Open Access

Applying Physical-Layer Network Coding in Wireless Networks

EURASIP Journal on Wireless Communications and Networking20102010:870268

https://doi.org/10.1155/2010/870268

Received: 26 September 2009

Accepted: 7 February 2010

Published: 23 March 2010

Abstract

A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes, simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11). This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC) scheme to coordinate transmissions among nodes. In contrast to "straightforward" network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM) waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput increases compared with traditional transmission and straightforward network coding, respectively, in 1D regular linear networks with multiple random flows. The throughput improvements are even larger in 2D regular networks: 200% and 100%, respectively.

1. Introduction

One of the biggest challenges in wireless communication is how to deal with the interference at the receiver when signals from multiple sources arrive simultaneously. In the radio channel of the physical-layer of wireless networks, data are transmitted through electromagnetic (EM) waves in a broadcast manner. The interference between these EM waves causes the data to be scrambled.

To overcome its negative impact, most schemes attempt to find ways to either reduce or avoid interference through receiver design or transmission scheduling [1]. For example, in 802.11 networks, the carrier-sensing mechanism allows at most one source to transmit or receive at any time within a carrier-sensing range. This is obviously inefficient when multiple nodes have data to transmit.

While interference causes throughput degradation on wireless networks in general, its negative effect for multihop ad hoc networks is particularly significant. For example, in 802.11 networks, the theoretical throughput of a multihop flow in a linear network is less than 1/4 of the single-hop case due to the "self-interference" effect, in which packets of the same flow but at different hops collide with each other [2, 3].

Instead of treating interference as a nuisance to be avoided, we can actually embrace interference to improve throughput performance with the "right mechanism". To do so in a multihop network, the following goals must be met.

  1. (1)

    A relay node must be able to convert simultaneously received signals into interpretable output signals to be relayed to their final destinations.

     
  2. (2)

    A destination must be able to extract the information addressed to it from the relayed signals.

     

The capability of network coding to combine and extract information through simple Galois field GF( ) additions [4, 5] provides a potential approach to meet such goals. However, network coding arithmetic is generally only applied on bits that have already been correctly received. That is, when the EM waves from multiple sources overlap and mutually interfere, network coding cannot be used to resolve the data at the receiver. So, criterion 1 above cannot be met.

This paper proposes the application of network coding directly within the radio channel at the physical-layer. We call this scheme Physical-layer Network Coding (PNC). The main idea of PNC is to create an apparatus similar to that of network coding, but at the physical-layer that deals with EM signal reception and modulation. Through a proper modulation-and-demodulation technique at the relay nodes, additions of EM signals can be mapped to GF( ) additions of digital bit streams, so that the interference becomes part of the arithmetic operation in network coding. The basic idea of PNC was first put forth in our conference paper in [6]. Going beyond [6], this paper addresses a number of practical issues of applying PNC in wireless networks. In particular, we evaluate the performance of PNC based on specific scheduling algorithms for 1D and 2D regular networks that make use of PNC (The PNC scheduling schemes in this paper can be easily extended to more general networks as in [6]). Compared to the traditional transmission and the straightforward network coding, our analytical results show that PNC can improve the network throughput by a factor of 2 and 1.5, respectively, for the 1D network, and by a factor of 3 and 2 respectively for the 2D network.

1.1. Related Work

In 2006, we proposed PNC in [6] as demodulation mappings based on different modulation schemes. A similar idea was also published independently in [7] at the same time by another group. After that, a large body of work from other researchers on PNC began to appear. The work can be roughly divided into three categories.

In the first category, PNC is regarded as a modulation-demodulation technique. Many new PNC mapping schemes have been proposed since [6]. For example, [8] proposed a scheme based on Tomlinson-Harashima precoding. Following [6], [9] proposed a simple relay strategy called analog network coding (ANC), in which the relay amplifies and forwards the received superimposed signal without any processing. Analog network coding turns out to be similar to a scheme earlier by researchers in the satellite communication society [10]. In [11], a number of memoryless relay functions, including PNC mapping and the BER optimal function, were identified and analyzed assuming phase synchronization between signals of the transmitters. In [12], we observed that there is a one-to-one correspondence between a relay function and a specific PNC scheme under the general definition of memoryless PNC. Besides the precise definition of memoryless PNC which distinguishes it from the traditional straightforward network coding (SNC), [12] also gave a number of new PNC schemes. Reference [13] proposed a new PNC scheme where the relay maps a group constellation points to one signal according to the phase difference of the two end nodes' signals. The mechanism also takes care of the phase difference between the two end nodes implicitly.

In the second category, PNC and channel coding are studied jointly. In [1416], PNC was combined with Lattice code or LDPC code. It was proved that the capacity of the two-way relay channel can be approached in high SNR and low SNR. In [1416], channel coding and PNC mapping are performed independently (i.e., successively). In [17], we proposed a novel scheme which treats channel coding and PNC in an integrated manner. We show that joint channel-PNC decoding can outperform the previous schemes significantly.

In the third category, the focus is on the performance impact and significance of PNC in large-scale wireless networks. For one-dimensional wireless networks, [18] showed that PNC can improve the capacity by a fixed factor, although it does not change the scaling law. For two-dimensional wireless networks, [19] showed that PNC can increase capacity by a factor of 2.5 for the rectangular networks and a factor 2 for the hexagonal networks. However, the result in [18] is obtained based on a rough scheduling scheme which is established traditional network coding rather than physical-layer network coding (the special properties of PNC are ignored). Our paper here also discusses the application of PNC in large-scale wireless networks. It is different from [18] in that we provide the construction of an explicit PNC-scheduling algorithm (specially designed for PNC), upon which all our results are established. Compared with [19], we consider the many-to-many scenario with multiple sources and destinations, while [19] only considered the one-to-many scenario with one source.

The rest of this paper is organized as follows. Section 2 overviews the basic idea of PNC with a linear 3-node multihop network. Sections 3 and 4 investigate the application of PNC in the 1D regular linear network and 2D regular grid network, respectively. Section A concludes the paper.

2. Illustrating Example: A Three-Node Wireless Linear Network

Consider the three-node linear network in Figure 1. (Node 1) and (Node 3) are nodes that exchange information, but they are out of each other's transmission range. (Node 2) is the relay node between them.
Figure 1

A three-node linear network.

This three-node wireless network is a basic unit for cooperative transmission and it has previously been investigated extensively [2025]. In cooperative transmission, the relay node can choose different transmission strategies, such as Amplify-and-Forward or Decode-and-Forward [22], according to different Signal-to-Noise (SNR) situations. This paper focuses on the Decode-and-Forward strategy. We consider frame-based communication in which a time slot is defined as the time required for the transmission of one fixed-size frame. Each node is equipped with an omnidirectional antenna, and the channel is half duplex so that transmission and reception at a particular node must occur in different time slots. Slow fading is assumed throughout this paper for the ease of synchronization.

Before introducing the PNC transmission scheme, we first describe the traditional transmission scheduling scheme and the "straightforward" network-coding scheme for mutual exchange of a frame in the three-node network [20, 25].

2.1. Traditional Transmission Scheduling Scheme

In traditional networks, interference is usually avoided by prohibiting the overlapping of signals from and to in the same time slot. A possible transmission schedule is given in Figure 2. Let denote the frame initiated by . first sends to , and then relays to . After that, sends in the reverse direction. A total of four time slots are needed for the exchange of two frames in opposite directions.
Figure 2

Traditional scheduling scheme.

2.2. Straightforward Network Coding Scheme

References [20, 25] outline the straightforward way of applying network coding in the three-node wireless network. Figure 3 illustrates the idea. First, sends to and then sends frame to . After receiving and , encodes frame as follows:
(1)
where denotes bitwise exclusive OR operation being applied over the entire frames of and . then broadcasts to both and . When receives , it extracts from using the local information , as follows:
(2)
Figure 3

Straightforward network coding scheme.

Similarly, can extract . A total of three time slots are needed, for a throughput improvement of 33% over the traditional transmission scheduling scheme.

2.3. Physical-Layer Network Coding (PNC)

We now introduce PNC as shown in Figure 4. Let us assume that the use of BPSK modulation at all the nodes. We further assume symbol-level time and carrier-phase synchronization, and the use of power control, so that the frames from and arrive at with the same phase and amplitude (Power control can be achieved in a slow fading channel with current techniques. Additional discussion about carrier-phase and symbol time synchronization can be found in [26]). The combined bandpass signal received by during one symbol period is
(3)
where , = 1 or 3, is the bandpass signal transmitted by , is the bandpass signal received by during one symbol period, is the BPSK modulated information bit of , and is the carrier frequency. Then, will obtain a baseband signal .
Figure 4

Physical-layer network coding.

Note that cannot extract the individual information transmitted by and , that is, and , from the combined signal in . However, is just a relay node. As long as can transmit the necessary information to and for extraction of and over there, the end-to-end delivery of information will be successful. For this, all we need is a special modulation/demodulation mapping scheme, referred to as PNC mapping in this paper, to obtain the equivalence of GF(2) summation of bits from and at the physical-layer.

Table 1 illustrates the idea of PNC mapping. In Table 1, is a variable representing the data bit of and is a variable representing the BPSK modulated bit of such that .
Table 1

PNC Mapping: modulation mapping at , ; demodulation and modulation mappings at .

Modulation mapping at and

Demodulation mapping at

 
    

Input

Output

 

Input

Output

 

Modulation mapping at

     

Input

Output

With reference to Table 1, obtains the information bits:
(4)
It then transmits
(5)

The BER analysis in [6] shows that the end-to-end BER for the three schemes is similar when the per-hop BER is low (the BER is less than for 10 dB). Ignoring the slight BER difference, we have the following conclusion. For a frame exchange, PNC requires two time slots, 802.11 requires four, while straightforward network coding requires three. Therefore, PNC can improve the system throughput of the three-node wireless network by a factor of 100% and 50% relative to traditional transmission scheduling and straightforward network coding, respectively.

3. Applying PNC in Regular 1D Networks

Our discussions so far has only focused on the simple 3-node network with one bidirectional flow. In this section, we discuss the application of PNC in 1D regular networks. There are two reasons for this discussion. First, the schemes proposed in regular network still work in random networks. And the analytical results in regular networks also provide some insights about applying PNC in random networks. Second, the regular network can also find applications in real world. For example, APs (access points) positioned along a highway form a regular linear chain in a vehicular network.

3.1. Regular Linear Network with One Bidirectional Flow

Consider a regular linear network with nodes with equal spacing between adjacent nodes. Label the nodes as node 1, node 2, , node , successively with nodes 1 and being the two source and destination nodes, respectively. Figure 5 shows a network with = 5. Suppose that node 1 is to transmit frames , , . to node , and node is to transmit frames , , . to node 1.
Figure 5

Bidirection PNC transmission in linear network.

We could divide the time slots into two types: odd slots and even slots. In the odd time slots, the odd-numbered nodes transmit and the even-numbered nodes receive. In the even time slots, the even-numbered nodes transmit and the odd-numbered nodes receive.

Figure 5 shows the sequence of frames being transmitted by the nodes in a 5-node network. In slot 1, node 1 transmits to node 2 and node 5 transmits to node 4 at the same time. In slot 2, node 2 and node 4 transmit and to node 3 simultaneously; both node 2 and node 4 also store a copy of and in their buffer, respectively. In slot 3, node 1 transmits to node 2, node 5 transmits to node 4, and node 3 broadcasts simultaneously; node 3 stores a copy of in its buffer. Adding the stored to received with PNC detection, node 2 can obtain . Node 4 can obtain similarly. In slot 4, node 2 and node 4 broadcast and , respectively. In this way, node 5 receives a copy of and node 1 receives in slot 4. Also, in slot 4, node 3 obtains by adding stored packet to the received packet .

With reference to Figure 5, we see that a relay node forwards two frames, one in each direction, every two time slots. So, the throughput is 0.5 frame/time slot in each direction. Due to the half duplex assumption, this is the maximum possible throughput we can achieve.

As detailed above, when applying PNC on the linear network, each node transmits and receives alternately in successive time slots; and when a node transmits, its adjacent nodes receive, and vice versa (see Figure 5). Let us investigate the signal-to-inference ratio (SIR) given this transmission pattern to make sure that it is not excessive. Consider the worst-case scenario of an infinite chain. We note the following characteristics of PNC from a receiving node's point of view.

  1. (a)

    The interfering nodes are symmetric on both sides.

     
  2. (b)

    The simultaneous signals received from the two adjacent nodes do not interfere due to the nature of PNC.

     
  3. (c)

    The nodes that are two hops away are also receiving at the same time, and therefore will not interfere with the node.

     
Therefore, the two nearest interfering nodes are three hops away. We have the following SIR:
(6)
where is the common (In a regular network, a trivial result of power control is that every node uses the same transmission power if the distances between adjacent nodes are constant) transmitting power of the nodes and is the path-loss exponent. According to [27], for free space, = 2.7 3.5 for urban cellular networks, and = 4 6 for in-building transmission. We calculate the SIR for different and the results are shown in Table 2. As can be seen, when (this is typical in wireless networks), the SIR is no less than 10 dB and the impact of the interference on BER is negligible for BPSK based on [28] (the capture threshold is often set to 10 db in wireless networks [3]). More generally, a thorough treatment should take into account the actual modulation scheme used, the difference between the effects of interference and noise, and whether or not channel coding is used. However, we can conclude that as far as the SIR is concerned, PNC is not worse than traditional scheduling (see Section 4) when generalized to the n-node linear network (In this paper, we assume that channel coding [17] is properly used at all the nodes and the packets can be correctly decoded to avoid error propagation once the targeted SIR is achieved. Reference [17] provides and investigates a hop-to-hop channel coding scheme for PNC).
Table 2

Signal to Noise Ratio with different path loss exponent

2

3

4

5

6

SIR (dB)

3.3

9.8

15.3

20.4

25.4

3.2. Regular Linear Network with Multiple Flows

Part A considers only one bidirectional flow. Here we consider a general setting in which there are unidirectional flows in the -node linear network. Note that this generalization includes the scenario in which there is a combination of unidirectional and bidirectional flows in the network, since each bidirectional flow can be considered as two unidirectional flows.

To allow PNC to be applied, we compose bidirectional flows out of the unidirectional flows by matching pairs of unidirectional flows in opposite directions. The bidirectional flows can then make use of PNC for transmission, while the remaining unmatched unidirectional flows make use of the traditional strategy of multihop data transmission.

The optimal way to compose the bidirectional flows and schedule the transmission of the links in the flows is a tough problem. Here we consider a simple heuristic which is asymptotically optimal for the regular -node linear network when goes to infinity as shown in Part C. For simplicity, we assume that all flows have equal traffic.

We define the following terms with respect to the linear network. Let us label the nodes from left to right by 1 to sequentially. Let denote the source-destination pair of flow . For a right-bound flow, ; for a left-bound flow, . Let denote the overall set of flows, and be the set of right-bound flows and be the set of left-found flows.

Two right-bound (left-bound) flows and are said to be nonoverlapping if or ( or ). A right packing (left packing) is a set of nonoverlapping right-bound flows (left-bound flows). A dual packing consists of a right packing and a left packing. Figure 6 shows an example of a dual packing. Flows 2 and 3 form a right packing, and Flow 1 forms a left packing. Note that some of the nodes are traversed by both a right-bound flow and a left-bound flow. Let us call these nodes the common nodes, and the other nodes the noncommon nodes. A sequence of adjacent common nodes, flanked by but not including two noncommon nodes at two ends (an ellipse in Figure 6), forms a PNC unit, and we can use the PNC mechanism for transporting the bidirectional traffic over it. A sequence of adjacent noncommon nodes, together with the two common nodes flanking them (a rectangle in Figure 6), may or may not have traffic flowing over them. When there is traffic, the traffic is in one direction only, and the traditional multihop communication technique can be used to carry the unidirectional traffic. Essentially, by forming a dual packing, we also form many "virtual" bidirectional flows (each corresponding to a PNC unit) on which PNC can be applied.
Figure 6

An example of a dual packing formed by a right packing and a left packing. An ellipse corresponds to a PNC unit. The nodes between two adjacent ellipses (including the terminal nodes of the ellipses) are grouped together by a rectangle.

Our heuristic as showing in Algorithm 1 consists of a method of forming dual packings from the unidirectional flows.

Algorithm 1

while ( ) /* Each iteration in the while loop forms a dual packing. */

while ( ) /* Each iteration in the while loop tries to find a "tight" right packing */

 largestDest=0;

 while (true)

/* Each iteration in the while loop includes one more flow into the right packing being assembled. */

  

/* Select a flow with the smallest source larger than LargestDest; assume "null" is returned if there is no more flow

left in with . */

  if ( )

   include flow i into the current right packing being assembled;

   largestDest = ;

   remove flow from ;

   else

   break;

/* Break out of the while(true) loop. */

     

while ( )

/* Each iteration in the while loop tries to find a "tight" left packing. */

/* Comment: details omitted here; the procedure is similar to the "while ( )" loop above

except that largestDest is replaced by smallestDest; is replaced by etc. */

/* Combine the right packings and left packings one by one to obtain dual packings */

The dual packings yield a set of "virtual" bidirectional flows, each corresponding to a PNC unit. Scheduling can then be performed as follows. Let us refer to the time needed for all the unidirectional flows to transfer one packet from source to destination as one frame. Each link (hop) of a flow is allocated one time slot for transmission within a frame. A frame is further divided into two intervals, as follows.

  1. (1)

    The first interval is dedicated to the PNC units (i.e., ellipses). Note that if there are M dual packings, time slots are needed in the worst case; in the worst case, different dual packings use different time slots to transmit, and 2 time slots are needed for each dual packing (Two caveats are in order. The first is that according to our construction, there could be "trivial" PNC units with two nodes only. In this case, the PNC mechanism is not needed, and each node gets to transmit directly to the other node. Regardless of whether the PNC unit is trivial or not, two time slots are needed for the bidirectional flows. The second caveat is that there could be two PNC units in the same dual packing next to each other. For example, suppose nodes 1, 2, and 3 form a PNC unit, and nodes 4, 5, 6 form another. To avoid conflict, the scheduling of the transmissions on these two PNC units should be such that nodes 1, 3, 4, and 6 transmit in one time slot while nodes 2 and 5 transmit in another time slot. Again, two time slots are needed.).

     
  2. (2)

    The second interval is dedicated to the nonPNC units (i.e., rectangles). The nodes of all rectangles of all dual packings are scheduled to transmit using the conventional scheme.

     

The number of time slots needed in the second interval depends on both the number and the lengths of the rectangles. As will be shown in Part C, it can be ignored compared to the time slots needed in the first interval as goes to infinity.

3.3. Throughput of 1D Network with PNC

We now show that the packing and scheduling strategies presented in Part B can allow the upper-bound capacity of 1D network to be approached when the number of nodes goes to infinity. Furthermore, compared with the conventional schemes discussed in [29], PNC can achieve a constant factor of throughput improvement.

We first detail the system model. To avoid edge effects, we consider a "large" circle instead of a line. The nodes are uniformly distributed over the circle with a constant distance between adjacent nodes. Without loss of generality, let the distance between two adjacent nodes be a unit distance. Each transmission is over only one unit distance (i.e., a node only transmits to its two adjacent nodes). Consider the receiver of a link. We assume that simultaneous transmission by another link whose transmitter is two or more hops away from the receiver of the first link will not cause a collision to the first link. In our model, nodes are randomly chosen as the source nodes. The remaining nodes are the potential destination nodes. For each source node, a unique destination node is chosen among the potential destination nodes with equal probability. We assume matching without replacement in that the destination node chosen for a source node will not be put back to the pool before the destination node of another source is chosen. The route for a source-destination pair is also predetermined in a random way (note: there are two routes from a source to its destination, one in the clockwise direction and the other in the counterclockwise direction).

The analytical results for the traditional transmission scheme and straightforward network coding scheme in our circular model are similar to those in the 1D linear network in [29] when goes to infinity. Using similar approach, it is not difficult to obtain the respective per-flow throughputs in our circular network as
(7)

where unit link bandwidth is assumed.

Let us now focus on the PNC throughput. We will show that PNC can achieve the per-flow throughput for any small positive value as goes to infinity. Let us first provide further details to the scheduling strategy presented in Part B.

The packing and scheduling are as follows. For packing, we first unwrap the circle to a noncircular linear network by randomly selecting the source node of a clockwise flow, labelled , on the circle as the start point of the linear network. The adjacent node of the selected source node in the counterclockwise direction in the circle, labeled , will serve as the end point of the linear network. Next, we obtain one packing of the clockwise flows according to the packing algorithm in Part B. It is possible that the last selected flow crosses the start point. In that case, we cut the flow into two subflows by performing the cut between the start point and the end point, and only consider the first subflow in the aforementioned packing. After forming the above clockwise unidirectional packing, we form a matching counterclockwise unidirectional packing at choosing as the start point and as the end point. If there is an existing counterclockwise flow with as its source node, we will start with this flow in the unidirectional packing. If not, we will choose the next flow with source node closest to e in the counterclockwise direction in our packing.

For "traffic balance", after getting the first dual packing as above, for the next dual packing, we will start with forming the counterclockwise unidirectional packing first (i.e., and will be defined with respect to the counterclockwise packing) before constructing the matching clockwise packing. Repeating the above procedure allows us to form a series of dual packings.

The scheduling of transmissions is the same as that in Part B except that here we also have to consider the transmission across the two subflows cut as above, if any. We assume the traffic from the destination of a preceding subflow to the source of its corresponding subflow is transmitted using the conventional scheme in the second interval.

With the above packing and scheduling strategies, we have the following theorem on the per-flow throughput of the 1D circular network when goes to infinity.

Theorem 1.

With PNC, we can approach the upper bound of the per-flow throughput of the 1D network:
(8)

Sketch of Proof

A sketch of the proof for Theorem 1 is provided here and a detailed proof is given in the Appendix. With the help of the max-flow min-cut theorem, the upper bound of the per-flow throughput for our 1D circular network can be shown to be . That this upper bound can be approached with the application of the aforementioned PNC packing and scheduling strategies is argued as follows. Consider the original N/4 unidirectional flows. With PNC packing and scheduling, these flows have been decomposed into PNC units and nonPNC units for transmission in the first and second intervals. For each round of first and second intervals (i.e., for each frame), one packet is transported from the source to the destination of each flow. We can show that the number of time slots needed in the first interval for all the flows is at most , where the small positive quantity goes to zero as goes to infinity. The number of time slots needed in the second interval, on the other hand, is , where the small positive quantity goes to zero as goes to infinity. Then we can obtain the per-flow throughput with PNC: .

A corollary of Theorem 1 is that PNC can improve the throughput of the 1D network by a factor of 2 and 1.5 relative to the traditional transmission scheme and the SNC scheme (7), respectively.

A notable fact is that PNC can approach the capacity with minimum energy. Recall that PNC exchanges one packet between the two end nodes within two time slots, during which each of the n nodes on the chain transmits once with energy E t and receives once with energy . And a total energy is used. In fact, is the lower bound of energy to exchange one packet. For one exchange, the two end nodes must transmit once to send their message and must receive once to obtain their needed message; the relay nodes must receive once and transmit once to finish one relay. Therefore, the energy of is necessary.

4. Applying PNC in 2D Grid Network

Section 3 focused on the 1D regular network. This section investigates the application of PNC in a 2D regular gird network. We assume the same transmission protocol as in Section 3.

4.1. 2D Grid Network with One Bidirectional Flow in Each Line

Figure 7 shows the grid network under consideration, in which nodes are uniformly located at the cross points as shown. In this part, we first consider the case in which each line (horizontal or vertical) on the grid has one and only one bidirectional flow. Specifically, the two end nodes in each line, node 1 and node , exchange information through the relay nodes in between.
Figure 7

Subfigure (a) shows 2D grid network with one bidirectional flow in each line. The lines separated by lines, that is, the lines with the same color, are allowed to transmit simultaneously. Subfigure (b) shows a scheduling for one group active lines (red lines) in a specific time slot

The flows transmit with the following PNC schedule. Consider the horizontal lines (similar schedule applies for the vertical lines). The first two time slots are dedicated to transmissions on lines ; the next two time slots are dedicated to transmissions on lines nodes on the lines ; and so on. The separation J must be large enough for acceptable SIR. In the example of Figure 7, .

For a group of simultaneous active lines, to reduce SIR, when the odd nodes transmit on one active line, then the even nodes will transmit on its two adjacent active lines, as shown in Figure 7.

Let us investigate the SIR of this transmission pattern given a . Consider the worst-case scenario in which N goes to infinity. For a given receiver, the interference from the nodes within the same line is , where , , , and are defined similarly as in Section 3.1. Without loss of generality, suppose that the receiver is an even node. The interference from the other active lines whose odd nodes are transmitting is , and the interference from the other active lines whose even nodes are transmitting is . Thus, the overall SIR is given by
(9)

For a typical value of , the SIR in (9) is about 13.5 dB, 12.3 dB, and 10.0 dB for equals 5, 4, and 3, respectively. With an assumed 10 dB target, is enough to guarantee successful transmission.

4.2. 2D Grid Network with Multiple Random Flows

Let us now investigate the application of PNC in the 2D grid network with a more general traffic pattern. With respect to Figure 7, we now randomly choose of the nodes as the source nodes. The remaining nodes are the destination nodes.

Here we apply a simple routing scheme, as in [29]. For a source-destination pair at positions and , the data will first be forwarded vertically to the node at before being forwarded horizontally to the destination. The horizontal and vertical transmissions are separated into two different time intervals. For horizontal (or vertical) transmissions, the scheduling within each line (column) is the same as that in the Section 3.2 and the scheduling among different lines (columns) is the same as in part A.

When goes to infinity, the number of nodes in each line or column, , also goes to infinity, and the per-flow PNC throughput in each line or column will approach , as argued in Section 3. Since the horizontal transmission and vertical transmission are scheduled in different time interval and in each interval every lines (columns) transmit simultaneously, the per-flow transmission of PNC in the 2D grid network can approach
(10)
For comparison purposes, let us look at the per-flow throughput under the traditional transmission strategy and under the straightforward network coding strategy. With the routing/scheduling strategy and the corresponding throughput analysis in [29], we can show that the traditional transmission scheme and SNC scheme can achieve the following throughputs, respectively:
(11)

In the 2D grid network, the nodes are tightly packed than in the 1D network, and the interfering nodes must be kept at least 3 hops away, that is, , to obtain an SIR of no less than 10 dB (note: in the 1D network, could be 1 for SIR of about 10 dB). When , we can verify that throughputs better than (11) cannot be achieved. In other words, the throughput in (11) is also the upper bound for traditional transmission scheme and SNC scheme under all possible schedulings.

Therefore, setting in (10), we conclude that PNC can achieve a throughput improvement factor of 3 and 2 relative to the traditional transmission scheme and the SNC scheme, respectively. Note that the improvement factors under the 2D network are larger than those under the 1D network, which are 2 and 1.5, respectively (see Section 3).

5. Conclusion

This paper has introduced a novel scheme called Physical-layer Network Coding (PNC) that significantly enhances the throughput performance of multihop wireless networks. Instead of avoiding interference caused by simultaneous electromagnetic waves transmitted from multiple sources, PNC embraces interference to effect network-coding operation directly from physical-layer signal modulation and demodulation. With PNC, signal scrambling due to interference, which causes packet collisions in the MAC layer protocol of traditional wireless networks (e.g., IEEE 802.11), can be eliminated.

We have proposed explicit scheduling algorithms for PNC in 1D and 2D regular networks with multiple random flows. It is shown that PNC can potentially achieve 100% and 50% throughput increases compared with traditional transmission and straightforward network coding, respectively, in the 1D regular linear network. The throughput improvements are even larger in the 2D regular network: 200% and 100%, respectively. In particular, PNC can allow the upper-bound throughput of the 1D regular network to be approached as the number of nodes goes to infinity.

Declarations

Acknowledgments

This work was partially supported by the Competitive Earmarked Research Grant (project number 414507) established under the University Grant Committee of the Hong Kong and the Natural Science Foundation of China (project number 60902016).

Authors’ Affiliations

(1)
Department of Communication Engineering, Shenzhen University, Shenzhen, China
(2)
Department Information Engineering, Chinese University of Hong Kong, Shatin, Hong Kong

References

  1. Ojanperä T, Prasad R: An overview of air interface multiple access for IMT-2000/UMTS. IEEE Communications Magazine 1998, 36(9):82-95. 10.1109/35.714623View ArticleGoogle Scholar
  2. Li J, Blake C, De Couto DSJ, Lee HI, Morris R: Capacity of ad hoc wireless networks. Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MOBICOM '01), July 2001, Rome, Italy 61-69.View ArticleGoogle Scholar
  3. Ng PC, Liew SC: Throughput analysis of IEEE802.11 multi-hop ad hoc networks. IEEE/ACM Transactions on Networking 2007, 15(2):309-322.View ArticleGoogle Scholar
  4. Ahlswede R, Cai N, Li S-YR, Yeung RW: Network information flow. IEEE Transactions on Information Theory 2000, 46(4):1204-1216. 10.1109/18.850663MathSciNetView ArticleMATHGoogle Scholar
  5. Li S-YR, Yeung RW, Cai N: Linear network coding. IEEE Transactions on Information Theory 2003, 49(2):371-381.MathSciNetView ArticleMATHGoogle Scholar
  6. Zhang S, Liew SC, Lam PP: Hot topic: physical-layer network coding. Proceedings of the 12th Annual International Conference on Mobile Computing and Networking (MOBICOM '06), September 2006, Los Angeles, Calif, USA 358-365.View ArticleGoogle Scholar
  7. Popovski P, Yomo H: The anti-packets can increase the achievable throughput of a wireless multi-hop network. Proceedings of IEEE International Conference on Communications (ICC '06), July 2006, Istanbul, Turkey 9: 3885-3890.Google Scholar
  8. Hao Y, Goeckel D, Ding Z, Towsley D, Leung KK: Achievable rates for network coding on the exchange channel. Proceedings of IEEE Military Communications Conference (MILCOM '07), October 2007, Orlando, Fla, USAGoogle Scholar
  9. Katti S, Gollakota S, Katabi D: Embracing wireless interference: analog network coding. MIT, Cambridge, Mass, USA; 2007.View ArticleGoogle Scholar
  10. Denkberg M: Paired carrier multiple access(PCMA) for satellite communications. Proceedings of the Pacafic Telecommunications Conference, 1998, Honolulu, Hawaii, USAGoogle Scholar
  11. Cui T, Ho T, Kliewer J: Memoryless relay strategies for two-way relay channels: performance analysis and optimization. Proceedings of IEEE International Conference on Communications (ICC '08), May 2008, Beijing, China 1139-1143.Google Scholar
  12. Zhang S, Liew SC, Lu L: Physical layer network coding schemes over finite and infinite fields. Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '08), November-December 2008, New Orleans, La, USA 3784-3789.Google Scholar
  13. Koike-Akino T, Popovski P, Tarokh V: Denoising maps and constellations for wireless network coding in two-way relaying systems. Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '08), November-December 2008, New Orleans, La, USA 3790-3794.Google Scholar
  14. Zhang S, Liew S: Capacity of two-way relay channel. 3rd HK-BJ Doctoral forum, 2008, http://arxiv.org/ftp/arxiv/papers/0804/0804.3120.pdfGoogle Scholar
  15. Nam W, Chung S-Y, Lee YH: Capacity bounds for two-way relay channels. Proceedings of the International Zurich Seminar on Digital Communications (IZS '08), March 2008, Zurich, Germany 144-147.Google Scholar
  16. Narayanan K, Wilson MP, Sprintson A: Joint physical layer coding and network coding for bi-directional relaying. Proceedings of the 45th Annual Allerton Conference on Communication, Control, and Computing, September 2007, Monticello, Ill, USAGoogle Scholar
  17. Zhang S, Liew S-C: Channel coding and decoding in a relay system operated with physical-layer network coding. IEEE Journal on Selected Areas in Communications 2009, 27(5):788-796.View ArticleGoogle Scholar
  18. Lu K, Fu S, Qian Y, Chen H-H: On capacity of random wireless networks with physical-layer network coding. IEEE Journal on Selected Areas in Communications 2009, 27(5):763-772.View ArticleGoogle Scholar
  19. Chen C, Cai K, Xiang H: Scalable ad hoc networks for arbitrary-cast: practical broadcast-relay transmission strategy leveraging physical-layer network coding. EURASIP Journal on Wireless Communications and Networking 2008, 2008:-15.Google Scholar
  20. Wu Y, Chou PA, Kung SY: Information exchange in wireless networks with network coding and physical layer broadcast. Microsoft Research, Redmond, Wash, USA; 2004.Google Scholar
  21. Hausl C, Hagenauer J: Iterative network and channel decoding for the two-way relay channel. Proceedings of IEEE International Conference on Communications (ICC '06), July 2006, Istanbul, Turkey 4: 1568-1573.Google Scholar
  22. Laneman JN, Tse DNC, Wornell GW: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Transactions on Information Theory 2004, 50(12):3062-3080. 10.1109/TIT.2004.838089MathSciNetView ArticleMATHGoogle Scholar
  23. Cover TM, El-Gamal AA: Capacity theorems for the relay channel. IEEE Transactions on Information Theory 1979, 25(5):572-584. 10.1109/TIT.1979.1056084MathSciNetView ArticleMATHGoogle Scholar
  24. Lai L, Liu K, El-Gamal H: On the achievable rate of three-node wireless networks. Proceedings of the IEEE International Conference on Wireless Networks, Communications and Mobile Computing, June 2005, Maui, Hawaii, USA 1: 739-744.Google Scholar
  25. Katti S, Rahul H, Hu W, Katabi D, Medard M, Crowcroft J: XORs in the air: practical wireless network coding. IEEE/ACM Transactions on Networking 2008, 16(3):497-510.View ArticleGoogle Scholar
  26. Zhang S, Liew S: Synchronization analysis in physical layer network coding. Submitted, http://arxiv.org/abs/1001.0069
  27. Rappaport TS: Wireless Communications: Principles and Practice. Prentice-Hall, Englewood Cliffs, NJ, USA; 1996.MATHGoogle Scholar
  28. Proakis JG: Digital Communications. McGraw-Hill, New York, NY, USA;Google Scholar
  29. Liu J, Goeckelt D, Towsley D: Bounds on the gain of network coding and broadcasting in wireless networks. Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07), May 2007, Anchorage, Alaska, USA 724-732.Google Scholar

Copyright

© S. Zhang and S. C. Liew. 2010

This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.