Nonorthogonal Multiple Access for 5G and BeyondView this Special Issue
Research Article | Open Access
Michel Kulhandjian, Claude D’Amours, Hovannes Kulhandjian, "Multiway Physical-Layer Network Coding via Uniquely Decodable Codes", Wireless Communications and Mobile Computing, vol. 2018, Article ID 2034870, 8 pages, 2018. https://doi.org/10.1155/2018/2034870
Multiway Physical-Layer Network Coding via Uniquely Decodable Codes
We focus on a multiway relay channel (MWRC) network where two or more users simultaneously exchange information with each other through the help of a relay node. We propose for the first time to apply ternary uniquely decodable (UD) code sets that we have developed to allow each user to uniquely recover the information bits from the noisy channel environment. One of the key features of the proposed scheme is that it utilizes a very simple decoding algorithm, which requires only a few logical comparisons. Simulation results in terms of bit error rate (BER) demonstrate that the performance of the proposed decoder is almost as good as the maximum-likelihood (ML) decoder. In addition to that through simulations, we show that the proposed scheme can significantly improve the sum-rate capacity, which in turn can potentially improve overall throughput, as it needs only two time slots (TSs) to exchange information compared to the conventional methods.
Network coding (NC) has attracted a lot of attention in the research community due to its capability to enhance the throughput of lossless wireline networks in a multicast environment . In a two-way bidirectional relay channel, NC requires three time slots (TSs) for information exchange while the conventional scheme requires four. Therefore, NC can potentially improve the channel throughput by 4/3 times in bidirectional channels.
A lot of work has been done to investigate some of the NC issues in wireless environments [2–5]. The conventional NC data forwarding schemes based on decode-and-forward (DF) relaying are not able to fully utilize the wireless channel. More recently, denoise-and-forward (DNF) relaying adopting the physical-layer network coding (PNC) proposed by Zhang et al.  can potentially provide further throughput improvements of the wireless channel. The PNC has several attractive features; in particular, it is relatively simple to implement compared to the conventional NC method as mentioned in . Unlike the conventional two-way relay channel (TWRC), which requires four time slots, PNC requires only two time slots; hence, it can potentially double the throughput. A large volume of research on PNC, mainly focusing on the TWRC, has been reported in the literature, which outperform the conventional NC technique in terms of throughput and achievable data rates. In [7, 8], the authors present a PNC scheme based on frequency-shift keying (FSK).
More recently, a code-division multiple-access (CDMA) based analog network coding (ANC) scheme that utilizes amplify-and-forward (AF) relaying has been introduced in [9, 10] for multipath and asynchronous underwater acoustic sensor networks (UW-ASNs). The authors developed an adaptive RAKE receiver that equalizes the received signal and then jointly estimates the two multipath faded channels. The relay node cancels the interference before decoding the information of interest. The simulation and experiment results demonstrate that their proposed scheme can significantly improve the channel utilization by up to for unidirectional and for bidirectional networks compared to the conventional DS-CDMA scheme.
One of the main constraints of PNC and ANC techniques is the limitation on the number of users that can simultaneously transmit to the relay node. The concept of a multiway relay channel (MWRC), which was introduced in , is a generalization of a TWRC, where users simultaneously aim to achieve full information exchange with the help of a single relay node. A major application of MWRC is in satellite communication in which multiple users around the world simultaneously exchange data through a satellite. Several works studied different multiple access schemes to achieve MWRC. For example, in [12, 13] authors present a transmission method that uses binary phase-shift keying (BPSK), where multiuser detection (MUD) is achieved at the expense of an increase of channel use by identifying “minority” nodes. In , MUD relies on iterative multiuser detection of users at the receiver. Nonorthogonal multiple access schemes can be considered to be potential candidate for MWRC.
A well-known example of nonorthogonal multiple access is CDMA. The existence of uniquely decodable (UD) codes for overloaded synchronous CDMA where the number of multiplexed signals is greater than the signature length over the antipodal alphabet with linear MUD in noiseless channels is reported in . However, in a noisy channel the high computation cost involved in MUD, which may increase in an exponential order with the number of users, has limited use in practical applications.
An interesting technique referred to as interleave-division multiple-access (IDMA) was introduced in . This technique is attractive because of its low-complexity receiver design. A similar technique referred to as sparse code multiple access (SCMA) that possesses a low-complexity receiver is also presented in . Authors in  utilize the UD code set over the ternary alphabet , which as mentioned before has linear MUD in noiseless environment only. In addition to that the authors present a decision decoding scheme at the relay for the user case only, with decision regions in a noisy channel.
In this paper, we focus on a MWRC network, where users exchange information with each other simultaneously via the help of a relay node. For MWRC networks utilizing PNC, it is proved in  that TSs are required. Hence, we propose for the first time to apply ternary UD code sets, which will allow each user to uniquely recover the information bits from a noisy channel. One of the attractive features of the proposed scheme is that it utilizes a very simple decoding algorithm, which requires only a few logical comparisons. Simulation results in terms of bit error rate (BER) demonstrate that the performance of the proposed decoder is very close to the maximum-likelihood (ML) decoder. Moreover, through simulations, we show that the proposed scheme can significantly improve the sum-rate capacity, which in turn can potentially improve overall throughput, as it needs only two TSs to exchange information compared to the conventional methods.
The rest of the paper is organized as follows. In Section 2, we present the system model. In Section 3, we discuss the construction of the uniquely decodable code sets followed by decoding algorithm in Section 4. The complexity analysis is performed in Section 5. After illustrating simulation results in Section 6, a few conclusions are drawn in Section 7.
The following notations are used in this paper. All boldface lower case letters indicate column vectors and upper case letters indicate matrices, denotes transpose operation, denotes the set of all complex numbers, denotes conjugate, denotes the sign function, denotes complex amplitude, and , are the floor and ceiling functions, respectively.
2. System Model
We consider a MWRC network with users where each user intends to transmit binary data to all the other user nodes; that is, full data exchange is desired. Direct communication is assumed infeasible, and thus, users can only exchange information through the help of a relay node, as shown in Figure 1. We assume that perfect synchronization is available during the whole transmission, and all channel state information (CSI) is known at all the user nodes and the relay node . Unlike the conventional PNC technique in which DNF is utilized, in this paper, we explore PNC with the AF criteria. Notice that the proposed scheme is still coined PNC and not ANC because of synchronization assumption and the fact that the relay node can potentially detect all of the users’ information even without the knowledge of users’ previous binary data. The communication takes place in two phases, that is, multiple access (MA) and broadcast (BC) phases. In each TS1, that is, the MA phase, each user encodes the data sequence and then simultaneously transmits their signals to the relay through an additive white Gaussian noise (AWGN) channels. The received signal at the relay node can be expressed aswhere is the ternary spreading code assigned to the user from UD code set , stands for the complex channel gain between the -th user and the relay node, is BPSK modulated data bits, and the channel noise is assumed to be AWGN. Since each user has perfect CSI at the transmitter it is reasonable to utilize transmit diversity scheme, where it precodes the signal by before the transmission to mitigate the channel effects . For each user, the encoder combines its data sequence into , which is then transmitted through the MA channel, as shown in Figure 2.
The BC phase is shown in Figure 3. In TS2, the relay node may apply the AF criteria and amplify the received vector to obtain depending on the channel conditions. The relay node broadcasts the combined sum-signals to all the user nodes. Each end user’s received signal is given bywhere is the complex channel gain between the relay node and the -th user and is AWGN. Note that to get rid of the channel effects each user can multiply the received signal by before applying the MUD. In the following section, we will present the construction of the proposed UD code sets and their linear MUD decoder.
The beauty behind the proposed scheme is that any user node can uniquely decode every user’s binary data from the received sum-signal without using any table, as discussed in , or previous decoded data, which is the case for the ANC. Compared to the conventional PNC, sum data rate is much greater than 1. At the relay, we apply AF criteria instead of performing DNF.
3. Iterative Construction
In the proposed MWRC system, we utilize the UD code set that allows -users to exchange information with the help of the relay node in only 2 TSs. These codes along with the proposed linear MUD decoder make a perfect candidate for MWRC systems.
We recall that a ternary code set is uniquely decodable over signals or , if and only if, for any , or, equivalently, . We can rewrite the unique decodability necessary and sufficient condition as or in an equivalent manner asLet represent the maximum number of columns (signals) that matrix can have for a given and still be uniquely decodable. For the ternary code matrix with codes of length , is simple and can be found by looking at the total number of possible columns . Excluding the column, half of the remaining is the negative of the other half, which makes it a total of 4 distinct columns that can be chosen to be , , , and . We conclude that no possible distinct combinations of these 4 columns satisfy uniquely decodability criteria (3). Out of all the possible combinations there are only few matrices with number of columns 3 that satisfy (3); therefore, . Every possible ternary matrix of dimension that has uniquely decodable property can be reduced toby applying operations such as multiplying columns by negative one, permuting rows, and columns. For the case of and it can be shown with an exhaustive search that and , respectively.
In the preparation of general construction of matrices having , where , we carefully choose our seed matrix from distinct uniquely decodable matrices, which are found by exhaustive search,Next, we are ready to propose a general code set design when with , . Starting from the following recursive relation defines a sequence of matrices. The recursive matrix is formed as follows:where , , and is derived by eliminating the first row of . The above code sequences preserve the uniquely decodability property, given that is a UD matrix.
4. The Proposed Fast Decoder
In this section, we present our proposed fast decoder algorithm (FDA). In the system with signature matrix , where the columns are the user spreading codes. At ’s user, the received vector after multiplication by is expressed bywhere are signatures for , is user data, and is AWGN noise. The objective of the receiver is the following: given the received vector and recover the user data such that the mean square error is minimized. It is known that obtaining the ML solution is generally NP-hard .
For our detection problem, where the overloaded signature matrix has a UD structure, can be solved efficiently if there is a function that maps , where is a -module with rank . It is equivalent to finding the closest point in a lattice , such that
Gaining the knowledge of , one of the points in generated by , we can obtain uniquely, since satisfies the uniquely decodability criteria (3). However, there is no known polynomial algorithm that can obtain from .
We first present the general form of the proposed FDA for the , case, where the vector 1 is defined as and the quantizer , is a mapping of to the constellation of . The output of the quantizer shows the number of s in . Furthermore, let , , , , , , and represent the number of −1’s at , 3, 4, 1, 6, 7, and 8 locations of , respectively. Note that when or only one comparison is required. The algorithm proceeds by computing , , and , which denote the number of −1’s in , , and , respectively.
For the case of the decoding is trivial and will not be covered in this article, instead we start with the nonsymmetric case of . The FDA, shown in Algorithm 1, calls the subDecoder (Algorithm 2) at line with , , and parameters. This algorithm will proceed in four different paths depending on and . If is 0 or 4 then the leftDecoder (Algorithm 4) will never be called and will assign or , respectively. Similarly, if is 0 or 3 then the rightDecoder (Algorithm 3) will never be called and will assign or , respectively. Therefore, the trivial case is when both the leftDecoder and the rightDecoder are not required; other scenarios are that the rightDecoder is called when the leftDecoder is not required, the leftDecoder is called when the rightDecoder is not required, and the last case is when left and right decoder, lrDecoder, is called (Algorithm 5).
The rightDecoder and the leftDecoder decoders are straightforward, having the knowledge of the rightDecoder computes , and similarly, having the knowledge of , the leftDecoder computes (Algorithms 3 and 4).
Having all the required information now the subDecoder assigns and . Now we completed the case when ; the rest of the algorithm in FDA proceeds by applying the general decoder algorithm with the inputs of and to obtain and , respectively, to find the middle element . The decoded data is . In the following section, we study the complexity of the proposed fast decoder analytically.
5. Complexity Analysis
The proposed decoder, discussed in Section 4, deciphers all the users’ data at the receiver side in a recursive manner. In this section, we demonstrate the computational complexity analytically. It is important to state that the proposed FDA neither requires any multiplications nor additions; instead, only a few comparisons are performed in the function. First, we will look at the average number of comparisons required for the case, whose decoding algorithm is presented in the subDecoder algorithm. Since, our proposed matrix is nonsymmetric, we will analyze the complexity of decoding all the possible input vectors. By closely analyzing FDA algorithm the comparison required for is , respectively, and there are of input vectors per . There are a total of 1500 comparisons; hence, the average computational complexity is . The recursive structure of our proposed matrices for possesses symmetries that enable us to present the general case. In order to express the relationship for , where , we will first introduce a few definitions. Let us definewhere is the number of comparisons that are required in the first call of the function. If the input vector contains number of −1’s, in function it needs comparisons, as shown in (9). Note that, due to symmetry, we do not consider all the input vectors , instead, only half of them, that is, . The is related to the number of comparisons required in the second call of the function, while the last term shows how many times left and/or right subdecoders are called. The general relation for can be expressed aswhereis the altered version of the by excluding the number of comparisons in the first call of the calculations.
In Table 1, we show the complexity results for (), (), () using the proposed FDA and ML algorithms. As we can see, the complexity of ML decoder increases exponentially, while the proposed decoder has fairly small complexity even for a relatively large matrix size ().
6. Simulation Results
In this section, we evaluate the performance of the MWRC network by employing our proposed ternary uniquely decodable codes at the physical layer. All the simulations at the physical layer of the proposed scheme are performed in Matlab. We consider wireless transmission between and users. In the MA phase, each user spreads its data , using BPSK modulation and the proposed ternary code , and then transmits to the relay node through a slow Rayleigh fading channel. The relay node in BC phase transmits the combined sum-signals to all the user nodes.
We assume that the transmission is synchronous and all CSI is known at all the user as well as relay nodes. Each user gets rid of the complex channel effects and then applies the proposed FDA to decode its information. For comparison purposes, we compare FDA algorithm with the optimum ML decoder. In Figures 4 and 5, we plot the BER performance averaged over all the different users for the UD code sets of and , respectively. For a BER of the performance of FDA is only about 1 dB worse than the ML. In other words, our proposed FDA achieves near-ML performance without having an exponentially complex algorithm.
In order to show the advantage of PNC with UD codes compared to the conventional PNC, we first define the sum rate to be the number of correctly transmitted bits per unit time. Suppose that the bit rate of each node is Mbps. In the case of conventional PNC TSs are required compared to only 2 TSs for the PNC with UD code. Thus, the sum rates are Mbps and Mbps, where is the error rate of conventional PNC, with and user nodes, respectively. Using the conventional PNC Mbps and Mbps are exchanged during 14 and 32 TSs. Meanwhile, the sum rates of the proposed PNC with UD code sets are Mbps and Mbps, where is the error rate of the detector of the UD codes.
In Figures 6 and 7, we plot the sum rates for the cases of and user nodes, respectively. We can see from Figures 6 and 7 that the proposed scheme utilizing UD codes improves the sum rates by almost 7 and 16 times, respectively, compared to conventional PNC scheme. When the signal-to-noise ratio (SNR) is high enough, the sum rate is nearly enhanced by about times.
In this paper, we have proposed to apply a ternary uniquely decodable (UD) code sets to a multiway relay channel (MWRC) network where two or more users are able to exchange information with each other simultaneously through the help of a relay node. A key feature of the proposed scheme is that it utilizes a novel UD code sets in a transmission, which requires only two time slots (TSs) as opposed to TSs for the conventional physical-layer network coding (PNC) scheme. We developed for the proposed UD code set a very simple decoding algorithm, which requires only a few logical comparisons. Simulation results in terms of bit error rate (BER) and sum rates demonstrate that the proposed decoder outperforms the conventional methods. The performance of the proposed low computational cost decoder is almost as good as the maximum-likelihood (ML) decoder.
Conflicts of Interest
The authors declare that there are no conflicts of interest regarding the publication of this paper.
- R. Ahlswede, N. Cai, S. R. Li, and R. W. Yeung, “Network information flow,” Institute of Electrical and Electronics Engineers Transactions on Information Theory, vol. 46, no. 4, pp. 1204–1216, 2000.
- T. Matsuda, T. Noguchi, and T. Takine, “Survey of network coding and its applications,” IEICE Transactions on Communications, vol. 94, no. 3, pp. 698–717, 2011.
- M. Medard and A. Sprintson, Network Coding: Fundamentals and Applications, Academic Press, 2011.
- C. Fragouli and E. Soljanin, “Network coding fundamentals,” Foundations and Trends in Networking, vol. 2, no. 1, pp. 1–133, 2007.
- T. Ho and D. S. Lun, Network Coding: An Introduction, Cambridge University Press, New York, NY, USA, 2008.
- S. Zhang, S. Liew, and P. Lam, “Hot topic: physical-layer network coding,” in Proceedings of the ACM 12th Annual International Conference of Mobile Computing and Networks (MobiCom '06), pp. 358–365, Los Angles, USA, September 2006.
- Q.-Y. Yu, D.-Y. Zhang, H.-H. Chen, and W.-X. Meng, “Physical-layer network coding systems with MFSK modulation,” IEEE Transactions on Vehicular Technology, vol. 65, no. 1, pp. 204–213, 2016.
- J. H. Sørensen, R. Krigslund, P. Popovski, T. K. Akino, and T. Larsen, “Physical layer network coding for FSK systems,” IEEE Communications Letters, vol. 13, no. 8, pp. 597–599, 2009.
- H. Kulhandjian, T. Melodia, and D. Koutsonikolas, “Securing underwater acoustic communications through analog network coding,” in Proceedings of the 2014 11th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2014, pp. 266–274, Singapore, July 2014.
- H. Kulhandjian, T. Melodia, and D. Koutsonikolas, “CDMA-Based Analog Network Coding for Underwater Acoustic Sensor Networks,” IEEE Transactions on Wireless Communications, vol. 14, no. 11, pp. 6495–6507, 2015.
- D. Gunduz, A. Yener, A. Goldsmith, and H. V. Poor, “The multiway relay channel,” Institute of Electrical and Electronics Engineers Transactions on Information Theory, vol. 59, no. 1, pp. 51–63, 2013.
- S. Sharifian and T. A. Gulliver, “Performance of physical-layer network coded multi-way relay channels with binary signaling,” in Proceedings of the 14th IEEE Pacific Rim Conference on Communications, Computers, and Signal Processing, PACRIM 2013, pp. 292–295, Victoria, BC, Canada, August 2013.
- R. Y. Chang, S. Lin, and W. Chung, “Transmission Protocol Design for Binary Physical Network Coded Multi-Way Relay Networks,” in Proceedings of the 2014 IEEE Vehicular Technology Conference (VTC'14), pp. 1–5, Seoul, South Korea, May 2014.
- Z. A. Almaalie, X. Tang, Z. Ghassemlooy, I. E. Lee, and A. A. Al-Rubaie, “Iterative multiuser detection with physical layer network coding for multi-pair communications,” in Proceedings of the 2016 10th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), pp. 1–6, Prague, Czech Republic, July 2016.
- M. Kulhandjian and D. A. Pados, “Uniquely decodable code-division via augmented Sylvester-Hadamard matrices,” in Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, WCNC 2012, pp. 359–363, Paris, France, April 2012.
- L. Ping, L. Liu, K. Wu, and W. K. Leung, “Interleave-division multiple-access,” IEEE Transactions on Wireless Communications, vol. 5, no. 4, pp. 938–947, 2006.
- M. Kulhandjian and C. D'Amours, “Design of permutation-based sparse code multiple access system,” in Proceedings of the 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1–6, Montreal, QC, October 2017.
- Y. Li, Q. Yu, K. He, and W. Xiang, “Apply Uniquely-Decodable Codes to Multiuser Physical-Layer Network Coding Based on Amplify-and-Forward Criterion,” in Proceedings of the 2015 IEEE Global Telecommunications Conference 2015, pp. 1–6, San Diego, CA, USA, December 2015.
- D.-Y. Zhang, Q.-Y. Yu, W.-X. Meng, and C. Li, “2FSK modulation for multiuser physical-layer network coding network,” in Proceedings of the 2014 1st IEEE International Conference on Communications, ICC 2014, pp. 514–519, Australia, June 2014.
- T. Koike-Akino, P. Popovski, and V. Tarokh, “Adaptive modulation and network coding with optimized precoding in two-way relaying,” in Proceedings of the 2009 IEEE Global Telecommunications Conference, GLOBECOM 2009, pp. 1–6, Honolulu, HI, USA, December 2009.
- R. Lupas and S. Verdu, “Linear multiuser detectors for synchronous code-division multiple-access channels,” Institute of Electrical and Electronics Engineers Transactions on Information Theory, vol. 35, no. 1, pp. 123–136, 1989.
Copyright © 2018 Michel Kulhandjian et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.