Resource Allocation Design for Next Generation Multiple Access: A Tutorial Overview
Abstract
Multiple access is the cornerstone technology for each generation of wireless cellular networks, which fundamentally determines the method of radio resource sharing and significantly influences both the system performance and the transceiver complexity. Meanwhile, resource allocation design plays a crucial role in multiple access, as its name suggests, encompassing radio resource and interference management, and it is crucial for providing high-speed and reliable communication services to multiple users. Given that resource allocation design is intrinsically scenario-specific and the optimization tools for resource allocation design are typically varied, in this paper, we present a comprehensive tutorial overview for junior researchers in this field, aiming to offer a foundational guide for resource allocation design in the context of next-generation multiple access (NGMA). Our discussion spans a broad range of fundamental topics: from typical system models, through the intricacy of problem formulation in resource allocation design, to the exploration of various potential optimization solution methodologies. Initially, we identify three types of channels where NGMA is primarily operational for future wireless cellular networks: natural channels, reconfigurable channels, and functional channels. Natural channels are traditional uplink and downlink communication channels; reconfigurable channels are defined as channels that can be proactively reshaped via emerging platforms or techniques, such as intelligent reflecting surface (IRS), unmanned aerial vehicle (UAV), movable/fluid antenna (M/FA); and functional channels support not only communication but also other functionalities simultaneously, with typical examples including integrated sensing and communication (ISAC) and joint computing and communication (JCAC) channels. We introduce NGMA models applicable to these three types channels that covers most of the practical communication scenarios of future wireless communications. Subsequently, we articulate the key optimization technical challenges inherent in NGMA’s resource allocation design for these channel types, categorizing them into rate-oriented, power-oriented, and reliability-oriented resource allocation designs. The corresponding optimization approaches for solving the formulated resource allocation design problems are then presented. Moreover, simulation results are presented and discussed to elucidate the practical implications and insights derived from resource allocation designs in NGMA.
Index Terms:
Resource allocation design, multiple access, non-convex optimization, global optimization.I Introduction
The sixth-generation (6G) wireless networks are envisioned to provide massive, immersive, and reliable communications, which are expected to revolutionize our future daily lives. Furthermore, the IMT-2030 framework has highlighted three groundbreaking usage scenarios: ubiquitous connectivity, integrated sensing and communication, and integrated artificial intelligence (AI) and communication [IMT-2030]. These scenarios lay the groundwork for a sophisticated intelligent digital world, serving as a pivotal data foundation. Moreover, these innovative services open doors to novel business models and applications, simultaneously introducing unprecedented challenges in the evolution of 6G wireless communication technologies. In particular, massive communication is expected to accommodate an extraordinary connectivity density ranging from to [IMT-2030], encompassing a variety of ubiquitous wideband and Internet-of-Things (IoT) devices across a broad spectrum of coverage and mobility. Beyond these capabilities, immersive communication demands stringent requirements on peak and experienced data rates, latency, and connectivity capacity, which are crucial for supporting a wide variety of applications in entertainment, education, and manufacturing sectors.
Radio access technology plays a crucial role in sharing limited radio resources among multiple users in a controllable manner to achieve satisfactory quality-of-service (QoS). This is vital for providing high-speed and reliable services to massive wideband users and IoT devices. Multiple access technology is the most fundamental aspect of the physical layer and defines each generation of wireless cellular networks. Dated back to the early 80s, in the first generation (1G) cellular networks, frequency-division multiple access (FDMA) was adopted which assigns different frequency bands to various users, separated by guard bands to mitigate any potential inter-user interference (IUI). In the 1990s, the second-generation (2G) wireless networks adopted time-division multiple access (TDMA), allocating the system bandwidth based on a time-sharing scheme. Besides, code-division multiple access (CDMA)[Verdu1999, YangCDMA], utilized in both 2G and the third-generation (3G), enabled users to transmit data across the entire bandwidth simultaneously by exploiting the unique properties of code sequences to distinguish among users. As time evolves, in the fourth-generation (4G) and the fifth-generation (5G), orthogonal frequency division multiplexing (OFDM) waveform [Wong1999, Strohmer2003] has been predominantly adopted owing to its higher spectral efficiency than FDMA and the low implementation complexity of frequency domain equalization (FDE). Also, orthogonal frequency-division multiple access (OFDMA) [Kwan_AF_2010, DerrickEEOFDMA, DerrickEESWIPT, DerrickLimitedBackhaul, ZhiqiangOFDMA] further enhances this by allowing different users to occupy different subcarriers, thus providing high flexibility in resource allocation (RA) design. Furthermore, by equip** multiple antennas at transceivers, spatial division multiple access (SDMA) [yang2017noma, Ngo2011] has been recognized as an efficient strategy for supporting multi-user communication, which has gained increased popularity with the advancement of multiple-input multiple-output (MIMO) technology in recent years.
From an information-theoretical perspective, a set of orthogonal system resources can be interpreted as the system’s degrees-of-freedom (DoF)[Tse2005], enabling the transmission of multiple data streams across different DoFs without mutual interference. Traditional multiple access protocols, whether in time, frequency, spatial, or code domains, are categorized as orthogonal multiple access (OMA) schemes. In particular, these schemes are designed to allocate distinct system DoFs to different users or data streams exclusively, primarily to minimize interference, thereby facilitating interference-free transmission and simplifying channel equalization at the receiver’s end. However, despite its advantages, OMA demands a certain level of system signaling overhead to maintain this orthogonality, such as time synchronization overhead for TDMA and the required accurate channel state information (CSI) at the transmitter side for SDMA. Moreover, OMA struggles to support massive communications and ubiquitous connectivity due to the limited system DoFs. In contrast, NOMA serves as a more versatile generalization of OMA, with the former introducing a manageable level of IUI by permitting multiple users to share the same system DoF [Ding2015b, LiuSWIPT, Lei2016NOMA, 9679390]. Specifically, NOMA leverages advanced multi-user detection (MUD) techniques to distinguish users at the receiver[MUDCDMA, Hanzo2003], representing a more flexible approach to resource allocation than OMA, which strictly avoids DoF sharing among users[PerGainWei].
Through DoF sharing, NOMA can accommodate more number of users with limited system resources, i.e., time-frequency resource block, spatial DoF, or radio frequency (RF) chains [XuMassiveMIMONOMA, DingSignalAlignment, wei2018multibeam, WeiBeamWidthControl], compared to its orthogonal counterpart. Moreover, from the optimization point of view, by relaxing the orthogonality constraint of OMA, NOMA enables a more flexible management of radio resources and offers an efficient manner to improve spectral efficiency via resource allocation design[Wei2017]. Typical NOMA schemes include power-domain and code-domain NOMA, which characterize the approach for DoF sharing. Specifically, power domain NOMA exploits the discrepancy in users’ transmit/receive power levels for multi-user multiplexing, combined with superposition coding at the transmitter and successive interference cancellation (SIC) at the receivers to harness IUI[PerGainWei]. In contrast, code-domain NOMA shares the system DoF among multiple users via non-orthogonal coding/spreading, facilitating user separation at the receiver. This includes low-density spreading (LDS)[Razavi2012], sparse code multiple access (SCMA) [WeijieSCMA, WeijieSCMAII], and pattern division multiple access (PDMA)[ShanzhiPDMA], etc. On the other hand, rate splitting multiple access (RSMA) [BrunoJSAC, YijieRSMA], a generalization of power/code domain NOMA, partially decodes interference and partially treats the remainder as noise, based on rate splitting principles. Despite the standardization of NOMA and RSMA in 5G has been gradual, their related research has attracted significant attention and efforts in academia[Access2015]. Indeed, the notion of NOMA and RSMA might serve as a foundation for addressing the unique challenges of 6G, including massive communication and ubiquitous connectivity.
As we navigate the evolving service demands of 6G and the technological advancements in multiple access from 1G through 5G, a critical question emerges: what will the NGMA look like [YuanweiNGMA]? One potential new feature of NGMA could be innovative multiple access schemes that can enhance the connectivity density, spectral efficiency, and/or energy efficiency. In particular, NGMA may incorporate, solely or in combination, existing OMA, NOMA, and RSMA to address the enormous challenges and to meet the heterogeneous service demands of next-generation wireless networks. Secondly, NGMA is anticipated to exploit cutting-edge infrastructures and enabling technologies, such as intelligent reflecting surface (IRS) [ZhiqiangOFDMA, XianghaoJSAC, 9183907], UAV-assisted communication [8663615, 8644086], and movable/fluid antenna (M/FA) systems[LipengMovableAntenna, 10318134]. These technologies could offer additional design DoF via adaptive channel reconfiguration and thus improve system performance. Thirdly, NGMA aims not only to satisfy the stringent communication requirements but also to realize versatile functionalities, including sensing [Fan2020], computing [Yuyi2017], and learning [YandongCST]. In light of these considerations, this paper introduces a comprehensive framework and resource allocation strategy for NGMA, addressing its application in natural, reconfigurable, and functional channels, which cover a broad spectrum of practical scenarios.
In practice, to unleash the potential of effective multiple access schemes, meticulous resource allocation design is of utmost importance. It can make the best use of limited communication resources based on the information available at the resource allocator, such as the CSI, QoS, power budget, and the number of antennas/subcarriers, to improve overall system performance. The resource allocation designs for OMA, NOMA, and RSMA schemes have been extensively studied[Kwan_AF_2010, DerrickEEOFDMA, DerrickEESWIPT, DerrickLimitedBackhaul, ZhiqiangOFDMA, XuMassiveMIMONOMA, DingSignalAlignment, wei2018multibeam, WeiBeamWidthControl, Shuangyang_FTN_NOMA]. While it is not our goal to exhaustively list all the existing resource allocation designs for OMA, NOMA, and RSMA detailed in the literature, our focus is to present a holistic overview of the predominant models and approaches in resource allocation design for NGMA, addressing its application in natural channels, reconfigurable channels, and functional channels. In natural channels, the primary resource allocation for NGMA lies in the optimal deployment of limited resources towards achieving specific objectives, such as maximizing the sum-rate, minimizing transmit power, or enhancing communication reliability [WeiProceeding]. In the context of reconfigurable channels, resource allocation design explores the best methods of channel reconfiguration in conjunction with the usage of system resources for NGMA. This often necessitates a joint design, such as joint active and passive beamforming design [QingqingIRS] in IRS-assisted systems and joint trajectory and resource allocation design[YuanxinUAVNOMA] in UAV-enabled systems. Besides, next-generation wireless networks are anticipated to support additional capabilities of sensing, computing, and/or learning alongside communication. This anticipation has spurred the development of integrated sensing and communication (ISAC) systems [Fan2020] [10283659], integrated computing and communication systems[Yuyi2017], and integrated learning and communication systems[YandongCST]. The key challenges in resource allocation for NGMA, particularly within these functional channels, revolve around efficiently managing user access while delicately balancing the trade-offs between communication and these auxiliary functionalities.
The main objective of this tutorial paper is to provide a framework for NGMA and its resource allocation design. Section I introduces the unified framework for NGMA in different channels and provides some exemplary system models. Section II focuses on the foundational problem formulations of resource allocation design for NGMA in different types of channels. Section III introduces various advanced optimization tools for resource allocation design, highlighting their tradeoffs between computational complexity, convergence, and optimality. Some simulations and discussions are provided in Section V. Section VI concludes this work and provides an outlook on resource allocation design for NGMA. An illustrative diagram, depicted in Fig. 1, guides the reader through the logical progression and interconnectedness of the topics discussed within this paper.
The following notations are adopted in this paper. Boldface capital and lowercase letters are reserved for matrices and vectors, respectively. denotes the set of all matrices with complex entries; denotes the set of all matrices with real entries; denotes the set of all matrices with binary entries; and denote the transpose and the Hermitian transpose of a vector or a matrix, respectively; denotes the absolute value of a complex scalar or the cardinality of a set, denotes the Euclidean norm of a vector, and denotes the Frobenius norm of a matrix. and denote the trace and determinant of a matrix; denotes the rank of a matrix; denotes a diagonal matrix whose main diagonal elements are given by its input vector ; denotes the identity matrix; denotes the zero vector with all zero entries; returns the entry in the -th row and -th column of matrix ; returns the -th entry of vector . and denote the Kronecker product and the differential operator, respectively. The real-valued Gaussian distribution with mean and covariance matrix is denoted by , and the circularly symmetric complex Gaussian distribution with mean and covariance matrix is denoted by . The key acronyms used in this paper are summarized in Table I.
Common term | Acronym | Common term | Acronym |
Sixth-generation | 6G | Artificial intelligence | AI |
Internet-of-Things | IoT | Next-generation multiple access | NGMA |
Orthogonal multiple access | OMA | Non-orthogonal multiple access | NOMA |
Frequency-division multiple access | FDMA | Inter-user interference | IUI |
Time-division multiple access | TDMA | Code-division multiple access | CDMA |
Rate splitting multiple access | RSMA | Delay-division multiple access | DDMA |
Orthogonal frequency division multiplexing | OFDM | Orthogonal frequency-division multiple access | OFDMA |
Spatial division multiple access | SDMA | Multiple-input multiple-output | MIMO |
Degrees-of-freedom | DoF | Quality-of-service | QoS |
Single-input single-output | SISO | Channel state information | CSI |
Unmanned aerial vehicle | UAV | Intelligent reflecting surface | IRS |
Integrated sensing and communication | ISAC | Joint computing and communication | JCAC |
Movable/fluid antenna | M/FA | Low-density spreading | LDS |
Uniform planar array | UPA | Uniform linear array | ULA |
Line-of-sight | LoS | Additive white Gaussian noise | AWGN |
Non-convex objective function | NOF | Variable coupling | VC |
Fractional constraint | FC | Binary constraint | BC |
Semi-infinite constraint | SMIC | Unit-modulus constraint | UMC |
Equality constraint | EC | Branch-and-bound | BnB |
Successive convex approximation | SCA | Semidefinite relaxation | SDR |
Block coordinate descent | BCD | Monotonic optimization | MO |
II Next-Generation Multiple Access in Different Channels
In this section, we introduce a unified framework accompanied by various representative system models for NGMA across natural, reconfigurable, and functional channels. This comprehensive approach encompasses a broad spectrum of NGMA scenarios anticipated in future wireless networks. By presenting these models, we aim to provide a holistic overview that encapsulates the extensive variety of NGMA categories, ensuring a thorough understanding of the challenges and prospects awaiting in the advancement of wireless network technologies.
II-A NGMA in Natural Channels
In this subsection, we first introduce the unified framework for NGMA in natural channels, which subsumes OMA, NOMA, and RSMA as special cases. For each multiple access scheme, the corresponding transceiver architectures, the available system resources, and the resource allocation design are discussed. To further illustrate this framework’s applicability, we present four exemplary NGMA systems, including OFDMA, NOMA, DDMA, and RSMA.
II-A1 A Unified Framework for NGMA in Natural Channels
The fundamental input-output relationship of NGMA in natural channels is given by
(1) |
where contains a total of data streams of all users such that , as widely adopted in the literature[Wei2017]. Its subset contains data streams of user , , where and . The channel matrix models the propagation between transmitter and receiver, where and are determined by the number of available system resource elements at the transmitter and receiver, respectively, such as the number of antennas, time slots, or subcarriers, etc. In practice, the channel matrix needs to be defined in a proper domain such that it does not violate the intrinsic physics of wave propagation. For instance, if the channel matrix is defined in the spatial domain, we usually consider a narrowband assumption for the system [YijieRSMA], such that each entry of can characterize the flat fading coefficient between each pair of transceiver antennas. Vectors and denote the received signal and noise at the receiver side, respectively, where the additive white Gaussian noise (AWGN) follows with the noise power of . If the channel matrix is defined in the frequency domain, a multicarrier communication system is usually considered with denoting the number of subcarriers, where denotes the frequency domain effective channel between transceiver[Al-Imari2011LDSOFDM]. For concise notation in this paper, the notations , , , and will be consistently employed to denote entities with analogous meanings, albeit with varying specifications and dimensions across different scenarios.
Domain of channel matrix | Modulation waveform | Typical multiple access schemes |
Frequency domain | FDM or OFDM | FDMA, OFDMA, NOMA |
Time domain | TDM | TDMA |
Spatial domain | Any narrowband modulation waveform | SDMA, RSMA |
Delay-Doppler domain | OTFS | DDMA |
On the other hand, the channel matrix can be defined in different domains depending on the adopted modulation waveform and on which domain NGMA is performed, as shown in Table II. Note that the channel matrix can be defined in multiple domains, such as the frequency-spatial domain for MIMO-OFDM systems. In such a case, NGMA can be performed in the frequency domain, spatial domain, or cross the frequency-spatial domain, depending on the structure of . Despite the domain of , its rank determines the maximum available DoFs of the considered communication systems, which is the theoretical maximum number of users that can be accommodated in an interference-free manner. Moreover, the eigenvalue distribution of determines the channel disparity in a certain domain, facilitating the exploration of multi-user diversity for efficient resource allocation design. When , the system is known as underloaded [DerrickEEOFDMA] where the system resources are sufficient to accommodate all the data streams of all the users. In this case, OMA exhibits a handy approach to serve all the users, since each data stream can be allocated in at least one available system DoF and enjoys an interference-free transmission. In contrast, when , the system is overloaded [PerGainWei] and the users access the channel in a non-orthogonal manner, i.e., NOMA or RSMA. In such a case, advanced multi-user interference mitigation techniques need to be adopted to improve system performance, such as SIC[Wei2017] and message passing-based multiuser detection [BayestehSCMA].
In (1), the vector function maps the information symbols of all the users to the system resources at the transmitter side. In particular, this map** function captures a specific approach of multiple access as well as resource allocation among multiple users, which plays a key role in determining the system performance. In other words, the joint consideration of multiple access and resource allocation is to design the map** function, , for a given channel matrix , such that the transmission and the channel properties match with each other so as to achieve certain purposes, e.g., interference management, rate maximization, and power minimization. In practice, advanced channel estimation technologies are generally required to acquire the channel matrix [BigueshMMSE, zhao2017multiuser, Sun2019]. In certain scenarios, such as slow-fading channels, accurate CSI can be acquired at the transmitter with a reasonable amount of system overhead. In such cases, the estimated accurate CSI would be treated as perfect CSI to simplify the design of multiple access and resource allocation. In contrast, for the cases in which acquiring accurate CSI is not possible, only imperfect CSI is available. As such, different robust resource allocation design approaches should be performed such that the QoS of all users can be guaranteed to a certain extent, e.g., [WeiProceeding].
For a given , OMA schedules to serve one user in each DoF, while NOMA schedules to serve more than one user in each DoF. Also, hybrid NOMA strategically combines the approaches by serving a portion of the users through OMA while allocating the remaining users via NOMA [ZengHybridNOMA]. In practice, the formulation of resource allocation design problems can be tailored to specific system design goals, depending on the chosen multiple access scheme. Specifically, OMA imposes strict constraints to ensure resource orthogonality at the expense of underutilization of limited system resources. In contrast, NOMA is more flexible in terms of resource allocation design and can degenerate to OMA configuration if the power or rate allocated to certain NOMA users is set to zero. Nonetheless, the receiver in an OMA system benefits from a reduced complexity compared to that of a NOMA system[PerGainWei]. Meanwhile, hybrid NOMA synergizes the advantages of both NOMA and OMA, enabling IUI-free transmission for certain users while simultaneously supporting a larger number of users through non-orthogonal multiplexing. In contrast, RSMA multiplexes common and private data streams via precoding in the spatial domain based on a proper rate splitting strategy at the transmitter side[BrunoJSAC]. At the RSMA receiver, the common data stream is decoded by treating the interference as noise, and the private data streams are decoded successively based on the SIC framework. This structure offers high flexibility in exploiting the spatial DoF and resource allocation, which bridges spatial-division multiple access (SDMA) and NOMA in an efficient manner[BrunoJSAC].
We note that the input-output relationship in (1) can be applied to both uplink and downlink transmission. In downlink communication systems, the BS has the full information of and and thus the map** function can be designed in a centralized manner at the BS. As in uplink systems, the map** function needs to be designed in a distributed manner, since each user only has its own specific CSI (either perfect or imperfect CSI) and information symbols.
II-A2 Uplink OFDMA
Consider an uplink system, where a single-antenna BS serves single-antenna users. All the transceivers are equipped with an OFDM modulator or demodulator [DerrickEEOFDMA] and all the users are accessed the channel concurrently based on OFDMA. In this case, in (1) is the total number of subcarriers adopted in OFDM modulation. Between user and the BS, there would be a frequency domain channel matrix . Thus, we have and the channel matrix in (1) can be rewritten as . The data streams and the received signals are also defined in the frequency domain. In this case, the total number of data streams as the system DoF is limited by the number of subcarriers adopted at the BS.
For the considered uplink OFDMA system, the input-output relationship in (1) can be specified as
(2) |
where and is the power allocation for the -th data stream of user . Note that the total transmit power of user should be limited by its power budget , i.e., . The binary matrix is the user scheduling matrix. denotes that the -th data stream of user is scheduled to the -th subcarrier, otherwise . Without loss of generality, we assume that each data stream is allocated to one subcarrier, i.e., , , and thus the total number of subcarriers allocated to user is . For OFDMA, we need to limit to guarantee that at most one data stream of a user can be scheduled to each subcarrier.
In practice, when a static multipath propagation environment and a proper cyclic prefix length are considered, the frequency domain channel of each user is a diagonal matrix, which lays the foundation for interference-free parallel data stream transmission and facilitates low-complexity single-tap FDE at the BS. In contrast, in high-mobility channels when the Doppler is not well compensated, the frequency domain channel is generally not diagonal, leading to severe inter-carrier interference (ICI) in OFDM and IUI in OFDMA systems[Zhiqiang_magzine]. In this case, multiple access schemes designed in the delay-Doppler domain might be more beneficial [Chong2022achievable], as will be detailed in the later sections. For now, we restrict ourselves to OFDM transmission in a static environment, i.e., ICI-free, in which case OFDMA is appealing for multi-user communication. In this case, the received signal in subcarrier , , at the BS is given by
(3) |
Due to , the multiple data streams of each user can be easily retrieved at the BS based on a simple single-tap FDE, and thus the achievable rate of user can be formulated as:
(4) |
The resource allocation design challenge is to schedule the data streams of all users and allocate power to each data stream based on the available CSI, for achieving the design goal while taking into the system resource constraints. Note that the user scheduling matrices , , need to be designed at the BS in a centralized manner[DerrickEEOFDMA], while the power allocation for user can be designed distributively at each user, based on its individual CSI.
II-A3 Downlink Power Domain NOMA
Consider a downlink system where a single-antenna BS serves single-antenna users. Both the BS and users still adopt OFDM modulation and demodulation by dividing the system bandwidth into subcarriers. In this downlink system, the channel matrix in (1) is constituted by and the received signal in (1) is given by , i.e., , where and denote the frequency domain channel matrix between the BS and user and the received frequency domain signal at user , respectively. In contrast to OFDMA, we consider an overloaded scenario and assume that the BS can schedule only one data stream to transmit for each user, i.e., and , . Thus, power domain NOMA can be adopted to accommodate all the users to form multi-carrier NOMA[Wei2017]. For power-domain NOMA, superimposition coding is adopted at the transmitter [Wei2017, PerGainWei] to multiplex more than one user on each subcarrier while SIC decoding is employed at the user side to mitigate IUI. In this case, the input-output relationship in (1) can be specified as
(5) |
where collects the information symbols for all the users, denotes the noise at user with noise power of , and denotes the user scheduling matrix at the BS. The diagonal matrix is defined by , where is the power allocation for user at the BS. denotes that user is scheduled to subcarrier , otherwise . More explicitly, the received signal in subcarrier at user is given by
(6) |
For power domain NOMA, since more than one user can be scheduled on each subcarrier, i.e., , achieving IUI-free transmission is not a practical expectation without exploiting extra DoF from other domains. Instead, the power domain NOMA relies on power allocation and SIC decoding by exploiting the channel discrepancies such that the inherent interference can be properly harnessed. According to the principle of power domain NOMA, on subcarrier , the power allocation and the SIC decoding order should be determined by the channel gain order[Wei2017]. In particular, denote the user set scheduled on subcarrier as and without loss of generality their channel gains are sorted , . Accordingly, if both users and are scheduled on subcarrier , a higher power is allocated to the user with a lower channel gain, i.e., . Also, the user with a higher channel gain always first decodes the information of the user with a lower channel gain before attempting to decode its own information symbol [Tse2005]. The achievable rate for user is given by
(7) |
where as each user can only be allocated to at most one subcarrier in the overloaded scenario. Note that user suffers from IUI from user having a stronger channel in subcarrier . Particularly, for the strongest user in subcarrier , it needs to perform steps SIC and then decodes its own information. As a result, IUI-free decoding is realized for this user, and its achievable rate is given by
(8) |
The resource allocation for downlink power domain NOMA is performed at the BS in a centralized manner and its task is to schedule users and to allocate power based on the CSI of all the users, i.e., , for realizing a certain system design goal.
II-A4 Uplink DDMA
OTFS modulation is a recently proposed multi-carrier waveform that aims to provide reliable communication over time-varying channels [Hadani2017orthogonal, ZhiqiangLetterPartI, ShuangyangLetterPartII, WeijieLetterPartIII]. In contrast to the conventional OFDM waveform, OTFS modulates information symbols in the delay-Doppler (DD) domain [Yuan2023survey, Yuan2019simple], offering a distinct approach to signal processing and transmission. As a result, OTFS modulation can effectively exploit the DD domain channel properties, including quasi-static, compactness, potential sparsity, and separability [Zhiqiang_magzine], which enables numerous advanced designs in various wireless applications [Mengmeng2023P2PMIMO, Ruoxi2023Globecom, Shuangyang_ISAC, Weijie2021JSTSP, Chang2023Predictive]. Notably, the coupling between the DD domain channel and the information symbols is characterized by the “twisted convolution” [Shuangyang2023Globecom, LSY_THP, Zhiqiang2022off], a specialized form of convolution that incorporates an additional phase term. The convolution nature of the DD domain channel naturally provides new design challenges and opportunities for NGMA.
Let us consider an uplink multi-user transmission leveraging OTFS waveform with users and the channel between each user and the BS has independent resolvable paths. For the sake of illustration, both the BS and users are equipped with a single antenna. We define a DD grid of size for accommodating information symbols, which corresponds to a time-frequency (TF) grid with subcarriers and time slots. Besides, we consider the case of DDMA [Chong2022achievable], where each user’s information symbols are placed along the whole Doppler dimension but with a specific delay, i.e., each user occupies a row in the DD grid, as shown in Fig. 2. Notice that the coupling relationship between channel and information in the DD domain is convolutional in nature[Hadani2017orthogonal]. Particularly, we shall notice that each user’s data will spread to adjacent rows due to the channel delay. Here, denotes the maximum delay index that is computed as the ratio between the maximum delay spread and the delay resolution , where denotes the duration of one time-slot (corresponding to the duration of an OFDM symbol). Specifically, the symbol multiplexing for user can be characterized by the indicator matrix , , associated for each user [Chong2022achievable], which maps the information symbols to the -th row of the DD grid. Thus, we have and . We adopt denoting the DD domain channel matrix between user to the BS such that . Thus, the input-output relationship in (1) is further specified by
(9) |
where , , is the symbol vector of user , is the transmit power of user , and the detailed structure of is specified in [Chong2022achievable, li2021cross]. Assuming that the SIC detection is adopted at the BS, i.e., the BS always first decodes information of the stronger user with a higher received signal power while treating the IUI caused by weaker users as noise. By assuming that the users’ received signal power levels are sorted in descending order, i.e., , , the achievable rate of user is given by[Chong2022achievable]
(10) |
where the IUI faced by user is given by
(11) |
It should be noted that the rate expression given in (10) is subjected to the specific realization of channel delay, Doppler, and fading coefficients, which is generally challenging to acquire at the user side in uplink transmissions. It was shown in [Chong2022achievable] that the achievable rate in (10) can be tightly upper-bounded by the rate determined by the effective signal-to-interference-plus-noise ratio (SINR) of each user, which is only related to the effective channel gains. More importantly, compared to uplink OFDMA with SIC, a modest achievable rate improvement can be observed thanks to the fact that OTFS is insensitive to delay and Doppler, while OFDMA is prone to substantial channel variability within the TF domain due to the presence of delay and Doppler [Li2020performance, Wei2020transmitter, Shuangyang2021hybrid]. This sensitivity leads to considerable fluctuations in the effective SINR of OFDMA, and consequently decreases the achievable rate.
II-A5 Downlink RSMA
RSMA offers a versatile and generalized non-orthogonal transmission, which presents a dynamic interference management framework that softly bridges SDMA and power domain NOMA, adapting to varying interference levels and specific system requirements[BrunoJSAC].
Here, we consider a narrow-band downlink single-layer linearly precoded RSMA scheme [YijieRSMA] where a multi-antenna BS serves single-antenna users. In this case, the channel matrix in (1) is defined in the spatial domain, the number of antennas at the BS is , and . Again, in overloaded scenarios, we assume that the BS schedules only one data stream to transmit for each user, i.e., and , . The message for user is firstly split into two sub-messages, i.e., one common message and one private message . The common messages of all the users are combined into one common message and is encoded into a common data stream , which is decoded by all the users. The private sub-messages of all the users are independently encoded into private data streams , which are decoded by the corresponding users, respectively. Then, the generated data streams intended for users are linearly precoded and transmitted to the channel. For the considered downlink single-layer RSMA system, the input-output relationship in (1) can be specified as
(12) |
where collects the received signal of all the users and collects the channel vectors between the BS and all the users. and , respectively, denote the precoding vectors for the common data stream and the private data stream of user , . The received signal at user is given by
(13) |
At the receiver side, each user first decodes the common data stream into the common message and performs SIC to subtract its signal from the received signal while treating the interference from all the private data streams as noise. Then, user decodes its private data stream into its private message by treating the remaining interference from other private data streams as noise. After decoding the private message, user reconstructs the original message by extracting from and combining with into . Based on the above procedure, the instantaneous rates for decoding the common and private data streams at user are given by
(14) | ||||
(15) |
respectively. Note that the achievable rate for the common message cannot exceed , such that all the users can decode successfully, i.e.,
(16) |
Without loss of generality, let denote the common rate allocation to user for . The overall achievable rate for user includes both the common rate and the private rate , i.e.,
(17) |
The resource allocation for downlink single-layer RSMA is also performed at the BS in a centralized manner. The resource allocation aims to design the precoding vectors and the common rate allocation based on the CSI of all the users to achieve a specific system design objective.
In summary, the choice of domain for defining the channel matrix significantly influences the specification of the signal generation function . Indeed, the domain of sets the foundation for the overall NGMA framework, while specifies the particular NGMA scheme to employ. More importantly, both and are indicative of the available system resources that can be allocated, which determine the problem formulation and establish the resource allocation design DoF for improving the system performance.
II-B NGMA in Reconfigurable Channels
Although the previously discussed NGMA schemes can efficiently enhance the performance of multi-user communication systems, their efficiency in practical systems is not always guaranteed, especially in challenging radio propagation environments [Ding2015b, Lei2016NOMA, 9679390]. In particular, due to the random and dynamic nature of radio propagation environments, some users may experience adverse channel conditions such as fast fading in high-mobility communication scenarios or severe attenuation due to the absence of line-of-sight (LoS) link caused by the existence of blockages. Under such circumstances, the QoS requirements of the users, e.g., achievable rate or SINR, might not be satisfied, despite the deployment of OMA, NOMA, or RSMA schemes.
II-B1 A Unified Framework for NGMA in Reconfigurable Channels
Recently, several promising techniques have been proposed to proactively configure wireless channels, aiming to mitigate the issues mentioned earlier. By customizing the radio propagation environment, these approaches facilitate the creation of favorable wireless channel conditions for multiple access, thereby inherently overcoming the obstacles faced by NGMA communication systems. Generally, the NGMA model for reconfigurable channels is described by
(18) |
where is the channel reconfiguration variable and its dimension is determined by the specific type of channel reconfiguration techniques. In this scenario, the method of multiple access and the resource allocation among multiple users, i.e., the vector function , can be jointly designed with the channel reconfiguration variable . Particularly, the system resources can be utilized strategically to enhance the system performance based on specific QoS requirements. Different from the fixed conditions for natural channels, the reconfigurable channel condition enabled by introduces greater flexibility in designing NGMA schemes. Consequently, the focus of resource allocation optimization problems shifts from merely determining an efficient strategy, , for a given fixed radio propagation environment to jointly designing both the strategy and the wireless channel . From a mathematical perspective, the former scenario is essentially a subset of the latter case. With this concept in mind, it is crystal clear that the potential for performance enhancement is greater when the overall channel is properly reconfigured by smartly designing . In particular, in practical scenarios where , the original system resources are sufficient to accommodate all the users, OMA schemes remain to be an efficient approach to serve all the users. As such, the extra design DoF can be leveraged to establish more favorable radio propagation environments to achieve desired system design objectives. As such, resha** each user’s channel is possible such that the orthogonality among channels can be maintained, facilitating the mitigation of IUI. On the other hand, when the original system DoF of the natural channel is limited, i.e., , the additional design DoF introduced by becomes crucial. It enables the creation of a more favorable radio propagation environment for NOMA or hybrid NOMA. In particular, by fine-tuning the channel gains, the user paring policy in NOMA or hybrid NOMA can be designed more flexibly and appropriately, potentially enhancing the system performance.
In the following, we will briefly introduce several promising emerging techniques in the literature that can be exploited to shape desired radio propagation environments.
II-B2 NGMA in UAV-Assisted Communication
Equip** UAVs with communication transceivers introduces the capability to establish air-to-ground NGMA links, which can significantly enhance system performance. Compared to conventional cellular systems that rely on fixed terrestrial infrastructure [wong2017key, you2021towards], UAV-assisted communication systems offer on-demand connectivity by deploying UAV-mounted wireless transceivers flexibly over a target area. This flexibility is particularly useful in emergency situations, such as natural disasters and major accidents, where UAVs can be leveraged as aerial base stations to establish temporary communication links quickly and cost-effectively [8663615]. Additionally, the high mobility and maneuverability of UAVs allow them to adapt their trajectories based on the environment and terrain variations, thus improving system performance. By properly optimizing the UAV trajectories, we can place new communication nodes at desired locations to facilitate certain optimal wireless channel conditions for NGMA schemes. Therefore, UAV-assisted communication systems offer a promising solution for providing connectivity in remote or hard-to-reach areas, emergency situations, and other scenarios where traditional infrastructure may be unavailable or insufficient.
Next, to illustrate the above advantages, we consider a toy example where a UAV-mounted BS is equipped with a uniform planar array (UPA) composing antenna elements, i.e., , and serves a group of single-antenna users. In such a case, the reconfigurable channel between the UAV and user is given by [8445944]
(19) |
Here, is a constant determined by the speed of light and the carrier frequency . Moreover, variables and indicate the three-dimensional (3D) Cartesian coordinates of the UAV and user , respectively, where is the fixed altitude of the UAV. Furthermore, the term and vector represent the channel gain between the UAV and user and the corresponding antenna array response (AAR), respectively. Specifically, vector is expressed as [8974403]
(20) | |||||
where is the antenna spacing, and indices and denote the rows and columns of the UPA, respectively. Moreover, variables and represent the vertical and horizontal angle-of-departures between the UAV and user , respectively. As can be seen from the above channel model , the channel is reconfigured by varying the location of the UAV. As such, the position of the UAV and the corresponding AAR vector can be regarded as the channel reconfigure variable in (18).
In the -th time slot, the received signal of user is given by
(21) |
where and is the precoding vector for user in the -th time slot, . For UAV-assisted NGMA systems, the position of the UAV, i.e., , can be jointly designed with beamforming vector to facilitate the implementation of NGMA schemes [8918497, 8648498]. On the other hand, according to the SIC principle for NOMA, strong users will first decode the information of the weaker users to avoid the interference caused. In particular, user will first detect and remove the information signals of user () successively, and then the signal dedicated to user is detected by treating the rest of the users’ signals as noise. To model this, we define a binary variable , , to represent the SIC decoding order of users and in the -th time slot. For the case , we assume that user will perform SIC to eliminate the signal intended for user . For the case , we assume that user will treat user ’s signal as noise. In addition, we should guarantee that since it is not reasonable to mutually implement SIC at both users [8114722, 7973146]. The received SINR of user is given by
(22) |
As can be seen from the above equation, for UAV-assisted NGMA systems, the position of the UAV can be jointly designed with the transmit precoding to achieve the desired objective, including system sum rate or total power consumption of the UAV. Moreover, multiple UAVs can collaborate with each other to further improve the performance of NGMA systems. In this case, the position or trajectory of multiple UAVs can be jointly designed with the other available resources in the system. Besides, additional constraints, such as a collision avoidance constraint, should be considered for safety.
II-B3 NGMA in IRS-Assisted Communication
Thanks to the advances in electromagnetic meta-material, IRSs have emerged as a disruptive solution for harnessing interference in wireless communication systems [QingqingIRS, 9183907, XianghaoJSAC]. An IRS is a planar metasurface consisting of an array of small, passive, low-cost elements, such as phase shifters and printed dipoles, capable of reflecting incident signals with a controlled phase shift. By adaptively adjusting the phase shifts of the IRS elements according to the dynamic radio propagation environment, the wireless channel can be proactively manipulated, which introduces additional designing DoFs for resource allocation design[yu2019miso, 9024490]. Furthermore, the reflected signals can be strategically superimposed with the non-reflected signals constructively or destructively to enhance the desired signal power strength or mitigate detrimental interference, improving overall system performance [9154337]. The relatively simple structure of IRSs allows for flexible installation on building facades and interior walls, smoothly and seamlessly integrating them into existing cellular communication systems. By properly configuring the phase shift patterns of the IRS, we can tailor different wireless channel conditions to match the characteristics of various multiple access schemes. Therefore, IRSs offer a promising solution for improving wireless communication systems, enhancing signal strength, and mitigating interference.
Considering a wireless network comprising a BS, an IRS, and a set of single-antenna users. In particular, the BS is equipped with a uniform linear array (ULA) of antenna elements, while the IRS contains phase shift elements. Without loss of generality, we assume that there exist direct links between the BS and all users. In such a case, the narrow-band reconfigurable channel between the UAV and user can be explicitly expressed as
(23) |
where the channel vectors and characterize the direct link between the BS and user and the link between the IRS and user , respectively. In the literature, and can be modeled as Ricean or Rayleigh random variables based on the specific communication scenarios [8910627]. Also, matrix models the channel between the BS and IRS. Moreover, the diagonal matrix represents the phase shift matrix of the IRS with , where , , is the phase shift introduced by the -th IRS element [9154252, 9154337]. Alternatively, by employing active IRS, both the amplitude and the phase of the IRS element can be jointly optimized111The literature presents a range of IRS models, each designed for specific implementations and applications, where the phase shift matrix, , is subject to distinct constraints. For detailed information, readers are encouraged to refer [XX, YY] [10134546, 10266592].
As can be seen from the above channel model, the channel is reconfigured by varying the phase shift configuration of the IRS. As such, the phase shift matrix can be regarded as the channel reconfigure variable in (18). In fact, by deploying the IRS, an additional reflecting link is established. In the case where the direct link is present, the signals coming from the two links can be combined in a constructive or destructive manner. On the other hand, when the direct link is absent, the IRS-induced link can be smartly tuned to reflect the signal from the BS to the users to establish a strong end-to-end propagation path.
The received signal of user is given by
(24) |
Therefore, by employing the SIC principle for NOMA, the received SINR of user can be expressed as
(25) |
where is a binary variable representing the SIC decoding order between user and user .
We note the aforementioned characteristics of the IRSs are particularly suitable for facilitating resource allocation design for NGMA schemes in wireless networks. In conventional downlink NOMA, users with stronger channels utilize the SIC technique to cancel co-channel interference from others. In contrast, since IRS is capable of reconfiguring user channels by sha** the reflected signal amplitudes and/or phase shifts, the user decoding order of NOMA can be permuted by adjusting the IRS reflection which further facilitates a more flexible performance trade-offs among the users. Furthermore, in scenarios where multiple IRSs are present within an NGMA system [9440764], it is possible to leverage all IRSs or select a subset to assist in transmission, optimizing the balance between system performance, signaling overhead, and computational resources needed for resource allocation. Specifically, for IRS-assisted NGMA systems, the selection policy and phase shift settings of the IRSs can be strategically coordinated with the beamforming strategy of the BS, ensuring a harmonized and efficient network operation.
II-B4 M/FA-Assisted SDMA
The emerging holographic MIMO technique has been proposed to fully harness the spatial variation of wireless channels within a specific spatial transmitter area [10243545, 9264694]. Holographic MIMO surfaces consist of numerous miniature passive elements spaced at sub-wavelength distances that can manipulate the electromagnetic properties of transmitted or reflected waves. By utilizing zero-spacing continuous antenna elements, holographic MIMO can fully leverage the spatial DoFs of the spatially continuous transmitter area. However, the large number of antenna elements required for holographic MIMO presents a critical challenge for both channel estimation and data processing, hindering its practical implementation.
To bridge the gap between holographic MIMO and conventional MIMO, a new MIMO concept based on the M/FA system has been proposed. In the M/FA system, each antenna element is connected to an RF chain via a flexible cable, and its physical position can be adjusted within a designated spatial region. For solid antenna elements, this is enabled by using an electromechanical device, such as a stepper motor [10243545]. As for fluid antennas, changing the position of the antenna elements can be realized by employing a piston structure or electromagnetic device [9264694, 9650760]. Unlike conventional MIMO systems, which have a set of antenna elements mounted at fixed locations, M/FA can utilize the full spatial DoFs within the available spatial transmitter area by leveraging the flexible movement of the M/FA [10318134]. In fact, by adjusting the position of antenna elements, we can vary some characteristics of the channels, e.g., the path loss between the BS and the receivers and the correlation between the antenna elements. As a result, the M/FA can be regarded as an additional channel reconfiguration based on the conventional position-fixed antenna array, which introduces extra DoFs for resource allocation design for NGMA systems [10078147]. On the other hand, since M/FA requires only a small number of antenna elements to exploit the available DoFs, the computational complexity of the required signal processing is significantly reduced compared to holographic MIMO systems [10146274]. Therefore, M/FA offers a promising solution for fully exploiting the spatial variation of wireless channels within a given spatial transmitter area while overcoming the challenges of holographic MIMO.
We consider a multi-user wireless communication system consisting of a BS and single-antenna users. The BS is equipped with M/FA elements to serve the users. The positions of the M/FA elements can be adjusted simultaneously within a given two-dimensional (2D) rectangular region. To facilitate the resource allocation design, the 2D rectangular region is quantized, which results in possible positions of the M/FAs. For notational simplicity, we define a set to collect all possible positions, i.e., . In particular, the vector denotes the -th possible position, where variable and are the corresponding horizontal and vertical coordinates, respectively. We note that for the -th M/FA element, its feasible position, denoted by , is selected from , i.e., . As such, the physical channel can be reshaped by adjusting the positions of the M/FA elements. In particular, the channel between the -th M/FA element and all users is defined as , where variable is the channel coefficient between the -th M/FA element and user . We note that the channel vector is a function of . To facilitate notational simplicity, we define a matrix to collect the channel vectors from the -th M/FA element to all users for all feasible discrete locations. Then, channel vector can be represented as follows
(26) |
where vector . In particular, binary variable is the indicator to determine the position of the -th M/FA element and we have . For the considered system, the channel matrix between the BS and the users, , is then given by
(27) |
where matrices and are defined as follows, respectively,
(28) |
Next, we define as the -th row of , which denotes the channel vector between the BS and user . Then, the received signal of user is given by
(29) |
where denotes the precoding matrix at the BS. For notational simplicity, we define sets , , and to collect the indices of the users, M/FA elements, and candidate positions of the antenna elements, respectively.
By introducing an auxiliary matrix , the received signal of user can be rewritten as
(30) |
Thus, the SINR of user is given by
(31) |
where denotes the -th column of .
The distinctive features of the M/FA system are exceptionally well-suited for enhancing NGMA schemes within wireless networks. In particular, in case some of the users suffer from unfavorable wireless channel conditions,the M/FA enables the reconfiguration of the antenna array to cultivate a more conducive radio propagation environment. For example, the positions of specific antenna elements can be modified to bypass obstructions between the antenna array and the users. Alternatively, we may assign a subset of the antenna elements to dedicatedly serve a user whose channel condition is poor. Moreover, due to the high maneuverability of the antenna elements, we can flexibly adjust the spacing between adjacent antenna elements to manipulate the correlation and coupling of the antenna elements for better interference management in NGMA.
In summary, the resource allocation design of NGMA for reconfigurable channels requires the joint design of channel reconfiguring and resource allocation variables, such as joint passive and active beamforming design for IRS-assisted communications and joint trajectory and resource allocation design for UAV-assisted communications. Compared to natural channels, the capability of channel reconfiguration provides additional DoF for accommodating more users and further improving the system performance. In Table III, we summarize the DoFs for NGMA design, limitations, and implementation complexity of different channel reconfiguration techniques. We can observe that although the channel reconfiguration techniques introduce additional flexibility in resource allocation design, they also bring new challenges. In particular, to fully exploit the potential of the UAV-assisted NGMA, the dynamic and uncertain environments have to be taken into account when designing the trajectory and transmit precoding of the UAV. Also, no-fly zones and collision avoidance should be considered for safety issues. Moreover, considering the fact that the RF chains are usually absent at the IRSs, advanced channel estimation methods should be developed to facilitate the acquisition of accurate CSI, which enables efficient IRS-assisted NGMA. Furthermore, compared to the coherence time of the wireless channels, the reconfiguration speed of the M/FA systems is significantly slower. As such, it is infeasible to reconfigure the M/FA systems per time slot. As a result, advanced hardware should be developed to facilitate fast array reconfiguration. Also, a more delicate and suitable frame structure should be proposed to perfectly accommodate the NGMA schemes in M/FA systems.
Techniques | DoFs | Limitations |
UAV | UAV position | Weather dependent, safety issue |
IRS | Phase, amplitude | Difficult to obtain accurate CSI |
M/FA | Antenna position, correlation | Relatively low array reconfiguration speed |
II-C NGMA in Functional Channels
II-C1 A Unified Framework for NGMA in Functional Channels
Future cellular networks are envisioned to support various wireless functionalities, extending well beyond the scope of traditional communication to satisfy the demands of emerging applications and use cases [10349846, WeijieLetterPartIII, 10266619]. This evolution is propelled by the growing need for sensing and computing within wireless networks, which makes the discussion of the performance of multiple functionalities under limited network resources more meaningful [Fan2020, **ke2019JCAC]. We refer to wireless channels that must support multiple functionalities simultaneously as functional channels. Particularly, the functional channel inevitably introduces new challenges and opportunities for NGMA. Firstly, in functional channels, the concurrent optimization of multiple functionalities is imperative, indicating that traditional multiple access strategies tailored for natural channels might not seamlessly apply. Secondly, the integration of multiple functionalities opens up innovative design avenues for NGMA by strategically utilizing the outcomes of these functionalities. For example, in ISAC channels, the sensing results can be leveraged to predict the future CSI of the users, which helps improve the communication performance [Weijie2021JSTSP, Shuangyang2022ISAC]. Specifically, sensing-assisted communication and communication-assisted sensing transmissions are shown to outperform the communication-only and sensing-only cases [Shuangyang2022ISAC, Weijie2021JSTSP, chang2022learning], respectively. More interestingly, it was shown in [Kobayashi2018Joint] that a careful design of the transmitted signal can improve the performance of both functionalities simultaneously. Therefore, the presence of functional channels may be beneficial for NGMA designs. In line with (1), it is convenient to discuss the NGMA designs in a functional channel according to the following model
(32) |
where and are the channel observations for the communication functionality and the other functionalities, respectively, e.g., radar sensing, and and are the numbers of resource elements available at receivers. Furthermore, and are the symbol vectors for communication information and the other functionalities, respectively, e.g., computing, and and are the numbers of symbols required by the communication and the other functionalities, respectively. Also, and denote the communication channel and the channel for other functionalities, respectively, with being the number of resource elements available at the transmitter, while and are the corresponding AWGN vectors for different functionalities. From (33), we notice that the function in (33) maps both the symbols for communications and other functionalities to system resources, where is the total number of symbols required by all functionalities. Different from (1), the function needs to be designed carefully by jointly considering the requirements of various functionalities. To shed light on the specific NGMA designs, we propose to discuss the importance of NGMA for two representative types of functional channels in the following, namely the ISAC channel [Fan2020], and the JCAC channel [Sun2019JCAC], respectively.
II-C2 NGMA for ISAC Channels
ISAC represents a paradigm shift in the design and development of wireless networks, emphasizing providing communication and sensing functions into a single unified platform. Typically, the ISAC system can be described by the following general form [Fan2020]
(33) |
where and denote the communication and sensing channels, respectively, and denote the received signals at the communication and sensing receivers, respectively, and and denote the corresponding communication and sensing noise vectors, respectively. Here, and denote the numbers of resource elements available at the receiver for communication and radar sensing, respectively, and represent the resource allocation strategy that maps the information symbols to the transmitted symbols . Particularly, it is important to highlight that the parameters the values of , , and can be different due to the available system resource elements at the transmitter and receiver for both communication and radar sensing functionalities.
Denote by the transmitted symbol vector after map**. We shall rewrite (33) by
(34) |
which aligns with the conventional ISAC models [Yifeng2023fundamental]. From (33) and (II-C2), it is clear that the resource allocation problem for functional channels is to design an effective map** function for given communication and sensing channels and . However, the major difference of such a resource allocation problem in comparison to the one discussed in Section II-A is the fact that needs to exploit the connection between and for simultaneously satisfying both the communication and sensing requirements. In the following, we present an illustrative example system for enabling dual functionality of sensing and communication.
Downlink SDMA-based Monostatic ISAC system: Let us examine a downlink monostatic ISAC multiple access transmission with dual-functional MIMO arrays at the BS. The BS is equipped with a ULA with antennas serving single-antenna users while capturing backscattered signals from targets for radar detection and estimation purposes. We consider the case where each user transmits a data stream of length denoted by , i.e., , and we assume that and are the numbers available resource elements. Furthermore, assume that the system operates over a flat fading channel with a sufficiently long coherence time. In accordance to (II-C2), the underlying ISAC transmission is modeled by
(35) |
where is the information matrix to be transmitted, is the underlying precoding matrix, and and are the communication and radar received symbol matrices, respectively. In (II-C2), and , where and are the channel vectors for communication and sensing of user , respectively.
We propose to study the resource allocation in this example by optimizing the precoding matrix , such that the received signal at each user requires little or no equalization, while the transmitted signals at the BS mimic a certain beampattern [AA, BB] that is favorable for radar sensing. More specifically, by rearranging the communication input-output relation into
(36) |
we can define the effective SINR by
(37) |
Based on (37), the achievable rate for user is calculated by
(38) |
which can be adopted to evaluate communication performance. On the other hand, the radar performance is evaluated by deriving the difference between the transmit beampattern and the desired radar beampattern. Let be the radar beampattern of interest, where is the desired radar transmitted signal [Fan2018Toward]. Then, the radar performance is characterized by the MSE of the form
(39) |
Note that a wide range of sensing metrics exists within the field[Fan2020]. However, for the purposes of this analysis, we have deliberately selected the MSE between the transmitted and the sensing-desired signals as the metric for assessing radar performance. This choice is motivated by the MSE’s relatively straightforward formulation for resource allocation and its direct influence on the actual performance of the radar system.
Based on (38) and (39), we observe that the choice of will directly affect the signal beampattern and the communication achievable rate. Therefore, we note that the resource allocation in the above example boils down to the design of for providing a desired tradeoff between communication and radar sensing performance. Note that the desired tradeoff may be different according to the NGMA requirements. For example, in communication-centric designs, the sensing performance is less important, and therefore the resource allocation should lean towards the communication functionality, where would ideally resemble a zero-forcing precoder that aims to null the interference caused by sensing signals. On the other hand, in sensing-centric designs, where the priority is on the radar sensing capabilities over communication performance, resource allocation is oriented more towards enhancing the sensing functionality. Consequently, the design of should aim to align closely with the desired signal , evaluated by the Frobenius norm as specified in (39). In summary, the resource allocation strategy for NGMA within the ISAC system framework necessitates a proper balance between communication and radar sensing functionalities, tailored according to the constraints of available resource elements. This requirement for equilibrium poses a significant difference from traditional resource allocation approaches in NGMA for natural channels, underlining the unique challenges and considerations involved in optimizing integrated systems that offer multiple functionalities.
II-C3 NGMA for JCAC Channels
Mobile edge computing (MEC) is recently emerged as a potential solution to relieve the burden of backhaul links in wireless networks[Yuyi2017]. Specifically, the MEC protocol aims to move the computing resources from the central network towards the network edges. In this context, both communication and computing functionalities are involved and therefore it falls in the category of JCAC transmissions [Feng2019multiantenna].
Let us consider the NGMA design for JCAC channels, where users aim to compute their tasks exploiting the MEC protocol and transmit information to the BS simultaneously. To leverage the computation resource at the BS and fulfill the constraint of latency, each user separates their tasks into two parts computed either at the edge or at the center via offloading and downloading. In this context, the channel model in (33) is further specified by
g | (40) |
where is the received signal at the BS containing information for both communication and computing, is the corresponding channel matrix, and is the AWGN vector. In (40), and are the information symbols to be transmitted and task symbols describing the computation tasks of all users. Based on (40), we notice that needs to satisfy both the communication and computing requirements, which requires the resource allocation taking into account both communication and computation resource, e.g., energy consumption. The following example provides further details on designing .
OFDMA-based Computation Offloading for JCAC channels: Let us consider the computation offloading issue for JCAC transmissions, where the users communicate and offload part of their tasks to the center BS simultaneously via OFDMA while computing the rest of their tasks locally 222The consideration of OFDMA serves as an illustrative example. The extension to a non-orthogonal framework can be achieved by following a similar approach as in previous sections.. For ease of exposition, we ignore the transmission where users collect their task symbols after computing from the central BS via the downlink [Feng2019multiantenna]. Let be the number of subcarriers available in the OFDMA system and we have . Considering transmissions over static channels, we shall further specify (40) based on (2) by
(41) |
where are the transmitted symbols of user , and the rest of notations follow the same definition given in (2). Specifically, is a subset of the total data streams with cardinality , containing the corresponding information symbols of user . Similarly, is a subset of the total task symbols with cardinality , containing the corresponding computation task symbols of user . Hence, we have . Following the same derivation as for (3), we shall obtain the input-output relations of user by highlighting both the communication and computing functionalities in the form of
(42) |
Notice that entries in and do not share the same subcarrier. We can characterize the communication rate of user by
(43) |
Similarly, the achievable rate for task offloading of user is given by
(44) |
In addition to the achievable rates, it is important to characterize the total consumed energy for each device to transmit symbols and to locally compute part of the task using the central processing unit (CPU). According to [Feng2019multiantenna], the total energy consumption is given by
(45) |
In (45), is the latency allowed for all users finishing computing the task, while is the allowed signal transmission time to meet the latency according to the computation ability of the BS that is the inverse of the total bandwidth. Furthermore, is the number of bits left for user to compute locally, is the number of CPU cycles for computing one input-bit for user that is chosen to guarantee the task completion within , is the effective capacitance coefficient that depends on the chip architecture of user . On the other hand, the term denotes the average energy required for the signal transmission of user . Finally, (45) can be understood as the summation of each user’s consumed energy including the energy for both task offloading, communication symbol transmission, and local computing. In fact, in (45) depends on the achievable rate given in (44). Let be the number of bits describing the task of user . Then, in order to guarantee the computing functionality, must hold. From (43), (44), and (45), we also observe that the resource allocation for the JCAC transmission needs to consider the tradeoff between communication rate, computing efficiency, and the total energy consumption. Particularly, we observe that the computing efficiency is translated to the latency constraint as included in (45). Therefore, the resource allocation problem is reduced to find the desired balance between the communication rate and the total energy consumption of all users.
III Resource Allocation Design for Next-Generation Multiple Access
In this section, we present the typical problem formulations for resource allocation design of different types of NGMA.
III-A Resource Allocation Design for NGMA in Natural Channel
Resource allocation design for NGMA in natural channels can be categorized into three types according to the design orientations, i.e., rate-oriented, power-oriented, and reliability-oriented resource allocation design. In particular, the rate-oriented resource allocation is suitable for rate-demanding applications or scenarios. Power-oriented resource allocation intends to reduce the system power consumption, which fits scenarios where power is a limited system resource, such as for massive IoT devices. Besides, reliability-oriented resource allocation aims to enhance the system robustness against the existence of imperfect CSI. In this subsection, we present the problem formulations for these three types of resource allocation designs for NGMA in natural channels.
III-A1 Rate-oriented Resource Allocation Design [AA, BB, CC]
We consider the downlink power domain NOMA system in (5) and formulate the rate-oriented resource allocation design problem. The main motivation of NOMA is accommodating more users and improving the spectral efficiency when the system spectrum resource is limited. In particular, the power allocation for each data stream at each user and user scheduling strategy are jointly designed to maximize the system sum rate. The system sum rate maximization problem can be formulated as the following optimization problem:
(46) |
where is given by (7). C1 guarantees that the total transmit power does not exceed the power budget at the BS . C2 limits that each user can only be allocated to at most one subcarrier. Constraint C4 is imposed to ensure variable to be an indicator. This optimization problem is also non-convex due to the non-convex objective function (NOF), variable coupling (VC) between and , fractional constraint (FC) C3, and binary constraint (BC) C4.
III-A2 Power-oriented Resource Allocation Design [AA, BB, CC]
We consider the uplink OFDMA system in (2) and formulate a power-oriented resource allocation design problem. The power allocation and the data stream scheduling strategy should be jointly designed to minimize the total transmit power of all users while satisfying the QoS requirement of each user. In particular, the power minimization problem can be formulated as the following optimization problem:
(47) |
where is given by (4). C1 guarantees that the total transmit power of user does not exceed its power budget . Besides, the user scheduling variables must obey C2 such that at most one data stream of a user can be scheduled exclusively to one subcarrier for maintaining orthogonality in resource allocation. Constant in C3 denotes the minimum required data rate of user and C3 is introduced to guarantee the QoS of each user. This optimization problem is also non-convex due to the VC between and , FC in C3, and BC in C4.
III-A3 Reliability-oriented Resource Allocation Design [AA, BB, CC]
For the case of imperfect CSI at the transmitter (CSIT), the resource allocation design for NGMA only has the knowledge of channel estimate , which may suffer from the channel estimation error as follows:
(48) |
where is the channel estimation error. The channel estimation error can be modeled by a Gaussian model or a bounded model , where is the covariance matrix of the channel estimation error and is the sphere radius where is located in. A reliability-oriented resource allocation design should be considered to guarantee communication performance even in the presence of channel estimation error. We consider the downlink RSMA system in (13) and formulate a robust resource allocation design problem concerning the worst-case achievable rates. The resource allocation design problem in the case of imperfect CSIT for RSMA is formulated as the following optimization problem:
(49) |
where and are the worst-case achievable rate in the presence of channel estimation error and they are defined by
(50) |
with and given by (14) and (15), respectively. Constraint C1 guarantees the decodability of the common stream for all users and constraint C2 is the total power constraint for the precoding vectors. Constraint C3 guarantees the minimum data rate for each user, where the sum of the private and common data rates for user should not be less than its minimum required data rate . Constraint C4 is introduced to guarantee a non-negative common rate allocation to user . This optimization problem is non-convex due to the NOF, semi-infinite constraint (SMIC) in C1, and FCs in both C3 and C4.
III-B Resource Allocation Design for NGMA in Reconfigurable Channel
Emerging techniques including UAV, IRS, and M/FAs enable the joint design of wireless channels and signals. These techniques bring extra DoFs for resource allocation design. However, some challenges need to be tackled before the full potential of these emerging techniques can be unlocked. In the following, for each of these techniques, we formulate a typical optimization problem to help the readers better understand this.
III-B1 Resource Allocation for IRS-assisted NGMA [ZhiqiangOFDMA, yu2020power, wu2023globally]
We consider a passive IRS-assisted multi-user communication system. One typical design objective for resource allocation in IRS-assisted communication systems is the maximization of the sum rate. This leads to the following optimization problem:
(51) |
where the SINR of user is given by (25). In the above optimization problem, the BS transmit beamforming vector, the IRS phase shift pattern, and the SIC decoding order are jointly optimized for the maximization of the system sum rate. The constant in constraint C1 is the maximum BS transmit power. Due to the passive nature of the IRS, unit-modulus constraint (UMC) C2 is adopted to enforce each main diagonal element of the IRS phase shift matrix to have a unit gain [xu2021resource, yu2019enabling]. Alternatively, by employing a discrete phase shift model, the elements of can be selected from a discrete feasible set [wu2023globally]. Binary constraint C3 represents the candidate SIC decoding order and constraint C4 ensures that for two users, only one possible SIC decoding order is employed for both users.
III-B2 Resource Allocation for UAV-assisted NGMA [8663615, 8445944, 8644086]
We consider a rotary-wing UAV-assisted multi-user communication system in (21). One possible design goal for resource allocation in UAV-assisted communication systems is the minimization of the UAV’s total power consumption. In time slot , the power minimization problem is formulated as the following optimization problem:
(52) |
where the SINR of user in time slot is given by (22). The constant in constraint C1 denotes the maximum transmit power of the -th antenna element, , due to the limitation of the analog RF front-end. Constraint C2 indicates a pre-defined SINR threshold of user should be met to ensure the desired QoS requirement, denoted by . In addition to conventional communication-oriented performance metrics and constraints, UAV-assisted communication also introduces additional UAV-related terms and constraints for resource allocation design. First, in the objective function denotes the UAV aerodynamic power and it is determined by the UAV speed . In particular, can be modelled as . Here, constant denotes the rotor tip speed and , , , , and are UAV aerodynamic power consumption parameters [seddon2011basic, 8663615]. Moreover, constraints C3 and C4 are the UAV kinetic constraints. Constraints C5 and C6 are imposed to ensure the SIC decoding order. This optimization problem is non-convex due to the NOF, FC in C2, and BC in C5.
III-B3 Resource Allocation for M/FA-enabled NGMA [10283659, 10207991]
We consider a M/FA-enabled multi-user communication system in (29). One possible common design objective of M/FA-enabled communication systems is to minimize the BS total transmit power by jointly optimizing the beamforming vectors and the position of the M/FAs. This leads to the following optimization problem:
(53) |
where the SINR of user is given by (31). The constant in constraint C1 denotes the minimum required SINR of user to ensure a satisfying communication service. Constraints C2 and C3 are imposed to present the position selection of M/FA elements. Equality constraint (EC) C4 is imposed such that the beamforming and antenna selection policy can be successfully recovered after optimization. This optimization problem is non-convex due to the FC C1, BC C2, and EC C4.
III-C Resource Allocation Design for NGMA in Functional Channels
The resource allocation design for functional channels departs from the objectives for conventional communication-only channels, given the unique integrated nature, where communication functionality and other functionalities coexist. Particularly, the objective function for functional channels necessitates a careful tradeoff between communication performance and other performance of interest. Depending on the specific system requirements and objectives, the objective function in NGMA can be broadly classified into three categories. Specifically, the communication-centric design may be the most straightforward design that aims to optimize the communication performance subject to a reasonable performance requirement of the other functionalities. In contrast to the communication-centric design, the resource allocation design can focus on the performance of other functionalities while maintaining a reasonable communication performance. This design is referred to as the function-centric design. According to the above two design criteria, the resource allocation design for NGMA in functional channels is detailed as follows.
III-C1 Communication-Centric Resource Allocation [**ke2019JCAC, Fan2020, 10207991]
We study the communication-centric resource allocation based on the downlink SDMA-based monostatic ISAC system given in Section II-C. In the communication-centric resource allocation, the design objective is to optimize the communication performance while satisfying certain constraints required by the radar sensing functionality. Considering (37), the corresponding optimization problem can be formulated as follows:
(54) |
where is given by (37), is a pre-determined parameter characterizing the required sensing quality, and is the power constraint. As mentioned before, the radar sensing quality is evaluated by the similarity between the transmitted beampattern and the desired beampattern for radar sensing, which becomes the optimization problem constraint C2 [xu2022integrated]. Compared to the resource allocation problem for conventional communication-oriented channels, the size of the solution set for the sum rate optimization problem is reduced due to the requirement of radar sensing quality. This optimization problem is non-convex due to the NOF.
III-C2 Function-Centric Resource Allocation [AA, BB, CC]
We study the function-centric resource allocation for JCAC transmissions discussed in Section II-C. In the considered problem, the design objective is to minimize energy consumption while satisfying the constraint on the communication rate. The corresponding optimization problem can be formulated as follows:
(55) |
Note that the value of needs to be an integer by definition but is treated as a continuous variable here, but the performance loss is in general negligible when is sufficiently large [Feng2019multiantenna]. In (III-C2), C1 states that the communication rate of each user needs to satisfy the corresponding minimum constraint; C2 is the constraint on the offloading rate such that the the whole task of each user can be computed either locally at the user side or at the BS; C3 is the power constraint; C4 is the length requirements of the offloading bit sequences; C5 and C6 together ensure that the communication symbol and task symbol can be allocated to at most one subcarrier in the transmission.
IV Optimization Tools for Resource Allocation Design
You better pay attention to this section. The discussions are not precise, with respect the so-called global optimality. Are you dealing with single optimization variables or multiple? FOR ALL algorithms, they are about performance, convergence, complexity, and hidden cost (e.g., signalling overhead). it’s better to address some of them, at least convergence anc complexity
In this section, we introduce several optimization approaches for addressing the optimization problems of NGMA systems formulated in Section III. In particular, we first discuss a few globally optimal approaches for handling a particular type of non-convexity, including semidefinite relaxation (SDR), branch-and-bound (BnB), and monotonic optimization (MO). Indeed, the resource allocation problems for NGMA are generally complicated involving different kinds of non-convexities. In general, one may need to exploit a combination of different global optimization methods to obtain a globally optimal solution. We note that these optimal approaches can be exploited to reveal the performance upper bound of the NGMA systems and serve as performance benchmarks for the related suboptimal approaches. While they allow us to find the globally optimal solution, they typically require a significant amount of computational resources. To strike a balance between optimality and complexity, we then introduce a few low-complexity suboptimal approaches such as successive convex approximation (SCA) and block coordinate descent (BCD). Moreover, for each approach, we will provide a clear explanation of the basic ideas behind these approaches and interpret the flow and key steps in detail. Also, we will take some optimization problems listed in Section III and briefly discuss how these approaches can be employed to tackle the optimization problems.
Problem | Challenges | Methods | Optimality | Complexity |
(III-A1) | NOF, VC, FC, BC | BnB, SCA | Locally optimal | Exponentially high |
(III-A2) | VC, FC, BC | BnB | Globally optimal | Exponentially high |
(III-A3) | NOF, SMIC, FC | SCA, S-procedure[boyd2004convex] | Locally optimal | Moderate |
(III-B1) | NOF, UMC, FC | BCD, SCA, SDR, manifold optimization[absil2009optimization] | Locally optimal | Moderate |
(III-B2) | NOF, FC, BC | MO, SDR | Globally optimal | Exponentially high |
(III-B3) | FC, BC, EC | BnB, bilinear transformation[6698281] | Locally optimal | Exponentially high |
(III-C1) | NOF | SCA | Locally optimal | Low |
(III-C2) | NOF FC | MO | Globally optimal | Exponentially high |
IV-A Global Optimization Approaches
IV-A1 Semidefinite Relaxation Approach
When the transmitter is equipped with multiple antennas and the targeted receivers are equipped with single antennas, the corresponding transmitter beamforming design problem, e.g., the problems in (III-B1), (III-B2), and (III-B3), can be equivalently transformed as semidefinite programming (SDP) problems 333You need to articulate clearly what variables are you talking about? The heading Global optimization can be very misleading. . We take the optimization problem in (III-B2) as an example. To dev=In particular, by defining the beamforming matrix , , (III-B2) can be equivalently represented as the following SDP problem:
( Are you talking about optimization only?? or all variables?)
(56) |
We note that the original quadratic function with respect to the beamforming vector is now replaced by an affine function with respect to the beamforming matrix [9723093]. This is achieved by replacing the beamforming vector to be optimized with the beamforming matrix where . To efficiently recover the beamforming vector, two additional constraints, i.e., a semidefinite constraint C7 and a rank constraint C8, are imposed. Although the rank constraint is highly non-convex, we can exploit the popular SDR approach by drop** the rank constraint. In case the unit-rank constraint is the only non-convex constraint of the problem at hand, we can then optimally solve the resulting rank constraint-relaxed version of the original optimization problem. The tightness of the SDR has been proved in the literature, e.g., [DerrickEERobust, yu2020irs]. In the following, we briefly explain the key steps. First, by exploiting the duality theory [boyd2004convex], we can express the Lagrange function of the considered optimization problem with respect to the beamforming matrix . Then, based on the Lagrange function, we can formulate the dual problem of the original optimization problem and express the Karush-Kuhn-Tucker (KKT) conditions with respect to . Subsequently, by analyzing the KKT conditions, we can conclude that there is always an optimal solution satisfying .
IV-A2 Branch-and-Bound Approach
In NGMA systems, some resource allocation optimization problems, such as the subcarrier assignment or SIC decoding strategy design, involve binary optimization variables [7812683, xu2023joint]. This results in non-convex binary integer programming (BIP) problems, cf. (III-A1) and (III-B2), which are challenging to solve. On the other hand, since the available subcarriers or the feasible SIC decoding strategies are countable and finite in an NGMA system, the number of corresponding binary optimization variables is limited. Based on this observation, we can exploit enumeration-based approaches to traverse all possible binary variable-induced schemes and obtain the optimal solution. One popular and systematic enumeration-based approach is the BnB approach [lawler1966branch]. We take the subcarrier assignment optimization problem in (III-A2) as an example and rewrite it here
(Similarly here, are you talking about optimizing a variable only?)
(57) | |||
We note that the above optimization problem can be optimally solved by employing the BnB approach. Next, we explain the basic concept and the key steps of the BnB approach. Specifically, the fundamental idea behind the BnB approach is to construct a search tree and check the branches of the tree to find the best solution. This is achieved by iteratively applying the three steps of partitioning, branching, and bounding until the optimal solution is obtained when upper and lower bounds are merged [lawler1966branch, 9669263]. Initially, the full feasible set is mapped onto the root node of the search tree. According to a pre-defined partitioning rule, we partition each node as two subnodes and the two subnodes represent two subsets of the full feasible set. In this case, both subsets contain one specific binary variable that is already set as and , respectively. Accordingly, for each subnode, we have to solve one subproblem associated with a subset and obtain the corresponding objective function value. Then, among the objective function values of all subnodes, we select the one with the minimum value as the upper bound for the original optimization problem in (57). As for the lower bound of (57), we can replace the binary constraint C4 by a convex constraint with a set of continuous variables, i.e., . We note that in the convex constraint, those variables already set as or in the previous iteration of BnB will not be relaxed as continuous variables. Then, the relaxed version of (57) with the aforementioned convex constraint can be optimally solved by employing bilinear optimization approaches, e.g., McCormick envelopes [mitsos2009mccormick]. As such, the resulting objective function value of the relaxed version of (57) serves as a lower bound of the original optimization problem in (57). To simplify the traversal in each iteration, if the objective function value of one subproblem is larger than the upper bound, the associated subnode will be discarded from the tree. Along with the expansion of the search tree, the original feasible set is progressively partitioned into more subsets and the BnB approach will not be terminated until the gap between the upper bound and the lower bound is smaller than a pre-defined threshold. It has been proved in [horst2013global] that as long as the number of binary variables is finite, the BnB approach converges to the globally optimal solution of the BIP problem in a limited number of iterations. For the considered optimization problem in (57), there are in total binary optimization variables, where . Hence, we need to construct an -tier search tree comprising at most subnodes in the last tier. This is illustrated in Fig. 3 where the optimum of a BIP problem involving 2 binary optimization variables can be obtained by constructing a -tier search tree with subnodes in the last tier.
IV-A3 Monotonic Optimization Approach
( Why did you consider a convex problem for illustrating MO? At least you should show NOMA…)
Although resource allocation designs for NGMA systems often encounter non-convexity, most resulting optimization problems do preserve monotonicity [tuy2000monotonic]. In this case, their objective function monotonically increases or decreases relative to the optimization variables over the feasible set, cf. (III-A1) and (III-B1). This property provides us with a promising means to solve this kind of problem, that is, to iteratively reduce an upper bound on the monotonic objective function until the maximum over the feasible set is obtained. In the following, we take the optimization problem in (III-A1) as an example. To deliver the basic idea, we assume that the given subcarrier assignment policy is already determined by employing enumeration-based approaches and focusing on the power allocation design. In this case, we replace the term in the objective function of (III-A1) by and thus the optimization problem in (III-A1) is degenerated as follows
(58) |
We note that for (IV-A3), the objective function is monotonically increasing with respect to the SINR term . Moreover, constraints C1 and C3 define a normal set and a conormal set [zhang2013monotonic], respectively. As a result, we define an optimization variable , which satisfies . Then, the optimization problem in (IV-A3) can be equivalently reformulated as a canonical form of MO problem which is given as follows
(59) |
where feasible set is defined as and the normal set and the conormal set are given by, respectively,
(60) | |||
(61) |
where sets and are spanned by constraints C1 and C3, respectively. By exploiting MO theory, we can develop MO-based algorithms, e.g., two-layer polyblock outer approximation algorithm [bjornson2013optimal, 8648498, 9423667], to obtain the globally optimal solution to (IV-A3). Next, we introduce the key steps of the polyblock outer approximation algorithm. To start with, we construct a polyblock that contains the feasible set . As such, the vertex of serves as an upper bound of the objective function of (IV-A3). Then, in each iteration of the outer layer of the algorithm, we continuously shrink by removing a cone that does not belong to the feasible set . However, as the feasible set is in general unknown in advance and difficult to characterize, we exploit the bisection projection search in the inner layer of the algorithm to find the projection of a vertex on the upper boundary of the feasible set [zhang2013monotonic]. In particular, we check the feasibility of an optimization problem subject to constraints C1 and C3 for a given projection factor. The two-layer algorithm is not terminated until the gap between the vertex of the current block and its projection on the upper boundary of the feasible set is smaller than a pre-defined threshold. When the pre-defined threshold is infinitely small, we can guarantee to find the globally optimal solution of (IV-A3). A more detailed convergence proof can be found in [zhang2013monotonic]. Besides, the computational complexity of the two-layer polyblock outer approximation algorithm increases exponentially with the number of users. An example of the polyblock outer approximation algorithm is given in Fig. 4. As can be observed from the figure, although the feasible region of the considered two-variable optimization problem is a non-convex set ( I don’t see the drawing in Figure 4 as a non-convex set…), the polyblock outer approximation algorithm finds the optimum after sequentially shrinking the polyblock for roughly times.
( Say a few words about convergence…)
IV-B Low-Complexity Suboptimal Approaches
( You were not actually solving the problems….you handled a particular non-convexity)
Although the optimization approaches introduced in Section IV-A can be employed to obtain globally optimal solutions to the considered optimization problem, most of them, e.g., BnB and MO approaches, entail high computational complexity. As such, the required computation resources may not be affordable in practical NGMA systems to perform real-time resource allocation. To overcome this issue, in the following, we introduce several low-complexity optimization approaches to facilitate the real-time design of the NGMA systems.
IV-B1 Successive Convex Approximation Approach
Wireless communication systems have become increasingly complex, necessitating the joint allocation of various wireless resources. This complexity has led to more sophisticated system models and made non-convex resource allocation optimization problems more prevalent. Often, the non-convexity in practical optimization challenges arises from specific parts of the objective function or constraints, while the rest of the optimization problem remains convex. Recognizing this, the sequential/successive convex approximation (SCA) approach was developed. The core idea behind the SCA approach is straightforward: approximating non-convex functions with tractable convex ones and iteratively solving a series of approximated convex optimization problems until convergence is achieved.
( There are some requirements (three, if I remember correctly) for the surrogate functions to ensure convergences. )
It has been shown in the literature, that the SCA approach can find a solution that is close to the global optimum in a computationally efficient manner. In the following, we briefly explain how the SCA approach is employed to tackle the resource allocation optimization problem in the NGMA systems. We take the optimization problem in (III-C1) as an example and rewrite it here:
(62) |
We note that constraints C1 and C2 are two convex functions with respect to the optimization variable . The non-convexity of (IV-B1) originates from the objective function. To show the basic idea of the SCA, we define a function as follows
(63) |
Instead of directly solving the above non-convex problem, we construct a surrogate function, e.g., a global underestimator, for the objective function in (IV-B1) as follows
(64) |
where is the iteration index and is a feasible point in the -th iteration. Then, in the -th iteration of the SCA approach, a lower bound of the problem in (IV-B1) can be obtained by solving the following optimization problem
(65) |
By applying the SCA approach, the lower bound for (IV-B1) is gradually tightened. It has been proved in [dinh2010local] that the SCA approach is assured to provide a locally optimal solution to the original problem in (IV-B1). Also, since in each iteration of the SCA approach, a convex optimization problem is solved, the objective function value of (IV-B1) converges efficiently. In Fig. 5, we illustrate the basic idea behind the SCA approach. As can observed from the figure, for different initial points, the SCA approach may converge to the globally optimal solution or a locally optimal solution. This becomes a drawback when compared with the global optimization approaches where the convergence point is independent of initial points. ( On the other hand, the computational complexity of the SCA approach is of polynomial time, due to the fact that it requires solving only a sequence of convex optimization problems. This efficiency highlights SCA’s practicality in managing the complex resource allocation challenges in wireless communication systems. )
IV-B2 Block Coordinate Descent Approach
To enhance the performance of NGMA systems, available wireless resources such as beamforming policy, subcarrier assignment, and other components in the systems should be jointly designed. Yet, this inevitably leads to the coupling between various optimization variables, which brings new a challenge for the design of NGMA systems. To circumvent this challenge, the BCD approach has been proposed in the literature [bezdek2002some]. The fundamental idea of the BCD approach is to divide the feasible set into several disjoint subsets and solve the corresponding subproblems in an alternating manner. Next, we take the optimization problem in (III-B1) as an example to show how the BCD approach works. In particular, we focus on the following optimization problem
(66) |
where is given by (25). In the above optimization problem, the beamforming vectors , IRS phase shift pattern , and SIC decoding order are coupled with each other. As a result, we employ the BCD approach and partition optimization variables into three blocks, i.e., , , and . Accordingly, the optimization problem in (III-B1) is decomposed into three subproblems as follows
Subproblem 1: | (67) | ||||
Subproblem 2: | (68) | ||||
Subproblem 3: | (69) | ||||
Subsequently, in each iteration of the BCD approach, one subproblem is tackled with the other two blocks fixed. In case the subproblems are still non-convex, other optimization approaches such as SCA or SDR will be used. It has been shown in [bezdek2002some] that the BCD approach is guaranteed to converge to a stationary point in a finite number of iterations (IV-B2), if all subproblems are convex with respect to the corresponding optimization variables. However, since the BCD approach overcomes the variable coupling by simply discarding the joint optimality of the original optimization problem, it can yield a range of outcomes: from globally optimal solutions to locally optimal solutions or even saddle points. Furthermore, the BCD method’s effectiveness is heavily influenced by the choice of the initial point and the sequence in which the blocks are optimized. As a result, the BCD approach may result in poor performance for practical NGMA systems. On the other hand, as the BCD approach tackles each subproblem with a subset of the original feasible space, it usually requires significantly fewer computational resources compared to that for solving the original optimization problem, which facilitates the real-time design of practical NGMA systems. In Fig. 6, we consider a toy example where a non-convex maximization problem involving two coupled optimization variables is solved by employing the BCD approach. As can be observed from the figure, for different initial points and different orders of the blocks, the BCD algorithm may converge to saddle point, locally optimal solution, or globally optimal solution [AA, BB].
IV-C Machine Learning Approach
Recent advances in machine learning have provided a new solution to general optimization problems. Conventional mathematical-based optimization may result in poor complexity scaling with respect to the size of the solution set. Therefore, it may prevent the direct application of conventional optimization tools in large-scale networks. In contrast, machine learning-based optimizations do not rely on explicit analytical models and therefore can provide a much better complexity scaling. In fact, machine learning has already shown promising performance in NGMA systems in various aspects [Guan2018DL, Kowshik2023DL, Huang2020DL], including resource allocation design. For instance, in [Huang2020DL], an effective communication deep neural network was proposed which consists of several convolutional layers and multiple hidden layers. Relying on the training algorithms, the proposed neural network is able to address the power allocation problem over challenging channel conditions with extremely complex spatial stricture limitations. A hot-booting Q-learning-based power allocation for downlink NOMA was presented in [Liang2018reinforcement], which does not rely on the explicit representation of the jamming and channel parameters. Furthermore, better performance can be observed using the proposed scheme in comparison to the standard Q-learning-based strategy. The above two examples have underscored the effectiveness of machine learning in resource allocations for natural channels. In fact, machine learning-based optimizations can also be applied to the resource allocation for reconfigurable channels and functional channels. In [Minghui2023DL], a deep learning-based RSMA scheme was proposed for RIS-assisted Tera-Hertz (THz) massive MIMO transmissions. Specifically, the proposed scheme consists of passive precoding at the RIS, analog active precoding, and RSMA digital active precoding at the BS. Furthermore, a CSI acquisition network was also devised to acquire accurate CSI. The proposed scheme enables a higher spectral efficiency compared to the conventional designs with lower signaling overhead. A predictive beamforming aided ISAC transmission with presented in [chang2022learning], where a versatile unsupervised deep learning network was devised. Specifically, the network was realized by a long short-term memory (LSTM) network with historically estimated channels as inputs. Furthermore, the resource allocation problem was formulated with the aim to maximize the system sum rate while making sure the Cramér–Rao lower bound (CRLB) is smaller than a threshold, which is solved by the deep learning network. Numerical results were presented and shown to approach the genie-aided upper bound.
Other than directly applying machine learning to design the resource allocation strategy, machine learning can also be applied as a tool to solve the optimization problem for resource allocation. An example of such design is the neural optimization machine (NOM) [Chen2022NOM], which leverages the neural network as a surrogate model and optimizes it with and without constraints. Compared to conventional optimization techniques, NOM can be applied to general objective functions, e.g., linear and quadratic programming. Furthermore, NOM is flexible, where arbitrary neural network architectures and activation functions can be adopted. More importantly, NOM can find multiple local minima, whose computational cost does not increase significantly with the dimension of the design variables. These appealing features make NOM a promising tool for solving optimization problems formulated for resource allocation. The application of NOM in NGMA is still at its early stage, which is an interesting direction for future research.
Pros and cons? The required of frequency training? The training of tunnable parameters, etc.?
V Simulations and Discussions
In this section, we present some simulation results of the introduced resource allocation design approaches and discuss the insights.
In this section, we evaluate the performance of resource allocation design for an IRS-assisted NOMA system in (III-B1). In particular, the BS is equipped with antennas to serve a sector of a cell with a radius of m. There are single-antenna users randomly and uniformly distributed in the sector. To assist in the information transmission, a passive IRS is deployed away from the BS, cf. Fig. 7. The IRS is composed of phase shift elements. From a practical perspective, we assume that the IRS elements employ 2-bit phase shifters, i.e., the discrete phase shift values are from the set . All channels in the considered system are assumed to be Rician distributed with the path loss exponent of and the Rician factor of . The noise variances of all users are set to dBm. We focus on solving the optimization problem in (III-B1). In particular, we propose a two-layer optimization algorithm to obtain the globally optimal of the considered problem. In the inner layer, for a given decoding order, we solve (III-B1) for the maximization of the system sum rate. In this case, the corresponding optimization problem in (III-B1) is a mixed integer programming problem and is solved optimally by employing the BnB algorithm. In the outer layer, since there are users, the total number of the corresponding decoding order combinations is . As such, we check the objective function value for each decoding order and select the one with the maximum objective function value among all decoding orders. Due to the exponentially high complexity of the proposed optimal scheme, we also develop a low-complexity suboptimal scheme capitalizing on alternating optimization, big-M [XX], and SCA methods.
For comparison, we also consider three baseline schemes. For baseline scheme 1, we randomly select an SIC decoding order from the set and jointly optimize the beamforming vectors at the BS and the phase shift matrix at the IRS. For baseline scheme 2, we randomly generate the phase shift matrix at the IRS and jointly optimize the beamforming vectors and the SIC decoding order. For baseline scheme 3, we assume that there is no IRS deployed in the considered system and jointly optimize beamforming vectors and the SIC decoding order.
Fig. 8 illustrates the average system sum rate (bits/s/Hz) versus the maximum transmit power of the BS (dBm). The figure shows that both the proposed and baseline schemes exhibit a consistent increase in the average system sum rate with an increase in the maximum transmit power budget. This phenomenon can be attributed to the proposed optimization framework, which effectively enhances the SINRs of users by providing them with additional transmit power. This leads to a significant improvement in the overall system sum rate. Moreover, the figure also highlights that the proposed optimal scheme outperforms the suboptimal scheme. This is because the optimal scheme jointly optimizes all available wireless resources, thereby achieving better results. However, both the optimal and suboptimal schemes exhibit a remarkable sum rate gain compared to the three baseline schemes. This can be attributed to the fact that the three baseline schemes employ simple implementation methods, which often come at the cost of performance. Therefore, the results clearly confirm the effectiveness of the proposed optimal and suboptimal optimization algorithms. Overall, the figure provides valuable insights into the performance of different wireless resource allocation schemes and highlights the importance of optimizing all available resources for achieving optimal system performance.
Can we have a section of future research direction?
VI Conclusions
This article provided an overview of system models, problem formulations, and potential optimization approaches for resource allocation design of NGMA in three types of channels, i.e., natural channels, reconfigurable channels, and functional channels. For each type of channel, we proposed a unified framework for NGMA by formulating the essential input-output relationship, emphasizing the system resources and design DoF, and highlighting the key performance metrics for resource allocation design. Diverse NGMA system models applicable to these three channels were methodically discussed, including OFDMA, NOMA, RSMA, DDMA, IRS-assisted NGMA, UAV-assisted NGMA, M/FA-enabled NGMA, NGMA-based ISAC, and NGMA-enabled JCAC. Even for a given channel type and NGMA scheme, diverse resource allocation designs can be formulated according to the available system information (perfect or imperfect CSI), QoS requirements, and design goals. To cover more resource allocation designs, we formulated different types of resource allocation design problems for different NGMA system models, which are mainly categorized as rate-oriented, power-oriented, and reliability-oriented designs. Corresponding optimization tools for solving the formulated resource allocation design problems were presented, including both the global optimization approaches and low-complexity suboptimal approaches. The machine learning approaches for resource allocation design were briefly discussed. A simulation example of resource allocation design for IRS-assisted NOMA systems was provided and discussed, which highlights the importance of resource allocation designs for improving system performance. We believe that resource allocation design will continuously play the most important role in multiple access in future wireless cellular networks. Emerging technologies would pose new challenges and interesting research topics for resource allocation design, which deserves continuous research efforts invested in this area. We hope this article provides a starter pack for junior researchers studying resource allocation design for NGMA and can stimulate more interesting problems and directions in this prosperous research area.