Skip to main content

A novel design of physical layer network coding in strong asymmetric two-way relay channels

Abstract

The quality of two-way links is always asymmetric in practical two-way relay channels (TWRC) and therefore, the capacity of TWRC will be limited by the weaker link. An asymmetric modulation scheme, with physical layer network coding, was presented in order to improve the transmission reliability in TWRC. This makes full use of the stronger link to improve the overall transmission rate and also ensures the reliability of the weaker link. The simulation results show that the proposed asymmetric modulation scheme in the case of strongly asymmetric channels, compared to the symmetric transmission, enhances the system capacity significantly and also guarantees the system reliability.

1. Introduction

Network coding (NC) was originally proposed to improve the performance of multicast throughput in wired networks by Ahlswede et al. in 2000 [1]. Recently, the broadcast nature of wireless channels has attracted a lot of research activities on the application of NC in wireless networks.

The two-way relay channel (TWRC) is a typical scenario in wireless communications. Physical layer network coding (PLNC) was proposed to improve the throughput of TWRC [2], which maps the superimposition of the signals received simultaneously to a digital bit stream. PLNC improves the system performance by making use of the interference, instead of avoiding it. PLNC can further be classed into two categories - PNCF (PNC over finite field) and PNCI (PNC over infinite field) - according to whether the network coding field adopted is finite or infinite [3]. The capacity of TWRC with PLNC is higher than the traditional communication strategies [4, 5]. The design of modulation suited for TWRC with PLNC can be BPSK or QPSK [6], and an unconventional 5-ary modulation which is optimized according to the channel condition [7]. In addition, PLNC can be combined with channel code to improve bit error rate (BER) performance of the system [8].

The research works reported above are all based on the same assumption that the transmission rate of two end nodes is symmetric. In practical TWRC, however, the quality of two-way links is always asymmetric. Therefore, the capacity of TWRC will be limited by the weaker link. Thus, in the symmetric rate transmission of TWRC, in order to ensure the reliability of the weaker link, the stronger link has to transmit and receive with low-order modulation as same as the weaker link. For this reason, the stronger link does not take advantage of its good channel conditions to improve the overall transmission rate, which lowers the validity.

Asymmetric modulation is a method to realize the asymmetric rate transmission. The power matching ratio of the two end nodes in TWRC is corresponding to the performance of symbol error rate in the multiple access phase [9, 10]. In the broadcast phase of TWRC, under the same BER constraint, the weaker link can decode at lower signal noise ratio (SNR) compared to the stronger link by exploiting a priori bit information in each transmit symbol [11].

This paper investigates the asymmetric rate transmission both in the multiple access phase and broadcast phase of the two-phase TWRC by designing an asymmetric modulation scheme with PLNC. The simulation results show that the proposed scheme not only improves the transmission validity by increasing the system capacity but also guarantees the transmission reliability.

The rest of this paper is organized as follows. Section 2 introduces the system model. Section 3 presents the new scheme of asymmetric modulation with PLNC. Section 4 analyzes the performance of the asymmetric modulation scheme. Simulation experiments and performance comparisons between the symmetric transmission mode and the proposed scheme will be discussed in Section 5. Finally, Section 6 concludes this paper.

2. System model

We consider the two-phase TWRC system as shown in Figure 1, in which two independent end nodes n1 and n2 exchange information with each other via the relay node nR. As illustrated in Figure 1, B i , i {1, 2, R} denotes the bit information of node n i which is modulated to symbol X i . The coefficient h ij , i,j {1,2,R} is the complex path-loss coefficient for the channel from n i to n j . W i is the noise at n i to be zero-mean complex Gaussian variable with variance σ i 2. P i is the transmitting power of n i . In this paper, the following assumptions are made: (1) all nodes operate in a half-duplex manner, i.e., a node cannot transmit and receive simultaneously; (2) symbol-level time synchronization is assumed; (3) there is no direct link between n1 and n2; (4) channel coefficient is quasi-static and possess reciprocity, i.e., h1R = hR1 = h1, h2R = hR2 = h2; (5) nodes can perfectly estimate the channel state information (CSI) to realize the phase synchronization and amplitude pre-equalization; (6) the energy of symbol X i is normalized to unit 1; (7) power constrains P1 + P2 = 1, PR = 1.

Figure 1
figure 1

System model of TWRC.

The process of information exchange comprises of two phases:

  1. 1.

    Multiple access phase (MAC). First, n 1 and n 2 modulate B 1 and B 2 respectively to X 1 and X 2. Second, n 1 and n 2 transmit X 1 and X 2 to the relay node n R simultaneously. Then n R demodulates the superimposition of the signal Y R to B R = B 1B 2.

  2. 2.

    Broadcast phase (BRC). The relay node n R modulates B R to X R and broadcasts it to n 1 and n 2, simultaneously. Then n 1 demodulates Y 1 to B R and get the bit information of n 2 by using exclusive or (XOR) operation B 2 = B 1B R. Similarly, n 2demodulates Y 2 to B R and get the bit information of n 1 by using XOR operationB 1 = B 2B R.

So, n1 and n2 can finish the information exchange only by two phases. The importance of the information exchange is the design of modulation and demodulation at the relay node nR. In multiple access phase, nR is supposed to realize the demodulation of YRBR = B1B2. In broadcast phase, nR has to realize the modulation of BRXR. The performance of the system depends on the design at nR, which is a key point in this paper.

3. Asymmetric rate transmission

The design of the modulation and demodulation for n1, n2, and nR will be presented in this section to realize the asymmetric rate transmission both in the multiple access phase and broadcast phase. For simplicity and without loss of generality, we assume σ h 1 2 > σ h 2 2 (respectively denote the variances of h1 and h2) which means that the stronger link C1 (the channel between n1 and nR) has better quality than the weaker link C2 (the channel between n2 and nR).

3.1 Design of asymmetric modulation

The asymmetric modulation is proposed by utilizing the asymmetric channel quality to make n1 and n2 transmit and receive at different rates. For simplicity and clarity, QPSK and 16QAM will be as examples to be depicted for the design of the asymmetric modulation, which are respectively 2 bit/symbol and 4 bit/symbol.

3.1.1 MAC phase

Before transmitting, n1 first inserts two dummy zeros ‘00’ for each two bits in B1 to obtain B 1 · , making ‘00’,‘01’,‘10’, and ‘11’ become ‘ 0 · 0 · 00 ’,‘ 0 · 0 · 01 ’,‘ 0 · 0 · 10 ’, and‘ 0 · 0 · 11 ’ (these dummy zeros contain no information and their positions are fixed and known to both n1 and n2); Then n1 modulates B 1 · to X1 by QPSK, and n2 modulates B2 to X2 by 16QAM (the constellation of X1 and X2 are shown in Figures 2 and 3. Finally, n1 and n2 transmit X1 and X2 to nR, respectively. So in the same symbol period, n1 transmits two-bit information while n2 transmits four bit information.

Figure 2
figure 2

QPSK constellation of X 1 .

Figure 3
figure 3

16QAM constellation of X 2 , X R .

As illustrated in Figures 2 and 3, the stronger link C1 transmits signals by low-order modulation (QPSK), while the weaker link C2 transmits signals by high-order modulation (16QAM). This kind of design might be opposite to our straight thinking, but it lets the system make use of the stronger link C1 to improve the overall transmission rate and also guarantee the transmission reliability of the weaker link C2 in the BRC phase (the specific statement is next). When the transmitting power ratio is PQPSK : P16QAM = 4 : 5, the BER performance of the QPSK-16QAM superimposition signals is optimal in the MAC phase, which is demonstrated in [9]. Note that there are 36 points in the QPSK-16QAM constellation as shown in Figure 4.

Figure 4
figure 4

QPSK-16QAM constellation at n R .

3.1.2 BRC phase

In the BRC phase, nR first modulates B R to X R . Then nR broadcasts XR to n1 and n2. The constellation of XR is shown in Figure 3, which is same as the constellation of X2 in the MAC phase.

Due to the fore 2 bit ‘ 0 · 0 · ’ in each 4 bit of B 1 · which is inserted by n1 as the dummy zeros, the fore 2 bits of B2 are kept unchanged in BR after the XOR operation at nR. So n2 can exploit these as a priori information and does not need to decode every bit in B R . Node n2 can discard the known bits and decode only the latter 2 bits of B R according to the subset of 16QAM constellation (QPSK), which is illustrated in Figure 5. Then n2 can obtain the bit information of n1 by executing the XOR operation B1 = B2BR.

Figure 5
figure 5

Subset of 16QAM constellation X R at n 2 . (a) Fore 2bit ‘00’ of B R (B2). (b) Fore 2bit ‘01’ of BR (B2). (c) Fore 2bit ‘10’ of BR (B2). (d) Fore 2bit ‘11’ of BR (B2).

As illustrated in Figure 5, the constellation used to demodulate signals by n2 is QPSK, which is a subset of 16QAM constellation. In this way, the distance of the adjacent points is increased, so the BER performance is improved and the transmission reliability is guaranteed.

By using this scheme, in BRC phase, the signal modulated by high-order modulation (16QAM) is transmitted through the stronger link C1 to improve the transmission rate, while the signal modulated by low-order modulation (QPSK, which is the subset of 16QAM constellation) is transmitted through the weaker link C2 to ensure the transmission reliability.

3.2 Symmetric modulation for comparison

In order to show up the advantages of the proposed asymmetric modulation scheme, we use the symmetric modulation QPSK-QPSK as examples for a simple comparison.

By using symmetric modulation, the stronger link C1 has to adopt the same low-order modulation as the weaker link C2 to transmit and receive signals. Both n1 and n2 adopt QPSK modulation to transmit and receive signals, and nR adopt QPSK modulation to transmit the XOR signals. The constellations are shown in Figures 6 and 7.

Figure 6
figure 6

QPSK constellation of X 1 , X 2 , and X R .

Figure 7
figure 7

QPSK-QPSK constellation at n R .

4. Performance analysis

In this section, we will analyze the performance of the proposed asymmetric modulation and compare it to that of the symmetric modulation. As we known, C1 is better than C2. Without loss of generality, we assume μ> 1. For simplicity, we assume that the noises at the three nodes have the same variance, σ 1 2 = σ 2 2 = σ R 2 = σ 2 .

4.1 BER analysis

4.1.1 MAC phase

Here, we use dmin to denote the minimum distance between the adjacent points in the constellation of the superimposition of the signals received at nR (as shown in Figures 4 and 7). Thus, we have

d QPSK - 16 QAM min = 2 / 3 0.667 d QPSK - QPSK min = 2 1.414
(1)

Then the approximation of the BER can be obtained according to [12, 13] as

BER QPSK-QPSK 3 log 2 4 Q γ R BER QPSK - 16 QAM 5 log 2 16 Q 2 9 γ R ,
(2)

Where γR is SNR of the signals received at nR.

4.1.2 BRC phase

Also, we use dmin to denote the minimum distance between the adjacent points in the constellation of the signals received at n1 and n2 from nR (as shown in Figures 3, 5, and 6). Then we have

d n 1 - 16 QAM ASY min = 2 5 / 5 0.894 d n 2 - QPSK ASY min = 4 5 / 5 1.789 d n 1 - QPSK SYM min = 2 d n 2 - QPSK SYM min = 2
(3)

Further, the approximation of the BER can be obtained according to [12, 13] as

BER n 1 - QPSK SYM 2 log 2 4 Q 2 γ 1 BER n 2 - QPSK SYM 2 log 2 4 Q 2 γ 2 BER n 1 - 16 QAM ASY 4 log 2 16 Q 2 5 γ 1 BER n 2 - QPSK ASY 2 log 2 16 Q 2 × 4 5 γ 2 ,
(4)

where γ1 and γ2 denote SNR of the signals received at n1 and n2, respectively.

4.3 Capacity analysis

According to [14, 15], the AWGN channel in MAC phase and BRC phase can be regarded as an equivalent virtual channel CV shown in Figure 8.

Figure 8
figure 8

Equivalent virtual channel.

The input of CV is X and the output is Y = X + W, where W is a zero-mean complex Gaussian random variable WCN(0, σ2). CV is a discrete-input and continuous-output channel according to [15]. The input X comprises symbols selected from a finite and discrete input alphabet X = x k (k = 0, 1, …, q − 1), and the output is continuous Y = { − ∞, + ∞}. For a given X, it follows that Y is a complex Gaussian random variable with mean x k and variance σ2, that is,

p y | X = x k = 1 2 π σ e y x k 2 / 2 σ 2 .
(5)

For any given input sequence X i (i = 1, 2,…, n), there is a corresponding output sequence of

Y i = X i + W i i = 1 , 2 , , n .
(6)

The condition that the channel is memoryless can be expressed as

p y 1 , y 2 , , y n | X 1 = u 1 , X 2 = u 2 , , X n = u n = i = 1 n p y i | X i = u i .
(7)

So, the capacity of CV is defined as

C V = max p x i I X ; Y = max p x i i = 0 q 1 + p y | x i p x i log p y | x i p y d y = max p x i i = 0 q 1 + p y | x i p x i log p y | x i k = 0 q 1 p y | x k p x k d y .
(8)

The input X are equally probable symbols, and the probability p(x i ) can be obtained according to the corresponding modulation constellation. Substituting p(x i ) and Equation 7 into Equation 8, we can obtain the capacity of the equivalent virtual channel CV.

5. Simulation results

In this section, simulation results are presented to demonstrate the performance of our proposed scheme and to verify the accuracy of our analytical analysis in Section 4. In the simulation, all the numerical results are calculated with averaging over 10,000,000 packets, and the number of bits contained by each packet is equal to the bits contained by each symbol in the corresponding constellation. For simplicity and without loss of generality, we consider two scenarios of μ = 4 and μ = 8. The SNR of the stronger link C1 is 6 and 9 dB higher than that of the weaker linkC2.

5.1 BER performance

Here, the simulation results are presented to demonstrate the BER performance of the asymmetric modulation at n1 and n2.

Figures 9 and 10 respectively show the BER performance of n1 and n2 when the asymmetric levels of the two-way links are 6 and 9 dB. As can be seen in Figures 9 and 10, when the asymmetric modulation QPSK-16QAM is adopted, although the modulation is different (one is QPSK, another is 16QAM), the BER performance of n1 is close to n2. Moreover, the closeness of the BER performance for the symmetric modulation QPSK-QPSK is similar with the asymmetric modulation QPSK-16QAM. When the asymmetric level of the two-way links increases (from 6 to 9 dB), the trend remains unchanged.

Figure 9
figure 9

BER performance (asymmetric level is 6 dB).

Figure 10
figure 10

BER performance (asymmetric level is 9 dB).

5.2 Capacity

Here, the simulation results are presented to demonstrate the capacity of the asymmetric modulation at the end nodes n1 and n2. The sum of capacity is also illustrated here.

Figures 11 and 12 respectively show the capacity of n1 and n2. The x-axis is the SNR of C2 in the two figures above, which needs to be paid attention to. As shown in Figure 11, when the SNR of the stronger link C1 is 6 dB higher than that of the weaker link C2 and the SNR is higher than 13 dB, the capacity of n1 by using the asymmetric modulation QPSK-16QAM is higher than by using the symmetric modulation QPSK-QPSK. When the SNR of the stronger link C1 is 9 dB higher than that of the weaker link C2, the situation is similar when SNR is higher than 11 dB. As shown in Figure 12, when the channel quality is asymmetric, the capacity of n2 by using the asymmetric modulation QPSK-16QAM is close to the capacity of n2 by using the symmetric modulation QPSK-QPSK.

Figure 11
figure 11

Capacity at n 1 .

Figure 12
figure 12

Capacity at n 2 .

Figure 13 shows the total capacity of n1 and n2 when the asymmetric level of the two-way links is 6 and 9 dB. As shown in Figure 13, when the SNR of the stronger link C1 is 6 dB higher than that of the weaker link C2 and the SNR is higher than 15 dB, the capacity of n1 by using the asymmetric modulation QPSK-16QAM is higher than by using the symmetric modulation QPSK-QPSK. When the SNR of the stronger link C1 is 9 dB higher than that of the weaker link C2, the situation is similar when SNR is higher than 13 dB. Overall, under higher SNR, compared with the symmetric modulation, the total capacity has been greatly improved by using the asymmetric modulation.

Figure 13
figure 13

Sum of capacity.

6. Conclusions

In this paper, an asymmetric modulation scheme with PLNC in TWRC is proposed, which aims to improve both the validity and reliability in two-way relay transmissions. The proposed asymmetric modulation scheme realized the asymmetric rate transmission both in MAC phase and BRC phase of TWRC. In MAC phase, the BER performance at the relay is improved. In BRC phase, the capacity is boosted by making full use of the stronger link, and the BER performance is guaranteed by exploiting a priori bit information to demodulate for the weaker link. We derived the approximated BER expressions for the scheme proposed, which were also demonstrated by simulation experiments. Through the comparisons of the symmetric modulation scheme, it is found that by using the proposed asymmetric modulation scheme, the total capacity is improved significantly under the asymmetric level of the two-way links.

In addition, as well-known channel coding possesses the correcting ability and can improve the BER performance further, combining channel coding, network coding, and modulation for asymmetric transmissions in TWRC will be our future researches.

References

  1. Ahlswede R, Cai N, Li SY, Yeung RW: Network information flow. J. IEEE Trans. Inform. Theor.) 2000, 46(4):1204-1216. 10.1109/18.850663

    Article  MathSciNet  Google Scholar 

  2. Zhang S, Liew S, Patrick PL: Proceedings of the 12th Annual International Conference on Mobile Computing and Networking, Los Angeles, 24–29 September 2006. New York: ACM; 2006:358-365.

    Google Scholar 

  3. Zhang S, Liew S, Lu L: Physical layer network coding schemes over finite and infinite fields. In Global Telecommunications Conference, IEEE GLOBECOM 2008, 30 November-4 December 2008. New Orleans: IEEE Communication Society; 2008:1-6.

    Google Scholar 

  4. Zhang S, Liew S, Wang H, Lin X: Capacity of two-way relay channel. Access Netw.: Inst. Comput. Sci., Soc. Inform. Telecom. Eng. 2010, 37(2):219-231.

    Article  Google Scholar 

  5. Popovski P, Yomo H: Physical network coding in two-way wireless relay channels. In IEEE International Conference on Communications, ICC 2007, Glasgow, 24–28 June 2007. Glasgow: IEEE Press; 2007:707-712.

    Google Scholar 

  6. Lu K, Fu S, Qian Y, Chen H-H: SER performance analysis for physical layer network coding over AWGN channels. In Global Telecommunications Conference, IEEE GLOBECOM 2009, Honolulu, 30 November-4 December 2009. Honolulu: IEEE Communication Society Press; 2009:1-6.

    Google Scholar 

  7. Toshiaki KA, Popovski P, Tarokh V: Optimized constellations for two-way wireless relaying with physical network coding. EEE J. Sel. Area Comm. 2009, 27(5):773-787.

    Article  Google Scholar 

  8. Zhang S, Liew S: Channel coding and decoding in a relay system operated with physical-layer network coding. EEE J. Sel. Area Comm. 2009, 27(5):788-796.

    Article  Google Scholar 

  9. Zhang X, Li Y, Lin J, Li G, He Z: On performance of judging region and power allocation for wireless network coding with asymmetric modulation. In IEEE Vehicular Technology Conference, VTC2011-Fall, San Francisco,5–8 September 2011. San Francisco: IEEE Press; 2011:1-5.

    Google Scholar 

  10. Zhang X, Li Y, Lin J, Di J, Han R: Asymmetric network coding in two-way relay channels for cooperative communications: SER performance and power matching. In IEEE International Symposium on Wireless Personal Multimedia Communications, WPMC 2011, Brest, 3–7 October2011. Brest: IEEE Press; 2011:1-5.

    Google Scholar 

  11. Zhao J, Kuhn M, Wittneben A, Bauch G: Asymmetric data rate transmission in two-way relaying systems with network coding. In IEEE International Conference on Communications, ICC 2010, Cape Town, May 23–27, 2010. Cape Town: IEEE Press; 2010:1-6.

    Google Scholar 

  12. Fan C, Cao L: The Principle of Communications. Beijing: National Defense Industry Press; 2008.

    Google Scholar 

  13. Goldsmith A: Wireless Communications. Cambridge: Cambridge University Press; 2005.

    Book  Google Scholar 

  14. Chen Z, Zheng B, Ji X, Xiao X: An improved joint design of physical layer network coding and channel coding based on trellis coded modulation in two-way relay channel. J. Electron. Inform. Technol. 2011, 33(11):2594-2599. 10.3724/SP.J.1146.2011.00112

    Article  Google Scholar 

  15. Proakis J: Digital Communications. New York: McGraw-Hill; 2000.

    Google Scholar 

Download references

Acknowledgement

This work was supported by the National Natural Science Foundation of China under No. 61271240.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hao Wei.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Wei, H., Zheng, B. & Ji, X. A novel design of physical layer network coding in strong asymmetric two-way relay channels. J Wireless Com Network 2013, 166 (2013). https://doi.org/10.1186/1687-1499-2013-166

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1499-2013-166

Keywords