Professional Documents
Culture Documents
Impact of User Pairing On 5G Non-Orthogonal Multiple Access: IEEE Transactions On Vehicular Technology December 2014
Impact of User Pairing On 5G Non-Orthogonal Multiple Access: IEEE Transactions On Vehicular Technology December 2014
net/publication/269416921
CITATIONS READS
821 1,167
3 authors:
H. Vincent Poor
Princeton University
2,441 PUBLICATIONS 90,207 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by H. Vincent Poor on 14 March 2015.
Abstract—Non-orthogonal multiple access (NOMA) represents Since multiple users are admitted at the same time, fre-
a paradigm shift from conventional orthogonal multiple access quency and spreading code, co-channel interference will be
(MA) concepts, and has been recognized as one of the key strong in NOMA systems, i.e., a NOMA system is interference
enabling technologies for 5G systems. In this paper, the impact limited. As a result, it may not be realistic to ask all the
of user pairing on the performance of two NOMA systems, users in the system to perform NOMA jointly. A promising
NOMA with fixed power allocation (F-NOMA) and cognitive
alternative is to build a hybrid MA system, in which NOMA
radio inspired NOMA (CR-NOMA), is characterized. For F-
NOMA, both analytical and numerical results are provided to is combined with conventional MA. In particular, the users in
demonstrate that F-NOMA can offer a larger sum rate than the system can be divided into multiple groups, where NOMA
is implemented within each group and different groups are
arXiv:1412.2799v1 [cs.IT] 8 Dec 2014
allocated to the n-th user is constrained by the m-th user’s A. Impact of user pairing on the sum rate
signal-to-interference-noise ratio (SINR), whereas F-NOMA In this subsection, we focus on how user pairing affects
uses a fixed set of power allocation coefficients. Since the the probability that NOMA achieves a lower sum rate than
m-th user’s QoS can be guaranteed, we mainly focus on conventional MA schemes, which is given by
the performance of the n-th user offered by CR-NOMA. An
exact expression for the outage probability achieved by CR- P(Rm + Rn < R̄m + R̄n ). (4)
NOMA is obtained first, and then used for the study of the
diversity order. In particular, we show that the diversity order The following theorem provides an exact expression for the
experienced by the n-th user is m, which means that the above probability as well as its high SNR approximation.
m-th user’s channel quality is critical to the performance of
CR-NOMA. This is mainly because of the imposed SINR Theorem 1. Suppose that the m-th and n-th ordered users
constraint, where the n-th user can be admitted into the are paired to perform NOMA. The probability that F-NOMA
bandwidth channel occupied by the m-th user, only if the m- achieves a lower sum rate than conventional MA is given by
th user’s SINR is guaranteed. As a result, with a fixed m, P(Rm + Rn < R̄m + R̄n ) = (5)
increasing n does not bring much improvement to the n-th n−1−m Z ̟
user’s outage probability, which is different from F-NOMA. If X n − 1 − m (−1)i ̟1 2
the ergodic rate is used as the criterion, a similar difference 1− f (y)(F (y))n−1−m−i
i=0
i m + i ̟4
between F-NOMA and CR-NOMA can be observed. Again m+i !
take the scenario described in the last paragraph as an example. M−n m+i ̟2 − y
If n = M , in order to yield a large gain over conventional MA, × (1 − F (y)) [F (y)] − F dy
1+y
F-NOMA prefers the choice of m = 1, but CR-NOMA prefers
n−1
the choice of m = M − 1 , i.e., pairing the user with the best ̟3 X n − 1 ρ (M −n+j+1)̟2
channel condition with the user with the second best channel − (−1)j e− ρ ,
ρ j=0 j M −n+j +1
condition.
1 −x x
II. NOMA W ITH F IXED P OWER A LLOCATION where f (x) = ρe
ρ, F (x) = 1 − e − ρ , ̟1 =
Consider a downlink communication scenario with one BS M! 1−2a2n M!
(m−1)!(n−1−m)!(M−n)! , ̟2 = ̟3 =
a4n , (n−1)!(M−n)!
and M mobile users. Without loss of generality, assume that √
and ̟4 = 1 + ̟2 − 1. At high SNR, this probability can
the users’ channels have been ordered as |h1 |2 ≤ · · · ≤ |hM |2 , be approximated as follows:
where hm denotes the Rayleigh fading channel gain between
the BS and the ordered m-th user. Consider that the m-th user 1 ̟3 ̟2n
and the n-th user, m < n, are paired to perform NOMA. P(Rm + Rn < R̄m + R̄n ) ≈ n − ̟1 ̟ , (6)
ρ n
In this section, we focus on F-NOMA, where the BS
allocates a fixed amount of transmit power to each user. Pn−1−m n−1−m (−1)i R ̟2 n−1−m−i
where ̟ = i=0 i m+i ̟4 y
In particular, denote am and an as the power allocation h im+i
coefficients for the two users, where these coefficients are fixed ̟ −y
× y m+i − (1+y)
2
dy, i.e., ̟ is a constant and
and a2m + a2n = 1. According to the principle of NOMA,
am ≥ an since |hm |2 ≤ |hn |2 . The rates achievable to the not a function of ρ.
two users are given by Proof: See the appendix.
!
|hm |2 a2m Theorem 1 demonstrates that it is almost certain for F-
Rm = log 1 + , (1) NOMA to outperform conventional MA, particularly at high
|hm |2 a2n + ρ1 SNR. Furthermore, the decay rate of the probability P(Rm +
and Rn < R̄m + R̄n ) is approximately ρ1n , i.e., the quality of the n-
th user’s channel determines the decay rate of this probability.
Rn = log 1 + ρa2n |hn |2 , (2)
respectively, where ρ denotes the transmit SNR. Note that the
n-th user can decode the message intended for the m-th user B. Asymptotic studies of the sum rate achieved by NOMA
and Rn is2 always
successfully achievable at the n-th user, since In addition to the probability P(Rm + Rn < R̄m + R̄n ), it
|h | a2m
Rm ≤ log 1 + |hn |n2 a2 + 1 . is also of interest to study how large of a performance gain
n ρ
On the other hand, an orthogonal MA scheme, such as time- F-NOMA offers over conventional MA, i.e.,
division multiple-access (TDMA), can support the following
data rate: P(Rm + Rn − R̄m − R̄n < R),
1
where R is a targeted performance gain. The probability
R̄i = log 1 + ρ|hi |2 , (3)
2 studied in the previous subsection can be viewed as a special
where i ∈ {m, n}. In the following subsections, the impact case by setting R = 0. An interesting observation for the
of user pairing on the sum rate and the individual user rates cases with R > 0 is that there will be an error floor for
achieved by F-NOMA is investigated. P(Rm +Rn − R̄m − R̄n < R), regardless of how large the SNR
3
is. This can be shown by studying the following asymptotic C. Impact of user pairing on individual user rates
expression of the sum rate gap: Careful user pairing not only improves the sum rate, but
also has the potential to improve the individual user rates, as
Rm + Rn − R̄m − R̄n (7) shown in this section. We first focus on the probability that
1 F-NOMA can achieve a larger rate than orthogonal MA for
→ log + log ρa2n |hn |2 − log (ρ|hm ||hn |) the m-th user which is given by
ρ→∞ a2n
= log |hn | − log |hm |, P(Rm > R̄m ) (12)
!2
2 2
which is not a function of SNR. Hence the probability can be |h m | a
expressed asymptotically as follows: =P 1 + m
> (1 + ρ|hm |2 ) .
|hm |2 a2n + ρ1
P Rm + Rn − R̄m − R̄n < R (8) After some algebraic manipulations, the above probability can
→ P (log |hn | − log |hm | < R) . be further rewritten as follows:
ρ→∞
1 − 2a2n
P(Rm > R̄m ) = P |hm |2 < (13)
When R = 0, P Rm + Rn − R̄m − R̄n < R → 0, which is ρa4n
consistent with Theorem 1, since Z 1−2a4 2n m−1
ρan ̟5 − (M −m+1)y y
1 = e ρ 1 − e− ρ dy
P Rm + Rn < R̄m + R̄n ∼ n → 0. 0 ρ
ρ ρ→∞ X m − 1
m−1 (1−2a2
!
(−1)i ̟5 − n )(M −m+i+1)
4
= 1−e ρan
,
When R 6= 0, (8) implies that the probability i M −m+i+1
i=0
P Rm + Rn − R̄m − R̄n < R can be expressed asymptot-
M!
ically as follows: where ̟5 = (m−1)!(M−m)! .
By applying a series expansion, the above probability can
|hn |2 2R be rewritten as follows:
P (log |hn | − log |hm | < R) → P <2 . (9)
|hm |2 m−1
X m − 1
P(Rm > R̄m ) = (−1)i+1 ̟5 (14)
Directly applying the joint probability density function (pdf) i=0
i
of the users’ channels shown in (31), the probability can be ∞
X (1 − 2a2n )k (M − m + i + 1)k−1
rewritten as follows: × (−1)k .
k!ρk a4k
n
k=1
P (log |hn | − log |hm | < R) (10)
Z ∞Z y Again applying the results in (41) and (42), the above equation
= ̟1 f (x)f (y)[F (x)]m−1 can be approximated as follows:
0 2−2R y
(1 − 2a2n )m
× (F (y) − F (x))
n−1−m M−n
(1 − F (y)) dxdy, P(Rm > R̄m ) ≈ ̟5 , (15)
mρm a4mn
which is quite complicated to evaluate. In [9], a simpler pdf for which means that P(Rm > R̄m ) decays at a rate of ρ1m .
the ratio of two order statistics has been provided as follows: On the other hand, the probability that the n-th user can
experience better performance in a NOMA system than in
m−1
X n−m−1
M! X orthogonal MA systems is given by
f |hm |2 (z) =
|hn |2 (m − 1)!(n − m − 1)!(M − n)! j =0 j =0 2 2
1 2
1 2 P(Rn > R̄n ) = P log 1 + ρan |hn | > log(1 + ρ|hn | .
m − 1
n − m − 1 2
(−1)j1 +j2 (τ2 + τ1 z)−2 ,
j1 j2 Following similar steps as previously, we obtain the following:
where τ1 = j1 − j2 + n − m and τ2 = M − n + 1 + j2 . By 2 1 − 2a2n
P(Rn > R̄n ) = P |hn | > . (16)
using this pdf, the addressed probability can be calculated as ρa4n
follows: Interestingly P(Rn > R̄n ) in (16) is very much similar to
P(Rm > R̄m ) in (13), which yields the following:
P (log |hn | − log |hm | < R) (11)
m−1
X n−m−1 X n − 1 (−1)i ̟3
n−1
M! X
P(Rn > R̄n ) = 1 − (17)
→ i M −n+i+1
(m − 1)!(n − m − 1)!(M − n)! j =0 j =0 i=0
!
1 2
2(1−2an )(M −n+i+1)
(−1)j1 +j2 m − 1 n − m − 1 1 1 × 1−e
− ρa4
n ,
− .
τ1 j1 j2 τ2 + 2−2R τ1 τ2 + τ1
4
R
and its high SNR approximation is given by 1 − e−y , ǫ1 = 2 ρ−1 , b = Iρ , a = 1 + I and b ≤ aǫ1 . The
diversity order achieved by CR-NOMA is given by
(1 − 2a2n )n
P(Rn > R̄n ) ≈ 1 − ̟3 . (18) log Pon
nρn a4n
n lim − = m.
ρ→∞ log ρ
As can be seen from (15) and (18), the two users will have
totally different experience in NOMA systems. Particularly, a Proof: See the appendix.
user with a better channel condition is more willing to perform Theorem 2 demonstrates an interesting phenomenon that, in
NOMA since P(Rn > R̄n ) → 1, which is not true for a user CR-NOMA, the diversity order experienced by the n-th user
with a poor channel condition. Furthermore, it is preferable is determined by how good the m-th user’s channel quality is.
to pair two users whose channel conditions are significantly This is because the n-th user can be admitted to the channel
distinct, since (15) and (18) implies that m should be as small occupied by the m-th user only if the m-th user’s QoS is
as possible and n should be as large as possible. met. For example, if the m-th user’s channel is poor and its
targeted SINR is high, it is very likely that the BS allocates
all the power to the m-th user, and the n-th user might not
III. C OGNITIVE R ADIO I NSPIRED NOMA even get served.
NOMA can be also viewed as a special case of cognitive Recall from the previous section that F-NOMA can achieve
radio systems [10] and [11], in which a user with a strong a diversity gain of n for the n-th user, and therefore the
channel condition, viewed as a secondary user, is squeezed diversity order achieved by CR-NOMA could be much smaller
into the spectrum occupied by a user with a poor channel than that achieved by F-NOMA, particularly if n >> m. This
condition, viewed as a primary user. Following the concept performance difference is again due to the imposed power
of cognitive radio networks, a variation of NOMA, termed as constraint shown in (21).
CR-NOMA, can be designed as follows. Suppose that the BS It is important to point out that CR-NOMA can strictly guar-
needs to serve the m-th user, i.e., a user a with poor channel antee the m-th user’s QoS, and therefore achieve better fairness
condition, due to either the high priority of this user’s messages compared to F-NOMA. In particular, the use of CR-NOMA
or user fairness, e.g., this user has not been served for a long can ensure that a diversity order of m is achievable to the n-th
time. This user can be viewed as a primary user in a cognitive user, and admitting the n-th user into the same channel as the
radio system. The n-th user can be admitted into this channel m-th user will not cause too much performance degradation to
on the condition that the n-th user will not cause too much the m-th user. Particularly the SINR experienced by the m-th
performance degradation to the m-th user. user is strictly maintained at the predetermined level I.
Consider that the targeted SINR at the m-th user is I, which
means that the choices of the power allocation coefficients, am Sum rate achieved by CR-NOMA
and an , need to satisfy the following constraint: Without sharing the spectrum with the n-th user, i.e, all the
|hm |2 a2m bandwidth resource is allocated to the m-th user, the following
1 ≥ I. (20) rate is achievable:
|hm |2 a2n + ρ
R̃m = log 1 + ρ|hm |2 . (23)
This means that the maximal transmit power that can be
allocated to the n-th user is given by It is easy to show that the use of CR-NOMA always achieves
( ) a larger sum rate since
2
|hm |2 − Iρ
an = max 0, , (21) Rm + Rn − R̃m (24)
|hm |2 (1 + I) !
|hm |2 a2m
which means that an = 0 if |hm |2 < ρI . Note that the choice of = log 1 + 2 2 1 + log 1 + ρa2n |hn |2
|hm | an + ρ
an in (21) is a function of the channel coefficient hm , unlike
the constant choice of an used by F-NOMA in the previous − log 1 + ρ|hm |2
section. 1 + ρa2n |hn |2
Since the m-th user’s QoS can be guaranteed due to (20), = log ≥ 0.
1 + ρa2n |hm |2
we only need to study the performance experienced by the n-
th user. Particularly the outage performance of the n-th user This superior performance gain is not surprising, since the key
is defined as follows: idea of CR-NOMA is to serve a user with a strong channel
condition, without causing too much performance degradation
Pno , P log(1 + a2n ρ|hn |2 ) < R , (22) to the user with a poor channel condition.
In addition, it is of interest to study how much the averaged
and the following theorem provides an exact expression for rate gain CR-NOMA can yield, i.e., E {Rn }. This averaged
the above outage probability as well as its approximation. rate gain can be calculated as follows:
Theorem 2. Suppose that the transmit power allocated to the Z ∞Z ∞
x−b
n-th user can satisfy the predetermined SINR threshold, I, as E {Rn } = log 1 + ρy (25)
b x xa
shown in (21). The n-th user’s outage probability achieved
by CR-NOMA is given by (19), where g(y) = e−y , G(y) = × f|hm |2 ,|hn |2 (x, y)dydx.
5
M−n
X n−1−m
X n − 1 − m Z aǫ1
M −n [G(b)]m+i M−n
Pon = ̟5 (−1)i + (−1)i g(y) (1 − G(y)) G(y)n−1−m−i ̟1 (19)
i=0
i m + i i=0
i b
n−1−m
G(y)m+i − G(b)m+i X n − 1 − m Z b+aǫ1
G(y)m+i − G(b)m+i
× dy + (−1)i (1 − G(y))M−n G(y)n−1−m−i
m+i i=0
i aǫ1 m+i
m+i !
n−1−m
G 1− baǫ1 − G(b)m+i
X n − 1 − m Z ∞
M−n
|hn |2
× ̟1 g(y)dy + (−1)i g(y) (1 − G(y)) G(y)n−1−m−i ̟1 dy.
i=0
i b+aǫ 1
m+i
Now applying Eq. (3.352.2) in [12], the average rate gain can
be expressed as follows: −2
10
P(Rm + Rn < R̄m + R̄n )
Z ∞
̟1
E {Rn } = f (x)[F (x)]m−1 (27) −3
10
n=3,m=2
M −n+1 b
2
x a
x−b M−n+1 e ρ(x−b) −4
10
× log 1 +
ρ (1 − F (x)) −
a ln 2 n=5,m=2
−5
(M − n + 1)xa 10
×Ei −(M − n + 1)x − dx,
ρ(x − b)
−6
10
5 10 15 20 25 30
where Ei(·) denotes the exponential integral. SNR in dB
(b) m = 2
IV. N UMERICAL S TUDIES
Fig. 1. The probability that F-NOMA realizes a lower sum rate than
In this section, computer simulations are used to evaluate the conventional MA. M = 5. The analytical results are based on Theorem 1.
performance of two NOMA schemes as well as the accuracy
of the developed analytical results.
6
A. NOMA with fixed power allocation have been developed to show that both P(Rm > R̄m ) and
P(Rn < R̄n ) are decreasing with increasing SNR, which is
In Fig. 1, the probability that F-NOMA realizes a lower
confirmed by the simulation results in Fig. 3. The reason that
sum rate than conventional MA, i.e., P(Rm + Rn < R̄m +
P(Rm > R̄m ) is reduced at a higher SNR is that the m-
R̄n ), is shown as a function of SNR. a2m = 45 and a2n = 15 .
th user’s rate in an F-NOMA system becomes a constant,
As can be seen from both figures, F-NOMA almost always |hm |2 a2m
a2m
outperforms conventional MA, particularly at high SNR. The i.e., log 1 + |hm |2 a2 + 1 → log 1 + a2 , which is much
n ρ ρ→∞ n
simulation results in Fig. 1 also demonstrate the accuracy of smaller than R̄m , at high SNR. On the other hand, it is more
the analytical results provided in Theorem 1. For example, likely for Rn to be larger than R̄n since there is a factor of 21
the exact expression of P(Rm + Rn < R̄m + R̄n ) shown outside of the logarithm of R̄n .
in Theorem 1 matches perfectly with the simulation results,
whereas the developed approximation results become accurate 0
10
at high SNR.
Another important observation from Fig. 1 is that increasing
n, i.e., scheduling a user with a better channel condition, will −1
10
make the probability decrease at a faster rate. This observation
is consistent to the high SNR approximation results provided
in Theorem 1 which show that the slope of the curve for the
probability P(Rm +Rn < R̄m + R̄n ) is a function of n. In Fig. −2
10
0
Fig. 3. The behavior of individual data rates achieved by F-NOMA, P(Rn <
10
Simulation results, m=1 R̄n ) and P(Rm > R̄m ). M = 5. The analytical results are based on (14)
Asymptotic results, m=1 and (17).
Simulation results, m=2
Asymptotic results, m=2
−1
10
P(Rm + Rn − R̄m − R̄n < R)
9
0
Simulation results, m=1, n=m+1
10 Analytical results, m=1, n=m+1
8 Simulation results, m=2, n=m+1
Analytical results, m=2, n=m+1
Simulation results, m=3, n=m+1
7
Analytical results, m=3, n=m+1
−1
10 Simulation results, m=4, n=m+1
6 Analytical results, m=4, n=m+1
m=1
5
P(Rn < R)
E(Rn )
−2
10
4
Simulation results 3
Analytical results
−3 1
10 An auxiliary line with ρm
2
m=2
1
−4
10
5 10 15 20 25 30 0
SNR in dB 5 10 15 20 25 30
SNR in dB
Fig. 4. The outage probability for the n-th user achieved by CR-NOMA, (a) n = m + 1
when n = M . M = 5, R = 1 bit per channel use (BPCU) and I = 5. The
9
analytical results are Theorem 2. m=1, n=M
m=1, n=M−2
8 m=2, n=M
m=2, n=M−2
0 m=M−1, n=M
10 7
I=5 6
5
E(Rn )
4
−1
P(Rn < R)
10
3
2
n=M
n=M−1
n=M−2 I=1 1
n=M−3
−2 0
10 5 10 15 20 25 30
SNR in dB
Fig. 6. The ergodic data rate for the n-th user achieved by CR-NOMA.
Fig. 5. The outage probability for the n-th user achieved by CR-NOMA. M = 5 and I = 5. Analytical results are based on (27).
m = 1, M = 5, and R = 1 BPCU.
has been studied. For F-NOMA, both analytical and numerical A PPENDIX
results have been provided to demonstrate that F-NOMA
can offer a larger sum rate than orthogonal MA, and the Proof for Theorem 1: Observe that the sum rate achieved by
performance gain of F-NOMA over conventional MA can be NOMA can be expressed as follows:
further enlarged by selecting users whose channel conditions
1 + ρ|hm |2
are more distinctive. For CR-NOMA, the channel quality of the Rm + Rn = log 2 2
1 + ρa2n |hn |2 .
user with a poor channel condition is critical, since the transmit ρ|hm | an + 1
power allocated to the other user is constrained following the On the other hand the sum rate achieved by conventional MA
concept of cognitive radio networks. One promising future is given by
direction of this paper is that the analytical results can be used
as criteria designing distributed approaches for dynamic user 12 21
R̄m + R̄n = log 1 + ρ|hm |2 1 + ρ|hn |2 . (28)
pairing/grouping.
Now the addressed probability can be written as follows:
the binomial expansion, the joint pdf can be further written as Now the probability Q1 can be approximated as follows:
follows:
X
n−1−m Z
n − 1 − m (−1)i ̟2 1 y
n−1−m−i
Q 1 ≈ ̟1
X
n−1−m
n−1−m
i=0
i m + i ̟4 ρ ρ
f|hm |2 ,|hn |2 (x, y) = ̟1 (−1)i f (x) m+i m+i !
i=0
i y ̟2 − y
M−n
× − dy
× f (y)[F (x)]m−1+i (1 − F (y)) (F (y))n−1−m−i . ρ ρ(1 + y)
n−1−m Z
̟1 X n − 1 − m (−1)i ̟2 n−1−m−i
Therefore the probability Q1 can now be evaluated as follows: ≈ n y
ρ i=0
i m + i ̟4
m+i !
n−1−m
! ̟ 2 − y
n − 1 − m (−1)i ̟2 × y m+i −
Z
Q 1 = ̟1
X
f (y)(F (y))n−1−m−i dy. (37)
i m + i ̟4 (1 + y)
i=0
m+i !
M −n m+i ̟2 − y The high SNR approximation for Q2 is more complicated.
× (1 − F (y)) [F (y)] − F dy.
1+y After applying the series expansion of the exponential func-
(34) tions in (36), we have
i−1
∞ n−1 i+j (M−n+j+1) ̟2i
X ̟3 X n − 1 (−1) ρi−1
On the other hand, Q2 can be calculated as follows: Q2 = (38)
i=0
ρ j=0
j i!
Z ∞ n−1
∞ X (−1)i ̟3 ̟2i X n − 1
Q2 = ̟3 f (y) (F (y)) n−1
(1 − F (y))M−n
dy (35) = i
(−1)j (M − n + j + 1)i−1 .
i!ρ j
Z̟∞
2
n−1
i=0 j=0
1 (M −n+1)y y
= ̟3 e − ρ 1 − e− ρ dy. Consider Q2 as a function of ̟2 , and Q2 = 1 is true for
̟2 ρ
̟2 = 0, as can be seen from the definition of Q2 in (33).
On the other hand by letting ̟2 = 0 in (36), we obtain the
By applying the binomial expansion, Q2 can be written as following equality:
follows:
n−1
X
n−1 1
n−1 ̟3 (−1)j = 1. (39)
̟3 X n − 1 Z ∞
(M −n+j+1)y j M −n+j+1
Q2 = (−1)j
e− ρ dy (36) j=0
ρ j=0
j ̟2
Consequently Q2 can be rewritten as follows:
n−1
X n − 1
̟3 ρ (M −n+j+1)̟2
= (−1)j e− ρ . X∞ n−1
(−1)i ̟3 ̟2i X n − 1
ρ j=0
j M −n+j +1 Q2 = 1 + (−1)j (40)
i!ρ i j
i=1 j=0
i−1
Combining (34) with (36), the first part of the theorem is X i−1
× (M − n + 1)i−1−l j l .
proved. l
l=0
To find high SNR approximations for Q1 and Q2 , first
observe that the integral in (34) is calculated for the range Recall the following sums of the binomial coefficients (Eq.
of 0 ≤ y < ̟2 . At high SNR, the two functionsy f (y) and (0.154.3) in [12]):
F (y) can be approximated as follows: f (y) = 1ρ e− ρ ≈ ρ1 and n−1
y X n − 1
F (y) = 1 − e− ρ ≈ yρ , since 0 ≤ y ≤ ̟2 and ρ → ∞. (−1)j j l = 0, (41)
̟2 −y j=0
j
Define u(y) = 1+y . It is straightforward to show
for n − 2 ≥ l ≥ 1 and
0 ≤ u(y) ≤ ̟2 , n−1
X n − 1
(−1)j j n−1 = (−1)n−1 (n − 1)!. (42)
j
for 0 ≤ y ≤ ̟2 , since dg(y)
dy < 0. Therefore at high SNR, we
j=0
b
factor. With these steps, the probability can be approximated b) If |hn |2 < b + aǫ1 , we have aǫ
1− |h 1|2
> |hn |2 ,
as follows: and Q3 can be written as follows:
n
(−1)n ̟3 ̟2n
Q2 ≈ 1 + (−1)n−1 (n − 1)! (43)
Q3 = P aǫ1 < |hn |2 < b + aǫ1 , b < |hm |2 < |hn |2 ,
n!ρn
̟3 ̟2n which is again conditioned on b < aǫ1 .
=1− .
nρn Therefore, the probability Q3 can be written as follows:
Combining (37) and (43), the second part of the theorem is
also proved. Q3 = P b ≤ |hn |2 < aǫ1 , |hn |2 > |hm |2 > b (48)
2 2 2
+ P |hn | < b + aǫ1 , b < |hm | < |hn |
Proof for Theorem 2: !
Recall that the outage performance of the n-th user is given 2 2 b
+ P |hn | > b + aǫ1 , b < |hm | < .
by 1 − |haǫn1|2
P log(1 + a2n ρ|hn |2 ) < R (44) The first probability in (48) can be calculated by applying (32)
! !
2 I
|hm | − ρ I as follows:
=P log 1 + ρ|hn |2 < R, |hm |2 >
2
|hm | (1 + I) ρ P b ≤ |hn |2 < aǫ1 , |hn |2 > |hm |2 > b
| {z } n−1−m
X n − 1 − m Z aǫ1
Q3 i M−n
= (−1) g(y) (1 − G(y))
2 I i=0
i b
+ P |hm | < . Z y
ρ
| {z } × G(y)n−1−m−i ̟1 g(x)[G(x)]m−1+i dxdy
Q4 b
The first factor in the above equation can be calculated as X
n−1−m
n−1−m
Z aǫ1
follows: = (−1) i
g(y) (1 − G(y))M−n
! i=0
i b
|hm |2 − ρI I m+i
Q3 =P 2 2
|hn | < ǫ1 , |hm | > . (45) n−1−m−i G(y) − G(b)m+i
|hm |2 (1 + I) ρ × G(y) ̟1 dy.
m+i
Recall that the users’ channels are ordered, i.e., |hm |2 < |hn |2 , Following similar steps, the second probability in (48) can be
which brings additional constraints to the integral range in the expressed as
above equation. The constraints can be written as follows:
( ) P aǫ1 < |hn |2 < b + aǫ1 , b < |hm |2 < |hn |2 (49)
b n−1−m Z
b < |hm |2 < min |hn |2 , . (46) X n−1−m b+aǫ1
M−n
1 − |haǫn1|2 = (−1)i g(y) (1 − G(y))
i=0
i aǫ1
The outage events due to these constraints can be classified as m+i
follows: n−1−m−i G(y) − G(b)m+i
× G(y) ̟1 dy.
1) If |hn |2 < aǫ1 , we have the following: m+i
! The third probability in (48) can be calculated as follows:
|hm |2 − Iρ
P |hn |2 < ǫ1 (47) !
|hm |2 (1 + I) 2 2 b
P |hn | > b + aǫ1 , b < |hm | < (50)
1 − |haǫn1|2
= P |hm |2 (|hn |2 − ǫ1 a) < b|hn |2 = 1.
n−1−m
X n − 1 − m Z ∞
Therefore the probability Q3 can be expressed as fol- i M−n
lows: 1 = (−1) g(y) (1 − G(y))
i=0
i b+aǫ1
Q3 = P b ≤ |hn |2 < aǫ1 , |hn |2 > |hm |2 > b . Z b
aǫ1
1−
2) If |hn |2 > aǫ1 , there are two possible events: × G(y)n−1−m−i |hn |2
̟1 g(x)[G(x)]m−1+i dxdy
b
a) If |hn |2 > b + aǫ1 , we have 1− baǫ1 < |hn |2 , n−1−m
X Z ∞
|hn |2 n−1−m M−n
and Q3 can be written as follows: = (−1)i g(y) (1 − G(y))
! i=0
i b+aǫ1
b m+i !
2 2
Q3 = P |hn | > b + aǫ1 , b < |hm | < . b
1− aǫ1
|hn |2
G 1− aǫ1 − G(b)m+i
|hn |2
1 It
× G(y)n−1−m−i ̟1 dy.
is assumed that b ≤ aǫ1 here. For the case of b > aǫ1 , the outage m+i
probability can be calculated in a straightforward way, since there will be
fewer events to analyze. Note that the same diversity order will be obtained Note that Q4 can be obtained easily by applying (32) and the
regardless of the choice of b and aǫ1 . first part of the theorem is proved.
11
Recall that the first probability in (48) can be expressed as Again applying the binomial expansion, the above probability
follows: can be further expanded as follows:
|hm |2 aǫ1
P b ≤ |hn |2 < aǫ1 , |hn |2 > |hm |2 > b 2
P b < |hm | < b + aǫ1 , b + aǫ1 < |hn | <2
n−1−m
X n − 1 − m Z aǫ1 |hm |2 − b
i
= ̟1 (−1) g(y) n−1−m
X
n−1−m
Z b+aǫ1
i=0
i b = ̟1 (−1)i g(x)[G(x)]m−1+i
m+i
i b
M−n n−1−m−i G(y) − G(b)m+i i=0
× (1 − G(y)) G(y) dy, M−n
X M − n Z G( xaǫ1
)
m+i x−b
n−1−m−i+j
× (−1)j [G(y)] dG(y)dx
where the integral range is 0 ≤ y ≤ (aǫ1 ). Note that when j=0
j G(b+aǫ1 )
ρ → ∞, ǫ1 approaches zero, which means y → 0, g(y) ≈ 1 n−1−m Z b+aǫ1
and G(y) ≈ 1 − y. Therefore the above probability can be
X n−1−m
= ̟1 (−1)i g(x)[G(x)]m−1+i
approximated as follows: i=0
i b
M−n
P b ≤ |hn |2 < aǫ1 , |hn |2 > |hm |2 > b (51) X M − n (−1) j
n−1−m × (53)
X n−1−m j=0
j n−1−m−i+j
≈ ̟1 (−1)i !
i=0
i
xaǫ1
n−m−i+j
n−m−i+j
Z aǫ1 m+i
× G − [G(b + aǫ1 )] dx.
n−1−m−i y − bm+i x−b
× y dy
b m+i Compared to (50), the above equation is more complicated;
n−1−m
X n − 1 − m however, this expression is more suitable for asymptotic stud-
≈ ̟1 (−1)i ies, as explained in the following.
i
i=0
Recall that the integral range in (53) is b < x < b + aǫ1 .
(aǫ1 )n −bn m+i (aǫ1 )
n−m−i
−bn−m−i When ρ → 0, we have b → 0 and b + aǫ1 → 0, which
m+i+1 − b n−m−i
× → ρ−n . implies x → 0. Therefore the following approximation can be
m+i obtained:
Following similar steps, the second probability in (48) can 2 2 |hm |2 aǫ1
be approximated as follows: P b < |hm | < b + aǫ1 , b + aǫ1 < |hn | <
|hm |2 − b
P aǫ1 < |hn |2 < b + aǫ1 , b < |hm |2 < |hn |2 → ρ−n . (52) (54)
n−1−m
The exact diversity order of the third probability in (48) is X n−1−m
difficult to obtain. Particularly the expression in (50) is difficult ≈ ̟1 (−1)i
i=0
i
to use for asymptotic studies, since the range of y is not limited
M−n
X M − n Z b+aǫ1
and those manipulations related to high SNR approximations (−1)j
cannot be applied here. We first rewrite (50) in an alternative × xm−1+i
j=0
j n − 1 − m − i + j b
form as follows: !
! n−m−i+j
xaǫ1 n−m−i+j
b × G − [b + aǫ1 ] dx.
P |hn |2 > b + aǫ1 , b < |hm |2 < x−b
1 − |haǫn1|2
|hm |2 aǫ1
First focus on the following integral which is from the above
= P b < |hm |2 < b + aǫ1 , b + aǫ1 < |hn |2 < . equation:
|hm |2 − b Z b+aǫ1 n−m−i+j
m−1+i xaǫ1
|hm |2 aǫ1 x G dx (55)
Note that b + aǫ1 < |hm |2 −b always holds since |hm |2 < b x−b
b Z aǫ1
aǫ1 .
h i
abǫ1 n−m−i+j
1− |hn |2 ≈ (b + z)m−1+i 1 − e− z dz.
Now applying the joint pdf of the two channel coefficients, 0
we obtain the following expression: We can find the following bounds for the above integral:
|hm |2 aǫ1
Z b+aǫ1
P b < |hm |2 < b + aǫ1 , b + aǫ1 < |hn |2 < xm−1+i dx (56)
|hm |2 − b b
n−1−m Z b+aǫ1 Z b+aǫ1 n−m−i+j
X n−1−m xaǫ1
= ̟1 (−1)i g(x)[G(x)]m−1+i ≥ xm−1+i G dx
i b b x −b
i=0 " #
Z G( xaǫ Z aǫ1 n−m−i+j
x−b )
1
m−1+i 1
× [G(y)]n−1−m−i (1 − G(y))M−n dG(y)dx. ≥ (b + z) 1− dz,
G(b+aǫ1 ) 0 1 + abǫ
z
1
12
Z aǫ1 +abǫ1
n−m−i+j (w + b − abǫ1 )m−1+i
= (abǫ1 ) dz
abǫ1 wn−m−i+j
m−1+i
X
= (abǫ1 )n−m−i+j (b − abǫ1 )m−1+i−k
k=0
Z aǫ1 +abǫ1 m−1+i
X
× wk−(n−m−i+j) dz , ξk .
abǫ1 k=0