Investigation of Swipt Noma
Investigation of Swipt Noma
On
S. GOWTHAMI - (17691A0442)
G. KIRANMAI - (18695A0406)
M. HEMALATHA - (17691A0455)
Under the Guidance of
Mr. Dr. Ravi Shankar, Ph.D.,
Associate Professor
Department of Electronics & Communication Engineering
S. GOWTHAMI - (17691A0442)
G. KIRANMAI - (18695A0406)
M.HEMALATHA - (17695A0455)
Submitted in partial fulfillment of the requirements for the award of degree Bachelor of
Technology in the stream of Electronics & Communication Engineering in
Madanapalle Institute of Technology & Science, Madanapalle, affiliated to
Jawaharlal Nehru Technological University Anantapur, Ananthapuramu during the
academic year 2020-2021.
The following is the URKUND report for the dissertation consisting of 54 Pages.
Plagiarism In charge
ACKNOWLEDGEMENT
I express my sincere and heartfelt gratitude to Mr. Dr. Ravi Shankar, Ph.D.,
We are extremely grateful to Dr. S. Rajasekaran, Ph.D., Professor and Head of ECE for
him valuable guidance and constant encouragement given to us during this work.
We sincerely thank Dr. C. Yuvaraj, M.E., Ph.D., Principal for guiding and providing
facilities for the successful completion of our project at Madanapalle Institute of
Technology & Science, Madanapalle.
We would like to say thanks to other Faculty of ECE Department and also to our
friends and our parents for their help and cooperation during our project work.
DECLARATION
We hereby declare that the results embodied in this project “Investigation of
SWIPT NOMA” by us under the guidance of Mr. Dr. Ravi Shankar, Ph.D., Associate
Professor, Dept. of ECE in partial fulfillment of the award of Bachelor of
Technology in Electronics and Communication Engineering, MITS, Madanapalle
from Jawaharlal Nehru Technological University Anantapur, Ananthapuramu and
we have not submitted the same to any other University/institute for award of any
other degree.
Date :
Place :
PROJECT ASSOCIATE
S. Gowthami
M. Durga Prasad
G. Kiranmai
M. Hemalatha
I certify that above statement made by the students is correct to the best of my
knowledge.
Date : Guide
ABSTRACT
Because of its intrinsic capacity to satisfy a wide range of requirements, NOMA is the
most promising and appropriate wireless technology for next-generation communication
systems. Minimum latency, high dependability, massive connection, and high data rate
are the characteristics that distinguish 5G technology from present technology. Using the
differential power domain idea, this technology allows access to several clients at the
same time and within the same frequency range. The 5G plan was designed to reduce
energy usage and enable viable green communication. The proposed study focuses on
resource optimization for NOMA that is both energy efficient and cost effective. There
are a variety of NOMA methods available, such as powe. HR Operations Manager is a
web application that allows the applicants to upload the resumes and allows them to
attend the interview once shortlisted. An email will be sent to them on short listing. If the
candidate performs well in the interview he/she will be selected. The use of simultaneous
wireless information and power transfer (SWIPT) to cooperative non-orthogonal
spectrum sharing is investigated in this work (NOMA). A novel cooperative multiple-
input single-output (MISO) SWIPT NOMA protocol is developed, in which a user with a
good channel condition works as an energy-harvesting (EH) relay by using the power
splitting (PS) method to assist a user with a bad channel state. We seek to maximize the
data rate of the "strong user" while fulfilling the Application requirements of the "weak
user" by optimizing the PS ratio and beamforming vectors together. The semidefinite
relaxation (SDR) approach is used to reformulate the original issue and prove rank one
optimality in order to solve the stated nonconvex problem. Then, for complexity
reduction, an iterative method based on sequential convex approximation (SCA) is
developed, which can at least reach its stationary point efficiently. The single-input
single-output (SISO) situation is also investigated in light of prospective application
scenarios, such as the Internet of Things (IoT). In terms of the PS ratio, the stated issue is
shown to be strictly unimodal.
vii
Table of Contents
Power
5.3 Code for SWIPT Network 40
viii
5.4 Simulation Results 43
6. CONCLUSION 47
6.1 Conclusion 47
7. REFERENCES 48
List of Figures
ix
4 2.4.1 (a) Cooperative Communication Network with Two 8
Users
5 2.4.1 (b) Direct Transmission 10
6 2.4.2 (a) The Raw Data of Near and Far User. 14
7 2.4.2 (b) The Data of Near and Far User After QPSK 15
8 2.4.2 (c) Power Level Shifting of Near User and Far User 16
9 2.4.2 (d) Superposition Coded Signal 17
10 3.2.1 MATLAB Work Environment 22
11 3.2.3 (a) MATLLAB Window for Preference 25
12 3.2.3 (b) MATLAB Window for Toolboxes 25
x
xi
CHAPTER 1
INTRODUCTION
1.1 Motivation:
As the population of the world is increasing day by day, internet usage has been
grown exponentially. In 1940’s the population of the world is about 318 million which
mobile technologies starts evolving and by the year 2020 it is increased by 43% (1 billion
380 million) population. In olden days there is no use of internet connectivity that number
of channels are free and channel capacity is efficient. The problem become complex as
number of devices and network usage increases rapidly. To maintain the efficient
communication with all the devices many multiple access techniques evolved such as
Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA),
etc., these techniques come under the Orthogonal multiple access technique (OMA)
through which orthogonality is achieved by time, space, frequency and code. The main
problem with orthogonal multiple access technique is power issue [1-2]. In these
techniques battery gets drained and system throughput is very less, another main problem
that OMA encounters are successive interference at receiver side. Fading is another
problem in orthogonal multiple access technique that the receiver receives delayed and
advance copy of same message due to reflection, scattering, refraction etc., this problem
is rectified in different multiple access techniques.
The orthogonal multiple access technique supports single input single output
(SISO), as well as multiple input and multiple output but the efficient and reliability of
these multiple access technique is very less, due to this many connectivity problems
occurred in wireless communication. To connect all the devices many techniques are
proposed among them one of the most efficient technique is “NON-ORTHOGONAL
MULTIPLE ACCESS TECHNIQUE”. The common problems encountered in these
multiple access techniques is interference, signal to interference ratio(S/I), signal to noise
ratio(S/N), fading [4-7]. To avoid these problems many multiple access techniques are
proposed. Each of them has their own advantages and disadvantages. The first multiple
access technique starts with FDMA and developed to CDMA. In designing the wireless
generation networks, multiple access techniques play a vital role, and they are considered
very important in describing the efficiency of any communication systems.
1
We know that IOT devices are increasing day to day and communication with
these devices and connectivity between them has become more complex with existing
multiple access techniques. To resolve these issues non orthogonal multiple access
techniques are used. Before understanding multiple access techniques, we must have a
clear idea on SISO and MIMO systems [8-10]. The SISO systems has ability that can
process only single input but not the multiple inputs and provide single output at a given
time. Whereas MIMO systems produces multiple outputs for the multiple inputs at given
time.
We know that the channel capacity is directly proportional to bandwidth, for a SISO
system to increase the channel capacity we need to increase the bandwidth of the
particular channel. In case of MIMO, increasing the signal power at the transmitter we
can achieve more channel capacity without expanding the band width.
2
the same frequency on the same spot area. Each user in the cell has different power, thus
you may consider that as the technique for power modulation. To separate the
multiplexed signals in the NOMA system, special receivers should be utilized. The
advantage of NOMA is that capacity and total output are increased. On the other side, the
high interference problem should be dealt with. On the other side, NOMA allows all users
to access all the sub controller channels, which enables high-CSI users to still use the
bandwidth resources that are allocated to poor CSI users, thereby substantially improving
spectral efficiency.
The transmission period of the second scheme, designated B, is divided into two
time slots, as in scheme A, with the exception that in each time slot, one receiver
performs ID, and the other receiver does EH concurrently. Simulations were used to
investigate the attainable total rate of these suggested TDMA systems A and B under
ideal conditions. It was demonstrated that the ideal scheme, which employs ideal
receivers, is not always the greatest option in terms of sum rate maximization. In an
interference restricted system, TDMA of Scheme A provides a higher sum rate than the
optimal scheme. When one of the receivers demands more energy than the other, TDMA
of SC is used [11-12].
3
CHAPTER 2
LITERATURE SURVEY
2.1 Introduction
The radio access technique in next generation wireless communications. When compared
to orthogonal multiple access technique, NOMA has enhanced spectrum efficiency,
reduced latency with high reliability and effective connectivity. NOMA new proposal for
encoding technology [13-15].
Based on the decoding techniques at the receiver side NOMA is broadly classified
to two categories
4
The code division NOMA is again classified as low-density spreading NOMA and
Sparse code multiple access. There are two special cases in NOMA, Pattern division
multiple access and inter-leaver multiple access. In low density spreading multiple access
and sparse code multiple access information of single user is spread over multiple
subcarriers. The sparse features ensures that same subcarrier is not utilized by large
number of users which keeps the complexity of the system manageable. Each user has
unique codes to identify at the receiver side for proper decoding. In PD-NOMA
multiplexing is performed in power domain. Signals from different users are superposed
at the transmitter by allocating optimal power to each user and the subsequent signal, is
then transferred using the same subcarriers. For example, the base station provides less
power to near user and more power to far user [16-18]. To analyze NOMA schemes, we
need a proper understanding on concepts like successive interference cancellation,
cooperative communication network and super position coding.
R 1=log¿ (0)
The data rate of far user given by
R 1=log ? ¿) (2)
2.2Existing system
5
Orthogonal Multiple Access Techniques
1. FDMA:
2. TDMA:
6
A good example is the widely used T1 transmission system, which has been used
in the telecom industry for many years. T1 lines are capable of carrying up to 24
individual voice telephone calls on a single line. Each voice signal typically spans
300 Hz to 3000 Hz and is digitalized at an 8-kHz rate, which is slightly higher
than the minimum Nyquist rate of twice the highest-frequency component
required to retain the signal.
4) For mobiles and, particularly for handsets, TDMA on the uplink demands high
peak power in transmit mode that shortens battery life.
6) Dropped calls are possible when users switch in and out of different cells.
7
8) Equalization is required, since transmission rates are generally very high as
compared to FDMA channels.
8
1. Relaying cam virtually extend the coverage area of the base station this gives
more channel capacity.
2. We established two links to transmit the same message, even if one of them is in
outage chances of the other link is good.
3. We reduce the outage probability and hence diversity gain without the need of
additional antennas
Let us design a cooperative Non-Orthogonal Multiple Access (NOMA) network.
Consider a downlink transmission where there is a base station and two NOMA users.
The two users are near user and far user. The user who is nearer to the base station is
called near user and the user who is far to the base station is called far user. Near user has
a stronger channel with the base station and a far user has weak channel with the base
station. Information source transmits the information data to the users is called data
transmission. NOMA is a diverse multiple user access scheme with respect to other
established and existing multiple access schemes that is orthogonal multiple access. At
the transmitter side, NOMA deliberately introduce intercell interference. Therefore, it can
utilize non orthogonal transmission.
In direct transmission slot, the base station uses non orthogonal multiple access to
transmit data intended for the near user. Let us denote near user as xn and far user as xf.
The near user does successive interface cancellation (SIC) to decode the far user’s data
[21]. In direct transmission slot firstly, base station sends information to both far user and
near user. Near user has a strong channel because user is very nearer to the base station.
So near user receives the information first. Near user decodes both far user and near
user’s information. Near user has far user’s data. Near user does successive interface
cancellation to decode the far user information.
9
Fig 2.4.1 (b) Direct Transmission
From figure,
Near user get the far user’s data for this near user should subtract superposition
coded signal. And then near user decodes its own data. The far user just performs direct
decoding. At the end of direct transmission slot, the achievable data rates at the near user
and far user are,
1 (3)
S n
log 2 1 n | h n |2
2
(4)
Here,
f
is power allocation coefficient for far user
10
h n is channel between base station and near user
h f
is channel between base station and far user
S
is transmit SNR= 2 where S is transmitting power and 2 is noise variance
f n
As usual, >
And n + f =1
We have this factor of half in front of the achievable rates because we have two
2) Relaying Slot
In relaying slot near user act as relay. Near user decode the far user’s information
and decodes its own information. After getting decoded its own data near user retransmit
the far user’s information to far user. Here base station transmits the information and also
transmit near user. Far user will get two copies of same information. If any one of them
fails no problem at all. Far user receive information at least one time. Probability of
failing both base station and near user is very less. So, it will not affect the overall
performance. The next half of the time slot is called relaying slot. Achievable rate is a key
11
performance for wireless communication systems, so we need to focus on achievable data
rates for relaying transmission slot.
S f ,2
1
log 2 1 | h |2
2 nf
(5)
Here,
h nf
= the channel between near user and far user.
3) Diversity Combining
Diversity is an effective communication receiver technology that improves
wireless links at a reasonable cost. This study establishes a broad framework for future
research. A framework for integrating approaches in order to increase to variety wireless
communication technology that works in collaboration. This article that serves as an
overview of several methods to taking use of the advantages of variety and multi hop
relay -based communication, such as a method for extending radio range in mobile and
wireless broadband cellular networks. The concept of relaying is given as a way to lower
the cost of infrastructure deployment in addition, it is proven that by taking advantage of
spatial variety, Multi hop relaying can boost cellular capacity network. While this article
concentrates on stationary relays, many of the concepts described may also be applied to
systems with moving relays.
The idea behind this approach is to use the low chance of deep fades overlapping in all of
the diversity channels to reduce the likelihood of mistake and outage.
12
Types of diversity combining:
At the receiver, there are three fundamental strategies for combining diversity:
Selection diversity, equal gain combining, and maximum ratio combining. In the context
of selection diversity, the signal with the highest. The received level is fed into the
receiver. All incoming signals are combined in equal gain combining. Coherently
summed with the same amplitude and phase. A weighted maximum-ratio combination is
used. The signal summation is carried out where the amplitudes are proportional to
signal-to-noise ratio (SNR) and phase of each signal are preserved equal. The Rayleigh
distribution is a statistical time-varying distribution that is widely used to characterize the
statistical time charging nature of incoming data. The envelope of a signal multipath
component. The Rayleigh distribution of fading has a PDF document in terms of signal
received 𝑟𝑖.
13
Fig 2.4.2(a) The Raw Data Of Near And Far User.
X1 and X 2 date undergoes digital modulation before transmission like BPSK that
transforms o’s to -1 and 1’s to +1.
X1= 1, -1, 1, -1
14
Fig 2.4.2(b)The Data Of Near And Far User After QPSK
SPC is a technique for power domain multiplexing. we are adding the data x1 and
x2, before that the data is converted to BPSK and multiplied by different power levels.
The power levels should meet the condition that the sum of power levels should be unity
It looks like a super position principle hence it is known as super position coding
technique. Let assume that the power levels is α1=0.75, α2=0.25The graphs of the
superposition coding technique is shown below
15
Fig 2.4.3 (c) Power Level Shifting Of Near Userand Far User
16
Fig 2.4.3(d) Superposition Coded Signal
NOMA uses power domain multiplexing of users sharing same time and
frequency resources. This is accomplished by performing super position coding at
transmitter and successive interface coding at receiver. SIC is carried out to decode the
super position coded signal at the receiver side. Consider two users in NOMA downlink
system. That is user1 and user2. User1 is at near to the base station and user2 is far to the
base station of carrying x1 and x2 data. We know that at transmitter side super position
coding is done.
Let h1 is the channel from base station to near user and h2 is the channel from base station
to the far user. The copy of x is received at user1 through channel h1.
y 1=h1x+w 1
Where, w 1= noise
y 1=h1x+w 1
17
y 1= h1 √ p √ a1 x1 + h1 √ p √ a2 x2 +w 1 (7)
Here, w 1=noise
Since a 1>a 2 ,direct decoding of y 1 would yield x 1. The term containing the x 2
component will be treated as interference. The signal to interference noise ratio for the far
user is ,
¿ h1∨¿2 p a1
?1 = 2 2
¿
¿ h1∨¿ p a2 +s ¿
y 2=h2 x+w 2
Here,
w 2=noise
User2 must first perform successive interference cancellation before decoding his own
signal.
CHAPTER 3
ANALYSIS
3.1 Introduction
19
large-scale networks, on the other hand, has received little attention. Relay-aided and
wireless networks are investigated. These studies, on the other hand, focus on single-
antenna transmission. Ad hoc networks with multiple-antenna transmitters are
investigated in the paper. However, the study does not apply to cellular networks. In
addition to legacy and millimeter-wave frequencies, SWIPT cellular networks are
studied. Directional antennas are considered in both situations, although MIMO is not.
MIMO systems are a promising method that has made its way into a number of
contemporary wireless communication networks, with the goal of enhancing system
Quality of Service (QoS). As a result, investigating and analyzing the performance of a
MIMO system while taking into consideration the influence of various practical
difficulties is important. As a result, the combination of MIMO technology with energy
harvesting is a fascinating issue[27-28].
After entering into your account, double-click the MATLAB shortcut icon (MATLAB
7.0.4) on your Windows desktop to launch MATLAB. A unique window called the
MATLAB desktop emerges when you start MATLAB [29-30]. The desktop is a container
for other windows. The following are the main tools found on or accessible from the
desktop:
The Command History Window displays the commands you've typed before. Any
of these commands can be double-clicked or dragged from the Command History
Window into the Command Window to be repeated. Using the up arrow in the Command
Window, you may easily scroll back to earlier commands. You may drag commands from
one MATLAB script file or function to another when you learn how to modify MATLAB
script files or functions.
3. The Workspace:
The Workspace displays a list of all presently specified variables, along with the
kind of variable for each. The value of the independent variable may also be shown, vary
in size (i.e. type). If any of the Workspace variables are plottable, you may plot them
quickly and easily by right-clicking on the variable name and selecting a plot type. Select
several variables for pl with the control key.
The contents of the current working directory are displayed in the Current
Directory Window. To open a file in a (text) editor, double-click it. To run the commands
included in MATLAB scripts and function files, right-click on them. To import the data
as MATLAB variables, right-click on the data file. Click on folders to change directories,
or utilize the Current Working Directory text box at the top of the M.
21
Fig 3.2.1 MATLAB Work Environment
1. Working with 2-D and 3-D Matrices and Arrays Graphics and plotting
2. Algebra Linear
3. Equations in Algebra
5. Statistics
22
1. History:
2. Strengths:
23
2) For numerical analysis and linear algebra, MATLAB is more convenient. It's a
term that's commonly used in the technical community.
3) Mathematica is famous among physicists because of its superior symbolic
manipulation.
There are other competitors like shown below
o Skylab
o GNU Octave
o R Lab
24
d. Optimization tool toolbox
e. Signal processing toolbox
f. Etc.; anything related to the project or research field.
25
CHAPTER 4
SYSTEM MODEL
4.1.1 Bit Error Rate of Non-Orthogonal Multiple Access with QPSK Modulation
In olden days we are analog communication their capacity allocation, carrier power,
message signal type it depends on, now the technology become developed and communication
transforms to digital communication which involves many new methods and approaches to
communicate through wirelessly. One of the key concepts in the communication system that need
is end -end performance measurements. Here many concepts like interference, noise, distortion,
signal to noise ratio bit synchronization
Bit Error Rate: The bit error rate is which the reliability of the entire communication systems that
number of bits in and number of bits out including signal path, transmitter and receiver side. In an
simple way the bit error rate is defined as the ratio of number of errors occurred to the total
number of bits in a entire duplex communication.
26
To understand the bit error rate, consider a wireless network consisting of three
NOMA users M1, M2, M3.let the respective distances from the base station be h1, h2, h3
such that h3<h2<h1. Based on the distances between them the user M1 is at near to the
base station and the user M2 is moderately and user M3 is at farthest from the base
station. Let assume that r1, r2, r3 denote their corresponding Rayleigh fading coefficients
such that |r3|2 >|r2|2 >|r1|2
Let α1, α2, α3 be the respective power allocation coefficients. According to the
Noma Principle the user who is at nearest to the base station is allocated least power and
the user who is at the farthest from is allocated the more power by power splitting
method. The power allocation coefficients must be ordered as α1 > α2 > α3. The power
allocation coefficients had a greater impact in the performance of a NOMA network. For
simplicity we assume the fixed power allocation is allocated. These are the system
parameters assumption that for the system design model.
Let d1, d2, d3 denote the data of user M1, M2, M3 of using the one of the popular
modulation technique in digital communication is QPSK The QPSK superposition coded
signal transmitted by the BS is given by the equation
D tp 1 D1 2 D2 3 D3 (10)
yi hi d ni
AT User 1
1tp | h1 |2 (11)
R1 log 2 1 2
2tp | h1 | 3tp | h1 |
2 2
AT User 2
The bit error rate equation for M2, since 2 1 and 2 3 ,M2 must perform
successive interference cancellation to remove M1’s data and treat M3 as interference.
After removing M1’s data the achievable bit error rate is
2tp | h2 |2 (13)
R2 log 2 1 2
3tp | h2 |
2
AT USER 3
At finally the user who is at far distance from the base station M3 has to perform
signal to interference cancellation two times that to remove m1’s data and M2’s data from
y3 as interference, after removing M1’s data.
3tp | h3 |2 (14)
R3 log 2 1
2
The block diagram representation of the three users decoding technique ay the receiver
side is given as
28
Fig 4.3 Mechanisim of SIC of Three Users
As we are moving towards more and more advanced communication systems, the
power consumption of devices becomes an important issue. For example, in a wireless
network made up of thousands of IoT sensors, drainage of battery may cause the sensors
o die. To address this issue, there is a push towards green communication technologies
like RF energy harvesting devices. NOMA involves successive interference cancellation,
which is computationally intensive task, this places a burden on the battery life.
When we studied the cooperative NOMA system, we used user cooperation where the
near user acted as relay to the far user. This user cooperation was natural because the near
user has the data of the far user as well.
There are always electromagnetic signals present everywhere around us due to data
transmissions, these signals are no use unless they contain information that is intended for
us. They can also carry the power which we harvest using a simple RF circuits, this
power is used to transmit the data as a relaying network. To transmit the user2 data to the
by relaying technique we need power to transmit. This can be done in two ways
1) Time Switching
2) Power Splitting
29
1) Energy Harvesting by Time Switching:
In this process the device operates in a time-slotted fashion, which involve two
time slots. In first time slot the energy is harvested from the surroundings, in second time
slot the information is transmitted.
The device splits the received signal power for energy and information decoding,
power splitting allows simultaneous implementation of energy harvesting and
information decoding, so this method is also called SWIPT (Simultaneous wireless
information and power transfer
30
Fig 4.4 Network model of cooperative SWIPT network
We are considering down link transmission the base station uses NOMA schemes
to transmit messages for both near and far users. Unfortunately, there is an obstacle
between station and the far user which causes shadowing. But the near user has very good
channel with the base station. According to NOMA principles signal interference
cancellation is to be done at the near user to decode its own data so the near user has the
copy of far user data which can help the far user by acting as decode-and-forward
relay.But the problem here is there is no enough power to relay the data of far user.
Therefore, the near user decides to perform power splitting method of energy harvesting
to obtain the sufficient power to relay the far user data.
Time slot 1
The NOMA signal transmitted by the base station in the first time slot of the energy
harvesting technique is given by
d tp n X n f X f (15)
Where
f
= the Rayleigh coefficient power allocated to far user.
Xf
= the signal used by the far user.
Due to the shadowing effect, fading phenomenon the far user cannot receive the signal.
The near user received signal is given by
31
d n tp
n X n f X f hsn wn (16)
Where,
hsn Rayleigh fading coefficient between the BS and near user with zero mean and
Variance = d sn
From d n , the near user harvests a fraction of power and let us denote this fraction by .
This is also called the energy harvesting coefficient. The 1 is the fraction of power
available for decoding the information.
The signal available for information decoding, after the energy harvesting is
dD
1 d n weh 1 tp
n X n f X f
1 wn weh (17)
Where,
n = Rayleigh coefficient
expression for d D ,
dD 1 tp
n X n f X f weh (18)
X
From d D , the near user first performs direct decoding of f . The achievable data rate to
decode the far user data by the near user is given by
32
1 tp 1 f | hsn |2 (19)
S nf log 2 1
2 p 1 n | hsn |2 2
Where,
Snf
=data rate of near user
After signal to interference cancellation, the achievable data rate for the near user to
decode its information is given by,
1 tp 1 n | hsn |2 (20)
S n log 2 1
2 2
Since is the power harvested in the first time slot, the amount of power is harvested is
given by
tpH tp | hsn |
Where,
Time slot 2
In second time slot the near user relays the data to the far user by using power
harvested in the time slot 1, tpH .Hence, the transmitted signal by the near user is
tpH X f
. The received signal at the far user is given by
d f tpH X f hnf w f
hnf
Where, is the Rayleigh fading channel between the near and far users. Now, the
achievable data rate of the far user is given by
1 tp | h |2 (21)
S f log 2 1 H 2 sn
2
33
In time slot 1 and time slot 2 the power splitting coefficient plays an major role in
energy harvesting. The near user decodes the far user data in the first time slot. Then only
near user can act as relay for signal to interference cancellation and decode the far user
data correctly. To ensure this condition, the achievable data rate of near user should be
greater than the far users target data rate. It should be mathematically represented as
Snf S * f
Where,
Snf
= near user achievable data rate
S* f
= far users target data rate
S nf
Let us substitute value of in above condition and solve for
1 tp 1 f | hsn |2
log 1 Sf
2
*
2 tp 1 n | hsn |2
tp 1 f | hsn |2
log 2 1 2 S *f
tp 1 | h |2 2
n sn
tp 1 f | hsn |2 2 S *f
1 2
tp 1 n | hsn |
2 2
tp 1 f | hsn |2 2 S *f
2 1
tp 1 n | hsn |
2 2
tp 1 f | hsn |2
f
tp 1 n | hsn |2 2
tp 1 f | hsn |2 f tp 1 n | hsn |2 f 2
tp 1 | hsn |2 ( f f n ) f 2
34
f 2
1
tp | hsn |2 ( f f n )
f 2 (22)
1
tp | hsn |2 ( f f n )
From above equation is less than 1, and we can modify the equation as given below
f 2 (23)
1
tp | hsn |2 ( f f n )
4.7 Conclusion
CHAPTER 5
clc;
clear all;
close all;
N = 10^6;
d1 = 1;
d2 = 2;
35
d12 = 1;
eta = 4;
h2 = sqrt(d2^-eta)*(randn(1,N) + 1i*randn(1,N))/sqrt(2);
g2 = (abs(h2)).^2;
g12 = (abs(h12)).^2;
SNR = 0:40;
snr = db2pow(SNR);
a1 = 0.2; a2 = 0.8;
R2 = 1;
p2 = zeros(1,length(snr));
p12 = zeros(1,length(snr));
p_oma = zeros(1,length(snr));
for u = 1:length(snr)
gamma_12 = snr(u)*g12;
C2 = log2(1 + gamma_2);
for k = 1:N
if C2(k)<R2
p2(u) = p2(u)+1;
end
if C12(k)<R2
p12(u) = p12(u)+1;
36
end
if C_OMA(k)<R2
p_oma(u) = p_oma(u)+1;
end
end
end
emiology(SNR,p_oma/N,’-*’,’color’,’g’,’linewidth’,2);
hold on;
grid on;
emiology(SNR,p2/N,’-*’,’color’,’b’,’linewidth’,2);
emiology(SNR,p12/N,’-*’,’color’,’k’,’linewidth’,2);
xlabel(‘SNR’);
ylabel(‘Outage probability’);
legend(‘Far user without NOMA’,’Far user NOMA without cooperation’,’Far user NOMA
with cooperation’);
clc ;
clear all;
close all;
N = 5*10^5;
PR = 0:2:40;
BW = 10^6;
No = -174 + 10*log10(BW);
37
no = (10^-3) * db2 pow (No);
pla = 4;
38
eq2 = y2. /h2;
end
hold on;
grid on;
39
legend (‘User 1 (Weakest user)’, ‘User 2 (optimized user)’, ‘User 3 (Strongest user)’);
clc;
clear all;
close all;
N = 10^6;
dsn = 10;
dnf = 10;
eta = 4;
Pt = 0:5:20;
BW = 10^9;
No = -174 + 10*log10(BW);
af = 0.8; an = 0.2;
ratetarget = 1;
snrtarget = (2^(2*ratetarget))-1;
eff = 0.7;
40
del = 10^-6;
for u = 1: length(pt)
ph = pt(u)*gsn. *frac*eff;
Rf = 0.5*log2(1 + ph.*gnf/no);
for k = 1: N
if (Rnn(k)<ratetarget)||(Rnf(k)<ratetarget)
pn(u) = pn(u) + 1;
end
pf(u) = pf(u) + 1;
end
end
end
poutn1 = pn/N;
poutf1 = pf/N;
figure;
41
plot (Pt, cn,’-*’, ‘linewidth’, 2,’color’,’g’); hold on; grid on;
figure;
hold on;
grid on;
figure;
hold on;
grid on;
43
From the simulation result that the user M1 has the highest bit rate error among
the three users because he suffers the most interference from the user M2 and M3. User
m2 suffers moderate interference due to user M3. finally, the user M3 is free from
interference and has the lowest BER in the group. The BER performance is strongly
affected by the power allocation scheme, more sophisticated power allocation Schemes
further improvement in performance.
5.4.3 SWIPT
44
Fig 5.4.3(a) Achevable Data Rate of NOMA
45
Fig 5.4.3(c) Data Rate after SIC analysis
CHAPTER 6
46
CONCLUSION
6.1 Conclusion:
CHAPTER 7
47
REFERENCES
3. Huang, Y., Zhang, C., Wang, J., Jing, Y., Yang, L., & You, X. (2018). Signal
Processing for MIMO-NOMA: Present and Future Challenges. IEEE Wireless
Communications, 25(2), 32–38. doi:10.1109/mwc.2018.1700108
4. https://ecewireless.blogspot.com/2020/03/noma-graphical-example-of-
superpostion.html
5. https://ecewireless.blogspot.com/2020/08/what-is-cooperative-swipt-noma.html
6. Z. Ding, R. Schober and H. V. Poor, "A General MIMO Framework for NOMA
Downlink and Uplink Transmission Based on Signal Alignment," in IEEE
Transactions on Wireless Communications, vol. 15, no. 6, pp. 4438-4454, June
2016, doi: 10.1109/TWC.2016.2542066.
9. https://doi.org/10.1007/s11276-018-1807-z
10. S. Singh, D. Mitra and R. K. Baghel, "Analysis of NOMA for Future Cellular
Communication," 2019 3rd International Conference on Trends in Electronics and
Informatics (ICOEI), 2019, pp. 389-395, doi: 10.1109/ICOEI.2019.8862527.
11. M. Jain, S. Soni, N. Sharma and D. Rawal, "Performance Analysis at Near and
Far users of a NOMA System Over Fading Channels," 2019 IEEE 16th India
Council International Conference (INDICON), 2019, pp. 1-4, doi:
10.1109/INDICON47234.2019.9030258.
48
12. Cooperative Non-Orthogonal Multiple Access in 5G Systems," Z. Ding, M. Peng,
and H. V. Poor, IEEE communications letters, vol. 19, no. 8, 2015.
25. T. M. Cover and J. A. Thomas, Elements of information theory. John Wiley &
Sons, 2012. [4] J. N. Laneman, D. N. Tse, and G. W. Wornell, “Cooperative
diversity in wireless networks: Efficient protocols and outage behavior,” IEEE
Trans. Inf. Theory, vol. 50, no. 12, pp. 3062–3080, Dec. 2004. [5] Z. Ding, S. M.
Perlaza, I. Esnaola, and H. V. Poor, “Power allocation strategies in energy
harvesting wireless cooperative networks,” IEEE Trans. Wireless Commun., vol.
13, no. 2, pp. 846–860, Feb. 2014.
26. Z. Ding, H. Dai, and H. V. Poor, “Relay selection for cooperative NOMA,” IEEE
Wireless Commun. Lett., vol. 5, no. 4, pp. 416–419, Jun. 2016.
29. J.-B. Kim and I.-H. Lee, “Non-orthogonal multiple access in coordinated direct
and relay transmission,” IEEE Commun. Lett., vol. 19, no. 11, pp. 2037–2040,
Nov. 2015.
30. J. Men and J. Ge, “Non-orthogonal multiple access for multiple-antenna relaying
networks,” IEEE Commun. Lett., vol. 19, no. 10, pp. 1686–1689, Oct. 2015.
50