Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2009

Open Access 01.12.2009 | Research Article

End-to-End Joint Antenna Selection Strategy and Distributed Compress and Forward Strategy for Relay Channels

verfasst von: Rahul Vaze, Robert W. Heath Jr.

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2009

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Multihop relay channels use multiple relay stages, each with multiple relay nodes, to facilitate communication between a source and destination. Previously, distributed space-time codes were proposed to maximize the achievable diversity-multiplexing tradeoff; however, they fail to achieve all the points of the optimal diversity-multiplexing tradeoff. In the presence of a low-rate feedback link from the destination to each relay stage and the source, this paper proposes an end-to-end antenna selection (EEAS) strategy as an alternative to distributed space-time codes. The EEAS strategy uses a subset of antennas of each relay stage for transmission of the source signal to the destination with amplifying and forwarding at each relay stage. The subsets are chosen such that they maximize the end-to-end mutual information at the destination. The EEAS strategy achieves the corner points of the optimal diversity-multiplexing tradeoff (corresponding to maximum diversity gain and maximum multiplexing gain) and achieves better diversity gain at intermediate values of multiplexing gain, versus the best-known distributed space-time coding strategies. A distributed compress and forward (CF) strategy is also proposed to achieve all points of the optimal diversity-multiplexing tradeoff for a two-hop relay channel with multiple relay nodes.

1. Introduction

Finding optimal transmission strategies for wireless ad-hoc networks in terms of capacity, reliability, diversity-multiplexing (DM) tradeoff [1], or delay has been a long standing open problem. The multi-hop relay channel is an important building block of wireless ad-hoc networks. In a multi-hop relay channel, the source uses multiple relay nodes to communicate with a single destination. An important first step in finding optimal transmission strategies for the wireless ad-hoc networks is to find optimal transmission strategies for the multi-hop relay channel.
In this paper, we focus on the design of transmission strategies to achieve the optimal DM-tradeoff of the multi-hop relay channel. The DM-tradeoff [1] characterizes the maximum achievable reliability (diversity gain) for a given rate of increase of transmission rate (multiplexing gain), with increasing signal-to-noise ratio (SNR). The DM-tradeoff curve is characterized by a set of points, where each point is a two-tuple whose first coordinate is the multiplexing gain and the second coordinate is the maximum diversity gain achievable at that multiplexing gain. We consider a multi-hop relay channel, where a source uses https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq1_HTML.gif relay stages to communicate with its destination, and each relay stage is assumed to have one or more relay nodes. Relay nodes are assumed to be full-duplex. Under these assumptions we find and characterize multi-hop relay strategies that achieve the DM-tradeoff curve (in the two hop case) or come close to the optimum DM-tradeoff curve while outperforming prior work (with more than two hops).
In prior work there have been many different transmit strategies proposed to achieve the optimal DM-tradeoff of the multi-hop relay channel, such as distributed space time block codes (DSTBCs) [217], or relay selection [2, 3, 1823]. The best known DSTBCs [14, 15] achieve the corner points of the optimal DM-tradeoff of the multi-hop relay channel, corresponding to the maximum diversity gain and maximum multiplexing gain, however, fail to achieve the optimal DM-tradeoff for intermediate values of multiplexing gain. Moreover, with DSTBCs [14, 15] the encoding and decoding complexity can be quite large. Antenna selection (AS) or relay selection (RS) strategies have been designed to achieve only the maximum diversity gain point of the optimal DM-tradeoff when a small amount of feedback is available from the destination for a two-hop relay channel in [2, 3, 1823], and for a multi-hop relay channel in [24]. RS is also used for routing in multi-hop networks [2527] to leverage path diversity gain. The primary advantages of AS and RS strategies over DSTBCs are that they require a minimal number of active antennas and reduce the encoding and decoding complexity compared to DSTBCs. The only strategy that is known to achieve all points of the optimal DM-tradeoff is the compress and forward (CF) strategy [28], but that is limited to a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq2_HTML.gif -hop relay channel with a single relay node.
In this paper we design an end-to-end antenna selection (EEAS) strategy to maximize the achievable diversity gain for a given multiplexing gain in a multi-hop relay channel. The EEAS strategy chooses a subset of antennas from each relay stage that maximize the mutual information at the destination. The proposed EEAS strategy is an extension of the EEAS strategy proposed in [24], where only a single antenna of each relay stage was used for transmission. The proposed EEAS strategy is shown to achieve the corner points of the optimal DM-tradeoff corresponding to maximum diversity gain and maximum multiplexing gain. For intermediate values of multiplexing gains, the achievable DM-tradeoff of the EEAS strategy does not meet with an upper bound on the DM-tradeoff, but outperforms the achievable DM-tradeoff of the best known DSTBCs [15]. Other advantages of the proposed EEAS strategy over DSTBCs [14, 15] include lower bit error rates due to less noise accumulation at the destination, reduced decoding complexity, and lesser latency. We assume that the destination has the channel state information (CSI) for all the channels in the receive mode. Using the CSI, the destination performs subset selection, and using a low rate feedback link feedbacks the index of the antennas to be used by the source and each relay stage.
Even though our EEAS strategy performs better than the best known DSTBCs [14, 15], it fails to achieve all points of the optimal DM-tradeoff. To overcome this limitation, we propose a distributed CF strategy to achieve all points of the optimal DM-tradeoff of a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq3_HTML.gif -hop relay channel with multiple relay nodes. Previously, the CF strategy of [29] was shown to achieve all points of the optimal DM-tradeoff of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq4_HTML.gif -hop relay channel with a single relay node in [28]. The result of [28], however, does not extend for more than one relay node. With our distributed CF strategy, each relay transmits a compressed version of the received signal using Wyner-Ziv coding [30] without decoding any other relay's message. The destination first decodes the relay signals and then uses the decoded relay messages to decode the source message.
Our distributed strategy is a special case of the distributed CF strategy proposed in [31], where relays perform partial decoding of other relay messages and then use distributed compression to send their signals to the destination. With partial decoding, the achievable rate expression is quite complicated [31], and it is hard to compute the SNR exponent of the outage probability. To simplify the achievable rate expression, we consider a special case of the CF strategy [31] where no relay decodes any other relay's message. Consequently, the derivation for the SNR exponent of the outage probability is simplified, and we show that the special case of CF strategy [31] is sufficient to achieve the optimal DM-tradeoff for a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq5_HTML.gif -hop relay channel with multiple relays.
Organization
The rest of the paper is organized as follows. In Section 2, we describe the system model for the multi-hop relay channel and summarize the key assumptions. We review the diversity multiplexing (DM-) tradeoff for multiple antenna channels in Section 3 and obtain an upper bound on the DM-tradeoff of multi-hop relay channel. In Section 4 our EEAS strategy for the multi-hop relay channel is described, and its DM-tradeoff is computed. In Section 5 we describe our distributed CF strategy and show that it can achieve the optimal DM-tradeoff of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq6_HTML.gif -hop relay channel with any number of relay nodes. Final conclusions are made in Section 6.
Notation 1.
We denote by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq7_HTML.gif a matrix, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq8_HTML.gif a vector, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq9_HTML.gif the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq10_HTML.gif element of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq11_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq12_HTML.gif denotes the transpose conjugate of matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq13_HTML.gif . The maximum and minimum eigenvalue of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq14_HTML.gif is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq15_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq16_HTML.gif , respectively. The determinant and trace of matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq17_HTML.gif is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq18_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq19_HTML.gif . The field of real and complex numbers is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq20_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq21_HTML.gif , respectively. The set of natural numbers is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq22_HTML.gif . The set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq23_HTML.gif is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq24_HTML.gif . The set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq25_HTML.gif denotes the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq26_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq27_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq28_HTML.gif denotes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq29_HTML.gif . The space of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq30_HTML.gif matrices with complex entries is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq31_HTML.gif . The Euclidean norm of a vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq32_HTML.gif is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq33_HTML.gif . The https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq34_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq35_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq36_HTML.gif represent the transpose and the transpose conjugate. The cardinality of a set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq37_HTML.gif is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq38_HTML.gif . The expectation of function https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq39_HTML.gif with respect to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq40_HTML.gif is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq41_HTML.gif . A circularly symmetric complex Gaussian random variable https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq42_HTML.gif with zero mean and variance https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq43_HTML.gif is denoted as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq44_HTML.gif . We use the symbol https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq45_HTML.gif to represent exponential equality, that is, let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq46_HTML.gif be a function of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq47_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq48_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq49_HTML.gif , and similarly https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq50_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq51_HTML.gif denote the exponential less than or equal to and greater than or equal to relation, respectively. To define a variable we use the symbol https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq52_HTML.gif .

2. System Model

We consider a multi-hop relay channel where a source terminal with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq53_HTML.gif antennas wants to communicate with a destination terminal with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq54_HTML.gif antennas via https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq55_HTML.gif stages of relays as shown in Figure 1. The https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq56_HTML.gif th relay stage has https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq57_HTML.gif relays and, the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq58_HTML.gif th relay of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq59_HTML.gif th stage has https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq60_HTML.gif antennas https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq61_HTML.gif . The total number of antennas in the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq62_HTML.gif th relay stage is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq63_HTML.gif . In Section 5 we consider a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq64_HTML.gif -hop relay channel with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq65_HTML.gif relay nodes, where the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq66_HTML.gif relay has https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq67_HTML.gif antennas and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq68_HTML.gif . We assume that the relays do not generate their own data, and each relay stage has an average power constraint of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq69_HTML.gif . We assume that the relay nodes are synchronized at the frame level. To keep the relay functionality and relaying strategy simple we do not allow relay nodes to cooperate among themselves. For Section 4 we assume that there is no direct path between the source and the destination, but we relax this assumption in Section 5 for the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq70_HTML.gif -hop relay channel. The absence of the direct path is a reasonable assumption for the case when relay stages are used for coverage improvement, and the signal strength on the direct path is very weak. We also assume that relay stages are chosen in such a way that all the relay nodes of any two adjacent relay stages are connected to each other, and there is no direct path between relay stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq71_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq72_HTML.gif . This assumption is reasonable for the case when successive relay stages appear in increasing order of distance from the source toward the destination, and any two relay nodes are chosen to lie in adjacent relay stages if they have sufficiently good SNR between them. In any practical setting there will be interference received at any relay node of stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq73_HTML.gif because of the signals transmitted from relay nodes of relay stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq74_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq75_HTML.gif . Due to relatively large distances between nonadjacent relay stages, however, this interference is quite small and we account for that in the additive noise term. The system model is similar to the fully connected layered network with intralayer links [15] and more general than the directed multi-hop relay channel model of [14]. We consider the full-duplex multi-hop relay channel, where each relay node can transmit and receive at the same time.
As shown in Figure 1, the channel matrix between the subset https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq77_HTML.gif of antennas of stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq78_HTML.gif and the subset https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq79_HTML.gif of antennas of stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq80_HTML.gif is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq81_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq82_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq83_HTML.gif . Stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq84_HTML.gif represents the source and stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq85_HTML.gif the destination.
In Section 5, we only consider a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq86_HTML.gif -hop relay channel and denote the channel matrix between the source and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq87_HTML.gif th relay by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq88_HTML.gif and between the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq89_HTML.gif th relay and destination by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq90_HTML.gif . The channel between the source and destination is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq91_HTML.gif and the channel matrix between relay https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq92_HTML.gif and relay https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq93_HTML.gif by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq94_HTML.gif .
We assume that the CSI is known only at the destination, and none of the relays have any CSI, that is, the destination knows https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq95_HTML.gif . For Section 5, we assume that the destination knows https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq96_HTML.gif , and the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq97_HTML.gif th relay node knows https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq98_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq99_HTML.gif . We assume that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq100_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq101_HTML.gif have independent and identically distributed (i.i.d.) https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq102_HTML.gif entries for all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq103_HTML.gif to model the channel as Rayleigh fading with uncorrelated transmit and receive antennas. We assume that all these channels are frequency flat, block fading channels, where the channel coefficients remain constant in a block of time duration https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq104_HTML.gif and change independently from block to block.

3. Problem Formulation

We consider the design of transmission strategies to achieve the DM-tradeoff of the multi-hop relay channel. In the next subsection we briefly review the DM-tradeoff [1] for point-to-point channels and obtain an upper bound on the DM-tradeoff of the multi-hop relay channel.
Review of the DM-Tradeoff: following [1], let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq105_HTML.gif be a family of codes, one for each https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq106_HTML.gif . The multiplexing gain of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq107_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq108_HTML.gif if the data rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq109_HTML.gif of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq110_HTML.gif scales is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq111_HTML.gif with respect to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq112_HTML.gif , that is,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ1_HTML.gif
(1)
Then the diversity gain https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq113_HTML.gif is defined as the rate of fall of probability of error https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq114_HTML.gif of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq115_HTML.gif with respect to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq116_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ2_HTML.gif
(2)
The exponent https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq117_HTML.gif is called the diversity gain at rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq118_HTML.gif , and the curve joining https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq119_HTML.gif for different values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq120_HTML.gif characterizes the DM-tradeoff. The DM-tradeoff for a point-to-point multi antenna channel with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq121_HTML.gif transmit and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq122_HTML.gif antennas has been computed in [1] by first showing that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq123_HTML.gif and then computing the exponent https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq124_HTML.gif , where
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ3_HTML.gif
(3)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq125_HTML.gif , for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq126_HTML.gif .
Next, we present an upper bound on the DM-tradeoff of the multi-hop relay channel obtained in [14].
Lemma 1 (see [14]).
The DM-tradeoff curve of the multi-hop relay channel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq127_HTML.gif is upper bounded by the piecewise linear function connecting the points https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq128_HTML.gif where
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ4_HTML.gif
(4)
for each https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq129_HTML.gif .
The upper bound on the DM-tradeoff of multi-hop relay channel is obtained by using the cut-set bound [32] and allowing all relays in each relay stage to cooperate. Using the cut-set bound it follows that the mutual information between the source and the destination cannot be more than the mutual information between the source and any relay stage or between any two relay stages. Moreover, by noting the fact that mutual information between any two relays stages is upper bounded by the maximum mutual information of a point-to-point MIMO channel with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq130_HTML.gif transmit and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq131_HTML.gif receive antennas, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq132_HTML.gif , then the result follows from (3).
In the next section we propose an EEAS strategy for the multi-hop relay channel and compute its DM-tradeoff. We will show that the achievable DM-tradeoff of the EEAS strategy meets the upper bound at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq133_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq134_HTML.gif .

4. Joint End-to-End Multiple Antenna Selection Strategy

In this section we propose a joint end-to-end multiple antenna selection strategy (JEEMAS) for the multi-hop relay channel and compute its DM-tradeoff. In the JEEMAS strategy, a fixed number https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq135_HTML.gif of antennas are chosen from each relay stage to forward the signal towards the destination using amplify and forward (AF). Before introducing our JEEMAS strategy and analyzing its DM-tradeoff, we need the following definitions and Lemma 2.
Definition 1.
Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq136_HTML.gif be a subset of antennas of stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq137_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq138_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq139_HTML.gif be the edge joining the set of antennas https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq140_HTML.gif of stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq141_HTML.gif to the set of antennas https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq142_HTML.gif of stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq143_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq144_HTML.gif . Then a path in a multi-hop relay channel is defined as the sequence of edges https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq145_HTML.gif .
Definition 2.
Two paths https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq146_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq147_HTML.gif are called independent if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq148_HTML.gif .
In the next lemma we compute the maximum number of independent paths in a multi-hop relay channel.
Lemma 2.
The maximum number of independent paths in a multi-hop relay channel is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ5_HTML.gif
(5)
Proof.
Follows directly from [24, Theorem 3] by replacing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq149_HTML.gif by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq150_HTML.gif .
Now we are ready to describe our JEEMAS strategy for the full-duplex multi-hop relay channel. To transmit the signal from the source to the destination, a single path in a multi-hop relay channel is used for communication. How to choose that path is described in the following. Let the chosen path for the transmission be https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq151_HTML.gif . Then the signal is transmitted from the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq152_HTML.gif subset of antennas of the source and is relayed through https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq153_HTML.gif subset of antennas of relay stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq154_HTML.gif and decoded by the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq155_HTML.gif subset of antennas of the destination. Each antenna on the chosen path uses an AF strategy to forward the signal to the next relay stage, that is, each antenna of stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq156_HTML.gif on the chosen path transmits the received signal after multiplying by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq157_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq158_HTML.gif is chosen to satisfy an average power constraint https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq159_HTML.gif across https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq160_HTML.gif antennas of stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq161_HTML.gif .
Therefore with AF by each antenna subset on the chosen path, the received signal at the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq162_HTML.gif subset of antennas of the destination at time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq163_HTML.gif of a multi-hop relay channel is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ6_HTML.gif
(6)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq164_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq165_HTML.gif are functions of channel coefficients https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq166_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq167_HTML.gif ensures that the power constraint at each stage is met, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq168_HTML.gif is a function of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq169_HTML.gif 's, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq170_HTML.gif is the complex Gaussian noise with zero mean and unit variance added at stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq171_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq172_HTML.gif . Since the destination has the CSI, accumulated noise https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq173_HTML.gif is white and Gaussian distributed. From hereon in this paper we assume that the accumulated noise at the destination for all the multi-hop relay channels is white Gaussian distributed without explicitly mentioning it. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq174_HTML.gif be the covariance matrix of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq175_HTML.gif , then by multiplying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq176_HTML.gif to the received signal we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ7_HTML.gif
(7)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq177_HTML.gif is a matrix with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq178_HTML.gif entries. Note that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq179_HTML.gif is a function of channel coefficients https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq180_HTML.gif .
We propose to use successive decoding at the destination with the JEEMAS strategy, similar to [24]. With successive decoding, the destination tries to decode only https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq181_HTML.gif at time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq182_HTML.gif assuming that all the symbols https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq183_HTML.gif have been decoded correctly. Assuming that at time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq184_HTML.gif all the symbols https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq185_HTML.gif have been decoded correctly, the received signal (7) can be written as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ8_HTML.gif
(8)
since the channel coefficients https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq186_HTML.gif are known at the destination. Let the probability of error in decoding https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq187_HTML.gif from (8) be https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq188_HTML.gif , then the probability of error https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq189_HTML.gif in decoding https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq190_HTML.gif from (7) with successive decoding https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq191_HTML.gif is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ9_HTML.gif
(9)
where the last equality follows from [24].
From (8) it is clear that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq192_HTML.gif is the same for any https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq193_HTML.gif , since the channel coefficients https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq194_HTML.gif do not change for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq195_HTML.gif time instants. Therefore without loss of generality we compute an upper bound on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq196_HTML.gif to upper bound https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq197_HTML.gif . Next, we describe our JEEMAS strategy and compute an upper bound on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq198_HTML.gif of the JEEMAS strategy to evaluate its DM-tradeoff. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq199_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq200_HTML.gif , then the mutual information of path https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq201_HTML.gif is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ10_HTML.gif
(10)
Then the JEEMAS strategy chooses the path that maximizes the mutual information at the destination, that is, it chooses path https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq202_HTML.gif , if
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ11_HTML.gif
(11)
Thus defining https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq203_HTML.gif , the mutual information of the chosen path is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ12_HTML.gif
(12)
Since we assumed that the destination of the multi-hop relay channel has CSI for all the channels in the receive mode, this optimization can be done at the destination, and using a feedback link, the source and each relay stage can be informed about the index of antennas to use for transmission. Next, we evaluate the DM-tradeoff of the JEEMAS strategy by finding the exponent of the outage probability (8).
From [1] we know that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq204_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq205_HTML.gif is the outage probability of (8). Therefore it is sufficient to compute an upper bound on the outage probability of (8) to upper bound https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq206_HTML.gif . With the proposed EEAS strategy, the outage probability of (8) can be written as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ13_HTML.gif
(13)
From [14, 15] https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq207_HTML.gif can be dropped from the DM-tradeoff analysis without changing the outage exponent, since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq208_HTML.gif [14], that is, the maximum or the minimum eigenvalue of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq209_HTML.gif does not scale with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq210_HTML.gif . Thus,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ14_HTML.gif
(14)
We first compute the DM-tradeoff of the JEEMAS strategy for the case when there exists https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq211_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq212_HTML.gif , and then for the general case.
If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq213_HTML.gif , then by Lemma 2, the total number of independent paths in a multi-hop relay channel is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq214_HTML.gif . Thus,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ15_HTML.gif
(15)
since from (14) https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq215_HTML.gif for any https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq216_HTML.gif .
From [14]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ16_HTML.gif
(16)
where
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ17_HTML.gif
(17)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq217_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq218_HTML.gif . Thus, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq219_HTML.gif , and the DM-tradeoff of the JEEMAS strategy is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ18_HTML.gif
(18)
For the general case when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq220_HTML.gif , let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq221_HTML.gif , for some https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq222_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq223_HTML.gif . Then partition the multi-hop relay channel into two parts, the first partition https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq224_HTML.gif containing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq225_HTML.gif antennas of each stage, such that the chosen set of antennas by the JEEMAS strategy https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq226_HTML.gif , and the second partition https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq227_HTML.gif containing the rest https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq228_HTML.gif antennas of each stage. By reordering the index of antennas, without loss of generality, let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq229_HTML.gif contain antennas https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq230_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq231_HTML.gif of each relay stage, and let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq232_HTML.gif contain antennas https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq233_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq234_HTML.gif of stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq235_HTML.gif . Recall that the JEEMAS strategy chooses those https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq236_HTML.gif antennas of each stage that have the maximum mutual information at the destination. Thus,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ19_HTML.gif
(19)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq237_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq238_HTML.gif is the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq239_HTML.gif channel matrix between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq240_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq241_HTML.gif antennas of stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq242_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq243_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq244_HTML.gif antennas of stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq245_HTML.gif . Note that the channel coefficients in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq246_HTML.gif are not independent of the channel coefficients in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq247_HTML.gif , and therefore we cannot write https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq248_HTML.gif as the product of
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ20_HTML.gif
(20)
To circumvent this problem, let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq249_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq250_HTML.gif is the channel matrix between the last https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq251_HTML.gif antennas of stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq252_HTML.gif and the last https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq253_HTML.gif antennas of stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq254_HTML.gif of partition https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq255_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq256_HTML.gif is the channel matrix between the last https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq257_HTML.gif antennas of stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq258_HTML.gif and the last https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq259_HTML.gif antennas of stage https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq260_HTML.gif of partition https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq261_HTML.gif . Basically we pick https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq262_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq263_HTML.gif antennas alternatively, note that use of more antennas increases the mutual information of the channel, and consequently reduces the outage probability. Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq264_HTML.gif uses a subset of antennas of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq265_HTML.gif , therefore from (19),
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ21_HTML.gif
(21)
Since the channel coefficients in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq266_HTML.gif are independent of the channel coefficients of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq267_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ22_HTML.gif
(22)
Therefore,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ23_HTML.gif
(23)
since the number of independent paths in partition https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq268_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq269_HTML.gif .
From [14], https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq270_HTML.gif where
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ24_HTML.gif
(24)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq271_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq272_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq273_HTML.gif is the nondecreasing ordered version of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq274_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq275_HTML.gif . Thus,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ25_HTML.gif
(25)
Therefore, using (16), the DM-tradeoff of the JEEMAS strategy is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ26_HTML.gif
(26)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq276_HTML.gif .
Recall that in the JEEMAS strategy the design parameter is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq277_HTML.gif , the number of antennas to use from each stage. To obtain the best lower bound on the DM-tradeoff of JEEMAS strategy one needs to find out the optimal value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq278_HTML.gif . From (26), it follows that using a single antenna https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq279_HTML.gif , maximum diversity gain point can be achieved. Similarly, choosing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq280_HTML.gif , the maximum multiplexing gain point can also be achieved. For intermediate values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq281_HTML.gif , however, it is not apriori clear what value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq282_HTML.gif maximizes the diversity gain. After tedious computations it turns out that choosing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq283_HTML.gif provides with the best achievable DM-tradeoff for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq284_HTML.gif . Thus, we propose a hybrid JEEMAS strategy, where for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq285_HTML.gif use https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq286_HTML.gif , and for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq287_HTML.gif use https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq288_HTML.gif . Our approach is similar to [15], where for each https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq289_HTML.gif an optimal partition of the multi-hop relay channel is found by solving an optimization problem. We compare the achievable DM-tradeoff of our hybrid JEEMAS strategy and the strategy of [15] for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq290_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq291_HTML.gif in Figures 2 and 3.
For the case when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq292_HTML.gif , the achievable DM-tradeoff of our hybrid JEEMAS strategy matches with that of the partitioning strategy of [15]. For the case when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq293_HTML.gif , however, it is difficult to compare the hybrid JEEMAS strategy with the strategy of [15] in terms of achievable DM-tradeoff, since an optimization problem has to be solved for the strategy of [15]. For a particular example of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq294_HTML.gif the hybrid JEEMAS strategy outperforms the strategy of [15] as illustrated in Figure 3. Moreover, in [15] a new partition is required for each https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq295_HTML.gif , in contrast to our strategy, which has only two modes of operation, one for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq296_HTML.gif and the other for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq297_HTML.gif .
The following remarks are in order.
Remark 1.
Recall that we assumed that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq298_HTML.gif , that is, equal number of antennas are selected at each relay stage. The justification of this assumption is as follows. Let us assume that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq299_HTML.gif antennas are used from each relay stage. Now assume that all relay stages are using the same number of antennas https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq300_HTML.gif , except https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq301_HTML.gif , which is using https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq302_HTML.gif antennas, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq303_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq304_HTML.gif . Using (26), it can be shown that the achievable DM-tradeoff with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq305_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq306_HTML.gif is a subset of the union of the achievable DM-tradeoff with using https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq307_HTML.gif (all relay stages using https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq308_HTML.gif antennas), and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq309_HTML.gif (all relay stages using https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq310_HTML.gif antennas). Thus, it is sufficient to consider same number of antennas from each relay stage. It turns out, however, that different values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq311_HTML.gif provide with different achievable DM-tradeoff's because of the different number of independent paths in the multi-hop relay channel. To optimize over all possible values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq312_HTML.gif we keep https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq313_HTML.gif as a variable and choose https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq314_HTML.gif to obtain the best achievable DM-tradeoff.
Remark 2.
Using the DM-tradeoff analysis of the JEEMAS strategy, we can obtain the DM-tradeoff of an antenna selection strategy for the point-to-point MIMO channel by considering a multi-hop relay channel with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq315_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq316_HTML.gif transmit, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq317_HTML.gif receive antennas such that ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq318_HTML.gif ). Surprisingly we could not find this result in literature and provide it here for completeness sake. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq319_HTML.gif , and the transmitter uses https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq320_HTML.gif antennas out of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq321_HTML.gif antennas that have maximum mutual information at the destination, then the DM-tradeoff is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ27_HTML.gif
(27)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq322_HTML.gif . The proof follows directly from (26).
Remark 3 (CSI Requirement).
With the proposed hybrid JEEMAS strategy, the destination needs to feedback the index of the path with the maximum mutual information to the source and each stage. Recall from the derivation of the achievable DM-tradeoff of the JEEMAS strategy that only https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq323_HTML.gif paths in a multi-hop relay channel are independent, and control the achievable DM-tradeoff for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq324_HTML.gif . Thus, the destination only needs to feedback the index of the best path among https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq325_HTML.gif independent paths with the maximum mutual information. Consequently the destination only needs to know CSI for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq326_HTML.gif paths. For the case when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq327_HTML.gif , we need to consider one more path from partition https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq328_HTML.gif corresponding to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq329_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq330_HTML.gif antennas of alternate relay stages. Thus, the CSI overhead is moderate for the proposed EEAS strategy.
Remark 4 (Feedback Overhead).
As explained in Remark 3, to obtain the achievable DM-tradeoff of the hybrid JEEMAS strategy it is sufficient to consider any one set of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq331_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq332_HTML.gif independent paths. Let the destination choose a particular set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq333_HTML.gif of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq334_HTML.gif independent paths. Then each relay node knows on which of the paths of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq335_HTML.gif it lies, and depending on the index of the element of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq336_HTML.gif from the destination, it knows whether to transmit or remain silent. Thus, only https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq337_HTML.gif bits of feedback is required from the destination to the source and each stage. Therefore the feedback overhead with the proposed EEAS strategy is quite small and can be realized with a very low-rate feedback link.
Discussion
In this section we proposed a hybrid JEEMAS strategy that has two modes of operation, one for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq338_HTML.gif , where it uses a single antenna of each stage, and the other for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq339_HTML.gif , that uses https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq340_HTML.gif antennas of each stage. The proposed strategy is shown to achieve both the corner points of the optimal DM-tradeoff curve, corresponding to the maximum diversity gain and the maximum multiplexing gain. For intermediate values of multiplexing gain, the diversity gain of our strategy is quite close to that of the upper bound. Even though our strategy does not meet the upper bound, we show that it outperforms the best known DSTBC strategy [15] with smaller complexity and possess several advantages over DSTBCs as described in [24]. In the next section we propose a distributed CF strategy to achieve the optimal DM-tradeoff of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq341_HTML.gif -hop relay channel.

5. Distributed CF Strategy for 2-hop Relay Channel

In this section we consider a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq342_HTML.gif -hop relay channel with multiple relay nodes in the presence of a direct path between the source and the destination. For this https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq343_HTML.gif -hop relay channel we propose a distributed compress and forward (CF) strategy to achieve the optimal DM-tradeoff. The signal model for this section is as follows. We consider a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq344_HTML.gif -hop relay channel with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq345_HTML.gif relay nodes, where the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq346_HTML.gif relay has https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq347_HTML.gif antennas, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq348_HTML.gif . The source and destination are assumed to have https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq349_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq350_HTML.gif antennas, respectively. We assume that the source and each relay have an average power constraint of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq351_HTML.gif . Different transmit power constraints do not change the DM-tradeoff. Let the signal transmitted from the source be https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq352_HTML.gif , and from the relay node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq353_HTML.gif let it be https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq354_HTML.gif , respectively. Then,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ28_HTML.gif
(28)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq355_HTML.gif is the received signal at the destination, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq356_HTML.gif is the signal received at relay https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq357_HTML.gif .
Previously in [28], the CF strategy of [29] has been shown to achieve the optimal DM-tradeoff of a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq358_HTML.gif -hop relay channel with a single relay node ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq359_HTML.gif ) in the presence of direct path between the source and the destination. The result of [28], however, does not generalize to the case of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq360_HTML.gif -hop relay channel with multiple relay nodes. The problem with multiple relay nodes is unsolved, since how multiple relay nodes should cooperate among themselves to help the destination to decode the source message is hard to characterize. A compress and forward (CF) strategy for a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq361_HTML.gif -hop relay channel with multiple relay nodes has been proposed in [31], which involves partial decoding of other relays messages at each relay and transmission of correlated information from different relay nodes to the destination using distributed source coding. The achievable rate expression obtained in [31], however, is quite complicated and cannot be computed easily in closed form.
The achievable rate expression of the CF strategy [31] is complicated because each relay node partially decodes all other relay messages. Partial decoding introduces auxillary random variables which are hard to optimize over. To allow analytical tractability, we simplify the strategy of [31] as follows. In our strategy each relay compresses the received signal from the source using Wyner-Ziv coding similar to [31], but without any partial decoding of any other relay's message. The compressed message is then transmitted to the destination using the strategy of transmitting correlated messages over a multiple access channel [33]. Our strategy is a special case of CF strategy [31], since in our case the relays perform no partial decoding. Consequently our strategy leads to a smaller achievable rate compared to [31]. The biggest advantage of our strategy, however, is its easily computable achievable rate expression and its sufficiency in achieving the optimal DM-tradeoff as shown in the sequel. We refer to our strategy as distributed CF from hereon in the paper. Even though the relays do not perform any partial decoding in the distributed CF strategy, in the sequel we show that they still provide the destination with enough information about the source message to achieve the optimal DM-tradeoff. Before describing our distributed CF strategy and showing its optimality in achieving the optimal DM-tradeoff, we present an upper bound on the DM-tradeoff of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq362_HTML.gif -hop relay channel.
Lemma 3 (see [14]).
The DM-tradeoff of a two-way relay channel is upper bounded by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ29_HTML.gif
(29)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq363_HTML.gif .
Proof.
Let us assume that all the relay nodes and the destination are colocated and can cooperate perfectly. This assumption can only improve https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq364_HTML.gif . In this case, the communication model from the source to destination is a point to point MIMO channel with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq365_HTML.gif transmit antennas and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq366_HTML.gif receive antennas. The DM-tradeoff of this MIMO channel is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq367_HTML.gif , and since this point to point MIMO channel is better than our original https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq368_HTML.gif -hop relay channel, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq369_HTML.gif . Next, we assume that the source is co-located with all the relay nodes and can cooperate perfectly for transmission to the destination. This setting is equivalent to a MIMO channel with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq370_HTML.gif transmit and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq371_HTML.gif receive antenna with DM-tradeoff https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq372_HTML.gif . Again, this point to point MIMO channel is better than our original https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq373_HTML.gif -hop relay channel and hence https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq374_HTML.gif , which completes the proof.
To achieve this upper bound we propose the following distributed CF strategy. Let the rate of transmission from source to destination be https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq375_HTML.gif . Then the source generates https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq376_HTML.gif independent and identically distributed https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq377_HTML.gif according to distribution https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq378_HTML.gif . Label them https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq379_HTML.gif . The codebook generation, the relay compression, and transmission remain the same as in [31], expect that no relay node decodes any other relay's codewords, that is, no partial decoding at any relay node. Relay node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq380_HTML.gif generates https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq381_HTML.gif independent and identically distributed https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq382_HTML.gif according to distribution https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq383_HTML.gif and labels them https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq384_HTML.gif , and for each https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq385_HTML.gif generates https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq386_HTML.gif 's, each with probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq387_HTML.gif . Label these https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq388_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq389_HTML.gif and randomly partition the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq390_HTML.gif into https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq391_HTML.gif cells https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq392_HTML.gif .
Encoding
A Block Markov encoding [29] together with Wyner-Ziv coding [30] is used by each relay. Let in block https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq393_HTML.gif the message sent from the source be https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq394_HTML.gif , then the source sends https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq395_HTML.gif . Let the signal received by relay https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq396_HTML.gif in block https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq397_HTML.gif be https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq398_HTML.gif . Then https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq399_HTML.gif is compressed to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq400_HTML.gif using Wyner-Ziv coding [30] where correlation among https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq401_HTML.gif is exploited. Then relay https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq402_HTML.gif determines the cell index https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq403_HTML.gif in which https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq404_HTML.gif lies and transmits https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq405_HTML.gif in block https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq406_HTML.gif . We consider transmission of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq407_HTML.gif blocks of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq408_HTML.gif symbols each from the source in which https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq409_HTML.gif messages will be sent. Each message is chosen from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq410_HTML.gif . Thus, as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq411_HTML.gif , for fixed https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq412_HTML.gif , rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq413_HTML.gif is arbitrarily close to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq414_HTML.gif [29]. In the first block, the relay has no information about https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq415_HTML.gif necessary for compression. In this case, however, any good sequence allows each relay to start block Markov encoding [29]. In the last block, the source is silent, and only the relays transmit to destination.
Decoding
Backward decoding is employed at the destination. At the end of block https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq416_HTML.gif , the codeword sent by source in block https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq417_HTML.gif is decoded. At the end of block https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq418_HTML.gif , the destination first decodes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq419_HTML.gif for each https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq420_HTML.gif by looking for a jointly typical https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq421_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq422_HTML.gif . If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq423_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq424_HTML.gif can be decoding reliably. Next, given that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq425_HTML.gif 's have been decoded correctly for each https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq426_HTML.gif , the destination tries to find a set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq427_HTML.gif of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq428_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq429_HTML.gif is jointly typical. The destination declares that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq430_HTML.gif were the correctly sent codewords if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq431_HTML.gif . After decoding https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq432_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq433_HTML.gif the destination decodes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq434_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq435_HTML.gif is jointly typical. With this distributed CF strategy,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ30_HTML.gif
(30)
is achievable with the joint probability distribution
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ31_HTML.gif
(31)
subject to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ32_HTML.gif
(32)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq436_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq437_HTML.gif are vectors with elements https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq438_HTML.gif , respectively, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq439_HTML.gif is the vector containing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq440_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq441_HTML.gif is the complement of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq442_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq443_HTML.gif . For more detailed error probability analyses we refer the reader to [31]. In the next theorem we compute the outage exponents for (30) and show that they match with the exponents of the upper bound.
Theorem 1.
CF strategy achieves the DM-tradeoff upper bound (Lemma 3).
Proof.
To prove the theorem we will compute the achievable DM-tradeoff of the CF strategy (30) and show that it matches with the upper bound.
To compute the achievable rates subject to the compression rate constraints for the signal model (28), we fix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq444_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq445_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq446_HTML.gif vector with covariance matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq447_HTML.gif . Also, we choose https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq448_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq449_HTML.gif to be complex Gaussian with covariance matrices https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq450_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq451_HTML.gif , and independent of each other, respectively. Next, we compute the various mutual information expressions to derive the achievable DM-tradeoff of the CF strategy. By the definition of the mutual information,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ33_HTML.gif
(33)
From (28),
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ34_HTML.gif
(34)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq452_HTML.gif is defined as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ35_HTML.gif
(35)
and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq453_HTML.gif . From (28),
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ36_HTML.gif
(36)
which implies
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ37_HTML.gif
(37)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq454_HTML.gif
Next, we compute the values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq455_HTML.gif 's that satisfy the compression rate constraints (32). Note that in (32), we need to satisfy the constraints for each subset https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq456_HTML.gif . Towards that end, first we consider the subsets https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq457_HTML.gif of the form https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq458_HTML.gif and obtain the lower bound on the quantization noise https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq459_HTML.gif needed to satisfy (32), that is not proportional to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq460_HTML.gif for each https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq461_HTML.gif . It is important to note that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq462_HTML.gif should not be proportional to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq463_HTML.gif ; otherwise, from (37) it can be concluded that our distributed CF strategy cannot achieve the optimal DM-tradeoff. In the sequel we will point out how to obtain https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq464_HTML.gif satisfying (32) for all subsets of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq465_HTML.gif .
For https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq466_HTML.gif , from (32), for each relay https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq467_HTML.gif , we need to satisfy
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ38_HTML.gif
(38)
By definition
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ39_HTML.gif
(39)
Similarly,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ40_HTML.gif
(40)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq468_HTML.gif is defined as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ41_HTML.gif
(41)
Similarly,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ42_HTML.gif
(42)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq469_HTML.gif is defined as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ43_HTML.gif
(43)
From (39), (40), and(42), to satisfy the compression rate constraints (38), we need
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ44_HTML.gif
(44)
Note that both sides of (44) are functions of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq470_HTML.gif ; however, the resulting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq471_HTML.gif is not a function of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq472_HTML.gif or SNR similar to [28]. Recall that we have only considered the subsets of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq473_HTML.gif of the form https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq474_HTML.gif . For the rest of the subsets also, we can show that the quantization noise https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq475_HTML.gif required to satisfy (32) is not proportional to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq476_HTML.gif . The analysis follows similarly and is deleted for the sake of brevity. Thus, to satisfy (32), we can take the maximum of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq477_HTML.gif required for each subset https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq478_HTML.gif and use that to analyze the DM-tradeoff. Let the maximum https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq479_HTML.gif required to satisfy (32) be https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq480_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq481_HTML.gif for each subset https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq482_HTML.gif is not proportional to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq483_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq484_HTML.gif is also not proportional to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq485_HTML.gif .
Then, using (30) and (37), we can compute the outage probability of the distributed CF as follows. From [1], to compute https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq486_HTML.gif , it is sufficient to find the negative of the exponent of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq487_HTML.gif of outage probability at the destination, where outage probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq488_HTML.gif is defined as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ45_HTML.gif
(45)
From (30) and (37),
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ46_HTML.gif
(46)
Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq489_HTML.gif . Then choose https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq490_HTML.gif such that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ47_HTML.gif
(47)
It is possible to choose https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq491_HTML.gif 's that satisfy (47), since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq492_HTML.gif is not proportional to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq493_HTML.gif .
Then
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ48_HTML.gif
(48)
where the last equality follows since multiplying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq494_HTML.gif by constant does not change the DM-tradeoff.
From here on we follow [28] to compute the exponent of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq495_HTML.gif .
Let
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ49_HTML.gif
(49)
Then, from (34), https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq496_HTML.gif ; therefore, using [28, Lemma 2], it follows that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ50_HTML.gif
(50)
Therefore, to lower bound the DM-tradeoff we need to find out the outage exponents https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq497_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq498_HTML.gif of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq499_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq500_HTML.gif . Notice that, however, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq501_HTML.gif is the mutual information between the source and the destination by choosing the covariance matrix to be https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq502_HTML.gif and allowing all the relays and the destination to cooperate perfectly. From [1], choice of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq503_HTML.gif as the covariance matrix does not change the optimal DM-tradeoff; therefore, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq504_HTML.gif . Similar argument holds for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq505_HTML.gif , by noting that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq506_HTML.gif is the mutual information between the source and the destination if all the relays and the source were co-located and could cooperate perfectly, while using covariance matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq507_HTML.gif , where
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_Equ51_HTML.gif
(51)
Thus, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq508_HTML.gif . Thus, the achievable DM-tradeoff with CF strategy meets the upper bound (Lemma 3).
Discussion
In this section we proposed a simplified version of the distributed CF strategy of [31] and showed that it can achieve the optimal DM-tradeoff for the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq509_HTML.gif -hop relay channel for any number of relays. In our distributed CF strategy, each relay uses Wyner-Ziv coding to compress the received signal without any partial decoding of other relay messages. After compression, each relay transmits the message to the destination using the strategy for multiple access channel with correlated messages [33], since the relay compressed messages are correlated with each other. Even though the achievable rate with our strategy is smaller than the one obtained in [31] (because of no partial decoding at any relay), we show that it is sufficient to achieve the optimal DM-tradeoff. We prove the result by showing that the exponent of the outage probability of our strategy matches with the upper bound on the optimal DM-tradeoff, without requiring the compression noise constraints to be proportional to the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq510_HTML.gif .
Generalizing our distributed CF strategy is possible for more than 2-hop relay channel; however, computing the exponents of the outage probability of achievable rate and compression rate constraints is a nontrivial problem.

6. Conclusions

In this paper we considered the problem of achieving the optimal DM-tradeoff of the multi-hop relay channel. First, we proposed an antenna selection strategy called JEEMAS, where a subset of antennas of each relay stage is chosen for transmission that has the maximum mutual information at the destination. We showed that the JEEMAS strategy can achieve the maximum diversity gain and the maximum multiplexing gain in a multi-hop relay channel. Then we compared the DM-tradeoff performance of the JEEMAS strategy with the best known DSTBC strategy [15]. We observed that the DM-tradeoff of the JEEMAS is better than the DSTBCs [15], except for the case when the number of antennas at each stage are divisible by the minimum of the antennas across all relay stages, in which case the DM-tradeoffs of JEEMAS and DSTBCs [15] match.
Next, we proposed a distributed CF strategy for the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq511_HTML.gif -hop relay channel with multiple relay nodes and showed that it achieves the optimal DM-tradeoff. Our distributed CF strategy is a special case of the strategy proposed in [31], where the specializations are done to allow analytical tractability. We showed that if each relay transmits a compressed version of the received signal using Wyner-Ziv coding, it is sufficient to achieve the optimal DM-tradeoff. Our distributed CF strategy can be extended to more than https://static-content.springer.com/image/art%3A10.1155%2F2009%2F295418/MediaObjects/13638_2008_Article_1629_IEq512_HTML.gif -hop relay channels; however, computing the outage probability exponents is a non-trivial problem.

Acknowledgment

This work was funded by DARPA through IT-MANET Grant no. W911NF-07-1-0028.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat Zheng L, Tse DNC: Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels. IEEE Transactions on Information Theory 2003, 49(5):1073-1096. 10.1109/TIT.2003.810646MATHCrossRef Zheng L, Tse DNC: Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels. IEEE Transactions on Information Theory 2003, 49(5):1073-1096. 10.1109/TIT.2003.810646MATHCrossRef
2.
Zurück zum Zitat Laneman JN, Wornell GW: Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks. IEEE Transactions on Information Theory 2003, 49(10):2415-2425. 10.1109/TIT.2003.817829MATHMathSciNetCrossRef Laneman JN, Wornell GW: Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks. IEEE Transactions on Information Theory 2003, 49(10):2415-2425. 10.1109/TIT.2003.817829MATHMathSciNetCrossRef
3.
Zurück zum Zitat Laneman JN, Tse DNC, Wornell GW: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Transactions on Information Theory 2004, 50(12):3062-3080. 10.1109/TIT.2004.838089MATHMathSciNetCrossRef Laneman JN, Tse DNC, Wornell GW: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Transactions on Information Theory 2004, 50(12):3062-3080. 10.1109/TIT.2004.838089MATHMathSciNetCrossRef
4.
Zurück zum Zitat Nabar RU, Bolcskei H, Kneubuhler FW: Fading relay channels: performance limits and space-time signal design. IEEE Journal on Selected Areas in Communications 2004, 22(6):1099-1109. 10.1109/JSAC.2004.830922CrossRef Nabar RU, Bolcskei H, Kneubuhler FW: Fading relay channels: performance limits and space-time signal design. IEEE Journal on Selected Areas in Communications 2004, 22(6):1099-1109. 10.1109/JSAC.2004.830922CrossRef
5.
Zurück zum Zitat Jing Y, Hassibi B: Diversity analysis of distributed space-time codes in relay networks with multiple transmit/receive antennas. EURASIP Journal on Advances in Signal Processing 2008., 2008: Jing Y, Hassibi B: Diversity analysis of distributed space-time codes in relay networks with multiple transmit/receive antennas. EURASIP Journal on Advances in Signal Processing 2008., 2008:
6.
Zurück zum Zitat Jing Y, Hassibi B: Distributed space-time coding in wireless relay networks. IEEE Transactions on Wireless Communications 2006, 5(12):3524-3536.CrossRef Jing Y, Hassibi B: Distributed space-time coding in wireless relay networks. IEEE Transactions on Wireless Communications 2006, 5(12):3524-3536.CrossRef
7.
Zurück zum Zitat Yang S, Belfiore J-C: Optimal space-time codes for the MIMO amplify-and-forward cooperative channel. IEEE Transactions on Information Theory 2007, 53(2):647-663.MathSciNetCrossRef Yang S, Belfiore J-C: Optimal space-time codes for the MIMO amplify-and-forward cooperative channel. IEEE Transactions on Information Theory 2007, 53(2):647-663.MathSciNetCrossRef
8.
Zurück zum Zitat Yiu S, Schober R, Lampe L: Distributed space-time block coding for cooperative networks with multiple-antenna nodes. Proceedings of the 1st International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP '05), December 2005 52-55.CrossRef Yiu S, Schober R, Lampe L: Distributed space-time block coding for cooperative networks with multiple-antenna nodes. Proceedings of the 1st International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP '05), December 2005 52-55.CrossRef
9.
Zurück zum Zitat Barbarossa S, Scutari G: Distributed space-time coding strategies for wideband multihop networks: regenerative vs. non-regenerative relays. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '04), May 2004, Montreal, Canada 4: 501-504. Barbarossa S, Scutari G: Distributed space-time coding strategies for wideband multihop networks: regenerative vs. non-regenerative relays. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '04), May 2004, Montreal, Canada 4: 501-504.
10.
Zurück zum Zitat Damen MO, Hammons R Jr.: Distributed space-time codes: relays delays and code word overlays. Proceedings of the International Wireless Communications and Mobile Computing Conference (IWCMC '07), August 2007, Honolulu, Hawaii, USA 354-357. Damen MO, Hammons R Jr.: Distributed space-time codes: relays delays and code word overlays. Proceedings of the International Wireless Communications and Mobile Computing Conference (IWCMC '07), August 2007, Honolulu, Hawaii, USA 354-357.
11.
Zurück zum Zitat Oggier F, Hassibi B: An algebraic family of distributed space-time codes for wireless relay networks. Proceedings of IEEE International Symposium on Information Theory, July 2006 538-541. Oggier F, Hassibi B: An algebraic family of distributed space-time codes for wireless relay networks. Proceedings of IEEE International Symposium on Information Theory, July 2006 538-541.
12.
Zurück zum Zitat Yindi J, Hassibi B: Using orthogonal and quasi-orthogonal designs in wireless relay networks. IEEE Transactions on Information Theory 2007, 53(11):4106-4118.MATHCrossRef Yindi J, Hassibi B: Using orthogonal and quasi-orthogonal designs in wireless relay networks. IEEE Transactions on Information Theory 2007, 53(11):4106-4118.MATHCrossRef
13.
Zurück zum Zitat Jing Y, Jafarkhani H: Network beamforming with channel means and covariances at relays. Proceedings of the IEEE International Conference on Communications (ICC '08), May 2008, Beijing, China 3743-3747. Jing Y, Jafarkhani H: Network beamforming with channel means and covariances at relays. Proceedings of the IEEE International Conference on Communications (ICC '08), May 2008, Beijing, China 3743-3747.
15.
Zurück zum Zitat Sreeram K, Birenjith S, Vijay Kumar P: DMT of multi-hop cooperative networks—part II: half-duplex networks with full-duplex performance. submitted to IEEE Transactions on Information Theory Sreeram K, Birenjith S, Vijay Kumar P: DMT of multi-hop cooperative networks—part II: half-duplex networks with full-duplex performance. submitted to IEEE Transactions on Information Theory
16.
Zurück zum Zitat Vaze R, Heath RW Jr.: Maximizing reliability in multi-hop wireless networks. Proceedings of IEEE International Symposium on Information Theory (ISIT '08), July 2008, Toronto, Canada 11-15. Vaze R, Heath RW Jr.: Maximizing reliability in multi-hop wireless networks. Proceedings of IEEE International Symposium on Information Theory (ISIT '08), July 2008, Toronto, Canada 11-15.
17.
Zurück zum Zitat Oggier F, Hassibi B: Code design for multihop wireless relay networks. EURASIP Journal on Advances in Signal Processing 2008, 2008:-12. Oggier F, Hassibi B: Code design for multihop wireless relay networks. EURASIP Journal on Advances in Signal Processing 2008, 2008:-12.
18.
Zurück zum Zitat Peters SW, Heath RW Jr.: Nonregenerative MIMO Relaying with Optimal Transmit Antenna Selection. IEEE Signal Processing Letters 2008, 15: 421-424.CrossRef Peters SW, Heath RW Jr.: Nonregenerative MIMO Relaying with Optimal Transmit Antenna Selection. IEEE Signal Processing Letters 2008, 15: 421-424.CrossRef
19.
Zurück zum Zitat Bletsas A, Khisti A, Reed DP, Lippman A: A simple cooperative diversity method based on network path selection. IEEE Journal on Selected Areas in Communications 2006, 24(3):659-672.CrossRef Bletsas A, Khisti A, Reed DP, Lippman A: A simple cooperative diversity method based on network path selection. IEEE Journal on Selected Areas in Communications 2006, 24(3):659-672.CrossRef
20.
Zurück zum Zitat Lin Z, Erkip E: Relay search algorithms for coded cooperative systems. Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '05), November-December 2005, St. Louis, Mo, USA 3: 1314-1319. Lin Z, Erkip E: Relay search algorithms for coded cooperative systems. Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '05), November-December 2005, St. Louis, Mo, USA 3: 1314-1319.
21.
Zurück zum Zitat Ibrahim AS, Sadek AK, Su W, Liu KJR: Cooperative communications with relay-selection: when to cooperate and whom to cooperate with? IEEE Transactions on Wireless Communications 2008, 7(7):2814-2827.CrossRef Ibrahim AS, Sadek AK, Su W, Liu KJR: Cooperative communications with relay-selection: when to cooperate and whom to cooperate with? IEEE Transactions on Wireless Communications 2008, 7(7):2814-2827.CrossRef
22.
Zurück zum Zitat Lo CK, Vishwanath S, Heath RW Jr.: Relay subset selection in wireless networks using partial decode-and-forward transmission. submitted to IEEE Transactions on Vehicular Technology Lo CK, Vishwanath S, Heath RW Jr.: Relay subset selection in wireless networks using partial decode-and-forward transmission. submitted to IEEE Transactions on Vehicular Technology
23.
Zurück zum Zitat Tannious R, Nosratinia A: Spectrally-efficient relay selection with limited feedback. IEEE Journal on Selected Areas in Communications 2008, 26(8):1419-1428.CrossRef Tannious R, Nosratinia A: Spectrally-efficient relay selection with limited feedback. IEEE Journal on Selected Areas in Communications 2008, 26(8):1419-1428.CrossRef
24.
Zurück zum Zitat Vaze R, Heath RW Jr.: To Code in Space and Time or Not in a Multi-Hop Relay Channels. IEEE Transactions on Signal Processing 2009, 57: 3736-2747.MathSciNetCrossRef Vaze R, Heath RW Jr.: To Code in Space and Time or Not in a Multi-Hop Relay Channels. IEEE Transactions on Signal Processing 2009, 57: 3736-2747.MathSciNetCrossRef
25.
Zurück zum Zitat Park M, Andrews JG, Nettles SM: Wireless channel-aware ad hoc cross-layer protocol with multi-route path selection diversity. Proceedings of the 58th IEEE Vehicular Technology Conference (VTC '03), October 2003, Orlando, Fla, USA 4: 2197-2201. Park M, Andrews JG, Nettles SM: Wireless channel-aware ad hoc cross-layer protocol with multi-route path selection diversity. Proceedings of the 58th IEEE Vehicular Technology Conference (VTC '03), October 2003, Orlando, Fla, USA 4: 2197-2201.
26.
Zurück zum Zitat Gui B, Dai L, Cimini LJ Jr.: Routing strategies in broadband multihop cooperative networks. Proceedings of the 41st Annual Conference on Information Sciences and Systems (CISS '07), March 2007 661-666. Gui B, Dai L, Cimini LJ Jr.: Routing strategies in broadband multihop cooperative networks. Proceedings of the 41st Annual Conference on Information Sciences and Systems (CISS '07), March 2007 661-666.
27.
Zurück zum Zitat Bohacek S: Performance improvements provided by route diversity in multihop wireless networks. IEEE Transactions on Mobile Computing 2008, 7(3):372-384.CrossRef Bohacek S: Performance improvements provided by route diversity in multihop wireless networks. IEEE Transactions on Mobile Computing 2008, 7(3):372-384.CrossRef
28.
Zurück zum Zitat Yuksel M, Erkip E: Multiple-antenna cooperative wireless systems: a diversity-multiplexing tradeoff perspective. IEEE Transactions on Information Theory 2007, 53(10):3371-3393.MathSciNetCrossRef Yuksel M, Erkip E: Multiple-antenna cooperative wireless systems: a diversity-multiplexing tradeoff perspective. IEEE Transactions on Information Theory 2007, 53(10):3371-3393.MathSciNetCrossRef
29.
Zurück zum Zitat Cover TM, El Gamal AA: Capacity theorems for relay channels. IEEE Transactions on Information Theory 1979, 25(5):572-584. 10.1109/TIT.1979.1056084MATHMathSciNetCrossRef Cover TM, El Gamal AA: Capacity theorems for relay channels. IEEE Transactions on Information Theory 1979, 25(5):572-584. 10.1109/TIT.1979.1056084MATHMathSciNetCrossRef
30.
Zurück zum Zitat Wyner AD, Ziv J: The rate-distortion function for source coding with side information at the decoder. IEEE Transactions on Information Theory 1976, 22(1):1-10. 10.1109/TIT.1976.1055508MATHMathSciNetCrossRef Wyner AD, Ziv J: The rate-distortion function for source coding with side information at the decoder. IEEE Transactions on Information Theory 1976, 22(1):1-10. 10.1109/TIT.1976.1055508MATHMathSciNetCrossRef
31.
Zurück zum Zitat Kramer G, Gastpar M, Gupta P: Cooperative strategies and capacity theorems for relay networks. IEEE Transactions on Information Theory 2005, 51(9):3037-3063. 10.1109/TIT.2005.853304MATHMathSciNetCrossRef Kramer G, Gastpar M, Gupta P: Cooperative strategies and capacity theorems for relay networks. IEEE Transactions on Information Theory 2005, 51(9):3037-3063. 10.1109/TIT.2005.853304MATHMathSciNetCrossRef
32.
Zurück zum Zitat Cover T, Thomas J: Elements of Information Theory. John Wiley & Sons, New York, NY, USA; 2004. Cover T, Thomas J: Elements of Information Theory. John Wiley & Sons, New York, NY, USA; 2004.
33.
Zurück zum Zitat Cover TM, El Gamal AA, Salehi M: Multiple access channels with arbitrarily correlated source. IEEE Transactions on Information Theory 1980, 26(6):648-657. 10.1109/TIT.1980.1056273MATHMathSciNetCrossRef Cover TM, El Gamal AA, Salehi M: Multiple access channels with arbitrarily correlated source. IEEE Transactions on Information Theory 1980, 26(6):648-657. 10.1109/TIT.1980.1056273MATHMathSciNetCrossRef
Metadaten
Titel
End-to-End Joint Antenna Selection Strategy and Distributed Compress and Forward Strategy for Relay Channels
verfasst von
Rahul Vaze
Robert W. Heath Jr.
Publikationsdatum
01.12.2009
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2009/295418

Weitere Artikel der Ausgabe 1/2009

EURASIP Journal on Wireless Communications and Networking 1/2009 Zur Ausgabe