Skip to main content

Adaptive hierarchical modulation and power allocation for superposition-coded relaying

Abstract

We propose a relaying scheme based on superposition coding (SC) with discrete adaptive modulation and coding (AMC) for a three-node wireless relay system, based on half duplex transmission, where each node decodes messages by successive interference cancelation (SIC). Unlike the previous works where the transmission rate of each link is assumed to achieve Gaussian channel capacity, we design a practical superposition-coded relaying scheme with discrete AMC while taking into account the effect of decoding errors at each stage of the SIC process at each node. In our scheme, hierarchical modulation (HM) is used to create an SC message composed of one basic and one superposed message with optimized power allocation. We firstly introduce the proposed scheme without forward error correction (FEC) for high signal-to-noise ratio (SNR) region and provide the optimal power allocation between the superimposed messages. Next, we extend the uncoded scheme to incorporate FEC to overcome bad channel conditions. The power allocation in this case is based on an approximated expression of the bit error rate (BER). Numerical results show the performance gains of the proposed SC relaying scheme with HM compared to conventional schemes, over a large range of SNRs.

1 Introduction

Cooperative relaying is a recently developed technique that enables to enhance the overall performance of wireless communication systems in terms of transmission rates and coverage by exploiting spatial diversity [1, 2]. In cooperative relaying systems, one or more relay nodes assist the data transmission from the source node to the destination node. Due to the broadcast nature of the wireless medium, relays can receive the signal sent by the source and, in turn, forward their processed version of the signal to the destination. At the destination, the signals received from the relays (and possibly from the source) are combined for improving the received signal-to-noise ratio (SNR). A number of cooperative relaying schemes have been proposed for half-duplex relays that either transmit or receive the signal but cannot do both at the same time. There are two major types of relaying protocols: amplify-and-forward (AF) and decode-and-forward (DF) [3]. In the AF protocol, relays amplify the received signal and transmit it to the destination. This protocol has advantages on complexity and cost due to its simple design. However, noise is also enhanced by the relays. In the DF protocol, the relays decode the received signal before forwarding it to the destination. Although the relays require higher capabilities, this protocol can mitigate the effects of noise in the source to relay links. Moreover, the relays can employ adaptive modulation and coding (AMC) in the relay to destination links, which is one of the notable advantages of the DF protocol. In this paper, we consider the three-node wireless relay system composed of one source, one destination, and one relay as shown in Figure 1, where the relay operates according to DF protocol. For such a system, authors in [4–6] have proposed cooperative relaying schemes. In the cooperative diversity (CD) scheme of [4], the destination uses maximum ratio combining (MRC). In [5, 6], the destination decodes the combined direct and relayed signals by using the log-likelihood ratio (LLR) for each bit, allowing the source and relay to use different modulation rates.

Figure 1
figure 1

The three-node wireless relay system.

Recently, a cooperative DF relaying scheme based on superposition coding (SC) has been proposed in [7, 8] for the three-node wireless relay system. SC was originally introduced in [9, 10] for the broadcast channel, where multiple users are served simultaneously by a single source. The source superimposes the messages for the users with a certain power allocation and broadcasts the resulting signal. Then, successive interference cancelation (SIC) is performed by each user, where the messages intended for users with weaker channel are decoded first, then subtracted from the received signal, prior to decoding their own message. It was shown in [9, 10] that SC with SIC actually achieves the capacity of the Gaussian broadcast channel. In the scheme of [7, 8], the source generates the SC message composed of one basic and one superposed message, both of which are destined to the destination, and transmits it in the first time slot with an adequate power allocation between the two messages. In the second time slot, after decoding both messages using SIC, the relay forwards only the superposed message to the destination, reducing the relay transmission time and enhancing the overall rate. Using the superposed message decoded correctly, the destination subtracts the contribution of the superposed message from the direct signal received in the first time slot and decodes the basic message from the resulting signal. It is shown that this SC scheme outperforms conventional relaying schemes by using optimum power allocation under the assumption that the transmission rate of each link achieves Gaussian channel capacity. However, practical wireless systems make use of discrete modulation and coding, in which case the analysis in [7] based on the assumption of Gaussian channels is not applicable. Although an example of implementation with discrete modulation was considered in [8], no power optimization nor channel coding was considered. Thus, the design of a new scheme with optimized power allocation and modulation/coding is required in order to benefit from SC relaying under such practical constraints.

In this paper, we propose a practical superposition-coded relaying scheme using discrete AMC for the three-node wireless relay system. In order to create an SC message, we make use of hierarchical modulation (HM) [11, 12]. HM is the technique adopted by digital TV broadcasting that enables to embed two independent bitstreams, a low-priority one and a high-priority one, using discrete modulations [11]. We first introduce the uncoded SC scheme of [13] with discrete HM, for which we provide here the full analysis for optimizing the power allocation between the two superimposed messages. Such an uncoded scheme can attain better performance over coded schemes in the high SNR regime, since the redundancy introduced by coding becomes useless whenever there are no errors. Next, we extend our uncoded SC scheme in [13] to incorporate FEC technique for overcoming bad channel conditions. In this case, due to the difficulty to derive a theoretical formula for the bit error rate (BER) of decoded messages, we make use of an approximate expression of the BER to perform power optimization. We consider the low-density parity-check (LDPC) code as it can provide a performance close to the Shannon limit [14, 15], although other coding techniques can be considered as well. The extensive simulation results show the performance gains provided by the proposed uncoded and coded SC schemes with discrete HM, compared to reference CD schemes.

The paper is organized as follows: Section 2 presents the system model, and Section 3 introduces our protocol. In Sections 4 and 5, the throughput expressions of our scheme are derived, and the optimal power allocation, which maximizes the throughput, is analyzed for both uncoded and LDPC-coded cases. Section 6 presents the numerical results and discussions. Finally, conclusions and directions for future work are given in Section 7.

2 System model

We consider the wireless relay system which consists of three nodes: source S, relay R, and destination D which are shown in Figure 1.

Relay R is assumed to use DF protocol and to be half duplex, i.e., it cannot transmit and receive simultaneously. We assume separate power constraints at nodes S and R as in [3]a.

Thus, if node S transmits a vector of N symbols x= [ x(1),…,x(N)]T, nodes D and R receive

y D 1 = h SD x + z D 1 ,
(1)
y R = h SR x + z R ,
(2)

respectively. The vector of M symbols xR= [ xR(1),…,xR(M)]T being transmitted from node R, and the received signal at node D is

y D 2 = h RD x R + z D 2 .
(3)

In (1), (2), and (3), h i (i ∈ {SD,SR,RD}) denotes the complex channel coefficient of links SD, SR, and RD, respectively, while z j (j ∈ {R,D1,D2}) are vectors of a circular-symmetric complex additive white Gaussian noise (AWGN) having mean zero and variance σ2. The link SNRs are defined as

γ i = | h i | 2 σ 2 ,i∈{SD,SR,RD}.
(4)

All channel coefficients h i (i∈{SD,SR,RD}) and hence instantaneous SNRs are assumed to be constant during each frame consisting of the two steps. However, they undergo flat Rayleigh fading from frame to frame. Node S is assumed to know γSD and γSR, and node R is assumed to know γRD. Both S and R transmit signals with an average power E[ |x(n)|2]=1 (n=1,…,N). Finally, the bandwidth of each link is assumed to be normalized to 1.

Two types of transmissions will be considered: the uncoded and LPDC coded cases with the discrete modulations specified in Tables 1 and 2, respectively. In the uncoded case, the SNR thresholds for each modulation level are derived as in [16], for a target BER of 10−3. On the other hand, the SNR thresholds for the LDPC-coded case are derived based on the frame error rate (FER) approximation used in [17, 18], for a target FER of 10−3.

Table 1 Discrete AMC table: uncoded case
Table 2 Discrete AMC table: LDPC-coded case

In addition, the proposed protocol makes use of HM levels 2/4-QAM and 4/16-QAM in the first step, as explained in the next section.

3 Description of the proposed protocol

We introduce the steps of the proposed scheme based on [8] when modulations/coding in Tables 1, 2, and HMs 2/4-QAM 4/16-QAM are available.

The steps of the proposed scheme are as follows (see Figure 2):

Step 1. Denote a basic message and a superposed message created from information bits at node S as ub and us, respectively. Moreover, we define L as the number of bits in ub or us. In the uncoded scheme, the components of ub and us are mapped to the basic symbols xb(n) and the superposed symbols xs(n)(n=1,…,N), respectively. In the coded scheme, the LDPC codewords cb and cs are generated by encoding ub and us, respectively. Then node S maps the LDPC codewords cb and cs to the basic symbols xb(n) and the superposed symbols xs(n)(n=1,…,N), respectively. Using either 2/4-QAM or 4/16-QAM, node S generates the following symbol from the basic and superposed symbols

x(n)= 1 − α x b (n)+ α x s (n),n=1,…,N,
(5)
Figure 2
figure 2

SC-relaying scheme. The arrows represent the signal transmission from a node A to a node B. Step 1 is shown at the left of the broken line, and Step 2 at the right.

where α denotes the power allocation parameter between the basic symbol xb(n) and the superposed symbol xs(n). If 2/4-QAM is used, xb(n) is an in-phase binary phase shift keying (BPSK) symbol, while xs(n) is a quadrature-phase BPSK symbol, giving the constellation of the superposed signal shown in Figure 3.

Figure 3
figure 3

Constellation of the transmitted symbol by node S using 2/4-QAM. I represents the in-phase component, and Q the quadrature-phase component. Arrows in broken lines show the power allocated to the basic and superposed symbols.

Let r be the coding rate used at node S, we thus have L=r N. It is noted that r=1 is equivalent to the uncoded case. We set α∈(0, 1 2 ] for 2/4-QAM due to symmetry. On the other hand, when 4/16-QAM is used, both xb(n) and xs(n) are independent QPSK symbols, giving the constellation shown in Figure 4.

Figure 4
figure 4

Constellation of the transmitted symbol by node S using 4/16-QAM. Arrows in broken lines show the power allocated to the basic and superposed symbols.

In this case, we have L=2r N. We assume α∈(0, 1 2 ) so that each constellation point stays within the same quadrant as its corresponding basic symbol. Defining vectors of basic and superposed symbols as xb= [ xb(1),…,xb(N)]T and xs= [ xs(1),…,xs(N)]T, the received signal at node R is given by

y R = h SR 1 − α x b + h SR α x s + z R .
(6)

From yR, node R first decodes xb by treating α x s as noise and then obtains the basic message ub if there is no decoding error. Subtracting 1 − α x b from yR, we obtain

y R ′ = y R − h SR 1 − α x b = h SR α x s + z R ,
(7)

from which R decodes xs and obtains the superposed message us. On the other hand, node D receives

y D 1 = h SD 1 − α x b + h SD α x s + z D 1 ,
(8)

in the first step, and keeps it in memory.

Step 2. Given the link qualities, node R transmits xR= [ xR(1),…,xR(M)]T, the remodulated signal of us correctly decoded in step 1. The received signal at node D is

y D 2 = h RD x R + z D 2 .
(9)

From yD2, node D decodes xR and hence obtains us. Node D cancels the contribution of xs from yD1 kept in memory in step 1, obtaining

y D 1 ′ = y D 1 − h SD α x s = h SD 1 − α x b + z D 1 ,
(10)

from which D finally decodes xb, obtaining ub.

4 Throughput analysis for the uncoded case

4.1 Average throughput

Here, we consider the proposed scheme without FEC. First, we derive the average throughput defined as the number of correct bits received at node D per unit symbol time. If at least one bit in the message is not decoded correctly, the whole message is discarded. We define probabilities QRb, QRs, QDs, and QDb as follows:

Q Rb = Pr ( u Ì„ Rb = u b ) ,
(11)
Q Rs = Pr ( u ̄ Rs = u s ∣ u ̄ Rb = u b ) ,
(12)
Q Ds = Pr ( u ̄ Ds = u s ∣ u ̄ Rs = u s , u ̄ Rb = u b ) ,
(13)
Q Db = Pr ( u ̄ Db = u b ∣ u ̄ Ds = u s , u ̄ Rs = u s , u ̄ Rb = u b ) ,
(14)

where u ̄ k b , u ̄ k s , k∈{R,D} represent the basic and superposed messages decoded at node k, respectively; while ub and us are the original basic and superposed messages, respectively. In the analysis, we assume that the L bits of the superposed message are correctly received at node D if the basic and the superposed messages have been correctly decoded at node R, and if us has been correctly decoded at node D. However, in the simulations, all superposed messages will be forwarded to node D even if they were not correctly decoded at node R, since they may still be correctly decoded at node D. Still, it will be shown in Section 6 that the analytical throughput gives a valid approximation of the actual one. Thus, the expected number of bits that node D correctly receives is L QRbQRsQDs bits. With a similar calculation for the basic message, the expected number of bits that node D correctly receives after the two steps is equal to L QRbQRsQDsQDb. Since node S transmits the signal of N symbols in step 1 and node R transmits the signal of M symbols in step 2, the duration of the two steps is N+M symbol times, giving the average throughput as

R SC = L Q Rb Q Rs Q Ds ( 1 + Q Db ) N + M .
(15)

4.1.1 2/4-QAM

We derive the average throughput when node S selects 2/4-QAM in step 1. As both the basic and the superposed symbols are BPSK, we have L=N in (15). When node R decodes xb from yR, node R decides the basic symbols xb(n) (n=1,…,N) through BPSK symbol detection. In 2/4-QAM, basic and superposed symbols are transmitted using in-phase and quadrature-phase, respectively. This means that QRb is the probability that the message is decoded correctly with BPSK at the SNR γSR(1−α). Thus, denoting the probability that each symbol xb(n) (n=1,…,N) is decoded correctly by q, we have

q=1− P BPSK γ SR ( 1 − α ) ,
(16)

where PBPSK(γ) is the symbol error rate of BPSK in AWGN channel with SNR γ. PBPSK(γ) is given by [14]

P BPSK (γ)= 1 2 erfc γ ,
(17)

where erfc (x) is the complimentary error function,

erfc x = 2 π ∫ x ∞ exp(− t 2 )dt.
(18)

Using (16), we obtain

Q Rb = q N = 1 − P BPSK γ SR ( 1 − α ) N .
(19)

After cancelation of xb, node R decodes xs at the SNR γSRα, giving

Q Rs = 1 − P BPSK γ SR α N .
(20)

In step 2, node R forwards the N bits to node D using discrete modulations. For clarity of exposition, we will only derive the analysis for QPSK and 16-QAM, since these are the most likely to be used as the relay-destination link is of high quality (otherwise, relaying schemes would be of no use). Moreover, the analysis for BPSK can be derived similarly. Thus, we have M= N 2 when QPSK is used, and M= N 4 for 16-QAM. Denoting by ΓR the SNR threshold for switching between QPSK and 16-QAM (from Table 1, ΓR=17 dB), QDs is given by

Q Ds = 1 − P QPSK ( γ RD ) N 2 , γ RD < Γ R , 1 − P 16 QAM ( γ RD ) N 4 , γ RD ≥ Γ R ,
(21)

where PQPSK(γ) is the symbol error rate of QPSK in AWGN channel with SNR γ and P16QAM(γ) is the symbol error rate of 16-QAM in AWGN channel with SNR γ given as [14]

P QPSK ( γ ) = 1 − 1 − 1 2 erfc γ 2 2 ,
(22)
P 16 QAM ( γ ) = 1 − 1 − 3 4 erfc γ 10 2 .
(23)

As node D decodes xb in step 2 at SNR γSD(1−α), we obtain

Q Db = 1 − P BPSK γ SD ( 1 − α ) N .
(24)

By substituting (19), (20), (21), and (24) into (15), the average throughput with 2/4-QAM denoted by R SC 4 ( i ) (α) for γRD<ΓR and by R SC 4 ( ii ) (α) for γRD≥ΓR can be expressed as

R SC 4 ( i ) ( α ) = 2 3 1 − 1 2 erfc γ SR ( 1 − α ) N × 1 − 1 2 erfc γ SR α N · 1 − 1 2 erfc γ RD 2 N × 1 + 1 − 1 2 erfc γ SD ( 1 − α ) N ,
(25)
R SC 4 ( ii ) ( α ) = 4 5 1 − 1 2 erfc γ SR ( 1 − α ) N × 1 − 1 2 erfc γ SR α N · 1 − 3 4 erfc γ RD 10 N 2 × 1 + 1 − 1 2 erfc γ SD ( 1 − α ) N .
(26)

4.1.2 4/16-QAM

For 4/16-QAM, the average throughput can be derived in a similar way. As both the basic and the superposed symbols are QPSK, we have L=2N in (15). Node R first decodes xb from yR by treating the components of xs as noise, which means that it performs common QPSK symbol detection. Here, it should be noted that unlike the case of 2/4-QAM, the interference from xs degrades the detection performance. If the basic symbol corresponds to the point B in the first quadrant in Figure 4, the resulting transmitted 4/16-QAM symbol is one of the points S1, S2, S3, or S4. Denoting the probabilities that point S j (j=1,…,4) is received in the first quadrant by q j and considering the symmetric property of 4/16-QAM constellation, we have

Q Rb = 1 4 ( q 1 + q 2 + q 3 + q 4 ) N .
(27)

As q1 is the probability that both in-phase and quadrature-phase components of the point S1 stay in the first quadrant, q1 is given by

q 1 = 1 − 1 2 erfc γ SR ( 1 − α ) 2 − γ SR α 2 × 1 − 1 2 erfc γ SR ( 1 − α ) 2 + γ SR α 2 .
(28)

Similarly, we obtain

q 2 = 1 − 1 2 erfc γ SR ( 1 − α ) 2 + γ SR α 2 2 ,
(29)
q 3 = q 1 ,
(30)
q 4 = 1 − 1 2 erfc γ SR ( 1 − α ) 2 − γ SR α 2 2 .
(31)

Substituting these probabilities q1, q2, q3, and q4 into (27), we obtain

Q Rb = 1 − 1 4 erfc γ SR ( 1 − α ) 2 − γ SR α 2 − 1 4 erfc γ SR ( 1 − α ) 2 + γ SR α 2 2 N .
(32)

Since node R decodes xs at the SNR α γSR, we have

Q Rs = 1 − P QPSK γ SR α N .
(33)

In step 2, node R transmits the information of N bits to node D using either QPSK or 16-QAM. Thus, we have M=N when QPSK is used and M= N 2 when 16-QAM is used, and QDs is given by

Q Ds = 1 − P QPSK ( γ RD ) N , γ RD < Γ R , 1 − P 16 QAM ( γ RD ) N 2 , γ RD ≥ Γ R .
(34)

As node D decodes xb in step 2 at SNR γSD(1−α), we obtain

Q Db = 1 − P QPSK γ SD ( 1 − α ) N .
(35)

By substituting (32), (33), (34), and (35) into (15), the average throughput with 4/16-QAM denoted by R SC 16 ( i ) (α) for γRD<ΓR and by R SC 16 ( ii ) (α) for γRD≥ΓR can be expressed as

R SC 16 ( i ) ( α ) = 1 − 1 4 erfc γ SR ( 1 − α ) 2 − γ SR α 2 − 1 4 erfc γ SR ( 1 − α ) 2 + γ SR α 2 2 N · 1 − 1 2 erfc γ SR α 2 2 N 1 − 1 2 erfc γ RD 2 2 N × 1 + 1 − 1 2 erfc γ SD ( 1 − α ) 2 2 N ,
(36)
R SC 16 ( ii ) ( α ) = 4 3 1 − 1 4 erfc γ SR ( 1 − α ) 2 − γ SR α 2 − 1 4 erfc γ SR ( 1 − α ) 2 + γ SR α 2 2 N · 1 − 1 2 erfc γ SR α 2 2 N 1 − 3 4 erfc γ RD 10 N × 1 + 1 − 1 2 erfc γ SD ( 1 − α ) 2 2 N .
(37)

4.2 Optimizing the power allocation

The throughput of the proposed scheme depends on the power allocation parameter α, which is optimized next.

4.2.1 2/4-QAM

First, assuming that node S uses 2/4-QAM in step 1, the problem is to select α∈(0,1/2] that maximizes the throughput RSC4, given N, γSD, γSR, and γRD. It can be observed that the value of α maximizing (25) and (26) does not depend on SNR γRD, since the HM is restricted to 2/4-QAM here. Thus, without loss of generality, we assume γRD≥ΓR. By differentiating (26) with respect to α, we have

d R SC 4 ( ii ) ( α ) d α = 4 N 5 Q Db ( α ) N − 1 N Q Ds ( α ) N − 1 N Q Ds G SC 4 (α),
(38)

where we define

G SC 4 ( α ) = − 1 2 γ SR π 1 1 − α exp ( − γ SR ( 1 − α ) ) 1 − 1 2 erfc γ SR α × 1 + 1 − 1 2 erfc γ SD ( 1 − α ) N + 1 2 γ SR π 1 α exp ( − γ SR α ) 1 − 1 2 erfc γ SR ( 1 − α ) × 1 + 1 − 1 2 erfc γ SD ( 1 − α ) N − 1 2 γ SD π 1 1 − α exp ( − γ SD ( 1 − α ) ) · 1 − 1 2 erfc γ SD ( 1 − α ) N − 1 1 − 1 2 erfc γ SR ( 1 − α ) × 1 − 1 2 erfc γ SR α .
(39)

For 0<α≤ 1 2 , we have

4 N 5 Q Db ( α ) N − 1 N Q Ds ( α ) N − 1 N Q Ds >0.
(40)

Thus, GSC4(α)=0 is the necessary condition for an optimal α. We can prove that the solutions of the equation GSC4(α)=0 always exist in 0<α≤ 1 2 . By (39), we obtain

lim α → 0 + G SC 4 ( α ) = − 1 4 γ SR π exp ( − γ SR ) 1 + 1 − 1 2 erfc γ SD N + 1 2 γ SR π lim α → 0 + 1 α 1 − 1 2 erfc γ SR × 1 + 1 − 1 2 erfc γ SD N − 1 4 γ SD π exp ( − γ SD ) 1 − 1 2 erfc γ SR × 1 − 1 2 erfc γ SD N − 1 = + ∞ ,
(41)
G SC 4 1 2 = − γ SD 2 π exp − γ SD 2 1 − 1 2 erfc γ SD 2 N − 1 × 1 − 1 2 erfc γ SR 2 2 ,
(42)

where lim x → c + f(x) represents the right-hand limit of a function f(x) as x approaches c. From (41) and (42), it can be seen that lim α → 0 + G SC 4 (α)>0 and G 1 2 <0, thus the intermediate-value theorem guarantees the existence of the solution in the considered range. Although it is difficult to prove the uniqueness of the solution for GSC4(α)=0 in 0<α≤ 1 2 in the proposed scheme, the value α SC 4 ∗ obtained by solving the equation GSC4(α)=0 numerically is used. The numerical results in Section 6 will show that α SC 4 ∗ can maximize the throughput RSC4(α).

4.2.2 4/16-QAM

A similar analysis applies in the case where node S uses 4/16-QAM in step 1. Here, the problem is to select α∈(0,1/2) that maximizes the throughput RSC16, given N, γSD, γSR, and γRD. Again, we can see that the value of α maximizing (36) and (37) does not depend on SNR γRD, as the HM is restricted to 4/16-QAM. Thus, we may assume γRD≥ΓR without loss of generality. By differentiating (37) with respect to α, we have

d R SC 16 ( ii ) ( α ) d α = 4 N 3 Q Db ( α ) 2 N − 1 2 N Q Ds ( α ) 2 N − 1 2 N Q Ds G SC 16 (α),
(43)

where we define

G SC 16 ( α ) = − 1 2 γ SR 2 π 1 − 1 2 erfc γ SR α 2 × 1 + 1 − 1 2 erfc γ SD ( 1 − α ) 2 2 N · 1 1 − α + 1 α exp − γ SR 2 + γ SR α ( 1 − α ) + 1 1 − α − 1 α exp − γ SR 2 − γ SR α ( 1 − α ) + γ SR 2 π 1 α exp − γ SR α 2 1 + 1 − 1 2 erfc γ SD ( 1 − α ) 2 2 N · 1 − 1 4 erfc γ SR ( 1 − α ) 2 − γ SR α 2 − 1 4 erfc γ SR ( 1 − α ) 2 + γ SR α 2 − γ SD 2 π 1 1 − α exp − γ SD ( 1 − α ) 2 1 − 1 2 erfc γ SD ( 1 − α ) 2 2 N − 1 × 1 − 1 2 erfc γ SR α 2 · 1 − 1 4 erfc γ SR ( 1 − α ) 2 − γ SR α 2 − 1 4 erfc γ SR ( 1 − α ) 2 + γ SR α 2 .
(44)

For 0<α< 1 2 , we have

4 N 3 Q Db ( α ) 2 N − 1 2 N Q Ds ( α ) 2 N − 1 2 N Q Ds >0.
(45)

Thus, GSC16(α)=0 is the necessary condition for an optimal α. We can prove that the solutions of the equation GSC16(α)=0 always exist in 0<α< 1 2 . By (44), we obtain

lim α → 0 + G SC 16 ( α ) = − 1 4 γ SR 2 π 1 + lim α → 0 + 1 α + 1 − lim α → 0 + 1 α · exp − γ SR 2 1 + 1 − 1 2 erfc γ SD 2 2 N + γ SR 2 π lim α → 0 + 1 α 1 − 1 2 erfc γ SR 2 × 1 + 1 − 1 2 erfc γ SD 2 2 N − 1 2 γ SD 2 π exp − γ SD 2 × 1 − 1 2 erfc γ SD 2 2 N − 1 1 − 1 2 erfc γ SR 2 = + ∞ ,
(46)
lim α → 1 2 − G SC 16 ( α ) = − γ SR π 1 − 1 2 erfc γ SR 4 − 3 4 exp − γ SR 4 × 1 + 1 − 1 2 erfc γ SD 4 2 N − 1 4 γ SR π exp − γ SR 4 erfc γ SR 1 + 1 − 1 2 erfc γ SD 4 2 N − γ SD π exp − γ SD 4 1 − 1 2 erfc γ SD 4 2 N − 1 × 3 4 − 1 4 erfc γ SR 1 − 1 2 erfc γ SR 4 ,
(47)

where lim x → c − f(x) represents the left-hand limit of a function f(x) as x approaches c. From (46) and (47), it can be seen that lim α → 0 + G SC 16 (α)>0 and lim α → 1 2 − G SC 16 (α)<0, thus the intermediate-value theorem guarantees the existence of the solution in the considered range. Again, the proposed scheme chooses the value α SC 16 ∗ obtained by solving the equation GSC16(α)=0 numerically which is shown to maximize the throughput RSC16 in Section 6.

5 Throughput analysis for the LDPC-coded case

5.1 Average throughput

In this subsection, we consider the average throughput of our scheme with FEC. When LDPC code is used, it is very difficult to obtain the exact closed-form expressions of BER and FER for the proposed method. So, in this paper, we assume that bit errors are independent of each other within each frame and that each bit has the same BER. We employ the following FER approximation used in [17, 18] to derive the throughput:

FER(γ)≈1− 1 − a · exp ( − bγ ) ℓ ,
(48)

where ℓ is the number of message bits and γ is the SNR. Parameters a and b in (48) are determined by fitting (48) to the FER curve obtained by simulations as explained in Section 6. Here, we consider the coding rates of 1 2 and 2 5 , although any other codes and rates can be similarly used in the proposed method. We adopt the code length of 64,800 as in the Digital Video Broadcasting - Satellite - Second Generation (DVB-S2) standard. The fitting parameters a and b are shown in Table 3. The parameter b for QPSK is half of that for BPSK, since QPSK requires double SNR to achieve the same BER as BPSK. For the same reason, the parameter b for 16-QAM is obtained by dividing the parameter b for BPSK by 7.2. Thus, we can write the FER approximation for QPSK (16-QAM) by only using the parameters a and b for BPSK. We will show that these fitting curves provide a good approximation for the FER obtained by simulations in Section 6.

Table 3 Parameters a and b for various modulations and coding rates

5.1.1 2/4-QAM

We derive the average throughput when node S selects 2/4-QAM in step 1. Here, to simplify the description, we assume that nodes S and R use identical LDPC code. Let r be the coding rate used at node S, giving L=r N in (15). We define A(r)=a and B(r)=b as parameters in Table 3 for BPSK modulation and coding rate r. For example, if r= 1 2 , A(r)=3.11×1012 and B(r)=47.9. Since node R decodes the BPSK signal xb at the SNR γSR(1−α), we have

Q Rb = 1 − A ( r ) exp − B ( r ) γ SR ( 1 − α ) rN .
(49)

Since node R decodes the BPSK signal xs at the SNR γSRα after canceling the interference from the signal xb, we have

Q Rs = 1 − A ( r ) exp − B ( r ) γ SR α rN .
(50)

As for the uncoded case, we describe the analysis for the cases where QPSK or 16-QAM are used at node R in step 2 (the case for BPSK may be derived similarly). In this case, the SNR threshold for switching between QPSK and 16-QAM is ΓR = 8 dB from Table 2. Then, QDs is given by

Q Ds = 1 − A ( r ) exp − 1 2 B ( r ) γ SR α rN , γ RD < Γ R , 1 − A ( r ) exp − 1 7.2 B ( r ) γ SR α rN , γ RD ≥ Γ R .
(51)

As node D decodes the BPSK signal xb in step 2 at the SNR γSD(1−α), we obtain

Q Db = 1 − A ( r ) exp − B ( r ) γ SD ( 1 − α ) rN .
(52)

By substituting (49), (50), (51), and (52) into (15), the average throughput for 2/4-QAM denoted by R ̂ SC 4 ( i ) (α) for γRD<ΓR and by R ̂ SC 4 ( ii ) (α) for γRD≥ΓR can be expressed as

R ̂ SC 4 ( i ) ( α ) = 2 r 3 1 − A ( r ) exp − B ( r ) γ SR ( 1 − α ) rN × 1 − A ( r ) exp − B ( r ) γ SR α rN · 1 − A ( r ) exp − 1 2 B ( r ) γ RD rN × 1 + 1 − A ( r ) exp − B ( r ) γ SD ( 1 − α ) rN ,
(53)
R ̂ SC 4 ( ii ) ( α ) = 4 r 5 1 − A ( r ) exp − B ( r ) γ SR ( 1 − α ) rN × 1 − A ( r ) exp − B ( r ) γ SR α rN · 1 − A ( r ) exp − 1 7.2 B ( r ) γ RD rN × 1 + 1 − A ( r ) exp − B ( r ) γ SD ( 1 − α ) rN .
(54)

Here, we require the following conditions for the probabilities (49), (50), (51), and (52) to have their value in the range of (0, 1 2 ]:

0 ≤ 1 − A ( r ) exp − B ( r ) γ SR α ≤ 1 ,
(55)
0 ≤ 1 − A ( r ) exp − B ( r ) γ SD ( 1 − α ) ≤ 1 ,
(56)
0 ≤ 1 − A ( r ) exp − 1 7.2 B ( r ) γ RD ≤ 1 .
(57)

From the conditions (55) and (56), we have the following inequalities for α:

log A ( r ) B ( r ) γ SR ≤α,α≤1− log A ( r ) B ( r ) γ SD .
(58)

Here, we assume that A(r), B(r), and γSD satisfy the inequality 1 2 ≤1− log A ( r ) B ( r ) γ SD , which is true if γSD>0.7 dB when using A(r) and B(r) in Table 3. Since the performance of our scheme has very limited gain when γSD≤0.7 dB, this is not a restrictive constraint. Thus with (58), we obtain the range of α,

C≜ log A ( r ) B ( r ) γ SR ≤α≤ 1 2 .
(59)

5.1.2 4/16-QAM

For 4/16-QAM, the average throughput can be derived as follows. Here, L=2r N in (15). Recall that node R decodes xb from the received signal yR with QPSK symbol detection in step 1, treating xs as noise. In the uncoded case, each bit of a basic message is mapped to one constellation point of QPSK symbol corresponding to the basic message, for example, to point B in Figure 4, for which the interference from xs deterministically results from points S1, S2, S3, or S4. However, in the coded case, each message bit is encoded by a generator matrix into a number of coded bits which are mapped into any 4/16-QAM constellation point across all symbols. Due to the difficulty of tracking all the constellation points corresponding to each message bit, we take a stochastic approach to approximate the impact of the interference from xs for each message bit as follows. When decoding a basic message bit, we can assume that the overall interference for the message bit results from the aggregation of a large number of interference components with power α, since the length of the LDPC codeword is very long. Therefore, from the central limit theorem, we can see the interference from xs as Gaussian noise with power of α. In this way, we can write QRb by using the fitting parameters A(r) and B(r) given by the FER approximation for LDPC-coded BPSK, and thus we have

Q Rb = 1 − A ( r ) exp − 1 2 B ( r ) 1 − α α + 1 γ SR 2 rN .
(60)

Since node R decodes the QPSK signal xs at SNR γSRα, we have

Q Rs = 1 − A ( r ) exp − 1 2 B ( r ) γ SR α 2 rN .
(61)

Using ΓR, QDs is given by

Q Ds = 1 − A ( r ) exp − 1 2 B ( r ) γ SR α 2 rN , γ RD < Γ R , 1 − A ( r ) exp − 1 7.2 B ( r ) γ SR α 2 rN , γ RD ≥ Γ R .
(62)

As node D decodes the QPSK signal xb in step 2 at SNR (1−α)γSD, we obtain

Q Db = 1 − A ( r ) exp − 1 2 B ( r ) γ SR ( 1 − α ) 2 rN .
(63)

By substituting (60), (61), (62), and (63) into (15), the average throughput with LDPC-coded 4/16-QAM denoted by R ̂ SC 16 ( i ) (α) for γRD<ΓR and by R ̂ SC 16 ( ii ) (α) for γRD≥ΓR can be expressed as

R ̂ SC 16 ( i ) ( α ) = r 1 − A ( r ) exp − 1 2 B ( r ) 1 − α α + 1 γ SR 2 rN × 1 − A ( r ) exp − 1 2 B ( r ) γ SR α 2 rN · 1 − A ( r ) exp − 1 2 B ( r ) γ RD 2 rN × 1 + 1 − A ( r ) exp − 1 2 B ( r ) γ SD ( 1 − α ) 2 rN ,
(64)
R ̂ SC 16 ( ii ) ( α ) = 4 r 3 1 − A ( r ) exp − 1 2 B ( r ) 1 − α α + 1 γ SR 2 rN × 1 − A ( r ) exp − 1 2 B ( r ) γ SR α 2 rN · 1 − A ( r ) exp − 1 7.2 B ( r ) γ RD 2 rN × 1 + 1 − A ( r ) exp − 1 2 B ( r ) γ SD ( 1 − α ) 2 rN .
(65)

Here, we require the follow the conditions for the probabilities (60), (61), (62), and (63) to have their values in the range of (0, 1 2 ]:

0 ≤ 1 − A ( r ) exp − 1 2 B ( r ) 1 − α α + 1 γ SR ≤ 1 ,
(66)
0 ≤ 1 − A ( r ) exp − 1 2 B ( r ) γ SR α ≤ 1 ,
(67)
0 ≤ 1 − A ( r ) exp − 1 2 B ( r ) γ SD ( 1 − α ) ≤ 1 ,
(68)
0 ≤ 1 − A ( r ) exp − 1 7.2 B ( r ) γ RD ≤ 1 .
(69)

From the conditions (66), (67), and (68), we have the following inequalities for α:

α ≤ 1 − 2 log A ( r ) B ( r ) γ SR 1 + 2 log A ( r ) B ( r ) − 1 ,
(70)
2 log A ( r ) B ( r ) γ SR ≤ α ,
(71)
α ≤ 1 − 2 log A ( r ) B ( r ) γ SD ,
(72)

Here, we assume that A(r), B(r), and γSD satisfy the inequality 1 2 ≤1− 2 log A ( r ) B ( r ) γ SD , which is true if γSD>4 dB, which again is not a restrictive constraint. Moreover, γSR satisfies the inequality 2 log A ( r ) B ( r ) γ SR ≤ 1 − 2 log A ( r ) B ( r ) γ SR 1 + 2 log A ( r ) B ( r ) − 1 . This inequality holds when γSR>6 dB, the region in which our scheme achieves significant gains. Thus with (70), (71), and (72), we get the region of α,

D≜ 2 log A ( r ) B ( r ) γ SR ≤α≤ 1 − 2 log A ( r ) B ( r ) γ SR 1 + 2 log A ( r ) B ( r ) − 1 ≜E.
(73)

5.2 Optimizing the power allocation

5.2.1 2/4-QAM

First, assuming that node S uses LDPC-coded 2/4-QAM in step 1, the problem is to select α∈(0,1/2] that maximizes the throughput R ̂ SC 4 , given r, N, γSD, γSR, and γRD. We assume γRD≥ΓR since the optimal value of α does not depend on SNR γRD. By differentiating (54) with respect to α, we have

d R ̂ SC 4 ( ii ) ( α ) d α = 2 r 2 N 3 Q Rb rN − 1 rN Q Rs rN − 1 rN Q Ds Ĝ SC 4 (α),
(74)

where we define

Ĝ SC 4 ( α ) = − A ( r ) B ( r ) γ SR exp − B ( r ) γ SR ( 1 − α ) × 1 − A ( r ) exp − B ( r ) γ SR α · 1 + 1 − A ( r ) exp − B ( r ) γ SD ( 1 − α ) rN + A ( r ) B ( r ) γ SR exp − B ( r ) γ SR α × 1 − A ( r ) exp − B ( r ) γ SR ( 1 − α ) · 1 + 1 − A ( r ) exp − B ( r ) γ SD ( 1 − α ) rN − A ( r ) B ( r ) γ SD exp − B ( r ) γ SD ( 1 − α ) × 1 − A ( r ) exp − B ( r ) γ SR ( 1 − α ) · 1 − A ( r ) exp − B ( r ) γ SR α × 1 − A ( r ) exp − B ( r ) γ SD ( 1 − α ) rN − 1 .
(75)

Given C defined in (59), when C≤α≤ 1 2 , we have

2 r 2 N 3 Q Rb rN − 1 rN Q Rs rN − 1 rN Q Ds rN − 1 rN ≥0.
(76)

Thus, Ĝ SC 4 (α)=0 is the necessary condition for an optimal α. We can prove that the solutions of the equation Ĝ SC 4 (α)=0 always exist in C≤α≤ 1 2 , since Ĝ SC 4 (C)≥0 and Ĝ SC 4 1 2 ≤0, where

Ĝ SC 4 ( C ) = B ( r ) γ SR 1 − A ( r ) exp − B ( r ) γ SR ( 1 − C ) · 1 + 1 − A ( r ) exp − B ( r ) γ SD ( 1 − C ) rN ,
(77)
Ĝ SC 4 1 2 = − A ( r ) B ( r ) γ SD exp − 1 2 B ( r ) γ SD · 1 − A ( r ) exp − 1 2 B ( r ) γ SR 2 × 1 − A ( r ) exp − 1 2 B ( r ) γ SD rN − 1 .
(78)

Although it is difficult to prove the uniqueness of the solution for Ĝ SC 4 (α)=0 in C≤α≤ 1 2 , in the proposed scheme, the value α ̂ SC 4 ∗ obtained by solving the equation Ĝ SC 4 (α)=0 numerically is used.

5.2.2 4/16-QAM

A similar analysis applies in the case where node S uses LDPC-coded 4/16-QAM in step 1. Here, the problem is to select α∈(0,1/2) that maximizes the throughput R ̂ SC 16 , given N, γSD, γSR, and γRD. Here, we assume γRD≥ΓR. By differentiating (65) with respect to α, we have

d R ̂ SC 16 ( ii ) ( α ) d α = 8 r 2 N 3 Q Rb 2 rN − 1 2 rN Q Rs 2 rN − 1 2 rN Q Ds Ĝ SC 16 (α),
(79)

where we define

Ĝ SC 16 ( α ) = − 1 2 A ( r ) B ( r ) exp − 1 2 B ( r ) 1 − α α + 1 γ SR 1 + 1 γ SR α + 1 γ SR 2 · 1 − A ( r ) exp − 1 2 B ( r ) γ SR α × 1 + 1 − A ( r ) exp − 1 2 B ( r ) γ SD ( 1 − α ) 2 rN + 1 2 A ( r ) B ( r ) γ SR exp − 1 2 B ( r ) γ SR α · 1 − A ( r ) exp − 1 2 B ( r ) 1 − α α + 1 γ SR × 1 + 1 − A ( r ) exp − 1 2 B ( r ) γ SD ( 1 − α ) 2 rN − 1 2 A ( r ) B ( r ) γ SD exp − 1 2 B ( r ) γ SD ( 1 − α ) × 1 − A ( r ) exp − 1 2 B ( r ) 1 − α α + 1 γ SR · 1 − A ( r ) exp − 1 2 B ( r ) γ SR α × 1 − A ( r ) exp − 1 2 B ( r ) γ SD ( 1 − α ) 2 rN − 1 .
(80)

Based on D and E defined in (73), when D≤α≤E, we have

8 r 2 N 3 Q Rb 2 rN − 1 2 rN Q Rs 2 rN − 1 2 rN Q Ds ≥0.
(81)

Thus, Ĝ SC 16 (α)=0 is the necessary condition for an optimal α. We can prove that the solutions of the equation Ĝ SC 16 (α)=0 always exist in D≤α≤E, since Ĝ SC 16 (D)≥0 and Ĝ SC 16 (E)≤0, where

Ĝ SC 16 ( D ) = 1 − A ( r ) exp − 1 2 B ( r ) γ SR ( 1 − D ) · 1 2 A ( r ) B ( r ) γ SR A ( r ) 1 + 1 − 1 2 A ( r ) exp − B ( r ) γ SD ( 1 − D ) 2 rN ,
(82)
Ĝ SC 16 ( E ) = − 1 2 B ( r ) 1 + 1 γ SR E + 1 γ SR 2 1 − A ( r ) exp − 1 2 B ( r ) γ SR E · 1 + 1 − A ( r ) exp − 1 2 B ( r ) γ SD ( 1 − E ) 2 rN .

Again, the proposed scheme chooses the value α ̂ SC 16 ∗ obtained by solving the equation Ĝ SC 16 (α)=0 numerically.

6 Numerical results

6.1 Reference schemes

We consider three alternatives to the proposed scheme when BPSK, QPSK, and 16-QAM are available for adaptive modulation:

  1. 1.

    Direct transmission. Node S transmits to node D directly without any help from node R. Node S chooses the modulation and coding rate to achieve the best throughput.

  2. 2.

    Multi-hop (MH) transmission. Only the relayed signal is considered at node D, not the direct one. After node R decodes the received signal from node S in step 1, it forwards in step 2 the remodulated signal given the SNR γ RD of link RD.

  3. 3.

    CD transmission. We consider the CD scheme proposed in [6], where different modulation rates can be used at node S and node R. In step 1, the signal transmitted by node S is received by both nodes R and D. At node R, the received signal is demodulated and retransmitted to node D in step 2 using the modulation adapted to the SNR γ RD of link RD. If node R uses the same modulation as in step 1, node D performs MRC of the signal received from node S in step 1 with the one received from node R in step 2 and decodes the combined signal. Otherwise, node D decodes the combined signal by using the LLR for each bit before decoding.

6.2 FER approximation

When we use half rate LDPC code and a modulation scheme among BPSK, QPSK, and 16-QAM, the FER obtained by simulations and the FER approximation (48) are compared with respect to γ in Figure 5. Here, the parameters a and b in Table 3 are used. The parameters a and b are determined as least square solutions by considering the shift and the slope of the simulated BER curve in logarithmic scale, respectively. It is shown that the fitting curve provides a good approximation for the simulated FER for each modulation.

Figure 5
figure 5

FER with half rate LDPC-coded BPSK, QPSK, and 16-QAM in AWGN channel: fitting curve and simulation.

Figure 6 compares the expression (60) with the parameters a and b for BPSK in Table 3, namely, A(r)=3.11×1012, B(r)=47.9, r= 1 2 , and N=64,800, with the simulated FER of the basic message for various values of α and γSR. We can observe a certain gap between the fitting curve and the simulated curve due to the Gaussian approximation of the interference from xs. However, since both the optimal power allocation parameter obtained by exhaustive search and the proposed power allocation parameter α ̂ SC 16 ∗ obtained numerically from Equation 80 have values less than 0.3, the gap between the approximated and simulated FER of the basic message is not so large. The throughput evaluations presented later show the validity of this approximation.

Figure 6
figure 6

FER of the basic message with half rate LDPC-coded 4/16-QAM in AWGN channel: fitting curve and simulation.

6.3 Performance comparison

Next, the proposed and reference schemes are evaluated in terms of average throughput for the uncoded and LDPC-coded cases under flat Rayleigh fading channels. For each link, instantaneous SNR levels with average denoted by γ i avg (i∈{SD,SR,RD}) are generated for each frame consisting of the two steps for the relaying schemes but are assumed to be constant during each frame.

6.3.1 Uncoded case

Figure 7 illustrates the throughput performance of the schemes for N=500, γ SD avg =10dB, and γ RD avg =19dB. Legends SC-2/4QAM (exh.), SC-2/4QAM (num.), and SC-2/4QAM (const.) refer to the simulation curves of the proposed SC scheme using uncoded 2/4-QAM with α given by exhaustive search, the proposed SC scheme with the optimized α determined numerically as α SC 4 ∗ in Section 4, and the proposed SC scheme with fixed α= 1 2 , respectively. Note that fixing α= 1 2 corresponds to a standard QPSK constellation, as considered in [8]. Then, SC-2/4QAM (ana.) refers to the analytical throughput derived in (25) to (26) with optimized α SC 4 ∗ . In this case, the throughput of the proposed SC scheme using 2/4-QAM outperforms the one using 4/16-QAM, which is why we omit the throughput curve of the latter case. Recall that in the analysis, node R only forwards the superposed message when it had been correctly decoded, while in the simulations, it is always forwarded regardless of its decoding result.

Figure 7
figure 7

Throughput of proposed and benchmark schemes for N=500 , γ avg SD =10 dB , γ avg RD =19 dB .

Finally, SC-2/4QAM (Gaus.) refers to the proposed SC scheme but using the optimal α determined in [8] that assumes Gaussian channel capacities.

We can find that the proposed method using the numerical solution α SC 4 ∗ for (39) closely approaches the throughput of the exhaustive searching case, although the uniqueness of the solution GSC4(α)=0 in (39) could not be proved. In addition, we see that the analytical throughput SC-2/4QAM (ana.) approaches well the simulated one SC-2/4QAM (num.), proving the validity of the derivations. Moreover, the poor performance of SC-2/4QAM (Gaus.) based on [8] shows the necessity of the proposed schemes and analysis for discrete HM. The proposed method with 2/4-QAM also outperforms the conventional relaying methods over 11dB≤ γ SR avg ≤18dB, when γ SD avg =10dB and γ RD avg =19dB. The large improvement over the fixed power allocation case is due to the fact that more power is allocated to the basic signal as the transmission over the SR link is virtually error-free in the range 13dB≤ γ SR avg ≤18dB.

Figure 8 shows the throughput performance of the schemes for varying values of γ SR avg when N=500, γ SD avg =11dB, and γ RD avg =19dB. Legends SC-4/16QAM (exh.), SC-4/16QAM (num.), and SC-4/16QAM (const.) refer to the proposed SC scheme using uncoded 4/16-QAM with α given by exhaustive search, the proposed SC scheme with the optimized α determined numerically as α SC 16 ∗ in Section 4, and the proposed SC scheme with fixed α= 1 5 , respectively. Note that fixing α= 1 5 corresponds to the square 16-QAM constellation of 4/16-QAM as in [8].

Figure 8
figure 8

Throughput of proposed and benchmark schemes for N=500 , γ avg SD =11 dB , γ avg RD =19 dB .

Again, SC-4/16QAM (ana.) refers to the analytical throughput derived in (36) to (37) with optimized α SC 16 ∗ . Finally, SC-4/16QAM (Gaus.) refers to the proposed SC scheme but using the optimal α determined in [8] assumes Gaussian channel capacities.

We can observe that the proposed scheme, where α SC 16 ∗ is found numerically from (44), achieves the same throughput as the scheme where α is obtained by exhaustive search for γ SR avg ≥18dB, proving the validity of our solution.b Moreover, the proposed method outperforms the conventional relaying methods for γ SR avg ≥20dB, when γ SD avg =11dB and γ RD avg =19dB. This is because the proposed method takes advantage of both direct and relayed links by optimizing the power allocation parameter, as shown by the large improvement over the fixed SC method using the constant power allocation parameter, α= 1 5 . Again, the performance of SC-4/16QAM (Gaus.) based on [8] is poor, validating the proposed approach.

Figure 9 shows the throughput performance of the schemes compared with respect to γ SD avg . When γ SD avg is lower, CD scheme outperforms other relaying schemes, while the direct transmission performs best for γ SD avg ≥18. The proposed SC scheme using 4/16-QAM can bridge the gap between those two extreme cases, i.e., for 10≤ γ SD avg ≤18. Thus, the proposed scheme is most beneficial when the direct link is worse than the relayed links, as in other relaying schemes, yet not too bad since it should be of sufficient quality for enabling the decoding of the basic message at node D.

Figure 9
figure 9

Throughput of proposed and benchmark schemes for N=500 , γ avg SR =30 dB , γ avg RD =19 dB .

Note that the best strategy in Figure 7 is to use the proposed SC scheme using 2/4-QAM with α SC 4 ∗ for 11dB≤ γ SR avg ≤18dB, then CD scheme for γ SR avg >18dB. In Figure 8, we should use direct transmission for γ SR avg ≤18dB, then the proposed SC scheme using 4/16-QAM with α SC 16 ∗ , for γ SR avg >18dB. In Figure 9, CD scheme should be selected for γ SD avg ≤10dB, then our SC scheme using 4/16-QAM with α SC 16 ∗ for 10dB< γ SD avg ≤18dB, and finally the direct transmission for γ SD avg >18dB.

6.3.2 LDPC-coded case

Figure 10 shows the throughput performance of the schemes for varying values of γ SR avg when γ SD avg =2dB and γ RD avg =8dB. Here, we depict the throughput for both coding rates of 1 2 and 2 5 . The throughput of the proposed SC scheme with 4/16-QAM is omitted here as 2/4-QAM achieves a better rate. We can observe that the proposed scheme, where α ̂ SC 4 ∗ is found numerically from (75), achieves much the same throughput as the scheme where α is obtained by exhaustive search in the region of interest ( γ SR avg ≥2.5dB), proving the validity of our solution. The slight decrease of the analytical throughput SC [LDPC,1/2]-2/4 QAM (ana.) compared to the simulated throughput of the proposed scheme SC [LDPC,1/2]-2/4 QAM (num.) is both due to the assumption in the analysis of only forwarding correctly decoded messages at the relay and to the fact that α ̂ SC 4 ∗ is derived from the approximated FER expression.

Figure 10
figure 10

Throughput of proposed and benchmark schemes for γ avg SD =2 dB , γ avg RD =8 dB .

It is also shown that the proposed method with 2/4-QAM outperforms the conventional relaying methods over most of the γ SR avg range for γ SD avg =2dB and γ RD avg =8dB, by using a coding rate of 2 5 for 1dB≤ γ SR avg ≤2.8dB, then the coding rate of 1 2 over γ SR avg ≥2.8dB. Moreover, it greatly enhances the performance of the constant power allocation case SC [LDPC,1/2]-2/4 QAM (const.). Once again, the performance of SC [LDPC,1/2]-2/4 QAM (Gaus.) based on [8] is extremely low, showing the necessity of our analysis in the LDPC-coded case, too.

Figure 11 shows the throughput performance of the schemes for varying values of γ SR avg when γ SD avg =5dB and γ RD avg =8dB and coding rate of 1 2 . In this case, we obtain the numerical solution of (80) α ̂ SC 16 ∗ within the range of 0.25 to 0.29, while we obtain the values of the optimal power allocation obtained by exhaustive search from 0.21 to 0.29. Accordingly, we see that the optimal throughput SC [LDPC,1/2]-4/16 QAM (exh.) with exhaustive search is closely approached by our scheme with numerical α ̂ SC 16 ∗ , SC [LDPC,1/2]-4/16 QAM (num.) in the region of interest, namely γ SR avg ≥8dB. Moreover, despite a certain gap due to the same reasons as in the previous case, the analytical throughput SC [LDPC,1/2]-4/16 QAM (ana.) is also close to that of SC [LDPC,1/2]-4/16 QAM (num.), showing the validity of the Gaussian approximation for interference. Moreover, the proposed method outperforms the conventional relaying methods for γ SR avg ≥8dB, with γ SD avg =5dB and γ RD avg =8dB. The best strategy in Figure 11 is to perform direct transmission for 7dB≤ γ SR avg ≤8dB, then the proposed SC scheme using 4/16-QAM with α ̂ SC 16 ∗ , for γ SR avg ≥8dB.

Figure 11
figure 11

Throughput of proposed and benchmark schemes for γ avg SD =5 dB , γ avg RD =8 dB .

Figure 12 shows the throughput performance of the schemes with respect to γ SD avg >0.7dB to meet conditions (55) to (56), when r= 1 2 , γ SR avg =5dB and γ RD avg =8dB. Similar to the uncoded case, the proposed scheme fills well the gap between the conventional relaying schemes and the direct transmission. The proposed SC scheme using half rate LDPC-coded 2/4-QAM with α ̂ SC 4 ∗ should be chosen for 0.7dB< γ SD avg ≤2.4dB, followed by direct transmission for γ SD avg >2.4dB.

Figure 12
figure 12

Throughput of proposed and benchmark schemes for N=500 , γ avg SR =5 dB , γ avg RD =8 dB .

Finally, we discuss about the required signaling overhead for implementing the proposed scheme in a practical system. Firstly, node S requires the channel state information feedback of the SR and SD links in order to optimize the power allocation parameter α∗, as shown in, e.g., (39), while node R requires CSI feedback for the RD link. However, the reference CD scheme of [6] also requires the same amount of CSI feedback as it should adapt its AMC levels depending on the state of the three links. By then, the only additional information that is needed by the proposed scheme is the knowledge of the actual power allocation parameter α which should be sent from S to nodes R and D in step 1. Note that the proposed scheme may still be implemented without this overhead by fixing α (corresponding to the const. curves in the figures), but significant gains in throughput are achieved at the expense of some extra bits for control.

7 Conclusions

Considering a three-node wireless relay system with and without FEC, we have proposed an SC-based scheme using discrete HM. We have derived the achievable throughput by analysis, taking into account the decoding errors occurring during SIC. Although a closed-form expression of the optimal power allocation parameter could not be derived, we have obtained the necessary conditions of the optimal power allocation, providing the numerical solution used in the proposed scheme. The simulation results show that the proposed scheme closely approaches the throughput performance obtained by exhaustive search for the optimal power allocation, validating our approach. Moreover, it is shown that over a large range of SNRs, the proposed scheme outperforms the conventional Direct, MH and CD schemes. Thus, relaying based on practical SC is proved to be very effective in a wireless relay system with various discrete modulations and FEC codings.

In the future work, we will extend the proposed SC scheme with discrete HM and coding for serving multiple relayed users in the context of scheduling in cellular relay systems.

Endnotes

a Although a total power constraint may be considered for studying the entire system efficiency, setting separate powers reflects the practical system constraints as S and R are distinct entities, each with a given power.

b Although there is a certain gap for γ SR avg <18dB, this region is not of interest since the best rate is achieved by direct transmission.

References

  1. Pabst R, Walke B, Schultz DC, Herhold P: Relay-based deployment concepts for wireless and mobile broadband radio. IEEE Commun. Mag 2004, 42(9):80-89. 10.1109/MCOM.2004.1336724

    Article  Google Scholar 

  2. Sendonaris A, Erkip E, Aazhang B: User cooperation diversity part I: system description. IEEE Trans. Commun 2003, 51: 1927-1938. 10.1109/TCOMM.2003.818096

    Article  Google Scholar 

  3. Laneman JN, Tse DNC, Wornell GW: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Trans. Inform. Theory 2004, 50(12):3062-3080. 10.1109/TIT.2004.838089

    Article  MathSciNet  MATH  Google Scholar 

  4. Wang T, Cano A, Giannakis GB, Laneman JN: High-performance cooperative demodulation with decode-and-forward relays. IEEE Trans. Commun 2007, 55(7):1427-1438.

    Article  Google Scholar 

  5. Zhang Y, Ma Y, Tafazolli R: Modulation-adaptive cooperation schemes for wireless networks. In Proceedings of the IEEE 67th Vehicular Technology Conference (VTC Spring 2008). Singapore; 11–14 May 2008:1320-1324.

    Chapter  Google Scholar 

  6. Kimura K, Nakada M, Obara T, Adachi F: Single-carrier cooperative DF relay using adaptive modulation. In Proceedings of the 8th IEEE Asia Pacific Wireless Communication Symposium (APWCS 2011). Singapore; 22–23 August 2011.

    Google Scholar 

  7. Popovski P, de Carvalho E: Spectrally-efficient wireless relaying based on superposition coding. In Proceedings of the IEEE 65th Vehicular Technology Conference (VTC Spring 2007). Dublin; 22–25 April 2007:2936-2940.

    Chapter  Google Scholar 

  8. Popovski P, de Carvalho E: Improving the rates in wireless relay systems through superposition coding. IEEE Trans. Wireless Commun 2008, 7(12):4831-4836.

    Article  Google Scholar 

  9. Cover TM: Broadcast channels. IEEE Trans. Inform. Theory 1972, IT-18: 2-14.

    Article  MathSciNet  MATH  Google Scholar 

  10. Bergmans PP, Cover TM: Cooperative broadcasting. IEEE Trans. Inform. Theory 1974, IT-20: 317-324.

    Article  MathSciNet  MATH  Google Scholar 

  11. Vittharadevuni PK, Alouini MS: BER computation of 4/M-QAM hierarchical constellations. IEEE Trans. Broadcasting 2001, 47(3):228-239. 10.1109/11.969372

    Article  Google Scholar 

  12. European Broadcasting Union, ETSI EN 300 744, V1.6.1. (2009-01) European Standard (Telecommunications series), Digital Video Broadcasting (DVB); Framing structure, channel coding and modulation for digital terrestrial television. 2009.

  13. Yamaura H, Kaneko M, Hayashi K, Sakai H: Superposition coding scheme with discrete adaptive modulation for wireless relay systems. In Proceedings of the IEEE 74th Vehicular Technology Conference (VTC Fall 2011). San Francisco; 5–8 September 2011:1-5.

    Chapter  Google Scholar 

  14. Proakis J, Salehi M: Digital Communications. New-York, NY: McGraw-Hill; 2007.

    Google Scholar 

  15. Goldsmith A: Wireless Communications. New-York, NY: Cambridge University Press; 2005.

    Book  Google Scholar 

  16. Chung ST, Goldsmith AJ: Degrees of freedom in adaptive modulation: a unified view. IEEE Trans. Commun 2001, 49(9):1561-1571. 10.1109/26.950343

    Article  MATH  Google Scholar 

  17. Simon MK, Alouini MS: Digital Communication Over Fading Channels: a Unified Approach to Performance Analysis. Hoboken, New Jersey: Wiley; 2000.

    Book  Google Scholar 

  18. Liu Q, Zhou S, Giannakis GB: Cross-layer combining of adaptive modulation and coding with truncated ARQ over wireless links. IEEE Trans. Wireless Commun 2004, 3(5):1746-1755. 10.1109/TWC.2004.833474

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the Grants-in-Aid for Scientific Research no. 10595739 and no. 24560457 from the Ministry of Education, Science, Sports, and Culture of Japan.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Megumi Kaneko.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://creativecommons.org/licenses/by/2.0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Yamaura, H., Kaneko, M., Hayashi, K. et al. Adaptive hierarchical modulation and power allocation for superposition-coded relaying. J Wireless Com Network 2013, 233 (2013). https://doi.org/10.1186/1687-1499-2013-233

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1499-2013-233

Keywords