2,790 research outputs found

    Cooperative Symbol-Based Signaling for Networks with Multiple Relays

    Get PDF
    Wireless channels suffer from severe inherent impairments and hence reliable and high data rate wireless transmission is particularly challenging to achieve. Fortunately, using multiple antennae improves performance in wireless transmission by providing space diversity, spatial multiplexing, and power gains. However, in wireless ad-hoc networks multiple antennae may not be acceptable due to limitations in size, cost, and hardware complexity. As a result, cooperative relaying strategies have attracted considerable attention because of their abilities to take advantage of multi-antenna by using multiple single-antenna relays. This study is to explore cooperative signaling for different relay networks, such as multi-hop relay networks formed by multiple single-antenna relays and multi-stage relay networks formed by multiple relaying stages with each stage holding several single-antenna relays. The main contribution of this study is the development of a new relaying scheme for networks using symbol-level modulation, such as binary phase shift keying (BPSK) and quadrature phase shift keying (QPSK). We also analyze effects of this newly developed scheme when it is used with space-time coding in a multi-stage relay network. Simulation results demonstrate that the new scheme outperforms previously proposed schemes: amplify-and-forward (AF) scheme and decode-and-forward (DF) scheme

    A Simple Cooperative Diversity Method Based on Network Path Selection

    Full text link
    Cooperative diversity has been recently proposed as a way to form virtual antenna arrays that provide dramatic gains in slow fading wireless environments. However most of the proposed solutions require distributed space-time coding algorithms, the careful design of which is left for future investigation if there is more than one cooperative relay. We propose a novel scheme, that alleviates these problems and provides diversity gains on the order of the number of relays in the network. Our scheme first selects the best relay from a set of M available relays and then uses this best relay for cooperation between the source and the destination. We develop and analyze a distributed method to select the best relay that requires no topology information and is based on local measurements of the instantaneous channel conditions. This method also requires no explicit communication among the relays. The success (or failure) to select the best available path depends on the statistics of the wireless channel, and a methodology to evaluate performance for any kind of wireless channel statistics, is provided. Information theoretic analysis of outage probability shows that our scheme achieves the same diversity-multiplexing tradeoff as achieved by more complex protocols, where coordination and distributed space-time coding for M nodes is required, such as those proposed in [7]. The simplicity of the technique, allows for immediate implementation in existing radio hardware and its adoption could provide for improved flexibility, reliability and efficiency in future 4G wireless systems.Comment: To appear, IEEE JSAC, special issue on 4

    Selective Combining for Hybrid Cooperative Networks

    Full text link
    In this study, we consider the selective combining in hybrid cooperative networks (SCHCNs scheme) with one source node, one destination node and NN relay nodes. In the SCHCN scheme, each relay first adaptively chooses between amplify-and-forward protocol and decode-and-forward protocol on a per frame basis by examining the error-detecting code result, and NcN_c (1≤Nc≤N1\leq N_c \leq N) relays will be selected to forward their received signals to the destination. We first develop a signal-to-noise ratio (SNR) threshold-based frame error rate (FER) approximation model. Then, the theoretical FER expressions for the SCHCN scheme are derived by utilizing the proposed SNR threshold-based FER approximation model. The analytical FER expressions are validated through simulation results.Comment: 27 pages, 8 figures, IET Communications, 201

    Recovering Multiplexing Loss Through Successive Relaying Using Repetition Coding

    Full text link
    In this paper, a transmission protocol is studied for a two relay wireless network in which simple repetition coding is applied at the relays. Information-theoretic achievable rates for this transmission scheme are given, and a space-time V-BLAST signalling and detection method that can approach them is developed. It is shown through the diversity multiplexing tradeoff analysis that this transmission scheme can recover the multiplexing loss of the half-duplex relay network, while retaining some diversity gain. This scheme is also compared with conventional transmission protocols that exploit only the diversity of the network at the cost of a multiplexing loss. It is shown that the new transmission protocol offers significant performance advantages over conventional protocols, especially when the interference between the two relays is sufficiently strong.Comment: To appear in the IEEE Transactions on Wireless Communication

    Secure Beamforming for MIMO Two-Way Communications with an Untrusted Relay

    Full text link
    This paper studies the secure beamforming design in a multiple-antenna three-node system where two source nodes exchange messages with the help of an untrusted relay node. The relay acts as both an essential signal forwarder and a potential eavesdropper. Both two-phase and three-phase two-way relay strategies are considered. Our goal is to jointly optimize the source and relay beamformers for maximizing the secrecy sum rate of the two-way communications. We first derive the optimal relay beamformer structures. Then, iterative algorithms are proposed to find source and relay beamformers jointly based on alternating optimization. Furthermore, we conduct asymptotic analysis on the maximum secrecy sum-rate. Our analysis shows that when all transmit powers approach infinity, the two-phase two-way relay scheme achieves the maximum secrecy sum rate if the source beamformers are designed such that the received signals at the relay align in the same direction. This reveals an important advantage of signal alignment technique in against eavesdropping. It is also shown that if the source powers approach zero the three-phase scheme performs the best while the two-phase scheme is even worse than direct transmission. Simulation results have verified the efficiency of the secure beamforming algorithms as well as the analytical findings.Comment: 10 figures, Submitted to IEEE Transactions on Signal Processin
    • …
    corecore