Skip to main content
Top
Published in: EURASIP Journal on Wireless Communications and Networking 1/2009

Open Access 01-12-2009 | Research Article

Rate-Optimized Power Allocation for DF-Relayed OFDM Transmission under Sum and Individual Power Constraints

Authors: Luc Vandendorpe, Jérôme Louveaux, Onur Oguz, Abdellatif Zaidi

Published in: EURASIP Journal on Wireless Communications and Networking | Issue 1/2009

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We consider an OFDM (orthogonal frequency division multiplexing) point-to-point transmission scheme which is enhanced by means of a relay. Symbols sent by the source during a first time slot may be (but are not necessarily) retransmitted by the relay during a second time slot. The relay is assumed to be of the DF (decode-and-forward) type. For each relayed carrier, the destination implements maximum ratio combining. Two protocols are considered. Assuming perfect CSI (channel state information), the paper investigates the power allocation problem so as to maximize the rate offered by the scheme for two types of power constraints. Both cases of sum power constraint and individual power constraints at the source and at the relay are addressed. The theoretical analysis is illustrated through numerical results for the two protocols and both types of constraints.

1. Introduction

In applications where it is difficult to locate several antennas on the same equipment, for size or cost issues, it has been proposed to mimic multiantenna configurations by means of cooperation among two or more terminals. Cooperation or relaying, also coined distributed MIMO, has gained a lot of interest recently. Cooperative diversity has been studied for instance in [13] (and references therein) for cellular networks.
In this paper we consider communication between a source and a destination, and the source is possibly assisted with a relay node. All the channels (source to destination, source to relay and relay to destination) are assumed to be frequency selective and in order to cope with that, OFDM modulation with proper cyclic extension is used. The relay operates in a DF mode. This mode is known to be suboptimum [4, 5]. Decode-and-forward is adopted here as a relaying strategy for its simplicity and its mathematical tractability. Two protocols (P1 and P2) are considered. Each protocol is made of two signaling periods, named time slots. The first time slot is identical for both protocols. During this period, on each carrier, the source broadcasts a symbol. This symbol (affected by the proper channel gain) is received by the destination and the relay. The relay may retransmit the same carrier-specific symbol to the destination during the second time slot. Whether the relay does it or not will be indicated by the optimization problem which is formulated and solved in this paper. The protocol P2 differs from the protocol P1 in that, in the latter, the source does not transmit during the second time slot, irrespective to whether the relay is active or not during the second time slot. For P2, on a per carrier basis, the source sends a new symbol if the relay is inactive. The reason for not having the source and the relay transmitting at the same time is to avoid the interference that would occur in this case, thus rendering the optimization problem somewhat tedious. Moreover in practice source and relay will have different carrier frequency offsets which is likely to require involved precorrection mechanisms. A scenario with interference will be investigated in the future.
For both protocols, whenever it is active, the relay uses the same carrier as the one used by the source. This is an a priori choice made here to make the optimization more tractable. It is however clear that carrier pairing between source and relay is a topic for possible further optimization of the scheme. At the destination, it is assumed that for the relayed carriers, the receiver performs maximum ratio combining of what is received from the source in the first time slot, and what is received from the relay in the second one, for each tone.
OFDM with relaying has already been investigated by some authors. In [6], the authors consider a general scenario in which users communicate by means of OFDMA (orthogonal frequency division multiple access). They propose a general framework to decide about the relaying strategy, and the allocation of power and bandwidth for the different users. The problem is solved by means of powerful optimization tools, for individual constraints on the power. In the current paper, we restrict ourselves to a single user scenario but we investigate more deeply the analytical solution and its understanding. We study power allocation to maximize the rate for both cases of sum power and individual power constraints. We also compare two different DF protocols and show the advantage of having the source also transmitting during the second time slot. In [7] the authors consider a setup which is similar to the one we address in this paper but with nonregenerative relays. In [8], the authors investigate OFDM transmission with DF relaying, and a rate maximizing power allocation for a global power constraint. They briefly investigate the power allocation for the protocol named P1 in the current paper, and a sum power constraint only. On the other hand they investigate optimized tone pairing. In [9], the authors consider OFDM with multiple decode and forward relays. They minimize the total transmission power by allocating bits and power to the individual subchannels. A selective relaying strategy is chosen. More recently, in [10] the authors also consider OFDM systems assisted by a single cooperative relay. The orthogonal half-duplex relay operates either in the selection detection-and-forward (SDF) mode or in the amplify-and-forward (AF) mode. The authors target the minimization of the transmit-power for a desired throughput and link performance. They investigate two distributed resource allocation strategies, namely flexible power ratio (FLPR) and fixed power ratio (FIPR).
The paper is organized as follows. The system under consideration is described in Section 2. The rate optimization for a sum power constraint is investigated in Section 3 for the two protocols. The cases of individual power constraints are dealt with in Section 4. Finally numerical results are discussed in Section 5.

2. System Description

We consider communication between a source and a destination, assisted with a relay node. All links are assumed to be frequency selective and this motivates the use of OFDM as a modulation technique. Assuming that the cyclic prefix is properly designed and that transmission over all links is synchronous, the scheme can be equivalently represented by a set of parallel subsystems corresponding to the different subchannels or frequencies used by the modulation and facing flat fading over each link. The block diagram associated with the system for one particular carrier (or tone) is depicted in Figure 1.
During the first time slot, the source sends one modulated symbol on each carrier. During the second time slot, the relay selects some of the modulated symbols that it decodes, and retransmits them. For each relayed symbol, we constrain the relay to use the same carrier as that used by the source for the same symbol. Based on the two signalling intervals, the destination implements maximum ratio combining for the carriers with relaying. As explained earlier, we consider two protocols, called P1 and P2. In protocol P1, the carriers that are not relayed are simply not used in the second time slot (neither by the relay nor by the source). In protocol P2, a new carrier specific modulated symbol is sent by the source in the second time slot on each one of the carriers that are not used by the relay.
Let us denote by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq2_HTML.gif (resp., https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq3_HTML.gif ) the amplitude of the symbol sent by the source (resp., the relay) on carrier https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq4_HTML.gif in the first (resp., second) time slot, and by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq5_HTML.gif (resp., https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq6_HTML.gif ) the complex channel gain for tone https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq7_HTML.gif between source (resp., relay) and destination. The noise sample corrupting the transmission on tone https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq8_HTML.gif during the first time slot is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq9_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq10_HTML.gif during the second period. These two noise samples are zero-mean circular Gaussian, white and uncorrelated with the same variance https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq11_HTML.gif . Denoting by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq12_HTML.gif the unit variance symbol transmitted over tone https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq13_HTML.gif , after proper maximum ratio combining at the destination, the decision variable obtained at the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq14_HTML.gif th output of the FFT (Fast Fourier transform) is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ1_HTML.gif
(1)
The associated signal to noise ratio is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ2_HTML.gif
(2)
where we have used the following notations: https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq15_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq16_HTML.gif .

3. Rate Optimization for a Sum Power Constraint

We first investigate the case of a sum power constraint. The techniques used in this section will be useful in solving the problem with individual power constraints. It is well known [11, 12] that the optimization with individual power constraints can be solved by reformulating it properly into an equivalent problem with a sum power constraint. All channels gains are assumed to be perfectly known for the central device computing the power allocation. The overhead associated with channel updating is not discussed further in the current paper.
We investigate the two protocols separately.

3.1. Protocol P1

For protocol P1, the rate achieved by the system for a duration of 2 OFDM symbols is given by [13]:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ3_HTML.gif
(3)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq17_HTML.gif is the set of carriers (or tones) receiving power at the source only, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq18_HTML.gif the complementary set, that is the set of carriers receiving power at both source and relay. These sets are not known in advance and must be characterized in an optimal way. In [13] the signal to noise ratio without fading was assumed to be symmetric throughout the network. Here the model is more general and notations are introduced to possibly allow different transmit powers at the source and at the relay, not only for the same carrier but also for different carriers. For a relayed carrier, assuming a decode-and-forward mode, the rate is the minimum between the rate on link https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq19_HTML.gif and the rate on the link https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq20_HTML.gif . The power allocation which maximizes (3) is first investigated for a sum power constraint
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ4_HTML.gif
(4)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq21_HTML.gif is the total power budget available for the source and the relay together, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq22_HTML.gif is the total number of carriers. Below, the objective function will be worked out in order to find criteria enabling to decide about the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq23_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq24_HTML.gif to which each carrier has to be assigned.
The Lagrangian for the optimization of the rate, taking into account the total power constraint and the decode-and-forward constraints, is defined by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ5_HTML.gif
(5)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq25_HTML.gif is the Lagrange multiplier associated with the global power constraint and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq26_HTML.gif is the Lagrange multiplier associated with the decodability (perfect decode and forward) constraint on carrier https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq27_HTML.gif . The https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq28_HTML.gif are indicators taking values https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq29_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq30_HTML.gif and whose optimization will provide the solution for the assignment to sets https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq31_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq32_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq33_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq34_HTML.gif .
Let us first investigate whether the decodability constraints are active or not for relayed carriers. For relayed carrier https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq35_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq36_HTML.gif . If a constraint is inactive, its associated Lagrange multiplier is zero [14]. Assuming this may be the case, setting the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq37_HTML.gif and taking the derivative of the Lagrangian with respect to the powers for a relayed carrier leads to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ6_HTML.gif
(6)
This shows that assuming that the constraint is not saturated, the equations lead to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq38_HTML.gif . This imposes a constraint on the current channel state, which is almost certain not to happen. Hence, except in very marginal cases, the decode-and-forward constraint has to be saturated. This means
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ7_HTML.gif
(7)
where the last line defines the coefficient https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq39_HTML.gif .
Hence for relayed carrier https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq40_HTML.gif , the total amount of power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq41_HTML.gif allocated to that carrier will be given by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq42_HTML.gif . Therefore the Lagrangian can be written as:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ8_HTML.gif
(8)
where for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq43_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq44_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq45_HTML.gif , while for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq46_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq47_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq48_HTML.gif .
The solution for the carrier assignment can be found by taking the derivatives with respect to the indicators. We have that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ9_HTML.gif
(9)
It appears that when
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ10_HTML.gif
(10)
the carrier should have https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq49_HTML.gif and be allocated to set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq50_HTML.gif . By opposition, when
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ11_HTML.gif
(11)
the carrier should be allocated to set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq51_HTML.gif .
Investigating (3) it should be clear that when one has https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq52_HTML.gif , because of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq53_HTML.gif , the rate obtained by allocating the carrier to the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq54_HTML.gif will always be higher than the rate obained if the carrier were allocated to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq55_HTML.gif . It is worth noting that, if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq56_HTML.gif , the inequality between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq57_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq58_HTML.gif is equivalent to the inequality between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq59_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq60_HTML.gif . As a matter of fact, with the definition of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq61_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ12_HTML.gif
(12)
Then,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ13_HTML.gif
(13)
The above shows that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ14_HTML.gif
(14)
This means that when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq62_HTML.gif , the allocation to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq63_HTML.gif or to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq64_HTML.gif of the carrier may be based on either comparisons in (14) because they are equivalent. And in short, to be relayed, a carrier should fulfil the following two conditions simultaneously: https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq65_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq66_HTML.gif .
Now that the assignment is known, the Karush-Kuhn-Tucker (KKT) optimality conditions are such that, at the optimum, for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq67_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ15_HTML.gif
(15)
for the carriers to be served, and for carrier https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq68_HTML.gif such that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ16_HTML.gif
(16)
the power should be set to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq69_HTML.gif . For carriers https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq70_HTML.gif and to be served with power,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ17_HTML.gif
(17)
while if
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ18_HTML.gif
(18)
we should set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq71_HTML.gif .
All these derivations basically also show that, after the assignment step, our constrained optimization problem can actually be solved thanks to the seminal waterfilling algorithm, applied to a water container built either from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq72_HTML.gif or from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq73_HTML.gif . The latter values actually show that the constraint related to the DF operating mode of the relay leads to particular values to be used for the container. More specifically, for the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq74_HTML.gif , these values are modified values with respect to the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq75_HTML.gif .

3.2. Protocol P2

In this case, the rate achieved by the system over a duration of 2 OFDM symbols is given by [13]:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ19_HTML.gif
(19)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq76_HTML.gif is the set of carriers (or tones) receiving power at the source only, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq77_HTML.gif is the complementary set, that is, carriers receiving power at both the source and the relay. We also denote by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq78_HTML.gif the power allocated to a carrier at the source. If this carrier is not relayed, each protocol instant uses https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq79_HTML.gif .
Analysis of this objective function shows that the DF constraint is also saturated on all carriers using the relay, like for protocol P1. Hence for a relayed carrier with an allocated power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq80_HTML.gif the rate evolves as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ20_HTML.gif
(20)
For a nonrelayed carrier https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq81_HTML.gif , and a total allocated power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq82_HTML.gif (over the two instants), the rate evolves as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ21_HTML.gif
(21)
When https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq83_HTML.gif we have that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq84_HTML.gif for any value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq85_HTML.gif . On the contrary, when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq86_HTML.gif we have https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq87_HTML.gif . However this is only valid for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq88_HTML.gif where
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ22_HTML.gif
(22)
If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq89_HTML.gif , even when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq90_HTML.gif , the power is better used by allocating the carrier to set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq91_HTML.gif . Let us define the following Lagrangian, with a Lagrange multiplier https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq92_HTML.gif associated with the global power constraint, and taking into account the saturation of the DF constraints:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ23_HTML.gif
(23)
with
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ24_HTML.gif
(24)
Equating to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq93_HTML.gif the derivatives of this Lagrangian with respect to the power, we get for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq94_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ25_HTML.gif
(25)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq95_HTML.gif stands for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq96_HTML.gif . Similarly, for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq97_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ26_HTML.gif
(26)
Again the derivations show that the constrained optimization problem can be solved using the waterfilling algorithm, applied to a water container built either from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq98_HTML.gif or from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq99_HTML.gif . It is also important to note that for the nonrelayed carriers two identical values have to be used for the water container, corresponding to the two protocol instants. At the end of the waterfilling one checks if any of the relayed carriers receives an amount of power larger than the threshold given by (22). If this happens, the relayed carrier fulfilling this condition and for which the rate increase is the largest one is moved from the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq100_HTML.gif to the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq101_HTML.gif . The waterfilling is applied again. This procedure is iterated till none of the relayed carrier receives an amount of power larger than its associated threshold. In the sequel this procedure will be named the reallocation step.

4. Rate Maximization for Individual Power Constraints

This section is devoted to the power allocation which maximizes the rates under individual power constraints on the source and the relay respectively:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ27_HTML.gif
(27)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ28_HTML.gif
(28)
First, note that for the optimum power allocation with individual power constraints, it might happen that constraint (28) is inactive for certain values of channel parameters, but constraint (4) will always be active. In other words, at the optimum, the full available power will always be used at the source, while some of the power available at the relay may not be used. This can be explained using simple intuitive arguments. Assume a solution is found such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq102_HTML.gif is not fully used. The rate can be further increased by allocating the remaining source power to a carrier in set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq103_HTML.gif or in set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq104_HTML.gif . For the relay power, things may be different. For instance, it may even happen that all carriers are allocated to the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq105_HTML.gif in which case the relay does not transmit at all. One way to take this particular case into account is to perform a first optimization (called first step hereafter), trying to allocate the source power in an optimum way, not considering the constraint on the relay power. After this allocation process of the source power, one has to check whether the relay power is sufficient or not. If it is sufficient, then the optimum solution corresponds to this particular situation in which the full relay power is not used. If not, it can now be assumed that the relay power constraint is satisfied with equality at the optimum, and the full iterative method explained below should be used. Let us first describe the first step.

4.1. First Step

Again, we analyze the two protocols separately.

4.1.1. Protocol P1

The problem in this case is still to maximize (3) where it is now assumed that the constraint on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq106_HTML.gif may not be active. This means that there is enough relay power such that for a relayed carrier https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq107_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq108_HTML.gif can always be made large enough to have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ29_HTML.gif
(29)
As discussed above, the constraint on the source power being saturated the associated Lagrange multiplier https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq109_HTML.gif may be different from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq110_HTML.gif . Here we investigate a solution for the case where the relay power is not saturated and the related Lagrange multiplier is then https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq111_HTML.gif . The corresponding Lagrange function can be written as:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ30_HTML.gif
(30)
In agreement with the indicator variables used above, when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq112_HTML.gif carrier https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq113_HTML.gif should be allocated to set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq114_HTML.gif . In the reverse case, it should be allocated to set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq115_HTML.gif . Once the assignment is known, taking the derivative with respect to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq116_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq117_HTML.gif and equating it to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq118_HTML.gif , it comes
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ31_HTML.gif
(31)
For a carrier https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq119_HTML.gif in the other set, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq120_HTML.gif , we get
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ32_HTML.gif
(32)
Hence the problem can be solved by means of a waterfilling procedure, where the container is built from values https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq121_HTML.gif in set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq122_HTML.gif , and values https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq123_HTML.gif in set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq124_HTML.gif . With such an allocation procedure, the minimum power required at the relay is given by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq125_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq126_HTML.gif . If this value is below the power available at the relay, the problem is solved. This would correspond to a situation where the relay is located far away from the source, and, in a sense, not very useful for the protocol used here. Otherwise one has to investigate the situation where both power constraints are active (saturated), which is of most interest.

4.1.2. Protocol P2

The corresponding Lagrange function can be written:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ33_HTML.gif
(33)
Taking the derivative with respect to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq127_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq128_HTML.gif and equating it to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq129_HTML.gif , it comes
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ34_HTML.gif
(34)
For a carrier https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq130_HTML.gif in the other set, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq131_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ35_HTML.gif
(35)
So the conclusions are similar to those drawn for protocol P1. The problem can again be solved by means of a waterfilling procedure, where the container is built from the values https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq132_HTML.gif , and the values https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq133_HTML.gif in set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq134_HTML.gif . However it has to be noted that for the values related to set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq135_HTML.gif those values have to be used twice because of the two time slots. Besides that, the reallocation procedure has to be implemented: it has to be checked whether any of the carrier allocated to set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq136_HTML.gif receives an amount of power above a certain threshold. If this happens, carriers have to be moved from set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq137_HTML.gif to set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq138_HTML.gif , and the waterfilling has to be applied till this no longer happens, as explained above. The value to be used for the threshold is similar to (22), where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq139_HTML.gif has to be used instead of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq140_HTML.gif .

4.2. Second Step

A second step is needed unless the power used at the relay by the procedure described in the first step is below the available relay power. Two Lagrange multipliers, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq141_HTML.gif ad https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq142_HTML.gif , now have to be used for the power contraints. One element in the direction of the solution lies in the observation [12] that the rate only depends on the products of powers and (possibly modified) channel gains. Hence allocating power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq143_HTML.gif to a carrier with gain https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq144_HTML.gif provides the same rate as allocating power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq145_HTML.gif to a carrier with gain https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq146_HTML.gif . Let us assume for the moment that the optimum https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq147_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq148_HTML.gif are known. The allocation rules proposed above to define the sets https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq149_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq150_HTML.gif should be revisited with gains modified as: https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq151_HTML.gif ; https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq152_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq153_HTML.gif . The equivalent powers under consideration are now https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq154_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq155_HTML.gif .

4.2.1. Protocol P1

Let us define the following Lagrangian:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ36_HTML.gif
(36)
It is interesting to compare this Lagrangian with the one given by (5). Actually they both have the same structure. The first difference is that (5) is based on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq156_HTML.gif 's and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq157_HTML.gif 's while (36) is based on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq158_HTML.gif 's and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq159_HTML.gif 's. Assuming that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq160_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq161_HTML.gif are known, and thanks to the use of the modified gains and powers, the individual power constraints give rise to a single sum power constraint. The associated Lagrange multiplier now has to be equal to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq162_HTML.gif .
Based on these observations, it turns out that for fixed https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq163_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq164_HTML.gif all the results derived in Section 3 apply to our problem with individual power constraints, and to the powers and the gains that have been properly normalized. In particular it can be concluded that for the carriers using the relay, the decode-and-forward constraint will be saturated, leading to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq165_HTML.gif . Hence https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq166_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq167_HTML.gif should be allocated simultaneously leading to a total power denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq168_HTML.gif where
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ37_HTML.gif
(37)
Considering that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq169_HTML.gif , we also have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ38_HTML.gif
(38)
Therefore, omitting the indicators, the Lagrangian can be rewritten as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ39_HTML.gif
(39)
Carrier https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq170_HTML.gif should be placed in set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq171_HTML.gif if
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ40_HTML.gif
(40)
Based on the above, and relations (14) to be adapted with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq172_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq173_HTML.gif it turns out that the selection rule when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq174_HTML.gif amounts to choosing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq175_HTML.gif when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq176_HTML.gif or when
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ41_HTML.gif
(41)
and vice-versa. Therefore, the allocation procedure of the carriers turns out to be equivalent to that in the sum power case, with properly modified channel gains.
There is however one important exception to this rule which is related to the particular case where the equality https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq177_HTML.gif holds. It has been assumed previously that this particular case needs not being investigated as it is very unlikely to happen. This applies for the sum power constraint. However, in the case of individual power constraints, the procedure is now working with the modified values https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq178_HTML.gif which are no longer given but depend on the Lagrange parameters https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq179_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq180_HTML.gif . It may happen (and has been encountered for some of the channels randomly generated) that the optimal values of these Lagrange parameters are such that the equality is exactly met on some carriers (usually at most one). This particular situation needs a few additional developments and adjustments which have been presented in [15] and will not be repeated here.
For a carrier belonging to the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq181_HTML.gif , the rate gain and optimality conditions are given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ42_HTML.gif
(42)
This leads to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ43_HTML.gif
(43)
For a carrier belonging to the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq182_HTML.gif , the gain and optimality conditions are given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ44_HTML.gif
(44)
The corresponding power allocation is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ45_HTML.gif
(45)
So far, we have assumed that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq183_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq184_HTML.gif were known. In fact there is a single pair https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq185_HTML.gif for which the two power constraints are simultaneously fulfilled. To find this pair, the following algorithm is proposed. The idea is to scan all possible assignments to sets https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq186_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq187_HTML.gif . For carriers such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq188_HTML.gif , as discussed above, the carrier will be assigned to set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq189_HTML.gif . For the other carriers, with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq190_HTML.gif , relaying may be considered. Equation (41) says that the assignment of a carrier candidate for relaying depends on the ratio https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq191_HTML.gif . By sorting the carriers candidates for relaying by decreasing order of the ratios https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq192_HTML.gif , all possible assignments can be considered. As a matter of fact, if a single carrier gets relayed it will be the first one in the sorted set. If two get relayed, it will be the first two, and so forth. Therefore, by considering all possible sets of first carriers in this sorted set, all possible assignments can be investigated. We have as many situations to consider as we have carriers being candidates to be relayed. For each situation, the assignment to sets https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq193_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq194_HTML.gif is fixed. For a fixed assignment, the optimization problem to be solved is convex. The corresponding dual problem is also convex. The dual problem can be solved by taking the derivatives of the dual objective with respect to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq195_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq196_HTML.gif , and equating these derivatives to zero. The values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq197_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq198_HTML.gif solving these equations can be entered in the primal problem, and the optimum power values can be obtained. The problem is that the equations to find the optimum https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq199_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq200_HTML.gif are nonlinear. They can be solved for instance in an iterative manner.
These derivatives with respect to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq201_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq202_HTML.gif correspond to the two power constraints that have to be fulfilled. Hence any classical method known to find the roots of a function (here the derivatives with respect to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq203_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq204_HTML.gif ) can be used. A typical method used is the so-called "subgradient method" where the correction to the Lagrange variables https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq205_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq206_HTML.gif at step https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq207_HTML.gif is made proportionally to the error on the constraints. Here we try to improve this classical method by using a Newton-Raphson algorithm where the first derivative of the objective function (here the objectives are the constraints) is also used. A Newton-Raphson approach is known to have quadratic convergence, and to always converge for a convex objective function. At iteration https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq208_HTML.gif , the power prices https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq209_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq210_HTML.gif are updated according to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ46_HTML.gif
(46)
This Newton-Raphson procedure is thus to be repeated for each one of the possible assignments.

4.2.2. Protocol P2

Adapting the results of the previous subsection leads to the following Lagrangian with the modified gains and powers:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ47_HTML.gif
(47)
For a carrier belonging to the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq211_HTML.gif , the rate gain and optimality conditions are given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ48_HTML.gif
(48)
which leads to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ49_HTML.gif
(49)
For a carrier belonging to the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq212_HTML.gif , the gain and optimality conditions are given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ50_HTML.gif
(50)
The corresponding power allocation is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_Equ51_HTML.gif
(51)
Equations (49) and (51) also show that the powers are given by a waterfilling procedure with a common water level https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq213_HTML.gif or a common power constraint, and containers defined by these equations. The problem is again equivalent to the sum power case and the procedure defined for the maximisation problem in Section 3.2 can be reused. The https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq214_HTML.gif have to be replaced by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq215_HTML.gif , and the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq216_HTML.gif by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq217_HTML.gif . The comments about the allocation of the carrier to set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq218_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq219_HTML.gif are the same as in the case of protocol P1. Recall also that the reallocation step has to be implemented. The Newton-Raphson procedure for the updating of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq220_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq221_HTML.gif is similar to that used for protocol P1.

5. Results

In order to illustrate the theoretical analysis, numerical results are provided and discussed. The number of carriers is set to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq222_HTML.gif . Channel impulse responses (CIR) of length https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq223_HTML.gif are generated. The taps are randomly generated from independent zero mean unit variance circular complex gaussian distributions. Hence the power delay profile is flat. All taps have a unit variance for all links. From these CIRs, FFT are computed to provide the corresponding https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq224_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq225_HTML.gif ). We set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq226_HTML.gif .
For illustrative purposes, results are first presented for one particular channel realization. The power is set to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq227_HTML.gif for the sum power constraint, and to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq228_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq229_HTML.gif for the case of individual power constraints. Figure 2 shows the gains https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq230_HTML.gif (solid curve), https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq231_HTML.gif (dash-dotted), https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq232_HTML.gif (dashed) in dBW of the channels. Figure 3 shows, for protocol P1 and the sum power constraint, the result about the power allocation https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq233_HTML.gif and the possible additional split whenever relevant among source power (solid line) and relay power (dashed). The https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq234_HTML.gif s indicate whether the relay is active ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq235_HTML.gif at the top of the figure) or not ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq236_HTML.gif in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq237_HTML.gif ). In this case, the power used by the source is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq238_HTML.gif and that by the relay is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq239_HTML.gif . The total rate obtained here is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq240_HTML.gif  bits per a duration of 2 OFDM symbols. If preferred, this rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq241_HTML.gif (bits) per 2 OFDM symbols may readily be converted to a spectral efficiency by computing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq242_HTML.gif (bits/sec/Hz) where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq243_HTML.gif is the roll-off factor. Figure 4 reports the power allocation for protocol P2 with a sum power constraint. Recall that for a nonrelayed carrier the amount of source power shown has to be used twice: once per time slot. The rate achieved for the particular channel realization under consideration here is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq244_HTML.gif  bits for a duration of 2 OFDM symbols. It is also interesting to mention that in this case, the power allocated to the source for the channel realization under consideration is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq245_HTML.gif and to the relay, the remainder meaning https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq246_HTML.gif . Compared to protocol P1, the gain is noticeable and is clearly due to the better exploitation of the second time slot.
With protocol P1 and individual power constraints, the bit rate achieved is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq248_HTML.gif  bits for a duration of 2 OFDM symbols. Compared to the same protocol with the sum power constraint, the observed rate loss is due to the values chosen here for the individual power constraints ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq249_HTML.gif - https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq250_HTML.gif ) which are rather different from the values devoted to the two categories of carriers by the sum power case (136-64). For individual power constraints and protocol P2, the total rate is 318 bits per 2 OFDM symbols duration. The loss incurred compared to the sum power case can be explained in a manner identical to that discussed for protocol P1. And again the advantage of this protocol compared to P1 is visible.
Systematic results have also been produced for the two protocols, the sum power case, and different values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq251_HTML.gif . For each value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq252_HTML.gif the results reported are obtained by averaging over 250 channel realizations. The CIRs associated with the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq253_HTML.gif , have a variance of 20 dBs above those associated with the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq254_HTML.gif and the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq255_HTML.gif . The results obtained with the optimized power allocation are contrasted against uniform power allocation. For protocol P1 with uniform power allocation, the carrier allocation to sets https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq256_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq257_HTML.gif is performed as in the optimized case. The power available is uniformly divided between the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq258_HTML.gif carriers. For the carriers to be relayed, the per carrier power is further split between source and relay according to the ratio associated with the saturation of the decodability constraint (7). For protocol P2, the allocation of the carrier to set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq259_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq260_HTML.gif is based on the comparison of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq261_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq262_HTML.gif . If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq263_HTML.gif carriers are allocated to set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq264_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq265_HTML.gif to set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq266_HTML.gif the total power is divided by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq267_HTML.gif in order to take into account the use of the two time slots for the carriers in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq268_HTML.gif . At this point the reallocation step is implemented and some carriers may be moved from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq269_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq270_HTML.gif . For the carriers remaining in set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq271_HTML.gif the power is further split among source and relay according to the ratio associated with the saturation of the decodability constraint (7). Figure 5 reports the rate obtained with the two protocols, and for each protocol, with the optimized and the uniform power allocation. In order to have a better understanding of the gain associated with the optimized power allocation with respect to the uniform one, the rate gain in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq272_HTML.gif between uniform power allocation and optimized allocation is also reported in Figure 6. The rate results (Figure 5) clearly show the higher efficiency of protocol P2 compared to P1. This is due to the better use of the second time slot for the nonrelayed carriers. For high values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq273_HTML.gif and protocol P2, all carriers will be allocated to set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq274_HTML.gif (because of the reallocation step). Because each carrier is used over the two time slots, the rate grows with a slope https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq275_HTML.gif for P2 whereas the slope is only https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq276_HTML.gif with P1. The rate gain results (Figure 6) show how the rate gain evolves with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq277_HTML.gif . Clearly and as expected, the benefit of the optimized power allocation decreases with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq278_HTML.gif . For high values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq279_HTML.gif the optimized power allocation tends to become a uniform one.
Figures 7 and 8 report similar results for the case where the CIRs associated with the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq288_HTML.gif , have a variance of 10 dBs (instead of 20 dBs) above those associated with the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq289_HTML.gif and the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F814278/MediaObjects/13638_2008_Article_1756_IEq290_HTML.gif . These results lead to similar conclusions.

6. Conclusion

In this paper we considered an OFDM point to point link enhanced by means of a relay. When a symbol is received by the relay on a certain tone, it may be relayed to the destination on the same tone. We have investigated the problem of power allocation to the source and to the relay in order to maximize the rate of the whole transmission for a global power constraint and for individual power constraints at the source and at the relay. Two protocols have been considered; the second one makes a better use of the second time slot whenever the relay is inactive. It is assumed that the destination implements MRC between what is received from the source and what is received from the relay, for each tone. The DF operating mode of the relay puts an additional constraint on the design. The carrier classification (whether a carrier has to be relayed or not) has first been investigated for the sum power case. The power allocation problem has been shown to be of the waterfilling type with a specific construction of the container. It has also been shown how the problem for individual constraints could be recast into an equivalent waterfilling problem by using the technique of equivalent powers and equivalent channels. It has been proposed to find iteratively the two Lagrange multipliers in this second case by means of a Newton-Raphson method implemented for each possible carrier assignment. Numerical results have been provided to illustrate the schemes and have shown the advantage of protocol P2 over protocol P1.
Future work will be devoted to the cases of multiple relays, nonperfect channel state information and a refinement of the power allocation across the two signaling intervals. Moreover, coding will also be included in the transmission scheme and taken into account. Besides these topics, the (peak to average power ratio) PAPR might also be a problem to be considered. PAPR issues are well known with OFDM transmission and are likely to be impacted by power allocation.

Acknowledgments

The authors would like to thank the Walloon Region DGTRE Nanotic-COSMOS project, the FP6 project COOPCOM and the FP7 Network of Excellence NEWCOM++ for their financial support. Parts of this work have been reported in IEEE SCVT 2007, IEEE ICC 2008 and ISWPC 2008.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literature
1.
go back to reference Sendonaris A, Erkip E, Aazhang B: Increasing uplink capacity via user cooperative diversity. Proceedings of the IEEE International Symposium on Information Theory, August 1998 156. Sendonaris A, Erkip E, Aazhang B: Increasing uplink capacity via user cooperative diversity. Proceedings of the IEEE International Symposium on Information Theory, August 1998 156.
2.
go back to reference Sendonaris A, Erkip E, Aazhang B: User cooperation diversity—part I: system description. IEEE Transactions on Communications 2003, 51(11):1927-1938. 10.1109/TCOMM.2003.818096CrossRef Sendonaris A, Erkip E, Aazhang B: User cooperation diversity—part I: system description. IEEE Transactions on Communications 2003, 51(11):1927-1938. 10.1109/TCOMM.2003.818096CrossRef
3.
go back to reference Sendonaris A, Erkip E, Aazhang B: User cooperation diversity—part II: implementation aspects and performance analysis. IEEE Transactions on Communications 2003, 51(11):1939-1948. 10.1109/TCOMM.2003.819238CrossRef Sendonaris A, Erkip E, Aazhang B: User cooperation diversity—part II: implementation aspects and performance analysis. IEEE Transactions on Communications 2003, 51(11):1939-1948. 10.1109/TCOMM.2003.819238CrossRef
4.
go back to reference Cover TM, El-Gamal AA: Capacity theorems for the relay channel. IEEE Transactions on Information Theory 1979, 25(5):572-584. 10.1109/TIT.1979.1056084MATHMathSciNetCrossRef Cover TM, El-Gamal AA: Capacity theorems for the relay channel. IEEE Transactions on Information Theory 1979, 25(5):572-584. 10.1109/TIT.1979.1056084MATHMathSciNetCrossRef
5.
go back to reference Kramer G, Gastpar M, Gupta P: Cooperative strategies and capacity theorems for relay networks. IEEE Transactions on Information Theory 2005, 51(9):3037-3063. 10.1109/TIT.2005.853304MATHMathSciNetCrossRef Kramer G, Gastpar M, Gupta P: Cooperative strategies and capacity theorems for relay networks. IEEE Transactions on Information Theory 2005, 51(9):3037-3063. 10.1109/TIT.2005.853304MATHMathSciNetCrossRef
6.
go back to reference Ng TC-Y, Yu W: Joint optimization of relay strategies and resource allocations in cooperative cellular networks. IEEE Journal on Selected Areas in Communications 2007, 25(2):328-339.CrossRef Ng TC-Y, Yu W: Joint optimization of relay strategies and resource allocations in cooperative cellular networks. IEEE Journal on Selected Areas in Communications 2007, 25(2):328-339.CrossRef
7.
go back to reference Hammerstrom I, Wittneben A: On the optimal power allocation for nonregenerative OFDM relay links. Proceedings of the IEEE International Conference on Communications, 2006 10: 4463-4468. Hammerstrom I, Wittneben A: On the optimal power allocation for nonregenerative OFDM relay links. Proceedings of the IEEE International Conference on Communications, 2006 10: 4463-4468.
8.
go back to reference Ying W, Xin-Chun Q, Tong W, Bao-Ling L: Power allocation and subcarrier pairing algorithm for regenerative OFDM relay system. Proceedings of the 65th IEEE Vehicular Technology Conference (VTC '07), 2007 2727-2731. Ying W, Xin-Chun Q, Tong W, Bao-Ling L: Power allocation and subcarrier pairing algorithm for regenerative OFDM relay system. Proceedings of the 65th IEEE Vehicular Technology Conference (VTC '07), 2007 2727-2731.
9.
go back to reference Gui B, Cimini LJ Jr.: Bit loading algorithms for cooperative OFDM systems. Proceedings of the IEEE Military Communications Conference (MILCOM '07), October 2007 1-7. Gui B, Cimini LJ Jr.: Bit loading algorithms for cooperative OFDM systems. Proceedings of the IEEE Military Communications Conference (MILCOM '07), October 2007 1-7.
10.
go back to reference Ma Y, Yi N, Tafazolli R: Bit and power loading for OFDM-based three-node relaying communications. IEEE Transactions on Signal Processing 2008, 56(7):3236-3247.MathSciNetCrossRef Ma Y, Yi N, Tafazolli R: Bit and power loading for OFDM-based three-node relaying communications. IEEE Transactions on Signal Processing 2008, 56(7):3236-3247.MathSciNetCrossRef
11.
go back to reference Sartenaer T, Louveaux J, Vandendorpe L: Balanced capacity of wireline multiple access channels with individual power constraints. IEEE Transactions on Communications 2008, 56(6):925-936.CrossRef Sartenaer T, Louveaux J, Vandendorpe L: Balanced capacity of wireline multiple access channels with individual power constraints. IEEE Transactions on Communications 2008, 56(6):925-936.CrossRef
12.
go back to reference Cheng RS, Verdu S: Gaussian multiaccess channels with ISI: capacity region and multiuser water-filling. IEEE Transactions on Information Theory 1993, 39(3):773-785. 10.1109/18.256487MATHMathSciNetCrossRef Cheng RS, Verdu S: Gaussian multiaccess channels with ISI: capacity region and multiuser water-filling. IEEE Transactions on Information Theory 1993, 39(3):773-785. 10.1109/18.256487MATHMathSciNetCrossRef
13.
go back to reference Laneman JN, Tse DNC, Wornell GW: Cooperative diversity in wireless networks: efficient protocols and outage behaviour. IEEE Transactions on Information Theory 2004, 50: 3062-3080. 10.1109/TIT.2004.838089MATHMathSciNetCrossRef Laneman JN, Tse DNC, Wornell GW: Cooperative diversity in wireless networks: efficient protocols and outage behaviour. IEEE Transactions on Information Theory 2004, 50: 3062-3080. 10.1109/TIT.2004.838089MATHMathSciNetCrossRef
14.
go back to reference Boyd S, Vandenberghe L: Convex Optimization. Cambridge University Press, Cambridge, UK; 2004.MATHCrossRef Boyd S, Vandenberghe L: Convex Optimization. Cambridge University Press, Cambridge, UK; 2004.MATHCrossRef
15.
go back to reference Louveaux J, Torrea R, Vandendorpe L: Efficient algorithm for optimal power allocation in OFDM transmission with relaying. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '08), May 2008, Las Vegas, Calif, USA 3257-3260. Louveaux J, Torrea R, Vandendorpe L: Efficient algorithm for optimal power allocation in OFDM transmission with relaying. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '08), May 2008, Las Vegas, Calif, USA 3257-3260.
Metadata
Title
Rate-Optimized Power Allocation for DF-Relayed OFDM Transmission under Sum and Individual Power Constraints
Authors
Luc Vandendorpe
Jérôme Louveaux
Onur Oguz
Abdellatif Zaidi
Publication date
01-12-2009
Publisher
Springer International Publishing
DOI
https://doi.org/10.1155/2009/814278

Other articles of this Issue 1/2009

EURASIP Journal on Wireless Communications and Networking 1/2009 Go to the issue

Premium Partner