Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Multi-user access in wireless optical communication system

Open Access Open Access

Abstract

In this paper, a multipoint-to-point system consisting K users and a central node over wireless optical communication (WOC) channel is analyzed. The scenario focused on is that there is simultaneous communication from a number of users to the central node. As a powerful solution, we utilize non-orthogonal multiple access (NOMA) technique in the system. Although the superiority of NOMA in radio frequency (RF) system has been greatly considered, the NOMA in WOC still needs further research due to the special features of WOC, especially the non-broadcast nature of optical beam and the vulnerable turbulence channel. With the special features of WOC in mind, system is evaluated in terms of outage probability, bit error rate and ergodic sum rate. In addition, we theoretically prove that NOMA outperforms orthogonal multiple access (OMA), and the performance gain increases with the increase of turbulence strength. Hence, NOMA is more suitable for WOC, especially in strong turbulence channel. Moreover, we also analyze the user pairing scheme. Monte Carlo simulations have been done, which match quite well with the theoretical analysis.

© 2018 Optical Society of America under the terms of the OSA Open Access Publishing Agreement

1. Introduction

Driven by the tablets, smartphones, and real-time bandwidth-intensive applications, wireless traffic will increase by over a factor of 100: from under 3 exabytes in 2010 to over 190 exabytes by 2018 [1]. Wireless optical communication (WOC) has been attracted much interest in both academia and industry as a high-speed wireless communication technology, due to the advantages of quick and easy deployment, high bandwidth qualities, and high security [2,3]. More importantly, the features of no license fees and no government regulations become significant advantages as the radio frequency (RF) spectrum is heavily congested [4–7].

As a wireless technology, it is imperative that WOC can support multiple users to access the network. Generally, the multiple access techniques include orthogonal multiple access (OMA) and non-orthogonal multiple access (NOMA). The OMA is widely utilized and analyzed, like time division multiple access (TDMA), frequency division multiple access (FDMA), and code division multiple access (CDMA). In [8], the authors proposed an optical CDMA (OCDMA) network by assigning the fast frequency hopping-based codes in the hybrid optical system. However, for OCDMA techniques, the optical orthogonal codes (OOCs) are considered, which limits the resource reuse due to the orthogonal property of OOCs [9]. The TDMA is analyzed in [10], where the central node intents to serve “only” one user at each time instant. However, as mentioned in this paper, it is quite hard to achieve the tradeoff between the system throughput and the fairness. The space and time division multiple access technique is proposed by J. Liu et al., in which the space dimension is utilized [11]. However, for OMA, only one user can be accessed in each orthogonal resource block, which cannot provide sufficient resource reuse. On the other hand, NOMA technique has been proposed in [12], and has been considered as a reasonable candidate for future wireless access. Until now, NOMA has been widely analyzed in RF, and researches show that NOMA can fully exploit the capacity and outperforms OMA. However, the features of WOC link are quite different with RF link, one is the non-broadcast nature of optical beam and the other is the vulnerable turbulence channel. Hence, performance of NOMA in WOC is still unknown, and we cannot make the conclusion that NOMA outperforms OMA in WOC without thorough research. Note that so far, references [13] and [14] considered NOMA in WOC. Reference [14] proposed the dynamic NOMA, which is for minimizing the outage probability. However, it suffers from some limitations. Firstly, it only presented the results of two users. Although it may be extended to the case in which the arbitrary users are considered, the scheme would be quite complicated, and cannot be widely utilized in practical system. Secondly, there is no power control scheme, then, the utilization of the scheme is limited. The users’ performance is just determined by the channel fading. If the channel fading is approximately equal, users’ message cannot be decoded perfectly. On the other side, if the link distance between user 1 and central node is much smaller than the link distance between user 2 and central node, the central node always decodes the message of user 1 priority, and the fairness of the users cannot be guaranteed. Moreover, the [13] and [14] just focus on the outage probability of NOMA and cannot present a comprehensive insight into the NOMA. Hence, features of NOMA in WOC are still unknown, and the reasons why we utilize NOMA instead of OMA in WOC are still unknown. In this paper, we intent to explain the reasons and present thorough research of NOMA in WOC.

Motivated by the previous works, and considering the limitations of the existing schemes, we investigate the performance of NOMA in WOC. As mentioned above, the features of WOC are quite different with RF. Then, the application scenario of NOMA in WOC is different with that in RF. In this paper, we consider a multipoint-to-point WOC system, consisting of several users and a central node, shown in Fig. 1(a), which is quite different with the one in [8–11]. The system model is reasonable, and the system model provides a solution for the uplink scenario of multi-user access, while [10] focuses on the downlink scenario. In this model, the message of users is multiplexed in power domain, and users communicate with the central node in the same orthogonal resources. Because each user experiences different optical link, the channel fading is distinct. The randomization of atmospheric induced intensity fading is no longer treated as the nuisance, which needs to be eliminated, but as a source of power diversity that allows the central node to split users in power domain though successive interference cancellation (SIC). Meanwhile, a power back-off scheme is proposed to enlarge power diversity. The performances of the system are evaluated through outage probability, bit error rate (BER) and ergodic capacity. The resultsshow that NOMA outperforms OMA, and the performance gain increases with the increase of turbulence strength. Moreover, the user pairing scheme in turbulence channel is presented.

 figure: Fig. 1

Fig. 1 Diagram of the NOMA in WOC system. (a) System model of the proposed system. (b) A scenario of the proposed system model.

Download Full Size | PDF

This paper is organized as follows. The system and channel models are introduced in Section 2. In Section 3, performance analyses for NOMA in WOC system are shown. The simulation results are depicted in Section 4. Finally, conclusions are drawn.

2. System and channel models

As shown in Fig. 1(a), we consider a multipoint-to-point WOC system consisting of K users, indexed by {1,2,…,K}, and a central node. The system model is reasonable, and one of the possible application scenarios is shown in Fig. 1(b). Figure 1(b) presents an integration of the RF and WOC networks, where the users in different network cell (NC) intent to transmit their signal to the backbone node through the base station (BS). The system model investigated in this paper can provide an effective solution of the multiple access protocol between BS and backbone node. In this model, we assume that each user is equipped with one telescope for transmitting their own message, and at the central node the telescope with wide field angle is used for receiving the signals from all users. The users transmit their own message on the same time-frequency resources. At the central node, the telescope receives the signal simultaneously. The central node decodes the signal by utilizing the power diversity of the received power with the help of SIC. In the following, we assume that users to be served quasi-static, therefore, their channel state information (CSI) is not outdated until the next channel estimation, which means both the user and the central node have the perfect CSI. Note that the assumption is reasonable because of the slow fading characteristic of turbulence channel. Particularly, intensity modulation/direct detection (IM/DD) is adopted. Without loss of generality, assuming that all the users are ordered based on their channel gain, g1gkgK, where gk is the channel fading of the k-th user. The channel gain is considered to be a product of two factors, i.e. gk = LkIk, where Lk is the deterministic propagation loss and Ik is the intensity scintillation caused by turbulence. In the next subsections, we firstly give the system model and then present the channel model.

2.1 System model

At the transmitter side, the users utilize intensity modulator to imprint the message onto the optical carrier, and then transmit the optical signal into turbulence channel through telescope. The transmitted message of k-th users is Pkxk, where Pk is the transmitted power and xk is the transmitted message. At the receiver side, the optical signal from all the users are collected by the telescope and focused on the photodetector. Then, we can express the received electrical signal at the central node as

y=k=1KgkξPkxk+n,
where n is the additive white Gaussian noise (AWGN) with zero mean and variance of σ2, ξ is the optical-to-electrical conversion coefficient, which is considered as 1 for convenience in the following derivations. After receiving the message, SIC is adopted to decode the message. SIC requires diverse arrived power to distinguish multiplexed users. The randomization of atmospheric induced intensity fading is a source of power diversity that allows the central node to split users in power domain. To maintain the power diversity, besides the random channel fading, a power back-off scheme is required. In [15], the authors proposed the power control scheme by applying back-off to users with longer distance. However, in WOC link, the one with smaller path loss not always maintains large scintillation fading. Then, the scheme in [15] is not suitable for WOC. A revised power control scheme in WOC is required. Firstly, we express the transmitted power control for point-to-point WOC as
P=Paim/L,
where Paim is the targeted arrived power and L is the power loss caused by path loss. Based on the above result, in NOMA system, the transmitted power of k-th user is expressed as
Pk=PaimLk10(k1)ς10=akPaim,
where ζ is the power back-off step in dB. Note that the power control scheme contains two parts. The first part, 1/Lk, is for counteracting the path loss, which achieves similar objective as in point-to-point WOC, and can guarantee the fairness of users. The second part is for enlarging the power diversity between users by gradually degrading the arrived power with a step of ζ dB, which maintains the power diversity besides the randomization of channel fading. In this way, the randomization of channel fading is fully exploited.

Based on [Eq. (46), [16]], the achievable data rate for k-th user can be expressed as

Rk={[12log(1+ρ(μkgkak)2ρi=k+1K(μigiai)2+A)εϕ]+R˜k,k<K[12log(1+ρ(μKgKaK)2A)εϕ]+R˜K,k=K
where R˜k is the targeted data rate of k-th user, ρ=Paim2/σ2 with A = 9(1 + εμ)2, εϕ=0.016 and εμ = 0.0015. [x]+ denotes max{0,x}, and μk∈[0,0.5] represents the ratio between expectation of the received power and the maximum received power. If the inequation in (4) is satisfied, we assume that perfect SIC can be performed in the central node without error propagations.

2.2 Channel model

The channel gain of WOC is considered to be a product of two factors, i.e. gk = LkIk. Path loss Lk is determined by the exponential Beers-Lambert law as Lk=eΦ×dk, where dk is the link distance between k-th user and central node, and Φ is the atmospheric attenuation coefficient. Φ=3.91/V(km)×(λ(nm)/550)q, where V is the visibility in kilometers, λ is the wavelength of laser in nanometers, and q is a parameter related to the visibility [17]. For the intensity scintillation, Ik, gamma-gamma probability density function (PDF) is the most widely accepted model for describing the distribution of intensity scintillation, which is [18]

fI(I)=2(αβ)(α+β)/2Γ(α)Γ(β)I(α+β)/21Kαβ(2αβI),I>0,
where Γ(⋅) is the gamma function, Kα-β(⋅) is the (α-β)th-order modified Bessel function, α and β are determined by Rytov variance (σR2) related with the atmospheric conditions [18]

α=[exp(0.49σR2(1+1.11σR12/5)7/6)1]1,
β=[exp(0.51σR2(1+0.69σR12/5)5/6)1]1.

Denote hk=Ik2. The PDF of the unordered channel fading can be calculated using the “change of variable” method, therefore, the PDF of hk can be expressed as

fhk(h)=(αβ)(α+β)/2Γ(α)Γ(β)(h)(α+β)/22Kαβ(2αβh).

Integral (8), the cumulative distribution function (CDF) of the unordered variable hk can be expressed as

Fhk(y)=(αβ)α+β2yα+β44πΓ(α)Γ(β)G1,54,1(116(αβ)2y|1(α+β)/4αβ4,αβ+24,βα4,2α+β4,α+β4),
where Gp,qm,n(y|·) is the Meijer’s G-function [19]. Based on the proposed power control scheme in (3), the path loss induced fading is counteracted. Then, only the intensity scintillation involves into the order statistics. Using order statistics [20], the PDF of the ordered channel fading hk is

fhk(h)=K!(k1)!(Kk)!{Fhk(h)}Kk{1Fhk(h)}k1fhk(h).

The joint density of all k-order statistics is [20]

fh1,,hk(h1,,hk)=k!i=1kfhi(hi),h1hk.

3. Performance analysis

In this section, the performance of the proposed NOMA system is evaluated from outage probability and BER. In order to present the superiority of NOMA in WOC, the ergodic sum rate is analyzed, where NOMA shows its special characteristics in WOC link. With the special features of WOC in mind, the user pairing scheme is also presented.

3.1 Outage probability

In this case, each user has a targeted data rate, determined by the quality of service (QoS), rather than the channel condition. When (4) is satisfied, the sum rate of the network is kR˜k. Outage probability is of interest. Based on (4), the outage probability can be expressed as [15]

Pkout=1P(E1cEkc)=1i=1kP(Eic),
where Ek{Rk<R˜k}, and Ekc is the complementary set of Ek. When k<K,
P(Ekc)=P{[12log(1+(μkgkPk)2i=k+1K(μigiPi)2+Aσ2)εϕ]+R˜k}=(a)1P{hkAϕk+ϕkρi=k+1KLi2μi2hiai2ρμk2ak2Lk2}=1yk+1υfhk,,hK(yk,,yK)dykdyK,
where υ=(Aϕk+ϕkρi=k+1KLi2μi2hiai2)/(ρμk2ak2Lk2), ϕk=e2(R˜k+εϕ)1, and ρ=Paim2/σ2. Step (a) is obtained by assuming hk/(υϕk)>exp(2εϕ)1. When k = K, (13) is changed to
P(EKc)=10ψKK[1Fhk(y)]K1fhk(y)dy=[1Fhk(ψK)]K,
where ψK=AϕK/ρμK2LK2aK2. Substituting (13) and (14) into (12), the outage probability of k-th user can be derived.

3.2 BER performance

We assume on-off keying (OOK) modulation, which is the most widely utilized technique in WOC link. The conditional BER of WOC link is given by the following theorem.

Theorem 1: At the backbone node, the user’s message is decoded successively with SIC. The conditional BER of k-th user can be expressed as

Pe(Ck|h)=ek1=0,1,1e1=0,1,1Pe(Ck|ek1,,e1,h)×Pe(ek1|ek2,,e1,h)Pe(e2|e1,h)Pe(e1|h),
where Ck expresses the event that the bit error occurs, h is (h1, h2, …, hK). ek=xkx^k denotes the error in detecting k-th user. The error probabilities of all the previous detection, Pe(Ck|ek1,,e1,h), can be expressed as
Pe(ek|ek1,,e1,h)={12Pe(Dk|ek1,,e1,h),ek=1,1Pe(Ck|ek1,,e1,h),ek=0,12Pe(Ek|ek1,,e1,h),ek=1,
where Dk is the event that error occurs when the transmitted message is ‘1’, and Ek is the event that error occurs when the transmitted message is ‘0’, then,
Pe(Ck|ek1,,e1,h)=12[Pe(Dk|ek1,,e1,h)+Pe(Ek|ek1,,e1,h)],
where
Pe(Dk|ek1,,e1,h)=12Kk+1xkerfc(γk1),
and
Pe(Ek|ek1,,e1,h)=12Kk+1xkerfc(γk2),
and
γk1=(akgkPaim+Fkτk)2σ,γk2=(τkFk)2σ,
where τk is the threshold when detecting the message of k-th user with maximum likelihood (ML) detection, shown in (27).

Proof: The proof is provided in Appendix A.

Theorem 1 presents the conditional BER of k-th user. It can be concluded from (15) that the BER of k-th user is influenced by the detection of i-th (i<k) user. Because of the multiple integration, we present the conditional BER rather than the average BER over channels. However, based on the conditional BER, the average BER can be easily obtained through numerical simulation.

3.3 Ergodic sum rate

In this case, user’s QoS depends on their own channel conditions, i.e. Rk=R˜k. Therefore, in this case, the inequation in (4) always holds. There is no outage and perfect SIC can be done. Ergodic sum rate is the ideal metric rather than outage probability, because it is always zero. Through the analysis of ergodic sum rate of WOC link, we intent to explain why NOMA technique is utilized in this paper, and present the unique features of NOMA in WOC. Ergodic sum rate can be expressed as

RsumNOMA=E{k=1KRk}=(b)E{12log(1+ρk=1K(μkgkak)2A)Kεϕ}(c)12E{log(ρk=1K(μkgkak)2A)}=12E{log(k=1K(μkgkak)2)}+12logρ12logA,
where E{·} is the expectation over channel fading. Step (b) is obtained by substituting (4) into it, and step (c) is derived at large ρ. It can be seen in (21) that the first term is determined by the channel condition and power allocation coefficient, and the third term is a constant. Only the second term is relative to the ρ. Therefore, the ergodic sum rate of NOMA is proportional to logρ. Based on the above equation, the following Propositions are presented.

Proposition 1: In terms of ergodic sum rate, NOMA outperforms OMA for ρ→∞.

Proof: Based on (21) and (30) (in Appendix B), the proposition can be easily proved with the help of Jensen’s inequality.

Proposition 1 presents that NOMA outperforms OMA at large ρ. Although WOC has some special characters (non-broadcast nature of optical beam and the vulnerable turbulence channel), NOMA still performs better. In RF, NOMA outperforms OMA in the whole range of ρ, however, NOMA outperforms OMA at large ρ. Notice that the gain comes from SIC, which increases the complexity of system. It is quite important to obtain the trade-off between the performance and complexity.

Proposition 2: In terms of ergodic sum rate, the performance gain of NOMA, Rgain=RsumNOMARsumOMA, increases with the increase of turbulence strength.

Proof: The proof is provided in Appendix B.

Besides the influence of ρ, the turbulence strength is another important factor in WOC. Proposition 2 intents to explain the influence of turbulence strength. Proposition 2 presents that the performance gain of NOMA is larger in strong turbulence channel. As we all know, the increase of turbulence strength causes the performance loss. However, the NOMA technique can neutralize the performance loss. The reason behind the proposition is that the randomization of fading level increases with the increase of turbulence strength, which helps to increase the power diversity. The increased power diversity can neutralize the performance loss caused by enlarging turbulence strength. Combining the two propositions, we can easily make the conclusion that NOMA technique is more suitable for WOC system, especially in strong turbulence channel.

3.4 User pairing

The performance gain of NOMA comes from increase of systematic complexity due to SIC. The increase of the total number of users in the same NOMA group results into the complexity of the practical system. Generally, the hybrid scheme, consisting of NOMA and OMA, is an alternative method. The pairing criterion is quite important for the hybrid scheme. In this subsection, we aim at analysing the impact of user pairing on the system performance, and then present the criterion for user pairing. For giving the straightforward but insightful results, we consider a group size of two. Moreover, the results can be easily extended to the case in which the arbitrary users are paired. We analyse the effects from two aspects. Firstly, we derive the power conditions that the NOMA throughput gains are guaranteed. Secondly, the influence of user pairing on ergodic sum rate is studied.

Assume that the i-th user and j-th user are paired together, and i-th user is decoded priority. Without loss of generality, for OMA system, the degree of freedom allocated to two users is 0.5. Therefore, the achieved data rate for each user is

RkOMA=0.5[12log(1+2ρ(μkgkak)2A)εϕ]+,
where k = {i, j}. Based on (4) and (22), the power condition is given by the following theorem, with the condition Rk>RkOMA, k.

Theorem 2: Assume that the i-th user and j-th (i<j) user are paired in the same NOMA group, in which the i-th user is decoded before j-th user. For j-th user, the performance of NOMA is always better than that of OMA. However, for i-th user, to guarantee that NOMA outperforms OMA, j-th user’s power has to meet a necessary condition, which is aj<A(1+B)A/2ρ(μjgj)2, where B=2ρ(μigiai)2/A.

Proof: The proof is provided in Appendix C.

Theorem 2 presents the criterion for two users, and it is quite important for i-th user that the power diversity is big enough. Another important feature revealed in the Theorem 2 is that the performance of user with smaller received power (j-th user) can be enhanced by utilizing NOMA. This theorem is the basic condition for user pairing. The users in the same group have to satisfy the power condition given in Theorem 2. Besides the impact of pairing scheme on data rate of individual user, the pairing scheme also has great effect on the ergodic sum rate. Theorem 3 presents the influence to the ergodic sum rate at large ρ.

Theorem 3: Assuming that the i-th user and j-th (i<j) user are paired in the same NOMA group (i-th user is priority decoded), the ergodic sum rates of NOMA and OMA satisfy the following equations.

For i<K,

limρE{Ri+1+RjRi+1OMARjOMA}<limρE{Ri+RjRiOMARjOMA}.

For j<K,where Ri and Ri are the date rate of i-th user when it is pairing with j-th user and (j + 1)-th user, respectively.

limρE{Ri+RjRiOMARjOMA}<limρE{Ri+Rj+1RiOMARj+1OMA}.

Proof: The proof is provided in Appendix D.

Theorem 3 demonstrates how the ergodic sum rate varies if i and j changes. We can make the conclusion that the optimal sum rate gain is achieved when the two users with the most distinctive channel are paired together. Theorem 3 presents the criterion for the optimization of ergodic sum rate. Note that both Theorem 2 and Theorem 3 should be considered for user pairing.

4. Simulation results

In this section, the performance of NOMA is evaluated, where OMA is used as benchmark. Both theoretical and Monte Carlo simulation results are presented, denoted as “Theo.” and “Simu.”, respectively. Two-user system is considered and the link distances between usersand central node are 1 km and 3 km, respectively. The wavelength of the laser is 1550 nm. Clear visibility of 16 km with σR2 = {0.1, 1} is considered. In Fig. 2, the outage probability for two users are depicted when the power back-off are 2 dB, 3 dB, and 5 dB, respectively. Figure 2(a) shows the results when Rytov variance (σR2) is 0.1, and the targeted data rates for two users are R˜1=0.5 and R˜2=0.5. For user 1, the outage performance of 5 dB outperforms that of 2 dB and 3 dB power back-off because large power back-off helps to decrease the interference from the second user. However, user 2 holds the opposite results, due to the essence of the back-off scheme is reducing the power of second user. Although better performance of the first user helps to decode user 2, the arrived signal-to-noise ratio (SNR) of second user is too small when the back-off power is large enough. Figure 2(b) presents the similar results as Fig. 2(a), when the Rytov variance is 1. Comparing Fig. 2(a) with Fig. 2(b), the strength of turbulence has great influence to the outage probability performance as expected. In both subfigures, the Monte Carlo results match quite well with the theoretical results. In Fig. 3, the outage probability performances of two users under different targeted data rate are shown when R˜1=R˜2, and ζ = 3 dB. In both subfigures, higher targeted data rate results in worse outage probability as it is more difficult to be satisfied. Moreover, the BER is shown in Fig. 4 when σR2 = 0.1. It is clearly shown in the Fig. 4(a) that the BER performance of user 1 is better when ζ = 5 dB than that when ζ = 2 dB, and 3 dB, while user 2 holds the opposite results. The properties of BER are similar to the outage probability shown in Fig. 2. In terms of BER, there are an appropriate power back-off in order to achieve the minimum average BER. Figure 4(b) shows the average BER and individual BER when {ρ, σR2} = {25 dB, 0.1}. It verifies the analysis in Fig. 4(a). For user 1, the BER performance is improved with the increase of power back-off. However, for user 2, there are a minimum value with the varies of power back-off. With the increase of power back-off, the BER first decreases and then increases. The reason why the BER first decrease is that the better performance of user 1 helps to decode the message of user 2. However, if the power back-off is too large, the SNR of user 2 is too small. That is why the BER increases. In Fig. 5, the ergodic sum rate between NOMA and OMA are presented when ζ = 5dB, where degree of freedom allocated to two users is 0.5 in OMA. ζ = 5dB is just one of the special cases to give the visualized results of Proposition 1. Figure 5(a) demonstrated that the NOMA can achieve a larger sum rate than OMA under different turbulence strength as demonstrated in Proposition 1. The performance loss of NOMA is quite small compared with OMA with the increase of turbulence strength, and it is another advantage of NOMA technique. In Fig. 5(b), the difference value of ergodic sum rate between NOMA and OMA (RsumNOMARsumOMA) is presented under ρ is 30 dB and 40 dB.

 figure: Fig. 2

Fig. 2 Outage probability of NOMA for different ζ. (a) σR2 = 0.1. (b) σR2 = 1.

Download Full Size | PDF

 figure: Fig. 3

Fig. 3 Outage probability of NOMA for different targeted data rate. (a) σR2=0.1. (b) σR2=1.

Download Full Size | PDF

 figure: Fig. 4

Fig. 4 BER performance of the proposed NOMA system σR2=0.1. (a) BER of NOMA versus ρ. (b) BER of NOMA versus ζ.

Download Full Size | PDF

 figure: Fig. 5

Fig. 5 Ergodic sum rate performance of NOMA. (a) Ergodic sum rate results of NOMA as the function of ρ. (b) Difference value of ergodic sum rate.

Download Full Size | PDF

As can be seen from the figure, the performance gain of NOMA increases with the increase of intensity strength as demonstrated in Proposition 2. In order to reinforce the statements for the user pairing scheme, we provide the simulation results in Fig. 6. In the simulations, three-user system is considered, and the link distances between users and central node are 1 km, 2 km, and 3 km, respectively. σR2 = 1 is considered. The power back-off step ζ = 5dB. In the figure, “Ui-Uj” denotes that the i-th user and j-th user are paired together. It is clearly shown in the figure that the optimal performance gain is achieved when user 1 and user 3 are paired together.

 figure: Fig. 6

Fig. 6 Performance gain of different user pairing cases.

Download Full Size | PDF

5. Conclusions

In this paper, NOMA technique with power control scheme has been proposed for WOC system. The performance of the system is evaluated from the outage probability and BER aspects. The ergodic sum rate of the WOC link is analyzed, where we show that NOMA achieves a superior ergodic sum data rate than OMA. With the characters of turbulence channel in mind, we further prove that NOMA is more suitable for WOC link than OMA, especially for strong turbulence channel. Because SIC has to be considered, the proposed system introduces additional complexity. It is quite important to achieve a tradeoff between performance and complexity. As an alternative method, the hybrid system is considered, in which the criterion of user pairing scheme is theoretically given. Monte Carlo simulations are presented, which corroborate the theoretical results.

Appendix A

With the utilization of law of total probability, (15) can be easily obtained. Therefore, the proof of the theorem can be converted to prove (18) and (19). The signal model when detecting k-th user can be expressed as

yk={akgkPaim+Fk+n,xk=1,Fk+n,xk=0,
where
Fk=Paimi=1k1giaiei+Paimi=k+1Kgiaixi,
where the first term is the residual interference caused by the previous detection, and the second term is the interference of the j-th user (j>k). Under ML criterion, the threshold of k-th user can be expressed as
τk=akgkPaim+Paimi=k+1Kaigi2.
Denote xk=(xk,xk+1,,xK). The Pe(Dk|ek1,,e1,xk,h) is
Pe(Dk|ek1,,e1,xk,h)=-τk12πσ2exp[(x(akgkPaim+Fk))22σ2]dx=12erfc(γk1).
With the utilization of law of total probability, (18) is obtained.

Similarly, when the transmitted message of k-th user is ‘0’, the conditional error rate can be expressed as

Pe(Ek|ek1,,e1,xk,h)=τk+12πσ2exp[(xFk)22σ2]dx=12erfc(γk2).
With the utilization of law of total probability, (19) is obtained.

The proof is completed.

Appendix B

The performance gain can be expressed as Rgain=RsumNOMARsumOMA. For proving the proposition, we need to prove the first derivation of Rgain with respect of σR2 is bigger than zero. Therefore, the proof can be converted to prove that RsumNOMA/σR2 is bigger than RsumOMA/σR2. The ergodic sum rate of OMA is

RsumOMA=E{k=1Kηk[12log(1+ρ(μkgkak)2ηkA)εϕ]+}(d)12k=1KηkE[log(ρ(μkgkak)2ηkA)]=12logρ+12k=1KηkE[log((μkgkak)2)]12k=1Kηklog(ηkA),
where ηk is the degree of freedom of k-th user, and k=1Kηk=1. Step (d) is obtained at large ρ. Then,
RsumOMAσR2=12σR2{k=1KηkE[log((μkgkak)2)]}=12gk=1Kηklog((μkgkak)2)σR2f(g,σR2)dg12glog(k=1Kηk(μkgkak)2)σR2f(g,σR2)dg12glog(k=1K(μkgkak)2)σR2f(g,σR2)dg,
where g is (g1, g2, …, gK), and f(g, σR2) is the joint PDF of (g1, g2, …, gK). Utilizing (21), RsumNOMA/σR2 is derived as

RsumNOMAσR2=12σR2E{log(k=1K(μkgkak)2)}=12σR2glog(k=1K(μkgkak)2)f(g,σR2)dg=12glog(k=1K(μkgkak)2)σR2f(g,σR2)dg.

Comparing (31) with (32), RsumNOMA/σR2 is bigger than RsumOMA/σR2, which completes the proof. We obtain the statement of the Proposition 2.

Appendix C

The proof of the theorem should be divided into two parts. Firstly, we prove that j-th user performs better with NOMA. Secondly, we prove that j-th user’s power has to meet a necessary condition, in order to guarantee that i-th user performs better with NOMA. For the first part, the data rate expressions of NOMA and OMA of j-th user are expressed in (4) and (22). Then,

RjRjOMA12log(1+ρ(μjgjaj)2A)14log(1+2ρ(μjgjaj)2A)=14log(A2+2Aρ(μjgjaj)2+[ρ(μjgjaj)2]2A(A+2ρ(μjgjaj)2))=14log(1+[ρ(μjgjaj)2]2A(A+2ρ(μjgjaj)2))>0,
where 0.5εϕ is neglected, because εϕ=0.016. Therefore, Rj>RjOMA.

For the second part, the condition is derived by utilizing Ri>RiOMA, as

12log(1+ρ(μigiai)2ρ(μjgjaj)2+A)εϕ>0.5{12log(1+ρ(μigiai)20.5×A)εϕ}.
Neglecting εϕ, after some algebraic manipulations, the condition can be obtained. To this end, Theorem 2 is proved.

Appendix D

The expression in (23) is equivalent to

limρE{Ri+1RiI1(Ri+1OMARiOMA)I2}<0.
Firstly, we derive the expressions of ℐ1 and ℐ2. Based on the derived expressions, (35) is proved. Utilizing (4),
I1=12log(1+ρ(μi+1gi+1ai+1)2ρ(μjgjaj)2+A)εϕ12log(1+ρ(μigiai)2ρ(μjgjaj)2+A)+εϕ=12log(ρ(μjgjaj)2+A+ρ(μi+1gi+1ai+1)2ρ(μjgjaj)2+A+ρ(μigiai)2).
With (22),
I2=0.5[12log(1+2ρ(μi+1gi+1ai+1)2A)εϕ]0.5[12log(1+2ρ(μigiai)2A)εϕ]=14[log(A+2ρ(μi+1gi+1ai+1)2A+2ρ(μigiai)2)].
Substituting (36) and (37) into(35),

limρE{Ri+1RiRi+1OMA+RiOMA}=12E{log((μjgjaj)2+(μi+1gi+1ai+1)2(μjgjaj)2+(μigiai)2μigiaiμi+1gi+1ai+1)I3}.

With some algebraic manipulations, it is easily to obtain ℐ3<1. Therefore, (35) is proved. Meanwhile, the expression of (24) is equivalent to

limρE{RiRi+Rj+1RjRj+1OMA+RjOMA}>0.

The proof of (39) is conducted in a similar way as the proof of (35), which is shown as

limρE{RiRi+Rj+1RjRj+1OMA+RjOMA}=12E{log((μj+1gj+1aj+1)2+(μigiai)2μj+1gj+1aj+1μjgjaj(μjgjaj)2+(μigiai)2)I4}>0.

With some algebraic manipulations, it is easily to obtain ℐ4>1. Therefore, (40) is proved.

Combining (35) and (39), Theorem 3 is proved.

Funding

National Key Research and Development Program of China (2016QY02D0304); National Key Basic Research Program of China (2013CB329205); National Natural Science Foundation of China (NSFC) (60572002).

References

1. J. G. Andrews, S. Buzzi, W. Choi, S. V. Hanly, A. Lozano, A. C. K. Soong, and J. C. Zhang, “What will 5G be?” IEEE J. Sel. Areas Comm. 32(6), 1065–1082 (2014). [CrossRef]  

2. H. Kaushal and G. Kaddoum, “Optical communication in space: challenges and mitigation techniques,” IEEE Comm. Surv. and Tutor. 19(1), 57–96 (2017). [CrossRef]  

3. M. A. Khalighi and M. Uysal, “Survey on free space optical communication: a communication theory perspective,” IEEE Comm. Surv. and Tutor. 16(4), 2231–2258 (2014). [CrossRef]  

4. B. Born, I. R. Hristovski, S. Geoffroy-Gagnon, and J. F. Holzman, “All-optical retro-modulation for free-space optical communication,” Opt. Express 26(4), 5031–5042 (2018). [CrossRef]   [PubMed]  

5. J. M. Garrido-Balsells, F. Javier Lopez-Martinez, M. Castillo-Vázquez, A. Jurado-Navas, and A. Puerta-Notario, “Performance analysis of FSO communications under LOS blockage,” Opt. Express 25(21), 25278–25294 (2017). [CrossRef]   [PubMed]  

6. R. Li, S. Ding, and A. Dang, “Suboptimal maximum likelihood detection of on-off keying for a wireless optical communication system,” J. Opt. Soc. Am. A 34(5), 798–803 (2017). [CrossRef]   [PubMed]  

7. A. Dang, “A closed-form solution of the bit-error rate for optical wireless communication systems over atmospheric turbulence channels,” Opt. Express 19(4), 3494–3502 (2011). [CrossRef]   [PubMed]  

8. A. Jurado-Navas, T. R. Raddo, J. M. Garrido-Balsells, B.-H. V. Borges, J. J. V. Olmos, and I. T. Monroy, “Hybrid optical CDMA-FSO communications network under spatially correlated gamma-gamma scintillation,” Opt. Express 24(15), 16799–16814 (2016). [CrossRef]   [PubMed]  

9. R. Li and A. Dang, “A novel coherent OCDMA scheme over atmospheric turbulence channels,” IEEE Photonics Technol. Lett. 29(5), 427–430 (2017). [CrossRef]  

10. J. Abouei and K. N. Plataniotis, “Multiuser diversity scheduling in free-space optical communications,” J. Lightwave Technol. 30(9), 1351–1358 (2012). [CrossRef]  

11. J. Liu, J. Sando, S. Shimamoto, C. Fujikawa, and K. Kodate, “Experiment on space and time division multiple access scheme over free space optical communication,” IEEE Trans. Consum. Electron. 57(4), 1571–1578 (2011). [CrossRef]  

12. Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, and K. Higuchi, “Non-orthogonal multiple access (NOMA) for cellular future radio access,” in 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), 2013), 1–5. [CrossRef]  

13. R. Li and A. Dang, “Performance analysis of non-orthogonal multiple access in free space optical communication system,” Online version available on arXiv. [Online]. Available: https://arxiv.org/pdf/1707.06571.pdf (2017).

14. M. Najafi, V. Jamali, P. D. Diamantoulakis, G. K. Karagiannidis, and R. Schober, “Non-orthogonal multiple access for FSO backhauling,” in 2018 IEEE Wireless Communications and Networking Conference (WCNC), 2018), 1–6.

15. N. Zhang, J. Wang, G. Kang, and Y. Liu, “Uplink nonorthogonal multiple access in 5G systems,” IEEE Commun. Lett. 20(3), 458–461 (2016). [CrossRef]  

16. A. Chaaban, O. M. S. Al-Ebraheemy, T. Y. Al-Naffouri, and M. S. Alouini, “Capacity Bounds for the Gaussian IM-DD Optical Multiple-Access Channel,” IEEE Trans. Wirel. Commun. 16(5), 3328–3340 (2017). [CrossRef]  

17. I. I. Kim, B. McArthur, and E. Korevaar, “Comparison of laser beam propagation at 785 nm and 1550 nm in fog and haze for optical wireless communications,” in Optical Wireless Communications Iii, E.J. Korevaar, ed. (Spie-Int Soc Optical Engineering, Bellingham, 2001), pp. 26–37.

18. M. A. Al-Habash, L. C. Andrews, and R. L. Phillips, “Mathematical model for the irradiance probability density function of a laser beam propagating through turbulent media,” Opt. Eng. 40(8), 1554–1562 (2001). [CrossRef]  

19. I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products (Academic, 2014).

20. H. A. David and H. N. Nagaraja, Order Statistics, 3rd ed. (Wiley, USA, 2003).

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (6)

Fig. 1
Fig. 1 Diagram of the NOMA in WOC system. (a) System model of the proposed system. (b) A scenario of the proposed system model.
Fig. 2
Fig. 2 Outage probability of NOMA for different ζ. (a) σ R 2 = 0.1. (b) σ R 2 = 1.
Fig. 3
Fig. 3 Outage probability of NOMA for different targeted data rate. (a) σ R 2 =0.1. (b) σ R 2 =1.
Fig. 4
Fig. 4 BER performance of the proposed NOMA system σ R 2 =0.1. (a) BER of NOMA versus ρ. (b) BER of NOMA versus ζ.
Fig. 5
Fig. 5 Ergodic sum rate performance of NOMA. (a) Ergodic sum rate results of NOMA as the function of ρ. (b) Difference value of ergodic sum rate.
Fig. 6
Fig. 6 Performance gain of different user pairing cases.

Equations (40)

Equations on this page are rendered with MathJax. Learn more.

y = k = 1 K g k ξ P k x k + n ,
P = P a i m / L ,
P k = P a i m L k 10 ( k 1 ) ς 10 = a k P a i m ,
R k = { [ 1 2 log ( 1 + ρ ( μ k g k a k ) 2 ρ i = k + 1 K ( μ i g i a i ) 2 + A ) ε ϕ ] + R ˜ k , k < K [ 1 2 log ( 1 + ρ ( μ K g K a K ) 2 A ) ε ϕ ] + R ˜ K , k = K
f I ( I ) = 2 ( α β ) ( α + β ) / 2 Γ ( α ) Γ ( β ) I ( α + β ) / 2 1 K α β ( 2 α β I ) , I > 0 ,
α = [ exp ( 0.49 σ R 2 ( 1 + 1.11 σ R 12 / 5 ) 7 / 6 ) 1 ] 1 ,
β = [ exp ( 0.51 σ R 2 ( 1 + 0.69 σ R 12 / 5 ) 5 / 6 ) 1 ] 1 .
f h k ( h ) = ( α β ) ( α + β ) / 2 Γ ( α ) Γ ( β ) ( h ) ( α + β ) / 2 2 K α β ( 2 α β h ) .
F h k ( y ) = ( α β ) α + β 2 y α + β 4 4 π Γ ( α ) Γ ( β ) G 1 , 5 4 , 1 ( 1 16 ( α β ) 2 y | 1 ( α + β ) / 4 α β 4 , α β + 2 4 , β α 4 , 2 α + β 4 , α + β 4 ) ,
f h k ( h ) = K ! ( k 1 ) ! ( K k ) ! { F h k ( h ) } K k { 1 F h k ( h ) } k 1 f h k ( h ) .
f h 1 , , h k ( h 1 , , h k ) = k ! i = 1 k f h i ( h i ) , h 1 h k .
P k o u t = 1 P ( E 1 c E k c ) = 1 i = 1 k P ( E i c ) ,
P ( E k c ) = P { [ 1 2 log ( 1 + ( μ k g k P k ) 2 i = k + 1 K ( μ i g i P i ) 2 + A σ 2 ) ε ϕ ] + R ˜ k } = ( a ) 1 P { h k A ϕ k + ϕ k ρ i = k + 1 K L i 2 μ i 2 h i a i 2 ρ μ k 2 a k 2 L k 2 } = 1 y k + 1 υ f h k , , h K ( y k , , y K ) d y k d y K ,
P ( E K c ) = 1 0 ψ K K [ 1 F h k ( y ) ] K 1 f h k ( y ) d y = [ 1 F h k ( ψ K ) ] K ,
P e ( C k | h ) = e k 1 = 0 , 1 , 1 e 1 = 0 , 1 , 1 P e ( C k | e k 1 , , e 1 , h ) × P e ( e k 1 | e k 2 , , e 1 , h ) P e ( e 2 | e 1 , h ) P e ( e 1 | h ) ,
P e ( e k | e k 1 , , e 1 , h ) = { 1 2 P e ( D k | e k 1 , , e 1 , h ) , e k = 1 , 1 P e ( C k | e k 1 , , e 1 , h ) , e k = 0 , 1 2 P e ( E k | e k 1 , , e 1 , h ) , e k = 1 ,
P e ( C k | e k 1 , , e 1 , h ) = 1 2 [ P e ( D k | e k 1 , , e 1 , h ) + P e ( E k | e k 1 , , e 1 , h ) ] ,
P e ( D k | e k 1 , , e 1 , h ) = 1 2 K k + 1 x k e r f c ( γ k 1 ) ,
P e ( E k | e k 1 , , e 1 , h ) = 1 2 K k + 1 x k e r f c ( γ k 2 ) ,
γ k 1 = ( a k g k P a i m + F k τ k ) 2 σ , γ k 2 = ( τ k F k ) 2 σ ,
R s u m N O M A = E { k = 1 K R k } = ( b ) E { 1 2 log ( 1 + ρ k = 1 K ( μ k g k a k ) 2 A ) K ε ϕ } ( c ) 1 2 E { log ( ρ k = 1 K ( μ k g k a k ) 2 A ) } = 1 2 E { log ( k = 1 K ( μ k g k a k ) 2 ) } + 1 2 log ρ 1 2 log A ,
R k O M A = 0.5 [ 1 2 log ( 1 + 2 ρ ( μ k g k a k ) 2 A ) ε ϕ ] + ,
lim ρ E { R i + 1 + R j R i + 1 O M A R j O M A } < lim ρ E { R i + R j R i O M A R j O M A } .
lim ρ E { R i + R j R i O M A R j O M A } < lim ρ E { R i + R j + 1 R i O M A R j + 1 O M A } .
y k = { a k g k P a i m + F k + n , x k = 1 , F k + n , x k = 0 ,
F k = P a i m i = 1 k 1 g i a i e i + P a i m i = k + 1 K g i a i x i ,
τ k = a k g k P a i m + P a i m i = k + 1 K a i g i 2 .
P e ( D k | e k 1 , , e 1 , x k , h ) = - τ k 1 2 π σ 2 exp [ ( x ( a k g k P a i m + F k ) ) 2 2 σ 2 ] d x = 1 2 e r f c ( γ k 1 ) .
P e ( E k | e k 1 , , e 1 , x k , h ) = τ k + 1 2 π σ 2 exp [ ( x F k ) 2 2 σ 2 ] d x = 1 2 e r f c ( γ k 2 ) .
R s u m O M A = E { k = 1 K η k [ 1 2 log ( 1 + ρ ( μ k g k a k ) 2 η k A ) ε ϕ ] + } ( d ) 1 2 k = 1 K η k E [ log ( ρ ( μ k g k a k ) 2 η k A ) ] = 1 2 log ρ + 1 2 k = 1 K η k E [ log ( ( μ k g k a k ) 2 ) ] 1 2 k = 1 K η k log ( η k A ) ,
R s u m O M A σ R 2 = 1 2 σ R 2 { k = 1 K η k E [ log ( ( μ k g k a k ) 2 ) ] } = 1 2 g k = 1 K η k log ( ( μ k g k a k ) 2 ) σ R 2 f ( g , σ R 2 ) d g 1 2 g log ( k = 1 K η k ( μ k g k a k ) 2 ) σ R 2 f ( g , σ R 2 ) d g 1 2 g log ( k = 1 K ( μ k g k a k ) 2 ) σ R 2 f ( g , σ R 2 ) d g ,
R s u m N O M A σ R 2 = 1 2 σ R 2 E { log ( k = 1 K ( μ k g k a k ) 2 ) } = 1 2 σ R 2 g log ( k = 1 K ( μ k g k a k ) 2 ) f ( g , σ R 2 ) d g = 1 2 g log ( k = 1 K ( μ k g k a k ) 2 ) σ R 2 f ( g , σ R 2 ) d g .
R j R j O M A 1 2 log ( 1 + ρ ( μ j g j a j ) 2 A ) 1 4 log ( 1 + 2 ρ ( μ j g j a j ) 2 A ) = 1 4 log ( A 2 + 2 A ρ ( μ j g j a j ) 2 + [ ρ ( μ j g j a j ) 2 ] 2 A ( A + 2 ρ ( μ j g j a j ) 2 ) ) = 1 4 log ( 1 + [ ρ ( μ j g j a j ) 2 ] 2 A ( A + 2 ρ ( μ j g j a j ) 2 ) ) > 0 ,
1 2 log ( 1 + ρ ( μ i g i a i ) 2 ρ ( μ j g j a j ) 2 + A ) ε ϕ > 0.5 { 1 2 log ( 1 + ρ ( μ i g i a i ) 2 0.5 × A ) ε ϕ } .
lim ρ E { R i + 1 R i I 1 ( R i + 1 O M A R i O M A ) I 2 } < 0.
I 1 = 1 2 log ( 1 + ρ ( μ i + 1 g i + 1 a i + 1 ) 2 ρ ( μ j g j a j ) 2 + A ) ε ϕ 1 2 log ( 1 + ρ ( μ i g i a i ) 2 ρ ( μ j g j a j ) 2 + A ) + ε ϕ = 1 2 log ( ρ ( μ j g j a j ) 2 + A + ρ ( μ i + 1 g i + 1 a i + 1 ) 2 ρ ( μ j g j a j ) 2 + A + ρ ( μ i g i a i ) 2 ) .
I 2 = 0.5 [ 1 2 log ( 1 + 2 ρ ( μ i + 1 g i + 1 a i + 1 ) 2 A ) ε ϕ ] 0.5 [ 1 2 log ( 1 + 2 ρ ( μ i g i a i ) 2 A ) ε ϕ ] = 1 4 [ log ( A + 2 ρ ( μ i + 1 g i + 1 a i + 1 ) 2 A + 2 ρ ( μ i g i a i ) 2 ) ] .
lim ρ E { R i + 1 R i R i + 1 O M A + R i O M A } = 1 2 E { log ( ( μ j g j a j ) 2 + ( μ i + 1 g i + 1 a i + 1 ) 2 ( μ j g j a j ) 2 + ( μ i g i a i ) 2 μ i g i a i μ i + 1 g i + 1 a i + 1 ) I 3 } .
lim ρ E { R i R i + R j + 1 R j R j + 1 O M A + R j O M A } > 0.
lim ρ E { R i R i + R j + 1 R j R j + 1 O M A + R j O M A } = 1 2 E { log ( ( μ j + 1 g j + 1 a j + 1 ) 2 + ( μ i g i a i ) 2 μ j + 1 g j + 1 a j + 1 μ j g j a j ( μ j g j a j ) 2 + ( μ i g i a i ) 2 ) I 4 } > 0.
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.