 Research
 Open Access
 Published:
Nonorthogonal multiple access in a downlink multiuser beamforming system with limited CSI feedback
EURASIP Journal on Wireless Communications and Networking volume 2016, Article number: 239 (2016)
Abstract
Nonorthogonal multiple access (NOMA) has been recognized as a promising multiple access technology for fifth generation (5G) mobile communication system. However, the advantage of NOMA is only verified under the ideal condition that the transmitter has the perfect knowledge of channel state information (CSI). In this paper, NOMA downlink multiuser system, in which the transmitter acquires the CSI through limited feedback channel, is studied. Two traditional beamforming technologies, zeroforcing beamforming and random beamforming, are investigated in the NOMA downlink multiuser system. Making use of the imperfect CSI feedback, channel direction information (CDI), and channel quality indicator (CQI), we propose the user selection scheme to reduce the interference between the NOMA users. Furthermore, a power allocation scheme is proposed to improve the sumrate of NOMA system. Numerical results show that NOMA system with limited feedback channel still gains larger system rate than traditional orthogonal multiple access system. It is also shown that random beamforming is more suitable for the NOMA system with limited CSI feedback.
1 Introduction
As a promising multiple access technology for fifth generation (5G) wireless systems, nonorthogonal multiple access (NOMA) has received many attentions recently, as it can improve the system capacity and spectrum efficiency [1–3]. Besides, compared to orthogonal multiple access (OMA) systems, it has the exciting advantage of facilitating ubiquitous accessing of wireless nodes from heterogeneous networks [2]. Therefore, NOMA has been treated as a candidate technology of air interface for future communication systems.
There have been some early work of analyzing and optimizing the NOMA systems. In [4] and [5], the systemlevel performances of NOMA system have been proven to be superior than that of the OMA system. Ding et al. in [6] demonstrated that NOMA with appropriate transmit power allocation can achieve superior system sumrates and better outage performances than the OMA system. In [7], a cooperative NOMA transmission scheme which makes use of users with better channel conditions as relays to transmit messages for users with poor channel conditions was proposed. In [8], the authors proposed a NOMAbased downlink cooperative cellar system, where the transmitter transmits information to two paired mobile users simultaneously with the help of a dedicated relay station. A NOMA scheme to minimize spectrum usage was proposed in [9]. In [10], a NOMA with coordinated relay transmission was introduced, in which a base station (BS) directly communicates with NOMA user 1 while communicating with NOMA user 2 via a relay. The impact of user pairing on 5G NOMA system was investigated in [11]. For coordinated twopoint systems, [12] showed that NOMA can bring celledge users to obtain a reasonable transmission rate without suffering loss of the near users’ rates. By [13] and [14], it was shown that multiantenna NOMA system outperforms the traditional time division multiple access (TDMA) system. To further enhance the performance of NOMA, the impact of applying the successive interference cancelation (SIC) receiver in downlink NOMA was addressed in [15]. User clustering scheme and precoding matrix optimization for the NOMA system were studied in [16]. In [17], the user selection and power schedule scheme for downlink NOMA system based on zeroforcing beamforming (NOMAZFBF) were proposed to improve the NOMA system capacity. An uplink NOMA system was proposed in [18]. All the above work is proposed to improve the overall performance of the NOMA system. On the other hand, an important issue for NOMA system, the fairness between NOMA users, is investigated in [19–21].
Most of the aforementioned results are based on the assumption that the perfect channel state information (CSI) is known at the transmitter. In practice, however, it is difficult or impossible to let the transmitter have the perfect knowledge of CSI [22]. Thus, whether the advantage of NOMA still appears should be checked and answered. In [23], the performance of downlink NOMA system with channel estimation error was analyzed and it was shown that NOMA still obtains system rate gains compared to traditional OMA systems. Bedsides, a channel correlation matrixbased CSI feedback scheme was proposed in massiveantenna NOMA system [24]. One promising approach to provide the transmitter with imperfect CSI is limited CSI feedback, where each user quantizes its CSI and feeds the corresponding quantized index to the transmitter [25]. To the best of our knowledge, there is little research on the NOMA system with limited CSI feedback.
In this paper, we intend to investigate the performance of NOMA system in downlink multiuser beamforming system with limited CSI feedback.^{1} Two beamforming technologies in downlink NOMA system, zeroforcing beamforming (NOMAZFBF) and random beamforming (NOMARBF), are employed in our system model. Via the limited feedback channel, the channel direction information (CDI) and channel quality indicator (CQI) are fed back to the BS. With the imperfect CSI, we propose the user selection scheme to reduce the interference between the NOMA users and the power allocation scheme to improve the sumrate of NOMA system. Finally, numerical results show that the NOMABF system with our proposed schemes can improve the sumrate performance under condition of the limited CSI feedback. We also compare the performances of NOMAZFBF and NOMARBF, and it is shown that NOMARBF has better performance than NOMAZFBF in the limited CSI feedback case.
This paper is organized as follows. We provide the system model of the downlink NOMA and introduce the SIC detection mechanisms in Section 2. Section 3 presents the limited feedback model of the NOMA system in terms of RBF and ZFBF and introduces the proposed user selection schemes for both beamforming schemes. Power optimization for NOMA system is presented in Section 4. Simulation results are investigated in Section 5, and we conclude this paper in Section 6.
We adopt the following notations. Uppercase boldface letters denote matrices, and lowercase boldface letters denote vectors. Sets are indicated by uppercase calligraphic letters. \(\mathcal {C}\) denotes the size of a set \(\mathcal {C}\). A ^{T}(a ^{T}) denotes the transpose of a matrix A (vector a), A ^{H}(a ^{H}) denotes the conjugate transpose of a matrix A (vector a), and A ^{†}=A ^{H}(A A ^{H})^{−1} stands for the pseudoinverse of A. ∥∙∥^{2} is the twonorm of a vector. \(\mathbb E\{\bullet \}\) represents the expectation operator.
2 System model
We consider a downlink multiuser BF transmission system consisting of a single base station (BS) with K antennas and M candidate users with one antenna (M≥2K), as depicted in Fig. 1. Define the candidate user set as \(\mathcal {U}\), i.e., \(\mathcal {U}=M\). The BS simultaneously transmits K beams to provide multiuser downlink transmission, and each beam serves one user cluster, which includes two or more users to perform NOMA. For simplicity of analyzing, we assume the user cluster contains two users like [7] and [17]. To exploit the advantage of NOMA, users in one cluster have different target data rates. The user, who requires a higher data rate, is named the highrate (HR) user. The other one with a lower transmission rate is named the lowrate (LR) user. Denote the HR user set as \(\mathcal {U}_{h}\) and the LR user set as \(\mathcal {U}_{l}\). \(\mathcal {U}_{h}(k)\) and \(\mathcal {U}_{l}(k)\) stand for the index numbers of the HR user and LR user in the kth cluster, respectively. Note that in the kth cluster, we always denote the HR user with “1” and the LR user with “2” to distinguish the related signals, i.e., \( k1=\mathcal {U}_{h}(k)\) and \( k2=\mathcal {U}_{l}(k)\).
The BS tries to send \(\sum _{k=1}^{K}\mathbf {w}_{k}x_{k} \) with power \(p_{k}=\frac {P}{K\\mathbf {w}_{k}\^{2}}\), where w _{ k } is the K×1 BF vector for the kth cluster, P is the total transmitted power, and x _{ k } is the superposition symbol of the transmitted symbols for the kth cluster, i.e., \(x_{k}=\sqrt {\alpha _{k}}s_{k1}+\sqrt {1\alpha _{k}}s_{k2}\). Here, s _{ k1} and s _{ k2} represent the transmitted symbol for the HR and LR users in the kth cluster, respectively. We assume that the information symbols s _{ ki },i=1,2 have unit energy, i.e., \(\mathbb {E}\{\s_{ki}\^{2}\}=1\). Additionally, α _{ k }∈(0,1) is the power allocation coefficient between the HR user and the LR user in the kth user cluster. Denote the 1×K vectors h _{ k1} and h _{ k2} as the channel coefficient vectors of the HR user and the LR user in the kth cluster, respectively. Herein, h _{ ki } has zero mean and unit variance i.i.d complex Gaussian entries. Therefore, the received signal y _{ ki } at the two users in the kth cluster can be given as
where n _{ ki } is the receiver noise and follows complex Gaussian with zero mean and unit variance, i.e., \(n_{ki}\sim \mathcal {CN}(0,1)\). Observing (1), the first term on the righthand side of the equality sign is a useful signal for the kth cluster and the second term is the interference from other K−1 beams. Following the results in [17], we define the indicator function for HR and LR users as
Note that g _{ k1} and g _{ k2} can be treated as the received signaltointerferenceplusnoise ratio (SINR) with respect to x _{ k } at the HR user and LR user, respectively. Furthermore, x _{ k } contains both s _{ k1} and s _{ k2}. Thus, g _{ ki } is not the SINR with respect to s _{ ki }. We define g _{ ki } herein to determine the detection order at the receivers.
2.1 Successive interference cancelation receiver
As both y _{ k1} and y _{ k2} include the intrabeam interference and users in one cluster cannot exchange its received information, SIC is implemented to remove the intrabeam interference in NOMA system [3–17]. As the system capacity is up to the detecting order of the SIC receiver, we consider two cases:
2.1.1 Case 1. Detect s _{ k2 } firstly
In this case, s _{ k2} is firstly detected by both users. Then, the LR user directly detects its desired information from y _{ k2}. So, the maximum achievable rate of the LR user is
Yet, the HR user needs to remove \(\mathbf {h}_{k1}\mathbf {w}_{k}\sqrt {1\alpha _{k}}s_{k2}\) from y _{ k1} and detect s _{ k1} subsequently. To avoid error propagation, s _{ k2} should be detected correctly by the HR user. As R _{ k2} is directly determined by the LR user, the HR should provide large enough channel capacity to ensure detecting s _{ k2} without error. It means R _{ k,2→1}≥R _{ k2}, where
stands for the maximum achievable rate for the HR user to detect s _{ k2}. Thus, after that, the maximum achievable rate of the HR user is
To ensure R _{ k,2→1}≥R _{ k2}, by (2), there must be
2.1.2 Case 2. Detect s _{ k1 } firstly
In this case, s _{ k1} is firstly detected by both users. Hence, the LR user needs to remove \(\mathbf {h}_{k2}\mathbf {w}_{k}\sqrt {\alpha _{k}}s_{k1}\) from y _{ k2} and detect s _{ k2} from the remaining signal. Therefore, to prevent error propagation at the LR user, similar to Case 1, the condition R _{ k,1→2}≥R _{ k1} is required, where R _{ k,1→2} denotes the maximum achievable rate for the LR user to detect s _{ k1}. Herein, R _{ k1}, R _{ k,1→2}, and R _{ k2} are
and
Due to (7) and (8), R _{ k,1→2}≥R _{ k1} is equivalent to
Like Case 1, (10) is the necessary condition to detect s _{ k1} firstly without error propagation. According to (6) and (10), we know that the decoding order of the SIC receivers in each cluster is determined by the values of g _{ k1} and g _{ k2}. In summary, if g _{ k1}≥g _{ k2}, detect s _{ k2} firstly and vice versa. Specially, if g _{ k1}=g _{ k2}, both orders work well. We herein choose Case 1 as default. To let the users in a cluster know the detection order, the BS can use the flag bit to inform HR and LR users.
In the above analysis, we assume that the BS has the perfect CSI to determine the beamforming vectors and the detection order. In practice, it is difficult to acquire the perfect CSI at the transmitter. One promising method to obtain g _{ k1} and g _{ k2} is to let the users feed back their related channel information by limited feedback channels.
3 NOMA system with limited CSI feedback
In this paper, we assume that all M candidate users can perfectly estimate their channel state information and have to send CSI via a finiterate, zerodelay, and errorfree feedback channel, which is usually modeled in multiuser multipleinput and multipleoutput (MIMO) systems [26]. In the limited feedback channel, CDI and CQI of candidate users are fed back to the BS. After that, the BS uses its obtained CDI and CQI to design beamforming vectors w _{ k },k=1,2,…,K and determines the detection orders in these K clusters. To be compatible with existing mobile communication systems, we consider two classic beamforming technologies: zeroforcing beamforming (ZFBF), which is a linear precoding and easy to be implemented, and random beamforming (RBF), which is specially designed for the transmitter with limited CSI feedback. Since different beamforming technologies may require different CDI and CQI, we next separately discuss the feedback models for ZFBF and RBF. Additionally, the imperfect feedback scenario, e.g., latency and noise in the limited feedback channel, is left for our further study.
3.1 Zeroforcing beamforming
ZFBF technology is widely studied in multiantennabased wireless systems, as it incurs low computing complexity of precoding and decoding [26]. So, we first address the NOMA downlink multiuser system with ZFBF (NOMAZFBF).
3.1.1 CDI feedback model
All M candidate users quantize the direction of their channel vector \(\tilde {\mathbf {h}}_{m}=\mathbf {h}_{m}/\\mathbf {h}_{m}\, 1\leq m\leq M\) to a unit norm vector \(\hat {\mathbf {h}}_{m}\) which is chosen from a codebook. Each user has its own codebook formed by N=2^{B} unit norm row vectors which are generated by a random vector quantization (RVQ) algorithm in [26]. For the mth user, the codebook stored by both the BS and mth user is
and \(\hat {\mathbf {h}}_{m}=\mathbf {c}_{m,n}\) is based on the minimum distance criterion:
Thus, each user just needs to feed back the quantization index n with B bits to the BS.
In this section, we assume that K HR users and K LR users have been selected from M candidate users. How to select these 2K users in K user clusters is illustrated later. After obtaining K HR users, we define \(\hat {\mathbf {H}}=\left [\hat {\mathbf {h}}^{T}_{11},\ldots,\hat {\mathbf {h}}^{T}_{K1}\right ]^{T}\) as the HR user CDI vector and W as the beamforming matrix. By the ZFBF method in [26], the beamforming matrix is
where \(\hat {\mathbf {H}}^{\dag }\) indicates the pseudoinverse of \(\hat {\mathbf {H}}\) and \(\hat {\mathbf {H}}^{\mathrm {H}}\) is the conjugate transpose of matrix \(\hat {\mathbf {H}}\). Thus, the beamforming vector of the kth beam, w _{ k }, is the kth column of W and satisfies
3.1.2 CQI feedback model
To decide the SIC detecting order and optimize system capacity, the BS needs to know g _{ k1} and g _{ k2}. As using CDI to calculate g _{ k1} and g _{ k2} incurs great distortion, each user has to provide the CQI information for the BS to estimate g _{ k1} and g _{ k2}. For the mth user, the angle θ _{ m }∈[0,π/2] between vectors \(\tilde {\mathbf {h}}_{m}\) and \(\hat {\mathbf {h}}_{m}\) is given by \(\cos \theta _{m}=\tilde {\mathbf {h}}_{m}\hat {\mathbf {h}}^{\mathrm {H}}_{m}\). Following the decomposition method in [26], there is
where e _{ m } indicates the quantization error vector and \(\tilde {\mathbf {e}}_{m}=\frac {\mathbf {e}_{m}}{\\mathbf {e}_{m}\}\).
First, we start from g _{ k1}. Define \(\tilde {\mathbf {w}}_{k}=\frac {\mathbf {w}_{k}}{\\mathbf {w}_{k}\}\). So, according to (14), there are \(\hat {\mathbf {h}}_{k1}\tilde {\mathbf {w}}_{k}=\frac {1}{\\mathbf {w}_{k}\}\) and \(\mathbf {e}_{k1}\tilde {\mathbf {w}}_{k}\approx 0\). Therefore, we have
Since the quantization error vectors are random variables, we should get the expectation of (16) with respect to \(\tilde {\mathbf {e}}_{k1}, k=1,2,\ldots,K\). Note that both \(\tilde {\mathbf {e}}_{k1}\) and \(\tilde {\mathbf {w}}_{j}\) are isotropically distributed on the K−1 dimensional hyperplane orthogonal to \(\hat {\mathbf {h}}_{k1}\). Also, as \(\tilde {\mathbf {w}}_{j}\) is determined by \(\hat {\mathbf {H}}\), we infer that \(\tilde {\mathbf {w}}_{j}\) is independent of \(\tilde {\mathbf {e}}_{k1}, k1\neq j\). Therefore, \(\tilde {\mathbf {e}}_{k1}\tilde {\mathbf {w}}_{j}^{2}\) is a betadistributed random variable with parameters (1,K−2), and its mean value is \(\frac {1}{K1}\). Furthermore, there is \(\mathbb {E}(\sum ^{K}_{j=1,j\neq k}\tilde {\mathbf {e}}_{k1}\tilde {\mathbf {w}}_{j}^{2})=1\). As a result, we have
where Jensen’s inequality is applied in step (a). Because these M candidate users have no idea on the beamforming matrix W and selected HR and LR users before CSI feedback, according to (17), all candidate users have to transmit their CQI as
For g _{ k2}, similarly, we also define \(\tilde {\mathbf {h}}_{k2}=\mathbf {h}_{k2}/\\mathbf {h}_{k2}\\), which can be composed into \(\tilde {\mathbf {h}}_{k2}=\left (\tilde {\mathbf {h}}_{k2}\hat {\mathbf {h}}^{H}_{k1}\right)\hat {\mathbf {h}}_{k1}+\mathbf {e}_{k2} \). Here, define ϕ _{ k }∈[0,π/2] as the angle between \(\tilde {\mathbf {h}}_{k2}\) and \(\hat {\mathbf {h}}_{k1}\), i.e., \(\cos \phi _{k}=\tilde {\mathbf {h}}_{k2}\hat {\mathbf {h}}_{k1}^{H}\). Thus, there is
Note that key step (b) is based on the assumption that \(\mathbf {e}_{k2}\tilde {\mathbf {w}}_{k} \approx 0\), which is guaranteed by the user selection algorithm in the next subsection. Like (17), we can obtain
where η _{ k }∈[0,π/2] is the angle between \(\hat {\mathbf {h}}_{k2}\) and \(\hat {\mathbf {h}}_{k1}\) and step (c) is due to the inequality ϕ _{ k }≤θ _{ k2}+η _{ k }. In step (d), in order to reduce the intrabeam interference, the BS should try to select the LR user to let η _{ k } as small as possible. By (20), each candidate user needs to send CQI as
Since each candidate cannot determine whether it is a HR user or LR user, observing (18) and (21), the CQI of candidate user m can be written as
Summarily, each candidate user feeds back its CDI \(\hat {\mathbf {h}}_{m}\) and CQI f(h _{ m }) to the BS in a predefined manner, e.g., time division order. After that, the BS can obtain the ZFBF matrix W and select M HR users and M LR users to perform the NOMAZFBF downlink multiuser system. As said, to make the CQI approach the real g _{ k1} and g _{ k2} as closely as possible, we should select users in a cluster to ensure η _{ k }≈0.
3.1.3 User selection algorithm
To be compatible with existing MIMO systems and meet the highrate requirement of HR users, K HR users are suggested to be selected first by the socalled semiorthogonal user selection (SUS) algorithm proposed in [26]. The purpose of using the SUS algorithm is to let the HR users experience as small as possible interbeam interferences to meet the highrate quality of service (QoS) requirement. Then, to select K LR users from the residual M−K users, we propose a LR user selection algorithm herein. After K HR users have been selected, ZFBF vectors {w _{ k },1≤k≤K} are obtained by the transmitter. From (20), the user meeting η _{ k }≈0 should be matched for the existing HR user in a cluster, i.e.,
In summary, we give the LR user selection algorithm in Algorithm 1.
3.2 Random beamforming
In the NOMAZFBF system, the quantization codebook is independently generated by each candidate user, so there is no coordination among these quantizers. Nevertheless, the beamforming vectors are designed through the quantized CDI of the selected HR users. Thus, the quantization errors could be so large that the interbeam interferences may degrade the system performances. On the one hand, to reduce the quantization error of the whole system, we have to coordinate the codebooks of these users. On the other hand, a lowcomplexity beamforming suitable for limited feedback condition is expected. In this section, we introduce a random beamforming scheme for the downlink NOMA multiuser system with limited CSI feedback.
3.2.1 CDI feedback
The BS and all candidate users share a common codebook \(\mathcal {I}\) which is used to quantize the direction of user channel vectors. The codebook \(\mathcal {I}\) consists of L subcodebooks, i.e., \(\mathcal {I}=\bigcup _{l=1}^{L}\mathcal {I}_{l}\), and each subcodebook is comprised of K unit norm mutually orthogonal vectors with size 1×K, i.e., \(\mathcal {I}_{l}=\{\mathbf {v}_{l,1},\mathbf {v}_{l,2},\ldots,\mathbf {v}_{l,K}  \mathbf {v}_{l,k}\mathbf {v}_{l,k}^{H}=1, \forall k\neq j, \mathbf {v}_{l,k}\mathbf {v}_{l,j}^{H}=0\}\). Moreover, the K vectors in the subcodebook \(\mathcal {I}_{l}\) are independently selected from the uniform distribution on the complex unit sphere [27]. To reduce the quantization error, L should be set as large as possible. Of course, the lager L is, the more memory space is needed for both users and BS.
For the mth user, quantized CDI \(\hat {\mathbf {h}}_{m}\) is selected based on the following guidelines:
Accordingly, the mth user just feeds back the CDI, twotuple (l,k), to the BS. To be fair, each user feeds back B= logN bits CQI like the one with the ZFBF scheme. Thus, there is N=L×K. In the RBF scheme, the BS chooses one of the L subcodebooks to perform beamforming. For example, if the lth subcodebook \(\mathcal {I}_{l}\) is selected, then the kth beamforming vector is \(\tilde {\mathbf {w}}_{k}=\mathbf {v}_{l,k}^{H}\) and the users quantized into \(\mathcal {I}_{l}\) are treated as candidate users. Assume M is large enough, K HR users can be selected from these candidate users. How to select both these HR users and the subcodebook are illustrated in the next subsection. Therefore, we have
3.2.2 CQI feedback
Due to (25), taking into consideration the same requirement η _{ k }≈0, we can also get the same expressions of (18) and (21), respectively. It means that NOMARBF has the same CQI f(h _{ m }) as NOMAZFBF.
3.2.3 User selection algorithm
After obtaining CDI and CQI from the users, the BS first needs to determine K HR users and K beamforming vectors. Then, K LR users can be scheduled according to the K beamforming vectors. Since there may be more than one users quantized into a vector in one subcodebook, we have to select the candidate HR users for a subcodebook. For example, assume there are more than one user whose CDI information meets \(\hat {\mathbf {h}}_{m}=\mathbf {v}_{l,k}\) for the subcodebook \(\mathcal {I}_{l}\). By (24), it means we should select the user with maximum \(\cos \theta _{m}=\tilde {\mathbf {h}}_{m}\mathbf {v}^{H}_{l,k}\) as the HR user for the vector v _{ l,k }. As the BS knows nothing about θ _{ m }, we can use the CQI f(h _{ m }) fed back by the mth user instead. Define \(\mathcal {U}_{l,k}\) as the candidate HR user for v _{ l,k }. Then, there is
Then, the optimal subcodebook is given by
As a result, \(\mathbf {v}_{l^{*},k}^{H} \in \mathcal {I}_{l^{*}}, k=1,2,\ldots,K\) are the RBF vectors. Meanwhile, the users with index \(\mathcal {U}_{l^{*},k}\), k=1,2,…,K are the HR user in the kth beam, i.e., \(\mathcal {U}_{h}(k)=\mathcal {U}_{l^{*},k}\). For the LR user, as the angle η _{ k } between \(\hat {\mathbf {h}}_{k2}\) and \(\hat {\mathbf {h}}_{k1}\) should meet η _{ k }≈0, the LR user in the kth cluster is
In summary, we give the user selection algorithm in Algorithm 2.
4 Power allocation for NOMA users
Since α _{ k } affects the data rate greatly, we need to carefully choose a suitable power allocation ratio to maximize the system rate. Note that, if the NOMA multiuser system has a worse performance than the traditional OMA multiuser system, there is no need to perform NOMA which incurs some extra decoding complexity. As a baseline of our system, we herein consider a traditional downlink multiuser system, where during the same resource block as the NOMA system, each beam supports two users in a time division multiple access (TDMA) way, denoted as TDMABF. In other words, the transmit duration is divided into two equal slots for two users. For the kth beam, denote the sumrate of TDMABF system as R _{ k,TDMA}. Then, the system sumrate of the kth cluster in the proposed downlink NOMA multiuser system is
For the given CSI, R _{ k,TDMA} is determined. Next, we just need to optimize R _{ k1}+R _{ k2} through adjusting the power allocation ratio α _{ k }.
Recalling (14) and (25), even though the beamforming vectors are dependent on the quantized CDI from the users, the interbeam interference is very slight in the scenario with massive candidate users. It means the relativity between beams can be insignificant. Therefore, it is dispensable to seek for the optimal power allocation to maximize the object (29). Instead, we can maximize the sumrate of a user cluster individually. Moreover, to demonstrate the different QoS requirements of the HR user and LR user, we set the minimum user rate constraints R _{ k1}≥R _{ h }>0 and R _{ k2}≥R _{ l }>0. That is to say, the NOMA downlink multiuser system provides two transmission rate services in a cluster. For the kth cluster, the optimization problem can be expressed as
As the BS only can use CDI and CQI to calculate g _{ k1} and g _{ k2}, in the following, we denote \(\hat {g}_{k1}\) and \(\hat {g}_{k2}\) as the obtained g _{ k1} and g _{ k2}, respectively. According to the relationship between \(\hat {g}_{k1}\) and \(\hat {g}_{k2}\), we consider two cases to solve (30).
4.1 Case 1: \(\boldsymbol {\hat {g}_{k1}\geq \hat {g}_{k2}}\)
If \(\hat {g}_{k1}\geq \hat {g}_{k2}\), substituting (3) and (5) with (30), the optimal problem becomes
To ensure that there exists feasible α _{ k } for (31), there is
Then, we have
As R _{ l }>0, due to (34), R _{ h } has a constraint
If the given R _{ h } and R _{ l } make (34) and (35) hold, there exists feasible α _{ k } for (31). Next, we assume that both (34) and (35) hold.
To optimize the objective function in (31) is equivalent to maximize
Thus, the firstorder derivative of F _{1}(α _{ k }) with respect to α _{ k } is
As \(\hat {g}_{k1}\geq \hat {g}_{k2}\) holds in Case 1, there is \(F^{\prime }_{1}(\alpha _{k})\geq 0\). It means F _{1}(α _{ k }) is a monotonic increasing function of α _{ k }. Hence, the optimal solution is
It is easy to confirm that \(0<\alpha _{k}^{*}<1\). So, \(\alpha _{k}^{*}\) is the expected solution of problem (31) under the condition of (34) and (35).
4.2 Case 2: \(\boldsymbol {\hat {g}_{k1}<\hat {g}_{k2}}\)
In this case, due to (7) and (9), similarly, we consider the following optimization problem
Considering the condition
we have
From (42), there is
Assume R _{ h } and R _{ l } meet (42) and (43), we define the objective function as
It is easy to see that F _{2}(α _{ k }) is a monotonic decreasing function of α _{ k } because of \(\hat {g}_{k1}<\hat {g}_{k2}\) in Case 2. Therefore, the optimal solution is
Since (43) holds, there is \(0<\alpha _{k}^{*}<1\). Therefore, \(\alpha _{k}^{*}\) is the expected solution of problem (39) under the condition of (42) and (43).
4.3 Discussion
In the above analysis, we assume R _{ h } and R _{ l } make (34) and (35) hold in Case 1 or (42) and (43) in Case 2. If both conditions in a case cannot hold, it means the NOMA system cannot offer sufficient rates to meet the minimum rate constraints R _{ h } and R _{ l }. There could be two possible methods to deal with this situation:

1.
Adjusting R _{ h } and R _{ l } : Since \(\hat {g}_{k1}\) and \(\hat {g}_{k2}\) are dependent on instantaneous CSI from the BS to these users, we can dynamically adjust R _{ h } and R _{ l } to meet (34) and (35) or (42) and (43) as much as possible. For example, the BS can estimate the possible values of \(\hat {g}_{k1}\) and \(\hat {g}_{k2}\) via some training signals. Then, the BS could set the R _{ h } and R _{ l } which can make the rate conditions hold with a very large probability.

2.
Employing traditional OMA system: If the NOMA system cannot offer the desired rate, the most direct method is to employ traditional multiuser access schemes with relatively lower complexity. Note that given a total power P, these traditional OMA schemes, such as TDMA, could not provide the required minimum rates either. In this case, the minimum rate constraints have to be ignored.
5 Simulation results
In this section, we show the performances of the proposed NOMAZFBF and NOMARBF systems. The number of BS antennas is K=2. Channel and noise parameters are described in the system model. We set R _{ l }=1 bps/Hz and R _{ h }=3 bps/Hz. In the following simulations, if the NOMA system cannot offer the minimum required rates, we employ the traditional TDMA scheme to transmit information for HR and LR users.
5.1 NOMAZFBF versus NOMARBF
Figure 2 shows the user rates of the NOMAZFBF and NOMARBF systems versus the total transmit power. From Fig. 2 a, we can see that NOMA systems with perfect CSI at the transmitter (CSIT) achieve larger system sumrates than NOMA systems with limited CSI feed back. Thereinto, NOMAZFBF system with perfect CSIT has the best performances. That is to say, the performances of NOMA system with perfect CSIT are the upper bound of NOMA system with limited CSI feedback. For the same N in limited CSI feedback, NOMARBF outperforms NOMAZFBF. It means RBF is more suitable for NOMA downlink multiuser transmission with limited CSI feedback, which is different from the results with perfect CSIT. In Fig. 2 b, as P increases, the average rates of the LR user in all systems increase slightly. Meanwhile, observing Fig. 2 c, the average rates of the HR user become larger and larger as P increases. The reason is that the HR user is always selected from the candidate users in priority. Thus, the HR users could gain the most of the advantages of increasing transmit power. For a given beamforming scheme, more bits fed back incurs more rates. For example, the NOMARBF system with N=64 has about 3bps sumrate gain than the NOMARBF system with N=16 at the situation P=35 dB.
In addition, we also show the user rates of the NOMAZFBF and NOMARBF systems versus the candidate user number in Fig. 3. We also can see that NOMAZFBF with perfect CSIT achieves the largest sumrate among all NOMA systems. Moreover, NOMARBF is superior to NOMAZFBF with limited CSI feedback. Through Fig. 3, as the number of candidate users M increases, all average user rates increase, especially for HR users. This is because more candidate users could provide more opportunities to select a user with little quantization error. By Figs. 2 and 3, we can conclude that RBF has better performances than ZFBF in the NOMA downlink multiuser system with limited CSI feedback and the feedback link with higher capacity improves the rates of NOMA users.
5.2 NOMARBF versus TDMARBF
In Fig. 4, we compare the sumrate performances of NOMARBF and TDMARBF. Obviously, NOMARBF with perfect CSIT has the best performance. In NOMARBF system with limited CSI feedback, more feedback bits incur larger average sumrates. For the same N, NOMARBF system outperforms TDMARBF system. For example, with N=64 and M=100, NOMARBF has about 4bps sumrate gain than TDMARBF system. When N=16 and M=100, the rate gain between NOMARBF and TDMARBF becomes larger. Therefore, it is shown that NOMA system still gains rate advantage than the traditional TDMA system with limited CSI feedback.
5.3 Optimal power allocation
We herein consider two power allocation schemes to be compared with the proposed optimal power allocation scheme. Define
which is the sum of maximum and minimum values in the feasible region of α _{ k } in both cases. Then, we have four power allocation schemes: \(\alpha _{k}^{\mathrm {{I}}}=\frac {1}{2}\tilde {\alpha }_{k}\), \(\alpha _{k}^{\mathrm {{II}}}=\frac {1}{3}\tilde {\alpha }_{k}\), \(\alpha _{k}^{\mathrm {{III}}}=\frac {1}{4}\tilde {\alpha }_{k}\), and \(\alpha _{k}^{\mathrm {{IV}}}=\frac {1}{10}\tilde {\alpha }_{k}\). In Fig. 5, as P increases, the average sumrates of all five power allocation schemes increase. The proposed optimal power allocation scheme achieves the best sumrate among all presented schemes.
6 Conclusions
In this paper, we investigate NOMA downlink multiuser beamforming system with limited CSI feedback. We introduce the zeroforcing beamforming and random beamforming into NOMA downlink multiuser system and give the feedback forms of channel direction information and channel quality indicator, which are transmitted by the candidate users via a limited rate channel. In addition, we also propose the user selection algorithms to determine the users sharing a beam in one user cluster. To improve the performances of NOMA system further, we also provide an optimal power allocation scheme. Finally, simulation results show that NOMA system still can provide more user rates than the traditional TDMA system and the RBF is more suitable for NOMA downlink multiuser system with limited CSI feedback.
References
C Wang, F Haider, X Gao, et al, Cellular architecture and key technologies for 5G wireless communication networks. IEEE Commun. Mag. 52(2), 122–130 (2014).
Q Li, H Niu, A Papathanassiou, et al, 5G network capacity: key elements and technologies. IEEE Vehic. Technol. Mag. 9(1), 71–78 (2014).
L Dai, B Wang, Y Yuan, S Han, et al, Nonorthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends. IEEE Commun. Mag. 53(9), 74–81 (2015).
Y Saito, A Benjebbour, Y Kishiyama, et al, in Int. Conf. Personal, Indoor, and Mobile Radio Communications (PIMRC). Systemlevel performance evaluation of downlink nonorthogonal multiple access (NOMA) (London, 2013), pp. 611–615.
Y Saito, Y Kishiyama, A Benjebbour, et al., in Int. Conf. Vehicular Technology Conference (VTC Spring). Nonorthogonal multiple access (NOMA) for cellular future radio access (Dresden, German, 2013).
Z Ding, Z Yang, P Fan, et al., On the performance of nonorthogonal multiple access in 5G systems with randomly deployed users. IEEE Signal Process. Lett. 21(12), 1501–1505 (2014).
Z Ding, M Peng, et al., Cooperative nonorthogonal multiple access in 5G systems. IEEE Commun. Lett. 19(8), 1462–1465 (2015).
J Men, J Ge, Performance analysis of nonorthogonal multiple access in downlink cooperative network. IET Commun. 9(18), 2267–2273 (2015).
M Hojeij, J Farah, C Nour, et al, New optimal and suboptimal resource allocation techniques for downlink nonorthogonal multiple access. Wireless Pers. Commun. 87(3), 837–867 (2016).
J Kim, I Lee, Nonorthogonal multiple access in coordinated direct and relay transmission. IEEE Commun. Lett. 19(11), 2037–2040 (2015).
Z Ding, P Fan, V Poor, Impact of user pairing on 5g nonorthogonal multiple access downlink transmissions. IEEE Trans. Vehic. Technol. 65(8), 6010–6023 (2015).
J Choi, Nonorthogonal multiple access in downlink coordinated twopoint systems. IEEE Commun. Lett. 18(2), 313–316 (2014).
Q Sun, S Han, I ChinLin, et al, On the ergodic capacity of MIMO NOMA systems. IEEE Wireless Commun. Lett. 4(4), 405–408 (2015).
Q Sun, S Han, Z Xu, S Wang, et al., in IEEE Wireless Communications and Networking Conference (WCNC). Sum rate optimization for MIMO nonorthogonal multiple access systems (New Orleans, USA, 2015), pp. 747–752.
X Chen, A Beiijebbour, A Li, et al., in Int. Conf. on Personal, Indoor, and Mobile Radio Communications (PIMRC). Consideration on successive interference canceller (SIC) receiver at celledge users for nonorthogonal multiple access (NOMA) with SUMIMO (Hong Kong, 2015), pp. 522–526.
J Kim, J Koh, J Kang, et al, in Int. Conf. on Military Communications. Design of user clustering and precoding for downlink nonorthogonal multiple access (NOMA) (Florida, 2015), pp. 1170–1175.
S Liu, C Zhang, G Lyu, in IEEE International Conference on Communication Workshop Heterogeneous Converged Networks. User selection and power schedule for downlink nonorthogonal multiple access (NOMA) system (London, 2015), pp. 2561–2565.
B Kim, W Chung, in IEEE VTC 2015Spring. Uplink NOMA with multiantenna (Scotland, UK, 2015), pp. 1–5.
S Timotheou, I Krikidis, Fairness for nonorthogonal multiple access in 5G systems. IEEE Signal Process. Lett. 22(10), 1647–1651 (2015).
Y Liu, Z Ding, M Elkashlan, et al., Cooperative nonorthogonal multiple access with simultaneous wireless information and power transfer. IEEE J. Selected Areas Commun. 34(4), 938–953 (2016).
Y Liu, M Elkashlan, Z Ding, GK Karagiannidis, Fairness of user clustering in MIMO nonorthogonal multiple access systems. IEEE Commun. Lett. 20(7), 1465–1468 (2016).
A Tukmanov, S Boussakta, Z Ding, et al, Outage performance analysis of imperfectCSIbased selection cooperation in random networks. IEEE Trans. Commun. 62(8), 2747–2757 (2014).
Z Yang, Z Ding, P Fan, et al., On the performance of nonorthogonal multiple access systems with partial channel information. IEEE Trans. Commun. 64(2), 654–667 (2015).
Z Ding, H Poor, Design of massiveMIMONOMA with limited feedback. IEEE Signal Process. Lett. 23(5), 629–633 (2016).
D Love, R Heath, V Lau, et al., An overview of limited feedback in wireless communication systems. IEEE J. Sel. Areas Commun. 26(8), 1341–1365 (2008).
T Yoo, N Jindal, A Goldsmith, Multiantenna downlink channels with limited feedback and user selection. IEEE J.Selected Areas Commun. 25(7), 1478–1491 (2007).
K Huang, R Heath, Performance of orthogonal beamforming for SDMA with limited feedback. IEEE Trans. Vehic. Technol. 58(1), 152–164 (2009).
Acknowledgements
The authors want to thank the editor and anonymous reviewers for the suggestions and comments to improve the quality of this paper.
This work was supported by the Research Fund of National Mobile Communications Research Laboratory, Southeast University (No.2011D14), the National Natural Science Foundation of China (No.61102082), the Natural Science Basic Research Plan in Shaanxi Province of China under Program No.2015JQ6234, and the Fundamental Research Funds for the Central Universities.
Competing interests
The authors declare that they have no competing interests.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Liu, S., Zhang, C. Nonorthogonal multiple access in a downlink multiuser beamforming system with limited CSI feedback. J Wireless Com Network 2016, 239 (2016). https://doi.org/10.1186/s1363801607359
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s1363801607359
Keywords
 Power Allocation
 Channel State Information
 Time Division Multiple Access
 Successive Interference Cancelation
 Channel Quality Indicator