ABSTRACT
In this study, we consider the design of a network coded non-orthogonal interleave-division multiple-access (IDMA) user cooperation system. Based on eXclusive OR (XOR) operation at relays, the source messages are re-transmitted forward to the destination simultaneously. At destination, a network coding aided iterative Multi-User Detection (MUD) scheme is proposed. And, a multi-user soft network decoding algorithm is developed. Over Nakagami-m fading channels, we examine the BER performance of the proposed network coded cooperative (NetCC) IDMA scheme in various scenarios. Simulation results confirm that NetCC IDMA scheme can provide significant BER improvement compared to the existing IDMA scheme. In addition, based on the EXtrinsic Information Transfer (EXIT) chart technique, the convergence behavior of NetCC IDMA scheme is studied. Simulations also reveal that the proposed scheme can support more users than existing IDMA scheme.
PDF Abstract XML References Citation
How to cite this article
DOI: 10.3923/itj.2010.1353.1360
URL: https://scialert.net/abstract/?doi=itj.2010.1353.1360
INTRODUCTION
User cooperation is recently introduced as an efficient technique to exploit the spatial diversity inherent in multi-user wireless networks. The basic idea is that single-antenna users cooperate with each other and form a virtual multiple-antenna system (Sendonaris et al., 2003). Each cooperating user transmits both its own information and the partners information. This new method can increase system throughput, improve transmission quality and enhance network coverage (Pabst et al., 2004).
Many valuable user cooperation schemes have been investigated over the past few years (Sadek et al., 2010; Laneman et al., 2004; Weng and Murch, 2009). The system level description of the user cooperation concept is presented by Sendonaris et al. (2003). They show user cooperation has substantial gains over a noncooperative strategy on a higher data rate and a decreased sensitivity to channel variations. In particular, an adaptive network coding (ANCC) based user cooperation is designed by Bao and Li (2008). The central idea is to couple the instantaneous network topologies with the channel code graph. Simulations reveal that ANCC can offer the large network coding gain. However, these user cooperation strategies are based on the orthogonal channel assumption, such as time-division multiple-access (TDMA) and frequency-division multiple-access (FDMA). Several limits are needed to overcome. First, the orthogonal channel assumption (e.g., time slots) may results in the low spectral efficiency. Second, the requirement for orthogonality is difficult to satisfy, especially in large networks with many cooperating users (Huang et al., 2008).
Motivated by the potential to achieve the high spectral efficiency, there has been increasing interest in non-orthogonal user cooperation systems (Zhang and Hanzo, 2009; Han et al., 2009; Huang et al., 2008). As an efficient non-orthogonal multiple-access scheme, interleave-division multiple-access (IDMA) provides a good multiple-user communication capability with low complexity (Ping et al., 2006). To our best knowledge, there has been relatively little published on network coded non-orthogonal IDMA multi-user cooperative systems.
In this study, we propose a network coded cooperative (NetCC) IDMA transmission scheme. One advantage is that two time slots are enough in a round of multi-source multi-relay cooperation for the capacity improvement. And, at destination, a network coding assisted iterative Multi-User Detection (MUD) scheme is developed. A chip-level soft multi-user network decoding algorithm is also studied. Moreover, the Bit Error Rate (BER) performance and EXtrinsic Information Transfer (EXIT) charts are evaluated over Nakagami-m fading channels. And, this study can be applied to sensor networks, 3rd Generation Partnership Project Long Term Evolution (3GPP-LTE) wireless communication networks.
Notation: Boldface upper-case letters refer to matrices and boldface lower-case letters denote column vectors. Var (x) and E (x) stand for the variance and mean of random variable x, respectively. q denotes the element-wise eXclusive OR (XOR) operation. The superscripts (•)(1) and (•)(2) denote the first and second cooperation phase, respectively.
SYSTEM DESCRIPTION
Consider the user cooperation system in Fig. 1 that comprises N cooperating users, K source users (e.g., mobile stations) and (N-K) relay users. Here, source users are denoted as {Si}, iε[1, K]. And, relay users are denoted as {Rj}, jε[1, {N-K}]. All cooperating users and destination (e.g., base station) are equipped with a single antenna.
As illustrated in Fig. 1a and b, an uplink cooperation round takes place in two phases, which are the broadcast phase and the relay phase. In the first broadcast phase, the source users transmit the data message to relay users and destination. And, in the second relay phase, the relay users decode and re-transmit forward the source message to the destination.
In this study, we assume that source-destination channels, relay-destination channels and source-relay channels experience independent channel fading. And, the envelope α of channel coefficient follows Nakagami-m distribution, i.e.,
![]() | |
Fig. 1: | Network coded user cooperation system under consideration. (a) The first cooperation phase and (b) the second cooperation phase |
![]() | (1) |
where, Γ(m) is the gamma function, m is the fading parameter with m≥ ½ and Ω = E(α2) is the mean power.
In addition, we also suppose that the entire power of proposed NetCC IDMA system is PT, which is equally allocated to N cooperating users. That is:
![]() |
with 1≤i≤K, 1≤j≤(N-K), where Pi(1) and Pj(2) are transmit power of ith source user and jth relay user, respectively.
COOPERATION PROTOCOL
In this section, the network coded non-orthogonal cooperative protocol is designed.
Broadcast phase strategy: As shown in Fig. 2a-c, the broadcast phase occupies one time slot. First, the information bits {bi(1) [l], i, ..., K} are encoded at time index l, lε[1, L] and interleaved with user-specific interleaver {ΠiS}. L is the information bits frame length. After that, the yielding sequence is modulated and broadcasted from K source users simultaneously, illustrated in Fig. 2b.
Besides, due to the broadcast character of wireless channels, the received symbol stream at destination is given by:
![]() |
with 1≤lS≤LS, where xi(x) [ls] is the modulated symbol of ith source user. HiSD represents the flat fading channel from ith source user to destination. {ND(i) [lS]} are the additive white Gaussian noise (AWGN) samples with zero mean and a variance of σ2D. lS is the time index. lS is the length of the symbol frame. Hereafter, we omit the time index for notational simplicity.
Relay phase strategy: With help of a low-cost iteration MUD detection method (Ping et al., 2006), (N-K) relay users can recover the source users information as After channel re-encoding, the recovered information data sequence is encoded.And, the yielding sequence is
. Here, we let the subset of candidate source users that the jth relay user serves is
. Then, using a linear network coding, each relay user XOR the encoded data and obtains the relayed forward data.
![]() | |
Fig. 2: | Two phase cooperation protocol and transmitter structure. (a) Time slots allocation for the two phase cooperation protocol, (b) Transmitter of the ith source user in broadcast phase and (c) Transmitter of the jth relay user in relay phase |
Thus, the combined chip stream cjR = {cjR {m}, m = 1, ..., Lc} is produced, where:
![]() |
And, . After that, with user-specific interleaving and modulation, all (N-K) relay users re-transmit forward the symbol packets to destination simultaneously.
And, the received symbol sequence at destination in the second relay phase is:
![]() |
with 1≤lS≤LS, where xj(2) [lS] is the transmitted symbol from jth relay user. HjRD represents the fading channel from jth relay user to destination. {nD(2) [lS]} are AWGN samples with zero mean and a variance of σ2D. It is noted that, since IDMA can be regarded as a special case of CDMA, the elements of encoded bits and modulated symbols are denoted as chips (Liu et al., 2006; Ping et al., 2006).
DETECTION ALGORITHM
At the destination, the turbo-type iterative receiver architecture is shown in Fig. 3. It consists of two parts: (1) the broadcast signal processing (BSP) block; (2) the relay signal processing (RSP) block. And, each block has a soft MUD module, a network coding decoder and a posteriori probability (APP) soft decoder (DEC).
Network coding assisted iteration detection: Based on the chip-level Gaussian distribution approximation soft MUD method (Ping et al., 2006), the extrinsic Logarithm of Likelihood Ratios (LLRs) about {xi(1)} can be obtained:
![]() | (2) |
where:
![]() |
and
![]() |
is the a priori LLR about xi(1), which can be approximately updated by extrinsic LLRs
. As shown in Fig. 3,
is the extrinsic LLR output from the soft MUD 1 module, which will be sent to deinterleaver.
![]() | |
Fig. 3: | Architecture of the network coding assisted IDMA receiver |
After that, the deinterleaved { LaMUD (ci(c))} and LLR output { L(1)MUD (cij} from network coding decoder are summed together. The detailed multi-user network decoding algorithm will be studied in the next subsection. Then, are used as a priori information in DEC, which generates the more reliable soft information { LMUD (ci(1))}. After that, the subtraction is performed:
![]() |
for the extrinsic information. And, the extrinsic LLR information { LeDE (ci(1))} is fed back to soft MUD module for the next iteration. After final iteration, the detected bits can be obtained subjected to a hard decision. And, for the RSP block, the iterative detection operates in a similar manner.
Multi-user soft network decoding algorithm: In the BSP block, the soft information contribution for ith source user from the jth relay user is calculated as (see Appendix for the proof):
For any iε[1, K], jε[1, (N-K)]
![]() | (3) |
where:
![]() | (4) |
Thus, the achieved LLR value of ith source user is:
![]() | (5) |
Then, is further forwarded to DEC as a priori information.
It is noted that, based on Eq. 5, multiple copies of soft information about {ci(1)} is obtained from broadcast signals and relay signals. And, with more cooperating relay users, more cooperation spatial diversity gain and better system BER performance can be achieved.
Similarly, in the RSP block, can be calculated as:
![]() | (6) |
where:
![]() | (7) |
And, Bl = exp { LaMUD (ci(1))} with 1≤l≤K. If cl(1) = 0, then { LRMUD (cj(2))}. The { LRMUD (cj(2))} can be obtained from soft MUD 2 module. Then, will be delivered to DEC for more accurate value.
PERFORMANCE EVALUATION
The performance of NetCC IDMA scheme is evaluated in terms of BER performance and EXIT charts. And, the comparisons with existing non-cooperative IDMA scheme are also carried out. For a fair comparison, the non-cooperative IDMA and NetCC IDMA scheme has the same transmit power PT. Thus, the power of kth user kth with PkNonC = PT/N. Besides, the source-relay channels are assumed almost perfect with error-free broadcast phase cooperation (Zhang and Hanzo, 2009). And, in the following simulations, the information bits frame length L = 5114, which is a practical length in the 3rd Generation Partnership Project (3GPP) wireless communication systems. Moreover, BPSK modulation is also used.
Simulation 1: This simulation examines the BER performance of NetCC IDMA scheme and compares it with non-cooperative IDMA scheme. There are 4 source users and 1 relay user in this simulation scenario. And, the relay data:
![]() |
Repetition code rate Rc is 1/8. Here, Nakagami-m fading parameter is 1.
As shown in Fig. 4, in good channels with high Eb/N0, the proposed NetCC IDMA scheme can bring obvious BER improvement compared to the non-cooperative IDMA scheme. For example, if BER is 2x10-3, the Eb/N0 gain is 5.4 dB using NetCC IDMA scheme. The reason is that, in good channels, the LLR information is reliable. And, the network coding decoder can effectively provide
the relayed soft information for specific source user. Thus, the cooperative diversity gain and the improved BER performance can be achieved.
On the contrary, in poor channels with low Eb/N0, the performance of NetCC IDMA scheme becomes worse compared to non-cooperative IDMA scheme. It is because that, with bad channel quality, each user has the low reliable LLR information. After network decoding, the cooperation scheme cannot provide sufficient spatial diversity for performance enhancement. Moreover, the relay user also occupies some part of the transmit power.
Simulation 2: This simulation investigates the impact of relay user number on the BER performance. The scenario has 8 source users and relay users number is 1, 2, 4, respectively. The repetition coding rate Rc = 1/12. And, Nakagami-m fading parameter is 1. Here, the network coded relaying scheme is:
![]() | |
Fig. 4: | Comparison between NetCC IDMA and non-cooperative IDMA scheme |
![]() | |
Fig. 5: | Impact of relay user number on BER performance of NetCC IDMA scheme |
![]() |
for 1≤j≤(N-K), 1≤i≤K and G = K/(N-K). For example, for 8 source users and 2 relay users scheme, the network coded chips are:
![]() |
and
![]() |
In Fig. 5, a significantly reduced BER performance can be obtained with increasing relay user number. For instance, if BER is 10-3, 8 relay users scheme has 4.2 dB gain compared to 1 relay user scheme. The reason is that, in the NetCC IDMA system, each cooperating user experiences the independent channel fading. More relay users can bring more cooperation diversity gain and better BER performance.
Moreover, it is worth pointing out that, in order to enhance system BER performance, more powerful FEC codes (e.g., turbo codes, low-density parity-check (LDPC) codes) can be considered in further studies.
Simulation 3: This simulation examines the effect of Nakagami-m fading on the BER performance. The scenario has 8 source users with 2 relay users. Figure 6 shows that the BER degrades with decreasing fading parameter m. Moreover, such degradation becomes more significant in low parameter m region, which represents the severe fading environment.
![]() | |
Fig. 6: | Impact of Nakagami-m fading parameters on BER performance |
Simulation 4: This simulation studies the mutual information gain using the proposed NetCC IDMA scheme based on EXIT charts. The EXIT chart was initially introduced by Brink (2001) as an efficient technique to investigate the convergence property of iterative detector.
In this simulation, 4 source users with 4 relay users cooperation scheme are considered. And, Nakagami-m fading parameter is 1. The results are portrayed in Fig. 7a, where RDEC consists of network coding decoder and FEC decoder.
First, in high mutual information region, the noticeable mutual information gain can be obtained based on NetCC IDMA scheme. Since, in this region, the multi-user interference is greatly mitigated with the reliable chips estimation. Using network decoding, the larger mutual information is achieved due to cooperation diversity gain. It results in the better BER performance and more supportable user number.
Second, in low mutual information region, the improvement is limited. The reason is that, in this region, multi-user interference is strong and LLR information has low reliability. The network coding decoder is hard to provide accurate LLR information estimation, yielding the low cooperation gain.
Simulation 5: This simulation analyzes the iteration convergence property based on the trajectory of EXIT chart. The scenario has 8 source users and 2 relay users. And, Nakagami-m fading parameter is 1. The results are depicted in Fig. 7b.
First, the simulated trajectory almost touches the EXIT curves of MUD and RDEC, which confirms the accuracy of EXIT charts simulation. Second, Fig. 7b also shows that 8 source users can be supported at Eb/N0=10 dB with 2 relay users cooperation.
![]() | |
Fig. 7: | EXIT charts of NetCC IDMA scheme |
![]() | |
Fig. 8: | EXIT charts with various Eb/N0 |
And, the required iteration number is 3. It reveals that the proposed NetCC iteration MUD algorithm is efficient with the rapid convergence property.
Simulation 6: This simulation investigates the impact of Eb/N0 on EXIT charts. The scenario has 3 source users and 1 relay user. The repetition coding rate is 1/8. And, Nakagami-m fading parameter is 1.
In Fig. 8, there is an intersection between the MUD and RDEC EXIT curves. It means that the system cannot support 3 source users at Eb/N0=6 dB. But, with increasing Eb/N0, the EXIT curve of MUD has higher extrinsic mutual information. When Eb/N0=12 dB, there exists an open tunnel, which means that 3 source users become supportable. These results and simulation method are useful for analyzing the multi-user capacity of NetCC IDMA system.
CONCLUSIONS
This study designed a network coded non-orthogonal IDMA cooperation system. A linear network coding assisted iterative MUD method was proposed. And, a soft multi-user network decoding algorithm was also studied. Over Nakagami-m channels, the BER performance and EXIT charts were evaluated in various scenarios. Numerical results have confirmed that the proposed NetCC IDMA scheme can achieve obvious BER improvement and extrinsic mutual information enhancement compared to the existing IDMA scheme. Moreover, the proposed cooperation strategy can also bring benefits of low time cost and flexible network deployment for multi-user cooperative systems.
ACKNOWLEDGMENTS
We thank Dr. Rong Zhang from the School of ECS, University of Southampton for his thoughtful discussions. And, this study is supported by the National Natural Science Foundation of China under Grant No. 60802011.
APPENDIX
In this appendix, we will prove Eq. 3, which is the chip-level multiuser soft network decoding algorithm.
Without loss of generality, we assume that source user number K is even. The case that K is odd can be extended in a straightforward manner:
![]() | (8) |
where, r = {r1SD, r2RD}. And:
![]() | (9) |
![]() | (10) |
where, Al = exp { LRMUD (cl(1))}, 1≤l≤K, 1≠i. If cl(1), then { LaMUD (cl(1))}.
REFERENCES
- Bao, X. and J. Li, 2008. Adaptive network coded cooperation (ANCC) for wireless relay networks: Matching code-on-graph with network-on-graph. IEEE Trans. Wireless Commun., 7: 574-583.
CrossRefDirect Link - Brink, S.T., 2001. Convergence behavior of iteratively decoded parallel concatenated codes. IEEE Trans. Commun., 49: 1727-1737.
CrossRefDirect Link - Han, Z., X. Zhang and H.V. Poor, 2009. High performance cooperative transmission protocols based on multiuser detection and network coding. IEEE Trans. Wireless Commun., 8: 2352-2361.
CrossRefDirect Link - Huang, W.J., Y.W.P. Hong and C.C.J. Kuo, 2008. Relay-assisted decorrelating multiuser detector (RAD-MUD) for cooperative CDMA networks. IEEE J. Selected Areas Commun., 26: 550-560.
CrossRefDirect Link - Laneman, J.N., D.N.C. Tse and G.W. Wornell, 2004. Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Trans. Inform. Theory, 50: 3062-3080.
CrossRefDirect Link - Liu, L., J. Ton and L. Ping, 2006. Analysis and optimization of CDMA systems with chip-level interleavers. IEEE J. Selected Areas Commun., 24: 141-150.
CrossRefDirect Link - Pabst, R., B.H. Walke, D.C. Schultz, P. Herhold and H. Yanikomeroglu et al., 2004. Relay-based deployment concepts for wireless and mobile broadband radio. IEEE Commun. Magaz., 42: 80-89.
CrossRefDirect Link - Sadek, A.K., H. Zhu and K.J.R. Liu, 2010. Distributed relay-assignment protocols for coverage expansion in cooperative wireless networks. IEEE Trans. Mobile Comput., 9: 505-515.
CrossRefDirect Link - Sendonaris, A., E. Erkip and B. Aazhang, 2003. User cooperation diversity. Part I. System description. IEEE Trans. Commun., 51: 1927-1938.
CrossRefDirect Link - Weng, L. and R.D. Murch, 2009. Cooperation strategies and resource allocations in multiuser OFDMA systems. IEEE Trans. Veh. Technol., 58: 2331-2342.
CrossRefDirect Link - Zhang, R. and L. Hanzo, 2009. Coding schemes for energy efficient multi-source cooperation aided uplink transmission. IEEE Signal Process. Lett., 16: 438-441.
CrossRefDirect Link - Ping, L., L. Liu, K. Wu and W.K. Leung, 2006. Interleave division multiple-access. IEEE Trans. Wireless Commun., 5: 938-947.
CrossRef