Alternative relaying for cooperative multiple-access channels in wireless vehicular networks

In this paper, a novel spectrally efficient half-duplex cooperative transmission protocol is proposed for cooperative multiple-access channels in wireless vehicular networks, where multiple sources (vehicles) deliver messages to a common destination (roadside base station or roadside infrastructure) with the help of multiple decode-and-forward relays (roadside stations). The basic idea is to apply superposition coding at each transmitter in order to achieve the full diversity gain, where the linear zero-forcing detection is used at each relay to combat inter-relay interference. Compared to existing uplink cooperative protocols, the proposed scheme can exploit the cooperation involving both the relays and the sources. An achievable diversity-multiplexing trade-off is developed for the proposed transmission protocol. Even with strong inter-relay interference which has been ignored by many existing works, the proposed scheme can still approach the optimal multiple-input single-output upper bound. Numerical results have also been provided to demonstrate the performance of the proposed protocol.


Background
Recent researches have paid much attention to wireless vehicular ad hoc networks (VANETs) since they are important to intelligent transportation, environment monitoring, etc [1,2]. Unlike the cellular networks, there does not exist a powerful base station in a vehicular ad hoc network, so peer-to-peer transmission is relied on. Correspondingly, a key problem is how to design the routing protocols to efficiently forward the source messages to the destination. One potential method is to design cross-layer protocols for mobile vehicular ad hoc networks. For example, the work in [3] has shown that cooperative transmission, a low-cost and effective alternative to multiple-input multiple-output (MIMO) techniques to enhance the physical layer performance, can bring its physical layer benefits to the upper layer, such as the design of routing protocols.
Motivated by these benefits of cooperative transmission, this paper aims to design a novel cooperative transmission scheme for the multiple access channel (MAC) in the wireless vehicular networks.
Exploring cooperation among the source nodes has been studied in [4,5] for the MACs. The work in [4] proposed a cooperative multiple-access (CMA) transmission protocol using amplify-and-forward (AF) strategy, and its decode-and-forward (DF) version has been proposed in [5] by using superposition (SP) coding at each source, where the idea of superposition coding was first proposed in [6] to increase the system capacity. Specifically, the key idea of such superimposed cooperative schemes is that each user will share parts of its power with other users and transmit a mixture of its own and others' information. The diversity-multiplexing trade-off (DMT) [7] achieved by these schemes can approach the optimal multipleinput single-output (MISO) upper bound. However, such schemes only exploit the cooperation among the sources and are therefore constrained by the number of sources. http://jwcn.eurasipjournals.com/content/2014/1/165

Related work
To further improve the reception robustness, exploiting relays as an extra dimension has been recognized as a cost-effective way, since the number of idle users is always larger than the active ones in a typical wireless network. However, extra time slots may be consumed to repeat source messages in relay transmission. For example, due to the half-duplex constraint, there exists a loss of spectral efficiency for the classical orthogonal transmission schemes [8,9]. The standard non-orthogonal transmission strategies in [4,10] can make some improvement and achieve the full multiplexing gain but still suffer a significant diversity loss for large multiplexing gains, if compared with the optimal MISO upper bound. To overcome limitation of the available diversity, a successive relaying concept which aims to physically reuse the relay-destination channels was studied in [11][12][13][14]. The basic idea is to arrange two or more relays to alternatively retransmit the source messages. To deal with the inter-relay interference, the inter-relay link was usually assumed to be either sufficiently strong or weak in these DF-relaying works. A cooperative transmission protocol named as shifted successive DF relaying (SSDFR) was proposed in [14], where maximum likelihood (ML) decoding is utilized at two multiple-antenna relays. In [15], another cooperative transmission protocol, called relay-reuse DF (RRDF), has been proposed to the scenario with a single source node, which yields furthermore improvement in comparison with [14] due to the linear zero-forcing (ZF) detection which can reduce the computational complexity.
For a general uplink scenario with multiple users and relays, it is still a challenging problem to integrate the cooperation among the sources and the cooperation from the relays. In [16,17], each relay utilized superposition coding to assist each source. However, the developed upper bound of DMT in [16,17] can only be achieved with some assumptions on the conditions of inter-relay channels. The work in [18] considered a more general scenario and proposed a cooperative protocol, called relay-assisted CMA (R-CMA), which carefully schedules the multiple sources and relays' transmission, but the optimal MISO bound can only be approached for a large number of relays. More works that considered such multi-user multi-relay networks can be found in [19][20][21], where the assistance of relays has been well exploited. Generally, these works only use the assistance of relays without the cooperation between sources, which cannot fully exploit the capacity of the uplink system.

Contribution
This paper aims to design a novel cooperative transmission protocol for a CMA channel to integrate the cooperation from dedicated relays and the mutual cooperation between users.
Specially, we consider a cooperative multiple-access communication scenario in which multiple source nodes communicate with the common destination with multiple half-duplex relays. Such a communication pattern is an important building block in wireless VANETs. For example, some proposals of intelligent vehicle highway systems (IVHS) have introduced a variety of vehicle-to-vehicle and vehicle-to-roadside-infrastructure communications. In this case, cooperation can take place between vehicles or between vehicles and roadside stations. When some vehicles wish to send messages to a common roadside base-station, they can cooperate with each other and also obtain external assistances from more powerful roadside stations with multiple antennas.
The proposed cooperative transmission protocol is termed as alternative-relaying decode-and-forward (ARDF) throughout this paper. The main novelty is that a new cooperative multiple-access transmission protocol has been designed by carefully applying these low-cost tools (zero-forcing detection, antenna selection, superposition coding, repetition-coded decode-and-forward, etc.) and fully exploiting the potentials of relay and source cooperation. To the best of the authors' knowledge, no existing works can effectively achieve this full cooperation. The basic idea of the proposed protocol is to combine the superposition coding [6] with RRDF scheme [15]. By carefully arranging the transmission process and applying superposition coding at transmitters, each source can be assisted by all the other nodes, including relays and other sources; by utilizing the linear ZF decoding in terms of RRDF transmission scheme, the reuse of the relaydestination links can be achievable in the scenario with a general inter-relay interference. Hence, the potential of such a system can be fully exploited, and the full diversity gain can be achievable. Antenna selection is also applied at each relay to select the best antenna for transmitting, which can preserve the full diversity gain and save transmit power.
DMT is used to evaluate the spectral efficiency of the proposed CMA protocol, since it has been recognized as an effective information-theoretic criterion. The achievable DMT for the proposed ARDF protocol for the CMA channel is developed by characterizing the associated outage probabilities of outage events. From the derived result, we can show that the DMT of the proposed scheme can approach the optimal MISO upper bound when the length of one cooperative data frame is large. Compared to the previous CMA schemes in [4,5] and R-CMA in [18], the proposed cooperative scheme achieves a better DMT curve at most multiplexing gain ranges, especially when the frame length is large enough. Monte Carlo simulation results have also been presented to demonstrate the http://jwcn.eurasipjournals.com/content/2014/1/165 outage probability performance of the proposed transmission protocol.
Compared to the point-to-point communication in [15], we consider a multi-user case for the addressed MAC scenario in this paper. As a consequence, DMT for the MAC channel in [22] should be adopted, the informationtheoretic criterion, which is developed based on the capacity region of MAC [23]. Specifically, define X S = {X i : i ∈ S}, and X i (Y ) is the channel input (output) variable. For a instantaneous channel state information (CSI) which is known at the receiver, the capacity region of the M-user MAC can be written as following [23]: for some product distribution where R i the data rate of source i (i = 1, · · · , M) and H is the corresponding source-destination channel matrix. As can be observed from the above equation, the capacity region of MAC is a set of many inequalities with different conditions, which makes the calculation of DMT much more difficult than the single-user scenario in [15]. These challenges also make the corresponding analysis more valuable. This paper is organized as follows. Section 2 describes the proposed CMA-ARDF transmission protocol. Section 3 presents the details of the ARDF transmission process of the proposed scheme. Section 4 outlines the achievable DMT and the Monte Carlo simulation results for the proposed protocol. Section 5 offers concluding remarks. The proofs of the final DMT result are provided in the 'Appendix' section.

Protocol description
A cooperative multiple-access scenario is considered in this paper, where multiple sources wish to communicate a common destination under the help of relays. In particular, the addressed scenario consists of two single-antenna sources (i.e., vehicles, denoted as S 1 and S 2 ), two M rantenna (M r ≥ 2) relays (i.e., fixed roadside stations, denoted as R 1 and R 2 ), and one common single-antenna destination (i.e., base station, denoted as D). The abstract system model and its application to the wireless vehicular networks are shown in Figures 1 and 2, respectively. All channels are assumed to be frequency-flat quasi-static Rayleigh fading. Such a Rayleigh fading assumption is valid in a practical vehicular network since it is very likely that there does not exist a line-of-sight (LOS) component between a pair of VANET transceivers due to their relatively low antenna height [3,24,25]. All nodes are constrained by the half-duplex assumption and use the same transmission power. Time division multiplexing access (TDMA) is utilized in this scenario for its simplicity.
Every antenna at each relay is marked with a distinct index number from 1 to M r . As shown in Figure 1, the column vector h i,Rj denotes the channel vector between the i-th source and R j , where i, j = 1, 2, and h Si represent the source-destination channel. The channel vector between R j and D is denoted as a column vector g j = {g j,1 , · · · , g j,M r }. Moreover, the column vector h j,m denotes the inter-relay channel vector between the m-th antenna of R j and the other relay. Each relay uses all the M r antennas to receive messages but only chose the best antenna to transmit signals for simplicity. The index of such a transmit antenna is defined as r j at R j . Note that this antenna selection method can preserve the diversity gain achieved by all the antennas at each relay in the high SNR regions.
The proposed protocol consists of two stages, initialization and data transmission.

Initialization
During the initialization stage, each relay channel is assumed to have the knowledge of its incoming and outgoing channel state information (CSI). Based on the sourcerelay CSI, using the relay selection method in [8], we known that R j can decode the messages from S i when the source-relay channel satisfies log(1 + ρ|h i,Rj | 2 ) >R. Here, log(·) is taken to base 2, ρ denotes the transmit signal-tonoise ratio (SNR), where we have assumed that all transmitters are under the same and fixed power constraint, | · | denotes the Euclidean norm of a vector, andR denotes the number of bits in each codeword transmitted by sources a . If R j can correctly decode the messages from both sources, i.e., |h i,Rj | 2 ≥ 2R−1 ρ for ∀i ∈ {1, 2}, it will broadcast a onebit indicator, which is denoted as ACK1. Otherwise, R j broadcasts a one-bit indicator NACK1, assumed that all the other nodes can correctly receive each feedback signal. Denote A k as the situation in which k relays broadcast ACK1 signals. On the other hand, based on the relaydestination CSI, each relay can determine the index of the best antenna as r j arg max r=1...M r |g j,r | 2 .
For situation A 2 in which both relays broadcast ACK1 signals, two sub-events will be further considered. According to the source-relay/inter-relay CSI, R j will determine whether it can use ZF detection to separate the mixture of two unknown streams which are from S j and the other relay, respectively. For the ZF receiver, the qualification criterion [26] represents the k-th diagonal element of matrix X, H Rj = β 1 h 2,r 2 α 1 h 1,R1 for j = 1, and β 1 h 1,r 1 α 1 h 2,R2 for j = 2. Note that α i and β i are the power weighting factors at the sources and relays, respectively, which are constrained by If R j satisfies this ZF condition, it will send back another one-bit http://jwcn.eurasipjournals.com/content/2014/1/165 Figure 1 The system model and ARDF process at two successive time slots (a-b). Each relay is equipped with multiple antennas. The antenna marked with black color for each relay is selected as the transmit antenna.
indicator ACK2. Otherwise, it sends back NACK2. Let E denote the event that both relays send back ACK2 signals, and such an event can be represented as [26] Otherwise, the system lies in event E if any relay sends back a NACK2 signal.

Cooperative transmission
Based on the initialization stage, the transmission is divided into four different modes according to the indicators sent back from the two relays. The flow chart of the proposed protocol is shown in Figure 3, where each of the sources is assumed to correctly decode the messages of the other source, which is valid for high SNR regions as shown in [5]. In the next paragraphs, we will describe the cooperative transmission mode for each situation in details.
For situation A 0 in which both relays send back NACK1 signals, we can only utilize the mutual cooperation between the two sources. In one cooperative data frame, each source intends to send L codewords, and the system works in mode 1. In time slot n (2 ≤ n ≤ 2L), S i will transmit a mixed message b α 2 x(n − 1) + α 1 x(n) and the other source listens, where i = 2 if n is even and i = 1 if n is odd. The data rate per channel use here is 2L 2L+1R .
For situation A 1 in which only one relay sends back ACK1 signal, we assume that R 1 is this relay without loss of generality. Each source intends to transmit only one codeword, and the system works in mode 2. For the first two time slots, the transmission process is the same as that in mode 1, and R 1 can correctly decode x(1) and x(2) since it sends back ACK1. In the third time slot, S 1 and R 1 will retransmit x(2) and x(1), respectively. In the fourth time slot, R 1 will retransmit x (2). The transmission data rate in this situation is 2 4R .  Figure 2 The application of the system model in Figure 1 to the wireless vehicular networks (a-b). Two vehicles communicate with a common roadside base station with the help two roadside stations. http://jwcn.eurasipjournals.com/content/2014/1/165

Figure 3
The flow chart for the transmission stage. Note that A k denotes the situation that k relays broadcast ACK1 signals, k = 0, 1, 2. The event E denotes that both relays broadcast ACK2 signals, otherwise the system lies in Event E. L is used to denote the number of codewords transmitted by each source in the corresponding data frame. α i is power allocation factor at the sources, i = 1, 2.
For situation A 2 , if the event E occurs, the system works in mode 3. The transmission scheduling during the first three time slots is the same as that in mode 2. Then, during the fourth time slot, R 1 and R 2 will retransmit x(2) and x(1), respectively. During the fifth time slot, R 2 retransmits x (2). The data rate for the eventĒ is 2 5R . For the event E, both relays broadcast ACK2 signals. As shown in Equation (2), each relay can correctly decode two unknown codewords transmitted by a source and the other relay, so the ARDF transmission process can be performed. The two sources will transmit 2L codewords to the destination during 2L + 3 time slots, so the data rate is 2L 2L+3R . The details of such an ARDF process are put into in to the next section, i.e., Section 3, and the system works in mode 4.
From the protocol description, the transmission mode and equivalent channel matrix for each situation can be easily shown in Table 1.

Transmission process
The proposed ARDF transmission process follows the concept of successive relaying [13], where the two half-duplex relays alternatively retransmit the source messages to mimic a full-duplex node. As shown in Figure 1, the sending source sends a superposition codeword α 2 x (n−3)+α 1 x(n) in any one time slot n (n > 3), where x(n) is its own codeword and x(n − 3) is the codeword it received from the other source in time slot n − 3. At the same time, the sending relay will transmit a superposition codeword , where x(n − 1) and x(n − 2) are codewords it received from the source during the previous two time slots. The other source (i.e., the listening source) and the other relay (i.e., the listening relay) listen to the transmissions in this time slot. In the next time slot, i.e., time slot n + 1, both the two sources and relays will exchange their working roles, where the listening ones become the sending ones and the sending ones become the listening ones. At the sources, different to [5,6], the sending source retransmit the codeword x(n − 3) instead of x(n − 1) in time slot n. This is because we have arranged the sending relay to transmit x(n − 1) , so such a codeword should not be transmitted by the sending source again in this time slot to avoid the potential mutual cancellation. In the proposed ARDF process, each codeword can be transmitted by both the sources and relays during four successive time slots, which ensures that the 'full' cooperation can be achieved. http://jwcn.eurasipjournals.com/content/2014/1/165 Table 1 The transmission modes for each situation, where y i , n i ∈ C i , i = 4, 5, 2L + 1, 2L + 3; x j ∈ C j , j = 2, 2L

Situation
Transmission mode Equivalent channel matrix In the following paragraphs, we will describe the transmission process during the four successive time slots in details. Assume n to be odd without loss of generality. In time slot n (1 ≤ n ≤ 2L), the sending source S 1 first transmits x(n), while R 1 and S 2 decode x(n) from S 1 . In time slot n + 1, R 1 is the sending relay and uses its best antenna to retransmit x(n); R 2 receives x(n) from R 1 . In time slot n+2, R 2 becomes the sending relay and uses its best antenna to repeat x(n). In time slot n + 3, the sending source S 2 retransmits x(n) again. Therefore, during such four successive time slots, x(n) can be transmitted four times, by both two sources and relays. Similar to the transmission of x(n), the codeword of S 2 , x(n + 1), will be transmitted by S 2 , R 2 , R 1 , and S 1 in time slot n + 1, n + 2, n + 3, and n + 4, respectively. When a transmitting node wishes to transmit two codewords simultaneously, it will transmit the superposition of these two codewords and use an amplitude factor to constrain the power of each codeword. Figure 4 illustrates the whole ARDF transmission process, where 2L + 3 time slots are required for a cooperative data frame.
From the above ARDF transmission process, one can observe that the listening relay may need to decode at most two unknown codewords in a time slot. For instance, during time slot n (2 ≤ n ≤ 2L), in addition to the new source codeword x(n), the listening relay also does not know x(n − 1) transmitted by the sending relay. This is because it is transmitting during the previous time slot and cannot simultaneously receive the source codeword x(n − 1) due to the half-duplex constraint. After canceling the known codewords, this relay will decode two independent unknown codewords, i.e., x(n) and x(n − 1), from one source and the other relay, respectively. Such a transmission mode mimics a two-user MAC with two single-antenna transmitters and one M rantenna receiver. At each relay, simple linear zero-forcing detection approaches can be used to separate the source message and the interference from the other relay, where each relay is equipped with multiple antennas and therefore has the capability to separate the messages under the ZF condition in Equation (2).

Data model
Note that we have used a fixed power allocation strategy in each time slot, and the use of more advanced adaptive power allocation shall yield better outage performance at finite SNRs. However, for the infinite SNR region, the precise power allocation does not affect the final DMT result [27].
For the ARDF process with respect to situation A 2 event E, the data model can be expressed as y = Hx + n, where x =[ x(1), · · · , x(2L)] T , which is the codeword vector of the two sources transmitted during a data frame; y =[ y(1), · · · , y(2L+3)] T , which is the observation vector at the destination during a data frame that lasts 2L+3 time http://jwcn.eurasipjournals.com/content/2014/1/165 Figure 4 The ARDF process during each time slot (TS). Here n is an odd number and 5 ≤ n ≤ 2L − 1, L ≥ 3. The solid blocks denote that the sending relays transmit the codewords using the best antenna. Dashed blocks denote that the listening relays receive signals using all the antennas, and each codeword within the dashed circle is an unknown codeword to be decoded. The horizontal and vertical arrows imply that a node receives the corresponding codewords from sending source and the sending relay, respectively. slots; n = [ n(1), · · · , n(2L + 3)] T , which is the Gaussian additive noise vector; and the (2L + 3) × (2L) equivalent channel matrix is as follows:

Diversity-multiplexing trade-off and numerical results
In this section, the analytical performance evaluation of the proposed protocol will be first shown by using DMT. Then, the Monte Carlo simulations will be carried out to demonstrate the outage performance of the proposed cooperative ARDF protocol.

Achievable diversity-multiplexing trade-off
Firstly, recall that the diversity and multiplexing gain are defined as [7] d − lim where P e is the ML detection error probability and R is the target data rate per channel use. Following similar steps in [22], it can be proved that the ML error probability in the MAC scenario can be tightly bounded by the outage probability at high SNR. So the outage probability will be focused in this paper. When lim ρ→∞ log f (ρ) log ρ = d, f (ρ) is said to be exponentially equal to ρ d , denoted as f (ρ) . = ρ d (≤ and≥ are similarly defined). The following theorem gives the final DMT performance of the proposed cooperative protocol.

Theorem 1.
When each relay is equipped with at least two antennas, i.e., M r ≥ 2, the achievable DMT of the proposed ARDF protocol for the two-user and two-relay CMA scenario can be expressed as where (x) + denotes max{x, 0}.

Proof 1.
We have briefly provided the proof of this theorem in [28] without formal derivations. In this journal paper, the details of the proof for this theorem will be blue presented in Appendix 2.
• Remark 1: The optimal MISO DMT for the addressed CMA scenario can be expressed as According to Equation (5), when the frame length L is sufficiently large, the achievable DMT of the proposed scheme yields 2L+3 2L ≈ 1, which demonstrates that the optimal MISO trade-off d MISO (r) can be asymptotically approached by the proposed scheme.
• Remark 2: The achievable DMT of the CMA schemes in [4,5] can be written as where M denotes the number of the sources. When there only exist two active users in a network, d CMA (r) = 2(1 − r). Hence, the schemes in [4,5] cannot perform well for a small number of sources, whereas the proposed ARDF-CMA scheme can http://jwcn.eurasipjournals.com/content/2014/1/165 further enhance the reception robustness by exploiting the relay nodes. • Remark 3: On the other hand, the R-CMA protocol in [18] can be straightforwardly extended to the two-user two-relay scenario considered in this paper. It means that each relay apply a simple antenna selection, and the DMT result presented in Equation (7) in [18] can be accordingly updated as Compared to the R-CMA scheme, the proposed scheme achieves one more diversity gain, because it exploits the help of two M r -antenna relays while preserves the cooperation between two sources. Although the proposed protocol can only achieve a maximal multiplexing gain 2L 2L+3 while the schemes in [18] can achieve 1, the difference is negligible for a large L. Figure 5 illustrates the achievable DMTs of various cooperative schemes. As can be seen from this figure, the proposed scheme can approach the optimal MISO upper bound for a sufficiently large L, and hence, outperforms the comparable ones in most multiplexing range.

Numerical results
In this section, some numerical results based on the Monte Carlo simulations are provided for the addressed CMA scenario. The targeted data rate is set as 2 or 4 bits per channel use (BPCU). Each relay is equipped with two antennas, i.e., M r = 2. For the proposed CMA-ARDF protocol, set L = 25, α 1 = β 1 = 0.87 for simplicity. Note that all the channels are assumed to be Rayleigh fading with unit variance and all the nodes have the same transmit power.
In addition to the superposition-coding-based CMA in [5], the R-CMA scheme in [18] is also used to compare with the proposed ARDF protocol. As shown in Figure 6, ARDF has limited performance at low SNR. This is because the performance of the proposed scheme is much more sensitive to the source-relay/inter-relay channel condition, and the outage event is prone to occur at each relay at low SNR, which results in some degradation to the outage performance. However, the proposed scheme achieves the smallest outage probability among the comparative ones when we increase SNR. This performance gain is due to the fact that the proposed ARDF scheme can exploit the available relays to provide an extra dimension to improve the outage performance, whereas the scheme in [5] only considers the cooperation between the two sources and the R-CMA scheme in [18] does not consider the mutual source cooperation. Therefore, larger diversity gains can be achieved by the proposed transmission protocol, which guarantee the superior performance particularly at high SNR. In Figure 7, different antenna numbers, i.e., M r , is consider at each relay to demonstrate the outage performance of the proposed scheme. One can observe that increasing the number of relay antennas can further improve the robustness of the transmission scheme, since more diversity gains can be provided. Outage Probability SP in [5] R−CMA in [18] Proposed ARDF 2BPCU 4BPCU Figure 6 The outage probability for the proposed protocol, the superposition cooperative scheme in [5] and non-cooperative transmission. Note that each relay is equipped with two antennas. For the proposed protocol, we set L = 25. The power allocation at the sources for both the proposed ARDF scheme and the SP scheme in [5] is fixed as α

Conclusions
In this paper, a new cooperative transmission protocol has been proposed for a CMA scenario in the wireless vehicular networks. Without the use of assumptions of strong inter-relay channel in [13], the relay reuse has still been realized using the linear ZF detection at the halfduplex relays to combat a general inter-relay interference.
In addition, to fully exploit the cooperation between all the transmitters, the superposition coding strategy has also been carefully applied at both sources and relays .
To evaluate the spectral efficiency, an achievable DMT of the proposed scheme was developed, which demonstrated that the proposed ARDF protocol can outperform the existing related schemes and approximately achieve the optimal MISO upper bound. The derived analytical result and the numerical results have demonstrated that the proposed scheme has a better performance in comparison with the existing related schemes in most conditions. The impact of adaptive power allocation has not been analyzed due to the high SNR considered in this paper, where a promising future direction is to carry out the study for the optimal design of power allocation to improve the overall system throughput at intermediate SNR.
Endnotes a For a particular situation, the data rate should bẽ where N x and N t are the number of transmitted codewords and the number of required time slots, respectively. So the targeted data rate R (i.e., the average data rate) can be calculated fromR. We will provide more discussions about the relationship between the two rates later in this paper. b In this paper, x(n) denotes the new source codeword sent by S i (i = 1, 2) in time slot n (1 ≤ n ≤ 2L). Obviously, the mapping criterion is where s i (l) denotes the l-th (1 ≤ l ≤ L) codeword of S i in one cooperative frame.

Appendix 1 Preliminary results
We first present four lemmas and their proof steps in this section. These results will be useful for the proofs of Theorem 1 in the next section.

Lemma 3. By assuming quasi-static and flat Rayleigh-
fading channels and α 1 = β 1 = 1 2 for simplicity, the probability of the event E that both relays can successfully perform ZF detection and broadcast ACK2 signals, as expressed in Equation (2), can be bounded as where γ = 2R−1 ρα 2 1 δ 2 , δ 2 is the variance of each channel coefficient. Furthermore, the probability of the event E can be obviously obtained as P(E) Lemma 4. When X 1 and X 2 are subjected to exponential distribution, the probability can be approximated as P(X 1 X 2 < a) ≈ −a ln a, where a > 0 and is sufficiently small.

Lemma 5.
Assuming that z = max{z 1 , · · · , z M r }, where z i is exponentially distributed with unit variance, the expectation of e −cz (c > 0) can be revealed as , [ ·] denotes the expectation of a random variable.
The proofs steps of the above lemmas are provided in the following section.

Proof of Lemma 2
Denote B as the event that a relay R j is not qualified, i.e., it can be expressed as the event: B Thus, the probability of each situation A k can be expressed as follows:

Proof of Lemma 3
Consider a signal model in which the r 2 -th antenna of R 2 transmits a messages 1 with a power lever β 2 1 while the first source S 1 broadcasts a messages 2 with a power lever α 2 1 . We set α 1 = β 1 = 1 2 for ease of explanation. Such a signal model can be found in most time slots with odd numbers in situation A 2 event E. At this time, the signal vector received by R 1 can be written as r R1 = H R1s + w 1 , where r R1 , w 1 ∈ C M r , H R1 = β 1 h 2,r 2 α 1 h R1 ,s =[s 1 ,s 2 ] T , and w 1 is the noise vector. This transmission model can be recognized as a special MIMO system with two transmit, and M r receive antennas when ZF detection is applied. Denote the Applying ZF detection at the receiver and according to [26], the probability of E R1 can be expressed as when ρ is sufficiently large, where γ = 2R−1 ρα 2 1 δ 2 . Note that the similar ZF decoding can be applied at R 2 when R 1 and S 2 are transmitting messages at the same time, and E R2 is similarly defined as E R2 >R, ∀k ∈ {1, 2} , whose probability is the same as P(E R1 ), i.e., Then, the probability of the event E defined in Equation (2) can be revealed as P(E) = P E R1 E R2 , where the events E R1 and E R2 are not strictly independent. Since reciprocal channel is assumed, the channel vectors h 1,r 1 and h 2,r 2 have one common element which is the channel coefficient between the r 1 -th antenna of R 1 and the r 2 -th antenna of R 2 , so that it is difficult to obtain the accurate value of P(E). However, when we notice that P(E) can be bounded as According to Equation (A.3), Lemma 3 can be proved.

Proof of Lemma 4
Assume X 1 and X 2 to be independently exponentially distributed with unit variance without loss of generality. Let Then, the probability P (X 1 X 2 < a) can be expressed as Now, the function a (u) is first defined as x i dx. Then, the improper integral a can be calculated as a = lim u→0 + a (u). Moreover, from [29] (Equation 3.351.4), B i (u) can be calculated by the exponential integral function as where i ≥ 2, and exponential integral function can be shown as Ei(−u) = ln(u) + ∞ k=1 (−u) k k·k! . Now that, B i (u) can be obtained as where o(1) → 0 when u → 0 + . By substituting B i (u) into Equation (A.7) and rearranging the infinite series, a (u) can be rewritten as where φ n (u) = −a n+1 n! (n + 1)! ln(u) .

Proof of Lemma 5
It is not difficult to obtain the PDF of z as where C q p = p! (p−q)!q! , p and q are positive integers, and p ≥ q. Splitting each term on the right side, Equation (A. 16) can be calculated as .

Appendix 2 Proof of theorem 1
As shown in [7,22], the ML error probability can be tightly bounded by the outage probability at high SNR, so the outage probability will be analyzed in this section. According to [22] and the protocol description in Section 2, we can define the outage event of the proposed ARDF protocol as Here, O A k denotes the outage event in the situation A k at the destination, O A 2 ,E and O A 2 ,E are similarly defined. Thus, the overall outage probability of the proposed protocol can be expressed as The probabilities of each situation A k and the event E have been presented in Lemma 2 and Lemma 3, respectively. Moveover, the outage probability in each situation will be analyzed in the terms of the MAC capacity region. Based on the definition in Equation (1), the source data rate constrains for the proposed-ARDF protocol can be further calculated as follows: where |S| denotes number of users in S, Q denotes the number of codewords transmitted by each source in one cooperative frame, and h l is a channel vector, both the structure of h l and the set L are a function of S and the details of their relationship to S will be discussed in the next few subsections. The outage events occur when any constraint in Equation (B.2) is not met, and the highest outage probability achieved by each constraint is the dominant factor [22]. In the following subsections, different values of each parameter in Equation (B.2) will be considered for different situations.  Table 1. When |S| = 1, S is assumed to be {1} without loss of generality, so L = {1, 3, · · · , 2L − 1}, and http://jwcn.eurasipjournals.com/content/2014/1/165 the outage probability at the destination in such a case can be calculated as where X i = |h Si | 2 , i = 1, 2; (a) holds since 0 < α 2 1 < 1, and (b) holds since X 1 is independent of X 2 . Otherwise, S = {1, 2} and L = {1, 2, · · · , 2L}, In order to make the analysis more tractable, a (2L is a tridiagonal matrix. According to [30], the determinant of the tridiagonal matrix can be shown iteratively as where D n = det[ I 2L+1 + ρ H n H H n ], and H n denotes the n × n top-left submatrix from H A 0 , x n and y n are the nth element on the principle diagonal and subdiagonal of H A 0 , respectively. By using such a property and note that x 2L+1 = 0, the following inequality can be obtained From Equation (B.5) and Lemma 4, P 2 (O A 0 ) can be upper bounded as Thus, P(O A 0 )≤ρ −2(1−r) can be easily obtained by combining P 1 (O A 0 ) and P 2 (O A 0 ). Table 1. When |S| = 1, assume that S = {1}, P 1 (O A 1 ) can be easily obtained as where G j = |g j,r j | 2 max{|g j,1 | 2 , · · · , |g j,M r | 2 }, j = 1, 2.

Situation A 2 event E
The outage probability in situation A 2 event E is difficult to be obtained using the above method, but the upper bound can be calculated by following the similar analysis in [17]. Firstly, model 4 in Table 1 is assumed to be a symmetric 2L-user multiple-access system where the codeword x(n) in x 2L is transmitted by S n , and such an assumption will make the analysis tractable. For the twouser case considered in this paper, the performance would not be worse than the performance of the former one. So that L = S ⊆ {1, 2, · · · , 2L}, Q = 1, h l denotes the l-th column vector of H in Equation (3), and there are (2 2L −1) source data constrains in Equation (B.2). For each constraint, there exists a probability that the channel condition cannot satisfy it, and the highest outage probability is the dominant factor and achieve the system's DMT.
In order to calculate the outage probability of each constraint, a (m + 3) × m MIMO channel is first considered as y m = F m s m + w m , where s m ∈ C m , y m , w m ∈ C m+3 and F m is the (m + 3) × m top-left submatrix from H in Equation (3). According to [17], the outage probability achieved by this system for every 1 ≤ m ≤ 2L is the same as the highest outage probability for each constraint in Equation (B.2). When m = 1, P 1 (O A 2 ,E ) . = ρ −(2M r +2)(1−r) can be easily obtained, following the similar steps in Equation (B.7).
When m > 1, following the similar DMT analysis for the inter-symbol interference (ISI) channel in [31] and the proof steps in [17], the average error probability can be upper bounded by where c 1 is a constant, f =[ h S1 , h S2 , g 1,r 1 , g 2,r 2 ] T , [ ·] denotes the expectation of a random variable, and λ = inf f∈C 4 λ min ( F m |f| ) > 0, λ min (·) denotes the minimum singular value of a matrix. By using Lemma 5, P e can be upper bounded as Depending on the variable-rate strategy in Equation (34) of [8] and integrating the four transmission modes, the target transmission data rate R BPCU can be expressed as One can also refer to [8] to get the mapping criterion from R toR. It is not difficult to prove the inequality P(E)+ P(A 2 ) − 1 ≤ P(A 2 , E) ≤ P(E), so P(A 2 , E) . = P(E) can be obtained in the large-SNR region. From Equation (A.2) and Lemma 3 and substituting R = r log ρ,R =r log ρ, P(A 2 , E) = P(A 2 ) − P(A 2  where P 1 = ρ −M r (1−r) , P 2 = ρ −(M r −1)(1−r) . Following the analysis in Claim 3 of [8] and the similar steps in