Cooperative Network Coding Strategies for Wireless Relay Networks with Backhaul IEEE Transactions on Communications, vol. 59, pp. 2502โ2514, Sep. 2011. c 2011 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this
material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
JINFENG DU, MING XIAO, MIKAEL SKOGLUND
Stockholm September 2011 School of Electrical Engineering and the ACCESS Linnaeus Center, Royal Institute of Technology (KTH), SE-100 44 Stockholm, Sweden IR-EE-KT 2011:024
2502
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 59, NO. 9, SEPTEMBER 2011
Cooperative Network Coding Strategies for Wireless Relay Networks with Backhaul Jinfeng Du, Student Member, IEEE, Ming Xiao, Member, IEEE, and Mikael Skoglund, Senior Member, IEEE
Index TermsโCooperative communication, network coding, relay, source cooperation, cut-set bound.
I. I NTRODUCTION
C
APACITY bounds and various cooperative strategies for three-node relaying networks (source-relay-sink, or two cooperative sources and one sink) have been studied in [1], [2]. The relay (or the other source) uses decode-and-forward (DF) or compress-and-forward (CF) to aid the transmission. Coding schemes have been investigated for multiple-access relay channels (MARC) [3], [4] involving multiple sources and a single destination, and for broadcast relay channels (BRC) [3], [5] where a single source transmits messages to multiple destinations. Recent results on capacity bounds for multiple-source multiple-destination relay networks, [6]โ[9] and references therein, have provided valuable insight into the benefits of relaying. Motivated by the MAC channel at the relay node where different messages mix up by nature, various network coding (NC) [10]โ[12] approaches, which essentially combine multiple messages together, can be introduced to boost the sum rate. For instance, in a relay-aided two-source two-sink multicast network, achievable rates for a full-duplex amplify-and-forward (AF) relay with linear NC (LNC) have been studied in [13], and in [8] the relay uses lattice codes for network coding. In [14] joint NC and physical layer coding is performed via lattice coding for the bi-directional Paper approved by E. Serpedin, the Editor for Synchronization and Sensor Networks of the IEEE Communications Society. Manuscript received August 28, 2010; revised February 18, 2011. This work was presented in part at IEEE ITW, Aug. 2010. This work was supported in part by the Swedish Governmental Agency for Innovation Systems (VINNOVA) and the Swedish Foundation for Strategic Research (SSF). The authors are with the School of Electrical Engineering and the ACCESS Linnaeus Center, Royal Institute of Technology, Stockholm, Sweden (e-mail:
[email protected]; {ming.xiao, mikael.skoglund}@ee.kth.se). Digital Object Identifier 10.1109/TCOMM.2011.061311.100525
๐1
๐2
๐1
๐ฎ1 ๐1
Backhaul
AbstractโWe investigate cooperative network coding strategies for relay-aided two-source two-destination wireless networks with a backhaul connection between the source nodes. Each source multicasts information to all destinations using a shared relay. We study cooperative strategies based on different network coding schemes, namely, finite field and linear network coding, and lattice coding. To further exploit the backhaul connection, we also propose network coding based beamforming. We measure the performance in term of achievable rates over Gaussian channels, and observe significant gains over benchmark schemes. We derive the achievable rate regions for these schemes and find the cut-set bound for our system. We also show that the cut-set bound can be achieved by network coding based beamforming when the signal-to-noise ratios lie in the sphere defined by the source-relay and relay-destination channel gains.
๐ฎ2
๐2
๐๐
โ
๐๐
๐2
๐1
๐2
Fig. 1. Two source nodes ๐ฎ1 and ๐ฎ2 , connected with backhaul, multicast information ๐1 and ๐2 respectively to both destinations ๐1 and ๐2 , with aid from a full-duplex relay node โ.
relay channel. The recently proposed noisy network coding scheme (Noisy NC) [15] for transmitting multiple sources over a general noisy network, has been shown to outperform the conventional CF scheme in the Gaussian two-way relay channel and the interference relay channel. Apart from introducing dedicated relay nodes to help the transmission, one can also utilize cooperative strategies among sources [16]โ [21] and/or among destinations [20]โ[22] with the help of orthogonal conferencing channels. In this paper, we aim at evaluating achievable rate regions for various cooperative strategies when source cooperation and network coding are designed jointly with the relaying. More specifically, we focus on a relay-aided two-source twodestination multicast network with backhaul support, as shown in Fig. 1. Sources ๐ฎ1 and ๐ฎ2 multicast their own information (๐1 and ๐2 respectively) to geographically separated destinations ๐1 and ๐2 , with the help of a relay โ. This model arises, for example, in a wireless cellular downlink where two base stations multicast to two mobile terminals, one in each cell, with the help of a dedicated relay deployed at the common cell boundary. Since the base stations are connected through the (fiber or microwave) backhaul, more general network coding schemes can be used at the relay to cooperate with the sourcesโ transmission. This model is interesting since it is a combination of relaying, MARC, BRC, source cooperation, and network coding. It can be extended to more general networks by tuning the channel gains within the range [0, โ). In this paper, we are interested in the scenario without cross channels between ๐ฎ1 and ๐2 , or ๐ฎ2 and ๐1 . While, in general, the signal from ๐ฎ๐ would be heard also at ๐๐ , ๐ โ= ๐, our assumption can be motivated for example in scenarios where the cross links are too weak to be of any use, or are technically suppressed. In any case we consider any contribution directly from ๐ฎ๐ at ๐๐ (๐ โ= ๐) not to be useful and therefore part of the noise. We also restrict our analysis to fixed channel gains, and we assume a full-duplex DF relay. Furthermore, any extensions of the cooperative NC strategies
c 2011 IEEE 0090-6778/11$25.00 โ
DU et al.: COOPERATIVE NETWORK CODING STRATEGIES FOR WIRELESS RELAY NETWORKS WITH BACKHAUL
developed in this paper to multiple sources and/or multiple relays are left to future work. The paper is organized as follows. The system model is introduced in Section II. For symmetric channel gains and highrate backhaul, various cooperative NC strategies are investigated in Section III, and a benchmark scheme together with the cut-set bound are presented in Section IV. Cooperative NC strategies for non-symmetric channel gains and for lowrate backhaul (i.e., partial transmitter cooperation) scenarios are discussed in Section V. Numerical results are presented in Section VI and concluding remarks in Section VII. Notation: Capital letter ๐ indicates a real valued random variable and ๐(๐) indicates its probability density/mass function. ๐ (๐) denotes a vector of random variables of length ๐, and with the ๐th component ๐[๐] (in general without emphasizing the (โ
)(๐) ). ๐ผ(๐; ๐ ) denotes the mutual information between ๐ and ๐ , and ๐ถ(๐ฅ) = 12 log2 (1 + ๐ฅ) is the Gaussian capacity function. II. S YSTEM M ODEL To simplify our analysis, we first consider the symmetric channel gain scenario illustrated in Fig. 1 (๐)
(๐)
= ๐1
๐1
(๐) ๐2 ๐๐(๐)
= =
(๐)
+ ๐๐๐(๐) + ๐1 ,
(๐) (๐) ๐2 + ๐๐๐(๐) + ๐2 , (๐) (๐) ๐๐1 + ๐๐2 + ๐๐(๐) ,
(1a) (1b) (1c)
where ๐ โฅ 0 is the normalized channel gain for the sourcerelay links and ๐ โฅ 0 for the relay-destination links. For (๐) (๐) (๐) ๐ = 1, 2, ๐, ๐๐ , ๐๐ and ๐๐ are ๐-dimensional transmitted signals, received signals, and noise, respectively, where ๐๐ [๐], ๐ = 1, ..., ๐ are i.i.d. Gaussian with zero-mean and unitvariance. The transmitted signals are subject to individual average power constraints, i.e., ๐
1โ 2 ๐๐ [๐] โค ๐๐ , ๐ = 1, 2, ๐. ๐
(2)
๐=1
Note that (1) implies simultaneously perfect synchronization at ๐1 , ๐2 , and โ, respectively. This assumption, although widely adopted in information-theoretic work, is optimistic in practice. In general, the results we obtain based on perfect synchronization will serve as upper bounds on any practical performance, and can be directly extended in the same way as in [2] to scenarios where constructive (co-phase) addition is not available. In practice the backhaul normally has much higher capacity and lower error rates than the forward wireless channels. Therefore, in our model the backhaul is assumed to be errorfree and of sufficiently high capacity (higher than the forward sum-rate). The case of a backhaul capacity smaller than the sum-rate will be discussed in Section V. With a high rate backhaul, our system is closely related to the MIMO relay channel scenario, as studied in [23], [24]. However the problems are not equivalent, and we emphasize the following three main differences between the system investigated in this paper and the MIMO relay scenario with a two-antenna source node. First, in our system each source/antenna is subject to an individual power constraint (2), while in the MIMO relay
2503
channel model a sum-power constraint is usually applied at the source node, which in general implies a larger achievable rate region. Second, in our system the relay combines the messages from the sources by performing NC rather than forwarding them separately through orthogonal channels. Last but not the least, the cooperative strategies proposed for high rate backhaul in Section III can be directly extended to the finite-rate backhaul scenario with the help of superposition coding or time-sharing strategies, as stated in Section V. III. C OOPERATIVE N ETWORK C ODING S TRATEGIES Similar to [1]โ[3], [6], source ๐ฎ๐ , ๐ = 1, 2, divides its messages ๐๐ into ๐ต blocks ๐๐,1 , . . . , ๐๐,๐ต with ๐๐
๐ bits each. The transmission is completed over ๐ต + 1 blocks. At the first block the two sources exchange ๐๐,1 over the backhaul and also broadcast their own messages over the relay channels; in block ๐ก, source ๐ฎ๐ exchanges ๐๐,๐ก through the backhaul (๐) and broadcasts its codeword ๐๐,๐ก , which is a function of (๐๐,๐ก , ๐1,๐กโ1 , ๐2,๐กโ1 ), over the channels; in block ๐ต + 1 only ๐๐,๐ต is broadcasted. As each transmission is over ๐ channel uses, and assuming the backhaul is used for free, the ๐ต๐๐
๐ bits per channel use, which converges overall rate is (๐ต+1)๐ to ๐
๐ when ๐ต goes to infinity. Three decoding protocols, namely successive decoding [1], backward decoding [25], and sliding-window decoding [26], have been summarized and extended to multiple-source or multiple-relay scenarios in [3]. We implement these protocols at relay/destination nodes depending on the cooperative NC strategy under consideration. Unless stated otherwise, random coding is used for encoding and joint-typicality is used for decoding. Each codeword is generated randomly in the memoryless fashion [27]: For transmitting messages in {๐ } each of ๐๐
bits, we create a codebook consisting of 2๐๐
randomly and independently generated sequences {๐ (๐) }, each of ๐-bit length, according to the distribution ฮ ๐๐=1 ๐(๐ข๐ ). We assign a codeword ๐ (๐) to a message ๐ and associate them via an encoding function ๐ (๐) (๐ ), omitting the explicit relation where appropriate. A. Finite-field Network Coding With DF (DF+FNC) At the end of block ๐ก โ 1, the relay decodes (๐) (๐1,๐กโ1 , ๐2,๐กโ1 ) jointly from its received signal ๐๐,๐กโ1 and then creates a new message ๐๐,๐ก = ๐1,๐กโ1 โ ๐2,๐กโ1 (bitwise GF(2) addition). If the lengths of ๐1,๐กโ1 and ๐2,๐กโ1 are not equal, i.e., ๐
1 โ= ๐
2 , we can append zeros at the end of the shorter message. During block ๐ก, โ transmits ๐๐,๐ก using an independent random codebook {๐ (๐) } of size 2๐๐
(where ๐
= max(๐
1 , ๐
2 )), โ (๐) ๐๐,๐ก = ๐๐ ๐ (๐) (๐๐,๐ก ). (3) ๐ฎ1 and ๐ฎ2 , on the other hand, transmit their information (๐) via independent random codebooks {๐1 } of size 2๐๐
1 and (๐) ๐๐
2 {๐2 } of size 2 , respectively. Since ๐1,๐กโ1 and ๐2,๐กโ1 are exchanged via the backhaul in block ๐ก โ 1, ๐ฎ1 and ๐ฎ2 also know ๐๐,๐ก if decoding at โ is reliable. Therefore to exploit the possibility of coherent combining gain, ๐ฎ1 and ๐ฎ2 can coordinate their transmission with โ as follows, โ โ (๐) (๐) ๐1,๐ก = ๐ผ1 ๐1 ๐1 (๐1,๐ก ) + (1 โ ๐ผ1 )๐1 ๐ (๐) (๐๐,๐ก ), (4a) โ โ (๐) (๐) ๐2,๐ก = ๐ผ2 ๐2 ๐2 (๐2,๐ก ) + (1 โ ๐ผ2 )๐2 ๐ (๐) (๐๐,๐ก ), (4b)
2504
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 59, NO. 9, SEPTEMBER 2011
TABLE I I LLUSTRATION OF THE E NCODING AND D ECODING P ROCESS FOR DF+FNC, W ITH ๐๐,๐ก = ๐1,๐กโ1 โ ๐2,๐กโ1 , ๐๐,1 = 1, AND ๐ต = 3 ๐ก= โ ๐ฎ1 transmits ๐ฎ2 transmits โ transmits โ decodes ๐1 decodes recovers by โ
1 โฃ 2 โฃ 3 โฃ 4 ๐1,1 โ๐2,1 โฃ๐1,2 โ๐2,2 โฃ๐1,3 โ๐2,3 โฃ / (๐1,1 , 1) โฃ(๐1,2 , ๐๐,2 )โฃ(๐1,3 , ๐๐,3 )โฃ(1, ๐๐,4 ) (๐2,1 , 1) โฃ(๐2,2 , ๐๐,2 )โฃ(๐2,3 , ๐๐,3 )โฃ(1, ๐๐,4 ) 1 โฃ ๐๐,2 โฃ ๐๐,3 โฃ ๐๐,4 ๐1,1 , ๐2,1 โฃ ๐1,2 , ๐2,2 โฃ ๐1,3 , ๐2,3 โฃ / ๐1,1 โฃ ๐1,2 , ๐๐,2 โฃ ๐1,3 , ๐๐,3 โฃ ๐๐,4 / โฃ ๐2,1 โฃ ๐2,2 โฃ ๐2,3
Without the backhaul, ๐ฎ1 and ๐ฎ2 cannot know/estimate ๐๐ and therefore cannot cooperate with โ, i.e. ๐ผ1 = ๐ผ2 = 1. Hence, no coherent combining gain can be achieved.
B. Linear Network Coding With DF (DF+LNC)
When LNC is used in the signal domain, โ essentially performs superposition coding. The scheme presented here is a natural extension of the one in Theorem 1 of [6] which is designed for transmitting both private and common messages via the interference relay channel (IFRC). In our case, only where 0 โค ๐ผ1 , ๐ผ2 โค 1 are power allocation parameters. The common messages are transmitted (i.e., multicast). Unlike received signals are therefore in [6] where each source can only cooperate with node โ (๐) โ โ (๐) โ (๐) (๐) (๐) ๐1,๐ก = ๐ผ1 ๐1 ๐1 +( (1 โ ๐ผ1 )๐1 +๐ ๐๐ )๐ + ๐1,๐ก , (5a) regarding its own message in ๐๐ , the two source nodes can in our case cooperate to transmit both messages, thanks โ โ (๐) โ (๐) (๐) ๐2,๐ก = ๐ผ2 ๐2 ๐2 +( (1 โ ๐ผ2 )๐2 +๐ ๐๐ )๐ (๐) + ๐2,๐ก , (5b) to the backhaul. We first generate two independent random โ โ โ (๐) (๐) (๐) (๐) codebooks {๐1 } of size 2๐๐
1 and {๐2 } of size 2๐๐
2 . At ๐๐,๐ก =๐( (1โ๐ผ1 )๐1 + (1โ๐ผ2 )๐2 )๐ (๐) +๐ ๐ผ1 ๐1 ๐1 โ the end of block ๐ก โ 1, โ decodes (๐1,๐กโ1 , ๐2,๐กโ1 ) and then (๐) (๐) +๐ ๐ผ2 ๐2 ๐2 + ๐๐,๐ก . (5c) (๐) (๐) picks up codewords ๐1 (๐1,๐กโ1 ) and ๐2 (๐2,๐กโ1 ) from the Successive decoding is implemented at both the relay two codebooks respectively, and transmits the superposition of and the two destination nodes: assuming ๐1,๐กโ1 has been these in block ๐ก with power allocation parameter 0 โค ๐ผ๐ โค 1 โ โ successfully decoded by ๐1 , at the end of block ๐ก, ๐1 (๐) (๐) (๐) (๐) recovers (๐1,๐ก , ๐๐,๐ก ) jointly from ๐1,๐ก , and then retrieves ๐๐,๐ก = ๐ผ๐ ๐๐ ๐1 (๐1,๐กโ1 ) + (1โ๐ผ๐ )๐๐ ๐2 (๐2,๐กโ1 ). ๐2,๐กโ1 = ๐๐,๐ก โ ๐1,๐กโ1 . This approach is also used for (๐) (๐) For each codeword ๐1 (๐1,๐กโ1 ), we generate an indepen๐2 . The relay โ decodes jointly (๐1,๐ก , ๐2,๐ก ) from ๐๐,๐ก by (๐) first cancelling out ๐ (๐) . The encoding/decoding process is dent codebook {๐1 } of size 2๐๐
1 , and then use this codebook to encode the new message ๐1,๐ก . We denote the selected illustrated in Table I. (๐) codeword for ๐1,๐ก given ๐1,๐กโ1 as ๐1 (๐1,๐ก , ๐1,๐กโ1 ). Proposition 1: The achievable rate region for DF+FNC is (๐) the union over all (๐
1 , ๐
2 ) satisfying Similarly we choose ๐2 (๐2,๐ก , ๐2,๐กโ1 ) for ๐2,๐ก . With power allocation parameters 0 โค ๐ผโฒ๐ , ๐ผโฒโฒ๐ โค 1, ๐ = 1, 2 to cooperate { } โ โ with โ, the transmitted signal at ๐ฎ1 and ๐ฎ2 are therefore 2 2 ๐
1 < min ๐ถ(๐ ๐ผ1 ๐1 ), ๐ถ(๐ผ1 ๐1 ), ๐ถ(( (1โ๐ผ2 )๐2 +๐ ๐๐ ) ) , { } โ โ ๐
2 < min ๐ถ(๐2 ๐ผ2 ๐2 ), ๐ถ(๐ผ2 ๐2 ), ๐ถ(( (1โ๐ผ1 )๐1 +๐ ๐๐ )2 ) , ) { ( โ ๐
1 + ๐
2 < min ๐ถ ๐1 +๐2 ๐๐ +2๐ (1โ๐ผ1 )๐1 ๐๐ , (6) )} ( โ 2 , ๐ถ(๐ ๐ผ1 ๐1 +๐2 ๐ผ2 ๐2 ), ๐ถ ๐2 +๐2 ๐๐ +2๐ (1โ๐ผ2 )๐2 ๐๐
where the union is taken over 0 โค ๐ผ1 , ๐ผ2 โค 1. Proof: The proof can be found in Appendix A. The constraint on ๐
1 corresponds to the condition that ๐1 can be decoded reliably at โ and ๐1 , and that the NC message ๐๐ can be decoded at ๐2 , and similarly for ๐
2 and ๐
1 + ๐
2 . Note that our scheme is similar to the strategy in [8]: ๐1 recovers ๐1 from the direct link and ๐๐ from the โโ๐1 link, and then retrieves ๐2 based on the observation of ๐1 and ๐๐ . But there are two main differences: finite-field NC rather than lattice coding is used; both source nodes know ๐๐ thanks to the backhaul and therefore they cooperate with โ to get a coherent combining gain. Corollary 1: For the symmetric scenario with ๐1 =๐2 = ๐๐ = ๐ and ๐
1 =๐
2 =๐
, rate ๐
is achievable by DF+FNC if โ { } ๐ถ(2๐2 ๐ ๐ผ) ๐ถ((1+๐2 +2๐ 1โ๐ผ)๐ ) , ๐
< max min ๐ถ(๐ผ๐ ), . 0โค๐ผโค1 2 2 (7)
Proof: The result follows straightforwardly from (6) by setting ๐ผ1 = ๐ผ2 = ๐ผ.
(๐)
โ โ (๐) (๐) โ (๐) ๐ผโฒ1 ๐1 ๐1 + ๐ผโฒโฒ1 ๐1 ๐2 + (1โ๐ผโฒ1 โ๐ผโฒโฒ1 )๐1 ๐1 , โ โ โ (๐) (๐) (๐) = ๐ผโฒ2 ๐2 ๐2 + ๐ผโฒโฒ2 ๐2 ๐1 + (1โ๐ผโฒ2 โ๐ผโฒโฒ2 )๐2 ๐2 .
๐1,๐ก = (๐)
๐2,๐ก
The received signals at the destinations and the relay are โ โ โ (๐) (๐) (1โ๐ผโฒ1 โ๐ผโฒโฒ1 )๐1 ๐1 + ( ๐ผโฒ1 ๐1 +๐ ๐ผ๐ ๐๐ )๐1 โ โ (๐) (๐) +( ๐ผโฒโฒ1 ๐1 + ๐ (1 โ ๐ผ๐ )๐๐ )๐2 + ๐1 , โ โ โ (๐) (๐) (๐) ๐2 = (1โ๐ผโฒ2 โ๐ผโฒโฒ2 )๐2 ๐2 + ( ๐ผโฒโฒ2 ๐2 +๐ ๐ผ๐ ๐๐ )๐1 โ โ (๐) (๐) +( ๐ผโฒ2 ๐2 + ๐ (1 โ ๐ผ๐ )๐๐ )๐2 + ๐2 , [โ (๐) โ (๐) ๐๐(๐) = ๐ (1โ๐ผโฒ1 โ๐ผโฒโฒ1 )๐1 ๐1 + (1โ๐ผโฒ2 โ๐ผโฒโฒ2 )๐2 ๐2 โ โ โ โ (๐) (๐) (๐) +( ๐ผโฒ1 ๐1 + ๐ผโฒโฒ2 ๐2 )๐1 +( ๐ผโฒโฒ1 ๐1 + ๐ผโฒ2 ๐2 )๐2 ]+๐๐ . (8) (๐)
๐1
=
The decoding follows directly from [6]: the relay performs successive decoding and the destinations use backward de(๐) coding. โ decodes (๐1,๐ก , ๐2,๐ก ) reliably from ๐๐,๐ก at the end of block ๐ก. ๐1 and ๐2 start decoding when transmission is finished. At block ๐ต + 1, no new message is transmitted and the received signal at ๐1 (๐2 ) only depends on (๐1,๐ต , ๐2,๐ต ). After decoding (๐1,๐ต , ๐2,๐ต ) successfully, only ๐1,๐ตโ1 ( (๐) (๐) ๐2,๐ตโ1 ) is unknown in ๐1,๐ต (๐2,๐ต ), and we repeat this process backwards until all messages are recovered.
DU et al.: COOPERATIVE NETWORK CODING STRATEGIES FOR WIRELESS RELAY NETWORKS WITH BACKHAUL
Proposition 2: The achievable rate region for DF+LNC is given by { ๐
1 < min ๐ถ(๐2 ๐1 (1 โ ๐ผโฒ1 โ ๐ผโฒโฒ1 )), ) ( โ ๐ถ (1โ๐ผโฒโฒ1 )๐1 + ๐2 ๐ผ๐ ๐๐ + 2๐ ๐ผโฒ1 ๐ผ๐ ๐1 ๐๐ , ( )} โ ๐ถ ๐ผโฒโฒ2 ๐2 + ๐2 ๐ผ๐ ๐๐ + 2๐ ๐ผโฒโฒ2 ๐ผ๐ ๐2 ๐๐ , { 2 โฒ โฒโฒ ๐
2 < min ๐ถ(๐ ๐2 (1 โ ๐ผ2 โ ๐ผ2 )), ( ) โ ๐ถ (1โ๐ผโฒโฒ2 )๐2 +๐2 (1โ๐ผ๐ )๐๐ +2๐ ๐ผโฒ2 (1โ๐ผ๐ )๐2 ๐๐ , ( )} โ ๐ถ ๐ผโฒโฒ1 ๐1 + ๐2 (1โ๐ผ๐ )๐๐ + 2๐ ๐ผโฒโฒ1 (1โ๐ผ๐ )๐1 ๐๐ , { ๐
1 +๐
2 < min ๐ถ(๐2 (1โ๐ผโฒ1 โ๐ผโฒโฒ1 )๐1 +๐2 (1โ๐ผโฒ2 โ๐ผโฒโฒ2 )๐2 ), [โ ]) ( โ โ ๐ผโฒ1 ๐ผ๐ + ๐ผโฒโฒ1 (1โ๐ผ๐ ) , ๐ถ ๐1 +๐2 ๐๐ +2๐ ๐1 ๐๐ ( [โ ])} โ โ ๐ถ ๐2 +๐2 ๐๐ +2๐ ๐2 ๐๐ ๐ผโฒโฒ2 ๐ผ๐ + ๐ผโฒ2 (1โ๐ผ๐ ) , (9) with the union taken over all 0 โค ๐ผ๐ , ๐ผโฒ1 , ๐ผโฒโฒ1 , ๐ผโฒ2 , ๐ผโฒโฒ2 โค 1, with ๐ผโฒ1 + ๐ผโฒโฒ1 โค 1, ๐ผโฒ2 + ๐ผโฒโฒ2 โค 1. Proof: The proof can be found in Appendix B. The constraint on ๐
1 refers to the condition that ๐1 can be decoded successfully at โ, ๐1 , and ๐2 , respectively, and similarly for ๐
2 and ๐
1 + ๐
2 . Corollary 2: For the symmetric scenario, the following equal rate constraints apply { โ ๐
< โฒ maxโฒโฒ min ๐ถ((๐ผโฒโฒ + 12 ๐2 +๐ 2๐ผโฒโฒ )๐ ), ๐ผ โฅ0, ๐ผ โฅ0 0โค๐ผโฒ +๐ผโฒโฒ โค1
( ) โ ( ) ๐ถ (1โ๐ผโฒโฒ + 12 ๐2 +๐ 2๐ผโฒ )๐ , 12 ๐ถ 2๐2 ๐ (1โ๐ผโฒ โ๐ผโฒโฒ ) , ( )} โ โ 1 2 โฒ +๐ 2๐ผโฒโฒ )๐ ๐ถ (1+๐ +๐ 2๐ผ . (10) 2 Proof: Follows from (9) directly by setting ๐ผโฒ1 = ๐ผโฒ2 = ๐ผ , ๐ผโฒโฒ1 = ๐ผโฒโฒ2 = ๐ผโฒโฒ , and ๐ผ๐ = 1/2. Without backhaul, ๐๐ would only be partially known by the source nodes, i.e., ๐ผโฒโฒ1 = ๐ผโฒโฒ2 = 0. โฒ
C. Physical Layer Network Coding by Lattice Coding In contrast to Section III-A where โ first decodes (๐1 , ๐2 ) and then encodes into a joint NC message ๐๐ , the relay can (๐) decode the NC message directly from ๐๐ by using lattice encoding at the sources and lattice decoding at the relay, as in [8], [14] where only the case of symmetric powers is considered. We propose a protocol based on superposition of a lattice code and a random code to be able to handle the case of non-symmetric powers. Without loss of generality, we assume that ๐1 โค๐2 (hence ๐
1 โค๐
2 ). ๐ฎ2 splits its message โฒ โฒโฒ โฒ , ๐2,๐ก ], where ๐2,๐ก has the same ๐2,๐ก into two parts [๐2,๐ก length as ๐1,๐ก . ๐ฎ1 encodes ๐1,๐ก based on a nested lattice code [28], and we denote the corresponding transmitted code(๐) โฒ using the same nested word by ๐1 (๐1,๐ก ). ๐ฎ2 encodes ๐2,๐ก lattice code as ๐ฎ1 , denoting the corresponding codeword by (๐) โฒ โฒโฒ ๐2 (๐2,๐ก ), and encodes ๐2,๐ก using a random codebook (๐) (๐) (๐) ๐(๐
2 โ๐
1 ) {๐3 } of size 2 . Note that codewords ๐1 and ๐2 are independent even though they are generated by the same nested lattice code, since the dither vectors used at ๐ฎ1 and ๐ฎ2 โฒโฒ are independent [8], [28]. The relay, after decoding ๐2,๐กโ1 via a single-user joint-typicality decoder and the NC message
2505
โฒ using a lattice decoder, encodes all these new ๐1,๐กโ1 โ๐2,๐กโ1 messages by using an independent random codebook {๐ (๐) } of size 2๐๐
2 , โ (๐) โฒ โฒโฒ ๐๐,๐ก = ๐๐ ๐ (๐) (๐1,๐กโ1 โ ๐2,๐กโ1 , ๐2,๐กโ1 ).
Since ๐1,๐กโ1 and ๐2,๐กโ1 are known both at ๐ฎ1 and ๐ฎ2 โฒ โฒโฒ thanks to the backhaul, ๐ (๐) (๐1,๐กโ1 โ๐2,๐กโ1 , ๐2,๐กโ1 ) is also known. Therefore ๐ฎ1 and ๐ฎ2 cooperate with โ as follows โ โ (๐) (๐) ๐1,๐ก = ๐ฟ๐1 (๐1,๐ก ) + ๐1 โ ๐ฟ๐ (๐) , (11) โ โ (๐) โ (๐) (๐) โฒ โฒโฒ (๐) ๐2,๐ก = ๐ฟ๐2 (๐2,๐ก ) + ๐๐3 (๐2,๐ก ) + ๐2 โ๐ฟโ๐๐ , where 0 โค ๐ฟ โค ๐1 and 0 โค ๐ โค ๐2 โ๐ฟ are the allocated power to transmit the new messages. The corresponding received signals at the relay and destinations are ) โ ( (๐) โ (๐) (๐) (๐) + ๐ ๐๐3 ๐๐,๐ก =๐ ๐ฟ ๐1 +๐2 (โ ) โ (๐) +๐ ๐1 โ๐ฟ + ๐2 โ๐ฟโ๐ ๐ (๐) + ๐๐,๐ก , โ ) โ (๐) (โ (๐) (๐) ๐1 โ๐ฟ + ๐ ๐๐ ๐ (๐) + ๐1,๐ก , (12) ๐1,๐ก = ๐ฟ๐1 + โ (๐) โ (๐) (โ โ ) (๐) (๐) (๐) ๐2,๐ก = ๐ฟ๐2 + ๐๐3 + ๐2 โ๐ฟโ๐+๐ ๐๐ ๐ +๐2,๐ก . ๐1 performs successive decoding: at the end of block ๐ก, (๐) โฒ โฒโฒ ๐1 decodes (๐1,๐กโ1 โ ๐2,๐กโ1 , ๐2,๐กโ1 ) from ๐1,๐ก by joint โฒ by using ๐1,๐กโ1 which has typicality and recovers ๐2,๐กโ1 been recovered successfully from block ๐กโ1; after cancelling out ๐ (๐) the new information ๐1,๐ก can be decoded. This approach is also used for ๐2 . Proposition 3: Using lattice coding, an achievable rate region is given by { } ๐
1 < min ๐ถ(โ1/2 + ๐2 ๐ฟ), ๐ถ(๐ฟ) , { } ๐
2 < min ๐ถ(โ1/2 + ๐2 ๐ฟ + ๐2 ๐/2), ๐ถ(๐ฟ + ๐) , { ( ) โ ๐
1 + ๐
2 < min ๐ถ ๐1 + ๐2 ๐๐ + 2๐ ๐๐ (๐1 โ ๐ฟ) , ( )} โ ๐ถ ๐2 + ๐2 ๐๐ + 2๐ ๐๐ (๐2 โ๐ฟโ๐) , (13) with the union taken over 0 โค ๐ฟ โค ๐1 and 0 โค ๐ โค ๐2 โ ๐ฟ. Proof: The proof can be found in Appendix C. The first term in ๐
1 (๐
2 ) refers to the decoding constraint at โ for the nested lattice code. Corollary 3: For the symmetric scenario, the achievable rate region is { ๐
< max min ๐ถ(๐ผ๐ ), ๐ถ(โ1/2 + ๐2 ๐ ๐ผ), 0โค๐ผโค1 (( ) )} โ 1 1 + ๐2 + 2๐ 1 โ ๐ผ ๐ . (14) 2๐ถ Proof: The result follows straightforwardly from (14) by setting ๐ = 0 and ๐ฟ = ๐ ๐ผ. Without backhaul, the NC message would not be known at the sources, i.e., ๐ฟ = ๐1 and ๐ = ๐2 โ ๐1 . D. Network (DF+NBF)
Coding
Based
Beam-forming
With
DF
To further exploit the available coherent combining (beamforming) gain [1]โ[3] at the sinks, we propose a new strategy that performs NC at both ๐ฎ1 and ๐ฎ2 but not at the relay (decreasing the complexity at โ). We refer to this scheme as
2506
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 59, NO. 9, SEPTEMBER 2011
NC based beam-forming (NBF) since the signals transmitted at ๐ฎ1 , ๐ฎ2 and โ are formed in a beamforming-like fashion. NBF requires ๐ต+2 blocks in total: (๐1,๐กโ1 , ๐2,๐กโ1 ) are exchanged via the backhaul during block ๐กโ1; at block ๐ก the NC message ๐๐ก = ๐ (๐1,๐กโ1 , ๐2,๐กโ1 ) is transmitted; at block ๐ก+1, ๐๐ก is transmitted by โ. The relay transmits ๐๐กโ1 using a random codebook {๐ (๐) } of size 2๐(๐
1 +๐
2 ) . For each codeword ๐ (๐) (๐๐กโ1 ), we generate an independent random codebook {๐ (๐) } of size 2๐(๐
1 +๐
2 ) , and then use it to encode the new message ๐๐ก . We denote the selected codeword for ๐๐ก given ๐๐กโ1 as ๐ (๐) (๐๐ก , ๐๐กโ1 ). At block ๐ก, the transmitted signals are โ (๐) ๐๐,๐ก = ๐๐ ๐ (๐) (๐๐กโ1 ), (15) โ โ (๐) (๐) (๐) ๐1,๐ก = ๐ผ1 ๐1 ๐ (๐๐ก , ๐๐กโ1 ) + (1โ๐ผ1 )๐1 ๐ (๐๐กโ1 ), โ โ (๐) ๐2,๐ก = ๐ผ2 ๐2 ๐ (๐) (๐๐ก , ๐๐กโ1 ) + (1โ๐ผ2 )๐2 ๐ (๐) (๐๐กโ1 ), where 0 โค ๐ผ1 , ๐ผ2 โค 1 are power allocation parameters. The corresponding received signals are โ โ โ (๐) (๐) ๐1,๐ก = ๐ผ1 ๐1 ๐ (๐) +(๐ ๐๐ + (1โ๐ผ1 )๐1 )๐ (๐) +๐1,๐ก , โ โ โ (๐) (๐) ๐2,๐ก = ๐ผ2 ๐2 ๐ (๐) +(๐ ๐๐ + (1โ๐ผ2 )๐2 )๐ (๐) +๐2,๐ก , ) (โ โ (๐) ๐ผ1 ๐1 + ๐ผ2 ๐2 ๐ (๐) (16) ๐๐,๐ก =๐ ) (โ โ (๐) (1โ๐ผ1 )๐1 + (1โ๐ผ2 )๐2 ๐ (๐) + ๐๐,๐ก . +๐ The decoding process is similar as in the other cooperative strategies: the relay performs successive decoding and the destinations utilize backward decoding. Proposition 4: The achievable rate region for NBF is defined by ) { ( โ ๐
1 + ๐
2 < min ๐ถ ๐1 + ๐2 ๐๐ + 2๐ (1 โ ๐ผ1 )๐1 ๐๐ , ( ) โ ๐ถ ๐2 + ๐2 ๐๐ + 2๐ (1 โ ๐ผ2 )๐2 ๐๐ , ( ( ))} โ ๐ถ ๐2 ๐ผ1 ๐1 + ๐ผ2 ๐2 + 2 ๐ผ1 ๐ผ2 ๐1 ๐2 , (17) with the union taken over the power allocation parameters 0 โค ๐ผ1 , ๐ผ2 โค 1. Proof: Since ๐ฎ1 and ๐ฎ2 transmit the same NC message ๐๐ก , the achievable sum-rate can be split arbitrarily between them. Therefore in the NBF strategy only the constraints for the sum-rate matter. Following similar arguments as in Appendix A, the sum-rate constraint (55c) still holds here. By (๐) applying successive decoding to ๐๐,๐ก and backward decoding (๐) (๐) to ๐1,๐ก and ๐2,๐ก , the jointly Gaussian distributed random variables (๐ (๐) , ๐ (๐) ) will translate (55c) into (17). The terms in (17) indicate the constraints at ๐1 , ๐2 , and โ, respectively. Corollary 4: For the symmetric scenario, the achievable rate region is defined by { (( ) )} โ ๐
< max min 12 ๐ถ(4๐2 ๐ ๐ผ), 12 ๐ถ 1+๐2 +2๐ 1โ๐ผ ๐ . 0โค๐ผโค1
(18) Proof: The result follows straightforwardly from (17) by setting ๐ผ1 = ๐ผ2 = ๐ผ. Without the backhaul, this strategy is impossible.
IV. B ENCHMARK S CHEMES AND C UT- SET B OUND To evaluate the performance of the cooperative NC strategies presented in Section III, we consider two benchmark schemes, namely the non-NC based time-sharing relay scheme and the non-DF based noisy NC scheme [15]. We also derive the cut-set bound [27] for our scenario. A. Time Sharing Relay With DF (DF+TD) In contrast to the orthogonal scheme described in [6] for the case of the IFRC, ๐ฎ1 and ๐ฎ2 here cooperate with โ to convey both messages. We first generate two independent random (๐) (๐) codebooks {๐1 } of size 2๐๐
1 and {๐2 } of size 2๐๐
2 , and they will be used by โ to help ๐ฎ1 and ๐ฎ2 , respectively. For (๐) each codeword in {๐2 }, we generate an independent random (๐) codebook {๐1 } of size 2๐๐
1 , and then use it to encode the new message at ๐ฎ1 . Similarly we generate a random codebook (๐) (๐) {๐2 } of size 2๐๐
2 for each codeword in {๐1 }. During block ๐ก, ๐1,๐ก and ๐2,๐ก are exchanged via the backhaul, and the transmission during block ๐ก is divided into two parts. During the first part of block ๐ก, the transmitted signals are โ (๐) (๐) (๐) ๐2,๐ก = 0, ๐๐,๐ก1 = ๐๐ ๐2 (๐2,๐กโ1 ), โ 1 โ (๐) (๐) (๐) 1) ๐2 (๐2,๐กโ1 ), ๐1,๐ก1 = ๐ผ1๐ฝ๐1 ๐1 (๐1,๐ก , ๐2,๐กโ1 )+ ๐1 (1โ๐ผ ๐ฝ where 0 โค ๐ผ1 โค 1 is the power allocation parameter and 0 โค ๐ฝ โค 1 is the time sharing parameter. Transmission power (๐) ๐1 /๐ฝ is used in ๐1,๐ก1 to meet the power constraint (2). The received signals are โ (๐) (๐) (๐) (๐) (๐) ๐2,๐ก1 = ๐๐๐,๐ก1 + ๐2,๐ก1 = ๐ ๐๐ ๐2 + ๐2,๐ก1 , โ โ (๐) (๐) (๐) (๐) 1) ๐2 + ๐๐,๐ก1 , (19) ๐๐,๐ก1 = ๐ ๐ผ1๐ฝ๐1 ๐1 + ๐ ๐1 (1โ๐ผ ๐ฝ (โ ) โ โ (๐) (๐) (๐) (๐) ๐1 (1โ๐ผ1 ) ๐1,๐ก1 = ๐ผ1๐ฝ๐1 ๐1 + +๐ ๐๐ ๐2 + ๐1,๐ก1 . ๐ฝ The relay decodes ๐1,๐ก given ๐2,๐กโ1 and then encodes it (๐) to ๐1 (๐1,๐ก ). During the remaining part of block ๐ก, the transmitted signals are โ (๐) (๐) (๐) ๐1,๐ก2 = 0, ๐๐,๐ก2 = ๐๐ ๐1 (๐1,๐ก ), โ โ (๐) (๐) (๐) 2) 2 ๐2 ๐2 (๐2,๐ก , ๐1,๐ก )+ ๐2 (1โ๐ผ ๐1 (๐1,๐ก ). ๐2,๐ก2 = ๐ผ1โ๐ฝ 1โ๐ฝ The corresponding received signals are โ (๐) (๐) (๐) (๐) (๐) ๐1,๐ก2 = ๐๐๐,๐ก2 + ๐1,๐ก2 = ๐ ๐๐ ๐1 + ๐1,๐ก2 , โ โ (๐) (๐) (๐) (๐) 2) 2 ๐2 ๐2 + ๐ ๐2 (1โ๐ผ ๐1 + ๐2,๐ก2 , (20) ๐๐,๐ก2 = ๐ ๐ผ1โ๐ฝ 1โ๐ฝ ( ) โ โ โ (๐) (๐) (๐) (๐) (1โ๐ผ2 )๐2 2 ๐2 ๐2,๐ก2 = ๐ผ1โ๐ฝ ๐2 + + ๐ ๐๐ ๐1 + ๐2,๐ก2 . 1โ๐ฝ At the end of block ๐ก, โ decodes ๐2,๐ก given ๐1,๐ก , and ๐1 can retrieve (๐1,๐ก , ๐2,๐กโ1 ) reliably using sliding-window decoding based on the received signals during block ๐ก. Similarly, after the first part of block ๐ก + 1, ๐2 can decode (๐2,๐ก , ๐1,๐ก ) reliably based on signals received from the first part of block ๐ก + 1 and the second part of block ๐ก.
DU et al.: COOPERATIVE NETWORK CODING STRATEGIES FOR WIRELESS RELAY NETWORKS WITH BACKHAUL
Proposition 5: The achievable rate region for this time sharing strategy is defined by { 2 ๐
1 < min ๐ฝ๐ถ( ๐ผ1 ๐๐ฝ ๐1 ), ๐ฝ๐ถ( ๐ผ1๐ฝ๐1 ) + (1โ๐ฝ)๐ถ(๐2 ๐๐ ), ( )} โ ๐2 (1โ๐ฝ)๐ถ ๐2 ๐๐ + 1โ๐ฝ + 2๐ (1โ๐ผ2 )๐2 ๐๐ /(1โ๐ฝ) , { ๐2 ๐2 2 ๐2 ), (1โ๐ฝ)๐ถ( ๐ผ1โ๐ฝ )+๐ฝ๐ถ(๐2 ๐๐ ), ๐
2 < min (1โ๐ฝ)๐ถ( ๐ผ21โ๐ฝ ( )} โ ๐ฝ๐ถ ๐2 ๐๐ + ๐๐ฝ1 + 2๐ ๐1 ๐๐ (1โ๐ผ1 )/๐ฝ , ๐
1 +๐
2 < min{
(21) ( ) โ (1โ๐ฝ)๐ถ(๐2 ๐๐ )+๐ฝ๐ถ ๐2 ๐๐ + ๐๐ฝ1 +2๐ ๐1 ๐๐ (1โ๐ผ1 )/๐ฝ , ( )} โ ๐2 ๐๐ (1โ๐ผ2 ) 2 ๐2 2 , ๐ฝ๐ถ(๐ ๐๐ ) + (1โ๐ฝ)๐ถ ๐ ๐๐ + 1โ๐ฝ +2๐ 1โ๐ฝ
with the union taken over all 0 โค ๐ผ1 , ๐ผ2 โค 1 and the time sharing parameter 0 โค ๐ฝ โค 1. Proof: The proof follows immediately from Appendix B by applying the Gaussian condition and noting the dependence stated in (19) and (20). Constraints in ๐
1 (๐
2 ) correspond to the condition of successful decoding of ๐1 (๐2 ) at โ, ๐1 (๐2 ), and ๐2 (๐1 ), respectively. Constraints in ๐
1 + ๐
2 refer to successful decoding at ๐1 and ๐2 . By setting ๐ผ1 = ๐ผ2 = ๐ผ and ๐ฝ = 1/2, (21) can be translated into the symmetric rate constraint { ( ( )) โ ๐
< max min 12 ๐ถ ๐ 2+๐2 +2๐ 2โ2๐ผ , 0โค๐ผโค1 ( ) 1 1 2 2 2 2 ๐ถ (2๐ผ+๐ +2๐ผ๐ ๐ )๐ , 2 ๐ถ(2๐ ๐ ๐ผ), (( ) )]} [ โ 1 2 2+๐2 +2๐ 2โ2๐ผ ๐ . (22) 4 ๐ถ(๐ ๐ )+๐ถ Without backhaul, sources can only encode over their own messages. Therefore we have ๐ผ1 = ๐ผ2 = 1 and the first term in (22) reduces to 12 ๐ถ(๐2 ๐ ). B. Noisy Network Coding (Noisy NC) The basic principle of noisy NC, as described in [15], is to convey a โsuper messageโ ๐ต times, each time using an independent codebook and letting ๐ตโโ, before the destination(s) can successfully decode the message. Therefore it is not clear how collaboration via the finite-rate backhaul can be implemented, since it requires a ๐ตโโ times higher backhaul rate to exchange the super message before transmission starts. On the other hand, the backhaul provides orthogonal (i.e., out-ofband) conferencing bit-pipes between two source nodes. How to extend the noisy NC scheme [15], originally designed for relay networks with co-channel (i.e., in-band) transmission, so as to optimally utilize the rate-limited backhaul is interesting but out of the scope of this paper. The achievable rate region for noisy NC (without backhaul collaboration) can be specialized from Theorem 1 of [15] to the multicast relay network in Fig. 1 as follows ๐
1 < min{๐ผ(๐1 ; ๐ห๐ ๐1 โฃ๐2 ๐๐ ๐), ๐ผ(๐1 ; ๐ห๐ ๐2 โฃ๐2 ๐๐ ๐), ๐ผ(๐1 ๐๐ ; ๐1 โฃ๐2 ๐) โ ๐ผ(๐๐ ; ๐ห๐ โฃ๐1 ๐2 ๐๐ ๐1 ๐), ๐ผ(๐1 ๐๐ ; ๐2 โฃ๐2 ๐) โ ๐ผ(๐๐ ; ๐ห๐ โฃ๐1 ๐2 ๐๐ ๐2 ๐)}, ๐
2 < min{๐ผ(๐2 ; ๐ห๐ ๐1 โฃ๐1 ๐๐ ๐), ๐ผ(๐2 ; ๐ห๐ ๐2 โฃ๐1 ๐๐ ๐), ๐ผ(๐2 ๐๐ ; ๐1 โฃ๐1 ๐) โ ๐ผ(๐๐ ; ๐ห๐ โฃ๐1 ๐2 ๐๐ ๐1 ๐),
2507
๐ผ(๐2 ๐๐ ; ๐2 โฃ๐1 ๐) โ ๐ผ(๐๐ ; ๐ห๐ โฃ๐1 ๐2 ๐๐ ๐2 ๐)}, ๐
1 +๐
2 < min{๐ผ(๐1 ๐2 ; ๐ห๐ ๐1 โฃ๐๐ ๐), ๐ผ(๐1 ๐2 ; ๐ห๐ ๐2 โฃ๐๐ ๐), ๐ผ(๐1 ๐2 ๐๐ ; ๐1 โฃ๐) โ ๐ผ(๐๐ ; ๐ห๐ โฃ๐1 ๐2 ๐๐ ๐1 ๐), ๐ผ(๐1 ๐2 ๐๐ ; ๐2 โฃ๐) โ ๐ผ(๐๐ ; ๐ห๐ โฃ๐1 ๐2 ๐๐ ๐2 ๐)},
(23)
where ๐ห๐ is the compressed version of ๐๐ , ๐ is the timesharing random variable, and the joint probability can be ๐ฆ๐ โฃ๐ฅ๐ , ๐ฆ๐ , ๐). By partitioned as ๐(๐)๐(๐ฅ1 โฃ๐)๐(๐ฅ2 โฃ๐)๐(๐ฅ๐ โฃ๐)๐(ห setting ๐ = โ
and ๐ห๐ = ๐๐ + ๐ห with ๐ห โผ ๐ (0, ๐ 2 ), and applying (1) and (2), the achievable rate region in (23) is simplified to ๐
1 < min{๐ถ(๐2 ๐1 /(1 + ๐ 2 )), ๐ถ(๐2 ๐๐ ) โ ๐ถ(1/๐ 2 )}, ๐
2 < min{๐ถ(๐2 ๐2 /(1 + ๐ 2 )), ๐ถ(๐2 ๐๐ ) โ ๐ถ(1/๐ 2 )}, ๐
1 + ๐
2 < min{๐ถ(๐1 +๐2 (๐1 +๐2 +๐1 ๐2 )/(1+๐ 2 )), (24) ๐ถ(๐2 + ๐2 (๐1 + ๐2 + ๐1 ๐2 )/(1+๐ 2 )), ๐ถ(๐1 + ๐2 ๐๐ )โ๐ถ(1/๐ 2 ), ๐ถ(๐2 + ๐2 ๐๐ )โ๐ถ(1/๐ 2 )}, with the union taken over all ๐ 2 > 0. Note that redundant terms have been removed from ๐
1 and ๐
2 . For the symmetric scenario, the achievable rate region is ๐2 (2๐ +๐ 2 ) 1 ), 2 ๐ถ(๐ + 1+๐2 2 1 2 1 2 ๐ถ(๐ ๐ )โ๐ถ(1/๐ ), 2 ๐ถ(๐ + ๐ ๐ ) โ 2 ๐ถ(1/๐ 2 )}. 2
๐ ๐ ๐
< min{๐ถ( 1+๐ 2 ),
(25)
C. Cut-Set Bound By the cut-set bound [27], the maximum achievable sum rate from the source nodes to any of the destinations can be no larger than the minimum of the mutual information flows across all possible cuts, maximized over a joint distribution for the transmitted signals. In our case, the cut-set bound between the two sources and each of the sink for the network in Fig. 1 can be derived based on four cuts, as demonstrated in Fig. 2, as follows (the dimension super script (๐) is suppressed to simplify the notation) ๐
1 +๐
2 โค ๐ถcut-set =
sup
๐(๐1 ,๐2 ,๐๐ )
min{
1 1 ๐ผ(๐1 ๐2 ; ๐1 ๐๐ โฃ๐๐ ), ๐ผ(๐1 ๐2 ๐๐ ; ๐1 ), ๐ ๐ } 1 1 ๐ผ(๐1 ๐2 ; ๐2 ๐๐ โฃ๐๐ ), ๐ผ(๐1 ๐2 ๐๐ ; ๐2 ) , ๐ ๐
(26)
where ๐1 , ๐2 and ๐๐ are potentially correlated. As suggested in [29], to find the exact cut-set bound ๐ถcut-set , we will first find an upper bound ๐ถupp โฅ ๐ถcut-set based on the technique used in [1], and then find a lower bound ๐ถcut-set, G โค ๐ถcut-set by restricting the source distribution to Gaussian, and finally show that ๐ถcut-set, G = ๐ถupp . Following the conventional notation for the differential entropy โ(๐) of a continuous valued random variable ๐, the mutual information corresponding to cut 2 can be written as ๐ผ(๐1 ๐2 ๐๐ ; ๐1 ) = โ(๐1 ) โ โ(๐1 โฃ๐1 ๐2 ๐๐ ) ๐ = โ(๐1 ) โ โ(๐1 ) = โ(๐1 ) โ log(2๐๐), 2
(27)
2508
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 59, NO. 9, SEPTEMBER 2011
๐ฎ1 ๐1
๐1
Cut 1
Backhaul
๐๐ ๐ฎ2 ๐ 2
๐2
Cut 2 ๐1 โ
๐1
โ 1 ๐ผ(๐1 ๐2 ๐๐ ; ๐1 ) โค ๐ถ(๐1 +๐2 ๐๐ +2๐ (1โ๐ผ1 )๐1 ๐๐ ), ๐ โ 1 ๐ผ(๐1 ๐2 ๐๐ ; ๐2 ) โค ๐ถ(๐2 +๐2 ๐๐ +2๐ (1โ๐ผ2 )๐2 ๐๐ ). (37) ๐
๐๐ Cut 4 ๐2
Cut 3
Now, substituting (36) and (30) into (29), and applying the same approach also to cut 4, we get
๐2
Fig. 2. The sum multicast capacity is bounded by the cut-set bound based on the four cuts shown in the figure.
For cut 1 we have ๐ผ(๐1 ๐2 ; ๐1 ๐๐ โฃ๐๐ ) = โ(๐1 ๐๐ โฃ๐๐ )โโ(๐1 ๐๐ โฃ๐1 ๐2 ๐๐ ) (38) = โ(๐1 ๐๐ โฃ๐๐ ) โ โ(๐1 โฃ๐1 ๐2 ๐๐ ) โ โ(๐๐ โฃ๐1 ๐2 ๐๐ )
From the maximum entropy lemma [27], we get โ(๐1 ) โค
๐ โ ๐=1
โ(๐1,๐ ) โค
๐ โ 1 ๐=1
2
log(2๐๐Var[๐1,๐ ]),
(28)
where the second equality is achieved when ๐1,๐ is Gaussian distributed. Hence ๐ 1 1โ1 ๐ผ(๐1 ๐2 ๐๐ ; ๐1 ) โค log(Var(๐1,๐ )) ๐ ๐ ๐=1 2 ๐
โค
1 1โ Var(๐1,๐ )), log( 2 ๐ ๐=1
(29)
where the last steps follow from Jensenโs inequality. Furthermore, we have Var(๐1,๐ ) = Var(๐1,๐ + ๐๐๐,๐ ) + 1 โค 1 + ๐ธ[(๐1,๐ + ๐๐๐,๐ )2 ] 2 2 = 1 + ๐ธ[๐1,๐ ] + ๐2 ๐ธ[๐๐,๐ ] + 2๐๐ธ[๐1,๐ ๐๐,๐ ], (30)
with equality for ๐ธ[๐๐ ] = 0. Also, using the CauchyโSchwarz inequality we get
๐ ๐ ๐ โ โ 1 โ 1 2 1 ๐ธ[๐1,๐ ๐๐,๐ ] โค โท ๐ธ[๐๐,๐ ] ๐ธ[(๐ธ(๐1,๐ โฃ๐๐,๐ ))2 ]. ๐ ๐=1 ๐ ๐=1 ๐ ๐=1
(31)
As in [1], we can introduce an auxiliary variable ๐ผ1 โ [0, 1] such that ๐ 1โ ๐ธ[(๐ธ(๐1,๐ โฃ๐๐,๐ ))2 ] = (1 โ ๐ผ1 )๐1 . (32) ๐ ๐=1
= โ(๐1 ๐๐ โฃ๐๐ )โโ(๐1 )โโ(๐๐ ) = โ(๐1 ๐๐ โฃ๐๐ )โ๐ log(2๐๐) ๐ ๐ ( ) 1โ 1โ โค log (2๐๐)2 โฃ๐ฒ ๐ โฃ โ ๐ log(2๐๐) = log (โฃ๐ฒ ๐ โฃ) , 2 ๐=1 2 ๐=1 where the second equality in (38) comes from the fact that ๐1 and ๐๐ are independent given (๐1 , ๐2 , ๐๐ ) and the inequality is due to the maximum entropy lemma [27], with equality achieved by joint Gaussian distributed (๐1,๐ , ๐๐,๐ ) with conditional covariance matrices ๐ฒ ๐ defined by [ ] ๐ธ[Var(๐1,๐ โฃ๐๐,๐ )] ๐ธ[Cov(๐1,๐ , ๐๐,๐ โฃ๐๐,๐ )] ๐ฒ๐= , (39) ๐ธ[Cov(๐1,๐ , ๐๐,๐ โฃ๐๐,๐ )] ๐ธ[Var(๐๐,๐ โฃ๐๐,๐ )] where ๐ธ[Var(๐1,๐ โฃ๐๐,๐ )] = 1 + ๐ธ[Var(๐1,๐ โฃ๐๐,๐ )], ๐ธ[Cov(๐1,๐ , ๐๐,๐ โฃ๐๐,๐ )] = ๐๐ธ[Cov(๐1,๐ , ๐1,๐ +๐2,๐ โฃ๐๐,๐ )] = ๐(๐ธ[Var(๐1,๐ โฃ๐๐,๐ )]+๐ธ[Cov(๐1,๐ , ๐2,๐ โฃ๐๐,๐ )]), (40) ๐ธ[Var(๐๐,๐ โฃ๐๐,๐ )] = 1 + ๐2 ๐ธ [Var(๐1,๐ +๐2,๐ )โฃ๐๐,๐ ] = 1 + ๐2 (๐ธ[Var(๐1,๐ โฃ๐๐,๐ )] + ๐ธ[Var(๐2,๐ โฃ๐๐,๐ )] + 2๐ธ[Cov(๐1,๐ , ๐2,๐ โฃ๐๐,๐ )]). (41) Obviously, the covariance matrices ๐ฒ ๐ are positive semidefinite. Since the function log โฃ๐ฒโฃ is concave [30], we can thus bound the throughput of cut 1 as follows ๐
1โ1 1 ๐ผ(๐1 ๐2 ; ๐1 ๐๐ โฃ๐๐ ) โค log (โฃ๐ฒ ๐ โฃ) ๐ 2 ๐=1 ๐ ) ( ๐ 1 โ 1 โค log ๐ฒ๐ . ๐ 2
Then by applying the power constraint defined in (2), we have ๐ ๐ 1โ 1โ 2 ๐ธ[Var(๐1,๐ โฃ๐๐,๐ )] = (๐ธ[๐1,๐ ]โ๐ธ[(๐ธ(๐1,๐ โฃ๐๐,๐ ))2 ]) ๐ ๐=1 ๐ ๐=1
โค ๐ผ1 ๐1 .
(33)
Similarly, we can introduce ๐ผ2 โ [0, 1] such that ๐ 1โ ๐ธ[(๐ธ(๐2,๐ โฃ๐๐,๐ ))2 ] = (1 โ ๐ผ2 )๐2 , ๐ ๐=1 ๐ 1โ ๐ธ[Var(๐2,๐ โฃ๐๐,๐ )] โค ๐ผ2 ๐2 . ๐ ๐=1
(34)
By substituting (32) into (31) we get ๐
โ 1โ ๐ธ[๐1,๐ ๐๐,๐ ] โค (1 โ ๐ผ1 )๐1 ๐๐ . ๐ ๐=1
It is then straightforward to show that for the inner term in (42) we can get
๐ ๐
โ
1 + ๐2 โ
1
๐ฒ ๐ = 1 + ๐ธ[Var(๐1,๐ โฃ๐๐,๐ )]
๐
๐ ๐=1 ๐=1 +
(35)
(36)
(42)
๐=1
๐ ๐ ๐2 โ 2๐2 โ ๐ธ[Var(๐2,๐ โฃ๐๐,๐ )] + ๐ธ[Cov(๐1,๐ , ๐2,๐ โฃ๐๐,๐ )] ๐ ๐=1 ๐ ๐=1 ) ( ๐ ๐ 1โ 1โ 2 +๐ ๐ธ[Var(๐1,๐ โฃ๐๐,๐ )] ๐ธ[Var(๐2,๐ โฃ๐๐,๐ )] ๐ ๐=1 ๐ ๐=1 )2 ( ๐ 1โ 2 โ๐ ๐ธ[Cov(๐1,๐ , ๐2,๐ โฃ๐๐,๐ )] . (43) ๐ ๐=1
DU et al.: COOPERATIVE NETWORK CODING STRATEGIES FOR WIRELESS RELAY NETWORKS WITH BACKHAUL
โ As Cov(๐1,๐ , ๐2,๐ โฃ๐๐,๐ )=๐๐ Var(๐1,๐ โฃ๐๐,๐ )Var(๐2,๐ โฃ๐๐,๐ ), where โฃ๐๐ โฃ โค 1 is the correlation coefficient, we have ๐
1โ ๐ธ[Cov(๐1,๐ , ๐2,๐ โฃ๐๐,๐ )] ๐ ๐=1 ๐ ๐ 1 โ 1โ โคโท ๐๐ ๐ธ[Var(๐1,๐ โฃ๐๐,๐ )] ๐๐ ๐ธ[Var(๐2,๐ โฃ๐๐,๐ )] ๐ ๐=1 ๐ ๐=1 โ โค ๐ผ1 ๐ผ2 ๐1 ๐2 , (44) where the first inequality is due to the CauchyโSchwarz inequality and the last step is given by (33) and (35). Given that โฃ๐๐ โฃ โค 1, we can introduce another auxiliary variable 0 โค ๐ โค 1 such that ๐
โ 1โ ๐ธ[Cov(๐1,๐ , ๐2,๐ โฃ๐๐,๐ )] = ๐ ๐ผ1 ๐ผ2 ๐1 ๐2 . ๐ ๐=1
(45)
Now, by substituting (33), (35) and (45) into (43), the bound (42) can be translated into 1 ๐ผ(๐1 ๐2 ; ๐1 ๐๐ โฃ๐๐ ) โค ๐ถ(๐ผ1 ๐1 (46) ๐ ) โ +๐2 (๐ผ1 ๐1 +๐ผ2 ๐2 +2๐ ๐ผ1 ๐ผ2 ๐1 ๐2 +(1โ๐2 )๐ผ1 ๐ผ2 ๐1 ๐2 ) . Similarly, we can bound the throughput of cut 3 as follows 1 ๐ผ(๐1 ๐2 ; ๐2 ๐๐ โฃ๐๐ ) โค ๐ถ(๐ผ2 ๐2 (47) ๐ ) โ +๐2 (๐ผ2 ๐2 +๐ผ1 ๐1 +2๐ ๐ผ1 ๐ผ2 ๐1 ๐2 +(1โ๐2 )๐ผ1 ๐ผ2 ๐1 ๐2 ) . By combining the individual bounds defined by (37), (46) and (47), the cut-set bound ๐ถcut-set in (26) can be upper bounded by ๐ถupp , as defined in (48) at the bottom of this page. On the other hand, we can also lower bound ๐ถcut-set by ๐ถcut-set, G , obtained by restricting ๐(๐1 , ๐2 , ๐๐ ) in (26) to be Gaussian. We partition the Gaussian variables ๐1 , ๐2 and ๐๐ as follows โ ๐๐ ๐, (49a) โ โ โ ๐1 = (1โ๐)๐ผ1 ๐1 ๐1 + ๐๐ผ1 ๐1 ๐ + (1โ๐ผ1 )๐1 ๐, (49b) โ โ โ ๐2 = (1โ๐)๐ผ2 ๐2 ๐2 + ๐๐ผ2 ๐2 ๐ + (1โ๐ผ2 )๐2 ๐, (49c) ๐๐ =
where ๐1 , ๐2 , ๐ , and ๐ are ๐-dimensional independent Gaussian random vectors with zero-mean and unit-variance. 0 โค ๐ผ1 , ๐ผ2 , ๐ โค 1 are auxiliary variables introduced to represent the potential correlation among ๐1 , ๐2 and ๐๐ due
๐ถupp =
2509
to cooperation. The received signals are then โ โ โ ๐1 = (1โ๐)๐ผ1 ๐1 ๐1 + (๐ ๐๐ + (1โ๐ผ1 )๐1 )๐ โ + ๐๐ผ1 ๐1 ๐ + ๐1 , (50a) โ โ โ ๐2 = (1โ๐)๐ผ2 ๐2 ๐2 + (๐ ๐๐ + (1โ๐ผ2 )๐2 )๐ โ + ๐๐ผ2 ๐2 ๐ + ๐2 , (50b) โ โ โ ๐๐ = ๐ (1โ๐)๐ผ1 ๐1 ๐1 +๐( (1โ๐ผ1 )๐1 + (1โ๐ผ2 )๐2 )๐ โ โ โ +๐ (1โ๐)๐ผ2 ๐2 ๐2 +๐( ๐๐ผ1 ๐1 + ๐๐ผ2 ๐2 )๐ +๐๐ . (50c) By substituting (50) into (27) and (38), we can derive from (26) ๐
๐ถcut-set, G =
sup
0โค๐ผ1 ,๐ผ2 ,๐โค1
min
1 โ {log(Var(๐1,๐ )), 2๐ ๐=1
log(Var(๐2,๐ )), log (โฃ๐ฒ 1,๐ โฃ) , log (โฃ๐ฒ 2,๐ โฃ)} , (51) where for ๐ = 1, ..., ๐, we have
โ Var(๐1,๐ ) = 1 + ๐1 + ๐2 ๐๐ + 2๐ (1 โ ๐ผ1 )๐1 ๐๐ , โ Var(๐2,๐ ) = 1 + ๐2 + ๐2 ๐๐ + 2๐ (1 โ ๐ผ2 )๐2 ๐๐ , โ โฃ๐ฒ 1,๐ โฃ = 1+(1+๐2 )๐ผ1 ๐1 +๐2 ๐ผ2 ๐2 +2๐2 ๐ ๐ผ1 ๐ผ2 ๐1 ๐2 +๐2 (1โ๐2 )๐ผ1 ๐ผ2 ๐1 ๐2 , โ โฃ๐ฒ 2,๐ โฃ = 1+(1+๐2 )๐ผ2 ๐2 +๐2 ๐ผ2 ๐2 +2๐2 ๐ ๐ผ1 ๐ผ2 ๐1 ๐2
(52)
+๐2 (1โ๐2 )๐ผ1 ๐ผ2 ๐1 ๐2 . By substituting (52) into (51) we get ๐ถcut-set, G which actually equals to ๐ถupp as defined in (48), i.e., ๐ถcut-set, G = ๐ถupp . Recall that ๐ถcut-set, G โค ๐ถcut-set โค ๐ถupp , we can finally conclude that ๐ถcut-set = ๐ถupp , i.e., the capacity upper bound defined in (48) is actually the cut-set bound. For the symmetric scenario where ๐1 = ๐2 = ๐๐ = ๐ , by setting ๐ผ = ๐ผ1 = ๐ผ2 , the cut-set bound defined in (48) can be translated to the following constraint { โ )) 1 ( ( ๐ถ ๐ 1 + ๐2 + 2๐ 1 โ ๐ผ , ๐
< sup min 2 0โค๐ผ,๐โค1 } ) 1 ( 2 2 2 2 2 ๐ถ ๐ [(1 + 2๐ )๐ผ + 2๐ ๐๐ผ + ๐ (1 โ ๐ )๐ผ ๐ ] . (53) 2 D. Achievability of the Cut-Set Bound by DF+NBF Proposition 6: In the symmetric scenario where ๐1 = ๐2 = ๐๐ = ๐ and ๐
1 = ๐
2 = ๐
, DF+NBF can achieve the cutset bound, i.e. (18) and (53) are equivalent, if and only if (๐2 , ๐2 , ๐ ) satisfy { 4๐2 > max{2, 1 + ๐2 } 8๐2 (2๐2 โ1) (54) โ 2 2 . 01+๐2 , i.e., there should exist two variables 0 โค ๐ผโ , ๐ โค 1 such that โ (66a) 4๐2 ๐ผโ =1 + ๐2 + 2๐ 1 โ ๐ผโ , 4๐2 ๐ผโ =๐ผโ + ๐2 (2๐ผโ + 2๐ผโ ๐ + (1 โ ๐2 )(๐ผโ )2 ๐ ).
(66b)
By subtracting 1 + ๐2 from both sides of (66a) and then taking square, we have 16๐4 (๐ผโ )2 โ ๐ผโ (8๐2 + 8๐2 ๐2 โ 4๐2 ) + (1 โ ๐2 )2 = 0, which has only one true root for (66a) (must satisfy 4๐2 ๐ผโ > 1 + ๐2 ) โ 2๐2 (1 + ๐2 ) โ ๐2 + (4๐2 โ ๐2 )(4๐2 โ ๐)๐2 โ ๐ผ = . (67) 8๐4 From (66b) we get โ ๐๐ผโ = 1/๐ + ๐ผโ /(๐2 ๐ ) + (๐ผโ โ 1/๐ )2 , or โ ๐๐ผโ = 1/๐ โ ๐ผโ /(๐2 ๐ ) + (๐ผโ โ 1/๐ )2 . Since 0 โค ๐๐ผโ โค ๐ผโ , the first root is obviously a false root and therefore omitted. To make the second root satisfy the constraint, we must have โ 0 โค 1/๐ โ ๐ผโ /(๐2 ๐ ) + (๐ผโ โ 1/๐ )2 โค ๐ผโ . The second inequality is self-evident, and the first inequality requires 1 1 ๐2 > 1/2 and ๐ผโ โค (2 โ 2 ). (68) ๐ ๐ We therefore conclude from (67) and (68), given 4๐2 > 1 + ๐2 and ๐ > 0, that (66) holds if and only if 4๐2 > 2 and โ 2๐2 (1 + ๐2 ) โ ๐2 + (4๐2 โ ๐2 )(4๐2 โ ๐)๐2 1 1 โค (2 โ 2 ). 4 8๐ ๐ ๐ Combined with the finding that ๐NBF = ๐cut-set is impossible for 4๐2 โค 1+๐2, we can conclude that ๐NBF = ๐cut-set , i.e. (18) and (53) are identical, if and only if (๐2 , ๐2 , ๐ ) satisfies (54). ACKNOWLEDGMENTS The authors would like to thank the anonymous reviewers and the associate editor for their suggestions that helped improve the quality and presentation of the paper. R EFERENCES [1] T. M. Cover and A. El Gamal, โCapacity theorems for the relay channel,โ IEEE Trans. Inf. Theory, vol. 25, pp. 572โ584, Sep. 1979. [2] A. Hรธst-Madsen and J. Zhang, โCapacity bounds and power allocation for wireless relay channels,โ IEEE Trans. Inf. Theory, vol. 51, pp. 2020โ 2040, June 2005. [3] G. Kramer, M. Gastpar, and P. Gupta, โCooperative strategies and capacity theorems for relay networks,โ IEEE Trans. Inf. Theory, vol. 51, pp. 3037โ3063, Sep. 2005. [4] G. Kramer and A. J. van Wijngaarden, โOn the white Gaussian multipleaccess relay channel,โ in Proc. IEEE ISIT, Jan. 2000. [5] Y. Liang and G. Kramer, โRate regions for relay broadcast channels,โ IEEE Trans. Inf. Theory, vol. 53, pp. 3517โ3535, Oct. 2007. [6] O. Sahin and E. Erkip, โAchievable rates for the Gaussian interference relay channel,โ in Proc. IEEE GLOBECOM, Nov. 2007. [7] D. Gรผndรผz, O. Simeone, A. J. Goldsmith, H. V. Poor, and S. Shamai, โRelaying simultaneous multicast messages,โ in Proc. IEEE ITW, June 2009.
2513
[8] D. Gรผndรผz, O. Simeone, A. J. Goldsmith, H. V. Poor, and S. Shamai, โMultiple multicasts with the help of a relay,โ IEEE Trans. Inf. Theory, vol. 56, pp. 6142โ6158, Dec. 2010. [9] A. Avestimehr and T. Ho, โApproximate capacity of the symmetric halfduplex Gaussian butterfly network,โ in Proc. IEEE ITW, June 2009. [10] S. R. Li, R. W. Yeung, and N. Cai, โLinear network coding,โ IEEE Trans. Inf. Theory, vol. 49, no. 2, pp. 371โ381, Feb. 2003. [11] R. Koetter and M. Mรฉdard, โAn algebraic approach to network coding,โ IEEE/ACM Trans. Netw., vol. 11, pp. 782โ795, Oct. 2003. [12] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Mรฉdard, and J. Crowcroft, โXORs in the air: practical wireless network coding,โ IEEE/ACM Trans. Netw., vol. 16, pp. 497โ510, June 2008 [13] S. Katti, I. Mariยดc, A. J. Goldsmith, D. Katabi, and M. Mรฉdard, โJoint relaying and network coding in wireless networks,โ in Proc. IEEE ISIT, June 2007. [14] M. P. Wilson, K. Narayanan, H. D. Pfister, and A. Sprintson, โJoint physical layer coding and network coding for bi-directional relaying,โ IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5641โ5654, Nov. 2010. [15] S. H. Lim, Y.-H. Kim, A. El Gamal, and S.-Y. Chung, โNoisy network coding,โ IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3132โ3152, May 2011. [16] F. M. J. Willems, โThe discrete memoryless multiple-access channel with partially cooperating encoders,โ IEEE Trans. Inf. Theory, vol. 29, pp. 441โ445, May 1983. [17] I. Mariยดc, R. Yates, and G. Kramer, โCapacity of interference channels with partial transmitter cooperation,โ IEEE Trans. Inf. Theory, vol. 53, pp. 3536โ3548, Oct. 2007. [18] S. I. Bross, A. Lapidoth, and M. A. Wigger, โThe Gaussian MAC with conferencing encoders,โ in Proc. IEEE ISIT, July 2008. [19] N. Devroye, P. Mitran, and V. Tarokh, โAchievable rates in cognitive radio channels,โ IEEE Trans. Inf. Theory, vol. 52, pp. 1813โ1827, May 2006. [20] C. T. K Ng, N. Jindal, A. J. Goldsmith, and U. Mitra, โCapacity gain from two-transmitter and two-receiver cooperation,โ IEEE Trans. Inf. Theory, vol. 53, pp. 3822โ3827, Oct. 2007. [21] O. Simeone, D. Gรผndรผz, H. V. Poor, A. J. Goldsmith, and S. Shamai, โCompound multiple-access channels with partial cooperation,โ IEEE Trans. Inf. Theory, vol. 55, pp. 2425โ2441, June 2009. [22] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, โCooperative diversity in wireless networks: efficient protocols and outage behavior,โ IEEE Trans. Inf. Theory, vol. 50, pp. 3062โ3080, Dec. 2004. [23] B. Wang, J. Zhang, and A. Hรธst-Madsen, โOn the capacity of MIMO relay channels,โ IEEE Trans. Inf. Theory, vol. 51, pp. 29โ43, Jan. 2005. [24] S. Simoens, O. Muรฑoz-Medina, J. Vidal, and A. del Coso, โOn the Gaussian MIMO relay channel with full channel state information,โ IEEE Trans. Signal Process., vol. 57, pp. 3588โ3599, Sep. 2009. [25] A. B. Carleial, โMultiple-access channels with different generalized feedback signals,โ IEEE Trans. Inf. Theory, vol. 28, pp. 841โ850, Nov. 1982. [26] F. M. J. Willems, โInformation theoretical results for the discrete memoryless multiple access channel,โ Ph.D. thesis, Katholieke Univ. Leuven, Oct. 1982. [27] T. M. Cover and J. A. Thomas, Elements of Information Theory. Wiley, 2006. [28] U. Erez and R. Zamir, โAchieving 1/2 log (1+ SNR) on the AWGN channel with lattice encoding and decoding,โ IEEE Trans. Inf. Theory, vol. 50, pp. 2293โ2314, Oct. 2004. [29] A. El Gamal and Y.-H. Kim, Lecture Notes on Network Information Theory, chap. 17. Available: http://arxiv.org/abs/1001.3404 [30] T. M. Cover and J. A. Thomas, โDeterminant inequalities via information theory,โ SIAM J. Matrix Analysis Applications, vol. 9, pp. 384โ392, July 1998. [31] B. Rimoldi and R. Urbanke, โA rate-splitting approach to the Gaussian multiple-access channel,โ IEEE Trans. Inf. Theory, vol. 42, pp. 364โ375, Mar. 1996.
2514
Jinfeng Du (Sโ07) received his B.Eng. degree in electronic information engineering from the University of Science and Technology of China (USTC), Hefei, China, in 2004, his M.Sc. degree in electronic engineering, and his Tekn. Lic. degree in electronics and computer systems, both from the Royal Institute of Technology (KTH), Stockholm, Sweden, in 2006 and 2008, respectively. He is currently working for his Ph.D. degree in telecommunications at KTH. He received the best paper award from IC-WCSP, Suzhou, October 2010, the โHans Werthรฉn Grantโ from the Royal Swedish Academy of Engineering Science (IVA) in March 2011, and a grant from Ericssonโs Research Foundation in May 2011. Ming Xiao (Sโ02-Mโ07) was born in the SiChuan Province, P. R. China, on May 22nd, 1975. He received bachelor and master degrees in engineering from the University of Electronic Science and Technology of China, ChengDu, in 1997 and 2002, respectively. He received his Ph.D degree from Chalmers University of Technology, Sweden, in November 2007. From 1997 to 1999, he worked as a network and software assistant engineer for ChinaTelecom. From 2000 to 2002, he also held a position in the SiChuan Communications Administration. Since November 2007, he has been with the ACCESS Linnaeus Center, School of Electrical Engineering, Royal Institute of Technology, Sweden, where he is currently an assistant professor. He received the โChinese Government Award for Outstanding Self-Financed Students Studying Aboradโ in 2007. He received the โHans Werthรฉn Grantโ from the Royal Swedish Academy of Engineering Science (IVA) in March 2006, and a grant from Ericssonโs Research Foundation in 2010.
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 59, NO. 9, SEPTEMBER 2011
Mikael Skoglund (Sโ93-Mโ97-SMโ04) received the Ph.D. degree in 1997 from Chalmers University of Technology, Sweden. In 1997, he joined the Royal Institute of Technology (KTH), Stockholm, Sweden, where he was appointed to the Chair in Communication Theory in 2003. At KTH, he heads the Communication Theory Lab and he is the Assistant Dean for Electrical Engineering. Dr. Skoglundโs research interests are in the theoretical aspects of wireless communications. He has worked on problems in source-channel coding, coding and transmission for wireless communications, Shannon theory, and statistical signal processing. He has authored some 220 scientific papers, including papers that have received awards, invited conference presentations, and papers ranking as highly cited according to the ISI Essential Science Indicators. He has also consulted for industry, and he holds six patents. Dr. Skoglund has served on numerous technical program committees for IEEE conferences. During 2003โ2008, he was an Associate Editor with the IEEE T RANSACTIONS ON C OMMUNICATIONS and he is presently on the editorial board for the IEEE T RANSACTIONS ON I NFORMATION T HEORY.