Next Article in Journal
Object Detection and Classification of Metal Polishing Shaft Surface Defects Based on Convolutional Neural Network Deep Learning
Previous Article in Journal
Bulletproof Performance of Composite Plate Fabricated Using Shear Thickening Fluid and Natural Fiber Paper
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance of Dynamic Time Division Broadcast Protocol with Rateless Coding

1
College of Information and Communication, National University of Defense Technology, Wuhan 430010, China
2
National Innovation Institute of Defense Technology, Military Academy of Sciences, Beijing 100071, China
*
Authors to whom correspondence should be addressed.
Appl. Sci. 2020, 10(1), 86; https://doi.org/10.3390/app10010086
Submission received: 25 November 2019 / Revised: 16 December 2019 / Accepted: 16 December 2019 / Published: 20 December 2019
(This article belongs to the Section Electrical, Electronics and Communications Engineering)

Abstract

:
Two-way relaying channel (TWRC) improves the throughput of one-way relaying channel through network coding at the relay. Time division broadcast (TDBC) is one typical protocol for TWRC, but with three time slots for one round information exchange leading to throughput loss. To enhance throughput performance, incremental redundancy transmission is usually incorporated into TDBC (i.e., TDBC-IR) by one bit feedback, indicating the successful or failed transmission. Nevertheless, TDBC-IR still suffers in throughput since it cannot fully exploit and adapt to the varying channel dynamics. In the paper, we propose a dynamic TDBC protocol with incremental redundancy in the form of rateless coding (i.e., DTDBC-RC) to fully utilizing the varying channel dynamics. In DTDBC-RC, the two sources first transmit in rateless coding way with given maximum allowable transmission time, and then the relay retransmits or not based on its decoding results. To reveal the advantages of DTDBC-RC, we analyze its performance comprehensively in terms of outage probability, expected rate, and diversity-multiplexing trade-off (DMT). We also present a subslot realization scheme for DTDBC-RC (i.e., sub-DTDBC-RC) since the DMT of DTDBC-RC cannot be obtained directly. Simulation and numerical results show the performance advantage of DTDBC-RC (or sub-DTDBC-RC) over TDBC-IR in terms of both expected rate and DMT.

1. Introduction

Two-way relaying is an efficient way to improve the throughput performance of conventional one-way cooperative communications with half-duplex relay [1], where two sources exchange information with the aid of a relay (Considering the scenario where two sources S 1 and S 2 exchange information with the aid of relay R, four time slots, i.e., the time slots on the S 1 R , R S 2 , S 2 R , and R S 1 links’ transmission, are typically entailed for one round information exchange between S 1 and S 2 , leading to throughput loss. To improve throughput performance, two-way relaying is proposed with network coding at R, where both S 1 and S 2 transmit simultaneously to R, R then network-encodes the information received for S 1 and S 2 (e.g., through bit level XOR operation) and broadcasts to them, with less time slots.). There are two well-known protocols for two-way decode and forward relaying, i.e., physical-layer network coding (PNC) and time division broadcast protocol (TDBC) [2,3]. For one round information exchange between the two sources, TDBC consumes three time slots, with lower throughput than PNC which only needs two time slots. In this paper, we focus on two-way relaying channel with direct link between the two sources (often encountered in many practical applications) and the TDBC protocol, and aim to improve its throughput.
To enhance throughput performance in relaying channel, incremental redundancy (IR)-based retransmission is commonly used by utilizing one-bit feedback indicating successful or failed decoding at the destination [4,5,6], and it has been incorporated in TDBC (i.e., TDBC-IR) to improve the throughput performance of TDBC [7,8] (Note that one retransmission is used in PNC in [9] to form a new protocol named PNC-IR, aiming to improve the outage performance. However, not only the outage performance but also the throughout performance of PNC-IR are improved by introducing one retransmission when compared with PNC.).
Although IR can improve throughput, we argue that TDBC-IR is not the best way since fixed two or three time slots are still entailed, leading to underutilizing good channel conditions (or unable to adapt to the varying channel dynamics). Motivated by rateless coding, which adapts to varying channel dynamics and achieves (or approaches) channel capacity automatically [10], we propose a dynamic TDBC with rateless coding as a kind of incremental redundancy transmission (termed DTDBC-RC for short). In DTDBC-RC, the two sources first transmit with a given maximum allowable transmission time, and then the relay retransmits or not based on the decoding results. To reveal the advantages of DTDBC-RC, we analyze its performance comprehensively in terms of outage probability, expected rate, and diversity-multiplexing trade-off (DMT). We also present a subslot realization scheme for DTDBC-RC (i.e., sub-DTDBC-RC) for the DMT derivation of DTDBC-RC since it cannot be obtained directly based on conventional outage probability and expected rate analysis. It is revealed that although TDBC-IR and DTDBC-RC have the same outage performance, the latter outperforms the former in both expected rate and DMT performance.
The rest of the paper is organized as follows. Section 2 first presents the system models of DTDBC-RC and sub-DTDBC-RC. Their performance is then analyzed in Section 3 while simulation and numerical results are shown in Section 4. Finally, conclusions are drawn in Section 5.
Notation: log ( ) is the logarithm function with base 2. P r is the probability of a random event. x + = max ( x , 0 ) . f x = . ρ x is exponential equality and means that lim ρ + log f x log ρ = x . Accordingly, means ‘exponentially larger or equal than’, i.e., a b means lim ρ + log a log ρ lim ρ + log b log ρ . C N ( a , b ) means complex Gaussian distribution with mean a and variance b. ϕ | x = a denotes the function ϕ ’s value at x = a .

2. System Models

2.1. System Model of DTDBC-RC

Considering a delay-constrained transmission application with two sources (denoted by S 1 and S 2 ) exchanging information with the aid of a relay (denoted by R), one-round information exchange with maximum allowable transmission time T consists of at most three time slots and each source’s message is transmitted for at most two time slots (i.e., one time slot for its own transmission and the other for the relay). The first and second time slots are with maximum allowable transmission time α T , and the third time slot is with minimum transmission time ( 1 2 α ) T , where 0 < α < 1 2 if retransmission at the third time slot is possible. The message is transmitted in the form of codeword. For simplicity of analysis and without loss of generality, it is assumed that both sources transmit with the same rate and the same power (When the scenario with different data rates and/or different power is considered, the transmission lengths of each time slot in DTDBC-RC are different although with channel reciprocity assumption (see the system model in Section 2). This is a general scenario which can be extended directly from the simple scenario with same data rates and same power in the paper. Moreover, the performance analysis in Section 3 can be directly applied to the general scenario. Since the simple scenario captures the essence of utilizing the dynamics of the direct link transmission by rateless coding, we do not consider the general scenario here.). The channels keep unchanged in one-round information exchange and changes independently across different rounds. Moreover, the channels between any two nodes are assumed to be reciprocal.
The codeword lengths of S 1 and S 2 corresponding to the two-time-slot transmission are denoted by I 1 and I 2 , i.e., the transmitted codewords of S 1 and S 2 are denoted by [ X 1 1 , X 2 1 , , X I 1 1 , X I 1 + 1 1 , , X I 1 + I 2 1 ] and [ X 1 2 , X 2 2 , , X I 1 2 , X I 1 + 1 2 , , X I 1 + I 2 2 ] , respectively. The proposed DTDBC-RC protocol works in the following way.
In the first time slot (with given maximum allowable transmission time α T ), S 1 broadcasts its first part of codeword (i.e., [ X 1 1 , X 2 1 , , X I 1 1 ] ) continuously to S 2 and R in the rateless coding way. S 2 decodes the received message before or until α T . If S 2 decodes successfully, it feeds back one-bit acknowledgement (ACK). If S 2 cannot decode successfully until α T , it feeds back one-bit non-acknowledgement (NACK). In the second time slot (also with given maximum allowable transmission time α T ), S 2 works in the same way as S 1 in the first time slot, i.e., it broadcasts the first part of codeword (i.e., [ X 1 2 , X 2 2 , , X I 1 2 ] ) continuously to S 1 and R in the rateless coding way. Due to channel reciprocity, S 2 has the same decoding results as S 1 , and it feeds back NACK or ACK accordingly.
After the first two time slots, the following working process of DTDBC-RC depends on the decoding results of both S 1 and S 2 , and there are only two decoding states listed as follows.
State 1: both S 1 and S 2 cannot decode successfully. In this state, depending on the decoding result at R, there are two cases. In Case I, R successfully decodes the messages from both S 1 and S 2 . It feeds backs an ACK to both S 1 and S 2 , re-encodes the received message from both sources and network-encodes the two sources’ message before retransmission (e.g., through bit-level XOR operation), and retransmits the network-encoded message to both S 1 and S 2 in the third time slot (i.e., until the transmission length T is reached). In this case, S 1 ( S 2 ) decodes S 2 ’s ( S 1 ’s) message by combining the message received from both S 2 ( S 1 ) in the first time slot and from R in the third time slot. In Case II, at least one source’s message ( S 1 or S 2 ) cannot be decoded successfully at R. In this case, R feeds back a NACK and there is no retransmission occurred at S 1 , S 2 , or R. Thus, an outage event occurs and S 1 and S 2 begin a new round of information exchange as described above (In TWRC, outage probability is usually defined for the whole system, not for any single source (see [2,3] and the references therein). In the paper, we also define the system outage probability. Therefore, if R cannot decode successfully any source’s message, there is no improvement in system outage probability if S 1 or S 2 retransmits in the third time slot. Thus, there is no need to assume retransmission in the third time slot if at least one source’s message cannot be decoded successfully at R.).
State 2: both S 1 and S 2 decode successfully. In this state, S 1 and S 2 feed back ACKs to each other and begin a new round of information exchange, as described above.
The above two states are depicted in Figure 1, where T D T D B C R C is the transmission length of the first and second time slots (it will be calculated in Section 3) due to the channel reciprocity assumption.
Note that (i) the one-bit ACK/NACK feedback is assumed to be received without delay or error, e.g., through a dedicated control channel; (ii) in one-round information exchange of DTDBC-RC, there are at most three time slots and two time slots for the whole system and for each source, respectively. Moreover, the transmission lengths of the first and second time slots are random depending on the channel quality of the direct link because the sources transmit in rateless coding way. Therefore, the transmission length of one-round information exchange is 2 T D T D B C R C when both S 1 and S 2 succeed in the first and second time slots (corresponding to State 2) or when R cannot decode successfully at least one source’s message (corresponding to Case II in State 1), or is T when both S 1 and S 2 cannot decode successfully in the first and second time slots and R successfully decodes both sources’ messages (corresponding to Case I in State 1); and (iii) we extend the equal-length time slot assumption in [7,8] to the case with unequal-length time slot in the paper (see Figure 1), i.e., both the first and second time slots are with length α T in TDBC-IR like DTDBC-RC (The protocol in [7,8] corresponds to the case when α = 1 3 for TDBC-IR in the paper.). Thus, the outage probability, expected rate, and DMT analysis for TDBC-IR in Section 3 is for the unequal-time length case.

2.2. System Model of Sub-DTDBC-RC

With the same assumptions as in DTDBC-RC, we present a subslot implementation scheme for DTDBC-RC (i.e., sub-DTDBC-RC) since its DMT cannot be derived directly based on conventional outage and expected rate analysis (this will be detailed in Section 3). In sub-DTDBC-RC, the maximum allowable transmission time α T at the first and second time slots is divided into N equal-length subslots, each with length α T N . The sub-DTDBC-RC works in the same way as DTDBC-RC, with the exception that S 1 ( S 2 ) only decodes at one subslot before or at α T in the former (i.e., at the n-th subslot, where 0 < n N ), whereas it decodes at any time before or at α T for the latter. The working process of sub-DTDBC-RC is shown in Figure 2.
With the above description, it is intuitively and readily seen that when N + , the sub-DTDBC-RC becomes DTDBC-RC.
Remark 1: We note that the authors in [11] proposed a similar protocol as TDBC. Their protocol works in the same way as TDBC protocol with direct link, but S 1 , S 2 , and R transmit in the rateless coding way, where there are always three time slots and the lengths of three time slots are all random depending on the channels of direct and relaying links. The major differences between DTDBC-RC and the protocol in [11] are that (i) only R decodes in the first and second time slots while S 1 and S 2 keep silent (leading to three-time-slot transmission) in the latter, while in the former, S 1 and S 2 decode and R only retransmits when possible (leading to possible two-time-slot transmission); (ii) DTDBC-RC applies in the delay-constrained scenarios with given maximum allowable transmission time for one round information exchange while the latter applies in the scenarios with no delay-constraint; and (iii) we investigate the performance in terms of outage probability, expected rate, and DMT in the paper, which is more comprehensive than the performance analysis in [11] (The performance analysis method in Section 3 can be directly extended to the protocol in [11], where the two sources transmit with different data rates.).
From the above description, it is also intuitive that DTDBC-RC will be more efficient in throughput than the protocol in [11]. We also point out that the protocol in [11] will never have an outage event occurring since no time delay constraint is entailed, therefore its performance is not compared with the protocols presented in this paper.

3. Performance Analysis

Let h a b denote the channel coefficient of the a b link and X a b = h a b 2 denote the channel gain power, where a , b S 1 , S 2 , R and a b . With channel reciprocity assumption, we have h a b = h b a and X a b = X b a . Moreover, assume that (i) all channels (i.e., h S 1 S 2 , h S 1 R , and h S 2 R ) are independent with distribution C N ( 0 , Ω 0 ) , C N ( 0 , Ω 1 ) , and C N ( 0 , Ω 2 ) , respectively; (ii) all the noises at the corresponding receiving nodes are independently and identically distributed (i.i.d.) complex additive white Gaussian noises with distribution C N ( 0 , 1 ) ; (iii) all nodes transmit with power ρ ; (iv) each codeword of the two sources bears M bits information and then the target data rate for each source is C = M W ( 1 α ) T bits/s/Hz, where W is the transmission bandwidth of the system; and (v) ideal capacity approaching rateless coding is adopted.
With the above assumptions, the transmission length of the first or second time slot of DTDBC-RC is expressed as T D T D B C R C = min M W log 1 + ρ h S 1 S 2 2 , α T , a random variable depending on the channel quality of the direct link S 1 S 2 (with ρ being the transmit signal-to-noise ratio (SNR). (The transmit SNR is defined as the ratio between the transmit power and the channel noise power, and it is usually used in performance analysis although it is not an important metric in practice.)).

3.1. Outage Probability and Expected Rate

With the system model description in Section 2, the outage probability of DTDBC-RC, defined as the probability that the system cannot support the give target data rate (i.e., the probability that either source cannot support the the give target data rate), is presented in the following theorem.
Theorem 1.
For given target data rate C bits/s/Hz, the outage probability of DTDBC-RC is
P o u t = 1 e z 0 / Ω 0 1 e z 0 Ω 1 + Ω 2 Ω 1 Ω 2 + T 1 e z 0 / Ω 1 + T 2 e z 0 / Ω 2 T 3 ,
where T 1 , T 2 , and T 3 are expressed as
T 1 = 0 , if 0 < α 1 3 , e z 0 / Ω 2 1 e z 1 / Ω 0 Δ 0 . if 1 3 < α < 1 2 ,
T 2 = 0 , if 0 < α 1 3 e z 0 / Ω 1 1 e z 1 / Ω 0 Δ 1 . if 1 3 < α < 1 2 ,
and
T 3 = 0 , if 0 < α 1 3 e z 0 1 / Ω 1 + 1 / Ω 2 1 e z 1 / Ω 0 e z 0 / Ω 1 Δ 0 e z 0 / Ω 2 Δ 1 + Δ 2 . if 1 3 < α < 1 2
with z 0 = 2 ( 1 α ) C / α 1 / ρ , z 1 = 2 ( 1 α ) 3 α 1 C / α 2 1 / ρ , Δ 0 = 0 z 1 1 / Ω 0 e x / Ω 0 e ϕ / Ω 2 d x , Δ 1 = 0 z 1 1 / Ω 0 e x / Ω 0 e ϕ / Ω 1 d x , Δ 2 = 0 z 1 1 / Ω 0 e x / Ω 0 e ϕ 1 / Ω 1 + 1 / Ω 2 d x , and the integrand ϕ = 2 ( 1 α ) C / ( 1 2 α ) / 1 + ρ x α / ( 1 2 α ) 1 / ρ .
Proof. 
Let Θ p q i ( p , q S 1 , R , S 2 , p q ) be the event that the p q link is in outage after the i-th time slot ( i = 1 , 2 ) transmission, and let Θ p q i ¯ be its complementary event. Then, for the target data rate C bits/s/Hz, according to the total probability formula, the outage probability of DTDBC-RC is
P o u t = P r Θ S 1 S 2 1 Θ S 1 R 1 Θ S 2 R 2 Σ 1 + P r Θ S 1 S 2 1 Θ S 1 R 1 ¯ Θ S 2 R 1 ¯ Θ S 1 R S 2 Θ S 2 R S 1 Σ 2 ,
where Θ i R j (with i , j { S 1 , S 2 } and i j ) is the event that the source j still cannot decode successfully after combining the messages received from both the source i and the relay R, i.e.,
Θ i R j = h i j , h j R : α log 1 + ρ h i j 2 + 1 2 α log 1 + ρ h j R 2 < 1 α C
and
Θ S 1 S 2 1 = h S 1 S 2 : α log 1 + ρ h S 1 S 2 2 < 1 α C ,
Θ S 1 R 1 = h S 1 R : α log 1 + ρ h S 1 R 2 < 1 α C ,
Θ S 2 R 2 = h S 2 R : α log 1 + ρ h S 2 R 2 < 1 α C .
With the identity (for any set A, B, and C)
P r A B C = P r A B + P r A C P r A B C ,
the first and second terms at the right-hand side (RHS) of Equation (5) can then be calculated as
Σ 1 = P r Θ S 1 S 2 1 Θ S 1 R 1 + P r Θ S 1 S 2 1 Θ S 2 R 2 P r Θ S 1 S 2 1 Θ S 1 R 1 Θ S 2 R 2 = P r X S 1 S 2 < z 0 and X S 2 R < z 0 + P r X S 1 S 2 < z 0 and X S 1 R < z 0 P r X S 1 S 2 < z 0 , X S 1 R < z 0 and X S 2 R < z 0 = 1 e z 0 / Ω 0 1 e z 0 Ω 1 + Ω 2 Ω 1 Ω 2
and
Σ 2 = P r Θ S 1 S 2 1 Θ S 1 R 1 ¯ Θ S 2 R 1 ¯ Θ S 1 R S 2 + P r Θ S 1 S 2 1 Θ S 1 R 1 ¯ Θ S 2 R 1 ¯ Θ S 2 R S 1 P r Θ S 1 S 2 1 Θ S 1 R 1 ¯ Θ S 2 R 1 ¯ Θ S 1 R S 2 Θ S 2 R S 1 = P r X S 1 R > z 0 P r X S 1 S 2 < z 0 , X S 2 R > z 0 and 1 + ρ X S 1 S 2 α 1 + ρ X S 2 R 1 2 α < 2 ( 1 α ) C T 1 + P r X S 2 R > z 0 P r X S 1 S 2 < z 0 , X S 1 R > z 0 and 1 + ρ X S 1 S 2 α 1 + ρ X S 1 R 1 2 α < 2 ( 1 α ) C T 2 P r X S 1 S 2 < z 0 , X S 1 R > z 0 , X S 2 R > z 0 , 1 + ρ X S 1 S 2 α 1 + ρ X S 2 R 1 2 α < 2 ( 1 α ) C and 1 + ρ X S 1 S 2 α 1 + ρ X S 1 R 1 2 α < 2 ( 1 α ) C T 3 .
In the following, we calculate T 1 , T 2 , and T 3 at the RHS of Σ 2 . The calculation of T 1 can be divided into two cases: (i) when α 1 3 , we have ϕ | x = 0 = 2 ( 1 α ) C / ( 1 2 α ) 1 / ρ z 0 , then T 1 = 0 ; (ii) when 1 3 < α < 1 2 , we have ϕ | x = 0 = 2 ( 1 α ) C / ( 1 2 α ) 1 / ρ > z 0 and the integral area for X S 1 S 2 and X S 2 R is 0 X S 1 S 2 z 1 and z 0 X S 2 R ϕ . Thus,
T 1 = 0 z 1 1 Ω 0 e x / Ω 0 z 0 ϕ 1 Ω 2 e y / Ω 2 d y d x = e z 0 / Ω 2 1 e z 1 / Ω 0 Δ 0 .
From the above results, we see when α 1 3 , T 1 = 0 . This means that when the transmission of the S 1 S 2 link fails in the first time slot and the S 2 R link succeeds in the second time slot, then the transmission of S 1 ’s message aided by S 2 will be successful. The reason is that the S 2 R link (and thus, the R S 2 link with the channel reciprocity assumption) can support the message transmission without outage.In a similar way, T 2 can be calculated as in Equation (3), whose calculation process is omitted here.As for T 3 , its integral area is the intersection of T 1 and T 2 , thus T 3 0 only when α > 1 3 and its integral area is 0 X S 1 S 2 z 1 , z 0 X S 1 R ϕ and z 0 X S 2 R ϕ . Then,
T 3 = 0 z 1 1 Ω 0 e x / Ω 0 z 0 ϕ 1 Ω 1 e y / Ω 1 d y z 0 ϕ 1 Ω 2 e t / Ω 2 d y d x = 0 z 1 1 Ω 0 e x / Ω 0 e z 0 1 / Ω 1 + 1 / Ω 2 e z 0 / Ω 1 e ϕ / Ω 2 e z 0 / Ω 2 e ϕ / Ω 1 + e ϕ 1 / Ω 1 + 1 / Ω 2 d x = e z 0 1 / Ω 1 + 1 / Ω 2 1 e z 1 / Ω 0 e z 0 / Ω 1 Δ 0 e z 0 / Ω 2 Δ 1 + Δ 2 .
Substituting the above results into Equation (5), we obtain the result, i.e., Equation (1) in the theorem.  □
Remark 2:
It is worthwhile to point out that DTDBC-RC has the same outage probability as that of TDBC-IR and sub-DTDBC-RC for fixed target data rate. This can be deduced by how the outage event occurs. We also note that for TDBC-IR in [7,8], the authors consider the case with three equal-length time slots.
With the outage probability given in Theorem 1, the expected rate—defined as the expected successfully transmitted throughput—of DTDBC-RC is expressed as (according to the total probability formula)
C D T D B C R C = z 0 + log ( 1 + ρ x ) 1 Ω 0 e x / Ω 0 d x Σ 3 + 2 1 α C 1 e z 0 / Ω 0 1 P o u t Σ 4 = 1 α α C e z 0 / Ω 0 + ρ ln 2 z 0 + e x / Ω 0 1 + ρ x d x + 2 1 α C 1 e z 0 / Ω 0 1 P o u t ,
where Σ 3 and Σ 4 at the RHS denote the expected rates corresponding to State 2 and State 1, respectively, and z 0 = 2 ( 1 α ) C / α 1 / ρ is the channel gain power when S 1 (or S 2 ) decodes successfully exactly at α T .
Similarly, the expected rates of TDBC-IR and sub-DTDBC-RC are derived as follows for comparison with DTDBC-RC.
C T D B C I R = 2 M 2 α W T 1 P d i r e c t + 2 M W T P d i r e c t 1 P o u t = 1 α α C e z 0 / Ω 0 + 2 1 α C 1 e z 0 / Ω 0 1 P o u t ,
C s u b D T D B C R C = i = 0 N 1 2 M 2 α T W ( 1 + i ) / N P r i P r i + 1 + 2 1 α C 1 e z 0 / Ω 0 1 P o u t = i = 0 N 1 ( 1 α ) C N α ( 1 + i ) P r i P r i + 1 + 2 1 α C 1 e z 0 / Ω 0 1 P o u t ,
where P d i r e c t is the outage probability of the direct link transmission in TDBC-IR and P d i r e c t = P r α log 1 + ρ h S 1 S 2 2 < 1 α C = 1 e z 0 / Ω 0 ; P r 0 = 1 , P r i is the outage probability for S 1 or S 2 in sub-DTDBC-RC that the direct link fails after the i-th ( i = 1 , 2 , . . . , N 1 ) time slot transmission (i.e., P r i = P r α i N log 1 + ρ h S 1 S 2 2 < 1 α C = 1 e 2 N ( 1 α ) C / ( i α ) 1 / Ω 0 ρ ), and P r i P r i + 1 is the probability that S 1 or S 2 exactly fails after the i-th time slot but succeeds after the i + 1 -th time slot transmission.

3.2. Diversity-Multiplexing Trade-off

For the DMT derivation, we first present its definition and two related lemmas.
Definition 1
(of DMT [12,13]). Consider a family of codes χ ρ operating at SNR ρ with rate R ρ bits/s/Hz. If P o u t ρ is the outage probability of the protocol for rate R ρ , the multiplexing gain r and the diversity gain d are defined as r = lim ρ + R ( ρ ) log ρ and d = lim ρ + log ( P o u t ( ρ ) ) log ρ , respectively.
The DMT metric takes into account both transmission reliability and throughput performance simultaneously and provides a more comprehensive view on the performance of communications systems. Note that when calculating DMTs of different protocols, the target data rate C scales with r log ρ in different forms (see in the following subsections).
Lemma 1
([13]). If h is a complex Gaussian random variable with zero mean and given variance, let h 2 = . ρ v , then the probability density function of v is given by p v = . ρ v ( v > 0 ) .
Lemma 2
([13]). For independent random variables v i i = 1 N distributed identically with v, the probability P Θ that v 1 , v 2 , , v N belongs to the set Θ is characterized by P Θ = . ρ d 0 with d 0 = inf v 1 , v 2 , , v N Θ + i = 1 N v i , where Θ + is the set consisting of only non-negative elements of the set Θ.

3.2.1. DMT of TDBC-IR

For TDBC-IR, its DMT is presented in the following theorem for comparison.
Theorem 2.
The DMT of TDBC-IR is given as: (i) when 0 r 0 . 5 ,
d T D B C I R ( r ) = 2 ( 1 r ) , if 0 < α 2 5 2 α r ( 1 2 α ) , if 2 5 < α 1 2 + r 1 α 1 r . if 1 2 + r < α < 1 2 ;
(ii) when 0.5 < r 1 ,
d T D B C I R ( r ) = 2 ( 1 r ) , if 0 < α 1 3 r 1 α 1 r . if 1 3 r < α < 1 2 .
Proof. 
Since P o u t in Equation (5) is decided by Σ 1 and Σ 2 , to prove the theorem, we first calculate Σ 1 and then Σ 2 with C expressed as the function of the multiplexing gain and when ρ + .
Calculation of Σ 1 . When ρ + , C T D B C I R inf = lim ρ + C T D B C I R = 1 α C α , based on Equation (10). Let X S 1 S 2 = . ρ u , X S 1 R = . ρ v and X S 2 R = . ρ w , then according to Lemma 1, u, v, and w are i.i.d. random variables with identical probability density function p z = ρ z with z { u , v , w } . Let C T D B C I R inf = r log ρ , where r ( 0 r 1 ) is the multiplexing gain of TDBC-IR, then C = α r 1 α log ρ and we have (based on Equations (5) and (6))
Σ 1 = . P r Θ S 1 S 2 1 Θ S 1 R 1 + P r Θ S 1 S 2 1 Θ S 2 R 2 ,
where the exponential equality holds because min P r Θ S 1 S 2 1 Θ S 2 R 2 , P r Θ S 1 S 2 1 Θ S 1 R 1 P r Θ S 1 S 2 1 Θ S 1 R 1 Θ S 2 R 2 . Then, by substituting X S 1 S 2 = . ρ u , X S 1 R = . ρ v and X S 2 R = . ρ w into Equation (14), we have
Σ 1 = . P r X S 1 S 2 < z 0 and X S 2 R < z 0 + P r X S 1 S 2 < z 0 and X S 1 R < z 0 = . P r u 1 r P r v > 1 r + P r u 1 r P r w 1 r = . ρ 2 ( 1 r ) + + ρ 2 ( 1 r ) + = . ρ 2 ( 1 r ) + ,
where the second exponential equality is derived based on Lemma 2.
Calculation of Σ 2 . Based on Equations (14) and (8), we have T 2 = . T 1 T 3 and then
P o u t = Σ 1 + e z 0 / Ω 1 T 1 + e z 0 / Ω 2 T 2 T 3 = . ρ 2 1 r + + T 1 .
With this equation, Σ 2 = . T 1 , we only need to calculate T 1 to obtain Σ 2 , and then P o u t . The following process calculates T 1 .
First, when α 1 3 , T 1 = T 2 = T 3 = 0 (see from Equations (2)–(4)) and then Σ 2 = . T 1 = . ρ ; second, when α > 1 3 ,
T 1 = P r X S 1 S 2 < z 0 , X S 2 R > z 0 and 1 + ρ X S 1 S 2 α 1 + ρ X S 2 R 1 2 α < 2 ( 1 α ) C = . P r 1 w + > r and α 1 u + + 1 2 α 1 w + < α r .
Let T 1 = . ρ d 1 ( r ) , then d 1 ( r ) is the solution of the following optimization problem based on Lemma 2.
d 1 ( r ) = min ( u + w ) ,
s . t . , 0 w 1 r , 0 u 1 a n d 1 α α r α u + 1 2 α w .
Since α > 1 3 , 1 α α r α < 1 α α r 1 2 α . To obtain d 1 ( r ) , we only need to compare 1 α 1 r with 1.
Case I: when 1 3 < α 1 2 + r , 1 α 1 r 1 and Σ 2 = . ρ d 1 ( r ) with d 1 ( r ) = 2 α r 1 2 α (see the left part of Figure 3 for calculation of d 1 ( r ) , which is a simple linear programming problem).
Case II: when 1 2 + r < α < 1 2 , 1 α 1 r < 1 and Σ 2 = . ρ d 1 ( r ) with d 1 ( r ) = 1 α 1 r (see the right part of Figure 3 for calculation of d 1 ( r ) ).
Concluding the above process, we have
(i)
when 0 < α 1 3 , P o u t = . ρ 2 1 r + ;
(ii)
when 1 3 < α 1 2 + r , for 0 r 0.5 ,
P o u t = . ρ 2 ( 1 r ) + , if 1 3 < α 2 5 ρ ( 2 α r / 1 2 α ) + . if 2 5 < α 1 2 + r .
For 0.5 < r 1 , P o u t = . ρ 2 1 r + + ρ 2 α r / ( 1 2 α ) + = . ρ 2 1 r + ;
(iii)
when 1 2 + r < α < 1 2 , for 0.5 < r 1 ,
P o u t = . ρ 2 ( 1 r ) + , if 1 2 + r < α 1 3 r ρ ( 1 / α 1 r ) + . if 1 3 r < α 1 2 .
For 0 r 0.5 , P o u t = . ρ 1 / α 1 r + .
With the above results, the DMT of TDBC-IR, i.e., d T D B C I R = lim ρ + log P o u t log ρ , is readily obtained by comparing Σ 1 and Σ 2 . □

3.2.2. DMT of Sub-DTDBC-RC and DTDBC-RC

When ρ + , it is impossible to obtain the limit value of the expected rate of DTDBC-RC from Equation (9), and the DMT of DTDBC-RC cannot be obtained with the conventional outage and expected rate analysis like in Section 3.2.1. Hence, we first derive the DMT of sub-DTDBC-RC and then the DMT of DTDBC-RC by setting the number of subslots N + .
As for the DMT of sub-DTDBC-RC, it is given in the following theorem.
Theorem 3.
The DMT of sub-DTDBC-RC is
d s u b D T D B C R C ( r ) = 2 ( 1 r N ) , if 0 < α 2 5 2 α r N ( 1 2 α ) , if 2 5 < α 1 2 + r / N 1 α 1 r N . if 1 2 + r / N < α < 1 2 ,
where N is the number of subslots of sub-DTDBC-RC.
Proof. 
When ρ + , we have C s u b D T D B C R C inf = lim ρ + C s u b D T D B C R C = N 1 α R α from Equation (11). Let C s u b D T D B C R C inf = r log ρ , where r ( 0 r 1 ) is the multiplexing gain of sub-DTDBC-RC, C = α r N 1 α log ρ . Then, Σ 1 and Σ 2 of P o u t in Equation (5) are calculated as follows.
Calculation of Σ 1 . The calculation of Σ 1 follows the same way as in the proof of Theorem 2, only with the exception that C is now replaced by C = α r N 1 α log ρ . Substituting C into Equation (14), Σ 1 = . ρ 2 ( 1 r / N ) +
Calculation of Σ 2 . Following the same way as in the proof of Theorem 2, only T 1 is needed for calculation of Σ 2 and then P o u t (since Σ 2 = . T 1 ). First, when α 1 3 , Σ 2 = . ρ ; when α > 1 3 , substituting C = α r N 1 α log ρ into T 1 in Equation (8), we get T 1 = . P r 1 w + > r N and α 1 u + + 1 2 α 1 w + < α r N = . ρ d 2 ( r ) , where d 2 ( r ) is the solution of the following optimization problem based on Lemma 2.
d 2 ( r ) = min ( u + w ) ,
s . t . , 0 w 1 r N , 0 u 1 a n d 1 α α r N α u + 1 2 α w .
Moreover, 1 α α r / N α < 1 α α r / N 1 2 α (since α > 1 3 ). Thus, to calculate d 2 ( r ) , we only need to compare 1 α 1 r N with 1.
Case I: when 1 3 < α 1 2 + r / N , 1 α 1 r N 1 , and Σ 2 = . ρ d 2 ( r ) with d 2 ( r ) = 2 α r N 1 2 α .
Case II: when 1 2 + r / N < α < 1 2 , and Σ 2 = . ρ d 2 ( r ) with d 2 ( r ) = 1 α 1 r N .
The calculation of d 2 ( r ) , which follows the same way as for calculating d 1 ( r ) in the proof of Theorem 2, is simple and thus omitted here.
Concluding the above process, we have (i) when 0 < α 1 3 , P o u t = . ρ 2 1 r / N + ; (ii) when 1 3 < α 1 2 + r / N ,
P o u t = . ρ 2 ( 1 r / N ) + , if 1 3 < α 2 5 ρ ( 2 α r N ( 1 2 α ) ) + . if 2 5 < α 1 2 + r / N ;
(iii) and when 1 2 + r / N < α < 1 2 , P o u t = . ρ 1 α 1 r N + .
With the above results, the DMT of sub-DTDBC-RC, i.e., d s u b D T D B C R C = lim ρ + log P o u t log ρ , is readily obtained by comparing Σ 1 and Σ 2 . □
With Theorem 3, the DMT of DTDBC-RC is readily obtained by setting N + as follows.
Corollary 1.
The DMT of DTDBC-RC is d D T D B C R C ( r ) = 2 , i.e., its diversity gain is always two for any multiplexing gain r ( 0 r 1 ), independent of α.
Proof. 
By setting N + in Equation (17), the result is obtained directly. □

4. Simulation and Numerical Results

In the section, Matlab is used for simulation and the simulation process proceeds as described in Section 2. The simulation parameters are set as follows: C = 0 . 5 bits/s/Hz, Ω 0 = Ω 1 = Ω 2 = 1 , and the number of information exchange rounds is 10 9 . In the simulation process, all the channel coefficients are produced independently and keep unchanged in each round of information exchange. Moreover, if the channels in the DTDBC-RC (or sub-DTDBC-RC) protocol cannot support the target rate, an outage event occurs.
The theoretical (Equation (1)) and simulated outage probabilities of DTDBC-RC/TDBC-IR are presented in Figure 4 for various α , where the horizontal axis denotes the transmit SNR (the SNR has the same meaning for the other figures in the paper). From the figure, we see the theoretical and simulated outage probabilities coincide exactly, validating the results in Theorem 1. Moreover, when α 0 . 4 , the outage performance becomes better as α increases. Based on the result of [14] (i.e., the result in Figure 10 of [14]), the optimal cooperation level (i.e., the ratio of a codeword between the part transmitted by the source and that transmitted by the relay) in reaching the best outage performance for one-way coded cooperation lies between 0.6 and 0.7 when the direct and relaying channels are with the same distribution. For DTDBC-RC/TDBC-IR, when α = 0.4, it corresponds to the cooperation level 0 . 4 0 . 4 + 1 2 × 0 . 4 0 . 67 , which lies between 0.6 and 0.7; when α = 0.45, it corresponds to the cooperation level 0 . 45 0 . 45 + 1 2 × 0 . 45 0 . 82 (larger than 0.7). Thus, the outage performance of DTDBC-RC/TDBC-IR when α = 0.4 is better than that of α = 0.45.
The expected rate performance corresponding to Figure 4 for TDBC-IR and DTDBC-RC is shown in Figure 5 and Figure 6, respectively. Figure 5 reveals that on the one hand, the expected rate of TDBC-IR at low-SNR region (when ρ 5 dB) becomes larger as α increases. This is because its expected rate is mainly decided by the second term on the RHS of Equation (10) at this SNR region, i.e., the expected rate decided by the third-time-slot transmission dominates. On the other hand, its expected rate becomes larger as α decreases at high-SNR region (when ρ > 11 dB). This is because its expected rate is mainly decided by the first term on the RHS of Equation (10) at this SNR region, i.e., the expected rate decided by the first two-time-slot transmission dominates. Moreover, as SNR tends to infinity, the expected rate of TDBC-RC reaches ( 1 α ) C α (i.e., the first term on the RHS of Equation (10)) since e z 0 / Ω 0 = 1 .
For DTDBC-RC, the similar expected rate performance trend is observed at low-SNR region (see Figure 6), i.e., the expected rate becomes larger as α increases. The reason is also similar, i.e., it is mainly decided by the second term (i.e., Σ 4 ) on the RHS of Equation (9) and thus, the expected rate decided by the third-time-slot transmission dominates. However, when the SNR is large enough, its expected rate is independent of α (unlike for the TDBC-IR) and becomes infinite as SNR tends to infinity. This is because the expected rate of DTDBC-RC is mainly decided by the first term at the RHS of Equation (9) (i.e., Σ 3 ) and it will always succeed in the first two-time-slot transmission (thus, its transmission time T D T D B C R C only depends on the channel distribution of the direct link).
The expected rate performance comparison among TDBC-IR, DTDBC-RC, and sub-DTDBC-RC (with various number of subslots N) is presented in Figure 7. We see that DTDBC-RC outperforms sub-DTDBC-RC and sub-DTDBC-RC outperforms TDBC-IR, revealing the expected rate performance advantage of DTDBC-RC (or sub-DTDBC-RC) over TDBC-IR. Moreover, as N increases the expected rate performance of sub-DTDBC-RC approaches that of DTDBC-RC gradually, validating the intuition that sub-DTDBC-RC becomes DTDBC-RC as N + .
As for the DMT performance, we plot the DMTs of TDBC, DTDBC-RC, and sub-DTDBC-RC in Figure 8 based on the results in Theorem 2, Theorem 3, and the Corollary. We see that DTDBC-RC outperforms sub-DTDBC-RC and sub-DTDBC-RC outperforms TDBC-IR for the same α . It is also obtained from Theorem 2 that TDBC-IR achieves its best DMT performance when α 2 5 .

5. Conclusions

In this paper, we considered a two-way relaying channel with direct link and proposed the DTDBC-RC protocol to fully utilize the channel dynamics of the direct link by using rateless coding. We analyzed the performance (in terms of outage probability, expected rate, and DMT) of DTDBC-RC and presented a subslot implementation scheme (sub-DTDBC-RC) to derive the DMT of DTDBC-RC. Compared with the already existing TDBC-IR protocol, DTDBC-RC (or sub-DTDBC-RC) has better expected rate and DMT performance.

Author Contributions

K.X. and Z.D. conceived of and designed the model, performed the theoretical analysis and simulation, analyzed the simulation result, and wrote the paper. M.G., C.Y., and B.J. provided valuable suggestions for this paper and helped in simulation and writing. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China under Grant No. 61801492 and No. 61601490, and is also supported by research fund of National University of Defense Technology with contract No. ZK18-03-20.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Rankov, B.; Wittneben, A. Spectral efficient protocols for half-duplex fading relay channels. IEEE J. Sel. Areas Commun. 2007, 25, 379–389. [Google Scholar] [CrossRef]
  2. Liu, P.; Kim, I.M. Performance analysis of bidirectional communication protocols based on decode-and-forward relaying. IEEE Trans. Commun. 2010, 58, 2683–2696. [Google Scholar] [CrossRef]
  3. Kim, S.J.; Mitran, P.; Tarokh, V. Performance bounds for bidirectional coded cooperation protocols. IEEE Trans. Inf. Theory 2008, 54, 5235–5241. [Google Scholar] [CrossRef]
  4. Laneman, N.J.; Tse, D.N.; Wornell, G.W. Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Trans. Inf. Theory 2004, 50, 3062–3080. [Google Scholar] [CrossRef]
  5. Yang, Y.; Chen, W.; Li, O.; Liu, Q.; Hanzo, L. Truncated-ARQ aided adaptive network coding for cooperative two-way relaying networks: Cross-layer design and analysis. IEEE Access 2016, 4, 9361–9376. [Google Scholar] [CrossRef]
  6. He, J.; Liew, S.-C. ARQ for physical-layer network coding. IEEE Trans. Mob. Comput. 2016, 15, 1614–1631. [Google Scholar] [CrossRef] [Green Version]
  7. Xu, K.; Gao, Y.; Yi, X.; Zang, G.; Sha, N. Performance analysis of time division broadcast protocol with incremental relaying and symmetric users. Int. J. Commun. Syst. 2013, 26, 1419–1432. [Google Scholar] [CrossRef]
  8. Ding, H.; Ge, J.; da Costa, D.B.; Jiang, Z. Two birds with one stone: Exploiting direct links for multiuser two-way relaying systems. IEEE Trans. Wirel. Commun. 2012, 11, 54–59. [Google Scholar] [CrossRef]
  9. Xu, K.; Gao, Y.; Xu, Y.; Fan, Z.; Yi, X. Decode-and-forward two-way relaying protocol with one retransmission. Int. J. Commun. Syst. 2014, 27, 776–793. [Google Scholar] [CrossRef]
  10. Castura, J.; Mao, Y. Rateless coding for wireless relay channel. IEEE Trans. Wirel. Commun. 2007, 6, 1638–1642. [Google Scholar] [CrossRef]
  11. Yu, Z.; Zhang, Z.; Yin, R.; Yu, G.; Wang, W. Joint network-channel coding with rateless code in two-way relay systems. IEEE Trans. Wirel. Commun. 2013, 7, 3158–3169. [Google Scholar]
  12. Zheng, L.; Tse, D. Diversity and multiplexing: A fundamental tradeoff in multiple-antenna channels. IEEE Trans. Inf. Theory 2003, 49, 1073–1096. [Google Scholar] [CrossRef] [Green Version]
  13. Azarian, K.; Gamal, H.E.; Schniter, P. On the achievable diversity-multiplexing tradeoff in half-duplex cooperative channels. IEEE Trans. Inf. Theory 2005, 51, 4152–4172. [Google Scholar] [CrossRef] [Green Version]
  14. Hunter, T.E.; Sanayei, S.; Nosratinia, A. Outage analysis of coded cooperation. IEEE Trans. Inf. Theory 2006, 52, 375–391. [Google Scholar] [CrossRef]
Figure 1. The working states of the dynamic time division broadcast rateless coding (DTDBC-RC) protocol.
Figure 1. The working states of the dynamic time division broadcast rateless coding (DTDBC-RC) protocol.
Applsci 10 00086 g001
Figure 2. The working states of the sub-DTDBC-RC protocol.
Figure 2. The working states of the sub-DTDBC-RC protocol.
Applsci 10 00086 g002
Figure 3. The calculation of d 1 ( r ) .
Figure 3. The calculation of d 1 ( r ) .
Applsci 10 00086 g003
Figure 4. The outage probability performance of the DTDBC-RC/TDBC-IR protocol for various α .
Figure 4. The outage probability performance of the DTDBC-RC/TDBC-IR protocol for various α .
Applsci 10 00086 g004
Figure 5. The expected rate performance of the TDBC-IR protocol.
Figure 5. The expected rate performance of the TDBC-IR protocol.
Applsci 10 00086 g005
Figure 6. The expected rate comparison performance of the DTDBC-RC protocol.
Figure 6. The expected rate comparison performance of the DTDBC-RC protocol.
Applsci 10 00086 g006
Figure 7. The expected rate comparison of TDBC-IR, DTDBC-RC, and sub-DTDBC-RC.
Figure 7. The expected rate comparison of TDBC-IR, DTDBC-RC, and sub-DTDBC-RC.
Applsci 10 00086 g007
Figure 8. The diversity-multiplexing trade-off (DMT) performance comparison of TDBC-IR, DTDBC-RC, and sub-DTDBC-RC.
Figure 8. The diversity-multiplexing trade-off (DMT) performance comparison of TDBC-IR, DTDBC-RC, and sub-DTDBC-RC.
Applsci 10 00086 g008

Share and Cite

MDPI and ACS Style

Xu, K.; Guo, M.; Yang, C.; Jiang, B.; Du, Z. Performance of Dynamic Time Division Broadcast Protocol with Rateless Coding. Appl. Sci. 2020, 10, 86. https://doi.org/10.3390/app10010086

AMA Style

Xu K, Guo M, Yang C, Jiang B, Du Z. Performance of Dynamic Time Division Broadcast Protocol with Rateless Coding. Applied Sciences. 2020; 10(1):86. https://doi.org/10.3390/app10010086

Chicago/Turabian Style

Xu, Kun, Makun Guo, Chule Yang, Bin Jiang, and Zhiyong Du. 2020. "Performance of Dynamic Time Division Broadcast Protocol with Rateless Coding" Applied Sciences 10, no. 1: 86. https://doi.org/10.3390/app10010086

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop