• Sonuç bulunamadı

Reliable Two-Path Successive Relaying

N/A
N/A
Protected

Academic year: 2021

Share "Reliable Two-Path Successive Relaying"

Copied!
5
0
0

Yükleniyor.... (view fulltext now)

Tam metin

(1)

Reliable Two-Path Successive Relaying

Ertu˘grul Bas¸ar

, ¨ Umit Ayg¨ol¨u

, Erdal Panayırcı

and H. Vincent Poor

Istanbul Technical University, Faculty of Electrical and Electronics Engineering, 34469, Maslak, Istanbul, Turkey.

Kadir Has University, Department of Electronics Engineering, 34083, Cibali, Istanbul, Turkey.

Department of Electrical Engineering, Princeton University, Princeton, NJ, 08544, USA.

Email: basarer@itu.edu.tr, aygolu@itu.edu.tr, eepanay@khas.edu.tr, poor@princeton.edu

Abstract—Emerging two-path successive relaying protocols

generally rely on error-free source-relay channels and/or interference-free inter-relay channels to achieve high-rate and full-diversity. In this paper, by removing these optimistic assump- tions, a novel two-path successive relaying scheme that benefits from relay selection and distributed space-time block coding (STBC), and transfers the data from the source to the destination via relays in a reliable fashion is proposed. The proposed scheme can achieve full diversity without the requirement of perfect decoding at relays since not only the destination but also the relays benefit from distributed STBC and relay selection. As the target STBC, coordinate interleaved orthogonal design (CIOD) for two transmit antennas is considered. The average symbol error probability of the proposed scheme is derived and its error performance is compared with reference systems.

I. I

NTRODUCTION

Two-path successive relaying has emerged recently as a promising cooperative transmission strategy since it provides significant bandwidth efficiency improvements over the clas- sical relaying methods [1]. Two-path successive relaying has been realized by exploiting distributed space-time block codes (STBC) [2], which create a virtual multi antenna scheme for STBC transmission. An effective distributed STBC for two- path relaying has been proposed in [3] which provides full-rate and full-diversity; however, this code does not permit single symbol detection, which makes its implementation difficult and costly. More recently, a new distributed STBC, which uses the coordinate interleaved orthogonal design (CIOD) [4], has been proposed for two-path relaying [5]. This scheme provides single symbol decoding and achieves better error performance than the scheme of [3] and provides full-diversity when i) the relays perfectly decode and forward the signals transmitted from the source, and ii) the channel between relays is not affected by fading; however, these are extremely optimistic as- sumptions which cannot hold for practical wireless networks.

In this paper, by removing these two assumptions, we propose a novel two-path successive relaying scheme which can reliably transfer the data from the source to the destination via relays under realistic network conditions. The main con- tributions of this work are as follows: 1) It is shown that full- diversity can be achieved with the proposed protocol at both relay nodes and the destination without any assumptions. This is accomplished by implementing distributed CIOD signaling at the destination and at one of the relays, while the other relay benefits from relay selection; 2) The average symbol error probability (ASEP) of the proposed scheme is evaluated analytically for M -ary quadrature amplitude modulation (M - QAM). Taking into account the error propagation, it is shown

that analytical and computer simulation results match very well; 3) It is shown that for realistic network conditions, the proposed scheme achieves significantly better bit error rate (BER) performance than its counterparts given in the literature.

II. S

YSTEM

M

ODEL AND

T

HE

N

EW

S

CHEME

We consider a relay network with a single source node S, two relay nodes R

1

and R

2

and a destination node D. Each node has a single antenna and operates in half-duplex mode.

We assume that there is no direct transmission from S to D. h

SRi

and h

RiD

, i = 1, 2, represent the wireless channel fading coefficients between S and relays, and relays and D, respectively, while the inter-relay channel h

R

is reciprocal. We assume that the real and imaginary parts of h

SRi

, h

RiD

and h

R

follow the N (0, 1/2) distribution, and h

RiD

, i = 1, 2, are known at D, while h

SRi

and h

R

are known at the relays. The variance of the zero-mean complex Gaussian noise samples n

R1

(t), n

R2

(t) and n

D

(t) at relays and D is assumed to be N

0

, where t (t = 1, 2, 3) represents time slots.

The proposed scheme is based on CIOD transmission with two transmit antennas which may be presented by either of the following 2 × 2 transmission matrices [4]:

 s

R1

+ js

I2

0 0 s

R2

+ js

I1



(1)

 s

R2

+ js

I1

0 0 s

R1

+ js

I2



(2) where columns and rows correspond to time slots and transmit antennas, respectively, and s

1

and s

2

are two complex infor- mation symbols drawn from a rotated M -QAM constellation.

Assuming that a square M -QAM constellation with signal points s = s

R

+js

I

where s

R

, s

I

∈ 

±1, ±3, . . . , ± √ M −1  is rotated by an angle θ, the rotated signal constellation symbols are denoted by s

θ

= se

= s

Rθ

+ js

Iθ

whose real and imaginary components s

Rθ

and s

Iθ

take M distinct values from the set 

s

R

cos θ − s

I

sin θ 

, where θ = 31.7

is the optimal rotation angle for square M -QAM [4]. Consequently, for a given s

Rθ



s

Iθ

 , s

Iθ



s

Rθ



can be determined uniquely. As an example, for 4-QAM, the rotated symbols with distinct real and imaginary parts are s

θ

∈ {(−1.376 + j0.325), (−0.325 − j1.376), (0.325 + j1.376), (1.376 − j0.325)}, and if s

Rθ

=

−1.376 is given for this constellation, we know that s

Iθ

=

Notation: For a complex variables = sR+ jsI,sRandsI denote the real and imaginary parts ofs, where j =√

−1. X ∼ N μX, σ2X

denotes the Gaussian distribution of a real r.v.X with mean μX and varianceσ2X. 2013 IEEE 24th International Symposium on Personal, Indoor and Mobile Radio Communications: Fundamentals and PHY

Track

(2)

5 ,

V MV

5 ,

V MV

 

5 ,

V MV

 

5 ,

V MV

5 ,

V MV









W  









W 









W 

ܵ ܦ

ܴ

ܴ

ܵ ܦ

ܴ

ܴ

ܵ ܦ

ܴ

ܴ

Fig. 1. Three Phase Successive Relaying with StrongerS−R1Channel

5 ,

V MV

5 ,

V MV

 

5 ,

V MV

5 ,

V MV

5 ,

V MV









W   









W 









W  ܦ

ܵ

ܴ

ܴ

ܦ

ܵ

ܴ

ܴ

ܦ

ܵ

ܴ

ܴ

Fig. 2. Three Phase Successive Relaying with StrongerS−R2Channel

0.325. Constellation rotation is required for CIODs to achieve full-diversity, while in our scheme it is also required to identify symbols from their real or imaginary parts.

In the proposed protocol given in Figs. 1-2, within every consecutive three time slots, two information symbols s

1

and s

2

drawn from a rotated M -QAM constellation are transmitted from S as follows: In the first time slot, S processes s

1

and s

2

, and transmits the coordinate interleaved symbol s

R1

+ js

I2

to R

1

and R

2

. If the S − R

1

channel is stronger than the S − R

2

channel, R

1

decodes s

R1

and s

I2

first, i.e., it obtains s

1

and s

2

since each symbol can be identified from its real or imaginary part only, which take distinct values after the constellation rotation. Then R

1

forms and transmits the coordinate interleaved symbol s

R2

+ js

I1

to R

2

and D in the second time slot. As seen from (1), distributed CIOD signaling is achieved for R

2

after two time slots. In the third time slot, after detecting s

1

and s

2

, R

2

transmits s

R1

+js

I2

to D to create the virtual multiple-input single-output (MISO) system using the CIOD matrix given in (2) for D. As seen from Fig. 2, similar procedures can be applied when the S−R

2

channel is stronger than the S −R

1

channel. Note that a virtual MISO system is created for both D and one of the relays, while the other relay benefits from relay selection. Therefore, the overall diversity order of the system becomes two since not only D, but also R

1

and R

2

achieve a diversity order of two. On the other hand, the transmission rate of the proposed scheme is 2/3 symbols per channel use since only two information symbols are transmitted in three time slots.

III. S

YMBOL

E

RROR

P

ROBABILITY

(SEP) A

NALYSIS OF THE

P

ROPOSED

S

CHEME

In this section, we evaluate the ASEP of the proposed scheme for general M -QAM. Without loss of generality, we can analyze the error performance of the signaling scheme given in Fig. 1 where the S−R

1

channel is stronger than the S−R

2

channel since the ASEP is the same for both cases. The average destination SEP of the scheme given in Fig. 1 can be expressed as P

D

=

M1



s



ˆs

P

D

(s → ˆs) for s = ˆs where P

D

(s → ˆs) stands for the pairwise error probability (PEP) at the destination associated with detection of symbol ˆs given that symbol s is transmitted.

Destination PEP P

D

(s → ˆs) can be expressed as the sum of four probabilities related to the error events at the relays as P

D

(s → ˆs) = P

1

+ P

2

+ P

3

+ P

4

where

P1=PRc1(s) PRc2(s | Rc1) PD(s → ˆs | Rc1, Rc2) P2=

¯

s,¯s=sPRc1(s) PRe2(s → ¯s | Rc1) PD(s → ˆs | Rc1, Re2) P3=

˜

s,˜s=sPRe1(s → ˜s) PRc2(s | Re1) PD(s → ˆs | Re1, Rc2) P4=

˜ s,˜s=s



¯ s,¯s=s

PRe1(s→ ˜s) PRe2(s→ ¯s | Re1) PD(s→ ˆs | Re1, Re2)

in which P

Rc1

(s) is the probability of correct detection of s at R

1

, P

Rc2

(s | R

c1

) is the correct detection probability of s at R

2

conditioned on correct detection at R

1

, P

D

(s → ˆs | R

c1

, R

c2

) is the PEP at the destination conditioned on the correct detection of s at both relays, P

Re2

(s → ¯s | R

c1

) is the PEP at R

2

conditioned on the correct detection of s at R

1

, P

D

(s → ˆs | R

c1

, R

e2

) is the PEP at the destination conditioned on correct detection of s at R

1

and erroneous detection of s to ¯s at R

2

, P

Re1

(s → ˜s) is the PEP at R

1

, P

Rc2

(s | R

e1

) is the probability of correct detection of s at R

2

conditioned on the erroneous detection of s to ˜ s at R

1

, P

D

(s → ˆs | R

e1

, R

c2

) is the PEP at the destination conditioned on correct detection of s at R

2

and erroneous detection of s to ˜ s at R

1

, P

Re2

(s → ¯s | R

e1

) is the PEP at R

2

conditioned on the erroneous detection of s to ˜s at R

1

, P

D

(s → ˆs | R

1e

, R

2e

) is the PEP at the destination conditioned on the erroneous detection of s at both relays.

Our analyses show that the ASEP at the destination is dominated by the case in which ˜s = ¯s = ˆs, i.e., for the case where successive identical erroneous detections occur in the relaying scheme. Therefore we obtain the following:

P

2

∼ = P

Rc1

(s) P

Re2

(s → ˆs | R

c1

) P

D

(s → ˆs | R

c1

, R

e2

) P

3

∼ = P

Re1

(s → ˆs) P

Rc2

(s | R

e1

) P

D

(s → ˆs | R

e1

, R

c2

) P

4

∼ = P

Re1

(s → ˆs) P

Re2

(s → ˆs | R

e1

) P

D

(s → ˆs | R

e1

, R

e2

) Our analyses also show that the ASEP at the destination is mainly dominated by P

1

, P

2

and P

4

, and the effect of P

3

can be ignored. This can be explained by the fact that P

Rc2

(s | R

e1

)  P

Re2

(s → ˆs | R

1e

) while P

D

(s → ˆs | R

e1

, R

c2

) ∼ P

D

(s → ˆs | R

e1

, R

e2

). As we will show in the sequel, independent of the SNR, the probability of symbol error increases dramatically at R

2

when R

1

makes a decision error. Therefore, the probability P

Rc2

(s | R

e1

) can be neglected when compared to P

Re2

(s → ˆs | R

e1

), and we can assume P

3

 P

4

. Therefore the ASEP can be rewritten as the sum of the three terms as

P

D

(s → ˆs) ∼ = P

Rc1

(s) P

Rc2

(s | R

c1

) P

D

(s → ˆs | R

1c

, R

2c

) + P

Rc1

(s) P

Re2

(s → ˆs | R

c1

) P

D

(s → ˆs | R

c1

, R

e2

)

+ P

Re1

(s → ˆs) P

Re2

(s → ˆs | R

e1

) P

D

(s → ˆs | R

1e

, R

2e

). (3) In order to obtain the ASEP, we calculated (3) for s = s

1

. The derivation of each term in (3) is quite lengthy. In Appendices A, B and C, the details of the derivations are given for the terms related with R

1



P

Rc1

(s) , P

Re1

(s → ˆs)  , R

2

 P

Rc2

(s | R

c1

) , P

Re2

(s → ˆs | R

c1

) , P

Re2

(s → ˆs | R

e1

) 

and D

(P

D

(s→ ˆs|R

c1

, R

c2

) , P

D

(s→ ˆs|R

c1

, R

e2

) , P

D

(s→ ˆs|R

e1

, R

e2

)),

respectively.

(3)

          

í

í

í

í

í

í





(E1 G%

$6(36(5

í4$07KHRUHWLFDO

í4$06LPXODWLRQ

í4$07KHRUHWLFDO

í4$06LPXODWLRQ

í4$07KHRUHWLFDO

í4$06LPXODWLRQ

Fig. 3. Theoretical performance curves for the new scheme

IV. N

UMERICAL

R

ESULTS

In this section, we present numerical results based on the above analytical expressions as well as Monte Carlo simulation results for quasi-static uncorrelated Rayleigh fading channels.

In Fig. 3, we show the theoretical ASEP curves and com- puter simulation results for the proposed scheme using 4- QAM, 16-QAM and 64-QAM modulation schemes. As seen from Fig. 3, with increasing SNR, the theoretical curves become extremely tight with the computer simulation curves, and therefore support our analytical results.

In Fig. 4, we compare the bit error rate performance of the proposed scheme with the scheme of [5] and the classical CIOD (i.e., the scheme of [5] with error-free relays) which provides a performance benchmark. We employ 4-QAM mod- ulation for all systems. For the new scheme and the scheme of [5], we consider realistic network conditions in which relays can make erroneous detections. As seen from Fig. 4, without perfect decoding at relays, the scheme of [5] cannot achieve full diversity while the proposed scheme does. We also observe from Fig. 4 that the reference distributed CIOD with error-free relays and the proposed scheme achieve the same diversity order; however, the difference in the error performance can be explained by the additional errors at the relays which increase the overall ASEP at the destination of the proposed scheme.

V. C

ONCLUSION

A novel reliable two-path successive relaying protocol has been proposed and its error performance has been investigated comprehensively. It has been shown that by the achievement of full-diversity at all of the nodes of the network, it is possible to transfer data from the source to the destination via relays in a reliable manner.

A

PPENDIX

A

CALCULATION OFPROBABILITIESRELATED TOR1

PRc1(s) , PRe1(s → ˆs)

As we mentioned earlier, we consider the case in which the S −R

1

channel is stronger than the S −R

2

channel, i.e., h

1

>

         

í

í

í

í

í

í



(E1 G%

%(5

6FKHPHRI>@

UHIHUHQFH&,2' SURSRVHGVFKHPH

Fig. 4. Performance of the new scheme, the CIOD and the scheme of [5]

h

2

, where h

1

= |h

SR1

|

2

and h

2

= |h

SR2

|

2

. On analyzing the order statistics we obtain f

h1

(h

1

) = 2 

1 − e

−h1



e

−h1

, h

1

>

0 and f

h2

(h

2

) = 2e

−2h2

, h

2

> 0 [6].

i) P

Rc1

(s

1

) : The received signal at R

1

for t = 1 is given as r

R1

(1) = h

SR1

 s

R1

+ js

I2



+ n

R1

(1). Thanks to coordinate interleaving, for the independent detection of s

R1

, R

1

obtains y

R1

= h

RSR1

r

RR1

(1) + h

ISR1

r

IR1

(1) = h

1

s

R1

+ w

R1

(4) where w

R1

 h

RSR1

n

RR1

(1) + h

ISR1

n

IR1

(1). Therefore, the detection problem of s

R1

becomes the detection of a modified M -PAM signal subject to fading. Let us denote the possible values of s

R1

in ascending order as a

1

, a

2

, . . . , a

M

. Consider- ing the transmission model given in (4), we have M decision intervals separated by the threshold values (normalized by h

1

) λ

1

, λ

2

, . . . , λ

M−1

. As an example for 4-QAM, we have λ

1

= − cos θ, λ

2

= 0 and λ

3

= cos θ. Considering that w

R1

in (4) is distributed as N (0, ψ

2

), where ψ

2

= σ

2

h

1

and σ

2

= N

0

/2, the correct detection probability for a

i

, i = 1, . . . , M , conditioned on h

1

can be written as

P

Rc1

(a

i

)

h

1

=

b

a

f

yR1

(y

R1

| a

i

, h

1

) dy

R1

where a = −∞, b = h

1

λ

1

and a = h

1

λ

i−1

, b = h

1

λ

i

for i = 1, M and 2 ≤ i ≤ M − 1, respectively, and conditioned on a

i

and h

1

, y

R1

follows the N 

h

1

a

i

, ψ

2



distribution for all i. Simple manipulation gives

P

Rc1

(a

i

)

h1

=

⎧ ⎨

1 − Q 

h

11−a1) ψ



, i = 1, i = M 1 − Q 

h

1(ai−λi−1) ψ

 − Q 

h

1i−ai) ψ

 , o.w.

Using the alternative form of the Q-function Q (x) = 1

π

π/2

0

exp



− x

2

2 sin

2

θ



dθ (5)

and considering the moment generating function (m.g.f.) of h

1

given as M

h1

(s) = 2/ 

2 − 3s + s

2



, the unconditional

(4)

correct detection probability for a

i

is obtained as follows:

P

Rc1

(a

i

)=

⎧ ⎨

⎩ 1−q 

1−a1)2 N0



, i = 1, i = M

1−q 

(a

i−λi−1)2 N0

 −q 

i−ai)2 N0



, 2 ≤ i ≤ M −1 where

q (x)  1 π

π/2

0

M

h1

 −x sin

2

θ

 dθ = 1

2



1− 2

 1 +

1x

+ 1

 1 +

x2

 . (6) ii) P

Re1

(s

1

→ ˆs

1

): For the signaling scheme of (4), by the integration of the conditional p.d.f. of y

R1

over the decision intervals mentioned above, the exact conditional PEP (CPEP) can be written in general form as

P

Re1

(a

i

→ a

j

)

h1

=

b

a

f

yR1

(y

R1

| a

i

, h

1

) dy

R1

(7) where (a, b) pairs are given by (−∞, h

1

λ

1

), (h

1

λ

j−1

, h

1

λ

j

) and (h

1

λ

M−1

, ∞) for j = 1, 2 ≤ j ≤ M − 1 and j = M , respectively for 1 ≤ i ≤ M. Using (5), M

h1

(s) and (6), the unconditional PEP (UPEP) is derived as follows (for i = 1, . . . , M, j = i):

P

Re1

(a

i

→ a

j

) =

⎧ ⎪

⎪ ⎪

⎪ ⎪

⎪ ⎩ q



(ai−λ1)2 N0



, j = 1

q 

j−1−ai)2 N0

 − q 

j−ai)2 N0

 , o.w.

q 

M−1−ai)2 N0



, j = M.

Since the coordinate interleaving technique allows us to dis- tinguish symbols from only their real (or imaginary) parts, P

Rc1

(a

i

) = P

Rc1

(s

1

) and P

Re1

(a

i

→ a

j

) = P

Re1

(s

1

→ ˆs

1

), for s

1

= ˆs

1

.

A

PPENDIX

B

CALCULATION OFPROBABILITIESRELATED TOR2

PRc2(s | Rc1) , PRe2(s → ˆs | Rc1) , PRe2(s → ˆs | Re1)

i) P

Re2

(s

1

→ ˆs

1

| R

e1

): Assuming that s

1

= s

R1

+ js

I1

has been erroneously detected at R

1

as ˜s

1

= ˜s

R1

+j˜s

I1

, the received signals at R

2

at the first two time slots can be written as

 r

R2

(1) r

R2

(2)



=

 s

R1

+ js

I2

0 0 s

R2

+ j˜s

I1

  h

SR2

h

R

 +

 n

R2

(1) n

R2

(2)

 . R

2

applies CIOD detection procedures to decode s

1

and s

2

by combining the received signals as γ

R2

= α

RR2

+ jβ

RI2

and δ

R2

= β

RR2

+ jα

IR2

where α

R2

= h

SR2

r

R2

(1) and β

R2

= h

R

r

R2

(2). Then, the maximum likelihood (ML) decision rules for s

1

and s

2

are given as follows [4]:

ˆs

i

=arg min

si

{m

R2

(s

i

)} , i = 1, 2, where m

R2

(s

1

) = h

3



γ

RR2

− h

2

s

R1



2

+ h

2



γ

RI2

− h

3

s

I1



2

m

R2

(s

2

) = h

2



δ

RR2

− h

3

s

R2



2

+ h

3



δ

RI2

− h

2

s

I2



2

with h

2

 |h

SR2

|

2

and h

3

 |h

R

|

2

. The CPEP of detecting ˆs

1

when s

1

is transmitted can be given as

P

Re2

(s

1

→ ˆs

1

| R

e1

)

h2,h3

= P (m

R2

(ˆs

1

) < m

R2

(s

1

)) . (8) Considering γ

R2

= h

2

s

R1

+jh

3

˜s

I1

+w

RR2

(1)+jw

RI2

(2), where w

R2

(1) = h

SR2

n

R2

(1) and w

R2

(2) = h

R

n

R2

(2), we obtain

P

Re2

(s

1

→ ˆs

1

| R

e1

)

h2,h3

= P 

h

3



h

2

Δ

1

+ w

RR2

(1) 

2

+ h

2



h

3

Δ

2

+ w

RI2

(2) 

2

< h

3



w

RR2

(1) 

2

+ h

2



h

3

Δ

3

+ w

IR2

(2) 

2

 (9) where Δ

1

 s

R1

− ˆs

R1

, Δ

2

 ˜s

I1

− ˆs

I1

and Δ

3

 ˜s

I1

− s

I1

. After manipulation, we arrive at

P

Re2

(s

1

→ ˆs

1

| R

e1

)

h

2,h3

= P (A < 0) (10) where A ∼ N 

μ

A

, σ

A2



, μ

A

= h

2

h

3



h

2

Δ

21

+h

3



Δ

22

−Δ

23



and σ

2A

= 4σ

2

h

22

h

23



h

2

Δ

21

+ h

3

2

− Δ

3

)

2



. From (10), the desired CPEP expression can be obtained as

P

Re2

(s

1

→ ˆs

1

| R

e1

)

h2,h3

=Q

⎝ h

2

Δ

21

+ h

3



Δ

22

− Δ

23

 2σ 

h

2

Δ

21

+ h

3

2

− Δ

3

)

2

⎠.

(11) Let us define Φ

1

= s

R1

− ˆs

R1

and Φ

2

= s

I1

− ˆs

I1

. As we mentioned earlier, the average SEP at the destination is dominated by the case where ˜s

1

= ˆs

1

. For this case we have Δ

21

= Φ

21

, Δ

2

= 0 and Δ

3

= Φ

22

in (11), which gives

P

Re2

(s

1

→ ˆs

1

| R

e1

)

h

2,h3

=Q

 h

2

Φ

21

− h

3

Φ

22

2σ 

h

2

Φ

21

+ h

3

Φ

22

 . (12) Please note that (12) can take very large values when h

3

Φ

22

>

h

2

Φ

21

, which supports our assumption that P

Rc2

(s | R

e1

)  P

Re2

(s→ ˆs | R

e1

). Thus, we can approximate the UPEP for high SNR after tedious calculations as

P

Re2

(s

1

→ ˆs

1

| R

e1

) ≈ P 

h

2

Φ

21

< h

3

Φ

22

 = 2Φ

22

Φ

21

+ 2Φ

22

(13) which proves that the probability of error becomes very high at R

2

if R

1

forwards an erroneously detected signal.

ii) P

Re2

(s

1

→ ˆs

1

| R

c1

): With correct detection at R

1

, the CPEP of detection ˆs

1

when s

1

is transmitted can be obtained by setting ˜s

I1

= s

I1

in (11) 

Δ

22

= Φ

22

, Δ

3

= 0  as P

Re2

(s

1

→ ˆs

1

| R

c1

)

h

2,h3

= Q



h

2

Φ

21

+ h

3

Φ

22

2N

0

⎠ (14)

which is the CPEP of the classical CIOD. Let us define u = u

1

+ u

2

where u

1

 h

2

Φ

21

and u

2

 h

3

Φ

22

. Using (5) and defining M

u

(s) = E {e

su

}, the corresponding UPEP can be evaluated as follows:

P

Re2

(s

1

→ ˆs

1

| R

c1

) = 1 π

π/2 0

M

u

 −1

4N

0

sin

2

θ



dθ. (15) Considering f

u1

(u

1

) = 

2/Φ

21



e

−2u121

and f

u2

(u

2

) =

 1/Φ

22



e

−u222

the p.d.f. of u, which is the sum of two exponential r.v.’s, can be calculated by [6]

f

u

(u)=

u

0

f

u2

(u

2

) f

u1

(u − u

2

) du

2

= 2 

e

−2u/Φ21

− e

−u/Φ22

 (Φ

21

− 2Φ

22

) Then, the corresponding m.g.f. is evaluated as

M

u

(s) = 2

21

s − 2) (Φ

22

s − 1) . (16)

(5)

Combining (15) and (16), we obtain

P

Re2

(s

1

→ ˆs

1

| R

c1

) = Φ

21

(1 − ρ

1

) + 2Φ

22

(−1 + ρ

2

) 2 (Φ

21

− 2Φ

22

) (17) where ρ

1

 1/ 

1 + 8N

0

21

and ρ

2

 1/ 

1 + 4N

0

22

. iii)P

Rc2

(s

1

| R

c1

): The correct detection probability of s

1

at R

2

given that R

1

forwarded the correct s

1

component can be easily obtained by using (17) in the following union bound:

P

Rc2

(s

1

| R

c1

) ≤ 1 − 1 M



ˆs1,ˆs1=s1

P

Re2

(s

1

→ ˆs

1

| R

c1

) . (18) A

PPENDIX

C

CALCULATION OFPROBABILITIESRELATED TOD PD(s → ˆs | Rc1, Rc2) , PD(s → ˆs | Rc1, Re2) , PD(s → ˆs | Re1, Re2)

i) P

D

(s

1

→ ˆs

1

| R

1e

, R

2e

): Assuming that s

1

= s

R1

+ js

I1

has been erroneously detected as ˜s

1

= ˜s

R1

+ j˜s

I1

and ¯s

1

=

¯s

R1

+ j¯s

I1

at R

1

and R

2

, respectively, the received signals at the destination for t = 2 and 3 can be expressed as

 r

D

(3) r

D

(2)



=

 ¯s

R1

+ js

I2

0 0 s

R2

+ j˜s

I1

  h

R2D

h

R1D

 +

 n

D

(3) n

D

(2)

 . (19) According to the CIOD detection procedures, after processing and interleaving these signals as α

D

= h

R2D

r

D

(3), β

D

= h

R1D

r

D

(2) and γ

D

= α

RD

+ jβ

DI

, δ

D

= β

DR

+ jα

ID

, the receiver calculates the ML decision metrics as

ˆs

1

= arg min

s1

 h

4



γ

DR

− h

5

s

R1



2

+ h

5



γ

DI

− h

4

s

I1



2

ˆs

2

= arg min

s2

 h

5



δ

DR

− h

4

s

R2



2

+ h

4



δ

DI

− h

5

s

I2



2

where h

4

 |h

R1D

|

2

and h

5

 |h

R2D

|

2

. Considering γ

D

= h

5

¯s

R1

+ jh

4

˜s

I1

+ w

RD

(3) + jw

ID

(2) where w

D

(3) = h

R2D

n

D

(3) and w

D

(2) = h

R1D

n

D

(2), similar to (8), the CPEP can be calculated as

P

D

(s

1

→ ˆs

1

| R

e1

, R

e2

)

h

4,h5

= P 

h

4



h

5

Δ

4

+ w

RD

(3) 

2

+ h

5



h

4

Δ

2

+ w

ID

(2) 

2

< h

4



h

5

Δ

5

+ w

RD

(3) 

2

+ h

5



h

4

Δ

3

+ w

DI

(2) 

2

 (20) where Δ

2

and Δ

3

are defined in (9), and Δ

4

 ¯s

R1

− ˆs

R1

, Δ

5

 ¯s

R1

− s

R1

. After simple calculations, we obtain

PD(s1→ ˆs1| Re1, Re2)h

4,h5

= Q

⎝ h5

Δ24− Δ25 + h4

Δ22− Δ23 2σ

h54− Δ5)2+ h42− Δ3)2

⎠. (21)

As mentioned earlier, we assume that for the dominant case

¯s

R1

= ˆs

R1

and ˜s

I1

= ˆs

I1

, which gives Δ

2

= Δ

4

= 0 and Δ

25

= Φ

21

, Δ

23

= Φ

22

, and (21) simplifies to

P

D

(s

1

→ ˆs

1

| R

e1

, R

e2

)

h4,h5

= Q

⎝−



h

5

Φ

21

+ h

4

Φ

22

2N

0

= 1 − P

D

(s

1

→ ˆs

1

| R

c1

, R

c2

)

h

4,h5

(22)

where P

D

(s

1

→ ˆs

1

| R

c1

, R

c2

)

h

4,h5

is the CPEP of the clas- sical CIOD, which will be calculated in the sequel. As seen from (22), the error probability approaches unity with increasing SNR, which is somehow expected since both relays erroneously detected s

1

and forwarded this signal to D.

ii) P

D

(s

1

→ ˆs

1

| R

c1

, R

e2

): Assuming that s

1

= s

R1

+ js

I1

has been correctly detected at R

1

( ˜ s

1

= s

1

) and erroneously detected as ˆs

1

= ˆs

R1

+ jˆs

I1

at R

2

, by setting Δ

3

= Δ

4

= 0, Δ

22

= Φ

22

and Δ

25

= Φ

21

in (21) for this case, we obtain

P

D

(s

1

→ ˆs

1

| R

c1

, R

e2

)

h4,h5

=Q

 −h

5

Φ

21

+ h

4

Φ

22

2σ 

h

5

Φ

21

+ h

4

Φ

22

 (23) which has a similar structure as that of (12), and the corre- sponding UPEP can be calculated as

P

D

(s

1

→ ˆs

1

| R

c1

, R

e2

)≈P 

h

4

Φ

22

< h

5

Φ

21



= Φ

21

Φ

21

+ Φ

22

. (24) iii) P

D

(s

1

→ ˆs

1

| R

c1

, R

c2

): Assuming that both of the relays have been successfully detected s

1

, i.e., ˜s

1

= s

1

and ¯s

1

= s

1

, we have Δ

3

= Δ

5

= 0, Δ

24

= Φ

21

and Δ

22

= Φ

22

, and (21) simplifies to the CPEP of the classical CIOD as

P

D

(s

1

→ ˆs

1

| R

c1

, R

c2

)

h

4,h5

=Q



h

5

Φ

21

+ h

4

Φ

22

2N

0

⎠ (25)

for which the UPEP can be calculated as follows:

P

D

(s

1

→ ˆs

1

| R

c1

, R

c2

)= 1 π

π/2

0

M

v

 −1

4N

0

sin

2

θ

 dθ (26) where v  h

5

Φ

21

+ h

4

Φ

22

with

f

v

(v) = e

−v/Φ21

− e

−v/Φ22

Φ

21

− Φ

22

,

M

v

(s) = 1

21

s − 1) (Φ

22

s − 1) . (27) Substituting (27) into (26), the desired UPEP, which is also the UPEP of the classical CIOD, can be calculated as

P

D

(s

1

→ ˆs

1

| R

1c

, R

2c

) = Φ

21

(1 − ρ

1

) + Φ

22

(−1 + ρ

2

) 2 (Φ

21

− Φ

22

) (28) where ρ

1

 1/ 

1 + 4N

0

21

and ρ

2

 1/ 

1 + 4N

0

22

.

R

EFERENCES

[1] B. Rankov and A. Wittneben, “Spectral efficient protocols for half-duplex fading relay channels,” IEEE J. Sel. Areas Commun., vol. 25, no. 2, pp.

379–389, Feb. 2007.

[2] J. Laneman and G. Wornell, “Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks,” IEEE Trans. Inf.

Theory, vol. 49, no. 10, pp. 2415–2425, Oct. 2003.

[3] F. Tian, W. Zhang, W.-K. Ma, P. Ching, and H. V. Poor, “An effective distributed space-time code for two-path successive relay network,” IEEE Trans. Commun., vol. 59, no. 8, pp. 2254–2263, Aug. 2011.

[4] M. Z. A. Khan and B. S. Rajan, “Single-symbol maximum likelihood decodable linear STBCs,” IEEE Trans. Inf. Theory, vol. 52, no. 5, pp.

2062–2091, May 2006.

[5] L. Shi, W. Zhang, and P. C. Ching, “Single-symbol decodable distributed STBC for two-path successive relay networks,” in Proc. IEEE Int. Conf.

on Acoustics, Speech and Signal Proc., May 2011, pp. 3324–3327.

[6] A. Papoulis and S. U. Pillai, Probability, Random Variables and Stochastic Processes, 4th Ed. New York, NY: McGraw-Hill, Inc., 2002.

Referanslar

Benzer Belgeler

ec d

The influence of preparation and activation procedures upon the catalytic oligomerization activity was screened by initial testing of these catalysts using a batch gas -

(a) Scanning electron micrograph of a microring with its linear waveguide (indicated with an arrow), (b) schematic drawing showing target miRNAs (red) captured by ssDNA probes

For an extensive treatment of the polaron problem in (integer) N dimensions, the reader is referred to reference [10]. figure 2), we shall be content to just present numerical

the Bear-country to equally alien ‘land of Stark-Wall’ and the familiar world from which Walter originates, the realms of the romance serially pile up to offer a cosmos teeming

Coculture of enriched pDCs with the CXCR6 expressing Jurkat T cells decreased the activation threshold of these cells responding to D-ODN, suggesting that CXCL16/CXCR6 interaction

Since the interaction between SO phonons and electrons in VSP silicene under an exchange field leads to dissimilar hybrid plasmon modes and quasiparticle scattering rates in

In this work, we propose an iterative method for equalizing the frequency response characteristics of sub-band channels of the MWC for improved dynamic range performance that makes