Design And Performance Analysis Of Modified Non-Orthogonal Multiple Access

1y ago
9 Views
1 Downloads
1.15 MB
50 Pages
Last View : 12d ago
Last Download : 3m ago
Upload by : Melina Bettis
Transcription

Design and Performance Analysis ofModified Non-Orthogonal Multiple AccessPrepared by Hsin-Yu LueAdvisory by Prof. Po-Ning ChenInstitute of Communications EngineeringNational Chiao Tung UniversityHsinchu, Taiwan 300, R.O.C.E-mail: lueshinyou33@gmail.comAugust, 2015

i

Design and Performance Analysis of Modified Non-Orthogonal MultipleAccessStudent : Hsin-Yu LueAdivisor : Po-Ning ChenInstitute of Communications EngineeringNational Chiao Tung UniversityAbstractRecently, non-orthogonal transmission technology has been discussed extensively due toits better cell coverage and higher throughput for users located at cell edge region thanthe traditional orthogonal multiple access (OMA) technology. In order to improve userthroughput of OMA, user equipments (UEs) of non-orthogonal transmission technologyneeds to enhance their receivers with interference cancellation capability in order to eliminate interferences generated by other users. In this thesis, two kinds of non-orthogonaltransmission schemes are investigated, which are non-orthogonal multiple access (NOMA)and rate-adaptive constellation expansion multiple access (REMA). Effects of combiningNOMA and REMA with different receiver designs will be studied by both analysis andsimulations. Furthermore, we propose to incorporate multilevel code into REMA, namedmodified REMA. Simulation shows that the combination of REMA with multilevel codingtechnique can achieve a better rate than conventional REMA.ii

ContentsChinese AbstractiAbstractiiContentsiiiList of FiguresvList of Tablesvii1 Introduction12 System Model and Background32.1 Introduction to Non-Orthogonal Multiple Access (NOMA) . . . . . . . . .32.2 Receiver Design in Typical MIMO System . . . . . . . . . . . . . . . . . .72.2.1Linear Minimum Mean Square Error (MMSE) Detector . . . . . . .72.2.2Successive Interference Cancellation (SIC) Receiver . . . . . . . . .82.3 CWIC Receiver in NOMA . . . . . . . . . . . . . . . . . . . . . . . . . . . 102.3.1CWIC with Single UE detection (SUD) . . . . . . . . . . . . . . . . 102.3.2CWIC with Joint Maximum Likelihood (JML) . . . . . . . . . . . . 112.4 Joint Maximum-Likelihood (JML) Receiver inNOMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12iii

3 Non-Orthogonal Transmission with Equal Distance Constellations143.1 NOMA with Equal Distance Constellation (EDC-NOMA) . . . . . . . . . . 153.2 Rate-Adaptive Constellation Expansion Multiple Access (REMA) . . . . . 153.2.1Concept of REMA . . . . . . . . . . . . . . . . . . . . . . . . . . . 153.2.2Demodulation in REMA . . . . . . . . . . . . . . . . . . . . . . . . 173.3 Examination of NOMA and REMA . . . . . . . . . . . . . . . . . . . . . . 184 Modified REMA294.1 Modified REMA Transmission Scheme . . . . . . . . . . . . . . . . . . . . 294.1.1Introduction to Multilevel Coding . . . . . . . . . . . . . . . . . . . 294.1.2Multistage Decoding for Multilevel Code . . . . . . . . . . . . . . . 314.1.3Modified REMA with Multilevel Codes . . . . . . . . . . . . . . . . 334.2 Simulations on Modified REMA with Multilevel Code . . . . . . . . . . . . 345 Conclusion and Future Work39Bibliography40iv

List of Figures2.1 Basic NOMA scheme in downlink communication . . . . . . . . . . . . . .32.2 Comparison between OMA and NOMA . . . . . . . . . . . . . . . . . . . .52.3 Capacities of OMA and NOMA . . . . . . . . . . . . . . . . . . . . . . . .52.4 NOMA combining with MIMO . . . . . . . . . . . . . . . . . . . . . . . .6 0.2 8-PAM 0.8 2-PAM .72.6 Structure of the S-SIC receiver . . . . . . . . . . . . . . . . . . . . . . . . .92.7 Structure of the CWIC receiver . . . . . . . . . . . . . . . . . . . . . . . .92.5 Unequal distance constellation of NOMA: 2.8 Structure of far UE and near UE receiver in NOMA . . . . . . . . . . . . . 102.9 CWIC with JML receiver in NOMA . . . . . . . . . . . . . . . . . . . . . . 112.10 JML receiver in NOMA. . . . . . . . . . . . . . . . . . . . . . . . . . . . 122.11 Achievable rates of JML and NOMA with SUD . . . . . . . . . . . . . . . 133.1 Schematic diagram of equal and non-equal distance constellation . . . . . . 143.2 NOMA transmitter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153.3 Structure of REMA transmitter . . . . . . . . . . . . . . . . . . . . . . . . 163.4 8-PAM Constellation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163.5 Example of UE#2 LLR calculation . . . . . . . . . . . . . . . . . . . . . . 173.6 Example of bit-level interference cancellation in REMA . . . . . . . . . . . 193.7 Gray-mapping REMA using JML receiver . . . . . . . . . . . . . . . . . . 213.8 Gray-mapping REMA using CWIC with JML receiverv. . . . . . . . . . . 22

3.9 Natural-mapping REMA using JML receiver . . . . . . . . . . . . . . . . . 233.10 Natural-mapping REMA using CWIC with JML receiver . . . . . . . . . . 243.11 EDC-NOMA using JML receiver. . . . . . . . . . . . . . . . . . . . . . . 253.12 EDC-NOMA using CWIC with SUD receiver . . . . . . . . . . . . . . . . . 263.13 Natural-mapping 16-PAM . . . . . . . . . . . . . . . . . . . . . . . . . . . 263.14 Maximum achievable rate pairs in different scenarios . . . . . . . . . . . . 284.1 A typical LTE transmitter . . . . . . . . . . . . . . . . . . . . . . . . . . . 294.2 Multilevel coding transmitter . . . . . . . . . . . . . . . . . . . . . . . . . 304.3 Multilevel coding receiver. . . . . . . . . . . . . . . . . . . . . . . . . . . 304.4 Capacity for multilevel coding under 8-PAM modulation with naturalmapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314.5 Example of multistage decoding for multilevel code . . . . . . . . . . . . . 324.6 Transmitter of modified REMA with multilevel codes . . . . . . . . . . . . 334.7 Modified REMA with Multistage Decoding in far UE . . . . . . . . . . . . 334.8 Modified REMA with Multistage Decoding in near UE . . . . . . . . . . . 344.9 Natural-mapping-based modified REMA with multilevel code versus conventional REMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364.10 Indication of difference between modified REMA and conventional REMA374.11 Gray-mapping-based modified REMA with multilevel code versus conventional REMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38vi

List of Tables2.1 Exemplified rates of two UEs for OMA and NOMA . . . . . . . . . . . . .53.1 Specific power allocation for equal distance constellation . . . . . . . . . . 153.2 Parameter setting in simulations . . . . . . . . . . . . . . . . . . . . . . . . 203.3 Gray-mapping REMA using JML receiver . . . . . . . . . . . . . . . . . . 203.4 Gray-mapping REMA using CWIC with JML receiver. . . . . . . . . . . 213.5 Natural-mapping REMA using JML receiver . . . . . . . . . . . . . . . . . 223.6 Natural-mapping REMA using CWIC with JML receiver . . . . . . . . . . 233.7 EDC-NOMA using JML receiver. . . . . . . . . . . . . . . . . . . . . . . 233.8 EDC-NOMA using CWIC with SUD receiver . . . . . . . . . . . . . . . . . 244.1 Simulation setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354.2 Maximum achievable rates of Gray-mapping-based modified REMA withmultilevel code for the near UE. Different orders of multistage decoding aretested. Here, 16-PAM is adopted, where 1 bit is for the far UE and 3 bitsfor the near UE, which we denote by “F N 1 3” in the previous chapter. 354.3 Maximum achievable rate pairs of Gray-mapping-based modified REMAwith multilevel code. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354.4 Maximum achievable rate pairs of natural-mapping-based modified REMAwith multilevel code. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36vii

Chapter 1IntroductionThe demand to high transmission rates with multiple access capability on mobile deviceshas grown rapidly in recent years. In order to provide multiple users with shared system resources concurrently, many multiple access technologies have been proposed andpracticed such as time division multiple access (TDMA), frequency division multiple access (FDMA), code division multiple access (CDMA), and orthogonal frequency divisionmultiple access (OFDMA). Perhaps, the most popular technology in the current mobilecommunications in this regard is the so-called fourth generation (4G) Long-Term Evolution (LTE) [1]. It is standardized by the 3rd Generation Partnership Project (3GPP).The 3GPP adopts orthogonal multiple access (OMA) as its communication vehicle.In practice, OMA utilizes its orthogonality characteristic to achieve good systemthroughput with structural receiver design. However, with the emerging applicationssuch as high definition videos and cloud computations, orthogonality seems to becomea restriction in further increasing of transmission rates. As such, multi-user superposedtransmission (MUST) technology has been discussed extensively in order to push forwardthe system throughput. In its implementation, MUST requires advanced receiver design [2] to mitigate intra-cell and inter-cell interferences. Different from the OMA system,MUST allows to transmit information from more than one user at the same frequency orat the same time slot. Although MUST deliberately makes non-orthogonal transmissionby requiring advanced receiver design to cancel intra- and inter-cell interferences beforedecoding the desired signal, it can achieve better bandwidth efficiency and hence has a1

better throughput than OMA does. As a result, MUST becomes a good candidate of afuture multiple access technology.Two kinds of MUST will be introduced in this thesis, which are non-orthogonal multiple access (NOMA) [3, 4] and rate-adaptive constellation expansion multiple access(REMA) [5]. The remaining of the thesis is then organized as follows. Chapter 2 introduces NOMA and its respective receiver designs. Comparisons of these NOMA basedreceiver designs will follow. Chapter 3 addresses REMA, including its resultant constellation that maintains a large minimum distance among adjacent constellation points.Performance comparisons under different scenarios are also provided. Chapter 4 devotesto multilevel codes [6] as well as its combination with REMA. Verification of performancegain by incorporating multilevel code into REMA will be done by simulations. Chapter 5concludes the thesis.2

Chapter 2System Model and Background2.1Introduction to Non-Orthogonal Multiple Access(NOMA)Figure 2.1: Basic NOMA scheme in downlink communicationIn the 4G long-term evolution (LTE) system [1], orthogonal frequency division multipleaccess (OFDMA or simply OMA) is adopted. The OMA demands the signals of userequipments (UEs) being orthogonal in frequency domain so that a UE would not affectthe transmissions of other UEs. The characteristic of orthogonality allows UEs to achievea good system throughput with a linear-algebraic based receiver design. Recent advancein technology however hints that orthogonality may limit further increasing of systemthroughput and hence non-orthogonal multiple access (NOMA) [3, 4, 7, 8, 9] for downlinktransmission is introduced.In order to simplify our investigation on NOMA, we assume that both base stations3

(BSs) and user equipments (UEs) are equipped with a single antenna, and each BS servesonly two UEs (cf. Figure 2.1). Furthermore, the informational signals that are transmittedfrom the BS respectively to the two UEs are independently generated, and are combinedwith different powers before their transmission. The combined signal x from the BS tothe two UEs is then described by the following model:x pP 1 s1 pP 2 s2(2.1)where s1 and s2 are the informational signals respectively to be conveyed to UE#1 andUE#2, and P1 and P2 are respectively their transmission powers. The total transmissionpower P is therefore equal to the sum of P1 and P2 , and E[ s1 2 ] and E[ s2 2 ] are bothunity as a convention.The received signal at UE#i is then given byyi hi x ni hi pP 1 s1 pP2 s2 ni ,i 1, 2(2.2)where hi is the channel gain between BS and UE#i, and ni is an additive white Gaussiannoise (AWGN) with mean zero and variance Ni .From the above setting, we learn that the BS of a NOMA system schedules its transmission signal to two UEs concurrently either at the same frequency band or at the sametime slot. As a result of such design, a UE receives not only its desired informational signal but also the interference signal to the other UE. So the UE should have the capabilityto remove the unwanted interference signal.In the sequel of this section, we remark on the comparison between OMA and NOMA.Without loss of generality, let the total transmission bandwidth be unity and be remindedagain that both UE#1 and UE#2 consume the entire transmission bandwidth. Underthe assumption that UE#1 decodes successfully and no error propagation occurs, thetransmission rates of UE#1 and UE#2 in the NOMA system are given by: P1 h1 21P2 h2 21, R2 log2 1 .R1 log2 1 2N12P1 h2 2 N2(2.3)On the other hand, under OMA, UE#1 and UE#2 should use separate transmissionbandwidths in order to make orthogonal their transmission signals. We assume that α4

portion of the entire transmission bandwidth is assigned to UE#1 and (1 α) to UE#2.This changes their transmission rates to: αP1 h1 2(1 α)P2 h2 2R1 log2 1 , R2 .log2 1 2αN12(1 α)N2(2.4)Figure 2.2: Comparison between OMA and NOMATable 2.1: Exemplified rates of two UEs for OMA and NOMAOMANOMAR11.66462.1962R20.250.3685Far User (SNR h2 2 / N2 0 dB) Capacity0.5OMA capacity boundaryNOMA capacity 2.5Near User (SNR h 2 / N 20 dB) Capacity133.51Figure 2.3: Capacities of OMA and NOMABased upon the above setting, we herein give a simple example to exemplify thetheoretical difference between OMA and NOMA. As shown in Figure 2.2, we suppose thatthe signal-to-noise ratios (SNRs) of UE#1 and UE#2 are 20 dB and 0 dB, respectively,5

where the SNR of UE#i is defined as hi 2 /Ni for i 1, 2. Let α 0.5 and P1 P2 0.5Pfor OMA, and let P1 P/5 and P2 4P/5 for NOMA. Then we can conclude fromTable 2.1 that NOMA has a better sum rate than OMA. We also plot in Figure 2.3 thecapacities of OMA and NOMA, which also confirms that NOMA is significantly betterthan OMA.Figure 2.4: NOMA combining with MIMOIn its extension design, NOMA may combine with multiple-in-multiple-out (MIMO) aswell as opportunistic beamforming [11], in which BSs and UEs now equip with multipleantennas. An an example in Figure 2.4, the BS generates four informational signalsrespectively for each of the four UEs and then superposes them into two beams before theirtransmission [12]. As such, a UE receives both intra-beam and inter-beam interferences.The authors in [12] then proposed to use the minimum mean squared error (MMSE)detector to suppress the inter-beam interference and cancel the intra-beam interferenceby the successive interference cancellation (SIC) technique.In this thesis, the modulation symbols we adopt are pulse-amplitude modulation(PAM) because PAM is a one-dimensional symbol and hence can be analyzed. Beforeconstellations combining, each of the two UE modulation symbols (i.e., s1 and s2 ) takes6

Figure 2.5: Unequal distance constellation of NOMA: 0.2 8-PAM 0.8 2-PAMthe Gray-mapping constellation; hence, any two adjacent constellation points have onlyone bit difference. But after constellation combining, the resultant extension constellation will become unequal distance and non-Gray-mapping, for which an example is givenin Figure 2.5. One can manage to make the resultant combined constellation a Graymapping one for NOMA. For example, simply making the constellation points of UE#2depends on those of UE#1 can do the trick.Recently, a novel non-orthogonal transmission was proposed by Huawei Technologies Co. Ltd., which was named rate-adaptive constellation expansion multiple access(REMA) [5]. Basically, the idea behind REMA is to use existing equal-distance constellation at the combining stage, together with the natural mapping and Gray-mapping.REMA will be introduced in detail in the next chapter.2.22.2.1Receiver Design in Typical MIMO SystemLinear Minimum Mean Square Error (MMSE) DetectorA typical MIMO system can be described by:y Hx n7(2.5)

where H is the channel matrix, x is the transmitted signal vector, and n denotes theAWGN with mean zero and variance σN2 . Two common receiver designs for the MIMOsystem are zero-forcing (ZF) and minimum mean square error (MMSE) [13]. The ZFdetector only focuses on the elimination of channel effect and has the form ofwZF HH HHH 1(2.6)where superscript “H ” denotes the Hermitian transpose operation. The MMSE detectoradditionally considers the impact of additive noise, and improves the ZF detector withthe form ofwMMSE HH HHH diag(σN2 ) 1.(2.7)Since the MMSE detector also depresses the noise effect, it has a better performance thanthe ZF detector.In order to improve the performance of MMSE detector in interference cancellation,the authors in [14] proposed a novel modification of it, resulting in the so-called MMSEinterference rejection combining (MMSE-IRC) detector. It is worth mentioning that thecomplexity of linear detectors is often lower than that of nonlinear ones, and hence theyare more commonly employed in successive interference cancellation (SIC) technique.2.2.2Successive Interference Cancellation (SIC) ReceiverSIC is a commonly employed receiver scheme in conventional MIMO system. In situationwhen the interference power is seemingly larger than the power of the desired signal, SICcan reach a good performance [15, 16]. In its practice, SIC usually uses a linear MMSEdetector to retrieve and subsequently cancel the interference signal. It can be classifiedinto two categories: symbol-SIC (S-SIC) and codeword-SIC (CWIC).The MIMO system in its simplest form assumes two transmit antennas at the transmitter and two receive antennas at the receiver. By assuming that there are only onedesired signal and one interference signal contained in one beam, the system model in(2.5) can be rewritten as: y1h11h12n xs xi 1y2h21h22n28(2.8)

where xs and xi are the desired signal and the interference signal, respectively.Figure 2.6: Structure of the S-SIC receiverFigure 2.6 illustrates the structure of a S-SIC receiver. By the linear detector introduced in Section 2.2.1, both the desired and interference signals are detected. Denote therecovered signals by ỹ1 and ỹ2 , respectively. The S-SIC receiver then resumes the transmitted interference signal through a hard-decision maker, and subtracts the hard-decisionoutput from y to obtain ỹ. The next step of the S-SIC receiver is to perform again thelinear detector on ỹ and recover the desired signal.One of the disadvantages of the S-SIC receiver is its serious error propagation whensymbol error rate (SER) is high. In certain case, the S-SIC receiver may have a worseperformance than performing linear receiver directly to obtain the desired signal withoutdoing interference cancellation.Figure 2.7: Structure of the CWIC receiverTo mitigate the error propagation problem of the S-SIC receiver, the CWIC receiverhas been proposed as illustrated in Figure 2.7. Different from S-SIC, a CWIC receivercollects the soft information of all interferences, which are log-likelihood ratios (LLRs)[10], and passes these to the channel decoder to decode the interference signals. Then,re-encode and re-modulate the obtained estimates of interference signals and remove the9

interference effects from received signals y.Simulation results in [15] show that CWIC improves the performance of S-SIC in errorperformance. To further reduce the error rate, cyclic redundancy check (CRC) can beadded to CWIC. Thus, it is suggested that if interference signal is decoded correctly,which is confirmed by CRC, adopting CWIC; otherwise, fall back to linear detector. Bythis, the chance of error propagation can be eliminated in the CWIC receiver.Notably, a premise for CWIC is that the modulation scheme of interferences shouldbe known; otherwise, CWIC will be infeasible.2.3CWIC Receiver in NOMAIn Section 2.1, we learn that NOMA schedules multiple UEs together and shares thetransmit power among UEs with significant difference. In Section 2.2.2, we further learnthat the CWIC receiver performs better when the power difference between UEs is large.Accordingly, the CWIC receiver is suitable in the NOMA system.2.3.1CWIC with Single UE detection (SUD)Figure 2.8: Structure of far UE and near UE receiver in NOMAIn Figure 2.1 as well as subsequent Eq. (2.2), we observe that UE#1 is closer to BS10

than UE#2. So it is reasonably anticipated that UE#1 has a better channel gain thanUE#2. So BS allocates more power to UE#2, resulting that P2 P1 .Figure 2.8 shows the block diagram of UE#1 (near UE) and UE#2 (far UE) receiversFor the received signal of UE#2, since signal s1 to UE#1 has a smaller power than s2 ,UE#2 treats s1 as interference and directly estimates its desired signal s2 . This is referredto as single UE detection (SUD). In other words, UE#2 is operated based onrP1n2y2s1 s2 ñ2ŷ2 s2 P2h2 P2h2 P2(2.9)where ñ2 denotes the effective noise experienced by UE#2.On the other hand, for the received signal of UE#1, the signal to UE#2 has a largerpower that the signal to UE#1 does. So UE#1 first determines s2 throughrn1y1P1s1 s2 ñ2 .ŷ1 s2 P2h1 P2h1 P2(2.10)After collecting the soft information of interference signal s2 , UE#1 proceeds to executedecoding as the interference signal is designed to be a codeword of a certain code. Then,UE#1 regenerates the interference signal s2 by re-do the encoding process, and subtractsit from the received signal y1 . It then decodes s1 without interference term s2 . The systemdesign is then called CWIC with SUD.2.3.2CWIC with Joint Maximum Likelihood (JML)Figure 2.9: CWIC with JML receiver in NOMAOther than CWIC with SUD, one can alternatively adopt the so-called CWIC withjoint maximum likelihood (JML). The structure of a CWIC with JML receiver is shown11

in Figure 2.9. It is similar to CWIC with SUD except that the near UE performs JML. Specifically, the near UE detects x P1 s1 P2 s2 and generates its correspondingLLR via the joint constellation based onŷ1 ppy1n1 ( P 2 s2 P 1 s1 ) x ñ1 .h1h1(2.11)It should be mentioned that in the NOMA system, the desired signal and interferencesignal come from one BS; so it is possible to provide the scheduling information (such ascode rates and modulation schemes of users) to both UEs through a control channel. Incase such information is not available, CWIC may become infeasible.2.4Joint Maximum-Likelihood (JML) Receiver inNOMAFigure 2.10: JML receiver in NOMAAs remarked at the end of the previous subsection, CWIC is infeasible if the receiverdoes not have the information of inference modulation scheme. In such case, JML can beused instead as depicted in Figure 2.10. In comparison with CWIC technique, the JMLreceiver may perform worse but it can be used without knowing the modulation schemeof the other user.Figure 2.11 is the simulation result for JML and NOMA with SUD. It indicates asanticipated that JML performs worse than CWIC with SUD.12

Rate Pair of NOMA with PAM SignalsUE#1 20dB UE#2 10dB, TargetBLER 0.1UE#1: CWIC with SUD Receiver UE#2: single UE detectionUE#1: JML Receiver UE#2: single UE detectionPAM time sharing region1.81.6Far UE Rate1.41.210.80.60.40.2000.2 0.4 0.6 0.811.2 1.4 1.6 1.8 2 2.2 2.4 2.6 2.8Near UE Rate33.2 3.4 3.6 3.8Figure 2.11: Achievable rates of JML and NOMA with SUD134

Chapter 3Non-Orthogonal Transmission withEqual Distance ConstellationsIn the NOMA system, the combined constellation may have unequal distance constellationpoints because of unbalanced power allocation. Some adjacent constellation points maybecome very close as exemplified in Figure 3.1(b). In order to reduce the so-called errorvector magnitude (EVM) [17], or sometimes called receive constellation error (RCE), equaldistance constellation points are favored as depicted in Figure 3.1(a).In this chapter, we will introduce two kinds of non-orthogonal transmission with equaldistance constellations. Analysis of their pros and cons will follow.Equal distance PAM constellationNon equal distance PAM constellation110.50.500 0.5 0.5 1 2 101 1 22(a) Equal distance constellation points 1012(b) Non-equal distance constellation pointsFigure 3.1: Schematic diagram of equal and non-equal distance constellation14

3.1NOMA with Equal Distance Constellation (EDCNOMA)Figure 3.2: NOMA transmitterRecall in Figure 3.2 the transmitter of NOMA. In notations, P1 and P2 are the transmission powers allocated for two information signals, respectively. In order to have equaldistance constellation, P1 and P2 cannot be arbitrary but fixed. For example, whenthe two informational signals are respectively 4-PAM and 2-PAM modulated, choosingP1 0.2381 and P2 0.7619 will result in an equal distance extension constellation.Table 3.1 lists the fixed powers allocated for different kinds of combination of PAM modulations, which can lead to equal distance constellation.Table 3.1: Specific power allocation for equal distance constellationUE#1 UE#2P1P2Combined constellation2-PAM 2-PAM0.20.84-PAM4-PAM 2-PAM0.23810.76198-PAM8-PAM 2-PAM0.24710.752916-PAM4-PAM 4-PAM0.05880.941216-PAM3.23.2.1Rate-Adaptive Constellation Expansion MultipleAccess (REMA)Concept of REMARate-adaptive constellation expansion multiple access (REMA) is also a non-orthogonaltransmission scheme. Similar to NOMA, it also transmits the informational signals totwo UEs concurrently either at the same frequency band or at the same time slot. Thekey idea behind REMA is to do the combination of the two informational signals not at15

the symbol level but at the bit level such that the combined symbols are always equaldistance in the combined extension constellation.Specifically, tag the coded bits for informational message to UE#1 by “N,” and thosefor informational message to UE#2 by “F,” where “N” and “F” stand for near andfar users, respectively. The REMA actually encodes the two informational messages totwo UEs independently, followed by a multiplexing process that superposes the codedmessages into their allocated positions as shown in Figure 3.3. The resulting multiplexedcolumn-wise bit patterns are then mapped to modulation symbols corresponding to equaldistance constellation points.For better understanding, an 8-PAM example is given in Figure 3.4. Since the protection level of each bit is different, where b0 is least likely to be erroneously transmitted,while b2 has the worst bit error rate, row permutation is added before modulation in orderto equalize the protection capability of each of the three bits.Alternatively, one can take advantage of the unequal protection capability of eachbit. For example, as the far UE has a worse SNR than the near UE, we can place theinformational message to the far UE at a better protected bit position.Figure 3.3: Structure of REMA transmitterFigure 3.4: 8-PAM Constellation16

3.2.2Demodulation in REMARepresent the received signal in REMA as:yi hi x nii 1, 2(3.1)where x is the combined modulated M-PAM signal, and suppose K2 bits are allocated toUE#2, which for simplicity are assumed to be b0 , b1 , . . . , bK2 1 . Then for k 0, 1, . . . , K2 1, UE#2 calculates LLRs according to:max(1)LLR(bk ) logα SUE#2,kmax(0)α SUE#2,k 12σ 2 12πσexp 2σ12 y2 h2 α 2 12πσexp 2σ12 y2 h2 α 2min(0)α SUE#2,k y2 h2 α 2 min(1)α SUE#2,k (3.2)! y2 h2 α 2 ,(b)where SUE#2,k is the set of 2K2 -PAM symbols that corresponds to UE#2 and bk b. Anexample of M 4 and K2 1 is given in Figure 3.5.Figure 3.5: Example of UE#2 LLR calculationTwo kinds of receivers can be used by the near UE (i.e., UE#1): JML receiver andCWIC with JML receiver.A) JML ReceiverThe same as (3.2), a JML receiver calculates LLRs of all bits according to: 1max 2πσexp 2σ12 y1 h1 α 2(1)LLR(bk ) logα Skmax(0)α Sk 12σ 2 12πσexp 2σ12 y1 h1 α 2 min y1 h1 α 2 min y1 h1 α 2(1)(0)α Skα Sk17(3.3)!,

(b)where Sk is the set of M-PAM symbols that corresponds to bk b. Here, bk correspondsto those bits that belong to the coded informational message to UE#1.B) CWIC with JML ReceiverIn REMA, interference cancellation can be done at the bit level, which includes two stepsas follows.Step 1: Calculate LLRs corresponding to those code bits of UE#2 via (3.3), and decodethe information bits of UE#2. Check CRC of the decoded information bits ofUE#2. If CRC check is passed, re-encode the decoded information bits of UE#2and go to Step 2; else, fall back to use JML receiver to demodulate and decodethe information bits of UE#1.Step 2: Calculate the LLRs corresponding to those coded bits of UE#1 according to: 1exp 2σ12 y1 h1 s1 2max ′ 2πσ(1)LLR(bk ) logs1 Skmax ′(0)s1 Sk (b)′where Sk12σ 2 12πσexp 2σ12 y1 h1 s1 2 min ′ y1 h1 s1 2 min ′ y1 h1 s1 2(1)(0)s1 Sks1 Sk(3.4)!is the set of constellation points with b0 , b1 , . . . , bK2 1 for UE#2 beingequal to the ones obtained from Step 1. Collecting LLRs for the desired signalfor UE#1 and decode them.For better understanding, an example of constellation points after interference cancellation in REMA is illustrated in Figure 3.6.3.3Examination of NOMA and REMAIn this section, we examine the performance of various REMA schemes through simulations.In our setting, we assume that both BSs and UEs are equipped with only a singleantenna (cf. Figure 2.1). Each BS only serves two UEs, where the near and far ones are18

Figure 3.6: Example of bit-level interference cancellation in REMArespectively indexed as 1 and 2. Under the AWGN channel, assume the SNRs of near andfar UEs are 20dB and 10dB, respectively. 3GPP-specified punct

the traditional orthogonal multiple access (OMA) technology. In order to improve user throughput of OMA, user equipments (UEs) of non-orthogonal transmission technology needs to enhance their receivers with interference cancellation capability in order to elim-inate interferences generated by other users. In this thesis, two kinds of non-orthogonal

Related Documents:

Research Design: Financial Performance Analysis In this study, financial performance analysis will be used. The analysis is based on three types of analysis methods which are horizontal analysis, trend analysis and ratio analysis. All data analysis is based on the items on the financial statement. A financial statement is a written record

Qualitative analysis, quantitative analysis, non-financial indicator analysis, financial indicator analysis, internal performance analysis, external performance analysis, project-orientated analysis, organization-orientated analysis 8 [36] Area-based Knowledge measurement in products and processes,

Incorporates performance analysis, such as safety and valuations (“bang for the buck”) Based on fundamentally understanding design controls and then establishing the corresponding design values Best supported by performance-based analysis Emphasized as Performance Based Practical Design (PBPD)

Present ICE Analysis in Environmental Document 54 Scoping Activities 55 ICE Analysis Analysis 56 ICE Analysis Conclusions 57 . Presenting the ICE Analysis 59 The ICE Analysis Presentation (Other Information) 60 Typical ICE Analysis Outline 61 ICE Analysis for Categorical Exclusions (CE) 62 STAGE III: Mitigation ICE Analysis Mitigation 47 .

Design and Analysis Software v2 file used as a template to contain primary analysis and secondary analysis settings. This option can be used for the analysis of legacy EDS or SDS files when a specific set of primary and secondary analysis settings are needed. The primary and secondary analysis settings will be used when the analysis (-a) option .

Performance Analysis and Design Model (PAD5) Westinghouse October 2013. WESTINGHOUSE NON-PROPRIETARY CLASS 3 ii WCAP-17642-NP Revision 0 Westinghouse Performance Analysis and Design Model (PAD5) Tim M. Crede Fuel Rod and Thermal-Hydraulic Design Paul J. Kersting PWR Core Methods Otto Linsuain PWR Core Methods

An NDARC job consists of one or more cases, each case optionally performing design and analysis tasks. The design task involves sizing the rotorcraft to satisfy specified design conditions and missions. The analysis tasks can include off-design mission performance calculation, flight performance calcula-

Legal Design Service offerings Legal Design - confidential 2 Contract design Litigation design Information design Strategy design Boardroom design Mastering the art of the visual Dashboard design Data visualization Legal Design What is especially interesting in the use of visual design in a p