You are on page 1of 13

Telecommunication Systems (2023) 83:227–239

https://doi.org/10.1007/s11235-023-01014-4

Resource allocation and BER performance analysis of NOMA based


cooperative networks
Ali Olfat1

Accepted: 19 April 2023 / Published online: 13 May 2023


© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023

Abstract
Resource sharing and management can significantly improve the performance and spectral efficiency of wireless systems.
In power domain non-orthogonal multiple access (NOMA) systems, users share a common bandwidth for simultaneous
data transmission and therfore, the spectral efficiency of the system will be improved at the expense of increased complexity.
Provided proper power allocation, it is possible to detect symbols at receivers. In this paper, the downlink of a cellular system is
considered where a base station (BS) communicates with two users using NOMA with the assistance of a decode-and-forward
(DF) relay. In the proposed scheme, receivers combine received signals from direct and cooperative links, and decode symbols
by employing successive interference cancellation (SIC). The bit error rate (BER) performance of the proposed scheme is
analyzed and the optimal power allocation is also derived through a Min–Max optimization, and a closed form approximate
solution is proposed for binary phase shift keying (BPSK) modulation. Furthermore, it is proved that the proposed receiver
achieves full diversity order for all users for proper choice of power allocation. Simulation results also corroborate BER and
diversity analysis.

Keywords Decode and forward (DF) relay · Non-orthogonal multiple access · Power allocation · Successive interference
cancellation

1 Introduction Two fundamental elements for implementing a NOMA


based network are superposition coding at the transmitter and
Non-orthogonal multiple access (NOMA) is one of the successive interference cancellation (SIC) at destinations [7].
promising candidates for enhancing power spectrum effi- By superposition coding, the symbols of users are combined
ciency of 5 G cellular networks [1, 2]. Orthogonal multiple with specific power scales at the transmitter to be sent to the
access (OMA) methods are designed to eliminate inter- users [8]. Although system performance can be enhanced by
ference between users. However, these methods have low applying channel coding [9]. Successive interference cancel-
spectral efficiency due to exclusive assignment of resources lation is a technique for detection of symbol of users that are
[3]. On the other hand, by ever increasing number of users, the linearly combined, e.g. through superposition coding, and its
utilization of new methods with higher spectral efficiency is performance highly depends on power allocation [10, 11].
vital in the design of next generation of networks. In NOMA In NOMA based networks, usually two users are paired
systems each resource will be assigned to at least two users. to share a common subcarrier for data transmission between
Although sharing resources, improves spectral efficiency and base station (BS) and destinations [12]. More power is allo-
throughput [4, 5], there are some challenges that should be cated to the user with weaker channel condition, and this
addressed too [6]. Due to the interference between the users user can decode its own data by a simple matched filtering.
that are sharing resources, receivers must have the ability to In contrast, the user with stronger channel condition will be
detect symbols and this increases the complexity of receivers. allocated less power and should apply SIC to decode its own
data [13].
Cooperative communication is a well-known technique
B Ali Olfat
to achieve spatial diversity to combat fading effects [14]
aolfat@ut.ac.ir
and also improving the coverage in wireless systems [15].
1 Signal Processing and Communication Systems Laboratory, In cooperative networks, several relays assist the transmit-
University of Tehran, Tehran, Iran

123
228 A. Olfat

ter for data transmission. Two protocols that are widely used
in relaying systems, include amplify and forward (AF) and
decode and forward (DF) relaying [16]. In AF method, relay
retransmits the received signal, while in DF relaying relay
decodes the received symbols, and then retransmits them
[17]. System performance depends on the number of relays
and system structure, but it is generally proved that coop-
erative communication increases capacity and throughput.
Using relays in NOMA systems, can improve the spec- Fig. 1 Block diagram of a cooperative network with two users
tral efficiency and bit error rate (BER) performance of
communication systems simultaneously [18]. In [18], a coop-
erative non-orthogonal multiple access (NOMA) system is the diversity order of proposed scheme is analyzed and it
proposed, where one near user is employed as decode-and- is shown the the proposed method achieves full diversity
forward (DF) relaying switching between full-duplex (FD) order for both users if the proper power allocation condi-
and half-duplex (HD) mode to help a far user. Performance tion for users are met. Performance of proposed scheme
metrics are outage probability, ergodic rate and energy effi- is investigated through simulations which corroborates the
ciency. In [19] the source transmits two symbols using the analytical results. The main contribution of this paper is the
superposition code, and the relay decodes and retransmits the investigation of BER metric and diversity order for NOMA
symbol of the user with lower allocated power by employing based cooperative systems while other related works consider
the successive interference cancellation (SIC). At the des- metrics like energy efficiency, ergodic capacity and outage
tination, two symbols from both the direct signal and the probability. Furthermore this paper investigates the diversity
forwarded signal are decoded by using the maximum-ratio order of proposed method and derives sufficient conditions
combining and the ergodic sum rate and the outage perfor- under which full diversity order can be achieved.
mance of the system are investigated. The rest of this paper is organized as follows. In Sect. 2, the
A model of a cooperative network with K users is con- model of system under investigation is described. In Sect. 3,
sidered in [20]. There is no dedicated relay, and users assist the proposed receiver is introduced, and its BER performance
each other for data transmission. Based on SIC technique, for BPSK modulation is analyzed in Sect. 4. Power alloca-
each user should decode symbol of users with more power; tion problem is formulated in Sect. 5. In Sect. 6, diversity
hence, it can act as a relay and send its estimation to stronger order of the proposed receiver is evaluated. In Sect. 7 results
users. The outage probability and ergodic sum rate of this are extended to any arbitrary constellation. Simulation and
model is calculated based on SINR of each user. The main numerical results are presented in Sect. 8. Finally, conclu-
drawback of this model is that (K −1) time slots are required sions are drawn in Sect. 9.
to send one symbol. As a consequence, the delay of the sys-
tem will be increased by the number of users. One of the main
benefits of cooperative networks is improving coverage [15].
Power allocation and user pairing have a significant effect 2 System model
on the performance of NOMA based networks. In [21], an
algorithm is suggested for maximizing power efficiency, by In this paper, downlink of a NOMA based network with two
assuming perfect channel state information (CSI). In [22, users is considered where a relay assists the BS for data trans-
23], the impact of user paring on NOMA based networks are mission. With reference to Fig. 1, our model consists of a
investigated and it is shown that the best performance corre- source (S) and a DF relay (R) and two destinations (D1 , D2 ).
sponds to a scenario in which users with distinctive channel By employing superposition coding at the BS, symbol of
conditions are paired. users are combined with specific scales α and β to be trans-
In this paper, the BER performance of a cooperative mitted. By considering time division duplex (TDD) mode,
NOMA system is investgated. A base station communicates data transmission consists of two time slots. In the first time
with two users by NOMA with the assistance of a DF relay. slot, S broadcast coded signal (αS1 + β S2 ) to relay and both
After combining the received signals from the direct and destinations. Received symbols at R, D1 and D2 can be writ-
cooperative paths, users decode their symbols using SIC tech- ten as,
nique. The BER performance of proposed combining scheme
is computed in closed form for BPSK modulation and can be
y S R = h S R (αS1 + β S2 ) + n S R (1)
genelalized to arbitrary M-ary constellations. Further, a Min–
Max optimization is proposed for finding the optimum power y S D1 = h S D1 (αS1 + β S2 ) + n S D1 (2)
allocation, and an approximate solution is derived. Besides, y S D2 = h S D2 (αS1 + β S2 ) + n S D2 (3)

123
Resource allocation and BER performance analysis... 229

where information symbols denoted by S1 , S2 ∈ A M are 3 Proposed receiver


drawn form any arbitrary M-ary constellation A M and n S R ,
n S Di , n R Di (i=1,2) are additive noise of corresponding chan- Consider a combing scheme, where received signals by direct
nels that are assumed to be zero mean complex Gaussian and relaying phase are linearly combined by w S D1 and w R D1
random variables with variance N0 . In the second time slot, for user 1, and w S D2 and w R D2 for user 2. The combiner
relay exploits successive interference cancellation (SIC) in output for each user can be written as,
order to decode S1 and S2 from the received signal. Then,
using superposition codes, relay combines decoded symbols y D1 = w S D1 y S D1 + w R D1 y R D1 (7)
and transmits it to D1 and D2 . The received signals at each
y D2 = w S D2 y S D2 + w R D2 y R D2 (8)
destination can be expressed as

Proposed weights for combining are [24],


y R D1 = h R D1 (α̂ Ŝ1 + β̂ Ŝ2 ) + n R D1 (4)
y R D2 = h R D2 (α̂ Ŝ1 + β̂ Ŝ2 ) + n R D2 γmin 1 ∗
(5) w S D1 = h ∗S D1 , w R D1 = h (9)
γ R D1 R D1
γmin 2 ∗
w S D2 = h ∗S D2 , w R D2 = h (10)
where Ŝ1 and Ŝ2 denote detected symbols corresponding to γ R D2 R D2
S1 and S2 at relay, and α̂ and β̂ are power allocation scales at
relay. The fading coefficient of each link is modeled as zero where γmin 1 and γmin 2 are defined as
mean complex Gaussian random variable:
γmin i = min{ γ S R , γ R Di } (i = 1, 2) (11)
h S R ∼ CN (0, σ S2R ) σ S2R = E{|h S R |2 }
By adjusting the weights using (9) and (10), signals will be
h S Di ∼ CN (0, σ S2Di ) σ S2Di = E{|h S Di |2 } i = 1, 2
combined constructively and moreover, the contribution of
h R Di ∼ CN (0, σ R2 Di ) σ R2 Di = E{|h R Di |2 } i = 1, 2 the relaying phase will be adjusted based on the SNR of S-R-
D link. Consider a scenario in which the SNR of S-R link is
low; consequently, the probability of erroneous detection at
Instantaneous signal-to-noise-ratio (SNR) at each link is relay will increase. In this case, weight of the relaying phase
defined as, should be decreased. In contrast, If the SNR of S-R link is
acceptable, weight of the relaying phase increases.
Using SIC, the strong user will decode its symbols through
γ S R = |h S R |2 γ̄
a simple match filtering, whereas the weak user should first
γ S D1 = |h S D1 |2 γ̄ , γ R D1 = |h R D1 |2 γ̄ (6) decode the symbols of the strong user and after substracting
γ S D2 = |h S D2 | γ̄ , γ R D2 = |h R D2 | γ̄
2 2 it from the received signal, then decode its own symbols. For
simplicity of presentation, we assume that user 1 is the strong
user and user 2 is the weak user (user 1 has more power than
where γ̄ = Ps (αN+β )
2 2
and Ps is the transmitted power at user 2).
0
source. We also assume combining coefficients α and β meet Relay should also decode S1 and S2 through SIC. Decision
the constraint α 2 + β 2 = 1 and Ps = E{S1 2 } = E{S2 2 }. rules at relay are,
In the rest of this paper, we assume similar power alloca-
tion at BS and relay, i.e., (α̂ = α , β̂ = β), unless mentioned Ŝ1 = arg min{|y S R − h S R α S1 |2
otherwise. In Sect. 8, we will show that this assumption will S1 ∈A M
(12)
not affect the performance, significantly. Sˆ2 = arg min{|y S R − h S R (α Ŝ1 + β S2 )|2 }
As mentioned before, the most important point in sep- S2 ∈A M

arating symbol of users is power allocation. Based on SIC


features, for the feasibility of detection, the user with stronger Users receive signals from direct and cooperative paths, and
channel condition should be allocated less power than the combine them using (7) and (8). The strong user does not
user with weaker channel condition. Throughout this paper, need to perform SIC, and the decision rule for this user is,
we will call the user with more allocated power (user with
weaker channel coefficient) as "strong user" and the user with Sˆ1 = arg min{|y D1 − (w S D1 h S D1 + w R D1 h R D1 )αS1 |2 }
less allocated power (user with stronger channel coefficient) S1 ∈A M
by "weak user". (13)

123
230 A. Olfat

The weak user first decodes symbol of strong user by the calculated as,
decision rule,
⎛ ⎞

Ps |h S R | pW eak ⎠
Ŝ1,2 =argmin{|y D2 −(w S D2 h S D2 +w R D2 h R D2 )αS1 |2 } (14) PeW eak = (1 − Pe Str ong )Q ⎝ 
S1 ∈A M N0
2
⎛ ⎞
 √
of (14), the weak user decodes Sˆ2 as, Ps |h S R |( pW eak − 2 p Str ong )
then using Ŝ1,2 +Pe Str ong 0.5 Q ⎝  ⎠
N0
2
Sˆ2 = argmin{|y D2 − (w S D2 h S D2 + w R D2 h R D2 ) ⎛ ⎞
√ 
S2 ∈A M Ps |h S R |( pW eak + 2 p Str ong )
(15) +0.5 Q ⎝  ⎠
× (α Ŝ1,2 + β S2 )|2 } N0
2
(17)

4 BER performance for BPSK modulation


4.2 Error probability of strong user
Although the proposed receiver can be used for any constel-
Using (2), (4) and (7), the combiner output for the strong user
lation, in the first step, we analyze the BER performance of
(user 1) can be written as
BPSK signaling. The results will be extended to any M-ary
constellation in Sect. 7.
y D1 = w S D1 [h S D1 (αS1 + β S2 ) + n S D1 ]
(18)
4.1 Error probability at relay + w R D1 [h R D1 (α Ŝ1 + β Ŝ2 ) + n R D1 ]

Relay decodes S1 , S2 ∈ {± Ps } from the received signal With BPSK modulation the detected symbols of each user can
y S R given in (1) using (12). First, the symbol of the strong only take two values. For instance, Ŝ1 =±S1 for user 1. There-
user and then after subtraction, the symbol of the weak user fore, the combiner output will assume four possible forms as
will be detected. By defining pstr ong = max{α, β} and pweak = presented in (19), where N1 = w S D1 n S D1 + w R D1 n R D1 .



⎪ (w h + w R D1 h R D1 )αS1 + (w S D1 h S D1 + w R D1 h R D1 )β S2 + N1 if Ŝ1 = S1 , Ŝ2 = S2
⎪ S D1 S D1

(w S D1 h S D1 + w R D1 h R D1 )αS1 + (w S D1 h S D1 − w R D1 h R D1 )β S2 + N1 if Ŝ1 = S1 , Ŝ2 = −S2
y D1 = (19)

⎪ (w S D1 h S D1 − w R D1 h R D1 )αS1 + (w S D1 h S D1 + w R D1 h R D1 )β S2 + N1 if Ŝ1 = −S1 , Ŝ2 = S2

⎩ (w h
S D1 S D1 − w R D1 h R D1 )αS1 + (w S D1 h S D1 − w R D1 h R D1 )β S2 + N1 if Ŝ1 = −S1 , Ŝ2 = −S2

⎡ ⎞⎤ ⎛
min{α, β}, the error probability of the strong user at relay can |H |α − |H |β
Pe1 = (1 − B)(1 − A) ⎣0.5Q ⎝
1 1 ⎠⎦
be expressed as, 
2 σ N1
2
⎛ ⎞ ⎡ ⎛ ⎞⎤

Ps |h S R |( p Str ong − pW eak ) |H |α + |H |β
+ ⎣0.5Q ⎝ ⎠⎦
1 1
Pe Str ong = 0.5 Q ⎝  ⎠ 
N0 σ N1 2
2

2
⎞ ⎡ ⎛ ⎞⎤

Ps |h S R |( p Str ong + pW eak ) |H |α − |H |β
+B(1 − A) ⎣0.5Q ⎝
1 2 ⎠⎦
+0.5 Q ⎝  ⎠ (16) 
N0
2 σ N1
2
⎡ ⎛ ⎞⎤2
|H1 |α + |H2 |β ⎠⎦
The weak user should subtract α Sˆ1 h S R from the received + ⎣0.5Q ⎝ 
σ N1 2
signal. If S1 is detected correctly, the interference will be 2
⎡ ⎛ ⎞⎤
eliminated after subtraction, whereas in BPSK modulation
|H |α − |H |β
+(1 − C)A ⎣0.5Q ⎝ ⎠⎦
2 1
the interference will be doubled in case of erroneous detec- 
σ N1 2
tion. Thus, the error probability of the weak user can be 2

123
Resource allocation and BER performance analysis... 231
⎡ ⎛ ⎞⎤ ⎛ ⎞
|H |α + |H |β |G |α + |G |β
+ ⎣0.5Q ⎝ ⎠⎦ +0.5Q ⎝ ⎠
2 1 1 1
 
σ N1 2 σ N2 2
2 2
⎡ ⎛ ⎞⎤ ⎛ ⎞
|H |α − |H |β |G |α − |G |β
+C A ⎣0.5Q ⎝
2 ⎠⎦
= 0.5Q ⎝
2 1 2 ⎠
 Pe22 
σ N1 2 σ N2 2
2 2
⎡ ⎛ ⎞ ⎤ ⎛ ⎞
|H |α + |H |β |G |α + |G |β
+ ⎣0.5Q ⎝ ⎠ x⎦ +0.5Q ⎝ ⎠
2 2 1 2
 (20) 
σ N1 2 σ N2 2
2 2
⎛ ⎞
Using (19), the error probability of the strong user can be |G |α − |G |β
= 0.5Q ⎝
2 1 ⎠
Pe23 
computed as (20), where H1 , H2 and σ N2 1 are defined as σ N2 2
2
 ⎛ ⎞
H1 = Ps (w R D1 h R D1 + w S D1 h S D1 ) |G 2 |α + |G 1 |β ⎠
 +0.5Q ⎝ 
H2 = Ps (−w R D1 h R D1 + w S D1 h S D1 ) (21) σ N2 2
  ⎛ 2

σ N2 1 = |w R D1 |2 + |w S D1 |2 N0
|G |α − |G |β
= 0.5Q ⎝ ⎠
2 2
Pe24 
In this equation A (probability of wrong detection of strong σ N2 2
user at relay), B (probability of wrong detection of weak user 2
conditioned on correct detection of strong user at relay) and ⎛ ⎞
C (probability of wrong detection of weak user conditioned |G 2 |α + |G 2 |β ⎠
on wrong detection of strong user at relay)are defined as +0.5Q ⎝  (24)
σ N2 2
follows: 2
⎛ ⎞ ⎛ ⎞
|h |(α − β) |h |(α + β)
A = 0.5 Q ⎝  ⎠ + 0.5 Q ⎝  ⎠
S R S R
σS R 2 σS R 2
where G 1 , G 2 and σ N2 2 are defined as,
2 2
⎛ ⎞
|h S R |β ⎠ 
B = Q⎝ G1 = Ps (w R D2 h R D2 + w S D2 h S D2 )
σS R 2
2

⎡ ⎛ ⎞ ⎛ ⎞⎤ G 2 = Ps (−w R D2 h R D2 + w S D2 h S D2 )
(β − 2 α)|h | (β + 2 α)|h |  
C = ⎣0.5 Q ⎝ 
S R ⎠ + 0.5 Q ⎝ 
S R ⎠⎦ σ N2 2 = |w R D2 |2 + |w S D2 |2 N0 (25)
σS R 2 σS R 2
2 2
(22)

5 Optimum power allocation

4.3 Error probability of weak user In NOMA, users will be separated by power and as a conse-
quence, the system performance strongly depends on power
From (3), (5) and (8), the combiner output for the weak user allocation adjustment. Generally, more power should be allo-
(user 2) can be written as cated to the user with weaker channel condition, but for
  finding the optimum power allocation an optimization prob-
y D2 = w S D2 h S D2 (αS1 + β S2 ) + n S D2 lem should be defined. Different type of objectives can be
  (23) considered for the optimization problem such as outage
+w R D2 h R D2 (α Ŝ1 + β Ŝ2 ) + n R D2
probability and ergodic sum rate. The goal of this paper is
proposing a receiver with acceptable BER performance for
Similarly, four scenarios are possible regarding the detection
both users. In this regard, we define an optimization problem
at relay. Considering (14) and (15), the error probability of
in order to minimize the maximum error probability of users
the weak user can be derived as (31) where Pe21 , Pe22 , Pe23
subject to the condition α 2 + β 2 = 1.
and Pe24 are the error probability of decoding symbols of the
The optimization problem can be presented as,
strong user by weak user in each scenario and are defined as
⎛ ⎞
|G |α − |G |β min max (Pe1 , Pe2 )
Pe21 = 0.5Q ⎝ ⎠
1 1
 s.t α2 + β 2 = 1 . (26)
σ N2 2
2 0 < α, β < 1

123
232 A. Olfat

where Pe1 and Pe2 are defined as (20) and (31). Since the mal power allocation.
optimization problem is not convex, One possible approach
 
for solving this problem is using an exhaustive search which |G 1 |β
may have high computational complexity. Another approach Pe2 = (1 − B)(1 − A) (1 − Pe21 )Q  2
σ N2
is finding an approximate solution for (26). We should note 2
 
that the solution of (26) is the one of the points where Pe1 = |G 1 |β − 2|G 1 |α
+ Pe21 [0.5Q 
Pe2 . σ N2 2
If we only consider the dominant terms forPe1 and Pe2 ,  ! 2
the approximate equation can be written as, |G 1 |β + 2|G 1 |α
+ 0.5Q  ]
σ N2
2

⎛ ⎞ ⎛ ⎞ 2
 
|H1 |α − |H1 |β ⎠ |G 1 β| |G 2 |β
Q⎝  x = Q ⎝ 2 ⎠ (27) + B(1 − A) (1 − Pe22 )Q  2
σ N2
σ N1
2 σ N2
2
2 2  
|G 2 |β − 2|G 1 |α
+ Pe22 [0.5Q 
σ N2 2
The summation can be bounded by using the inequality 2
 !
below, |G 2 |β + 2|G 1 |α
+ 0.5Q  ]
σ N2
2

√ √   2
 
Q( x) + Q( y) < Q min(x, y) |G 1 |β−|G 2 −G 1 |α
+(1 − C)A (1−Pe23 ) 0.5 Q 
σ N2 2
2
 !
Thus, |G 1 |β + |G 2 − G 1 |α
+ 0.5 Q 
σ N2 2
⎛ ⎞ ⎛ ⎞  2

|H |α − |H |β |G β| |G 1 |β − |G 2 + G 1 |α
Q⎝
1

1 ⎠
= Q ⎝ 2 ⎠
1
(28) + Pe23 [0.5Q 
σ N1
2 σ N2 σ N2 2
2
2 2  !
|G 1 |β + |G 2 + G 1 |α
+ 0.5Q  ]
σ N2
2
By substituting H1 with G 1 , we have 2
 
|G 2 |β − |G 2 − G 1 |α
+ C A (1 − Pe24 ) 0.5 Q 
   σ N2 2
(α − β)2 γmin 1 2
Q( |h S D1 | +
2 |h R D1 | )
2  !
N0 /2 γ R D1 |G 2 |β + |G 2 − G 1 |α
+ 0.5 Q 
  2 σ N2
β2 γ min 2
=Q (|h 2 | + 2
|h R D2 |2 ) (29)  
N0 /2 S D2 γ R D2 |G 2 |β − |G 2 + G 1 |α
+ Pe24 [0.5Q 
2 σ N2
2
 !
By solving this equation, a closed form solution for opti- |G 2 |β + |G 2 + G 1 |α
+ 0.5Q  ]
mum power allocation problem can be calculated for BPSK 2 σ N2
modulation as 2
(31)
 
η 1
α= , β=
1+η 1+η 6 Diversity analysis of DF relaying
 (30)
γ̄ S D2 + min{γ̄ S R , γ̄ R D2 }
η≈( + 1)2 Diversity order is defined as the negative exponent of the
γ̄ S D1 + min{γ̄ S R , γ̄ R D1 }
average BER when SNR tends to infinity. As a matter of
fact,
In the simulation section, we will show that the proposed
approximation has a good performance very close to the opti- Pγ̄b→∞ ≈ (G c γ̄ )−G d (32)

123
Resource allocation and BER performance analysis... 233

the diversity order is G d , and G c denotes the coding gain. In By solving (26), the optimum power allocation will be
this section, It will be proved that the proposed receiver can drawn as (α, β) = (0.94, 0.3412). Since k > 2.5735, we
achieve diversity up to the order of two which means that it can claim that the condition of property 2 is satisfied for all
achieves full diversity. We should notice that the error prob- terms with optimum power allocation.
ability of both users that demonstrated in (20) and (31) are
instantaneous error probabilities. For evaluating the diversity
order of proposed receiver, first the average BER of users will
7 Performance bound for general
be calculated, and later the diversity orders will be assessed
constellations
by bounding the average BER. Finally, by using proposi-
tion 1 (see “Appendix A” for proof) and proposition 2 (see
We want to prove that the proposed receiver achieves full-
“Appendix B” for proof) it will be proved that Pe1 and Pe2
diversity for any M-ary constellation A M . First, we evaluate
achieve full diversity order.
the union bound of a simple SIC receiver with two users.
Proposition 1: The expectation E{P1 }, where x is a posi-
Consider a system that consists of a BS and two users. If
tive constant and γmin = min{γ S R , γ R D } achieves diversity
the BS exploits NOMA for data transmission, the received
order of two.
signal at destinations will be,

2x(γ S D + γmin )
P1 = Q(  ) yi = h i (αS1 + β S2 ) i = 1, 2 (35)
γmin
2 (33)
γS D + γR D )
User with greater power (user 1 in our notation) decode its
See the proof in “Appendix A”. symbols as
Proposition 2: If 16y 2 (x + z 2 ) − (y + z)4 > 0, the expec-
tation of (34) achieves diversity order of two, where x,y,z are
Sˆ1 = argmin{|y1 − h 1 αS1 |2 } (36)
positive constants and γmin = min{γ S R , γ R D }. S1 ∈A M

⎛ ⎞
√ Assuming equiprobable symbols, the error probability for the
 ⎜ 2(yγ S D − zγmin ) ⎟
P2 = Q( 2xγ S R )Q ⎜
⎝ 

⎠ (34) first user can be bounded as (37), where dmin and dmax denote
γmin
2 the minimum and maximum Euclidean distance between
γS D + γR D
symbols in constellation A M . At the worse case, the decoded
symbol can be located at distance of dmin /2 form the actual
See the proof in “Appendix A”. symbol in constellation.
With reference to (20), the upper bound of Pe1 can be
calculated by eliminating negative terms. All terms of the
1 $
M−1
upper bound are in the form of proposition 1 and 2. Since Pe1 = Pe1 |S2 =Sn ≤ Pe1 |S2 =SN
we have proved that the average of error probabilities which M
n=0
are in form of proposition 1 and 2, achieve diversity order of  
dmin
two, it is clear that the strong user achieves full-diversity. = P h 1 (αS1 + β Sn ) + n 1 − h 1 αS1 ≤ |h 1 |α
2
For the weak user, in the same manner of the strong user, d 
2 α|h 1 | − β|h 1 ||Sn |
min
first the upper bound will be calculated by removing nega- =Q √
tive elements. By taking the same steps, we can see that all N0 /2
⎛ ⎞
elements of the upper bound of Pe2 are in the form of propo-
α|h 1 | dmin − |h |β dmax
≤ Q⎝ 2 ⎠
1
sition 1 and 2, and based on these theorems, will achieve 2
 (37)
diversity order of two. Since all elements of Pe2 achieve N0
2
diversity order of two, we can claim that the proposed receiver
achieves full-diversity order for weak user too.
To use proposition 2 for diversity analysis, we should be where S N denotes the nearest point in the constellation to S1 .
confident that the condition is satisfied. Proposition 3 pro- The weak user should apply SIC. Decision rule for this user
vides a lower bound for power allocation ratio that guarantees is,
diversity order of proposed receiver.
Proposition 3: If k > 2.5735 (k = βα ), the error probability Ŝ2 = arg min{| yˆ2 − h 2 β S2 |2 }
of both users decays with order of two in high SNR regime. S2 ∈S M (38)
See the proof in “Appendix A”. yˆ2 = y2 − h 2 α Sˆ1 = h 2 α(S1 − Sˆ1 ) + h 2 β S2 + n 2

123
234 A. Olfat

0
The error probability of weak user depends on the detection 10

of Sˆ1 . User1

User2
  10
-1
dmin
Pe2 ≤ (1 − Pe1 ) × P n 2 ≥ β|h 2 |
2
  (39) -2
dmin 10
+ Pe1 × P h 2 α(S1 − Sˆ1 ) + n 2 ≥ β|h 2 |

BER
2
-3
10
Finally, the union bound of error probability for weak user
can be bounded by,
-4
⎛ ⎞ 10

β|h 2 | dmin
2 − h 2 αdmax ⎠
Pe2 ≤ Pe1 Q ⎝ 
N0 -5
10
2 0 5 10 15 20 25
 
β|h 2 | dmin β|h 2 |dmin
+ (1 − Pe1 )Q(  2 )≤Q √
N0 2N0 (40) Fig. 2 Error probability of proposed receiver with BPSK modulation
2 where signal to noise ratio set as (41) and power allocation is obtained
 
βdmin |h 2 | − 2|h 2 |αdmax by exhaustive search from (26)
+Q √
2N0
 
αdmin |h 2 | − |h 2 |βdmax 10
0

×Q √ Theory-user1
Theory-user2
2N0 -1
Simulation-user1
Simulation-user2
10

Using proposition 1 and proposition 2, the union bound of


-2
10
error probability decays with order of two when SNR tends
to infinity. The union bound of proposed receiver will be at -3
10
form of (37) and (40) with different coefficients. Hence, we
BER

can say that the proposed receiver can collect diversity up to -4


10
order of two, regardless of the underlying constellation.
-5
10

8 Simulation result 10
-6

In this section, performance of the proposed receiver will 10


-7
0 5 10 15 20 25 30 35
be evaluated. With reference to Fig. 1, downlink of a system
with a single decode and forward (DF) relay and two users
Fig. 3 Theoretical and Simulation error probability of users when SNR
is considered. Data of users transmit on the same resource set as (41)
(Time) by employing superposition codes at the source. We
assume that both users exploit BPSK modulation and power
allocation is the solution of (26). We consider a scenario in
the optimum power allocation. We should consider that the
which SNR in all links is related to γ̄ , and the mean SNR of
solution of (26) is one of the points where the error probability
each link is adjusted as below in logarithmic scale.
of users are equal. By considering this fact, we can expect
that users should have a tight error probability performance
γ S R = γ̄
that is perceptible from Fig. 2.
γ S D1 = γ R D1 = γ̄ To evaluate the accuracy of the theoretical error prob-
γ S D2 = γ̄ + 10 , γ R D2 = γ̄ (41) ability of users, which presented in (20) and (31), in the
second experiment, the error probability of both users is
In the considered scenario, user 2 has a better direct channel plotted based on theoretical and simulation results. From
condition, so we can expect that it should allocate less power Fig. 3, we can claim that the calculated error probabilities are
than the other user. Users decode their symbols based on accurate. In Fig. 3, it is assumed that the power is adjusted
decision rules (13) and (15). The error probability of both based on the solution of (26), but for all other non-optimum
users for (41) presented in Fig. 2, where the solution of (26) power allocation scenarios, the theoretical and simulation
is obtained by exhaustive search with the step of 0.01 to find error probabilities will be tight too.

123
Resource allocation and BER performance analysis... 235

10
0 0
User 1
User1-appriximation
User 2
User2-approximation
-1
-1 User1
10
User2

-2
-2
10

log(BER)
BER

-3

-3
10
-4

-4
10
-5

-5
10 -6
0 5 10 15 20 25
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

Fig. 4 Error probability of users when SNR set as (41) and power Fig. 5 Error probability of users versus α when SNR set as (41) and
allocation set as (26) and (30) γ̄ = 20

0
10
User1-without relay
User2-without relay
In Sect. 5, an approximate power allocation for BPSK User1-with relay
modulation is proposed as (30). To evaluate the accuracy User2-with relay
-2
10
of proposed power adjustment, in the third experiment,
the approximate power allocation applied. First, the power
adjusted based on the the solution of (26) by step of 0.001,
BER

-4
and then using (30). Error probability of two scenarios pre- 10

sented in Fig. 4.
From this figure, we can conclude that the proposed
approximation for optimum power allocation is accurate. 10
-6

To pinpoint the importance of the power allocation adjust-


ment in NOMA, error probability of users versus α is
presented in Fig. 5 in logarithmic scale when γ̄ = 20. This 10
-8
0 5 10 15 20 25 30 35
figure depicts that the error probability of both users is very
sensitive to the power allocation, and must be adjusted pre-
cisely to achieve the best performance. Because of the power Fig. 6 Error probability with and without relay where SNR set as (41)
constraint, for α = 0 and α = 1 the error probability of one
user is very good, but the other user has a high BER. Further-
more, we should notice that allocating equal power to users modulation, we used it for power adjustment. The proposed
is not optimal too since in this case the power of main symbol approximate power has a good performance for 4-QAM and
and the interference will be the same which can disrupt the 4-PSK modulation, but its performance will degrade for con-
detection procedure. stellations with higher degree.
To evaluate the influence of relay on the system perfor- One may argue that the proposed receiver performance
mance, the scenario of (41) is applied with and without relay is not optimal, due to the constraint of equal powers at BS
presence, and error probability of both scenarios is presented and the relay. For refuting this argument, the performance of
in Fig. 6. The noticeable point which can be concluded from proposed receiver is evaluated for BSPK modulation when
Fig. 6 is that by adding relay to the system, the step of error power allocation scales at BS and relay are not equal. We
probability is doubled. It will approve the state that the pro- should consider that for the feasibility of detection, power
posed receiver achieves full diversity. allocation in BS and relay should have the same sequence.
To evaluate performance of the system for other modula- For instance, if allocated power at BS for user 1 is greater
tions, the error probability of proposed receiver is plotted for than user 2, the allocated power for user 1 at relay should
4-QAM modulation. Generally, for finding optimum power be greater than user 2 too, otherwise it is not possible to
allocation an exhaustive search should be used. Since we separate symbol of users at destinations. By adding this con-
proved that (30) is an accurate approximation for BSPK straint, the error probability of users can be calculated in

123
236 A. Olfat

10
0
10 0
User1-BPSK User-1 Proposed
User-1 ML
User2-BPSK
-1 User1-4QAM
10
User2-4QAM 10 -2

-2
10

10 -4
-3
10

-4 10 -6
10

-5
10
0 5 10 15 20 25 10 -8
0 5 10 15 20 25 30 35

Fig. 9 BER Performance of the proposed method and Maximum Like-


Fig. 7 Performance of proposed receiver for BPSK and 4-QAM mod- lihood detector for User 1
ulations when SNR set as (41)

10
0
9 Conclusion
User1-same power
User2-same power

-1 User1-different power
In this paper, we proposed a receiver for downlink of a coop-
10
User2-different power erative system with two users that exploit non-orthogonal
multiple access for data transmission. The proposed receiver
10
-2 combines the received signals form direct and cooperative
links and employs successive interference cancellation to
BER

decode symbol of users. The theoretical error probability of


-3
10 users derived for BPSK modulation. The optimal power allo-
cation problem is defined to minimize the maximum of error
10
-4 probabilities, and an approximate closed form solution was
derived. Furthermore, It is proved that the proposed receiver
achieves full diversity regardless of underlying constellation.
-5
10
0 5 10 15 20 25
Funding The authors have not disclosed any funding.

Fig. 8 Performance of the system by changing power at relay Declarations

Conflict of interest The authors have not disclosed any competing inter-
the same manner, and the optimal power allocation can be ests.
founded by searching among valid regions. BER of both sce-
narios is plotted in Fig. 8 when SNRs adjusted as (41). From
this figure we can claim that the performance of both scenar- Appendix A
ios is very similar. In Fig. 9 we have compared the BER of
proposed detector with the so called Maximum Likelihood Proof of proposition 1
(ML) detector which has the best BER performance and is a
benchmark for measuring BER performance. Our proposed Since γmin = min{γ S R , γ R D }, γmin ≤ γ R D . Hence, an upper
bound for (33) can be derived as,
method’s performance is quite close to ML detector while
 
its complexity is much lower than ML. The ML detector, 
conducts exhaustive search for detection of symbols through P1 ≤ E Q(x 2(γ S D + γmin ))
maximization of a nonlinear objective function. % ∞% ∞% ∞
≤ exp(−x 2 (γ S D + γmin )) f γ S D f γ S R f γ R D
0 0 0

123
Resource allocation and BER performance analysis... 237

% ∞% ∞ After applying this inequality and integrating over different


1
dγ S D dγ S R dγ R D =   exp(−x 2 γmin ) regions, we arrive at
γ̄ S D x 2 + γ̄ S1D 0 0
    1 γ S¯ R
1 γS R 1 γR D Y ≤ ×
× exp − exp − dγ S R dγ R D 4γ S¯ R γ R¯ D (y 2 γ S¯D + 1) x γ S¯ R + 1
γ S¯ R γ S¯ R γ R¯ D γ R¯ D
1 1 16(y 2 γ S¯D + 1)γ S¯ R γ R¯ D
=   2
γ ¯ x2 + 1 x γ ¯ γ
RD SR ¯ + γ S¯ R + γ R¯ D γ S¯ R γ R¯ D (η1 γ¯S D + 16η2 ) + 16(y 2 γ S¯D + 1)[γ S¯ R + γ R¯ D ]
SD γ S¯D !
16(y 2 γ S¯D + 1)γ S¯ R γ R¯ D
x 2 γ S¯ R 2 + [x 2 + 1]γ S¯ R + γ R¯ D + (46)
× (42) η1 γ S¯D γ S¯ R + 16(y 2 γ S¯D + η2 γ S¯ R + 1)
x 2 γ S¯ R + 1 
(y + z)2 π (1 + y 2 γ S¯D )γ S¯D 1 + γ R¯ D
+
32γ S¯ R (y 2 γ S¯D + 1)2 γ R¯ D
When γ̄ tends to infinity, the average of proposition 1 decays ! 23
(y 2 γ S¯D + 1)γ S¯D γ R¯ D
with order of two. × η1
γ S¯D γ R¯ D ( 16 γ S¯D + y 2 η2 ) + (y 2 γ S¯D + 1)[γ R¯ D + γ S¯D ]

where η1 = 16y 2 (x + z 2 ) − (y + z)4 and η2 = x + z 2 .


Appendix B After calculating the average over different parameters,

Proof of proposition 2 % ∞% ∞%
zγmin
y 1
U= exp(−γ S R x)
0 0 0 2
We can claim P2 < Y + U , where  
1 γS R 1 γR D
× exp(− ) exp −
% γS R γ S¯ R γ R D γ R¯ D
∞% ∞% ∞ 1 1   (47)
Y = exp(−xγ S R ) 1 γS D
zγmin 2 2 × exp − dγ S D dγ R D dγ S R =
0 0 y γS D γ S¯D
  z γ S¯ R γ R¯ D
(yγ S D − zγmin ) 2
,
× exp − 2ξ(γ S¯ R x + 1)
γ S D + γmin
(43)
× f γ S D f γ S R f γ R D dγ S D dγ R D dγ S R
where ξ = z γ S¯ R γ R¯ D + γ S¯D [x y γ S¯ R γ R¯ D + y γ R¯ D + y γ S¯ R ].
% ∞ % ∞ % zγmin
y 1 If η1 = 0, we can claim that P2 decays with order of two,
U= exp(−xγ S R )
0 0 0 2 when γ̄ tends to infinity.
f γ S D f γ S R f γ R D dγ S D dγ S R dγ R D

Appendix C
For calculating Y we use this inequality.
Proof of proposition 3
% ∞    
(yγ S D − zγmin )2 γS D
exp − exp − dγ S D ≤ Based on (20) and (31), we should note that the possible
zγmin γ S D + γmin γ S¯D
y
 & ' values for x,y and z are:
(y + z) 4 γ S¯D
exp −γmin z 2 − × 2
16(y + γ S¯D )
2 1 (y γ S¯ D + 1)
2 x, y, z : α + β, α − β, β
 !
(y + z)2
× 1 + y 2 γ S¯D + (1 + y 2 γ S¯D )γmin γ S¯D π There are two general classes which require satisfaction of
4 proposition 2 condition. The first class is attributed to the
(44) terms in which y = z. For this class, the condition of propo-
sition 2 will be reduced to 16x y 2 . Since the coefficients of x
The upper bound of this inequality is drawn using, and y are positive the condition will be always satisfied.
For the second class, there are two terms which require the
satisfaction of the condition 16y 2 (x +z 2 )−(y +z)4 > 0. The
(yγ S D − γmin )2 coefficients of the first term are x = α + β, y = α − β, z =
γ S D + γmin α + β. We consider a scenario in which α = kβ. After some
(45)
(y + z)2 √ calculations, the inequality of proposition 2 can be written
≤ y γ S D + z γmin
2 2
− γ S D γmin as:
2

123
238 A. Olfat

k 3 − (1 + 2β)k 2 − k + 1 + β > 0 (48) 4. Wu, Q., Chen, W., Ng, D. W. K., & Schober, R. (2018). Spectral
and energy efficient wireless powered iot networks: Noma or tdma?
IEEE Transactions on Vehicular Technology.
To find an approximate solution for this inequality, we limit
5. Ding, Z., Zhao, Z., Peng, M., & Poor, H. V. (2017). On the spectral
the search region by considering the equation below, efficiency and security enhancements of noma assisted multicast-
unicast streaming. IEEE Transactions on Communications, 65(7),
k 3 − (1 + 2β)k 2 − k > 0 (49) 3151–3163.
6. Islam, S. R., Avazov, N., Dobre, O. A., & Kwak, K.-S. (2017).
Power-domain non-orthogonal multiple access (noma) in 5g sys-
If the variable k satisfies (49), the equation (48) will be satis- tems: Potentials and challenges. IEEE Communications Surveys &
fied too. By solving this inequality, the valid value for k can Tutorials, 19(2), 721–742.
be calculated as (k > 0): 7. Yue, X., Qin, Z., Liu, Y., Kang, S., & Chen, Y. (2018). A unified
framework for non-orthogonal multiple access. IEEE Transactions
 on Communications,
(2β + 1) + (2β + 1)2 + 4
k> (50) 8. Nguyen, V.-D., Tuan, H. D., Duong, T. Q., Poor, H. V., & Shin, O.-
2 S. (2017). Precoder design for signal superposition in mimo-noma
multicell networks. IEEE Journal on Selected Areas in Communi-
Based on power assignment constraint (α 2 + β 2 = 1), β can cations, 35(12), 2681–2695.
be computed as, 9. Yuan, L., Pan, J., Yang, N., Ding, Z., & Yuan, J. (2018). Successive
interference cancellation for ldpc coded non-orthogonal multiple
 access systems. IEEE Transactions on Vehicular Technology.
1 10. Verdu S. (1998). et al., Multiuser detection.Cambridge university
β=
1 + k2 press.
11. Gupta, A. S., & Singer, A. (2007). Successive interference cancel-
By applying a recursive calculation with initial value of β = lation using constellation structure. IEEE Transactions on Signal
1, the approximate solution of (49) will be, Processing, 55(12), 5716–5730.
12. Ding, Z., Fan, P., & Poor, H. V. (2016). Impact of user pairing on
5g nonorthogonal multiple-access downlink transmissions. IEEE
k = 2.2547, β = 0.4054 Trans. Vehicular Technology, 65(8), 6010–6023.
13. Lei, L., Yuan, D., Ho, C. K., & Sun, S. (2016). Power and chan-
The coefficients of the second term are x = α−β, y = α−β, nel allocation for non-orthogonal multiple access in 5g systems:
Tractability and computation. IEEE Transactions on Wireless Com-
z = α + β. By substituting the coefficients, the resulting munications, 15(12), 8580–8594.
inequality will be, 14. Kramer, G., Gastpar, M., & Gupta, P. (2005). Cooperative strategies
and capacity theorems for relay networks. IEEE Transactions on
k 3 − (3 − 2β)k 2 + 3k − 1 + β > 0 (51) Information Theory, 51(9), 3037–3063.
15. Do, T. N., da Costa, D. B., Duong, T. Q., & An, B. (2018).
Improving the performance of cell-edge users in noma systems
Since k > 1, k − 1 + β is positive; we can use the inequality using cooperative relaying. IEEE Transactions on Communica-
below, tions, 66(5), 1883–1901.
16. Laneman, J. N., Tse, D. N., & Wornell, G. W. (2004). Coopera-
k 3 − (3 − 2β)k 2 + 2k > 0 (52) tive diversity in wireless networks: Efficient protocols and outage
behavior. IEEE Transactions on Information theory, 50(12), 3062–
3080.
The delta function of this inequality is, 17. Sendonaris, A., Erkip, E., & Aazhang, B. (2003). User cooper-
ation diversity. part i. system description. IEEE Transactions on
δ = (3 − 2β)2 − 8 communications, 51(11), 1927–1938.
18. Yue, X., Liu, Y., Kang, S., Nallanathan, A., & Ding, Z. (2018).
Exploiting full/half-duplex user relaying in noma systems. IEEE
Hence, if k > 2.2547, both of (48) and (51) inequalities will Transactions on Communications, 66(2), 560–575.
be true. 19. Xu, M., Ji, F., Wen, M., & Duan, W. (2016). Novel receiver design
for the cooperative relaying system with non-orthogonal multiple
access. IEEE Communications Letters, 20(8), 1679–1682.
References 20. Ding, Z., Peng, M., & Poor, H. V. (2015). Cooperative non-
orthogonal multiple access in 5g systems. IEEE Communications
1. Ding, Z., Lei, X., Karagiannidis, G. K., Schober, R., Yuan, J., Letters, 19(8), 1462–1465.
& Bhargava, V. (2017). A survey on non-orthogonal multiple access 21. Fang, F., Zhang, H., Cheng, J., & Leung, V. C. (2016). Energy-
for 5g networks: Research challenges and future trends. arXiv efficient resource allocation for downlink non-orthogonal multiple
preprint. arXiv:1706.05347 access network. IEEE Transactions on Communications, 64(9),
2. Chen, S., Ren, B., Gao, Q., Kang, S., Sun, S., & Niu, K. (2017). 3722–3732.
Pattern division multiple access-a novel nonorthogonal multiple 22. Sedaghat, M. A., & Müller, R. R. (2018). On user pairing in uplink
access for fifth-generation radio networks. IEEE Transactions on noma. IEEE Transactions on Wireless Communications, 17(5),
Vehicular Technology, 66(4), 3185–3196. 3474–3486.
3. Chen, Z., Ding, Z., Dai, X., & Zhang, R. (2017). An optimization 23. Liang, W., Ding, Z., Li, Y., & Song, L. (2017). User pairing for
perspective of the superiority of noma compared to conventional downlink non-orthogonal multiple access networks using matching
oma. IEEE Trans. Signal Process, 65(19), 5191–5202.

123
Resource allocation and BER performance analysis... 239

algorithm. IEEE Transactions on Communications, 65(12), 5319– Ali Olfat received his Ph.D. from
5332. the University of Tehran, Iran in
24. Wang, T., Cano, A., Giannakis, G. B., & Laneman, J. N. (2007). Electrical Engineering in 2004.
High-performance cooperative demodulation with decode-and- During 2004 and 2005, he was a
forward relays. IEEE Transactions on Communications, 55(7), research associate with the Kings
1427–1438. College London, United Kingdom.
He joined the school of Electrical
and Computer Engineering, Uni-
Publisher’s Note Springer Nature remains neutral with regard to juris- versity of Tehran as an assistant
dictional claims in published maps and institutional affiliations. professor in 2006. He is currently
a professor at communication engi-
Springer Nature or its licensor (e.g. a society or other partner) holds neering department and director
exclusive rights to this article under a publishing agreement with the of Signal Processing and Commu-
author(s) or other rightsholder(s); author self-archiving of the accepted nication Systems Laboratory and
manuscript version of this article is solely governed by the terms of such Digital Communications Labora-
publishing agreement and applicable law. tory. He has served as director of communication engineering depart-
ment between 2012 and 2014. His research interests are cooperative
communications, Information theory, statistical and adaptive signal
processing, array signal processing, detection and estimation theory
and MIMO communication systems.

123

You might also like