OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous … · 2019. 7. 15. · 1 OTFS-NOMA:...

16
1 OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous User Mobility Profiles Zhiguo Ding, Robert Schober, Pingzhi Fan, and H. Vincent Poor, Abstract—This paper considers a challenging communication scenario, in which users have heterogenous mobility profiles, e.g., some users are moving at high speeds and some users are static. A new non-orthogonal multiple-access (NOMA) transmission protocol that incorporates orthogonal time frequency space (OTFS) modulation is proposed. Thereby, users with different mobility profiles are grouped together for the implementation of NOMA. The proposed OTFS-NOMA protocol is shown to be applicable to both uplink and downlink transmission, where sophisticated transmit and receive strategies are developed to remove inter-symbol interference and harvest both multi-path and multi-user diversity. Analytical results demonstrate that both the high-mobility and the low-mobility users benefit from the application of OTFS-NOMA. In particular, the use of NOMA allows the spreading of the high-mobility users’ signals over a large amount of time-frequency resources, which enhances the OTFS resolution and improves the detection reliability. In addi- tion, OTFS-NOMA ensures that low-mobility users have access to bandwidth resources which in conventional OTFS-orthogonal multiple access (OTFS-OMA) would be solely occupied by the high-mobility users. Thus, OTFS-NOMA improves the spectral efficiency and reduces latency. I. I NTRODUCTION Non-orthogonal multiple access (NOMA) has been recog- nized as a paradigm shift for the design of multiple access techniques for the next generation of wireless networks [1]– [4]. Many existing works on NOMA have focused on sce- narios with low-mobility users, where users with different channel conditions or quality of service (QoS) requirements are grouped together for the implementation of NOMA. For example, in power-domain NOMA, a base station serves two users simultaneously [5], [6]. In particular, the base station first orders the users according to their channel conditions, where the ‘weak user’ which has a poorer connection to the base station is generally allocated more transmission power and the other user, referred to as the ‘strong user’, is allocated less power. As such, the two users can be served in the same time-frequency resource, which improves the spectral efficiency compared to orthogonal multiple access (OMA). In the case that users have similar channel conditions, grouping users with different QoS requirements can facilitate The work of Z. Ding was supported by the UK Engineering and Physical Sciences Research Council under grant number EP/P009719/2 and by H2020- MSCA-RISE-2015 under grant number 690750. The work of P. Fan was supported by the National Natural Science Foundation of China under grant number 61731017, and the 111 Project (No.111-2-14). The work of H. V. Poor was supported by the U.S. National Science Foundation under Grants CCF-093970 and CCF-1513915. Z. Ding and H. V. Poor are with the Department of Electrical En- gineering, Princeton University, Princeton, NJ 08544, USA. Z. Ding is also with the School of Electrical and Electronic Engineering, the Univer- sity of Manchester, Manchester, UK (email: [email protected], [email protected]). R. Schober is with the Institute for Digital Com- munications, Friedrich-Alexander-University Erlangen-Nurnberg (FAU), Ger- many (email: [email protected]). P. Fan is with the Institute of Mobile Communications, Southwest Jiaotong University, Chengdu, China (email: [email protected]). the implementation of NOMA and effectively exploit the potential of NOMA [7]–[9]. Various existing studies have shown that the NOMA principle can be applied to different communication networks, such as millimeter-wave networks [10], [11], massive multiple-input multiple-output (MIMO) systems [12], [13], hybrid multiple access systems [14], [15], visible light communication networks [16], [17], and mobile edge computing [18]. We also note that various standardization efforts have been made to facilitate the implementation of NOMA in practical systems. For example, a study for the application of NOMA for downlink transmission, termed multi-user superposition transmission (MUST), was carried out for the 3rd Generation Partnership Project (3GPP) Release 14, where 15 different forms of MUST were proposed and compared [19]. After this study was completed, MUST was formally included in 3GPP Release 15 which is also referred to as Evolved Universal Terrestrial Radio Access (E-UTRA) [20]. A study for the application of NOMA for uplink transmission has been recently carried out for 3GPP Release 16, where more than 20 different forms of NOMA have been proposed by various companies [21]. This paper considers the application of NOMA to a chal- lenging communication scenario, where users have heteroge- neous mobility profiles. Different from the existing works in [22], [23], the use of orthogonal time frequency space (OTFS) modulation is considered in this paper because of its supe- rior performance in scenarios with doubly-dispersive channels [24]–[26]. Recall that the key idea of OTFS is to use the delay-Doppler plane, where the users’ signals are orthogonally placed. Compared to conventional modulation schemes, such as orthogonal frequency-division multiplexing (OFDM), OTFS offers the benefit that the time-invariant channel gains in the delay-Doppler plane can be utilized, which simplifies channel estimation and signal detection in high-mobility scenarios. The impact of pulse-shaping waveforms on the performance of OTFS was studied in [27], and the design of interference cancellation and iterative detection for OTFS was investigated in [28]. The diversity gain achieved by OTFS was studied in [29], and the application of OTFS to multiple access was proposed in [30]. In [31] and [32], the concept of OTFS was combined with MIMO, which revealed that the use of spatial degrees of freedom can further enhance the performance of OTFS. This paper considers the application of OTFS to NOMA communication networks, where the coexistence of NOMA and OTFS is investigated. In particular, this paper makes the following contributions: 1) A spectrally efficient OTFS-NOMA transmission pro- tocol is proposed by grouping users with different mobility profiles for the implementation of NOMA. On the one hand, users with high mobility are served in the delay-Doppler plane,

Transcript of OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous … · 2019. 7. 15. · 1 OTFS-NOMA:...

Page 1: OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous … · 2019. 7. 15. · 1 OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous User Mobility Profiles Zhiguo

1

OTFS-NOMA: An Efficient Approach for ExploitingHeterogenous User Mobility ProfilesZhiguo Ding, Robert Schober, Pingzhi Fan, and H. Vincent Poor,

Abstract—This paper considers a challenging communicationscenario, in which users have heterogenous mobility profiles, e.g.,some users are moving at high speeds and some users are static.A new non-orthogonal multiple-access (NOMA) transmissionprotocol that incorporates orthogonal time frequency space(OTFS) modulation is proposed. Thereby, users with differentmobility profiles are grouped together for the implementationof NOMA. The proposed OTFS-NOMA protocol is shown tobe applicable to both uplink and downlink transmission, wheresophisticated transmit and receive strategies are developed toremove inter-symbol interference and harvest both multi-pathand multi-user diversity. Analytical results demonstrate that boththe high-mobility and the low-mobility users benefit from theapplication of OTFS-NOMA. In particular, the use of NOMAallows the spreading of the high-mobility users’ signals over alarge amount of time-frequency resources, which enhances theOTFS resolution and improves the detection reliability. In addi-tion, OTFS-NOMA ensures that low-mobility users have accessto bandwidth resources which in conventional OTFS-orthogonalmultiple access (OTFS-OMA) would be solely occupied by thehigh-mobility users. Thus, OTFS-NOMA improves the spectralefficiency and reduces latency.

I. INTRODUCTION

Non-orthogonal multiple access (NOMA) has been recog-nized as a paradigm shift for the design of multiple accesstechniques for the next generation of wireless networks [1]–[4]. Many existing works on NOMA have focused on sce-narios with low-mobility users, where users with differentchannel conditions or quality of service (QoS) requirementsare grouped together for the implementation of NOMA. Forexample, in power-domain NOMA, a base station serves twousers simultaneously [5], [6]. In particular, the base stationfirst orders the users according to their channel conditions,where the ‘weak user’ which has a poorer connection tothe base station is generally allocated more transmissionpower and the other user, referred to as the ‘strong user’, isallocated less power. As such, the two users can be servedin the same time-frequency resource, which improves thespectral efficiency compared to orthogonal multiple access(OMA). In the case that users have similar channel conditions,grouping users with different QoS requirements can facilitate

The work of Z. Ding was supported by the UK Engineering and PhysicalSciences Research Council under grant number EP/P009719/2 and by H2020-MSCA-RISE-2015 under grant number 690750. The work of P. Fan wassupported by the National Natural Science Foundation of China under grantnumber 61731017, and the 111 Project (No.111-2-14). The work of H. V.Poor was supported by the U.S. National Science Foundation under GrantsCCF-093970 and CCF-1513915.

Z. Ding and H. V. Poor are with the Department of Electrical En-gineering, Princeton University, Princeton, NJ 08544, USA. Z. Ding isalso with the School of Electrical and Electronic Engineering, the Univer-sity of Manchester, Manchester, UK (email: [email protected],[email protected]). R. Schober is with the Institute for Digital Com-munications, Friedrich-Alexander-University Erlangen-Nurnberg (FAU), Ger-many (email: [email protected]). P. Fan is with the Institute of MobileCommunications, Southwest Jiaotong University, Chengdu, China (email:[email protected]).

the implementation of NOMA and effectively exploit thepotential of NOMA [7]–[9]. Various existing studies haveshown that the NOMA principle can be applied to differentcommunication networks, such as millimeter-wave networks[10], [11], massive multiple-input multiple-output (MIMO)systems [12], [13], hybrid multiple access systems [14], [15],visible light communication networks [16], [17], and mobileedge computing [18]. We also note that various standardizationefforts have been made to facilitate the implementation ofNOMA in practical systems. For example, a study for theapplication of NOMA for downlink transmission, termedmulti-user superposition transmission (MUST), was carriedout for the 3rd Generation Partnership Project (3GPP) Release14, where 15 different forms of MUST were proposed andcompared [19]. After this study was completed, MUST wasformally included in 3GPP Release 15 which is also referred toas Evolved Universal Terrestrial Radio Access (E-UTRA) [20].A study for the application of NOMA for uplink transmissionhas been recently carried out for 3GPP Release 16, wheremore than 20 different forms of NOMA have been proposedby various companies [21].

This paper considers the application of NOMA to a chal-lenging communication scenario, where users have heteroge-neous mobility profiles. Different from the existing works in[22], [23], the use of orthogonal time frequency space (OTFS)modulation is considered in this paper because of its supe-rior performance in scenarios with doubly-dispersive channels[24]–[26]. Recall that the key idea of OTFS is to use thedelay-Doppler plane, where the users’ signals are orthogonallyplaced. Compared to conventional modulation schemes, suchas orthogonal frequency-division multiplexing (OFDM), OTFSoffers the benefit that the time-invariant channel gains in thedelay-Doppler plane can be utilized, which simplifies channelestimation and signal detection in high-mobility scenarios.The impact of pulse-shaping waveforms on the performanceof OTFS was studied in [27], and the design of interferencecancellation and iterative detection for OTFS was investigatedin [28]. The diversity gain achieved by OTFS was studiedin [29], and the application of OTFS to multiple access wasproposed in [30]. In [31] and [32], the concept of OTFS wascombined with MIMO, which revealed that the use of spatialdegrees of freedom can further enhance the performance ofOTFS.

This paper considers the application of OTFS to NOMAcommunication networks, where the coexistence of NOMAand OTFS is investigated. In particular, this paper makes thefollowing contributions:

1) A spectrally efficient OTFS-NOMA transmission pro-tocol is proposed by grouping users with different mobilityprofiles for the implementation of NOMA. On the one hand,users with high mobility are served in the delay-Doppler plane,

Page 2: OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous … · 2019. 7. 15. · 1 OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous User Mobility Profiles Zhiguo

2

and their signals are modulated by OTFS. On the other hand,users with low mobility are served in the time-frequencyplane, and their signals are modulated in a manner similarto conventional OFDM.

2) The proposed new OTFS-NOMA protocol is applied toboth uplink and downlink transmission, where different rateand power allocation policies are used to suppress multipleaccess interference. In addition, sophisticated equalizationtechniques, such as the frequency-domain zero-forcing linearequalizer (FD-LE) and the decision feedback equalizer (FD-DFE), are employed to remove the inter-symbol interferencein the delay-Doppler plane. The impact of the developedequalization techniques on OTFS-NOMA is analyzed by usingthe outage probability as the performance criterion. Strategiesto harvest multi-path diversity and multi-user diversity are alsointroduced, which can further improve the outage performanceof OTFS-NOMA transmission.

3) The developed analytical results demonstrate that boththe high-mobility and the low-mobility users benefit from theproposed OTFS-NOMA scheme. The use of NOMA allows thehigh-mobility users’ signals to be spread over a large amountof time-frequency resources without degrading the spectralefficiency. As a result, the OTFS resolution, which determineswhether the users’ channels can be accurately located in thedelay-Doppler plane, is enhanced significantly, and therefore,the reliability of detecting the high-mobility users’ signalsis improved. We note that, in OTFS-OMA, enhancing theOTFS resolution implies that a large amount of time andfrequency resources are solely occupied by the high-mobilityusers, which reduces the overall spectral efficiency since thehigh-mobility users’ channel conditions are typically weakerthan those of the low-mobility users. In contrast, the use ofOTFS-NOMA ensures that the low-mobility users can accessthe bandwidth resources which would be solely occupied bythe high-mobility users in the OMA mode. Hence, OTFS-NOMA improves spectral efficiency and reduces latency, aswith OTFS-OMA the low-mobility users may have to wait fora long time before the scarce bandwidth resources occupiedby the high-mobility users become available. In addition, wenote that for the low-mobility users, using OFDM yields thesame reception reliability as using OTFS, as pointed out in[33]. Therefore, the proposed OTFS-NOMA scheme, whichserves the low-mobility users in the time-frequency planeand modulates the low-mobility users’ signals in a mannersimilar to OFDM, offers the same reception reliability asOTFS-OMA, which serves the low-mobility users in the delay-Doppler plane and modulates the low-mobility users’ signalsby OTFS. However, OTFS-NOMA has the benefit of reducedsystem complexity because the use of the complicated OTFStransforms is avoided.

II. FOUNDATIONS OF OTFS-NOMA

A. Time-Frequency Plane and Delay-Doppler Plane

The key idea of OTFS-NOMA is to efficiently use both thetime-frequency plane and the delay-Doppler plane. A discrete

time-frequency plane is obtained by sampling at intervals ofT s and ∆f Hz as follows:

ΛTF = {(nT,m∆f), n = 0, · · · , N − 1,m = 0, · · · ,M − 1},(1)

and the corresponding discrete delay-Doppler plane is givenby

ΛDD =

{(k

NT,

l

M∆f

), k = 0, · · · , N − 1, (2)

l = 0, · · · ,M − 1} ,

where N and M denote the total number of time intervals andthe total number of frequency subchannels, respectively. Thechoices for T and ∆f are determined by the channel charac-teristics, as will be explained in the following subsection.

B. Channel Model

This paper considers a multi-user communication networkin which one base station communicates with (K + 1) users,denoted by Ui, 0 ≤ i ≤ K. Denote Ui’s channel response inthe delay-Doppler plane by hi(τ, ν), where τ denotes the delayand ν denotes the Doppler shift. OTFS uses the sparsity featureof a wireless channel in the delay-Doppler plane, i.e., there area small number of propagation paths between a transmitter anda receiver [24], [25], [28], which means that hi(τ, ν) can beexpressed as follows:

hi(τ, ν) =

Pi∑p=0

hi,pδ(τ − τi,p)δ(ν − νi,p), (3)

where (Pi + 1) denotes the number of propagation paths,and hi,p, τi,p, and νi,p denote the complex Gaussian channelgain1, the delay, and the Doppler shift associated with thep-th propagation path, respectively. We assume that the hi,p,0 ≤ p ≤ Pi, are independent and identically distributed (i.i.d.)random variables2, i.e., hi,p ∼ CN

(0, 1

Pi+1

), which means∑Pi

p=0 E{|hi,p|2} = 1, where E {·} denotes the expectationoperation. The discrete delay and Doppler tap indices for thep-th path of hi(τ, ν), denoted by lτi,p and kνi,p , respectively,are given by [28]

τi,p =lτi,p + lτi,pM∆f

, νi,p =kνi,p + kνi,p

NT, (4)

where lτi,p and kνi,p denote the fractional delay and thefractional Doppler shift, respectively.

The construction of ΛTF and ΛDD needs to ensure thatT is not smaller than the maximal delay spread, and ∆fis not smaller than the largest Doppler shift, i.e., T ≥max{τi,p, 0 ≤ p ≤ Pi, 0 ≤ i ≤ K} and ∆f ≥ max{νi,p, 0 ≤p ≤ Pi, 0 ≤ i ≤ K}. In addition, the choices of N and

1The Gaussian assumption has been commonly used in the OTFS literature[26]–[29] since each channel gain (or each tap of the delay-Doppler impulseresponse) represents a cluster of reflectors with specific delay and Dopplercharacteristics .

2In order to simplify the performance analysis, we assume that the users’channels are i.i.d. In practice, it is likely that the high-mobility users’ channelconditions are worse than the low-mobility users’ channel conditions. Thischannel difference is beneficial for the implementation of NOMA, and hencecan further increase the performance gain of OTFS-NOMA over OTFS-OMA.

Page 3: OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous … · 2019. 7. 15. · 1 OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous User Mobility Profiles Zhiguo

3

M affect the OTFS resolution, which determines whetherhi(τ, ν) can be accurately located in the discrete delay-Doppler plane. In particular, M and N need to be sufficientlylarge to approximately achieve ideal OTFS resolution, whichensures that lτi,p = kνi,p = 0, such that the interferencecaused by fractional delay and Doppler shift is effectivelysuppressed [24].

C. General Principle of OTFS-NOMA

To facilitate the illustration of the general principle ofOTFS-NOMA, we first briefly describe OTFS-OMA, thebenchmark scheme used in this paper. In OTFS-OMA, thereis no spectrum sharing between the high-mobility users andthe low-mobility users, i.e., if OTFS is used to serve thehigh-mobility users, the NT time intervals and the M∆ffrequency subchannels are occupied by the high-mobility usersand the low-mobility users cannot be served in these resourceblocks. The general principle of the proposed OTFS-NOMAscheme is to exploit both the delay-Doppler plane and thetime-frequency plane, where users with heterogenous mobilityprofiles are grouped together and served simultaneously. Onthe one hand, for the users with high mobility, their signalsare placed in the delay-Doppler plane, which means that thetime-invariant channel gains in the delay-Doppler plane canbe exploited. It is worth pointing out that in order to ensurethat the channels can be located in the delay-Doppler plane,both N and M need to be large, which is a disadvantage ofOTFS-OMA, since a significant number of frequency channels(e.g., M∆f ) are occupied for a long time (e.g., NT ) by thehigh-mobility users whose channel conditions can be quiteweak. The use of OTFS-NOMA facilitates spectrum sharingand hence ensures that the high-mobility users’ signals canbe spread over a large amount of time-frequency resourceswithout degrading the spectral efficiency.

On the other hand, for the users with low mobility, theirsignals are placed in the time-frequency plane. The inter-ference between the users with different mobility profilesis managed by using the principle of NOMA. As a result,compared to OTFS-OMA, OTFS-NOMA improves the overallspectral efficiency since it encourages spectrum sharing amongusers with different mobility profiles and avoids that thebandwidth resources are solely occupied by the high-mobilityusers which might have weak channel conditions. In addition,the complexity of detecting the low-mobility users’ signals isreduced, compared to OTFS-OMA which serves all users inthe delay-Doppler plane.

In this paper, we assume that, among (K + 1) users, U0 isa user with high mobility, and the remaining K users, Ui for1 ≤ i ≤ K, are low-mobility users, which are referred to as‘NOMA’ users3. For OTFS-OMA, we assume that U0 solely

3 We note that the principle of OTFS-NOMA can be extended to the casewhere multiple high-mobility users are served in the delay-Doppler plane. Inthis case, the NM signals in the delay-Doppler plane belong to different high-mobility users and OTFS is used as a type of multiple access technique [24],[30]. For downlink transmission, this change has no impact on the proposeddetection schemes and the analytical results developed in this paper. For uplinktransmission, the results developed in this paper are applicable to the case withmultiple high-mobility users if the adaptive-rate transmission scheme proposedin Section VI is employed.

occupies all NM resource blocks in ΛDD. In OTFS-NOMA,Ui, for 1 ≤ i ≤ K, are opportunistic NOMA users and theirsignals are placed in ΛTF. The design of downlink OTFS-NOMA transmission will be discussed in detail in SectionsIII, IV, and V. The application of OTFS-NOMA for uplinktransmission will be considered in Section VI only briefly,due to space limitations.

III. DOWNLINK OFTS-NOMA - SYSTEM MODEL

In this section, the OTFS-NOMA downlink transmissionprotocol is described. In particular, assume that the basestation sends NM symbols to U0, denoted by x0[k, l], k ∈{0, · · · , N − 1}, l ∈ {0, · · · ,M − 1}. By using the inversesymplectic finite Fourier transform (ISFFT), the high-mobilityuser’s symbols placed in the delay-Doppler plane are convertedto NM symbols in the time-frequency plane as follows [24]:

X0[n,m] =1

NM

N−1∑k=0

M−1∑l=0

x0[k, l]ej2π( knN −mlM ), (5)

where n ∈ {0, · · · , N − 1} and m ∈ {0, · · · ,M − 1}. Wenote that the NM time-frequency signals can be viewed as NOFDM symbols containing M signals each. We assume that arectangular window is applied to the transmitted and receivedsignals.

The NOMA users’ signals are placed directly in the time-frequency plane, and are superimposed with the high-mobilityuser’s signals, X0[n,m]. With NM orthogonal resourceblocks available in the time-frequency plane, there are differentways for the K users to share the resource blocks. For illustra-tion purposes, we assume that M users are selected from theK opportunistic NOMA users4, where each NOMA user is tooccupy one frequency subchannel and receive N informationbearing symbols, denoted by xi(n), for 1 ≤ i ≤ M and0 ≤ n ≤ N − 1. The criterion employed for user schedulingand its impact on the performance of OTFS-NOMA will bediscussed in Section V. Denote the time-frequency signals tobe sent to Ui by Xi[n,m], 1 ≤ i ≤M . The following mappingscheme is used in this paper5:

Xi[n,m] =

{xi(n) if m = i− 10 otherwise , (6)

for 1 ≤ i ≤M and 0 ≤ n ≤ N − 1.

4The same M users can be scheduled as long as the users’ channels do notchange in the delay-Doppler plane. Otherwise, a new set of M users may beselected from the K opportunistic users. We also note that the number of theopportunistic users is assumed to be larger than the number of the frequencysubchannels (K ≥M ), which can be justified by a spectrum crunch scenario,i.e., there are not sufficient bandwidth resources available to support a largenumber of mobile devices.

5We note that mapping schemes different from (6) can also be used. Forexample, if N users are scheduled and each user is to occupy one time slot andreceives an OFDM-like symbol containing M signals, we can set Xi[n,m] =xi(m), for n = i− 1.

Page 4: OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous … · 2019. 7. 15. · 1 OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous User Mobility Profiles Zhiguo

4

The base station superimposes U0’s time-frequency signalswith the NOMA users’ signals as follows:

X[n,m] =γ0

NM

N−1∑k=0

M−1∑l=0

x0[k, l]ej2π( knN −mlM ) (7)

+

M∑i=1

γiXi[n,m],

where γi denotes the NOMA power allocation coefficient ofuser i, and

∑Mi=0 γ

2i = 1.

The transmitted signal at the base station is obtained byapplying the Heisenberg transform to X[n,m]. By assumingperfect orthogonality between the transmit and receive pulses,the received signal at Ui in the time-frequency plane can bemodelled as follows [24], [25], [28]:

Yi[n,m] =Hi[n,m]X[n,m] +Wi[n,m], (8)

where Wi(n,m) is the white Gaussian noisein the time-frequency plane, and Hi(n,m) =∫ ∫

hi(τ, ν)ej2πνnT e−j2π(ν+m∆f)τdτdν.

IV. DOWNLINK OTFS-NOMA - DETECTING THEHIGH-MOBILITY USER’S SIGNALS

For the proposed downlink OTFS-NOMA scheme, U0 di-rectly detects its signals in the delay-Doppler plane by treatingthe NOMA users’ signals as noise. In particular, in order todetect U0’s signals, the symplectic finite Fourier transform(SFFT) is applied to Y0[n,m] to obtain the delay-Dopplerestimates as follows:

y0[k, l] =1

NM

N−1∑n=0

M−1∑m=0

Y0[n,m]e−j2π(nkN −mlM ) (9)

=1

NM

M∑q=0

γq

N−1∑n=0

M−1∑m=0

xq[n,m]hw,0

(k − nNT

,l −mM∆f

)+ z0[k, l],

where q denotes the user index, z0[k, l] is complex Gaussiannoise, xq[k, l], 1 ≤ q ≤ M , denotes the delay-Dopplerrepresentation of Xq[n,m] and can be obtained by applyingthe SFFT to Xq[n,m], the channel hw,0(ν′, τ ′) is given by

hw,0(ν′, τ ′) =

∫ ∫hi(τ, ν)w(ν′ − ν, τ ′ − τ)e−j2πντdτdν,

(10)

and w(ν, τ) =∑N−1c=0

∑M−1d=0 e−j2π(νcT−τd∆f). To simplify

the analysis, the power of the complex-Gaussian distributednoise is assumed to be normalized, i.e., zi[k, l] ∼ CN(0, 1),where CN(a, b) denotes a complex Gaussian distributed ran-dom variable with mean a and variance b.

By applying the channel model in (3), the relationshipbetween the transmitted signals and the observations in thedelay-Doppler plane can be expressed as follows [24], [25],[28]:

y0[k, l] =

M∑q=0

γq

P0∑p=0

h0,pxq[(k − kν0,p)N , (l − lτ0,p)M ] (11)

+ z0[k, l],

where (·)N denotes the modulo N operator. As in [29]–[31],we assume that N and M are sufficiently large to ensurethat both kν0,p and lτ0,p are zero, i.e., there is no interferencecaused by fractional delay or fractional Doppler shift. We notethat for OTFS-OMA, increasing N and M can significantlyreduce spectral efficiency, whereas the use of large N and Mbecomes possible for OTFS-NOMA because of the spectrumsharing of users with different mobility profiles.

Define y0,k =[y0[k, 0] · · · y0[k,M − 1]

]Tand y0 =[

yT0,0 · · · yT0,N−1

]T. Similarly, the signal vector xi and

the noise vector z0 are constructed from xi[k, l] and z0[k, l],respectively. Based on (11), the system model can be expressedin matrix form as follows:

y0 = γ0H0x0 +

M∑q=1

γqH0xq + z0︸ ︷︷ ︸Interference and noise terms

, (12)

where H0 is a block-circulant matrix and defined as follows:

H0 =

A0,0 A0,N−1 · · · A0,2 A0,1

A0,1 A0,0. . . A0,3 A0,2

.... . . . . . . . .

...

A0,N−2 A0,N−3. . . A0,0 A0,N−1

A0,N−1 A0,N−2. . . A0,1 A0,0

, (13)

and each submatrix A0,n is an M×M circulant matrix whosestructure is determined by (11).

Example: Consider a special case with N = 4 and M = 3,and U0’s channel is given by

h0(τ, ν) =h0,0δ(τ)δ(ν) + h0,1δ

(τ − 1

M∆f

(ν − 3

NT

),

(14)

which means k0 = 0, k1 = 3, l0 = 0, l1 = 1. Therefore, theblock-circulant matrix is given by

H0 =

A0,0 A0,3 A0,2 A0,1

A0,1 A0,0 A0,3 A0,2

A0,2 A0,1 A0,0 A0,3

A0,3 A0,2 A0,1 A0,0

, (15)

where A0,0 = h0,0I3, A0,1 = A0,2 = 03×3 and A0,3 = 0 0 h0,1

h0,1 0 00 h0,1 0

.

Remark 1: It is well known that an n× n circulant matrixcan be diagonalized by the n × n discrete Fourier transform(DFT) and inverse DFT matrices, denoted by Fn and F−1

n ,respectively, i.e., the columns of the DFT matrix are theeigenvectors of the circulant matrix. We note that directlyapplying the DFT factorization to H0 is not possible, sinceH0 is not a circulant matrix, but a block circulant matrix.

Because of the structure of H0, inter-symbol interferencestill exists in the considered OTFS-NOMA system, and equal-ization is needed. We consider two equalization approaches,FD-LE and FD-DFE, which were both originally developedfor single-carrier transmission with cyclic prefix [34], [35].

Page 5: OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous … · 2019. 7. 15. · 1 OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous User Mobility Profiles Zhiguo

5

A. Design and Performance of FD-LE

The proposed FD-LE consists of two steps. Let ⊗ denote theKronecker product. The first step is to multiply the observationvector y0 by FN ⊗ FHM , which leads to the result in thefollowing proposition.

Proposition 1. By applying the detection matrix FN ⊗FHM toobservation vector y0, the received signals for OTFS-NOMAdownlink transmission can be written as follows:

y0 =D0(FN ⊗ FHM )

(γ0x0 +

M∑q=1

γqxq

)+ z0, (16)

where y0 = (FN ⊗ FHM )y0, z0 = (FN ⊗ FHM )z0, D0 is adiagonal matrix whose (kM+l+1)-th main diagonal elementis given by

Dk,l0 =

N−1∑n=0

M−1∑m=0

am,10,n ej2π lmM e−j2π

knN , (17)

for 0 ≤ k ≤ N − 1, 0 ≤ l ≤M − 1, and am,10,n is the elementlocated in the (nM + m + 1)-th row and the first column ofH0.

Proof. Please refer to Appendix A.

With the simplified signal model shown in (16), the secondstep of FD-LE is to apply

(FN ⊗ FHM

)−1D−1

0 to y0. Thus,U0’s received signal is given by

y0 =γ0x0 +

M∑q=1

γqxq +(FN ⊗ FHM

)−1D−1

0 z0︸ ︷︷ ︸Interference and noise terms

, (18)

where y0 =(FN ⊗ FHM

)−1D−1

0 y0. To simplify the analysis,we assume that the powers of all users’ information-bearingsignals are identical, which means that the transmit signal-to-noise ratio (SNR) can be defined as ρ = E{|x0[k, l]|2} =E{|xi(n)|2}, since the noise power is assumed to be nor-malized 6. The following lemma provides the signal-to-interference-plus-noise ratio (SINR) achieved by FD-LE.

Lemma 1. Assume that γi = γ1, for 1 ≤ i ≤ N . By usingFD-LE, the SINRs for detecting all x0[k, l], 0 ≤ k ≤ N − 1and 0 ≤ l ≤M − 1, are identical and given by

SINRLE0,kl =

ργ20

ργ21 + 1

NM

∑N−1

k=0

∑M−1

l=0|Dk,l

0 |−2. (19)

Proof. Please refer to Appendix B.

Remark 2: The proof of Lemma 1 shows that∑Mi=0 γ

2i = 1

can be simplified as γ20 +γ2

i = 1 for 1 ≤ i ≤M , which is themotivation for assuming γi = γ1. Following steps similar tothose in the proofs for Proposition 1 and Lemma 1, one canshow that directly applying H−1

0 to the observation vectoryields the same SINR. However, the proposed FD-LE schemecan be implemented more efficiently since

(FN ⊗ FHM

)−1=

6Following steps in the proof for Proposition 1 to show the statisticalproperty of z0 in (66), we can also show that Wi[n,m] ∼ CN(0, 1) ifzi[k, l] ∼ CN(0, 1).

FHN ⊗FM and D0 is a diagonal matrix. Hence, the inversionof a full NM ×NM matrix is avoided.

In this paper, the outage probability and the outage rateare used as performance criteria, since the outage probabilitycan provide a tight bound on the probability of erroneousdetection and is general in the sense that it does not de-pend on particular channel coding and modulation schemesused [36]. The outage probability achieved by FD-LE is givenby P(log(1 + SINRLE

0,kl) < R0), where Ri, 0 ≤ i ≤ M ,denotes Ui’s target data rate. It is difficult to analyze theoutage probability for the following two reasons. First, theDk,l

0 , k ∈ {0, · · · , N − 1}, l ∈ {0, · · · ,M − 1}, are notstatistically independent, and second, the distribution of a sumof the inverse of exponentially distributed random variablesis difficult to characterize. The following lemma provides anasymptotic result for the outage probability based on the SINRprovided in Lemma 1.

Lemma 2. If γ20 > γ2

1ε0, the diversity order achieved byFD-LE is one, where ε0 = 2R0 − 1. Otherwise, the outageprobability is always one.

Proof. Please refer to Appendix C.

Remark 3: Recall that the diversity order achieved by OTFS-OMA, where the high-mobility user, U0, solely occupies thebandwidth resources, is also one. Therefore, the use of OTFS-NOMA ensures that the additional M low-mobility usersare served without compromising U0’s diversity order, whichimproves the spectral efficiency compared to OTFS-OMA.B. Design and Performance of FD-DFE

Different from FD-LE, which is a linear equalizer, FD-DFE is based on the idea of feeding back previously detectedsymbols. Since both x0 and xq , q ≥ 1, experience the samefading channel, we first define x = γ0x0 +

∑Mq=1 γqxq , which

are the signals to be recovered by FD-DFE. Given the receivedsignal vector shown in (12), the outputs of FD-DFE are givenby

x = P0y0 −G0x, (20)

where x contains the decisions made on the symbols x, P0 isthe feed-forward part of the equalizer, and G0 is the feedbackpart of the equalizer. Similar to [34], [35], we use the followingchoices for P0 and G0: P0 = L0(HH

0 H0)−1HH0 , G0 = L0−

INM , where L0 is a lower triangular matrix with its maindiagonal elements being ones in order to ensure causality ofthe feedback signals. With the above choices for P0 and G0,U0’s signals can be detected as follows:

x =L0(HH0 H0)−1HH

0 y0 − (L0 − INM )x. (21)

For FD-DFE, L0 is obtained from the Cholesky decompositionof H0, i.e., HH

0 H0 = LH0 Λ0L0, where L0 is the desirablelower triangular matrix, and Λ0 is a diagonal matrix. There-fore, the estimates of x0 can be rewritten as follows:

x =x + L0(HH0 H0)−1HH

0 z0 (22)

=γ0x0 +

M∑q=1

γqxq + L0(HH0 H0)−1HH

0 z0︸ ︷︷ ︸Interference and noise terms

, (23)

Page 6: OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous … · 2019. 7. 15. · 1 OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous User Mobility Profiles Zhiguo

6

where perfect decision-making is assumed, i.e., x = x, andthere is no error propagation [35], [37], [38]. We note that (23)yields an upper bound on the reception reliability of FD-DFEwhen error propagation cannot be completely avoided.

Following steps similar to those in the proof of Lemma 1,the covariance matrix for the interference-plus-noise term canbe found as follows:

Ccov =ργ21IMN + L0(HH

0 H0)−1LH0 = ργ21IMN + Λ−1

0 ,(24)

where the last step follows from the fact that L0 is obtainedfrom the Cholesky decomposition of H0. Therefore, the SINRfor detecting x0[k, l] can be expressed as follows:

SINR0,kl =ργ2

0

ργ21 + λ−1

0,kl

, (25)

where λ0,kl is the (kM+l+1)-th element on the main diagonalof Λ0.

Remark 4: We note that there is a fundamental differencebetween the two equalization schemes. One can observefrom (19) that the SINRs achieved by FD-LE for differentx0[k, l] are identical. However, for FD-DFE, different symbolsexperience different effective fading gains, λ0,kl. Therefore,FD-DFE can realize unequal error protection for data streamswith different priorities. This comes at the price of a highercomputational complexity.

We further note that the use of FD-DFE also ensures thatmulti-path diversity can be harvested, as shown in the follow-ing. The outage performance analysis for FD-DFE requiresknowledge of the distribution of the effective channel gains,λ0,kl. Because of the implicit relationship between Λ0 andH0, a general expression for the outage probability achievedby FD-DFE is difficult to obtain. However, analytical resultscan be developed for special cases to show that the use ofFD-DFE can realize the maximal multi-path diversity.

In particular, the SINR for x0[N−1,M−1] is a function ofλ0,(N−1)(M−1) which is the last element on the main diagonalof Λ0. Recall that Λ0 is obtained via Cholesky decomposition,i.e., HH

0 H0 = LH0 Λ0L0. Because L0 is a lower triangularmatrix, λ0,(N−1)(M−1) is equal to the element of HH

0 H0

located in the NM -th column and the NM -th row, whichmeans

λ0,(N−1)(M−1) =

P0∑p=0

|h0,p|2. (26)

Since the channel gains are i.i.d. and follow h0,p ∼CN(0, 1

P0+1 ), the probability density function (pdf) of√P0 + 1λ0,(N−1)(M−1) is given by

f(x) =1

P0!e−xxP0 . (27)

By using the above pdf, the outage probability and the diversityorder can be obtained by some algebraic manipulations, asshown in the following corollary.

Corollary 1. Assume γ20 > γ2

1ε0. The use of FD-DFErealizes the following outage probability for detection ofx0[N − 1,M − 1]:

P0N−1,M−1 =

1

P0!g

(P0 + 1,

ε0(P0 + 1)

ρ(γ20 − γ2

1ε0)

), (28)

where g(·) denotes the incomplete Gamma function. The fullmulti-path diversity order, P0 + 1, is achievable for x0[N −1,M − 1]

Remark 5: The results in Corollary 1 can be extended toOTFS-OMA with FD-DFE straightforwardly. We also notethat diversity gains larger than one are not achievable with FD-LE as shown in Lemma 2, which is one of the disadvantagesof FD-LE compared to FD-DFE.

Remark 6: We note that not all NM data streams can benefitfrom the full diversity gain. The simulation results provided inSection VII (Fig. 2) show that the diversity orders achievablefor x0[k, l], k < N−1 and l < M−1, are smaller than that forx0[N−1,M−1], and the diversity order for x0[0, 0] is one, i.e.,the same value as for FD-LE. We further note that the diversityresult in Corollary 1 is obtained by assuming that there is noerror propagation, i.e., it is assumed that when detecting thei-th element of x in (21), the first (i− 1) elements of x havealready been correctly detected. Because of this assumption,the diversity gain developed in Corollary 1 is an upper boundon the diversity gain achieved by FD-DFE. If the assumptiondoes not hold, the diversity orders for x0[k, l] will be cappedby the worst case, i.e., the diversity gain for x0[0, 0] which isone.

Remark 7: FD-DFE entails a higher implementation com-plexity than FD-LE, as explained in the following. The com-plexity of FD-LE is mainly caused by computing the inversionof HH

0 H0. However, for FD-DFE, L0 needs to be computed,in addition to (HH

0 H0)−1, as shown in (21). Recall that L0 isobtained from the Cholesky decomposition of the NM×NMmatrix H0, which entails a computational complexity ofO(N3M3). Therefore, the computational complexity of FD-DFE is higher than that of FD-LE, but FD-DFE offers aperformance gain in terms of reception reliability comparedto FD-LE, as shown in Section VII.

V. DOWNLINK OTFS-NOMA - DETECTING THE NOMAUSERS’ SIGNALS

Successive interference cancellation (SIC) will be carriedout by the NOMA users, where each NOMA user first decodesthe high mobility user’s signal in the delay-Doppler planeand then decodes its own signal in the time-frequency plane.The two stages of SIC are discussed in the following twosubsections, respectively.A. Stage I of SIC

Following steps similar to the ones in the previous section,each NOMA user also observes the mixture of the (M + 1)users’ signals in the delay-Doppler plane as follows:

yi = γ0Hix0 +

M∑q=1

γqHixq + zi︸ ︷︷ ︸Interference and noise terms

, (29)

Page 7: OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous … · 2019. 7. 15. · 1 OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous User Mobility Profiles Zhiguo

7

where Hi and zi are defined similar to H0 and z0, respectively.We assume that the low-mobility NOMA users do not

experience Doppler shift, and therefore, their channels can besimplified as follows:

hi(τ) =

Pi∑p=0

hi,pδ(τ − τi,p), (30)

for 1 ≤ i ≤ K, which means that each NOMA user’s channelmatrix, Hi, 1 ≤ i ≤ N , is a block-diagonal matrix, i.e.,Ai,0 is a non-zero circulant matrix and Ai,n = 0M×M ,for 1 ≤ n ≤ N − 1. Therefore, each NOMA user candivide its observation vector into N equal-length sub-vectors,i.e., yi =

[yTi,0 · · · yTi,N−1

]T, which yields the following

simplified system model:

yi,n = γ0Ai,0x0,n +

M∑q=1

γqAi,0xq,n + zi,n, (31)

where, similar to yi,n, xi,n and zi,n are obtained from xiand zi, respectively. Therefore, unlike the high-mobility user,the NOMA users can perform their signal detection based onreduced-size observation vectors, which reduces the computa-tional complexity.

Since Ai,0 is a circulant matrix, the two equalizationapproaches used in the previous section are still applicable.First, we consider the use of FD-LE. Following the same stepsas in the proof for Proposition 1, in the first step of FD-LE, theDFT matrix is applied to the reduced-size observation vector,which yields the following:

yi,n =DiFHM

(γ0x0,n +

M∑q=1

γqxq,n

)+ zi,n, (32)

where yi,n = FHMyi,n and zi,n = FHMzi,n. Compared to Di

in Proposition 1 which is an NM × NM matrix, Di is anM × M diagonal matrix, and its (l + 1)-th main diagonalelement is given by Dl

i =∑M−1m=0 a

m,1i,0 ej2π

lmM , for 0 ≤ l ≤

M − 1, where am,1i,0 is the element located in the (m + 1)-throw and the first column of Ai,0. Unlike conventional OFDM,which uses FM at the receiver, FHM is used here. BecauseFHMAi,0FM =

[FMA∗i,0F

HM

]∗, the sign of the exponent of

the exponential component of Dli is different from that in the

conventional case.In the second step of FD-LE, FMD−1

i is applied to yi,n.Following steps similar to the ones in the proof for Lemma 1,the SINR for detecting x0[k, l] can be obtained as follows:

SINRi,LE0,kl =

ργ20

ργ21 + 1

M

∑M−1

l=0|Dl

i|−2. (33)

We note that SINRi,LE0,k1l

= SINRi,LE0,k2l

, for k1 6= k2, due to thetime invariant nature of the channels.

If FD-DFE is used, the corresponding SINR for detectingx0[k, l] is given by

SINRi,DFE0,kl =

ργ20

ργ21 + λ−1

0,l

, (34)

where λ0,l is obtained from the Cholesky decomposition ofAi,0. The details for the derivation of (34) are omitted heredue to space limitations.

B. Stage II of SIC

Assume that U0’s NM signals can be decoded and removedsuccessfully, which means that, in the time-frequency plane,the NOMA users observe the following:

Yi[n,m] =

M∑q=1

γqHi[n,m]Xq[n,m] +Wi[n,m] (35)

=γ1Hi[n,m]xm+1(n) +Wi[n,m],

where the last step follows from the mapping scheme used in(6) and it is assumed that all NOMA users employ the samepower allocation coefficient. We note that Ui is only interestedin Yi[n, i−1], 0 ≤ n ≤ N−1. Therefore, Ui’s n-th informationbearing signal, xi(n), can be detected by applying a one-tapequalizer as follows:

xi(n) =Yi[n, i− 1]

γ1Hi[n, i− 1], (36)

which means that the SNR for detecting xi(n) is given by

SNRi,n = ργ21 |Di−1

i |2, (37)

since Wi[n, i− 1] is white Gaussian noise and Hi[n, i− 1] =Di−1i . We note that SNRi,n1

= SNRi,n2, for n1 6= n2, which

is due to the time-invariant nature of the channel.Without loss of generality, assume that the same target data

rate Ri is used for xi(n), 0 ≤ n ≤ N − 1. Therefore, theoutage probability for xi(n) is given by

PLEi,n = 1− P

(SNRi,n > εi,SINRi,LE

0,kl > ε0,∀l)

(38)

= 1− P

(ργ2

1 |Di−1i |2 > εi,

ργ20

ργ21 + 1

M

∑M−1l=0 |Dl

i|−2> ε0

),

if FD-LE is used in the first stage of SIC. If FD-DFE is usedin the first stage of SIC, the outage probability for xi(n) isgiven by

PDFEi,n =1− P

(SNRi,n > εi,SINRi,DFE

0,kl > ε0,∀l)

(39)

=1− P

(ργ2

1 |Di−1i |2 > εi,

ργ20

ργ21 + λ−1

0,l

> ε0,∀l

),

where εi = 2Ri−1. Again because of the correlation betweenthe random variables |Dl

i|−2 and λ0,l, the exact expressions forthe outage probabilities are difficult to obtain. Alternatively,the achievable diversity order is analyzed in the followingsubsections.

1) Random User Scheduling: If the M users are randomlyselected from the K available users, which means that each|Dl

i|2 is complex Gaussian distributed. For the FD-LE case,the outage probability, PLE

i,n, can be upper bounded as follows:

PLEi,n ≤ 1− P

(ργ2

1 |Dmini |2 > εi,

ργ20

ργ21 + |Dmin

i |−2> ε0

),

(40)

Page 8: OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous … · 2019. 7. 15. · 1 OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous User Mobility Profiles Zhiguo

8

where |Dmini |2 = min{|Dm

i |2, 0 ≤ m ≤ M − 1}. The upperbound on the outage probability in (40) can be rewritten asfollows:

PLEi,n ≤ 1− P

(|Dmin

i |2 > ε), (41)

where ε = max{

ε0ρ(γ2

0−γ21ε0)

, εiργ2

1

}. As a result, an upper

bound on the outage probability can be obtained as follows:

PLEi,n ≤ P

(|Dmin

i |2 < ε)≤MP

(|D0

i |2 < ε).=

1

ρ, (42)

where Po.= ρ−d denotes exponential equality, i.e., d =

− limρ→∞

log Po

log ρ [36]. Therefore, the following corollary can be

obtained.

Corollary 2. For random user scheduling and FD-LE, adiversity order of 1 is achievable at the NOMA users.

Our simulation results in Section VII show that a diversityorder of 1 is also achievable for FD-DFE, although we do nothave a formal proof for this conclusion, yet.

2) Realizing Multi-User Diversity: The diversity order ofOTFS-NOMA can be improved by carrying out opportunisticuser scheduling, which yields multi-user diversity gains. Forillustration purpose, we propose a greedy user schedulingpolicy, where a single NOMA user is scheduled to transmitin all resource blocks of the time-frequency plane. Fromthe analysis of the random scheduling case we deduce that|Dmin

i |2 is critical to the outage performance. Therefore, thescheduled NOMA user, denoted by Ui∗ , is selected based onthe following criterion:

i∗ = arg maxi∈{1,··· ,K}

{|Dmin

i |2}. (43)

By using the assumption that the users’ channel gains areindependent and following steps similar to the ones in theproof for Lemma 2, the following corollary can be obtainedin a straightforward manner.

Corollary 3. For FD-LE, the user scheduling strategy shownin (43) realizes the maximal multi-user diversity gain, K.

Remark 8: The reason why a multi-user diversity gain ofK can be realized by the proposed scheduling strategy isexplained in the following. Recall that the SINR for FD-LEto detect x0[k, l] is SINRi,LE

0,kl =ργ2

0

ργ21+ 1

M

∑M−1

l=0|Dli|−2

. If this

SINR is too small, the first stage of SIC will fail and anoutage event will occur. To improve the SINR, it is importantto ensure that for a scheduled user, its weakest channel gain,|Dmin

i |2 = min{|Dmi |2, 0 ≤ m ≤ M − 1}, is not too small.

The used scheduling strategy shown in (43) is essentially amax-min strategy and ensures that the user with the strongest|Dmin

i |2 is selected from the K candidates, which effectivelyexploits multi-user diversity.

We note that the user scheduling strategy shown in (43)is also useful for improving the performance of FD-DFE, asshown in Section VII.

VI. UPLINK OTFS-NOMA TRANSMISSION

The design of uplink OTFS-NOMA is similar to that ofdownlink OTFS-NOMA, and due to space limitations, wemainly focus on the difference between the two cases in thissection. Again, we assume that U0 is grouped with M NOMAusers, selected from the K available users. U0’s NM signalsare placed in the delay-Doppler plane, and are denoted byx0[k, l], where 0 ≤ k ≤ N − 1 and 0 ≤ l ≤ M − 1. Thecorresponding time-frequency signals, X0[n,m], are obtainedby applying ISFFT to x0[k, l]. On the other hand, the NOMAusers’ signals, xi(n), are mapped to time-frequency signals,Xi[n,m], according to (6).

Following steps similar to the ones for the downlink case,the base station’s observations in the time-frequency plane aregiven by

Y [n,m] =

M∑q=0

Hq[n,m]Xq[n,m] +W [n,m] (44)

=H0(n,m)

NM

N−1∑k=0

M−1∑l=0

x0[k, l]ej2π( knN −mlM )

+

M∑q=1

Hq[n,m]Xq[n,m] +W [n,m],

where W [n,m] is the Gaussian noise at the base station inthe time-frequency plane. We assume that all users employthe same transmit pulse as well as the same transmit power.The base station applies SIC to first detect the NOMA users’signals in the time-frequency plane, and then tries to detectthe high-mobility user’s signals in the delay-Doppler plane, asshown in the following two subsections.

A. Stage I of SIC

The base station will first try to detect the NOMA users’signals in the time-frequency plane by treating the signals fromU0 as noise, which is the first stage of SIC.

By using (6), xi(n) can be estimated as follows:

xi(n) =Y [n, i− 1]

Hi[n, i− 1](45)

=xi[n] +H0[n, i− 1]X0[n, i− 1] +W [n, i− 1]

Hi[n, i− 1].

Define an NM×1 vector, x0, whose (nM+m+1)-th elementis X0[n,m]. Recall that X0[n,m] is obtained from the ISFFTof x0[k, l], i.e.,

x0 =(FHN ⊗ FM )x0, (46)

which means X0[n,m] follows the same distribution asx0[k, l]. By applying steps similar to those in the proof forLemma 1, the SINR for detecting xi(n) is given by

SINRi,n =ρ|Hi[n, i− 1]|2

ρ|H0[n, i− 1]|2 + 1. (47)

Unlike downlink OTFS-NOMA, there are two possiblestrategies for uplink OTFS-NOMA to combat multiple accessinterference, as shown in the following two subsections.

Page 9: OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous … · 2019. 7. 15. · 1 OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous User Mobility Profiles Zhiguo

9

1) Adaptive-Rate Transmission: One strategy to combatmultiple access interference is to impose the following con-straint on xi(n):

Ri,n ≤ log

(1 +

ρ|Hi[n, i− 1]|2

ρ|H0[n, i− 1]|2 + 1

), (48)

which means that the first stage of SIC is guaranteed to besuccessful. Therefore, the M low-mobility users are servedwithout affecting U0’s outage probability, i.e., the use ofNOMA is transparent to U0.

Because Ui’s data rate is adaptive, outage events when de-coding xi(n) do not happen, which means that an appropriatecriterion for the performance evaluation is the ergodic rate.Recall that Hi[n, i − 1] = Di−1

i and H0[n, i − 1] = Dn,i−10 .

Therefore, Ui’s ergodic rate is given by

E{Ri,n} ≤ E

{log

(1 +

ρ|Di−1i |2

ρ|Dn,i−10 |2 + 1

)}. (49)

We note that the ergodic rate of uplink OTFS-NOMA canbe further improved by modifying the user scheduling strategyproposed in (43), as shown in the following. Particularly,denote the NOMA user which is scheduled to transmit in them-th frequency subchannel by Ui∗m , and this user is selectedby using the following criterion:

i∗m = arg maxi∈{1,··· ,K}

{|Dm

i |2}. (50)

We note that a single user might be scheduled on multiplefrequency channels, which reduces user fairness.

Because the integration of the logarithm function appearingin (49) leads to non-insightful special functions, we will usesimulations to evaluate the ergodic rate of OTFS-NOMA inSection VII.

2) Fixed-Rate Transmission: If the NOMA users do nothave the capabilities to adapt their transmission rates, theyhave to use fixed data rates Ri for transmission, which meansthat outage events can happen and the achieved outage perfor-mance is analyzed in the following. For illustration purposes,we focus on the case when the user scheduling strategy shownin (50) is used.

The outage probability for detecting xi∗m(n) is given by

Pi∗m,n = P

log

1 +ρ|Di∗m−1

i∗m|2

ρ|Dn,i∗m−10 |2 + 1

< Ri∗m

. (51)

Following steps similar to the ones in the proof for Lemma 2,we can show that |Di∗m−1

i∗m|2 and |Dn,i∗m−1

0 |2 are independent,and the use of the user scheduling scheme in (50) simplifiesthe outage probability as follows:

Pi∗m,n =P

log

1 +ρ|Di∗m−1

i∗m|2

ρ|Dn,i∗m−10 |2 + 1

< Ri∗m

(52)

=

∫ ∞0

(1− e−

εi∗m(1+ρy)

ρ

)Ke−ydy,

where we use the fact that the cumulative distribution functionof |Di∗m−1

i∗m|2 is (1− e−x)

K because of the adopted userscheduling strategy.

The outage probability can be further simplified as follows:

Pi∗m,n =

K∑k=0

(K

k

)(−1)k

∫ ∞0

e−kεi∗m

(1+ρy)

ρ −ydy (53)

=

K∑k=0

(K

k

)(−1)ke−

kεi∗mρ

1

kεi∗m + 1.

At high SNR, the outage probability can be approximatedas follows:

Pi∗m,n ≈K∑k=0

(K

k

)(−1)k

1

kεi∗m + 1, (54)

which is no longer a function of ρ, i.e., the outage probabilityhas an error floor at high SNR. This is due to the fact thatUi∗m is subject to strong interference from U0.

However, we can show that the error floor experienced byUi∗m can be reduced by increasing K, i.e., inviting more oppor-tunistic users for NOMA transmission. In particular, assumingKεi∗m → 0, the outage probability can be approximated asfollows:

Pi∗m,n ≈K∑k=0

(K

k

)(−1)k

(1 + kεi∗m

)−1(55)

≈K∑k=0

(K

k

)(−1)k

∞∑l=0

(−1)lklεli∗m ,

where we use the fact that (1+x)−1 =∑∞l=0(−1)lxl, |x| < 1.

Therefore, the error floor at high SNR can be approximatedas follows:

Pi∗m,n ≈∞∑l=0

(−1)lεli∗m

K∑k=0

(K

k

)(−1)kkl (56)

≈(−1)KεKi∗m(−1)KK! = K!εKi∗m ,

where we use the identities∑Kk=0

(Kk

)(−1)kkl = 0, for l < K

and∑Kk=0

(Kk

)(−1)kkK = (−1)KK!.

The conclusion that increasing K reduces the error floorcan be confirmed by defining f(k) = k!εki∗m and using thefollowing fact:

f(k)− f(k + 1) = k!εki∗m

(1− (k + 1)εi∗m

)> 0, (57)

where it is assumed that kεi∗m → 0.

B. Stage II of SIC

If adaptive transmission is used, the NOMA users’ sig-nals can be detected successfully during the first stageof SIC. Therefore, they can be removed from the obser-vations at the base station, i.e., Y [n,m] = Y [n,m] −∑Nq=1Hq(n,m)Xq[n,m], and SFFT is applied to obtain the

delay-Doppler observations as follows:

y0[k, l] =1

NM

N−1∑n=0

M−1∑m=0

Y [n,m]e−j2π(nkN −mlM ) (58)

=

P0∑p=0

h0,px0[(k − kµ0,p)N , (l − lτ0,p)M ] + z[k, l],

Page 10: OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous … · 2019. 7. 15. · 1 OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous User Mobility Profiles Zhiguo

10

TABLE IDELAY-DOPPLER PROFILE FOR U0’S CHANNEL

Propagation path index (p) 0 1 2 3Delay (τ0,p) µs 8.33 25 41.67 58.33Delay tap index (lτ0,p ) 2 6 10 14Doppler (ν0,p) Hz 0 0 468.8 468.8Doppler tap index (kν0,p ) 0 0 1 1

where z[k, l] denote additive noise. U0’s signals can be de-tected by applying either of the two considered equalizationapproaches, and the same performance as for OTFS-OMAcan be realized. The analytical development is similar to thedownlink case, and hence is omitted due to space limitations.

However, if fixed-rate transmission is used, the uplinkoutage events for decoding x0[k, l] are different from thedownlink ones, as shown in the following. Particularly, the useof FD-LE yields the following SINR expression for decodingx0[k, l]:

SINRLE0,kl =

ρ1

NM

∑N−1k=0

∑M−1l=0 |D

k,l0 |−2

. (59)

If FD-DFE is used, the SNR for detection of x0[k, l] is givenby

SINRDFE0,kl = ρλ0,kl. (60)

Therefore, the outage probability for detecting x0[k, l] is givenby

Pkl =1− P(SINRDFE/LE

0,kl > ε0,SNRi,n > εi∀i, n)

≥1− P (SNRi,n > εi∀i, n) ≥ P (SNR1,0 < εi) .

Since P (SNR1,0 < εi) has an error floor as shown in theprevious subsection, the uplink outage probability for detectionof U0’s signals does not go to zero even if ρ → ∞, whichis different from the downlink case. Therefore, if fixed-ratetransmission is used, adding the M low-mobility users into thebandwidth, which would be solely occupied by U0 in OTFS-OMA, improves connectivity but degrades U0’s performance.

VII. NUMERICAL STUDIES

In this section, the performance of OTFS-NOMA is evalu-ated via computer simulations. Similar to [26]–[28], we firstdefine the delay-Doppler profile for U0’s channel as shownin Table I, where P0 = 3 and the subchannel spacing is∆f = 7.5 kHz. Therefore, the maximal speed correspondingto the largest Doppler shift ν0,3 = 468.8 Hz is 126.6 km/h ifthe carrier frequency is fc = 4 GHz. On the other hand, theNOMA users’ channels are assumed to be time invariant withPi = 3 propagation paths, i.e., τi,p = 0 for p ≥ 4, i ≥ 1. Forall the users’ channels, we assume that

∑Pip=0 E{|hi,p|2} = 1

and |hi,p|2 ∼ CN(

0, 1Pi+1

). For the fixed rate transmission

scheme, a simple choice for power allocation (γ20 = 3

4 andγ2i = 1

4 for i > 0) is considered. The performance of OTFS-NOMA could be further improved by optimizing γi accordingto the users’ channel conditions and QoS requirements.

In Fig. 1, downlink OTFS-NOMA transmission is evaluatedby using the normalized outage sum rate as the performancecriterion which is defined as 1

NM

∑N−1k=0

∑M−1l=0 (1−P0,kl)R0

and 1NM

∑N−1k=0

∑M−1l=0 (1−P0,kl)R0 + 1

NM

∑Mi=1

∑N−1n=0 (1−

0 5 10 15 20 25 30

The transmit SNR ρ (dB)

0

0.5

1

1.5

2

2.5

Norm

alizedOutage

Sum

Rates

OMA-LEOMA-DFENOMA-LENOMA-DFE

(a) R0 = 1 BPCU and Ri = 1.5 BPCU

0 5 10 15 20 25 30

The transmit SNR ρ (dB)

0

0.5

1

1.5

NormalizedOutage

Sum

Rates

OMA-LEOMA-DFENOMA-LENOMA-DFE

(b) R0 = 0.5 BPCU and Ri = 1 BPCU

Fig. 1. Impact of OTFS-NOMA on the downlink sum rates. M = N =K = 16. P0 = Pi = 3. BPCU denotes bit per channel use. γ20 = 3

4and

γ2i = 14

for i > 0. Random user scheduling is used.

Pi,n)Ri for OTFS-OMA and OTFS-NOMA, respectively.Fig. 1 shows that the use of OTFS-NOMA can significantlyimprove the sum rate at high SNR for both considered choicesof R0 and Ri. The reason for this performance gain is the factthat the maximal sum rate achieved by OTFS-OMA is cappedby R0, whereas OTFS-NOMA can provide sum rates up toR0 + Ri. Comparing Fig. 1(b) to Fig. 1(a), one can observethat the performance loss of OTFS-NOMA at low SNR canbe mitigated by reducing the target data rates, since reducingthe target rates improves the probability of successful SIC.Furthermore, both figures show that FD-DFE outperforms FD-LE in the entire considered range of SNRs; however, we notethat the performance gain of FD-DFE over FD-LE is achievedat the expense of increased computational complexity.

In Fig. 2, the outage probabilities achieved by downlinkOTFS-OMA and OTFS-NOMA are shown. As can be seenfrom Fig. 2(a), the diversity order achieved with FD-LE fordetection of x0[k, l] is one, as expected from Lemma 2. Asdiscussed in Section IV-B, one advantage of FD-DFE overFD-LE is that FD-DFE facilitates multi-path fading diversitygains, whereas FD-LE is limited to a diversity gain of one.

Page 11: OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous … · 2019. 7. 15. · 1 OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous User Mobility Profiles Zhiguo

11

This conclusion is confirmed by Fig. 2(a), where the analyt-ical results developed in Corollary 1 are also verified. Fig.2(b) shows the outage probabilities achieved by FD-DFE fordifferent x0[k, l]. As shown in the figure, the lowest outageprobability is obtained for x0[N − 1,M − 1], whereas theoutage probability of x0[0, 0] is the largest, which is due tothe fact that, in FD-DFE, different signals x0[k, l] are affectedby different effective channel gains, λ0,kl. Another impor-tant observation from the figures is that the FD-LE outageprobability is the same as the FD-DFE outage probability fordetection of x0[0, 0], which fits the intuition that for FD-DFEthe reliability of the first decision (x0[0, 0]) is the same asthat of FD-LE. For the same reason, FD-LE and FD-DFEyield similar performance for detection of the NOMA users’signals, since the FD-DFE outage performance is dominatedby the reliability for detection of x0[0, 0], and hence is thesame as that of FD-LE.

In addition to multi-path diversity, another degree of free-

0 5 10 15 20 25 30

The transmit SNR ρ (dB)

10-3

10-2

10-1

100

Outage

Probab

ilities

U0, OMA-LE

U0, OMA-DFE, sim.

U0, OMA-DFE, ana.

U0, NOMA-LE

U0, NOMA-DFE, sim.

U0, NOMA-DFE, ana.

NOMA users, LE

(a) Outage probabilities of U0 and the NOMA users

0 5 10 15 20 25 30

The transmit SNR ρ (dB)

10-3

10-2

10-1

100

U0’S

Outage

Probab

ility

OMA-DFE, x0[0, 0]

NOMA-DFE, x0[0, 0]

OMA-DFE, x0[N2 − 1, M2 − 1]

NOMA-DFE, x0[N2 − 1, M2 − 1]

OMA-DFE, x0[N − 1,M − 1]

NOMA-DFE, x0[N − 1,M − 1]

(b) Performance of FD-DFE

Fig. 2. The outage performance of downlink OTFS-OMA and OTFS-NOMA.M = N = K = 16. P0 = Pi = 3. γ20 = 3

4and γ2i = 1

4for i > 0. R0 =

0.5 BPCU and Ri = 1 BPCU. In Fig. 2(a), for FD-DFE, the performance ofx0[N − 1,M − 1] is shown. Random user scheduling is used.

0 5 10 15 20 25 30

The transmit SNR ρ (dB)

0

0.5

1

1.5

2

2.5

Normalized

Outage

Sum

Rates

OMA-LEOMA-DFENOMA-LE, randomNOMA-DFE, randomNOMA-LE, schedulingNOMA-DFE, scheduling

Fig. 3. Impact of user scheduling on the downlink outage sum rates. P0 =Pi = 3. R0 = 1 BPCU and Ri = 1.5 BPCU. M = N = K = 16, γ20 = 3

4and γ2i = 1

4for i > 0.

0 5 10 15 20 25 30

The transmit SNR ρ (dB)

0.5

1

1.5

2

2.5

3

Ergodic

RateGain

Random

User scheduling, K=4

User scheduling, K=8

User scheduling, K=16

Fig. 4. The ergodic rate gain of OTFS-NOMA over OTFS-OMA. The NOMAusers adapt their data rates according to (48). P0 = Pi = 3. M = N = 16.

dom available in the considered OTFS-NOMA downlinkscenario is multi-user diversity, which can be harvested byapplying user scheduling as discussed in Section V-B. Fig.3 demonstrates the benefits of exploiting multi-user diversity.With random user scheduling, at low SNR, the performanceof OTFS-NOMA is worse than that of OTFS-OMA, which isalso consistent with Fig. 1. By increasing the number of usersparticipating in OTFS-NOMA, the performance of OTFS-NOMA can be improved, particularly at low and moderateSNR. For example, for FD-LE, the performance of OTFS-NOMA approaches that of OTFS-OMA at low SNR byexploiting multi-user diversity, and for FD-DFE, an extra gainof 0.5 BPCU can be achieved at moderate SNR.

In Figs. 4 and 5, the performance of uplink OTFS-NOMA isevaluated. As discussed in Section VI, the NOMA users havetwo choices for their transmission rates, namely adaptive andfixed rate transmission. The use of adaptive rate transmissioncan ensure that the implementation of NOMA is transparent toU0, which means that U0’s QoS requirements are strictly guar-

Page 12: OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous … · 2019. 7. 15. · 1 OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous User Mobility Profiles Zhiguo

12

0 5 10 15 20 25 30The transmit SNR ρ (dB)

0

0.2

0.4

0.6

0.8

1

1.2Norm

alizedOutage

Sum

Rates

OMA-LEOMA-DFENOMA-LENOMA-DFE

Random user scheduling

User scheduling, K=16

User scheduling, K=8

(a) Outage Sum Rate (Ri = 1 BPCU)

0 5 10 15 20 25 30

The transmit SNR ρ (dB)

10-2

10-1

100

Ui’s

Outage

Probability

Random, Ri = 1 BPCURandom, Ri = 0.8 BPCUWith scheduling, Ri = 1 BPCU,K=8With scheduling, Ri = 0.8 BPCU,K=8With scheduling, Ri = 1 BPCU,K=16With scheduling, Ri = 0.8 BPCU,K=16

(b) Outage Probability

Fig. 5. The performance of uplink OTFS-NOMA. Fixed-rate transmission isused by the NOMA users. M = N = 16. P0 = Pi = 3. R0 = 0.5 BPCU.γ20 = 3

4and γ2i = 1

4for i > 0.

anteed. Since U0 achieves the same performance for OTFS-NOMA and OTFS-OMA when adaptive rate transmission isused, we only focus on the NOMA users’ performance, wherethe ergodic rate in (49) is used as the criterion. We note thatthis ergodic rate is the net performance gain of OTFS-NOMAover OTFS-OMA, which is the reason why the vertical axisin Fig. 4 is labeled ‘Ergodic Rate Gain’. When the M usersare randomly selected from the K NOMA users, the ergodicrate gain is moderate, e.g., 1.5 bit per channel use (BPCU) atρ = 30 dB. By applying the scheduling strategy proposed in(50), the ergodic rate gain can be significantly improved, e.g.,nearly by a factor of two compared to the random case withK = 16 and ρ = 30 dB.

Fig. 5 focuses on the case with fixed rate transmission, andsimilar to Fig. 1, the normalized outage sum rate is used asperformance criterion in Fig. 5(a). One can observe that withrandom user scheduling, the sum rate of OTFS-NOMA issimilar to that of OTFS-OMA. This is due to the fact that no in-terference mitigation strategy, such as power or rate allocation,

is used for NOMA uplink transmission, which means that U0

and the NOMA users cause strong interference to each otherand SIC failure may happen frequently. By applying the userscheduling strategy proposed in (50), the channel conditions ofthe scheduled users become quite different, which facilitatesthe implementation of SIC. This benefit of user schedulingcan be clearly observed in Fig. 5(a), where NOMA achievesa significant gain over OMA although advanced power or rateallocation strategies are not used. Fig. 5(a) also shows that thedifference between the performance of FD-LE and FD-DFEis insignificant for the uplink case. This is due to the fact thatthe outage events during the first stage of SIC dominate theoutage performance, and they are not affected by whether FD-LE or FD-DFE is employed. Another important observationfrom Fig. 5(a) is that the maximal sum rate R0 + Ri cannotbe realized, even at high SNR. The reason for this behaviouris the existence of the error floor for the NOMA users’ outageprobabilities, as shown in Fig. 5(b). The analytical resultsprovided in Section V-B show that increasing K can reducethe error floor, which is confirmed by Fig. 5(b).

VIII. CONCLUSIONS

In this paper, we have proposed OTFS-NOMA uplink anddownlink transmission schemes, where users with differentmobility profiles are grouped together for the implemen-tation of NOMA. The analytical results developed in thepaper demonstrate that both the high-mobility and the low-mobility users benefit from the application of OTFS-NOMA.In particular, the use of NOMA enables the spreading of thesignals of a high-mobility user over a large amount of time-frequency resources, which enhances the OTFS resolutionand improves the detection reliability. In addition, OTFS-NOMA ensures that the low-mobility users have access tothe bandwidth resources which would be solely occupiedby the high-mobility users in OTFS-OMA. Hence, OTFS-NOMA improves the spectral efficiency and reduces latency.An interesting topic for future works is studying the impactof non-zero fractional delays and fractional Doppler shiftson the performance of the developed OTFS-NOMA protocol.Furthermore, in this paper, the users’ channel gains (the tapsof the delay-Doppler impulse response) have been assumed tobe Gaussian distributed, and an important direction for futureresearch is to investigate the impact of other types of channeldistributions on the performance of OTFS-NOMA. Moreover,the combination of emerging spectrally efficient 5G solutions,such as 5G New Radio Bandwidth Part (5G-NR-BWP) [39],[40] and software-controlled metasurfaces [41], with OTFS-NOMA is also a promising topic for future research.

APPENDIX APROOF FOR PROPOSITION 1

Intuitively, the use of FN ⊗ FHM is analogous to theapplication of the ISFFT which transforms signals from thedelay-Doppler plane to the time-frequency plane, where inter-symbol interference is removed, i.e., the user’s channel matrixis diagonalized. The following proof confirms this intuitionand reveals how the diagonalized channel matrix is related to

Page 13: OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous … · 2019. 7. 15. · 1 OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous User Mobility Profiles Zhiguo

13

the original block circulant matrix. We first apply FN ⊗ IMto y0, which yields the following:

(FN ⊗ IM )y0 (61)

=(FN ⊗ IM )H0

(γ0x0 +

M∑q=1

γqxq

)+ (FN ⊗ IM )z0

=diag

{N−1∑n=0

A0,ne−j 2πln

N , 0 ≤ l ≤ N − 1

}(FN ⊗ IM )

×

(γ0x0 +

M∑q=1

γqxq

)+ (FN ⊗ IM )z0,

where diag{B1, · · · ,BN} denotes a block-diagonal matrixwith Bn, 1 ≤ n ≤ N , on its main diagonal. Note that∑N−1n=0 A0,ne

−j 2πlnN , 0 ≤ l ≤ N − 1, is a sum of N M ×M

circulant matrices, each of which can be further diagonalizedby FM . Therefore, we can apply IN ⊗FHM to (FN ⊗ IM )y0,which yields the following:

(IN ⊗ FHM )(FN ⊗ IM )y0 (62)

=diag

{N−1∑n=0

Λ0,ne−j 2πln

N , 0 ≤ l ≤ N − 1

}

× (FN ⊗ IM )(IN ⊗ FHM )

(γ0x0 +

M∑q=1

γqxq

)+ (IN ⊗ FHM )(FN ⊗ IM )z0,

where Λ0,n is a diagonal matrix, Λ0,n =

diag{∑M−1

m=0 am,10,n e

j 2πtmM , 0 ≤ t ≤M − 1

}, and am,10,n is

the element located in the m-th row and first column of A0,n.By applying a property of the Kronecker product, (A ⊗

B)(C ⊗ D) = (AC) ⊗ (BD), the received signals can besimplified as follows:

(FN ⊗ FHM )y0 (63)

=diag

{N−1∑n=0

Λ0,ne−j 2πln

N , 0 ≤ l ≤ N − 1

}︸ ︷︷ ︸

D0

(FN ⊗ FHM )

×

(γ0x0 +

M∑q=1

γqxq

)+ (FN ⊗ FHM )z0,

where the (kM + l + 1)-th element on the main diagonal ofD0 is Dk,l

0 as defined in the proposition. The proof for theproposition is complete.

APPENDIX BPROOF FOR LEMMA 1

In order to facilitate the SINR analysis, the system model in(18) is further simplified. Define X[n,m] =

∑Mi=1Xi[n,m].

With the mapping scheme used in (6), the NOMA users’signals are interleaved and orthogonally placed in the time-frequency plane, i.e., X[n,m] is simply Um+1’s n-th signal,xm+1(n). Denote the outcome of the SFFT of X[n,m] byx[k, l], which yields the following transform:

x[k, l] =1√NM

N−1∑n=0

M−1∑m=0

X[n,m]e−j2π(nkN −mlM ). (64)

Denote the NM × 1 vector collecting the x[k, l] by x and theNM × 1 vector collecting the X[n,m] by x, which meansthat (64) can be rewritten as follows:

x = (FN ⊗ FHM )x. (65)

Therefore, the model for the received signals in (18) can bere-written as follows:

y0 =γ0x0 + γ1x +(FN ⊗ FHM

)−1D−1

0 zi (66)

=γ0x0 + γ1(FN ⊗ FHM )x +(FN ⊗ FHM

)−1D−1

0 z0︸ ︷︷ ︸Interference and noise terms

,

where we have used the assumption that γi = γ1, for 1 ≤ i ≤N . Note that the power of the information-bearing signals issimply γ2

0ρ, and therefore, the key step to obtain the SINRis to find the covariance matrix of the interference-plus-noiseterm.

We first show that z0 , (FN ⊗ FHM )z0 is still a com-plex Gaussian vector, i.e., zi ∼ CN(0, INM ). Recall thatz0 contains NM i.i.d. complex Gaussian random variables.Furthermore, FN ⊗ FHM is a unitary matrix as shown in thefollowing:

(FN ⊗ FHM )(FN ⊗ FHM )H(a)= (FN ⊗ FHM )(FHN ⊗ FM )

(b)= (FNFHN )⊗ (FHMFM ) = INM , (67)

where step (a) follows from the fact that (A⊗B)H = AH ⊗BH and step (b) follows from the fact that (A⊗B)(C⊗D) =(AC) ⊗ (BD). Therefore, (FN ⊗ FHM )z0 ∼ CN(0, INM )given the fact that z0 ∼ CN(0, INM ) and a unitary transfor-mation of a Gaussian vector is still a Gaussian vector.

Therefore, the covariance matrix of the interference-plus-noise term is given by

Ccov = γ21E{

(FN ⊗ FHM )xxH(FN ⊗ FHM

)H}(68)

+ E{(

FN ⊗ FHM)−1

D−10 z0z

H0 D−H0

(FN ⊗ FHM

)−H}.

Recall that the (nM +m+ 1)-th element of x is X[n,m]which is equal to xm+1(n). Therefore, the covariance matrixcan be further simplified as follows:

Ccov =γ21ρ(FN ⊗ FHM )

(FN ⊗ FHM

)H(69)

+(FN ⊗ FHM

)−1D−1

0 D−H0

(FN ⊗ FHM

)−H=γ2

1ρIMN +(FHN ⊗ FM

)D−1

0 D−H0

(FN ⊗ FHM

),

where the noise power is assumed to be normalized.Following the same steps as in the proof of

Proposition 1, we learn that, by construction,(FHN ⊗ FM

)D−1

0 D−H0

(FN ⊗ FHM

)is also a block-

circulant matrix, which means that the elements on themain diagonal of

(FHN ⊗ FM

)D−1

0 D−H0

(FN ⊗ FHM

)are

identical. Without loss of generality, denote the diagonalelements of

(FHN ⊗ FM

)D−1

0 D−H0

(FN ⊗ FHM

)by φ.

Page 14: OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous … · 2019. 7. 15. · 1 OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous User Mobility Profiles Zhiguo

14

Therefore, φ can be found by using the trace of the matrix asfollows:

φ =1

NMTr{(

FHN ⊗ FM)D−1

0 D−H0

(FN ⊗ FHM

)}(70)

=1

NMTr{(

FN ⊗ FHM) (

FHN ⊗ FM)D−1

0 D−H0

}=

1

NMTr{D−1

0 D−H0

}=

1

NM

N−1∑k=0

M−1∑l=0

|Dk,l0 |−2.

Therefore, the SINR for detection of x0[k, l] is given by

SINRLE0,kl =ργ2

0

ργ21 + φ

, (71)

and the proof is complete.

APPENDIX CPROOF FOR LEMMA 2

The lemma is proved by first developing upper and lowerbounds on the outage probability, and then showing that bothbounds have the same diversity order.

An upper bound on SINR0,kl is given by

SINR0,kl =ργ2

0

ργ21 + 1

NM

∑N−1

k=0

∑M−1

l=0|Dk,l

0 |−2(72)

≤ ργ20

ργ21 + 1

NM |D0,00 |−2

.

Therefore, the outage probability, denoted by P0,kl, can belower bounded as follows:

P0,kl ≥P

(ργ2

0

ργ21 + 1

NM |D0,00 |−2

< ε0

)(73)

=P

(|D0,0

0 |2 <ε0

NMρ(γ20 − γ2

1ε0)

),

where we assume that γ20 > γ2

1ε0. Otherwise, the outageprobability is always one.

To evaluate the lower bound on the outage probability, thedistribution of Du,v

0 is required. Recall from (16) that Du,v0 is

the ((v− 1)M + u)-th main diagonal element of D0 and canbe expressed as follows:

Du,v0 =

N−1∑n=0

M−1∑m=0

am,10,n ej2π umM e−j2π

vnN , (74)

which is the ISFFT of am,10,n . Therefore, we have the followingproperty:

D0 =√NMFHMA0FN , (75)

where the element in the u-th row and the v-th column of D0

is Du,v0 and the element in the m-th row and the n-th column

of A0 is am,10,n .The matrix-based expression shown in (75) can be vector-

ized as follows:

Diag(D0) =vec(D0) =√NMvec(FHMA0FN ) (76)

=√NM(FN ⊗ FHM )vec(A0),

where Diag(A) denotes a vector collecting all elements onthe main diagonal of A and we use the facts that (CT ⊗A)vec(B) = vec(D) if ABC = D, and FTN = FN .

We note that vec(A0) contains only (P0 + 1) non-zeroelements, where the remaining elements are zero. Therefore,each element on the main diagonal of D0 is a superpositionof (P0 + 1) i.i.d. random variables, hi,p ∼ CN

(0, 1

P0+1

).

We further note that the coefficients for the superpositionare complex exponential constants, i.e., the magnitude ofeach coefficient is one. Therefore, each element on the maindiagonal of D0 is still complex Gaussian distributed, i.e.,Du,v

0 ∼ CN(0, 1), which means that the lower bound on theoutage probability shown in (73) can be expressed as follows:

P0,kl ≥1− e− ε0NMρ(γ20−γ21ε0) .

=1

ρ. (77)

On the other hand, an upper bound on the outage probabilityis given by

P0,kl ≤P

(ργ2

0

ργ21 + 1

NM

∑N−1

k=0

∑M−1

l=0|Dmin

0 |−2< ε0

),

(78)

where |Dmin0 | = min{|Dk,l

0 |,∀l ∈ {0, · · · ,M − 1}, k ∈{0, · · · , N − 1}}.

Therefore, the outage probability can be upper bounded asfollows:

P0,kl ≤P

(|Dmin

0 |2 <ε0

ρ(γ20 − γ2

1ε0)

). (79)

It is important to point out that the |Dk,l0 |2, l ∈ {0, · · · ,M −

1}, k ∈ {0, · · · , N − 1}, are identically but not independentlydistributed. This correlation property is shown as follows.The covariance matrix of the effective channel gains, i.e., theelements on the main diagonal of D0, is given by

E{

Diag(D0)Diag(D0)H}

(80)

=NME{

(FN ⊗ FHM )vec(A0)vec(A0)H(FN ⊗ FHM )H}

=NM(FN ⊗ FHM )E{

vec(A0)vec(A0)H}

(FN ⊗ FHM )H .

Because the channel gains, h0,p, are i.i.d.,E{

vec(A0)vec(A0)H}

is a diagonal matrix, where only(P0+1) of its main diagonal elements are non-zero. Followingthe same steps as in the proof for Proposition 1, one canshow that the product of (FN ⊗ FHM ), a diagonal matrix,and (FN ⊗ FHM )H yields a block circulant matrix, whichmeans that E

{Diag(D0)Diag(D0)H

}is a block-circulant

matrix, not a diagonal matrix. Therefore, the |Dk,l0 |2,

l ∈ {0, · · · ,M − 1}, k ∈ {0, · · · , N − 1}, are correlated, andnot independent.

Page 15: OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous … · 2019. 7. 15. · 1 OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous User Mobility Profiles Zhiguo

15

Although the |Dk,l0 |2 are not independent, an upper bound

on P0,kl can be still found as follows:

P0,kl ≤P

(|Dmin

0 |2 <ε0

ρ(γ20 − γ2

1ε0)

)(81)

≤N−1∑k=0

M−1∑l=0

P

(|Dk,l

0 |2 <ε0

ρ(γ20 − γ2

1ε0)

)≤MNP

(|D0,0

0 |2 <ε0

ρ(γ20 − γ2

1ε0)

)=MN

(1− e

− ε0ρ(γ20−γ21ε0)

).=

1

ρ.

Since both the upper and lower bounds on the outage proba-bility have the same diversity order, the proof of the lemmais complete.

REFERENCES

[1] Z. Ding, Y. Liu, J. Choi, Q. Sun, M. Elkashlan, C.-L. I, and H. V.Poor, “Application of non-orthogonal multiple access in LTE and 5Gnetworks,” IEEE Commun. Mag., vol. 55, no. 2, pp. 185–191, Feb. 2017.

[2] W. Shin, M. Vaezi, B. Lee, D. J. Love, J. Lee, and H. V. Poor, “Non-orthogonal multiple access in multi-cell networks: Theory, performance,and practical challenges,” IEEE Commun. Mag., vol. 55, no. 10, pp.176–183, Oct. 2017.

[3] S. M. R. Islam, N. Avazov, O. A. Dobre, and K. S. Kwak, “Power-domain non-orthogonal multiple access (NOMA) in 5G systems: Poten-tials and challenges,” IEEE Commun. Surveys Tuts., vol. 19, no. 2, pp.721–742, 2017.

[4] H. Sari, F. Vanhaverbeke, and M. Moeneclaey, “Multiple access usingtwo sets of orthogonal signal waveforms,” IEEE Commun. Lett., vol. 4,no. 1, pp. 4–6, Jan. 2000.

[5] Y. Saito, A. Benjebbour, Y. Kishiyama, and T. Nakamura, “System levelperformance evaluation of downlink non-orthogonal multiple access(NOMA),” in Proc. IEEE Int. Symposium on Personal, Indoor andMobile Radio Commun., London, UK, Sept. 2013.

[6] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, “On the performance ofnon-orthogonal multiple access in 5G systems with randomly deployedusers,” IEEE Signal Process. Lett., vol. 21, no. 12, pp. 1501–1505, Dec.2014.

[7] Z. Ding, P. Fan, and H. V. Poor, “Impact of user pairing on 5G non-orthogonal multiple access,” IEEE Trans. Veh. Tech., vol. 65, no. 8, pp.6010–6023, Aug. 2016.

[8] A. Brighente and S. Tomasin, “Power allocation for non-orthogonalmillimeter wave systems with mixed traffic,” IEEE Trans. WirelessCommun., vol. 18, no. 1, pp. 432–443, Jan. 2019.

[9] Y. Wu, L. Qian, K. Ni, C. Zhang, and X. Shen, “Delay-minimizationnonorthogonal multiple access enabled multi-user mobile edge compu-tation offloading,” IEEE J. Sel. Topics Signal Process, (to appear in2019).

[10] Z. Ding, P. Fan, and H. V. Poor, “Random beamforming in millimeter-wave NOMA networks,” IEEE Access, vol. 5, pp. 7667–7681, 2017.

[11] Y. Zhou, V. W. S. Wong, and R. Schober, “Coverage and rate analysisof millimeter wave NOMA networks with beam misalignment,” IEEETrans. Wireless Commun., vol. 17, no. 12, pp. 8211–8227, Dec. 2018.

[12] Z. Ding and H. V. Poor, “Design of massive-MIMO-NOMA with limitedfeedback,” IEEE Signal Process. Lett., vol. 23, no. 5, pp. 629–633, May2016.

[13] R. Chopra, C. R. Murthy, H. A. Suraweera, and E. G. Larsson, “Analysisof nonorthogonal training in massive MIMO under channel aging withsic receivers,” IEEE Signal Process. Lett., vol. 26, no. 2, pp. 282–286,Feb. 2019.

[14] A. Maatouk, E. Calıskan, M. Koca, M. Assaad, G. Gui, and H. Sari,“Frequency-domain NOMA with two sets of orthogonal signal wave-forms,” IEEE Communications Letters, vol. 22, no. 5, pp. 906–909, May2018.

[15] Y. Sun, D. W. K. Ng, Z. Ding, and R. Schober, “Optimal joint power andsubcarrier allocation for full-duplex multicarrier non-orthogonal multipleaccess systems,” IEEE Trans. Commun., vol. 65, no. 3, pp. 1077–1091,Mar. 2017.

[16] L. Yin, W. O. Popoola, X. Wu, and H. Haas, “Performance evaluation ofnon-orthogonal multiple access in visible light communication,” IEEETrans. Commun., vol. 64, no. 12, pp. 5162–5175, Dec. 2016.

[17] H. Marshoud, V. M. Kapinas, G. K. Karagiannidis, and S. Muhaidat,“Non-orthogonal multiple access for visible light communications,”IEEE Photonics Tech. Lett., vol. 28, no. 1, pp. 51–54, Jan. 2016.

[18] Z. Ding, P. Fan, and H. V. Poor, “Impact of non-orthogonal multipleaccess on the offloading of mobile edge computing,” IEEE Transactionson Communications, vol. 67, no. 1, pp. 375–390, Jan. 2019.

[19] 3rd Generation Partnership Project (3GPP), “Study on downlink mul-tiuser superposition transmission for LTE,” Mar. 2015.

[20] ——, “Technical specification group radio access network; evolveduniversal terrestrial radio access (E-UTRA); physical channels andmodulation (Release 15),” Jan. 2019.

[21] ——, “Study on non-orthogonal multiple access (NOMA) for NR(Release 16),” Dec. 2018.

[22] B. Di, L. Song, Y. Li, and Z. Han, “V2X meets NOMA: Non-orthogonalmultiple access for 5G-enabled vehicular networks,” IEEE WirelessCommun., vol. 24, no. 6, pp. 14–21, Dec. 2017.

[23] Y. Chen, L. Wang, Y. Ai, B. Jiao, and L. Hanzo, “Performance analysisof NOMA-SM in vehicle-to-vehicle massive MIMO channels,” IEEE J.Sel. Areas Commun., vol. 35, no. 12, pp. 2653–2666, Dec. 2017.

[24] R. Hadani and A. Monk, “OTFS: a new generation of modulationaddressing the challenges of 5G,” Available on-line at arXiv:1802.02623.

[25] R. Hadani, S. Rakib, M. Tsatsanis, A. Monk, A. J. Goldsmith, A. F.Molisch, and R. Calderbank, “Orthogonal time frequency space modula-tion,” in Proc. IEEE Wireless Commun. and Networking Conf. (WCNC),San Francisco, CA, USA, Mar. 2017.

[26] K. R. Murali and A. Chockalingam, “On OTFS modulation for high-doppler fading channels,” in Proc. Information Theory and ApplicationsWorkshop (ITA), San Diego, CA, USA, Feb. 2018.

[27] P. Raviteja, Y. Hong, E. Viterbo, and E. Biglieri, “Practical pulse-shapingwaveforms for reduced-cyclic-prefix OTFS,” IEEE Trans. Veh. Tech.,vol. 68, no. 1, pp. 957–961, Jan. 2019.

[28] P. Raviteja, K. T. Phan, Y. Hong, and E. Viterbo, “Interference can-cellation and iterative detection for orthogonal time frequency spacemodulation,” IEEE Trans. Wireless Commun., vol. 17, no. 10, pp. 6501–6515, Oct. 2018.

[29] G. D. Surabhi, R. M. Augustine, and A. Chockalingam, “On the diversityof OTFS modulation in doubly-dispersive channels,” Available on-lineat arXiv:1808.07747.

[30] V. Khammammetti and S. K. Mohammed, “OTFS based multiple-accessin high doppler and delay spread wireless channels,” IEEE WirelessCommun. Lett., (to appear in 2019).

[31] A. RezazadehReyhani, A. Farhang, M. Ji, R. R. Chen, and B. Farhang-Boroujeny, “Analysis of discrete-time MIMO OFDM-based orthogonaltime frequency space modulation,” in Proc. IEEE Int. Conf. Communi-cat. (ICC), Kansas City, MO, USA, May 2018.

[32] M. Kollengode Ramachandran and A. Chockalingam, “MIMO-OTFS inhigh-doppler fading channels: Signal detection and channel estimation,”in Proc. IEEE Global Commun. Conf. (GLOBECOM), Kansas City, MO,USA, Dec. 2018, pp. 206–212.

[33] P. Raviteja, E. Viterbo, and Y. Hong, “OTFS performance on staticmultipath channels,” IEEE Wireless Communications Letters, (to appearin 2019).

[34] D. Falconer, S. L. Ariyavisitakul, A. Benyamin-Seeyar, and B. Eidson,“Frequency domain equalization for single-carrier broadband wirelesssystems,” IEEE Commun. Mag., vol. 40, no. 4, pp. 58–66, Apr. 2002.

[35] J. Louveaux, L. Vandendorpe, and T. Sartenaer, “Cyclic prefixed singlecarrier and multicarrier transmission: bit rate comparison,” IEEE Com-mun. Lett., vol. 7, no. 4, pp. 180–182, Apr. 2003.

[36] L. Zheng and D. N. C. Tse, “Diversity and multiplexing : A fundamentaltradeoff in multiple antenna channels,” IEEE Trans. Inform. Theory,vol. 49, pp. 1073–1096, May 2003.

[37] B. Devillers, “Cyclic prefixed block transmission for wireless commu-nications: performance analysis and optimization,” Ph.D. dissertation,Universite catholique de Louvain, 2009.

[38] B. Devillers, J. Louveaux, and L. Vandendorpe, “About the diversity incyclic prefixed single-carrier systems,” Physical Communications, vol. 1,no. 4, pp. 266–276, Dec. 2008.

[39] J. Jeon, “NR wide bandwidth operations,” IEEE Commun. Mag., vol. 56,no. 3, pp. 42–46, Mar. 2018.

[40] C. Sexton, N. Marchetti, and L. A. DaSilva, “Customization and trade-offs in 5G RAN slicing,” IEEE Commun. Mag., vol. 57, no. 4, pp.116–122, Apr. 2019.

[41] C. Liaskos, S. Nie, A. Tsioliaridou, A. Pitsillides, S. Ioannidis, andI. Akyildiz, “A new wireless communication paradigm through software-controlled metasurfaces,” IEEE Commun. Mag., vol. 56, no. 9, pp. 162–169, Sep. 2018.

Page 16: OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous … · 2019. 7. 15. · 1 OTFS-NOMA: An Efficient Approach for Exploiting Heterogenous User Mobility Profiles Zhiguo

16

Zhiguo Ding (S’03-M’05-SM’15) received hisB.Eng in Electrical Engineering from the BeijingUniversity of Posts and Telecommunications in2000, and the Ph.D degree in Electrical Engineeringfrom Imperial College London in 2005. From Jul.2005 to Apr. 2018, he was working in Queen’sUniversity Belfast, Imperial College, Newcastle Uni-versity and Lancaster University. Since Apr. 2018,he has been with the University of Manchester asa Professor in Communications. From Oct. 2012 toSept. 2018, he has also been an academic visitor in

Princeton University.Dr Ding’ research interests are 5G networks, game theory, cooperative and

energy harvesting networks and statistical signal processing. He is servingas an Editor for IEEE Transactions on Communications, IEEE Transactionson Vehicular Technology, and Journal of Wireless Communications andMobile Computing, and was an Editor for IEEE Wireless CommunicationLetters, IEEE Communication Letters from 2013 to 2016. He received thebest paper award in IET ICWMC-2009 and IEEE WCSP-2014, the EUMarie Curie Fellowship 2012-2014, the Top IEEE TVT Editor 2017, 2018IEEE Communication Society Heinrich Hertz Award, 2018 IEEE VehicularTechnology Society Jack Neubauer Memorial Award and 2018 IEEE SignalProcessing Society Best Signal Processing Letter Award.

Robert Schober (M’01-SM’08-F’10) received theDiplom (Univ.) and the Ph.D. degrees in electri-cal engineering from Friedrich-Alexander Universityof Erlangen-Nuremberg (FAU), Germany, in 1997and 2000, respectively. From 2002 to 2011, hewas a Professor and Canada Research Chair at theUniversity of British Columbia (UBC), Vancouver,Canada. Since January 2012 he is an Alexandervon Humboldt Professor and the Chair for DigitalCommunication at FAU. His research interests fallinto the broad areas of Communication Theory,

Wireless Communications, and Statistical Signal Processing.Robert received several awards for his work including the 2002 Heinz

Maier-Leibnitz Award of the German Science Foundation (DFG), the 2004Innovations Award of the Vodafone Foundation for Research in MobileCommunications, the 2006 UBC Killam Research Prize, the 2007 WilhelmFriedrich Bessel Research Award of the Alexander von Humboldt Foundation,the 2008 Charles McDowell Award for Excellence in Research from UBC, a2011 Alexander von Humboldt Professorship, a 2012 NSERC E.W.R. SteacieFellowship, and a 2017 Wireless Communications Recognition Award by theIEEE Wireless Communications Technical Committee. He is listed as a 2017Highly Cited Researcher by the Web of Science and a Distinguished Lecturerof the IEEE Communications Society (ComSoc). Robert is a Fellow of theCanadian Academy of Engineering and a Fellow of the Engineering Instituteof Canada. From 2012 to 2015, he served as Editor-in-Chief of the IEEETransactions on Communications. Currently, he is the Chair of the SteeringCommittee of the IEEE Transactions on Molecular, Biological and MultiscaleCommunication, a Member of the Editorial Board of the Proceedings of theIEEE, a Member at Large of the Board of Governors of ComSoc, and theComSoc Director of Journals.

Pingzhi Fan (M’93-SM’99-F’15) received his MScdegree in computer science from the SouthwestJiaotong University, China, in 1987, and PhD degreein Electronic Engineering from the Hull University,UK, in 1994. He is currently a professor and di-rector of the institute of mobile communications,Southwest Jiaotong University, China, and a visitingprofessor of Leeds University, UK (1997-), a guestprofessor Shanghai Jiaotong University (1999-). Heis a recipient of the UK ORS Award (1992) and theOutstanding Young Scientist Award (1998, NSFC),

the chief scientist of a national 973 research project (2012-2016, MoST).Prof. Fan’s research interests include vehicular communications, wireless

networks for big data, signal design & coding, etc. He served as general chairor TPC chair of a number of international conferences, and is the guest editoror editorial member of several international journals. He is the founding chairof IEEE VTS BJ Chapter and IEEE ComSoc CD Chapter, the founding chairof IEEE Chengdu Section. He also served as a board member of IEEE Region10, IET(IEE) Council and IET Asia-Pacific Region. He has over 280 researchpapers published in various international journals, and 8 books (incl. edited),and is the inventor of 22 granted patents. He is an IEEE VTS DistinguishedLecturer (2015-2019), a fellow of IEEE, IET, CIE and CIC.

H. Vincent Poor (M’77-SM’82-F’87) received thePh.D. degree in EECS from Princeton University in1977. From 1977 until 1990, he was on the facultyof the University of Illinois at Urbana-Champaign.Since 1990 he has been on the faculty at Princeton,where he is currently the Michael Henry Strater Uni-versity Professor of Electrical Engineering. During2006 to 2016, he served as Dean of Princeton’sSchool of Engineering and Applied Science. Hehas also held visiting appointments at several otheruniversities, including most recently at Berkeley and

Cambridge. His research interests are in the areas of information theory andsignal processing, and their applications in wireless networks, energy systemsand related fields. Among his publications in these areas is the recent bookMultiple Access Techniques for 5G Wireless Networks and Beyond. (Springer,2019).

Dr. Poor is a member of the National Academy of Engineering and theNational Academy of Sciences, and is a foreign member of the ChineseAcademy of Sciences, the Royal Society, and other national and internationalacademies. He received the Marconi and Armstrong Awards of the IEEECommunications Society in 2007 and 2009, respectively. Recent recognitionof his work includes the 2017 IEEE Alexander Graham Bell Medal, the 2019ASEE Benjamin Garver Lamme Award, a D.Sc. honoris causa from SyracuseUniversity awarded in 2017, and a D.Eng. honoris causa from the Universityof Waterloo awarded in 2019.