Next Article in Journal
Location Privacy for Mobile Crowd Sensing through Population Mapping
Previous Article in Journal
A Novel 2D-to-3D Video Conversion Method Using Time-Coherent Depth Maps
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Coded Cooperation for Multiway Relaying in Wireless Sensor Networks †

1
Key Lab of Universal Wireless Communications, Ministry of Education, Beijing University of Posts and Telecommunications (BUPT), 100876 Beijing, China
2
School of Electrical Engineering and ACCESS Linnaeus Center, KTH Royal Institute of Technology, 10044 Stockholm, Sweden
*
Author to whom correspondence should be addressed.
This paper is an extended version of the paper entitled “Bidirectional broadcasting by using multi-edge type LDPC convolutional codes”. In Proceedings of IEEE International Symposium on Turbo Codes and Related Topics, Gothenburg, Sweden, 27–31 August 2012.
Sensors 2015, 15(7), 15265-15284; https://doi.org/10.3390/s150715265
Submission received: 7 May 2015 / Revised: 10 June 2015 / Accepted: 23 June 2015 / Published: 29 June 2015
(This article belongs to the Section Physical Sensors)

Abstract

: Wireless sensor networks have been considered as an enabling technology for constructing smart cities. One important feature of wireless sensor networks is that the sensor nodes collaborate in some manner for communications. In this manuscript, we focus on the model of multiway relaying with full data exchange where each user wants to transmit and receive data to and from all other users in the network. We derive the capacity region for this specific model and propose a coding strategy through coset encoding. To obtain good performance with practical codes, we choose spatially-coupled LDPC (SC-LDPC) codes for the coded cooperation. In particular, for the message broadcasting from the relay, we construct multi-edge-type (MET) SC-LDPC codes by repeatedly applying coset encoding. Due to the capacity-achieving property of the SC-LDPC codes, we prove that the capacity region can theoretically be achieved by the proposed MET SC-LDPC codes. Numerical results with finite node degrees are provided, which show that the achievable rates approach the boundary of the capacity region in both binary erasure channels and additive white Gaussian channels.

1. Introduction

Wireless sensor networks (WSNs) consist of spatially-distributed autonomous sensors which cooperatively monitor physical or environmental conditions, and they have been identified as one of the most important enabling technologies for constructing smart cities. The rapid development of portable and wearable devices has further fueled the application of sensor networks, which helps to improve the city's sustainable growth and citizens' living quality.

One important feature of WSNs is that the sensor nodes collaborate in some manner for information transmissions. Much of research on the physical-layer techniques has focused on relaying, which is an efficient cooperative strategy to improve throughput and coverage of the sensor network. The three-node relay channel [1], consisting of one source, one relay and one destination, serves as the fundamental unit of large networks. The two-way relaying, also known as bidirectional relaying [2], is another type of cooperative strategy. By exploiting bidirectional communication, the loss in spectral efficiency due to the half-duplex restriction in conventional relaying is reduced. As a generalization of the two-way relay channel, the multiway relay channel (mRC) has been investigated in [3]. In the mRC, multiple users exchange information with the help of a relay terminal. The mRC setup models a large variety of communication scenarios. For example, in a physical sensor network, temperature sensors exchange local temperature measurements among themselves. Similarly, in a social network, different users exchange their personal information through a coordinator.

In this manuscript, we are interested in a typical scenario which is called the multiway relay channel with full data exchange in [3] or the conferencing multiway channel in [4]. A practical example of this model is as follows. Each member of an emergency response team is equipped with a wireless device at a disaster site, and they may obtain valuable information at random times. All of the members, including one leader, need to share their messages with the others. Each member wants to transmit and receive data to and from all other responders, coordinated by the leader who acts as the relay. The above information exchange can be realized in two steps. First, since the members may initiate their transmissions asynchronously, each member is scheduled to transmit his or her message to the leader in a time-division manner. During this procedure, the message in the air may be overheard by other members. After successfully receiving all of the messages, the leader (relay) then encodes all of these messages together with his or her message and broadcasts the resulting codeword to all of the members. At each member's side, different and potentially partly overlapping a priori information is available for decoding the codeword from the relay. Eventually, all of the members in the team are supposed to obtain the messages from all of the others. Since the information delivery in the first phase is essentially a peer-to-peer communication, in this manuscript, we focus on the second phase in which the relay broadcasts the messages to all of the members.

The capacity region for the general multi-user broadcast channel is not known yet. In [5,6], the authors provided the capacity region for the bidirectional broadcast channel with a common and/or private message. The multiway relay channel with full data exchange as we described above can be considered as a generalization of the model in [6]. In this manuscript, we derive the capacity region for the multiway relay case. The capacity region establishes the fundamental limits of the transmission rate and provides guidelines for the code design. On top of this, we propose a coding strategy through coset encoding for broadcasting with receiver side information. The coding strategy is illustrated by using low-density parity-check codes [7]. However, in practice, the regular LDPC codes cannot provide satisfactory performance, while irregular LDPC codes suffer from the complicated optimization of the degree distribution [8]. Therefore, it is of interest to search for code constructions with a good performance and a low optimization overhead. Different designs can be found for various channel models in the literature based on Turbo codes [9,10], LDPC codes [11-13], Polar codes [14], etc.

The spatially-coupled LDPC (SC-LDPC) codes are good candidate for the cooperative code construction. Spatially-coupled LDPC codes were first introduced in [15] as a time-varying convolutional-like LDPC code family. Then, the idea was further developed in, e.g., [16-18], where different constructions and analytical results were provided. It has been proven analytically in [18,19] that the belief-propagation (BP) decoding threshold of a spatially-coupled LDPC code ensemble achieves the maximum a posteriori probability (MAP) threshold of the underlying LDPC block code. This code, in turn, approaches capacity as the node degrees increase. In addition to the capacity-achieving performance for various channels, the regularity of the SC-LDPC code allows us to avoid complicated re-optimization of the degree distributions for varying channel conditions. Meanwhile, this code enables recursive encoding and sliding-window decoding [20], which dispels the concerns about hardware complexity and delay. Motivated by these useful properties, spatially-coupled LDPC codes have been considered for applications in a variety of scenarios.

In this manuscript, we propose to use spatially-coupled LDPC codes for the cooperative channel coding in the mRC. To realize the proposed coding strategy by using SC-LDPC codes, we replace the LDPC codes with their spatially-coupled counterparts. The multi-edge-type (MET) [21] nested spatially-coupled LDPC codes are constructed by repeatedly applying the coset encoding [22]. If setting the node degree the same for all types of check nodes, the MET nested SC-LDPC codes present useful properties. Any combination of the nesting leads to a capacity-achieving SC-LDPC code, regardless of the number of edge types and the order of adding the edges. This property is beneficial for the model under discussion. We then prove that by using the MET nested SC-LDPC code, the capacity region of the channel model is achieved. Numerical results with finite node degrees are provided, which show that the achievable rates approach the boundary of the capacity region in both binary erasure channels (BECs) and binary-input additive white Gaussian channels (BI-AWGNs).

The remainder of the manuscript is organized as follows. The system model is introduced in Section 2. In Section 3, we derive the capacity region of the specific model. The coding strategy is illustrated in Section 4 through multi-edge-type LDPC codes. Based on the multi-edge-type construction, the MET spatially-coupled LDPC codes are proposed in Section 5. In Section 6, we apply the MET SC-LDPC codes to the multiway relay channel and prove that the capacity region can be achieved. The numerical results are provided in Section 7 to verify the theoretical analysis. Finally, Section 8 concludes the manuscript.

2. System Model

2.1. The Two-Way Relay Channel

We first use a special case, the two-way relay channel, to illustrate the system model. We assume that there are three users U0, U1 and U2 in the network, and they have individual messages m0, m1 and m2 to share with the others. Without loss of generality, we choose user U0 to act as the relay. In the first phase, the users U1 and U2 transmit their messages m1 and m2, respectively, in turn to the relay node U0. We assume that both messages are received successfully by U0. In the second phase, i.e., the broadcast phase, the relay U0 transmits a codeword to both U1 and U2. The goal of the transmission from U0 is to convey the messages m0, m1 and m2 efficiently, so that U1 is able to reliably decode the messages m0 and m2 and U2 is able to reliably decode the messages m0 and m1. Eventually, all three users share the three messages in the network. The channel model is illustrated in Figure 1. This model is recognized as the two-way relay channel with a common message in [6].

2.2. The Multiway Relay Channel with Full Data Exchange

In the following, we extend the model to the multiway relay channel with full data exchange. We assume that a number of K users {U0, U1, …,Ul, … Uk– 1 } form a network. Each user Ul has an individual message ml to share with the others, for 0 ≤ l ≤ K ‒ 1. One of the users, for example U0, is assigned as the relay node. In the first phase, all of the users, except the relay U0, send out their messages in a time-division manner. During this procedure, each message ml, 1 ≤ l ≤ K – 1, is successfully received by the relay and may be received by other users. In the second phase, the relay U0 has the task of broadcasting a set of messages Sensors 15 15265i1 = {m1, m2,…, mk–1} which he has received beforehand, together with his own message m0, to all of the users. The relay combines the messages Sensors 15 15265i1 and m0 and encodes them into a codeword X. At each user Ul, a non-empty subset of Sensors 15 15265i1, which includes at least his own message ml, is available as the side information for decoding. For a subgroup of the users, the side information may be: (i) non-overlapping; (ii) partly overlapping; or (iii) completely overlapping. We assume that the relay node has the knowledge of what side information is available at each user and of the channel condition between the relay and each user. The broadcasting from the relay should be dedicated to transmit all of the messages efficiently, considering the available information.

In Figure 2, we give a simple example of the above multiway relay channel. The example system consists of four users, and one of them is selected as the relay. In the first round of transmission, the message m1 from U1 is successfully received by both the relay and the user U2. The message m2 from U2 is successfully received by the relay and the user U3. The message m3 is only correctly received at the relay Each user can use the messages he has overheard together with his own message as the side information for decoding. That is, U1 has only his own message m1 as the side information. U2 has m1 and m2 as the a priori information, and U3 has m2 and m3 as the a priori information for the decoding. In the end of the first phase, each user informs the relay about what side information he has. This can be realized at each user by sending the indexes of his received messages to the relay. The number of bits needed to represent the index of one message is ⌈log2(K − 1)⌉, where K is the number of users. The total number of bits for each user to send the knowledge of available information is at most (K ‒ 2) ⌈log2(K − 1)⌉. For the example in Figure 2, each user only needs four bits. Comparing to the length of the messages, the resulting overhead and latency are negligible. In the broadcast phase, the relay delivers the missing messages to each user, i.e., {m0,m2,m3} to U1, {m0,m3} to U2 and {m0,m1} to U3. The challenge for the relay is then how to realize the information broadcasting efficiently and reliably.

3. Capacity Region

The capacity region for the two-way relay channel with a common message has been proved in [6]. Let R0, R1 and R2 be the encoding rates of the messages m0, m1 and m2, and let the capacities of the links to U1 and U2 be C1 and C2, respectively. The capacity region of the above model is then given by the set of triples (R0, R1, R2) that satisfies [6,14]:

R 0 + R 2 C 1 R 0 + R 1 C 2
provided that R0 ≤ min (C1, C2).

In the multiway broadcast channel that we described in Section 2.2, each user requests all of the messages he has missed from Sensors 15 15265i1 plus the message m0 from the relay. We assume that the receiver side information available at Ul is a set Sensors 15 15265i2l , ml Sensors 15 15265i2l Sensors 15 15265i1. Then, the messages that should be delivered from the relay to Ut can be denoted by Sensors 15 15265i3m0. This assumption simplifies the general problem of multi-user broadcasting, and therefore, the capacity region of the model can be obtained. We give the corresponding capacity region in the following theorem.

Theorem 1. We assume that Cl is the channel capacity of the link between the relay and the user Ul, for all l ∈ {1, 2,…, K – 1}. We let Rl denote the encoding rate of the message ml and R0 denote the encoding rate of the message m0 from the relay. The capacity region of the multiway relay channel with full data exchange is the set of all achievable rates that satisfies:

R 0 + i : m i S ¯ 1 R i C 1 R 0 + i : m i S ¯ 2 R i C 2 R 0 + i : m i S ¯ 1 R i C l R 0 + i : m i S ¯ k 1 R i C k 1
provided that: (i) R0 ≤ min(C1, C2,…, Ck–1); and (ii) ClCk if Sensors 15 15265i3 Sensors 15 15265i3, for any l, k ∈ {1, 2, …,K−1}.

Proof. Without loss of generality, we use the link between the relay and the user Ul (1 ≤ l ≤ K ‒ 1) to discuss the converse and the achievability of the capacity region. We assume that the messages are encoded by a length-n codeword X, and the channel observation at Ul is Yl.

First, the entropy can be bounded similarly as has been done in [6], where a two-user case was considered.

H ( M 0 , S ¯ l ) = ( a ) H ( M 0 , S ¯ l | S l ) = ( b ) I ( M 0 , S ¯ l ; Y l | S l ) + H ( M 0 , S ¯ l | Y l , S l ) ( c ) I ( M 0 , S ¯ l ; Y l | S l ) + n ε l ( d ) I ( M 0 , S ¯ l , S l ; Y l ) + n ε l ( e ) I ( X ; Y l ) + n ε l .

Equations (a) and (b) are obtained from the independence of the messages and the definition of mutual information. Inequation (c) has been proven in [6]. Inequations (d) and (e) are based on the properties of mutual information.

Dividing both sides by n and using the memoryless property, we get:

1 n H ( M 0 , S ¯ l ) 1 n i = 1 n I ( X i , Y l i ) + ε l ,
where the intermediate steps are omitted.

Since εl → 0 when n → ∞, we have the achievable rate on the relay-Ul link:

R 0 + i : m i S ¯ l R i C l .
Similarly, we obtain the rates for other relay-user links as in Theorem 1. Note that the conditions (i) and (ii) guarantee the nonnegativity of the rates.

The above proves the converse of the capacity region. The achievability of the capacity region can be done similarly as for the two-user case. Since we will prove in the remainder of the manuscript that the capacity region can be achieved by using the proposed code structure, we omit the proof of achievability here.

For the example in Figure 2, the capacity region is given as:

R 0 + R 2 + R 3 C 1 R 0 + R 3 C 2 R 0 + R 1 C 3
Note that this enforces R0 ≤ min(C1, C2,C3) and C2C1.

4. Multi-Edge-Type LDPC Codes and the Coding Strategy

4.1. Low-Density Parity-Check Codes

As the name suggests, LDPC codes are block codes with parity-check matrices which contain only a small proportion of non-zero entries. An LDPC code can be represented by a parity-check matrix or a Tanner graph.

A parity-check matrix H with elements in GF(2) defines the codeword constraints in a matrix form. For a binary code with k parity-check equations and with codeword length n, the matrix H is of size k × n. A vector X = [X1, X2, …, Xn] is a codeword of the LDPC code defined by H if and only if the following constraint is satisfied:

HX T = 0

In the following, we use Sensors 15 15265i4 to represent a code and use X to denote one codeword of Sensors 15 15265i4.

Tanner introduced an effective graphical representation for LDPC codes [23]. In a bipartite Tanner graph, the nodes are separated into two distinctive sets: variable nodes for the codeword bits and check nodes for the parity-check equations. An edge connects a variable node to a check node if that codeword bit is included in the parity-check equation.

As originally defined by Gallager, a (dv, dc) regular LDPC code is determined by the condition that every codeword bit participates in exactly dv parity-check equations and that every parity-check equation involves exactly dc codeword bits. The parameter dv is called the variable node degree, and dc is the check node degree.

Since each parity-check equation typically reduces the number of degrees of freedom by one, it follows that the design rate of the (dv, dc) regular LDPC code is:

R ( d v , d c ) = n k n = 1 d v d c

4.2. Binning and Coset Coding

One of the basic elements of network information theory is the idea of binning [24]. A binning scheme divides a set of codewords into subsets (“bins”), such that the codewords in each subset are as far apart as possible. In [24], random binning was used to prove the Slepian-Wolf source coding theorem. In [25], Cover and El Gamal proposed to use random binning for set partitioning in decode-and-forward relaying.

The random binning approach is convenient for theoretical analysis; however, it is not suitable for practical applications. Therefore, binning schemes with a structure were proposed. Wyner constructed an algebraic binning scheme for noiseless coding problems in [26]. In order to extend the idea to “noisy” coding problems, the structure of nested codes was proposed [27].

We first introduce the concept of coset. Let an LDPC code Sensors 15 15265i4 be specified by a k × n binary parity-check matrix H. The code Sensors 15 15265i4 = {X : HXT = 0} contains all length-n binary vectors whose syndrome S = HXT is equal to 0. Given some general syndrome S ∈ {0, 1}k, the set of all length-n binary vectors X satisfying HXT = S is called a coset Sensors 15 15265i4S.

A nested code [27] is a pair of linear codes ( Sensors 15 15265i41, Sensors 15 15265i42) that satisfies:

C 2 C 1

That is, each codeword of Sensors 15 15265i42 is also a codeword of Sensors 15 15265i41.

The nested parity-check codes can be constructed as follows [27]. Let H1 and H2 be parity-check matrices of dimension k1×n and of dimension k2 × n, respectively, k2 > k1. By bringing in an additional parity-check matrix ΔH of dimension (k2k1) × n, the nested codes can be realized by:

H 2 = [ H 1 Δ H ]

We can then partition Sensors 15 15265i41 into 2k2k1 cosets of Sensors 15 15265i42.

4.3. MET Nested LDPC Codes

Multi-edge-type LDPC codes [21] can be considered as a generalization of regular and irregular LDPC codes. For an MET LDPC ensemble, there are multiple equivalence classes of edges, while for a conventional LDPC ensemble, there exists a single type of edge. In the following, we introduce multi-edge-type LDPC codes constructed by coset encoding.

An MET nested LDPC code can be illustrated by the Tanner graph in Figure 3. The bit vector associated with the variable nodes V, i.e., the codeword, is denoted by X. There are K types of check nodes in the graph, C0, C1, …, Cl …, Ck−1. The parity-check matrices, which correspond to the K types of edges connecting the variable nodes and the different types of check nodes, are denoted by H0, H1, …, Hl, …, Hk-1, and have variable and check node degrees (dv0, dc0), (dv1, dc1), …, (dvl, dcl), …, (dvk−1, dck−1), respectively. The MET nested LDPC code can be described by the stacked parity-check matrix H, and we have:

HX T = [ H 0 H 1 H K 1 ] X T = 0
The definition of a multi-edge-type nested LDPC code ensemble is given in the following.

Definition 2. (The multi-edge-type nested LDPC code ensemble) A multi-edge-type nested LDPC ensemble includes all of the bipartite graphs where each variable node is connected to dvl type-l check nodes, and each of the type-l check nodes has dCl edges connecting to the variable nodes, for all l ∈ [0, K − 1].

4.4. Coding Strategy for Multiway Relaying

Based on the nested LDPC codes, in the following, we illustrate the coding strategy for the multiway relay channel with full data exchange. Since the first phase is in fact a peer-to-peer transmission, we focus particularly on the transmission strategy in the broadcast phase. We start with the case of two users and one relay. We assume that the binary messages m0, m1, and m2 are of lengths k0, k1 and k2 bits. To combine the three messages in a single transmission, the relay uses a double binning strategy: a high-rate code of length n is split into 2nR1 × 2nR2 disjoint sub-codes Sensors 15 15265i4i,j, with i ∈ {1,…,2 nR1} and j ∈ {1,…, 2nR2}, each of rate R0. Note that k0 = nR0, k1 = nR1 and k2 = nR2. For encoding, the relay lets the k1 and k2 message bits m1 and m2 determine which sub-code is selected, and he uses the chosen sub-code Sensors 15 15265i4 m1,m2 for encoding m0. This encoding strategy can be realized by using a coset code Sensors 15 15265i4m1,m2 of the MET nested LDPC code that is selected by the messages m1 and m2 as follows:

[ H 0 H 1 H 2 ] X T = [ 0 m 1 m 2 ]
where H0 is a (k′ × n) matrix, k′ satisfies n = k0 + k′ + k1 + k2, H1 is a (k1 × n) matrix and H2 is a (k2 × n) matrix.

Once the Tanner graph of an MET nested LDPC code is given or, equivalently, the parity-check matrices H0, H1, and H2 are given, the encoding can be carried out by mapping the message m0 into a codeword which simultaneously satisfies the check constraints (3).

If dC0 = dC1 = dC2dc, the rate for encoding m0 is:

R 0 = k 0 n = 1 k + k 1 + k 2 n = 1 d v 0 + d v 1 + d v 2 d c
and the rates for encoding m1 and m2 are, respectively:
R 1 = k 1 n = d v 1 d c
and:
R 2 = k 2 n = d v 2 d c

The decoding at each user is carried out as follows. Since U1 has perfect knowledge of m1, he interprets X as a codeword of a two-edge-type nested LDPC code and uses:

[ H 0 H 1 ] X T = [ 0 m 1 ]
to decode the codeword X. With the decoded codeword , U1 obtains m0 and recovers m2 by using the fact that m2 = H2XT following from Equation (3). In a similar way, U2 recovers the messages m0 and m1 by using m2 as side information.

The above coding strategy can be easily extended to the multi-user case. A multiple binning technique is utilized to combine all of the messages in a single transmission. For the general case, the encoding can be realized by selecting a codeword X that satisfies:

[ H 0 H 1 H 2 H K 1 ] X T = [ 0 m 1 m 2 m K 1 ]
By choosing dCl = dc for all l ∈ {0,1, 2,…, K – 1}, we get the rate for encoding m0 as:
R 0 = 1 l = 0 K 1 d v l d c
The rate for encoding the message ml is:
R l = d v l d c
for l ∈ {1,2,…,K−1}.

When decoding, each user utilizes the side information available at the receiver. We assume that the indexes of the available messages at Ul form a vector vl of length Pl. Then, the decoding of the codeword X (the message m0) at Ul is carried out by satisfying:

[ H 0 H v l ( 1 ) H v l ( 2 ) H v l ( P l ) ] X T = [ 0 m v l ( 1 ) m v l ( 2 ) m v l ( p l ) ]

As for the two-user case, the other messages designated to Ul can be recovered by using the decoded X and sub-parity-check equations in Equation (7).

We again have a look at the example in Figure 2. The encoding can be realized by selecting a codeword X that satisfies that:

[ H 0 H 1 H 2 H 3 ] X T = [ 0 m 1 m 2 m 3 ]

The decoding is carried out by satisfying:

[ H 0 H 1 ] X T = [ 0 m 1 ]
at U1, satisfying:
[ H 0 H 1 H 2 ] X T = [ 0 m 1 m 2 ]
at U2 and satisfying:
[ H 0 H 2 H 3 ] X T = [ 0 m 2 m 3 ]
at U3.

In the above, we have illustrated the coding strategy using LDPC codes. In general, the regular LDPC codes suffer from poor performance. The performance can be improved by introducing irregularity to the node degrees. However, an irregular degree distribution needs to be derived to match a given channel condition, which complicates the code design. Therefore, we are interested in searching for code constructions with a good performance and a low optimization overhead. The spatially-coupled LDPC codes are then good candidates for this purpose.

5. Multi-Edge-Type Spatially-Coupled LDPC Codes

In this section, we first give a brief introduction of spatially-coupled LDPC codes. Then, we introduce the construction of multi-edge-type nested SC-LDPC codes. The property of the proposed codes is analyzed. We will show that any N-edge-type nested SC-LDPC code embedded in the MET structure is capacity achieving.

5.1. Spatially-Coupled LDPC Codes

A regular {dv,dc} binary spatially-coupled LDPC code can be defined by an infinite parity-check matrix: [17]

H = [ h 0 ( 1 ) h w 1 ( 1 ) h 0 ( t ) h w 1 ( t ) ]
where dv is the variable node degree and dc is the check node degree. We assume that at each position t (t ∈ (−∞, ∞)), the number of variable nodes is M, and accordingly, the number of check nodes is Mdv/dc. Then, each submatrix hi(t) is an (Mdv/dc) × M binary matrix. In practice, for a finite number of positions L, we have t ∈ [1, L], and the code needs to be initialized in the beginning and terminated in the end. All of the submatrices hi(t) are sparse, and accordingly, the overall parity-check matrix is sparse.

There are many variations of spatially-coupled LDPC codes in the literature [15-18]. In this manuscript, we consider a generalized type of SC-LDPC code, which can be denoted by five parameters {dv, dc, M, L, w} [18]. We assume that each of the dv edges of a variable node at position t uniformly and independently connects to the check nodes in the range [t, t + w − 1], where the parameter w is a positive integer. Ignoring the boundary effects, there are in total a number of Mdv/w edges coming from all of the variable nodes at position tτ, τ ∈ [0, w − 1], to all of the check nodes at position t. Distributing these Mdv/w edges uniformly at random to the Mdv/dc check nodes at position t, for each check node, each edge is connected to the variable nodes at position tτ with probability 1/w. Therefore, each of the dc connections of a check node at position t is considered to be uniformly and independently chosen from the range [tw + 1, t].

It has been shown analytically in [18] that, for transmission over the BEC, the BP decoding threshold of an SC-LDPC code ensemble {dv, dc, M, L, w} converges to the MAP threshold of its underlying component ensemble {dv, dc} in the limit of large M, L and w. In the remainder of this manuscript, we will use the following properties, which were derived in [18] for the BEC case: for the design rate of the code, R, we have:

lim w lim L lim M R ( d v , d c , M , L , w ) = 1 d v d c
and for the BP decoding threshold, ϵBP, we have:
lim w lim L lim M ϵ B P ( d v , d c , M , L , w ) = ϵ M A P ( d v , d c )
where ϵMAP is the MAP threshold of its block code counterpart.

For a given rate R, the Shannon limit is defined as the ultimate channel parameter threshold, below which reliable communication can be achieved by using optimal codes and optimal decoding. For the BEC, the Shannon limit is ϵsh = 1 − R. If we increase the node degrees dv and dc while keeping the ratio λ = dc/dv fixed, i.e., keeping the rate of the code fixed, the MAP threshold in Equation (11) approaches the Shannon limit,

lim d v ϵ MAP ( d v , d c = λ d v ) = 1 λ = 1 R = ϵ S h

In this sense, the SC-LDPC code ensemble is capacity achieving for the BEC. This result was generalized in [19], where it is concluded that the SC-LDPC code ensemble universally achieves capacity over binary memoryless symmetric (BMS) channels. More details of code construction and theoretical analysis can be found in [18,19] and the references therein.

5.2. MET Nested SC-LDPC Codes

Based on the standard SC-LDPC code ensemble, we construct the MET nested SC-LDPC code as follows. We assume the number of variable nodes at each position to be M; then, for a code with L positions, the codeword length is Nv = ML. The connections between the variable nodes and the K types of check nodes are characterized by {dVl, dCl, M, L, w}, for l ∈ [0, K − 1]. We set the smoothing parameter w to be the same for all of the connections. Note that only edges of the same type are connected to one check node. The connections between the variable nodes and any two types of check nodes construct a two-edge-type SC-LDPC code embedded in the MET nested code. We denote the two-edge-type SC-LDPC code with the m-th and the n-th check nodes by Sensors 15 15265i4{m,n} = {dv{m,n},dc{m,n}, M, L, w}, m ∈ [0, K − 1], n ∈ [0, K − 1] and mn. The variable node degrees are dVm and dVn, and the check node degrees are dCm and dCn. In a similar manner, we construct the N-edge-type (N ∈ [1, K]) nested SC-LDPC code as follows. We define a set Φ of cardinality N, whose elements are the indices of the types of edges/check nodes chosen by the N-edge-type graph. We denote the N-edge-type code by Sensors 15 15265i4Φ = {d, d, M, L, w}. The corresponding node degrees are {(dvl, dcl) : l ∈ Φ}. The general definition of the N-edge-type SC-LDPC ensemble is given as follows.

Definition 3. (The N-edge-type SC-LDPC code ensemble) For a set Φ ⊆ [1, K] of cardinality N, N ∈ [1, K], the MET nested SC-LDPC code ensemble Sensors 15 15265i4Φ = {dvΦ, dcΦ, M, L, w} of codeword length M L includes all of the bipartite graphs where each variable node is connected to dvl type-l check nodes, and each type-l check node has dcl edges connecting to the variable nodes, for all l ∈ Φ. More specifically, each of the dvl type-l edges of a variable node at position t uniformly and independently connects to the type-l check nodes in the range [t,t + w − 1].

5.3. Properties of MET SC-LDPC Codes

In this section, we discuss the performance of the MET nested SC-LDPC codes.

We have shown in [22] that, when choosing the same check degree for both types of connections, the two-edge-type nested SC-LDPC code is equivalent to a standard SC-LDPC code in terms of design rate and BP decoding threshold. Therefore, the two-edge-type nested SC-LDPC code is able to provide capacity-achieving performance in the limit of large parameters.

In the following, we extend the discussion to the N-edge-type case. We can show that an arbitrarily-chosen N-edge-type (N ∈ [1, K]) nested SC-LDPC code ensemble Sensors 15 15265i4Φ = {dvΦ, dcΦ, M, L, w} embedded in the MET code with node degrees {(dvl ,dcl) : l ∈ Φ} has the same design rate and the same BP threshold as a standard SC-LDPC code {Σl∈Φ dvl,dc, M, L, w} if dcl = dc for all l ∈ Φ. The proof can be done recursively as follows. We choose arbitrarily a two-edge-type nested SC-LDPC code Sensors 15 15265i4{m,n} = {dv{m,n},dc{m,n}, M, L,w} from the MET code, where m ∈ Φ, n ∈ Φ and m ≠ n. This code is equivalent to a standard SC-LDPC code {dvm + dvn, dc, M, L, w} when dcm = dcn = dcmthreshold as a standard SC-LDPC code The edges of type-m and type-n can then be considered as the same type of edge. Now, we chose arbitrarily a type l, l ∈ Φ, lm and ln and add all type-l edges to the existing structure. If dcl = dc, we obtain a code that has the same design rate and BP threshold as a standard SC-LDPC code {dvm +dvn +dvl, dc, M, L, w} and is therefore capacity achieving. We repeat the above procedure until all of the N types of edges are added to the graph. The order in which we added the new edge type to the graph does not affect the result.

Based on the above derivation, we obtain the conclusion: if dcl = dcl ∈ [0,K − 1], all of the arbitrarily-chosen N-edge-type (N ∈ [1, K]) nested SC-LDPC code ensembles embedded in the MET code are simultaneously capacity achieving in the limit of large parameters.

6. MET Nested SC-LDPC Codes for the Multiway Relay Channel

In this section, we apply the MET nested SC-LDPC codes for the multiway relay channel with full data exchange. We will prove that the capacity region of the model can be achieved by using the proposed code structure.

Again, we start with the case of two users and one relay. When applying the spatially-coupled LDPC codes, the connections between the variable nodes and the three types of check nodes are characterized by {dv0, dc0, M, L, w}, {dv1, dc1, M, L, w} and {dv2, dc2, M, L, w}. We denote the MET nested SC-LDPC code ensemble by Sensors 15 15265i4 = {dv{0,1,2},dc{0,1,2}, M, L, w}. The embedded two-edge-type SC-LDPC code, which is to be decoded at U1, is denoted by Sensors 15 15265i4{0,1} = {dv{0,1} ,dc{0,1}, M, L, w}. Similarly, the two-edge-type code to be decoded at U2 is denoted by Sensors 15 15265i4{0,2} = {dv{0,2}, dc{0,2}, M, L, w}. If we write the MET SC-LDPC codes in the form of parity-check matrix, the only difference to Equation (3) is that the parity-check matrices are now for SC-LDPC codes instead of LDPC codes.

We apply the theoretical results in Section 5.3 for the performance analysis. Following Section 5.3, the two-edge-type codes Sensors 15 15265i4{0,1} and Sensors 15 15265i4{0,2} are simultaneously capacity achieving. Based on these facts, we give the following theorem.

Theorem 4. The capacity region of the two-way broadcast channel with a common message can be achieved by using an MET nested SC-LDPC code Sensors 15 15265i4 = {dv{0,1,2}, dc{o,1,2}, M, L, w}.

Proof. We assume that the capacities of the two individual links are C1 and C2, which together form the bound of the capacity region. The rate for broadcasting m0 is assumed to be R0, and R0 ≤ min(C1,C2). For constructing an MET nested SC-LDPC code, we first choose a check degree dc which is the same for all types of check nodes. With this dc, we decide the variable degrees by satisfying:

1 d v 0 + d v 1 d c = C 1 1 d v 0 + d v 2 d c = C 2 1 d v 0 + d v 1 + d v 2 d c = R 0

After determining the parameters, we construct an MET nested SC-LDPC code Sensors 15 15265i4 = {dv{0,1,2}, dc{0,1,2}, M, L, w} as explained in Section 5.2.

Assume that the numbers of three types of check nodes are NC0, NC1 and NC2, respectively. The number of variable nodes is Nv. According to the definition of encoding rate in Equations (4)(6), we have R0 = 1 − (NC0 + NC1 + NC1)/Nv, R1 = NC1/NV, and R2 = NC2/NV. The design rate of the code Sensors 15 15265i4{0,1} for U1 is given as:

R ( d v { 0 , 1 } , d c { 0 , 1 } , M , L , w ) = 1 N C 0 + N C 1 N V = R 0 + R 2

Since the code Sensors 15 15265i4{o,1} is capacity achieving, i.e., in the limit of large M, L and w,

R ( d v { 0 , 1 } , d c { 0 , 1 } , M , L , w ) = 1 d v 0 + d v 1 d c = C 1
it is easy to see that:
R 0 + R 2 = C 1

In a similar manner, for the relay- U2 link, we can prove that:

R 0 + R 1 = C 2

Therefore, the capacity region can be achieved by using the MET nested SC-LDPC code.

Now, we generalize to the multiway relay case. When constructing the MET nested SC-LDPC code, the connection between the variable nodes and the l-th type of check nodes is realized by the individual code {dvl, dcl, M, L, w}, l ∈ [0, K − 1]. In the following, we briefly discuss the performance of the proposed code construction in the multiway relay channel.

Theorem 5. The capacity region of the multi-user broadcast channel with full data exchange can be achieved by using multi-edge-type SC-LDPC codes.

Proof. For the given channel capacities {Cl : l ∈ [1, K − 1]} and the rate R0, we choose the node degrees by satisfying:

1 l = 0 K 1 d v l d c = R 0
and:
1 ( d v 0 + i : m i S l d v i ) / d c = C l
for l ∈ [1, K − 1]. For a predetermined check degree dc, there must exist a unique nonnegative solution set {dv0, dvl, …, dvl,…, dvK−1} satisfying the K independent equations on condition that R0 ≤ min(C1,C2,…,CK−1)and ClCk if Sensors 15 15265i3l Sensors 15 15265i3k for l, k, ∈ {1, 2, …, K − 1}.

We have shown in Section 5.3 that all of the N-edge-type nested SC-LDPC codes are simultaneously capacity achieving in the limit of large parameters. Therefore, the rate to be decoded at Ul is asymptotically:

R 0 + i : m i S ¯ l R i = 1 ( d v 0 + i : m i S l d v i ) / d c = C l
for l ∈ [1, K − 1]. Then, the boundary of the capacity region in Theorem 1 is achieved.

7. Numerical Results

In this section, we present the numerical results in terms of BP decoding thresholds and bit erasure rates (BERs) for the proposed MET nested SC-LDPC codes. The results are based on the density evolution for finite node degrees and based on simulations with finite code lengths. Without loss of generality, we only include the results for the two-way relay channel. The results for the multiway relay channel present the same characteristics, and therefore, they are omitted here.

Since we have shown in Section 5.3 that both the two-edge-type nested SC-LDPC codes Sensors 15 15265i4{0,1} and Sensors 15 15265i4{0,2} are capacity achieving, we consider only Sensors 15 15265i4{0,1} for the performance evaluation. We set the parameters as dV0 = 3, dc = 10, w = 3 and L = 100. Different variable degrees dV1 ∈ {1,2, 3, 4, 5, 6} are used to realize different sum rates R0 + R2, where the tradeoff between R0 and R2 is controlled by dV2, which is upper bounded by dV2 ≤ dc − (dV0 + dv1) (see also Equations (4)(6)). The results over BECs are summarized in Table 1. For the purpose of comparison, we also provide in Table 2 the results for regular LDPC block codes with the same node degrees. For each given degree setup, we calculated the gap between the Shannon limit and the BP threshold, which indicates how far the achievable rate at U1 is from the boundary of the capacity region.

We can see that the two-edge-type code Sensors 15 15265i4{o,1}, which is decoded at U1, exhibits significantly smaller gaps to capacity compared with its block code counterpart. In particular, regular LDPC block codes suffer greatly from larger gaps for lower rates. We observe a similar phenomenon for SC-LDPC codes, but the gaps are in general much smaller. In addition, the gaps can be further narrowed if we increase L for a given w or if we increase w while keeping the design rates fixed by choosing proper L. When both w and L are sufficiently large, the gaps for all degree distributions tend to disappear.

Similarly, we give the BP thresholds of SC-LDPC codes and regular LDPC block codes for BI-AWGN channels. The parameters are the same as in the BEC case, and the results are summarized in Tables 3 and 4. As for the BECs, the SC-LDPC codes clearly outperform the regular LDPC block codes in terms of the gap to the capacity

In the following, we provide the simulation results for the SC-LDPC codes with finite code lengths over BECs. The bit erasure rates are plotted in Figure 4 together with the BP thresholds of the corresponding ensembles. The node degrees (dV0, dV1, dc) are listed in the legend, and we set M = 1000 and L = 100. It can be seen that the MET SC-LDPC codes generally provide good performance over BECs. Similar observations can be obtained in BI-AWGN channels, and the results are omitted here. We also want to point out that the complexity and latency due to the encoding and decoding of SC-LDPC codes are not an issue for their applications in practice, since SC-LDPC codes allow recursive encoding and sliding-window decoding.

8. Conclusions

In this manuscript, we proposed multi-edge-type spatially-coupled LDPC codes through coset encoding for the multiway relay channel with full data exchange. This model has various applications in wireless sensor networks, and we have provided a practical coding solution for the communication aspects of the model. We have proven that an arbitrarily-chosen N-edge-type SC-LDPC code embedded in the multi-edge-type construction is capacity achieving. By applying the above code construction to the broadcast phase of the multiway relay channel, each user recovers the message from the relay and all of the other users based on the receiver side information. We have proven that the capacity region of the specific model can be achieved by using the proposed construction. Numerical results were provided in both binary erasure channels and AWGN channels, which verified the theoretical analysis.

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China (No. 61401037), the Fundamental Research Funds for the Central Universities (No. 2014RC0102, No. 2014ZD03-01) and the Sweden STINT initiation grant (Dnr. IB2015-5959).

The authors would like to thank the editors and the anonymous reviewers for their valuable comments and suggestions.

Conflicts of Interest

The authors declare no conflict of interest.

Author Contributions

Zhongwei Si and Ragnar Thobaben developed the proposal of the study for the model of bidirectional relaying with a common message. Zhongwei Si and Junyang Ma extended the study to the multiway relay channel with full data exchange. Zhongwei Si carried out the simulations and took care of most of the writing. Junyang Ma and Ragnar Thobaben made corrections of the manuscript. All authors have participated in the discussions and did a general review of the manuscript.

References

  1. Var der Meulen, E.C. Three-terminal communication channels. Adv. Appl. Probab. 1971, 3, 120–154. [Google Scholar]
  2. Oechtering, T.J.; Schnurr, C.; Bjelakovic, I.; Boche, H. Broadcast Capacity Region of Two-Phase Bidirectional Relaying. IEEE Trans. Inf. Theory 2008, 54, 454–458. [Google Scholar]
  3. Gunduz, D.; Yener, A.; Goldsmith, A.; Poor, H.V. The Multiway Relay Channel. IEEE Trans. Inf. Theory 2013, 59, 51–63. [Google Scholar]
  4. Eswaran, K.; Gastpar, M. Achievable rates for conferencing multiway channels. Proceedings of the IEEE International Symposium on Information Theory, Toronto, ON, Canada, Canada, 6–11 July 2008; pp. 1398–1402.
  5. Oechtering, T.J.; Boche, H. Piggyback a common message on half-duplex bidirectional relaying. IEEE Trans. Wirel. Commun. 2008, 7, 3397–3406. [Google Scholar]
  6. Wyrembelski, R.F.; Boche, H. Bidirectional broadcast channels with common and confidential messages. Proceedings of the IEEE Information Theory Workshop, Paraty, Brazil, 16–20 October 2011; pp. 713–717.
  7. Gallager, R.G. Low Density Parity Check Codes; MIT Press: Cambridge, MA, USA, 1963. [Google Scholar]
  8. Richardson, T.; Urbanke, R. Model Coding Theory; Cambridge University Press: Cambridge, UK, 2008. [Google Scholar]
  9. Zhao, B.; Valenti, M.C. Distributed Turbo coded diversity for relay channel. Electron. Lett. 2003, 39, 786–787. [Google Scholar]
  10. Roy, S.; Duman, T.M. Performance Bounds for Turbo Coded Half Duplex Relay Systems. Proceedings of the IEEE International Conference on Communications, Istanbul, Turkey, 11–15 June 2006; pp. 1586–1591.
  11. Chakrabarti, A.; de Baynast, A.; Sabharwal, A.; Aazhang, B. Low density parity check codes for the relay channel. IEEE J. Sel. Areas Commun. 2007, 25, 280–291. [Google Scholar]
  12. Hu, J.; Duman, T.M. Low Density Parity Check Codes over Wireless Relay Channels. IEEE Trans. Wirel. Commun. 2007, 6, 3384–3394. [Google Scholar]
  13. Azmi, M.H.; Li, J.; Yuan, J.; Malaney, R. Design of Distributed Multi-Edge Type LDPC Codes for Two-Way Relay Channels. In. Proceedings of the IEEE International Conference on Communications, Kyoto, Japan, 5–9 June 2011; pp. 1–5.
  14. Andersson, M.; Wyrembelski, R.F.; Oechtering, T.J.; Skoglund, M. Polar codes for bidirectional broadcast channels with common and confidential messages. Proceedings of the IEEE International Symposium on Wireless Communication Systems, Paris, France, 28–31 August 2012; pp. 1014–1018.
  15. Felstrom, A.J.; Zigangirov, K.S. Time-varying periodic convolutional codes with low-density parity-check matrix. IEEE Trans. Inf. Theory 1999, 45, 2181–2191. [Google Scholar]
  16. Pusane, A.E.; Felström, A.J.; Sridharan, A.; Lentmaier, M.; Zigangirov, K.S.; Costello, D.J. Implementation aspects of LDPC convolutional codes. IEEE Trans. Commun. 2008, 56, 1060–1069. [Google Scholar]
  17. Lentmaier, M.; Sridharan, A.; Costello, D.J.; Zigangirov, K.S. Iterative decoding threshold analysis for LDPC convolutional codes. IEEE Trans. Inf. Theory 2010, 56, 5274–5289. [Google Scholar]
  18. Kudekar, S.; Richardson, T.; Urbanke, R. Threshold saturation via spatial coupling: Why convolutional LDPC ensembles perform so well over the BEC. IEEE Trans. Inf. Theory 2011, 57, 803–834. [Google Scholar]
  19. Kudekar, S.; Richardson, T.; Urbanke, R. Spatially coupled ensembles universally achieve capacity under belief propagation. Proceedings of the IEEE International Symposium on Information Theory, Cambridge, MA, USA, 1–6 July 2012; pp. 453–457.
  20. Iyengar, A.R.; Papaleo, M.; Siegel, P.H.; Wolf, J.K.; Vanelli-Coralli, A.; Corazza, G.E. Windowed decoding of protograph-based LDPC convolutional codes over erasure channels. IEEE Trans. Inf. Theory 2012, 58, 2303–2320. [Google Scholar]
  21. Richardson, T.; Urbanke, R. Multi-Edge Type LDPC Codes. Available online: http://www.researchgate.net/publication/37439748_Multi-Edge_Type_LDPC_Codes (accessed on 25 Jun 2015).
  22. Si, Z.; Thobaben, R.; Skoglund, M.; Oechtering, T.J. Bidirectional broadcasting by using multi-edge type LDPC convolutional codes. Proceedings of the IEEE International Symposium on Turbo Codes and Iterative Information Processing; pp. 91–95.
  23. Tanner, R.M. A recursive approach to low complexity codes. IEEE Trans. Inf. Theory 1981, 27, 533–547. [Google Scholar]
  24. Slepian, D.; Wolf, J. Noiseless coding of correlated information sources. IEEE Trans. Inf. Theory 1973, 19, 471–480. [Google Scholar]
  25. Cover, T.; El Gamal, A. Capacity theorems for the relay channel. IEEE Trans. Inf. Theory 1979, 25, 572–584. [Google Scholar]
  26. Wyner, A. Recent results in the Shannon theory. IEEE Trans. Inf. Theory 1974, 20, 2–10. [Google Scholar]
  27. Zamir, R.; Shamai, S.; Erez, U. Nested linear/lattice codes for structured multiterminal binning. IEEE Trans. Inf. Theory 2002, 48, 1250–1276. [Google Scholar]
Figure 1. The two-way relay channel with a common message. (a) The users transmit to the relay in turn; (b) The relay broadcasts to the users.
Figure 1. The two-way relay channel with a common message. (a) The users transmit to the relay in turn; (b) The relay broadcasts to the users.
Sensors 15 15265f1 1024
Figure 2. One example of the multiway relay channel with full data exchange. (a) The users transmits to the relay in turn, and the messages may be overheard by other users; (b) The relay broadcasts to all the users.
Figure 2. One example of the multiway relay channel with full data exchange. (a) The users transmits to the relay in turn, and the messages may be overheard by other users; (b) The relay broadcasts to all the users.
Sensors 15 15265f2 1024
Figure 3. Multi-edge-type LDPC codes.
Figure 3. Multi-edge-type LDPC codes.
Sensors 15 15265f3 1024
Figure 4. Bit erasure rates of the multi-edge-type (MET) spatially-coupled (SC)-LDPC codes over BECs. The solid curves show the simulation results, and the dotted vertical lines indicate the BP thresholds from density evolution.
Figure 4. Bit erasure rates of the multi-edge-type (MET) spatially-coupled (SC)-LDPC codes over BECs. The solid curves show the simulation results, and the dotted vertical lines indicate the BP thresholds from density evolution.
Sensors 15 15265f4 1024
Table 1. Belief-propagation (BP) thresholds of Sensors 15 15265i4{0,1} over binary erasure channels (BECs).
Table 1. Belief-propagation (BP) thresholds of Sensors 15 15265i4{0,1} over binary erasure channels (BECs).
(dv0, dv1)Design RateShannon Limit ϵShBP Threshold ϵBPGap
(3,1)0.59210.40790.39700.0109
(3,2)0.49020.50980.49890.0109
(3,3)0.38820.61180.59610.0157
(3,4)0.28620.71380.68610.0277
(3,5)0.18830.81570.76540.0503
(3,6)0.08230.91770.83280.0849
Table 2. BP thresholds of LDPC block codes over BECs.
Table 2. BP thresholds of LDPC block codes over BECs.
(dv0, dv1)Design RateShannon Limit ϵShBP Threshold ϵBPGap
(3,1)0.60.40.30790.0921
(3,2)0.50.50.34150.1585
(3,3)0.40.60.36560.2344
(3,4)0.30.70.38400.3160
(3,5)0.20.80.39900.4010
(3,6)0.10.90.41150.4885
Table 3. BP thresholds of Sensors 15 15265i4{0,1} over binary-input (BI)-AWGN channels.
Table 3. BP thresholds of Sensors 15 15265i4{0,1} over binary-input (BI)-AWGN channels.
(dv0, dv1)Design RateShannon Limit ϵShBP Threshold ϵBPGap
(3,1)0.59210.8540.8360.018
(3,2)0.49020.9940.9760.018
(3,3)0.38821.1731.1430.030
(3,4)0.28621.4271.3550.072
(3,5)0.18831.8291.6300.199
(3,6)0.08232.7511.9980.753
Table 4. BP thresholds of LDPC block codes over BI-AWGN channels.
Table 4. BP thresholds of LDPC block codes over BI-AWGN channels.
(dv0, dv1)Design RateShannon Limit ∈ShBP Threshold ∈BPGap
(3,1)0.60.8440.7480.096
(3,2)0.50.9790.7930.186
(3,3)0.41.1490.8270.322
(3,4)0.31.3860.8530.533
(3,5)0.21.7670.8750.892
(3,6)0.12.5520.8941.658

Share and Cite

MDPI and ACS Style

Si, Z.; Ma, J.; Thobaben, R. Coded Cooperation for Multiway Relaying in Wireless Sensor Networks. Sensors 2015, 15, 15265-15284. https://doi.org/10.3390/s150715265

AMA Style

Si Z, Ma J, Thobaben R. Coded Cooperation for Multiway Relaying in Wireless Sensor Networks. Sensors. 2015; 15(7):15265-15284. https://doi.org/10.3390/s150715265

Chicago/Turabian Style

Si, Zhongwei, Junyang Ma, and Ragnar Thobaben. 2015. "Coded Cooperation for Multiway Relaying in Wireless Sensor Networks" Sensors 15, no. 7: 15265-15284. https://doi.org/10.3390/s150715265

Article Metrics

Back to TopTop