Skip to main content

Outage-optimal opportunistic scheduling with analog network coding in multiuser two-way relay networks

Abstract

This paper investigates the performance of an outage-optimal opportunistic scheduling scheme for a multiuser two-way relay network, wherein an analog network coding-based relay serves multiple pairs of users. Under a Rayleigh flat-fading environment, we derive an exact expression for cumulative distribution function (CDF) of the minimum of the two end-to-end instantaneous signal-to-noise ratios (SNRs) and utilize this to obtain an exact expression for the outage probability of such a greedy scheduling scheme. We then develop a modified scheduler that ensures fairness among user pairs of the considered system. By using a high SNR approximation of derived CDF, we present a simple closed-form expression for outage probability of the overall system and establish that a multiuser diversity of order equal to the number of user pairs is harnessed by the scheme. We also present an efficient power allocation strategy between sources and relay, subject to a total power constraint, that minimizes the outage probability of the overall system. Further, by deriving both upper and lower bound expressions for the average sum-rate of the proposed scheme, we demonstrate that an average sum-rate gain can also be achieved by increasing the number of user pairs in the system. Numerical and simulation results are presented to validate the performance of the proposed scheme.

1 Introduction

Cooperative relaying techniques have recently gained great research interest because of their potential in enhancing the throughput or reliability of wireless networks. Several schemes have been extensively studied in literature to achieve cooperative diversity utilizing the one-way relaying protocol [1]. However, the half-duplex constraint at the relays incurs a spectral efficiency loss in such schemes. Recent research has shown that such a loss can be effectively mitigated by exploiting the idea of network coding [2] in bidirectional communication scenarios [37]. Bidirectional cooperative relaying strategies facilitate information exchange between two users in either four, three, or two time phases via a half-duplex relay. The four-phase protocol follows the conventional approach by requiring two separate time phases for data flow in each direction and hence is spectrally inefficient. However, the bidirectional communication has been shown to be accomplished in even three phases in [37]. In the three-phase protocol (called physical layer network coding (PNC) [6] or time division broadcast (TDBC) [7]), the two users transmit successively in first and second phases, the relay then decodes both the data, applies network coding, and forwards the combined data to both users in the third phase. After canceling the self-interferences (as they are known by the respective users), the intended message can be received at each of the user terminals. Recently, a two-way relaying protocol [8, 9] has emerged as a promising technique to mitigate the spectral efficiency loss of conventional half-duplex relaying systems. In this scheme, the two users communicate bidirectionally (in the absence of a reliable direct link) in just two time phases, namely the multiple access channel (MAC) phase and the broadcast channel (BC) phase. In the first phase (MAC), both users transmit their data simultaneously to the relay, and the relay broadcasts the processed signal to both users in the second phase (BC). When an amplify-and-forward (AF) processing is applied on the superimposed signal received during the MAC phase at the relay, such a scheme is usually termed as analog network coding (ANC) [1013].

The two-phase two-way relaying protocol has also been generalized to a multiuser scenario in which multiple pairs of users communicate bidirection-ally via one or more relays [8, 1418]. The authors in [8, 14] considered several relays or antennas that orthogonalize multiple pairs by a distributed zero-forcing technique. A spread spectrum based interference management scheme wherein each pair shares a common spreading signature, and the relay uses a jointly demodulate-and-XOR forward strategy is proposed in [15]. The information theoretic capacity for such a scheme is studied in [16] and [17] by considering a deterministic channel model and a Gaussian two-pair two-way full-duplex relay network, respectively. To combat interference at each user of such a system, the authors in [18] proposed different beamforming schemes with amplify-and-forward (AF) and quantize-and-forward (QF) strategies at the relay. However, to the best of our knowledge, a performance analysis exploiting multiuser diversity for this system has not been reported so far. Although the two-phase two-way relaying protocol is spectrally efficient, it incurs a penalty in diversity as compared to conventional one-way relaying [1] due to the absence of the direct path. In traditional wireless communications under a multiuser downlink scenario, it has been shown in many publications [19, 20] that opportunistic scheduling of users can provide diversity gains. Therefore, the use of scheduling to harness multiuser diversity is well motivated in the two-way relaying context. Note that such opportunistic access avoids the difficult synchronization issues associated with simultaneous transmission of multiple user pairs, as well as the requirement of large number of antennas at the relay. However, scheduling strategies for such two-way systems are different from the commonly studied downlink scenarios. For this reason, development of good scheduling strategies in the two-way context is of considerable interest.

With the above motivation, we propose in this paper an opportunistic scheduling scheme for a multi-pair ANC-based two-way relay system and evaluate its performance over Rayleigh fading channels. We first consider a greedy scheduler based on minimizing the overall outage probability of the system. Considering channel state information (CSI)- and noise statistics-assisted gain at the relay, we derive an exact expression for the CDF of the minimum of SNRs of the two end-to-end transmissions, which is applicable for the whole SNR region. This facilitates an exact outage performance analysis for the considered greedy scheduling scheme. We then propose a scheduler that ensures fairness among user pairs of the system. By using a high SNR approximation of derived CDF, we obtain a simple closed-form expression for the outage probability of the overall system. Further, we provide an efficient power allocation scheme based on the derived expression that minimizes the system outage probability. In addition, we derive expressions for upper and lower bounds on the average sum-rate of the considered system. Numerical and simulation results illustrate the effectiveness of our analytically derived results and show that the considered scheme achieves performance gain by attaining an order of multiuser diversity equal to the number of user pairs.

The rest of the paper is organized as follows: Section 2 describes the system model. The opportunistic scheduling criteria are formulated in Section 3. The overall system is analyzed in terms of access probability, outage probability, and average sum-rate under Rayleigh fading in Section 4. Section 5 presents numerical and simulation results, and finally, Section 6 concludes the paper.

Notation

We use z ~ C N ( μ , σ 2 ) to denote a complex circular Gaussian random variable z with mean μ and variance σ2. The operators E [ ] , Pr[·], and |·| represent expectation, probability, and absolute value, respectively. denotes the binomial coefficient, ln(·) denotes the natural logarithm, and log(·) refers to log2(·).

2 System descriptions

We consider a multiuser two-way relay network consisting of 2K + 1 single-antenna nodes (K pairs of users and one relay), as depicted in Figure 1. Nodes Ta,kand Tb,kdenote members of k th pair, k {1, 2,..., K}, that want to communicate bidirectionally via a single relay R. All nodes operate in a half-duplex fashion. The communication takes place slot-wise where one time-slot represents the end-to-end transmission duration. In what follows, we consider one time-slot to be comprised of two phases of equal duration, viz., the MAC phase and the BC phase. We assume that the channels for all links are subject to independent, but not necessarily identical frequency-flat Rayleigh fading. Let hl,k(t) denote the channel fading coefficient between node Tl,kand relay R during the t th time-slot, where l {a, b}. We adopt the quasi-static fading-channel model such that hl,k(t) remains constant during a time-slot but independently changes in different time-slots. Since the scheduling policy is determined in each slot, we drop the time index t for notational simplicity. Therefore, hl,kcan be modeled as CN ( 0 , σ l , k 2 ) where σ l , k 2 is the average fading power of the link between Tl,kand R. We further assume that the relay R has perfect global channel state information (CSI) of the network. To facilitate CSI estimation at the users, the relay periodically broadcasts a common pilot signal to all users. Then, each user feeds back that CSI to the relay and assuming channel reciprocity, a scheduling strategy for opportunistic transmission by user pairs can be employed. The user pairs are informed about the scheduling decision through a certain control signal by the relay. The specific scheduling policy will be elaborated upon in Section 3.

Figure 1
figure 1

K-pair two-way relaying system. The solid and broken line arrows indicate data transmissions in orthogonal phases (MAC and BC respectively).

Let us consider that the k th user pair is scheduled for transmission and has access to relay channel resources for a given time-slot. We focus on the two-step ANC protocol whereby the information exchange for the k th pair takes place in two phases of equal time duration. In the first phase (MAC), both users of k th pair simultaneously transmit their data to the relay with equal power P. Note that equal transmit power assumption at the users does not loose generality in diversity performance analysis, as its effect can be included in the average SNR of each channel. With this, the received signal at the relay is given by

y r , k = P h a , k x a , k + P h b , k x b , k + n r , k ,
(1)

where xa,kand xb,kare the transmit symbols having unit energy from the sources Ta,kand Tb,k, respectively, and nr,kis an additive white Gaussian noise (AWGN) at the relay. The AWGN at all nodes is assumed as independent and identically distributed (i.i.d.) CN ( 0 , N 0 ) with the noise variance per dimension is N0/2. Therefore, we define P/N0 as simply the SNR.

During the second phase (BC), the signals received at the destinations Ta,kand Tb,kvia the AF relay can be expressed, respectively, as

y a , k = β k P h a , k h a , k x a , k + β k p h a , k h b , k x b , k + β k h a , k n r , k + n a , k
(2)

and

y b , k = β k P h a , k h b , k x a , k + β k p h b , k h b , k x b , k + β k h b , k n r , k + n b , k ,
(3)

where na,kand nb,kdenote AWGN at the nodes Ta,kand Tb,k, respectively, and β k represents the power-constrained amplifying gain at the relay given by

β k = P r P | h a , k | 2 + P | h b , k | 2 + N 0 ,
(4)

where P r is the transmit power at the relay. The intra-pair interferences in (2) and (3) can be canceled out as they are known at the respective terminals, and hence, the received signals can be re-expressed as

a , k = β k P h a , k h b , k x b , k + β k h a , k n r , k + n a , k
(5)

and

b , k = β k P h a , k h b , k x a , k + β k h b , k n r , k + n b , k .
(6)

The resultant end-to-end instantaneous SNRs at nodes Ta,kand Tb,kare given, respectively, by

γ a , k = P r P N 0 | h a , k | 2 | h b , k | 2 ( P r + P ) | h a , k | 2 + P | h b , k | 2 + N 0
(7)

and

γ b , k = P r P N 0 | h a , k | 2 | h b , k | 2 ( P r + P ) | h b , k | 2 + P | h a , k | 2 + N 0 .
(8)

The corresponding one-sided data-rates are thus given as R a , k = 1 2 log ( 1 + γ a , k ) and R b , k = 1 2 log ( 1 + γ b , k ) . Finally, the sum-rate of k th pair opportunistic transmission is given by

R k sum = R a , k + R b , k = 1 2 log [ ( 1 + γ a , k ) ( 1 + γ b , k ) ] .
(9)

Note that the pre-log factor 1 2 accounts for the fact that intra-pair information exchange takes place in two time phases.

3 Opportunistic scheduling strategy

In this section, we explain a multi-pair scheduling strategy and suggest a selection criteria for the best user pair for the system discussed previously. With perfect global CSI knowledge, the relay determines to service a target user pair in every time-slot. The key issue is how to determine the appropriate metric for channel-aware scheduling among user pairs. We first consider a greedy scheduling policy in which the best user pair k* is chosen among multiple pairs in each time-slot based on the following criterion:

k * = arg max k K { θ k } ,
(10)

where θ k = min(γa,k, γb,k) and K= { 1 , 2 , . . . , K } is the set of user pairs. However, by using the expressions of γa,kand γb,kgiven in (7) and (8), respectively, at a high SNR, one can recognize that the scheduling policy of (10) is equivalent to

k * = arg max k K { ϕ k } ,
(11)

where ϕ k = min(|ha,k|2,|hb,k|2).

The aforementioned greedy scheduling strategy thus selects the user pair for each time-slot with the largest value of the smaller end-to-end instantaneous SNRs. However, users' channels usually have different statistics due to different locations, and a user pair whose terminals are situated far away from the relay is unlikely to be ever selected by the scheduler. Hence, such a greedy scheduling scheme leads to an unfair resource allocation among user pairs, particularly for the case when the pairs are independent and non-identically distributed (i.ni.d.). To address this issue of fairness, the scheduling policy we now propose to use selects the best user pair k* in each time-slot based on the following criterion:

k * = arg max k K θ k θ ̄ k ,
(12)

where θ ̄ k is the average value of θ k for k th user pair in the given time-slot. Normalization by θ ̄ k in (12) is used in order to maintain long-term fairness among user pairs. To facilitate this, the relay keeps updating θ ̄ k in each time-slot. It is not difficult to realize that the pairs having poor channel quality may not have to wait longer to gain access to the relay channel. Considering now that user pairs are independent and identically distributed (i.i.d.), that is, the average values of θ k are identical such that θ ̄ k = θ ̄ for all k, the scheduler policy in (12) is reduced to that stated in (10).

Next, we investigate the performance of the system discussed previously based on multi-pair scheduling policy stated in (10)-(12) in the presence of Rayleigh fading.

4 Performance analysis

First of all, we derive an exact expression for the cumulative distribution function (CDF) of θ k . Then, by approximating the derived CDF in simple closed-form at high SNR, we obtain the expressions for the probability density function (PDF) and the CDF of best user pair as defined in (12) for the fair scheduling scheme. Finally, we analyze the overall system performance in terms of access probability, outage probability, and average sum-rate.

Under Rayleigh fading, |ha,k|2 and |hb,k|2 for any kK are independent but not necessarily identically distributed exponential random variables with parameters 1 σ a , k 2 and 1 σ b , k 2 , respectively. An exact expression for the CDF of θ k is provided in the following theorem.

Theorem 1 The CDF F θ k ( θ ) of θ k for any kK is given by

F θ k ( θ ) = P r [ min ( γ a , k , γ b , k ) < θ ] = P 1 , k + P 2 , k ,
(13)

where P 1,k and P 2,k are given, respectively, by

P 1 , k = 1 - η λ y 1 , k λ x 1 , k + η λ y 1 , k 1 - e - δ η ( λ x 1 , k + η λ y 1 , k ) - λ y 1 , k e - γ ( λ x 1 , k + λ y 1 , k ) n = 0 ( - 1 ) n n ! [ λ x 1 , k γ ( γ + 1 ) ] n ( δ - γ ) n - 1 E n [ λ y 1 , k ( δ - γ ) ]
(14)

and

P 2 , k = 1 - η λ x 2 , k λ y 2 , k + η λ x 2 , k 1 - e - δ η ( λ y 2 , k + η λ x 2 , k ) - λ x 2 , k e - γ ( λ y 2 , k + λ x 2 , k ) n = 0 ( - 1 ) n n ! [ λ y 2 , k γ ( γ + 1 ) ] n ( δ - γ ) n - 1 E n [ λ x 2 , k ( δ - γ ) ] ,
(15)

with λ x 1 , k = N 0 ( P σ a , k 2 ) , λ y 1 , k = N 0 ( ( P + P r ) σ b , k 2 ) , λ x 2 , k = N 0 ( ( P + P r ) σ a , k 2 ) , λ y 2 , k = N 0 ( P σ b , k 2 ) , = θ ( P + P r ) P r , η = ( P + P r ) P , and δ= 1 2 γ ( η + 1 ) + γ 2 ( η + 1 ) 2 + 4 γ η . E n [z] denotes the exponential integral of order n defined in [21, eq. 5.1.4] as E n [ z ] = 1 t - n e - z t d t .

See "Appendix I" for the proof of Theorem 1. It is worth noting that the expressions in (14) and (15) involve only exponentials and exponential integral functions. These can be numerically evaluated with sufficient accuracy using symbolic software packages such as MATHEMATICA and MATLAB. Further, the single infinite series expansion in (14) or (15) can be represented as n = 0 Λ n where Λ n = ( - 1 ) n n ! [ u γ ( γ + 1 ) ] n [ δ - γ ] n - 1 E n [ v ( δ - γ ) ] × v e - γ ( u + v ) denoting the n-th term with u,v { λ x 1 , k , λ x 2 , k , λ y 1 , k , λ y 2 , k } and uv, for and k. Since E n [z] decreases monotonically with n, it can be shown that lim n Λ n + 1 Λ n = lim n u γ ( γ + 1 ) ( δ - η ) ( n + 1 ) E n + 1 [ v ( δ - γ ) ] E n [ v ( δ - γ ) ] < 1 , satisfying the convergence criteria as per the ratio test [22].

Although the expression given by (13) is exact and valid for all values of SNR, it is difficult to facilitate in particular the analysis for the case of fairness in scheduling scheme. We hence focus on deriving a simple closed-form expression of F θ k ( θ ) at high SNR (P N0) in the following Lemma.

Lemma 1 The CDF F θ k ( θ ) of θ k can be approximated at high SNR as

F θ k ( θ ) 1 - e - η N 0 θ P r 1 σ a , k 2 + 1 σ b , k 2 .
(16)

See "Appendix II" for the proof of Lemma 1.

Note that such an approximate expression yields very tight results in the whole SNR region and therefore can be used to make analysis feasible for the case of fairness in scheduling. We make here an interesting remark that θ k in (16) follows an exponential distribution with its mean value θ ̄ k = P r σ a , k 2 σ b , k 2 η N 0 ( σ a , k 2 + σ b , k 2 ) . Moreover, ϕ k in (11) is also exponentially distributed with CDF given by

F ϕ k ( ϕ ) = 1 - e - ϕ 1 σ a , k 2 + 1 σ b , k 2 ,
(17)

where the mean value of ϕ k is given by ϕ ̄ k = σ a , k 2 σ b ; k 2 σ a , k 2 + σ b , k 2 .

Now applying a similar method as in [20], developed for downlink multiuser systems, we can express the PDF and the CDF of the best user pair (with θk*) for the considered fair scheduling system, respectively, as

f θ k * ( θ ) = k = 1 K 1 θ ̄ k f k θ θ ̄ k j=1 j k K F j θ θ ̄ k
(18)

and

F θ k * ( θ ) = k = 1 K 0 θ θ ̄ k f k ( x ) j=1 j k K F j ( x ) d x ,
(19)

where f k (·) and F k (·) are the PDF and the CDF of the normalized variable θ k θ ̄ k for the k th pair, respectively. Using (16), we can express (18) and (19), respectively, as

f θ k * ( θ ) k = 1 K 1 θ ̄ k n = 0 K - 1 K - 1 n ( - 1 ) n e - ( n + 1 ) θ θ ̄ k
(20)

and

F θ k * 1 K k = 1 K 1 - e - θ θ ̄ k K ,
(21)

where the sign denotes the equality in the region of high SNR.

4.1 Access probability

The access probability can be defined as the probability that user pair kK accesses the relay channel in the long run. It can be expressed by

[20]

P k acc = Pr θ k θ ̄ k θ j θ ̄ j j k = 0 1 θ ̄ k f k θ θ ̄ k j=1 j k K F j θ θ ̄ k d θ .
(22)

We can evaluate (22) by using (16) as

P k acc m = 0 K - 1 K - 1 m ( - 1 ) m m + 1 = 1 K m = 0 K - 1 K m + 1 ( - 1 ) m = 1 K .
(23)

Thus, as expected, the scheduling policy in (12) is fair in the sense that each pair k can have equal access probability of 1/K.

4.2 Outage probability

For each user pair, an end-to-end transmission is in outage when either user of the pair is in outage, that is, when either R a , k or R b , k is smaller than the target rate R. Hence, the outage probability for the best pair k* is given by

P k * out = Pr [ R a , k * < R or R b , k * < R ] = Pr [ min ( γ a , k * , γ b , k * ) < γ th ] ,
(24)

where γ th = 2 2 R - 1 is a threshold required for successful decoding at the receiver(s). As such, it is obvious that the considered greedy scheduling scheme minimizes the system outage probability.

Using the definition of best user pair for greedy scheduling scheme in (10) and applying the theory of order statistics [23] with K i.ni.d. random variables, the outage probability in (24) is given as

P k * , greedy out = k = 1 K F θ k ( γ th ) ,
(25)

which can be calculated exactly by using the CDF of θ k as given in (13).

For the fair scheduling scheme stated in (12), we can express the outage probability in (24) by using (21) as

P k * out = F θ k * ( γ th ) 1 K k = 1 K 1 - e - η N 0 γ th P r 1 σ a , k 2 + 1 σ b , k 2 K .
(26)

We now address an efficient power allocation problem to the relay subject to a total power constraint. Specifically for the total end-to-end transmission power P t = 2P + P r , we consider P r = αP t and P= 1 - α 2 P t where α (0,1) denotes the fraction of total power P t allocated to the relay. Henceforth, we define ϱ = P t /N0 as the total SNR. With such power distribution, we can rewrite (26) as

P k * out 1 K k = 1 K 1 - e - ( 1 + α ) γ th α ( 1 - α ) ϱ 1 σ a , k 2 + 1 σ b , k 2 K .
(27)

Now, we can show that the expression of outage probability in (27) is minimized when α= 2 -10.414. It is important to emphasize that this power allocation is independent of σ a , k 2 and σ b , k 2 for all k.

To investigate the asymptotic outage behavior, we can re-express (27) at high total SNR (ϱ → ∞) as

P k * out 1 K ( 1 + α ) γ th α ( 1 - α ) ϱ K k = 1 K 1 σ a , k 2 + 1 σ b , k 2 k ,
(28)

which follows from the approximation e - z z 0 1-z. By using the definition of diversity order as d=- lim ϱ log [ P k * out ( ϱ ) ] log ϱ , we can verify that the proposed scheduling scheme can achieve a multiuser diversity of order K.

4.3 Average sum-rate

For a more tractable sum-rate analysis, the expression in (9) can be approximated at high SNR as

R k sum 1 2 log ( γ a , k γ b , k ) log ( ω k ) + log P r Λ k N 0 ,
(29)

where ω k = | h a , k | 2 | h b , k | 2 | h a , k | 2 + | h b , k | 2 is half of the harmonic mean of channel strengths |ha,k|2 and |hb,k|2, and Λ k = ( | h a , k | 2 + | h b , k | 2 ) 2 ( η | h a , k | 2 + | h b , k | 2 ) ( η | h b , k | 2 + | h a , k | 2 ) .

By applying the bounds 2 η 2 + 1 < Λ k < 1 η for all k [9, Theorem 2], and the well-known bounds for the harmonic mean as 1 2 min ( x , y ) x y x + y <min ( x , y ) [24], we can bound the sum-rate for best pair bidirectional transmission at high SNR as

log ( ϕ k * ) + log P r N 0 2 ( η 2 + 1 ) < R k * sum < log ( ϕ k * ) + log P r N 0 η .
(30)

Therefore, the average sum-rate in (30) is bounded by

E [ log ( ϕ k * ) ] + log P r N 0 2 ( η 2 + 1 ) < R ̄ k * sum < E [ log ( ϕ k * ) ] + log P r N 0 η .
(31)

The expectation term in (31) can be evaluated as follows:

E [ log ( ϕ k * ) ] = 0 log ( ϕ ) f ϕ k * ( ϕ ) d ϕ ,
(32)

where f ϕ k * ( ϕ ) is the PDF of ϕk*, which can be evaluated using (17) in (18) with θ replaced by ϕ as

f ϕ k * ( ϕ ) = k = 1 K 1 ϕ ̄ k n = 0 K - 1 K - 1 n ( - 1 ) n e - ( n + 1 ) ϕ ϕ ̄ k .
(33)

Substituting (33) into (32), we get

E [ log ( ϕ k * ) ] = k = 1 K 1 ϕ ̄ k n = 0 K - 1 K - 1 n ( - 1 ) n 0 log ( ϕ ) e - ( n + 1 ) ϕ ϕ ̄ k d ϕ .
(34)

We can evaluate the integral term in (34) using [25, eq. 4.331.1] to obtain

E [ log ( ϕ k * ) ] = log ( e ) k = 1 K n = 0 K - 1 K - 1 n ( - 1 ) n + 1 n + 1 C + ln n + 1 ϕ ̄ k ,
(35)

where C = 0.577215664... is Euler's constant defined by [25, eq. 8.367.1].

Knowing that n = 0 K - 1 K n + 1 ( - 1 ) n + 1 =-1, we can express (35) as

E [ log ( ϕ k * ) ] = 1 K k = 1 K log ( ϕ ̄ k ) + ζ ( K ) - C log ( e ) ,
(36)

where ζ (K) is a constant not related with SNR or link quality given by

ζ ( K ) = n = 0 K - 1 K n + 1 ( - 1 ) n + 1 log ( n + 1 ) .
(37)

Inserting (36) into (31) and after invoking power assignment as considered previously, we obtain

log ϱ α ( 1 - α ) 2 ( 1 + α ) + 1 K k = 1 K log ( ϕ ̄ k ) + ζ ( K ) - log ( e C ) < R ̄ k * sum < log ϱ α 1 - α 1 + α + 1 K k = 1 K log ( ϕ ̄ k ) + ζ ( K ) - log ( e C ) .
(38)

As ζ(K) > log (eC) for K ≥ 2, the average sum-rate increases with K. It can now be shown easily that the lower bound of average sum-rate is maximized when α ≈ 0.414 (as for outage minimization), whereas the upper bound is maximized when α ≈ 0.618 (as in [9]).

5 Numerical and simulation results

In this section, we present numerical and simulation results to demonstrate the performance of the considered scheme. For numerical evaluations, we use selected channel variances as listed in Table 1 to reflect randomness in K user pairs with nonidentical distributions. This is owing to the fact that different users may be placed at different distances from the relay, and hence, they may have different average SNR values. In the following numerical studies, we assume γth = 1 (for outage probability).

Table 1 Selected values of channel variances over the two hops for i.ni.d. user pairs

Figure 2 shows the outage probability curves for various user pairs with nonidentical θ ̄ k versus total SNR (ϱ) under uniform power distribution among the selected users and the relay (α = 1/3). The exact curves corresponding to the evaluation of (25) for greedy scheduler were obtained by truncating the infinite series over index n in (14) and (15) to first few terms beyond which there is no change in the first seven decimal places of the results. As can be seen from Figure 2, the exact curves match perfectly with the results generated through Monte Carlo simulations, validating our analytical expression. Further, it can be seen that the analytical outage curves for fair scheduling scheme corresponding to the computation of (26) closely approximate the simulated values when the SNR is large. This implies that our approximated expression in (26) can provide good predictions of outage probabilities for fair scheduling scheme in the high SNR regime. The curves in Figure 2, however, illustrate that the greedy scheduling scheme outperforms the fair one. This is expected since fairness in the scheduling scheme results in some performance loss. Moreover, it is obvious from this figure that the overall system attains a multiuser diversity of order K.

Figure 2
figure 2

Outage probabilities of opportunistic scheduling scheme in multiuser two-way relaying with K i.ni.d. pairs.

Figures 3 and 4 demonstrate the outage performance of greedy and fair scheduling schemes, respectively, with different power assignments to the selected relay (by varying α) subject to a total power constraint. We can see that the minimum of the outage probability under both the schemes lies in the range of α between 0.4 and 0.5, regardless of the values of ϱ and channel parameters. Also, as the outage probability is not very sensitive to α in this range, α ≈ 0.4 provides the near-optimal performance for both the schemes. This is in good agreement with the result as derived analytically using the high SNR approximation in Section 4. It is an important result from a practical point of view since such power allocation scheme does not depend on the system/channel parameters.

Figure 3
figure 3

Outage probabilities of greedy scheduling scheme as a function of fraction of total power allocated to the relay.

Figure 4
figure 4

Outage probabilities of fair scheduling scheme as a function of fraction of total power allocated to the relay.

Figure 5 provides a comparison between user pairs with nonidentical and identical distributions in terms of outage probability as a function of K. For a fair comparison, we set up the simulation for i.i.d. case by considering θ ̄ = 1 K k = 1 K θ ̄ k for all k (as all the user pairs are required to have same statistics), so that the sum of θ ̄ k s is equal to K θ ̄ under both cases. Note that for i.i.d. user pairs, both greedy and fair scheduling schemes have the same performance, as stated earlier. It can be observed that i.i.d. pairs achieve better performance than i.ni.d. ones.

Figure 5
figure 5

Comparison of outage probabilities for i.ni.d. and i.i.d. user pairs of opportunistic scheduling scheme in multiuser two-way relaying.

With the same set of parameters, we plot the average sum-rate curves versus the number of pairs K in Figure 6. This figure shows that the average sum-rate performance for two-way relaying can also be improved by including more user pairs in the considered scheme. There is a gap between the bounds and simulation curves throughout the region of high SNR. This is because at high SNR, both γa,kand γb,khave a high probability of having values close to each other, and hence, their harmonic mean does not approximate its upper or lower bound very well. Figure 6 also illustrates that the average sum-rate performance of i.i.d. user pairs is better than that of i.ni.d. pairs.

Figure 6
figure 6

Comparison of average sum-rates for i.ni.d. and i.i.d. user pairs of opportunistic scheduling scheme with fairness in multiuser two-way relaying.

Figures 7 and 8 present a comparison of the performance of the proposed scheme with that of the direct transmission scheme using same scheduling procedure in terms of outage probability and average sum-rate, respectively, as a function of the distance d ab between two users of the best selected pair. We set up the simulation by considering an i.i.d. case with relay location lies midway between the two users so that d ab = 2d a = 2d b , where d a and d b represent the distances of Ta,kand Tb,kfrom R, respectively, for all k. We incorporate the large-scale path loss in the signal propagation with a path loss exponent ν. As such, we can have σ a , k 2 = d a - ν , σ b , k 2 = d b - ν , and σ a b , k 2 = d a b - ν for all k, where σ a b , k 2 denotes the channel variance of direct link between Ta,kand Tb,k. We assume equal power P at all nodes in the network. Further, we consider radio propagation with ν = 3, 4 in practical cases of highly shadowed environment [26]. It can be seen from these figures that the performance of both schemes will degrade with the increasing distance between the users of the selected pair, as expected. However, it is interesting to observe that the considered two-way relaying-based scheduling scheme performs much better than the direct transmission-based scheme in a practical shadowed environment.

Figure 7
figure 7

Comparison of outage performance of proposed scheduling scheme with direct transmission for i.i.d. user pairs.

Figure 8
figure 8

Comparison of average sum-rate performance of proposed scheduling scheme with direct transmission for i.i.d. user pairs.

6 Conclusion and future work

We have investigated the performance of an outage-optimal opportunistic scheduling scheme with fairness for a multi-pair ANC-based two-way relay network over a Rayleigh flat-fading scenario. For the greedy scheduling scheme of user pairs, we derived an exact expression for the outage probability that is valid over entire SNR region. We then proposed a scheduling strategy that ensures fairness among user pairs of the considered system. Based on a high SNR assumption, we derived an approximate expression for the outage probability and the bounds on the average sum-rate of the overall system. It was shown that the proposed scheme achieves performance gain by attaining an order of multiuser diversity equal to the number of user pairs. It is further demonstrated that near-optimal performance can be achieved when about 40% of the available power is assigned to the relay, irrespective of the system parameters.

In the present work, we have analyzed the considered scheduling scheme by assuming perfect channel estimation and no delay between the instants of estimation and best pair transmission. However, estimation errors and scheduling delays do exist in practical systems, and analyzing their effects on the performance is a subject for future work.

Appendix I

Proof of Theorem 1

We can express

Pr [ min ( γ a , k , γ b , k ) < θ ] = P 1 , k + P 2 , k ,
(39)

where P1,k= Pr[γb,k<θ, γb,k< γa,k] and P2,k= Pr[γa,k<θ, γa,k<γb,k]. Using (7), and (8) and after some straightforward manipulations, we can re-express

P 1 , k = Pr x 1 , k y 1 , k x 1 , k + y 1 , k + 1 < γ , x 1 , k < y 1 , k η ,
(40)

where x 1 , k P N 0 | h a , k | 2 and y 1 , k ( P + P r ) N 0 | h b , k | 2 . For Rayleigh fading, x1,kand y1,kare exponentially distributed random variables with parameters λ x 1 , k = N 0 ( P σ a , k 2 ) and λ y 1 , k = N 0 ( ( P + P r ) σ b , k 2 ) , and probability density functions f x 1 , k ( x ) = λ x 1 , k e - λ x 1 , k x ,x0 and f y 1 , k ( y ) = λ y 1 , k e - λ y 1 , k y ,y0, respectively. Now (40) can, be evaluated as follows:

P 1 , k = Pr [ x 1 , k ( y 1 , k - γ ) < γ ( y 1 , k + 1 ) , η x 1 , k < y 1 , k ] = 0 γ f y 1 , k ( y ) 0 y η f x 1 , k ( x ) d x d y + γ f y 1 , k ( y ) 0 min y η , γ ( y + 1 ) y - γ f x 1 , k ( x ) d x d y .
(41)

It can be shown that y η < γ ( y + 1 ) y - γ for y lying in the range γ <y <δ, where δ can be obtained by solving y2 - γ(η + 1)y - γη < 0 for y with η > 1 as the possible root. Hence the second term in (41) can be separated into two parts to yield

P 1 , k = 0 γ f y 1 , k ( y ) 0 y η f x 1 , k ( x ) d x d y + γ δ f y 1 , k ( y ) 0 y η f x 1 , k ( x ) d x d y + δ f y 1 , k ( y ) 0 γ ( y + 1 ) y - γ f x 1 , k ( x ) d x d y ,
(42)

which can be simplified further as

P 1 , k = 0 δ f y 1 , k ( y ) 0 y η f x 1 , k ( x ) d x d y + δ f y 1 , k ( y ) 0 γ ( y + 1 ) y - γ f x 1 , k ( x ) d x d y = I 1 + I 2 ,
(43)

where

I 1 0 δ λ y 1 , k e - λ y 1 , k y 0 y η λ x 1 , k e - λ x 1 , k x d x d y = 0 δ λ y 1 , k e - λ y 1 , k y 1 - e - λ x 1 , k η y d y = 1 - e - λ y 1 , k δ - η λ y 1 , k [ 1 - e - δ η λ x 1 , k + η λ y 1 , k ] λ x 1 , k + η λ y 1 , k
(44)

and

I 2 δ λ y 1 , k e - λ y 1 , k y 0 y ( y + 1 ) y - γ λ x 1 , k e - λ x 1 , k x d x d y = δ λ y 1 , k e - λ y 1 , k y 1 - e - λ x 1 , k γ y + 1 y - 1 d y = e - λ y 1 , k δ - δ λ y 1 , k e - λ y 1 , k y e - λ x 1 , k γ y + 1 y - γ d y .
(45)

Operating the change of variable t = y - γ within the integral in (45) and some simplifications, we get

I 2 = e - λ y 1 , k δ - λ y 1 , k e - γ ( λ x 1 , k + λ y 1 , k ) δ - γ e - λ y 1 , k t e - λ x 1 , k γ γ + 1 t d t .
(46)

Since the integral in (46) has no closed-form solution, it can be evaluated by using Taylor series expansion [25, eq. 1.211.1] for the second exponential term and interchanging the order of integration and summation as

I 2 = e - λ y 1 , k δ - λ y 1 , k e - γ ( λ x 1 , k + λ y 1 , k ) n = 0 - λ x 1 , k γ ( γ + 1 ) n n ! δ - γ e - λ y 1 , k t t n d t = e - λ y 1 , k δ - λ y 1 , k ( δ - γ ) e - γ ( λ x 1 , k + λ y 1 , k ) n = 0 ( - 1 ) n n ! λ x 1 , k γ ( γ + 1 ) δ - γ n × E n [ λ y 1 , k ( δ - γ ) ] ,
(47)

where the last equality follows from [21, eq. 5.1.4] after a simple transformation of the integration variable. Substituting (44) and (47) into (43) yields the expression of P1,kas provided in (14). Following the similar steps as above, we obtain P2,kas presented in (15). And the proof of Theorem 1 is completed.

Appendix II

Proof of Lemma 1

The end-to-end instantaneous SNR expressions in (7) and (8) can be approximated at high SNR (P N0), respectively, by

γ a , k P r N 0 h a , k 2 h b , k 2 η h a , k 2 + h b , k 2
(48)

and

γ b , k P r N 0 h a , k 2 h b , k 2 η h b , k 2 + h a , k 2 ,
(49)

where the approximation is made by ignoring the noise power in the gain at the relay. Despite this, such an approximation has been shown to be very tight in the entire SNR region [9, 13, 24]. Using these SNR expressions and following the similar approach as in "Appendix I," we can express P1,kin (14) as

P 1 , k 1 - σ a , k 2 σ a , k 2 + σ b , k 2 1 - e - θ η N 0 P r 1 + 1 η 1 σ a , k 2 + 1 σ b , k 2 - θ η N 0 P r σ b , k 2 e - θ η N 0 P r 1 σ a , k 2 + 1 η σ b , k 2 n = 0 ( - 1 ) n n ! θ N 0 P r σ b , k 2 n E n θ η N 0 P r σ b , k 2 .
(50)

Now for n ≥ 1, E n [z] can be expanded in series as [21, eq. 5.1.12]

E n [ z ] = ( - z ) n - 1 ( n - 1 ) ! ( ψ ( n ) - ln ( z ) ) - q=0 q n - 1 ( - z ) q ( q - n + 1 ) q ! ,
(51)

where ψ ( n ) = - C + s = 1 n - 1 1 s , n > 1 and ψ (1) = -C, where C = 0.577215664... is Euler's constant. By using (51), one can verify that for high SNR (P/N0 → ∞) and the fact that lim z ln ( 1 z ) z 2 =0, the summation term for n ≥ 1 in (50) becomes infinitesimal of order 2n. Therefore, we can write

P 1 , k 1 - σ a , k 2 σ a , k 2 + σ b , k 2 1 - e - θ η N 0 P r 1 + 1 η 1 σ a , k 2 + 1 σ b , k 2 - θ η N 0 P r σ b , k 2 e - θ η N 0 P r 1 σ a , k 2 + 1 η σ b , k 2 E 0 θ η N 0 P r σ b , k 2 ,
(52)

where we have omitted the higher-order terms. Further, with E0[z] = e-z/z, we can express (52) for large SNR as

P 1 , k 1 - σ a , k 2 σ a , k 2 + σ b , k 2 1 - e - θ η N 0 P r 1 + 1 η 1 σ a , k 2 + 1 σ b , k 2 - e - θ η N 0 P r 1 σ a , k 2 + 1 η σ b , k 2 e - θ η N 0 P r σ b , k 2 .
(53)

Similarly, we approximate P2,kin (15) for large SNR as

P 2 , k 1 - σ b , k 2 σ a , k 2 + σ b , k 2 1 - e - θ η N 0 P r 1 + 1 η 1 σ a , k 2 + 1 σ b , k 2 - e - θ η N 0 P r 1 σ b , k 2 + 1 η σ a , k 2 e - θ η N 0 P r σ a , k 2 .
(54)

Substituting (53) and (54) into (13), the approximate expression for F θ k ( θ ) at the high SNR region is given by

F θ k ( θ ) 1 - e - θ η N 0 P r 1 σ a , k 2 + 1 σ b , k 2 e - θ N 0 P r σ a , k 2 + e - θ N 0 P r σ b , k 2 - e - θ N 0 P r 1 σ a , k 2 + 1 σ b , k 2 .
(55)

Note that the above expression is dominated by the exponential term present outside the square brackets due to the factor η > 1. Therefore, by making use of the fact that e - z z 0 1-z for the terms within square brackets, we can express the result as given in (16).

References

  1. Laneman JN, Tse DNC, Wornell GW: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Trans Inform Theory 2004, 50(12):3062-3080. 10.1109/TIT.2004.838089

    Article  MATH  MathSciNet  Google Scholar 

  2. Ahlswede R, Cai N, Li SYR, Yeung RW: Network information flow. IEEE Trans Inform Theory 2000, 46(4):1204-1216. 10.1109/18.850663

    Article  MATH  MathSciNet  Google Scholar 

  3. Wu Y, Chou P, Kung SY: Information exchange in wireless networks with network coding and physical-layer broadcast. In Proceedings of the 39th Annual Conference on Information Sciences and Systems (CISS). Baltimore, Maryland; 2005.

    Google Scholar 

  4. Larsson P, Johansson N, Sunell KE: Coded bidirectional relaying. In Proceedings of the IEEE VTC. Melbourne; 2006.

    Google Scholar 

  5. Popovski P, Yomo H: Bi-directional amplification of throughput in a wireless multihop network. In Proceedings of the IEEE VTC. Melbourne; 2006.

    Google Scholar 

  6. Zhang S, Liew SC, Lam PP: Physical-layer network coding. In Proceedings of the ACM MobiCom. Los Angeles; 2006:358-365.

    Google Scholar 

  7. Kim SJ, Mitran P, Tarokh V: Performance bounds for bi-directional coded cooperation protocols. IEEE Trans Inform Theory 2008, 54(11):5235-5241.

    Article  MathSciNet  Google Scholar 

  8. Rankov B, Wittneben A: Spectral efficient protocols for half-duplex relay channels. IEEE J Select Areas Commun 2007, 25(2):379-389.

    Article  Google Scholar 

  9. Han Y, Ting SH, Ho CK, Chin WH: Performance bounds for two-way amplify-and-forward relaying. IEEE Trans Wireless Commun 2009, 8(1):432-439.

    Article  Google Scholar 

  10. Katti S, Gollakota S, Katabi D: Embracing wireless interference: analog network coding. Proceedings of the ACM SIGCOMM 2007, 397-408.

    Google Scholar 

  11. Zhang R, Liang YC, Chai CC, Cui S: Optimal beamforming for two-way multi-antenna relay channel with analogue network coding. IEEE J Select Areas Commun 2009, 27(5):699-712.

    Article  Google Scholar 

  12. Popovski P, Yomo H: Wireless network coding by amplify-and-forward for bi-directional traffic flows. IEEE Commun Lett 2007, 11(1):16-18.

    Article  Google Scholar 

  13. Yi Z, Kim I-M, Schober R: Finite-SNR diversity-multiplexing tradeoff in bidirectional cooperative networks. In Proceedings of the IEEE ICC. Cape Town; 2010.

    Google Scholar 

  14. Esli C, Wittneben A: One- and two-way decode-and-forward relaying for wireless multiuser MIMO networks. In Proceedings of IEEE Globecom. New Orleans; 2008.

    Google Scholar 

  15. Chen M, Yener A: Multiuser two-way relaying: detection and interference management strategies. IEEE Trans Wireless Commun 2009, 8(8):4296-4305.

    Article  Google Scholar 

  16. Avestimehr S, Khajehnejad A, Sezgin A, Hassibi B: Capacity region of the deterministic multi-pair bi-directional relay network. In Proceedings of IEEE ITW. Greece; 2009.

    Google Scholar 

  17. Sezgin A, Khajehnejad A, Avestimehr S, Hassibi B: Approximate capacity region of the two-pair bidirectional Gaussian relay network. In Proceedings of the IEEE ISIT 2009. Korea; 2009.

    Google Scholar 

  18. Yilmaz E, Zakhour R, Gesbert D, Knopp R: Multi-pair two-way relay channel with multiple antenna relay station. In Proceedings of the IEEE ICC. Cape Town; 2010.

    Google Scholar 

  19. Viswanath P, Tse D, Laroia R: Opportunistic beamforming using dumb antennas. IEEE Trans Inform Theory 2002, 48(6):1277-1294. 10.1109/TIT.2002.1003822

    Article  MATH  MathSciNet  Google Scholar 

  20. Yang L, Alouini MS: Performance analysis of multiuser selection diversity. IEEE Trans Veh Technol 2006, 55(6):1848-1861.

    Article  Google Scholar 

  21. Abramowitz M, Stegun IA: Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables. 10th edition. Dover Publications, New York; 1972.

    MATH  Google Scholar 

  22. Rudin W: Principles of Mathematical Analysis. 3rd edition. McGraw-Hill, New York; 1976.

    MATH  Google Scholar 

  23. David HA, Nagaraja HN: Order Statistics. 3rd edition. Wiley, New York; 2003.

    Book  MATH  Google Scholar 

  24. Anghel PA, Kaveh M: Exact symbol error probability of a cooperative network in a Rayleigh-fading environment. IEEE Trans Wireless Com-mun 2004, 3(5):1416-1421. 10.1109/TWC.2004.833431

    Article  Google Scholar 

  25. Gradshteyn IS, Ryzhik IM: Tables of Integrals, Series and Products. 5th edition. Academic Press, New York; 1994.

    Google Scholar 

  26. Rappaport TS: Wireless Communications: Principle and Practice. Prentice-Hall, Upper Saddle River; 2002.

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by the Department of Science and Technology, Government of India, under Project SR/S3/EECE/031/2008. A conference version with initial results pertaining to this paper has been presented at IEEE Wireless Communications and Networking Conference (WCNC), Can-cun, Mexico, March 2011. The authors would like to thank the anonymous reviewers for their helpful suggestions and insightful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prabhat K. Upadhyay.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Upadhyay, P.K., Prakriya, S. Outage-optimal opportunistic scheduling with analog network coding in multiuser two-way relay networks. J Wireless Com Network 2011, 194 (2011). https://doi.org/10.1186/1687-1499-2011-194

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1499-2011-194

Keywords