Skip to main content
Top
Published in: EURASIP Journal on Wireless Communications and Networking 1/2011

Open Access 01-12-2011 | Research Article

Full Rate Network Coding via Nesting Modulation Constellations

Authors: Suhua Tang, Hiroyuki Yomo, Tetsuro Ueda, Ryu Miura, Sadao Obana

Published in: EURASIP Journal on Wireless Communications and Networking | Issue 1/2011

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Network coding is an effective method to improving relay efficiency, by reducing the number of transmissions required to deliver data from source(s) to destination(s). However, its performance may be greatly degraded by rate mismatch, which is seldom touched in previous works and remains a challenge. In this paper, we reinterpret network coding as a mapping of modulation constellation. On this basis, we extend the mapping to support full rate network coding (FRNC), enabling simultaneous use of different modulations by nesting the low level constellation as a subset of the high level constellation. When relay links have different qualities, the messages of different flows are combined via network coding in such a way that for each relay link, its desired message is transmitted at its own highest rate. The limit in constellation size is also addressed. Compared with the state-of-the-art solutions to rate mismatch, the proposed scheme achieves the full rate of all relay links on the broadcast channel.

1. Introduction

Wireless communications suffer greatly from multipath fading where outages may degrade communication quality. Different schemes, such as adaptive modulation and coding and relay [1], have been exploited to mitigate this problem. The relay efficiency can be improved via network coding (NC) [2] if the traffic pattern and the a priori information are exploited. Typical transmission patterns suitable for applying NC include two-way relay [35], multihop forwarding [6], multiple access channel [7], multicast channel, and so forth. In addition, joint network and channel coding can further improve spectral efficiency [7, 8].
A two-way relay transmission typically consists of two stages: multiple access stage and broadcast stage. NC is applied in the second stage and has two types. The first type of NC is performed in the bit level [3]. Each node transmits its packet to the relay node successively. The relay node decodes each packet and combines them together via NC and forwards the coded packet later. The second type of NC is performed in the signal level. Typically two nodes transmit simultaneously their packets. The relay node regards the superposed signal as a NC signal and forwards it. Each node recovers its desired signal from the NC signal with interference cancelation [4]. The NC signal is further refined in [5] by taking modulation constellations into account.
The performance of NC, especially bit level NC, is limited by several factors such as packet length mismatch (the short packets are zero padded), traffic rate mismatch (some packets cannot be network-coded due to lack of pairing packets) and transmit rate mismatch. The last factor is neglected in most previous works. In the two-way relay scenarios, the rate mismatch may be formed due to two factors. One is the relay position (which leads to relatively stable differences in link qualities) and the other is fading. Even though the relay lies exactly in the middle of two nodes, the two relay links may have different instantaneous qualities. Since the network-coded packet is intended to be received by both nodes, the minimal rate is chosen for the NC transmission [3]. In this way, the transmission at a low rate on the link supporting a high rate wastes channel bandwidth.
When NC is applied to multiple flows, the effect of rate mismatch becomes more obvious, since the minimal rate over more links only gets lower. One solution to this problem is to exploit opportunistic scheduling. Instead of transmitting network-coded packets to all potential nodes, only some of them are selected by taking the tradeoff between the number of links and the actual rate [9]. This opportunistic scheduling, however, cannot exploit the full power of NC.
Recently, some initial efforts were made to fully exploit rate adaptations in NC. Multiplicative NC was proposed in [10] to better adapt code and modulation rates to different links. However, it only applies to constant modulus signals. Unconventional 5-ary modulation was introduced to work together with QPSK in [11]. This makes modulation complex and is difficult to extend to other modulations. Compress and forward was studied in [12], with the assumption that the relay is much closer to the sink than nodes and has a much higher rate. Its application is limited to multiple access up-link. XOR-based NC and physical layer superposition coding were combined together to better exploit rate adaptation in [13], however, at the cost of significant power loss. Moreover, its performance is degraded and approaches that of NC when relay links have similar quality. Despite all these efforts, there is still no complete solution to the rate mismatch problem.
In this paper, we focus on the bit level NC and propose to achieve full rate network-coding (FRNC) on the broadcast channel via nesting modulation constellations. With a cross-layer design, we exploit physical layer method as well. The principle of dirty paper coding [14] indicates that a signal known at the receiver is not interference at all and with suitable coding the full capacity is achievable. As an analogy for NC, when the a priori information is available, NC should also achieve the highest rate over each link, in other words, achieve the full rate on the broadcast channel. This is our starting point. The basic idea is as follows: (i) at the relay node, in order to combine packets together and transmit them over links supporting different rates (modulations), the low level constellation points are nested in the high level constellation. In other words, a subset of the high level constellation is used as the low level constellation, and this subset depends on the design of NC. (ii) At the receiver side, nodes merely supporting low level modulation first find their constellation according to the a priori information and then perform demodulation and decoding. In this way, the highest rate of each link is used and the sum rate is achieved over the broadcast channel. We further study the effect of the limit in constellation size and suggest combining FRNC with superposition coding (SC). Both the analysis and simulation evaluation show that FRNC with SC is significantly superior to the state-of-the-art solutions to the rate mismatch problem.
The rest of the paper is organized as follows: the relay model is presented in Section 2 and the reinterpretation of NC as constellation mapping is addressed in Section 3. In Section 4, the detailed procedures for achieving full rate in network-coded transmissions are described. The performance of different schemes is analyzed in the two-way relay scenario in Section 5 and the related simulation evaluation is presented in Section 6. Finally, we conclude the paper with Section 7.

2. System Model

We consider a network with https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq1_HTML.gif nodes https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq2_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq3_HTML.gif , and 1 relay https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq4_HTML.gif . For the simplicity of description, we assume that all nodes and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq5_HTML.gif are synchronized and the transmissions are done in terms of TDMA (it is possible to extend the proposed scheme to other channel access methods such as CSMA.) There are https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq6_HTML.gif flows. The https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq7_HTML.gif th flow from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq8_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq9_HTML.gif goes through the two-hop path https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq10_HTML.gif - https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq11_HTML.gif - https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq12_HTML.gif and the actual transfer of packets is via the relay https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq13_HTML.gif . The packet transfer is divided into two stages: (a) multiple access stage where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq14_HTML.gif collects packets from all nodes. Each node https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq15_HTML.gif sends packet https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq16_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq17_HTML.gif in the https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq18_HTML.gif th slot, using its optimal rate (modulation and coding). After the data transmission, each node reports its receiving status of packets to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq19_HTML.gif , in a similar way as the COPE scheme [15]. Based on such a feedback, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq20_HTML.gif makes the NC scheduling, selecting a subset of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq21_HTML.gif nodes, each of which knows all packets involved in the NC except its own desired packet. Without loss of generality, in the following, we assume https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq22_HTML.gif equals https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq23_HTML.gif . Then after https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq24_HTML.gif slots, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq25_HTML.gif knows https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq26_HTML.gif . (b) Broadcast stage where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq27_HTML.gif forwards packets to all nodes. https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq28_HTML.gif transmits https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq29_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq30_HTML.gif represents the bitwise exclusive or (XOR) operation) to all nodes, and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq31_HTML.gif recovers https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq32_HTML.gif by https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq33_HTML.gif . Hence, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq34_HTML.gif packets are exchanged in https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq35_HTML.gif +1 slots. A typical example for the model is the local area wireless networks where nodes exchange packets via their associated access point ( https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq36_HTML.gif in the model). A special case is https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq37_HTML.gif , corresponding to the two-way relay in Figure 1. In this special case, each node uses its transmitted packet as the a priori information and the feedback of receiving status of packets is unnecessary.
Over each link, the rate can be adjusted by modulation and coding. With coding rate https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq38_HTML.gif and modulation level https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq39_HTML.gif (constellation size = https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq40_HTML.gif ), on average https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq41_HTML.gif bits can be transmitted by each symbol. Generally, the modulation level determines a rate range, within which the coding scheme further fine adjusts the rate. Different modulation levels have constellations with different sizes. But these constellations all have the same normalized energy.
In the above model, NC is used at the second stage. We focus on this stage and exploit joint design of modulation and coding so that the highest rate of each link is realized in the NC transmission. We take the following assumptions: (i) https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq42_HTML.gif has collected enough data for each flow so that the zero-padding is unnecessary in the NC transmission, (ii) the a priori information required for network decoding is available at each node by recording the overheard packets, and (iii) the relay node knows the channel state information of all links. The key problem is how to realize full rate on all links simultaneously.

3. Reinterpretation of Network Coding

In conventional bit level NC schemes, bits from different flows are XORed together, channel coded, modulated, and then transmitted. The receiver just works in the reverse way to recover its information bits. Due to the linearity of both channel coding and NC, their order can be exchanged [16]. In this paper, the NC operation is done after channel coding.
Although the NC is performed in the bit level, it can be reinterpreted as a function of constellation mapping. This is explained by an example shown in Figure 2 using the typical QPSK constellation with gray codes. Assume https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq43_HTML.gif relays https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq44_HTML.gif ("01") from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq45_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq46_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq47_HTML.gif ("11") from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq48_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq49_HTML.gif , respectively. When relaying these bits, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq50_HTML.gif combines them together as "10" by XOR and transmits https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq51_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq52_HTML.gif already knows https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq53_HTML.gif ("11"). Exploiting this as the a priori information, for all possible bits of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq54_HTML.gif , the NC bits and corresponding signals can be computed locally at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq55_HTML.gif . These signals, when interpreted as the points for https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq56_HTML.gif , construct a new QPSK constellation https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq57_HTML.gif . This constellation has the same size as https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq58_HTML.gif but with a different layout due to NC. In this way, the NC function actually provides a mapping between constellations. Instead of a fixed constellation in conventional modulations, such a mapping depends on the a priori information and changes for each symbol. The reinterpretation of NC can be summarized as follows:
(i) https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq59_HTML.gif transmits https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq60_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq61_HTML.gif is the channel-coded packet of the https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq62_HTML.gif th flow, and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq63_HTML.gif involves NC (XOR in conventional NC) and modulation.
(ii)At the receiver side, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq64_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq65_HTML.gif in conventional NC) provides the constellation for demodulating https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq66_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq67_HTML.gif is the a priori information at the https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq68_HTML.gif th receiver.
In conventional NC schemes, the constellations for different flows have the same size and min-distance, and the latter is the main factor that decides the rate. This forces the relay node to transmit the XORed packet with the minimal rate of all links so that all nodes can correctly recover the XORed packet.
The above constellation mapping can be extended to support simultaneous use of modulations with different levels (size and min-distance). Specifically, we use constellation-compatible modulations and nest the low level constellation inside the high level constellation. For example, a subset of four 16 QAM constellation points can be used as the QPSK constellation so that over the broadcast channel QPSK is used for one link while 16 QAM is used for the other link in the two-way relay scenario. In other words, among the links supporting different modulations, the highest modulation level is always used as the container. Other low level modulations use a subset of the high level constellation as their constellations.

4. Full Rate Network Coding Protocol

In this section, we present the full rate network-coding (FRNC) protocol. First the basic idea is explained with a simple example. Then the idea is generalized. How to nest constellations, how to find the actual constellation under the NC operation, how to transmit at the relay, and how to receive at the nodes are successively described in detail.

4.1. An Example Revealing the Basic Idea

With the two-node ( https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq69_HTML.gif ) scenario in Figure 1, we show how to use different rates over different links in the network-coded transmission. Assume that (i) links between https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq70_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq71_HTML.gif / https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq72_HTML.gif support rates with https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq73_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq74_HTML.gif (QPSK), https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq75_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq76_HTML.gif (16 QAM), respectively. On average, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq77_HTML.gif can forward https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq78_HTML.gif bit/symbol to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq79_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq80_HTML.gif bit/symbol to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq81_HTML.gif . (ii) The slot length is https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq82_HTML.gif symbols. Then 2 bits to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq83_HTML.gif or 4 bits to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq84_HTML.gif can be transmitted in a single slot. (iii) The two bits from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq85_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq86_HTML.gif are https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq87_HTML.gif = "10" and 4 bits from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq88_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq89_HTML.gif are https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq90_HTML.gif = "1101".
The transmit procedure is shown in Figure 3. At https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq91_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq92_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq93_HTML.gif are channel-coded to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq94_HTML.gif = "1101" and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq95_HTML.gif = "11100010". The modulations for the two messages are QPSK and 16 QAM, respectively. To transmit the two messages together via NC, the QPSK constellation for https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq96_HTML.gif is nested in the 16 QAM constellation used for https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq97_HTML.gif . The nesting is realized by postcoding. In this example, by repetition codes with rate = 1/2, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq98_HTML.gif is encoded to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq99_HTML.gif = "11110011", with the same length as https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq100_HTML.gif = https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq101_HTML.gif = "11100010". The XORed sum of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq102_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq103_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq104_HTML.gif = "00010001". Then https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq105_HTML.gif is modulated with the 16 QAM constellation (using gray codes) shown in Figure 4, and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq106_HTML.gif transmits https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq107_HTML.gif .
The receive procedure is shown in Figure 5. At the https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq108_HTML.gif th node, the signal received from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq109_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq110_HTML.gif . For simplicity, noise and channel fading are ignored. In the same way as the relay performs channel coding and post-coding, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq111_HTML.gif = "11110011" is calculated from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq112_HTML.gif at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq113_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq114_HTML.gif = "11100010" is calculated from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq115_HTML.gif at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq116_HTML.gif , and are used as the a priori information in the network decoding stage.
Since https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq117_HTML.gif has the same modulation level as the one supported by the quality of link https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq118_HTML.gif , decoding at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq119_HTML.gif is the same as usual. At first, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq120_HTML.gif = "00010001" is demodulated from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq121_HTML.gif . With https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq122_HTML.gif = "11110011" as the a priori information, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq123_HTML.gif = https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq124_HTML.gif = "11100010" is obtained and then https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq125_HTML.gif = "1101" is channel decoded. https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq126_HTML.gif has a higher modulation level than the one supported by the quality of link https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq127_HTML.gif . Therefore, the decoding at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq128_HTML.gif is a little more complex. The QPSK constellation to be used at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq129_HTML.gif depends on the a priori information and has to be constructed from the 16 QAM constellation. With repetition codes used in the post-coding stage in this example, two bits https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq130_HTML.gif carried in a QPSK symbol are post-coded to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq131_HTML.gif , corresponding to a 16-QAM symbol. With https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq132_HTML.gif as the a priori information, varying https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq133_HTML.gif , the possible NC bits https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq134_HTML.gif and the corresponding signals can be computed. Table 1 shows the derived QPSK constellations for demodulating https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq135_HTML.gif , with the four a priori bits https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq136_HTML.gif as an index.
Table 1
Constellation conversion from 16 QAM to QPSK ( https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq137_HTML.gif represents the a priori info, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq138_HTML.gif are the info bits to be received).
a priori info https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq139_HTML.gif
QPSK constellation ( https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq140_HTML.gif )
0000
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq141_HTML.gif
0001
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq142_HTML.gif
0010
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq143_HTML.gif
0011
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq144_HTML.gif
0100
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq145_HTML.gif
0101
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq146_HTML.gif
0110
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq147_HTML.gif
0111
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq148_HTML.gif
1000
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq149_HTML.gif
1001
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq150_HTML.gif
1010
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq151_HTML.gif
1011
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq152_HTML.gif
1100
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq153_HTML.gif
1101
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq154_HTML.gif
1110
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq155_HTML.gif
1111
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq156_HTML.gif
At https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq157_HTML.gif , with https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq158_HTML.gif = "11100010" known a priori, for the first symbol in https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq159_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq160_HTML.gif = "1110", https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq161_HTML.gif is to be demodulated with the QPSK constellation https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq162_HTML.gif (refer to Table 1); for the second symbol in https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq163_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq164_HTML.gif = "0010", https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq165_HTML.gif is to be demodulated with the QPSK constellation https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq166_HTML.gif . Here, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq167_HTML.gif logically corresponds to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq168_HTML.gif . It is demodulated to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq169_HTML.gif = "1101" and converted to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq170_HTML.gif = "10" after channel decoding. In this way network decoding is realized by the constellation conversion.
A simple comparison on the broadcast channel, among decode-and-forward (DF), bit level NC with minimal rate, and FRNC, is summarized in Table 2. With DF, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq171_HTML.gif uses one symbol for each node and thus transmits 3 bits in total. With NC, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq172_HTML.gif transmits https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq173_HTML.gif = 4 bits. With FRNC, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq174_HTML.gif transmits https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq175_HTML.gif = 6 bits using two symbols.
Table 2
A comparison of the broadcast channel among three schemes, for the scenario shown in Figure 1.
scheme
rate
# transmitted bits
DF
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq176_HTML.gif
3
NC (min rate)
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq177_HTML.gif
4
FRNC (full rate)
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq178_HTML.gif
6
Although superposition coding handles links with different qualities as well, the proposed FRNC scheme is quite distinct from it. Constellation nesting fully exploits the power on each link by using the a priori information in times of decoding. As a comparison, superposition coding does not exploit the a priori information for decoding the desired signal. Instead, the total power is divided into two parts, most power for the base layer signal and little power for the secondary layer signal, which results in significant power loss in transmitting the secondary layer signal.
In the following sections, we extend the above idea to more general cases and study the related post-coding scheme and the decoding method.

4.2. Nesting Constellations

We first consider how to nest https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq179_HTML.gif -QAM (we focus on the constellations in the form of grid, extension to other forms of constellations is also possible.) in https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq180_HTML.gif -QAM ( https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq181_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq182_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq183_HTML.gif ). A simple way is to choose a subset of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq184_HTML.gif -QAM constellation points as the https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq185_HTML.gif -QAM constellation. We construct the https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq186_HTML.gif -QAM constellation by dividing https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq187_HTML.gif -QAM into subsets. Let the min-distance of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq188_HTML.gif -QAM be https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq189_HTML.gif . The points of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq190_HTML.gif -QAM with a distance https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq191_HTML.gif to their neighbors are grouped into the same subset. In this way, the https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq192_HTML.gif -QAM constellation is divided into https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq193_HTML.gif subsets, each of which having the same size https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq194_HTML.gif .
Choosing points for (non-QAM) BPSK requires one more step: after choosing a subset for QPSK from the QAM constellation, select two diagonal points from the QPSK constellation for BPSK.
A single point of the https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq195_HTML.gif -point constellation can only carry https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq196_HTML.gif information bits. But after nesting it inside the https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq197_HTML.gif -constellation, its bit vector is extended to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq198_HTML.gif bits. There should be a bit-mapping. The only subset, which contains the all-zero bit-vector, is used for bit mapping from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq199_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq200_HTML.gif .
Figure 4 shows an example of dividing 16 QAM to find QPSK constellations, where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq201_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq202_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq203_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq204_HTML.gif . The 16 QAM constellation is divided into four subsets: https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq205_HTML.gif = https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq206_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq207_HTML.gif = https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq208_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq209_HTML.gif = https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq210_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq211_HTML.gif = https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq212_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq213_HTML.gif   =   https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq214_HTML.gif is the constellation for 16 QAM. QPSK may use any https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq215_HTML.gif as its constellation point, although with a different layout under NC.
Table 3 shows some bit mapping methods, where the https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq216_HTML.gif    https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq217_HTML.gif -bit vectors are one-to-one mapped to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq218_HTML.gif    https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq219_HTML.gif -bit vectors in the subset containing the all-zero vector. The left column represents the nesting method, the second column is the original bits to be transmitted with low level constellation, and the right column shows the bit vectors in the nested constellation. With the bit mapping, the bits of low-level constellations are modulated to the subsets of high-level modulation, and the function of post-coding in Figure 3 is realized.
Table 3
Some bit mapping methods.
Nesting Method
Bits in low-level constellation
Bits for sub-set in container constellation
BPSK in QPSK
0, 1
00, 11
BPSK in 16 QAM
0, 1
0000, 1111
QPSK in 16 QAM
00, 01
0000, 0011
 
10, 11
1100, 1111
QPSK in 64 QAM
00, 01
000000, 000110
 
10, 11
110000, 110110
16 QAM in 64 QAM
0000, 0001
000000, 000011
 
0010, 0011
000101, 000110
 
0100, 0101
011000, 011011
 
0110, 0111
011101, 011110
 
1000, 1001
101000, 101011
 
1010, 1011
101101, 101110
 
1100, 1101
110000, 110011
 
1110, 1111
110101, 110110
The constellation nesting may have SNR loss since the min-distance of the nested constellation may be a little less than that of the standard one. For example, with normalized energy, the min-distance of two 16-QAM points equals 0.6325. When nesting QPSK inside 16 QAM, the min-distance equals https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq220_HTML.gif , which is 0.97 dB less than 1.414, the min-distance of normal QPSK constellation. Table 4 shows the SNR loss, where the horizontal and vertical labels stand for original constellations and container constellations, respectively. Although nesting QPSK in 16 QAM has SNR loss of about 0.97 dB, nesting other constellations has little SNR loss (0.05 dB for 64 QAM in 256 QAM) or no SNR loss (0 dB for BPSK in QPSK) at all. The SNR loss is taken into account when choosing rate (modulation and coding) according to SNR.
Table 4
Potential SNR loss in constellation conversion.
 
BPSK
QPSK
16 QAM
64 QAM
QPSK
0
   
16 QAM
−0.97 dB
−0.97 dB
  
64 QAM
−1.18 dB
−1.18 dB
−0.21 dB
 
256 QAM
−1.23 dB
−1.23 dB
−0.26 dB
−0.05 dB

4.3. Actual Constellation under Network Coding

The next important issue is to find the actual constellation layout under NC. We explain this with Figure 4 as an example. It can be easily verified that the division has the following property:
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_Equ1_HTML.gif
(1)
Equation (1) shows that, for a point https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq221_HTML.gif in the high level constellation ( https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq222_HTML.gif ), if https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq223_HTML.gif is in the subset https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq224_HTML.gif , it maps https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq225_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq226_HTML.gif by the NC operation. The actual constellation layout of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq227_HTML.gif for demodulating https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq228_HTML.gif is determined by https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq229_HTML.gif , with https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq230_HTML.gif known a priori at the receiver. Although a constellation under NC changes with the a priori information, the min-distance for https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq231_HTML.gif -QAM, under all the a priori information, remains the same: https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq232_HTML.gif .
As for the example in Figure 1, using the third row of Table 3, two bits https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq233_HTML.gif are post-coded to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq234_HTML.gif . With https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq235_HTML.gif being received and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq236_HTML.gif known a priori at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq237_HTML.gif , the QPSK constellation for demodulating https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq238_HTML.gif is looked up in Table 1 by using https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq239_HTML.gif as an index. For example, when https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq240_HTML.gif = "1110", https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq241_HTML.gif is equivalent to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq242_HTML.gif . Since the derived QPSK constellation depends on the a priori information, it changes for each symbol. Recovery of other constellations can be done in a similar way.

4.4. Encoding/Modulation at the Relay

Figure 3 shows the transmit procedure at relay https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq243_HTML.gif . For each flow https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq244_HTML.gif , according to the SNR of its relay link, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq245_HTML.gif finds the transmit rate https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq246_HTML.gif from an empirical SNR-rate table shown in Table 5. SNR loss due to constellation nesting is considered in this process: the rate corresponding to SNR is lowered if SNR loss makes this rate improper.
Table 5
SNR threshold for rate adaptation (for a message consisting of 4800 symbols).
SNR (dB)
Modulation and coding
Bit/Sym
 
BPSK (1/2)
0.50
≥7.0
BPSK (3/4)
0.75
≥7.6
QPSK (1/2)
1.00
≥10.4
QPSK (3/4)
1.50
≥12.8
16 QAM (1/2)
2.00
≥17.0
16 QAM (3/4)
3.00
≥21.0
64 QAM (2/3)
4.00
≥23.4
64 QAM (3/4)
4.50
≥26.8
256 QAM (2/3)
5.33
≥28.0
256 QAM (3/4)
6.00
Assume, without loss of generality, that rates, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq247_HTML.gif , over links from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq248_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq249_HTML.gif , are in the increasing order, that is, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq250_HTML.gif . Each https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq251_HTML.gif corresponds to a coding rate https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq252_HTML.gif and a modulation level https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq253_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq254_HTML.gif , are also in the increasing order.
Transmission at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq255_HTML.gif is done by the following steps.
(i)
Every time https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq256_HTML.gif transmits a fixed number of symbols, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq257_HTML.gif . For each flow https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq258_HTML.gif , the number of information bits that can be transmitted is https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq259_HTML.gif . These information bits form a frame https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq260_HTML.gif . On https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq261_HTML.gif channel coding with rate https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq262_HTML.gif is performed, which generates https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq263_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq264_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq265_HTML.gif , have different length in bits.
 
(ii)
In order to transmit https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq266_HTML.gif , the constellation https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq267_HTML.gif should be nested in https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq268_HTML.gif . This is done by the bit mapping (POST-COD) according to Table 3, which maps https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq269_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq270_HTML.gif and encodes https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq271_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq272_HTML.gif .
 
(iii)
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq273_HTML.gif are XORed together as https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq274_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq275_HTML.gif , modulated to signal https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq276_HTML.gif with constellation https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq277_HTML.gif , is transmitted to all nodes with out-of-band rate information https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq278_HTML.gif (each node only records the information bits on overhearing packets from nearby nodes to the relay. With the rate information from the relay, the node performs the same channel coding/post coding as the relay and calculates the coded bits as the a priori information for network decoding.)
 

4.5. Demodulation/Decoding at the Receiver

Figure 5 shows the demodulation and decoding procedure at all nodes. At the https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq279_HTML.gif th node, the signal received from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq280_HTML.gif is
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_Equ2_HTML.gif
(2)
where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq281_HTML.gif is the channel gain and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq282_HTML.gif is zero mean additive white Gaussian noise (AWGN).
A node https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq283_HTML.gif , supporting the used constellation ( https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq284_HTML.gif ), performs soft demodulation and calculates symbol log-likelihood ratio (LLR) [17] and then converts to bit LLR. The bit LLR corresponds to XORed bits from all flows. With the a priori information bits ( https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq285_HTML.gif ) known in advance, the LLR of desired bits can be recovered and then channel decoding is performed. The whole procedure is shown in the right side of Figure 5.
For a receiver https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq286_HTML.gif requiring a lower constellation https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq287_HTML.gif , at first the low-level constellation is derived by exploiting the a priori information, as described in Section 4.3. This derivation of constellation is actually network decoding. Then the received signal is demodulated with the derived constellation and later channel decoded to recover the bits, as shown in the left side of Figure 5.

4.6. Discussion: Constellation Size Limit

FRNC requires that constellation size should be large enough so that high rate can be used at high SNR. In practical systems, there is a constraint on the constellation size which restricts the maximal rate. The maximum of constellation size, referred to as the constellation size limit hereafter, confines the performance of FRNC. In such cases, FRNC can be used together with superposition coding (SC) to fully exploit the transmit power. NC is already used together with SC in [13], where the fine scheduling is used to combine links with almost the same gain and apply NC to them. For links with quite different gains, SC is applied. But such a scheduling heavily depends on the actual topology. As a comparison, we replace the NC in [13] with FRNC and suggest FRNC + SC, which is analyzed in Section 5.

5. Performance Analysis of Two-Way Relay

In this section, we analyze the performance of different schemes under the two-way relay scenario shown in Figure 1. Six schemes are compared here. (i) DF, the decode-and-forward scheme, (ii) NC, the normal bit level NC scheme with minimal rate constraint, (iii) SC, the superposition coding scheme, (iv) NC + SC, the iPack scheme in [13], (v) FRNC, and (vi) FRNC + SC. In the analysis, we assume (i) each channel has zero mean AWGN noise with variance https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq288_HTML.gif ; (ii) channel gain of the link https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq289_HTML.gif - https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq290_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq291_HTML.gif ; (iii) each symbol has normalized energy and the SNR over each link is https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq292_HTML.gif , (iv) the packet length is infinite.

5.1. Capacity without Fading

With FRNC, the capacity of the broadcast channel reaches the sum rates of the two links (here, we ignore SNR loss in constellation nesting for simplicity. the SNR loss is taken into account in the simulation evaluation),
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_Equ3_HTML.gif
(3)
The capacity of DF is half of that of FRNC,
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_Equ4_HTML.gif
(4)
The capacity of NC is
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_Equ5_HTML.gif
(5)
Next we calculate the throughput of NC + SC, SC, FRNC + SC, where SC is involved. Assume, without loss of generality, that https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq293_HTML.gif . Part https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq294_HTML.gif of the power is used to transmit the base layer signal https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq295_HTML.gif (the NC coded message in NC + SC, the plain message in pure SC, the FRNC coded message in FRNC + SC), and the remaining power https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq296_HTML.gif is used to transmit the secondary signal https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq297_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq298_HTML.gif . The transmitted signal is
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_Equ6_HTML.gif
(6)
At https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq299_HTML.gif , SNR of the received base layer signal ( https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq300_HTML.gif ) is
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_Equ7_HTML.gif
(7)
Since https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq301_HTML.gif is an increasing function of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq302_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq303_HTML.gif and the rate used for the NC coded message is determined by https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq304_HTML.gif . At https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq305_HTML.gif , after perfect interference cancellation, the SNR of the secondary layer signal is
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_Equ8_HTML.gif
(8)
The throughput of NC + SC under given https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq306_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq307_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq308_HTML.gif , is
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_Equ9_HTML.gif
(9)
By differentiating https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq309_HTML.gif with respect to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq310_HTML.gif , its maximum can be obtained at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq311_HTML.gif . To achieve the maximal capacity, the power allocation should be done as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_Equ10_HTML.gif
(10)
The capacity of the pure SC is as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_Equ11_HTML.gif
(11)
This is a decreasing function of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq312_HTML.gif and reaches its maximum when https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq313_HTML.gif approaches 0. With the constellation size limit in practical systems, over the link https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq314_HTML.gif - https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq315_HTML.gif , all SNR greater than a certain threshold https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq316_HTML.gif supports the maximal rate. When https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq317_HTML.gif is large enough, it is sufficient to choose https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq318_HTML.gif so as to satisfy https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq319_HTML.gif . The rest of the power can be used for the SC transmission over the link https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq320_HTML.gif - https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq321_HTML.gif .
As for FRNC + SC, the FRNC coded message replaces https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq322_HTML.gif in (6), and its capacity is as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_Equ12_HTML.gif
(12)
It is interesting to see that the power allocation has no capacity loss over the link https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq323_HTML.gif - https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq324_HTML.gif . The only loss compared with FRNC is the part https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq325_HTML.gif over the https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq326_HTML.gif - https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq327_HTML.gif link, which approaches 0 as https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq328_HTML.gif approaches 1. https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq329_HTML.gif is an increasing function of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq330_HTML.gif . Without constellation size limit, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq331_HTML.gif should be set to 1, and FRNC + SC degenerates to FRNC. With the constellation size limit, devoting full power to transmitting the FRNC coded packet is unnecessary. Therefore, the SC coding should be used and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq332_HTML.gif is divided into two parts, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq333_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq334_HTML.gif . The optimal power allocation policy is as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_Equ13_HTML.gif
(13)
The power allocation can be explained as follows: (i) when https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq335_HTML.gif is small enough ( https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq336_HTML.gif ), all power ( https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq337_HTML.gif ) should be used for FRNC since its rate is not saturated yet. (ii) As https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq338_HTML.gif gets greater than https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq339_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq340_HTML.gif should be set to satisfy https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq341_HTML.gif . The maximal rate is used over link https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq342_HTML.gif - https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq343_HTML.gif for FRNC, and the extra power is used for the SC transmission over the link https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq344_HTML.gif - https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq345_HTML.gif . (iii) If https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq346_HTML.gif is very large, both the FRNC and SC transmission reach the maximal rate over the link https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq347_HTML.gif - https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq348_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq349_HTML.gif is chosen to satisfy https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq350_HTML.gif for the SC transmission. The rest power is used in improving the FRNC rate over the link https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq351_HTML.gif - https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq352_HTML.gif .

5.2. Capacity with Fading

Next we consider the effect of fading and assume each channel experiences block Rayleigh fading. https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq353_HTML.gif follows the exponential distribution: https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq354_HTML.gif , and the joint distribution is https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq355_HTML.gif . The average throughput can be calculated by numerical integration.
With a two-way relay scenario similar to the one shown in Figure 1, we study how the position of the relay node affects the system performance. Adjusting the position of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq356_HTML.gif between https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq357_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq358_HTML.gif changes the normalized distance https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq359_HTML.gif . Average SNR ( https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq360_HTML.gif ) of links https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq361_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq362_HTML.gif is calculated from the normalized distance https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq363_HTML.gif according to the two-ray model [18] with the path loss exponent (equaling 3 in the simulation). When https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq364_HTML.gif lies in the middle of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq365_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq366_HTML.gif , the average SNR of both relay links equals 20 dB. https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq367_HTML.gif is set to the optimal value for schemes employing SC.
Figure 6 shows the average throughput of different schemes, where there is no limit on constellation size. The curve of FRNC + SC overlaps with that of FRNC. Both outperform other schemes. As analyzed before, SC in NC + SC only works under certain conditions. When the relay is near the middle point, the difference in link quality is not very large. NC + SC degenerates to NC, as is clear when the distance equals 0.5. Without constellation size limit, the best link is always chosen in SC, and the two-way communication becomes unidirectional. The performance of NC is greatly affected by the min-rate, especially when the relay is away from the middle point and the difference in link quality becomes large. Due to the effect of fading, two links with the same average SNR have different instantaneous SNR. Therefore, FRNC/FRNC + SC outperform NC and NC + SC even when the normalized distance equals 0.5.

6. Numerical Results

In this section, we evaluate the proposed FRNC and FRNC + SC schemes using Monte-Carlo simulations. Each slot consists of 4800 symbols. Messages are coded by a 4-state recursive systematic convolutional (RSC) code with the generator matrix (1, 5/7). Modulation and coding schemes shown in Table 5 are used. Altogether, 10 different transmit rates can be supported. The number of information bits in a message varies from 2400 bits to 28800 bits. Messages are transmitted from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq368_HTML.gif to nodes via different schemes and decoded accordingly. In the evaluation, we focus on the broadcast channel, and compare FRNC, FRNC + SC against DF, NC [3], NC with opportunistic scheduling (NCSched) [9], SC, and NC + SC [13]. SNR loss in FRNC is taken into account when choosing rates for transmissions. It is assumed that each link experiences independent block Rayleigh fading. Modulation constellations are adopted from IEEE 802.11a and the related parameters (symbol period, number of subcarrier) are used in calculating throughput [19].
With the two-way relay scenario shown in Figure 1 and the same setting as in Section 5.2, we compare the actual throughput achieved by different schemes, with the practical constellation size limit. Figure 7 shows the total throughput of different schemes on the broadcast channel with respect to the normalized distance, where the largest constellation is 256 QAM. Generally speaking, Figure 7 shows similar trend as Figure 6. But with the limit in constellation size, some differences do occur: (i) FRNC + SC outperforms FRNC, (ii) at a small distance, FRNC and NC + SC have similar performances, and (iii) the difference between FRNC + SC and NC + SC gets larger than that in Figure 6. By the optimal allocation of power between FRNC and SC, the best performance is achieved in FRNC + SC under all distances. When the distance equals 0.30, FRNC + SC reaches the largest throughput gain, 25.8%, against NC + SC. At this distance, FRNC + SC achieves a much larger gain, 74.2%, against NC. The cumulative density function of the throughput at this distance is shown in Figure 8. The superiority of FRNC and FRNC + SC over other schemes is very clear.
Figure 9 shows the effect of constellation size limit. When the largest constellation is constrained to 64 QAM instead of 256 QAM, the performance of both FRNC + SC and FRNC is degraded. But the performance of FRNC + SC is less affected, where the extra-power is used in SC transmission than being wasted in FRNC.
Next the effect of the number of nodes, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F780632/MediaObjects/13638_2010_Article_2146_IEq369_HTML.gif , is evaluated. Average SNR of all relay links is fixed at 20 dB. In such scenarios, SC can hardly be used. Therefore, only the schemes without using SC are compared. Figure 10 shows the throughput on the broadcast channel. DF transmits in a TDMA manner. Therefore, it cannot benefit from the increase in nodes and its throughput is almost a constant value. On the other hand, NC, NCSched and FRNC all benefit from the increase in flows more or less. Due to the different capability in handling rate mismatch, the slopes of three curves differ greatly. FRNC always has the highest throughput because the rate mismatch problem is completely solved and full rate is achieved.

7. Conclusions

Recently, network coding is widely studied for improving the relay efficiency in wireless networks. Its performance, however, is greatly limited by factors such as rate mismatch. In this paper, we reinterpreted network coding as a mapping between modulation constellations and extended this mapping to enable simultaneous use of different modulations in network-coded transmissions. In this way, the highest rate over each link can be used and the sum rate can be achieved over the broadcast channel. As a result, the rate mismatch problem is completely solved. The only shortcoming of the proposed scheme is its SNR loss in nesting constellations. This little SNR loss is acceptable if the throughput gain is taken into account. We will further study the effect of the direct link and the potential errors at relay node.

Acknowledgment

This research was performed under research contract of "Research and Development for Reliability Improvement by The Dynamic Utilization of Heterogeneous Radio Systems", for the Ministry of Internal Affairs and Communications, Japan.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literature
1.
go back to reference Fitzek FHP, Katz MD: Cooperation in Wireless Networks: Principles and Applications. 1st edition. Springer, New York, NY, USA; 2006.CrossRef Fitzek FHP, Katz MD: Cooperation in Wireless Networks: Principles and Applications. 1st edition. Springer, New York, NY, USA; 2006.CrossRef
2.
go back to reference Ahlswede R, Cai N, Li SYR, Yeung RW: Network information flow. IEEE Transactions on Information Theory 2000, 46(4):1204-1216. 10.1109/18.850663MATHMathSciNetCrossRef Ahlswede R, Cai N, Li SYR, Yeung RW: Network information flow. IEEE Transactions on Information Theory 2000, 46(4):1204-1216. 10.1109/18.850663MATHMathSciNetCrossRef
3.
go back to reference Larsson P, Johansson N, Sunell KE: Coded bi-directional relaying. Proceedings of the IEEE 63rd Vehicular Technology Conference (VTC '06), July 2006 2: 851-855. Larsson P, Johansson N, Sunell KE: Coded bi-directional relaying. Proceedings of the IEEE 63rd Vehicular Technology Conference (VTC '06), July 2006 2: 851-855.
4.
go back to reference Popovski P, Yomo H: Bi-directional amplification of throughput in a wireless multi-hop network. Proceedings of the IEEE 63rd Vehicular Technology Conference (VTC '06), July 2006 2: 588-593. Popovski P, Yomo H: Bi-directional amplification of throughput in a wireless multi-hop network. Proceedings of the IEEE 63rd Vehicular Technology Conference (VTC '06), July 2006 2: 588-593.
5.
go back to reference Zhang S, Liew SC, Lam PP: Hot topic: physical-layer network coding. Proceedings of the 12th Annual International Conference on Mobile Computing and Networking (MOBICOM '06), September 2006 358-365.CrossRef Zhang S, Liew SC, Lam PP: Hot topic: physical-layer network coding. Proceedings of the 12th Annual International Conference on Mobile Computing and Networking (MOBICOM '06), September 2006 358-365.CrossRef
6.
go back to reference Katti S, Gollakota S, Katabi D: Embracing wireless interference: analog network coding. Proceedings of the ACM : Conference on Computer Communications (SIGCOMM '07), August 2007 397-408. Katti S, Gollakota S, Katabi D: Embracing wireless interference: analog network coding. Proceedings of the ACM : Conference on Computer Communications (SIGCOMM '07), August 2007 397-408.
7.
go back to reference Hausl C, Hagenauer J: Iterative network and channel decoding for the two-way relay channel. Proceedings of the IEEE International Conference on Communications (ICC '06), July 2006 4: 1568-1573. Hausl C, Hagenauer J: Iterative network and channel decoding for the two-way relay channel. Proceedings of the IEEE International Conference on Communications (ICC '06), July 2006 4: 1568-1573.
8.
go back to reference Tang S, Cheng J, Sun C, Miura R, Obana S: Joint channel and network decoding for XOR-based relay in multi-access channel. IEICE Transactions on Communications 2009, E92-B(11):3470-3477. 10.1587/transcom.E92.B.3470CrossRef Tang S, Cheng J, Sun C, Miura R, Obana S: Joint channel and network decoding for XOR-based relay in multi-access channel. IEICE Transactions on Communications 2009, E92-B(11):3470-3477. 10.1587/transcom.E92.B.3470CrossRef
9.
go back to reference Yomo H, Popovski P: Opportunistic scheduling for wireless network coding. IEEE Transactions on Wireless Communications 2009, 8(6):2766-2770.CrossRef Yomo H, Popovski P: Opportunistic scheduling for wireless network coding. IEEE Transactions on Wireless Communications 2009, 8(6):2766-2770.CrossRef
10.
go back to reference Larsson P: A multiplicative and constant modulus signal based network coding method applied to CB-Relaying. Proceedings of the IEEE 67th Vehicular Technology Conference (VTC '08), May 2008 61-65. Larsson P: A multiplicative and constant modulus signal based network coding method applied to CB-Relaying. Proceedings of the IEEE 67th Vehicular Technology Conference (VTC '08), May 2008 61-65.
11.
go back to reference Koike-Akino T, Popovski P, Tarokh V: Denoising maps and constellations for wireless network coding in two-way relaying systems. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '08), December 2008 3790-3794. Koike-Akino T, Popovski P, Tarokh V: Denoising maps and constellations for wireless network coding in two-way relaying systems. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '08), December 2008 3790-3794.
12.
go back to reference Zeitler G, Koetter R, Bauch G, Widmer J: On quantizer design for soft values in the multiple-access relay channel. Proceedings of the IEEE International Conference on Communications (ICC '09), June 2009 Zeitler G, Koetter R, Bauch G, Widmer J: On quantizer design for soft values in the multiple-access relay channel. Proceedings of the IEEE International Conference on Communications (ICC '09), June 2009
13.
go back to reference Alimi R, Li LI, Ramje R, Viswanathan H, Yang YR: IPack: in-network packet mixing for high throughput wireless mesh networks. Proceedings of the 27th IEEE Communications Society Conference on Computer Communications (INFOCOM '08), April 2008 66-70. Alimi R, Li LI, Ramje R, Viswanathan H, Yang YR: IPack: in-network packet mixing for high throughput wireless mesh networks. Proceedings of the 27th IEEE Communications Society Conference on Computer Communications (INFOCOM '08), April 2008 66-70.
14.
go back to reference Costa MHM: Writing on dirty paper. IEEE Transactions on Information Theory 1983, IT-29(3):439-441.CrossRef Costa MHM: Writing on dirty paper. IEEE Transactions on Information Theory 1983, IT-29(3):439-441.CrossRef
15.
go back to reference Katti S, Rahul H, Hu W, Katabi D, Médard M, Crowcroft J: XORs in the air: practical wireless network coding. Proceedings of the Conference on Computer Communications (SIGCOMM '06), 2006 243-254. Katti S, Rahul H, Hu W, Katabi D, Médard M, Crowcroft J: XORs in the air: practical wireless network coding. Proceedings of the Conference on Computer Communications (SIGCOMM '06), 2006 243-254.
16.
go back to reference Xiao L, Fuja TE, Kliewer J, Costello Jr DJ: Nested codes with multiple interpretations. Proceedings of the 40th Annual IEEE Conference on Information Sciences and Systems (CISS '06), 2007 851-856. Xiao L, Fuja TE, Kliewer J, Costello Jr DJ: Nested codes with multiple interpretations. Proceedings of the 40th Annual IEEE Conference on Information Sciences and Systems (CISS '06), 2007 851-856.
17.
go back to reference Hagenauer J, Papke L, Offer E, Papke L: Iterative decoding of binary block and convolutional codes. IEEE Transactions on Information Theory 1996, 42(2):429-445. 10.1109/18.485714MATHCrossRef Hagenauer J, Papke L, Offer E, Papke L: Iterative decoding of binary block and convolutional codes. IEEE Transactions on Information Theory 1996, 42(2):429-445. 10.1109/18.485714MATHCrossRef
18.
go back to reference Goldsmith A: Wireless Communications. Cambridge University Press, New York, NY, USA; 2005.CrossRef Goldsmith A: Wireless Communications. Cambridge University Press, New York, NY, USA; 2005.CrossRef
19.
go back to reference IEEE Computer Society LAN MAN Standards Committee : LAN Medium Access Protocol (MAC) and Physical Layer (PHY) Specification. IEEE Std 802.11-2007, IEEE, 2007 IEEE Computer Society LAN MAN Standards Committee : LAN Medium Access Protocol (MAC) and Physical Layer (PHY) Specification. IEEE Std 802.11-2007, IEEE, 2007
Metadata
Title
Full Rate Network Coding via Nesting Modulation Constellations
Authors
Suhua Tang
Hiroyuki Yomo
Tetsuro Ueda
Ryu Miura
Sadao Obana
Publication date
01-12-2011
Publisher
Springer International Publishing
DOI
https://doi.org/10.1155/2011/780632

Other articles of this Issue 1/2011

EURASIP Journal on Wireless Communications and Networking 1/2011 Go to the issue

Premium Partner