Professional Documents
Culture Documents
Achievable Rate Region For Iterative Multi-User Detection Via Low-Cost Gaussian Approximation
Achievable Rate Region For Iterative Multi-User Detection Via Low-Cost Gaussian Approximation
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2020.2971999, IEEE
Transactions on Wireless Communications
1
Abstract—We establish a multiuser extrinsic information involves subtraction of successfully detected signals. If
transfer (EXIT) chart area theorem for the interleave- practical forward error control (FEC) codes are used,
division multiple access (IDMA) scheme, a special form of each subtraction incurs an overhead in terms of either
superposition coding, in multiple access channels (MACs).
A low-cost multi-user detection (MUD) based on the power or rate loss relative to an ideal capacity achieving
Gaussian approximation (GA) is assumed. The evolution code [5, Fig. 13.3]. Such overheads accumulate during
of mean-square errors (MSE) of the GA-based MUD SIC steps, moving its performance away from the ca-
during iterative processing is studied. We show that the pacity as K grows. Also, both time-sharing and rate-
K-dimensional tuples formed by the MSEs of K users splitting involve segmenting a data frame of a user
constitute a conservative vector field. The achievable rate
is a potential function of this conservative field, so it is into several sub-frames. In practice, the length of a
the integral along any path in the field with value of coding frame is restricted by the latency requirement.
the achievable rate solely determined by the two path Frame segmentation results in shorter sub-frames and
terminals. Optimized error correcting codes can be found therefore reduces the coding gain for a practical turbo
given the integration paths in the MSE fields by matching or low-density parity-check (LDPC) type code [6], which
EXIT type functions. The above findings imply that i) low-
cost GA detection can provide MAC capacity-approaching further worsens the losses of accumulation.
performance, ii) the sum-rate capacity can be achieved Iterative detection [7]–[10] can alleviate the loss accu-
independently of the integration path in the MSE fields; mulation problem using soft cancellations instead of hard
and iii) the integration path determining achievable rate
subtraction. A turbo or LDPC code involving iterative
tuples of all users can be an extra degree of freedom for
code design. detection can be optimized by matching the so-called
extrinsic information transfer (EXIT) functions of two
Index Terms—EXIT chart, non-orthogonal multiple ac-
local processors, i.e., demapper/detector and FEC de-
cess, area theorem, MAC capacity, multi-user detection.
coder, [11], [12]. In a single-user point-to-point channel,
such matching can offer near capacity performance, as
I. I NTRODUCTION shown by the area properties [13], [14].
Consider a multiple access channel (MAC) with K Code-division multiple-access (CDMA) is a conven-
users. The MAC capacity region is bounded by 2K − 1 tional approach to the MAC. Iterative multi-user de-
constraints and determined by a tuple of user rates tection (MUD) has been studied for CDMA [15]–[17]
Rk , 1 ≤ k ≤ K [2], [3]. To achieve arbitrary points with impressive gains. CDMA is capacity achieving
of the capacity region, joint detection and decoding under ideal coding and SIC. However, with practical
is required, which has prohibitively high complexity FEC codes, there is still a considerable gap between
exponential to K. Theoretically, successive interference CDMA performance and the MAC capacity. This is
cancellation (SIC) together with time-sharing or rate- because CDMA is not specifically optimized for iterative
splitting can achieve the entire capacity region [4]. SIC detection and decoding, as explained graphically in [18].
Part of the results is published in the proceedings of the IEEE Interleave-division multiple-access (IDMA) provides
International Symposium on Information Theory 2019, Paris, France
[1]. a simple solution to closing this gap [19]. According
The work of Chulong Liang and Li Ping was supported by the to information theory, mutually random codebooks for
University Grants Committee of the Hong Kong Special Administrative different users are capacity achieving in a MAC [4].
Region, China, under Projects CityU 11216817 and CityU 11216518.
X. J. Wang and S. ten Brink are with Institute of Telecommuni- These codebooks can be implemented by assigning each
cations, Pfaffenwaldring 47, University of Stuttgart, 70569 Stuttgart, user with a codebook generated from a master codebook
Germany (e-mail: {wang, tenbrink}@inue.uni-stuttgart.de). using a user-specific interleaving, provided that the resul-
C. Liang and L. Ping are with the Department of Electronic
Engineering, City University of Hong Kong, Hong Kong SAR, China tant codebooks are approximately mutually random. This
(e-mail: liangchulong@qq.com and eeliping@cityu.edu.hk). principle underpins IDMA and its theoretically capacity
1536-1276 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Uppsala Universitetsbibliotek. Downloaded on March 11,2020 at 04:07:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2020.2971999, IEEE
Transactions on Wireless Communications
2
T
approaching performance. field v = [v1 , v2 , · · · , vK ] . A main finding of this
IDMA does also have several practical advantages. paper is that the integral is path-independent and its
As shown in [18], both CDMA and IDMA with LDPC value is solely determined by the two terminations. The
coding can be represented by sparse graphs, but the path independence property greatly simplifies the code
former is “regular” (prone to a large number of short optimization problem.
cycles) while the latter is randomized with reduced The findings and contributions of this paper are sum-
occurrence probability of short cycles. This difference marized as follows.
leads to the performance advantage of IDMA under • A low-cost GA-based MUD can provide near op-
iterative processing. More details can be found in [6], timal performance. In particular, it is provably
[18]–[20] on iterative processing on random graphs. The capacity-achieving for Gaussian signaling.
connection between the occurrence probability of short • Relative to Gaussian signaling, the loss due to
cycles and graph randomization was first revealed in discrete modulation can be made arbitrarily small
[21]. using a superposition coded modulation (SCM)
The complexity of an IDMA receiver can be further technique.
reduced by Gaussian approximation (GA) on the residual • FEC codes optimized for single-user channels may
cross-user interference during iterative processing (See not be good choices for MACs involving low-
Sec. II-A below for details). The per-user complexity of a cost GA-based MUD. The FEC codes should be
GA-based MUD remains roughly the same for all K. For carefully designed to match MUD, which facilitates
comparison, the complexity of a standard a posteriori iterative detection. We will provide examples for the
probability (APP) based MUD is exponential in K [19]. related code design.
• A multi-user area theorem of EXIT chart is es-
A question naturally arises: At such low cost, what is tablished for the code design. We show that the
the achievable performance of IDMA under GA-based sum-rate capacity is a potential function of the
MUD? Some partial answers to this question are avail- MSE vector field formed by v, which leads to the
able. It was shown that IDMA is capacity approaching path independence property. All points of the MAC
when all users see the same channel [22]. In [23], [24], capacity region are achievable using only one FEC
the capacity optimality of IDMA with arbitrary user code per user. This avoids the loss related to the
power and antenna number was firstly proved for two- frame segmentation of SIC as aforementioned.
• The above results can be extended to MIMO MAC
user case and numerically verified for three-user case.
However, for the general MAC system, the code design channels straightforwardly. We will provide simu-
for IDMA becomes difficult when different users see lation results to show that properly designed IDMA
different channels. In the latter case, to achieve the entire can approach the sum-rate MAC capacity for differ-
capacity region, different FEC code rates are generally ent decoding paths in the MSE vector field within
required. Previous works on IDMA focused on the 1 dB .
achievability of some special points in the MAC capacity This paper is structured as follows. In Sec. II, we
region [20], [25]–[28] and/or other aspects, e.g., power present the multi-user iterative detection and decoding
control etc. [29]–[34]. To the best of our knowledge, scheme in IDMA along with the matching condition.
no previous work has shown that IDMA under the Then, we derive the achievable rates of IDMA and show
GA-based MUD can achieve the entire MAC capacity its implication in code design in single antenna setup in
region. Recent developments on IDMA and multiple Sec. III. The achievable rate analysis is further extended
access for 5G and beyond are discussed with practical to MIMO cases in Sec. IV. Sec. V provides code design
implementation techniques in [18], [35], performance examples and numerical results verifying our theorems.
comparison among different NOMA schemes in [36], Finally, Sec. VI concludes the paper.
[37] and multi-carrier, multiple antenna and relay aspects
in [38]–[40]. II. I TERATIVE IDMA R ECEIVER
This paper analyzes the achievable performance of Consider a general K-user MAC system, character-
IDMA under GA-based MUD. We approach the problem ized by
by multi-dimensional curve matching of EXIT type XK p
vk = 0 indicating perfect decoding. Using the relation- where Pk denotes the received signal strength of the
ship between mutual information (MI) and minimum kth user’s signal, hk denotes the fading coefficients of
MSE (MMSE) derived in [14], [41], we show that the user, xk is the transmitted signal of the kth user
the achievable sum-rate can be evaluated using a line and n is the additive (circularly symmetric complex)
integral along a valid path in the K-dimensional vector white Gaussian noise (AWGN) with zero mean and unit
1536-1276 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Uppsala Universitetsbibliotek. Downloaded on March 11,2020 at 04:07:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2020.2971999, IEEE
Transactions on Wireless Communications
3
variance, i.e., CN 0, σ 2 = 1 . We consider complex- BPSK signaling, x̂i = tanh L2i with Li being the
valued signals throughout the paper if not otherwise log-likelihood ratio (LLR) after decoding. For higher
stated. Practically, a sequence of symbols y, forming one modulation schemes, the soft symbol estimates can be
or multiple codewords y, is received. obtained by [42, eqn. 3a], [43]. The feedback from
The iterative receiver is depicted in Fig. 1. The el- channel decoders will be discussed later in Sec. II-B.
The term zk in (2b) is comprised of AWGN and residual
ρ1 , y10 multi-user interference. To reduce complexity, we will
adopt Gaussian approximation (GA) assuming that zk is
Decoder 1 Gaussian-distributed with zero mean and variance σz,k
2
,
1
v1 , x01 i.e., CN (0, σz,k ) . From (2b), we obtain
2
..
. K
2
X
ρk , yk0 2
σz,k = Pi |hi | vi + σ 2 , (3a)
i=1,i6=k
y Decoder k
ESE
vk , x0k
where the MSE of the symbol estimates vi =
.. h
2
i
. E |xi − x̂i | is to characterize the quality of the
0 decoder feedback x̂i . The complexity in (2a) can be
ρK , y K reduced by a sum-and-minus trick by noting that z̃k =
K
Decoder K √ X √
Σ − Pk hk x̂k where Σ = Pi hi x̂i . Here Σ is
vK , x0K i=1
common to all users, so its cost can be shared. The per
user cost for (2a) thus does not grow with K. The quality
Fig. 1. The iterative multi-user detection and decoding model in of the ESE output for user k can be measured by the
IDMA.
signal-to-noise ratio (SNR) offered by yk in (2a)
ementary signal estimator (ESE) module has access to 2 2
Pk |hk | Pk |hk |
the channel observation y and feedbacks x0k from all the ρk = 2 = ,
σz,k K
users’ decoders. It performs the so-called soft interfer- X 2
Pi |hi | vi + σ 2
ence cancellation (SoIC) and output signals with reduced
i=1,i6=k
interference. Each decoder (DEC) performs decoding for
a particular user while treating the residual signals of ∀k = 1, 2, . . . , K. (3b)
other users as noise. Through iterative message passing Assume that the average power of xi is normalized to
between the ESE and DECs, the estimates are refined 1. Then vi = 1 in the first iteration, meaning no a prior
and interference suppressed progressively. More details information about xi . During the iterative detection, vi
on the ESE DECs are given below. For the convenience will be updated using decoder output (See the discussion
of discussions, we will assume that xi are modulated in Sec. II-B below). For K users, we express (3b) in a
using binary phase shift keying (BPSK). vector form as
ρ = φ (v) , (3c)
A. ESE functions
T
The function of the ESE (for elementary signal es- where ρ = [ρ1 , ρ2 , · · · , ρK ] and v =
T
timation) module in Fig. 1 is interference cancellation. [v1 , v2 , · · · , vK ] . Due to h the ifact that the MSE
2
The outputs of ESE are a sequence of yk with [19], [29] is bounded by 0 ≤ vi ≤ E |xi | = 1,we obtain that
p the SNR is also bounded by
yk = y − z̃k = Pk hk xk + zk , (2a)
2 2
K Pk |hk | Pk |hk |
X p ρk,min = ≤ ρk ≤ = ρk,max .
zk = Pi hi (xi − x̂i ) + n. (2b) K σ2
2
X
i=1,i6=k Pi |hi | + σ 2
i=1,i6=k
Here, yk is obtained from y in (1) by canceling out (3d)
K
X √ We will view (3) as a transfer function from v to ρ.
the mean of the interference z̃k = Pi hi x̂i
i=1,i6=k 1 The Gaussian assumption is valid for a large number of users with
based on the feedback of the channel decoders. The
arbitrary independently transmitted symbols xi as the consequence of
soft symbol estimates x̂i are generated by feedbacks the central limit theorem or if the transmit signals xi are Gaussian by
from the users’ channel decoders. For instance with themselves.
1536-1276 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Uppsala Universitetsbibliotek. Downloaded on March 11,2020 at 04:07:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2020.2971999, IEEE
Transactions on Wireless Communications
4
i=1
v (t0 ) = ψ (ρ (t0 )) = 1, (5e) vk =0
gk
Z
v (t∞ ) = ψ (ρ (t∞ )) = 0, (5f) =− T
dvk (t) , ∀k = 1, 2, . . . , K,
vk =1 g v (t) + σ2
since we are interested in the error-free decoding cases. (7b)
1536-1276 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Uppsala Universitetsbibliotek. Downloaded on March 11,2020 at 04:07:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2020.2971999, IEEE
Transactions on Wireless Communications
5
h iT
2 2 2
where gT = P1 |h1 | , P2 |h2 | , · · · , PK |hK | con- with the following assumptions
tains the powers of all users, v = [v1 , v2 , · · · , vK ] and
T 1) The exchanged messages during the iterative pro-
2 cessing of the extrinsic and a priori channel are
gk = Pk |hk | denotes the kth element of vector g. Note
that the achievable rate expression in (7b) depends on observations from AWGN channels, given in (3a)
multiple variables v1 , v2 , · · · and vK , i.e., the evolution and (4).
of the MSEs of all the DECs. This can be intuitively 2) The channel decoder is APP (i.e., MAP) decoder.
explained by the iterative soft interference cancellation 3) The channel encoders and decoders use “matched
of the ESE based on other users’ DEC feedbacks. codes” for a given path in the MSE vector field
Hence, the achievable sum-rate of all users can be given in (6).
written as Remark: The assumptions used in Theorem 1 are
XK Z
g common for turbo-type iterative receivers. It is generally
Rsum = Rk = − T 2
· dv (t) , (8a) accepted that these assumptions are sufficiently accurate
v(t) g v (t) + σ
k=1 for practical systems, based on which turbo and LDPC
where (8a) denotes a line integral defined by v (t) , t ∈ codes are designed in many modern communication
[t0 , t∞ ]. Notice that the line v (t) is determined by the systems [11], [48]. Theorem 1 provides guidelines for the
evolution of the MSE vector v of all DECs. We recall design of FEC codes in the matching condition discussed
that the terminals of the line are given in (5e) and (5f) as in Sec. II-C for multi-user scenarios. Further, various
v (t0 ) = 1 and v (t∞ ) = 0. It can be verified that the in- channel decoders such as BCJR and belief propagation
tegrands in (8a) constitute a gradient of a scalar field (or (BP) are known for achieving APP performance.
g
potential function), i.e., gT v+σ 2 = ∇v log σ + g v .
2 T
1536-1276 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Uppsala Universitetsbibliotek. Downloaded on March 11,2020 at 04:07:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2020.2971999, IEEE
Transactions on Wireless Communications
6
5 K = 8, QPSK g 1 σ
K = 16, QPSK
K = 32, QPSK In this case, the achievable rate of each user is pro-
4 K = 128, QPSK portional to the received signal power strength gk . This
rate tuple coincides with the point where TDMA/FDMA
3 achieves the sum-rate capacity (see green dot in Fig. 3).
In path 1, it satisfies
2 v1 (t) = v2 (t) = · · · = vK (t) = v (t) , ∀ t.
1 The matching code for kth user shall have the following
MSE characteristic function
0 1 ρk ≤ ρk,min
−10 −5 0 5 10 15 20
1 1 2
vk = gT 1−gk · ρk − σ ρk,min ≤ ρk ≤ ρk,max .
SNRsum [dB]
0 ρ ≥ρ
k k,max
Fig. 2. Achievable rates of multi-user IDMA with matching codes
and QPSK modulation; all users are assumed to have the same power, For path 2 and path 3 which are comprised of K
modulation and coding scheme; For fair comparison, the multi-user segments and each segment has merely value change
SNR SNRsum = KP/σ 2 is used as abscissa. (from vl = 1 to vl = 0) in one particular direction vl ,
i.e., within the segment dv dvk
dt 6= 0 and dt = 0, ∀k 6= l.
l
equal-rate for simplicity, the achievable rates analysis are the decoding thresholds. The decoding functions are
can be extended to other general cases straightforwardly. step functions with sharp transitions at corresponding
We will provide code matching examples for a three threshold SNRs ρk,SIC . This type of decoding functions
user case based on QPSK signaling in Sec. V. The may pose difficulties for practical code designs, com-
achievable rates can also be found by the MSE evolution pared to that with smooth transitions.
method (compute the SNR-MSE transfer functions),
which are very close to the Gaussian capacity. D. Achievable rate region
To achieve an arbitrary point of the MAC capacity
C. Path vs rate tuples region, other paths shall be found. In the following the-
Consider a simple two-user case, i.e., K = 2. Fig. 3 orem, we show that the entire MAC capacity region can
illustrates some special paths and their corresponding be achieved by proving the existence of a dedicated path
achievable rate tuple (or rate pair for K = 2). The achieving an arbitrary point within the capacity region.
1536-1276 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Uppsala Universitetsbibliotek. Downloaded on March 11,2020 at 04:07:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2020.2971999, IEEE
Transactions on Wireless Communications
7
path 2
path 2 start iteration
FDMA
TDMA
1 path 1 path 3
path 3
ath
p
0 0
stop iteration
Fig. 3. Illustration (example for two users) of different integration paths achieving different rate pairs (R1 , R2 ); the arrows in the left figure
illustrate the two-dimensional MSE vector field; the achieved rate pairs are marked in the right figure for the corresponding paths; the dashed
lines denote paths achieving rate pairs moving (from the green dot) toward the corresponding SIC corner points.
Examples for constructing a dedicated path achieving a the iterative process). We verified GA through DDE for
feasible rate tuple are provided in case 2 of Sec. V-A. these cases (results omitted). Instead, we show results
for the following example with a few number of users
Theorem 2. Under the assumptions in Theorem 1,
operating at relatively high SNR, since GA becomes
IDMA with GA-based MUD achieves every rate tuple in
skeptical in these cases.
the K-user MAC capacity region C (K ). Given a feasible
Example: The number of users is set to K = 4, each
target rate tuple R = [R1 , R2 , · · · , RK ] ∈ C (K ), there
with the same power P = 41 and BPSK modulation.
exists at least one path defined by vR (t) : vs = 1 →
The multi-user SNR is −10 log σ 2 =20 dB. An LDPC
ve = 0 which achieves the target rate tuple R.
code with the variable node degree profile (from “edge”
Proof: See Appendix B. perspective) 0.5231λ1 + 0.3187λ2 + 0.1582λ11 and the
Remark: It is easy to prove that there exists a unique check node degree η 2 is used for each user. The PDF
path for each of the K! SIC corner points and the of the log-likelihood ratio (LLR) at the output of the
decoding functions shall be step functions. For other LDPC variable node decoder (VND) is tracked using
rate tuples, it can be verified that there exist many DDE with 10 bits and shown in Fig. 4 for the first
different paths achieving that rate tuple. The choice of 8 iterations. Clearly, the interference plus noise does
the integration path poses varying degrees of difficulty not resemble a Gaussian density at the first iteration.
for the design of matching codes. Thus, the design of an As the consequence of the soft interference cancellation,
appropriate integration path could be an extra degree of the density at VND becomes more Gaussian-like as the
freedom for the code design. iteration proceeds. Similar trend can be observed also
at the output of ESE and CND (results not shown).
E. Gaussian Approximation Surprisingly, GA is quite accurate even for a few number
We provide in this section numerical evidence show- of users operating at high SNR regime.
ing that GA used in our achievable rate analysis is
IV. MU-MIMO C HANNEL
accurate enough for addressing the behavior of a practi-
cal iterative IDMA multi-user demodulator and decoder. Assume that the kth transmitter has Nt,k antennas
The technique we used to track the probability density and the receiver has NR antennas respectively; then, the
function (PDF) of the exchanged messages during the it- received signal can be written as
erative processing is discretized density evolution (DDE) K p
X
proposed in [50]. y= Pk Hk xk + n, (11)
GA is arguably true for large number of users (central k=1
limit theorem) and/or noise-limited scenarios (the noise where Hk is the channel
ofthe kth user, n denotes the
density rather the multiple access interference governs uncorrelated noise E nnH = σ 2 I. In this case, the
1536-1276 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Uppsala Universitetsbibliotek. Downloaded on March 11,2020 at 04:07:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2020.2971999, IEEE
Transactions on Wireless Communications
8
iteration 7
0.8 V. R ESULTS
The code design for multi-user can be complicated
0.6 [52]–[55]. For simplicity, we consider a single-input
single-output (SISO) setup. We assume that the power
0.4 levels gi = Pi |hi |2 (i = 1, · · · , K) are constant in our
code design. Thus, the multi-user SNR is defined as
0.2 PK
gi
SNRsum = i=1 . (14)
0 σ2
−10 −5 0 5 10 15 20 25 We consider K = 3 users with the power distribution
LLR at VND g = [g1 , g2 , g3 ]T = [ 71 , 27 , 47 ]T and we target the sum-
rate Rsum = R1 + R2 + R3 = 1 bpcu as an example.
Fig. 4. Evolution of the LLR distribution at the VND during the Theoretically, this sum-rate is attainable at the noise
iterative multi-user detection and decoding model with K = 4 users variance σ 2 = 1. Furthermore, the capacity region (more
at the SNR of 20 dB; the symbol x = +1 is assumed to be transmitted
for the user under test.
precisely, the dominant face which maximizes the sum-
rate) with Gaussian alphabets is given by
g1
ESE module is replaced by an iterative linear MMSE 0.1069 ≤ R1 ≤ log2 1 + 2 = 0.1926,
σ
(LMMSE) receiver [42, eqn. (4a)]. Under the LMMSE-
g2
0.2224 ≤ R2 ≤ log2 1 + 2 = 0.3626,
based ESE, the SNR of user k can be written as [51] σ
g3
Nt,k
0.4854 ≤ R3 ≤ log2 1 + 2 = 0.6521,
X σ
−1
hH
k,i R hk,i g1 + g2
R1 + R2 ≤ log2 1 + = 0.5145,
ρk = i=1
, (12) σ2
Nt,k
X g1 + g3
1 − vk hH
k,i R
−1 h
k,i R1 + R3 ≤ log2 1 + = 0.7776,
σ2
i=1
g2 + g3
where hk,i denotes the ith column of the kth user’s R2 + R3 ≤ log2 1 + = 0.8931.
σ2
channel matrix Hk and
A. ESE functions
R = σn2 I + HVHH ,
According to the matching condition in (6), for the
with V = diag (P1 v1 , P2 v2 , · · · , PK vK ) and H being design of capacity-achieving codes, the ESE transfer
the concatenated channels of all users. Following a functions ρ(t) = φ(v(t)) shall be determined. For this,
similar approach in Appendix A, we obtain with the we specify the K-dimensional decoding path v(t).
matching condition in (6) the user rate Rk as Following the path independence property of The-
vk =0 orem 1, we can constraint v(t) to be a piece-wise
linear path with n segments starting from the point
Z N t,k
1536-1276 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Uppsala Universitetsbibliotek. Downloaded on March 11,2020 at 04:07:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2020.2971999, IEEE
Transactions on Wireless Communications
9
for i = 0, 1, 2, · · · , n − 1. With the specified path, the Substituting (20) into (18), we obtain
ESE transfer function for user k can be computed as g1 (1 − x1,1 ) 2
gk 0.15 = log2
1 − g1 x1,1 − g2 x1,2 g1 x1,1 + g2 x1,2 + 1
ρk = φk (vk ) = T
g v(t) − gk vk (t) + σ 2 g1 x1,1 g1 x1,1 + g2 x1,2 + 1
gk + log2 ,
g1 x1,1 + g2 (x1,2 − x2,2 ) g2 x2,2 + 1
= h i ,
x −vk g2 (1 − x1,2 ) 2
g T xi − (xi − xi+1 ) · xi,ki,k −xi+1,k − gk vk + σ
2
0.3 = log2
1 − g1 x1,1 − g2 x1,2 g1 x1,1 + g2 x1,2 + 1
gk
=K , g2 (x1,2 − x2,2 ) g1 x1,1 + g2 x1,2 + 1
xi,k0 −xi+1,k0 xi,k xi+1,k0 −xi+1,k xi,k0
+ log2
2 g1 x1,1 + g2 (x1,2 − x2,2 ) g2 x2,2 + 1
P
gk0 xi,k −xi+1,k vk + xi,k −xi+1,k +σ
k0 6=k + log2 (g2 x2,2 + 1) ,
vk ∈ [xi+1,k , xi,k ] for i = 0, 1, 2, · · · , n − 1. (17) 0.55 =
g3
log2
2
.
1 − g1 x1,1 − g2 x1,2 g1 x1,1 + g2 x1,2 + 1
Note that when xi,k = xi+1,k , the above function is not (21)
valid. Actually, ρk is a vertical line from gT xi −ggkkxi,k +σ2
to gT xi+1 −ggkkxi+1,k +σ2 with vk = xi,k . Substituting (16) Solving (21), we obtain one feasible solution given
into (7b), we obtain the user rate Rk by x1,1 = 0.2145, x1,2 = 0.2056, x2,2 = 0.0618.
Z vk (t)=0 Substituting the solution into (17), we can obtain the
gk ESE functions. These transfer functions are depicted
Rk = − T v(t) + σ 2
dvk (t)
vk (t)=1 g in the middle sub-figure of Fig. 5 for the three users,
n−1
X gk (xi,k − xi+1,k ) g T xi + σ 2 respectively.
= T
log T . (18) 3) Case 3: We randomly choose the intermediate
g (xi − xi+1 ) g xi+1 + σ 2
i=0 points {xi }. Then, substituting the points into (17),
To verify the path independence property of Theorems we obtain the ESE transfer functions and subsequently
1 and 2, we consider three different paths for (17) and compute the rate for each user using (18).
evaluate the system performance and achievable rates via Here, we consider a piece-wise linear path with 2
density evolution and bit error rate (BER) simulations. segments by specifying an intermediate point arbitrarily,
1) Case 1: We do not specify any intermediate point e.g., x1 = [0.5, 0.2, 0.2]. Substituting x1 into (17), we
{xi }, i.e., n = 1. The path is a straight line between the have the ESE functions as
starting point v(t = 0) = 1 and the stop point v(t =
( g1
2, 0 ≤ v1 ≤ 0.5,
∞) = 0, as discussed in Sec. III-C. The ESE function ρ1 = (g2 +g3 )0.4v1 +σg1
g2 (1.6v1 −0.6)+g3 (1.6v1 −0.6)+σ 2 , 0.5 ≤ v1 ≤ 1,
for user k is given by (
g2
gk 2, 0 ≤ v2 ≤ 0.2,
ρk = T , vk ∈ [0, 1]. (19) ρ2 = g1 2.5v2 +g3 v2g+σ
(g 1 − gk )vk + σ 2 2
g1 (0.625v2 +0.375)+g3 v2 +σ 2 , 0.2 ≤ v2 ≤ 1,
The rate for user k is proportional to its power gk , i.e.,
(
g3
2, 0 ≤ v3 ≤ 0.2,
Rk = ggTk1 Rsum . Thus, the corresponding rate tuple is ρ3 = g1 2.5v3 +g2 v3g+σ 3
g1 (0.625v3 +0.375)+g2 v3 +σ 2 , 0.2 ≤ v3 ≤ 1.
(R1 , R2 , R3 ) = ( 17 , 27 , 47 ). The transfer functions in (19)
are depicted in the left most sub-figure in Fig. 5 for the These transfer functions are depicted in the right most
three users, respectively. sub-figure of Fig. 5 for the three users, respectively. The
2) Case 2: We construct a dedicated path to achieve achievable rates for each user, given in (22), can be
an arbitrarily chosen rate tuple in the MAC region, e.g., obtained by substituting x1 into (18), see Tab. I.
(R1 , R2 , R3 ) = (0.15, 0.3, 0.55). To find a dedicated
path, we search for {xi } by solving K non-linear B. LDPC code optimization
equations given by (18). Then, the ESE transfer functions As the ESE functions are readily available, according
can be obtained by substituting {xi } into (17). If n > 2, to the matching condition, we optimize the degree profile
there are K(n − 1) unknown variables {xi,k }, which is of LDPC codes to match the ESE functions for user k,
larger than K. This potentially lead to multiple solutions. i.e.,
It is noteworthy to mention that the variables {xi,k } are
bounded in [0, 1] and shall satisfy (15). We may fix some 1, ρk ≤ ρk,min ,
unknown variables {xi,k } and solve the K non-linear vk = ψk (ρk ) = φ−1 (ρ k ), ρk,min ≤ ρk ≤ ρk,max ,
k
equations given by (18) to obtain remaining unknown 0, ρk ≥ ρk,max ,
(23)
variables. Usually, we can fix K(n − 2) unknown vari-
where φ−1
k (ρk ) is the inverse of the ESE function of user
ables and have feasible solution for the remaining K gk gk
k and ρk,min = gT 1−g 2 , ρk,max = σ 2 . Using the
unknown variables. Here, we consider a 3-segment path k +σ
EXIT chart matching techniques [42], [48], [56], [57],
having intermediate points
the matching LDPC codes can be designed by properly
x1 = [x1,1 , x1,2 , 0]T and x2 = [0, x2,2 , 0]T . (20) choosing the degree distributions.
1536-1276 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Uppsala Universitetsbibliotek. Downloaded on March 11,2020 at 04:07:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2020.2971999, IEEE
Transactions on Wireless Communications
10
v
v
v
Fig. 5. ESE transfer function and the matching LDPC code transfer function for three different paths; the x-axis denotes the SNR of ESE and the
y-axis denotes the MSE of the feedback from channel decoder; three users with QPSK and the power distribution g = [g1 , g2 , g3 ]T = [ 17 , 72 , 47 ]T
are considered.
Table I
C ODE O PTIMIZATION R ESULTS FOR T HREE C ASES
1536-1276 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Uppsala Universitetsbibliotek. Downloaded on March 11,2020 at 04:07:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2020.2971999, IEEE
Transactions on Wireless Communications
11
g1 (1 − 0.5)
1+1
R1 = log2
g1 (1 − 0.5) + g2 (1 − 0.2) + g3 (1 − 0.2) g1 · 0.5 + g2 · 0.2 + g3 · 0.2 + 1
g1 (0.5 − 0)
+ log2 (g1 · 0.5 + g2 · 0.2 + g3 · 0.2 + 1) = 0.157,
g1 (0.5 − 0) + g2 (0.2 − 0) + g3 (0.2 − 0)
g2 (1 − 0.2)
1+1
R2 = log2
g1 (1 − 0.5) + g2 (1 − 0.2) + g3 (1 − 0.2) g1 · 0.5 + g2 · 0.2 + g3 · 0.2 + 1
g2 (0.2 − 0) g1 · 0.5 + g2 · 0.2 + g3 · 0.2 + 1
+ log2 = 0.281,
g1 (0.5 − 0) + g2 (0.2 − 0) + g3 (0.2 − 0) 0+1
g3 (1 − 0.2)
1+1
R3 = log2
g1 (1 − 0.5) + g2 (1 − 0.2) + g3 (1 − 0.2) g1 · 0.5 + g2 · 0.2 + g3 · 0.2 + 1
g3 (0.2 − 0) g1 · 0.5 + g2 · 0.2 + g3 · 0.2 + 1
+ log2 = 0.562. (22)
g1 (0.5 − 0) + g2 (0.2 − 0) + g3 (0.2 − 0) 0+1
v
u 2
dv,max u dc,max p
X X
(27)
u
λi · J −1 1 − j − 1 · J −1 (1 − IE,V ) + 4ρ
IE,V = (i − 1) J ηj · J ,
t
i=1 j=1
We basically follow the method described in [56, (resp., variable node), ρ is the decoder input SNR, and
Appendix 5G] to design irregular LDPC codes given the J(·) is defined by
a target transfer function v = ψ(ρ), where ρ is the
a priori SNR and v, the decoder output, denotes the 2 /2)2
−(y−σch
∞ 2σ 2
e
Z
extrinsic variance. The difference is that we use mutual J(σch ) = 1 −
ch
· log2 1 + e−y dy,
information instead of the mean of LLR to track the
p
2
2πσch
−∞
evolution process.
The asymptotic performance of an LDPC code ensem- its inverse function is further denoted by J −1 (·). Sub-
ble can be specified by its variable node and check node stituting (26) into (25), we obtain (27) where the LDPC
edge distribution polynomials, namely code can be characterized by one single variable IE,V .
dv,max dc,max The degree optimization problem can be formulated in
(28). The cost function in (28) is to maximize the code
X X
λ(x) = λi xi−1 and η(x) = ηi xi−1 , (24)
i=1 i=1
rate. Let IE,V,ini (ρ) be the initial extrinsic information
given by the channel, which can be written as
where λi (resp., ηi ) is the fraction of edges in the
bipartite graph of the LDPC code connected to variable dv,max q
nodes (resp., check nodes) with degree i, and dv,max 2
X
IE,V,ini (ρ) = λi · J (i − 1) [J −1 (0)] + 4ρ
(resp., dc,max ) is the maximum variable node (resp., i=1
check node) degree. Moreover, we use the Gaussian √
= J (2 ρ) . (29)
approximation [58], i.e., (3a) and (4), to optimize the
edge distributions for the sake of simplicity.
Let IE,V,fin (ρ) denote the extrinsic information upon
In [48], it is shown that the decoder characteristic for
convergence, which corresponds to an output extrinsic
an LDPC code can be computed as
variance to the MUD v = ψ(ρ), i.e., given ρ, IE,V,fin (ρ)
dv,max q should satisfy the following equation
2
X
IE,V = λi · J (i − 1) [J −1 (IE,C )] + 4ρ ,
i=1 dv,max 2 !
i · J −1 (IE,C,fin )
(25)
X
Λ i · fQ = ψ(ρ), (30)
dc,max i=1
4
X p
IE,C = 1 − ηj · J j − 1 · J −1 (1 − IE,V ) ,
j=1 where fQ is defined in (10), and
(26)
dc,max
where IE,V (resp., IE,C ) is the extrinsic information
X p
IE,C,fin = 1 − ηj · J j − 1 · J −1 (1 − IE,V,fin )
from variable node (resp., check node) to check node j=1
1536-1276 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Uppsala Universitetsbibliotek. Downloaded on March 11,2020 at 04:07:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2020.2971999, IEEE
Transactions on Wireless Communications
12
dv,max
X λi
max
{λi }
i=1
i
dv,max
X
s.t. λi = 1,
i=1
v
u 2
dv,max u dc,max p
X u X
λi · J t(i − 1) J −1 1 − ηj · J j − 1 · J −1 (1 − I
E,V ) + 4ρ > IE,V
i=1 j=1
for ∀0 < ρ < ∞ and IE,V,ini (ρ) ≤ IE,V ≤ IE,V,fin (ρ). (28)
1536-1276 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Uppsala Universitetsbibliotek. Downloaded on March 11,2020 at 04:07:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2020.2971999, IEEE
Transactions on Wireless Communications
13
users with matching codes along different decoding paths • Change each K-dimension
PK point xi into a point xi
0
(denoted by solid lines, respectively), where we set a with dimension L = i=1 Li as follows.
maximum iteration of 1000 between the ESE detector
x0i =
and the LDPC decoders. Moreover, the Shannon limit
at the sum-rate Rsum = 1 along with the density
evolution performance with optimized codes considering
xi,1 , · · · , xi,1 , xi,2 , · · · , xi,2 , · · · , xi,K , · · · , xi,K .
QPSK are provided. From the numerical results, we can | {z } | {z } | {z }
conclude that L1 copies L2 copies LK copies
• the evolution thresholds for three cases with QPSK • Finally, we have an equal power system with L
are close to the Gaussian capacity. The loss incurred virtual users each with power g and the decoding
by finite alphabets is negligible at the target sum- path is x00 → x01 → · · · → x0n , where the original
rate. user i is the superposition
Pi−1 of the Pivirtual users with
• Three cases have BER below 10−4 within 1 dB indices from 1 + j=1 Lj to j=1 Lj .
to the Shannon limit. The sum-rate capacity can By substituting the modified power allocation and path
be achieved for different paths also with QPSK into (18), it is easy to find that the equal power system
signaling. satisfies the requirement of the original K-user system.
• For case 2, we computed a dedicated path to achieve Table I shows the optimized LDPC code for a targeted
an arbitrarily chosen rate tuple (R1 , R2 , R3 ) = sum-rate of Rsum = 2 for case 2, where the individual
(0.15, 0.3, 0.55). The numerical results also verified user rate is pre-defined and a dedicated decoding path
our path construction based on GA. is then specified to achieve that rate tuple. For the
• Case 1 has the worst performance; this may be simplicity of code design, we apply SCM to each user.
due to its worst girth property of the randomly In particular, the to be transmitted data packet for user
constructed parity check matrix because of its low 2 and user 3 is divided into two and four independent
code-rate; we conjecture that more sophisticated data layers, respectively. By doing this, the three-user
methods of parity check matrix design, e.g., pro- MAC system is converted to a MAC system with seven
gressive edge growth (PEG) [60] and methods in “users”, each with the same transmit power. The main
[61] could be used to improve its performance. motivation for applying SCM is that the curve matching
To further verify that the decoding path (or decoding code design becomes difficult at high rate [22]. It may
trajectory L(t)) in the BER simulation is close to the require rather complicated joint design of modulation
desired theoretical path, we compare the decoding trajec- and coding scheme for each user. Simulation and density
tories obtained via density evolution and BER simulation evolution results are depicted in Fig. 8 for the most
for three cases at the SNR SNRsum = 1 dB, where interesting case 2 (user rate is prescribed). Compared
all users can decode its signal with high probability. to the low-rate scenario in Fig. 6, the gap to Shannon-
The evolution trajectories differ from the specified paths limit increases both for density evolution and simulation
(discussed in Sec. V-A) mainly due to the different results at high rate (0.4 dB and 1.5 dB respectively).
SNRs (the specified paths assume SNRsum = 0 dB). However, we conjecture that this gap can be reduced
We observe that the simulation trajectories are consistent by imposing more data layers. However, increasing the
with those of density evolution for all three cases. This number of data layers essentially decreases the code-rate
further consolidates the path independence theorem, and per layer. It is a rather challenging task to design low-
provides numerical evidence the validity of Theorem 1 rate LDPC codes with good performance [62], [63]. To
to finite alphabet cases. this end, more complexity-demanding and sophisticated
LDPC code design methods such as density evolution
[12], generalized constraint nodes based on Hadamard
D. High Rate codes [63], serial concatenation with a repetition code
[20] and PEG [60] may be used in future work to verify
For scenarios where high rates for users are required, this conjecture.
SCM [43], [45] can be applied. We consider the case that
the data layers in SCM are of the same power. Suppose VI. C ONCLUSION
that we have a K-user system with power allocation We proved under Gaussian approximation (GA) that
[g1 , g2 , · · · , gK ]T . The decoding path x0 → x1 → the simple interleave-division multiple-access (IDMA),
· · · → xn is also specified. Then, we can convert this relying on a low-cost GA based multi-user detector
unequal power system into an equivalent equal power (MUD), is capacity-achieving for the general Gaussian
system as follows. multiple access channels (GMAC) with arbitrary number
• Find a real number g > 0 such that Li = gi /g is of users, power distribution and with single or multiple
an integer for all i. antennas. We showed that IDMA with matching codes
1536-1276 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Uppsala Universitetsbibliotek. Downloaded on March 11,2020 at 04:07:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2020.2971999, IEEE
Transactions on Wireless Communications
14
0.5
0.6
v3
0.4
0
1
0.2
0.5
0.8 1
v2 0.4 0.6 0
00 0.2 0 0.2 0.4 0.6 0.8 1
v1 v1
Fig. 7. Evolution and simulation trajectories for three cases at SNRsum = 1 dB; Left: 3-D diagram for a trajectory (v1 , v2 , v3 ); Right: Side
view (v1 , v3 ) of a trajectory.
100 A PPENDIX A
Shannon limit P ROOF OF (7b)
simulation case 2
evolution case 2
10−1 Let the SNR of the output of ESE be ρk,min , ρk,max as
defined in (3d). Since the achievable rate formula in (7)
requires the integration for the SNR ρ spanning (0, ∞),
10−2 we explicitly write the transfer function of the DECs as
BER
1,
ρ ≤ ρk,min
10−3 vk = ψk (ρk ) , ρk,max ≤ ρ ≤ ρk,min .
0 ρ ≥ ρk,max
10−4
We also assume that the matching condition in (6) holds.
Then, the achievable rates can be expressed as
10−5 ρk,max ρk,min
1 1
Z Z
4.5 5 5.5 6 6.5 7
Rk = dρk + dρk .
SNRsum [dB] ρk,min ρk + vk−1 0 ρk + 1
1536-1276 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Uppsala Universitetsbibliotek. Downloaded on March 11,2020 at 04:07:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2020.2971999, IEEE
Transactions on Wireless Communications
15
2
Let gk = Pk |hk | be the kth element of the vector g [3] A. E. Gamal and Y.-H. Kim, Network Information Theory.
and v = [v1 , v2 , · · · , vK Cambridge, U.K.: Cambridge Univ. Press, 2011.
], we can express (3b) as ρk = [4] D. Tse and P. Viswanath, Fundamentals of Wireless Communi-
gk / gT v − gk vk + σ 2 and obtain cations. Cambridge, U.K.: Cambridge Univ. Press, 2005.
vk =0 [5] Y. Hu and L. Ping, “Interleave-Division Multiple Access
(IDMA),” in Multiple Access Techniques for 5G Wireless Net-
gk
Z
(3a) −1
Rk = log ρk + vk + log vk − dvk works and Beyond, M. Vaezi, Z. Ding, and H. V. Poor, Eds.
gT v + σ 2 vk =1 New York City, U.S.: Springer, 2019, ch. 13, pp. 417–449.
+ w0 [6] T. Richardson and R. Urbanke, Modern Coding Theory, 1st ed.
Cambridge, U.K.: Cambridge Univ. Press, 2008.
vk =0 [7] C. Schlegel, R. Kempter, and P. Kota, “A novel random wireless
gk
Z
= log (ρk vk + 1) − dvk + w0 packet multiple access method using CDMA,” IEEE Trans.
g v + σ2
T
vk =1 Wireless Commun., vol. 5, no. 6, pp. 1362–1370, Jun. 2006.
0 [8] M. Jiang, J. Akhtman, and L. Hanzo, “Iterative joint channel
gk
Z
=− dvk , estimation and multi-user detection for multiple-antenna aided
1g
Tv + σ2 OFDM systems,” IEEE Trans. Wireless Commun., vol. 6, no. 8,
pp. 2904–2914, Aug. 2007.
where the last equality is due to w0 = log (1 + ρk,min ) = [9] P. A. Hoeher, S. Badri-Hoeher, Wen Xu, and C. Krakowski,
log (1 + ρk (vk = 1)). “Single-antenna co-channel interference cancellation for TDMA
cellular radio systems,” IEEE Trans. Wireless Commun., vol. 12,
no. 2, pp. 30–37, Apr. 2005.
A PPENDIX B [10] M. Zhao, Z. Shi, and M. C. Reed, “Iterative turbo channel esti-
P ROOF OF T HEOREM 2 mation for OFDM system over rapid dispersive fading channel,”
Z vk =0 IEEE Trans. Wireless Commun., vol. 7, no. 8, pp. 3174–3184,
gk Aug. 2008.
The user rate Rk = − gT v+σ 2
dvk is a con- [11] S. ten Brink, “Exploiting the chain rule of mutual information
vk =1
tinuous and monotonically decreasing function of v. If for the design of iterative deoding shemes,” in Proc. 39th Annual
Allerton Conf. Commun., Control and Computing, 2001.
vk are unbounded, then Rk can take on anyvalue with [12] T. J. Richardson, M. A. Shokrollahi, and R. L. Urbanke, “De-
X T 2
the single sum-rate constraint Rk ≤ log g 1+σ σ2 . sign of capacity-approaching irregular low-density parity-check
codes,” IEEE Trans. Inform. Theory, vol. 47, no. 2, pp. 619–637,
In other words, there exists at least one integration Feb. 2001.
path which allows achievingX an arbitrary point
T within [13] A. Ashikhmin, G. Kramer, and S. ten Brink, “Extrinsic informa-
tion transfer functions: model and erasure channel properties,”
2
the region determined by Rk ≤ log g 1+σ σ2 . IEEE Trans. Inform. Theory, vol. 50, no. 11, pp. 2657–2673,
However, the value range of Rk is constrained by the fact Nov. 2004.
that 0 ≤ vl ≤ 1, ∀l. Furthermore, the integrand gT v+σ gk [14] K. Bhattad and K. R. Narayanan, “An MSE-based transfer
2
chart for analyzing iterative decoding schemes using a Gaussian
is monotonically decreasing with vl , ∀l 6= k. Therefore, approximation,” IEEE Trans. Inform. Theory, vol. 53, no. 1, pp.
the maximum of the kth user rate Rk is attained when 22–38, Jan. 2007.
vl = 0, ∀l 6= k, i.e., [15] M. C. Reed, C. B. Schlegel, P. D. Alexander, and J. A. Asen-
storfer, “Iterative multiuser detection for CDMA with FEC: near-
single-user performance,” IEEE Trans. Commun., vol. 46, no. 12,
Z vk =0
gk + σ 2
gk
Rk ≤ − 2
dv k = log . pp. 1693–1699, Dec. 1998.
vk =1 gk vk + σ σ2 [16] X. Wang and H. V. Poor, “Iterative (turbo) soft interference
cancellation and decoding for coded CDMA,” IEEE Trans. Com-
Similarly, the following constraints can also be obtained mun., vol. 47, no. 7, pp. 1046–1061, Jul. 1999.
[17] F. N. Brannstrom, T. M. Aulin, and L. K. Rasmussen, “Iterative
gk + gl + σ 2
Rk + Rl ≤ log , ∀k 6= l multi-user detection of trellis code multiple access using a pos-
σ2 teriori probabilities,” in Proc. IEEE Int. Conf. Commun., vol. 1,
Jun. 2001, pp. 11–15.
gk + gl + gm + σ 2
Rk + Rl + Rm ≤ log , ∀k 6= l 6= m[18] Y. Hu, C. Liang, J. Hu, and L. Ping, “Low-cost implementation
σ2 techniques for interleave division multiple access,” IEEE Wireless
Commun. Lett., vol. 7, no. 6, pp. 1026–1029, Dec. 2018.
.... [19] L. Ping, L. Liu, K. Wu, and W. K. Leung, “Interleave division
..
T multiple-access,” IEEE Trans. Wireless Commun., vol. 5, no. 4,
g 1 + σ2 pp. 938–947, Apr. 2006.
X
Rk ≤ log , [20] X. Wang, S. Cammerer, and S. ten Brink, “Near-capacity de-
σ2 tection and decoding: Code design for dynamic user loads
and these constraints constitute the MAC capacity re- in Gaussian multiple access channels,” IEEE Trans. Commun.,
2019.
gion. Hence, for any point in rate region determined by [21] S. Benedetto and G. Montorsi, “Unveiling turbo codes: some
the above constraints (or equivalently the K-user MAC results on parallel concatenated coding schemes,” IEEE Trans.
capacity region), there exists at least an integration path Inform. Theory, vol. 42, no. 2, pp. 409–428, Mar. 1996.
[22] Y. Hu, C. Liang, L. Liu, C. Yan, Y. Yuan, and L. Ping, “Interleave-
constrained by vl , ∀l 6= k achieving that point. division multiple access in high rate applications,” IEEE Com-
mun. Lett., 2018.
R EFERENCES [23] L. Liu, C. Yuen, Y. L. Guan, and Y. Li, “Capacity-achieving
iterative LMMSE detection for MIMO-NOMA systems,” in Proc.
[1] X. Wang, C. Liang, L. Ping, and S. ten Brink, “Achievable rate IEEE Int. Conf. Commun., May 2016, pp. 1–6.
region for iterative multi-user detection via low-cost Gaussian [24] L. Liu, Y. Chi, C. Yuen, Y. L. Guan, and Y. Li, “Capacity-
approximation,” in Proc. IEEE Int. Symp. Inform. Theory, 2019. achieving iterative LMMSE detection for MIMO-NOMA sys-
[2] T. M. Cover and J. A. Thomas, Elements of Information Theory, tems,” IEEE Trans. Signal Process., vol. 67, no. 7, pp. 1758–
2nd ed. New Jersey, USA: John Wiley & Sons, 2006. 1773, Apr. 2019.
1536-1276 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Uppsala Universitetsbibliotek. Downloaded on March 11,2020 at 04:07:01 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TWC.2020.2971999, IEEE
Transactions on Wireless Communications
16
[25] K. Li and X. Wang, “EXIT chart analysis of turbo multiuser [44] S. ten Brink, “Convergence behavior of iteratively decoded
detection,” IEEE Trans. Wireless Commun., vol. 4, no. 1, pp. parallel concatenated codes,” IEEE Trans. Commun., vol. 49,
300–311, Jan. 2005. no. 10, pp. 1727–1737, Oct. 2001.
[26] G. Song and J. Cheng, “Low-complexity coding scheme to [45] L. Ping, J. Tong, X. Yuan, and Q. Guo, “Superposition coded
approach multiple-access channel capacity,” in Proc. IEEE Int. modulation and iterative linear MMSE detection,” IEEE J. Sel.
Symp. Inform. Theory, Jun. 2015, pp. 2106–2110. Areas Commun., vol. 27, no. 6, pp. 995–1004, Aug. 2009.
[27] X. Wang, S. Cammerer, and S. ten Brink, “Near Gaussian [46] T. Yang and J. Yuan, “Performance of iterative decoding for
multiple access channel capacity detection and decoding,” in superposition modulation-based cooperative transmission,” IEEE
Proc. IEEE Int. Symp.Turbo Codes Iterative Inform. Process., Trans. Wireless Commun., vol. 9, no. 1, pp. 51–59, Jan. 2010.
Dec. 2018, pp. 1–5. [47] P. A. Hoeher, H. Schoeneich, and J. C. Fricke, “Multi-layer
[28] R. Zhang, L. Xu, S. Chen, and L. Hanzo, “EXIT-chart-aided interleave division multiple access: Theory and practice,” Eur.
hybrid multiuser detector for multicarrier interleave-division mul- Trans. Telecommun., vol. 19, no. 5, p. 523–536, Aug. 2008.
tiple access,” IEEE Trans. Veh. Technol., vol. 59, no. 3, pp. 1563– [48] S. ten Brink, G. Kramer, and A. Ashikhmin, “Design of low-
1567, Mar. 2010. density parity-check codes for modulation and detection,” IEEE
[29] K. Li, X. Wang, and L. Ping, “Analysis and optimization Trans. Commun., vol. 52, no. 4, pp. 670–678, Apr. 2004.
of interleave-division multiple-access communication systems,” [49] D. Guo, Y. Wu, S. S. Shitz, and S. Verdu, “Estimation in Gaussian
IEEE Trans. Wireless Commun., vol. 6, no. 5, pp. 1973–1983, noise: Properties of the minimum mean-square error,” IEEE
May 2007. Trans. Inform. Theory, vol. 57, no. 4, pp. 2371–2385, Apr. 2011.
[30] K. Kusume, G. Bauch, and W. Utschick, “IDMA vs. CDMA: [50] Sae-Young Chung, G. D. Forney, T. J. Richardson, and R. Ur-
Analysis and comparison of two multiple access schemes,” IEEE banke, “On the design of low-density parity-check codes within
Trans. Wireless Commun., vol. 11, no. 1, pp. 78–87, Jan. 2012. 0.0045 dB of the Shannon limit,” IEEE Commun. Lett., vol. 5,
[31] J. Song and Y. Shu, “On construction of rate-compatible raptor- no. 2, pp. 58–60, Feb. 2001.
like QC-LDPC code for enhanced IDMA in 5G and beyond,” in [51] X. Yuan, Q. Guo, X. Wang, and L. Ping, “Evolution analysis
Proc. 10th Int. Symp. Turbo Codes, 2018. of low-cost iterative equalization in coded linear systems with
[32] P. Hammarberg, F. Rusek, and O. Edfors, “Channel estimation cyclic prefixes,” IEEE J. Sel. Areas Commun., vol. 26, no. 2, pp.
algorithms for OFDM-IDMA: Complexity and performance,” 301–310, Feb. 2008.
IEEE Trans. Wireless Commun., vol. 11, no. 5, pp. 1722–1732, [52] S. Sharifi, A. K. Tanc, and T. M. Duman, “LDPC code design
May 2012. for the two-user Gaussian multiple access channel,” IEEE Trans.
[33] T. Yang, J. Yuan, and Z. Shi, “Rate optimization for IDMA Wireless Commun., vol. 15, no. 4, pp. 2833–2844, Apr. 2016.
systems with iterative joint multi-user decoding,” IEEE Trans. [53] A. Balatsoukas-Stimming and A. P. Liavas, “Design of LDPC
Wireless Commun., vol. 8, no. 3, pp. 1148–1153, Mar. 2009. codes for the unequal power two-user Gaussian multiple access
[34] Y. Zhang, K. Peng, and J. Song, “Enhanced IDMA with rate- channel,” IEEE Wireless Commun. Lett., vol. 7, no. 5, pp. 868–
compatible raptor-like quasi-cyclic LDPC code for 5G,” in Proc. 871, Oct. 2018.
IEEE Globecom Workshops (GC Wkshps), Dec. 2017, pp. 1–6. [54] Y. Chi, L. Liu, G. Song, C. Yuen, Y. L. Guan, and Y. Li, “Prac-
[35] Transmitter Side Signal Processing Schemes for NOMA, docu- tical MIMO-NOMA: Low complexity and capacity-approaching
ment R1-1804396 3GPP TSG RAN WG1 Meeting # 92, Sam- solution,” IEEE Trans. Wireless Commun., vol. 17, no. 9, pp.
sung, Sanya, China, Apr. 2018. 6251–6264, Sep. 2018.
[36] LLS Results for RDMA, GOCA, RSMA and IDMA Schemes, docu- [55] G. Song and J. Cheng, “Distance enumerator analysis for
ment R1-167536 3GPP TSG RAN WG1 Meeting # 86, MediaTek interleave-division multi-user codes,” IEEE Trans. Inform. The-
Inc., Gothenburg, Sweden, Aug. 2016. ory, vol. 62, no. 7, pp. 4039–4053, Jul. 2016.
[37] Y. Chen and T. Wild, “Exploring performance and complexity [56] X. Yuan, Low-complexity iterative detection in coded linear
of selected NOMA candidates in 5G new radio,” in Proc. IEEE systems, Ph.D. dissertation, City University of Hong Kong, Hong
Globecom Workshops (GC Wkshps), Dec. 2018, pp. 1–6. Kong, China, 2008.
[38] C. Novak, G. Matz, and F. Hlawatsch, “IDMA for the multiuser [57] R. Y. S. Tee, R. G. Maunder, and L. Hanzo, “EXIT-chart aided
MIMO-OFDM uplink: A factor graph framework for joint data near-capacity irregular bit-interleaved coded modulation design,”
detection and channel estimation,” IEEE Trans. Signal Process., IEEE Trans. Wireless Commun., vol. 8, no. 1, pp. 32–37, Jan.
vol. 61, no. 16, pp. 4051–4066, Aug. 2013. 2009.
[39] T. Peng, Y. Xiao, X. He, and S. Li, “Improved detection of [58] S.-Y. Chung, T. Richardson, and R. Urbanke, “Analysis of sum-
uplink OFDM-IDMA signals with carrier frequency offsets,” product decoding of low-density parity-check codes using a
IEEE Commun. Lett., vol. 16, no. 5, pp. 646–649, May 2012. Gaussian approximation,” IEEE Trans. Inform. Theory, vol. 47,
[40] F. Lenkeit, C. Bockelmann, D. Wübben, and A. Dekorsy, “IRA no. 2, pp. 657–670, Feb. 2001.
code design for IDMA-based multi-pair bidirectional relaying [59] J. A. McGowan and R. C. Williamson, “Loop removal from
systems,” in Proc. IEEE Globecom Workshops (GC Wkshps), LDPC codes,” in Proc. IEEE Inform. Theory Workshop (ITW’03),
Dec. 2013, pp. 241–246. Apr. 2003, pp. 230–233.
[41] D. Guo, S. Shamai, and S. Verdu, “Mutual information and [60] Xiao-Yu Hu, E. Eleftheriou, and D. M. Arnold, “Regular and
minimum mean-square error in Gaussian channels,” IEEE Trans. irregular progressive edge-growth tanner graphs,” IEEE Trans.
Inform. Theory, vol. 51, no. 4, pp. 1261–1282, Apr. 2005. Inform. Theory, vol. 51, no. 1, pp. 386–398, Jan. 2005.
[42] X. Yuan, L. Ping, C. Xu, and A. Kavcic, “Achievable rates [61] G. Liva, S. Song, L. Lan, Y. Zhang, S. Lin, and W. E. Ryan,
of MIMO systems with linear precoding and iterative LMMSE “Design of LDPC codes: A survey and new results,” J. Commun.
detection,” IEEE Trans. Inform. Theory, vol. 60, no. 11, pp. Software Syst., vol. 2, no. 3, p. 191–211, Sep. 2006.
7073–7089, Nov. 2014. [62] I. Andriyanova and J. P. Tillich, “Designing a good low-rate
[43] P. A. Hoeher and T. Wo, “Superposition modulation: myths and sparse-graph code,” IEEE Trans. Commun., vol. 60, no. 11, pp.
facts,” IEEE Commun. Mag., vol. 49, no. 12, pp. 110–116, Dec. 3181–3190, Nov. 2012.
2011. [63] G. Yue, L. Ping, and X. Wang, “Generalized low-density parity-
check codes based on Hadamard constraints,” IEEE Trans. In-
form. Theory, vol. 53, no. 3, pp. 1058–1079, Mar. 2007.
1536-1276 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Uppsala Universitetsbibliotek. Downloaded on March 11,2020 at 04:07:01 UTC from IEEE Xplore. Restrictions apply.