Next Article in Journal
Effects of Endwall Fillet and Bulb on the Temperature Uniformity of Pin-Fined Microchannel
Previous Article in Journal
Capacity Bounds on the Downlink of Symmetric, Multi-Relay, Single-Receiver C-RAN Networks
Previous Article in Special Issue
Sum Capacity for Single-Cell Multi-User Systems with M-Ary Inputs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multilevel Coding for the Full-Duplex Decode-Compress-Forward Relay Channel

by
Ahmed Attia Abotabl
and
Aria Nosratinia
*
Department of Electrical & Computer Engineering, The University of Texas at Dallas, Richardson, TX 75080, USA
*
Author to whom correspondence should be addressed.
Entropy 2017, 19(11), 611; https://doi.org/10.3390/e19110611
Submission received: 14 August 2017 / Revised: 23 October 2017 / Accepted: 30 October 2017 / Published: 14 November 2017
(This article belongs to the Special Issue Multiuser Information Theory)

Abstract

:
The Decode-Compress-Forward (DCF) is a generalization of Decode-Forward (DF) and Compress-Forward (CF). This paper investigates conditions under which DCF offers gains over DF and CF, addresses the problem of coded modulation for DCF, and evaluates the performance of DCF coded modulation implemented via low-density parity-check (LDPC) codes and polar codes. We begin by revisiting the achievable rate of DCF in discrete memoryless channels under backward decoding. We then study coded modulation for the decode-compress-forward via multi-level coding. We show that the proposed multilevel coding approaches the known achievable rates of DCF. The proposed multilevel coding is implemented (and its performance verified) via a combination of standard DVB-S2 LDPC codes, and polar codes whose design follows the method of Blasco-Serrano.

1. Introduction

Shortly after the introduction of the three-node relay channel by Van Der Meulen [1], Cover and El-Gamal [2] proposed and analyzed block-Markov encoded decode-forward (DF) and compress-forward (CF) for the relay channel [3,4,5]. Decode-forward is capacity achieving for the degraded relay channel, but, due to the relay decoding constraint, it does not perform well when the source-relay link is weak. Compress-forward can also be optimal under certain conditions [6], but it also falls short under certain other conditions [3,4]. This motivated a generalization of DF and CF into a hybrid technique by Cover and El-Gamal ([2], Theorem 7), denoted decode-compress-forward (DCF). This technique, its performance and implementation via coded modulation are the subjects of this paper. Other hybrid relaying protocols include hybrid Decode-forward and Amplify-forward [7], and also a variation of DCF has appeared in the context of selective cooperation [8].
The known achievable rate of DCF in the additive white Gaussian noise (AWGN) full-duplex relay channel reduces to either DF or CF achievable rates. This is a result due to [9] that we re-derive in the following under backward decoding. In the discrete input full-duplex relay channel, we show via examples that the DCF performance can exceed both DF and CF.
A coding implementation for the DCF in the AWGN channel is then proposed based on multilevel coding (MLC). Multilevel coding was proposed by Imai and Hirakawa in [10]. More details about the performance and the design of MLC can be found in [11,12,13]. Duan et al. [14] showed that MLC with linear mapping does not require active shaping to achieve the capacity. MLC was extended to the MIMO (multiple-input multiple-output) transmission [15], and was used for diversity coding [16,17,18,19] and in data storage [20]. Much less is known about MLC in the context of multi-node networks. Exceptions exist, for example, Hern and Narayanan [21] used MLC in the context of compute and forward and Chen et al. [22] studied multilevel coding in the two-way relay channel.
At the source and the relay, the proposed DCF multilevel coding decomposes the overall coded modulation into a group of binary codes, each either operating via a DF or a CF protocol. The mapper combines these constituent level-wise codes into a hybrid DF-CF coded modulation. The assignment of each level to either DF or CF and the rate allocation to each level is an optimization problem. We demonstrate the operation of this system by an implementation that employs for the DF components the DVB-S2 LDPC codes [23], and, for the CF components, a group of polar codes that are designed according to Blasco-Serrano [24,25].

2. Preliminaries

2.1. The Relay Channel

The capacity of the full-duplex relay channel is in general unknown. The capacity of the degraded relay channel is achieved by decode-forward, and achievable rates for several other protocols have also been calculated including partial decode-forward and compress-forward. In a full-duplex relay, these protocols are implemented via block-Markov encoding [26], a consequence of the causality constraint on the relay.
Throughout the paper, we denote the signal transmitted from the source node and the relay node in block t by X 1 ( t ) and X 2 ( t ) . We begin with the received signal model at the relay, which experiences self-interference:
Y 2 ( t ) = H 12 X 1 ( t ) + n 2 + n s ,
where H 12 is the channel coefficient from the source to the relay, n 2 is the additive Gaussian (thermal) noise at the receiver, and n s is the sampled residual self-interference. The area of modeling and analyzing loop-back or self-interference has experienced rapid growth in the past few years. Several methods for mitigating self-interference are now in place, among them antenna design and placement (including passive components), as well as echo cancellation in the amplifier stage, as well as digital signal processing after down-conversion and sampling [27]. The collection of these methods has allowed the residual self-interference to be reduced significantly. The residue of self-interference, n s , is the component that is seen by the relay decoder. Several works to date [27,28,29] have used a Gaussian model for n s , an approximation that is confirmed by various measurements [30,31]. Therefore, the combination n ˜ 2 = n 2 + n s is also Gaussian with the appropriate variance.
Thus, the received signal at the relay and destination in block t are respectively given by
Y 2 ( t ) = H 12 X 1 ( t ) + n ˜ 2 ,
Y 3 ( t ) = H 13 X 1 ( t ) + H 23 X 2 ( t ) + n 3 ,
where H 12 ,   H 13 and H 23 are the channel coefficients as illustrated in Figure 1. The channel coefficients can include a path-loss component as well as any type of fading.
The destination uses either backward decoding or a sliding window decoding. The former requires waiting until a terminating point where no new message is transmitted from the source, and, in the latter, the decoder uses a window of L blocks for decoding.
In decode-forward, the relay decodes the message from the source in block t and assists the source in its transmission during block t + 1 . In compress-forward, the relay does not attempt decoding but quantizes the received signal Y 2 and sends the quantized version to the destination.

2.2. Multilevel Coding

In the point-to-point channel, multilevel coding (see Figure 2) divides the data stream into m = log 2 ( q ) binary sub-streams for a q-ary constellation. Each sub-stream i is encoded independently with rate R i . At each time instance, the outputs of the (binary) encoders are combined to construct the vector [ B 1 , B 2 , B m ] , which is then mapped to a constellation point X. The channel is described by the conditional distribution P Y | X ( y | x ) , where Y is the output of the channel. The mutual information between the input and output is given by
I ( X ; Y ) = I ( B 1 , B 2 , , B m ; Y ) = i = 1 m I ( B i ; Y | B i 1 ) ,
where we use the chain rule of mutual information, one-to-one relationship between X and [ B 1 , B 2 , , B m ] , and the notation B i 1 [ B 1 , B 2 , , B i 1 ] . This equation suggests a multistage decoding where the codeword of level i is decoded using the output of the decoders of the preceding levels. A necessary and sufficient condition for multilevel coding achieving the constellation constrained capacity is that the optimal distribution P B 1 , , B m ( b 1 , , b m ) must be independent across its components [32]:
P B 1 , , B m ( b 1 , , b m ) = i = 1 m P B i ( b i ) .

3. Decode-Compress-Forward

In this section, we re-derive Theorem 7 [2] for the discrete memoryless relay channel under backward decoding and obtain the DCF achievable rate for the AWGN relay channel as well as the constellation constrained AWGN relay channel.

3.1. Discrete Memoryless Full-Duplex Relay

Block Markov encoding for decode-compress forward is shown in Figure 3 over four transmission blocks. In each transmission block, the source and the relay send a compress-forward component that is superimposed on a decode-forward component. A detailed system design and analysis is explained as follows:
In g transmission blocks, a sequence of ( g 1 ) i.i.d. messages W j [ 1 : 2 n R ] , j [ 1 : g 1 ] is transmitted. Each message W j is split into two messages W d j [ 1 : 2 n R d ] and W c j [ 1 : 2 n R c ] for j [ 1 : g 1 ] . This implies that R = R d + R c , where R is the total rate, and R d , R c , respectively, indicate the rate carried by decode-forward and compress-forward components of signaling.
Codebook generation:
For each block j [ 1 : g ] , randomly and independently generate 2 n R d sequences U 2 d n ( w d ( j 1 ) ) according to
i = 1 n P U 2 d ( u 2 d i ) .
For each w d ( j 1 ) [ 1 : 2 n R d ] , randomly and conditionally independently generate 2 n R sequences X 2 n ( l j 1 | w d ( j 1 ) ) , l j 1 [ 1 : 2 n R ] , each according to
i = 1 n P X 2 | U 2 d ( x 2 i | u 2 d i ( w d ( j 1 ) ) ) .
For each l j 1 [ 1 : 2 n R ] , randomly and conditionally independently, generate 2 n R sequences Y ^ 2 n ( k j | l j 1 ) , k j [ 1 : 2 n R ] each according to
i = 1 n P Y ^ 2 | X 2 i ( y ^ 2 i | x 2 i ( l j 1 | w d ( j 1 ) ) .
R represents the compression rate at the relay. In addition, for each w d ( j 1 ) , randomly and conditionally independently generate 2 n R d sequences U 1 d n ( w d j | w d ( j 1 ) ) , w d j [ 1 : 2 n R d ] , each according to
i = 1 n P U 1 d | U 2 d ( u 1 d i | u 2 d i ( w d ( j 1 ) ) ) .
Finally, for each pair of messages w d ( j 1 ) and w d j , randomly and conditionally independent generate 2 n R c sequences X 1 n ( w c j | w d ( j ) , w d ( j 1 ) ) , each according to
i = 1 n P X 1 | U 2 d , U 1 d ( x 1 i | u 2 d i ( w d ( j 1 ) ) , u 1 d i ( w d ( j 1 ) ) ) .
This defines the codebooks
C j = { x 1 n ( w c j | w d j , w d ( j 1 ) ) , x 2 n ( l j | w d ( j 1 ) ) } , j [ 1 : g ] .
The source node:
In block j, the pair of messages w d j and w c j are to be transmitted. The encoder at the source node chooses x 1 ( w c j | w d j , w d ( j 1 ) ) from codebook C j . The messages of the last block are considered to be w c g = w d g = 1 .
The relay node:
The decoding phase of the relay uses typicality decoding as follows: first, assume that w ˜ d 0 = 1 . Second, at the end of block j, the relay finds a unique w ˜ d j such that
( x 1 n ( w c j | w ˜ d j , w ˜ d ( j 1 ) ) , x 2 n ( l j 1 | w ˜ d ( j 1 ) ) , y 2 n ( j ) ) T ϵ ( n )
for any w c j , where T ϵ ( n ) denotes the jointly typical sets of the corresponding random variables.
The relay then finds k j such that
y 2 n ( j ) , y ^ 2 n ( k j | l j 1 ) , x 2 n ( l j 1 ) T ϵ ( n ) ,
and if there is more than one k j , the relay selects one at random and if the relay does not find any k j , then, it selects one uniformly at random from [ 1 : 2 n R ] . Based on k j , the relay determines l j as it is the bin index of k j .
In the transmission phase, in block j, the relay chooses x 2 ( l j 1 | w d ( j 1 ) ) from codebook C j .
The destination node:
The destination uses backward decoding, so it waits until the reception of the g blocks and then starts decoding from the last block and successively toward the first block. For j = g 1 , g 2 , , 1 , the destination finds estimates w ^ d ( j ) and l ^ j such that
( x 1 n ( w ^ c ( j + 1 ) | w ^ d ( j + 1 ) , w ^ d ( j ) ) , x 2 n ( l ^ j | w ^ d ( j ) ) , y 3 n ( j + 1 ) ) T ϵ ( n ) ,
where w c g = w d g = 1 . The destination then finds an estimate w ^ c j such that
( x 1 ( w ^ c ( j ) | w ^ d ( j ) , w ^ d ( j 1 ) ) , x 2 ( l ^ j 1 | w ^ d ( j 1 ) ) , y ^ 2 n ( k ^ j | l ^ j 1 ) ) T ϵ ( n )
for some k ^ j that belongs to the bin l ^ j .
Probability of error analysis:
Without loss of generality, the source messages are w d j = w c j = 1 for j [ 1 : g ] . In block j, there are two error events at the relay, an error event when the relay does not decode w d j correctly and another when the relay makes an error in the compress-forward part. The two error events at the relay in block j are defined as follows:
E ˜ 1 ( j ) = { W ^ d j 1 } ,
E ˜ 2 ( j ) = { ( X 2 n ( L j 1 | W d ( j 1 ) ) , Y ^ 2 n ( k j | L j 1 ) , Y 2 n ( j ) ) T ϵ ( n ) for all k j [ 1 : 2 n R ] } ,
while the error events at the destination are defined as follows:
E ( j + 1 ) = { ( W d ( j + 1 ) 1 ) ( W c ( j + 1 ) 1 ) } ,
E ( j + 1 ) = { L c ( j + 1 ) 1 } ,
E 1 ( j ) = { ( X 1 n ( W ^ c ( j + 1 ) | W ^ d ( j + 1 ) , W ^ d j ) , X 2 n ( L ^ j | W ^ d j ) , Y 3 n ( j + 1 ) ) T ϵ ( n ) } ,
E 2 ( j ) = { ( X 1 n ( W ^ c ( j + 1 ) | W ^ d ( j + 1 ) , w ^ d j ) , X 2 n ( l ^ j | w ^ d j ) , Y 3 n ( j + 1 ) ) T ϵ ( n ) for some w ^ d j 1 , l ^ j 1 } ,
E 3 ( j ) = { ( X 1 n ( W ^ c ( j + 1 ) | W ^ d ( j + 1 ) , W ^ d j ) , X 2 n ( l ^ j | W ^ d j ) , Y ^ 2 n ( K ^ j | L ^ j 1 ) ) T ϵ ( n ) } ,
E 4 ( j ) = { ( X 1 n ( w c ( j + 1 ) | W ^ d ( j + 1 ) , W ^ d j ) , X 2 n ( l ^ j | W ^ d j ) , Y ^ 2 n ( K ^ j | L ^ j 1 ) ) T ϵ ( n ) for some w c ( j + 1 ) 1 } .
The probability of error is then
P ( E ( j ) ) = P ( E ˜ 1 ( j ) E ˜ 2 ( j ) E ( j + 1 ) E ( j + 1 ) E 1 ( j ) E 2 ( j ) E 3 ( j ) E 4 ( j ) ) P ( E ˜ 1 ( j ) ) + P ( E ˜ 2 ( j ) ) + P ( E ( j + 1 ) )
+ P ( ( E 1 ( j ) E 3 ( j ) ) E ˜ 1 c ( j ) E ˜ 2 c ( j ) E c ( j + 1 ) E c ( j + 1 ) ) + P ( E 2 ( j ) ) + P ( E 4 ( j ) ) ,
where the superscript c denotes the complementary event. By the law of large numbers and the packing lemma, P ( E ˜ 1 ( j ) ) 0 as n if
R d I ( U 1 d ; Y 2 | U 2 d ) .
By independence of the codebooks and the covering lemma, the term P ( E ˜ 2 ( j ) ) 0 as n if
R I ( Y ^ 2 ; Y 2 | X 2 ) .
For P ( E ( j + 1 ) ) , since the messages of the last block is known exactly to be 1, by induction and satisfying the other constraints, P ( E ( j + 1 ) ) 0 as n .
By the independence of the codebooks and the law of large numbers, the term P ( ( E 1 ( j ) E 3 ( j ) ) E ˜ 1 c ( j ) E ˜ 2 c ( j ) E c ( j + 1 ) E c ( j + 1 ) ) 0 as n . The term P ( E 2 ( j ) ) 0 as n if
R d I ( U 1 d , U 2 d ; Y 3 ) ,
R I ( X 2 ; Y 3 | U 2 d ) ,
R c I ( X 1 ; Y ^ 2 , Y 3 | X 2 , U 1 d ) .
Eventually, the total transmission rate is R d + R c . By combining the previous rate constraints, we have:
Theorem 1.
The achievable rate of decode-compress-forward is given by
R min { I ( U 1 d ; Y 2 | U 2 d ) , I ( U 1 d , U 2 d ; Y 3 ) } + I ( X 1 ; Y ^ 2 , Y 3 | X 2 , U 1 d )
subject to
I ( Y 2 ; Y ^ 2 | X 2 , U 1 d ) I ( X 2 ; Y 3 ) I ( U 2 d ; Y 3 ) ,
where
P Y 3 , Y 2 , Y ^ 2 , U 1 d , U 2 d , X 1 , X 2 ( y 3 , y 2 , y ^ 2 , u 1 d , u 2 d , x 1 , x 2 ) = P U 2 d ( u 2 d ) P U 1 d | U 2 d ( u 1 d | u 2 d ) P X 1 | U 1 d ( x 1 | u 1 ) P X 2 | U 2 d ( x 2 | u 2 ) P Y 2 | X 1 ( y 2 | x 1 ) P Y ^ 2 | U 1 d , X 2 , Y 2 ( y ^ 2 | u 1 , x 2 , y 2 ) P Y 3 | X 1 , X 2 ( y 3 | x 1 , x 2 ) .

3.2. AWGN Full-Duplex Relay

Assume that all the variables in the Section 3.1 are Gaussian, and the source and relay have an average power constrained by P 1 and P 2 , respectively. Note that Gaussian codebooks are not known to be optimal in this case. A block-Markov encoding of DCF in the AWGN channel is shown in Figure 4 under four transmission blocks. The source and relay signals are given by
X 1 = U 1 d + β U 2 d + U 1 c ,
X 2 = U 2 d + U 2 c ,
respectively.
Each of the codewords U 1 d , U 2 d , U 1 c and U 2 c are normally distributed. The term β U 2 d represents the assistance that the source provides for the relay destination transmission. This assistance depends on the correlation between U 1 d + β U 2 d and U 2 d , which is denoted by ρ .
Remark 1.
In DCF, normally one can optimize the power allocation of each code at the source and the relay. We fix the power of one of the DF signals U 1 d and the CF signal U 1 c . The power of the remaining signals can be obtained as a function of the power of U 1 d and U 1 c and the power constraint at the source and relay nodes. Consequently, the design variables of the rate maximization problem become the power of U 1 d , U 1 c and the correlation ρ.
Assuming that the power of U 1 d is P 1 d and the power of U 1 c is P 1 c , the power of U 2 d is then given by
P 2 d = P 1 P 1 d P 1 c β 2 ,
and, consequently, the power of U 2 c is
P 2 c = P 2 P 2 d = P 2 P 1 P 1 d P 1 c β 2 ,
where
ρ = E [ ( U 1 d + β U 2 d ) U 2 d ] ( P 1 d + β 2 P 2 d ) P 2 d ,
β = ρ 2 P 1 d P 2 d P 2 d 2 ( 1 ρ 2 ) .
The signals Y 2 , Y ^ 2 and Y 3 are given by
Y 2 = H 12 X 1 + n 2 ,
Y ^ 2 = Y 2 + n ^ ,
Y 3 = H 13 X 1 + H 23 X 2 + n 3 ,
where n 2 , n 3 and n ^ are zero mean Gaussian noise with variance σ 2 2 , σ 3 2 and N ^ , respectively.
Based on the previous characterization for each of the distributions of the variables involved in calculating the transmission rate, the achievable rate for the AWGN DCF relay is as follows:
R min { 1 2 log 1 + | H 12 | 2 P 1 d | H 12 | 2 P 1 c + σ 2 2 , 1 2 log 1 + ( P 1 d + β 2 P 2 c ) | H 13 | 2 σ 3 2 + P 2 d | H 23 | 2 σ 3 2 + 2 ρ ( P 1 d + β 2 P 2 ) P 2 d | H 13 | 2 | H 23 | 2 σ 3 4 } + 1 2 log ( | H 12 | 2 P 1 c + σ 3 2 + N ^ ) ( | H 13 | 2 P 1 c + σ 3 2 ) ( | H 12 | 2 | H 13 | 2 ) P 1 c 2 ( σ 3 2 + N ^ ) σ 3 2 ,
where
N ^ = ( | H 12 | 2 P 1 c + σ 2 2 ) ( | H 13 | 2 ( P 1 d + P 1 c ) + σ 2 2 ) | H 23 | 2 P 2 c .
To illustrate the performance of DCF as a function of the location of the relay, we adopt the illustration used in [3] and calculate the achievable rate as a function of relay position on a line extending from the source to destination. For simplicity, a path-loss model is considered with the channel coefficient H i j = 1 / d i j α , where d i j is the distance between node i and node j and α is the path-loss coefficient, which is usually between 2 and 4. The distance between the source and the destination is fixed to d 13 = 1 while the distances d 12 and d 23 depend on the relay location where d 23 = 1 d 12 . In Figure 5, the achievable rate of different transmission techniques are shown as a function of the distance between the source and the relay d 12 .
Figure 5 shows that the achievable rate of DCF in the AWGN relay channel reduces to either DF rate or CF rate. In other words, optimizing DCF results in either DF or CF.

3.3. Constellation-Constrained Full-Duplex Relay

For the discrete input AWGN relay channel, the rate expressions in Theorem 1 can be calculated via numerical integrations. The optimizing distribution may require an exhaustive search. As shown in many point-to-point and multi-user scenarios [33,34], when the constellation becomes large enough, the achievable rate under a constrained constellation becomes very close to the Gaussian input rate.
However, the main difficulty comes from the restriction in Equation (21), which is now even harder to satisfy since the mutual information I ( X 2 ; Y 3 ) is no longer equal to
1 2 log 1 + | H 23 | 2 P 2 σ 3
and is limited by the cardinality of the input size | X 2 | . The exact value of the constellation constrained capacity [35], I ( X 2 ; Y 3 ) , can be obtained from
I ( X 2 ; Y 3 ) = max P X 2 ( x 2 ) X 2 P X 2 ( x 2 ) y 3 P Y 3 | X 2 ( y 3 | x 2 ) log P Y 3 | X 2 ( y 3 | x 2 ) P Y 3 ( y 3 ) d y 3 .
An accurate approximation for I ( X 2 ; Y 3 ) under constrained constellation can be obtained using the Blahut–Arimoto algorithm [36,37]. Constellation constrained point-to-point channel capacity for various constellations is shown in Figure 6.
By calculating the value of I ( X 2 ; Y 3 ) , one can find the achievable rate of compress-forward and DCF. In the following, an upper bound is provided on the achievable rate of DCF under discrete relay-destination input X 2 . The upper bound is based on bounding I ( X 2 ; Y 3 ) by either the cardinality of X 2 or the Gaussian capacity
I ( X 2 ; Y 3 ) min | X 2 | , 1 2 log 1 + | H 23 | 2 P 2 σ 3 2 .
Therefore, the constraint in Equation (21) becomes
I ( Y 2 ; Y ^ 2 | X 2 , U 1 d ) min | X 2 | , 1 2 log 1 + | H 23 | 2 P 2 σ 3 2 I ( U 2 d ; Y 3 ) .
By using the bound in Equation (36), one can find an upper bound on the DCF as follows:
R min { I ( U 1 d ; Y 2 | U 2 d ) , I ( U 1 d , U 2 d ; Y 3 ) } + I ( X 1 ; Y ^ 2 , Y 3 | X 2 , U 1 d )
subject to
I ( Y 2 ; Y ^ 2 | X 2 , U 1 d ) min 1 2 log 1 + | H 23 | 2 P 2 σ 3 2 , | X 2 | I ( U 2 d ; Y 3 ) .
The capacity of the decode-compress-forward technique can be obtained by evaluating these expressions using numerical integrations and an exhaustive search for the optimal distribution.
In a similar manner to Section 3.2, the achievable rate for different strategies is shown in Figure 7, showing that when the relay is close to the destination, CF suffers a rate penalty while DCF does not.
Remark 2.
Compress-forward works well when the source-relay channel is weak, but the relay destination channel is strong so that an estimate of Y 2 can be communicated with the destination. If the relay-destination channel supports insufficient rate (either because of channel gain or limitation of constellation) communicating an estimate of Y 2 is not an attractive strategy for the relay. This can in part explain the effect of the constellation constraint on the performance of compress-forward.
Clearly, the relay channel model in Figure 7 does not represent every possible scenario. We show two more results in Table 1 that cannot be observed in Figure 7.

4. Multilevel Decode-Compress-Forward

The proposed multilevel coding is shown in Figure 8, over one transmission block. The message at the source, W ( t ) , is divided into two parts, W d ( t ) which is to be transmitted using decode-forward and W c ( t ) which is to be transmitted using compress-forward. As shown in the figures, each level at the source and the relay is responsible for either DF or CF.
Relay transmission:
The levels at the relay are divided into two sets. The first set sends the message W d ( t 1 ) . The second set sends the quantized version of Y 2 after removing the effect of W d , namely, Y ^ 2 .
Source transmission:
The levels at the source are divided into three sets. The first set sends the message W d ( t 1 ) cooperatively with the relay to the destination node. The second set sends the message W d ( t ) to be decoded at the relay. The third set of levels sends the message W c ( t ) .
The achievable rate of the multilevel coding DCF is given by
R max B ^ , B ¯ , C ^ , C ¯ min { I ( B ^ ; Y 2 | C ^ ) } , I ( B ^ , C ^ ; Y 3 ) } + I ( B ^ , B ¯ ; Y ^ 2 , Y 3 | C ^ , C ¯ , B ^ )
subject to
I ( Y 2 ; Y ^ 2 | C ^ , C ¯ ) I ( C ^ , C ¯ ; Y 3 ) I ( C ^ ; Y 3 ) ,
where B ^ = [ B 1 , , B j ] are the source levels that are responsible for the decode-forward part. B ¯ = [ B j + 1 B m ] are the source levels responsible for the compress-forward part. Similarly, C ^ = [ C 1 , C l ] and C ¯ = [ C l + 1 , C m ] are the relay levels responsible for the DF part and CF part, respectively.
The question now is how to allocate the rate in each level at the source and the relay. This is determined through the following steps.
  • The optimal function of each level (being a DF or a CF level) at the source and the relay depends on the constellation and the channel conditions. Using an exhaustive search to opti ize (39), one can find the best set of levels for decode-forward and for compress-forward at the source and the relay.
  • The number of bits of W d ( t ) and W c ( t ) depends on the rate of the decode-forward and compress-forward components given by
    R d = min { I ( B ^ ; Y 2 | C ^ ) } + I ( B ^ , C ^ ; Y 3 ) }
    and
    R c = I ( B ^ , B ¯ ; Y ^ 2 , Y 3 | C ^ , C ¯ , B ^ ) ,
    respectively.
Thus, W d has rate n R d and W c has rate n R c .
Remark 3.
In the proposed multilevel DCF, we assume that each level is limited to either DF or CF. Extensive simulations show that this restriction has a negligible effect on achievable rates.
Remark 4.
In addition to level-assignment, other labeling variations are also possible, e.g., natural versus Gray labeling. Simulations in the sequel indicate that natural labeling is in general preferable to Gray labeling.

5. Simulations

For the decode-forward components, we use the DVB-S2 LDPC codes. For the compress-forward components, we use the polar codes designed for compress-forward by Blasco-Serrano [24,25]. The optimal code rate of each level is obtained via an exhaustive search to maximize the rate. The block length of the component codes is n = 64 k . Both the relay and destination nodes used belief propagation decoding at each level where the maximum number of iterations is set to 50.
For simplicity of notation, in the following, we use P ( x ) to denote P X ( x ) . While decoding level i of the signal X 1 at the relay, the relay knows two parts of X 1 already. The first is the source assistance to the relay and the second is the output of the preceding decoders at the relay, assuming correct decoding. Therefore, the log-likelihood ratio (LLR) of level i at the relay is
L L R r = log P ( y 2 | c k , b i 1 , 0 ) P ( y 2 | c k , b i 1 , 1 ) ,
where
P ( y 2 | c ^ , b i 1 , b i ) = 1 P ( c ^ , b i 1 , b i ) b i + 1 m P ( y 2 | c ^ , b ^ ) .
The relay removes the effect of W d ( t 1 ) and W d ( t ) from Y 2 by first encoding them and removing their effect from X 1 .
The decoding at the destination node is performed as follows: after the last transmission block, the destination decodes the decode-forward signal from the relay and then decode the signal from the source node. The LLR of level i of the relay at the destination node is
L L R R D = log P ( y 3 | c i 1 , 0 ) P ( y 3 | c i 1 , 1 ) ,
where
P ( y 3 | c i 1 , c i ) = 1 P ( c i 1 , c i ) b m , c i + 1 m P ( y 3 | b m , c m ) .
The next step is to decode the signal from the source given the transmitted signal from the relay with
L L R S D = log P ( y 3 | c m , b i 1 , 0 ) P ( y 3 | c m , b i 1 , 1 ) ,
where
P ( y 3 | c m , b i 1 , b i ) = 1 P ( c m , b i 1 , b i ) b i + 1 m P ( y 3 | b m , c m ) .
In each of the error plots, a capacity threshold is marked that corresponds to the relay DCF constellation constrained capacity. The source and relay powers are identical throughout all simulations, enabling the use of a single scale for power (dB) in the error curves.
Figure 9 shows the bit error probability and frame error probability for a 16-QAM source and QPSK relay. The figure compares the performance of DCF under different labelings. The system model is the same as the one considered in Figure 7 where the source, relay and destination are all on one line. The distance between the source and relay is 0.8 , the distance between the relay and destination is 0.2 and the distance between the source and destination is 1. The path-loss coefficient is α = 2 .
The total transmission rate is 2.2 bits/s/Hz. The four levels of the source operate as follows: the most significant bit transmits the same information of the most significant bit of the relay to provide a beamforming gain to the relay-destination transmission. The following two levels at the source transmit new information to be decodable at the relay while the last level transmits a compress-forward component.
Figure 10 shows the bit error probability and frame error probability for a 16-QAM source and QPSK relay. The model that is considered this time is given by the channel gains, more specifically, H 12 = 1 , H 23 = 100 and H 13 = 1 . This figure compares the proposed DCF with DF and CF. The rate is 2 bits/s/Hz. The figure shows that DCF outperforms DF and CF.

6. Conclusions

This work studies the decode-compress-forward protocol, highlighting scenarios where it exceeds the rates available via decode-forward and compress-forward in the constellation constrained full-duplex relay channel. Furthermore, this work presents a multilevel coding strategy for the decode-compress-forward protocol. The proposed multilevel coding was shown to approach the rates achieved by decode-compress-forward in the constellation constrained AWGN full-duplex relay channel.

Acknowledgments

This work was supported in part by the grant CIF1219065 and ECCS1546969 from the National Science Foundation.

Author Contributions

Aria Nosratinia conceived the multilevel approach to multi-node coded modulation and contributed to mathematical formulation and proofs. Ahmed Attia Abotabl contributed to mathematical formulation, proofs, and simulations.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Van Der Meulen, E.C. Three-terminal communication channels. Adv. Appl. Probab. 1971, 3, 120–154. [Google Scholar] [CrossRef]
  2. Cover, T.; Gamal, A. Capacity theorems for the relay channel. IEEE Trans. Inf. Theory 1979, 25, 572–584. [Google Scholar] [CrossRef]
  3. Kramer, G.; Marić, I.; Yates, R.D. Cooperative communications. Found. Trends Netw. 2007, 1, 271–425. [Google Scholar] [CrossRef]
  4. Kramer, G.; Gastpar, M.; Gupta, P. Cooperative Strategies and Capacity Theorems for Relay Networks. IEEE Trans. Inf. Theory 2005, 51, 3037–3063. [Google Scholar] [CrossRef]
  5. Laneman, J.N. Cooperative Diversity in Wireless Networks: Algorithms and Architectures. Ph.D. Thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, 2002. [Google Scholar]
  6. Lee, S.H.; Chung, S.Y. When is compress-and-forward optimal? In Proceedings of the Information Theory and Applications Workshop (ITA), San Diego, CA, USA, 31 January–5 February 2010; pp. 1–3. [Google Scholar]
  7. Bao, X.; Li, J. Efficient Message Relaying for Wireless User Cooperation: Decode-Amplify-Forward (DAF) and Hybrid DAF and Coded-Cooperation. IEEE Trans. Wirel. Commun. 2007, 6, 3975–3984. [Google Scholar] [CrossRef]
  8. Haghighat, J.; Hamouda, W. Decode-Compress-and-Forward with Selective-Cooperation for Relay Networks. IEEE Commun. Lett. 2012, 16, 378–381. [Google Scholar] [CrossRef]
  9. Chong, H.F.; Motani, M.; Garg, H.K. Generalized Backward Decoding Strategies for the Relay Channel. IEEE Trans. Inf. Theory 2007, 53, 394–401. [Google Scholar] [CrossRef]
  10. Imai, H.; Hirakawa, S. A new multilevel coding method using error-correcting codes. IEEE Trans. Inf. Theory 1977, 23, 371–377. [Google Scholar] [CrossRef]
  11. Wachsmann, U.; Fischer, R.F.H.; Huber, J. Multilevel codes: Theoretical concepts and practical design rules. IEEE Trans. Inf. Theory 1999, 45, 1361–1391. [Google Scholar] [CrossRef]
  12. Huber, J.; Wachsmann, U. Capacities of equivalent channels in multilevel coding schemes. Electron. Lett. 1994, 30, 557–558. [Google Scholar] [CrossRef]
  13. Huber, J.; Wachsmann, U. Design of multilevel codes. In Proceedings of the IEEE Information Theory Workshop (ITW), Rydzyna, Poland, 25–29 June 1995. [Google Scholar]
  14. Duan, L.; Rimoldi, B.; Urbanke, R. Approaching the AWGN channel capacity without active shaping. In Proceedings of the IEEE International Symposium on Information Theory ISIT, Ulm, Germany, 29 June–4 July 1997; p. 374. [Google Scholar]
  15. Lampe, L.H.J.; Fischer, R.F.H.; Schober, R. Multilevel coding for multiple-antenna transmission. IEEE Int. Symp. Inf. Theory 2002, 3, 203–208. [Google Scholar]
  16. Yeung, R. Multilevel diversity coding with distortion. IEEE Trans. Inf. Theory 1995, 41, 412–422. [Google Scholar] [CrossRef]
  17. Roche, J.; Yeung, R.; Hau, K.P. Symmetrical multilevel diversity coding. IEEE Trans. Inf. Theory 1997, 43, 1059–1064. [Google Scholar] [CrossRef]
  18. Mohajer, S.; Tian, C.; Diggavi, S. Asymmetric Multilevel Diversity Coding and Asymmetric Gaussian Multiple Descriptions. IEEE Trans. Inf. Theory 2010, 56, 4367–4387. [Google Scholar] [CrossRef]
  19. Jiang, J.; Marukala, N.; Liu, T. Symmetrical Multilevel Diversity Coding and Subset Entropy Inequalities. IEEE Trans. Inf. Theory 2014, 60, 84–103. [Google Scholar] [CrossRef]
  20. Abdel-Ghaffar, K.; Hassner, M. Multilevel error-control codes for data storage channels. IEEE Trans. Inf. Theory 1991, 37, 735–741. [Google Scholar] [CrossRef]
  21. Hern, B.; Narayanan, K. Multilevel Coding Schemes for Compute-and-Forward With Flexible Decoding. IEEE Trans. Inf. Theory 2013, 59, 7613–7631. [Google Scholar] [CrossRef]
  22. Chen, Z.; Xia, B.; Hu, Z.; Liu, H. Design and Analysis of Multi-Level Physical-Layer Network Coding for Gaussian Two-Way Relay Channels. IEEE Trans. Commun. 2014, 62, 1803–1817. [Google Scholar] [CrossRef]
  23. Morello, A.; Mignone, V. DVB-S2: The second generation standard for satellite broad-band services. Proc. IEEE 2006, 94, 210–227. [Google Scholar] [CrossRef]
  24. Blasco-Serrano, R. Coding Strategies for Compress-and-Forward Relaying. Ph.D. Thesis, Kungliga Tekniska Högskolan (KTH), Stockholm, Sweden, 2010. [Google Scholar]
  25. Blasco-Serrano, R.; Thobaben, R.; Rathi, V.; Skoglund, M. Polar codes for compress-and-forward in binary relay channels. In Proceedings of the Forty Fourth Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, 7–10 November 2010; pp. 1743–1747. [Google Scholar]
  26. Gamal, A.E.; Kim, Y. Network Information Theory; Cambridge University Press: Cambridge, UK, 2012. [Google Scholar]
  27. Duarte, M. Full-Duplex Wireless: Design, Implementation and Characterization. Ph.D. Thesis, Rice University, Houston, TX, USA, 2012. [Google Scholar]
  28. Shende, N.; Gurbuz, O.; Erkip, E. Half-duplex or full-duplex relaying: A capacity analysis under self-interference. In Proceedings of the 47th Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, USA, 20–22 March 2013; pp. 1–6. [Google Scholar]
  29. Ahmed, E.; Eltawil, A.M. All-Digital Self-Interference Cancellation Technique for Full-Duplex Systems. IEEE Trans. Wirel. Commun. 2015, 14, 3519–3532. [Google Scholar] [CrossRef]
  30. Alexandris, K.; Balatsoukas-Stimming, A.; Burg, A. Measurement-based characterization of residual self-interference on a full-duplex MIMO testbed. In Proceedings of the IEEE 8th Sensor Array and Multichannel Signal Processing Workshop (SAM), A Coruna, Spain, 22–25 June 2014; pp. 329–332. [Google Scholar]
  31. Mahmood, N.H.; Ansari, I.S.; Berardinelli, G.; Mogensen, P.; Qaraqe, K.A. Analysing self interference cancellation in full duplex radios. In Proceedings of the IEEE Wireless Communications and Networking Conference, Doha, Qatar, 3–6 April 2016; pp. 1–6. [Google Scholar]
  32. Ingber, A.; Feder, M. On the optimality of multilevel coding and multistage decoding. In Proceedings of the IEEE 25th Convention of Electrical and Electronics Engineers in Israel, Eilat, Israel, 3–5 December 2008; pp. 731–735. [Google Scholar]
  33. Mheich, Z.; Alberge, F.; Duhamel, P. Achievable rates optimization for broadcast channels using finite size constellations under transmission constraints. EURASIP J. Wirel. Commun. Netw. 2013, 2013, 1–15. [Google Scholar] [CrossRef] [Green Version]
  34. Abotabl, A.A.; Nosratinia, A. Broadcast Coded Modulation: Multilevel and Bit-Interleaved Construction. IEEE Trans. Commun. 2017, 65, 969–980. [Google Scholar] [CrossRef]
  35. Ungerboeck, G. Channel coding with multilevel/phase signals. IEEE Trans. Inf. Theory 1982, 28, 55–67. [Google Scholar] [CrossRef]
  36. Blahut, R. Computation of channel capacity and rate-distortion functions. IEEE Trans. Inf. Theory 1972, 18, 460–473. [Google Scholar] [CrossRef]
  37. Arimoto, S. An algorithm for computing the capacity of arbitrary discrete memoryless channels. IEEE Trans. Inf. Theory 1972, 18, 14–20. [Google Scholar] [CrossRef]
Figure 1. Full-Duplex relay channel.
Figure 1. Full-Duplex relay channel.
Entropy 19 00611 g001
Figure 2. MLC and multi-stage decoding in the point to point channel.
Figure 2. MLC and multi-stage decoding in the point to point channel.
Entropy 19 00611 g002
Figure 3. Decode-Compress-Forward transmission over four transmission blocks.
Figure 3. Decode-Compress-Forward transmission over four transmission blocks.
Entropy 19 00611 g003
Figure 4. Decode-compress-forward transmission for the AWGN full-duplex relay channel over four blocks.
Figure 4. Decode-compress-forward transmission for the AWGN full-duplex relay channel over four blocks.
Entropy 19 00611 g004
Figure 5. The achievable rate of different transmission techniques in the AWGN full-duplex relay channel.
Figure 5. The achievable rate of different transmission techniques in the AWGN full-duplex relay channel.
Entropy 19 00611 g005
Figure 6. The constellation constrained capacity of several constellations in the point-to-point AWGN channel compared with the Gaussian input capacity.
Figure 6. The constellation constrained capacity of several constellations in the point-to-point AWGN channel compared with the Gaussian input capacity.
Entropy 19 00611 g006
Figure 7. The achievable rate of different transmission techniques in the AWGN relay channel under a constrained constellation of 16-PAM at the source and 4-PAM at the relay.
Figure 7. The achievable rate of different transmission techniques in the AWGN relay channel under a constrained constellation of 16-PAM at the source and 4-PAM at the relay.
Entropy 19 00611 g007
Figure 8. Multilevel coding for full-duplex decode-compress-forward relay.
Figure 8. Multilevel coding for full-duplex decode-compress-forward relay.
Entropy 19 00611 g008
Figure 9. Performance of multilevel superposition for 8-PAM constellation when the relay is located at d = 2.5 .
Figure 9. Performance of multilevel superposition for 8-PAM constellation when the relay is located at d = 2.5 .
Entropy 19 00611 g009
Figure 10. Performance of multilevel DCF vs. DF, CF, and no-relay.
Figure 10. Performance of multilevel DCF vs. DF, CF, and no-relay.
Entropy 19 00611 g010
Table 1. The achievable rate of different strategies in the relay channel under different values of channel coefficients.
Table 1. The achievable rate of different strategies in the relay channel under different values of channel coefficients.
H 12 H 23 H 13 R No Relay R DF R CF R DCF Upper Bound
11001 1.7 1.7 1.9 2.1 2.19
11002 2.19 1.7 2.3 2.45 2.47

Share and Cite

MDPI and ACS Style

Abotabl, A.A.; Nosratinia, A. Multilevel Coding for the Full-Duplex Decode-Compress-Forward Relay Channel. Entropy 2017, 19, 611. https://doi.org/10.3390/e19110611

AMA Style

Abotabl AA, Nosratinia A. Multilevel Coding for the Full-Duplex Decode-Compress-Forward Relay Channel. Entropy. 2017; 19(11):611. https://doi.org/10.3390/e19110611

Chicago/Turabian Style

Abotabl, Ahmed Attia, and Aria Nosratinia. 2017. "Multilevel Coding for the Full-Duplex Decode-Compress-Forward Relay Channel" Entropy 19, no. 11: 611. https://doi.org/10.3390/e19110611

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop