 Research
 Open Access
 Published:
Latticecoded cooperation protocol for the halfduplex Gaussian twoway relay channel
EURASIP Journal on Wireless Communications and Networking volume 2015, Article number: 252 (2015)
Abstract
This paper studies the Gaussian twoway relay channel (GTWRC), where two nodes exchange their messages with the help of a halfduplex relay. We investigate a cooperative transmission protocol, consisting of four phases: multiple access (MA) phase, broadcast (BC) phase, and two cooperative phases. For this setup, we propose a new transmission scheme based on superposition coding for nested lattice codes, random coding, and jointly typical decoding. This scheme divides the message of each node into two parts, referred to as satellite codeword and cloud center. Depending on the phase type, the encoder sends a linear combination of satellite codewords or cloud centers. For comparison, a rate region outer bound using a cutset bound is provided. We show that the proposed scheme can achieve the capacity region in the high signaltonoise ratio (SNR) regime. In addition, the achievable rate region is within 0.5 bit of the outer bound, regardless of all channel parameters. Using numerical examples, we show that our proposed scheme achieves a larger rate region than the best known 4phase transmission strategy so far, called the Hybrid Broadcast (HBC) protocol by Kim et al. Our proposed scheme not only improves upon previous 2 and 3 and 4phase protocols but also can perform superior at some cases to the introduced 6phase protocol by Gong, Yue, and Wang (which has more complexity relative to our 4phase protocol).
Introduction
In the last couple of years, cooperative communication and relaying has attracted great interest in wireless networks and some scenarios have been studied from information theory perspective. The first model to study this problem, which consists of 3 nodes, is introduced by Van der Meulen [1]. Cover and El Gamal presented two coding strategies for this model [2]. In addition to oneway relaying, twoway communication between two nodes or bidirectional relaying is of great interest. In the twoway relay channel (TWRC), there exists a relay that facilitates exchange of messages between two nodes. In the full duplex mode, each node is able to transmit and receive simultaneously but in a halfduplex communication, each node can either receive or transmit data at each time slot.
Due to practical constraints on wireless nodes, in this paper, we study the Gaussian twoway relay channel (GTWRC) in a halfduplex mode. In the literature, there exist many transmission protocols for the GTWRC in a halfduplex mode, see, e.g., [3–7]. Each transmission protocol consists of a sequence of phases (or states) where each phase is specified by the modes of the halfduplex nodes (transmit or receive) all together. For instance, in the 3node halfduplex TWRC, there exist 8 possible states, out of which there are 6 useful phases as shown in Fig. 1 (the 2 phases in which all nodes are transmitting or all are receiving are not useful [8]).
The basic protocol for the TWRC, which consists of two phases (phase 1 and 2 of Fig. 1), is Multiple Access and Broadcast (MABC) protocol. In the first phase, which is referred to as the MA phase, two nodes simultaneously transmit to the relay. In the second phase, i.e, the BC phase, the relay broadcasts a signal to both nodes. There are several practical coding schemes that investigate this protocol, see e.g., [9–13]. In the BC phase, the relay combines the data from both nodes and broadcasts the combined data back to both nodes. For this phase, there exist several strategies for the processing at the relay node, e.g., an amplifyandforward (AF) strategy [5], a decodeandforward (DF) strategy [5, 14], or a compressandforward (CF) strategy [15]. The AF protocol is a simple scheme, which amplifies the signal transmitted from both nodes and retransmits it to them, and unlike the DF protocol, no decoding at the relay is performed. In the twoway AF relaying strategy, the signals at the relay are actually combined on the symbol level. Due to amplification of noise, its performance degrades at low signaltonoise ratios (SNRs). The twoway DF relaying strategy was proposed in [5], where the relay decodes the received data bits from the both nodes. Since the decoded data at the relay can be combined on the symbol level or on the bit level, there has been different datacombining schemes at the relay for the twoway DF relaying strategy: superposition coding, network coding, and lattice coding [16]. In the superposition coding scheme, applied in [5], the data from the two nodes are combined on the symbol level, where the relay sends the linear sum of the decoded symbols from both nodes. Shortly after the introduction of the twoway relay channel, its connection to network coding [17] was observed and investigated. The network coding schemes combine the data from nodes on the bit level using the XOR operation, see, e.g., [10, 18–22]. Latticebased coding uses modulo addition in a multidimensional space and utilizes nonlinear operations for data combining. Applying lattice codes over twoway relaying systems was considered in, e.g., [7, 12, 13, 23–25]. In general, as in CF or partial DF relaying strategies, the relay node does not need to decode the source messages but only needs to pass sufficient information to the destination nodes. A strategy based on symbolwise network coding, in which two modulated symbols with different modulation types directly being mapped to a transmitted signal at the relay is investigated in [9]. A combination of bitwise network coding and channel decoding is considered in [10]. A coding scheme based on distributed lineardispersion spacetime codes is considered in [11]. Nested lattice codes for the GTWRC in the symmetric and asymmetric case are considered in [12, 13], respectively. For the asymmetric case, based on a lattice partition chain, [12] shows that the achievable rate region is within 0.5 bit from the capacity region for each user. Note that in [12] all nodes operate in fullduplex mode and there is no direct channel between the source nodes. Using a compressandforward strategy based on nested lattice codes, some new achievable rate regions for the GTWRC are provided [7] where it is assumed that all nodes operate in halfduplex mode without any direct link between the communication nodes. In the proposed scheme in [7], a layered coding is applied: a common layer is decoded by both receivers and a refinement layer is recovered only by the receiver which has the better channel condition. In [24] the GTWRC which operates in fullduplex mode is considered. Based on decoding noninteger linear combination of lattice codewords (instead of decoding linear combination of them), it is shown that the capacity region of the GTWRC under MABC protocol is partially achieved [24]. However, it is shown that the MABC protocol may not perform well when the channel gains are asymmetric [3]. Thus, to improve performance and to achieve a larger rate region, protocols with more phases are proposed in the literature, e.g., [3, 6,26–28].
The capacity region of relay channel with state information at the sources or at the relay is investigated in [29–36]. The relay channel and the cooperative relay broadcast channel controlled by random parameters are studied in [29]. It is shown that when the state is noncausally known to transmitter and intermediate nodes, the decodeandforward can achieve the capacity region under some cases. The relay channel with state known noncausally at the relay is investigated in [30, 31]. Using GelfandPinsker coding, ratesplitting and decodeandforward, a lower bound on channel capacity is obtained for this channel and it is shown that for the degraded Gaussian channels, the lower bound meets the upper bound and thus the capacity region is achievable. The relay channel when the state is available only at the source is studied in [32–34]. By obtaining lower and upper bounds, it is shown that in a number of special cases, the capacity region is achievable. A partially cooperative relay broadcast channel (PCRBC) with state is studied in [35] where two situations including availability of the state noncausally at both the source and the relay and only at the source are analyzed. The relay interference channel with cognitive source where only the source knows (noncausally) the interference from the interferer is considered in [36] and some achievable rate regions are obtained.
In [26], the GTWRC with four phases (phases 1, 2, 5, and 6 of Fig. 1) is considered. It is shown that for both full and halfduplex modes, partial decodeandforward can achieve a rate region strictly larger than the time shared region of pure decodeandforward and direct transmission. Two different decodeandforward protocols with three and four phases, which have a better performance than MABC under some constraints on the asymmetric model, are considered in [3]. These protocols are referred to as Time Division Broadcast (TDBC) (phases 2, 5, and 6 of Fig. 1) and Hybrid Broadcast (HBC) (phases 1, 2, 5, and 6 of Fig. 1). If channel coefficients tend to symmetricchannel coefficients, then TDBC protocol has a poor performance compared with the MABC. But it is shown that at some cases, the achievable sum rate of HBC protocol contains set of points that are outside the outer bounds of the MABC and TDBC protocols.
To achieve a larger rate region than the HBC protocol in [3, 37], a protocol that uses all possible 6 phases (shown in Fig. 1) is proposed in [27, 28]. Although increasing the number of transmission phases results in improvement of achievable rate region with respect to the HBC protocol, it has more complexity relative to a 4phase protocol. In [8], by obtaining achievable rate regions and outer bounds for a 6phase protocol, it is shown that it can achieve a larger rate region compared with other protocols at some cases. In [6], two protocols are investigated: MABC protocol and TDBC protocol. Using decodeandforward, compressandforward, amplifyandforward, and a new mixedforward scheme, some achievable rate regions for these protocols are obtained. A 3phase protocol, which is called Cooperative Multiple Access Broadcast (CoMABC) and consists of phases 1, 2, and 4 of Fig. 1, is proposed in [38]. Using doubly nested lattice codes, an achievable rate region for this scheme is obtained and it is shown numerically that the CoMABC outperforms the MABC and TDBC protocols in terms of sum rate in asymmetric channel conditions. The twoway relaying in a Gaussian diamond channel is considered in [39] and it is shown that lattice codes under certain conditions can achieve rate regions close to the outer bound.
In this paper, in contrast to [27], instead of increasing the number of phases in order to achieve a larger rate region than the HBC protocol, we propose a new 4phase cooperative MABC protocol for the halfduplex GTWRC, including phases 1, 2, 3, and 4 of Fig. 1. First, consider the MABC protocol, which includes two phases, MA and BC phases. It is well known that lattice codes can achieve the capacity region of the MABC protocol within 0.5 bit [6, 12]. Thus, it seems that we do not need to consider GTWRC with more transmission phases (i.e., three or four or six phases). But, suppose that the link from the relay node to node 2 (1) is very weak (noisy) such that node 2 (1) can correctly decode the message of node 1 (2) at a very low rate. Thus, we require defining other phases to increase the rate. Now, consider the CoMABC protocol [38]. The CoMABC protocol consists of three phases: phases 1 and 2 are similar to the MABC protocol and at the third phase, by cooperating between node 1 and the relay node, we send information to node 2. To explain why we must use the CoMABC protocol, suppose that we are at the MABC protocol. At the end of second phase, the relay sends information bits to both nodes. Node 1 can recover its data while node 2, since has a weak link, can only decode the message of node 1 at a very low rate. Thus, to increase the data transmission rate, we use another phase to send data to node 2. Now, to explain our proposed scheme, again, consider the CoMABC protocol. Suppose that at the end of phase 2, node 1 can recover message of node 2 at a very low rate. Since at phase 3, we send no data to node 1, thus, we must define other phases to send extra data to node 1 to decode the message of node 2 at a higher rate. In our proposed scheme, at phases 3 and 4, we send some data to node 1 and node 2 to decode the message of the other node at a higher rate.
Our proposed protocol is denoted by 2CoMABC. In phase 1 and phase 2, the protocol is similar to the MABC. In these phases, both nodes cannot completely recover the message of each other. Thus, we introduce two other phases. In phase 3 and phase 4, each node with the help of the relay and the other node tries to recover the message of the other node. These two phases are referred to as the cooperative phases. For the first time in this paper, we propose a scheme based on a “superposition coding for nested lattice codes” for the GTWRC. In superposition coding, we divide the message of each node into two parts using nested lattice codes: satellite codeword and cloud center. Thus, if we want to recover a message, we must recover the satellite codeword and the cloud center simultaneously. In phase 1, based on the idea of computation coding [40], we recover a linear combination of messages. Due to structured codes, we can calculate the satellite codeword and cloud center for linear combination of messages. Then, we send the satellite codewords to nodes in phase 2 using “random coding”. In phase 3 and 4, we send the cloud centers to both nodes. At the end of phase 4, we can recover both messages. Although we apply the superposition coding using nested lattice codes to the 2CoMABC protocol, but one can use it to achieve better or same rate regions which are obtained at other papers. For example, we can apply it to the CoMABC protocol proposed in [38] and show that our proposed scheme includes the CoMABC scheme as a special case.
Finally, by examining many numerical examples (out of which some are presented here) and comparing the achievable rate region of the proposed scheme with that of the HBC protocol, it can be observed that our proposed scheme has a better performance than the HBC protocol. In addition, this scheme not only improves upon previous 2 and 3 and 4phase protocols but also can perform superior at some cases to the 6phase protocol, proposed in [27] (which has more complexity relative to a 4phase protocol).
In summary, our main contributions are as follows:

Proposing a new transmission scheme based on “superposition coding for nested lattice codes” and “random coding”.

Analyzing the proposed protocol in a new cooperative transmission scheme and showing that our proposed scheme can achieve the capacity rate region in the high SNR regime and within 0.5 bit in general.

Improving the rate region of the 4phase HBC protocol without increasing any complexity (in contrast to the proposed scheme at [27]).
The remainder of the paper is organized as follows. We present the channel model and the preliminaries on lattice codes in Section 2. In Section 3, first, we present the superposition coding for nested lattice codes and then we introduce and analyze our proposed scheme. In Section 4, an achievable rate region as well as a rate region outer bound based on the cutset bound are provided. Using numerical examples, achievable rate regions of different cooperative protocols are compared in Section 5. Section 6 concludes the paper.
Notations: Let \(C\,(x)=\frac {1}{2}\log \left (1+x\right)\). Logarithms are of base two. The random variables (RV) and their realizations are denoted by capital and small letters, respectively. x stands for a vector of length n, (x _{1},x _{2},…,x _{ n }). [x]^{+}= max{x,0} for \(x\in \mathbb {R}\).
Preliminaries: channel model and lattices
Channel model
The channel model for the GTWRC via 2CoMABC protocol is shown in Fig. 2. This paper studies a GTWRC with four phases which operates in halfduplex mode, i.e., each node can only either listen or transmit at the same time. In this model, nodes 1 and 2 intend to exchange independent messages \(W_{1}\in \left \{ 1,2,\ldots,2^{nR_{1}}\right \} \) and \(W_{2}\in \left \{ 1,2,\ldots,2^{nR_{2}}\right \} \) with the assistance of a relay (represented by node r). We denote the relative time duration of the mth phase by t _{ m } where \(\sum _{m}t_{m}=1\). For a given block size n, we denote the normalized duration of the mth phase by t _{ m,n }, and in achievability schemes, we must have \(\underset {n\rightarrow \infty }{\lim }t_{m,n}=t_{m}\) [6]. The random sequences \(\boldsymbol {X}_{i}^{k}\in \mathcal {X}_{i}\) and \(\boldsymbol {Y}_{i}^{k}\in \mathcal {Y}_{i}\), respectively, denote the channel input and output at kth channel use at node i, for i∈{1,2,r}. Note that the distributions of \(\boldsymbol {X}_{i}^{k}\) and \(\boldsymbol {Y}_{i}^{k}\) depend on the value of k, e.g., for k≤t _{1,n }.n, we are in phase 1; for t _{1,n }.n≤k≤(t _{1,n }+t _{2,n }).n, we are in phase 2; for (t _{1,n }+t _{2,n }).n≤k≤(t _{1,n }+t _{2,n }+t _{3,n }).n, we are in phase 3; and for (t _{1,n }+t _{2,n }+t _{3,n }).n≤k≤n, we are in phase 4 [6]. With a slight abuse of notation, assume that \(\boldsymbol {X}_{i}^{(m)}\) denotes the random variable with alphabet \(\mathcal {X}_{i}\) during phase m.
In the following, similar to [6], we define encoders, decoders, and associated probability of errors: let \(W_{S,T}:=\left \{ W_{i,j}i\in S,\,j\in T,\,S,T\subset \mathcal {M}\right \} \) denote the set of messages from nodes in set S to nodes in set T. Note that if node i does not have a message for node j, then we have W _{ i,j }=Ø. At node i, the encoder at channel use k is a function \({X_{i}^{k}}\left (W_{\left \{ i\right \},\mathcal {M}},{Y_{i}^{1}},{Y_{i}^{2}},\ldots,Y_{i}^{k1}\right)\in \mathcal {X}_{i}\); the decoder at node i after all n channel uses produces an estimate of the message W _{ j,i } using function \(\widehat {W}_{j,i}\left ({Y_{i}^{1}},{Y_{i}^{2}},\ldots,{Y_{i}^{n}},W_{\left \{ i\right \},\mathcal {M}}\right)\). The error event to decode the message W _{ i,j } at the end of the block of length n is defined by \(E_{i,j}:=\left \{ W_{i,j}\neq \widehat {W}_{i,j}\left (.\right)\right \} \), and the error event at node j in which node j wants to find w _{ i } at the end of phase m is denoted by \(E_{i,j}^{(m)}\). For a protocol with phase durations {t _{ m }}, a set of rates R _{ i,j } is said to be achievable if there exist encoders/decoders of block length n=1,2,… with both P[E _{ i,j }]→0 and t _{ m,n }→t _{ m } as n→∞ for all i, j, m. An achievable rate region is the closure of a set of achievable rate tuples for fixed {t _{ m }}. The set of all achievable rate tuples is the capacity region of the TWRC.
In this paper, we assume all links in the bidirectional relay channel are subject to independent, identically distributed (i.i.d) white Gaussian noise. In the following, we describe the Gaussian channel model for the 2CoMABC protocol. Communication process takes place in four phases: MA phase, BC phase, and two cooperative phases, as follows:
where all Gaussian noise sequences are zero mean with unit variance and the channel inputs are subject to average power constraints as the following:
In addition, g _{ ij } is the channel gain between transmitter i and receiver j. We assume that the channel is reciprocal such that g _{ ij }=g _{ ji } and each node is fully aware of g _{1r }, g _{2r }, and g _{12} (i.e., full CSI). Considering channel reciprocity, the channel coefficient between nodes 1 and r is denoted collectively as g _{1}, i.e., g _{1r }=g _{ r1}=g _{1}. Similarly, we have g _{2r }=g _{ r2}=g _{2} and g _{12}=g _{21}=g _{3}.
Lattice definitions
Here, we provide some necessary definitions on lattices and nested lattice codes. Interested readers can refer to [40–42] and the references therein for more details.
Definition 1.
(Lattice): A lattice Λ ^{(n)} is a discrete additive subgroup of \(\mathbb {R}^{n}\). A lattice Λ ^{(n)} can always be written in terms of a generator matrix \(\mathbf {G}\in \mathbb {R}^{n\times n}\) as
where \(\mathbb {Z}\) represents the set of integers.
Definition 2.
(Quantizer): The nearest neighbor quantizer \(\mathcal {Q}_{\Lambda }\) maps any point \(\boldsymbol {x}\in \mathbb {R}^{n}\) to the nearest lattice point:
Definition 3.
(Voronoi region): The fundamental Voronoi region of lattice Λ ^{(n)} is set of points in \(\mathbb {R}^{n}\) closest to the zero codeword, i.e.,
Definition 4.
(Moments): σ ^{2}(Λ ^{(n)}) which is called the second moment of lattice Λ ^{(n)} is defined as
and the normalized second moment of lattice Λ can be expressed as
where \(V=\int _{\mathcal {V}(\Lambda)}d\boldsymbol {x}\) is the Voronoi region volume.
Definition 5.
(Modulus): The modulo Λoperation with respect to lattice Λ returns the quantization error as
that maps x into a point in the fundamental Voronoi region and it is always placed in \(\mathcal {V}\).
The modulo lattice operation satisfies the following distributive property [43]
Definition 6.
(Quantization goodness or Rogersgood): A sequence of lattices \(\Lambda ^{(n)}\subseteq \mathbb {R}^{n}\) is good for meansquared error (MSE) quantization if
The sequence is indexed by the lattice dimension n. The existence of such lattices is shown in [44, 45].
Definition 7.
(AWGN channel coding goodness or Poltyrevgood): Let Z be a lengthn i.i.d. Gaussian vector, \(\boldsymbol {Z}\thicksim \mathcal {N}\left (\boldsymbol {0},{\sigma _{Z}^{2}}\boldsymbol {I}_{n}\right)\). The volumetonoise ratio of a lattice is given by
where \({\sigma _{Z}^{2}}\) is chosen such that \(\text {Pr}\left \{ \boldsymbol {Z}\notin \mathcal {V}\right \} =\epsilon \) and I _{ n } is an nbyn identity matrix. A sequence of lattices is Λ ^{(n)} Poltyrevgood if
and, for fixed volumetonoise ratio greater than 1, \(\text {Pr}\left \{ \boldsymbol {Z}\notin \mathcal {V}^{n}\right \} \) decays exponentially in n.
Definition 8.
(Nested lattices): A lattice Λ ^{(n)} is said to be nested in lattice \(\Lambda _{c}^{(n)}\) if \(\Lambda ^{(n)}\subseteq \Lambda _{c}^{(n)}\). Λ ^{(n)} is referred to as the coarse lattice and \(\Lambda _{c}^{(n)}\) as the fine lattice. The set of all points of a fine lattice \(\Lambda _{c}^{(n)}\) that are within the fundamental Voronoi region \(\mathcal {V}\) of a coarse lattice Λ ^{(n)} form a nested lattice code. The rate of a nested lattice code is defined as
Erez et al. show that there exists a sequence of lattices that are simultaneously good for packing, covering, source coding (Rogersgood), and channel coding (Poltyrevgood). In the following, we present a key property of dithered lattice codes.
Lemma 1.
[ 41 ] The Crypto Lemma Let V be a random vector with an arbitrary distribution over \(\mathbb {R}^{n}\). If D is independent of V and uniformly distributed over \(\mathcal {V}\), then (V+D)mod Λ is also independent of V and uniformly distributed over \(\mathcal {V}\).
Proof.
See lemma 1 in [41].
Latticecoded cooperation protocol
In this section, based on nested lattice codes, we propose an achievable rate region on the capacity region of the GTWRC. First, we present the superposition scheme for nested lattice codes that is a key to our code construction.
Superposition coding for nested lattice codes
Consider the following nested lattices:
The coding lattice (i.e., fine lattice) \(\Lambda _{c}^{(n)}\) provides the codewords, while the shaping sublattices (i.e., coarse lattices) \(\Lambda _{s1}^{(n)}\) and \(\Lambda _{s2}^{(n)}\) satisfy the power constraint. The set of points of fine lattice \(\Lambda _{c}^{(n)}\) that lies in the fundamental Voronoi region of shaping lattice \(\Lambda _{\textit {si}}^{(n)}\) forms a codebook for node i, i.e.,
and its rate is given by
The mesolattice [46] \(\Lambda _{m}^{(n)}\) partitions the set of codewords for node i into two parts. To clarify this discussion, we define two additional codebooks as follows:
where the associated coding rates are
Now, we can decompose each lattice codeword \(\boldsymbol {V}_{i}\in \mathcal {C}_{i}^{(n)}\) by \(\Lambda _{m}^{(n)}\) into two points, V _{ a,i } (an individual codeword in each cloud, referred to as a satellite codeword) and V _{ b,i } (the cloud center associated with a nested lattice, referred to as a cloud center):
where
The mesolattice point V _{ b,i } determines the cloud center in which V _{ i } resides, while V _{ a,i } identifies its location within the clouds (i.e., the individual codewords within the clouds). This scheme is similar to superposition coding in the broadcast channel [47].
The following theorem presents the main result of this paper.
Theorem 1.
An achievable region of the halfduplex bidirectional relay channel with the 2CoMABC protocol is the closure of the set of all points (R _{1},R _{2}) satisfying:
where \(R_{i,r}^{*}\overset {\triangle }{=}\left [\frac {1}{2}\log \left (\frac {{g_{i}^{2}}P_{i}}{{g_{1}^{2}}P_{1}+{g_{2}^{2}}P_{2}}+{g_{i}^{2}}P_{i}\right)\right ]^{+}\) and [ x]^{+}= max{0,x}.
In the following, the steps of the proof are presented. First, we provide a brief explanation of our coding and then present our scheme in more details. Without loss of generality, we assume that R _{1}≥R _{2}. Since we need two codebooks, three nested lattices for generating these codebooks are required. One of the lattices, \(\Lambda _{c}^{(n)}\), constructs the codewords while the other two lattices (shaping lattices) satisfy the channel power constraints (\(\Lambda _{s1}^{(n)}\) and \(\Lambda _{s2}^{(n)}\)). Based on the idea of computation coding [40], at the end of phase 1, we decode two linear combinations of messages. In order to decompose these linear combinations, which are points of \(\Lambda _{c}^{(n)}\), we define another lattice \(\left (\Lambda _{m}^{(n)}\right)\) that partitions \(\Lambda _{c}^{(n)}\) into clouds. Based on this coding strategy, both linear combinations have the same satellite codeword (i.e., an individual codeword in \(\mathcal {V}_{m}\)) but different cloud centers (i.e., an individual codeword in \(\mathcal {V}_{s1}\) or \(\mathcal {V}_{s2}\)).
In phase 2, we send the satellite codeword of the linear combinations to both nodes while in phase 3 and 4, we communicate the cloud center associated with the linear combination of codewords to node 1 and 2, respectively. Thus, at the end of phase 4, based on having the cloud center associated with a nested lattice and the individual codeword in that cloud, we can fully find the linear combination of messages at both nodes. Using the later decoding, we can decode the message of each node at the opposite node. In the following, we present our scheme in more details.
Phase 1 (MA phase)

Encoding:
By calculating the optimum phase durations, t _{1}, t _{2}, t _{3}, and t _{4}, we can determine the codeword length in each phase as \(n_{1}=\frac {t_{1}}{T_{s}}\), \(n_{2}=\frac {t_{2}}{T_{s}}\), \(n_{3}=\frac {t_{3}}{T_{s}}\), and \(n_{4}=\frac {t_{4}}{T_{s}}\), where T _{ s } is the sampling interval. In the following, without loss of generality, we assume that \({g_{1}^{2}}P_{1}\geq {g_{2}^{2}}P_{2}\). In order to apply the rate splitting, we choose a chain of lattices as (2), such that \(\Lambda _{s1}^{(n_{1})}\), \(\Lambda _{s2}^{(n_{1})}\) and \(\Lambda _{m}^{(n_{1})}\) are Rogersgood and Poltyrevgood while \(\Lambda _{c}^{(n_{1})}\) is Poltyrevgood. The generation of these lattices is fully explained in [45].
To send the messages W _{ i } i∈{1,2} to the relay node, using a onetoone mapping, we first map it to lattice codeword \(\boldsymbol {V}_{i}\in \mathcal {C}_{i}^{(n_{1})}\). Then, we construct the following sequence to transmit over the channel:
where D _{ i } is a dither that is uniformly distributed over the Voronoi region of \(\Lambda _{\textit {si}}^{(n_{1})}\), i.e., \(\boldsymbol {D}_{i}\sim \text {Unif}\left (\mathcal {V}_{\textit {si}}\right)\). Since the channel gains from node 1→r and 2→r are different, and we also aim to decode the sum of codewords V _{1} and V _{2} at the relay node, we preamplify the transmit signals by \(\frac {1}{g_{i}}\). According to the channel power constraints, we choose the second moments of lattices as the following:

Decoding:
The relay aims to recover the linear combination of V _{ i }’s instead of recovering V _{1} and V _{2}, separately. Thus, the lattice scheme inherits the idea of computation coding [40] and physicallayer network coding [48]. To reach this goal, with receiving the sequence
the relay performs the following operations:
where
Due to the dithers, the vectors \(\boldsymbol {V}_{1},\boldsymbol {V}_{2},\boldsymbol {X}_{1}^{(1)},\boldsymbol {X}_{2}^{(1)}\) are independent and also independent of \(\boldsymbol {Z}_{r}^{(1)}\). Therefore Z _{eff} is independent of V _{1} and V _{2}. Now, we choose α such that the variance of the effective noise, Z _{eff} is minimized. Hence, we obtain
After calculating \(\boldsymbol {Y}_{d_{r}}^{(1)}\), we need to obtain estimations of the following linear combinations:
To decode (7) using \(\boldsymbol {Y}_{d_{r}}^{(1)}\), we perform the following operation:
where (9) is based on the distributive law of the modulo operation. Now, we use the minimum Euclidean distance lattice decoding [41, 49] to decode V _{ r,1}, correctly. Thus, we get
From (9), we can see that the estimation is incorrect if
(10) shows that the estimation of V _{ r,1} is incorrect if the effective noise Z _{eff} leaves the Voronoi region surrounding the true codeword, i.e., \(P_{e}=\text {Pr}\left (\boldsymbol {Z}_{\text {eff}}\notin \mathcal {V}_{c}\right).\)
To show that \(P_{e}=\text {Pr}\left (\boldsymbol {Z}_{\text {eff}}\notin \mathcal {V}_{c}\right)\) goes to zero exponentially in n, we consider a Gaussian sequence, \(\mathcal {N}\left (\boldsymbol {0},{\sigma _{Z}^{2}}\boldsymbol {I}_{n}\right)\) with the same second moment as Z _{eff}, i.e., \(\boldsymbol {Z}_{\text {eff}}^{*}\sim \mathcal {N}\left (0,\text {Var}\left (\boldsymbol {Z}_{\text {eff}}\right)\right)\). Since the fine lattice \(\Lambda _{c}^{(n_{1})}\) is a Poltyrevgood lattice, then from Definition 7, we know that for a Gaussian sequence, \(\boldsymbol {Z}_{\text {eff}}^{*}\sim \mathcal {N}\left (0,\text {Var}\left (\boldsymbol {Z}_{\text {eff}}\right)\right)\), the following error probability \(\text {Pr}\left (\boldsymbol {Z}_{\text {eff}}^{*}\notin \mathcal {V}_{c}\right)\), vanishes as n _{1}→∞ if
If this occurs, then from Lemma 11 in [41], \(P_{e}=\text {Pr}\left (\boldsymbol {Z}_{\text {eff}}\notin \mathcal {V}_{c}\right)\) goes to zero exponentially in n as well. Now, from (3), we can obtain the rate of link 1→r and 2→r, i.e., \(R_{i,r}^{(1)}\), as follows:
where (12) follows from (11), and (13) is based on Rogers goodness of \(\Lambda _{\textit {si}}^{(n_{1})}\) and the fact that \(G\left (\Lambda _{\textit {si}}^{(n_{1})}\right)\geq \frac {1}{2\pi e}\). Thus, we obtain the achievable rate region of link 1→r and 2→r as
where
In order to decode the second term, (8), we assume that the estimation of V _{ r,1} is correct. This assumption is valid if \(R_{1,r}^{(1)}\) and \(R_{2,r}^{(1)}\) satisfy (14). Thus, we can calculate V _{ r,2} as:
where (15) follows from \(\Lambda _{s1}^{(n_{1})}\subseteq \Lambda _{s2}^{(n_{1})}\) and the distributive law of the modulo operation.
Now, the relay node decomposes the linear combinations of messages, V _{ r,1} and V _{ r,2}, as the following:
where (16) follows from (4) and the last equality follows from \(\Lambda _{s1}^{(n_{1})}\subseteq \Lambda _{s2}^{(n_{1})}\subseteq \Lambda _{m}^{(n_{1})}\) and \(\boldsymbol {V}_{b,i}\in \mathcal {C}_{b,i}^{(n)}\). To determine the cloud center, we perform the following operation:
where the last equality is based on the distributive law of the modulo operation. Thus using (18), we can decompose V _{ r,1} as follows:
Similarly, for V _{ r,2}, we get:
where
Note that \(\boldsymbol {L}_{a,i}\in \mathcal {C}_{a}^{(n_{1})}\) and \(\boldsymbol {L}_{b,i}\in \mathcal {C}_{b,i}^{(n_{1})}\) for i=1,2. As we showed in (17) and (19), due to the structure of nested lattice codes, we can determine L _{ a,i } and L _{ b,i } for i=1,2 using V _{ r,i }. Our coding strategy sends the linear combination of satellite codewords (associated with V _{1} and V _{2}), i.e., L _{ a,1} to both nodes in phase 2. In phase 3 and 4, we communicate the cloud center associated with the linear combination of codewords, i.e., L _{ b,2} and L _{ b,1} to node 1 and 2, respectively.
Phase 2 (broadcast phase)

Encoding:
In this phase, we send the codeword \(\boldsymbol {L}_{a,1}=\left [\boldsymbol {V}_{a,1}+\boldsymbol {V}_{a,2}\right ]\textrm {mod }\Lambda _{m}^{(n_{1})}\) to both nodes by random coding. Note that \(\boldsymbol {L}_{a,1}\in \mathcal {C}_{a}^{(n_{1})}\). Here, we apply jointtypicality scheme. First, we generate \(2^{n_{2}R_{r}^{(2)}}\) sequences, with each element i.i.d. according to \(\mathcal {N}\sim \left (0,P_{r}\right)\) and \(R_{r}^{(2)}=\max \left (R_{r,1}^{(2)},R_{r,2}^{(2)}\right)\), where \(R_{r,1}^{(2)}\) and \(R_{r,2}^{(2)}\) will be determined later. These sequences form a codebook \(\mathcal {C}_{r}^{(n_{2})}\). We assume a onetoone correspondence between each \(\boldsymbol {L}_{a,1}\in \mathcal {C}_{a}^{(n_{1})}\) and a codeword \(\boldsymbol {X}_{r}^{(2)}\in \mathcal {C}_{r}^{(n_{2})}\).

Decoding:
Let us denote the relay codeword by \(\boldsymbol {X}_{r}^{(2)}\left (\boldsymbol {L}_{a,1}\right)\). Based on \(\boldsymbol {Y}_{1}^{(2)}=g_{1}\boldsymbol {X}_{r}^{(2)}+\boldsymbol {Z}_{1}^{(2)},\) node 1 finds the relay message L _{ a,1} as \(\widehat {\boldsymbol {L}}_{a,1}\) if a unique codeword \(\boldsymbol {X}_{r}\left (\widehat {\boldsymbol {L}}_{a,1}\right)\in \mathcal {C}_{r,2}^{(n_{2})}\) exists such that \(\left (\boldsymbol {X}_{r}\left (\widehat {\boldsymbol {L}}_{a,1}\right),\boldsymbol {Y}_{1}^{(2)}\right)\) are jointly typical, where
Note that \(\mathcal {C}_{r,2}^{(n_{2})}=2^{n_{2}R_{r,1}^{(2)}}\)(since V _{ a,1} is known at node 1). Since node 1 has access to its codeword, V _{1}, its corresponding satellite codeword V _{ a,1} can be determined easily. Using the knowledge of v _{ a,1} and \(\widehat {\boldsymbol {L}}_{a,1}\) at node 1, it can decode the message of node 2 as:
From the argument of random coding and jointly typical decoding [50], we get
Similarly, node 2 with having V _{2} and thus its corresponding satellite codeword V _{ a,2} can find V _{ a,1} if
Phase 3 (first cooperative phase)
During this phase, only node 2 and the relay node transmit.

Encoding:
In this phase, node 1 attempts to decode V _{ b,2} to construct V _{2} using the decoded satellite codeword, \(\widehat {\boldsymbol {V}}_{a,2}\) from the previous phase. At the relay node, from phase 1, the following sequence is available:
The relay encodes \(\boldsymbol {L}_{r}^{(3)}\) and transmits it to node 1. Node 2 has access to V _{2} and V _{ a,1} (from phase 2) and thus can generate \(\boldsymbol {L}_{2}^{(3)}\overset {\triangle }{=}\left [\boldsymbol {V}_{b,2}+\mathcal {Q}_{\Lambda _{m}}\left (\boldsymbol {V}_{a,1}+\boldsymbol {V}_{a,2}\right)\right ]\textrm {mod }\Lambda _{s2}^{(n_{1})}\). Since, the relay and node 2 want to send \(\boldsymbol {L}_{r}^{(3)}\) and \(\boldsymbol {L}_{2}^{(3)}\) to node 1, respectively, we have a conventional MAC and we can apply any capacityachieving code. Note that \(\boldsymbol {L}_{r}^{(3)}=\left [\boldsymbol {L}_{2}^{(3)}+\boldsymbol {V}_{b,1}\right ]\textrm {mod }\Lambda _{s2}^{(n_{1})}\) and the cardinality of the sets of \(\boldsymbol {L}_{r}^{(3)}\) and \(\boldsymbol {L}_{2}^{(3)}\) are equal (based on the Crypto lemma in [41, 51]). We assume that this cardinality is \(2^{n_{3}R^{(3)}}\phantom {\dot {i}\!}\). To construct codebooks at node 2 and the relay node, we first find all values of \(\boldsymbol {L}_{2}^{(3)}\) and V _{ b,1} which results in the same \(\boldsymbol {L}_{r}^{(3)}\phantom {\dot {i}\!}\). Suppose that for each \(\boldsymbol {L}_{r}^{(3)}\phantom {\dot {i}\!}\), there are \(m_{i}\left (i\in \left \{ 1,2,\ldots,2^{n_{3}R^{(3)}}\right \}\right)\) values of \(\boldsymbol {L}_{2}^{(3)}\) and V _{ b,1} so that the sum of them with each other results in the same \(\boldsymbol {L}_{r}^{(3)}\). Now, consider a multivariate Gaussian distribution \(p\left (x_{2,1},x_{2,2},\ldots,x_{2,2^{n_{3}R^{(3)}}},x_{r}\right)\) with the following covariance matrix:
where ρ _{2r } denotes the correlation coefficient between x _{2,i } and x _{ r } for \(i\in \left \{ 1,2,\ldots,2^{n_{3}R^{(3)}}\right \} \). To generate the codebook at node 2, we use the marginal distributions \(p\left (x_{2,1}\right),p\left (x_{2,2}\right),\ldots,p\left (x_{2,2^{n_{3}R^{(3)}}}\right)\) and by each one of them, construct a codeword with each element i.i.d. These sequences form a codebook \(\mathcal {C}_{2}^{(n_{3})}\) for node 2. This enables node 2 to map \(\boldsymbol {L}_{2}^{(3)}\) to a codeword \(\boldsymbol {X}_{2}^{(3)}\left (\boldsymbol {L}_{2}^{(3)}\right)\in \mathcal {C}_{2}^{(n_{3})}\).
Now at the relay node, we generate the codebook \(\mathcal {C}_{r}^{(n_{3})}\). In order to construct this codebook, suppose \(\mathcal {X}_{i}\) is set of all \(\boldsymbol {X}_{2,i}\left (\boldsymbol {L}_{2}^{(3)}\right)\) such that for the corresponding \(\boldsymbol {L}_{2}^{(3)}\), there exist a V _{ b,1} such that \(\boldsymbol {L}_{r}^{(3)}\) is the same for them. Now, we generate \(2^{n_{3}R^{(3)}}\phantom {\dot {i}\!}\) sequences according to the marginal distribution \(p\left (x_{r}\mathcal {X}_{i}\right)\). The relay maps \(\boldsymbol {L}_{r}^{(3)}\) to a codeword \(\boldsymbol {X}_{r}^{(3)}\left (\boldsymbol {L}_{r}^{(3)}\right)\in \mathcal {C}_{r}^{(n_{3})}\). Note that both mappings at the relay and node 2 are onetoone correspondence.

Decoding:
In this phase, the decoder of node 1 attempts to decode V _{ b,2} to construct V _{2}. Note that node 1 already has V _{ a,2} from phase 2. Since V _{ b,1} is known at node 1, and the following equality holds for \(\boldsymbol {L}_{2}^{(3)}\) and \(\boldsymbol {L}_{r}^{(3)}\): \(\boldsymbol {L}_{r}^{(3)}=\left [\boldsymbol {L}_{2}^{(3)}+\boldsymbol {V}_{b,1}\right ]\textrm {mod }\Lambda _{s2}^{(n_{1})}\), the decoder of node 1 suffices to decode either \(\boldsymbol {L}_{2}^{(3)}\) or \(\boldsymbol {L}{}_{r}^{(3)}\). Based on the received sequence in this phase, \(\boldsymbol {Y}_{1}^{(3)}=g_{1}\boldsymbol {X}_{r}^{(3)}+g_{3}\boldsymbol {X}_{2}^{(3)}+\boldsymbol {Z}_{1}^{(3)},\) node 1 estimates the message of node 2, \(\boldsymbol {L}_{2}^{(3)}\), as \(\widehat {\boldsymbol {L}_{2}^{(3)}}\) if a unique codeword \(\boldsymbol {X}_{2}^{(3)}\left (\widehat {\boldsymbol {L}_{2}^{(3)}}\right)\in \mathcal {C}_{2}^{(n_{3})}\) exists such that \(\left (\boldsymbol {X}_{r}^{(3)}\left (\left [\widehat {\boldsymbol {L}_{2}^{(3)}}+\boldsymbol {v}_{b,1}\right ]\textrm {mod }\Lambda _{s2}^{(n_{1})}\right),\boldsymbol {X}_{2}^{(3)}\left (\widehat {\boldsymbol {L}_{2}^{(3)}}\right),\boldsymbol {Y}_{1}^{(3)}\right)\) are jointly typical, where
From the argument of random coding and jointly typical decoding [50], we get
Note that by decoding \(\boldsymbol {L}_{2}^{(3)}\), we can decode V _{ b,2} as the following:
Also, using flow constraints, we have
Thus, if the rate of \(\boldsymbol {X}_{r}^{(3)}\left (\boldsymbol {L}_{r}^{(3)}\right)\) or \(\boldsymbol {X}_{2}^{(3)}\left (\boldsymbol {L}_{2}^{(3)}\right)\), which are equal, is less than the sum capacity of the multipleaccess channel, node 2 can transmit another sequence to node 1 in this phase. Suppose that \(\boldsymbol {X}_{2}^{'(3)}\) denotes this supplementary sequence. Given the data rate of \(\boldsymbol {X}_{2}^{'(3)}\) as \(R_{2,1}^{(3)}\), error probabilities vanish as n _{3}→∞, if the following constraints are satisfied:
Using (22), the constraints in (23) and (24) can be rewritten as follows:
Phase 4 (second cooperative phase)
In this phase, we can use the explained scheme at phase 3. Since the message of node 2 is recovered by node 1 at phase 3, it can construct the following sequence, which the relay has it as well:
Here, we assume that p(x _{1},x _{ r }) is a bivariate Gaussian distribution. The correlation coefficient between X _{1} and X _{ r } is denoted by ρ _{1r }, Var(X _{1})=P _{1} and Var(X _{ r })=P _{ r }. By using this distribution, we generate \(2^{n_{4}R^{(4)}}\phantom {\dot {i}\!}\) sequences, with each element i.i.d. according to p(x _{1},x _{ r }). We choose the first component of the generated sequence as a codeword for node 1 and the second component as a codeword for the relay node. These sequences form two codebooks \(\mathcal {C}_{1}^{(n_{4})}\) and \(\mathcal {C}_{r}^{(n_{4})}\). Node 1 and relay map L _{ b,1} to \(\boldsymbol {X}_{1}^{(4)}\left (\boldsymbol {L}_{b,1}\right)\) and \(\boldsymbol {X}_{r}^{(4)}\left (\boldsymbol {L}_{b,1}\right)\), respectively, and send them to node 2. Thus, we have a conventional MAC and the capacity region is easily achieved. But, we can see that if individual rate of node 1 and the relay is less than the sum capacity of the MAC, node 1 in this phase can communicate another data sequence, denoted by \(\boldsymbol {X}_{1}^{'(4)}\). Thus, to correctly recover \(\boldsymbol {X}_{r}^{(4)}\left (\boldsymbol {L}_{b,1}\right)\) and \(\boldsymbol {X}_{1}^{'(4)}\) in this phase, we get:
where \(t_{4}R^{(4)}=t_{1}R_{1,r}^{(1)}t_{2}R_{r,2}^{(2)}\). Thus, we can rewrite (27) and (28) as the following:
Encoding and decoding at nodes in four phases are explained with the help of Table 1.
Achievable rate region
From (14), (20), (21), (25), (26), (29) and (30), the following rate region is achieved:
Since there are outgoing data flows from node 1 to node 2 at phases 1 and 4, from (31) and (37), we get:
Similarly, there are information flows from node 2 to node 1 at phases 1 and 3. Thus, we get
The rate region outer bound and capacity results
The rate region outer bound
In this subsection using the cutset bound, we obtain an outer bound over the rate region of the halfduplex GTWRC. This bound can be derived from the halfduplex cutset bound in [52].
Lemma 2.
All rate pairs of the discrete memoryless restricted halfduplex twoway relay channel, as shown in Fig. 2, that are achievable for some joint probability distributions
must satisfy
where all t _{ m } are nonnegative subject to \(\overset {4}{\underset {m=1}{\sum }}t_{m}=1\).
Proof.
For a halfduplex relay network with k phases in which the sequence of phases is fixed with fraction of time, any achievable rate R of information flow is upper bounded as follows [53]
where a cut partitions nodes into two sets S and S ^{c} such that the source nodes are in S, the destination nodes are in S ^{c}, and S ^{c} is the complement of S. Using this, we bound R _{1} and R _{2}. For communication rate from node 1 to node 2, i.e., R _{1}, we divide the nodes into two sets, S={1} and S={1,r}. As seen from Fig. 2, node 1 only transmits to relay and node 2 in phases t _{1} and t _{4}, i.e., there is data rate from S={1} to S ^{c}={r,2} only in phases t _{1} and t _{4}. Thus,
On the other hand, there exists data rate from S={1,r} to S ^{c}={2} only in phases t _{2} and t _{4}. Therefore, we get
Now, by minimizing over two cuts, i.e., minimizing (43) and (44), we get the desired bound in (41). Similarly, we can conclude the bound on R _{2} which is given by (42).
For the Gaussian model, we can upper bound the various mutual information terms as the following [53]
where ρ _{1r } is the correlation coefficient between \(X{}_{1}^{(4)}\) and \(X_{r}^{(4)}\) and ρ _{2r } is the correlation coefficient between \(X{}_{2}^{(3)}\) and \(X_{r}^{(3)}\). Using these mutual information terms at the outer bounds, given in (41) and (42), we get:
\thelikesubsubsection Linear resource allocation problem
In (45) and (46), phases t _{1}, t _{2}, t _{3}, and t _{4} are not determined. Since the capacity region, which should be the convex hull of all achievable rate pairs (R _{1},R _{2}), has two dimensions, this region has no unique maximum and we cannot determine optimum values for phases. To solve this problem, we use an alternative metric that is commonly used in [3, 6]. In this metric, we maximize the sum rate, i.e., R _{1}+R _{2}. Thus, we have the following optimization problem with t _{1}, t _{2}, t _{3}, and t _{4} as optimization parameters:
We can easily transform this problem to a standard form and solve this optimization problem.
Capacity results
Corollary 1.
The capacity region of the halfduplex Gaussian twoway relay channel via the 2CoMABC protocol, as shown in Fig. 2, is achievable within 0.5 bit.
Proof.
We first calculate the gap for R _{1}. For calculating the gap for R _{1}, if we compare the righthand sides (RHS) of (5) and (41), the second term in both minimizations is the same and the first terms differ by at most \(\frac {1}{2}\) bit. To see this, we have:
where (48) is based on the fact that the maximum gap occurs at \(\frac {{g_{1}^{2}}P_{1}}{{g_{1}^{2}}P_{1}+{g_{2}^{2}}P_{2}}+{g_{1}^{2}}P_{1}=1\). Now, from a simple inequality min(a _{1},a _{2})− min(b _{1},b _{2})≤ max(a _{1}−b _{1},a _{2}−b _{2}), the RHSs of (5) and (45) differ by at most \(\frac {1}{2}\) bit. The same holds for (6) and (46), and thus the achievable rate region which is given by (5) and (6) is within 0.5 bit of the outer bound for each user regardless of channel parameters.
Now, we investigate the achievable rate region of the GTWRC via 2CoMABC protocol in the high SNR regime.
Corollary 2.
At high SNRs (i.e., \({g_{1}^{2}}P_{1}\gg 1\) and \({g_{2}^{2}}P_{2}\gg 1\)), the capacity region of the GTWRC via 2CoMABC protocol is given by
where o(1)→0 as \({g_{1}^{2}}P_{1},{g_{2}^{2}}P_{2}\rightarrow \infty \).
To evaluate the achievable rate region of the GTWRC via 2CoMABC protocol that is given by (5) and (6), in the high SNR regime, we consider \({g_{1}^{2}}P_{1}\gg 1\) and \({g_{2}^{2}}P_{2}\gg 1\). Thus, we have:
By comparing this region with the outer bound in (45) and (46) for \({g_{1}^{2}}P_{1}\gg 1\) and \({g_{2}^{2}}P_{2}\gg 1\), we can see that the capacity region is achievable at high SNRs.
Numerical results
In this section, we compare the achievable rate region and the outer bound, in the sum rate sense, of the bidirectional coded cooperation protocols: the MABC protocol [3], the TDBC protocol [3], the CoMABC protocol [38], the HBC [3], the 6phase protocol [27], and our proposed scheme, 2CoMABC. Since we have studied a 4phase protocol, and the MABC and TDBC protocols have two and three phases, respectively, we compare the achievable rate region of our protocol with the outer bound of MABC and TDBC protocols.

MABC protocol (outer bound): The MABC protocol is a twophase protocol (phases 1 and 2 of Fig. 1) where both users simultaneously transmit during the first phase and the relay alone transmits during the second. The outer bound of the MABC protocol is given by [3]:
$$\begin{array}{@{}rcl@{}} R_{1} & \leq & \min\left\{ t_{1}C\left({g_{1}^{2}}P_{1}\right),t_{2}C\left({g_{2}^{2}}P_{r}\right)\right\},\\ R_{2} & \leq & \min\left\{ t_{1}C\left({g_{2}^{2}}P_{2}\right),t_{2}C\left({g_{1}^{2}}P_{r}\right)\right\}. \end{array} $$ 
TDBC protocol (outer bound): The second protocol considers sequential transmissions from the two users followed by a transmission from the relay:
$${\fontsize{8.8pt}{9.6pt}\selectfont{\begin{aligned} R_{1} & \leq \min\left\{ t_{1}C\left(P_{1}\left({g_{1}^{2}}+{g_{3}^{2}}\right)\right),t_{1}C\left({g_{3}^{2}}P_{1}\right)+t_{3}C\left({g_{2}^{2}}P_{r}\right)\right\},\\ R_{2} & \leq \min\left\{ t_{2}C\left(P_{2}\left({g_{2}^{2}}+{g_{3}^{2}}\right)\right),t_{2}C\left({g_{3}^{2}}P_{2}\right)+t_{3}C\left({g_{1}^{2}}P_{r}\right)\right\}.\end{aligned}}} $$ 
In [38], using doubly nested lattice codes, an achievable rate region for three phases CoMABC protocol is obtained. The achievable rate region for this protocol is given by [38]
$$\begin{array}{@{}rcl@{}} R_{1} & \leq & \min\left\{ t_{1}R_{1,r}^{*}+t_{3}C\left({g_{3}^{2}}P_{1}\right),t_{2}C\left({g_{2}^{2}}P_{r}\right)\right.\\&&+\left. t_{3}C\left({g_{2}^{2}}P_{r}+{g_{3}^{2}}P_{1}\right)\right\},\\ R_{2} & \leq & \min\left\{ t_{1}R_{2,r}^{*},t_{2}C\left({g_{1}^{2}}P_{r}\right)\right\}. \end{array} $$ 
HBC protocol (achievable rate region): The HBC protocol contains four phases (phases 1, 2, 5, and 6 of Fig. 1) which starts with the broadcast phases (5 and 6) followed by the MABC phases (1 and 2). In [3], it is shown that for the HBC protocol, the following rate region is achievable:
$$\begin{array}{@{}rcl@{}} {}R_{1} & \leq & \min\left\{ t_{1}C\left({g_{1}^{2}}P_{1}\right)+t_{3}C\left({g_{1}^{2}}P_{1}\right)\right., \\ &&t_{1}C\left({g_{3}^{2}}P_{1}\right) + \left.t_{4}C\left({g_{2}^{2}}P_{r}\right)\right\}, \end{array} $$((51))$$\begin{array}{@{}rcl@{}} {}R_{2} & \leq & \min\left\{ t_{2}C\left({g_{2}^{2}}P_{2}\right)+t_{3}C\left({g_{2}^{2}}P_{2}\right)\right., \\ &&t_{2}C\left({g_{3}^{2}}P_{2}\right) +\left. t_{4}C\left({g_{1}^{2}}P_{r}\right)\right\}, \end{array} $$((52))$$\begin{array}{@{}rcl@{}} {}R_{1}+R_{2} & \leq & t_{1}C\left({g_{1}^{2}}P_{1}\right)+t_{2}C\left({g_{2}^{2}}P_{2}\right)\\&&+t_{3}C\left({g_{1}^{2}}P_{1}+{g_{2}^{2}}P_{2}\right). \end{array} $$((53))
An outer bound for the HBC protocol using the cutset bound is given in [3]. Since it is not clear that jointly Gaussian distributions are optimal, it is difficult to compute the outer bound of the HBC protocol numerically [3]. However, using the presented approach at [53], we can bound the given outer bound in [3] as the following for the Gaussian case:

HBC protocol (outer bound)
$$\begin{array}{@{}rcl@{}} R_{1} & \leq & \min\left\{ t_{1}C\left({g_{1}^{2}}P_{1}+{g_{3}^{2}}P_{1}\right)+t_{3}C\left({g_{1}^{2}}P_{1}\right),\right.\\ && \left.t_{1}C\left({g_{3}^{2}}P_{1}\right)+t_{4}C\left({g_{2}^{2}}P_{r}\right)\right\},\\ R_{2} & \leq & \min\left\{ t_{2}C\left({g_{2}^{2}}P_{2}+{g_{3}^{2}}P_{2}\right)+t_{3}C\left({g_{2}^{2}}P_{2}\right),\right.\\&&\left. t_{2}C\left({g_{3}^{2}}P_{2}\right)+t_{4}C\left({g_{1}^{2}}P_{r}\right)\right\}. \end{array} $$ 
6phase protocol (achievable rate region) [27]
$$\begin{array}{@{}rcl@{}} {}R_{1} & \leq & R_{1,2}^{(4)}+\min\left\{\vphantom{\left.t_{2}C\left({g_{2}^{2}}P_{r}\right)+R_{r,2}^{(4)}\right\}}\left(t_{1}+t_{5}\right)C\left({g_{1}^{2}}P_{1}\right),t_{5}C\left({g_{3}^{2}}P_{1}\right)\right.\\&&+\left.t_{2}C\left({g_{2}^{2}}P_{r}\right)+R_{r,2}^{(4)}\right\},\\ {}R_{2} & \leq & R_{2,1}^{(3)}+\min\left\{\vphantom{\left.t_{2}C\left({g_{2}^{2}}P_{r}\right)+R_{r,2}^{(4)}\right\}} \left(t_{1}+t_{6}\right)C\left({g_{2}^{2}}P_{2}\right),t_{6}C\left({g_{3}^{2}}P_{2}\right)\right.\\&&+\left.t_{2}C\left({g_{1}^{2}}P_{r}\right)+R_{r,1}^{(3)}\right\},\\{} R_{1}+R_{2} & \leq & t_{5}C\left({g_{1}^{2}}P_{1}\right)+R_{1,2}^{(4)}+t_{6}C\left({g_{2}^{2}}P_{2}\right)\\&&+t_{1}C\left({g_{1}^{2}}P_{1}+{g_{2}^{2}}P_{2}\right)+R_{2,1}^{(3)},\\ {}R_{1,2}^{(4)} & \leq & t_{4}C\left({g_{3}^{2}}P_{1}\right),\:R_{r,2}^{(4)}\leq t_{4}C\left({g_{2}^{2}}P_{r}\right),\:R_{1,2}^{(4)}\\&&+R_{r,2}^{(4)}\leq t_{4}C\left({g_{2}^{2}}P_{r}+{g_{3}^{2}}P_{1}\right),\\ {}R_{2,1}^{(3)} & \leq & t_{3}C\left({g_{3}^{2}}P_{2}\right),\:R_{r,1}^{(3)}\leq t_{3}C\left({g_{1}^{2}}P_{r}\right),\:R_{2,1}^{(3)}\\&&+R_{r,1}^{(3)}\leq t_{3}C\left({g_{1}^{2}}P_{r}+{g_{3}^{2}}P_{2}\right). \end{array} $$
Kim et al. [3] show that the achievable rate region for the HBC protocol contains points that are outside the outer bounds of the MABC and TDBC protocols. In [27], it is shown that by using a 6phase protocol, we can achieve a better rate region than the obtained rate region of the HBC protocol in [3]. Note that this improvement is due to increasing number of transmission phases from 4 to 6 (which induces higher complexity). Here, we numerically compare 2CoMABC with the abovementioned protocols. When we compare the sum rate outer bounds or achievable sum rates for different protocols, linear programming is used to optimize the portion of time allocated to each phase. In the following, for all nodes, we assume that the power constraint equals to P and we define \(\text {SNR}_{i}={g_{i}^{2}}P\) for i∈{1,2,3}.
We compare the sum rate in an environment with path loss. We assume the channel gains to be \(g_{1}=\left (1+d\right)^{\frac {\gamma }{2}}\), \(g_{2}=\left (1d\right)^{\frac {\gamma }{2}}\) and \(g_{3}=2^{\frac {\gamma }{2}}\), where d is the position of the relay and γ is the path loss exponent.
The achievable sum rate and sum rate outer bound with different d for HBC and 2CoMABC protocols are given in Fig. 3. The figures are evaluated at P=5 dB and 15 dB, respectively, with γ=4 and ρ _{1r }=ρ _{2r }=0.2. As we expected from Corollary 2, for 2CoMABC, the inner bound meets the outer bound at high SNR and performs superior to the HBC protocol. Also at P=15 dB, the achievable rate for 2CoMABC protocol is larger than the HBC outer bound. For P=5 dB, there is a gap between the inner bound and the outer bound for 2CoMABC protocol. This gap at d=±1 tends to zero due to \(R_{1,r}^{*}\rightarrow C\left ({g_{1}^{2}}P_{1}\right)\) or \(R_{2,r}^{*}\rightarrow C\left ({g_{2}^{2}}P_{2}\right)\).
In Fig. 4, we compare the achievable sum rates and sum rate outer bounds with different path loss exponents for 2CoMABC and HBC protocols. The results are for γ=2,5 with P=10 dB. Since we have normalized the channel gain at d=0, the two groups of curves meet at this position. As we observe, for smaller γ, the gap between 2CoMABC protocol and HBC protocol is significantly larger than the case of an environment with larger value of path loss exponent. Moreover, achievable sum rate region and sum rate outer bound of 2CoMABC protocol is larger than that of HBC under any circumstance.
In Figs. 5 and 6, we compare the rate region of different protocols in asymmetric and symmetric scenarios. For the asymmetric case, we see that the achievable rate region of our proposed scheme not only contains the achievable rate region of all previous protocols but it also contains some rates of the 6phase protocol in [27]. For the symmetric case, the achievable rate region of our proposed scheme is completely better than all other protocols and it fully contains the rate region of them.
In Fig. 7, we compare the rate region of protocols in low SNRs, SNR_{1}=−3 dB, SNR_{2}=−4 dB, and SNR_{3}= 2 dB. As we observe, the performance of our transmission scheme via the 2CoMABC protocol is similar to the 6phase transmission protocol and both schemes achieve the same rate region. In addition, this rate region coincides with the outer bound of the TDBC protocol. Note that the achievable rate region using CoMABC protocol is zero and thus by the proposed scheme in [38], no rate region for this protocol can be achieved.
Finally, we compare the performance of HBC, 6phase, CoMABC, TDBC, MABC, and 2CoMABC protocols (in the sense of achievable sum rate) for P=15 dB, g _{2}=0 dB, g _{3} =−5 dB with different \(G_{1}={g_{1}^{2}}\). Figure 8 shows that the achievable sum rate for 2CoMABC is larger than that of all other protocols. Note that in this example, 2CoMABC protocol, which only uses four transmission phases, has a larger sum rate than the 6phase protocol in [27].
Conclusions
In this paper, the Gaussian twoway relay channel in the halfduplex mode, which operates in four phases, is studied. By using superposition coding, a scheme which achieves the outer bound within 0.5 bit is proposed. In this scheme, both structured codes and random coding have been used. In phase 1 (MA phase), we decompose the message of each user into two parts due to structured codes. In phase 2 (BC phase) and phase 3 and 4 (cooperative phases), random coding is applied. In the high SNR regime, the proposed scheme coincided with the cutset outer bound and thus the capacity region is achieved. Also, using numerical examples, we showed that our 2CoMABC protocol performs superior to the wellknown HBC protocol (which has the same number of transmission phases). Although in general the comparison for few examples may not provide a general insight on which scheme outperforms the others, similar behavior has been observed by evaluating the achievable sum rates and the achievable rate regions in many other examples with different channel parameters.
References
 1
E Van Der Meulen, Threeterminal communication channels. Adv. Appl. Probab. 3(1), 120–154 (1971).
 2
TM Cover, AAE Gamal, Capacity theorems for the relay channel. IEEE Trans. Inf. Theory. 25(5), 572–584 (1979).
 3
S Kim, P Mitran, V Tarokh, Performance bounds for bidirectional coded cooperation protocols. IEEE Trans. Inf. Theory. 54(11), 5235–5241 (2008).
 4
B Rankov, A Wittneben, Spectral efficient protocols for halfduplex fading relay channels. IEEE J. Sel. Areas Commun. 25(2), 379–389 (2007).
 5
B Rankov, A Wittneben, in Proc. 43rd Allerton Conf. Commun., Contr., Comput. Spectral efficient protocols for nonregenerative halfduplex relaying (University of IllinoisMonticello, IL, 2005).
 6
S Kim, N Devroye, P Mitran, V Tarokh, Achievable rate regions and performance comparison of half duplex bidirectional relaying protocols. IEEE Trans. Inf Theory. 57(10), 6405–6418 (2011).
 7
S Smirani, M Kamoun, M Sarkiss, A Zaidi, P Duhamel, Achievable rate regions for twoway relay channel using nested lattice coding. IEEE Trans. Wireless Commun. 13(10), 5607–5620 (2014).
 8
K Ishaque Ashar, V Prathyusha, S Bhashyam, A Thangaraj, in Proc. 50th Allerton Conf. Commun., Contr., Comput. Outer bounds for the capacity region of a Gaussian twoway relay channel (IEEEMonticello, IL, 2012), pp. 1645–1652.
 9
T KoikeAkino, P Popovski, V Tarokh, Optimized constellations for twoway wireless relaying with physical network coding. IEEE J. Sel. Areas Commun. 27(5), 773–787 (2009).
 10
S Zhang, SC Liew, Channel coding and decoding in a relay system operated with physicallayer network coding. IEEE J. Sel. Areas Commun. 27(5), 788–796 (2009).
 11
QF Zhou, Y Li, FCM Lau, B Vucetic, Decodeandforward twoway relaying with network coding and opportunistic relay selection. IEEE Trans. Commun. 58(11), 3070–3076 (2010).
 12
W Nam, S Chung, YH Lee, Capacity of the Gaussian twoway relay channel to within 1/2 bit. IEEE Trans. Inf. Theory. 56(11), 5488–5494 (2010).
 13
MP Wilson, K Narayanan, H Pfister, A Sprintson, Joint physical layer coding and network coding for bidirectional relaying. IEEE Trans. Inf. Theory. 56(11), 5641–5654 (2010).
 14
TJ Oechtering, H Boche, in Proc. ISITA. Optimal resource allocation for a bidirectional regenerative halfduplex relaying (IEEESeoul Korea, 2006).
 15
C Schnurr, TJ Oechtering, S Stanczak, in Proc. 41st Annual Asilomar Conference on Signals, Systems, and Computers. Achievable rates for the restricted halfduplex twoway relay channel (IEEEPacific Grove, CA, 2007).
 16
J Zhao, Analysis and design of communication techniques in spectrally efficient wireless relaying systems (Master’s thesis, ETH Zurich, 2010).
 17
R Ahlswede, N Cai, SYR Li, RW Yeung, Network information flow. IEEE Trans. Inf. Theory. 46(5), 1204–1216 (2000).
 18
Y Wu, P Chou, SY Kung, in Proc. 39th Ann. Conf. Inf. Sci. Syst. (CISS). Information exchange in wireless networks with network coding and physicallayer broadcast (The Johns Hopkins UniversityBaltimore, MD, USA, 2005).
 19
P Larsson, N Johansson, KE Sunell, in Proc. IEEE Vehicular Technology Conf. (VTC). Coded bidirectional relaying (IEEEMelbourne, Australia, 2006).
 20
P Popovski, H Yomo, in Proc. IEEE Int. Conf. Commun. (ICC). Physical network coding in twoway wireless relay channels (IEEEGlasgow, Scotland, 2007), pp. 707–712.
 21
J Liu, M Tao, Y Xu, X Wang, in Proc. IEEE GLOBECOM. Superimposed XOR: a new physical layer network coding scheme for twoway relay channels (IEEEHonolulu, Hawaii, 2009), pp. 1–6.
 22
Q Zhou, Y Li, F Lau, B Vucetic, Decodeandforward twoway relaying with network coding and opportunistic relay selection. IEEE Trans. Comm. 58(11), 3070–3076 (2010).
 23
IJ Baik, SY Chung, in Proc. IEEE Int. Conf. Commun. (ICC). Network coding for twoway relay channels using lattices (IEEEBeijing, China, 2008), pp. 3898–3902.
 24
S GhasemiGoojani, H Behroozi, in Proc. IEEE Inf. Theory Workshop (ITW). On the IceWine problem: recovering linear combination of codewords over the Gaussian multiple access channel (IEEEHobart, Australia, 2014).
 25
S GhasemiGoojani, H Behroozi, Nested lattice codes for Gaussian twoway relay channels. Available at http://arxiv.org/abs/1301.6291, Accessed Jan. 2013.
 26
P Zhong, M Vu, in Proc. IEEE Int. Conf. Commun. (ICC). Partial decodeforward coding schemes for the Gaussian twoway relay channel (IEEEOttawa, Canada, 2012).
 27
C Gong, G Yue, X Wang, A transmission protocol for a cognitive bidirectional shared relay system. IEEE J. Sel. Top. Sign. Proces. 5(1), 160–170 (2011).
 28
M Khafagy, A ElKeyi, M Nafie, T ElBatt, in Proc. IEEE Int. Conf. Commun. (ICC). Degrees of freedom for separated and nonseparated halfduplex cellular MIMO twoway relay channels (IEEEOttawa, Canada, 2012).
 29
A Zaidi, L Vandendorpe, P Duhamel, in IEEE Int. Commun. Conf. (ICC). Lower bounds on the capacity regions of the relay channel and the cooperative relaybroadcast channel with noncausal sideinformation (IEEEGlasgow, Scotland, 2007), pp. 6005–6011.
 30
A Zaidi, SP Kotagiri, JN Laneman, L Vandendorpe, Cooperative relaying with state available noncausally at the relay. IEEE Trans. Inf. Theory. 56(5), 2272–2298 (2010).
 31
A Zaidi, SP Kotagiri, JN Laneman, L Vandendorpe, in Proc. IEEE Information Theory Workshop (ITW). Cooperative relaying with state at the relay (IEEEPorto, Portugal, 2008), pp. 139–143.
 32
A Zaidi, S Shamai, P Piantanida, L Vandendorpe, Bounds on the capacity of the relay channel with noncausal state at source. IEEE Trans. Inf. Theory. 59(5), 2639–2672 (2013).
 33
A Zaidi, L Vandendorpe, Lower bounds on the capacity of the relay channel with states at the source. Eurasip J. Wireless Commun. Netw. 2009:, 1–23 (2009).
 34
A Zaidi, S Shamai, P Piantanida, L Vandendorpe, in Proc. IEEE ISIT. Bounds on the capacity of the relay channel with noncausal state information at source (IEEEAustin, TX, 2010), pp. 639–643.
 35
A Zaidi, L Vandendorpe, in Proc. IEEE ISIT. Rate regions for the partiallycooperative relay broadcast channel with noncausal side information (IEEENice, France, 2007), pp. 1246–1250.
 36
A Zaidi, L Vandendorpe, in IEEE Int. Commun. Conf. (ICC). Achievable rates for the Gaussian relay interferer channel with a cognitive source (IEEEDresden, Germany, 2009), pp. 1–6.
 37
S GhasemiGoojani, H Behroozi, A new achievable rate region for the Gaussian twoway relay channel via hybrid broadcast protocol. IEEE Commun. Lett. 18(11), 1883–1886 (2014).
 38
Y Tian, D Wu, C Yang, A Molisch, Asymmetric twoway relay with doubly nested lattice codes. IEEE Trans. Wireless Commun. 11(2), 694–702 (2012).
 39
S Bhashyam, A Thangaraj, in Proc. 51th Ann. Allerton Conf. The Gaussian twoway diamond channel (IEEEMonticello, IL, 2013), pp. 1292–1299.
 40
B Nazer, M Gastpar, Computeandforward: harnessing interference through structured codes. IEEE Trans. Inf. Theory. 57(10), 6463–6486 (2011).
 41
U Erez, R Zamir, Achieving 1/2 log(1 + SNR) on the AWGN channel with lattice encoding and decoding. IEEE Trans. Inf. Theory. 50(22), 2293–2314 (2004).
 42
JH Conway, NJA Sloane, Packings, Lattices and Groups (SpringerVerlag, New York, 1992).
 43
B Nazer, M Gastpar, Computation over multipleaccess channels. IEEE Trans. Inf. Theory. 53(19), 3498–3516 (2007).
 44
R Zamir, M Feder, On lattice quantization noise. IEEE Trans. Inf. Theory. 42(4), 1152–1159 (1996).
 45
U Erez, S Litsyn, R Zamir, Lattices which are good for (almost) everything. IEEE Trans. Inf. Theory. 51(16), 3401–3416 (2005).
 46
M Nokleby, B Azhang, in IEEE Int’ l Conf on Comm. (ICC). Lattice coding over the relay channel (IEEEKyoto, Japan, 2011), pp. 1–5.
 47
TM Cover, Broadcast channels. IEEE Trans. Inf. Theory. 18(13), 2–14 (1972).
 48
S Zhang, SC Liew, PP Lam, in Proceedings of the 12th annual international conference on Mobile computing and networking. Hot topic: physicallayer network coding (ACMLos Angeles, CA, USA, 2006), pp. 358–365.
 49
G Poltyrev, On coding without restrictions for the AWGN channel. IEEE Trans. Inf. Theory. 40(9), 409–417 (1994).
 50
TM Cover, JA Thomas, Elements of Information Theory, 2nd edn (John Wiley & Sons, New York, 2006).
 51
GD Forney, in 41st Ann. Allerton Conf. Commun., Control Comput. On the role of MMSE estimation in approaching the information theoretic limits of linear Gaussian channels: Shannon meets Wiener (University of IllinoisMonticello, IL, 2003).
 52
MA Khojastepour, A Sabharwal, B Aazhang, in Proc. 2nd International Workshop on Information Processing (IPSN). Bounds on achievable rates for general multiterminal networks with practical constraints (SringerVerlagPalo Alto, CA, 2003).
 53
M Khojastepour, A Sabharwal, B Aazhang, in Global Telecommunications Conference, 2003. GLOBECOM’03. On capacity of Gaussian cheap relay channel (IEEESan Francisco, USA, 2003), pp. 1776–1780.
Acknowledgements
This work has been supported by the Iran NSF under Grant No. 93046836.
Author information
Additional information
Competing interests
The authors declare that they have no competing interests.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
GhasemiGoojani, S., Behroozi, H. Latticecoded cooperation protocol for the halfduplex Gaussian twoway relay channel. J Wireless Com Network 2015, 252 (2015) doi:10.1186/s1363801504832
Received:
Accepted:
Published: