ICTC 2014-Invited 1570024033

Buffer-Aided Two-Way Relaying with Lattice Codes Hyun Jong Yang, uByeong Su Lee , uBang Chul Jung

n

School of Electrical and Computer Eng., UNIST, Korea Dept. of Information and Communication Eng., Gyeongsang National Univ., Korea [email protected], [email protected], [email protected] n

u

lattice codes as channel codes [5]. [6]. This is referred to as CF TWR.

Abstract—The achievable sum-rate of the two-way relaying becomes far below the cut-set outer bound if the signal-tonoise-ratio (SNR) from one node to the relay is significantly different from the SNR from the other node to the relay, and particularly so for decode-and-forward or compute-and-forward type relaying. In this paper, we propose a buffer-aided compute-and-forward two-way relaying with lattice codes to improve the sum-rate in asymmetric SNR two-way relay channels (TWRCs). Specifically, the relay can store some amount of data received in the multiple access phase before forwarding it, thereby controlling the amount of data to be transmitted to each direction in the broadcast phase. Simulation results show that the sum-rate can be improved with the use of buffers compared to the conventional two-way relaying without buffers. Keywords— buffer-aided two-way network coding, lattice codes

I.

relaying,

One major drawback of all the conventional DF and CF TWR schemes is that the achievable rate is bounded by the minimum of the rates of the two hops, i.e., the rates from a node to the relay and from the relay to the other node [3], [5]. This is in fact, a fundamental limit of DF- and CF-type relaying techniques. Recently, it was shown that controlling the duration of the MA and BC phases adaptively can increase the achievable sum-rate by resolving the aforementioned fundamental limit [8]. [9]. Specifically, for three-phase relaying, where the two communication nodes transmit to the relay in the first and second phases, respectively, and where the relay broadcasts the signal in the third phase, it was shown that the optimization of the duration of each phase can increase the achievable sum-rate [8]. Since buffering is needed for any node to keep receiving for a certain duration of time, the scheme is referred to as a buffer-aided TWR. Note however that the capacity of the threephase relaying is 50% lower than the capacity of the two-phase TWR. In [9], the authors extended the same idea to a scheme in which all of two- and three-phase TWR and one-way relaying can be used accordingly. However, only DF TWR was considered, and hence, the scheme is subject to low sum-rates in high SNR regime due to the halved DoF.

physical-layer

INTRODUCTION

Two-way relaying (TWR) is expected to double the spectral efficiency of one-way relaying by employing a bidirectional relay [1-4]. In the multiple-access (MA) phase, the two communication nodes transmit their signals to the relay simultaneously, and the relay receives the added signal and reconstructs the relay transmit signal. In the broadcast (BC) phase, the relay transmits this transmit signal to the two communication nodes, and they retrieve their respective desired signals using the side information that they already have.

In this paper, we propose a CF-type buffer-aided TWR scheme with the use of nested lattice codes. Specifically, each communication node uses lattice codes which are designed according to the channel gains of the MA phase, and the relay performs lattice decoding. We allow the relay to keep receiving for a certain duration, and then the relay keep transmitting all the symbols that it has received. In other words, the durations of the MA and BC phases are controlled with the aid of buffers at the relay. Simulation results show that the achievable sumrate can be more improved as the size of the buffer increases, thereby showing the trade-off between the buffer size and achievable sum-rate.

According to the operation performed at the relay, TWR can be classified into three types [5]: 1) amplify-and-forward (AF), 2) decode-and-forward (DF), and 3) compute-andforward (CF). Though AF TWR has the benefit of ease of implementation, it suffers from noise propagation at the relay, which results in significant performance degradation in the case where the signal-to-noise-ratios (SNRs) of the channels in the MA phase are relatively low [7]. In DF TWR, the two symbols transmitted by the two communication nodes are individually decoded at the relay, and hence the achievable rate in the MA phase is bounded by the capacity of the MA channel; thus, the degrees-of-freedom (DoF) of DF TWR is half of the DoF of the cut-set outer capacity bound or even that of the AF TWR. It has been known that the cut-set capacity outer bound can be asymptotically achieved using the nested

The remainder of this paper is organized as follows. Section II describes the system model, and Section III presents the proposed buffer-aided relaying scheme. Section IV provides numerical simulation results, and Section V concludes the paper. II. SYSTEM MODEL The TWR system composed of two source nodes, denoted by ‘S1’ and ‘S2’, and a relay, denoted by ‘R’, as shown in Fig. 1. Time-division multiplexing (TDD) is assumed. The channel

This work was supported by the ICT R&D program of MSIP/IITP. [14000-04-001, Development of 5G Mobile Communication Technologies for Hyper-connected smart services]

978-1-4799-6786-5/14/$31.00 ©2014 IEEE

500

1

ICTC 2014

coefficient from S1 (S2) to the relay at the i-th time slot is denoted by

(i ) 1R (

h

(i ) 2 R ),

h

After the first B time slots, the relay store these decoded symbols.

and the channel from the relay to S1 (i )

(i)

(S2) at the i-th time slot is denoted by hR1 ( hR 2 ). Each channel coefficient is assumed to be static for the duration of each time slot and change at every time slot, i.e., block fading. S1 and S2 transmit for the first B time slots, i.e., the MA phase, and the relay transmits in the next B time slots. That is, the buffer size is denoted by B.

B. Broadcast phase In the next B time slots, the relay broadcasts signals to S1 and S2. From the sequence of the decoded symbols,

xR(i ) , i = 1,K B , the relay reconstructs B transmit signals as

(s

(1) R

,..., sR( B) ) = f ( xR(1) ,..., xR( B) ),

(6)

where f denotes the encoding function. Then, the received signal at S1 and S2 at the j-th time slot of the BC phase, i.e., (B+j)-th time slot from the start, is given by

y1( j ) = hR( 1j ) sR( j ) + z1( j )

( j)

where z1

Figure 1. Buffer-aided two-way relaying

, z2( j )

(7) y2( j ) = hR( j2) sR( j ) + z2( j ) , ~ CN(0, N 0 ) denote the AWGN at S1 and

S2, respectively, in the j-th time slot of the BC phase. From B received signals, S1 obtains

f −1 ( y1(1) ,..., y1( B) ) = ( xR(1) ,..., xR( B) ) ,

PROPOSED BUFFER-AIDED TWO-WAY RELAYING

III.

where

A. Multiple-access phase The received signal at the i-th time slot, written by

i = 1,K , B ,

yR(i ) = h1(Ri ) s1(i) + h2(iR) s2(i ) + z R(i ) ,

where

is

knows

where

s2(i) =

x2(i ) , h2(iR)

generality, the lattices

Λ1 ⊂ Λ 2

Λ1 and Λ 2

without loss of

are constructed such that

In addition, it is known that the achievable rates in the BC phase is obtained by the typical calculation of log(1 + SNR) , where SNR denotes the signal-to-noise-ratio of the corresponding channel. Therefore, the average achievable sum-rate for the proposed buffer-aided TWR is given by

and 2

2

s1(i) ≤ 1, s2(i) ≤ 1,

(3)

i.e., the unit-transmit power is assumed. Consequently, the received signal is written by

yR(i ) = x1(i) + x2(i ) + z R(i ) .

The relay performs lattice decoding to the received signal and obtains the signal to be transmitted in the BC phase as

xR(i ) = ⎡⎣ x1(i ) + x2(i ) ⎤⎦

Λ1

.

x , i = 1,K B , it can get the desired symbols as

2 2 ⎛ h1(Ri ) h1(Ri ) ⎞ ⎟ + Rate (S1 → R)= log ⎜ ⎜ h(i ) 2 + h(i ) 2 N0 ⎟ 2R ⎝ 1R ⎠ 2 2 i i ( ) ( ) ⎛ h2 R h2 R ⎞ ⎟ . (10) + Rate (S2 → R)= log ⎜ ⎜ h(i ) 2 + h(i ) 2 N0 ⎟ 2R ⎝ 1R ⎠

(2)

x1( i ) and x2( i ) are codewords chosen from the lattices

Λ1 and Λ 2 . Here, assuming h1(Ri ) ≥ h2(iR)

denotes the decoding function. Since S1 already

(i ) 1

C. Achievable sum-rate For nested lattice codes-aided signaling, it is known that the achievable rate in the i-th time slot of the MA phase is given by [5]

white Gaussian noise (AWGN) at the relay in the i-th time slot. Following the same footsteps of the code construction in [5], the transmit signals are obtained using nested lattice codes as

x1(i ) , h1(Ri )

(8)

S2 does the analogous operation to get x1( i ) , i = 1,..., B .

zR(i ) ~ CN(0, N 0 ) denotes the additive

s1(i) =

f

−1

⎡⎣ xR(i ) − x1(i ) ⎤⎦ = ⎡ ⎡⎣ x1(i ) + x2( i ) ⎤⎦ − x1( i ) ⎤ = x2( i ) . (9) ⎢⎣ Λ1 Λ1 ⎦⎥ Λ1

(1)

s1( i ) and s2( i ) denote the transmit signal at S1 and S2,

respectively, and

xR(i ) , i = 1,K B as

(4)

yR(i ) , (5)

501

2

C=

V.

2B ⎧ B ⎫ 1 min ⎨∑ C1(Ri ) , ∑ CR( j2) ⎬ B j = B +1 ⎩ i =1 ⎭ 2B ⎧ B ⎫ 1 + min ⎨∑ C2(iR) , ∑ CR( 1j ) ⎬ B j =1+ B ⎩ i =1 ⎭

where

(i ) 1R

C

C2(iR)

We have proposed compute-and-forward two-way relaying with buffers at the relay, where the relay keeps receiving for the first B time slots and keeps transmitting for the next B time slots. With the use of buffers, the average achievable rate of each communication path approaches to the ensemble average of log(1+SNR), and hence the ensemble achievable sum-rate becomes robust to a low achievable rate of any communication link at any time slot. Through simulation results, we have shown that the achievable sum-rate is improved compared to the case without buffers.

(11)

2 2 ⎛ h1(Ri ) h1(Ri ) ⎞ ⎟ , = log ⎜ + ⎜ h(i ) 2 + h(i ) 2 N0 ⎟ 2R ⎝ 1R ⎠ ( j ) 2 ⎞ ⎛ hR 2 ⎟ , CR( j2) = log ⎜1 + ⎜ N0 ⎟ ⎝ ⎠ 2 2 i ( ) ⎛ h2 R h2(iR) ⎞ ⎜ ⎟ , = log + ⎜ h(i ) 2 + h(i ) 2 N0 ⎟ 2R ⎝ 1R ⎠

C

( j) R1

2 ⎛ hR( 1j ) ⎞ ⎟ . = log ⎜1 + ⎜ N0 ⎟ ⎝ ⎠

(12)

Remark 1. Note that since the relay receives during B time slots, the amount of information received from S1 or S2 is cumulated as shown in (11). As B increases the average sumrate approaches to

lim B →∞ C = min {E {C1R } , E {CR 2 }}

+ min {E {C2 R } , E {CR1}} where the

,

Figure 2. SNR vs. achievable sum-rate for different B values 'REFERENCES

(13)

[1]

E {C1R }, E {CR 2 } E {C2 R } , E {CR1} denote the

[2]

ensemble averages on the corresponding achievable rates. IV.

CONCLUSION

[3]

NUMERICAL RESULTS

The achievable sum-rate of the proposed buffer-aided TWR is evaluated from numerical simulations. Figure 2 shows the achievable sum-rate of the proposed schemes with different buffer sizes. For comparison, the sum-rate of the conventional CF TWR with lattice codes but without buffers is also plotted. It is obvious that using buffers improves the achievable sumrate by alleviating the dependency of the achievable rate in each time slot. That is, without buffers, full achievable rate of the four communication links cannot be obtained, because the rate is bounded by the minimum values of the two hops. However, with buffers, the achievable rate of each communication link is averaged over time, and hence full achievable rate is nearly achieved as the buffer size increases. As seen from the figure, the achievable sum-rate is saturated as the buffer size increase, since the sum-rate converges to that in (13).

[4] [5] [6]

[7]

[8] [9]

502

3

H. J. Yang, K. Lee, and J. Chun, "Zero-forcing based two-phase relaying," in Proc. IEEE Int. Conf. Commun., Glasgow, Scotland, June 2007, pp. 5224-5228. S. Zhang, S.-C. Liew, and P. P. Lam, “Hot topic: Physical-layer network coding,” in Proc. ACM MobiCom, Sep. 2006, pp. 358-365. B. Rankov and A. Wittneben, “Spectral efficient protocols for halfduplex fading relay channels”, IEEE J. Sel. Areas Commun., vol. 25, no. 2, pp. 379- 389, Feb. 2007. P. Popovski and H. Yomo, “Physical network coding in two-way wireless relay channels,” in Proc. IEEE Int. Conf. Commun., Jun. 2007, pp. 707-712. H. J. Yang, J. Chun, and A. Paulraj, “Asymptotic capacity of the separated MIMO two-way relay channel,” IEEE Transactions on Information Theory, vol. 57, no. 11, pp. 7542-7554, Nov. 2011. H. J. Yang, Y. C. Choi, N. Lee, and A. Paulraj, “Achievable sum-rate of the MU MIMO two-way relay channel in cellular systems: lattice codeaided linear precoding,” IEEE Journals on Selected Areas in Communications, vol. 30, no. 8, p. 1304 – 1318, Sept. 2012. N. Lee, H. J. Yang, and J. Chun, “Achievable sum-rate maximizing AF relay beamforming scheme in two-way relay channels,” in Proc. Proc. IEEE Int. Conf. Commun. Workshop ’08, Beijing, China, May 2008, pp. 300-306. H. Liu and P. Popovski, “Sum-rate optimization in a two-way relay network with buffering,” IEEE Communications Letters, vol. 17, no. 1, Jan. 2013. V. Jamali, N. Zlatanov, A. Ikhelf, and R. Schober, “Adaptive mode selection and power allocation in bidirectional buffer-aided relay networks,” [Onlin] avaliable at http://arxiv.org/abs/1304.7971v2.

Buffer-Aided Two-Way Relaying with Lattice Codes - IEEE Xplore

relaying with lattice codes to improve the sum-rate in asymmetric SNR two-way relay channels (TWRCs). Specifically, the relay can store some amount of data.

657KB Sizes 1 Downloads 285 Views

Recommend Documents

Providing Secrecy with Lattice Codes - IEEE Xplore
Wireless Communications and Networking Laboratory. Electrical Engineering Department. The Pennsylvania State University, University Park, PA 16802.

Fountain codes - IEEE Xplore
7 Richardson, T., Shokrollahi, M.A., and Urbanke, R.: 'Design of capacity-approaching irregular low-density parity check codes', IEEE. Trans. Inf. Theory, 2001 ...

Optimizing Binary Fisher Codes for Visual Search - IEEE Xplore
The Institute of Digital Media, Peking University, Beijing, China. {zhew,lingyu,linjie,cjie,tjhuang,wgao}@pku.edu.cn. Fisher vectors (FV), a global representation obtained by aggregating local invari- ant features (e.g., SIFT), generates the state-of

Generalized quasi-cyclic low-density parity-check codes ... - IEEE Xplore
Email: {sd07501,hmatsui,smita}@toyota-ti.ac.jp. Abstract—In this study, we proved that several promising classes of codes based on finite geometries cannot be ...

Distributed Average Consensus With Dithered ... - IEEE Xplore
computation of averages of the node data over networks with band- width/power constraints or large volumes of data. Distributed averaging algorithms fail to ...

overlapped quasi-arithmetic codes for distributed video ... - IEEE Xplore
The presence of correlated side information at the decoder is used to remove this ... Index Terms— Distributed video coding, Wyner-Ziv coding, coding with side ...

Delay-Optimal Burst Erasure Codes for Parallel Links - IEEE Xplore
Cisco Systems, 170 West Tasman Drive, San Jose, CA 95134, USA. Email: ∗{leeoz ... implications on the code design – erasure burst and link outage.

performance of random fingerprinting codes under ... - IEEE Xplore
University of Illinois at Urbana-Champaign, USA. ABSTRACT. This paper analyzes the performance of arbitrary nonlinear collu- sion attacks on random fingerprinting codes. We derive the error exponent of the fingerprinting system, which determines the

A Survey on Network Codes for Distributed Storage - IEEE Xplore
ABSTRACT | Distributed storage systems often introduce redundancy to increase reliability. When coding is used, the repair problem arises: if a node storing ...

Performance of Orthogonal Fingerprinting Codes Under ... - IEEE Xplore
Abstract—We study the effect of the noise distribution on the error probability of the detection test when a class of randomly ro- tated spherical fingerprints is used. The detection test is performed by a focused correlation detector, and the sphe

IEEE Photonics Technology - IEEE Xplore
Abstract—Due to the high beam divergence of standard laser diodes (LDs), these are not suitable for wavelength-selective feed- back without extra optical ...

wright layout - IEEE Xplore
tive specifications for voice over asynchronous transfer mode (VoATM) [2], voice over IP. (VoIP), and voice over frame relay (VoFR) [3]. Much has been written ...

Device Ensembles - IEEE Xplore
Dec 2, 2004 - time, the computer and consumer electronics indus- tries are defining ... tered on data synchronization between desktops and personal digital ...

wright layout - IEEE Xplore
ACCEPTED FROM OPEN CALL. INTRODUCTION. Two trends motivate this article: first, the growth of telecommunications industry interest in the implementation ...

Investigating Sensor Networks with Concurrent ... - IEEE Xplore
The background behind this demonstration is described as an one-page poster submission. The goal is to show a flow of tools for quick sensor network modeling, from an high level abstraction down to a system validation, including random network genera

Trellis-Coded Modulation with Multidimensional ... - IEEE Xplore
constellation, easier tolerance to phase ambiguities, and a better trade-off between complexity and coding gain. A number of such schemes are presented and ...

Evolutionary Computation, IEEE Transactions on - IEEE Xplore
search strategy to a great number of habitats and prey distributions. We propose to synthesize a similar search strategy for the massively multimodal problems of ...

Compressive Sensing With Chaotic Sequence - IEEE Xplore
Index Terms—Chaos, compressive sensing, logistic map. I. INTRODUCTION ... attributes of a signal using very few measurements: for any. -dimensional signal ...

I iJl! - IEEE Xplore
Email: [email protected]. Abstract: A ... consumptions are 8.3mA and 1.lmA for WCDMA mode .... 8.3mA from a 1.5V supply under WCDMA mode and.

Gigabit DSL - IEEE Xplore
(DSL) technology based on MIMO transmission methods finds that symmetric data rates of more than 1 Gbps are achievable over four twisted pairs (category 3) ...

IEEE CIS Social Media - IEEE Xplore
Feb 2, 2012 - interact (e.g., talk with microphones/ headsets, listen to presentations, ask questions, etc.) with other avatars virtu- ally located in the same ...

Grammatical evolution - Evolutionary Computation, IEEE ... - IEEE Xplore
definition are used in a genotype-to-phenotype mapping process to a program. ... evolutionary process on the actual programs, but rather on vari- able-length ...

SITAR - IEEE Xplore
SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services. ∗. Feiyi Wang, Frank Jou. Advanced Network Research Group. MCNC. Research Triangle Park, NC. Email: {fwang2,jou}@mcnc.org. Fengmin Gong. Intrusion Detection Technology Divi

striegel layout - IEEE Xplore
tant events can occur: group dynamics, network dynamics ... network topology due to link/node failures/addi- ... article we examine various issues and solutions.