Академический Документы
Профессиональный Документы
Культура Документы
Abstract—In this work, we study a non-orthogonal multiple basic principle is that the users can achieve multiple access
access scheme used for the uplink of a wireless-powered com- by using the power domain. For this reason, the decoder
munication system. We focus on data rates optimization and needs to implement a joint processing technique, such as
fairness increase. We show that the formulated optimization
problems can be optimally and efficiently solved by either linear successive interference cancellation (SIC). The performance of
programming methods or convex optimization, which means that a downlink NOMA scheme with randomly deployed users has
the proposed scheme can be easily implemented in practical ap- been investigated in [13], while the application of NOMA for
plications. Simulation results illustrate that the proposed scheme the downlink of cooperative communication networks in [15],
outperforms the baseline orthogonal scheme, while they reveal among others. Finally, in [14], the authors study NOMA for
the dependence between sum-throughput, minimum data rate,
and wireless power transfer. the case of the uplink of a communication system, consisting
of traditional nodes with fixed energy supplies.
Unlike recent literature, in this work, we study the ap-
I. I NTRODUCTION plication of NOMA for the uplink of a wireless-powered
Energy harvesting is a promising solution for energy- communication system, which consists of one BS and several
sustainability of wireless nodes in communication networks, energy harvesting users, in order to increase the data rates and
enabling them to overcome the constraint of fixed energy fairness. Note that the implementation of NOMA in the uplink
supplies [1]. An alternative to traditional energy harvesting, is not a burden for the users, since the encoding complexity
such as solar power, is the wireless power transfer [2], [3]. In is not affected, while their synchronization is simpler than
this framework, nodes use the power by the received signal the case of TDMA. To this end, we optimize the related
to charge their batteries [4], or to transmit the information to variables, taking into account two different criteria: the sum-
a base station (BS) [5]. However, in practice, nodes cannot throughput and the equal rate maximization. Moreover, in the
harvest energy and transmit information simultaneously [5]– case of sum-throughput maximization, further improvement
[7]. In order to overcome this difficulty, a harvest-then- of the minimum data rate among users is also discussed. In
transmit protocol has been proposed in [5], where the users the formulated problems, we take into account the time used
first harvest energy, and then they transmit their independent for energy harvesting and the time-sharing variables related
messages to the BS. More specifically, the authors in [5] to SIC. Moreover, we show that all formulated problems
assume that the users utilize time division multiple access can be optimally solved by either linear programming or
(TDMA) for information transmission, using solely the en- convex optimization, which is important for the practical
ergy they harvested. Although using the harvested energy implementation of the proposed scheme. Extended simulation
for transmission has many benefits, the dependence of the results illustrate that the application of the proposed NOMA
nodes on the harvested energy has a negative impact on scheme, when comparing to the case of TDMA, has the
the data rates that they can achieve. Consequently, methods following advantages: i) it leads to a notable increase of the
which increase power-bandwidth efficiency should be carefully minimum data rate, and/or, ii) it improves fairness. Finally,
explored [8], [9]. Toward this direction, the utilization of an interesting trade-off between the time used for energy
orthogonal multiple access schemes, such as TDMA, might harvesting and information transmission is revealed, as well
not be the most appropriate option. as the dependence between sum-throughput, minimum data
On the other hand, non-orthogonal multiple access (NOMA) rate, and wireless power transfer.
proves to increase spectral efficiency [10]. For this reason, it The rest of the paper is organized as follows. Section II
has been recently proposed for LTE Advanced, as it can be describes the considered communication and energy harvesting
verified by [11], in which it is cited as multi-user superpo- model, while it formulates the users data rates and system’s
sition transmission. Furthermore, it has been recognized as a sum-throughput. The optimization problems of throughput
promising multiple access technique for fifth generation (5G) maximization and equal rates maximization are formulated and
networks [12]–[14]. NOMA is substantially different from solved in sections III and IV, respectively. Section IV presents
orthogonal multiple access schemes, i.e. time/frequency/code and discusses the simulation results and finally, section V
division multiple access (TDMA/FDMA/CDMA), since its summarizes our conclusions.
II. S YSTEM M ODEL white gaussian noise (AWGN) power. Also, assuming channel
We consider a wireless network consisting of N users and reciprocity, gn = G02 Gn2 L20n |h0n |4 .
one BS, which are all equipped with a single antenna. The The sum-throughput achieved by NOMA is given by [14]
path loss factor from the BS to user n is denoted by L0n , N N −1 N
!
while the channel coefficient is given by the complex random
X X X T
Rsum = Rn = T log2 ηρ gi +
variables h0n ∼ CN (0, 1). The communication is divided into n=1 n=1 i=n
1−T
time frames of unitary duration. It is assumed that the channel N
!!
conditions remain constant during a time frame, and their exact
X T
− log2 ηρ gi +
values are known by the BS. i=n+1
1 − T
A. Harvest-then-Transmit Protocol T T
+ T log2 ηρgN + − log2
1−T 1−T
We consider that the network adopts a harvest-then-transmit PN !
protocol, i.e. at first, the amount of time 1 − T, 0 ≤ T ≤ 1 is ηρ n=1 gn
= T log2 1 + T
.
assigned to the BS to broadcast wireless energy to all users [5]. 1−T
The remaining amount of time, T , is assigned to users, which (5)
simultaneously transmit their independent information to the
BS. In order to detect the users’ signals, the BS implements III. S UM -T HROUGHPUT M AXIMIZATION
a joint processing technique [13], [16]. For this purpose, it It can be easily observed that, when T = 0 or T = 1,
employs a non-orthogonal multiple access (NOMA) scheme no time or no energy, respectively, is available to the users
[14]. We assume that the energy transmitted by each user n in order to transmit, and thus the sum-throughput is zero.
is limited by the amount of harvested energy, i.e. during time The optimization problem which aims at maximizing the sum-
portion T , each user can only use the energy that was harvested throughput can be written as
during 1 − T . The harvested energy by the n-th user is max Rsum
T (6)
En = G0 Gn η1 L0n |h0n |2 P0 (1 − T ), (1) C : 0 < T < 1.
where G0 and Gn are the directional antenna gains of the BS In (6), Rsum is strictly concave with respect to T in (0, 1),
and the n-th user, respectively, 0 < η1 < 1 is the energy since it holds that
harvesting efficiency, P0 is the transmit power of the BS. The PN
d2 Rsum (ηρ n=1 gn )2
transmit power of the n-th user is given by = − P < 0.
dT 2 PN
T 3 ln(2)(1 − ηρ n=1 gn +
ηρ N
n=1 gn 2
)
En T
Pn = . (2) (7)
T
Thus, the optimal value for T in (0, 1) that maximizes Rsum
B. User-Throughput and Sum-Throughput is unique and can be obtained by
In this subsection, the user data rate and the system sum-
dRsum
throughput are defined. Interestingly, the decoding order does = 0. (8)
dT
not affect the sum-throughput, and any arbitrary decoding
order can be assumed. Accordingly, in this section it is After some mathetmatical calculations, the optimal value can
assumed that the users’ messages are decoded in an increasing be expressed as
order of their indices. Therefore, for decoding the first user’s PN
ηρ n=1 gn
message (n = 1), interference is imposed due to all other users T∗ = P , (9)
PN ηρ N n=1 gn −1
n = 2, ..., N , while on the second user’s message, interference ηρ n=1 gn + ηρ
PN
gn −1
W( n=1 )−1
e
is imposed due to users n = 3, ..., N , and so on. Using
∗
Shannon’s capacity formula, the throughput of the n-th user, where (·) denotes a solution value and W (x) is the Lam-
1 ≤ n ≤ (N − 1), is given by [14] bert W function, also called omega function or product
! logarithm, which gives the principal solution for W (x) in
Pn gn x = W (x)eW (x) . Note that W (x) is a built-in function in
Rn =T log2 1 + PN
most well-known mathematical software packages [1]. In the
j=n+1 (Pj gj ) + N0
(3) following, we describe two decoding order methods.
ηρ(1−T )gn
T
=T log2 1 + P , A. Descending Decoding Order
ηρ(1−T ) N j=n+1 gj
T + 1 The simplest case of decoding is to adopt a fixed decoding
while the throughput of the N -th user is order among users. For fairness, the users’ indices are assigned
ηρ(1 − T )gN
in a way that the values gn ∀N are sorted in descending
RN = T log2 1 + . (4) order, i.e. g1 ≥ ... ≥ gN , since this allows decoding the
T
weakest user’s message without interference. Therefore, this
P0
In the above equations, ρ = N 0
, η = η1 η2 , with η2 being scheme increases fairness compared to other schemes with
the efficiency of the user’s amplifier, and N0 the additive fixed decoding order, such as ascending decoding order.
B. Time-Sharing Configuration for minimum-throughput Im- IV. T IME A LLOCATION A LGORITHM D ESIGN FOR
provement COMMON - THROUGHPUT M AXIMIZATION
In this subsection, the indices of the users are ordered In this section, we aim to maximize the common-
according to the relations g1 ≥ g2 ≥ . . . ≥ gN , however, throughput, i.e. the throughput in the case where all users aim
the order of decoding depends on the time-sharing [16]. The to transmit with equal rate, Req . For this purpose, T as well as
basic principle of this technique is that the order of decoding the time-sharing configuration need to be optimized. In con-
for the users can change for specific fractions of the duration trast to the time-sharing configuration of the previous section
of T . Next, we present a simple method to optimize the time- for minimum rate improvement, the solution provided in this
sharing variables. In general, there are N ! configurations with section does not necessarily maximize the sum-throughput.
different Consequently, T can be adjusted accordingly, in order to
Pdecoding order, which will be called permutations.
Let τl , l τl = 1 denote the portion of time T for which the maximize the common-throughput. Next, the indices of the
BS decodes, according to the l-th permutation. Hereinafter, τ users are ordered according to g1 ≥ g2 ≥ . . . ≥ gN , however,
denotes the set of values of τl ∀l. For mathematical clarity, let the order of decoding depends on the time-sharing.
A be the matrix which represents all the permutations, with A. Problem Formulation and Solving Process Discussion
elements A(l, jl,n ), corresponding to the indices of the users, Taking into account the above considerations, the problem
i.e. A(l, jl,n ) = n. The decoding order of the users during the of common-throughput maximization can be formulated as
l-th permutation is determined by the indices of the columns,
jl,n , ∀n, for the l-th row of matrix A, i.e. if jl,n < jl,m , the max Req
τ ,T,Req
message of the n-th user will be decoded before the message s.t. Cn : R̃n ≥ Req , ∀n ∈ N , (12)
of the m-th. For example, if A(2, 4) = 3, it means that, when CN +1 : 0 < T < 1.
the 2-nd permutation is applied, the message of the 3-rd user
A selection for T corresponds to a specific achievable rate
will be decoded in the 4-th order. Thus, taking into account
region for the set of users N , where the time-sharing technique
the time-sharing configuration, the throughput of the n-th user,
can also be used. Thus, for a given time T , a set of time-
denoted by R̃n , can be written as
sharing fractions, τ , can be found that achieves any point of
R̃n (T ∗ ) = the achievable rate region defined by the inequalities
N!
X ηρ(1−T ∗ )gn R̃n (T ) ≤ T log2 1 + ηρgnT(1−T ) , ∀n ∈ N
τl T ∗ log2 1 + P
ηρ(1−T ∗ ) j
T∗
gA(l,jl,m )
. X P
l=1
>j
l,m l,n
+1 R̃n (T ) ≤ T log2 1 + ηρ(1−TT ) gn , ∀k : Mk ⊆ N ,
T∗
(10) n∈Mk
(13)
Please note that NOMA is appropriate for a small number where the second inequality holds for any sum set, Mk ⊆ N .
of users, thus the number of permutations is not a barrier for Now, suppose that the BS cancels all other users’ messages,
the determination of the time-sharing configuration. Moreover, for the user with the weakest link. In this case it is desired
taking into account all possible permutations can be considered that its throughput is at least equal to the final achievable Req ,
as a benchmark to other less complex schemes, which possibly i.e.
exclude some permutations at the expense of a suboptimal ηρ (1 − T ) gN
T log2 1 + ≥ Req . (14)
configuration. However, further discussion of these schemes T
is out of the scope of this paper, since it focuses only on | {z }
RN
optimal solutions.
Now, while the sum-throughput is maximized by setting Accordingly, for the two weakest users, that is for n = N and
T = T ∗ , where T ∗ is given by (9), we aim to boost n = N − 1, the sum of their throughput is maximized when
the minimum-throughput among users, Rmin , by applying the BS cancels out all other users’ messages, while for one of
the time-sharing technique. The corresponding optimization them it also cancels the other user’s message. Since they can
problem can be written as allow time-sharing for the time that each user’s message will
be canceled, for the sum of the throughput of these two users
max Rmin it must hold that
!
τ ,Rmin (11) PN
s.t. Cn : R̃n (T ∗ ) ≥ Rmin , ∀n ∈ N , ηρ (1 − T ) n=N −1 gn
T log2 1 + ≥ 2Req . (15)
T
where N = {1, 2, . . . , N } is the set of all users. | {z }
The optimization in (11) is a linear programming problem RN −1 +RN
and can be efficiently solved by well-known methods in Following the same strategy for all other users, it yields that
the literature, such as simplex or interior-point method [17]. Req is bounded by the following set of inequalities
As it has already been mentioned, the sum-throughput is P
ηρ Ni=n gi
independent of the decoding order of the messages, and thus T log2 1 + T
1−T
Req ≤ , ∀n ∈ N , (16)
it not affected by the solution of the optimization in (11). (N + 1 − n)
in which τ does not appear. Consequently, the optimization in Karush-Kuhn-Tucker (KKT) conditions, and is presented in
(12) can be optimally solved by reducing it into two disjoint detail in the next subsection.
optimization problems, minimizing the initial search space. The dual problem is given by
The two optimization problems are:
Problem 1: Optimization of T and Req min max L(λ, T, Req ). (20)
λ T,Req
max Req Considering the parts of the Lagrangian related to Req , it holds
T,Req
PN that
ηρ gi
s.t. Cn : T log2 1 + i=n
T ≥ (17) N
( PN
1−T X 0 if n=1 λn = 1,
(N + 1 − n)Req , ∀n ∈ N , max(1 − λn )Req = (21)
CN +1 : 0 < T < 1, Req
n=1
∞ otherwise.
N
N +1−n
X
L(λ, T, Req ) = Req + λn × !!#+
n=1 ηρgN
PN −T log2 1 + , ∀n ∈ {1, .., N − 1},
ηρ gi (19) T
T log2 1 + i=n
T 1−T Un
1−T
− Req , (25)
N +1−n
where t is the iteration index, λ̂n , n ∈ {1, ..., N − 1} are posi-
where λn ≥ 0 is the Lagrange multiplier, which corresponds tive step sizes, [·]+ = max(·, 0), and Un denotes
PN the projection
to the constraint Cn and λ is the Lagrange multiplier vector operator on the feasible set Un = {λn | n=1 λn = 1}. The
with elements λn . The constraint CN +1 is absorbed into the projection can P be simply implemented by a clipping function
1− n−1 λi
1 The bisection method is used in [5], in a problem of similar structure in
λn [t + 1] 0 i=1 and λN can be obtained from (22).
order to handle the linear objective function. In this paper, we do not use the Since Problem 1 is concave, it is guaranteed that the iterations
bisection method, in order to avoid the corresponding extra complexity. between the two layers converge to the optimal solution if the
size of the chosen step satisfies the infinite travel condition 7.0 Normalized Sum-Throughput (6) or [5]
X∞ 6.0
Min.-Throughput - NOMA (11)
P 3.0
∗ ηρ Ni=n gi
T log2 1 + 1−T
2.5
T∗
∗ 2.0
1.0
0.5
0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40
limited by the most stringent constraint Cn .
P (dBm)
0
V. S IMULATION R ESULTS AND D ISCUSSION Fig. 1. Comparison of average throughput when N = 3 and Rc2 = 20m.
0.8
Max. Sum-Throughput (6), N = 2 that the energy harvesting nodes utilize TDMA, which is used
Max. Sum-Throughput (6), N = 4
0.7
as a baseline. Extensive simulation results have shown that
the proposed scheme outperforms the baseline, in terms of
0.6
throughput and fairness. Finally, they reveal an interesting
0.5 dependence between sum-throughput, minimum data rate, and
0.4
wireless power transfer.
2 users
0.3
R EFERENCES
0.2 [1] P. D. Diamantoulakis, K. N. Pappi, G. K. Karagiannidis, and H. V. Poor,
“Autonomous Energy Harvesting Base Stations With Minimum Storage
0.1
Requirements,” IEEE Wireless Commun. Lett., vol. 4, no. 3, pp. 265–
0.0
268, Jun. 2015.
0 10 20 30 40 [2] P. Grover and A. Sahai, “Shannon Meets Tesla: Wireless Information and
P (dBm)
Power Transfer,” in Proc. IEEE International Symposium on Information
0
Theory Proceedings (ISIT), Jun. 2010, pp. 2363–2367.
Fig. 3. Comparison of (6) and (12) in terms of portion of time dedicated to [3] L. R. Varshney, “Transporting Information and energy simultaneously,”
energy transfer when N = 2 and N = 4. in Proc. IEEE International Symposium on Information Theory (ISIT),
Jul. 2008, pp. 1612–1616.
1.00 [4] D. Ng, E. Lo, and R. Schober, “Energy-Efficient Power Allocation in
0.95 OFDM Systems with Wireless Information and Power Transfer,” in Proc.
0.90
IEEE International Conference on Communications (ICC), June 2013,
0.85
0.80 N=2
pp. 4125–4130.
0.75 [5] H. Ju and R. Zhang, “Throughput Maximization in Wireless Powered
0.70 Communication Networks,” IEEE Trans. Wireless Commun., vol. 13,
Jain's fairness index
0.50
Way Relaying Networks with Wireless Power Transfer: Policies Design
0.45
N=4 and Throughput Analysis,” in Proc. IEEE Global Communications
0.40 Conference (GLOBECOM), Dec. 2014, pp. 4030–4035.
0.35
[7] C. Zhong, H. Suraweera, G. Zheng, I. Krikidis, and Z. Zhang, “Wireless
0.30
Information and Power Transfer with Full Duplex Relaying,” IEEE
0.25
0.20
Trans. Commun.,, vol. 62, no. 10, pp. 3447–3461, Oct. 2014.
0.15
Max. Sum-Throughput (6) - NOMA (11)
[8] D. Nguyen, M. Matthaiou, T. Duong, and H. Ochi, “RF Energy Harvest-
0.10 Max. Sum-Throughput (6) - NOMA (descending order)
ing Two-Way Cognitive DF Relaying with Transceiver Impairments,”
0.05 Max. Sum-Throughput - TDMA [5]
in Proc. IEEE International Conference on Communication Workshop
0.00
(ICCW), Jun. 2015, pp. 1970–1975.
0 10 20 30 40
[9] X. Chen, Z. Zhang, H.-H. Chen, and H. Zhang, “Enhancing Wireless
P
0
(dBm)
Information and Power Transfer by Exploiting Multi-Antenna Tech-
Fig. 4. Jain’s fairness index comparison when N = 2 and N = 4. niques,” IEEE Commun. Mag., vol. 53, no. 4, pp. 133–141, Apr. 2015.
[10] Y. Saito, A. Benjebbour, Y. Kishiyama, and T. Nakamura, “System-Level
Performance Evaluation of Downlink Non-Orthogonal Multiple Access
(NOMA),” in Proc. IEEE 24th International Symposium on Personal
the common rate. Thus, in this case, as the number of users Indoor and Mobile Radio Communications (PIMRC), Sept 2013, pp.
increases, the portion of time dedicated to energy transfer also 611–615.
[11] 3GPP, “TP for Classification of MUST Schemes,” Aug. 2015.
increases. [12] N. DOCOMO, “5G Radio Access: Requirements, Concept and Tech-
In order to fairly compare the two schemes (NOMA and nologies,” White Paper, Jul., 2014.
TDMA) in Fig. 4, we use the Jain’s fairness index, J , which [13] Z. Ding, Z. Yang, P. Fan, and H. Poor, “On the Performance of Non-
Orthogonal Multiple Access in 5G Systems with Randomly Deployed
is given by [14] PN Users,” IEEE Signal Process. Lett., vol. 21, no. 12, pp. 1501–1505, Dec
( n=1 Rn )2 2014.
J = P . (28) [14] M. Al-Imari, P. Xiao, M. Imran, and R. Tafazolli, “Uplink Non-
N N n=1 Rn
2
Orthogonal Multiple Access for 5G Wireless Networks,” in Proc.
11th International Symposium on Wireless Communications Systems
Note that Jain’s fairness index is bounded between 0 and 1, (ISWCS), Aug 2014, pp. 781–785.
with unitary value indicating equal users’ rates. It is seen [15] Z. Ding, M. Peng, and H. Poor, “Cooperative Non-Orthogonal Multiple
in Fig. 4 that NOMA provides more fairness compared to Access in 5G Systems,” IEEE Commun. Lett., vol. 19, no. 8, pp. 1462–
1465, Aug 2015.
TDMA, for the whole range of P0 . Also note that the three [16] M. L. Honig, Advances in Multiuser Detection. Wiley Online Library,
illustrated schemes achieve the same sum-throughput, for the 2009.
same number of users. [17] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge
University Press, 2009.
[18] S. Boyd, L. Xiao, and A. Mutapcic, Subgradient Methods. Lecture
VI. C ONCLUSIONS Notes of EE392o Stanford University Autumn, 2003-2004.
In this paper, we have studied time-allocation methods in [19] H. S. Chen and W. Gao, “MAC and PHY Proposal for 802.11af,” Tech.
Rep. Feb. 2010.
order to maximize the data rates and improve fairness in [20] I. P. W. LANs, “TGn Channel Models,” IEEE 802.11-03/940r4, Tech.
wireless powered communication systems with NOMA. All Rep., May 2004.
formulated optimization problems can be solved by using