You are on page 1of 14

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO.

8, AUGUST 2014 4283

Cooperative Communication Protocol Designs Based


on Optimum Power and Time Allocation
Zijian Mo, Student Member, IEEE, Weifeng Su, Senior Member, IEEE, Stella Batalama, Senior Member, IEEE,
and John D. Matyjas, Senior Member, IEEE

Abstract—Cooperative communication has emerged as a new I. I NTRODUCTION


wireless network communication concept, in which parameter
optimization such as power budget and time allocation plays an
important role in cooperative relaying protocol designs. While
most existing works on cooperative relaying protocol designs con-
C OOPERATIVE communication has received significant
attention recently as an emerging communication concept
for wireless networks [1], [2]. Due to the broadcast nature
sidered equal-time allocation scenario, i.e., equal time duration is
of wireless transmissions, cooperative communications enables
assigned to each source and each relay, in this work we intend
to design and optimize cooperative communication protocols by neighboring network nodes to share resources and cooperate
exploring all possible variations in time and power domains. We to send information to an intended node. Distributed transmis-
consider a cooperative relaying network in which no channel state sions from source and relay nodes provide spatial diversity (as
information (CSI) is available at the transmitter side and the well as multiplexing gain in some designs) for information
protocol optimization is based on channel statistics (i.e., mean and
variance) and it does not depend on instantaneous channel infor-
detection at a destination node. Cooperative communications
mation. First, we consider an ideal cooperative relaying protocol can significantly improve system performance and robustness
where the system can use arbitrary re-encoding methods at the of wireless networks especially in severe fading environment.
relay and adjust time allocation arbitrarily. We obtain an optimum Cooperative relaying techniques have been considered in some
strategy of power and time allocations to minimize the outage latest communication standards, for example, in IEEE 802.16j
probability of the ideal cooperative protocol. Specifically, for any
given time allocation, we are able to determine the corresponding WiMAX standard [3] and 3GPP’s Long Term Evolution (LTE)-
optimum power allocation analytically with a closed-form expres- Advanced standard [4].
sion. We also show that to minimize the outage probability of the The idea of cooperative communications can be traced back
protocol, one should always allocate more energy and time to the to 1970s [5] and information-theoretic studies have been exten-
source than the relay. Second, with more realistic consideration,
sively carried out since then (see [6]–[10] and the references
we design a practical cooperative relaying protocol based on linear
mapping, i.e., using linear mapping as the re-encoding method therein). In recent years, besides information-theoretic studies,
at the relay and considering integer time slots in the two phases. many efforts have been shifted to design practical cooperative
The theoretical results from the ideal cooperative protocol serve as communication protocols for wireless networks with specific
a guideline and benchmark in the practical cooperative protocol system constraints and quality-of-service (QoS) requirements.
design. We also develop an optimum linear mapping to minimize
the outage probability of the linear-mapping based cooperative
Various cooperative relaying protocols such as decode-and-
protocol. Extensive numerical and simulation studies illustrate forward (DF) relaying protocol and amplify-and-forward (AF)
our theoretical developments and show that the performance of relaying protocol were proposed for wireless networks (see,
the proposed cooperative relaying protocol based on the optimum for examples, [11]–[14]) and substantial performance gains of
linear mapping is close to the performance benchmark of the ideal such relaying protocols have been demonstrated compared to
cooperative protocol.
conventional non-cooperative transmission approach. Cooper-
Index Terms—Cooperative communications, decode-and- ative relaying protocols have been generalized to multi-relay
forward (DF) relaying, optimum time and power allocation, networks with either parallel or sequential multiple relays to
outage probability, wireless networks.
further improve network performance with price of higher com-
plexity and more overhead [11], [15]. Cooperative communica-
Manuscript received August 20, 2013; revised January 24, 2014 and March tion protocols have also been integrated into conventional QoS
25, 2014; accepted March 25, 2014. Date of publication April 6, 2014; date control mechanisms such as automatic-repeat-request (ARQ)
of current version August 8, 2014. The material in this paper will be pre- protocols to enhance reliability and robustness of wireless
sented in part at IEEE International Conference on Communications, Sydney,
Australia, June 2014. This work was supported in part by the U.S. Air Force networks [16], [17]. Cooperative relaying techniques have been
Research Laboratory (AFRL) under Grants FA87501110015, FA87501110016 applied to multimedia wireless broadcast and multicast applica-
and FA87501410074. Security clearance approval for public release (reference
number: 88ABW-2013-4002). The associate editor coordinating the review of
tions with substantial data rate increase and power saving [18],
this paper and approving it for publication was M. McKay. [19]. More thorough discussions on basic theories, protocols,
Z. Mo, W. Su, and S. Batalama are with the Department of Electrical and applications for cooperative communications can be found
Engineering, State University of New York, Buffalo, NY 14260 USA (e-mail:
zijianmo@buffalo.edu; weifeng@buffalo.edu; batalama@buffalo.edu). in [1], [2].
J. D. Matyjas is with the Air Force Research Laboratory/RIT, Rome, NY Resource allocation in cooperative communication protocols
13441 USA (e-mail: John.Matyjas@us.af.mil). such as power budget and time allocation to source and relays
Color versions of one or more of the figures in this paper are available online
at http://ieeexplore.ieee.org. plays an important role in the overall performance of the pro-
Digital Object Identifier 10.1109/TWC.2014.2315813 tocols. Note that most existing works on cooperative relaying

1536-1276 © 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Authorized licensed use limited to: AMITY University. Downloaded on June 30,2020 at 17:14:11 UTC from IEEE Xplore. Restrictions apply.
4284 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 8, AUGUST 2014

protocol designs considered equal-time allocation scenario, i.e., protocol design. More specifically, we design a cooperative
equal time duration is assigned to each source and each relay communication protocol by considering linear mapping as the
[11]–[22]. For example, with equal-time allocation, in [20] re-encoding method at the relay, where the protocol uses integer
source and relay power allocation was optimized such that time slots in Phases I and II. It is much easier to implement the
the outage probability of the cooperative relaying protocol is linear mapping forwarding method with the time allocation of
minimized. In [21], also with equal-time allocation, optimum integer time slots in the two phases in practical systems. We also
power allocation was determined in which symbol error rate develop an optimum linear mapping to minimize the outage
(SER) performances of both DF and AF relaying protocols probability of the linear-mapping based cooperative protocol.
were optimized, respectively. However, there are rather limited Interestingly, simulation results show that the performance of
studies on non-equal time allocation scenario and further on the proposed cooperative protocol based on the optimum linear
joint optimization of power allocation and time allocation in mapping is close to the performance benchmark of the ideal
cooperative relaying protocol designs. In [23], by assuming cooperative protocol.
that instantaneous channel state information (CSI) of source- The rest of the paper is organized as follows. In Section II,
destination, source-relay and relay-destination links are avail- we introduce a general system model for cooperative communi-
able, joint power and time allocation were optimized to minimize cation protocol design with flexibility in time/power allocation
the outage probability of the cooperative communication sys- and arbitrary re-encoding methods. In Section III, we study
tem. In [24], it was shown that the problem of minimizing the the ideal cooperative protocol and determine the corresponding
outage probability with respect to joint power and time alloca- optimum time and power allocations analytically. In Section IV,
tion at source and relays is a multi-variable convex optimization we design the practical cooperative communication protocol
problem for nonorthogonal cooperative communication sys- based on linear mapping and optimize the linear mapping
tems where the source and the relay are allowed to transmit function to minimize the outage probability of the protocol.
simultaneously. However, numerical method was considered in In Section V, extensive numerical and simulation studies are
[24] to solve the convex optimization problem without analyt- presented to verify our theoretical development. Finally, con-
ical solutions. It is hard to obtain insight understanding of the clusions are made in Section VI.
cooperative relaying protocols based on the numerical results. The paper uses the following notation. Bold letters in upper-
We note that in both [23] and [24], independent codebooks were case and lowercase denote matrices and vectors, respectively.
used for source and relays in the cooperative relaying protocol (·)H , det(·) and T r(·) represent Hermitian transpose, determi-
designs. nant and trace operators, respectively. IL is an L × L identity
In this paper, we intend to design and optimize cooperative matrix, and diag(λ1 , . . . , λL ) is an L × L diagonal matrix with
communication protocols by exploring all possible variations diagonal elements λ1 , . . . , λL .
in time and power domains. We assume that no channel
state information (CSI) is available at transmitter side and
the protocol optimization is based on channel statistics (i.e., II. S YSTEM M ODEL
mean and variance) and it does not depend on instantaneous
channel information. We consider an orthogonal cooperative We consider a cooperative wireless network that consists of
communication scenario, in which the source transmits signals one source, one destination and one relay using DF relaying
in Phase I and the relay decodes the signals and forwards protocol. The cooperative strategy is described as followed with
them to the destination in Phase II. First, we analyze an ideal two phases. In Phase I, the source transmits information signal
cooperative communication protocol where the system can use to the destination, and the signal is also received by the relay as
arbitrary re-encoding methods at the relay and adjust time well. In Phase II, if the relay is able to fully decode the infor-
allocation arbitrarily between Phases I and II. We develop an mation signal, it helps forwarding the information to the desti-
asymptotically tight approximation for the outage probability nation via certain re-encoding/transform methods. Throughout
of the cooperative protocol, then based on the asymptotically this paper, we consider narrowband transmissions in the wire-
tight approximation of outage probability, we are able to obtain less network in which channel between any two nodes is subject
an optimum strategy of power and time allocations in the ideal to the effects of frequency nonselective Rayleigh fading and
cooperative protocol. Specifically, for any given time allocation, additive white Gaussian noise (AWGN). We assume that the
we are able to determine the corresponding optimum power al- channel state information is available only at the receivers, not
location at the source and relay analytically with a closed-form at the transmitters. Nodes in the network work in a half-duplex
expression. We also show theoretically that to minimize the out- mode where they cannot transmit and receive simultaneously in
age probability of the protocol, one should always allocate more a same frequency band.
energy and time to Phase I than that to Phase II in the protocol. More specifically, in Phase I, the source broadcasts its infor-
Note that in the ideal cooperative protocol in which there is mation signal xs (t) to both the destination and the relay during
no constraint on the re-encoding methods and time allocation, time interval (0, T1 ]. The received signals ys,d (t) and ys,r (t) at
it may not be easy or feasible to implement it in practical the destination and at the relay can be modeled as
systems. So, next we would like to propose a practical cooper- 
ative communication protocol design based on linear mapping. ys,d (t) = P1 hs,d xs (t) + ns,d (t), 0 < t ≤ T1 , (1)
The theoretical results from the ideal cooperative protocol will 
serve as guideline and benchmark in the practical cooperative ys,r (t) = P1 hs,r xs (t) + ns,r (t), 0 < t ≤ T1 , (2)

Authorized licensed use limited to: AMITY University. Downloaded on June 30,2020 at 17:14:11 UTC from IEEE Xplore. Restrictions apply.
MO et al.: COMMUNICATION PROTOCOL DESIGNS BASED ON POWER AND TIME ALLOCATION 4285

where P1 is the transmission power, xs (t) is normalized with technique as the re-encoding function M(·), and interestingly,
power 1, and ns,d (t) and ns,r (t) are corresponding received the performance of the proposed practical protocol design is
noise at the destination and the relay. In (1) and (2), hs,d very close to the performance benchmark of the ideal coopera-
and hs,r are the channel coefficients from the source to the tive protocol.
destination and the relay, respectively. In Phase II, if the relay
fully decodes the information from the source, then the relay re-
III. I DEAL C OOPERATIVE C OMMUNICATION P ROTOCOL
encodes the information and forwards it to the destination with
power P2 , otherwise the relay remains idle. We denote the time In this section, we focus on joint optimization of power
duration of Phase II as T2 . Then, the received signal yr,d (t) at allocation and time allocation in an ideal cooperative protocol
the destination in Phase II can be modeled as where the system can use arbitrary re-encoding function M(·)
 at the relay and adjust time allocation arbitrarily between
yr,d (t) = P˜2 hr,d xr (t) + nr,d (t), T1 < t ≤ T1 + T2 (3) Phases I and II. It has been shown that the relay and the
source can use independent codebooks to achieve maximum
where P˜2 = P2 if the relay correctly decodes the information rate in cooperative communication protocols [23]. In the ideal
signal xs (t), otherwise P˜2 = 0, hr,d is the channel coefficient cooperative protocol, we assume that the source and the relay
from the relay to the destination, and nr,d (t) is received noise perfectly cooperate by using two independent codebooks. We
Δ
at the destination in Phase II. In (3), xr (t) = M(xs (t)) is a re- also assume that the system can arbitrarily allocate time dura-
encoded version of the original information signal xs (t) and it tion to both phases, i.e., T1 and T2 can be arbitrary positive
is normalized with average power 1. We note that theoretically numbers (T1 + T2 = T ). In the following, we first calculate
arbitrary re-encoding function M(·) may be considered in the the outage probability of the ideal cooperative protocol. Then,
protocol design. we obtain optimum power and time allocation to minimize
We assume that the channel coefficients hs,d , hs,r , and hr,d the outage probability of the ideal cooperative protocol. For
are modeled as zero-mean complex Gaussian random variables any give time allocation α ∈ (0, 1), we determine the optimum
with variances δs,d2 2
, δs,r 2
, and δr,d , respectively. The noise terms power allocation at the source and the relay analytically with
ns,d (t), ns,r (t), and nr,d (t) are modeled as zero-mean AWGN closed-form expression. Finally, we show that to minimize the
with variance N0 . We denote the total time duration of each outage probability of the protocol, one should allocate more
Δ
transmission period as T = T1 + T2 and assume that the fading energy and time to Phase I than Phase II.
channels are quasi-static within each transmission period. We
denote the ratio of the time allocation in Phase I over the whole A. Maximum Mutual Information and Outage Probability
Δ
period as α = T1 /T ∈ (0, 1). If the average transmission power
of the protocol in each transmission period is P , then the source First, we would like to derive the outage probability of the
and relay transmission powers P1 and P2 should satisfy the ideal cooperative relaying protocol. In Phase I, with indepen-
constraint dently and identically distributed (i.i.d.) circularly symmetric
complex Gaussian input signals, the maximum mutual infor-
P1 T 1 + P 2 T 2 = P T (4) mation between the source and the destination is given by
 
or equivalently αP1 + (1 − α)P2 = P . For convenience, we P1 |hs,d |2
Is,d = α log2 1 + (5)
further denote β as the ratio of the energy consumed in Phase I N0
over the total energy consumption in each transmission period,
Δ in which the time allocation ratio α shows the fact that Phase I
i.e., β = P1 T1 /P T , so we have β = αP1 /P . occupies time duration T1 in each transmission period (0, T ].
We note that the system model specified above for coopera- Since hs,d ∼ CN (0, δs,d 2
), then |hs,d |2 is an exponential ran-
tive relaying protocol designs has two variable domains to op- dom variable with parameter λs,d = 1/δs,d 2
. Thus, the proba-
timize: the power domain of allocating P1 and P2 and the time bility that the destination decodes incorrectly in Phase I can be
domain of allocating T1 and T2 . With given power budget P , we calculated as
intend to optimize the power variables and the time variables 
such that the outage probability of the cooperative relaying N0  RT 
protocol is minimized. The outage probability is defined as P r[Is,d < RT ] = 1 − exp − 2 2 α −1 . (6)
P1 δs,d
the probability that the maximum mutual information I of the
transceiver is smaller than a predetermined target transmission Similarly, the maximum mutual information Is,r between the
rate RT . If I > RT , we assume that the receiver can decode source and the relay in Phase I is
the message correctly with negligible error probability. In the  
P1 |hs,r |2
following, we first study an ideal cooperative relaying protocol Is,r = α log2 1 + (7)
where there is no constraint on the re-encoding function M(·) N0
and time allocation. The corresponding theoretical analysis and the outage probability that the relay fails to decode the
will serve as guideline and benchmark in following practical message in Phase I is
cooperative communication protocol design. Then, with more

N0  RT 
realistic consideration for implementation, we propose a practi-
P r[Is,r < RT ] = 1 − exp − 2
2 α − 1 . (8)
cal cooperative relaying protocol by considering linear mapping P1 δs,r

Authorized licensed use limited to: AMITY University. Downloaded on June 30,2020 at 17:14:11 UTC from IEEE Xplore. Restrictions apply.
4286 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 8, AUGUST 2014

If the relay fully decodes the message from the source, then B. Optimum Power and Time Allocations
the relay forwards the message to the destination by using an
In this subsection, we would like to minimize the outage
independent codebook. With two independent codebooks at the
probability in (11) to determine optimum power and time al-
source and relay, the channels of source-destination and relay-
locations for the ideal cooperative relaying protocol. However,
destination can be viewed as a pair of parallel channels, thus
the closed-form expression in (11) is not tractable for analytical
the joint maximum mutual information from the source to the
purpose. Therefore, in the following, we first derive an approx-
destination in the two phases is given by
imation of the outage probability (11) which is asymptotically
  tight, then we determine the optimum time and power alloca-
P1 |hs,d |2
Ijoint = α log2 1+ tions based on the asymptotically tight approximation of the
N0 outage probability.
  We would like to use the first-order Taylor series approxima-
P2 |hr,d |2 tion, i.e., exp(x) ≈ 1 + x for x close to 0, to simplify the two
+(1 − α) log2 1 + . (9)
N0 terms P r[Is,d < RT ] and P r[Is,r < RT ] in (11). With high
SNR where P1 /N0 is large, we have
Since hr,d ∼ CN (0, δr,d2
), |hr,d |2 is an exponential random RT
2 N0 (2 α − 1)
variable with parameter λr,d = 1/δr,d . The probability density P r[Is,d < RT ] ≈ , (12)
P δ2
function (pdf) of the random variable |hr,d |2 is f|hr,d |2 (zr,d ) =  1 Rs,d 
N0 2 α − 1
T
2
(1/δr,d 2
) exp{−(zr,d /δr,d )} with zr,d ≥ 0. Similarly, the pdf
of the random variable |hs,d |2 is given by f|hs,d |2 (zs,d ) = P r[Is,r < RT ] ≈ 2
. (13)
P1 δs,r
2
(1/δs,d 2
) exp{−(zs,d /δs,d )} with zs,d ≥ 0. Then, with the relay
signal, the probability that the destination decodes incorrectly Thus, the product of P r[Is,d < RT ] and P r[Is,r < RT ] can be
is given by (10), shown at the bottom of the page. Note that approximated as
the outage events of the cooperative relaying protocol have
N02
two possibilities: 1) both the destination and the relay fail P r[Is,d < RT ] · P r[Is,r < RT ] ≈ 2 A(α) (14)
to decode the message in phase I; and 2) the destination fails P12 δs,d
to decode the message jointly in Phase II even when the relay where
fully decodes the message and helps forwarding the message to
 2
the destination. Therefore, the overall outage probability Pout 2
RT
α −1
of the ideal cooperative protocol is given by (11), shown at the A(α) = . (15)
2
δs,r
bottom of the page.

⎛   ⎞
 RT
 N0
RT −α log2 (1+P1 zs,d /N0 )
N0 1−α −1
2 α −1 ⎜ P2 2

⎜ ⎟
P1

⎜ ⎟
P r[Ijoint < RT ] = f|hs,d |2 (zs,d ) ⎜
⎜ f|hr,d |2 (zr,d )dzr,d ⎟
⎟ dzs,d
⎜ ⎟
0 ⎝ 0 ⎠

 RT

N0
2 −1  
    exp − zs,d
α

P1

N0 RT −α log2 (1+P1 zs,d /N0 ) 2


δs,d
= 1 − exp − 2 2 1−α −1 2 dzs,d (10)
P2 δr,d δs,d
0

Pout = P r[Is,d < RT ]P r[Is,r < RT ] + (1 − P r[Is,r < RT ]) P r[Ijoint < RT ]


   

N0  R T  N0  RT  

N0  RT 
= 1 − exp − 2 2 α −1 1 − exp − 2
2 α −1 + exp − 2
2 α −1
P1 δs,d P1 δs,r P1 δs,r
 R 
N0 T
2 −1
    
α

P1

N0 RT −α log2 (1+P1 zs,d /N0 )


1 zs,d
× 1 − exp − 2 2 1−α −1 2 exp − δ 2 dzs,d (11)
P2 δr,d δs,d s,d
0

Authorized licensed use limited to: AMITY University. Downloaded on June 30,2020 at 17:14:11 UTC from IEEE Xplore. Restrictions apply.
MO et al.: COMMUNICATION PROTOCOL DESIGNS BASED ON POWER AND TIME ALLOCATION 4287

Note that A(α) > 0 and its first-order differential is continuous RT


N02   ln 2 RT −r
for any α ∈ (0, 1). Furthermore, we can see in (13) that the term =
r
2α − 1 2 1−α dr
2 δ2
P1 P2 δs,d 1−α
P r[Is,r < RT ]  1 in the high SNR region, so we have 1 − r,d
0
P r[Is,r < RT ] ≈ 1 with large P1 /N0 .
To obtain an asymptotically tight approximation for the RT
N02 ln 2 RT r(1−2α) r
term P r[Ijoint < RT ], we need the following lemma that was = 2 2 2 1−α 2 α(1−α) −2 α−1 dr . (19)
P1 P2 δs,d δr,d (1−α)
developed in [17]. 0
  
Lemma 1 [17]: Assume that us1 and vs2 be two indepen- Δ
=B(α)
dent scalar random variables. If their cumulative distribution
functions (CDF) satisfy the following properties
In (19), we observe that B(α) > 0 and its first-order differential
lim s1 · P r[us1 < R] = a · f (R), is continuous for any α ∈ (0, 1). To further simplify (19), we
s1 →∞ calculate the integral in B(α) by considering two cases: α =
lim s2 · P r[vs2 < R] = b · g(R) 1/2 and α = 1/2. When α = 1/2, B(α) can be derived as
s2 →∞
RT
2 ln 2 ! "
where a and b are constants, f (R) and g(R) are monotonically B(α) = 2 22RT 1 − 2−2r dr
δr,d
increasing functions, and the derivative of g(R), denoted as 0
g
(R), is integrable, then the CDF of the sum of the two 1
2 (2RT ln 2 · 2 − 22RT + 1).
2RT
independent random variables has the following property: = (20)
δr,d
R #R
lim s1 s2 ·P r[us1 +vs2 < R] = ab· f (r)g
(R−r)dr. (16) When α = 1/2, since 0 T 2cr dr = (1/c ln 2)[2cRT − 1] for
s1 ,s2 →∞ any constant c > 0, we have
0
⎡R ⎤
T RT
To use Lemma 1, we observe that Ijoint in (9) includes ln 2 RT r(1−2α)
2 1−α ⎣ 2 α(1−α) dr − 2 α−1 dr⎦
r
B(α) = 2
two independent random variables which can be written as δr,d (1 − α)
0 0
Ijoint = us1 + us2 , where us1 = α log2 (1 + (P1 |hs,d |2 /N0 )) (  
and us2 = (1 − α) log2 (1 + (P2 |hr,d |2 /N0 )). Let ln 2 RT α(1 − α) RT (1−2α)
= 2 2 1−α 2 α(1−α) −1
s1 = P1 /N0 and s2 = P2 /N0 , and since |hs,d |2 and |hr,d |2 δr,d (1 − α) (1 − 2α) ln 2
)
2
are exponential random variables with parameter 1/δs,d and
α − 1  α−1
RT
2
1/δr,d , so we have − 2 −1
ln 2
 RT
  
2 α −1 1 α RT α − 1 1−α
RT
lim s1 · P r[us1 < RT ] = lim s1 ·P r |hs,d | < 2 = 2 2 α + 2 +1 . (21)
s1 →∞ s1 →∞ s1 δr,d 1 − 2α 1 − 2α
1  RT

Therefore, B(α) in (19) can be given explicitly as
= 2 2 α −1 , (17)
δs,d    ⎧ 1
⎨ δ2 (2RT ln 2 · 22RT − 22RT + 1), α = 12 ;
 
Δ
=f (RT ) r,d
B(α) = RT RT

RT  ⎩ 21 α
2 α +
α−1 1−α
2 + 1 , otherwise.
δ 1−2α 1−2α
2 1−α −1 r,d
lim s2 · P r[us2 < RT ] = lim s2 · P r |hr,d | < 2 (22)
s2 →∞ s2 →∞ s2 We summarize the above discussion on the approximation of
1  1R−Tα  the outage probability in the following theorem.
= 2 2 −1 . (18) Theorem 1: In the ideal cooperative protocol, the outage
δr,d   
probability can be approximated as
Δ
=g(RT )
Δ N02 A(α) N02 B(α)
Pout ≈ P̃out = 2 P 2 + δ2 P P (23)
We can see that in (17) and (18), both f (RT ) and g(RT ) are δs,d 1 s,d 1 2
monotonically increasing functions, and furthermore we have
g
(RT ) = (ln 2/(1−α))2RT /(1−α) . By applying Lemma 1, we where A(α) and B(α) are specified in (15) and (22), respec-
obtain an approximation of P r[Ijoint < RT ] at the high SNR tively, and the approximation is asymptotically tight at high SNR.
region as In Fig. 1, we compare the exact value of the out-
age probability which was calculated based on (11) and
P r[Ijoint < RT ] the asymptotic approximation of the outage probability in
(23) in three scenarios with different channel variances:
RT (i) {δs,d
2 2
, δs,r 2
, δr,d }={1, 1, 1}; (ii) {δs,d
2 2
, δs,r 2
, δr,d } = {1, 10, 1};
N02
≈ 2 δ2 f (r)g
(RT − r)dr and (iii) {δs,d , δs,r , δr,d } = {1, 1, 10}. In the comparison, we
2 2 2
P1 P2 δs,d r,d
0 assume that α = 1/2, RT = 2, N0 = 1, and P1 = P2 = P .

Authorized licensed use limited to: AMITY University. Downloaded on June 30,2020 at 17:14:11 UTC from IEEE Xplore. Restrictions apply.
4288 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 8, AUGUST 2014

minimize the outage probability of the protocol. The results are


summarized in the following theorem and the proof is included
in Appendix I.
Theorem 2: In the ideal cooperative protocol, for any given
time allocation ratio α ∈ (0, 1), the corresponding optimum
powers P1∗ (α) and P2∗ (α) are given by

∗ 1 1+ 1 + 8 [αA(α)] / [(1 − α)B(α)]
P1 (α) = ·  P, (25)
α 3+ 1 + 8 [αA(α)] / [(1 − α)B(α)]
1 2
P2∗ (α) = ·  P, (26)
1 − α 3+ 1+8 [αA(α)] / [(1−α)B(α)]

where A(α) and B(α) are specified in (15) and (22), re-
spectively. Moreover, the resulting energy allocation ratio β =
αP1∗ (α)/P is strictly larger than 1/2, which means that, the
protocol should allocate more energy to Phase I than that to
Phase II to minimize the outage probability.
Fig. 1. Comparison of the exact and approximation of the outage probability Based on Theorem 2, we substitute the optimum power
in three cases: {δs,d
2 , δ 2 , δ 2 } = {1, 1, 1}, {δ 2 , δ 2 , δ 2 } = {1, 10, 1}
s,r r,d s,d s,r r,d
solutions P1∗ (α) and P2∗ (α) into the optimization problem (24)
and {δs,d , δs,r , δr,d
2 2 2 } = {1, 1, 10}. Assume that α = 1/2, R = 2, N =
T 0
1, and P1 = P2 = P . to find the optimum time allocation ratio, i.e.,
Δ N02 A(α) N02 B(α)
From the figure, we can see that the approximation of the outage min P̃out (α) = +
α δs,d P1∗ (α)2
2 δs,d P1∗ (α)P2∗ (α)
2
probability is tight at reasonable high SNR for various channel
conditions. The curve of the outage probability approximation s.t. 0 < α < 1. (27)
merges with the curve of the exact calculation at an outage
probability of 10−2 in each case. From Fig. 1, we also observe We can see that the optimization in (27) has only a single
that when the SNR is lower than 18 dB, the approximation variable α, and we can apply numerical search of the single
of the outage probability is not tight in which, however, the variable α over the interval (0, 1) to obtain the optimum
corresponding outage probability is around 10−1 and it may time allocation ratio α∗ that minimizes the asymptotic outage
not be acceptable in many practical applications. Thus, for probability P̃out . The objective function in (27) is continuous in
practical systems with reasonable high SNR requirement, the terms of the variable α, thus we are able to obtain the optimum
asymptotically tight approximation of the outage probability value of α with sufficiently small searching step size. With
in (23) is useful to get some insight understanding of the the optimum time allocation ratio α∗ , based on Theorem 2 we
system performance. More comparisons of the approximation can get the corresponding optimum source transmission power
and exact value of the outage probability can be found in P1∗ (α∗ ) and the optimum relay transmission power P2∗ (α∗ ). We
Figs. 2–4 with α = 1/2. note that the above two-step optimization procedure [i.e., using
Next, we would like to jointly optimize power and time Theorem 2 to reduce the three-variable optimization problem
allocations for the ideal cooperative protocol based on the in (24) into the single-variable optimization problem in (27)]
asymptotically tight approximation of the outage probability is guaranteed to find the global optimal solution for the joint
developed in Theorem 1. Note that the time allocation ratio optimization with the three variables α, P1 and P2 . Let us
α = T1 /T may take any number in the range of (0, 1), while the denote (α∗ , P1∗ (α∗ ), P2∗ (α∗ )) as the solution of optimum power
power parameters P1 and P2 should satisfy the power constraint and time allocation for the ideal cooperative protocol. We have
in (4), i.e., αP1 + (1 − α)P2 = P . The problem of optimizing the following result regarding the optimum time allocation α∗ .
time and power can be specified as follows: Theorem 3: In the ideal cooperative protocol, the optimum
time allocation ratio α∗ is strictly larger than 1/2, i.e., α∗ ∈
Δ N02 A(α) N02 B(α) (1/2, 1), which means that the protocol should allocate more
min P̃out (α, P1 , P2 ) = 2 P 2 + δ2 P P
α,P1 ,P2 δs,d 1 s,d 1 2 time to Phase I than to Phase II to minimize the outage proba-
bility of the protocol.
s.t. αP1 + (1 − α)P2 = P,
The proof of Theorem 3 is included in Appendix II. Theorem 3
0 < α < 1, P1 > 0, P2 > 0. (24) shows that the equal-time allocation strategy in most existing
cooperative relaying protocol (allocating equal time among the
We found that for any given time allocation ratio α ∈ (0, 1), two phases) is not optimal in general.
we are able to express the corresponding optimum powers P1
and P2 in terms of the time allocation ratio α with closed-
IV. P RACTICAL C OOPERATIVE C OMMUNICATION
form expressions, which are denoted as P1∗ (α) and P2∗ (α),
P ROTOCOL D ESIGN BASED ON L INEAR M APPING
respectively. Moreover, we found that for any time allocation
ratio α ∈ (0, 1), the protocol should allocate more energy to It is difficult, sometimes may be infeasible, to implement the
Phase I than that to Phase II (i.e., β = (αP1∗ (α)/P ) > 1/2) to ideal cooperative protocol as the re-encoding function M(·)

Authorized licensed use limited to: AMITY University. Downloaded on June 30,2020 at 17:14:11 UTC from IEEE Xplore. Restrictions apply.
MO et al.: COMMUNICATION PROTOCOL DESIGNS BASED ON POWER AND TIME ALLOCATION 4289

and time allocation can be arbitrary. In this section, with more and nr,d is the noise vector of size K × 1 at the destination in
realistic consideration, we design a cooperative communication Phase II. In (29)–(31), the elements of the noise vectors ns,d ,
protocol based on linear mapping, where the relay uses linear ns,r and nr,d are independent Gaussian random variables with
mapping as the re-encoding function M(·). Also, the practical mean zero and variance N0 . The channel coefficients hs,d , hs,r
cooperative protocol allocates integer time slots in Phases I and and hr,d are modeled as zero-mean complex Gaussian random
2 2 2
II. It is much easier to implement the linear mapping forward- variables with variances δs,d , δs,r and δr,d , respectively. We
ing method with the time allocation of integer time slots in note that the overall power constraint in (4) should be satisfied
both phases. The theoretical results from the ideal cooperative in the linear-mapping based cooperative protocol. There may be
protocol in the previous section will serve as guideline and power saving when relay not forwarding information (P˜2 = 0),
benchmark for the proposed linear-mapping based cooperative however the probability of relay not forwarding is small and the
protocol design. Interestingly, the practical cooperative protocol power saving is negligible.
based on optimum linear mapping performs closely to the At the destination, it combines the received signals ys,d and
performance benchmark of the ideal cooperative protocol. In yr,d from both phases to jointly detect the original message xs .
the following, we first specify the practical cooperative com- The combined signal at the destination can be expressed as
munication protocol design based on linear mapping. Then we   √   
optimize the linear mapping of the protocol such that the outage ys,d P1 Hs,d xs ns,d
yd =
Δ
=  + . (32)
probability of the proposed protocol is minimized. yr,d P˜2 Hr,d xr nr,d

A. Protocol Design Since xr = Gxs , the combined signal yd can be further sim-
plified as
We intend to design a practical cooperative relaying protocol
with L time slots in Phase I and K time slots in Phase II. yd = Hd xs + nd (33)
We assume that each time slot has time duration Ts . In

Phase I, the source broadcasts a block of symbols xs (xs = Δ  P1 Hs,d  Δ  s,d 
(xs [1], . . . , xs [L])T ) using L time slots, in which each element where Hd = √ ˜ , nd = nnr,d and nd ∼ CN (0,N0 IL+K ).
P2 Hr,d G
of xs has unit power. In Phase II, if the relay successfully
decodes the message, then the relay takes K time slots to
forward a re-encoded message xr (xr = (xr [1], . . . , xr [K])T ), B. Optimum Linear Mapping Design
where xr = Gxs and G is a K × L matrix representation of In this subsection, we optimize the linear mapping matrix
the linear mapping. In the protocol, the total time duration G of size K × L(K < L) such that the outage probability
of Phase I is T1 = LTs and the time duration of Phase II is of the proposed linear-mapping based cooperative protocol is
T2 = KTs , thus the time allocation ratio α of the protocol is minimized.
LTs L First, we derive the outage probability of the linear-mapping
α= = . (28) based cooperative protocol. From (29), we observe that the
LTs + KTs L+K
channel from the source to the destination in Phase I is a multi-
Based on the theoretical results in the previous section, we input multi-output complex Gaussian channel. Thus, with i.i.d.
know that we should allocate more time to Phase I than that to circular symmetric complex Gaussian inputs, the maximum
Phase II to minimize the outage probability (i.e., 1/2 < α < 1), mutual information between the source and the destination in
which means that we should choose K < L in the practical Phase I is
cooperative protocol design. (  )
The general system model in Section II can be modified 1 P1 H
Is,d = log2 det IL + Hs,d Hs,d
for the linear-mapping based cooperative protocol in a discrete L+K N0
version as follows:  
 L P1
ys,d = P1 Hs,d xs + ns,d , (29) = log2 1 + |hs,d | ,
2
(34)
L+K N0

ys,r = P1 Hs,r xs + ns,r , (30) where the factor 1/L + K in the first equality is due to the fact
 that the cooperative protocol uses L + K time slots in Phases I
yr,d = P˜2 Hr,d xr + nr,d , (31) and II. Similarly, the maximum mutual information between the
source and the relay in Phase I is given by
where P˜2 = P2 if the relay correctly decodes the information  
signal xs (t), otherwise P˜2 = 0 (the power parameters P1 and L P1
Is,r = log2 1 + |hs,r | .
2
(35)
P2 are selected based on the designed guideline from the previ- L+K N0
ous section), Hs,d = hs,d IL , Hs,r = hs,r IL , Hr,d = hr,d IK ,
ys,d and ys,r are the signal vectors of size L × 1 received at In Phase II, if the relay decodes the message from the source
the destination and the relay, respectively during Phase I, yr,d correctly (i.e., P˜2 = P2 ), the destination can utilize the com-
is the signal vector of size K × 1 received at the destination bined signal yd from two phases to detect the original message
during Phase II, ns,d and ns,r are the noise vectors of size xs . From (33), we can see that the channel between the output
L × 1 at the destination and the relay, respectively in Phase I, yd and the input xs is an equivalent multi-input, multi-output

Authorized licensed use limited to: AMITY University. Downloaded on June 30,2020 at 17:14:11 UTC from IEEE Xplore. Restrictions apply.
4290 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 8, AUGUST 2014

complex Gaussian channel. Therefore, the maximum mutual We can solve the problem by using Lagrange multipliers.
information of the joint detection in Phase II is Consider an Lagrange multiplier μ and an Lagrange function
   
1 Hd HH -K
P2 |hr,d |2 /N0 -K
Id = log2 det IL+K + d
L(λ1 , . . . , λK ) = log2 1+ λ + μ λi .
L+K ( N0  ) 1+P1 |hs,d |2 /N0
i
i=1 i=1
1 P1 |hs,d |2 P2 |hr,d |2 H (41)
= log2 det 1+ IL + G G
L+K N0 N0
(36) Differentiating the Lagrange function with respect to λi , we have
∂L(λ1 , . . . , λK ) 1
where the second equality is due to the fact that det(IL+K + = 1+P1 |hs,d |2 /N0
+ μ. (42)
∂λi λi +
(Hd HH H H
d /N0 )) = det(IL + (Hd Hd /N0 )) and Hd Hd = (P1 | P2 |hr,d |2 /N0
H
hs,d | /N0 )IL + (P2 |hr,d | /N0 )G G. Thus, for any given tar-
2 2

get transmission rate RT , the outage probability of the proposed Let ∂L(λ1 , . . . , λK )/∂λi = 0, we obtain an expression of op-
linear-mapping based cooperative protocol is timum λi as
 
1 1 + P1 |hs,d |2 /N0
Pout = P r[Is,d < RT ]P r[Is,r < RT ] λi = max 0, − − . (43)
μ P2 |hr,d |2 /N0
+ (1 − P r[Is,r < RT ]) P r[Id < RT ], (37)
.
Since Ki=1 λi = K, we have
in which Is,d , Is,r and Id are specified in (34)–(36),
respectively. P2 |hr,d |2 /N0
μ=− . (44)
Next, we try to optimize the linear mapping G to minimize 1 + P1 |hs,d |2 /N0 + P2 |hr,d |2 /N0
the outage probability in (37). We note that in (37), only the
term Id depends on the linear mapping G. Thus, to mini- By substituting (44) into (43), we have
mize the outage probability Pout , it is equivalent to minimize 1 + P1 |hs,d |2 /N0 + P2 |hr,d |2 /N0 1 + P1 |hs,d |2 /N0
P r[Id < RT ] under the power constraint T r(GGH ) ≤ K. The λi = −
P2 |hr,d |2 /N0 P2 |hr,d |2 /N0
power constraint ensures that the forwarded signals have unit = 1, (45)
average power. The mutual information Id in (36) can be
further calculated as i.e., the optimum solution for the problem (40) is λi = 1 for
 L i = 1, . . . , K. Therefore, the linear mapping G minimizes the
1 P1 |hs,d |2 outage probability in (37) if and only if GGH = IK . We
Id = log2 1+
L+K N0 summarize the above discussion in the following theorem.
 ) Theorem 4: In the linear-mapping based cooperative proto-
P2 |hr,d |2 /N0 H
×det IK + GG col, any K × L (K < L) linear mapping G with power con-
1 + P1 |hs,d |2 /N0
1 straint T r(GGH ) ≤ K minimizes the outage probability of the
Δ
= (Id,1 + Id,2 ) , (38) protocol if and only if it satisfies GGH = IK . Consequently,
L+K
we may select any K rows of an L × L unitary matrix to form
Δ Δ the optimum linear mapping G.
where Id,1 = log2 (1 + (P1 |hs,d |2 /N0 ))L and Id,2 =
log2 [det(IK + (P2 |hr,d |2 /N0 /(1 + P1 |hs,d |2 /N0 ))GGH )].
V. S IMULATION R ESULTS AND D ISCUSSION
We observe that Id,1 does not depend on the linear mapping G.
Thus, to maximize Id , it is equivalent to maximize Id,2 under In this section, we provide some numerical studies and sim-
the power constraint that T r(GGH ) ≤ K. To further calculate ulation results to illustrate the performance benchmark of the
Id,2 , we consider eigen-decomposition GGH = UH ΛU, ideal cooperative protocol and the performance of the practical
where U is a unitary matrix, Λ = diag(λ1 , . . . , λK ) and the cooperative protocol based on the optimum linear mapping.
eigenvalues λ1 , . . . , λK are non-negative. Thus, we have In all numerical studies and simulations, we assume that the
(  ) target transmission rate is RT = 2 bits/s/Hz, the noise variance
P2 |hr,d |2 /N0 H is N0 = 1, and the variance of the source-destination channel
Id,2 = log2 det IK + U ΛU
1 + P1 |hs,d |2 /N0 is normalized as δs,d 2
= 1. We consider three exemplary sce-
- K  
P2 |hr,d |2 /N0 narios with various channel variances: (i) {δs,r 2 2
, δr,d } = {1, 1};
= log2 1 + λi . (39)
1 + P1 |hs,d |2 /N0 (ii) {δs,r , δr,d } = {10, 1}; and (iii) {δs,r , δr,d } = {1, 10}.
2 2 2 2
i=1
In Figs. 2–4, we plot the outage probability of the ideal
. H
Since K i=1 λi = T r(GG ) ≤ K, the problem of optimizing
cooperative protocol in terms of different time allocation ratio
the linear mapping G is specified as α ∈ (0, 1) for the three channel conditions (i)–(iii), respec-
tively. In the study, we assume P/N0 = 30 dB. For any given
-
K  
P2 |hr,d |2 /N0 time allocation ratio α ∈ (0, 1), the corresponding optimum
max log2 1+ λi power allocation P1 = P1∗ (α) and P2 = P2∗ (α) are calculated
λ1 ,...,λK
i=1
1 + P1 |hs,d |2 /N0
based on Theorem 2. In each figure, we plot the outage proba-
-
K
s.t. λi ≤ K. (40) bility approximation based on (23) as well as the exact outage
i=1 probability calculated based on (11) for comparison. In the

Authorized licensed use limited to: AMITY University. Downloaded on June 30,2020 at 17:14:11 UTC from IEEE Xplore. Restrictions apply.
MO et al.: COMMUNICATION PROTOCOL DESIGNS BASED ON POWER AND TIME ALLOCATION 4291

Fig. 2. Outage probability of the ideal cooperative protocol with different time Fig. 4. Outage probability of the ideal cooperative protocol with different
allocation ratio α ∈ (0, 1) under the channel condition {δs,r
2 , δ 2 } = {1, 1}. 2 , δ2 } =
time allocation ratio α ∈ (0, 1) under the channel condition {δs,r r,d
r,d ∗ ∗
Assume that P1 = P1∗ (α) and P2 = P2∗ (α) for any given α ∈ (0, 1) based {1, 10}. Assume that P1 = P1 (α) and P2 = P2 (α) for any given α ∈ (0, 1)
on Theorem 2, and P/N0 = 30 dB. based on Theorem 2, and P/N0 = 30 dB.

Fig. 3. Outage probability of the ideal cooperative protocol with different Fig. 5. Performance of the proposed practical cooperative protocol with the
time allocation ratio α ∈ (0, 1) under the channel condition {δs,r
2 , δ2 } =
2 , δ 2 } = {1, 1}.
optimum linear mapping under the channel condition {δs,r r,d
r,d
∗ ∗
{10, 1}. Assume that P1 = P1 (α) and P2 = P2 (α) for any given α ∈ (0, 1)
based on Theorem 2, and P/N0 = 30 dB. corresponding energy allocation ratio β is strictly larger than
1/2 which is consistent to the result in Theorem 2. Moreover,
2 2
case of δs,r = 1 and δr,d = 1, Fig. 2 shows that the optimum we observe that the larger the ratio of the relay-destination
time allocation ratio is α∗ = 0.66. The corresponding opti- link quality over the source-relay link quality (δr,d 2 2
/δs,r ) is,
mum power allocation is P1∗ (α∗ ) = 1.0971P and P2∗ (α∗ ) = ∗
the larger the optimum time allocation ratio α and the cor-
0.8115P based on Theorem 2, in which the energy allocation responding energy allocation ratio β are. The phenomenon
2 2
ratio β = 0.7192. In case of δs,r = 10 and δr,d = 1, Fig. 3 can be understood as follows: when the relay is closer to the
shows that the optimum time allocation ratio is α∗ = 0.59. destination and the source-relay channel link is relatively weak,
The corresponding optimum power allocation is P1∗ (α∗ ) = in this case the system should allocate more time to Phase I for
1.0196P and P2∗ (α∗ ) = 0.9718P based on Theorem 2 and the the relay to receive enough information signals. If the received
2
energy allocation ratio β = 0.5969. In case of δs,r = 1 and signals at the relay are too weak, the relay is not able to decode
2
δr,d = 10, Fig. 4 shows that the optimum time allocation ratio the signals and the signal forwarding in Phase II is not necessary
is α∗ = 0.74. The corresponding optimum power allocation although the relay-destination link is strong in this case. In the
is P1∗ (α∗ ) = 1.1112P and P2∗ (α∗ ) = 0.6835P and the energy three figures, we can see that the approximation of the outage
allocation ratio β = 0.8122. probability based on (23) matches the exact value of the outage
Figs. 2–4 show that for all three channel conditions, the opti- probability based on (11) very well.
mum time allocation ratio α∗ is strictly larger than 1/2 which is Figs. 5–7 show the outage probability performance of the
consistent to the theoretical development in Theorem 3, and the proposed practical cooperative relaying protocol based on the

Authorized licensed use limited to: AMITY University. Downloaded on June 30,2020 at 17:14:11 UTC from IEEE Xplore. Restrictions apply.
4292 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 8, AUGUST 2014

the equal-time based cooperative protocol with performance


improvement about 1.5 dB, and the difference between the
performances of the practical linear-mapping based cooperative
protocol and the ideal benchmark is less than 1 dB. When
2 2
δs,r = 10 and δr,d = 1, we can see in Fig. 6 that there is a
2 dB difference between the proposed practical cooperative
protocol and the ideal performance benchmark, but compared
to the equal-time based cooperative protocol, the performance
difference is less than 1 dB. In this case, the performance gain
over the equal-time based cooperative protocol is narrowed
because the equal-time allocation ratio is close to the optimum
time ratio which is α∗ = 0.59 in this case. When δs,r 2
= 1 and
2
δr,d = 10, Fig. 7 shows that the performance of the proposed
practical cooperative protocol has over 2.5 dB improvement
compared to the equal-time based cooperative protocol. In this
case, the performance of the proposed linear-mapping based
cooperative protocol is very close to the ideal performance
Fig. 6. Performance of the proposed practical cooperative protocol with the benchmark (less than 0.25 dB). From the figures, we can see
optimum linear mapping under the channel condition {δs,r
2 , δ 2 } = {10, 1}.
r,d that the equal-time based cooperative protocol is not optimum
in general, and the proposed practical cooperative protocol with
the optimum linear mapping has performance gain in all three
different channel conditions, which varies according to channel
conditions. Moreover, we observe that when the ratio of the
relay-destination link quality over the source-relay link quality
2 2
(δr,d /δs,r ) becomes larger, the gap between the performance
of the proposed practical linear-mapping based cooperative
protocol and the ideal benchmark becomes smaller.

VI. C ONCLUSION
In this paper, we designed and optimized cooperative re-
laying protocols by exploring possible variations in time and
power domains. First, we analyzed and optimized the ideal
cooperative communication protocol where the system can use
arbitrary re-encoding function M(·) at the relay and adjust
time allocation arbitrarily between Phases I and II. Based on
the asymptotically tight approximation of the outage proba-
Fig. 7. Performance of the proposed practical cooperative protocol with the bility, we obtained the optimum strategy of power and time
optimum linear mapping under the channel condition {δs,r
2 , δ 2 } = {1, 10}.
r,d allocations to minimize the outage probability of the ideal
cooperative protocol. For any given time allocation α ∈ (0, 1),
optimum linear mapping for three channel conditions (i)–(iii), we determined the corresponding optimum power allocation
respectively. For comparison, the figures also show the per- at the source and the relay analytically with a closed-form
formance of the direct transmissions, the performance of the expression. We also showed theoretically that to minimize the
cooperative protocol based on equal time allocation, and the outage probability of the protocol, one should always allocate
performance benchmark from the ideal cooperative protocol. more energy and time to Phase I than Phase II in the protocol.
Table I specifies time and power parameters (α, P1 , P2 ) for We note that in the ideal cooperative protocol in which there is
each cooperative protocol under the three channel conditions, no constraint on the re-encoding methods and time allocation,
respectively. In the linear-mapping based cooperative protocol, it may not be easy/feasible to implement it in practical systems.
the time ratio and power parameter (α, P1 , P2 ) are selected Therefore, with more realistic consideration, we proposed a
based on the design guideline from the ideal case in Section III. practical cooperative relaying protocol design based on linear
For the selection of parameters K and L, we try to select mapping, where the protocol considers linear mapping forward-
smaller integers such that the ratio L/(L + K) is close to ing method at the relay and uses integer time slots in Phases I
the optimum time allocation ratio α∗ . For example, when and II. The theoretical results from the ideal cooperative
2 2
δs,r = 1 and δr,d = 1, the optimum time allocation ratio is protocol served as guideline and benchmark in the practical

α = 0.66, thus we consider small integers L = 2 and K = 1 cooperative protocol design. We also developed an optimum
such that the resulting ratio is close to the optimum time linear mapping to minimize the outage probability of the linear-
2 2
allocation ratio. When δs,r = 1 and δr,d = 1, Fig. 5 shows mapping based cooperative protocol. Simulation results show
that the proposed practical cooperative protocol outperforms that the practical cooperative relaying protocol based on the

Authorized licensed use limited to: AMITY University. Downloaded on June 30,2020 at 17:14:11 UTC from IEEE Xplore. Restrictions apply.
MO et al.: COMMUNICATION PROTOCOL DESIGNS BASED ON POWER AND TIME ALLOCATION 4293

TABLE I
T IME AND P OWER PARAMETERS FOR D IFFERENT C HANNEL C ONDITIONS

optimum linear mapping outperforms the existing cooperative First, by taking derivative of the target function P̃out (P1 ) in
protocol with equal time allocation, and more interestingly, the terms of P1 , we have
performance of the practical linear-mapping based cooperative
relaying protocol is close to the performance benchmark of ∂ P̃out N 2 −2A(P − αP1 )2 − (1 − α)B(P − 2αP1 )P1
= 20 .
the ideal cooperative protocol. We observed that when the ∂P1 δs,d P13 (P − αP1 )2
ratio of the relay-destination link quality over the source-relay (48)
2 2
link quality (δr,d /δs,r ) becomes larger, the gap between the Let ∂ P̃out (P1 )/∂P1 = 0, we have
performance of the proposed linear-mapping based cooperative
protocol and the ideal benchmark becomes smaller. −2A(P − αP1 )2 − (1 − α)B(P − 2αP1 )P1 = 0. (49)

By solving the above equation, we have two possible solutions


A PPENDIX I as follows:
P ROOF OF T HEOREM 2 
∗ [4αA−(1−α)B]± 8α(1−α)AB +(1−α)2 B 2
For simplicity, in this proof we drop the parameter α in P1,± = P.
4α [αA−(1−α)B]
A(α) and B(α), and denote them as A and B, respectively. (50)
Based on the power constraint αP1 + (1 − α)P2 = P , the relay
transmission power P2 can be written as Second, for the two possible solutions, we would like to show

that only the solution P1,− can satisfy the constraint in (47). We
P − αP1 detail the discussion in two scenarios:
P2 = . (46)
1−α 1) When αA > (1 − α)B, in this case the denominators
∗ ∗
of P1,− and P1,+ are positive. We have the analysis in
Since P2 > 0, (46) implies that αP1 < P . Therefore, for any Scenario 1, shown at the bottom of the page. We can
given time allocation ratio α ∈ (0, 1), the problem (24) can be see that the solution P1,+ ∗
does not satisfy the power
reduced as ∗
constraint and only P1,− satisfies the power constraint in
N02 A N02 (1 − α)B this case. Moreover, the corresponding energy allocation
min P̃out (P1 ) = + ∗
2 P2 2 P (P − αP ) ratio β = αP1,− /P is within (1/2, 1).
P1 δs,d δs,d
1 1 1
2) When αA < (1 − α)B, in this case the denominators of
∗ ∗
s.t. 0 < αP1 < P. (47) P1,− and P1,+ in (50) are negative. For convenience,
we multiply both their denominators and numerators by
To find the optimal power P1 in the problem (47), we proceed −1, then we have the analysis in Scenario 2, shown
in two steps. at the bottom of the next page. We can see that the


∗ ∗ [4αA − (1 − α)B] − 8α(1 − α)AB + (1 − α)2 B 2
Scenario 1 : P1,− : αP1,− = P
4 [αA − (1 − α)B]

[4αA − (1 − α)B] − 4α2 A2 + 4α(1 − α)AB + (1 − α)2 B 2
> P
4 [αA − (1 − α)B]

[4αA − (1 − α)B] − [2αA + (1 − α)B]2 P
> P = ,
4 [αA − (1 − α)B] 2

∗ [4αA − (1 − α)B] − 9(1 − α)2 B 2
αP1,− < P = P;
4 [αA − (1 − α)B]

∗ ∗ [4αA − (1 − α)B] + 8α(1 − α)AB + (1 − α)2 B 2
P1,+ : αP1,+ = P
4 [αA − (1 − α)B]

[4αA − (1 − α)B] − 9(1 − α)2 B 2
> P >P
4 [αA − (1 − α)B]

Authorized licensed use limited to: AMITY University. Downloaded on June 30,2020 at 17:14:11 UTC from IEEE Xplore. Restrictions apply.
4294 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 8, AUGUST 2014


solution P1,− is the only feasible solution satisfying the can be expressed as
power constraint in (47), and the corresponding energy
∗ N02 A(α∗ ) N02 B(α∗ )
allocation ratio β is within the interval (1/2, 1). P̃out = P̃out (α∗ , P1∗ , P2∗ ) = 2 (P ∗ )2 + δ 2 P ∗ P ∗ . (54)

δs,d 1 s,d 1 2
The above discussion shows that P1,− is the only solution
that satisfies the power constraint and minimize the outage Let us consider a new family of resource allocation strat-
probability. The resulting energy allocation ratio β is always egy (α̂, Pˆ1 , Pˆ2 ) = (τ α∗ , (P1∗ /τ ), ((1 − α∗ )P2∗ /(1 − τ α∗ ))) for
strictly larger than 1/2. 0 < τ < 1/α∗ . We can check that the new resource allocation

We may rewrite the optimum power P1,− as strategy (α̂, Pˆ1 , Pˆ2 ) satisfies the power constraint in (24). Es-
 pecially when τ = 1, the new resource allocation solution is
∗ 1 + 1 + 8(αA)/ [(1 − α)B] P reduced to the optimum solution (α∗ , P1∗ , P2∗ ). With the new
P1,− =  . (51)
3 + 1 + 8(αA)/ [(1 − α)B] α resource allocation strategy, the resulting outage probability is
Δ
Note that A and B are shorthands of A(α) and B(α), respec- C(τ ) = P̃out (α̂, Pˆ1 , Pˆ2 )
tively. For completeness, for any given time allocation ratio N02 (τ α∗ )2 A(τ α∗ ) N02 τ α∗ (1 − τ α∗ )B(τ α∗ )
α ∈ (0, 1), the optimum source transmission power P1∗ (α) is = 2 (P ∗ α∗ )2 + 2 P ∗ P ∗ α∗ (1 − α∗ ) . (55)
δs,d 1 δs,d 1 2
given by
#R
 Since (ln 2/α) 0 T 2v/α dv = 2RT /α − 1, we can rewrite the
∗ 1 + 1 + 8 [αA(α)] / [(1 − α)B(α)] P
P1 (α) =  . (52) functions A(α) and B(α), defined in (15) and (19), respec-
3 + 1 + 8 [αA(α)] / [(1 − α)B(α)] α tively, as follows:

Based on (46), the corresponding optimum relay transmission RT RT


(ln 2)2
power P2∗ (α) is given by
v r
A(α) = 2 2 2 α 2 α dvdr, (56)
δs,r α
0 0
2 P
P2∗ (α) =  . (53) RT R T −r
3+ 1 + 8 [αA(α)] / [(1 − α)B(α)] 1 − α (ln 2)2 v r
B(α) = 2 2 α 2 1−α dvdr. (57)
δr,d α(1 − α)
Therefore, we prove Theorem 2 completely.  0 0

Thus, C(τ ) can be written as


A PPENDIX II RT RT
v r
P ROOF OF T HEOREM 3 C(τ ) = c1 2 τ α∗ 2 τ α∗ dvdr
We would like to prove the result by contradiction. If there 0 0
exists an optimum solution (α∗ , P1∗ , P2∗ ) with α∗ ≤ 1/2 that RT R T −r
v r

achieves the minimum outage probability P̃out in the problem +c2 2 τ α∗ 2 1−τ α∗ dvdr, (58)
(24), we will find another solution that results in smaller outage 0 0
probability to contradict the assumption.
With the assumption of the optimum solution (α∗ , P1∗ , P2∗ ) where c1 = N02 (ln 2)2 /δs,d 2 2
δs,r (P1∗ α∗ )2 and c2 = N02 (ln 2)2 /
with α∗ ≤ 1/2, the resulting minimum outage probability P̃out ∗ 2
δs,d 2
δr,d P1∗ P2∗ α∗ (1 − α∗ ) are positive constants.


∗ ∗ − [4αA − (1 − α)B] + 8α(1 − α)AB + (1 − α)2 B 2
Scenario 2 : P1,− : αP1,− = P
−4 [αA − (1 − α)B]

− [4αA − (1 − α)B] + 4α2 A2 + 4α(1 − α)AB + (1 − α)2 B 2
> P
−4 [αA − (1 − α)B]

− [4αA − (1 − α)B] + [2αA + (1 − α)B]2 P
> P = ,
−4 [αA − (1 − α)B] 2

∗ − [4αA − (1 − α)B] + 9(1 − α)2 B 2
αP1,− < P = P;
−4 [αA − (1 − α)B]

∗ ∗ − [4αA − (1 − α)B] − 8α(1 − α)AB + (1 − α)2 B 2
P1,+ : αP1,+ = P
−4 [αA − (1 − α)B]
− [4αA − (1 − α)B] − (1 − α)B
< P <0
−4 [αA − (1 − α)B]

Authorized licensed use limited to: AMITY University. Downloaded on June 30,2020 at 17:14:11 UTC from IEEE Xplore. Restrictions apply.
MO et al.: COMMUNICATION PROTOCOL DESIGNS BASED ON POWER AND TIME ALLOCATION 4295

In the following, we would like to show that the dif- (α∗ , P1∗ , P2∗ ) with α∗ ≤ 1/2. Therefore, we prove Theorem 3
ferential of the function C(τ ) at τ = 1 is negative, i.e., completely. 
∂C(τ )/∂τ |τ =1 < 0. By taking derivative over the function
C(τ ), we have
/ RT RT   ACKNOWLEDGMENT
∂C(τ ) // v + r v+r
= c1 ln 2 − ∗ 2 ∗
dvdr
∂τ /τ =1
α
The findings and conclusions expressed in this material are
α
0 0 those of the authors and do not necessarily reflect the views of
RT R T −r the U.S. Air Force Research Laboratory (AFRL).
r
∗ v
+ c2 α ln 2 2 α∗ 2 1−α∗
 0 0 
v r R EFERENCES
× − ∗ 2+ dvdr. (59)
(α ) (1 − α∗ )2 [1] K. J. R. Liu, A. Sadek, W. Su, and A. Kwasinski, Cooperative Commu-
nications and Networking, 1st ed. Cambridge, U.K.: Cambridge Univ.
We can see that in (59), the first term is strictly less than Press, 2009.
[2] E. Hossain, D. Kim, and V. K. Bhargava, Cooperative Cellular Wireless
0. Next, we would like to show that the second term in Networks, 1st ed. Camrbridge, U.K.: Cambridge Univ. Press, 2011.
(59) is non-positive. We denote the integrand as b(v, r; α∗ ) = [3] IEEE 802.16 Relay Task Group, The p802.16j Baseline Document for
∗ ∗
2v/α 2r/(1−α ) (−(v/(α∗ )2 ) + (r/(1 − α∗ )2 )) and the corre- Draft Standard for Local and Metropolitan Area Networks, 802.16j-
06/026r4, May 2007. [Online]. Available: http://grouper.ieee.org/groups/
sponding integration domain as Δ = {(v, r) ∈ R2+ : v + r < 802/16/relay/
RT }, then # # we can rewrite the second term of (59) as [4] “Further advancements for E-UTRA; Physical layer aspects,” Sophia-
c2 α∗ ln 2 Δ b(v, r; α∗ )dvdr. The symmetric property of the Antipolis, France, 3GPP TR 36.814 V9.0.0, Release 9, Mar. 2010.
[5] E. C. van der Meulen, “Three-terminal communication channels,” Adv.
integration domain Δ implies that if (v, r) ∈ Δ, then (r, v) ∈ Δ Appl. Probab., vol. 3, no. 1, pp. 120–154, 1971.
as well. Thus, the second term of (59) can be given by [6] T. M. Cover and A. A. El Gamal, “Capacity theorems for the relay chan-
nel,” IEEE Trans. Inf. Theory, vol. IT-25, no. 5, pp. 572–584, Sep. 1979.
[7] G. Kramer, M. Gastpar, and P. Gupta, “Cooperative strategies and capacity
c2 α∗ ln 2 b(v, r; α∗ )dvdr theorems for relay networks,” IEEE Trans. Inf. Theory, vol. 51, no. 9,
pp. 3037–3063, Sep. 2005.
Δ
c2 α∗ ln 2 [8] Y. Ding, J. K. Zhang, and K. M. Wong, “Ergodic channel capacities for
= [b(v, r; α∗ ) + b(r, v; α∗ )] dvdr. (60) the amplify-and-forward half-duplex cooperative systems,” IEEE Trans.
2 Inf. Theory, vol. 55, no. 2, pp. 713–730, Feb. 2009.
Δ [9] B. Sirkeci-Mergen and M. Gastpar, “On the broadcast capacity of wireless
networks with cooperative relays,” IEEE Trans. Inf. Theory, vol. 56, no. 8,
To prove the second term of (59) is non-positive, it is sufficient pp. 3847–3861, Aug. 2010.
to prove that the sum of b(v, r; α∗ ) and b(r, v; α∗ ) is non- [10] A. Zaidi, S. Shamai, P. Piantanida, and L. Vandendorpe, “Bounds on the
capacity of the relay channel with noncausal state at the source,” IEEE
positive for any (v, r) ∈ Δ. Since α∗ ≤ 1/2, we can see that Trans. Inf. Theory, vol. 59, no. 5, pp. 2639–2672, May 2013.
only if v < r, we may have b(v, r; α∗ ) > 0, which means that [11] J. N. Laneman and G. W. Wornell, “Distributed space-time-coded pro-
b(v, r; α∗ ) and b(r, v; α∗ ) cannot be positive simultaneously. tocols for exploiting cooperative diversity in wireless networks,” IEEE
Trans. Inf. Theory, vol. 49, no. 10, pp. 2415–2525, Oct. 2003.
So, there are only two possible cases to consider. When both [12] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in
b(v, r; α∗ ) and b(r, v; α∗ ) are non-positive, the proof is trivial. wireless networks: Efficient protocols and outage behavior,” IEEE Trans.
When either b(v, r; α∗ ) or b(r, v; α∗ ) is positive, without loss of Inf. Theory, vol. 50, no. 12, pp. 3062–3080, Dec. 2004.
[13] A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity-
generality, we assume that b(v, r; α∗ ) > 0 and b(r, v; α∗ ) ≤ 0, Part I: System description,” IEEE Trans. Commun., vol. 51, no. 11,
then we have pp. 1927–1938, Nov. 2003.
[14] A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity-
b(v, r; α∗ ) + b(r,v; α∗ ) 
Part II: Implementation aspects and performance analysis,” IEEE Trans.
Commun., vol. 51, no. 11, pp. 1939–1948, Nov. 2003.
v r v r
= 2 α 2 1−α − ∗ 2 +
∗ ∗ [15] A. K. Sadek, W. Su, and K. J. R. Liu, “Multi-node cooperative communi-
(α ) (1 − α∗ )2  cations in wireless networks,” IEEE Trans. Signal Process., vol. 55, no. 1,
r v r v pp. 341–355, Jan. 2007.
+ 2 α∗ 2 1−α∗ − ∗ 2 + [16] B. Zhao and M. C. Valenti, “Practical relay networks: A generalization
 (α ) (1 − α∗ )2 of hybrid-ARQ,” IEEE J. Sel. Areas Commun., vol. 23, no. 1, pp. 7–18,
r v r+v r+v Jan. 2005.
≤ 2 α∗ 2 1−α∗ − ∗ 2 + ≤ 0, (61) [17] S. Lee, W. Su, S. Batalama, and J. D. Matyjas, “Cooperative decode-
(α ) (1 − α∗ )2 and-forward ARQ relaying: Performance analysis and power optimiza-
tion,” IEEE Trans. Wireless Commun., vol. 9, no. 8, pp. 2632–2642,
where the first inequality is due to the fact that v < r. The Aug. 2010.
above result implies that the second term of (59) is non-positive. [18] O. Alay, T. Korakis, Y. Wang, E. Erkip, and S. Panwar, “Layered wireless
video multicast using omni-directional relays,” in Proc. IEEE ICASSP,
Therefore, we conclude that ∂C(τ )/∂τ |τ =1 < 0. Apr. 2008, pp. 2149–2152.
The result of ∂C(τ )/∂τ |τ =1 < 0 implies that we are able [19] H. V. Zhao and W. Su, “Cooperative wireless multicast: Performance anal-
to find a τ (τ > 1) such that C(τ ) < C(1). Since C(1) is ysis and power/location optimization,” IEEE Trans. Wireless Commun.,
vol. 9, no. 6, pp. 2088–2100, Jun. 2010.
the outage probability with the optimum allocation strategy [20] X. Deng and A. M. Haimovich, “Power allocation for cooperative relaying
(α∗ , P1∗ , P2∗ ) and C(τ ) is the outage probability with another in wireless networks,” IEEE Commun. Lett., vol. 9, no. 11, pp. 994–996,
feasible allocations strategy (τ α∗ , (P1∗ /τ ), ((1 − α∗ )P2∗ /1 − Nov. 2005.
[21] W. Su, A. Sadek, and K. J. R. Liu, “Cooperative communication protocols
τ α∗ )), the fact that C(τ ) < C(1) for some τ > 1 contra- in wireless networks: Performance analysis and optimum power alloca-
dicts the assumption that there exists an optimum solution tion,” Wireless Pers. Commun., vol. 44, no. 2, pp. 181–217, Jan. 2008.

Authorized licensed use limited to: AMITY University. Downloaded on June 30,2020 at 17:14:11 UTC from IEEE Xplore. Restrictions apply.
4296 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 8, AUGUST 2014

[22] K. G. Seddik, A. K. Sadek, W. Su, and K. J. R. Liu, “Outage analysis Stella Batalama (S’91–M’94–SM’13) received the
and optimal power allocation for multi-node relay networks,” IEEE Signal Diploma degree in computer engineering and sci-
Process. Lett., vol. 14, no. 6, pp. 337–380, Jun. 2007. ence (5-year program) from the University of Patras,
[23] D. Gunduz and E. Erkip, “Opportunistic cooperation by dynamic resource Patras, Greece, in 1989 and the Ph.D. degree in elec-
allocation,” IEEE Trans. Wireless Commun., vol. 6, no. 4, pp. 1446–1454, trical engineering from the University of Virginia,
Apr. 2007. Charlottesville, VA, USA, in 1994.
[24] W. Hachem, P. Bianchi, and P. Ciblat, “Outage probability-based power In 1995, she joined the Department of Electrical
and time optimization for relay networks,” IEEE Trans. Signal Process., Engineering, State University of New York, Buffalo,
vol. 57, no. 2, pp. 764–782, Feb. 2009. NY, USA, where she is presently a Professor. From
[25] R. A. Horn and C. R. Johnson, Matrix Analysis. Cambridge, U.K.: July 2009 to June 2011 she served as the Associate
Cambridge Univ. Press, 1985. Dean for Research of the School of Engineering and
[26] Z. Mo, W. Su, S. N. Batalama, and J. D. Matyjas, “Optimum power Applied Sciences and since 2010, she is Chair of the Electrical Engineering
and time allocation for cooperative relaying protocol,” in Proc. IEEE Int. Department. During the summers of 1997–2002 she was a visiting faculty
Conf. Commun., Sydney, N.S.W., Australia, Jun. 2014, pp. 1–7. member of the U.S. Air Force Research Laboratory (AFRL), Rome, NY, USA.
[27] Z. Mo, W. Su, S. N. Batalama, and J. D. Matyjas, “Linear-mapping From Aug. 2003 to July 2004 she served as the Acting Director of the AFRL
based cooperative relaying protocol design with optimum power and time Center for Integrated Transmission and Exploitation, Rome, NY, USA.
allocation,” in Proc. IEEE Int. Conf. Commun., Sydney, N.S.W., Australia, Her research interests include small-sample-support adaptive filtering and re-
Jun. 2014, pp. 1–6. ceiver design, cooperative and cognitive communications and networks, covert
communications and steganography, robust spread-spectrum communications
and adaptive multiuser detection, compressive sampling. Dr. Batalama was an
Zijian Mo (S’13) received the B.S. degree in au- Associate Editor for IEEE C OMMUNICATIONS L ETTERS (2000–2005) and
tomation engineering from South China University IEEE T RANSACTIONS ON C OMMUNICATIONS (2002–2008).
of Technology, Guangzhou, China, in 2009 and the
M.S. degree in electrical engineering from the State
University of New York, Buffalo, NY, USA, in 2011, John D. Matyjas (M’02–SM’13) received the Ph.D.
where he is currently working toward the Ph.D. degree in electrical engineering from the State Uni-
degree in electrical engineering. versity of New York, Buffalo, NY, USA in 2004.
His research interests include cooperative relaying He has since been employed by the Air Force Re-
protocol design and optimization, space-time coding search Laboratory in Rome, NY, USA, serving as the
for MIMO wireless communication, and airborne Connectivity Core Technical Competency Lead. His
MIMO communication systems. research interests are in the areas of wireless
multiple-access communications and networking,
cognitive radio, statistical signal processing and op-
Weifeng Su (M’03–SM’14) received the B.S. and timization, and neural networks. Additionally, he
Ph.D. degrees in mathematics from Nankai Univer- serves as an adjunct faculty member in the Depart-
sity, Tianjin, China, in 1994 and 1999, respectively, ment of Electrical Engineering, State University of New York Institute of
and the Ph.D. degree in electrical engineering from Technology at Utica/Rome. Dr. Matyjas is the recipient of the Mohawk Valley
the University of Delaware, Newark, DE, USA, in “Engineer of the Year” Award and, as a coauthor, of the 2010 IEEE International
2002. His research interests span a broad range Conference on Communications (ICC) “Best Paper Award.” He is a member of
of areas from signal processing to wireless com- the IEEE Communications, Information Theory, Computational Intelligence,
munications and networking, including space-time and Signal Processing Societies, chair of the IEEE Mohawk Valley Chapter
coding and modulation for MIMO wireless commu- Signal Processing Society, and a member of the Tau Beta Pi and Eta Kappa Nu
nications, MIMO-OFDM systems, and cooperative engineering honor societies.
communications for wireless networks.
He joined the Department of Electrical Engineering at the State University
of New York, Buffalo, NY, USA in 2005, where he is currently an Associate
Professor. From June 2002 to March 2005, he was a Postdoctoral Research
Associate with the Department of Electrical and Computer Engineering and
the Institute for Systems Research, University of Maryland, College Park,
MD, USA. Dr. Su is the recipient of the 2010 IEEE International Conference
on Communications (ICC) Best Paper Award. He received the Invention of
the Year Award from the University of Maryland in 2005. Dr. Su has been
serving as Editor for several IEEE Journals including IEEE T RANSACTIONS
ON W IRELESS C OMMUNICATIONS , IEEE T RANSACTIONS ON V EHICULAR
T ECHNOLOGY, and IEEE S IGNAL P ROCESSING L ETTERS. He also co-
organized two Special Issues for IEEE Journals in the field of cooperative
communications and networking. Dr. Su coauthored the book “Cooperative
Communications and Networking” (Cambridge Univ. Press, 2009).

Authorized licensed use limited to: AMITY University. Downloaded on June 30,2020 at 17:14:11 UTC from IEEE Xplore. Restrictions apply.

You might also like