scholarly journals SIC-Coding Schemes for Underlay Two-Way Relaying Cognitive Networks

2020 ◽  
Vol 2020 ◽  
pp. 1-17
Author(s):  
Pham Ngoc Son ◽  
Tran Trung Duy ◽  
Khuong Ho-Van

In this paper, we propose an underlay two-way relaying scheme with the successive interference cancellation (SIC) solution in which two secondary sources transmit simultaneously their data to each other through secondary relays. The proposed scheme is operated in only two time slots and under an interference constraint of a primary receiver, denoted as the UTW-2TS scheme. In the UTW-2TS scheme, the secondary relays employ the SIC operation to decode successively the data from received broadcast signals and then encode these data by two techniques: digital network coding (DNC) enforced by XOR operations (denoted as the UTW-2TS-DNC protocol) and superposition coding (SC) enforced by power domain additions (denoted as the UTW-2TS-SC protocol). A selected secondary relay which subjects to maximize decoding capacities and to minimize collection time of channel state information in two protocols UTW-2TS-DNC and UTW-2TS-SC experiences residual interferences from imperfect SIC operations. Outage probabilities and throughputs are solved in terms of exact closed-form expressions to evaluate the system performance of the proposed protocols. Simulation and analysis results provide performance enhancement of the proposed protocols UTW-2TS-DNC and UTW-2TS-SC owing to increase the number of the cooperative secondary relays, the interference constraints, and the distances from the secondary network to the primary receiver. The best throughputs are pointed at optimal interference power allocation coefficients and optimal locations of the selected secondary relay. Considering the same power consumption, the UTW-2TS-DNC protocol outperforms the UTW-2TS-SC protocol. Finally, the simulation results are collected to confirm the exact analysis values of the outage probabilities and throughputs.

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Thu-Thuy Thi Dao ◽  
Pham Ngoc Son

This paper considers the effects of perfect/imperfect successive interference cancellation (SIC) and perfect/imperfect ` information (CSI) in a multiple-relay two-way cooperative network using nonorthogonal multiple access (NOMA) and digital network coding (DNC). In this model, a relay is selected by maximizing estimated channel gains to enhance the decoding capacity of the nearer source and minimize the collection time of imperfect CSI. Spectrum utilization efficiency is enhanced two times by a mixture of the SIC and DNC techniques at the selected relay (called as the SIC-2TS protocol). The system performance is considered through analysis of the exact and asymptotic expressions of the system outage probabilities and throughput. The major thing is exposed as the proposed SIC-2TS protocol can reach the best performance at optimal positions of the selected relay. Besides, the system throughput of the proposed protocol outperforms a SIC-utilized two-way relaying scheme without the DNC (called as the SIC-3TS protocol) and a conventional two-way scheme (called as the CONV-4TS protocol) for all signal-to-noise ratio regions. Lastly, the validity of the analytical expressions is verified by the Monte Carlo simulation results.


Author(s):  
Syed Rizwan Hassan ◽  
Noman Shabbir ◽  
Arooj Unbreen ◽  
Ateeq Ur Rehman ◽  
Ahmad Iqbal

Non Orthogonal Multiple Access (NOMA) is fundamentally different from the Orthogonal Multiple Access (OMA) techniques as in NOMA the user make access to channel by using the same frequency and in the same time. In NOMA the multiplexing is performed in power domain by using superposition coding at the transmitter and receiver side uses Successive Interference Cancellation (SIC) to separate the transmitted signals that are multiplexed in power domain. This technique is a possible candidate for future radio access so this is a hot topic in research. Being a different method from OMA that is implemented in all previous mobile communication generations several misconceptions have been developed about this technique. This paper give an overview about NOMA based system and also analyze the major misconceptions about this technique and also explain the concepts to resolve these mistaken beliefs.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Y.K. Shobha ◽  
H.G. Rangaraju

PurposeThe suggested work examines the latest developments such as the techniques employed for allocation of power, browser techniques, modern analysis and bandwidth efficiency of nonorthogonal multiple accesses (NOMA) in the network of 5G. Furthermore, the proposed work also illustrates the performance of NOMA when it is combined with various techniques of wireless communication namely network coding, multiple-input multiple-output (MIMO), space-time coding, collective communications, as well as many more. In the case of the MIMO system, the proposed research work specifically deals with a less complex recursive linear minimum mean square error (LMMSE) multiuser detector along with NOMA (MIMO-NOMA); here the multiple-antenna base station (BS) and multiple single-antenna users interact with each other instantaneously. Although LMMSE is a linear detector with a low intricacy, it performs poorly in multiuser identification because of the incompatibility between LMMSE identification and multiuser decoding. Thus, to obtain a desirable iterative identification rate, the proposed research work presents matching constraints among the decoders and identifiers of MIMO-NOMA.Design/methodology/approachTo improve the performance in 5G technologies as well as in cellular communication, the NOMA technique is employed and contemplated as one of the best methodologies for accessing radio. The above-stated technique offers several advantages such as enhanced spectrum performance in contrast to the high-capacity orthogonal multiple access (OMA) approach that is also known as orthogonal frequency division multiple access (OFDMA). Code and power domain are some of the categories of the NOMA technique. The suggested research work mainly concentrates on the technique of NOMA, which is based on the power domain. This approach correspondingly makes use of superposition coding (SC) as well as successive interference cancellation (SIC) at source and recipient. For the fifth-generation applications, the network-level, as well as user-experienced data rate prerequisites, are successfully illustrated by various researchers.FindingsThe suggested combined methodology such as MIMO-NOMA demonstrates a synchronized iterative LMMSE system that can accomplish the optimized efficiency of symmetric MIMO NOMA with several users. To transmit the information from sender to the receiver, hybrid methodologies are confined to 2 × 2 as well as 4 × 4 antenna arrays, and thereby parameters such as PAPR, BER, SNR are analyzed and efficiency for various modulation strategies such as BPSK and QAMj (j should vary from 8,16,32,64) are computed.Originality/valueThe proposed hybrid MIMO-NOMA methodologies are synchronized in terms of iterative process for optimization of LMMSE that can accomplish the optimized efficiency of symmetric for several users under different noisy conditions. From the obtained simulated results, it is found, there are 18%, 23% 16%, and 8% improvement in terms of Bit Error Rate (BER), Least Minimum Mean Squared Error (LMMSE), Peak to Average Power Ratio (PAPR), and capacity of channel respectively for Binary Phase Shift Key (BPSK) and Quadrature Amplitude Modulation (QAM) modulation techniques.


2019 ◽  
Author(s):  
Sanjeev Gurugopinath

Non-orthogonal multiple access (NOMA) has been recently proposed as a technique to increase the network throughput and to support massive connectivity, which are major requirements in the fifth generation (5G) communication systems. The NOMA can be realized through two different approaches, namely, in (a) power-domain, and (b) code-domain. In the power-domain NOMA (PD-NOMA), multiple users are assigned different power levels – based on their individual channel quality information – over the same orthogonal resources. The functionality of PD-NOMA comprises of two main techniques, namely, superposition coding at the transmitter and successive interference cancellation (SIC) at the receiver. An efficient implementation of SIC would facilitate to remove interference across the users. The SIC is carried out at users with the best channel conditions and is performed in descending order of the channel. On the other hand, in the code-domain NOMA (CD-NOMA), multiplexing is carried out using low-density spreading sequences for each user, similar to the code division multiple access (CDMA) technology. In this article, we provide an introduction to NOMA and present the details on the working principle of NOMA systems. Later, we discuss the different types of NOMA schemes under PD- and CD-domains, and investigate the related applications in the context of 5G communication systems. Additionally, we discuss the integration of NOMA with other technologies related to 5G such as cognitive radio and massive MIMO, and discuss some future research challenges.


Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3064
Author(s):  
Abdulah Jeza Aljohani ◽  
Muhammad Moinuddin

Power-domain non-orthogonal multiple access (NOMA) assigns different power levels for near and far users in order to discriminate their signals by employing successive interference cancellation (SIC) at the near user. In this context, multiple-input-single-output NOMA (MISO-NOMA), where the base station (BS) is equipped with multiple antennas while each mobile user has a single antenna receiver, is shown to have a better overall performance by using the knowledge of instantaneous channel state information (CSI). However, this requires prior estimation of CSI using pilot transmission, which increases the transmission overhead. Moreover, its performance is severely degraded in the presence of CSI estimation errors. In this work, we provide statistical beamforming solutions for downlink power-domain NOMA that utilize only knowledge of statistical CSI, thus reducing the transmission overhead significantly. First, we derive the outage probabilities for both near and far users in the multi-user NOMA system without imposing strong assumptions, such as Gaussian or Chi-square distribution. This is done by employing the exact characterization of the ratio of indefinite quadratic form (IQF). Second, this work proposes two techniques to obtain the optimal solution for beam vectors which rely on the derived outage probabilities. Specifically, these two methods are based on (1) minimization of total beam power while constraining the outage probabilities to the QoS threshold, and (2) minimization of outage probabilities while constraining the total beam power. These proposed methods are non-convex function of beam vectors and, hence, are solved using numerical optimization via sequential quadratic programming (SQP). Since the proposed methods do not require pilot transmission for channel estimation, they inherit better spectral efficiency. Our results validate the theoretical findings and prove the supremacy of the proposed method.


2021 ◽  
Author(s):  
Navideh Ghafouri Jeshvaghani ◽  
Naser Movahhedinia ◽  
Mohammad Reza Khayyambashi

Abstract Non-orthogonal multiple access (NOMA) is one of the promising radio access techniques for resource allocation improvement in the 5th generation of cellular networks. Compared to orthogonal multiple access techniques (OMA), NOMA offers extra benefits, including greater spectrum efficiency which is provided through multiplexing users in the transmission power domain while using the same spectrum resources non-orthogonally. Even though NOMA uses Successive Interference Cancellation (SIC) to repeal the interference among users, user grouping has shown to have a substantial impact on its performance. This prformance improvement can appear in different parameters such as system capacity, rate, or the power consumption. In this paper, we propose a novel user grouping scheme for sum-rate maximization which increases the sum-rate up to 25 percent in comparison with two authenticated recent works. In addition to being matrix-based and having a polynomial time complexity, the proposed method is also able to cope with users experiencing different channel gains and powers in different sub-bands.


2018 ◽  
Vol 2018 ◽  
pp. 1-15
Author(s):  
Marwa Chami ◽  
Mylene Pischella ◽  
Didier Le Ruyet

This paper investigates the resource allocation problem for a multicarrier underlay cognitive radio system, under the assumption that only statistical Channel State Information (CSI) about the primary channels is available at the secondary user. More specifically, we maximize the system utility under primary and secondary user outage constraints and the total power constraint. The secondary user transmission is also constrained by the interference threshold imposed by the primary user. Moreover, the secondary receiver adapts its decoding strategy, which is either treating interference as noise or using successive interference cancellation or superposition coding. This leads to a nonconvex optimization problem, with either perfect or statistical CSI. Consequently, we propose a sequential-based algorithm to efficiently obtain a solution to the problem. The simulation results show that the sequential algorithm is convergent and that our global proposed scheme achieves larger secondary and sum rates than other algorithms where the decoding strategy is not adapted.


Sensors ◽  
2020 ◽  
Vol 20 (5) ◽  
pp. 1273
Author(s):  
Yanhong Tuo ◽  
Chao Zhang

In this paper, we investigate the outage performance of simultaneous wireless information and power transfer (SWIPT) based Decode-and-Forward (DF) relay networks, where the relay needs to simultaneously forward information for two relaying links, primary relaying link and parasitic relaying link. The primary relaying link is the traditional source-relay-destination relay system. While in the parasitic relaying link, the parasitic source, i.e., Internet-of-Things (IoT) tag, is not connected to the stable power source and thus has to backscatter the signals from the primary source to convey its information. The relay not only harvests energy from Radio Frequency (RF) signals from both sources but also forwards messages to their corresponding destinations. The primary source and destination are unaware of the parasitic backscatter transmission, but the relay and parasitic destination can employ successive interference cancellation (SIC) detector to eliminate the interference from the primary link and detect the message from the parasitic source. In order to investigate the interplay between the primary and parasitic relaying links, the outage probabilities of both relaying links are derived. Besides, the effects of system parameters, i.e., power splitting coefficient, forwarding power allocation coefficient and backscatter reflection coefficient, on the system performance are discussed. Simulation results verify our theoretical analysis. In the meanwhile, it is revealed that the advised relaying system has far larger sum throughput than the one with only primary relaying link and the parasitic relaying link can gain considerable throughput at the cost of negligible degradation of primary throughput.


Sign in / Sign up

Export Citation Format

Share Document