Research Article | Open Access

Yulun Cheng, Longxiang Yang, "A Novel Error Detection due to Joint CRC Aided Denoise-and-Forward Network Coding for Two-Way Relay Channels", *The Scientific World Journal*, vol. 2014, Article ID 470324, 8 pages, 2014. https://doi.org/10.1155/2014/470324

# A Novel Error Detection due to Joint CRC Aided Denoise-and-Forward Network Coding for Two-Way Relay Channels

**Academic Editor:**Branimir Reljin

#### Abstract

In wireless two-way (TW) relay channels, denoise-and-forward (DNF) network coding (NC) is a promising technique to achieve spectral efficiency. However, unsuccessful detection at relay severely deteriorates the diversity gain, as well as end-to-end pairwise error probability (PEP). To handle this issue, a novel joint cyclic redundancy code (CRC) check method (JCRC) is proposed in this paper by exploiting the property of two NC combined CRC codewords. Firstly, the detection probability bounds of the proposed method are derived to prove its efficiency in evaluating the reliability of NC signals. On the basis of that, three JCRC aided TW DNF NC schemes are proposed, and the corresponding PEP performances are also derived. Numerical results reveal that JCRC aided TW DNF NC has similar PEP comparing with the separate CRC one, while the complexity is reduced to half. Besides, it demonstrates that the proposed schemes outperform the conventional one with log-likelihood ratio threshold.

#### 1. Introduction

Although the capacity bounds of two-way (TW) communication channel were first studied and calculated in the 1960s [1], various cooperative strategies have been extended to transmit over TW relay channels [2–6] only since the advent of network coding (NC) [7, 8] in recent years. In general, TW NC is consisted of multiaccess (MA) and broadcasting (BC) phases, and in the existing literatures, there are three main NC schemes that were studied in MA phase, which are XOR NC [8], amplify-and-forward (ANF) NC [9], and denoise-and-forward (DNF) NC [10]. Among these schemes, DNF is one of the most promising ones due to its very high spectral efficiency, since the TW communication can be accomplished within 2 time slots (TS), while 3 TS are required for XOR NC and ANF NC. This merit makes DNF NC very attractive in both industrial and academic areas in recent years. Despite the potential advantage, the performance loss caused by error propagation is also apparent. As shown in [11], fixed DNF without error check can offer almost no diversity gain in large signal-noise-ratio (SNR) region, while in [12, 13], the results similarly indicate that the signal reliability in MA phase dominates the performance of the whole system and any error occurred will be severely propagated among all the cooperative users. Hence, to mitigate error propagation effectively, DNF is always employed jointly with adaptive signal reliability check at relay. For example, [11, 14] utilize the metric based on SNR or square amplitude of channel gain to represent signal reliability. For accuracy improvement, [15] proposes the log-likelihood ratio- (LLR-) based threshold to replace the SNR-based one in the cooperative multiple access channels. In [12], this type of threshold is introduced into TW NC to evaluate the reliability of network coded bits, named as NC bit threshold. Besides these uncoded methods, [16, 17] employ cyclic redundancy code (CRC) check at relay for error bit identification. In all the above schemes, the detection or check is always operated separately; in other words, each signal from different cooperative users is checked independently, and the relay can decode and forward these signals only when all of them pass the check. Different from these former works, [18] first proposes joint-CRC (JCRC) check in space-time-block coded cooperation system, in which CRC check is applied to the mixed signals. However, the performance evaluation of this type check is only presented by simulations individually, not by theoretical derivation, nor compared with separate CRC (SCRC) check either. Besides, the impact of JCRC check on pairwise error probability (PEP) performance is also not analyzed theoretically. These two points motivate the work presented in this paper.

The contribution of this paper is threefold.(i)Several theoretical bounds are derived and compared with SCRC check to evaluate the effectiveness of JCRC check in TW relay channels.(ii)3 JCRC aided DNF NC schemes are proposed, and with the obtained bounds mentioned above, the PEP performances of the proposed schemes are also derived.(iii)The effectiveness of the derived bounds and the proposed schemes are confirmed by the simulation results.

The rest of this paper is organized as follows. Section 2 presents the system model and the theoretical bounds of detection reliability probability for JCRC check. Section 3 describes 3 JCRC aided DNF schemes, while the corresponding PEP analysis is presented in Section 4. Simulation results are shown in Section 5. Finally, Section 6 concludes the paper.

#### 2. System Model

##### 2.1. System Model

We consider a TW relay channel, where two source nodes and exchange information, with the aid of a relay node in between them, as is shown in Figure 1. All the nodes are equipped with signal antenna and communicate over the same frequency band. To meet the practice situation, we assume that each node cannot transmit and receive signal at the same time, while time division multiplexing (TDM) is employed for channel access.

**(a) MA phase**

**(b) BC phase**

As depicted in Figures 1(a) and 1(b), the whole transmission consists of MA and BC phases. In MA phase, each source node converts its own information into the CRC codeword and broadcasts it to each other during the first 2 TS; so the received signals at both relay and source nodes can be written as where and are the received signals at and , respectively, from . It is assumed that and employ and transmit the same length of CRC codeword, so and are both -length vectors. is the CRC codeword transmitted by , and it can be expressed as where binary phase shift keying (BPSK) modulation is assumed. Let capture the effects of frequency nonselective multipath fading between and , and it can be written as where is modeled as zero-mean, independent, and circular-symmetric complex Gaussian random variable with variances and is the corresponding phase variable with uniform distribution. It should be noted follows exponential distribution, where the distribution parameter , and is dependent on the distance between and . Similarly, is the channel gain between and , and we assume that the uplink and downlink channels between two nodes are reciprocal; that is, . Let and capture the effects of receiver noise at and , respectively, and are modeled as zero-mean complex Gaussian random sequences with variance . We denote as the average transmitting power, and represents the signal-noise-ratio (SNR) throughout this paper. After MA phase, relay tries to decode each from with maximum likelihood detection (MLD) as in which is the estimation of and is the transmit codebook. denotes the real part of a complex number , and indicates the complex conjugation.

Based on that, SCRC is employed to identify error bits; that is, each is checked by CRC function and generate the corresponding check remainder . It should be noted that according to the CRC check principle [19], is generated by the division of and primitive polynomial, and if , can be considered as error-free with high probability. Hence, when both , , relay will combine and forward and as , where is the NC mapping function. Although there exist different protocols for NC mapping, including bit-level XOR [8] and electromagnetic wave-level remapping [10], the actual effects are all equivalent to mod-2 operation in bit-level; that is, .

In BC phase, broadcasts to both and ; so the received signals at can be expressed as We assume that perfect channel state information (CSI) can be achieved at all the receivers; so first decode form through MLD as in which is estimation of . After that, maximal ratio combination (MRC) is employed to estimate as where is the NC inverse mapping function, while is preknown . Besides, if , will keep silent in BC phase, and is estimated by substituting into (8).

##### 2.2. Theoretical Bounds of JCRC Check

This paper aims to introduce JCRC check into TW DNF NC for effective error mitigation. Firstly, the equivalence of JCRC and SCRC check in TW relay channel is proved by the following theorem.

Theorem I. *In the above TW relay model, as SNR increases, there is .*

*Proof. *According to the property of CRC codeword [19], there is [16] when , . Hence, it can be deduced that . The above equation indicates that only when happens, where , and the set can be written as
Let denote the error bit number in , ; then the detection probability can be bounded as
According to Theorems 5–11 in [19], can be further bounded as
We assume that denotes the average bit error probability (BEP) of BPSK symbol over Rayleigh fading channel plus zero-mean unit-variance additive white Gaussian noise (AWGN), and it is easily deduced as [20, equation (14.3-7)]
in which . Hence, it can be derived that
Substituting (11)–(13) into (10), the upper and lower bounds of can be obtained as
in which
With the above results, the upper and lower bounds of detection reliability for SCRC check can be calculated as
in which is written as the function form , , and can be calculated by (15).

For JCRC check, according to the definition of the set and (10), can be calculated as
Note that (19) is due to the fact that, when the error bits coincidentally occur in the same position of and , it will not be identified by JCRC check, because the mod-2 operation of two error bits can still obtain the correct bit. Hence, (19) indicates that JCRC will bring more NC opportunities compared with SCRC check. Substituting (12), (17)–(19) into (18), the detection reliability bounds of JCRC can be calculated as
in which
Since there is always , it can be easily concluded that
According to (18), it can be seen that as SNR increases, because (19) tends to 0. At the same time, tends to 0, which indicates that tends to while tends to 1; thus, Theorem I is obtained.

#### 3. JCRC Aided DNF NC Protocol

On the basis of Theorem I, 3 JCRC aided DNF NC schemes are proposed in TW relay channels in this section.

##### 3.1. 3 TS Decode-JCRC-Forward (3T JCRC)

In the first 2 TS, and are gotten at from coherent reception of and , respectively. Then NC is accomplished at bit-level; that is, . After that, is checked by JCRC, and if , will forward to and at BC phase. Otherwise, keeps silent. Note that there are two main differences between this scheme and former TW denoise-XOR-forward CRC NC [8].(i)XOR is operated before CRC check in this scheme while in the former one, the bits are XORed only when both the codewords pass the CRC check.(ii)Only once JCRC check is operated to in this scheme, while in the former one, 2 SCRC checks are required for and , respectively.

##### 3.2. 2 TS Decode-JCRC-Forward with Phase Synchronization (2T JCRC-P)

It is proposed in [10] that the transmitted signals are precoded when CSI is known in the source nodes, so that it allows the direct merger of two signals from the source nodes in the form of electromagnetic waves at relay simultaneously. Relay then remaps the merged signals into one NC signal and broadcast it in BC phase. Only 2 TS are consumed for TW communication by this so-called physical layer NC (PNC). This paper introduces JCRC check into PNC system to judge the quality of the remapped signals. Assuming that only the phase synchronization is operated in MA phase, the received and remapped signals at relay can be written as in which After that, the remapped signal is detected by JCRC check, and if , relay will forward at BC phase.

##### 3.3. 2 TS Decode-JCRC-Forward with Phase and Amplitude Synchronization (2T JCRC-PA)

Assuming both phase and amplitude synchronization are ideally achieved at and in MA phase, the received and remapped signals at relay can be expressed as Note that this is the special case of (23) when , so the remapping operation is similar to the scheme mentioned above, and in (25) becomes the normal BPSK demodulation.

#### 4. PEP Analysis

In this section, to evaluate the performance of the proposed schemes, we derive the PEP with the obtained theoretical bounds in Theorem I.

Let denote the minimal Hamming distance of a system CRC codebook, and according to the principle of error correction [19], any received codeword that belongs to the codebook is able to correct at most random error bits itself. In general, the PEP of the denoise-JCRC-forward scheme can be written as follows: in which and denote the error bit number of the signal estimation at when broadcasts and keeps silent, respectively. The approximation in (27) is due to the fact that when SNR increases, which has been proved in Theorem I. can be expressed as in which the BEP can be obtained with the results deduced by [15] asin which and are the distribution parameters of and , respectively.

By comparing (1) and (23), it can be concluded that 2T JCRC-P and 3T JCRC will achieve similar PEP, because the only difference between these two schemes is the variance of receiver noise at . Since can be approximated by the lower bound of (17), the PEP of these two schemes can be calculated by substituting (17), (28), and (29) into (27): For 2T JCRC-PA, can be approximated by the lower bound of (20), in which can be written according to the results of [21] as Hence, the corresponding PEP can be calculated as

#### 5. Simulation Results

In this section, the Monte-Carlo simulation is employed to estimate the detection probability of JCRC check and the PEP performance of the three proposed schemes. Besides, the performance of LLR-based TW NC algorithm in [12] is also simulated as the baseline. The simulation parameters are as follows: the simulation length involved in all points is fixed at 10 million BPSK-modulated codewords. , , and are all equipped with single antenna. SNR denotes , and we assume that all the nodes transmit with the same power. The path loss effects are modeled and parameterized as follows: the reference distance is , and the channel gain parameter can be calculated as , in which (typical urban). The system model is as shown in Figure 1, and we assume that , . A (7, 4) system CRC code is employed, which is generated by the origin polynomial with the minimum Hamming distance . MLD is applied to estimate the signals at all the terminals. Since, in [12], LLR threshold is bit-oriented, the information rate is fixed as 1 bit/s/channel, and so its PEP equals the BEP. In all the simulations, the LLR threshold is set by the target BEP of 1%, and LLR-PA denotes that the checked signals are perfectly synchronized with both phase and amplitude.

Figure 2 depicts the detection probability comparisons of JCRC and SCRC check at . It is verified from the figure that the derived bounds in (15), (16), and (21) coincide well with the simulation results. Compared with SCRC, it can be seen that there is slight higher detection probability for JCRC in the regions of low and medium SNR. This is caused by the more loose restrictive conditions of JCRC check and that brings more opportunities to the relay to code and forward the received signals. However, this merit is not very obvious and gradually disappears when SNR increases. Compared with 3T JCRC and 2T JCRC-P, a distinct advantage can be achieved for 2T JCRC-PA in all SNR regions. As shown in the figure, when SNR > 6 dB, the detection probability is close to 1. This is mainly caused by two reasons: with the phase and amplitude compensation, the PNC signals at are of good quality. JCRC check matches the PNC signals well. This advantage enables 2T JCRC-PA to have more opportunities to exploit relay channel to obtain superior PEP performance.

Figure 3 shows the NC opportunities comparison of the schemes at , in which NC opportunity is defined as the probability that , because the relay is able to combine the received signals through NC if that happens. As is depicted, when SNR increases, the NC opportunities tend to 1 for all the compared schemes, among which 2T JCRC-PA is optimal. Besides, the metric is also close to 95% for LLR-based check, when SNR > 6 dB. The results show that 2T JCRC-PA is superior to LLR-based check in all SNR regions, which indicates that 2T JCRC-PA is able to fully exploit the relay channel to improve PEP performance. Moreover, the performance gaps are not obvious among 3T SCRC, 3T JCRC, and 2T JCRC-P, which indicates that these schemes will have similar opportunity to exploit relay channel through NC. However, it cannot be inferred that they achieve similar PEP performance, which will be discussed as follows.

Figure 4 shows the correct rate of the signals which has successfully passed the check. As can be seen in the figure, CRC-based and LLR-based checks are both effective measures to evaluate the reliability of the signals, because when SNR > 4 dB, all the compared check accuracies tend to 96%, and even when SNR = 0 dB, most of the compared accuracies are higher than 95%, except 3T JCRC and 2T JCRC-P. In general, CRC-based checks are superior to LLR-based one, but the performance gap is slight. In addition, in low SNR region, 3T SCRC and 2T JCRC-P are less efficient than other schemes, which indicates that JCRC is inferior to SCRC in low SNR region. This result indicates that although JCRC can enable the relay to obtain more opportunities to code and forward received signals, the relative low correct rate will degenerate the PEP performance in low SNR region, which make the gain less obvious compared with SCRC.

Figure 5 depicts the PEP comparisons of the proposed schemes. It can be observed that the theoretical results derived by (30) and (31) correspond well with the simulations, which verify the effectiveness of Theorem I and the analysis presented in Section 4. The figure shows that 2T JCRC-PA outperforms the other compared schemes, which also corresponds well with the results in Figure 3, because 2T JCRC-PA enables the relay to obtain more opportunities to exploit the relay channel. Besides, it can be observed that the PEP gap is not obvious among 3T SCRC, 3T JCRC, and 2T JCRC-P. On the one hand, this result verifies the effectiveness of JCRC check; on the other hand, it also confirms that the PEP of 2T JCRC-P and 3T JCRC can be approximated as (30). Moreover, the figure also indicates that 2T JCRC-P outperforms LLR-P scheme in [12] with only phase synchronization, while 2T JCRC-PA is superior to LLR-PA. In the former case, the SNR gain is 2 dB when the target PEP is 10^{−3}, while in the latter case, it grows to 4 dB. This gain growth is due to the error correction of CRC code, because for the simulated (7, 4) CRC, any single random error in the codeword can be recovered, which cannot be obtained for LLR check [12]. This advantage makes JCRC check more efficient to mitigate error propagation. Meanwhile, it should be noted that, for the proposed schemes, the spectral efficiency is sacrificed as the cost since the information rate = 4/7 bit/s/channel, while for LLR-based scheme, the metric equals 1 bit/s/channel.

#### 6. Conclusion

In this paper, we introduced JCRC check into the TW DNF NC system to evaluate the reliability of NC signals. Firstly, the detection probability bounds of JCRC are theoretically derived to prove its effectiveness. On the basis of that, three JCRC aided TW DNF NC schemes are proposed, and the corresponding PEP performances are also derived. Theoretical and simulation results indicate that the proposed JCRC schemes outperform conventional SCRC check in TW relay communications with only half complexity, because JCRC enables the relay node to have more opportunities to exploit the relay channel, which is helpful for PEP improvement. Moreover, it also shows that JCRC check is superior to the LLR-based scheme [12] in terms of PEP, at the cost of spectral efficiency. In future work, it is of significance to introduce JCRC check into cooperative multiple access channels for error mitigation.

#### Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

#### Acknowledgments

This work was supported by the National Basic Research Program of China (973 Program) (2013CB329104), the National Natural Science Foundations of China (61372124 and 61171093), the Key Projects of Natural Science Foundations of Jiangsu University (11KJA510001), the National Science and Technology Key Projects (2011ZX03005-004-003), and Jiangsu 973 Projects (BK2011027).

#### References

- C. Shannon, “Two-way communication channels,” in
*Proceedings of the 4th Berkeley Symposium on Mathematical Statistics and Probability*, pp. 611–644, Berkeley, Calif, USA, May 1961. View at: Google Scholar - Z. Ding, T. Wang, M. Peng, W. Wang, and K. K. Leung, “On the design of network coding for multiple two-way relaying channels,”
*IEEE Transactions on Wireless Communications*, vol. 10, no. 6, pp. 1820–1832, 2011. View at: Publisher Site | Google Scholar - R. H. Y. Louie, Y. Li, and B. Vucetic, “Performance analysis of physical layer network coding in two-way relay channels,” in
*Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '09)*, pp. 172–177, December 2009. View at: Publisher Site | Google Scholar - R. H. Y. Louie, Y. Li, and B. Vucetic, “Practical physical layer network coding for two-way relay channels: performance analysis and comparison,”
*IEEE Transactions on Wireless Communications*, vol. 9, no. 2, pp. 764–777, 2010. View at: Publisher Site | Google Scholar - Y. Li, R. H. Y. Louie, and B. Vucetic, “Relay selection with network coding in two-way relay channels,”
*IEEE Transactions on Vehicular Technology*, vol. 59, no. 9, pp. 4489–4499, 2010. View at: Publisher Site | Google Scholar - Q. F. Zhou, Y. Li, F. C. M. Lau, and B. Vucetic, “Decode-and-forward two-way relaying with network coding and opportunistic relay selection,”
*IEEE Transactions on Communications*, vol. 58, no. 11, pp. 3070–3076, 2010. View at: Publisher Site | Google Scholar - R. Ahlswede, N. Cai, S. R. Li, and R. W. Yeung, “Network information flow,”
*IEEE Transactions on Information Theory*, vol. 46, no. 4, pp. 1204–1216, 2000. View at: Publisher Site | Google Scholar - Y. Chen, S. Kishore, and J. Li, “Wireless diversity through network coding,” in
*Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '06)*, pp. 1681–1686, Las Vegas, Nev, USA, April 2006. View at: Google Scholar - P. Popovski and H. Yomo, “Wireless network coding by amplify-and-forward for bi-directional traffic flows,”
*IEEE Communications Letters*, vol. 11, no. 1, pp. 16–18, 2007. View at: Publisher Site | Google Scholar - S. Zhang, S. Liew, and P. Lam, “Hot topic: physical-layer network coding,” in
*Proceedings of the ACM 12th Annual International Conference of Mobile Computing and Networks (MobiCom '06)*, pp. 358–365, Los Angles, Calif, USA, September 2006. View at: Publisher Site | Google Scholar - J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: efficient protocols and outage behavior,”
*IEEE Transactions on Information Theory*, vol. 50, no. 12, pp. 3062–3080, 2004. View at: Publisher Site | Google Scholar | MathSciNet - S. L. H. Nguyen, A. Ghrayeb, G. Al-Habian, and M. Hasna, “Mitigating error propagation in two-way relay channels with network coding,”
*IEEE Transactions on Wireless Communications*, vol. 9, no. 11, pp. 3380–3390, 2010. View at: Publisher Site | Google Scholar - I. Krikidis, “Relay selection for two-way relay channels with MABC DF: a diversity perspective,”
*IEEE Transactions on Vehicular Technology*, vol. 59, no. 9, pp. 4620–4628, 2010. View at: Publisher Site | Google Scholar - A. Bletsas, A. Khisti, D. P. Reed, and A. Lippman, “A simple cooperative diversity method based on network path selection,”
*IEEE Journal on Selected Areas in Communications*, vol. 24, no. 3, pp. 659–672, 2006. View at: Publisher Site | Google Scholar - H. V. Khuong and H. Y. Kong, “LLR-based decode-and-forward protocol for relay networks and closed-form BER expressions,”
*IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences*, vol. E89-A, no. 6, pp. 1832–1841, 2006. View at: Publisher Site | Google Scholar - A. K. Sadek, W. Su, and K. J. R. Liu, “Multinode cooperative communications in wireless networks,”
*IEEE Transactions on Signal Processing*, vol. 55, no. 1, pp. 341–355, 2007. View at: Publisher Site | Google Scholar | MathSciNet - M. Elfituri, W. Hamouda, and A. Ghrayeb, “A convolutional-based distributed coded cooperation scheme for relay channels,”
*IEEE Transactions on Vehicular Technology*, vol. 58, no. 2, pp. 655–669, 2009. View at: Publisher Site | Google Scholar - K. Zhu and A. G. Burr, “Relay selection aided distributed space-time block code for two-way relay channel with physical-layer network coding,” in
*Proceedings of the IEEE 73rd Vehicular Technology Conference (VTC '11)*, pp. 1–5, Budapest, Hungary, May 2011. View at: Publisher Site | Google Scholar - S. Lin and D. Costello,
*Error Control Coding*, Pearson Prentice Hall, Upper Saddle River, NJ, USA, 2nd edition, 2004. - J. Proakis,
*Digital Communications*, McGraw-Hill, New York, NY, USA, 4th edition, 2001. - K. Lu, S. Fu, Y. Qian, and H. Chen, “SER performance analysis for physical layer network coding over AWGN channels,” in
*Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '09)*, pp. 1–6, Florida, Fla. USA, December 2009. View at: Publisher Site | Google Scholar

#### Copyright

Copyright © 2014 Yulun Cheng and Longxiang Yang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.