Skip to main content
Entropy logoLink to Entropy
. 2022 Nov 30;24(12):1757. doi: 10.3390/e24121757

Broadcast Approach to Uplink NOMA: Queuing Delay Analysis

Maha Zohdy 1,†,, Ali Tajer 1,*,, Shlomo Shamai (Shitz) 2,
Editors: Onur Günlü, Holger Boche
PMCID: PMC9777921  PMID: 36554162

Abstract

Emerging wireless technologies are envisioned to support a variety of applications that require simultaneously maintaining low latency and high reliability. Non-orthogonal multiple access techniques constitute one candidate for grant-free transmission alleviating the signaling requirements for uplink transmissions. In open-loop transmissions over fading channels, in which the transmitters do not have access to the channel state information, the existing approaches are prone to facing frequent outage events. Such outage events lead to repeated re-transmissions of the duplicate information packets, penalizing the latency. This paper proposes a multi-access broadcast approach in which each user splits its information stream into several information layers, each adapted to one possible channel state. This approach facilitates preventing outage events and improves the overall transmission latency. Based on the proposed approach, the average queuing delay of each user is analyzed for different arrival processes at each transmitter. First, for deterministic arrivals, closed-form lower and upper bounds on the average delay are characterized analytically. Secondly, for Poisson arrivals, a closed-form expression for the average delay is delineated using the Pollaczek-Khinchin formula. Based on the established bounds, the proposed approach achieves less average delay than single-layer outage approaches. Under optimal power allocation among the encoded layers, numerical evaluations demonstrate that the proposed approach significantly minimizes average sum delays compared to traditional outage approaches, especially under high arrival rates.

Keywords: broadcast approach, channel state information, latency, multiple access

1. Introduction

There is a growing need for maintaining low latency and high reliability in a wide range of wireless communication systems [1]. Among the recently proposed techniques for attaining the latency-reliability requirements is the power domain non-orthogonal multiple access (NOMA) [2,3,4,5,6]. Uplink power domain NOMA [5] facilitates simultaneous multi-user channel access, alleviating the traditional signaling period at the beginning of the transmission. Furthermore, by leveraging power control and adaptive decoding order among users, NOMA techniques enhance user fairness by taking into consideration the dissimilarities in the channel state of each user [7,8].

A fundamental challenge that NOMA faces in wireless networks is that its power control critically relies on the availability of full channel state information at each transmitter (CSIT). This assumption is generally unfeasible under the anticipated network scale growth. In the absence of CSIT, traditional NOMA occasionally suffers from outage events, which necessitate repeated re-transmissions and negatively affect the overall latency. To address this issue, we propose a non-orthogonal multi-access technique in which each transmitter splits its stream of information into multiple encoded layers, each adapted to a specific combination of all the network’s channel states. Each user then transmits the superposition of all its encoded layers to the receiver. In particular, we approach the problem of minimizing the overall communication latency from a cross-layer resource allocation perspective by focusing on the dominant delay factor, i.e., the queuing delay [9]. The goal of the proposed approach is to minimize the average sum-queuing delay among users by optimally allocating power among the encoded layers at each transmitter in the physical layer.

Outage avoidance via multi-layer superposition coding was first proposed in [10,11] for the slowly fading single-user channels. This is generally referred to as the broadcast approach [12]. Furthermore, the studies in [13] extended the broadcast approach to the energy harvesting settings, those in [14,15,16,17,18,19,20] to random and multi-access channel models, and those in [21,22] to the multiuser interference channel. Aside from analyzing the achievable rate regions of multi-layer superposition coding [17,23], the average delay performance has only been studied for the single-user fading channel in [24]. However, under CSIT uncertainties, the advantages of adaptive multi-layer superposition coding for controlling the average queuing delay in multiple access channels are yet to be explored. Finally, we note that the broadcast approach is related to the studies on the “rate-splitting”, the foundations of which rely on superposition coding of the layered information messages [25].

In this paper, we consider an N-user block fading multiple access channel (MAC) in which all transmitters are oblivious to their instantaneous channel state. Each user possesses an infinite capacity queue, occasionally holding the arriving information packets to be transmitted. A novel multi-layer superposition coding scheme is then employed, in which each transmitter adapts its message to the combined network state. Based on the proposed scheme, closed-form lower and upper bounds on the average delay are characterized analytically for deterministic arrivals. Furthermore, a closed-form expression for the average queuing delay is delineated for Poisson arrivals. Based on the derived bounds on average delay, the proposed approach is shown to outperform the single-layer outage approach. Finally, under optimal power allocation among the encoded layers, numerical evaluations demonstrate that the broadcast approach significantly reduces the average sum delays compared to traditional outage approaches under symmetric/asymmetric arrival rates and channel statistics among users.

A rich literature exists on minimizing the average delay through cross-layer resource allocation in MAC with full CSIT. Relevant studies include [26] in which the authors provide an optimal solution for minimizing average delays of two-user MAC channels by controlling the departure probability of each user’s queue. In [27], an information-theoretic rate allocation policy is proposed to achieve a lower bound on the average delay of multi-access coding schemes. Dynamic power and rate control to minimize the average delay are studied for multi-access channels in [28]. The study in [28] provides a one-step value iteration policy for optimal scheduling in MAC fading channels. A lower bound on the LTE-A average delay is derived in [29] for random access channels under different arrival processes. The random access scheduling problem is addressed in [30] using a distributed virtual queue model facilitating a self-organizing policy. The study in [31] proposes a joint superposition coding and scheduling policy for the uplink NOMA by relying on user-pairing to reduce the complexity of analysis [32,33]. The accuracy of ranking users in NOMA techniques using distance-based measures versus instantaneous signal-to-noise ratio (SNR) is addressed in [34]. Joint scheduling and superposition coding in fading channels is studied in [35]. The effect of unsaturated traffic in uplink NOMA is studied in [36] using tools from queuing theory. Interaction between power control and queuing service rates in interference-limited channels is studied in [37]. Delay analysis of multi-point to multi-point networks is provided in [38] for spatial-temporal random arrival traffic. The problem of power control in delay-bounded applications is considered in [39], especially under the assumption of imperfect successive interference cancellation in uplink NOMA. The effective capacity of two-user uplink NOMA is characterized in [40] under quality-of-service delay constraints.

Energy-efficient transmission in uplink NOMA is studied in [41] under statistical delay constraints, where probabilistic upper bounds on queuing delays of NOMA are characterized. Resorting to the concept of effective capacity, the study in [42] proposes an optimized hybrid approach between non-orthogonal multiple access and orthogonal multiple access with different user pairing techniques in order to maximize the effective capacity under stringent delay constraints. Contention-based modified NOMA for uplink access is studied in [43], showing that exploiting collisions in the power domain can greatly reduce access delay. The throughput, access delay, and energy efficiency of NOMA uplink random access system are studied in [44]. Joint power control and user scheduling is considered in [45] to investigate the access delay minimization problem through an efficient sub-optimal iterative algorithm. Optimal power level partitioning to accommodate non-critical and high-priority messages is studied in [46]. A joint dynamic power control and user pairing algorithm is proposed in [47] to minimize long-term time average transmit power and queuing delay. Recent studies further includes [48] in which an adaptive rate NOMA with full CSIT is shown to provide better ergodic capacities for mobile users than OMA while satisfying strict local delay constraints for the internet of things (IoT) devices in cellular IoT networks. Opportunistic NOMA schemes are proposed in [49] for short message delivery with delay constraint based on which an upper bound on session error probability is derived, showing the impact of NOMA on session error under Rayleigh fading. A queuing delay analysis is presented in [50] for uplink NOMA with full CSIT, and the impact of channel estimation imperfections for finite-length channel coding is studied. Dynamic power allocation schemes with statistical delay quality-of-service (QoS) guarantees are shown in [51] to significantly improve the sum effective capacity and effective energy efficiency for an uplink NOMA system with paired users.

The rest of this paper is organized as follows. Section 2 presents the N-user multi-access channel model. The proposed multi-layer-based multi-access approach is outlined in Section 3 for the special case of the 2-state channel. The average delay achievable by the proposed approach is shown to outperform the average delay of the single-layer outage approach in Section 4 for deterministic and stochastic arrivals processes. The proposed multi-access approach is generalized to the case of finite arbitrary -state channel in Section 5. Finally, numerical evaluations are provided in Section 6, and the paper is concluded in Section 7.

2. Channel Model

Consider an N-user block fading MAC channel consisting of N transmitters and one receiver. The channel state is assumed to remain unchanged during the period of one transmission block of n channel uses and varies independently among consecutive blocks. We assume that the block length n is large enough to give rise to the notion of reliable communications but much shorter than the dynamics of the fading process [24]. Each transmitter is assumed to know the statistics of the channel state information (CSI) of its own link to the receiver but is oblivious to its instantaneous value. Complete CSI of all links is assumed to be available at the receiver. The input-output relationship of this channel is given by

Y=i=1NhiXi+W, (1)

where Xi denotes the transmitted signal from user i and W is the additive white Gaussian noise with zero mean and unit variance. Finally, hi denotes the state of the fading channel between transmitter i and the receiver. The transmitted signal Xi is subject to an average power constraint P for all i{1,,N}, i.e., E|Xi|2P. We consider a quantized model for the fading channel according to which hi2 takes one of two possible states, referred to as {weak, strong}, denoted by {α1,α2}, respectively. Without loss of generality, we assume 0<α1<α2<+. User i experiences strong or weak channel states with probabilities pi=P(hi2=α2) and p¯i=1pi, respectively.

Each transmitter is assumed to possess an infinite-capacity queue. The queue at transmitter i receives random packets with an average arrival rate λi (bits/channel use). The size of the data queued at transmitter i at the beginning of any transmission block t is denoted by Q˜i(t),i{1,,N}. We define Ai(t) as the total number of bits arriving in the queue at transmitter i during transmission block t. Finally, ri(t) (bits/channel use) denotes the service rate of the queue at transmitter i. Hence, the queue size at transmitter i at the end of any transmission block can be expressed using a recursive relationship as

Q˜i(t+1)=Q˜i(t)+nAi(t)nri(t),Q˜i(t)+nAi(t)nri(t)00,otherwise. (2)

Accordingly, we define Qi(t) as queue size normalized by the number of transmission blocks n, i.e.,

Qi(t+1)=Qi(t)+Zi(t),Qi(t)+Zi(t)00,o.w., (3)

where the random variable Zi(t) is defined as Zi(t)=Ai(t)ri(t), and it captures the change in the queue size at transmitter i at the end of transmission block t. We remark that the number of bit arrivals Ai(t) is random and does not necessarily fit into the exact size of the transmitted packet in a given transmission block. Therefore, if the backlogged data at any queue is less than a packet length, the data bits are zero-padded to form a complete packet for the encoder at each transmitter. Throughout the rest of the paper, we assume that the processing delay, i.e., encoding and decoding processes, as well as the transmission delay, are fixed and negligible with respect to the queuing delay. We use the concise notation C(x,y)=12log2(1+x1P+y), {xji}j=1k={x1i,x2i,,xki}. Finally, we denote the set of all users in the network by N={1,,N}.

3. 2-State Channel Multi-Access

In this section, we present a non-orthogonal multiple-access approach based on multi-layer encoding at each transmitter and successive interference cancellation (SIC) at the receiver. The underlying layering approach hinges on adapting the number of encoded layers at each transmitter to the combined fading state of the network, i.e., the fading states of all transmitters to the receiver. Owing to the arising interference in non-orthogonal multi-access channels with no CSIT, the channel state of each user directly affects the decoding success probabilities of all the other users. Motivated by this, the recent work in [17] proposed a multi-layer coding approach for the two-user multiple access channel with no CSIT, specially adapted to the combined network state resulting in an enlarged average achievable rate regions compared to the existing multi-layer coding approaches. In this section, we extend the layering approach in [17] to the general case of an arbitrary number of N-users. As shown in this paper, the proposed multi-access approach enjoys considerable advantages in reducing the queuing delay.

3.1. Layering Approach

At the beginning of each transmission block, user i aims to transmit all the data bits accumulated in its queue if the channel state allows it. Otherwise, it encodes a part of its data with the maximum allowable encoding rate. Towards this goal, user i encodes its data (fully or partially) using 2N independent messages generated from 2N Gaussian codebooks. These messages are denoted by Ujki,iN,j{1,2},k{0N}. Based on this decomposition

Xi=j=12k=0NUjki. (4)

We consider an ordering of the network states based on the number of users with strong channel states denoted by k. We define Sk as the set of k users’ indices that experience strong channel states. Accordingly, Ek denotes the event that exactly k users are experiencing a strong channel including.

The notation Ujki can be interpreted as follows. Superscript i denotes the user index iN, subscript j{1,2} refers to user i’s channel state, where j=1 if hi2=α1 and otherwise j=2. Finally, k{0N} represents the number of users in the network with a strong channel state, possibly including user i’s channel. Therefore, for every value of k, user i adapts the rate of two codewords, {Ujki}j=12, based on its own channel state resulting in a total of 2k layers. The correspondence between each channel state and the adapted layer is shown in Table 1 and summarized below:

  • U10i is adapted to E0, where all channels are weak.

  • U2Ni is adapted to EN, where all channels are strong.

  • When exactly k channels are strong:

    • -

      U1ki is adapted to N\Ek if user i’s channel is weak.

    • -

      U2ki is adapted to Ek if user i’s channel is strong.

Table 1.

Layering and codebook assignments by user i.

hi2 k 0 1 2 N1 N
α1 U10i U11i U12i U1N11
α2 U21i U22i U2N1i U2Ni

The rate of codeword Ujki is denoted by Rjki. Finally, we define βjki as the power fraction of the total power P allocated to codeword Ujki, such that

j=12k=0Nβjki=1.

For user i, the rate of each codebook is governed via the power allocation parameters βjki such that at least one layer is successfully decoded in every possible network state.

3.2. Decoding Approach

Corresponding to the layering approach in Section 3.1, we propose a decoding algorithm with 2kN SIC stages for each combined channel state with k strong channels. The layers’ decoding order is adapted to the combined channel states such that all the layers adapted to channel states with less than k strong users, {Uji,j{1,2},<k}, are first decoded and subtracted from the received signal. Afterwards, layers adapted to channel state with exactly k strong users, {Ujki,j{1,2}}, are decoded.

When |S|=k, the receiver employs 4k+1 decoding stages. Each of the layers for any j{1,2} and {0,,k}, the set of codebooks {Uji:iN} is partitioned to two sets

Pj{Uji:iS}andQj{Uji:iS}, (5)

rendering a total of 4k+1 partitions for different j{1,2} and {0,,k}. The decoding strategy decodes one message from each of these, except for the partition {U2ki:iS}. The decoding strategy works as follows. We create the following two sequences of sets:

P{P10,P11,P21,,P2(k1),P1k,}, (6)
Q{Q1k,Q2(k1),Q1(k1),,Q11,Q10,}. (7)

The decoding strategy selects codebooks by alternating between P and Q in ascending order and decodes exactly one codebook from each. Specifically, the codebook sets are selected in the following order: {P10,Q1k,P11,Q2(k1),P21,,P1k,Q10}. This results in 4k coding stages. Finally, the codebooks in {U2ki:iS} are decoded as the last stage, i.e., stage 4k+1. Next, we describe the decoding stages and the set of codebooks decoded in each.

  • Decoding stage 1: We start by decoding the layers P10{U10i:iS}, i.e., the codebooks U10i of only the k strong users in S. We define Sk as an ordered set of these users, in which the users are ordered in an ascending order based on their indices. The codebooks will be decoded sequentially in this order.

  • Decoding stage 2: Next, after decoding and removing the codebooks in P10, we sequentially decode the layers in Q1k={U1ki:iS}, which involves layers U1ki of users with weak channels.

  • Decoding stage 3: In the third stage, the codebooks in P10 and Q1k are already decoded. We continue by sequentially decoding the set of codebooks in P11{U11i:iS}.

  • Decoding stage 4: The decoding process continues by sequentially decoding the codebooks in Q2(k1)={U2(k1)i:iS}, while the codebooks of P10, Q1k, and P11 are already decoded.

  • Decoding stage 5: This stage sequentially decodes the codebooks P21.

  • Decoding stage 6: This stage sequentially decodes the codebooks in Q1(k1).

  • Decoding stages {2,,4k+1}: Following the pattern of the previous decoding stages, in general, in stage {2,,4k}, we decode the codebooks according to the following schedule for {1,,k}:
    codebooksinQ1(k+1)stage42codebooksinP1stage41codebooksinQ2(k)stage4codebooksinP2stage4+1 (8)

The proposed decoding approach results in decoding more layers for a channel state with k strong users compared to a state with k1 strong users. In particular, the receiver decodes one extra layer for user i in channel state Ek as compared to state Ek1. Note that in both states, user i experiences a weak channel. On the other hand, the receiver decodes two extra layers for user i in channel state Ek as compared to state Ek1, note that user i experiences a strong channel in both states. Our intuition behind such a strategy hinges on two factors. First, that decoding and removing additional interfering users with strong channel states is expected to increase the achievable rate of user i. Secondly, when user i experiences a stronger channel, the receiver can possibly decode an additional layer from its message. The decoded layers for channel state Ek are shown in Table 2 for illustration.

Table 2.

Decoded layers for channel state Ek where hi2=αj.

Stage Stage 1 Stage 2 Stage 3 Stage 4 Stage 4k+1
Codebook P10 Q1k P11 Q2(k1) {U2k1:iSk}

Finally, the detailed steps of the proposed successive decoding algorithm are presented in Algorithm 1. We remark that the effect of the precedence of users with similar channel states within each decoding stage on the average achievable delay will be analyzed in the subsequent sections.

Algorithm 1: Successive Decoding for 2-state channel
1: input(h12,,hN2), k
2: for{0,,k}
3:    if =0
4:       In stage 1 successively decode {U10i}i=1N
5:    else if {1,,k}
6:       (1) In stage 42 successively decode Q1(k+1)
7:       (2) In stage 41 successively decode P1
8:       (3) In stage 4 successively decode Q2(k)
9:       (4) In stage 4+1 successively decode P2
10:    end if
11: end for

Based on the multi-access approach outlined throughout this section, the service rate of the queue at transmitter i is determined by the total rates of the successfully decoded layers during each network state. Therefore, the service rate ri(t) during transmission block t varies randomly and is jointly determined by the states of all users as well as the power allocation among different layers at each transmitter, i.e., βjki. The achievable rates for all the encoded layers are formally stated in the Theorem 1.

Theorem 1.

For the N-user MAC channel without CSIT, when exactly kN{0} users have strong channels, the achievable rates of the layering approach in Section 3.1 and the decoding policy in Algorithm 1 are characterized by the set of rates Rjki,j{1,2},iN,{0N} that satisfy

RjiminS:|S|=kdji(S), (9)

where constants djki(S),k{0N},j{1,2} are defined in Appendix A.

Proof. 

See Appendix B. □

We remark that characterizing the achievable rate region of the proposed approach in the form of rate bounds on individual codebooks rates, rather than an average achievable rate region, will be instrumental to characterizing the average achievable delay analysis throughout the next section.

4. Average Queuing Delay

In this section, we investigate the average queuing delay achieved by the multi-access approach in Section 3 compared to the conventional single-layer (outage) multi-access approach. First, in Section 4.1, we focus on the case of the deterministic arrival process at each queue, for which we delineate lower and upper bounds on the average queuing delay. Furthermore, the case of stochastic arrivals is examined in Section 4.2 in which a closed-form expression for the average delay achievable by the proposed approach is characterized and compared to that of the single-layer transmission approach. To proceed, we define Eki as the event in which we have exactly k strong channels and they include the channel of user i. Accordingly, we define E¯kiN\Eki. We begin by computing the probabilities of the events Eki (and E(S¯ki)) as follows.

PEki=IN|I|=kjIpjIip¯andPE¯ki=IN|I|=kjIjipjIp¯. (10)

where I denotes a subset of user indices.

4.1. Deterministic Arrivals

Throughout this subsection, we assume that the data arrival process at each queue is a deterministic process with an average arrival rate λi, i.e., Ai(t)=λi,iN. Note that as a result of the zero-padding applied by the encoder, whenever the available data bits are fewer than a transmission packet, a G/G/1 queuing model is generated at each transmitter. A closed-form expression characterizing the average delay of the G/G/1 queuing model is, in general, unknown. Therefore we resort to characterizing upper and lower bounds on the average queuing delay. These bounds are formally presented in Theorem 2. Before stating Theorem 2, we provide an outline of the main steps pertinent to deriving the characterized bounds, where the detailed proof can be found in Appendix C.

Establishing the desired bounds hinges on characterizing the average queue size at each transmitter i using the Laplace transform of the probability distribution function (PDF) of the queue size Qi (moment generating function). Let the PDF of Qi be denoted by dFi(q) and its associated Laplace transform be denoted by Li(s). Therefore, the average queue size at transmitter i is given by

E[Qi]=lims0dLi(s)ds. (11)

Recalling the recursive expression for Qi in terms of the variable Zi in (3), a recursive form of Fi(q) can be expressed as follows [52,53]

Fi(q)=qFi(qτ)dFZi(τ),q00,q<0, (12)

where dFZi(z) denote PDF of Zi denoting change in queue size at user i. At the end of every transmission block, the change in queue size i, Zi, is primarily determined by the difference between the data arrival λi and the total rate of all the layers successfully decoded by the receiver from user i’s message stream, which in turn is determined by the combined network state. Consequently, dFZi(z) can be expressed as

dFZi(z)=PES¯0iδzλi+R10i+PESNiδzλi+j=12k=1NRjki+=1N1PESiδzλi+j=12k=01Rjki+R2i+=1N1PES¯iδzλi+j=12k=01Rjki+R1i. (13)

We remark that in order to guarantee the stability of the data queue at each transmitter, we assume that the arrival rate λi is less than the average achievable rate (service rate of the queue), i.e.,

λi<Eri,iN, (14)

where the average service rate at queue i is given by

E[ri]=PES¯0iR10i+PESNi·j=12k=1NRjki+=1N1PESi·j=12k=01Rjki+R2i+=1N1PES¯i·j=12k=01Rjki+R1i. (15)

An explicit expression for Fi(q),iN, directly follows by combining (12) and (13)

Fi(q)=0,qR1PES0iFi(qλi+j=12k=0NRjki),qR2PES¯0iFi(qλi+R10i),qR2N1, (16)

where the intervals Ri,i{1,,2N1}, are given by

R1=(,0),R2=0,λij=12k=0NRjki+R1(N1)i,R2N1=λiR10i,.

Finally, the Laplace transform of the queue size PDF is computed using (16), which in turn facilitates obtaining the average queue size at user i. Note that although Fi(q) is expressed in (16), it is still a recursive form. Therefore, the obtained expression for the average queue size delay contains the unknown term Fi(q), which is why a closed form cannot be obtained. Subsequently, an upper and a lower bound on the average queue size of user iN are formally characterized in the next theorem.

Theorem 2.

The average queue size of transmitter i under the multi-access policy in Section 3 is bounded by

12j=12k=0NRjkiλi2NiDiE[Qi]j=12k=0NRjkiλiNiDi, (17)

where we have defined Di=2E[ri]λi and

Ni=j=12k=0NRjkiλi2+PES¯0ij=12k=1NRjki2+=1N1PESi·j=12k=+1NRjki+R1i2+=1N1PESi¯·j=12k=+1NRjki+R2i2. (18)

Proof. 

See Appendix C. □

Using Little’s law, upper and lower bounds on the average queuing delay at transmitter i under deterministic arrivals can directly be obtained by normalizing the bounds characterized in Theorem 2 E[Qi] by λi.

In order to assess the performance of the proposed multi-layer superposition coding access approach, we compare the achievable average queuing delay to that of the conventional single-layer access (outage) approach. To this end, we first summarize the single-layer approach, and afterward, a lower bound on the average queuing delay achieved by the single-layer approach is characterized in Lemma 1. Finally, we compare the rate of increase of the average delay achieved by each policy with respect to the data arrival rate. As the arrival rate increases, the rate of increase of the average delay with respect to λi resulting from the proposed approach is lower than that resulting from the single-layer (outage) approach.

According to the single-layer (outage) transmission approach, each transmitter encodes the available data in its queue into one layer of a fixed rate irrespective of the unknown network state. For iN, let Ris denote the rate of the single encoded layer transmitted by user i in the outage approach. In any given transmission block, if the rate Ris lies in the achievable rate region of the actual network state, it will be successively decoded by the receiver. Otherwise, an outage occurs where the receiver fails to decode the message of user i, and the transmitter attempts to re-transmit the same message in the subsequent transmission block using the same encoding rate Ris. We define ris(t) as the service rate of the queue at user i under the single-layer transmission, the encoding rate of the codeword transmitted by user i in transmission block t and successively decoded by the receiver, hence removed from user i’s queue. Furthermore, we denote by pis the probability of successfully decoding a message of rate Ris from user i. Accordingly, the service rate of the queue at transmitter i using the outage approach is given by

ris(t)=Ris,withprobabilitypis0,withprobability1pis. (19)

Finally, we define Qis as the queuing size at transmitter i under the single-layer transmission approach summarized above. In Lemma 1, we characterize lower and upper bounds on the average E[Qis] using an approach similar to that used to characterize the bounds in Theorem 2.

Lemma 1.

The average queue size of transmitter i under single layer (outage) approach is lower and upper bounded according to:

12Risλi2Risλi2Ris1pis2pisRisλiE[Qis]RisλiRisλi2Ris1pis2pisRisλi. (20)

Proof. 

Follows the same argument as that in Appendix C. □

In Theorem 2 and Lemma 1, we remark that the characterized bounds on the average queuing delay at each transmitter depend only on the arrival rate at the same node. Therefore, the effect of the average arrival rate on the delay bounds in (17) or (20) can be analyzed for each node i independently. In Theorem 3, while fixing the average achievable rates at each user among both approaches, we show that as the arrival rate λi at each user increases, the proposed multi-access approach lower rate of increase in the average queuing delay with respect to that achieved by the single layer approach.

Theorem 3.

For the N-user multiple access channel, given that

E[ri]=E[ris], (21)

the rate of increase of average delay with respect the arrival rate under the approach in Section 3 is lower than that achieved by single-layer outage approach, i.e., for every iN

E[Qi]λiE[Qis]λi. (22)

Proof. 

See Appendix D. □

4.2. Stochastic Arrivals

In this section, we consider the proposed multi-layer superposition coding policy presented in Section 3 under Poisson distributed random arrivals AiPois(λi). We adopt the same queuing model in which each transmitter applies zero-padding in case the available bits in its queue are fewer than the size of a transmitted packet. Therefore, under Poisson distributed arrivals, the considered model constitutes an M/G/1 queuing model with an average arrival rate λi and service rate ri specified in (15). Furthermore, we denote the queue utilization at transmitter i by ρi=λiE[ri]. The average queue length for an M/G/1 queue can be characterized in a closed form by directly applying the Pollaczek-Khinchin formula. Theorem 4 formally states the average queuing size under the proposed layering and decoding approach.

Theorem 4.

According to the multi-access approach outlined in Section 3, the average queue length at user i with Poisson distributed arrivals with the average rate λi is given by

E[Qi]=ρi+ρi2+λiV[ri]2(1ρi), (23)

where the average service rate E[ri] is given by (15) and the variance of the service rate V[ri] is

V[ri]=E[ri]+PES¯0i(R10i)2+PESNi·j=12k=1NRjki2+=1N1PESi·j=12k=01Rjki+R2i2+=1N1PESi¯·j=12k=01Rjki+R1i2. (24)

Proof. 

Follows by applying Pollaczek-Khinchin formula for the M/G/1 average queue size [54], where the service rate of queue i is given by ri. □

We remark that the proof of Theorem 3 implies that the proposed approach outperforms the single-layer outage approach in the case of Poisson arrivals as well, under equal average achievable rates. This result can be readily verified given that the proof in Appendix D essentially boils down to showing that the variance of the service rate (transmission rate) at each queue, V[ri], is higher in the case of single-layer outage approach when compared to the proposed multi-layer approach.

5. -State Channel Multi-Access

In this section, we generalize the multi-access encoding and decoding approach outlined in Section 3 from the special case of 2-state channel, {weak, strong}, to channel with an arbitrary number of states . We denote the channel states by {α1,,α}. Without loss of generality, we assume that 0<α1<<α<+. Similarly to Section 2, we consider a slowly fading non-orthogonal multiple access channel model with N-transmitters and one receiver. The channel power gain of each user i can randomly take one of -states, i.e., hi2{α1,,α}.

In the layering approach in Section 3.1, we ordered the network state according to the number of users experiencing a strong channel state. Subsequently, each user splits its message into 2N layers, and the receiver decodes the layers adapted to the actual network state. Similarly, for the -state channel, we order the combined network state according to the number of users in the network sharing a particular state αj as well as the value of such a state. In particular, a combined network state is degraded with respect to another state if it has a strictly smaller sum-rate capacity. We define the column vector h=[h12,,hN2]T as the the combined network state and consider that a network state h to be degraded with respect to network state h˜ if and only if

h1<h˜1. (25)

The motivation of such ordering stems from the fact the condition in (25) indicates the state h˜ allows higher sum-rate capacity in an N-user MAC with full CSIT. In order to overcome the absence of full CSIT at each user, a transmitter splits its message into a finite number of layers, each adapted to the combined network state to avoid complete outages. Similarly to Section 3.1, user i encodes an available message using (1)N+1 independent random Gaussian codebooks. The codewords of these codebooks are denoted by Ujki. For layer Ujki, j{1,,} denotes the channel state of user i, that is hi2=αj, while k{0,,N1} denotes the number of users in the network with stronger channel state, i.e., k=i=1NI(hi2>αj) where I(x) is the indicator function.

According to the layering approach outlined above, the receiver attempts to successively decode up to N((1)N+1) depending on the exact combined network state h. In particular, when the actual network state is h, the receiver decodes for each user i layer Ujki adapted to network state h in addition to all the layers adapted to all degraded network states h˜ such that (25) is satisfied. The number of layers decoded for user i at the receiver increases from network state h to network state h^ either if its own channel state becomes stronger or if the number of users experiencing channels strictly stronger than hi2 increases.

Given a network state h, the receiver employs up to M stages of successive decoding, where M denotes the argument of the strongest channel gain in the network, i.e., M=argh. In stage n{1,,M}, the receiver successively decodes up to one layer for each user according to a descending order of the channel states among users. The details of the proposed decoding order for the -state channel are outlined in Algorithm 2.

Algorithm 2: Successive Decoding for -state channel
1: inputh
2: setki=d=1NI(hd2>αi),iN,M=argh
3: form{1,,M}
4:    Successively decode {Umkii:hi2αm,iN}.
5: end for

We remark that according to the proposed layering approach for the -state channel and decoding approach in Algorithm 2, the total number of layers decoded by the receiver from each user i is possibly different in certain network states. Although, one possible generalization of the layering policy in Section 3 is that each user adapts a different encoding layer to each possible combined channel state, which in turn requires each user to encode its message into N layers. However, the computational complexity of the decoding process, in addition to determining the optimal power allocation among layers, is considerable as the number of users N grows larger. Therefore, we adopt the outlined layering approach where each user splits its message into N(1)+1 layers instead of N layers.

6. Numerical Evaluations

In this section, we evaluate the average achievable queuing delay for each user in the MAC channel using the multi-access broadcast approach outlined in Section 3. In particular, we adopt a Monte-Carlo simulation to optimally allocate the transmission power among the encoded layers at each user such that the average queuing delay is minimized. We divide the comparison settings into two main parts according to the arrival process at each queue, where we set the arrival process to be the same among both users in each setting. The first considers deterministic arrivals with value λ. The second one considers the Poisson arrival process. Furthermore, we also consider symmetric and asymmetric channel distributions among users. Throughout this section, we set the channel gains to α1=0.5 for the weak channel and α2=1 for the strong channel gains. In the symmetric case, we set the channel probability distribution for each user as p1=p2=0.5, and in the asymmetric case, we set the probabilities to p1=0.5 and p2=0.1. In the asymmetric model, user 2 encounters a weak channel with a high probability, i.e., p¯2=0.9. We set the objective function in this numerical simulation to minimize the sum average delays of users 1 and 2 for the broadcast approach. Subsequently, based on the obtained optimal power distribution among the layers at each user, we evaluate the resulting average delay for the outage approach such that the average rates for each user are equal across both approaches.

Figure 1 and Figure 2 focus on deterministic arrivals in the symmetric and asymmetric channel settings. In these figures, we compare average delay versus varying arrival rate λ in the proposed broadcast approach (denoted by “Bc”) and in the outage approach (denoted by “outage”). In these evaluations, we have set the SNR to P=10 dB. Furthermore, in these figures, we provide upper bounds that we have characterized for the broadcast approach (denoted by “BcUB”) and the outage approach (denoted by “OutageUB”). Figure 3 and Figure 4 depict the counterparts of these results for Poisson arrival processes. Finally, it is observed that introducing asymmetry in the models (i.e., unequal probabilities for encountering strong channels) slightly improves the average latency of the broadcast approach, whereas it does not have a notable effect in the outage approach.

Figure 1.

Figure 1

Deterministic: Symmetric.

Figure 2.

Figure 2

Deterministic: Asymmetric.

Figure 3.

Figure 3

Poisson: Symmetric.

Figure 4.

Figure 4

Poisson: Asymmetric.

The numerical evaluations support the analysis, demonstrating that the proposed broadcast approach significantly enhances the average delays of both users in the moderate and high SNR regimes for moderate and high arrival rates.

7. Concluding Remarks

In this paper, a non-orthogonal multi-access broadcast approach is employed, in which each user splits its information stream into a finite number of encoded layers, each adapted to one possible network state, serving as an outage-free low-latency transmission scheme. In particular, the average queuing delay of each user under the proposed multi-access approach is analyzed for different arrival processes at each transmitter. First, for deterministic arrivals, closed-form lower and upper bounds on the average delay are derived analytically. Secondly, for Poisson arrival rates, the average queuing delay is characterized in a closed form. The latency advantage of the proposed approach compared to the single-layer transmission is shown analytically. Finally, we note that in this paper, our focus has been on the discrete channel models since it provides a setting based on which the key ideas (specifically information layering and decoding strategy) can be described clearly and in detail. In order to gain insight into the behavior in the continuous channel models, by increasing the number of channel states in the limit of an infinite number of states, the models converge to a continuous model, and the codebook assignments and decoding strategy converge to their counterparts for continuous channels (larger number of codebooks with low rates).

Appendix A. Constants of Theorem 1

iN:

d10i(ϕ)=Cα1β10i,Nα1j=1iα1β10j. (A1)

mSk:

d10m(Sk)=Cα2β10m,(Nk)α1+kα2jSk,jk(m)α2(1β10j), (A2)
d11m(Sk)=Cα2β11m,(Nk)α1+kα2jSkα2β10jjSkα1β1kjjSk,jk(m)α2β11j), (A3)
d21m(Sk)=Cα2β21m,(Nk)α1+kα2jSkα2(β10j+β11j)jSkα1(β1kj+β2(k1)j)jSk,jk(m)α2β21j) (A4)

mSk and {1,,k}:

d1m(Sk)=Cα2β1m,(Nk)α1+kα2jSkα2β10jjSki=11α2(β1ij+β2ij)jSkα1i=11(β1(ki+1)j+β2(ki+1)j)jSk,jk(m)α2β1j, (A5)
d2m(Sk)=Cα2β2m,(Nk)α1+kα2jSkα2β10jjSki=1α2β1ijjSki=11α2β2ijjSkα1i=1(β1(ki+1)j+β2(ki+1)j)jSk,jk(m)α2β2j. (A6)

nSk and {1,,k}:

d1(k+1)n(Sk)Cα1β1(k+1)n,(Nk)α1+kα2jSkα2β10jjSki=11α2(β1ij+β2ij)jSkα1i=11(β1(ki+1)j+β2(ki+1)j)jSk,jk¯(n)α1β1(k+1)j), (A7)
d2(k)n(Sk)Cα1β2(k)n,(Nk)α1+kα2jSkα2β10jjSki=1α2β1ijjSki=11α2β2ijjSki=1α1β1(ki+1jjSki=11α1β2(ki+1)jjSk,jk¯(n)α1β2(k)j). (A8)

Appendix B. Proof of Theorem 1

The rate region characterized in Theorem 1 is achievable by employing the layering scheme in Section 3.1 at each transmitter combined with the successive decoding strategy in Algorithm 1. Recall that the maximum rate of codeword Ujki, for each user iN channel j{1,2}, and k{0N}, is bounded by the minimum achievable rate for that codebook in all combined network states during which it is decoded.

We define S as the set of users’ indices that are experiencing a strong states. This set is known to the receiver. Accordingly, we define Sk as a realization of S that contains exactly k users, i.e., k users have strong channels and Nk users have weak channels. Next, we discuss S0 and Sk for kN, separately.

|S|=0: All channels are weak

In the event of a network state with all channels in the weak state, hi2=α1,iN, the receiver decodes only one layer per user. Specifically, it decodes {U10i:iN}. It performs successive decoding, starting from user 1 and continuing in the ascending order of users’ indices. In order to successfully decode layers {U10i:iN}, the rate of each layer iN should satisfy:

iN:R10iCα1β10i,Nα1j=1iα1β10j=d10i(ϕ). (A9)

Note that the second argument C(x,y) represents the undecoded layers that will be treated as interference for layer U10i. Hence, based on the successive decoding procedure, when the receiver decodes U10i, layers U10i for users j{1,,i1} have already been decoded. Thus, their interference is subtracted from the total transmitted signal, accounted by the term 1β10j. On the other hand, none of the layers transmitted by users j{i+1,,N} have been decoded yet, which is accounted by the term (Ni)α1.

Next, we will characterize upper bounds on the achievable rates of all the layers decoded when there are exactly k users with strong channels, i.e., |S|=k.

|S|=k: k channels are strong

As discussed earlier, when |S|=k, the receiver employs 4k+1 decoding stages. For this purpose, the set of codebooks {Uji:iN} is partitioned to two sets

Pj{Uji:iS}andQj{Uji:iS}, (A10)

rendering a total of 4k+1 partitions for different j{1,2} and {0,,k}. The decoding strategy, decodes one message from each of these, except for the partition {U2ki:iS}. The decoding strategy works as follows. We create the following two sequences of sets:

P{P10,P11,P21,,P2(k1),P1k,}, (A11)
Q{Q1k,Q2(k1),Q1(k1),,Q11,Q10,}. (A12)

The decoding strategy selects codebooks by alternating between P and Q an an ascending order and decodes exactly one codebook from each. This results in 4k coding stages. Finally, the codebooks in {U2ki:iS} are decoded as the last stage, i.e., stage 4k+1.

  • Decoding stage 1:

    We start by decoding the layers P10{U10i:iS}. Recall that Sk was defined as an ordered set of these users. The codebooks will be decoded sequentially in this order. When mSk, we denote the position of m in Sk by k(m). Hence, mSk
    R10mCα2β10m,(Nk)α1+kα2jSk,jk(m)α2(1β10j)=d10m(Sk). (A13)
  • Decoding stage 2:

    Next, we sequentially decode the layers in Q1k={U1ki:iS}, which involves layers U1ki of users with weak channels. When nSk, we denote the position of n in the ordered set N\Sk by k¯(n). Hence, nSk
    R1knCα1β1kn,(Nk)α1+kα2jSkα2β10jjSk,j<k¯(n)α1β1kj=d1kn(Sk). (A14)
  • Decoding stage 3:

    In the third stage, the codebooks in P10 and Q1k are already decoded. We continue by sequentially decoding the set of codebooks in P11{U11i:iS}. Hence, mSk
    R11mCα2β11m,(Nk)α1+kα2jSkα2β10jjSkα1β1kjjSk,jk(m)α2β11j)=d11m(Sk). (A15)
  • Decoding stage 4:

    The decoding process continues by sequentially decoding the codebooks in Q2(k1)={U2(k1)i:iS}, while the codebooks of P10, Q1k, and P11 are already decoded. Hence, for nSk
    R2(k1)nCα1β2(k1)n,(Nk)α1+kα2jSkα2(β10j+β11j)jSkα1β1kjjSk,jk¯(n)α1β2(k1)j)=d2(k1)n(Sk). (A16)
  • Decoding stage 5:

    This stage sequentially decodes the codebooks P21. For all mSki we have
    R21mCα2β21m,(Nk)α1+kα2jSkα2(β10j+β11j)jSkα1(β1kj+β2(k1)j)jSk,jk(m)α2β21j)=d21m(Sk). (A17)
  • Decoding stage 6:

    This stage sequentially decodes the codebooks in Q1(k1). Hence, nSk we have
    R1(k1)nCα1β1(k1)n,(Nk)α1+kα2jSkα2(β10j+β11j+β21j)jSkα1(β1kj+β2(k1)j)jSk,jk¯(n)α1β1(k1)j)=d1(k1)n(Sk). (A18)
  • Decoding stages {2,,4k+1}:

    Following the pattern of the previous decoding stages, in general in the stage {2,,4k}, we decode the codebooks according to the following schedule, for {1,,k}:
    codebooksinQ1(k+1)stage42codebooksinP1stage41codebooksinQ2(k)stage4codebooksinP2stage4+1 (A19)

    Accordingly, we obtain the following rate constraints.

  • Decoding stage 42:

    By sequentially decoding the messages in Q1(k+1), nSk we have
    R1(k+1)nCα1β1(k+1)n,(Nk)α1+kα2jSkα2β10jjSki=11α2(β1ij+β2ij)jSkα1i=11(β1(ki+1)j+β2(ki+1)j)jSk,jk¯(n)α1β1(k+1)j)=d1(k+1)n(Sk). (A20)
  • Decoding stage 41:

    By sequentially decoding the messages in P1, mSk we have
    R1mCα2β1m,(Nk)α1+kα2jSkα2β10jjSki=11α2(β1ij+β2ij)jSkα1i=11(β1(ki+1)j+β2(ki+1)j)jSk,jk(m)α2β1j=d1m(Sk). (A21)
  • Decoding stage 4:

    By sequentially decoding the messages in Q1(k), nSk we have
    R2(k)nCα1β2(k)n,(Nk)α1+kα2jSkα2β10jjSki=1α2β1ijjSki=11α2β2ijjSki=1α1β1(ki+1jjSki=11α1β2(ki+1)jjSk,jk¯(n)α1β2(k)j)=d2(k)n(Sk). (A22)
  • Decoding stage 4+1:

    By sequentially decoding the messages in P2, mSk we have
    R2mCα2β2m,(Nk)α1+kα2jSkα2β10jjSki=1α2β1ijjSki=11α2β2ijjSkα1i=1(β1(ki+1)j+β2(ki+1)j)jSk,jk(m)α2β2j=d2m(Sk). (A23)

Given the upper bounds on the individual achievable rates of Ujki,iN,j1,2,k{0N}, the maximum achievable rate of Ujki is bounded my the minimum upper bound among all the network states within which it is decoded.

Appendix C. Proof of Theorem 2

By applying a change of variable to each term and taking the integral 0esqdF1(q) as a common factor, L1(s) can be expressed as

L1(s)=F1(0)0+(ijRij1λ1)es(q+(λ1ijRij1))dF1(q)1[p¯1p¯2es(λ1ijRij1)+p¯1p2es(λ1R111R211))+p1p¯2es(λ1R111R121))+p1p2es(λ1R111))] (A24)

Further, by using the definition of F1(0)=p¯1p¯2F1(q(λ1ijRij1)) and multiplying the numerator and denominator of (A24) by a common factor, es(ijRij1λ1), we have.

L1(s)=p¯1p¯2[0(ijRij1λ1)es(ijRij1λ1)esqdF1(q)]es(ijRij1λ1)[p¯1p¯2+p¯1p2es(R121+R221))+p1p¯2es(R211+R221))+p1p2es(R211+R121+R221))]=D1(s)N1(s). (A25)

It can be readily noticed from (A25) that lims0D1(s)=lims0N1(s)=0, therefore we apply L’hopital’s limit rule on (A25) to arrive at

E[Q1]=lims0DQ1(s)NQ1(s)2DQ1(s). (A26)

Finally, we evaluate the terms DQ1(s), NQ1(s) and DQ1(s) where we have

lims0DQ1(s)=(ijRij1λ1)+p¯1p2(R121+R221)+p1p¯2(R121+R221)+p1p2(R121+R211+R221) (A27)
lims0DQ1(s)=(ijRij1λ1)2p¯1p2(R121+R221)2p1p¯2(R121+R221)2p1p2(R121+R211+R221)2, (A28)

and

lims0NQ1(s)=p¯1p¯20(ijRij1λ1)[(ijRij1λ1)2q2]dF1(q). (A29)

Finally, by using lims0D1(s)=lims0N1(s), the second derivative of the numerator term can be upper bounded by replacing (ijRij1λ1+q) by 2(ijRij1λ1) arriving at

lims0NQ1(s)2(ijRij1λ1)ijRij1λ1p¯1p2(R121+R221)p1p¯2(R121+R221)p1p2(R121+R211+R221). (A30)

Next, we leverage (A26) reaching

E[Qi]12j=12k=0NRjkiλi2NiDi,E[Qi]j=12k=0NRjkiλiNiDi, (A31)

where

Ni=j=12k=0NRjkiλi2+PES¯0ij=12k=1NRjki2+=1N1PESi·j=12k=+1NRjki+R1i2+=1N1PESi¯·j=12k=+1NRjki+R2i2Di=2E[ri]λi. (A32)

Appendix D. Proof of Theorem 3

In this Appendix, we base the proof of Theorem 3 on two main steps. First, we characterize a lower bound on the average achievable rate of each user i using a single layer per user (outage approach). Secondly, we derive the rate of increase of the average achievable delay with respect to the average arrival rate λi (first-order derivative) for the delay upper bound of the multi-layer approach to that of the delay lower bound of the outage approach. Finally, under a fixed average achievable rate among both approaches, we show that the proposed approach outperforms the single layer outage approach.

Recalling the recursive expression for Qi in terms of the variable Zi in (3), a recursive form of Fi(q) can be expressed as follows [52,53]

Fi(q)=0,q<0qFi(qτ)dFZi(τ),q0, (A33)

where dFZi(z) denote pdf of Zi.

At the end of every transmission block, the change in queue size i, Zi, is primarily determined by the difference between the data arrival λi and the fixed rate successfully decoded at the receiver, which in turn is determined by the combined network state. Consequently, dFZi(z) can be expressed by

dFZi(z)=Poutδzλi+RF. (A34)

We remark that in order to guarantee the stability of every queue i, we assume that the arrival rate λi is less that the average achievable rate (service rate of the queue), i.e.,

λi<PoutRF,iN. (A35)

Combining (12) and (13), an explicit expression for Fi(q),iN is given by

Fi(q)=0,q<0PoutFi(qλi+RF),q0. (A36)

Finally, we evaluate the terms DQ1(s) and NQ1(s) where we have

lims0DQ1(s)=(RFλi)2(1Pout)RF2, (A37)

and

lims0NQ1(s)=Pout0RFλ1)[(RFλ1)2q2]dF1(q). (A38)

Finally, by using lims0D1(s)=lims0N1(s), the second derivative of the numerator term can be lower bounded by replacing (FFλ1+q) by (RFλ1) arriving at

lims0NQ1(s)(RFλ1)RFλ1PoutRF. (A39)

and substitute (A26) reaching

E[Qi]12RFλi2NiDi, (A40)

where

Ni=RFλi2+(1Pout)RF2Di=PoutRFλi. (A41)

By taking the derivative of the upper/lower bounds derived above we reach

UBλi=1j=12k=0NRjkiλiE[ri]λi2NiDi2, (A42)
LBλi=1RFλiPoutRFλi2RFλi2+(1Pout)RF2PoutRFλi. (A43)

Author Contributions

All authors have contributed equally to the manuscript. All authors have read and agreed to the published version of the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

Funding Statement

The work of A. Tajer has been supported in part by the U.S. Nationa Science Foundation grant ECCS-1933107. The work of S. Shamai (Shitz) has been supported by the European Union’s Horizon 2020 Research And Innovation Programme, grant agreement no. 694630.

Footnotes

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Study on Scenarios and Requirements for Next Generation Access Technologies. ETSI; Sophia Antipolis, France: 2017. [Google Scholar]
  • 2.Ding Z., Liu Y., Choi J., Sun Q., Elkashlan M., Chih-Lin I., Poor H.V. Application of non-orthogonal multiple access in LTE and 5G networks. IEEE Commun. Mag. 2017;55:185–191. doi: 10.1109/MCOM.2017.1500657CM. [DOI] [Google Scholar]
  • 3.Ding Z., Lei X., Karagiannidis G.K., Schober R., Yuan J., Bhargava V.K. A survey on non-orthogonal multiple access for 5G networks: Research challenges and future trends. IEEE J. Sel. Areas Commun. 2017;35:2181–2195. doi: 10.1109/JSAC.2017.2725519. [DOI] [Google Scholar]
  • 4.Ding Z., Yang Z., Fan P., Poor H.V. On the performance of non-orthogonal multiple access in 5G systems with randomly deployed users. IEEE Signal Process. Lett. 2014;21:1501–1505. doi: 10.1109/LSP.2014.2343971. [DOI] [Google Scholar]
  • 5.Islam S.R., Avazov N., Dobre O.A., Kwak K.-S. Power-domain non-orthogonal multiple access (NOMA) in 5G systems: Potentials and challenges. IEEE Commun. Surv. Tutor. 2016;19:721–742. doi: 10.1109/COMST.2016.2621116. [DOI] [Google Scholar]
  • 6.Benjebbovu A., Li A., Saito Y., Kishiyama Y., Harada A., Nakamura T. System-level performance of downlink NOMA for future LTE enhancements; Proceedings of the IEEE Global Communications Conference Workshops; Atlanta, GA, USA. 9–13 December 2013; pp. 66–70. [Google Scholar]
  • 7.Wang W., Liu Y., Luo Z., Jiang T., Zhang Q., Nallanathan A. Toward cross-layer design for non-orthogonal multiple access: A quality-of-experience perspective. IEEE Wirel. Commun. 2018;25:118–124. doi: 10.1109/MWC.2018.1700081. [DOI] [Google Scholar]
  • 8.Condoluci M., Dohler M., Araniti G., Molinaro A., Sachs J. Enhanced radio access and data transmission procedures facilitating industry-compliant machine-type communications over LTE-based 5G networks. IEEE Wirel. Commun. 2016;23:56–63. doi: 10.1109/MWC.2016.7422406. [DOI] [Google Scholar]
  • 9.Bennis M., Debbah M., Poor H.V. Ultrareliable and low-latency wireless communication: Tail, risk, and scale. Proc. IEEE. 2018;106:1834–1853. doi: 10.1109/JPROC.2018.2867029. [DOI] [Google Scholar]
  • 10.Shamai S., Steiner A. A broadcast approach for a single-user slowly fading MIMO channel. IEEE Trans. Inf. Theory. 2003;49:2617–2635. doi: 10.1109/TIT.2003.817834. [DOI] [Google Scholar]
  • 11.Shamai S. A broadcast strategy for the Gaussian slowly fading channel; Proceedings of the IEEE International Symposium Information Theory; Ulm, Germany. 29 June–4 July 1997; p. 150. [Google Scholar]
  • 12.Tajer A., Steiner A., Shamai S. The broadcast approach in communication networks. Entropy. 2021;23:120. doi: 10.3390/e23010120. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 13.Zohdy M., Tajer A. Broadcast Approach for the Single-user Energy Harvesting Channel. IEEE Trans. Commun. 2019;67:3192–3204. doi: 10.1109/TCOMM.2019.2895346. [DOI] [Google Scholar]
  • 14.Shamai S. A broadcast approach for the multiple-access slow fading channel; Proceedings of the IEEE International Symposium Information Theory; Sorrento, Italy. 25–30 June 2000; p. 128. [Google Scholar]
  • 15.Minero P., Tse D.N.C. A broadcast approach to multiple access with random states; Proceedings of the IEEE International Symposium Information Theory; Nice, France. 24–29 June 2007; pp. 2566–2570. [Google Scholar]
  • 16.Minero P., David N., Franceschetti M. A broadcast approach to random access; Proceedings of the IEEE Information Theory Workshop; Taormina, Italy. 11–16 October 2009; pp. 615–619. [Google Scholar]
  • 17.Kazemi S., Tajer A. Multiaccess communication via a broadcast approach adapted to the multiuser channel. IEEE Trans. Commun. 2018;66:3341–3353. doi: 10.1109/TCOMM.2018.2809733. [DOI] [Google Scholar]
  • 18.Zohdy M., Tajer A., Shamai S. Broadcast Approach to Multiple Access with Local CSIT. IEEE Trans. Commun. 2019;67:7483–7498. doi: 10.1109/TCOMM.2019.2933515. [DOI] [Google Scholar]
  • 19.Kazemi S., Tajer A. A broadcast approach to multiple access adapted to the multiuser channel; Proceedings of the IEEE International Symposium on Information Theory; Aachen, Germany. 25–30 June 2017. [Google Scholar]
  • 20.Zohdy M., Kazemi S., Tajer A. A broadcast approach to multiple access with partial CSIT; Proceedings of the IEEE Global Communications Conference; Abu Dhabi, United Arab Emirates. 9–13 December 2018. [Google Scholar]
  • 21.Zohdy M., Tajer A., Shamai S. Interference Management without CSIT: A Broadcast Approach; Proceedings of the IEEE International Symposium on Information Theory (ISIT); Los Angeles, CA, USA. 21–26 June 2020. [Google Scholar]
  • 22.Zohdy M., Tajer A., Shamai S. Distributed Interference Management: A Broadcast Approach. IEEE Trans. Commun. 2021;69:149–163. doi: 10.1109/TCOMM.2020.3026386. [DOI] [Google Scholar]
  • 23.Ye N., Wang A., Li X., Liu W., Hou X., Yu H. Rate-adaptive multiple access for uplink grant-free transmission. Wirel. Commun. Mob. Comput. 2018;2018:1–21. doi: 10.1155/2018/8978207. [DOI] [Google Scholar]
  • 24.Steiner A., Shamai S. On queueing and multilayer coding. IEEE Trans. Inf. Theory. 2010;56:2392–2415. doi: 10.1109/TIT.2010.2044076. [DOI] [Google Scholar]
  • 25.Clerckx B., Mao Y., Jorswieck E.A., Yuan J., Love D.J., Erkip E., Niyato D. A primer on rate-splitting multiple access: Tutorial, myths, and frequently asked questions. arXiv. 20222209.00491 [Google Scholar]
  • 26.Yang J., Ulukus S. Delay-minimal transmission for average power constrained multi-access communications. IEEE Trans. Wirel. Commun. 2010;9:2754–2767. doi: 10.1109/TWC.2010.062910.081209. [DOI] [Google Scholar]
  • 27.Yeh E. Delay-optimal rate allocation in multiaccess communications: A cross-layer view; Proceedings of the IEEE Workshop on Multimedia Signal Processing; St.Thomas, VI, USA. 9–11 December 2002; pp. 404–407. [Google Scholar]
  • 28.Goyal M., Kumar A., Sharma V. Optimal cross-layer scheduling of transmissions over a fading multiaccess channel. IEEE Trans. Inf. Theory. 2008;54:3518–3537. doi: 10.1109/TIT.2008.926335. [DOI] [Google Scholar]
  • 29.Koseoglu M. Lower bounds on the LTE-A average random access delay under massive M2M arrivals. IEEE Trans. Commun. 2016;64:2104–2115. doi: 10.1109/TCOMM.2016.2550526. [DOI] [Google Scholar]
  • 30.Awuor F.M., Wang C.-Y. Massive machine type communication in cellular system: A distributed queue approach; Proceedings of the IEEE International Conference on Communications; Kuala Lumpur, Malaysia. 22–27 May 2016; pp. 1–7. [Google Scholar]
  • 31.Zhao X., Chen W. Non-orthogonal multiple access for delay-sensitive communications: A cross-layer approach. IEEE Trans. Commun. 2019;67:5053–5068. doi: 10.1109/TCOMM.2019.2904577. [DOI] [Google Scholar]
  • 32.Ding Z., Fan P., Poor H.V. Impact of user pairing on 5G nonorthogonal multiple-access downlink transmissions. IEEE Trans. Veh. Technol. 2015;65:6010–6023. doi: 10.1109/TVT.2015.2480766. [DOI] [Google Scholar]
  • 33.Sedaghat M.A., Müller R.R. On user pairing in uplink NOMA. IEEE Trans. Wirel. Commun. 2018;17:3474–3486. doi: 10.1109/TWC.2018.2815005. [DOI] [Google Scholar]
  • 34.Salehi M., Tabassum H., Hossain E. Accuracy of distance-based ranking of users in the analysis of NOMA systems. IEEE Trans. Commun. 2019;67:5069–5083. doi: 10.1109/TCOMM.2019.2904987. [DOI] [Google Scholar]
  • 35.Zhao X., Chen W. Delay optimal non-orthogonal multiple access with joint scheduling and superposition coding; Proceedings of the IEEE Global Communications Conference; Singapore. 4–8 December 2017; pp. 1–6. [Google Scholar]
  • 36.Liu L., Sheng M., Liu J., Dai Y., Li J. Stable throughput region and average delay analysis of uplink NOMA systems with unsaturated traffic. IEEE Trans. Commun. 2019;67:8475–8488. doi: 10.1109/TCOMM.2019.2941683. [DOI] [Google Scholar]
  • 37.Sheng M., Jiao W., Wang X., Liu G. Effect of power control on performance of users in an interference-limited network with unsaturated traffic. IEEE Trans. Veh. Technol. 2016;66:2740–2755. doi: 10.1109/TVT.2016.2584085. [DOI] [Google Scholar]
  • 38.Zhong Y., Quek T.Q., Ge X. Heterogeneous cellular networks with spatio-temporal traffic: Delay analysis and scheduling. IEEE J. Sel. Areas Commun. 2017;35:1373–1386. doi: 10.1109/JSAC.2017.2687379. [DOI] [Google Scholar]
  • 39.Xu C., Wu M., Xu Y., Fang Y. Uplink low-power scheduling for delay-bounded industrial wireless networks based on imperfect power-domain NOMA. IEEE Syst. J. 2020;14:2443–2454. doi: 10.1109/JSYST.2019.2924483. [DOI] [Google Scholar]
  • 40.Nasfi R., Chorti A. Performance analysis of the uplink of a two user NOMA network under QoS delay constraints; Proceedings of the IEEE International Conference on Ubiquitous and Future Networks; Zagreb, Croatia. 2–5 July 2019; pp. 526–528. [Google Scholar]
  • 41.Xiao C., Zeng J., Liu B., Su X., Wang J. Cross-layer power control for uplink NOMA in IoT applications with statistical delay constraints; Proceedings of the IEEE Global Communications Conference; Abu Dhabi, United Arab Emirates. 9–13 December 2018; pp. 1–7. [Google Scholar]
  • 42.Bello M., Yu W., Pischella M., Chorti A., Fijalkow I., Musavian L. Flexible multiple access enabling low-latency communications: Introducing NOMA-R. arXiv. 20202001.10637 [Google Scholar]
  • 43.Li A., Chen X., Jiang H. Contention based uplink transmission with NOMA for latency reduction; Proceedings of the IEEE Vehicular Technology Conference; Sydney, NSW, Australia. 4–7 June 2017; pp. 1–6. [Google Scholar]
  • 44.Seo J.-B., Jung B.C., Jin H. Performance analysis of NOMA random access. IEEE Commun. Lett. 2018;22:2242–2245. doi: 10.1109/LCOMM.2018.2866376. [DOI] [Google Scholar]
  • 45.Zhai D., Zhang R., Cai L., Yu F.R. Delay minimization for massive internet of things with non-orthogonal multiple access. IEEE J. Sel. Top. Signal Process. 2019;13:553–566. doi: 10.1109/JSTSP.2019.2898643. [DOI] [Google Scholar]
  • 46.Park T., Lee G., Saad W. Message-aware uplink transmit power level partitioning for non-orthogonal multiple access (NOMA); Proceedings of the IEEE Global Communications Conference; Abu Dhabi, United Arab Emirates. 9–13 December 2018; pp. 1–6. [Google Scholar]
  • 47.Choi M., Kim J., Moon J. Dynamic power allocation and user scheduling for power-efficient and delay-constrained multiple access networks. IEEE Trans. Wirel. Commun. 2019;18:4846–4858. doi: 10.1109/TWC.2019.2929809. [DOI] [Google Scholar]
  • 48.Sreya G., Saigadha S., Goutam M.P.D.D., S D.H. Adaptive rate NOMA for cellular IoT networks. Proc. IEEE Wirel. Commun. Lett. 2021;11:478–482. doi: 10.1109/LWC.2021.3132932. [DOI] [Google Scholar]
  • 49.Jinho G. Opportunistic NOMA for uplink short-message delivery with a delay constraint. IEEE Trans. Wirel. Commun. 2020;19:3727–3737. [Google Scholar]
  • 50.Schiessl S., Sebastian M., Skoglund M., Gross J. NOMA in the uplink: Delay analysis with imperfect CSI and finite-length coding. IEEE Trans. Wirel. Commun. 2020;19:3879–3893. doi: 10.1109/TWC.2020.2979114. [DOI] [Google Scholar]
  • 51.Zeng J., Xiao C., Li Z., Ni W., Liu R. Dynamic Power Allocation for Uplink NOMA With Statistical Delay QoS Guarantee. IEEE Trans. Wirel. Commun. 2021;20:8191–8203. doi: 10.1109/TWC.2021.3091002. [DOI] [Google Scholar]
  • 52.Kleinrock L. Queuing Systems, Volume I: Theory. Wiley; New York, NY, USA: 1975. [Google Scholar]
  • 53.Kleinrock L. Queuing Systems, Volume II: Computer Applications. Wiley; New York, NY, USA: 1975. [Google Scholar]
  • 54.Chan W., Lu T.-C., Chen R.-J. Pollaczek-Khinchin formula for the M/G/1 queue in discrete time with vacations. IEEE Proc. Comput. Digit. Tech. 1997;144:222–226. doi: 10.1049/ip-cdt:19971225. [DOI] [Google Scholar]

Articles from Entropy are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES