0% found this document useful (0 votes)
156 views61 pages

Investigation of Swipt Noma

Uploaded by

kjzbx
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
156 views61 pages

Investigation of Swipt Noma

Uploaded by

kjzbx
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 61

A Project Report

On

INVESTIGATION OF SWIPT NOMA


Submitted to
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY ANANTAPUR, ANANTHAPURAMU

In Partial Fulfillment of the Requirements for the Award of the Degree of


BACHELOR OF TECHNOLOGY
In
ELECTRONICS & COMMUNICATION ENGINEERING
Submitted By

S. GOWTHAMI - (17691A0442)

M. DURGA PRASAD - (17691A0434)

G. KIRANMAI - (18695A0406)

M. HEMALATHA - (17691A0455)
Under the Guidance of
Mr. Dr. Ravi Shankar, Ph.D.,
Associate Professor
Department of Electronics & Communication Engineering

MADANAPALLE INSTITUTE OF TECHNOLOGY & SCIENCE


(UGC – AUTONOMOUS)
(Affiliated to JNTUA, Ananthapuramu)
Accredited by NBA, Approved by AICTE, New Delhi
AN ISO 9001:2008 Certified Institution
P. B. No: 14, Angallu, Madanapalle – 517325
2017-2021
DEPARTMENT OF ELECTRONICS AND COMMUNICATION
ENGINEERNIG
BONAFIDE CERTIFICATE
This is to certify that the project work entitled “INVESTIGATION OF SWIPT
NOMA” is a Bonafede work carried out by

S. GOWTHAMI - (17691A0442)

M.DURGA PRASAD - (17691A0434)

G. KIRANMAI - (18695A0406)

M.HEMALATHA - (17695A0455)

Submitted in partial fulfillment of the requirements for the award of degree Bachelor of
Technology in the stream of Electronics & Communication Engineering in
Madanapalle Institute of Technology & Science, Madanapalle, affiliated to
Jawaharlal Nehru Technological University Anantapur, Ananthapuramu during the
academic year 2020-2021.

Guide Head of the Department


Mr. Dr. Ravi Shankar, Ph.D., Dr. S. Rajasekaran, Ph.D.,
Associate Professor Professor and Head
Department of ECE Departments of ECE

Submitted for the University examination held on:

Internal Examiner External Examiner


Date: Date:
RECOGNISED RESEARCH CENTER

Plagiarism Verification Certificate

This is to certify that the B. Tech dissertation titled, “INVESTIGATION OF


SWIPT NOMA” submitted by S. Gowthami (17691A442), M. Durga Prasad
(17691A434), G. Kiranmai (18695A0406), M. Hemalatha (17691A0455) has been
evaluated using Anti-Plagiarism Software, URKUND and based on the analysis report
generated by the software, the dissertation's similarity index is found to be 13%.

The following is the URKUND report for the dissertation consisting of 54 Pages.

Plagiarism In charge

ACKNOWLEDGEMENT

I express my sincere and heartfelt gratitude to Mr. Dr. Ravi Shankar, Ph.D.,

Associate Professor, in Dept. of E.C.E, M.I.T.S, Madanapalle who has guided me in


completing the Project with his cooperation, valuable guidance and immense help in
giving the project a shape and success s. I am very much indebted to him for suggesting a
challenging and interactive project and his valuable advice at every stage of this work.

We are extremely grateful to Dr. S. Rajasekaran, Ph.D., Professor and Head of ECE for
him valuable guidance and constant encouragement given to us during this work.

We sincerely thank Dr. C. Yuvaraj, M.E., Ph.D., Principal for guiding and providing
facilities for the successful completion of our project at Madanapalle Institute of
Technology & Science, Madanapalle.

We sincerely thank the MANAGEMENT of Madanapalle Institute of


Technology & Science for providing excellent infrastructure and lab facilities that helped
me to complete this project.

We would like to say thanks to other Faculty of ECE Department and also to our
friends and our parents for their help and cooperation during our project work.
DECLARATION
We hereby declare that the results embodied in this project “Investigation of
SWIPT NOMA” by us under the guidance of Mr. Dr. Ravi Shankar, Ph.D., Associate
Professor, Dept. of ECE in partial fulfillment of the award of Bachelor of
Technology in Electronics and Communication Engineering, MITS, Madanapalle
from Jawaharlal Nehru Technological University Anantapur, Ananthapuramu and
we have not submitted the same to any other University/institute for award of any
other degree.

Date :

Place :

PROJECT ASSOCIATE

S. Gowthami

M. Durga Prasad

G. Kiranmai

M. Hemalatha

I certify that above statement made by the students is correct to the best of my
knowledge.

Date : Guide
ABSTRACT

Because of its intrinsic capacity to satisfy a wide range of requirements, NOMA is the
most promising and appropriate wireless technology for next-generation communication
systems. Minimum latency, high dependability, massive connection, and high data rate
are the characteristics that distinguish 5G technology from present technology. Using the
differential power domain idea, this technology allows access to several clients at the
same time and within the same frequency range. The 5G plan was designed to reduce
energy usage and enable viable green communication. The proposed study focuses on
resource optimization for NOMA that is both energy efficient and cost effective. There
are a variety of NOMA methods available, such as powe. HR Operations Manager is a
web application that allows the applicants to upload the resumes and allows them to
attend the interview once shortlisted. An email will be sent to them on short listing. If the
candidate performs well in the interview he/she will be selected. The use of simultaneous
wireless information and power transfer (SWIPT) to cooperative non-orthogonal
spectrum sharing is investigated in this work (NOMA). A novel cooperative multiple-
input single-output (MISO) SWIPT NOMA protocol is developed, in which a user with a
good channel condition works as an energy-harvesting (EH) relay by using the power
splitting (PS) method to assist a user with a bad channel state. We seek to maximize the
data rate of the "strong user" while fulfilling the Application requirements of the "weak
user" by optimizing the PS ratio and beamforming vectors together. The semidefinite
relaxation (SDR) approach is used to reformulate the original issue and prove rank one
optimality in order to solve the stated nonconvex problem. Then, for complexity
reduction, an iterative method based on sequential convex approximation (SCA) is
developed, which can at least reach its stationary point efficiently. The single-input
single-output (SISO) situation is also investigated in light of prospective application
scenarios, such as the Internet of Things (IoT). In terms of the PS ratio, the stated issue is
shown to be strictly unimodal.

vii
Table of Contents

S.N TOPIC PAGE NO.


O
1. INTRODUCTION 1
1.1 Motivation 1
1.2 Problem Definition 2
1.3 Limitations of Project 3
2. LITERATURE SURVEY 4
2.1 Introduction 4
2.2 Existing System 6
2.3 Disadvantages of Existing System 7
2.4 Proposed System 8
3. ANALYSIS 20
3.1Introduction 20
3.2 Software Requirement Specification 21
4. SYSTEM MODEL 27
4.1 System Design 27
4.2 Bit Error System Model 27
4.3 SC Decoding Procedure 28
4.4 SWIPT Energy Harvesting 29
4.5 Signal Model of Cooperative SWIPT NOMA 31
4.6 Optimization of Power Splitting Coefficient 34
4.7 Conclusion 35
5. IMPLEMENTATION AND RESULTS 36
5.1 Code for performance of cooperative and 36

Non-cooperative NOMA with far user


5.2 Code for Bit Error Rate vs Transmission 38

Power
5.3 Code for SWIPT Network 40

viii
5.4 Simulation Results 43
6. CONCLUSION 47
6.1 Conclusion 47
7. REFERENCES 48

List of Figures

S.NO. Figure Name of the figure Page


Number
1 2.1.2 Classification of NOMA 4
2 2.2 (a) FDMA 6
3 2.2 (b) TDMA 7

ix
4 2.4.1 (a) Cooperative Communication Network with Two 8
Users
5 2.4.1 (b) Direct Transmission 10
6 2.4.2 (a) The Raw Data of Near and Far User. 14
7 2.4.2 (b) The Data of Near and Far User After QPSK 15
8 2.4.2 (c) Power Level Shifting of Near User and Far User 16
9 2.4.2 (d) Superposition Coded Signal 17
10 3.2.1 MATLAB Work Environment 22
11 3.2.3 (a) MATLLAB Window for Preference 25
12 3.2.3 (b) MATLAB Window for Toolboxes 25

13 3.2.4 MATLAB File Folder Window 26


14 4.3 Mechanism of SIC of Three Users 29
15 4.4 Network model of cooperative SWIPT network 31
16 5.4.1 Performance Analysis of Cooperative and Non- 43
Cooperative Network
17 5.4.2 Bit Error Rate in NOMA Analysis 44
18 5.4.3 (a) Achievable Data Rate of NOMA 45
19 5.4.3 (b) Outage Probability of NOMA 45
20 5.4.3 (c) Data Rate after SIC analysis 46

x
xi
CHAPTER 1

INTRODUCTION

1.1 Motivation:

As the population of the world is increasing day by day, internet usage has been
grown exponentially. In 1940’s the population of the world is about 318 million which
mobile technologies starts evolving and by the year 2020 it is increased by 43% (1 billion
380 million) population. In olden days there is no use of internet connectivity that number
of channels are free and channel capacity is efficient. The problem become complex as
number of devices and network usage increases rapidly. To maintain the efficient
communication with all the devices many multiple access techniques evolved such as
Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA),
etc., these techniques come under the Orthogonal multiple access technique (OMA)
through which orthogonality is achieved by time, space, frequency and code. The main
problem with orthogonal multiple access technique is power issue [1-2]. In these
techniques battery gets drained and system throughput is very less, another main problem
that OMA encounters are successive interference at receiver side. Fading is another
problem in orthogonal multiple access technique that the receiver receives delayed and
advance copy of same message due to reflection, scattering, refraction etc., this problem
is rectified in different multiple access techniques.

The orthogonal multiple access technique supports single input single output
(SISO), as well as multiple input and multiple output but the efficient and reliability of
these multiple access technique is very less, due to this many connectivity problems
occurred in wireless communication. To connect all the devices many techniques are
proposed among them one of the most efficient technique is “NON-ORTHOGONAL
MULTIPLE ACCESS TECHNIQUE”. The common problems encountered in these
multiple access techniques is interference, signal to interference ratio(S/I), signal to noise
ratio(S/N), fading [4-7]. To avoid these problems many multiple access techniques are
proposed. Each of them has their own advantages and disadvantages. The first multiple
access technique starts with FDMA and developed to CDMA. In designing the wireless
generation networks, multiple access techniques play a vital role, and they are considered
very important in describing the efficiency of any communication systems.

1
We know that IOT devices are increasing day to day and communication with
these devices and connectivity between them has become more complex with existing
multiple access techniques. To resolve these issues non orthogonal multiple access
techniques are used. Before understanding multiple access techniques, we must have a
clear idea on SISO and MIMO systems [8-10]. The SISO systems has ability that can
process only single input but not the multiple inputs and provide single output at a given
time. Whereas MIMO systems produces multiple outputs for the multiple inputs at given
time.

We know that the channel capacity is directly proportional to bandwidth, for a SISO
system to increase the channel capacity we need to increase the bandwidth of the
particular channel. In case of MIMO, increasing the signal power at the transmitter we
can achieve more channel capacity without expanding the band width.

1.2 Problem Definition:

In terms of the notion of integrating NOMA with wireless powered networks,


NOMA may be implemented with wireless power transfer i.e., the simultaneous wireless
information and power transfer (SWIPT) technology was introduced together with a
relaying network, and its outage performance was evaluated in. Wireless power transfer is
supported in wireless relaying networks to send a signal to far users as a potential
technique to extend the lifetime of energy-constrained users. Two well-known policies,
namely, time switching (TS) and power splitting (PS) receiver architecture, are
introduced as in, as a model of green NOMA, an Emetine co - operative NOMA (SWIPT-
CNOMA) network is studied as a combination of the NOMA and SWIPT scheme, and
such novel approach It is feasible to circumvent the lifespan constraint of the energy-
constrained NOMA user who works as a relay and harvests energy from received signals
in this topology. The core idea of NOMA is to employ the power domain for several
access modes, compared with the time/frequency/code domain used for earlier
generations of mobile networks. Take 3GPP-LTE for example the traditional orthogonal
multiple-access frequency division (OFDMA) [3-8]. One major problem with this
Multiple Access Orthogonal (MAO) method is the low spectral efficiency when certain
bandwidth resources are assigned to users with inadequate channel state knowledge, such
as subscriber’s channels (CSI). In NOMA, several signals can be sent simultaneously at

2
the same frequency on the same spot area. Each user in the cell has different power, thus
you may consider that as the technique for power modulation. To separate the
multiplexed signals in the NOMA system, special receivers should be utilized. The
advantage of NOMA is that capacity and total output are increased. On the other side, the
high interference problem should be dealt with. On the other side, NOMA allows all users
to access all the sub controller channels, which enables high-CSI users to still use the
bandwidth resources that are allocated to poor CSI users, thereby substantially improving
spectral efficiency.

1.3 Limitations of Project:

In conventional wireless communication networks, a single antenna is utilised at both


the source and the destination, which presents problems in the communication connection
due to multipath effects. MISO technology, which uses two or more antennas to transmit
multiple signals at the source, can help to alleviate issues caused by multipath wave
propagation. MISO has investigated the most optimal transmission method for the best
case, in which the two receivers in the communication system concurrently harvest
energy and decode information to construct self-sustaining wireless communication
networks. It is also worth noting that cross-link signals can help improve receiver EH
while limiting the possible sum rate [9-10]. Following that, two feasible systems based on
TDMA are presented, where the receiver executes ID or EH at each time slot, considering
the existing limitations of circuit technology.

The transmission period of the second scheme, designated B, is divided into two
time slots, as in scheme A, with the exception that in each time slot, one receiver
performs ID, and the other receiver does EH concurrently. Simulations were used to
investigate the attainable total rate of these suggested TDMA systems A and B under
ideal conditions. It was demonstrated that the ideal scheme, which employs ideal
receivers, is not always the greatest option in terms of sum rate maximization. In an
interference restricted system, TDMA of Scheme A provides a higher sum rate than the
optimal scheme. When one of the receivers demands more energy than the other, TDMA
of SC is used [11-12].

3
CHAPTER 2

LITERATURE SURVEY

2.1 Introduction

2.1.1 Non-Orthogonal Multiple Access

The radio access technique in next generation wireless communications. When compared
to orthogonal multiple access technique, NOMA has enhanced spectrum efficiency,
reduced latency with high reliability and effective connectivity. NOMA new proposal for
encoding technology [13-15].

2.1.2 Different Types of NOMA

Based on the decoding techniques at the receiver side NOMA is broadly classified
to two categories

1. Code division NOMA


2. Power domain NOMA

Fig 2.1.2 Classification of NOMA

4
The code division NOMA is again classified as low-density spreading NOMA and
Sparse code multiple access. There are two special cases in NOMA, Pattern division
multiple access and inter-leaver multiple access. In low density spreading multiple access
and sparse code multiple access information of single user is spread over multiple
subcarriers. The sparse features ensures that same subcarrier is not utilized by large
number of users which keeps the complexity of the system manageable. Each user has
unique codes to identify at the receiver side for proper decoding. In PD-NOMA
multiplexing is performed in power domain. Signals from different users are superposed
at the transmitter by allocating optimal power to each user and the subsequent signal, is
then transferred using the same subcarriers. For example, the base station provides less
power to near user and more power to far user [16-18]. To analyze NOMA schemes, we
need a proper understanding on concepts like successive interference cancellation,
cooperative communication network and super position coding.

2.1.3 Principle of NOMA

To understand the working principle of NOMA, consider a two user SISO-


NOMA downlink system where the base station serves two users, one is near and other is
a far user with powers P1 and P2(P1<P2) respectively. At the receiver, near user decodes
the message considering far user data as noise and far user removes the near user message
and decodes his message. In this way both users have full access to whole resource block
in which full spectrum efficiency is achieved. Let us consider the data rates of near user
and far user be R1 and R2 and h1 and h2 be the channels used by the near and far user by the
base station [19-20].

The data rate of near user given by

R 1=log¿ (0)
The data rate of far user given by

R 1=log ? ¿) (2)

2.2Existing system
5
Orthogonal Multiple Access Techniques

1. FDMA:

The process of dividing a single channel or bandwidth into multiple


individual bands, each for use by a single user, is known as FDMA. Each band or
channel is large enough to accommodate the signal spectra of the transmissions o
be transmitted. The data to be transmitted is modulated on each subcarrier, which
is then linearly mixed together.

Fig 2.2(a) FDMA

The original analogue telephone system, which is used a hierarchy of


frequency multiplex techniques to put multiple telephone calls on a single line, is
one of the older FDMA systems. Analog voice signals ranging from 300 to 3400
Hz were used to modulate subcarriers in 12 channels ranging from 60 to 108 kHz.
Modulator/mixers produced single side band (SSB) signals on both the upper and
lower sidebands. FDMA was used in early satellite systems to share multiple
voice, video, or data signals across individual 36-MHz bandwidth transponders in
the 4-GHz to 6-GHz range. TDMA digital techniques are used in all of these
applications today.

2. TDMA:

The time division multiple access (TDMA) technique divides a single


channel or band into time slots. In the sequential serial data format, each time slot
is used to transmit one byte or another digital segment of each signal. This
technique is effective with slow voice data signals, but it is also useful with
compressed video and other high-speed data.

6
A good example is the widely used T1 transmission system, which has been used
in the telecom industry for many years. T1 lines are capable of carrying up to 24
individual voice telephone calls on a single line. Each voice signal typically spans
300 Hz to 3000 Hz and is digitalized at an 8-kHz rate, which is slightly higher
than the minimum Nyquist rate of twice the highest-frequency component
required to retain the signal.

Fig 2.2(b) TDMA

The GSM (Global System for Mobile Communications) cellular phone


system is TDMA-based at its core. It divides the ratio spectrum into 200-kHz
bands and then employs time division techniques to combine eight voice calls into
a single channel.

2.3 Disadvantages of Existing System

1) Multiple Access Techniques are sensitive to cross cell interference.

2) Frame synchronization is usually necessary to maintain orthogonality.

3) TDMA requires synchronization. If the time slot synchronization is lost, the


channels may collide with each other.

4) For mobiles and, particularly for handsets, TDMA on the uplink demands high
peak power in transmit mode that shortens battery life.

5) Network and spectrum planning are intensive.

6) Dropped calls are possible when users switch in and out of different cells.

7) Higher costs due to greater equipment sophistication.

7
8) Equalization is required, since transmission rates are generally very high as
compared to FDMA channels.

9) Lower spectral efficiency

10) Limited number of users

11) Unfairness for users

2.4 Proposed System

2.4.1 Cooperative Communication network:

We know that NOMA involves successive interference cancellation at receiver


side, to understand in an effective way let us consider two users, user1 who is near to the
base station and user2 who is far from the base station and carrying x1 and x2 data. In
SIC the user1 decodes user2 data to retrieve his data, user1 act as a relay and retransmit
the user2 data. This process is known as cooperative communication network. Now that
the user1 has user2 data he may as well relay the information to the user2 to aid him.
Since the user2 has poor channel capacity with the transmitting base station, the
retransmission of the data by the user1 will provide him diversity. that is, he will receive
two different copies of the same message. One from the base station and other from user1
who is acting like a relay. This is also known as cooperative relaying.

Fig 2.4.1(a) Cooperative Communication Network with Two Users

Advantages of Cooperative communication

8
1. Relaying cam virtually extend the coverage area of the base station this gives
more channel capacity.
2. We established two links to transmit the same message, even if one of them is in
outage chances of the other link is good.
3. We reduce the outage probability and hence diversity gain without the need of
additional antennas
Let us design a cooperative Non-Orthogonal Multiple Access (NOMA) network.
Consider a downlink transmission where there is a base station and two NOMA users.
The two users are near user and far user. The user who is nearer to the base station is
called near user and the user who is far to the base station is called far user. Near user has
a stronger channel with the base station and a far user has weak channel with the base
station. Information source transmits the information data to the users is called data
transmission. NOMA is a diverse multiple user access scheme with respect to other
established and existing multiple access schemes that is orthogonal multiple access. At
the transmitter side, NOMA deliberately introduce intercell interference. Therefore, it can
utilize non orthogonal transmission.

Transmission occurs in two time slots. They are

1) Direct Transmission Slot


2) Relaying Transmission Slot
3) Diversity combining.

1) Direct Transmission Slot

In direct transmission slot, the base station uses non orthogonal multiple access to
transmit data intended for the near user. Let us denote near user as xn and far user as xf.
The near user does successive interface cancellation (SIC) to decode the far user’s data
[21]. In direct transmission slot firstly, base station sends information to both far user and
near user. Near user has a strong channel because user is very nearer to the base station.
So near user receives the information first. Near user decodes both far user and near
user’s information. Near user has far user’s data. Near user does successive interface
cancellation to decode the far user information.

9
Fig 2.4.1 (b) Direct Transmission

From figure,

GNB is the base station

UE1 is the near user

UE2 is the far user

Near user get the far user’s data for this near user should subtract superposition
coded signal. And then near user decodes its own data. The far user just performs direct
decoding. At the end of direct transmission slot, the achievable data rates at the near user
and far user are,

1 (3)
S n
 log 2  1   n  | h n |2 
2
(4)

Here,

 n is power allocation coefficient for near user

f
is power allocation coefficient for far user
10
h n is channel between base station and near user

h f
is channel between base station and far user

S
 is transmit SNR=  2 where S is transmitting power and  2 is noise variance

 f n
As usual, >


And  n + f =1

We have this factor of half in front of the achievable rates because we have two

time slots of equal distribution and S ,S


n f
are the achievable data rates during the direct
transmission slot alone.

2) Relaying Slot

Relay transmission has been developed shown to be able to significantly improve


the transmission reliability, network coverage, and achievable cellular networks. As a
result, the integration of NOMA and cooperative relaying has recently piqued the interest
of a growing number of people. Improve future 5G wireless network throughput. A
cooperative NOMA transmission scheme was developed [22-25]. In this section we
derive analytical expressions for the outage probability and achievable data rates of the
proposed relay transmission. Asymptotic high SNR expressions are also presented to
provide useful insights into the effects of system and channel parameters on the
performance. Finally, our derived result will be compared with existing result. First
illustrate the outage probability of the relay assisted cooperative NOMA system. The
outage probability is defined as the probability that the instantaneous received SNR falls.

In relaying slot near user act as relay. Near user decode the far user’s information
and decodes its own information. After getting decoded its own data near user retransmit
the far user’s information to far user. Here base station transmits the information and also
transmit near user. Far user will get two copies of same information. If any one of them
fails no problem at all. Far user receive information at least one time. Probability of
failing both base station and near user is very less. So, it will not affect the overall
performance. The next half of the time slot is called relaying slot. Achievable rate is a key

11
performance for wireless communication systems, so we need to focus on achievable data
rates for relaying transmission slot.

The achievable rates are

S f ,2
1

 log 2 1   | h |2
2 nf
 (5)

Here,

h nf
= the channel between near user and far user.

We already seen that S f ,2


> S f ,1 because of two reasons

1) There is no interference from other transmissions


2) There is no fractional power allocation. The whole transmit power is given to
the far user.

3) Diversity Combining
Diversity is an effective communication receiver technology that improves
wireless links at a reasonable cost. This study establishes a broad framework for future
research. A framework for integrating approaches in order to increase to variety wireless
communication technology that works in collaboration. This article that serves as an
overview of several methods to taking use of the advantages of variety and multi hop
relay -based communication, such as a method for extending radio range in mobile and
wireless broadband cellular networks. The concept of relaying is given as a way to lower
the cost of infrastructure deployment in addition, it is proven that by taking advantage of
spatial variety, Multi hop relaying can boost cellular capacity network. While this article
concentrates on stationary relays, many of the concepts described may also be applied to
systems with moving relays.

Diversity combining is a technique used to reduce the effects of fading by


receiving redundancy of the same information-carrying signal over two or more channels.
After that, merge these numerous clones via fading channels. To improve the total
received SNR at the receiver.

The idea behind this approach is to use the low chance of deep fades overlapping in all of
the diversity channels to reduce the likelihood of mistake and outage.

12
Types of diversity combining:
At the receiver, there are three fundamental strategies for combining diversity:

Selection diversity, equal gain combining, and maximum ratio combining. In the context
of selection diversity, the signal with the highest. The received level is fed into the
receiver. All incoming signals are combined in equal gain combining. Coherently
summed with the same amplitude and phase. A weighted maximum-ratio combination is
used. The signal summation is carried out where the amplitudes are proportional to
signal-to-noise ratio (SNR) and phase of each signal are preserved equal. The Rayleigh
distribution is a statistical time-varying distribution that is widely used to characterize the
statistical time charging nature of incoming data. The envelope of a signal multipath
component. The Rayleigh distribution of fading has a PDF document in terms of signal
received 𝑟𝑖.

2.4.2 Super Position Coding:


In NOMA, at the transmitter side we use encoding technique, superposition
coding to code the transmitted signal, for simultaneously using the same frequency. way
let us consider two users, user1 who is near to the base station and user2 who is far from
the base station and carrying X1 and X2 data carrying 4 bits. Let X1=1010 and X2=0110

13
Fig 2.4.2(a) The Raw Data Of Near And Far User.

X1 and X 2 date undergoes digital modulation before transmission like BPSK that
transforms o’s to -1 and 1’s to +1.

X1= 1, -1, 1, -1

X2=-1, +1, +1, -1

14
Fig 2.4.2(b)The Data Of Near And Far User After QPSK

SPC is a technique for power domain multiplexing. we are adding the data x1 and
x2, before that the data is converted to BPSK and multiplied by different power levels.
The power levels should meet the condition that the sum of power levels should be unity

Let x be the transmitted signal,

X=√ ? 1∗x 1+ √ ? 2∗x 2 i.e. ? 12+? 22 =1

It looks like a super position principle hence it is known as super position coding
technique. Let assume that the power levels is α1=0.75, α2=0.25The graphs of the
superposition coding technique is shown below

15
Fig 2.4.3 (c) Power Level Shifting Of Near Userand Far User

16
Fig 2.4.3(d) Superposition Coded Signal

2.4.3 SUCCESSIVE INTERFACE CANCELLATION:

NOMA uses power domain multiplexing of users sharing same time and
frequency resources. This is accomplished by performing super position coding at
transmitter and successive interface coding at receiver. SIC is carried out to decode the
super position coded signal at the receiver side. Consider two users in NOMA downlink
system. That is user1 and user2. User1 is at near to the base station and user2 is far to the
base station of carrying x1 and x2 data. We know that at transmitter side super position
coding is done.

The equation of superposition coding is given by

X=√ p ¿+√ a2 x 2) (6)

Where, p=Transmit power

a 1 and a 2 are the power weights given to x 1 and x 2 respectively.

X is the linear combination of x 1 and x 2.

a 21+a 22 =1 (power levels)

Let h1 is the channel from base station to near user and h2 is the channel from base station
to the far user. The copy of x is received at user1 through channel h1.

y 1=h1x+w 1

Where, w 1= noise

The copy of x is received at user2 through channel2

y 2=h2 x+w 2 (For far users)

At user1 (far user)

Expanding the received signal at user1

y 1=h1x+w 1

y 1=h1 √ p(√ a1 x1 +√ a2 x2 )+w 1

17
y 1= h1 √ p √ a1 x1 + h1 √ p √ a2 x2 +w 1 (7)

Here, w 1=noise

h1 √ p √ a1 x1 = desired and dominating

h1 √ p √ a2 x 2=interference and low power

Since a 1>a 2 ,direct decoding of y 1 would yield x 1. The term containing the x 2
component will be treated as interference. The signal to interference noise ratio for the far
user is ,

¿ h1∨¿2 p a1
?1 = 2 2
¿
¿ h1∨¿ p a2 +s ¿

At user2 (near user)

Expanding the received signal at user2

y 2=h2 x+w 2

y 2=h2 √ p √ a1 x 1+h2 √ p √ a 2 x 2+ w2 (8)

Here,

w 2=noise

h2 √ p √ a1 x 1=interference and dominating

h2 √ p √ a 2 x 2=desired and low power.

User2 must first perform successive interference cancellation before decoding his own
signal.

SIC is carried out as follows:

1) y 2 is directly decoded to obtain x 1or rather, an estimate of x 1.


2) y '2= y 2-√ a1 x1 is computed.
3) y '2 is decoded to obtain an estimate of x 2.

What happens if SIC is imperfect


18
As user2 decodes the message indirectly from user1 that SIC is imperfect means some
residues of x 1component is still present in y 2

y '2=√ E h2 √ a1p x 1+h2 p √ a2 x 2+w 2 (9)

Where ℇ = fraction of residues of x 1.

CHAPTER 3

ANALYSIS

3.1 Introduction

Simultaneous Wireless Information and Power Transfer (SWIPT) is an emerging


study field that uses radio waves for both wireless information transfer (WIT) and
wireless power transfer (WPT) at the same time (WPT). SWIPT is gaining traction as a
technology that can energize and interact with low-power wireless devices, such as
Internet-of-Things (IoT) devices, as a result of the rising interest in these devices. MIMO
(Multiple-Input-Multiple-Output) systems are a potential way to manage and utilize
interference at the same time [25-26]. Multiple antennas at the receiver improve data
dependability and boost collected power through geographical variety. Multiple antennas
at the transmitter use spatial beamforming to optimize information and power transfer.
However, spatial beamforming causes interference isolation, which lowers the collected
power. The majority of SWIPT research is focused on small-scale networks. Its use in

19
large-scale networks, on the other hand, has received little attention. Relay-aided and
wireless networks are investigated. These studies, on the other hand, focus on single-
antenna transmission. Ad hoc networks with multiple-antenna transmitters are
investigated in the paper. However, the study does not apply to cellular networks. In
addition to legacy and millimeter-wave frequencies, SWIPT cellular networks are
studied. Directional antennas are considered in both situations, although MIMO is not.
MIMO systems are a promising method that has made its way into a number of
contemporary wireless communication networks, with the goal of enhancing system
Quality of Service (QoS). As a result, investigating and analyzing the performance of a
MIMO system while taking into consideration the influence of various practical
difficulties is important. As a result, the combination of MIMO technology with energy
harvesting is a fascinating issue[27-28].

3.2 Software Requirement Specifications

3.2.1 Get Started with MATLAB:

MATLAB® is a programming language used by millions of engineers and scientists


across the world to analyze and develop the systems and technologies that are changing
the world. The world's most intuitive way to express computer mathematics is through the
matrix-based MATLAB language. Data visualization and analysis are simplified thanks
to built-in visuals. Experimentation, investigation, and discovery are encouraged in the
desktop setting. These MATLAB programmers are really useful.

After entering into your account, double-click the MATLAB shortcut icon (MATLAB
7.0.4) on your Windows desktop to launch MATLAB. A unique window called the
MATLAB desktop emerges when you start MATLAB [29-30]. The desktop is a container
for other windows. The following are the main tools found on or accessible from the
desktop:

1. The Command Window:


20
You input MATLAB commands into the Command Window. Simple equations or
more complicated expressions utilizing MATLAB scripts or functions can be assessed.

2. The Command History:

The Command History Window displays the commands you've typed before. Any
of these commands can be double-clicked or dragged from the Command History
Window into the Command Window to be repeated. Using the up arrow in the Command
Window, you may easily scroll back to earlier commands. You may drag commands from
one MATLAB script file or function to another when you learn how to modify MATLAB
script files or functions.

3. The Workspace:

The Workspace displays a list of all presently specified variables, along with the
kind of variable for each. The value of the independent variable may also be shown, vary
in size (i.e. type). If any of the Workspace variables are plottable, you may plot them
quickly and easily by right-clicking on the variable name and selecting a plot type. Select
several variables for pl with the control key.

4. The Current Directory:

The contents of the current working directory are displayed in the Current
Directory Window. To open a file in a (text) editor, double-click it. To run the commands
included in MATLAB scripts and function files, right-click on them. To import the data
as MATLAB variables, right-click on the data file. Click on folders to change directories,
or utilize the Current Working Directory text box at the top of the M.

21
Fig 3.2.1 MATLAB Work Environment

3.2.2 Basic features of MATLAB:

1) It's a high-level programming language for numerical calculation, visualization,


and app creation.
2) It also offers an interactive platform for iterative problem solving, design, and
exploration.
3) It has a large library of functions for linear algebra, statistics, Fourier analysis,
filtering, optimization, numerical integration, and solving ordinary differential
equations.
4) It comes with built-in visuals for viewing data as well as capabilities for making
custom charts. 
5) The programming interface in MATLAB provides developers with tools for
enhancing code quality, maintainability, and performance.
6) It includes tools for creating bespoke graphical user interfaces for programmers. It
has utilities for integrating MATLAB-based algorithms with other programmers
and languages, such as Python.
The Computational Mathematics Power of MATLAB is utilized in every aspect of
computational mathematics. The following are some of the most popular mathematical
computations that it is utilized in:

1. Working with 2-D and 3-D Matrices and Arrays Graphics and plotting

2. Algebra Linear

3. Equations in Algebra

4. Nonlinear Functions are functions that are not linear.

5. Statistics

6. Calculus and Differential Equations for Data Analysis

Calculations Numerical etc.,

3.2.2 Analysis of MATLAB

22
1. History:

1) Cleve Moler was the primary developer in the 1970s.


2) Linear and eigenvalue systems are derived from FORTRAN subroutines
LINPACK and EISPACK.
3) LINPACK and EISPACK were primarily developed as an interactive system.
4) Because it was not formally supplied, it grew in popularity by word of mouth. In
the 1980s, it was rewritten in C with greater capability, including charting
functions.
The MathWorks Inc. was founded in 1984 to sell MATLAB and continue its
development. Three additional persons, according to Cleve Moler, were instrumental in
the development of MATLAB: J. H. Wilkinson, George Forsythe, and John Todd. It's
also worth mentioning the LINPACK authors: Jack Dongara and Pete Steward. Jim
Bunch, and Cleve Moler. Since then another package emerged: LAPACK. LAPACK
stands for Linear Algebra Package. It has been designed to supersede LINPACK and
EISPACK. C.

2. Strengths:

1) MATLAB may function as both a calculator and a programming language.


2) MATLAB is a programmed that combines math with visual charting.
3) Learning MATLAB is quite simple 62.
4) Because MATLAB is an interpreter (rather than a compiler), mistakes are simple
to correct.
5) When conducting matrix operations, MATLAB is designed to be quick.
6) There are some object-oriented components in MATLAB C.
3. Weaknesses:

1) MATLAB may be used as a calculator as well as a programming language.


2) MATLAB is a computer software that combines math and graphing.
3) MATLAB is an easy programme to learn 62.
4) Because MATLAB is an interpreter (rather than a compiler), it's easy to fix errors.
5) MATLAB is meant to be fast when doing matrix computations.
6) In MATLAB C, there are several object-oriented components.
4. Competition:

1) Mathematica, a symbolic computation software, is a rival of MATLAB.

23
2) For numerical analysis and linear algebra, MATLAB is more convenient. It's a
term that's commonly used in the technical community.
3) Mathematica is famous among physicists because of its superior symbolic
manipulation.
There are other competitors like shown below
o Skylab
o GNU Octave
o R Lab

3.2.3 MATLAB Quick Guide

1. MATLAB customization, in the top ribbon, navigate to Home  Environment 


Preferences
2. Allows you to customize your MATLAB experience like colors, fonts, etc., as
shown in below figure.

Fig 3.2.3(a) MATLLAB Window for Preference

Fig 3.2.3(b) MATLAB Window for Toolboxes

3.2.4 Installing Toolboxes

1. In the top ribbon, navigate to: Home  Environment  Add-on’s


2. Allows you to install toolboxes included with your license
3. Recommended toolboxes
a. Curve fitting toolbox
b. Computer system vision toolbox
c. Image processing toolbox

24
d. Optimization tool toolbox
e. Signal processing toolbox
f. Etc.; anything related to the project or research field.

1. use folders to keep your programs organized.


2. To make a new folder, click ”Browse” next to the file path.
3. Click the Make New Folder button, and change the name of the folder. In the
MATLAB folder, make the following structure
MATLABIAP MATLABDAY1 as shown below:

Fig 3.2.4 MATLAB File Folder Window

25
CHAPTER 4

SYSTEM MODEL

4.1 System Design

4.1.1 Bit Error Rate of Non-Orthogonal Multiple Access with QPSK Modulation

In olden days we are analog communication their capacity allocation, carrier power,
message signal type it depends on, now the technology become developed and communication
transforms to digital communication which involves many new methods and approaches to
communicate through wirelessly. One of the key concepts in the communication system that need
is end -end performance measurements. Here many concepts like interference, noise, distortion,
signal to noise ratio bit synchronization

Bit Error Rate: The bit error rate is which the reliability of the entire communication systems that
number of bits in and number of bits out including signal path, transmitter and receiver side. In an
simple way the bit error rate is defined as the ratio of number of errors occurred to the total
number of bits in a entire duplex communication.

Bit Error Rate = no. of errors /total no. of bits

4.2 Bit Error System Model

26
To understand the bit error rate, consider a wireless network consisting of three
NOMA users M1, M2, M3.let the respective distances from the base station be h1, h2, h3
such that h3<h2<h1. Based on the distances between them the user M1 is at near to the
base station and the user M2 is moderately and user M3 is at farthest from the base
station. Let assume that r1, r2, r3 denote their corresponding Rayleigh fading coefficients
such that |r3|2 >|r2|2 >|r1|2

Let α1, α2, α3 be the respective power allocation coefficients. According to the
Noma Principle the user who is at nearest to the base station is allocated least power and
the user who is at the farthest from is allocated the more power by power splitting
method. The power allocation coefficients must be ordered as α1 > α2 > α3. The power
allocation coefficients had a greater impact in the performance of a NOMA network. For
simplicity we assume the fixed power allocation is allocated. These are the system
parameters assumption that for the system design model.

Signal Model for Bit Error Rate

Let d1, d2, d3 denote the data of user M1, M2, M3 of using the one of the popular
modulation technique in digital communication is QPSK The QPSK superposition coded
signal transmitted by the BS is given by the equation

D  tp  1 D1   2 D2   3 D3  (10)

The signal in the case of the ith user is given by

yi  hi d  ni

Where ni denotes AWGN at receiver of Mi

4.3 SC Decoding Procedure

AT User 1

Since M1 is allocated to the nearest distance to the base station so it is decoded


directly by assigning the signal M2 and M3 as interference signal

The achievable rate of M1 is given by

 1tp | h1 |2  (11)
R1  log 2 1  2 
  2tp | h1 |  3tp | h1 |  
2 2

Which can be further simplified as,


27
 1tp | h1 |2  (12)
R1  log 2  1  2 
 ( 2   3 )tp | h1 |  
2

From equation we make one important observation that  2   3 is present at the

denominator, now we want α1 to satisfy α1 >  2   3 if it satisfies the condition M1’s


power will dominate in the transmit signal, D and in the received signal, Y1

AT User 2

The bit error rate equation for M2, since  2  1 and  2   3 ,M2 must perform
successive interference cancellation to remove M1’s data and treat M3 as interference.
After removing M1’s data the achievable bit error rate is

  2tp | h2 |2  (13)
R2  log 2  1  2 
  3tp | h2 |  
2

The condition is should to be meet for interference cancellation is  2   3

AT USER 3

At finally the user who is at far distance from the base station M3 has to perform
signal to interference cancellation two times that to remove m1’s data and M2’s data from
y3 as interference, after removing M1’s data.

The achievable data rate of user M3 is gen by

  3tp | h3 |2  (14)
R3  log 2  1  
 2 
The block diagram representation of the three users decoding technique ay the receiver
side is given as

28
Fig 4.3 Mechanisim of SIC of Three Users

4.4 SWIPT Energy Harvesting:

As we are moving towards more and more advanced communication systems, the
power consumption of devices becomes an important issue. For example, in a wireless
network made up of thousands of IoT sensors, drainage of battery may cause the sensors
o die. To address this issue, there is a push towards green communication technologies
like RF energy harvesting devices. NOMA involves successive interference cancellation,
which is computationally intensive task, this places a burden on the battery life.

When we studied the cooperative NOMA system, we used user cooperation where the
near user acted as relay to the far user. This user cooperation was natural because the near
user has the data of the far user as well.

There are always electromagnetic signals present everywhere around us due to data
transmissions, these signals are no use unless they contain information that is intended for
us. They can also carry the power which we harvest using a simple RF circuits, this
power is used to transmit the data as a relaying network. To transmit the user2 data to the
by relaying technique we need power to transmit. This can be done in two ways

1) Time Switching

2) Power Splitting
29
1) Energy Harvesting by Time Switching:

In this process the device operates in a time-slotted fashion, which involve two
time slots. In first time slot the energy is harvested from the surroundings, in second time
slot the information is transmitted.

2) Energy Harvesting by Power Splitting:

The device splits the received signal power for energy and information decoding,
power splitting allows simultaneous implementation of energy harvesting and
information decoding, so this method is also called SWIPT (Simultaneous wireless
information and power transfer

1. Cooperative SWIPT network

30
Fig 4.4 Network model of cooperative SWIPT network

We are considering down link transmission the base station uses NOMA schemes
to transmit messages for both near and far users. Unfortunately, there is an obstacle
between station and the far user which causes shadowing. But the near user has very good
channel with the base station. According to NOMA principles signal interference
cancellation is to be done at the near user to decode its own data so the near user has the
copy of far user data which can help the far user by acting as decode-and-forward
relay.But the problem here is there is no enough power to relay the data of far user.
Therefore, the near user decides to perform power splitting method of energy harvesting
to obtain the sufficient power to relay the far user data.

4.5 Signal Model of Cooperative SWIPT NOMA

 Time slot 1

The NOMA signal transmitted by the base station in the first time slot of the energy
harvesting technique is given by

d  tp  n X n   f X f  (15)

Where

d = transmitted super position coded signal.

Tp = the total power used to transmit the signal.

 n = the Rayleigh coefficient power allocated to near user.

f
= the Rayleigh coefficient power allocated to far user.

X n = the signal used by the near user.

Xf
= the signal used by the far user.

Due to the shadowing effect, fading phenomenon the far user cannot receive the signal.
The near user received signal is given by

31
d n  tp  
 n X n   f X f hsn  wn (16)

Where,

wn AWGN with zero mean and variance =  2

 path loss component

hsn Rayleigh fading coefficient between the BS and near user with zero mean and


Variance = d sn

d sn distance between Bs and near user

From d n , the near user harvests a fraction of power and let us denote this fraction by  .

This is also called the energy harvesting coefficient. The 1   is the fraction of power
available for decoding the information.

The signal available for information decoding, after the energy harvesting is

dD   
1   d n  weh   1  tp   
n X n   f X f  
1   wn  weh (17)

Where,

weh = thermal noise introduced by the energy harvesting circuit

 = fraction of power harvested by near user

tp = total power harvested

 n = Rayleigh coefficient

Let us assume energy harvested from wn is neglected leading to the following

expression for d D ,

dD   1  tp  
 n X n   f X f  weh (18)

X
From d D , the near user first performs direct decoding of f . The achievable data rate to
decode the far user data by the near user is given by

32
1  tp  1     f | hsn |2  (19)
S nf  log 2 1  
2  p  1     n | hsn |2  2 

Where,

Snf
=data rate of near user

After signal to interference cancellation, the achievable data rate for the near user to
decode its information is given by,

1  tp  1     n | hsn |2  (20)
S n  log 2 1  
2  2 

Since  is the power harvested in the first time slot, the amount of power is harvested is
given by

tpH  tp | hsn | 

Where,

 = power harvesting efficiency of the circuitry

 Time slot 2

In second time slot the near user relays the data to the far user by using power

harvested in the time slot 1, tpH .Hence, the transmitted signal by the near user is

tpH X f
. The received signal at the far user is given by

d f  tpH X f hnf  w f

hnf
Where, is the Rayleigh fading channel between the near and far users. Now, the
achievable data rate of the far user is given by

1  tp | h |2  (21)
S f  log 2  1  H 2 sn 
2   

4.6 Optimization of Power Splitting Coefficient:

33
In time slot 1 and time slot 2 the power splitting coefficient plays an major role in
energy harvesting. The near user decodes the far user data in the first time slot. Then only
near user can act as relay for signal to interference cancellation and decode the far user
data correctly. To ensure this condition, the achievable data rate of near user should be
greater than the far users target data rate. It should be mathematically represented as

Snf  S * f

Where,

Snf
= near user achievable data rate

S* f
= far users target data rate

S nf
Let us substitute value of in above condition and solve for 

1  tp  1     f | hsn |2 
log  1    Sf
2 
*

2  tp  1     n | hsn |2
 

 tp  1     f | hsn |2 
log 2 1   2 S *f
 tp  1     | h |2  2 
 n sn 

tp  1     f | hsn |2 2 S *f
1 2
tp  1     n | hsn | 
2 2

tp  1     f | hsn |2 2 S *f
2 1
tp  1     n | hsn | 
2 2

 1 by  f , and solve for SINR for the far user.


2S* f
Let’s assume 2

tp  1     f | hsn |2
 f
tp  1     n | hsn |2  2

tp  1     f | hsn |2   f (tp  1     n | hsn |2  2 )

tp  1     f | hsn |2  f tp  1     n | hsn |2   f  2

tp  1    | hsn |2 ( f   f  n )   f  2

34
 f 2
1  
tp | hsn |2 ( f   f  n )

 f 2 (22)
  1
tp | hsn |2 ( f   f  n )

From above equation  is less than 1, and we can modify the equation as given below

 f 2 (23)
  1 
tp | hsn |2 ( f   f  n )

Where  is very small number.

4.7 Conclusion

simulations were used to confirm the validity of these obtained analytical


conclusions. Furthermore, the obtained findings underlined the need of
considering his at transceivers, especially when the system has a specific tolerance
level. The results also indicated that increasing the imperfect SIC can improve the
influence of HI on system performance. In addition, we supplied closed-form and
algorithmic PA solutions to ensure fairness among all users. Finally, the influence
of each imperfection on system performance in terms of CP and throughput was
investigated under various system situations.

CHAPTER 5

IMPLEMENTATION AND RESULTS

5.1 Code for performance of cooperative and non-cooperative

NOMA with far user

clc;

clear all;

close all;

N = 10^6;

d1 = 1;

d2 = 2;

35
d12 = 1;

eta = 4;

h2 = sqrt(d2^-eta)*(randn(1,N) + 1i*randn(1,N))/sqrt(2);

h12 = sqrt(d12^-eta)*(randn(1,N) + 1i*randn(1,N))/sqrt(2);

g2 = (abs(h2)).^2;

g12 = (abs(h12)).^2;

SNR = 0:40;

snr = db2pow(SNR);

a1 = 0.2; a2 = 0.8;

R2 = 1;

p2 = zeros(1,length(snr));

p12 = zeros(1,length(snr));

p_oma = zeros(1,length(snr));

for u = 1:length(snr)

gamma_2 = a2*snr(u)*g2./(a1*snr(u)*g2 + 1);

gamma_12 = snr(u)*g12;

C2 = log2(1 + gamma_2);

C_OMA = 0.5*log2(1 + snr(u)*g2);

C12 = 0.5*log2(1 + max(gamma_12,gamma_2));

for k = 1:N

if C2(k)<R2

p2(u) = p2(u)+1;

end

if C12(k)<R2

p12(u) = p12(u)+1;

36
end

if C_OMA(k)<R2

p_oma(u) = p_oma(u)+1;

end

end

end

emiology(SNR,p_oma/N,’-*’,’color’,’g’,’linewidth’,2);

hold on;

grid on;

emiology(SNR,p2/N,’-*’,’color’,’b’,’linewidth’,2);

emiology(SNR,p12/N,’-*’,’color’,’k’,’linewidth’,2);

xlabel(‘SNR’);

ylabel(‘Outage probability’);

legend(‘Far user without NOMA’,’Far user NOMA without cooperation’,’Far user NOMA
with cooperation’);

5.2 Code for Bit Error Rate vs Transmission Power

clc ;

clear all;

close all;

N = 5*10^5;

PR = 0:2:40;

pt = (10^-3) * db2pow (PR);

BW = 10^6;

No = -174 + 10*log10(BW);

37
no = (10^-3) * db2 pow (No);

d1 = 500; d2 = 200; d3 = 70;

a1 = 0.8; a2 = 0.15; a3 = 0.05;

pla = 4;

h1 = sqrt(d1^-pla) *(randn(N/2,1) + 1i*randn(N/2,1))/sqrt (2);

h2 = sqrt(d2^-pla) *(randn(N/2,1) + 1i*randn(N/2,1))/sqrt (2);

h3 = sqrt(d3^-pla) *(randn(N/2,1) + 1i*randn(N/2,1))/sqrt (2);

n1 = sqrt(no)*(randn(N/2,1) + 1i*randn(N/2,1))/ sqrt (2);

n2 = sqrt(no)*(randn(N/2,1) + 1i*randn(N/2,1))/sqrt (2);

n3 = sqrt(no)*(randn(N/2,1) + 1i*randn(N/2,1))/sqrt (2);

x1 = randi ([0 1], N, 1);

x2 = randi ([0 1], N, 1);

x3 = randi ([0 1], N, 1);

QPSKmod = comm. QPSKModulator (‘BitInput’, true);

QPSKdemod = comm. QPSKDemodulator (‘BitOutput’, true);

xmod1 = step (QPSKmod, x1);

xmod2 = step (QPSKmod, x2);

xmod3 = step (QPSKmod, x3);

x = sqrt(a1) *xmod1 + sqrt(a2) *xmod2 + sqrt(a3) *xmod3;

for u = 1: length (PR)

y1 = sqrt(pt(u)) *x.*h1 + n1;

y2 = sqrt(pt(u)) *x.*h2 + n2;

y3 = sqrt(pt(u)) *x.*h3 + n3;

eq1 = y1. /h1;

38
eq2 = y2. /h2;

eq3 = y3. /h3;

dec1 = step (QPSKdemod, eq1);

dec12 = step (QPSKdemod, eq2);

dec12_remod = step (QPSKmod, dec12);

rem2 = eq2 – sqrt(a1*pt(u)) *dec12_remod;

dec2 = step (QPSKdemod, rem2);

dec13 = step (QPSKdemod, eq3);

dec13_remod = step (QPSKmod, dec13);

rem31 = eq3 – sqrt (a1*pt (u)) *dec12_remod;

dec23 = step (QPSKdemod, rem31);

dec23_remod = step (QPSKmod, dec23);

rem3 = rem31 – sqrt (a2*pt (u)) *dec23_remod;

dec3 = step (QPSKdemod, rem3);

ber1(u) = biterr (dec1, x1)/N;

ber2(u) = biterr (dec2, x2)/N;

ber3(u) = biterr (dec3, x3)/N;

end

semiology (PR, ber1, ‘-*’, ‘color’,’ r’, ‘linewidth’, 1);

hold on;

grid on;

semiology (PR, ber2, ‘-*’,’color’, ‘m’, ‘linewidth’, 1);

semiology (PR, ber3, ‘-*’,’color’, ‘k’, ‘linewidth’, 1);

xlabel (‘Transmit power range in (dBm)’);

ylabel (‘Bit Error Rate’);

39
legend (‘User 1 (Weakest user)’, ‘User 2 (optimized user)’, ‘User 3 (Strongest user)’);

5.3 Code for SWIPT Network:

clc;

clear all;

close all;

N = 10^6;

dsn = 10;

dnf = 10;

eta = 4;

hsn = (sqrt(dsn^-eta)) *(randn(N,1) +1i*randn(N,1))/ sqrt (2);

hnf = (sqrt(dnf^-eta)) *(randn(N,1) +1i*randn(N,1))/sqrt (2);

gsn = (abs(hsn)). ^2;

gnf = (abs(hnf)). ^2;

Pt = 0:5:20;

pt = (10^-3) *db2pow (Pt);

BW = 10^9;

No = -174 + 10*log10(BW);

no = (10^-3) *db2pow (No);

af = 0.8; an = 0.2;

ratetarget = 1;

snrtarget = (2^(2*ratetarget))-1;

eff = 0.7;
40
del = 10^-6;

pn = zeros (1, length(pt));

pf = zeros (1, length(pt));

cn = zeros (1, length(pt));

cf = zeros (1, length(pt));

for u = 1: length(pt)

frac = max (0, (1 – snrtarget*no./ ((af – snrtarget*an) *pt(u)*gsn))-del);

ph = pt(u)*gsn. *frac*eff;

Rnf = 0.5*log2(1 + af*pt(u)*(1-frac). *gsn. /(an*pt(u)*(1-frac). *gsn + no));

Rnn = 0.5*log2(1 + an*pt(u)*(1-frac). *gsn/no);

Rf = 0.5*log2(1 + ph.*gnf/no);

cn(u) = mean (Rnn);

cf(u) = mean (Rf);

for k = 1: N

if (Rnn(k)<ratetarget)||(Rnf(k)<ratetarget)

pn(u) = pn(u) + 1;

end

if Rf(k) < ratetarget

pf(u) = pf(u) + 1;

end

end

end

poutn1 = pn/N;

poutf1 = pf/N;

figure;

41
plot (Pt, cn,’-*’, ‘linewidth’, 2,’color’,’g’); hold on; grid on;

plot (Pt, cf,’-*’, ‘linewidth’, 2,’color’,’b’);

legend (‘Near user’,’Far user’);

xlabel (‘Power Transmitted(dBm)’);

ylabel (‘Average Achievable Data rate (bps/Hz)’);

figure;

semiology (Pt, poutn1, ‘linewidth’, 2);

hold on;

grid on;

semiology (Pt, poutf1,’color’,’g’, ‘linewidth’, 2);

legend (‘Near user’,’Far user’);

xlabel (‘Power Transmitted(dBm)’);

ylabel (‘Outage probability’);

figure;

plot (1:200, Rnn(1:200),’linewidth’,1.5,’color’,’b’);

hold on;

grid on;

plot (1:200, Rf(1:200),’color’,’k’);

plot (1:200, ones (1,200) *ratetarget,’linewidth’,1.5,’color’,’g’);

xlabel (‘Instance of channel realization’);

ylabel (‘Instantaneous achievable rate (bps/Hz)’);

legend (‘Near user’,’Far user’,’Target rate');

5.4 Simulation Results

5.4.1 Cooperative Communication Network


42
Fig 5.4.1 Performance Analysis Of Cooperative And Non Cooperative Network

5.4.2 Bit Error Rate in NOMA

Fig 5.4.2 Biterror Rate In NOMA Analysis

43
From the simulation result that the user M1 has the highest bit rate error among
the three users because he suffers the most interference from the user M2 and M3. User
m2 suffers moderate interference due to user M3. finally, the user M3 is free from
interference and has the lowest BER in the group. The BER performance is strongly
affected by the power allocation scheme, more sophisticated power allocation Schemes
further improvement in performance.

5.4.3 SWIPT

44
Fig 5.4.3(a) Achevable Data Rate of NOMA

Fig 5.4.3(b) Outage Probability of NOMA

45
Fig 5.4.3(c) Data Rate after SIC analysis

CHAPTER 6

46
CONCLUSION

6.1 Conclusion:

A unique cooperative SWIPT aided NOMA transmission technique has been


presented. The cooperative SWIPT NOMA in MISO and SISO instances, as well as the
cooperative SWIPT NOMA in MISO and SISO cases, have been studied. The combined
design of beamforming and power splitting has been explored in MISO instances. With
the SDR approach, we have equivalently changed the stated issue and demonstrated rank-
one optimality. Two-dimensional exploratory approach can be used to solve the
reformulated issue to its global optimal solution. Due to the complexity of the two-
dimensional exhaustive search, a SCA-based method was developed to efficiently
generate at least a stationary point. Motivated by the possible applications, the
cooperative SWIPT NOMA protocol design in SISO situations has also been studied. A
GSS-based approach was provided to achieve the global optimal solution by
demonstrating that the optimal value of the stated issue is unimodal with regard to the PS
ratio. Furthermore, the best answer may be expressed as a semiclosed-form expression.
Furthermore, we discovered that in SISO situations, both methods may converge to the
unique global optimum solution. The simulation findings demonstrate that the proposed
cooperative SWIPT NOMA method outperforms existing techniques, indicating that it is
a potential option for providing IoT scenario capabilities.

CHAPTER 7

47
REFERENCES

1. M. Zeng, A. Yadav, O. A. Dobre, G. I. Tsiropoulos and H. V. Poor, "Capacity


Comparison Between MIMO-NOMA and MIMO-OMA With Multiple Users in a
Cluster," in IEEE Journal on Selected Areas in Communications, vol. 35, no. 10,
pp. 2413-2424, Oct. 2017, doi: 10.1109/JSAC.2017.2725879.

2. S. Singh, D. Mitra and R. K. Baghel, "Analysis of NOMA for Future Cellular


Communication," 2019 3rd International Conference on Trends in Electronics and
Informatics (ICOEI), 2019, pp. 389-395, doi: 10.1109/ICOEI.2019.8862527.

3. Huang, Y., Zhang, C., Wang, J., Jing, Y., Yang, L., & You, X. (2018). Signal
Processing for MIMO-NOMA: Present and Future Challenges. IEEE Wireless
Communications, 25(2), 32–38. doi:10.1109/mwc.2018.1700108

4. https://ecewireless.blogspot.com/2020/03/noma-graphical-example-of-
superpostion.html

5. https://ecewireless.blogspot.com/2020/08/what-is-cooperative-swipt-noma.html

6. Z. Ding, R. Schober and H. V. Poor, "A General MIMO Framework for NOMA
Downlink and Uplink Transmission Based on Signal Alignment," in IEEE
Transactions on Wireless Communications, vol. 15, no. 6, pp. 4438-4454, June
2016, doi: 10.1109/TWC.2016.2542066.

7. modern digital and analog communication systems ,B.P.Lathi,Zhi Ding.

8. "Exploiting Non-orthogonal Multiple Access in Cooperative Relay Sharing,"


IEEE Communication Letters, Vol. 21, no. 5, pp. 1159-1162, 2017.

9. https://doi.org/10.1007/s11276-018-1807-z

10. S. Singh, D. Mitra and R. K. Baghel, "Analysis of NOMA for Future Cellular
Communication," 2019 3rd International Conference on Trends in Electronics and
Informatics (ICOEI), 2019, pp. 389-395, doi: 10.1109/ICOEI.2019.8862527.

11. M. Jain, S. Soni, N. Sharma and D. Rawal, "Performance Analysis at Near and
Far users of a NOMA System Over Fading Channels," 2019 IEEE 16th India
Council International Conference (INDICON), 2019, pp. 1-4, doi:
10.1109/INDICON47234.2019.9030258.

48
12. Cooperative Non-Orthogonal Multiple Access in 5G Systems," Z. Ding, M. Peng,
and H. V. Poor, IEEE communications letters, vol. 19, no. 8, 2015.

13. Y. Xu et al., "Joint Beamforming and Power-Splitting Control in Downlink


Cooperative SWIPT NOMA Systems," in IEEE Transactions on Signal
Processing, vol. 65, no. 18, pp. 4874-4886, 15 Sept.15, 2017, doi:
10.1109/TSP.2017.2715008.

14. H. Hourani, An Overview of Diversity Techniques in Wireless Communication


Systems, Helsinki University of Technology, S-72.333 Postgraduate Course in
Radio Communications (2004/2005).
15. J.L. Volakis, Antenna Engineering Handbook, 4th ed., McGraw-Hill, 2007.
16. T. Rappaport, Wireless Communications, 2nd ed., Prentice Hall, 2002. [5] Mehta
N.B. “Performance Analysis of a Cooperative System with Rate less Codes and
Buffered Relays”, IEEE Transactions on Wireless Communications, vol. 10 issue
4, pages 1069 – 1081, Apr 2011.
17. Qaraqe, K.A. “Performance Analysis of Joint Diversity Combining, Adaptive
Modulation, and Power Control Schemes “, IEEE Transactions on
Communications Volume. 59, issue 1, Pages 106 – 115, Jan 2011.
18. Juinn-Horng Deng “A partial PIC with MRC receiver design for SCBT system
over multipath fading channels” Advanced Communication Technology (ICACT),
2012 14th International Conference Pages. 506 – 510. On 19-22 Feb. 2012
19. Feteiha, M.F. “Infrastructure-to-vehicle cooperative communications with
decode-and forward relaying” Personal Indoor and Mobile Radio
Communications (PIMRC), 2011 IEEE 22nd International Symposium, Pages.
804 – 808, on 11- 14 Sept. 2011.
20. Ikki, S.S. ” Performance analysis of incremental relaying cooperative-diversity
networks over rayleigh fading channels” IET communications Volume: 5, Issue: 3
Page(s). 337 – 349, Feb. 11 2011
21. Sitti, Y. “Error performance analysis of cooperative systems with receiver
diversity: Effect of shadowing in source-destination link” Signal Processing and
Communications Applications (SIU) 2011 IEEE 19th Conference, Pages. 482 –
485, on 20-22 April 2011
22. Singh, A. “Cooperative Spectrum Sensing in Multiple Antenna Based Cognitive
Radio Network Using an Improved Energy Detector” Communications Letters,
IEEE Volume: 16, Issue: 1 Pages. 64 – 67, January 2012.
49
23. L. Dai, B. Wang, Y. Yuan, S. Han, I. Chih-Lin, and Z. Wang, “Nonorthogonal
multiple access for 5G: solutions, challenges, opportunities, and future research
trends,” IEEE Commun. Mag., vol. 53, no. 9, pp. 74–81, 2015.

24. M. F. Hanif, Z. Ding, T. Ratnarajah, and G. K. Karagiannidis, “A minorization-


maximization method for optimizing sum rate in the downlink of non-orthogonal
multiple access systems,” IEEE Trans. Signal Process., vol. 64, no. 1, pp. 76–88,
Jan. 2016.

25. T. M. Cover and J. A. Thomas, Elements of information theory. John Wiley &
Sons, 2012. [4] J. N. Laneman, D. N. Tse, and G. W. Wornell, “Cooperative
diversity in wireless networks: Efficient protocols and outage behavior,” IEEE
Trans. Inf. Theory, vol. 50, no. 12, pp. 3062–3080, Dec. 2004. [5] Z. Ding, S. M.
Perlaza, I. Esnaola, and H. V. Poor, “Power allocation strategies in energy
harvesting wireless cooperative networks,” IEEE Trans. Wireless Commun., vol.
13, no. 2, pp. 846–860, Feb. 2014.

26. Z. Ding, H. Dai, and H. V. Poor, “Relay selection for cooperative NOMA,” IEEE
Wireless Commun. Lett., vol. 5, no. 4, pp. 416–419, Jun. 2016.

27. Y. Liu, Z. Ding, M. Elkashlan, and H. V. Poor, “Cooperative nonorthogonal


multiple access with simultaneous wireless information and power transfer,” IEEE
J. Sel. Areas Commun., vol. 34, no. 4, pp. 938– 983, Apr. 2016.

28. Z. Ding, M. Peng, and H. V. Poor, “Cooperative non-orthogonal multiple access


in 5G systems,” IEEE Commun. Lett., vol. 19, no. 8, pp. 1462– 1465, Aug. 2015.

29. J.-B. Kim and I.-H. Lee, “Non-orthogonal multiple access in coordinated direct
and relay transmission,” IEEE Commun. Lett., vol. 19, no. 11, pp. 2037–2040,
Nov. 2015.

30. J. Men and J. Ge, “Non-orthogonal multiple access for multiple-antenna relaying
networks,” IEEE Commun. Lett., vol. 19, no. 10, pp. 1686–1689, Oct. 2015.

50

You might also like