) and (58) into (57), we can obtain the result Substituting φ431 , φ432 , φ441 , φ442 , φ443 , φ451 , and φ452
of φ442 . into (50), the throughput of Subcase 4b, i.e., T4b can be
The term φ443 in (50) is expressed as obtained.
Summing the throughput of Subcase 4a in (41) and Sub-
K n
V2 X X case 4b in (50), the total throughput of Case 4 can be obtained.
φ443 = Pr {|D2 | = n, |D1 | = m}
3
n=1 m=1
V. NUMERICAL AND SIMULATION RESULTS
×Pr A 2 , E , A 1 , D, C , G |D2 | = n, |D1 | = m .
In the simulations, unless stated otherwise, the system param-
(59) eters are set as: the number of relays K = 10, the power
allocation factor θ = 0.85, the distance between AP and U2
where the second probability can be derived as dau2 = d0 = 100 m, the distance between AP and U1 dau1 =
d1 = 30 m, the distance between the selected relay and U1
Pr A 2 , E , A 1 , D, C , G |D2 | = n, |D1 | = m
(or U2 ) drbi u1 = (µd0 − d1 ) (or drb2 u2 = (1 − µ)d0 ), the dis-
tance factor µ = 0.6, the transmit SNR of AP Pt = 70 dB,
!
ξ2 σ 2
= [Q2 (E5 ) − Q4 (E5 )] exp − ϒ(E1 ). (60) and the transmit SNR of relay Pr = 60 dB. In order to high-
Pr `rb2 u2
light the performance gain, we compare the proposed scheme
Substituting (71) and (60) into (59), we can obtain the result with the TDMA-RT strategy and the proposed scheme in
of φ443 . imperfect CSI, which are illustrated as follows
FIGURE 2. System throughput w.r.t. power allocation coefficient θ2 for FIGURE 3. System throughput w.r.t. target rate V2 for different V1 .
different target rates, and Pr = 50 dB.
FIGURE 5. System throughput w.r.t. number of relays K for different V2 . FIGURE 7. Maximal system throughput w.r.t. the number of relays K for
V1 =1 bits/s/Hz, Pt = 65 dB, and Pr = 50 dB. different Pt , and V2 = V1 = 1 bits/s/Hz.
FIGURE 6. Maximal system throughput w.r.t. transmit SNR of AP Pt for FIGURE 8. Maximal system throughput w.r.t. distance factor µ for
different V2 . different Pt .
from 1 to 20, the throughput grows gradually and then and then tends to invariant with the increase of the K . How-
remains unchanged after K = 4. By adopting the T-ARQ ever, for the higher transmit SNR, the maximal throughput
scheme, the throughput goes up fast and reaches the maximal can be reached fast with limited relays. The reason is that
value with limited number of relays. if the relay(s) can retrieve the respective signal and then the
From Fig. 2 to Fig. 5, we can see that the numerical results retransmission will occur when U1 or U2 is needed.
agree exactly with the simulation results, which can verify the Fig. 8 shows the maximal system throughput w.r.t. the
correctness of our analysis. distance factor µ. The target rate is set as V1 = V2 = 1
bits/s/Hz. When the cooperative region gets away from AP,
B. MAXIMAL SYSTEM THROUGHPUT the maximal throughput decreases gradually for the relative
Fig. 6 shows the maximal system throughput w.r.t. the lower SNR. The severe path-loss will adversely impact on the
transmit SNR of AP for different target rates. With the system throughput. However, our proposed scheme adopts
increase of Pt , the maximal throughput can be improved the retransmission from the selected relay(s) to improve the
and then keeps invariant after reaching the maximal value throughput performance of both users. In addition, the max-
for a given target rate. For the proper settings, our pro- imal system throughput is also sensitive to the transmit SNR
posed scheme can achieve a much higher throughput than the of AP. For the higher transmit SNR, the maximal throughput
TDMA-RT scheme. nearly keeps invariant when µ becomes larger. The higher
Fig. 7 shows the maximal system throughput w.r.t. the transmit SNR is beneficial to combat the path-loss. By adjust-
number of relays K for different Pt . For relative lower ing the transmit SNR and the distance factor, our proposed
transmit SNR, the more relays in the cooperative region, scheme outperforms the TDMA-RT scheme.
the more likely there exists the decodable relays in decoding Fig. 9 shows the mutual impacts of the target rates V1 and
sets D2 or D1 . The maximal system throughput goes up first V2 on the maximal system throughput. With the increase of V1
The function ϒ(E) in (52) is given by [19] Z. Yang , Z. Ding, Y. Wu, and P. Fan, ‘‘Novel relay selection strategies
! for cooperative NOMA,’’ IEEE Trans. Veh. Technol., vol. 66, no. 11,
Yσ2
Z
pp. 10114–10123, Nov. 2017.
ϒ(E) = exp −gau2 + dgau2 . (73) [20] Z. Ding, H. Dai, and H. V. Poor, ‘‘Relay selection for cooperative
E Pr `rb2 u2 NOMA,’’ IEEE Wireless Commun. Lett., vol. 5, no. 4, pp. 416–419,
Aug. 2016.
[21] D. Deng, L. Fan, X. Lei, W. Tan, and D. Xie, ‘‘Joint user and relay selection
REFERENCES for cooperative NOMA networks,’’ IEEE Access, vol. 5, pp. 20220–20227,
[1] Y. Saito, A. Benjebbour, Y. Kishiyama, and T. Nakamura, ‘‘System- 2017.
level performance evaluation of downlink non-orthogonal multiple [22] J. Zhao, Z. Ding, P. Fan, Z. Yang, and G. K. Karagiannidis, ‘‘Dual relay
access (NOMA),’’ in Proc. IEEE 24th Annu. Int. Symp. Pers., selection for cooperative NOMA with distributed space time coding,’’
Indoor, Mobile Radio Commun. (PIMRC), London, U.K., Sep. 2013, IEEE Access, vol. 6, pp. 20440–20450, 2018.
pp. 611–615. [23] Z. Yu, C. Zhai, J. Liu, and H. Xu, ‘‘Cooperative relaying based non-
[2] Y. Liu, Z. Qin, M. Elkashlan, Z. Ding, A. Nallanathan, and L. Hanzo, orthogonal multiple access (NOMA) with relay selection,’’ IEEE Trans.
‘‘Nonorthogonal multiple access for 5G and beyond,’’ Proc. IEEE, Veh. Technol., vol. 67, no. 12, pp. 11606–11618, Dec. 2018.
vol. 105, no. 12, pp. 2347–2381, Dec. 2017. [24] S. Lee, D. B. da Costa, Q.-T. Vien, T. Q. Duong, and R. T. de Sousa,
[3] C.-L. I, S. Han, Z. Xu, S. Wang, Q. Sun, and Y. Chen, ‘‘New paradigm ‘‘Non-orthogonal multiple access schemes with partial relay selection,’’
of 5G wireless Internet,’’ IEEE J. Sel. Areas Commun., vol. 34, no. 3, IET Commun., vol. 11, no. 6, pp. 846–854, Apr. 2017.
pp. 474–482, Mar. 2016. [25] N. T. Do, D. B. da Costa, T. Q. Duong, and B. An, ‘‘A BNBF user selection
[4] S. M. R. Islam, N. Avazov, O. A. Dobre, and K.-S. Kwak, ‘‘Power-domain scheme for NOMA-based cooperative relaying systems with SWIPT,’’
non-orthogonal multiple access (NOMA) in 5G systems: Potentials and IEEE Commun. Lett., vol. 21, no. 3, pp. 664–667, Mar. 2017.
challenges,’’ IEEE Commun. Surveys Tuts., vol. 19, no. 2, pp. 721–742, [26] Y. Liu, Z. Ding, M. Elkashlan, and H. V. Poor, ‘‘Cooperative non-
2nd Quart., 2016. orthogonal multiple access with simultaneous wireless information and
[5] W. Shin, M. Vaezi, B. Lee, D. J. Love, J. Lee, and H. V. Poor, power transfer,’’ IEEE J. Sel. Areas Commun., vol. 34, no. 4, pp. 938–953,
‘‘Non-orthogonal multiple access in multi-cell networks: Theory, perfor- Apr. 2016.
mance, and practical challenges,’’ IEEE Commun. Mag., vol. 55, no. 10, [27] L. Lv, J. Chen, and Q. Ni, ‘‘Cooperative non-orthogonal multiple access
pp. 176–183, Oct. 2017. in cognitive radio,’’ IEEE Commun. Lett., vol. 20, no. 10, pp. 2059–2062,
[6] Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan, and V. Bhargava, Oct. 2016.
‘‘A survey on non-orthogonal multiple access for 5G networks: Research [28] L. Lv, J. Chen, Q. Ni, and Z. Ding, ‘‘Design of cooperative non-
challenges and future trends,’’ IEEE J. Sel. Areas Commun., vol. 35, no. 10, orthogonal multicast cognitive multiple access for 5G systems: User
pp. 2181–2195, Oct. 2017. scheduling and performance analysis,’’ IEEE Trans. Commun., vol. 65,
[7] L. Dai, B. Wang, Y. Yuan, S. Han, C.-L. I, and Z. Wang, ‘‘Non- no. 6, pp. 2641–2656, Jun. 2017.
orthogonal multiple access for 5G: solutions, challenges, opportuni- [29] Q. Li, Q. Zhang, and J. Qin, ‘‘Secure relay beamforming for SWIPT in
ties, and future research trends,’’ IEEE Commun. Mag., vol. 53, no. 9, amplify-and-forward two-way relay networks,’’ IEEE Trans. Veh. Technol.,
pp. 74–81, Sep. 2015. vol. 65, no. 11, pp. 9006–9019, Nov. 2016.
[8] Z. Zhang, H. Sun, and R. Q. Hu, ‘‘Downlink and uplink non-orthogonal [30] L. Yang, M. O. Hasna, and I. S. Ansari, ‘‘Physical layer security
multiple access in a dense wireless network,’’ IEEE J. Sel. Areas Commun., for TAS/MRC systems with and without co-channel interference over
vol. 35, no. 12, pp. 2771–2784, Dec. 2017. η–µ fading channels,’’ IEEE Trans. Veh. Technol., vol. 67, no. 12,
[9] Y. Yu, H. Chen, Y. Li, Z. Ding, and B. Vucetic, ‘‘On the per- pp. 12421–12426, Dec. 2018.
formance of non-orthogonal multiple access in short-packet com- [31] J. Choi, ‘‘H-ARQ based non-orthogonal multiple access with successive
munications,’’ IEEE Commun. Lett., vol. 22, no. 3, pp. 590–593, interference cancellation,’’ in Proc. IEEE Global Telecommun. Conf.,
Mar. 2018. New Orleans, LO, USA, Nov./Dec. 2008, pp. 1–5.
[10] K. M. Rabie, B. Adebisi, E. H. Yousif, H. Gacanin, and A. M. Tonello, [32] A. Li, A. Benjebbour, X. Chen, H. Jiang, and H. Kayama, ‘‘Inves-
‘‘A comparison between orthogonal and non-orthogonal multiple access tigation on hybrid automatic repeat request (HARQ) design for
in cooperative relaying power line communication systems,’’ IEEE Access, NOMA with SU-MIMO,’’ in Proc. IEEE 26th Annu. Int. Symp. Pers.,
vol. 5, pp. 10118–10129, 2017. Indoor, Mobile Radio Commun. (PIMRC), Hong Kong, Aug./Sep. 2015,
[11] Y. Sun, D. W. K. Ng, Z. Ding, and R. Schober, ‘‘Optimal joint power and pp. 590–594.
subcarrier allocation for full-duplex multicarrier non-orthogonal multiple [33] D. Cai, Z. Ding, P. Fan, and Z. Yang, ‘‘On the performance of
access systems,’’ IEEE Trans. Commun., vol. 65, no. 3, pp. 1077–1091, NOMA with hybrid ARQ,’’ IEEE Trans. Veh. Technol., vol. 67, no. 10,
Mar. 2017. pp. 10033–10038, Oct. 2018.
[12] Z. Ding, L. Dai, and H. V. Poor, ‘‘MIMO-NOMA design for small [34] Z. Shi, S. Ma, H. E. Sawy, G. Yang, and M.-S. Alouini, ‘‘Cooperative
packet transmission in the Internet of Things,’’ IEEE Access, vol. 4, HARQ-assisted NOMA scheme in large-scale D2D networks,’’ IEEE
pp. 1393–1405, 2016. Trans. Commun., vol. 66, no. 9, pp. 4286–4302, Sep. 2018.
[13] M. S. ElBamby, M. Bennis, W. Saad, M. Debbah, and M. Latva-Aho, [35] Z. Yu, C. Zhai, and J. Liu, ‘‘Non-orthogonal multiple access relay-
‘‘Resource optimization and power allocation in in-band full ing with truncated ARQ,’’ IET Commun., vol. 11, no. 4, pp. 514–521,
duplex-enabled non-orthogonal multiple access networks,’’ Mar. 2017.
IEEE J. Sel. Areas Commun., vol. 35, no. 12, pp. 2860–2873, [36] I. Krikidis, ‘‘Distributed truncated ARQ protocol for cooperative
Dec. 2017. diversity networks,’’ IET Commun., vol. 1, no. 6, pp. 1212–1217,
[14] J.-B. Kim and I.-H. Lee, ‘‘Capacity analysis of cooperative relaying sys- Dec. 2007.
tems using non-orthogonal multiple access,’’ IEEE Commun. Lett., vol. 19, [37] Q. Liu, S. Zhou, and G. B. Giannakis, ‘‘Cross-layer combining of
no. 11, pp. 1949–1952, Nov. 2015. adaptive modulation and coding with truncated ARQ over wireless
[15] Z. Ding, Z. Zhao, M. Peng, and H. V. Poor, ‘‘On the spectral effi- links,’’ IEEE Trans. Wireless Commun., vol. 3, no. 5, pp. 1746–1755,
ciency and security enhancements of NOMA assisted multicast-unicast Sep. 2004.
streaming,’’ IEEE Trans. Commun., vol. 65, no. 7, pp. 3151–3163, [38] Y. Yang, H. Ma, and S. Aïssa, ‘‘Cross-layer combining of adaptive
Jul. 2017. modulation and truncated ARQ under cognitive radio resource require-
[16] S. Timotheou and I. Krikidis, ‘‘Fairness for non-orthogonal multiple access ments,’’ IEEE Trans. Veh. Technol., vol. 61, no. 9, pp. 4020–4030,
in 5G systems,’’ IEEE Signal Process. Lett., vol. 22, no. 10, pp. 1647–1651, Nov. 2012.
Oct. 2015. [39] A. Bletsas, A. Khisti, D. P. Reed, and A. Lippman, ‘‘A simple cooperative
[17] J. Men and J. Ge, ‘‘Non-orthogonal multiple access for multiple-antenna diversity method based on network path selection,’’ IEEE J. Sel. Areas
relaying networks,’’ IEEE Commun. Lett., vol. 19, no. 10, pp. 1686–1689, Commun., vol. 24, no. 3, pp. 659–672, Mar. 2006.
Oct. 2015. [40] Z. Yang, Z. Ding, P. Fan, and G. K. Karagiannidis, ‘‘On the perfor-
[18] Z. Ding, M. Peng, and H. V. Poor, ‘‘Cooperative non-orthogonal multiple mance of non-orthogonal multiple access systems with partial chan-
access in 5G systems,’’ IEEE Commun. Lett., vol. 19, no. 8, pp. 1462–1465, nel information,’’ IEEE Trans. Commun., vol. 64, no. 2, pp. 654–667,
Aug. 2015. Feb. 2016.
ZHIYUAN YU (S’17–M’18) received the B.Sc. WAN NI received the B.Sc. degree in elec-
degree in electronic information science and tech- tronic and information system, the B.A. and M.A.
nology and the Ph.D. degree in information and degrees in journalism and communication, and the
communication engineering from Shandong Uni- Ph.D. degree in arts and literature from Shandong
versity, China, in 2013 and 2018, respectively, University, Jinan, China, in 1997, 2000, 2003, and
where he is currently an Assistant Professor with 2009, respectively, where he is currently a Full
the School of Journalism and Communication. Professor and the Vice Dean of the School of
From 2012 to 2013, he was an Intern with the Journalism and Communication. He was a Visit-
Digital Multimedia Technology National Key Lab- ing Scholar with the School of Communication,
oratory, Hisense Co. Ltd., Qingdao, China. From Hong Kong Baptist University, in 2005. From
2016 to 2017, he was a Graduate Visiting Student with the Research Lab- 2016 to 2017, he was the Vice Director of the Center of Media Convergence
oratory of Electronics, Department of Electrical Engineering and Computer in Shandong Radio and TV Station, Jinan, China. His research interests
Science, Massachusetts Institute of Technology, Cambridge, MA, USA. His include big data analytic, communication systems, network convergence and
research interests include information inference, big data analysis, media management, online public opinion, and crisis communication.
convergence, protocol design and analysis for cooperative non-orthogonal
multiple access, energy harvesting communications, and spectrum sharing
in cognitive radio networks.