Skip to main content
Top
Published in: EURASIP Journal on Wireless Communications and Networking 1/2010

Open Access 01-12-2010 | Research Article

The Performance of Network Coding at the Physical Layer with Imperfect Self-Information Removal

Authors: Haris Gacanin, Fumiyuki Adachi

Published in: EURASIP Journal on Wireless Communications and Networking | Issue 1/2010

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Network capacity for bidirectional communication between pairs of wireless end users assisted by a relay terminal can be improved by network coding at the physical layer (PNC). Narrowband analog network coding (ANC) was introduced as a simpler implementation of PNC in a flat (i.e., frequency-nonselective fading) channel. Recently, broadband ANC has been studied for communication over a frequency-selective fading channel. In ANC, the end user removes its own information from the received signal before detecting the data of the other user. Clearly, the network performance of ANC scheme depends on the self-information removal at the destination terminal. In this paper, we discuss the impact of imperfect self-information removal on the performance of broadband ANC in terms of the bit error rate (BER) and achievable throughput in a frequency-selective fading channel. The theoretical minimum mean square error (MMSE) equalization weight for ANC based on single carrier with frequency domain equalization (SC-FDE) radio access is derived by taking into account the self-interference. We have used analysis and computer simulation to evaluate how the imperfect removal of self-information influences the achievable BER and throughput.

1. Introduction

Next generation wireless communication networks are expected to provide gigabit ubiquitous access and coverage over a large area for wireless users. To enable gigabit broadband services for wireless end-users, a higher capacity is required. Direct application of network coding [1] in a wireless relaying [2] at the physical layer increases the capacity of bi-directional communication in a flat (i.e., frequency-nonselective) fading channel (called bi-directional amplification of the throughput (BAT-relaying) in [3] and physical layer network coding (PNC) in [4]). The analog network coding (ANC) proposed in [5] is essentially another variation of BAT-relaying and PNC schemes in a flat fading channel with a simpler implementation. Recently, broadband ANC based on orthogonal frequency division multiplexing (OFDM) and single carrier with frequency domain equalization (SC-FDE) was investigated in a multipath (i.e., frequency-selective) fading channel [6].
In the ANC scheme, communication is done in two stages; in the first stage both users transmit their signals to the relay, while in the second stage the relay broadcasts the received signal. At the destination terminal, the self-information is removed from the received signal before data detection. Naturally the network performance of ANC scheme highly depends on the self-information removal at the destination terminal. Self-information removal accuracy can be degraded due to several factors such as imperfect frame synchronization, carrier frequency offset, and imperfect knowledge of channel state information. Early studies [36] considered perfect self-information removal at the destination terminal. Therefore, an important question is "How much does the imperfect self-information removal affect the performance of ANC scheme?" To the best of authors knowledge, this effect has not been evaluated in the literature yet.
This paper investigates the performance of bi-directional ANC with imperfect self-information removal based on OFDM and SC-FDE radio access in a frequency-selective fading channel. The performance metrics of practical interest are (i) the bit error rate (BER) and (ii) throughput. The achievable performance with imperfect self-information removal is evaluated by analysis and computer simulation. We develop a theoretical model to take into consideration a random nature of self-interference due to imperfect self-information removal. The theoretical MMSE weight for SC-FDE is derived by taking into account the self-interference. The theoretical expressions are derived based on the Gaussian approximation of both the residual inter-symbol interference (ISI) after equalization and the self-interference due to imperfect self-information removal.
The remainder of this paper is organized as follows. Section 2 explains the network model. In Section 3, we present the theoretical performance with imperfect self-information removal. Numerical and computer simulation results are presented in Section 4. Section 5 concludes the paper.

2. Network Model

This section firstly presents bi-directional ANC based on OFDM and SC-FDE radio access, and then we present a theoretical model for random self-interference due to imperfect self-information removal.

2.1. Broadband ANC Scheme

A two-way relay network with the users https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq1_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq2_HTML.gif and the relay https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq3_HTML.gif is illustrated in Figure 1. We assume that coverage area of terminals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq4_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq5_HTML.gif includes relay terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq6_HTML.gif while they are out of each other's transmission range due to solid obstacles as illustrated in Figure 1. Each terminal is equipped with an omnidirectional antenna, and the communication takes place in two stages as summarized in Table 1. During the first stage, terminals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq7_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq8_HTML.gif transmit simultaneously. During the second stage, the relay broadcast the received signal to both terminals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq9_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq10_HTML.gif using an amplify-and-forward network protocol [7].
Table 1
Network protocol.
First stage
Second stage
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq11_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq12_HTML.gif
Information bit sequence of length https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq13_HTML.gif is channel coded, bit interleaved, and mapped into the data-modulated symbols using quadrature phase-shift keying (QPSK) modulation scheme. The terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq14_HTML.gif data-modulated sequence is divided into https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq15_HTML.gif -symbol blocks https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq16_HTML.gif ; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq17_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq18_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq19_HTML.gif =1, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq20_HTML.gif denotes the ensemble average. Henceforth, the frame index https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq21_HTML.gif is omitted without loss of generality. We consider two radio access schemes for bi-directional ANC: (i) OFDM and (ii) SC-FDE. In the case of SC radio access, the transmit signal is given by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq22_HTML.gif , while in the case of OFDM signaling, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq23_HTML.gif is fed to an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq24_HTML.gif -point inverse fast Fourier transform (IFFT) to generate the OFDM signal. After insertion of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq25_HTML.gif -sample cyclic prefix into the guard interval (GI), the signal is transmitted over a frequency-selective fading channel.
The signal propagates through the channel with a discrete-time channel impulse response https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq26_HTML.gif given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_Equ1_HTML.gif
(1)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq27_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq28_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq29_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq30_HTML.gif denote the number of paths, the path gain between the terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq31_HTML.gif and relay at stage https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq32_HTML.gif (=1,2), the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq33_HTML.gif th path time delay normalized by IFFT sampling period, and the delta function, respectively. Without loss of generality, we assume that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq34_HTML.gif and that the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq35_HTML.gif th path time delay is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq36_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq37_HTML.gif defines the separation between adjacent paths.
Stage I
The signals transmitted from both terminals are superimposed in the wireless channel and reach the relay simultaneously. In this paper, we assume ideal synchronization and also assume no path loss and shadowing loss. It should be noted that the assumptions of no path loss and shadowing loss do not change our general conclusion.
The signal received at the relay terminal in the frequency domain can be represented as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_Equ2_HTML.gif
(2)
for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq38_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq39_HTML.gif (= https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq40_HTML.gif ), https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq41_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq42_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq43_HTML.gif , respectively, denote the transmit signal power, the Fourier transforms of the terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq44_HTML.gif transmit signal, the channel gain between https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq45_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq46_HTML.gif , and the additive white Gaussian noise (AWGN) at the relay with power spectral density https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq47_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq48_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq49_HTML.gif denote the data-modulated symbol energy and the sampling interval of IFFT. The received signal at the relay is amplified and broadcasted to both destination terminals.
Stage II
At the terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq50_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq51_HTML.gif -point FFT is applied to decompose the received signal into https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq52_HTML.gif frequency components represented by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_Equ3_HTML.gif
(3)
for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq53_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq54_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq55_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq56_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq57_HTML.gif denote the Fourier transforms of the relay transmitted signal, the channel gain between https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq58_HTML.gif and terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq59_HTML.gif , and the additive white Gaussian noise (AWGN) with power spectral density https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq60_HTML.gif at the terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq61_HTML.gif , respectively.

2.2. Self-Information Removal

The terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq62_HTML.gif removes its self-information from the received signal. However, the self-information removal is not perfect, and hence, the self interference is present. Since an exact analysis of self interference is quite difficult if not impossible, we introduce a simplified model to include the random interference resulting from, for example, imperfect channel estimation as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_Equ4_HTML.gif
(4)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq63_HTML.gif denotes the SC- or OFDM-transmitted signal of the terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq64_HTML.gif (i.e., https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq65_HTML.gif in case of OFDM and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq66_HTML.gif for SC-FDE). In (4), https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq67_HTML.gif , where the error term https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq68_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq69_HTML.gif ) is assumed to be independent zero mean complex Gaussian random variable [8]. Thus, we can rewrite (4) as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_Equ5_HTML.gif
(5)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq70_HTML.gif denotes the random self interference due to imperfect channel estimation given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_Equ6_HTML.gif
(6)
For the given channel gains https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq71_HTML.gif , the products https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq72_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq73_HTML.gif are also assumed to be independent complex Gaussian random variables. On the other hand, the cross term https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq74_HTML.gif is not a Gaussian variable. However, most of the time, the term https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq75_HTML.gif is much smaller than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq76_HTML.gif and therefore can be neglected. As a consequence, the self interference https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq77_HTML.gif behaves as a complex Gaussian random variable with the variance given as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq78_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq79_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq80_HTML.gif denotes the root mean square (rms) estimation error, which reflects the degree of imperfect self-information removal due to estimation error at the destination end. The case with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq81_HTML.gif represents the perfect self-information removal case. We note here that the self interference also may be caused by imperfect synchronization, carrier frequency offset, and so forth, in addition to the imperfect channel estimation, but their analysis is out of the scope of this work.

2.3. FDE

One-tap equalization is applied in the frequency domain to combat the channel impairments as presented below. The equalized signal can be represented as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_Equ7_HTML.gif
(7)
for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq82_HTML.gif , where the equalization weight at the terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq83_HTML.gif is given by (8) at the top of the next page. We note here that the theoretical MMSE equalization weight for SC-FDE is derived to take into consideration the random interference due to imperfect self-information removal (see the appendix).
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_Equ8_HTML.gif
(8)
In the case of SC-FDE transmission, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq84_HTML.gif -point IFFT is applied to (7) to obtain decision variables for data detection, while for OFDM case, (7) denotes the decision variables. Finally, the log-likelihood ratio (LLR) is computed, and de-interleaving followed by Viterbi decoding is carried out.

3. Performance Analysis

In this section, we first present the conditional signal-to-interference plus noise ratio (SINR) taking into account imperfect self-information removal. Later the conditional BER and throughput expressions are presented. We note here that the derivation of closed form BER and throughput expressions with imperfect self-information removal is very difficult if not impossible due to the presence of the residual ISI after FDE and self interference term in (11). We assume that the relay normalizes received signal (2) by the factor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq85_HTML.gif which represents its noise variance. This will not alter the signal-to-noise ratio (SNR) but will assist theoretical derivations.

3.1. Decision Variables with Imperfect Self-Information Removal

Using (2) through (6), the decision variables at the terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq86_HTML.gif after equalization can be expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_Equ9_HTML.gif
(9)
where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_Equ10_HTML.gif
(10)
with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq87_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq88_HTML.gif . In (9), https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq89_HTML.gif in the case of OFDM while https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq90_HTML.gif for SC-FDE radio access. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq91_HTML.gif denotes the total interference (i.e., the residual ISI after equalization plus random self interference due to imperfect self-information removal) given by (11) at the top of the next page. We note here that in the case of OFDM the ISI is eliminated by the insertion of the cyclic prefix within the GI.
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_Equ11_HTML.gif
(11)
It can be seen from (11) that the residual ISI is a weighted sum of a large number of independent and identically distributed (i.i.d.) data-modulated symbols as shown by summation in (11). The Gaussian approximation of the residual ISI remains valid only if the number of ISI components is large and if they are i.i.d. so that the central limit theorem can be considered. This is true for OFDM and SC-FDE when the IFFT/FFT size is large enough. Thus, we assume that the residual ISI after FDE, for SC-FDE, can be approximated as a complex-valued random Gaussian variable. Consequently, since the self interference due to imperfect self-information removal can be approximated as a complex-valued random Gaussian variable (see Section 2.2), the sum of the residual ISI, the self interference, and AWGN can be treated as a new complex-valued random Gaussian noise with variance https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq92_HTML.gif given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_Equ12_HTML.gif
(12)
It can be seen from (9) that the OFDM (SC-FDE) equalized (IFFT) output can be seen as a random variable with mean https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq93_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq94_HTML.gif ). Using (9) and (12), the conditional signal-to-interference plus noise ratio (SINR) https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq95_HTML.gif at the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq96_HTML.gif th terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq97_HTML.gif is represented by (13).
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_Equ13_HTML.gif
(13)

3.2. BER and Throughput Analysis for Uncoded System

We assume QPSK data modulation with all "1" transmission without loss of generality. The conditional BER at the terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq98_HTML.gif is given by [8]
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_Equ14_HTML.gif
(14)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq99_HTML.gif and erfc https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq100_HTML.gif denote the given average signal energy per symbol-to-AWGN power spectrum density ratio and the complementary error function, respectively. We define the packet length of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq101_HTML.gif bits. Using (14), the conditional packet error rate (PER) at the terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq102_HTML.gif can be expressed by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_Equ15_HTML.gif
(15)
The average PER at terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq103_HTML.gif can be numerically evaluated by averaging the conditional PER (15) over all possible realizations of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq104_HTML.gif ; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq105_HTML.gif as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_Equ16_HTML.gif
(16)
Finally, the achievable throughput https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq106_HTML.gif at terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq107_HTML.gif is given as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_Equ17_HTML.gif
(17)
which is the theoretical throughput achievable by selective repeat ARQ, where the transmission is done using a packet of 2 OFDM symbols (i.e., two https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq108_HTML.gif -sample IFFT blocks).
The evaluation of the throughput is done by Monte-Carlo numerical computation method as follows. First, a set of channel gains https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq109_HTML.gif ; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq110_HTML.gif is generated as a Fourier transform of the corresponding channel impulse response given by (1). Then, the equalization weight https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq111_HTML.gif ; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq112_HTML.gif is computed for each of the source terminals [6]. Secondly, the conditional BER is computed using (14) for the given set of channel gains https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq113_HTML.gif for the given https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq114_HTML.gif . Then, the average PER is computed using (16) to obtain the achievable throughput by evaluating (17).

4. Results and Discussions

Numerical and computer simulation parameters are summarized in Table 2. In our numerical evaluation and computer simulation, we assume https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq115_HTML.gif , GI length of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq116_HTML.gif samples, and ideal coherent QPSK data modulation and demodulation. The information bit sequence length is taken to be 1024 bits. For channel coding, we apply https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq117_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq118_HTML.gif convolutional encoder [9] with coding rate 1/2 and constraint length 3 (each new frame state of the encoder is initialized before transmission). 2048-bit random interleaver is used as channel interleaver. At the receiver, a hard decision Viterbi decoder is applied. The propagation channel is an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq119_HTML.gif -path block Rayleigh fading channel having the uniform power delay profile, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq120_HTML.gif ; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq121_HTML.gif are zero mean independent complex variables with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq122_HTML.gif . The normalized Doppler frequency https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq123_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq124_HTML.gif is the transmission symbol rate, is assumed (under this assumption, the path gains can be considered to remain almost constant over a packet of 1024 information bits and vary packet-by-packet). We assume that the maximum time delay of the channel is less than the GI length (i.e., https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq125_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq126_HTML.gif ) and that all paths in any channel are independent of each other. In this paper, we do not consider geometry, and thus, we assume neither shadowing nor path loss.
Table 2
Simulation parameters.
Transmitter
Data modulation
QPSK
 
Block/IFFT size
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq127_HTML.gif =256
 
GI
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq128_HTML.gif
Channel
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq129_HTML.gif -path block Rayleigh fading with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq130_HTML.gif
Receiver
FDE
MMSE, ZF
 
Channel estimation
Ideal

4.1. BER

We perform computer simulation to evaluate the uncoded and coded BER of broadband ANC as a function of the cancelation factor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq131_HTML.gif with the average signal energy per bit-to-AWGN power spectrum density ratio https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq132_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq133_HTML.gif ) as a parameter being illustrated in Figures 2 and 3. The uncoded BER is evaluated by both numerical computation using (14) and computer simulation, while the coded BER is measured by computer simulation.
It can be seen from the figure that in a lower https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq137_HTML.gif region, impact of imperfect self-information removal is negligible; for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq138_HTML.gif and 5 dB, the BER performance slightly degrades as the cancelation coefficient https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq139_HTML.gif increases. On the other side, for a higher https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq140_HTML.gif , the BER performance is severely affected by imperfect self-information removal. For example, if 10 times increase of the BER performance is allowable in comparison with the perfect self-information removal (i.e., https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq141_HTML.gif = 0) case, it is required to cancel 96% of self-information ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq142_HTML.gif = 0.04 in Figure 2) for uncoded OFDM case, while SC-FDE radio access is more sensitive to self-information removal since more than 99% of cancelation is required to allow only 10 times performance degradation. It can be seen from the figure that more self-interference is allowed in the lower https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq143_HTML.gif region to achieve the same performance degradation.
In the case of channel coding illustrated in Figure 3, a higher resistance to imperfect self-information removal due to channel coding gain is observed; a lower percentage of cancelation is required to allow 10 times performance degradation in comparison with the uncoded case. Note that, the BER of broadband ANC based on SC-FDE is lower in comparison with OFDM radio access due to the frequency diversity gain obtained through MMSE-FDE. However, the BER performance between their coded performances is significantly reduced since OFDM system achieves the frequency diversity gain through channel decoding. In this paper, we assume simple convolutional encoding and hard decision Viterbi decoding, which provides a relatively small coding gain. Much larger coding gain can be obtained with soft decision decoding or state-of-the-art channel coding techniques such as turbo codes and low-density parity check codes.

4.2. Throughput

The achievable throughput of broadband ANC as a function of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq144_HTML.gif is illustrated in Figure 5 for (i) uncoded and (ii) coded cases. The uncoded case is numerically evaluated by (17). Throughput in the coded case is evaluated by measuring the BER by computer simulation. Then, the PER is computed using (16) assuming that the bit errors after decoding are random, and finally, we compute the throughput using (17). In the uncoded case, the achievable throughput of broadband ANC using SC-FDE is higher than that using OFDM. This is because SC-FDE is able to exploit the channel frequency selectivity and obtain frequency diversity gain. However, the OFDM system achieves the frequency diversity gain through channel decoding. The performance difference between coded SC-FDE and coded OFDM is significantly reduced. In this paper, we assumed the hard decision decoding; however, the use of soft decision decoding provides better throughput.
Next, we discuss the impact of self-information removal on the achievable throughput. We perform computer simulation to evaluate the achievable throughput of broadband ANC as a function of the cancelation factor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq146_HTML.gif as illustrated in Figure 5. It can be seen from the figure that channel coding provides a better resistance to imperfect self-information removal in comparison with the uncoded case.

5. Conclusion

In this paper, we discussed the impact of imperfect self-information removal on the BER and achievable throughput of bi-directional ANC based on OFDM and SC-FDE radio access in a frequency-selective fading channel. The performance is evaluated by analysis and computer simulation. The theoretical MMSE equalization weight for SC-FDE is derived by taking into account the self interference due to imperfect self-information removal. Our results show that the allowable performance degradation in comparison with the perfect self-information removal case highly depends on the level of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq147_HTML.gif for both uncoded and coded performances. In the case of channel coding, due to coding gain, a lower percentage of self-information cancelation is required to allow the same performance degradation in comparison with uncoded case. It was also shown that broadband ANC based on SC-FDE is more sensitive to imperfect self-information removal in comparison with OFDM signaling radio access.
The self interference may be caused by different factors such as imperfect synchronization, carrier frequency offset, in addition to channel estimation error, but the analysis taking into account their full impact on the performance is very difficult. This is left as an interesting future work.

Appendix

The equalization weight for SC-FDE signaling, which takes into consideration the random self interference due to imperfect self-information removal, is chosen to minimize the mean square error (MSE) between https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq148_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq149_HTML.gif at the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq150_HTML.gif th frequency as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq151_HTML.gif . Substituting (5) into (7), the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq152_HTML.gif term can be expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_Equ18_HTML.gif
(A1)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq153_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq154_HTML.gif denote the zero mean and independent identically distributed (i.i.d.) complex Gaussian variable with variance https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq155_HTML.gif . Since data symbols are independent, that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq156_HTML.gif , we obtain https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq157_HTML.gif . After the expectation with respect to the noise and self interference components, we obtain
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_Equ19_HTML.gif
(A2)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq158_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq159_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq160_HTML.gif denotes the real part of the complex number https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq161_HTML.gif . By solving https://static-content.springer.com/image/art%3A10.1155%2F2010%2F659291/MediaObjects/13638_2009_Article_1985_IEq162_HTML.gif , we obtain the equalization weight given by (8).
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literature
1.
go back to reference Yeung RW: Multilevel diversity coding with distortion. IEEE Transactions on Information Theory 1995, 41(2):412-422. 10.1109/18.370142CrossRefMATH Yeung RW: Multilevel diversity coding with distortion. IEEE Transactions on Information Theory 1995, 41(2):412-422. 10.1109/18.370142CrossRefMATH
2.
go back to reference Ahlswede R, Cai N, Li S-YR, Yeung RW: Network information flow. IEEE Transactions on Information Theory 2000, 46(4):1204-1216. 10.1109/18.850663MathSciNetCrossRefMATH Ahlswede R, Cai N, Li S-YR, Yeung RW: Network information flow. IEEE Transactions on Information Theory 2000, 46(4):1204-1216. 10.1109/18.850663MathSciNetCrossRefMATH
3.
go back to reference Popovski P, Yomo H: Bi-directional amplification of throughput in a wireless multi-hop network. Proceedings of the 63rd IEEE Vehicular Technology Conference (VTC '06), May 2006, Melbourne, Australia Popovski P, Yomo H: Bi-directional amplification of throughput in a wireless multi-hop network. Proceedings of the 63rd IEEE Vehicular Technology Conference (VTC '06), May 2006, Melbourne, Australia
4.
go back to reference Zhang S, Liew SC, Lam P: Hot topic: physical-layer network coding. Proceedings of the 12th Annual International Conference on Mobile Computing and Networking (MOBICOM '06), September 2006, Los Angelos, Calif, USA 358-365.CrossRef Zhang S, Liew SC, Lam P: Hot topic: physical-layer network coding. Proceedings of the 12th Annual International Conference on Mobile Computing and Networking (MOBICOM '06), September 2006, Los Angelos, Calif, USA 358-365.CrossRef
5.
go back to reference Katti S, Gollakota S, Katabi D: Embracing wireless interference: analog network coding. Proceedings of the ACM SIGCOM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 2007, Kyoto, Japan 397-408. Katti S, Gollakota S, Katabi D: Embracing wireless interference: analog network coding. Proceedings of the ACM SIGCOM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 2007, Kyoto, Japan 397-408.
6.
go back to reference Gacanin H, Adachi F: Broadband analog network coding. IEEE Transactions on Wireless Communications 2010, 9(5):1577-1583.CrossRef Gacanin H, Adachi F: Broadband analog network coding. IEEE Transactions on Wireless Communications 2010, 9(5):1577-1583.CrossRef
7.
go back to reference Laneman JN, Tse DNC, Wornell GW: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Transactions on Information Theory 2004, 50(12):3062-3080. 10.1109/TIT.2004.838089MathSciNetCrossRefMATH Laneman JN, Tse DNC, Wornell GW: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Transactions on Information Theory 2004, 50(12):3062-3080. 10.1109/TIT.2004.838089MathSciNetCrossRefMATH
8.
go back to reference Proakis JG: Digital Communications. 3rd edition. McGraw-Hill, New York, NY, USA; 1995. Proakis JG: Digital Communications. 3rd edition. McGraw-Hill, New York, NY, USA; 1995.
9.
go back to reference Lin S, Costello DJ: Error Control Coding: Fundamentals and Aplications. Prentice Hall, Upper Saddle River, NJ, USA; 1983. Lin S, Costello DJ: Error Control Coding: Fundamentals and Aplications. Prentice Hall, Upper Saddle River, NJ, USA; 1983.
Metadata
Title
The Performance of Network Coding at the Physical Layer with Imperfect Self-Information Removal
Authors
Haris Gacanin
Fumiyuki Adachi
Publication date
01-12-2010
Publisher
Springer International Publishing
DOI
https://doi.org/10.1155/2010/659291

Other articles of this Issue 1/2010

EURASIP Journal on Wireless Communications and Networking 1/2010 Go to the issue

Premium Partner