Skip to main content

Selection combining for noncoherent decode-and-forward relay networks

Abstract

This paper studies a new decode-and-forward relaying scheme for a cooperative wireless network composed of one source, K relays, and one destination and with binary frequency-shift keying modulation. A single threshold is employed to select retransmitting relays as follows: a relay retransmits to the destination if its decision variable is larger than the threshold; otherwise, it remains silent. The destination then performs selection combining for the detection of transmitted information. The average end-to-end bit-error-rate (BER) is analytically determined in a closed-form expression. Based on the derived BER, the problem of choosing an optimal threshold or jointly optimal threshold and power allocation to minimize the end-to-end BER is also investigated. Both analytical and simulation results reveal that the obtained optimal threshold scheme or jointly optimal threshold and power-allocation scheme can significantly improve the BER performance compared to a previously proposed scheme.

1 Introduction

Cooperative diversity has recently emerged as a promising technique to combat fading experienced in wireless transmissions. The basic idea behind this technique is that a source node cooperates with other nodes (or relays) in the network to form a virtual multiple antenna system [17], hence providing spatial diversity. Amplify-and-forward (AF) and decode-and-forward (DF) are two well-known protocols to realize cooperative diversity. In AF, the relays amplify and forward the received signals to the destination. In DF, the received signal at each relay node is first decoded, and then remodulated and retransmitted. Unlike the AF protocol, it is not simple to provide cooperative diversity with the DF protocol. This is due to possible retransmission of erroneously decoded bits of the message by the relays in the DF protocol [1, 4, 8, 9].

On the other hand, the issue of how to efficiently combine multiple received signals at the receiver is of practical interest and has been intensively studied, both in point-to-point and relay communication systems. Typical combining schemes include maximal ratio combining (MRC), equal gain combining (EGC), and selection combining (SC). Since SC processes only one of the received signals, it is the simplest when compared to other combining schemes [10]. In fact, SC scheme has been widely investigated for coherent DF cooperative systems in which a perfect knowledge of channel state information (CSI) is available at the receivers (at relays and destination) [1114]. Moreover, the SC technique is especially suitable in noncoherent communications because instead of selecting the largest signal-to-noise ratio as in coherent systems, the signal branch with the largest signal-plus-noise power can be selected. Due to these advantages, the SC scheme for binary noncoherent frequency-shift keying (FSK) in point-to-point communications has also been well studied in the literature [1518].

The majority of research works in wireless relay networks is for coherent communications. Since obtaining the channel state information (CSI) in coherent communications might be unrealistic in fast fading environment and in multiple-relay networks, there have been some recent works that exploit noncoherent modulation and demodulation in cooperative networks [1925]. In what follows, related works and the contributions of this paper are described.

1.1 Related works

Differential phase-shift keying (DPSK) has been studied for both AF and DF protocols in [1922]. However, with the DF protocol in [20], the authors considered an ideal case that the relay is able to know exactly whether each decoded symbol is correct. The works in [21, 22] examine a very simple cooperative system with one source, one relay, and one destination node. Optimal resource allocation has been studied for noncoherent systems in [23, 24] to further improve the error performance of the system when DPSK is employed.

A framework of noncoherent cooperative relaying for the DF protocol employing FSK has been studied in [25] in which the maximum likelihood (ML) demodulation was developed to detect the signals at the destination. Due to the nonlinearity form and high complexity of the ML scheme, a suboptimal piecewise-linear (PL) scheme was also proposed in [25] and shown to perform very close to the ML scheme. It is noted, however, that a closed-form BER approximation for either the ML or PL scheme in [25] is not readily available for networks with more than two relays. Furthermore, the BER performance with either ML or PL demodulation can still suffer from the error propagation phenomenon [6].

To address the issue of error propagation and inspired by the work in [6], reference [26] examines an adaptive noncoherent relaying scheme in which two thresholds are employed at the relays and destination as follows. One threshold is used to select retransmitting relays: a relay retransmits to the destination if its decision variable is larger than the threshold, otherwise it remains silent. The other threshold is used at the destination for detection: the destination marks a relay as a retransmitting relay if the decision variable corresponding to the relay is larger than the threshold, otherwise, the destination marks it as a silent relay. Then, the destination simply combines (in a ML sense) the signals from the retransmitting relays and the signal from the source to make the final decision. Numerical results in [26] show that, with optimal threshold values, the cooperative relaying scheme proposed in [26] can significantly improve the error performance over the schemes in [25]. Unfortunately, closed-form BER expressions are only available for the single-relay and two-relay networks in [26]. As such, the important task of optimizing the threshold values has to rely on numerical search for networks with more than two relays.

1.2 Contributions

This paper is also concerned with a threshold-based relaying scheme for noncoherent DF cooperative networks in which binary FSK (BFSK) is employed at the source and relays. The transmission protocol considered is as follows. After receiving the signal from the source in the first phase, each relay decides to retransmit the decoded information if its decision variable is higher than a threshold. Otherwise, it remains silent in the second phase. At the destination, selection combining is employed to select the "strongest" received signal to decode.

It should be pointed out that one practical aspect of the proposed scheme is that the destination has no information on whether a particular relay retransmits or remains silent in the second phase. This means that the destination does not known whether a received signal is from a retransmitting relay or a silent relay. Therefore, the destination might select a signal from the relay that remains silent to decode. However, this possibility happens with a very small probability due to the selection rule implemented at the destination.

The main difference between the protocol in this paper and the one in [26] is that no threshold is needed and selection combining is performed at the destination. This simpler protocol (as compared to the protocol in [26]) also allows one to obtain a closed-form BER expression for a general network with K relays. This leads to a convenient optimization of threshold and power allocation among K relays. Numerical results show that our BER expression is accurate. Moreover, our proposed protocol provides a superior performance under all channel conditions with similar complexity compared to the piecewise-linear (PL) receiver in [25].

1.3 Organization of the paper

The remainder of this paper is organized as follows. Section 2 describes the system model. Section 3 presents the BER computation and discusses how to find the optimal threshold and power allocation. Numerical and simulation results are presented in Section 4. Finally, Section 5 concludes the paper.

2 System model

Consider a wireless communication system in which the source node sends its message to the destination node through K relay nodes. All nodes operate in a half-duplex mode, i.e., a node cannot transmit and receive simultaneously and DF protocol is employed at the relays. We consider that the relays retransmit signals to the destination in orthogonal channelsa and there is no direct link between the source and destination. For convenience, the source, relays, and destination are denoted and indexed by node 0, node i, i = 1, ..., K, and node K + 1, respectively.

Signal transmission from the source to destination is completed in two phases as illustrated in Figure 1. In the first phase, the source broadcasts a BFSK signal and the baseband received signals at node i, i = 1, ..., K, are written as

Figure 1
figure 1

System description of the proposed scheme.

y 0 , i , 0 = ( 1 - x 0 ) E 0 h 0 , i + n 0 , i , 0 ,
(1)
y 0 , i , 1 = x 0 E 0 h 0 , i + n 0 , i , 1 ,
(2)

where h0,iand n0,i,kdenote the channel fading coefficient between node 0 and node i and the noise component at node i, respectively. E0 is the average transmitted symbol energy of the source. The third subscript k {0, 1} in (1) and (2) denotes the two frequency subbands used in BFSK signaling. Furthermore, the source symbol x0 = 0 if the first frequency subband is used and x0 = 1 if the second frequency subband is used.

With noncoherent BFSK, signal detection at the i th relay node is carried out by simply comparing the signal energies received in the two subbands. As such the instantaneous magnitude of the energy difference in the two subbands, namely θ0,i= ||y0,i,0|2 - |y0,i,1|2|, serves as a reliability measure of the detection at the i th relay. Similar to [26], node i only decodes and retransmits a BFSK signal if θ 0 , i > θ r th , where θ r th is some fixed threshold value to be determined. If node i transmits in the second phase, the received signals at the destination in the two subbands are given by

y i , K + 1 , 0 = ( 1 - x i ) E i h i , K + 1 + n i , K + 1 , 0 ,
(3)
y i , K + 1 , 1 = x i E i h i , K + 1 + n i , K + 1 , 1 ,
(4)

where E i is the average transmitted symbol energy sent by node i and ni,K+1,kis the noise component at the destination in the second phase. Note that if the i th relay makes a correct detection, then x i = x0. Otherwise x i x0. On the other hand, when θ 0 , i < θ r th , node i remains silent. In this case, the outputs in the two subbands are given by

y i , K + 1 , 0 = n i , K + 1 , 0 ,
(5)
y i , K + 1 , 1 = n i , K + 1 , 1 .
(6)

After receiving all the signals from the relays, the destination chooses only one signal with the largest magnitude of the energy difference in the two subbands to decode. In other words, the signal from node i is chosen if maxjiθj,K+1< θi,K+1where θj,K+1= ||yj,K+1,0|2 - |yj,K+1,1|2|, j = 1, ..., K. The detector is of the form:

Λ = y i , K + 1 , 0 2 - y i , K + 1 , 1 2 1 0 0 .
(7)

The next section derives the average BER for a general network, i.e., a network with arbitrary qualities of source-relay and relay-destination links. Using the derived BER, the optimum thresholds can then be numerically found.

3 BER analysis and optimization of threshold and power allocation

Let the noise components at the relays and destination be modeled asb i.i.d. CN ( 0 , N 0 ) random variables. The channel between any two nodes is Rayleigh flat fading, modeled as CN ( 0 , σ i , j 2 ) , where i, j refer to transmit and receive nodes, respectively. The instantaneous received SNR for the transmission from node i to node j is given as γi,j= E i |hi,j|2/N0 and the corresponding average SNR is γ ̄ i , j = E i σ i , j 2 N 0 . With Rayleigh fading, the pdf of γi,jis f i , j ( γ i , j ) = 1 γ ̄ i , j e - γ i , j γ ̄ i , j .

Recall that the destination selects only one signal among K received signals to decode. The selected relay might forward a correct bit, an incorrect bit or remain silent in the second phase. Therefore, there are three different cases that result in different BERs at the destination. We parameterize the three cases by Θ {1, 2, 3} where Θ = 1, Θ = 2, and Θ = 3 are the events that the selected relay forwards a correct bit, an incorrect bit and remains silent, respectively. By using the law of total probability, the average BER with a given threshold θ r th can be expressed as

BER ( θ r th ) = i = 1 3 P ( ε , Θ = i )
(8)

where P(ε, Θ = i) is the average BER at the destination in the case Θ = i.

To compute all the terms in (8), divide the set Srelay = {1, 2, ..., K} of K relays into three disjoint subsets Ω1, Ω2, and Ω3, which include the relays that forward a correct bit, an incorrect bit, and remain silent in the second phase, respectively. Clearly, K = | Ω1| + | Ω2| + | Ω3| where | Ω| denotes the cardinality of set Ω. Without loss of generality, assume that the transmitted information bit is "0". Also let W m (m Ω1), V n (n Ω2) and R l (l Ω3) denote the energy differences in the two subbands measured at the destination for relay-destination links involving the relays in sets Ω1, Ω2 and Ω3, respectively. Obviously P (ε, Θ = i) can be calculated as follows:

P ( ε , Θ = i ) = Ω 1 P ( S relay ) Ω 2 P ( S relay \ Ω 1 ) P Ω 1 , Ω 2 , Ω 3 ( ε , Θ = i ) P ( Ω 1 , Ω 2 , Ω 3 ) .
(9)

where P Ω 1 , Ω 2 , Ω 3 ( ε , Θ = i ) and P1, Ω2, Ω3) denote the conditional BER and case probability for the specific set (Ω1, Ω2, Ω3). The notation P ( A ) means the power set of its argument, i.e., the set of all its subsets (including the empty set ). A\B denotes the relative complement of the set B in the set A.

First, according to Lemmas 2 and 4 in [26], the probability density functions (pdfs) of W m , V n and R l are given, respectively, by

f W m ( x ) = 1 2 + γ ̄ m , K + 1 e - x ( 1 + γ ̄ m , K + 1 ) , x 0 1 2 + γ ̄ m , K + 1 e x , x < 0
(10)
f V n ( x ) = 1 2 + γ ̄ n , K + 1 e - x , x 0 1 2 + γ ̄ n , K + 1 e x ( 1 + γ ̄ 2 ) , x < 0
(11)
f R l ( x ) = 1 2 e - x , x 0 1 2 e x , x < 0
(12)

It then follows that

f | W m | ( x ) = 1 2 + γ ̄ m , K + 1 ( e - x ( 1 + γ ̄ m , K + 1 ) + e - x ) , x 0
(13)
f | V n | ( x ) = 1 2 + γ ̄ n , K + 1 ( e - x ( 1 + γ ̄ n , K + 1 ) + e - x ) , x 0
(14)
f | R l | ( x ) = e - x , x 0
(15)

3.1 Case probability

The probability of occurrence for the specific set {Ω1, Ω2, Ω3} can be determined to be

P ( Ω 1 , Ω 2 , Ω 3 ) = i ( Ω 1 Ω 2 ) [ 1 - I 1 ( θ r th , γ ̄ 0 , i ) ] i Ω 1 [ 1 - I 2 ( θ r th , γ ̄ 0 , i ) ] (1) × i Ω 2 I 2 ( θ r th , γ ̄ 0 , i ) i Ω 3 I 1 ( θ r th , γ ̄ 0 , i ) (2) (3)
(16)

where AB denotes the union of sets A and B. The function I 1 ( θ r th , γ ̄ 0 , i ) is the probability that the magnitude of the energy difference in the two subbands at node i is smaller than the threshold, i.e., θ 0 , i < θ r th . The pdf of θ0,iis given in Lemma 2 of [26], which is used to obtain the following expression for I 1 ( θ r th , γ ̄ 0 , i ) :

I 1 ( θ r th , γ ̄ 0 , i ) = 0 θ r th f θ 0 , i ( x ) d x = 0 θ r th 1 2 + γ ̄ 0 , i ( e - x ( 1 + γ ̄ 0 , i ) + e - x ) d x (1) = 1 + γ ̄ 0 , i 2 + γ ̄ 0 , i [ 1 - e - θ r th ( 1 + γ ̄ 0 , i ) ] + 1 2 + γ ̄ 0 , i [ 1 - e - θ r th ] (2) (3)
(17)

On the other hand, I 2 ( θ r th , γ ̄ 0 , i ) is the probability of error at node i, i = 1, ..., K, given that the magnitude of the energy difference in the two subbands is larger than the threshold, i.e., θ 0 , i > θ r th . Therefore, I 2 ( θ r th , γ ̄ 0 , i ) can be computed as

I 2 ( θ r th , γ ̄ 0 , i ) = 1 1 - I 1 ( θ r th , γ ̄ 0 , i ) - - θ r th 1 2 + γ ̄ 0 , i e - x d x = 1 2 + γ ̄ 0 , i 1 1 - I 1 ( θ r th , γ ̄ 0 , i ) e - θ r th
(18)

3.2 Case Θ = 1

Next we compute the average BER for Θ = 1 conditioned on {Ω1, Ω2, Ω3}. In this case, the selected relay forwards a correct bit. This means that an error occurs at the destination if among the K statistics W m , V n and R l , the one with the largest magnitude is one of W m and negative. Thus, the conditional BER can be written as

P Ω 1 , Ω 2 , Ω 3 ( ε , Θ = 1 ) = m Ω 1 P max i m ( | W i | , | V n | , | R l | ) < | W m | , W m < 0 = m Ω 1 P max i m ( | W i | , | V n | , | R l | ) + W m < 0 = m Ω 1 P W ¯ m + W m < 0
(19)

where W ¯ m = max i m ( | W i | , | V n | , | R l | ) . The pdf of W ¯ m can be found as follows:

f W ¯ m ( x ) = d d x P ( W ¯ m < x ) = d d x i ( Ω 1 \ { m } ) F | W i | ( x ) n Ω 2 F | V n | ( x ) l Ω 3 F | R l | ( x ) = i ( ( Ω 1 Ω 2 ) \ { m } ) f | W i | ( x ) j ( ( Ω 1 Ω 2 ) \ { m , i } ) F | W j | ( x ) l Ω 3 F | R l | ( x ) + i Ω 3 f | R i | ( x ) l ( Ω 3 \ { i } ) F | R l | ( x ) j ( ( Ω 1 Ω 2 ) \ { m } ) F | W j | ( x )
(20)

It then follows that

P Ω 1 , Ω 2 , Ω 3 ( ε , Θ = 1 ) = m Ω 1 z = 0 - - z f W ¯ m ( z ) f W m ( x ) d x d z = m Ω 1 z = 0 f W ¯ m ( z ) 1 2 + γ ̄ m , K + 1 e - z d z = t ( Ω 1 Ω 2 ) 1 2 + γ ̄ t , K + 1 l = 0 L L l m Ω 1 i ( ( Ω 1 , Ω 2 ) \ { m } ) ( G 1 G 2 G 3 ) = ( ( Ω 1 Ω 2 ) \ { i , m } ) ( - 1 ) | G 2 | + | G 3 | + l t G 1 ( 2 + γ ̄ t , K + 1 ) t G 2 ( 1 + γ ̄ t , K + 1 ) × 1 t ( G 2 { i } ) 1 1 + γ ̄ t , K + 1 + | G 3 | + l + 1 + 1 t G 2 1 1 + γ ̄ t , K + 1 + | G 3 | + l + 2 + t ( Ω 1 Ω 2 ) 1 2 + γ ̄ t , K + 1 l = 0 L - 1 L - 1 l m Ω 1 i Ω 3 ( G 1 G 2 G 3 ) = ( ( Ω 1 Ω 2 ) \ { m } ) ( - 1 ) | G 2 | + | G 3 | + l t G 1 ( 2 + γ ̄ t , K + 1 ) t G 2 ( 1 + γ ̄ t , K + 1 ) 1 t G 2 1 1 + γ ̄ t , K + 1 + | G 3 | + l + 2 .
(21)

where (G1 G2 G3) = Ω means that G1, G2 and G3 are three disjoint subsets of P ( Ω ) and the union of those disjoint subsets is Ω.

3.3 Case Ω = 2

In this case, the selected relay forwards an incorrect bit, i.e., an error occurs if among the K statistics W m , V n and R l , the one with the largest magnitude is one of V n and negative. Let V ¯ n = max i n ( | W m | , | V i | , | R l | ) . It can be shown that the pdf of V ¯ n is as (20) by replacing m by n. Similar to the case Θ = 1, one has

P Ω 1 , Ω 2 , Ω 3 ( ε , Θ = 2 ) = n Ω 2 z = 0 - - z f V ¯ n ( z ) f V n ( x ) d x d z = n Ω 2 z = 0 f V ¯ n ( z ) 1 2 + γ ̄ n , K + 1 e - z ( 1 + γ ̄ n , K + 1 ) d z = t ( Ω 1 Ω 2 ) 1 2 + γ ̄ t , K + 1 l = 0 L L l n Ω 2 i ( ( Ω 1 , Ω 2 ) \ { n } ) ( G 1 G 2 G 3 ) = ( ( Ω 1 Ω 2 ) \ { i , n } ) ( - 1 ) | G 2 | + | G 3 | + l t G 1 ( 2 + γ ̄ t , K + 1 ) t ( G 2 { n } ) ( 1 + γ ̄ t , K + 1 × 1 t ( G 2 { i , n } ) 1 1 + γ ̄ t , K + 1 + | G 3 | + l + 1 t ( G 2 { n } ) 1 1 + γ ̄ t , K + 1 + | G 3 | + l + 1 + t ( Ω 1 Ω 2 ) 1 2 + γ ̄ t , K + 1 l = 0 L - 1 L - 1 l n Ω 2 i Ω 3 ( G 1 G 2 G 3 ) = ( ( Ω 1 , Ω 2 ) \ { n } ) ( - 1 ) | G 2 | + | G 3 | + l t G 1 ( 2 + γ ̄ t , K + 1 ) t ( G 2 { n } ) ( 1 + γ ̄ t , K + 1 ) 1 t ( G 2 { n } ) 1 1 + γ ̄ t , K + 1 + | G 3 | + l + 1
(22)

3.4 Case Θ = 3

Different from cases Θ = 1 and Θ = 2, in this case, the selected relay remains silent in the second phase, i.e., it is one of the relays in Ω3. The conditional BER is

P Ω 1 , Ω 2 , Ω 3 ( ε , Θ = 3 ) = l Ω 3 P max i l ( | W m | , | V n | , | R i | ) < | R l | , R l < 0 = l Ω 3 P max i l ( | W m | , | V n | , | R i | ) + R l < 0 = l Ω 3 P R ¯ l + R l < 0
(23)

where R ¯ l = max i l ( | W m | , | V n | , | R i | ) . The pdf of R ¯ l can be found as follows:

f R ¯ l ( x ) = d d x P ( R ¯ l < x ) = d d x m Ω 1 F | W m | ( x ) n Ω 2 F | V n | ( x ) i ( Ω 3 \ { l } ) F | R i | ( x ) = m ( Ω 1 Ω 2 ) f | W m | ( x ) j ( ( Ω 1 Ω 2 ) \ { m } ) F | W j | ( x ) i ( Ω 3 \ { l } ) F | R i | ( x ) + i ( Ω 3 \ { l } ) f | R i | ( x ) j ( Ω 3 \ { i , l } ) F | R j | ( x ) m ( Ω 1 Ω 2 ) F | W m | ( x )
(24)

Therefore,

P Ω 1 , Ω 2 , Ω 3 ( ε , Θ = 3 ) = l Ω 3 z = 0 - - z f R ¯ l ( z ) f R l ( x ) d x d z = l Ω 3 z = 0 f R ¯ l ( z ) 1 2 e - z d z = L 2 t ( Ω 1 Ω 2 ) 1 2 + γ ̄ t , K + 1 l = 0 L - 1 L - 1 l i ( Ω 1 Ω 2 ) ( G 1 G 2 G 3 ) = ( ( Ω 1 Ω 2 ) \ { i } ) ( - 1 ) | G 2 | + | G 3 | + l t G 1 ( 2 + γ ̄ t , K + 1 ) t G 2 ( 1 + γ ̄ t , K + 1 1 t ( G 2 { i } ) 1 1 + γ ̄ t , K + 1 + | G 3 | + l + 1 + 1 t G 2 1 1 + γ ̄ t , K + 1 + | G 3 | + l + 2 + L ( L - 1 ) 2 t ( Ω 1 Ω 2 ) 1 2 + γ ̄ t , K + 1 l = 0 L - 2 L - 2 l ( G 1 G 2 G 3 ) = ( Ω 1 Ω 2 ) ( - 1 ) | G 2 | + | G 3 | + l t G 1 ( 2 + γ ̄ t , K + 1 ) t G 2 ( 1 + γ ̄ t , K + 1 ) 1 t G 2 1 1 + γ ̄ t , K + 1 + | G 3 | + l + 2
(25)

To summarize, all the expressions involved in the final expression of the average BER in (8) can be calculated analytically. Although final expression is quite involved and presents limited insights, it is simple enough to use in optimizing the threshold θ r th to minimize the average BER of the network.

First, for a fixed power allocation among the source and relays, the optimization of the threshold value can be set up as follows:

θ ^ r th = arg min θ r th BER ( θ r th ) .
(26)

On the other hand, the total transmitted power of the network can also be optimally allocated to the source and relays. To this end, let the total signal energies at the source and relays be Etotal and the maximum signal energy that can be allocated to node i as Ei, max. Then, the joint optimization of the threshold θ r th and power to minimize the average BER are as follows:

( θ ^ r th , E ^ 0 , E ^ 1 , , E ^ K ) = arg min ( θ r th , E 0 , E 1 , . . . , E K ) BER ( θ r th , E 0 , E 1 , , E K ) , subject to 0 E i E i , max , i = 0 , , K i = 0 K E i = E tota 1
(27)

With the closed-form expression of the average BER, the above optimization problems can be solved by optimization techniques such as the Lagrange method [27]. Unfortunately, the exponential terms in the final expressions render a closed-from solution intractable. The optimization problems in (26) and (27) are simply solved with the MATLAB Optimization Toolbox.c It should be pointed out that, without proving the BER function is convex, the solutions obtained by MATLAB might only locally optimum solutions. Nevertheless, plotting the BER function versus the threshold value for various power allocations shows that the objective function is convex. This strongly suggests that the solutions are globally optimum. Moreover, since the average BER formulated in (8) only requires information on the average SNRs of the source-relay and relay-destination links, the optimization problems can be solved off-line for typical sets of average SNRs and the obtained optimal threshold and/or power ratio values are stored in a look-up table.

4 Simulation results

In all the simulations the noise components at the relays and destination are modeled as i.i.d.

CN ( 0 , 1 ) random variables. For convenience, define σ 2 = [ σ 0 , 1 2 σ 0 , K 2 σ 1 , K + 1 2 σ K , K + 1 2 ] . Figure 2 plots the average BERs at the destination for different channel conditions and different number of relays. Here the threshold is simply chosen as θ r th =2 to verify that our BER analysis is valid for any threshold value. The transmitted powers are set to be the same for the source and relays. The figure shows that the analytical (shown in lines) and simulation (shown as marker symbols) results are identical, hence verifying our analysis in Section 3.

Figure 2
figure 2

BERs of multiple-relay cooperative networks. Exact analytical values are shown in lines and simulation results are shown as marker symbols.

Next, Figure 3 compares the performance of the proposed scheme with that of PL scheme and the scheme in [26] in a two-relay network. The channel variances of all the transmission links in the network are set to be σ2 = [1.5 1.5 1.5 1.5]. The node energy constraints are E0, max = 0.6Etotal, Ei, max= 0.3Etotal, i = 1, 2, 3. The figure shows that our proposed scheme with selection combining outperforms the PL scheme. This is expected since the continuous retransmission of relays in the PL scheme causes error propagation and hence limits its BER performance. Furthermore, it can also be seen that the relaying scheme proposed in this paper performs the same as the scheme in [26] under both cases of fixed and optimal power allocations. This is not a surprising observation either as it can be verified that in a two-relay network, whether selecting the best received signal or combining two received signals does not affect the decision at the destination.d

Figure 3
figure 3

BERs of a two-relay network with different schemes when σ2 = [1.5 1.5 1.5 1.5].

Figure 4 shows the average BERs obtained by simulation for three different schemes in a three-relay cooperative network.e Here σ2 = [0.5 1.0 2.0 1.0 1.5 2.0]. From the figure, both the optimal threshold scheme and jointly optimal threshold and power-allocation scheme achieve better BER performances compared to the PL scheme. The percentages of total power spent for node 0, 1, 2, and 3 are 52.47, 12.61, 15.59, and 19.33%, respectively when the average power per node is 20 dB. This optimum power allocation is reasonable intuitively satisfying since what it does is to allocate a big portion of the power to the source to reduce decoding errors at the relays. Then, more reliable relays are accordingly allocated more powers since the destination is expected to select the signal from the relay that forwards a correct bit. Similar results are observed for other values of the total power.

Figure 4
figure 4

BERs of a three-relay network with different schemes when σ2 = [0.5 1.0 2.0 1.0 1.5 2.0].

Figure 5 presents performance improvement of the proposed scheme in a five-relay network when the variances of Rayleigh fading channels are set to be σ2 = [3.5 2.5 0.1 1.5 0.4 3.5 2.5 0.1 1.5 0.4]. The node energy constraints are set to be E0, max = 0.6Etotal, Ei, max= 0.3Etotal, i = 1, ..., 5. An SNR gain of about 3 dB is observed at the BER level of 10-6 by the proposed scheme with the optimal threshold value when compared to the PL scheme. The figure also shows that jointly optimizing the threshold and power-allocation scheme can be further beneficial in the proposed network. Specifically a further gain of 2 dB can be realized when compared to the case of solely optimizing the threshold value. The results presented in Figure 5 are also intuitively satisfying. Since the relays are geographically distributed, the PL scheme suffers from more decision errors made at the relays that are far from the source. Setting a proper threshold at the relays and/or re-allocating the power between the source and the relays is therefore beneficial in this situation.

Figure 5
figure 5

BERs of a five-relay network with different schemes when σ2 = [3.5 2.5 0.1 1.5 0.4 3.5 2.5 0.1 1.5 0.4].

It should be pointed out that the proposed scheme can actually save some power compared to the PL scheme (similar to the scheme with two thresholds proposed in [26]). This has not been incorporated in the BER plots in Figures 3, 4 and 5, where the BER curves are plotted versus the average power assigned per node, rather than the average power consumed per node. Such a power saving is a direct consequence of the fact that a relay might be silent in the second phase. However, numerical results indicate that the power saving is significant only at low/medium SNR and without power-allocation optimization.f This is expected since a relay likely makes more errors at low/medium SNR and therefore remains silent in the second phase. On the other hand, with the joint optimization of the threshold and power ratio, more power will be allocated to the source to reduce decoding error at the relays, and hence the relays are more likely to retransmit in the second phase.

Finally, it should be mentioned that, in general, the diversity order of the network depends on the chosen threshold value. Unfortunately, a theoretical analysis of the diversity order is not available. Nevertheless, the obtained BER expression is simple enough to plot and one can examine the diversity order by observing the BER curve. In fact, examining the BER curves indicates that the proposed scheme (with optimal threshold/power allocation) achieves the full diversity order.

5 Conclusion

In this paper, we have obtained the average BER expression for data transmission over a noncoherent cooperative network with K + 2 nodes. BFSK is employed at both the source and relays to facilitate noncoherent communications. A single threshold is employed to select retransmitting relays. A relay retransmits the decoded signal to the destination if its decision variable is larger than a threshold. Otherwise, it remains silent. The destination chooses the received signal with the largest decision variable to decode the transmitted information (i.e., selection combining). With the obtained closed-form BER expression, the optimal threshold or jointly optimal threshold and power allocation are chosen to minimize the average BER. Simulation results were presented to corroborate the analysis. Performance comparison reveals that the proposed scheme outperforms the conventional scheme with a similar complexity.

Endnotes

aConsidering orthogonal channels implies that one needs to trade multiplexing gain for error performance. b CN ( 0 , σ 2 ) denotes a circularly symmetric complex Gaussian random variable with variance σ2. cSpecifically, we made use of the routine "fmincon", which is designed to find the minimum of a given constrained nonlinear multivariable function. dWithout loss of generality, assume that the first branch is selected to decode the transmitted information, i.e., θ1,3 > θ2,3. The decision is of the form: Λ SC =| y 1 , 3 , 0 | 2 -| y 1 , 3 , 1 | 2 1 0 0. With the scheme in [26], the decision is as Λ [ 2 6 ] = y 1 , 3 , 0 2 - y 1 , 3 , 1 2 + y 2 , 3 , 0 2 - y 2 , 3 , 1 2 1 0 0. One can easily verify that both decisions give the same result as follows: θ1,3 > θ2,3 (|y1,3,0|2 - |y1,3,1|2 + |y2,3,0|2 - |y2,3,1|2) (|y1,3,0|2 - |y1,3,1|2 - |y2,3,0|2 + |y2,3,1|2) > 0 Λ[26] (2ΛSC - Λ[26]) > 0. It means that if Λ[26] > 0, then ΛSC > 0. Otherwise, if Λ[26] < 0, then ΛSC < 0. eWe are aware that the comparison between the PL scheme and jointly optimal threshold and power-allocation scheme might be unfair. Since reference [25] does not provide an average BER expression in a cooperative network with more than one relay, it is not possible to systematically obtain the optimal power allocation for the PL scheme. However, we believe that our proposed scheme has a better BER performance than the PL scheme with/without optimal power allocation. fTo keep Figures 3, 4 and 5 readable the BER curves taking into account power saving are not included.

References

  1. Laneman J, Wornell G: Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks. IEEE Trans Inform Theory 2003, 49: 2415-2425. 10.1109/TIT.2003.817829

    Article  MathSciNet  MATH  Google Scholar 

  2. Sendonaris A, Erkip E, Aazhang B: User cooperation diversity, Part I: system description. IEEE Trans Commun 2003, 51(11):1927-1938. 10.1109/TCOMM.2003.818096

    Article  Google Scholar 

  3. Sendonaris A, Erkip E, Aazhang B: User cooperation diversity, Part II: Implementation aspects and performance analysis. IEEE Trans Commun 2003, 51(11):1939-1948. 10.1109/TCOMM.2003.819238

    Article  Google Scholar 

  4. Bletsas A, Khisti A, Reed D, Lippman A: A simple cooperative diversity method based on network path selection. IEEE J Sel Areas Commun 2006, 24: 659-672.

    Article  Google Scholar 

  5. Michalopoulos D, Karagiannidis G: Performance analysis of single relay selection in Rayleigh fading. IEEE Trans Wirel Commun 2008, 7: 3718-3724.

    Article  Google Scholar 

  6. Onat F, Adinoyi A, Fan Y, Yanikomeroglu H, Thompson J, Marsland I: Threshold selection for SNR-based selective digital relaying in cooperative wireless networks. IEEE Trans Wirel Commun 2008, 7: 4226-4237.

    Article  Google Scholar 

  7. Onat F, Fan Y, Yanikomeroglu H, Thompson J: Asymptotic BER analysis of threshold digital relaying schemes in cooperative wireless systems. IEEE Trans Wirel Commun 2008, 7: 4938-4947.

    Article  Google Scholar 

  8. Laneman J, Tse D, Wornell G: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Trans Inf Theory 2004, 50: 3062-3080. 10.1109/TIT.2004.838089

    Article  MathSciNet  MATH  Google Scholar 

  9. Bletsas A, Shin H, Win M: Cooperative communications with outage-optimal opportunistic relaying. IEEE Trans Wirel Commun 2007, 6: 3450-3460.

    Article  Google Scholar 

  10. Simon MK, Alouini M-S: Digital Communication Over Fading Channels. Wiley, New York; 2005.

    Google Scholar 

  11. Hu J, Beaulieui N: Performance analysis of decode-and-forward relaying with selection combining. IEEE Commun Lett 2007, 11(6):489-491.

    Article  Google Scholar 

  12. Selvaraj M, Mallik R: Error analysis of the decode and forward protocol with selection combining. IEEE Trans Wirel Commun 2009, 8(6):3086-3094.

    Article  Google Scholar 

  13. Selvaraj M, Mallik R: Scaled selection combining based cooperative diversity system with decode and forward relaying. IEEE Trans Veh Technol 2010, 59(9):4388-4399.

    Article  Google Scholar 

  14. Ikki S, Ahmed M: Performance analysis of generalized selection combining for decode-and-forward cooperative-diversity networks. Proceedings of IEEE Vehicular Technology Conference 2010, 1-5.

    Google Scholar 

  15. Chyi G-T, Proakis J, Keller C: On the symbol error probability of maximum-selection diversity reception schemes over a Rayleigh fading channel. IEEE Trans Commun 1989, 37: 79-83. 10.1109/26.21658

    Article  Google Scholar 

  16. Neasmith E, Beaulieu N: New results on selection diversity. IEEE Trans Commun 1998, 46: 695-704. 10.1109/26.668745

    Article  Google Scholar 

  17. Annavajjala R, Chockalingam A, Milstein L: Further results on selection combining of binary NCFSK signals in Rayleigh fading channels. IEEE Trans Commun 2004, 52: 939-952. 10.1109/TCOMM.2004.829530

    Article  Google Scholar 

  18. Haghani S, Beaulieu N: M -ary NCFSK with S + N selection combining in Rician fading. IEEE Trans Commun 2006, 54: 491-498.

    Article  Google Scholar 

  19. Himsoon T, Su W, Liu K: Differential transmission for amplify-and-forward cooperative communications. IEEE Signal Process Lett 2005, 12: 597-600.

    Article  Google Scholar 

  20. Himsoon T, Siriwongpairat W, Su W, Liu K: Differential modulation with threshold-based decision combining for cooperative communications. IEEE Trans Signal Process 2007, 55: 3905-3923.

    Article  MathSciNet  Google Scholar 

  21. Zhao Q, Li H: Differential modulation for cooperative wireless systems. IEEE Trans Signal Process 2007, 55: 2273-2283.

    Article  MathSciNet  Google Scholar 

  22. Zhao Q, Li H, Wang P: Performance of cooperative relay with binary modulation in Nakagami- m fading channels. IEEE Trans Veh Technol 2008, 57: 3310-3315.

    Article  Google Scholar 

  23. Cho W, Cao R, Yang L: Optimum resource allocation for amplify-and-forward relay networks with differential modulation. IEEE Trans Signal Process 2008, 56: 5680-5691.

    Article  MathSciNet  Google Scholar 

  24. Cho W, Yang L: Optimum resource allocation for relay networks with differential modulation. IEEE Trans Commun 2008, 56: 531-534.

    Article  MathSciNet  Google Scholar 

  25. Chen D, Laneman J: Modulation and demodulation for cooperative diversity in wireless systems. IEEE Trans Wirel Commun 2006, 5: 1785-1794.

    Article  Google Scholar 

  26. Nguyen HX, Nguyen HH: Adaptive relaying in noncoherent cooperative networks. IEEE Trans Signal Process 2010, 58: 3938-3945.

    Article  MathSciNet  Google Scholar 

  27. Bertsekas DP: Constrained Optimization and Lagrange Multiplier Methods. Athena Scientific, Belmont; 1996.

    MATH  Google Scholar 

Download references

Acknowledgements

This work was supported by an NSERC Discovery Grant.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ha X Nguyen.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors' contributions

HX proposed the new relaying protocol, carried out the simulations and participated in the draft of the manuscript. HH supervised the research and revised the manuscript. All authors read and approved the final manuscript.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Nguyen, H.X., Nguyen, H.H. Selection combining for noncoherent decode-and-forward relay networks. J Wireless Com Network 2011, 106 (2011). https://doi.org/10.1186/1687-1499-2011-106

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1499-2011-106

Keywords