Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2010

Open Access 01.12.2010 | Research Article

Joint Channel-Network Coding for the Gaussian Two-Way Two-Relay Network

verfasst von: Ping Hu, ChiWan Sung, Kenneth W. Shum

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2010

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

New aspects arise when generalizing two-way relay network with one relay to two-way relay network with multiple relays. To study the essential features of the two-way multiple-relay network, we focus on the case of two relays in our work. The problem of how two terminals, equipped with multiple antennas, exchange messages with the help of two relays is studied. Five transmission strategies, namely, amplify-forward (AF), hybrid decode amplify forward (HLC), hybrid decode amplify forward (HMC), decode forward (DF), and partial decode forward (PDF), are proposed. Their designs are based on a variety of techniques including network coding, multiplexed coding, multi-input multi-output transmission, and multiple access with common information. Their performance is compared with the cut-set outer bound. It is shown that there is no dominating strategy and the best strategy depends on the channel conditions. However, by studying their multiplexing gains at high signal-tonoise (SNR) ratio, it is shown that the AF scheme dominates the others in high SNR regime.

1. Introduction

Relay channel, which considers the communication between a source node and a destination with the help of a relay node, was introduced by van der Meulen in [1]. Based on this channel model, Cover and El Gamal developed coding strategies known as decode-forward (DF) and compress-forward (CF) in [2]. These techniques now become standard building blocks for cooperative and relaying networks, which have been extensively studied in the literature (e.g., [3, 4]).
For many applications, communication is inherently two-way. A typical example is the telephone service. In fact, the study of two-way channel is not new and can be traced back to Shannon's work in 1961 [5]. However, the model of two-way relay channel, though natural, did not attract much attention. Recently, probably due to the advent of network coding [6] in the last decade, there is a growing interest in this model. The application of DF and CF to two-way relay channel was considered in [7]. The half-duplex case was studied in [8, 9]. The results in [10] showed that feedback is beneficial only in a two-way transmission. Network coding for the two-way relay channel was studied in [11, 12]. Physical layer network coding based on lattices is considered recently [13], and shown to be within 0.5 bit from the capacity in some special cases [14].
All the aforementioned works are for one relaying node. It is easy to envisage that in real systems, more than one relay can be used. Schein in [15] started the investigation of the network with one source-destination pair and two parallel relays in between. This model was further studied in [16] under the assumption of half-duplex relay operations. For one-way multiple-relay networks in general, cooperative strategies were proposed and studied in [17]. We remark that a notable feature that does not exist in the single-relay case is that the multiple relays can act as a virtual antenna array so that beamforming gain can be reaped at the receiver. In this paper, we follow this line of research and consider two-way communications. Two-relays are assumed, for this simple model already captures the essential features of the more general multiple-relay case. We are interested in knowing how different techniques can be used to construct transmission strategies for the two-way two-relay network and how they perform under different channel conditions. In particular, we apply the idea of network coding to both the physical layer and the network layer. Besides, channel coding techniques for multiple access channel (MAC) and multi-input multi-output (MIMO) channel are also employed. Several transmission strategies are thus constructed and their achievable rate regions are derived.
We remark that the channel model that we consider in this paper is also called the restricted two-way two-relay channel [7]. This means that the signal from a source node depends only on the message to be transmitted, but not on the received signal at the source. Besides, our results are obtained under the half-duplex assumption, which is realistic for practical systems. Each node is assumed to transmit one half of the time and receive during the other half of the time. The performance of our proposed strategies can be further improved if the ratio of transmission time and receiving time is optimized. We do not consider this more general case, since it complicates the analysis but provides no new insights.
This paper is organized as follows. Our network model is described in Section 2. Some basic coding techniques are reviewed in Section 3. Based on these coding techniques, several transmission strategies are devised in Section 4. Their performance at high signal-to-noise ratio regime is analyzed in Section 5. The rate regions of these strategies are compared under some typical channel realizations in Section 6. The conclusion is drawn in Section 7.

2. Channel Model and Notations

The two-way two-relay (TWTR) network consists of four nodes: two terminals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq1_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq2_HTML.gif , and two parallel relays 1 and 2 (see Figure 1). Terminals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq3_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq4_HTML.gif want to exchange messages with the help of the two relays. We assume there is no direct link between the two terminals and between the two-relays. Furthermore, all of the nodes are half-duplex. The total communication time, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq5_HTML.gif , are divided into two stages, each of which consists of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq6_HTML.gif time slots. In the first stage, the terminals send signals and the relays receive. In the second stage, the relays send signals and the terminals receive. The solid arrows in Figure 1 correspond to stage 1 and the dashed arrows correspond to stage 2.
Suppose that terminals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq7_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq8_HTML.gif are equipped with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq9_HTML.gif antennas, whereas each of relays 1 and 2 has only one antenna. For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq10_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq11_HTML.gif , we use https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq12_HTML.gif to denote the transmit signal from node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq13_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq14_HTML.gif to denote independently and identically distributed (i.i.d.) Gaussian noise with distribution https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq15_HTML.gif . The channel is assumed static and the channel gain from node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq16_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq17_HTML.gif is denoted by an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq18_HTML.gif -dimensional column vector https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq19_HTML.gif . We assume channel reciprocity holds so that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq20_HTML.gif = https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq21_HTML.gif . In the first stage, the outputs of the network at time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq22_HTML.gif , are given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ1_HTML.gif
(1)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ2_HTML.gif
(2)
In the second stage, for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq23_HTML.gif , the outputs at the terminal nodes are
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ3_HTML.gif
(3)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ4_HTML.gif
(4)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq24_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq25_HTML.gif is the transmit symbol of relay https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq26_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq27_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq28_HTML.gif is a Gaussian random vector with each component i.i.d according to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq29_HTML.gif . We assume that the link gains https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq30_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq31_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq32_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq33_HTML.gif are time-invariant and known to all nodes. We have the following power constraints in each stage:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ5_HTML.gif
(5)
for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq34_HTML.gif , and
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ6_HTML.gif
(6)
for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq35_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq36_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq37_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq38_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq39_HTML.gif denote the power constraints on terminals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq40_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq41_HTML.gif and relays 1 and 2, respectively.
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq42_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq43_HTML.gif be the data rates of terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq44_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq45_HTML.gif , respectively. In a period consisting of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq46_HTML.gif channel symbols ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq47_HTML.gif symbols for each phase), terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq48_HTML.gif wants to send one of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq49_HTML.gif symbols to terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq50_HTML.gif , and terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq51_HTML.gif wants to send one of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq52_HTML.gif symbols to terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq53_HTML.gif . A https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq54_HTML.gif code for the TWTR network consists of two message sets https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq55_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq56_HTML.gif , two encoding functions
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ7_HTML.gif
(7)
two relay functions
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ8_HTML.gif
(8)
and two decoding functions
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ9_HTML.gif
(9)
For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq57_HTML.gif , terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq58_HTML.gif transmits the codeword https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq59_HTML.gif in stage one, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq60_HTML.gif is the message to be transmitted. For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq61_HTML.gif , relay https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq62_HTML.gif applies the function https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq63_HTML.gif to its received signal and transmits the resulting signal in the second stage. Let the received signals at terminals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq64_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq65_HTML.gif be https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq66_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq67_HTML.gif , respectively. In this paper, we will use a superscript " https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq68_HTML.gif " to indicate a sequence of length https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq69_HTML.gif . So https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq70_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq71_HTML.gif are sequences of length https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq72_HTML.gif , with each component equal to a vector in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq73_HTML.gif . After the second stage, terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq74_HTML.gif decodes the message from the other source node by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq75_HTML.gif . We note that the decoding function https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq76_HTML.gif uses the message from source terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq77_HTML.gif as input as well. We say that a decoding error occurs if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq78_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq79_HTML.gif . The average probability of error is
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ10_HTML.gif
(10)
A rate pair https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq80_HTML.gif is said to be achievable if there exists a sequence of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq81_HTML.gif codes, satisfying the power constraints in (5) and (6), with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq82_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq83_HTML.gif .
Although the terminals are equipped with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq84_HTML.gif antennas, the transmitted signals from the terminals are essentially 2 dimensional. To see this, we observe that the first term in the right hand side of (1), namely, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq85_HTML.gif , is a projection of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq86_HTML.gif in the direction of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq87_HTML.gif . Any signal component of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq88_HTML.gif orthogonal to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq89_HTML.gif will not be picked up by relay 1. Likewise, from (2), we see that any signal component of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq90_HTML.gif orthogonal to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq91_HTML.gif will not be sensed by relay 2. There is no loss of generality, if we assume that the signals transmitted from the terminals take the following form:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ11_HTML.gif
(11)
for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq92_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq93_HTML.gif is an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq94_HTML.gif matrix, and the two components in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq95_HTML.gif represent the projections of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq96_HTML.gif on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq97_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq98_HTML.gif . We consider the 2-dimensional vector https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq99_HTML.gif as the input to the channel at node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq100_HTML.gif . The power constraint in (5) can be written as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ12_HTML.gif
(12)
for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq101_HTML.gif .
Notations
We will treat https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq102_HTML.gif random vectors https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq103_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq104_HTML.gif as input signals at terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq105_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq106_HTML.gif , respectively, and let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq107_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq108_HTML.gif denote their corresponding https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq109_HTML.gif covariance matrices. For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq110_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq111_HTML.gif , let
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ13_HTML.gif
(13)
be the signal to noise ratio of the signal received at relay https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq112_HTML.gif from terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq113_HTML.gif . Shannon's capacity formula is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq114_HTML.gif . Also, for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq115_HTML.gif matrices, we let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq116_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq117_HTML.gif denote the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq118_HTML.gif identity matrix. The reason for the factor of 0.25 before the log function, instead of a factor of 0.5 in the original capacity formula, is due to the fact that the total transmission time is divided into two stages of equal length. All logarithms in this paper are in base 2. The set of non-negative real numbers is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq119_HTML.gif . Gaussian distribution with mean zero and covariance matrix https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq120_HTML.gif is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq121_HTML.gif .

3. Review of Coding Techniques and Capacity Regions from Information Theory

The proposed transmission strategies are based on a host of existing coding techniques and capacity results. A review of them is given in this section.

3.1. Physical-Layer Network Coding

In wireless channel, the channel is inherently additive; the received signal is a linear combination of the transmitted signals. This fact is exploited for the two-way relay channel in [1821]. Consider the following single-antenna two-way network with two sources and one relay in between. There is no direct link between the two sources, and the exchange of data is done via the relay node in the middle. Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq122_HTML.gif be the transmitted signal from source https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq123_HTML.gif , for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq124_HTML.gif . The transmission is divided into two phases. In the first phase, the relay receives
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ14_HTML.gif
(14)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq125_HTML.gif is an additive noise. For simplicity, it is assumed that both link gains from the sources to the relay are equal to one. In the second phase, the relay amplifies the received signal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq126_HTML.gif , and transmits a scaled version https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq127_HTML.gif of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq128_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq129_HTML.gif is a scalar chosen so that the power requirement is met. Since source 1 knows https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq130_HTML.gif , the component https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq131_HTML.gif within the received signal at source 1 can be treated as known interference, and hence be subtracted. Similarly, source 2 can subtract https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq132_HTML.gif from the received signal. Decoding is then based on the signal after interference subtraction.

3.2. Multiplexed Coding

Multiplexed coding [22] is a useful coding technique for multi-user scenarios in which some user knows the message of another user a priori. Consider the two-way relay channel as in the previous paragraph. Node 1 wants to send message https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq133_HTML.gif to node 2 via the relay node, and node 2 wants to send message https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq134_HTML.gif to node 1 via the relay node. For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq135_HTML.gif , let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq136_HTML.gif be the number of bits used to represent message https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq137_HTML.gif . The transmission of the nodes is divided into two phases. In the first phase, the two source nodes transmit. Suppose that the relay node is able to decode https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq138_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq139_HTML.gif . For the encoder at the relay, we generate a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq140_HTML.gif array of codewords. Each codeword is independently drawn according to the Gaussian distribution such that the total power of each codeword is less than or equal to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq141_HTML.gif . In the second phase, the relay node sends the codeword in the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq142_HTML.gif -entry in this array. Suppose that the received signal at source node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq143_HTML.gif is corrupted by additive white Gaussian noise with variance https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq144_HTML.gif , for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq145_HTML.gif . At source 1, since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq146_HTML.gif is known, the decoder knows that one of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq147_HTML.gif codewords in the row corresponding to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq148_HTML.gif had been transmitted. Out of these https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq149_HTML.gif codewords, it then declares the one based on the maximal likelihood criterion. By the channel coding theorem for the point-to-point Gaussian channel, source 1 can decode reliably at a rate of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq150_HTML.gif . Likewise, by considering the columns in the array of codewords, source 2 can decode at a rate of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq151_HTML.gif .
Multiplexed coding can be implemented using concepts from network coding. We assume, without loss of generality, that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq152_HTML.gif . We identify the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq153_HTML.gif possible messages from source node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq154_HTML.gif with the vectors in the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq155_HTML.gif -dimensional vector space over the finite field of size 2, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq156_HTML.gif , and identify the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq157_HTML.gif messages from source node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq158_HTML.gif with a subspace of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq159_HTML.gif of dimension https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq160_HTML.gif , say https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq161_HTML.gif . We generate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq162_HTML.gif Gaussian codewords independently, one for each vector in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq163_HTML.gif . To send messages https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq164_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq165_HTML.gif in the second phase, the relay node transmits the codeword corresponding to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq166_HTML.gif , where the addition is performed using arithmetics in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq167_HTML.gif . The output of the decoder at node 1 is a vector in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq168_HTML.gif . We subtract from it the vector in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq169_HTML.gif corresponding to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq170_HTML.gif . If there is no decoding error, this gives the codeword corresponding to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq171_HTML.gif , and the value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq172_HTML.gif is recovered.
Now let us consider node 2. Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq173_HTML.gif is known a priori, node 2 is certain that the signal transmitted from the relay is associated with one of the vectors in the affine space https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq174_HTML.gif . The message https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq175_HTML.gif can be estimated by comparing the likelihood function of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq176_HTML.gif codewords associated with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq177_HTML.gif . It can be seen that the maximal data rate is the same as in the array approach mentioned in the previous paragraph, but the size of the codebook at the relay reduces from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq178_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq179_HTML.gif .

3.3. Capacity Region for MIMO Channel

Consider a MIMO channel with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq180_HTML.gif transmit antennas and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq181_HTML.gif receive antennas, with the link gain matrix denoted by a real https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq182_HTML.gif matrix https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq183_HTML.gif . The channel output equals
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ15_HTML.gif
(15)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq184_HTML.gif is the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq185_HTML.gif -dimensional channel input and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq186_HTML.gif is an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq187_HTML.gif -dimensional zero-mean colored Gaussian noise vector with covariance matrix https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq188_HTML.gif . Without loss of information, we whiten the noise by pre-multiplying both sides of (15) by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq189_HTML.gif . The transformed channel output is thus
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ16_HTML.gif
(16)
The covariance matrix of the noise vector https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq190_HTML.gif is now the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq191_HTML.gif identity matrix. By the capacity formula for MIMO channel with white Gaussian noise [23], the capacity for the MIMO channel in (15) is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ17_HTML.gif
(17)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq192_HTML.gif denotes the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq193_HTML.gif covariance matrix of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq194_HTML.gif . Using the identity
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ18_HTML.gif
(18)
which holds for any https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq195_HTML.gif matrix https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq196_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq197_HTML.gif matrix https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq198_HTML.gif , we rewrite (17) as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ19_HTML.gif
(19)

3.4. Capacity Region for Multiple-Access Channel (MAC)

The channel output of the two-user single-antenna Gaussian multiple-access channel is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ20_HTML.gif
(20)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq199_HTML.gif is the signal from user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq200_HTML.gif , for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq201_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq202_HTML.gif is an additive white Gaussian noise with variance https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq203_HTML.gif . Each of the two users wants to send some bits to the common receiver. Suppose that the power of user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq204_HTML.gif is limited to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq205_HTML.gif , for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq206_HTML.gif . The rate pair https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq207_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq208_HTML.gif is the data rate of user https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq209_HTML.gif , is achievable in the above 2-user MAC if and only if it belongs to
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ21_HTML.gif
(21)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ22_HTML.gif
(22)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ23_HTML.gif
(23)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ24_HTML.gif
(24)
We refer the reader to [24] for more details on the optimal coding scheme for MAC.

4. Channel-Network Coding Strategies

We develop five transmission schemes for TWTR network. In the first scheme (AF), the received signals at both relay nodes are amplified and forwarded back to terminals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq210_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq211_HTML.gif . In the second and third scheme (HLC, HMC), one of the relays employs the amplify forward strategy, while the other decodes the messages from terminals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq212_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq213_HTML.gif . In the fourth scheme (DF), both relays decode the messages from terminals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq214_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq215_HTML.gif . In the last strategy (PDF), another mixture of decode-forward and amplify-forward strategy is described.

4.1. Amplify Forward (AF)

In this strategy, relay node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq216_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq217_HTML.gif ) buffers the signal received in the first stage, and amplifies it by a factor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq218_HTML.gif . The amplified signal
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ25_HTML.gif
(25)
is then transmitted in the second stage. At the end of the second stage, each terminal, who has the information of itself, subtracts the corresponding term and obtains the desired message from the residual signal.
By putting (25) into (3), we can write the received signal at terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq219_HTML.gif as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ26_HTML.gif
(26)
Here, we have replaced https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq220_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq221_HTML.gif by their 2-dimensional representations https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq222_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq223_HTML.gif . Since terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq224_HTML.gif knows its own input https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq225_HTML.gif as well as the link gains and amplifying factors, the signal component containing https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq226_HTML.gif as a factor can be subtracted from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq227_HTML.gif . The residual signal is
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ27_HTML.gif
(27)
The message from terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq228_HTML.gif can then be decoded using a decoding algorithm for point-to-point MIMO channel. The received signal at terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq229_HTML.gif is treated similarly.
Theorem 1.
A rate pair https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq230_HTML.gif is achievable by the AF strategy if
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ28_HTML.gif
(28)
where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ29_HTML.gif
(29)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq231_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq232_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq233_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq234_HTML.gif are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq235_HTML.gif covariance matrices, such that the following power constraints:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ30_HTML.gif
(30)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ31_HTML.gif
(31)
are satisfied.
Proof.
The residual signal (27) at terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq236_HTML.gif can be written as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq237_HTML.gif plus a noise vector with covariance matrix https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq238_HTML.gif . The residual signal at terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq239_HTML.gif equals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq240_HTML.gif plus a noise vector with covariance matrix https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq241_HTML.gif . Therefore, after self-signal subtraction, the resultant channels can be considered MIMO channels with two transmit antennas and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq242_HTML.gif receive antennas. From (19), we obtain the rate constraints in (28). The inequalities in (30) are the power constraints for terminals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq243_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq244_HTML.gif , and those in (31) are the power constraints for relays 1 and 2.

4.2. Hybrid Decode-Amplify Forward with Linear Combination (HLC)

In this strategy, relay 1 decodes the messages from terminals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq245_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq246_HTML.gif , and meanwhile, relay 2 employs the amplify-forward strategy. In order to obtain beamforming gain, after decoding the two messages, relay 1 reconstructs the codewords corresponding to the decoded messages and sends a linear combination of them in the second stage.
In the first stage, relay 1 and terminals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq247_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq248_HTML.gif form a multiple-access channel with relay 1 as the destination node. We use the optimal encoding scheme for MAC at terminals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq249_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq250_HTML.gif , and the optimal decoding scheme at relay 1. In the second stage, relay 1 decodes and reconstructs https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq251_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq252_HTML.gif , and then transmits a linear combination
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ32_HTML.gif
(32)
for some https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq253_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq254_HTML.gif . Relay 2 amplifies https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq255_HTML.gif by a scalar factor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq256_HTML.gif and transmits https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq257_HTML.gif .
At terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq258_HTML.gif , after subtracting the signal component that involves https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq259_HTML.gif (t), we get
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ33_HTML.gif
(33)
At terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq260_HTML.gif , the residual signal after subtraction is
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ34_HTML.gif
(34)
The decoding is done by using decoding method for MIMO channel.
Theorem 2.
A rate pair https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq261_HTML.gif is achievable by the HLC strategy if
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ35_HTML.gif
(35)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ36_HTML.gif
(36)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ37_HTML.gif
(37)
where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ38_HTML.gif
(38)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq262_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq263_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq264_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq265_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq266_HTML.gif are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq267_HTML.gif covariance matrices such that the following power constraints:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ39_HTML.gif
(39)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ40_HTML.gif
(40)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ41_HTML.gif
(41)
are satisfied.
In (35), the product of a real number https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq268_HTML.gif and a set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq269_HTML.gif is defined as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq270_HTML.gif .
Proof.
From the rate constraints for MAC channel in (22)–(24), we have the rate constraints for relay 1 in (35). We multiply by a factor of one half because the first phase only occupies half of the total transmission time.
The conditions in (36) and (37) are derived from the capacity formula for MIMO channel with colored noise in (19). The inequalities in (39) are the power constraints for sources https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq271_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq272_HTML.gif . The inequalities in (40) and (41) are the power constraints for relays 1 and 2, respectively.
The parameters https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq273_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq274_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq275_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq276_HTML.gif can be obtained by running an optimization algorithm. For example, we can aim at maximizing a weighted sum https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq277_HTML.gif . The values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq278_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq279_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq280_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq281_HTML.gif which maximize the weighted sum https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq282_HTML.gif are chosen.

4.3. Hybrid Decode-Amplify Forward with Multiplexed Coding (HMC)

As in the previous strategy, relay 1 decodes and forwards the messages from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq283_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq284_HTML.gif , and relay 2 amplifies and transmits the received signal. However, in this strategy, relay 1 re-encodes the messages into a new codeword to be sent out in the second stage. Terminals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq285_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq286_HTML.gif decode the desired messages based on multiplexed coding.
Theorem 3.
A rate pair https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq287_HTML.gif is achievable by the HMC strategy if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq288_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq289_HTML.gif satisfy
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ42_HTML.gif
(42)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ43_HTML.gif
(43)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ44_HTML.gif
(44)
where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ45_HTML.gif
(45)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ46_HTML.gif
(46)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ47_HTML.gif
(47)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq290_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq291_HTML.gif are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq292_HTML.gif covariance matrices satisfying (39), and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq293_HTML.gif satisfies (41).
Proof.
The proof is by random coding argument and we will sketch the proof below. More details can be found in [25].
Our objective is to show that any rate pair https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq294_HTML.gif that satisfies the condition in the theorem is achievable. For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq295_HTML.gif , terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq296_HTML.gif randomly generates a Gaussian codebook with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq297_HTML.gif codewords with length https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq298_HTML.gif , satisfying the power constraint in (5). Label the codewords by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq299_HTML.gif , for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq300_HTML.gif . For relay 1, we generate a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq301_HTML.gif array of Gaussian codewords of length https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq302_HTML.gif and power https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq303_HTML.gif . The codeword in row https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq304_HTML.gif and column https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq305_HTML.gif is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq306_HTML.gif , and satisfies the power constraint in (6).
After the first stage, relay 1 is required to decode both messages from terminals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq307_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq308_HTML.gif . This can be accomplished with arbitrarily small probability of error if the rate constraints for MAC in (22) to (24) are satisfied. This corresponds to the rate constraint in (42). Let the estimated messages from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq309_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq310_HTML.gif be https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq311_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq312_HTML.gif .
In the second stage, relay 1 transmits https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq313_HTML.gif . Relay 2 amplifies its received signal and transmits https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq314_HTML.gif . From (41), the amplified signal has average power no more than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq315_HTML.gif .
After subtracting the term https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq316_HTML.gif , which is known to terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq317_HTML.gif , the residual signal at terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq318_HTML.gif is
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ48_HTML.gif
(48)
Note that terminal A knows its message https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq319_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq320_HTML.gif with probability arbitrarily close to one if (42) is satisfied. The idea of multiplexed coding can then be used. In (48), the covariance matrix of the signal in square bracket is given by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq321_HTML.gif in (46), and the covariance of the noise term is given by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq322_HTML.gif . Applying the capacity expression, we obtain the rate constraint in (44). In a similar manner, we obtain (43).

4.4. Decode Forward (DF)

In the DF strategy, terminal node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq323_HTML.gif , ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq324_HTML.gif ) splits the message https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq325_HTML.gif into two parts: the common part https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq326_HTML.gif and the private part https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq327_HTML.gif . The two common messages are transmitted via both relay nodes. The private message https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq328_HTML.gif is decoded by relay 1 only, and can be interpreted as going through the path from terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq329_HTML.gif to relay 1 to terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq330_HTML.gif . Symmetrically, the private part of message https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq331_HTML.gif is decoded by relay 2 only, and can be interpreted as going through the path from terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq332_HTML.gif to relay 2 to terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq333_HTML.gif . After the first stage, relay 1 decodes the common messages of both terminals and the private message of terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq334_HTML.gif . Relay 2 decodes the common messages of both terminals and the private message of terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq335_HTML.gif . The encoding and decoding schemes in the first stage is similar to those developed by Han and Kobayashi for the interference channel (IC) in [26]. Since both relays have access to the common messages, the channel in the second stage can be considered a multiple access channel with common information. Furthermore, since terminals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq336_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq337_HTML.gif have information of themselves, we can further improve the rate region by the idea of multiplexed coding.
We have the following characterization of the rate region for the DF strategy:
Theorem 4.
For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq338_HTML.gif , let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq339_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq340_HTML.gif be the rates of the private and common messages, respectively, from terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq341_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq342_HTML.gif denote https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq343_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq344_HTML.gif , and let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq345_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq346_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq347_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq348_HTML.gif denote https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq349_HTML.gif covariance matrices, and
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ49_HTML.gif
(49)
for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq350_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq351_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq352_HTML.gif . For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq353_HTML.gif . A rate pair https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq354_HTML.gif is achievable if we can decompose https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq355_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq356_HTML.gif such that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ50_HTML.gif
(50)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ51_HTML.gif
(51)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ52_HTML.gif
(52)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ53_HTML.gif
(53)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ54_HTML.gif
(54)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ55_HTML.gif
(55)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ56_HTML.gif
(56)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ57_HTML.gif
(57)
for some nonnegative https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq357_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq358_HTML.gif .
Details of the DF coding scheme and the proof of Theorem 4 are given in the Appendix.

4.5. Partial Decode Forward (PDF)

In the PDF strategy, both relays decode the message of terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq359_HTML.gif . Each relay then subtracts the reconstructed signal of terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq360_HTML.gif from the received signal. Call the resulting signal the residual signal. The message of terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq361_HTML.gif is re-encoded into a new codeword, and linearly combined with the residual signal. This linear combination is then transmitted in the second stage. Since both relays know the message of terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq362_HTML.gif , the two-relays can jointly re-encode the message of terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq363_HTML.gif using some encoding scheme for a MIMO channel with two transmit antennas and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq364_HTML.gif receive antennas.
Theorem 5.
A rate pair https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq365_HTML.gif is achievable by the PDF strategy if it satisfies
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ58_HTML.gif
(58)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ59_HTML.gif
(59)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ60_HTML.gif
(60)
where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ61_HTML.gif
(61)
and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq366_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq367_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq368_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq369_HTML.gif are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq370_HTML.gif covariance matrices such that the following power constraints hold
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ62_HTML.gif
(62)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ63_HTML.gif
(63)
for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq371_HTML.gif . (Here, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq372_HTML.gif denotes the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq373_HTML.gif th diagonal entry in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq374_HTML.gif .)
Proof.
The two-relays treat the signal originated from terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq375_HTML.gif as noise, and decode the message of terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq376_HTML.gif . The rate requirement in (58) guarantees that the message of terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq377_HTML.gif can be decoded with arbitrarily small probability of error at both relays. Let the decoded message of terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq378_HTML.gif be denoted by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq379_HTML.gif .
For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq380_HTML.gif , the reconstructed signal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq381_HTML.gif is then subtracted from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq382_HTML.gif . The residual signal at relay https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq383_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq384_HTML.gif .
At the relays, we employ two Gaussian codebooks for the re-encoding of the message from terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq385_HTML.gif . For each message https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq386_HTML.gif , we generate two correlated codewords https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq387_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq388_HTML.gif , with mean zero and each pair of symbols at any https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq389_HTML.gif distributed according to a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq390_HTML.gif covariance matrix https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq391_HTML.gif . At relay https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq392_HTML.gif , the decoded message https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq393_HTML.gif is re-encoded into https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq394_HTML.gif , which is a codeword with power https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq395_HTML.gif . In the second stage, relay https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq396_HTML.gif transmits
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ64_HTML.gif
(64)
for some amplifying factor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq397_HTML.gif . The inequality in (63) ensures that the power constraint is satisfied at the relays.
At the end of stage 2, terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq398_HTML.gif subtracts the signal component that involves https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq399_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq400_HTML.gif from its received signal and obtains
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ65_HTML.gif
(65)
From the capacity formula for MIMO channel (19), terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq401_HTML.gif can recover the message from terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq402_HTML.gif reliably if (60) is satisfied.
For the decoding in terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq403_HTML.gif , we subtract all terms involving https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq404_HTML.gif , and get
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ66_HTML.gif
(66)
This is equivalent to a MIMO channel with link gain matrix https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq405_HTML.gif and colored noise. Recall that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq406_HTML.gif is the covariance matrix of the encoded signal. By the capacity formula of MIMO channel (19), we obtain the rate constraint in (59).
Remark 1.
We note that the matrices https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq407_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq408_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq409_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq410_HTML.gif , for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq411_HTML.gif , are invertible. Indeed, by checking that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq412_HTML.gif is strictly positive for all non-zero https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq413_HTML.gif , we see that the matrix is positive definite, and hence invertible.

5. Performance in High SNR Regime

In this section, we compare the performance of the five strategies described in the previous section in the high Signal-to-Noise Ratio (SNR) regime.
For fixed powers and link gains, let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq414_HTML.gif denote the sum rate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq415_HTML.gif as a function of the noise variance https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq416_HTML.gif . We use the multiplexing gain (also called degree of freedom) [27], defined by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ67_HTML.gif
(67)
as the performance measure at high SNR. At high SNR, that is, when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq417_HTML.gif is very small, we can approximate the sum rate by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq418_HTML.gif if the multiplexing gain is equal to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq419_HTML.gif .
Consider the multiplexing gain of the AF scheme. When the sum rate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq420_HTML.gif is maximized subject to the rate constraints (28) in Theorem 1, the equalities in (28) hold. We can assume without loss of generality that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ68_HTML.gif
(68)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ69_HTML.gif
(69)
We first suppose that the covariance matrices https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq421_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq422_HTML.gif , and the amplifying constants https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq423_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq424_HTML.gif , are fixed. Note that if the power constraint in (31) holds, then it continues to hold if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq425_HTML.gif becomes smaller. Therefore, when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq426_HTML.gif , the power constraints in (30) and (31) are satisfied.
Each of the expressions in (68) and (69) can be written in the form
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ70_HTML.gif
(70)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq427_HTML.gif is a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq428_HTML.gif matrix that equals
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ71_HTML.gif
(71)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ72_HTML.gif
(72)
By singular value decomposition [28, Chapter https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq429_HTML.gif ], we can factor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq430_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq431_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq432_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq433_HTML.gif are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq434_HTML.gif unitary matrices, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq435_HTML.gif is a diagonal matrix with non-negative diagonal entries https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq436_HTML.gif . The number of positive diagonal entries in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq437_HTML.gif is precisely the rank of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq438_HTML.gif . We can rewrite (70) as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ73_HTML.gif
(73)
Suppose that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq439_HTML.gif is equal to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq440_HTML.gif . The determinant
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ74_HTML.gif
(74)
in (73) can be expanded as a polynomial in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq441_HTML.gif , with the degree equal to the rank of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq442_HTML.gif . Therefore, the limit
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ75_HTML.gif
(75)
depends only on the rank of the matrix https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq443_HTML.gif , and equals 0, 0.5, or 1, if the rank of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq444_HTML.gif is 0, 1, or 2, respectively. The problem of determining the multiplexing gain now reduces to determining the rank of the matrices in (71) and (72).
Recall that the rank function satisfies the following properties [28, page 13]: (i) if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq445_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq446_HTML.gif are square invertible matrices, then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq447_HTML.gif for all matrix https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq448_HTML.gif , whenever the matrix multiplications are well-defined; (ii) for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq449_HTML.gif matrices https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq450_HTML.gif , we have https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq451_HTML.gif . Consider the matrix in (72). After replacing https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq452_HTML.gif by its definition, we can express the matrix in (72) as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ76_HTML.gif
(76)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq453_HTML.gif denotes the diagonal matrix https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq454_HTML.gif . We assume that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq455_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq456_HTML.gif have full rank. This assumption holds with probability one if the link gains are generated from a continuous probability distribution function such as Rayleigh. Also, we assume that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq457_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq458_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq459_HTML.gif are of full rank. This assumption does not incur any loss of generality, because they are design parameters that we can choose. We can perturb them infinitesimally, and the resulting matrices will be of rank two, but the value on the right hand side of (69) deviates negligibly. By property (i), and the fact that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq460_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq461_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq462_HTML.gif are invertible https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq463_HTML.gif matrices, the rank of the matrix in (76) is equal to the rank of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq464_HTML.gif . Then we get
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ77_HTML.gif
(77)
Similarly, we can show that the rank of the matrix in (71) is equal to two.
For fixed invertible covariance matrices https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq465_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq466_HTML.gif , and positive real numbers https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq467_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq468_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ78_HTML.gif
(78)
Since the above argument holds for all invertible https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq469_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq470_HTML.gif , and positive https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq471_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq472_HTML.gif , we conclude that the multiplexing gain of the AF strategy is equal to 2.
For HLC and HMC, relay 1 is required to decode the messages of the terminals, and in both schemes the sum rate is subject to the sum rate constraint in the MAC channel in the first phase. The multiplexing gains of both the HLC and HMC strategies are limited by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ79_HTML.gif
(79)
Similarly, the multiplexing gain of DF is also limited by the decoding of messages at the relays. The rate constraints (50) and (51) imply that it is no more than 0.5.
The multiplexing gain of the PDF scheme is somewhere in between the multiplexing gains of AF and DF. The transmission from terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq473_HTML.gif to terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq474_HTML.gif can be considered AF, while the transmission from terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq475_HTML.gif to terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq476_HTML.gif in the other direction is limited by the message decoding after stage 1. From (58), we get
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ80_HTML.gif
(80)
and from (60), we have
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ81_HTML.gif
(81)
provided that the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq477_HTML.gif has full rank. Therefore, its maximal multiplexing gain is 1.5.
We summarize the performance of the five schemes at high SNR in Table 1. We can see that the AF strategy has the highest multiplexing gain. It is well known that the maximal multiplexing gain of the Gaussian MIMO channel with two transmit antennas and two received antennas is equal to two [23]. We see that at high SNR, the AF strategy behaves like a transmission scheme achieving full multiplexing gain in the MIMO channel with two transmit antennas and two received antennas.
Table 1
Multiplexing gains of the transmission schemes in the high SNR regime.
Scheme
AF
HMC, HLC, DF
PDF
Multiplexing gain
2
0.5
1.5

6. Numerical Examples

We compare the information rates achievable by the proposed strategies in Section 4 with the cut-set outer bound in [29]. Since the derivation is straightforward, we state the outer bound without proof. For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq478_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq479_HTML.gif , let
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ82_HTML.gif
(82)
Theorem 6 (Outer bound).
A rate pair https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq480_HTML.gif is achievable in the TWTR network only if it satisfies
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ83_HTML.gif
(83)
for some real number https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq481_HTML.gif between 0 and 1, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq482_HTML.gif covariance matrices https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq483_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq484_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq485_HTML.gif holds for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq486_HTML.gif .
We select several typical channel realizations and show the corresponding achievable rate regions in Figure 3 to Figure 8. To simplify the calculation, we consider the single antenna case where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq487_HTML.gif . The power constraint is set to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq488_HTML.gif and the noise variance is set to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq489_HTML.gif .
In Figure 3, we plot the rate regions when all link gains are large (the link gain is 10 for all links). As mentioned in the previous section, the AF strategy has the largest multiplexing gain in the high SNR regime. We can see in Figure 3 that the AF strategy achieves the largest sum rate.
In Figures 4 and 5, we consider the case where relay 1 has larger link gains than relay 2. In Figure 4, the link gains https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq490_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq491_HTML.gif are the same. In this case, HMC dominates all other strategies. In Figure 5, the two link gains, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq492_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq493_HTML.gif , are not equal. In this case, HLC dominates HMC. HLC performs better in this asymmetric case because of its ability to adjust power between signals and utilize the beamforming gain.
When both relays are close to one of the terminals, PDF has the best performance, as can be seen in Figure 6. The reason is that both relays are able to decode reliably the message from the closer terminal, and then they cooperatively forward the message to the other terminal using MIMO techniques.
Figures 7 and 8 presents two scenarios in which DF dominates all other transmission strategies. We remark that DF is quite flexible in that it has many tunable parameters. The case where both https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq495_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq496_HTML.gif are relatively large is shown in Figure 7. Another case where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq497_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq498_HTML.gif are larger than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq499_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq500_HTML.gif is shown in Figure 8. In both cases, DF is much better than other strategies.
We can further summarize the numerical results in Table 2. It is not supposed to be a precise description on the relative merits of the schemes. Instead, it provides a rough guideline for easy selection of a suitable scheme. In the table, "G" refers to "the channel condition is good" and "B" refers to "the channel condition is bad." We say that a channel is good if its link gain is two to three times, or more, than the link gain of a bad channel.When all the link gains are large, we should use AF. In the case when one pair of the opposite links of the network is good,whereas the other pair is weak, DF provides larger throughput. If one of the relays is good but the other relay is bad, HMC or HLC should be used. PDF scheme is the best one in the scenario where one of the sources has large link gains but the other does not.
Table 2
Performance guideline for the two-way two-relay network in the medium SNR regime.
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq501_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq502_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq503_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq504_HTML.gif
Scheme
G
G
G
G
AF
G
B
B
G
DF
G
G
B
B
HMC, HLC
G
B
G
B
PDF

7. Conclusion

We have devised several transmission strategies for the TWTR network, each of which is derived from a mix-and-match of several basic building blocks, namely, amplify-forward strategy, decode-forward strategy, and physical-layer network coding, and so forth. We can see from the numerical examples that there is no single transmission strategy that can dominate all other strategies under all channel realizations. In other words, transmission strategy should be tailor-made for a given environment. In this paper, we have investigated the pros and cons of different building blocks and demonstrated how they can be used to construct transmission strategies for the TWTR network. We believe that the idea can be applied to other relay networks as well.
While in this paper we only consider the case where there are only two-relays, the ideas of our proposed schemes can be applied to the case with more than two-relays. In particular, AF and PDF can be directly implemented without any change. As for DF, HMC, and HLC, the design may be more complicated, since we have to determine which relay to decode which source's message. On the other hand, the idea behind remains the same.
In our work, we have assumed that the channels are static. When link gains are time varying, our result reveals that a static strategy can only be suboptimal. To fully exploit the available capacity of the network, adaptive strategies that can switch between several modes are needed. How to determine a good strategy based on channel state information is an open problem. It is especially difficult if the switching is based on local information only, and we leave it for future work.

Appendix

Proof of Theorem 4

The following information-theoretic argument shows that any rate pair https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq505_HTML.gif satisfying the conditions in Theorem 4 is achievable.
Codebook Generation
For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq506_HTML.gif , the common message of terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq507_HTML.gif is drawn uniformly in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq508_HTML.gif and the private message from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq509_HTML.gif . For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq510_HTML.gif , we generate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq511_HTML.gif independent sequences of length https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq512_HTML.gif . In each sequence, the components are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq513_HTML.gif vectors drawn independently with distribution https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq514_HTML.gif . Label the generated sequences by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq515_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq516_HTML.gif . Generate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq517_HTML.gif independent sequences of length https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq518_HTML.gif , with each component drawn independently with distribution https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq519_HTML.gif . Label the generated sequences by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq520_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq521_HTML.gif . Set
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ84_HTML.gif
(A1)
By (56) and (57), with very high probability the power constraints on node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq522_HTML.gif and node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq523_HTML.gif are satisfied.
There is a common codebook for relay 1 and relay 2. We generate an array of codewords with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq524_HTML.gif rows and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq525_HTML.gif columns. The codewords have length https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq526_HTML.gif and each component is drawn independently from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq527_HTML.gif . Label the codewords by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq528_HTML.gif , for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq529_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq530_HTML.gif .
For relay 1, we generate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq531_HTML.gif codewords, indexed by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq532_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq533_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq534_HTML.gif , and denoted by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ85_HTML.gif
(A2)
Each of them is drawn independently with each component generated from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq535_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq536_HTML.gif be the linear combination
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ86_HTML.gif
(A3)
Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq537_HTML.gif is strictly less than 1, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq538_HTML.gif satisfies the power constraint of node 1 with very high probability.
For relay 2, we generate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq539_HTML.gif codewords, labeled by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ87_HTML.gif
(A4)
for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq540_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq541_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq542_HTML.gif . The components of each codeword are generated independently from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq543_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq544_HTML.gif be
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ88_HTML.gif
(A5)
The codeword https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq545_HTML.gif satisfies the power constraint of node 2 by the hypothesis that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq546_HTML.gif .
Encoding
For source node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq547_HTML.gif , to send the message https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq548_HTML.gif , it sends https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq549_HTML.gif to the relays.
In the second stage, relay 1 and relay 2 transmit https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq550_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq551_HTML.gif . The messages indicated by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq552_HTML.gif is the estimated version of the original message.
Decoding
For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq553_HTML.gif , the channel output at relay https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq554_HTML.gif is
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ89_HTML.gif
(A6)
The receiver at relay 1 treats the signal component https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq555_HTML.gif as noise, and tries to decode https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq556_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq557_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq558_HTML.gif . It reduces to a MAC with two users, but three independent messages; two messages from node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq559_HTML.gif and one message from node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq560_HTML.gif . In order to decode these three messages reliably, we need the requirement in (50). Likewise, we have the requirement in (51) for correct decoding at node 2.
Relay 2 treats the signal component https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq561_HTML.gif as noise, and tries to decode https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq562_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq563_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq564_HTML.gif . This can be done with arbitrarily small error if the condition in (51) holds.
In the second stage, terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq565_HTML.gif receives
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ90_HTML.gif
(A7)
Assuming that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq566_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq567_HTML.gif , the channel is equivalent to a two-user MAC with common information, in which both users send https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq568_HTML.gif , and one of the users sends the private message https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq569_HTML.gif . The decoding is done by typicality as in [30, chapter 8], with the additional functionality of multiplexed coding. The decoder at terminal A searches for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq570_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq571_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq572_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq573_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq574_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq575_HTML.gif are jointly typical. From the capacity region of MAC with common information [30, page 102], we obtain the following rate requirements
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_Equ91_HTML.gif
(A8)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq576_HTML.gif is the mutual information function. This gives the conditions in (54) and (55).
Similarly, we have the conditions in (52) and (53) for successful decoding in terminal https://static-content.springer.com/image/art%3A10.1155%2F2010%2F708416/MediaObjects/13638_2009_Article_1996_IEq577_HTML.gif . This completes the proof of Theorem 4.

Acknowledgment

This work is supported by a grant from the City University of Hong Kong (Project no. SRG 7002386).
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://​creativecommons.​org/​licenses/​by/​2.​0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat van der Meulen EC: Transmission of information in a T-terminals discrete memoryless channel, Ph.D. dissertation. University of California, Berkeley, Calif, USA; June 1968. van der Meulen EC: Transmission of information in a T-terminals discrete memoryless channel, Ph.D. dissertation. University of California, Berkeley, Calif, USA; June 1968.
2.
Zurück zum Zitat Cover TM, El Gamal AA: Capacity theorems for the relay channel. IEEE Transactions on Information Theory 1979, 25(5):572-584. 10.1109/TIT.1979.1056084MathSciNetCrossRefMATH Cover TM, El Gamal AA: Capacity theorems for the relay channel. IEEE Transactions on Information Theory 1979, 25(5):572-584. 10.1109/TIT.1979.1056084MathSciNetCrossRefMATH
3.
Zurück zum Zitat Sendonaris A, Erkip E, Aazhang B: User cooperation diversity—part I: system description. IEEE Transactions on Communications 2003, 51(11):1927-1938. 10.1109/TCOMM.2003.818096CrossRef Sendonaris A, Erkip E, Aazhang B: User cooperation diversity—part I: system description. IEEE Transactions on Communications 2003, 51(11):1927-1938. 10.1109/TCOMM.2003.818096CrossRef
4.
Zurück zum Zitat Laneman JN, Tse DNC, Wornell GW: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Transactions on Information Theory 2004, 50(12):3062-3080. 10.1109/TIT.2004.838089MathSciNetCrossRefMATH Laneman JN, Tse DNC, Wornell GW: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Transactions on Information Theory 2004, 50(12):3062-3080. 10.1109/TIT.2004.838089MathSciNetCrossRefMATH
5.
Zurück zum Zitat Shannon CE: Two-way communications channels. Proceedings of the 4th Berkeley Symposium on Mathematical Statistics and Probability, June 1961 611-644. Shannon CE: Two-way communications channels. Proceedings of the 4th Berkeley Symposium on Mathematical Statistics and Probability, June 1961 611-644.
6.
Zurück zum Zitat Ahlswede R, Cai N, Li S-YR, Yeung RW: Network information flow. IEEE Transactions on Information Theory 2000, 46(4):1204-1216. 10.1109/18.850663MathSciNetCrossRefMATH Ahlswede R, Cai N, Li S-YR, Yeung RW: Network information flow. IEEE Transactions on Information Theory 2000, 46(4):1204-1216. 10.1109/18.850663MathSciNetCrossRefMATH
7.
Zurück zum Zitat Rankov B, Wittneben A: Achievable rate regions for the two-way relay channel. Proceedings of IEEE International Symposium on Information Theory (ISIT '06), July 2006, Seattle, Wash, USA 1668-1672. Rankov B, Wittneben A: Achievable rate regions for the two-way relay channel. Proceedings of IEEE International Symposium on Information Theory (ISIT '06), July 2006, Seattle, Wash, USA 1668-1672.
8.
Zurück zum Zitat Larsson P, Johansson N, Sunell K-E: Coded bi-directional relaying. Proceedings of the 63rd IEEE Vehicular Technology Conference (VTC '06), May-July 2006, Melbourne, Australia 2: 851-855. Larsson P, Johansson N, Sunell K-E: Coded bi-directional relaying. Proceedings of the 63rd IEEE Vehicular Technology Conference (VTC '06), May-July 2006, Melbourne, Australia 2: 851-855.
9.
Zurück zum Zitat Kim SJ, Mitran P, Tarokh V: Performance bounds for bidirectional coded cooperation protocols. IEEE Transactions on Information Theory 2008, 54(11):5235-5241.MathSciNetCrossRefMATH Kim SJ, Mitran P, Tarokh V: Performance bounds for bidirectional coded cooperation protocols. IEEE Transactions on Information Theory 2008, 54(11):5235-5241.MathSciNetCrossRefMATH
10.
Zurück zum Zitat Dash D, Khoshnevis A, Sabharwal A: An achievable rate region for a multiuser half-duplex two-way channel. Proceedings of the 40th Asilomar Conference on Signals, Systems, and Computers (ACSSC '06), October-November 2006, Pacific Grove, Calif, USA 707-711. Dash D, Khoshnevis A, Sabharwal A: An achievable rate region for a multiuser half-duplex two-way channel. Proceedings of the 40th Asilomar Conference on Signals, Systems, and Computers (ACSSC '06), October-November 2006, Pacific Grove, Calif, USA 707-711.
11.
Zurück zum Zitat Liu C-H, Xue F: Network coding for two-way relaying: rate region, sum rate and opportunistic scheduling. Proceedings of IEEE International Conference on Communications (ICC '08), May 2008, Beijing, China 1044-1049. Liu C-H, Xue F: Network coding for two-way relaying: rate region, sum rate and opportunistic scheduling. Proceedings of IEEE International Conference on Communications (ICC '08), May 2008, Beijing, China 1044-1049.
12.
Zurück zum Zitat Baik I-J, Chung S-Y: Network coding for two-way relay channels using lattices. Proceedings of IEEE International Conference on Communications (ICC '08), May 2008, Beijing, China 3898-3902. Baik I-J, Chung S-Y: Network coding for two-way relay channels using lattices. Proceedings of IEEE International Conference on Communications (ICC '08), May 2008, Beijing, China 3898-3902.
13.
Zurück zum Zitat Narayanan K, Wilson MP, Sprintson A: Joint physical layer coding and network coding for bi-directional relaying. In Proceedings of the 45th Annual Allerton Conference on Communication, Control, and Computing, June 2007. University of Illinois; Narayanan K, Wilson MP, Sprintson A: Joint physical layer coding and network coding for bi-directional relaying. In Proceedings of the 45th Annual Allerton Conference on Communication, Control, and Computing, June 2007. University of Illinois;
14.
Zurück zum Zitat Nam W, Chung S-Y, Lee YH: Capacity bounds for two-way relay channels. Proceedings of International Zurich Seminar on Communications (IZS '08), March 2008, Zurich, Germany 144-147. Nam W, Chung S-Y, Lee YH: Capacity bounds for two-way relay channels. Proceedings of International Zurich Seminar on Communications (IZS '08), March 2008, Zurich, Germany 144-147.
15.
Zurück zum Zitat Schein B: Distributed coordination in network information theory, Ph.D dissertation. MIT, Cambridge, Mass, USA; 2001. Schein B: Distributed coordination in network information theory, Ph.D dissertation. MIT, Cambridge, Mass, USA; 2001.
16.
Zurück zum Zitat Xue F, Sandhu S: Cooperation in a half-duplex Gaussian diamond relay channel. IEEE Transactions on Information Theory 2007, 53(10):3806-3814.MathSciNetCrossRefMATH Xue F, Sandhu S: Cooperation in a half-duplex Gaussian diamond relay channel. IEEE Transactions on Information Theory 2007, 53(10):3806-3814.MathSciNetCrossRefMATH
17.
Zurück zum Zitat Kramer G, Gastpar M, Gupta P: Cooperative strategies and capacity theorems for relay networks. IEEE Transactions on Information Theory 2005, 51(9):3037-3063. 10.1109/TIT.2005.853304MathSciNetCrossRefMATH Kramer G, Gastpar M, Gupta P: Cooperative strategies and capacity theorems for relay networks. IEEE Transactions on Information Theory 2005, 51(9):3037-3063. 10.1109/TIT.2005.853304MathSciNetCrossRefMATH
18.
Zurück zum Zitat Zhang S, Liew SC, Lam PP: Hot topic: physical-layer network coding. Proceedings of the 12th Annual International Conference on Mobile Computing and Networking (MOBICOM '06), September 2006, Los Angeles, Calif, USA 358-365.CrossRef Zhang S, Liew SC, Lam PP: Hot topic: physical-layer network coding. Proceedings of the 12th Annual International Conference on Mobile Computing and Networking (MOBICOM '06), September 2006, Los Angeles, Calif, USA 358-365.CrossRef
19.
Zurück zum Zitat Katti S, Gollakota S, Katabi D: Embracing wireless interference: analog network coding. Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (ACM SIGCOMM '07), August 2007, Kyoto, Japan 397-408. Katti S, Gollakota S, Katabi D: Embracing wireless interference: analog network coding. Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (ACM SIGCOMM '07), August 2007, Kyoto, Japan 397-408.
20.
Zurück zum Zitat Zhang S, Liew SC, Lu L: Physical layer network coding schemes over finite and infinite fields. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '08), November-December 2008, New Orleans, La, USA 3784-3789. Zhang S, Liew SC, Lu L: Physical layer network coding schemes over finite and infinite fields. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '08), November-December 2008, New Orleans, La, USA 3784-3789.
21.
Zurück zum Zitat Dey BK, Katti S, Jaggi S, Katabi D, Médard M, Shintre S: "Real" and "complex" network codes: promises and challenges. Proceedings of the 4th Workshop on Network Coding, Theory, and Applications (NetCod '08), January 2008, Hong Kong 1-6. Dey BK, Katti S, Jaggi S, Katabi D, Médard M, Shintre S: "Real" and "complex" network codes: promises and challenges. Proceedings of the 4th Workshop on Network Coding, Theory, and Applications (NetCod '08), January 2008, Hong Kong 1-6.
22.
23.
Zurück zum Zitat Telatar E: Capacity of multi-antenna Gaussian channels. European Transactions on Telecommunications 1999, 10(6):585-595. 10.1002/ett.4460100604CrossRef Telatar E: Capacity of multi-antenna Gaussian channels. European Transactions on Telecommunications 1999, 10(6):585-595. 10.1002/ett.4460100604CrossRef
24.
Zurück zum Zitat Cover TM, Thomas JA: Elements of Information Theory. Wiley-Interscience, New York, NY, USA; 1991.CrossRefMATH Cover TM, Thomas JA: Elements of Information Theory. Wiley-Interscience, New York, NY, USA; 1991.CrossRefMATH
25.
Zurück zum Zitat Hu P: Cooperative strategies for Gaussian parallel relay networks, M.S. thesis. City University of Hong Kong, Hong Kong; September 2009. Hu P: Cooperative strategies for Gaussian parallel relay networks, M.S. thesis. City University of Hong Kong, Hong Kong; September 2009.
26.
Zurück zum Zitat Han TS, Kobayashi K: A new achievable rate region for the interference channel. IEEE Transactions on Information Theory 1981, 27(1):49-60. 10.1109/TIT.1981.1056307MathSciNetCrossRefMATH Han TS, Kobayashi K: A new achievable rate region for the interference channel. IEEE Transactions on Information Theory 1981, 27(1):49-60. 10.1109/TIT.1981.1056307MathSciNetCrossRefMATH
27.
Zurück zum Zitat Zheng L, Tse DNC: Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels. IEEE Transactions on Information Theory 2003, 49(5):1073-1096. 10.1109/TIT.2003.810646CrossRefMATH Zheng L, Tse DNC: Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels. IEEE Transactions on Information Theory 2003, 49(5):1073-1096. 10.1109/TIT.2003.810646CrossRefMATH
28.
Zurück zum Zitat Horn RA, Johnson CR: Matrix Analysis. Cambridge University Press, Cambridge, UK; 1985.CrossRefMATH Horn RA, Johnson CR: Matrix Analysis. Cambridge University Press, Cambridge, UK; 1985.CrossRefMATH
29.
Zurück zum Zitat Khojastepour MA, Sabharwal A, Aazhang B: Bounds on achievable rates for general multiterminal networks with practical constraints. Proceedings of the 2nd International Conference on Information Processing in Sensor Networks (IPSN '03), 2003, Palo Alto, Calif, USA, Lecture Notes in Computer Science 2634: 146-161.CrossRefMATH Khojastepour MA, Sabharwal A, Aazhang B: Bounds on achievable rates for general multiterminal networks with practical constraints. Proceedings of the 2nd International Conference on Information Processing in Sensor Networks (IPSN '03), 2003, Palo Alto, Calif, USA, Lecture Notes in Computer Science 2634: 146-161.CrossRefMATH
30.
Zurück zum Zitat Kramer G: Topics in Multi-User Information Theory, Foundations and Trends in Communications and Information Theory. Volume 4. NOW Publishers; 2007.MATH Kramer G: Topics in Multi-User Information Theory, Foundations and Trends in Communications and Information Theory. Volume 4. NOW Publishers; 2007.MATH
Metadaten
Titel
Joint Channel-Network Coding for the Gaussian Two-Way Two-Relay Network
verfasst von
Ping Hu
ChiWan Sung
Kenneth W. Shum
Publikationsdatum
01.12.2010
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2010/708416

Weitere Artikel der Ausgabe 1/2010

EURASIP Journal on Wireless Communications and Networking 1/2010 Zur Ausgabe