• Title/Summary/Keyword: wireless two-way relay channel

Search Result 13, Processing Time 0.018 seconds

Probabilistic Constrained Approach for Distributed Robust Beamforming Design in Cognitive Two-way Relay Networks

  • Chen, Xueyan;Guo, Li;Dong, Chao;Lin, Jiaru;Li, Xingwang;Cavalcante, Charles Casimiro
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.21-40
    • /
    • 2018
  • In this paper, we propose the distributed robust beamforming design scheme in cognitive two-way amplify-and-forward (AF) relay networks with imperfect channel state information (CSI). Assuming the CSI errors follow a complex Gaussian distribution, the objective of this paper is to design the robust beamformer which minimizes the total transmit power of the collaborative relays. This design will guarantee the outage probability of signal-to-interference-plus-noise ratio (SINR) beyond a target level at each secondary user (SU), and satisfies the outage probability of interference generated on the primary user (PU) above the predetermined maximum tolerable interference power. Due to the multiple CSI uncertainties in the two-way transmission, the probabilistic constrained optimization problem is intractable and difficult to obtain a closed-form solution. To deal with this, we reformulate the problem to the standard form through a series of matrix transformations. We then accomplish the problem by using the probabilistic approach based on two sorts of Bernstein-type inequalities and the worst-case approach based on S-Procedure. The simulation results indicate that the robust beamforming designs based on the probabilistic method and the worst-case method are both robust to the CSI errors. Meanwhile, the probabilistic method can provide higher feasibility rate and consumes less power.

Performance of Network Coding with Best Relay Selection in Fading Channels (페이딩 채널에서 최선 릴레이 선택을 갖는 네트워크 코딩의 성능)

  • Kim, Nam-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.193-200
    • /
    • 2013
  • Recently, network coding has been actively studied to increase the spectral efficiency of two-way relay wireless channels such as cellular systems as well as broadcasting systems. In this paper, we derive the average transmission capacity and the outage probability of a network coding system, which utilizes two-way data transmission via the best relay rather than multiple relays. Since the data unbalance between the forward and the reverse link in two-way communication systems exists, we include the asymmetric link as well as the symmetric link in the analysis. It is noticed that the space diversity gain increases as the increase of the number of relays. Also we obtain 11.4 dB signal-to-noise ratio (SNR) gain with 9 relays compared to that with single relay in symmetrical link at the given conditions. In asymmetrical links, we denotes that the outage probability is more sensitive to the number of relays rather than data unbalance between the links.

A Study on the Binary-Coded Physical-Layer Network Coding with High-Order Modulation Techniques (고차원 변조방식을 적용한 이진 부호화된 물리계층 네트워크 코딩에 관한 연구)

  • Lim, Hyeonwoo;Ban, Tae-Won;Jung, Bang Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.9
    • /
    • pp.2131-2139
    • /
    • 2014
  • In this paper, a binary-coded physical-layer network coding (PNC) is considered when high-order modulation techniques are used at source nodes in wireless communication environments. In the conventional PNC schemes, tight power control and phase compensation are required at a relay node. However, they may not be feasible in practical wireless communication environments. Thus, we do not assume the pre-equalization in this paper, and we only utilize the channel state information at receiver (CSIR). We propose a signal detection method for the binary-coded PNC with high-order modulation, such as QPSK and 16QAM, at the source nodes, while the conventional scheme only consider the BPSK at source nodes. We also analyze the bit-error performance of the proposed technique in both uncoded and coded cases.