 Research
 Open access
 Published:
Multipleaccess relaying with network coding: iterative network/channel decoding with imperfect CSI
EURASIP Journal on Advances in Signal Processing volume 2013, Article number: 170 (2013)
Abstract
In this paper, we study the performance of the fournode multipleaccess relay channel with binary Network Coding (NC) in various Rayleigh fading scenarios. In particular, two relay protocols, decodeandforward (DF) and demodulateandforward (DMF) are considered. In the first case, channel decoding is performed at the relay before NC and forwarding. In the second case, only demodulation is performed at the relay. The contributions of the paper are as follows: (1) two joint network/channel decoding (JNCD) algorithms, which take into account possible decoding error at the relay, are developed in both DF and DMF relay protocols; (2) both perfect channel state information (CSI) and imperfect CSI at receivers are studied. In addition, we propose a practical method to forward the relays error characterization to the destination (quantization of the BER). This results in a fully practical scheme. (3) We show by simulation that the number of pilot symbols only affects the coding gain but not the diversity order, and that quantization accuracy affects both coding gain and diversity order. Moreover, when compared with the recent results using DMF protocol, our proposed DF protocol algorithm shows an improvement of 4 dB in fully interleaved Rayleigh fading channels and 0.7 dB in block Rayleigh fading channels.
1 Introduction
In cooperative communications systems, idle nodes have the capability to relay information from other active nodes. Hence multiple copies of the same signal can reach a given destination through independent fading channels, which result in potential spatial diversity gains. However, diversity gains are usually achieved with some loss in system throughput[1, 2].
Network Coding (NC) has recently been introduced as a capacity–achieving routing scheme where intermediate network nodes are allowed to combine several input packets into one output packet[3]. Recent results have shown that NC can also provide improved performance and energy efficiency compared with conventional network routing techniques[4]. However, besides the many potential advantages and applications of NC over classical routing, the NC principle is not without limitations. A fundamental problem that NC needs to take into account over lossy (e.g., wireless) networks is the socalled error propagation problem: corrupted packets injected by some intermediate nodes may propagate through the network until the destination, and might render impossible to decode the original information[5, 6]. It is shown in[5, 6] that error propagation can dramatically degrade performance and reduce the diversity order of cooperative networks.
Among the solutions that are currently being investigated to counteract the error propagation problem[4], joint network channel decoding (JNCD) is gaining a growing interest[7]. The idea behind JNCD is the exploitation of the inherent redundancy of network and channel codes. In[7, 8], it has been shown that, compared to conventional distributed turbo coding and separate network and channel decoding, JNCD can improve the performance of canonical twoway and multipleaccess relay channels. However, these results assume that only correct packets are forwarded from the relay to the destination. Recently, various relaying protocols have addressed the error propagation problem in cooperative communications. In[9–11], the authors propose soft relaying protocols. In softrelaying, the relay does not take any hard decision of the input signals. Instead, the relay computes loglikelihood ratios (LLR) of networkcoded bits and reencodes them using a soft encoder. The relay then forwards encoded soft bits to the receiver. The disadvantage of this method is that it requires higher computational complexity at the relay, as well as larger bandwidth since soft values are transmitted to the destination instead of binary estimates. Another strategy is the socalled thresholdbased relaying[12, 13] where only decoded bits with reliability above a given threshold are forwarded to the destination. Opportunistic relaying is also useful to combat the error propagation[14]. Opportunistic relaying takes advantage of the many potential relay nodes in the network. The relay with the best endtoend link is chosen to forward the received data to the destination. It is wellknown that erroraware relaying provides better performance than errorunaware relaying protocols. Other solutions foresee that the destination takes care of error propagation. The idea is that, if the destination has access to the channel state information (CSI) of the sourcerelay links, it can exploit it to counteract the error propagation problem. In[15], the authors show that channelaware receivers can significantly improve the performance of NC. However, no channel coding is considered in[15]. In[16], a turbolike decoding is proposed. In[17], the authors propose a cooperative communication scheme for multipleinput multipleoutput (MIMO) systems. A similar approach is available in[18] without performing channel decoding at the relay.
All these papers assume that CSI and decoding error probability at the relay are available at the destination, which is not always true in practical wireless systems. It is shown in[19, 20] that imperfect CSI can significantly degrade the performance of cooperative systems. In this paper, we study the impact of both CSI and decoding error probability at the relay in the multiple access relay channel. It is assumed that CSI at the receivers is acquired via the transmission of pilot symbols. The decoding error probability at the relay is not assumed to be available for free at the destination but we propose a practical way of transmitting a quantized version of it. We study the performance of two notable relaying protocols: DecodeandForward (DF) relaying and DemodulateandForward (DMF) relaying. Behind, ComputeandForward has been recently introduced as a new relaying protocol which achieves a higher rate than existing relaying techniques and relies on lattice decoding structure[21]. However, this relaying technique is far different from our work in decoding aspects, hence is out of scope of this paper. In DF relaying, channel decoding is performed at the relay before NC and forwarding. On the other hand, in the DMF case, only demodulation is performed at the relay. As such, DMF has less computational complexity than DF but it is more prone to decoding errors at the relay. For each protocol, we develop two new channelaware JNCD algorithms. To summarize, the contributions of the paper are as follows: we show that JNCD provides better performance than separate network channel decoding only if the destination has enough knowledge of the decoding error probability at the relay; in addition, this gain will be larger as the number of fading blocks per codeword increases. Also, it is shown that the number of pilot symbols mostly affects the coding gain of the system with a negligible impact on the diversity order, at least for the signaltonoise ratio (SNR) range of interest. Finally, it is shown that CSI quantization errors affect both coding gain and diversity order. Additionally, it is shown that, in general, 3bit quantization is sufficient for DMF relaying and 6bit quantization is needed for DF relaying.
The remainder of this paper is organized as follows: section 2 describes system model and notation. Section 3 describes demodulation metrics and channel estimation for imperfect CSI. Section 4 describes the proposed JNCD algorithms. Section 5 describes how to compute the decoding error probability at the relay for various fading situations. Sections 6 and 7 show numerical examples with perfect and imperfect CSIs, respectively. Finally, section 8 concludes this paper.
2 System model
The system model under analysis is given by the canonical multipleaccess relay channel, where two sources, MS1 and MS2, communicate to a base station (BS) with the help of a relay R[7]. We study the realistic situation where all the channels are subject to Rayleigh fading and additive white Gaussian noise (AWGN). The relay is located between the sources and the base station. We note that in practice, when the relay is very close to the sources, sourcerelay channels might be subject to different fading models, e.g., rice fading. In this paper, we consider Rayleigh fading assumption for all links for convenience. In order to avoid mutual interference, we consider that transmissions are scheduled in timeorthogonal timeslots[4]. We study both perfect CSI and imperfect CSI at the receiver. Three fading scenarios are investigated: fully interleaved, block fading with F blocks per codeword, and quasistatic fading, i.e., F = 1.
The source node MSj, j ∈ {1,2}, emits a Klength information message u _{ j }, where K is the number of information bits in u _{ j }. At each source, the information message u _{ j } is processed as follows: (1) first, it is encoded using a recursive convolutional code, which produces a length N codeword c _{ j }, with N = K/R being the length of the codeword and R being the code rate; (2) then, c _{ j } is interleaved and mapped into a 2^{M} constellation point using Gray mapping. This operation provides the modulated signal x _{ j }. The modulated signal x _{ j }, of length N/M is transmitted to the relay and destination over a Rayleigh fading channel[22] with AWGN. Note that this description involves only the data part. In the imperfect CSI case, we consider that channel estimates are obtained via the use of pilot symbols, and the description will be refined accordingly. These details are provided in the next sections.
We study two relaying protocols: DMF relaying and DF relaying as shown in Figure1. In DMF relaying, two receivers first demodulate the corresponding signals y _{1r },y _{2r } to get the estimated codewords{\mathbf{\text{c}}}_{1}^{r},{\mathbf{\text{c}}}_{2}^{r}. Then the estimated codewords are interleaved before being networkencoded to get{\mathbf{\text{c}}}_{r}=\pi ({\mathbf{\text{c}}}_{1}^{r})\oplus \pi ({\mathbf{\text{c}}}_{2}^{r}), where π(.) denotes interleaving operations and ⊕ denotes bitwise XOR operations. In DF relaying, two softinput hardoutput (SIHO) decoders decode y _{1r },y _{2r } to get the estimated information messages{\mathbf{u}}_{1}^{r},{\mathbf{u}}_{2}^{r}. Note that errors may occur during the decoding process at the relay, i.e., the estimated messages are different from the messages transmitted from the sources. Unlike[12], which only forwards estimated bits with reliability above a certain threshold, we always forward the estimated bits with or without decoding errors (error channel model). However, the receiver will make use of the knowledge of the error probability at the relay. A network encoder encodes the interleaved estimated bits\pi ({\mathbf{u}}_{1}^{r}),\pi ({\mathbf{u}}_{2}^{r}) to get the networkcoded information messages{\mathbf{w}}^{r}=\pi ({\mathbf{u}}_{1}^{r})\oplus \pi ({\mathbf{u}}_{2}^{r}). Then, a channel encoder encodes w ^{r} to get the codeword c _{ r }, which is then mapped into the modulated signal x _{ r }. The signal received at BS from the sources, at R from the sources, and at BS from R are given, respectively, as follows:
where Es _{jd} is the energy of the signal received at the destination from MSj, Es _{jr} is the energy of the signal received at the relay from the MSj, Es _{ r } is the energy of the signal received at the destination from the relay. These quantities include the path loss effect; H _{jd}, H _{jr}, and H _{rd} are Rayleigh fading coefficient matrices of sourcetorelay channels and relaytodestination channels, respectively, with E[H _{(.)}^{2}] = 1. For the sake of simplicity, we use matrix notation H _{(.)} for all fading scenarios considered in this paper. Therefore, the structure of the matrix H _{(.)} depends on the fading scenario. Three fading channel scenarios are investigated: (1) fully interleaved fading, where{\mathbf{H}}_{(.)}=\text{diag}({h}_{0},\dots ,{h}_{{N}^{\prime}}), with N ^{′} = N/M, is the length of x _{(.)}; (2) Fblock fading, where the number of channel gains in one codeword is equal to F, the channel coefficient matrix is of the form H _{(.)} = diag(h _{1},h _{2},…,h _{ F }) ⊗ I(N ^{′}/F), with ⊗ denoting the Kronecker product, I(n) being an identity matrix; and (3) quasistatic fading, where we have H _{(.)} = h _{0} × I(N ^{′}). Furthermore, n (index is ignored for simplicity) is the noise vector whose components are circularly symmetric zeromean complex Gaussian random variables with power spectrum density equal to{\sigma}_{n}^{2},{n}_{k}\sim \mathit{\text{CN}}(0,{\sigma}_{n}^{2}).
3 Channel estimation and modulation metric computation
This section describes the computation of modulation metrics for both perfect and imperfect CSI as well as how channel estimation for imperfect CSI is performed. These metrics will be used in the next subsections to implement the proposed decoders.
3.1 Perfect CSI
For simplicity, we drop the channel indexes in our notation. Let x and y = H x + n be transmitted and received signals of a generic channel link. The demodulation metric of the k th symbol is computed, given the channel gain h _{ k } (corresponding to the k th symbol), as follows:
where Es_{(.)} is the energy at the destination of the signal received from the sources or from the relay.
Let C _{ k } = {c _{ k 1},c _{ k 2},…,c _{ kM }} be the k th data symbol, which contains M coded bits, associated to symbol x _{ k }, belonging to the constellation set Θ. The cardinality of Θ is equal to 2^{M}. The a posteriori probability (APP) of the l th bit, l = 1,…,M in the k th symbol after demodulating is as follows:
where λ is a normalization factor that satisfies the condition P _{FCSI}(c _{ kl } = 1) + P _{FCSI}(c _{kl} = 0) = 1. Then, the LLR of the coded bit c _{kl}, Lc _{kl}, is:
Lc _{kl} is sent to the JNCD decoder and is processed as described in the next sections.
3.2 Imperfect CSI
As far as the imperfect CSI case is concerned, we restrict our attention to only block fading channels with F blocks and quasistatic fading with F = 1. The reason is that channel estimation is assumed to be obtained via a pilotbased approach for[23], which is clearly not compatible with fully interleaved Rayleigh fading. The channel gain is assumed to be constant over one block and is assumed to change independently from block to block. In our setting, a codeword covers F blocks, and the relay estimates the error probability of the whole codeword based on the knowledge of the channel gains of all blocks (see section 5 below). These channel gains are estimated via a pilot message, which is inserted at the beginning of each block, and transmitted via BPSK modulation.
Let L _{ d } be the length in bits of the coded data part and L _{ p } the length of the overhead. As far as the sourcerelay links and the sourcedestination links are concerned, each block consists of L _{ d }/M data symbols and L _{ p } pilot symbols. As far as the relaydestination link is concerned, the relay also transmits to the destination a quantized version of its decoding error probability which is transmitted in the same way as the pilot bits. In this case, the overhead of length L _{ p } consists in the number of symbols L _{ q } used for transmitting this error probability (quantization precision), plus the pilot sequence which is thus reduced to Lr _{ p } = L _{ p }L _{ q }. In block fading environment with F > 1, the error probability is concerned with the whole codeword, thus only one block of the RBS channel is used to transmit this quantized error probability. The packet structure is sketched in Figure2. Note that pilot and quantization bits are assumed to be binary modulated in order to make the decoding process more robust.
We define a channel rate R _{ c } as the ratio of the information bits over the packet length in one channel use (in contrast with standard definition, we include the overhead bits). If F = 1 and L _{ d } = N, we have
If F > 1 and L _{ d } = N/F, we have
where R is the rate of the channel code and N is the codeword’s length.
The difference of the channel rates for F = 1 and F > 1 is negligible and can be ignored in practice. For example, for the parameters used in the simulation section, the actual rates for F = 1 and F = 4 are respectively 0.476 and 0.417. In this paper, block fading channels with F > 4 are not considered.
For simplicity, we drop MS and R indexes in our notation. The channel estimation of the generic link works as follows. Each transmission block first consists in the pilot message x _{ p } followed by the data message x _{ d }. The power of pilot symbols and data symbols are equal. The corresponding received signals y _{ p } and y _{ d } are of a form as in (1) with only one difference that the channel coefficient h in this case is a scale instead of a vector as in (1).
Note that the use of pilot message and its placement can be optimized via a crosslayer pilot design[24]. In this paper, since we just focus on the impact of imperfect CSI on performance of iterative decoding algorithms, a random sequence is used for pilot message, which obviously is a suboptimal solution.
A maximum likelihood (ML) estimator is employed. The estimated channel gain is given as[23]\widehat{h}={\mathbf{\text{x}}}_{p}^{\ast}{\mathbf{\text{y}}}_{p}{({\mathbf{\text{x}}}_{p}^{\ast}{\mathbf{\text{x}}}_{p})}^{1}, where (.)^{∗} denotes the transpose conjugate operator, (.)^{1}, denotes the matrix inverse operator. The channel estimation error is\stackrel{~}{h}=h\widehat{h}. Employing the mismatch demodulator, the estimated channel coefficient\widehat{h} is used as the correct one h. The modulation metric is then computed as follows:
Let C _{ k } = {c _{ k 1},c _{ k 2},…,c _{ kM }} be the k th data symbol associated to symbol x _{ k }. The a posteriori probability of the l th bit, l = 1,…,M in the k th symbol, c _{kl}, after demodulation can be computed as follows:
where λ is a normalization factor such that P _{PCSI}(c _{kl} = 1) + P _{PCSI}(c _{kl} = 0) = 1. The LLR demodulation output of the coded bit c _{kl}, Lc _{kl} is computed as in (2) with{D}_{\text{PCSI}}({x}_{k},{y}_{k}\widehat{h}) is used instead of D _{FCSI}(x _{ k },y _{ k }h).
These LLR are then used by the JNCD decoder for further processing as described in the next sections.
4 Proposed joint network/channel decoding
We propose two JNCD algorithms for the noisy MARC channel. The first algorithm works on possible decoding error of the information bits, while the second algorithm works on possible decoding error of coded bits. The error probability of information and coded bits are denoted by Pe_{bit} and Pe_{code}, respectively.
4.1 Proposed JNCD: Algorithm 1
The first algorithm is developed based on turbolike decoding methods. To fully exploit the potential distributed diversity provided by the relay, the destination needs to know the decoding error probability at the relay, which is estimated and transmitted by the relay as described in the previous section. After receiving three channel observations from the two sources and from the relay, along with the decoding error probability at the relay, the destination runs the algorithm as follows:
First, maximum a posteriori probability (MAP) decoding is applied. Let{\widehat{\mathbf{\text{c}}}}_{1},{\widehat{\mathbf{\text{c}}}}_{2}, and{\widehat{\mathbf{\text{c}}}}_{r} be the soft outputs of the demodulators associated to MS1, MS2, and R, respectively. At the destination, the maximum a posteriori probability decision rule is
where P[.] denotes probability and P[ab] denotes probability of a conditioned on b.
The probability in (3) is the marginal probability of the whole codeword. With some algebra, (3) can be rewritten as follows:
where{\sum}_{{\mathbf{\text{u}}}_{1}\sim \left\{{u}_{1k}\right\},{\mathbf{\text{u}}}_{2}\sim \left\{{u}_{2k}\right\},{\mathbf{\text{w}}}^{r}}(.) denotes the sum over all bits of u _{1},u _{2},w ^{r} except bits {u _{1k },u _{2k }}. From (4), we note that, given the information messages, the received signals are independent. Thus, the righthand side of (4) simplifies to:
The last term in (5) accounts for possible decoding errors at the relay. We note that this decoding error is on the information bits. The related error probability is denoted by Pe _{bit} and it is computed in the next section. We assume, for tractability, that the networkcoded information bits are independent (a reasonable assumptions when interleavers at the relay are used). Thus, we haveP[{\mathbf{\text{w}}}^{r}]={\prod}_{k=1}^{K}P[{w}_{k}^{r}]. This assumption leads to a suboptimal JNCD algorithm. In addition, since the transmitted information bits are independent, we haveP[{\mathbf{\text{w}}}^{r}{\mathbf{\text{u}}}_{1},{\mathbf{\text{u}}}_{2}]={\prod}_{k=1}^{K}P[{w}_{k}^{r}{u}_{1k},{u}_{2k}]. Let w _{ k } = u _{1k } ⊕ u _{2k } be the correct networkcoded bit. We note that w is based on the codebook while w ^{r} is based on the actual estimate at the relay. As a result, the decoding error at the relay is determined by\mathit{\text{Pr}}[{w}_{k}^{r}{w}_{k}]. The decision rule in (5) becomes
The block diagram of the proposed JNCD algorithm is illustrated in Figure3. The algorithm consists of three SISO decoders for the two sources and the single relay, as well as one network decoder. There is also a decoding check node between the SISO decoder for the relay and the network decoder, which controls the uncertainty of the decoding process at the relay. Let{\mathbf{Lu}}_{1}^{\text{Net}}(.),{\mathbf{Lu}}_{2}^{\text{Net}}(.), and L u ^{Net}(.) be the extrinsic LLRs of the information bits sent by the network decoder to SISO decoder 1, SISO decoder 2, and SISO decoder R, respectively. Also, let{\mathbf{Lu}}_{1}^{\text{Dec}}(.),{\mathbf{Lu}}_{2}^{\text{Dec}}(.), and L u ^{Dec}(.) be the extrinsic LLRs of the information bits that reach the network decoder from SISO decoder 1, SISO decoder 2, and SISO decoder R, respectively. Furthermore, let{\mathbf{Lu}}_{r}^{\text{Dec}}(.) be the extrinsic LLRs of the information bits sent from SISO decoder R to the decoding check node, and{\mathbf{Lu}}_{r}^{\text{Net}}(.) be the extrinsic LLRs of the information bits that reach the SISO decoder R from the decoding check node.
The proposed iterative decoding algorithm works by exchanging extrinsic information between the SISO decoders and the network decoder. It consists in the following steps:

Step 0. (Setup) Let Lc _{1},Lc _{2}, and Lc _{ r } be the LLRs of codewords{\widehat{\mathbf{c}}}_{1},{\widehat{\mathbf{c}}}_{2}, and{\widehat{\mathbf{c}}}_{r}, respectively, which are the outputs of the demodulators described in section 2. The k th element of Lc _{ j }, j = 1,2,r is computed as in section 3.

Step 1. (Channel decoding) At the n th iteration, the SISO decoder j, j = 1,2, and SISO decoder R run the BCJR algorithm[25], as follows: Input: extrinsic information of coded bits Lc _{ j }, j = 1,2,r and a priori information{\mathbf{IA}}_{j}^{n}, Output: extrinsic of information bits{\mathbf{Lu}}_{j}^{\text{Dec}(n)}({u}_{j}),\phantom{\rule{1em}{0ex}}j=1,2, and{\mathbf{Lu}}_{r}^{\text{Dec}(n)}({w}^{r}). The upper index (n) indicates the index iteration. In the first iteration, there is no a priori information for SISO decoders 1,2, and R.

Step 2. (Decoding errors are taken into account). The decoding check node updates the extrinsic of the estimated networkcoded information bits{\mathbf{Lu}}_{r}^{\text{Dec}(n)}({w}^{r}) to get the extrinsic of correct networkcoded information bits L u ^{Dec(n)}(w) by taking into account the decoding error probability Pe _{bit}. Let{\text{Lu}}_{r}^{\text{Dec}(\mathrm{n})}({w}_{k}^{r})\phantom{\rule{0.3em}{0ex}} and Lu^{Dec(n)}(w _{ k }) be the k th elements of{\mathbf{Lu}}_{r}^{\text{Dec}(n)}({w}^{r}) and L u ^{Dec(n)}(w), respectively, then
\begin{array}{l}{\text{Lu}}^{\text{Dec}(n)}\left({w}_{k}\right)=log\frac{\left(1{\mathit{\text{Pe}}}_{\text{bit}}\right)exp\left({\text{Lu}}_{r}^{\text{Dec}(n)}({w}_{k}^{r})\right)+{\text{Pe}}_{\text{bit}}}{{\text{Pe}}_{\text{bit}}exp\left({\text{Lu}}_{r}^{\text{Dec}(n)}({w}_{k}^{r})\right)+1{\text{Pe}}_{\text{bit}}}.\end{array}(7) 
Step 3. (Network decoding) The extrinsic of information bits{\mathbf{Lu}}_{1}^{\text{Dec}(n)}({u}_{1}),{\mathbf{Lu}}_{2}^{\text{Dec}(n)}({u}_{2}), L u ^{Dec(n)}(w) are input to the network decoder to output{\mathbf{Lu}}_{1}^{\text{Net}(n)}({u}_{1}),{\mathbf{Lu}}_{2}^{\text{Dec}(n)}({u}_{2}), L u ^{Net(n)}(w). Let{\text{Lu}}_{1}^{\text{Net}(n)}({u}_{1k}),{\text{Lu}}_{2}^{\text{Net}(n)}({u}_{2k}), Lu^{Net(n)}(w _{ k }) be the k th element of{\mathbf{Lu}}_{1}^{\text{Net}(n)}({u}_{1}),{\mathbf{Lu}}_{2}^{\text{Dec}(n)}({u}_{2}), L u ^{Net(n)}(w), respectively. The outputs of the network decoder are computed as follows:
\begin{array}{l}{\text{Lu}}_{1}^{\text{Net}(n)}({u}_{1k})=log\frac{1+exp\left({\text{Lu}}_{2}^{\text{Dec}(n)}({u}_{2k})+{\text{Lu}}^{\text{Dec}(n)}({w}_{k})\right)}{exp\left({\text{Lu}}_{2}^{\text{Dec}(n)}({u}_{2k})\right)+exp\left({\text{Lu}}^{\text{Dec}(n)}({w}_{k})\right)},\\ {\text{Lu}}_{2}^{\text{Net}(n)}({u}_{2k})=log\frac{1\phantom{\rule{0.3em}{0ex}}+exp\left({\text{Lu}}_{1}^{\text{Dec}(n)}({u}_{1k})+{\text{Lu}}^{\text{Dec}(n)}({w}_{k})\right)}{exp\left({\text{Lu}}_{1}^{\text{Dec}(n)}({u}_{1k})\right)\phantom{\rule{0.3em}{0ex}}+\phantom{\rule{0.3em}{0ex}}exp\left({\text{Lu}}^{\text{Dec}(n)}({w}_{k})\right)},\\ {\text{Lu}}^{\text{Net}(n)}({w}_{k})=log\frac{1+exp\left({\text{Lu}}_{1}^{\text{Dec}(n)}({u}_{1k})\phantom{\rule{0.3em}{0ex}}+\phantom{\rule{0.3em}{0ex}}{\text{Lu}}_{2}^{\text{Dec}(n)}({u}_{2k})\right)}{exp\left({\text{Lu}}_{1}^{\text{Dec}(n)}({u}_{1k})\right)\phantom{\rule{0.3em}{0ex}}+\phantom{\rule{0.3em}{0ex}}exp\left({\text{Lu}}_{2}^{\text{Dec}(n)}({u}_{2k})\right)}.\end{array}(8) 
Step 4. (Decoding errors are taken into account) The decoding check node update L u ^{Net(n)}(w) to get{\mathbf{Lu}}_{r}^{\text{Net}(n)}({w}^{r}) by taking into account the decoding error probability:
{\text{Lu}}_{r}^{\text{Net}(n)}({w}_{k}^{r})=log\frac{(1{\text{Pe}}_{\text{bit}})exp\left({\text{Lu}}^{\text{Net}(n)}({w}_{k})\right)+{\text{Pe}}_{\text{bit}}}{{\text{Pe}}_{\text{bit}}exp\left({\text{Lu}}^{\text{Net}(n)}({w}_{k})\right)+1{\text{Pe}}_{\text{bit}}}.(9) 
Step 5. (Feedback) The extrinsic of information bits{\mathbf{Lu}}_{1}^{\text{Net}(n)}({u}_{1}),{\mathbf{Lu}}_{2}^{\text{Net}(n)}({u}_{2}), and L u ^{Net(n)}(w) are feedback to SISO decoders 1,2, and R as a priori information for the next iteration, as follows:{\mathbf{IA}}_{1}^{n+1}({u}_{1})={\mathbf{Lu}}_{1}^{\text{Net}(n)}({u}_{1});{\mathbf{IA}}_{2}^{n+1}({u}_{2})={\mathbf{Lu}}_{2}^{\text{Net}(n)}({u}_{2});{\mathbf{IA}}_{r}^{n+1}({w}^{r})={\mathbf{Lu}}_{r}^{\text{Net}(n)}({w}^{r}).

Step 6. Repeat from Step 1.
4.2 Proposed JNCD: Algorithm 2
Algorithm 1 performs channel decoding first and utilizes the decoding error probability of the information bits Pe_{bit}. On the other hand, the second proposed JNCD algorithm exploits the decoding error probability of the coded bits Pe_{code} and performs network decoding first. After receiving three channel observations from the two sources and the single relay, along with the decoding error probability Pe_{code}, the destination applies the MAP decoding rule as follows[26]:
where c _{ j }, j = 1,2 is the codeword generated from the information message u _{ j }; c ^{r} is the networkcoded codeword;{\mathbf{\text{c}}}_{r}\triangleq {\mathbf{\text{c}}}_{1}\oplus {\mathbf{\text{c}}}_{2} is the correct networkcoded codeword;{\widehat{\mathbf{\text{c}}}}_{1,2,r} is the soft output of the demodulator related to sources 1, 2, and relay R. We note that the correct networkcoded codeword c _{ r } is computed from the codebook, while the networkcoded codeword{\mathbf{\text{c}}}^{r}=\pi ({\mathbf{\text{c}}}_{1}^{r})\oplus \pi ({\mathbf{\text{c}}}_{2}^{r}) is computed from the estimated codeword{\mathbf{\text{c}}}_{1}^{r},{\mathbf{\text{c}}}_{2}^{r} at the relay. The two first factors in (10) account for two channel decoders, and the other terms account for the network decoder. The last factor in (10) shows how error decoding on the coded bits at the relay, whose probability is Pe_{code}, is taken into account by the decoder. The block diagram of this algorithm is sketched in Figure4. The main difference between algorithm 1 and algorithm 2 is that in the latter case, network decoding is performed first. As a result, one channel decoder can be avoided in algorithm 2, which makes the receiver simpler to implement.
Let Lc _{1},Lc _{2}, and Lc _{ r } be LLR inputs for sources 1, 2, and relay R, respectively. Let{\mathbf{Lc}}_{1}^{\text{Net}} and{\mathbf{Lc}}_{2}^{\text{Net}} be the extrinsic information outputs of the network decoder, and{\mathbf{Lc}}_{1}^{\text{Dec}} and{\mathbf{Lc}}_{2}^{\text{Dec}} be extrinsic information outputs of the coded bits of SISO decoder 1 and SISO decoder 2. Finally, let IA _{1} and IA _{2} be the a priori information (on coded bits) of the network decoder.
Algorithm 2 consists of following steps:

Step 0. (Setup) The three demodulators process the received signal to output Lc _{1},Lc _{2},Lc _{ r }. The kth element of Lc _{ j }, j = 1,2,r is computed as in Section 3.
A decoding check node updates Lc _{ r } by taking into account the decoding error probability at the relay, Pe_{code}, to get{\stackrel{~}{\mathbf{Lc}}}_{r}:
{\stackrel{~}{\mathit{\text{Lc}}}}_{\mathit{\text{rk}}}=log\frac{(1{\text{Pe}}_{\text{code}})exp\left({\mathit{\text{Lc}}}_{\mathit{\text{rk}}}\right)+{\text{Pe}}_{\text{code}}}{{\text{Pe}}_{\text{code}}\phantom{\rule{1em}{0ex}}exp\left({\mathit{\text{Lc}}}_{\mathit{\text{rk}}}\right)+1{\text{Pe}}_{\text{code}}},(11)where Lc _{ rk } and{\stackrel{~}{\mathit{\text{Lc}}}}_{\mathit{\text{rk}}} are the k th elements of Lc _{ r } and{\stackrel{~}{\mathbf{Lc}}}_{r}, respectively.
Step 1. (Network decoding) At the n th iteration, the network decoder decodes Lc _{1}, Lc _{2},{\stackrel{~}{\mathbf{Lc}}}_{r}, with a priori information{\mathbf{IA}}_{1}^{n} and{\mathbf{IA}}_{2}^{n} to output the extrinsic information of coded bits{\mathbf{Lc}}_{1}^{\text{Net}(n)} and{\mathbf{Lc}}_{2}^{\text{Net}(n)}. Let Lc _{1k }, Lc _{2k }, and Lc _{ rk } be the k th elements of Lc _{1}, Lc _{2}, and{\stackrel{~}{\mathbf{Lc}}}_{r}, respectively;L{c}_{1k}^{\text{Net}(n)} andL{c}_{2k}^{\text{Net}(n)} be the k th element of{\mathbf{Lc}}_{1}^{\text{Net}(n)} and{\mathbf{Lc}}_{2}^{\text{Net}(n)}, respectively; and{\text{IA}}_{1k}^{n} and{\text{IA}}_{2k}^{n} be the k th elements of{\mathbf{IA}}_{1}^{n} and{\mathbf{IA}}_{2}^{n}, respectively. Then
\begin{array}{l}L{c}_{1k}^{\text{Net}(n)})={\mathit{\text{Lc}}}_{1k}+log\frac{exp\left({\stackrel{~}{\mathit{\text{Lc}}}}_{\mathit{\text{rk}}}\right)+exp\left({\mathit{\text{Lc}}}_{2k}+{\text{IA}}_{2k}^{n}\right)}{1+exp\left({\stackrel{~}{\mathit{\text{Lc}}}}_{\mathit{\text{rk}}}+{\mathit{\text{Lc}}}_{2k}+{\text{IA}}_{2k}^{n}\right)},\\ L{c}_{2k}^{\text{Net}(n)})={\mathit{\text{Lc}}}_{2k}+log\frac{exp\left({\stackrel{~}{\mathit{\text{Lc}}}}_{\mathit{\text{rk}}}\right)+exp\left({\mathit{\text{Lc}}}_{1k}+{\text{IA}}_{1k}^{n}\right)}{1+exp\left({\stackrel{~}{\mathit{\text{Lc}}}}_{\mathit{\text{rk}}}+{\mathit{\text{Lc}}}_{1k}+{\text{IA}}_{1k}^{n}\right)}.\end{array}At the first iteration,{\mathbf{IA}}_{1}^{1}={\mathbf{IA}}_{2}^{1}=0.

Step 2. (Channel decoding) The SISO decoder j, j = 1,2, run the BCJR algorithm[25] as follows: Input: extrinsic information of coded bits{\mathbf{Lc}}_{j}^{\text{Net}(n)}; the a priori extrinsic of information bits is equal to 0. Output: extrinsic information of coded bits{\mathbf{Lc}}_{j}^{\text{Dec}(n)}.

Step 3. (Feedback) The extrinsic information of coded bits{\mathbf{Lc}}_{1}^{\text{Dec}},\phantom{\rule{1em}{0ex}}{\mathbf{Lc}}_{2}^{\text{Dec}} is feedback to the network decoder as a priori (of coded bits) information for the next iteration:{\mathbf{IA}}_{j}^{n+1}={\mathbf{Lc}}_{j}^{\text{Dec}(n)},j=1,2.

Step 4. Repeat from Step 1.
5 Error probability estimation and quantization
In order to apply the algorithms described in the previous section, the destination must estimate Pe_{bit} = P[w ^{r} ≠ u _{1} ⊕ u _{2}] and Pe_{code} = P[c ^{r} ≠ c _{1} ⊕ c _{2}]. In this section, we compute these probabilities. Let{\text{Pe}}_{\text{bit}}(j)=P[{u}_{j}^{r}\ne {u}_{j}] and{\text{Pe}}_{\text{code}}(j)=P[{c}_{j}^{r}\ne {c}_{j}],j=1,2 be the decoding error probability of information bits and coded bits, respectively, of the link from source MSj to the relay. We assume, for simplicity, that the networkencoded information bits and networkencoded coded bits are independent (a reasonable assumption if interleavers are used at the relay).
The decoding error probability at the relay, Pe_{bit}, can be computed as follows:
The first factor can be computed as follows:
where the expression in (13) is given by the definition of XOR network coding.
Likewise, we have:
From (12) to (14) we have:
The decoding error probability at the relay, Pe_{code}, can be computed using similar steps as follows:
The first factor in (16) can be computed in the same manner as in (13) as follows:
Likewise, we have:
From (16) to (18) we have:
In the next subsections,{\text{Pe}}_{\text{bit}}(j)=P[{u}_{j}^{r}\ne {u}_{j}] and{\text{Pe}}_{\text{code}}(j)=P[{c}_{j}^{r}\ne {c}_{j}],j=1,2 are computed for different fading scenarios. In our analysis, we assume Gray mapping. Also, the nearest neighbor approximation is used. This corresponds to the assumptions that if an error occurs, then the transmitted symbol can only be one of the symbols closest to the estimated one. Therefore, due to Gray mapping, one symbol error causes a single coded bit error. As illustrative examples, three cases are considered: F = 1, F = 4, and fully interleaved fading.{\text{Pe}}_{\text{bit}}^{F1,F4,\text{Full}} ({\text{Pe}}_{\text{code}}^{F1,F4,\text{Full}}) denote the decoding error probability of information bits (coded bits) for each case study, respectively. For simplicity, we focus our attention on 16QAM modulation, as used in our numerical examples.
5.1 Error estimation with perfect CSI: computation of{\text{Pe}}_{\text{code}}^{F1,F4,\text{Full}}
5.1.1 Block Rayleigh fading F = 1
In this case, the channels MSjR j = 1,2 are Gaussiandistributed conditioned on h _{ j }. The symbol error probability of the MS _{ j }R link for MQAM modulation is ([27], Equation 5.2.79):
with
where Q(.) denotes the Qfunction, h _{ j } is the channel gain, and Es is the symbol energy. Because each symbol error causes one coded bit error (Gray mapping and nearest neighbor approximation), then the error probability of coded bits of, for example, 16QAM modulation can be estimated as follows:
where erfc(·) is related to the Qfunction.
5.1.2 Block Rayleigh fading F = 4
Let h _{ j } = [h _{ h 1}, h _{ j 2}, h _{ j 3}, h _{ j 4}] be the channel gain vector of link MSjR j = 1,2. Because the components of h _{ j } are independent, the error probability{\text{Pe}}_{\text{code}}^{F4}(j) of 16QAM modulation is estimated as the average over the vector h _{ j }:
5.1.3 Fullyinterleaved Rayleigh fading
The error probability of coded bits of link MSjR over fully interleaved Rayleigh fading channel is computed by integrating over the distribution of the channel gains. Let h _{ j } be channel gain, then γ = h _{ j }^{2} is exponentially distributed with mean equal to E[ h _{ j }^{2}] = 1. Therefore, the symbol error rate of link MSjR with MQAM modulation is:
The coded bit error probability of 16QAM modulation is thus equal to:
5.2 Error estimation with perfect CSI: computation of{\text{Pe}}_{\text{bit}}^{F1,F4,\text{Full}}
The information bit error probability of convolutional codes conditioned on the channel vector can be computed as follows ([28], Equation 3.175):
where d _{ f } is the minimum distance, β(d) is the distance spectrum of the convolutional code, and P _{ c }(d) is the probability of choosing a wrong path in the trellis with distance d from the correct path (usually the allzero path). P _{ c }(d) depends on the channel gains and is computed as follows.
5.2.1 Block Rayleigh fading channel with F = 1
Let{P}_{c}^{j}(d) be the conditional pairwise error probability related to the MSjR channel. Since Gray mapping is used and the nearest neighbor approximation is assumed, each symbol error only causes one error on the coded bits. In addition, the coded bits are interleaved before being mapped into the constellation. Thus, the conditional pairwise error probability of the MSjR link is
By substituting (25) in (24), the bit error probability of the MSjR link is estimated as follows:
In our simulation results, d _{ f } = 6 for the RSC code [1 15/13] and only two values of d are used.
5.2.2 Block Rayleigh fading channel with F = 4
The conditional pairwise error probability{P}_{c}^{j}(d) on the MSjR link depends on the channel vector{\mathbf{h}}_{j}={\left\{{h}_{\mathit{\text{jf}}}\right\}}_{f=1}^{4} and the distribution of the weight d over the F blocks. Denote by d _{ f } the number of weights in block f, f = 1,2,…F subject to 0 ≤ d _{ f } ≤ d and{\sum}_{f=1}^{F}{d}_{f}=d. Then the distribution of the weight d over the F blocks is given by the weight pattern\mathbf{D}={\left\{{d}_{f}\right\}}_{f=1}^{F}. The conditional pairwise error probability is estimated by averaging over all the weight patterns D:
where the pairwise error probability given the weight pattern D is computed as[22]:
and the distribution of the pattern D is computed using combinatorial analysis:
where{\mathcal{C}}_{k}^{n} denotes a combination of k elements of a set of n elements; N _{ s } = N/log_{2}(M) is the length of a signal; m = N _{ s }/F is the block’s length.
From (24), (27), and (28), the error probability reduces to:
5.2.3 Fully interleaved Rayleigh fading
The error probability of coded bits does not depend on the instantaneous channel gain but on the noise variance only. The pairwise error probability in fully interleaved fading channel can be obtained by integrating over the distribution of channel gains. Using[28], we get:
where{\mathcal{C}}_{m}^{n}=\frac{n!}{m!(nm)!} denotes the binomial coefficients.
5.3 Error estimation with imperfect perfect CSI
In the imperfect CSI case, we consider F = 1 and F = 4. The error probabilities at the relay can be computed as in the perfect CSI case, except that the estimated channel gain{\widehat{h}}_{j},j=1,2 is used instead of correct one h _{ j }.
5.4 Error quantization
To inform the destination about the decoding error probability at the relay, the relay quantizes and sends it to the destination. Let\stackrel{\u0304}{v} be a qbit quantized value of v using uniform quantization function Q _{ q }(.):
where M _{ v } = max(v) min(v). The quantization error by Q _{ q }(.) is given by ε _{ q } = M _{ v }/2^{q+1}. The quantized\stackrel{\u0304}{v} is transmitted over fading plus Gaussian noise to the destination. At the end of the channel estimation phase, the destination recovers the decoding error probability at the relay from the noisy version of the transmitted quantized signal.
6 Numerical results: perfect CSI case
In this section, we study the performance of the proposed JNCD algorithms in various fading scenarios. For this perfect CSI case, assume that the receivers have perfect knowledge of the onehop links CSI. In addition, the destination is assumed to have full knowledge of the decoding error probability at the relay, Pe_{bit} and Pe_{code}, which are estimated as described in the previous sections. We assume a symmetric network topology in which the distance from the sources to the destination is the same. The relay is located between sources and destination. The path loss has been chosen equal to 3.5[29]. Unless stated for specific cases, the recursive convolutional code (RSC) [1 15/3] with rate 1/2 is used. 16QAM is used as the modulation scheme. The number of iterations used to obtain our results is four since we have observed that the algorithms converge to the best performance in four iterations.
Both DF and DMF relaying protocols are studied. In particular, three schemes are studied: (1) DF relaying with the proposed algorithm 1, named DF Algo 1 in the figure; (2) DF relaying with the proposed algorithm 2, named DF Algo 2 in the figure; (3) DMF relaying with the proposed algorithm 2, named DMF Algo 2 in the figure. We note that algorithm 1 cannot be used with the DMF protocol because it performs network coding on the information bits. We also compare our algorithms with[18], which is denoted by Ref. [Yune] in the figure. In addition, we denote by Blind the scenario where the receiver has no information about the decoding error probability at the relay (it assumes perfect decoding at the relay) and by Non Cooperation the conventional pointtopoint communication scenario.
6.1 Effects of iterations
Figure5a shows the simulation results for fully interleaved fading channels. It is shown in the figure that (1) iterative network/channel decoding significantly improves the performance of both proposed algorithms using the DF protocol. More specifically, with four iterations, compared with separate decoding (one iteration), the proposed algorithm 1 gains 4 dB at a BER equal to 10^{3}. On the other hand, the proposed algorithm 2 gains 5 dB. If the DMF protocol is considered, the proposed algorithm 2 with four iterations gains about 2 dB at a BER equal to 10^{3} compared with one iteration decoding. (2) If the DF protocol is considered, the algorithm 2 is about 2 dB better than the algorithm 1 after one iteration. After four iterations, the two algorithms tend to have almost the same performance as SNR increases. (3) Compared to[18], the two proposed algorithms with four iterations and DF protocol significantly outperform.
Figure5b shows the simulation results for block fading channel with F = 4. In addition, the theoretical curve SNR ^{4} is plotted to provide some information about the achievable diversity order: (1) iterative decoding improves performance for both DF and DMF relaying. With four iterations, DF relaying with the proposed algorithm 1 gains about 3 dB and with the proposed algorithm 2, it gains about 2 dB at a BER equal to 10^{4} compared to the single iteration case. DMF relaying with algorithm 2 gains about 1 dB. (2) Compared to[18], after four iterations, algorithm 1 and algorithm 2 with DF relaying both gain about 3 dB at a BER equal to 10^{4}. With DMF relaying, the algorithm 2 with four iterations gains about 1 dB at a BER equal to 10^{4}. (3) For both DF and DMF relaying, the receiver loses the diversity order if it has no information about the decoding error probability.
We note that in Figure5b, the proposed algorithms have diversity order equal to 4 if F = 4. The reason is that the diversity gain d ^{H} of a convolutional code in a Fblock fading channel with MQAM modulation is upper bound by[22]:
where ⌊x⌋ denotes the largest integer no greater than x, R is the code rate in bits/symbol. In our setup, we have R = 2 bits/symbol and 16QAM. Thus, we get d ^{H} ≤ 3. It is shown from the simulation that the actual diversity order of the code [1 15/13] is 2 in the SNR range of interest. Therefore, it is reasonable that in the MARC, the relay provides a better diversity gain.
Figure5c shows simulation results for the quasistatic fading channel with F = 1. In addition, the theoretical curve SNR^{2} is plotted as a diversity reference. It is shown in the figure that (1) if the receiver is not informed about the decoding error probability at the relay, the performance is dramatically decreased and it loses diversity order; (2) iterative decoding brings a little gain in both algorithms. Algorithm 2 with four iterations gains about 0.8 dB over the oneiteration case, while algorithm 1 with four iterations gains about 0.5 dB over the oneiteration case; and (3) DMF with algorithm 2 is slightly better than DF with both algorithms.
Consider three fading channels, algorithm 2 is recommended because of its low complexity compared with algorithm 1. With quasistatic block fading scenario, DMF relaying is recommended. In this case, channel decoding at the relay does not improve the system performance. In general Fblock fading channels, DF relaying should be used.
6.2 Effects of location of the relay
Figure6 shows the effects of relay’s position on the performance of the proposed algorithms in F = 4 block Rayleigh fading channels. The horizonal axis presents the normalized sourcerelay distance when sourcedestination distance is 1. The system operates at EbNo = 6 dB. It is shown that the system performance is degraded when the relay move close to the destination. It is because in this case, the possible errors at the relay are so high. The system achieves the best performance when the relay is close to the source. In addition, the optimal location for DMF is closer to the source than that for DF. Since DMF does not perform channel decoding, it needs the sourcerelay links to be good enough for effective cooperation.
6.3 Effects of the channel code
Figure7 presents the performance of the proposed algorithm 1 with DF in F = 4 block Rayleigh fading scenario and the relay locates at the middle between the sources and the relay. The destination has full knowledge of the decoding error at the relay. Two channel codes are compared. Code 1: RSC [1 15/13] with rate 1/2 and Code 2: RSC [1 15/13 17/13] with rate 1/3. Obviously, the Code 2 with higher errorcorrection capability provides better performance than the Code 1. In addition, the MARC with Code 2 achieves diversity order 6 while the MARC with Code 1 achieves diversity order 4 in the SNR region of interest. This is because in F = 4 block fading, the Code 1 can only achieve diversity order 2 while the Code 2 provides diversity order 3.
7 Numerical results: imperfect CSI case
This section evaluates the impact of imperfect CSI and quantization error on the performance of the proposed algorithms. The two case studies with F = 1 and F = 4 are investigated. The relay is located at the middle between the sources and the destination. The RSC [1 15/13] is chosen as in the previous section and 16QAM is used. The ML estimator is used for channel estimation. Because the performance of algorithm 2 with DF and DMF relaying is almost the same, we only study algorithm 2 with DMF relaying in this section. Then, in this section, algorithm 1 is linked to DF relaying and algorithm 2 is linked to DMF relaying. In the figures, Full CSI denotes the case when the receivers (relay and destination) have perfect channel state information of the onehop links. On the other hand, Full Pe denotes the case when the destination has full knowledge of the decoding error probability at the relay.
Intensive simulations show that iterative decoding only provides coding gain if the receivers have enough accurate CSI and possible decoding errors. However, concerning realistic imperfect CSI systems where the total number of overhead symbols is not too large, we focus on only separate decoding (one iteration) for block fadings (F = 1 and F = 4) in what follows.
7.1 Effects of pilot length
Figure8 shows the effect of pilot length assuming FullPe for both quasistatic and F = 4 block fading channels. Both algorithms have the same performance trend as a function of number of pilot symbols. It is shown that pilot length only affects the coding gain, and it does not change the diversity order of the system in the SNR range of interest. In addition, 16symbol pilot curve is about 1dB worse than the full CSI curve (at a BER equal to 10^{4}).
7.2 Effects of quantization
Figure9 illustrates the effect of quantization by assuming five pilot symbols and F = 1. We note that the total overhead symbols (pilot symbols and quantization symbols) are five, the pilot symbols on relaydestination link is less than five. It is observed that if the BER at the relay is not taken into account by the decoder at destination, it loses both coding gain and diversity order. Furthermore, the quantization level, L _{ q }, affects both performance and diversity order. In both algorithms, L _{ q } = 4 bits quantization (L _{ p } = 1 symbol for relaydestination link) can achieve almost same performance as the full Pe case. It implies that the system BER is more sensitive to the quantization accuracy than the pilot length.
Figure10 shows the effect of quantization with perfect CSI and F = 4. Similar conclusions as above are derived. The quantization level affects both diversity order and coding gain. The quantization level has small effect to the algorithm 1 and it achieves almost same performance as full Pe case in the observing SNR range. This is because the algorithm 1 performs channel decoding at the relay and the possible decoding errors are negligible in this situation. Unlike algorithm 1, the performance of the algorithm 2 significantly degrades with quantized errors, even when L _{ q } = 6 bits are used. This is because of two following reasons: (1) the algorithm 2 employs DMF relaying, which results in high errors at the relay and (2) the decoding errors at the relay is computed as the average over four channels, which is not accurate for individual independent channels.
In conclusion, (1) if F = 1, algorithm 2 has the same performance as algorithm 1 and it is less complex than algorithm 1. However, if F = 4, algorithm 1 outperforms algorithm 2. (2) If the destination is aware enough of the decoding error probability at the relay, pilot length does not change that diversity order of the system. (3) The number of quantization bits for reporting decoding errors from the relay affects both coding gain and diversity order. (4) Sixbit quantization is enough in most analyzed scenarios.
8 Conclusion
In this paper, we have studied the performance of the multiple access relay channel with binary Network Coding and JNCD at the destination in practical situations. Decode and Forward and Demodulate and Forward relaying strategies are investigated. Our results show that iterative Joint Network and Channel Decoding provides better performance than separate network channel decoding only if the destination has enough CSI and knowledge of the decoding error probability at the relay. This gain increases with the number of fading blocks per codeword. It is also shown that the number of pilot symbols mostly affects the coding gain of the system with a negligible impact on the diversity order, at least for the SNR range of interest. Finally, it is shown that CSI quantization errors affect both coding gain and diversity order. In general, representing the BER at the relay using 6bit quantization is sufficient for both DMF relaying and DF relaying. The proposed iterative decoding algorithms can be easily extended to frequency selective fading scenarios, e.g., OFDM systems.
References
Sendonaris A, Erkip E, Aazhang B: User cooperation diversity  Part I: system description. IEEE Trans. Commun 2003, 51(11):19271938. 10.1109/TCOMM.2003.818096
Laneman JN, Tse DNC, Wornell GW: Cooperative diversity in wireless networks: Efficient protocols and outage behavior. Inform. Theory, IEEE Trans 2004, 50(12):30623080. 10.1109/TIT.2004.838089
Ahlswede R, Ning C, Li SYR, Yeung RW: Network information flow. Inform. Theory, IEEE Trans 2000, 46(4):12041216. 10.1109/18.850663
Renzo M, Iwaza L, Kieffer M, Duhamel P, Agha K: Robust wireless network coding–an overview. In Lecture Notes of the Institute for Computer Sciences. Social Informatics and Telecommunications Engineering, Vol. 45. Berlin Heidelberg: Springer; 2010:685698.
Sichao Y, Koetter R: Network coding over a noisy relay : a belief propagation approach. in the IEEE International Symposium on Information Theory, ISIT 2007. Nice, 24–29 June 2007
Woldegebreal DH, Karl H: Multipleaccess relay channel with network coding and nonideal sourcerelay channels in the 4th International Symposium on Wireless Communication Systems, ISWCS 2007. Trondheim, 17–19 October 2007
Hausl C, Dupraz P: Joint networkchannel coding for the multipleaccess relay channel in the 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, SECON ’06..
Polgar ZA, Stef MP, Bota V: Network and channel coded cooperation algorithms for cellular networks in the IEEE 69th Vehicular Technology Conference 2009, VTC Spring. Barcelona, 26–29 April, 2009
Yonghui L, Vucetic B, Wong TF, Dohler M: Distributed turbo coding with soft information relaying in multihop relay networks. Select. Areas Commun., IEEE J 2006, 24(11):20402050.
Weitkemper P, Wuebben D, Kuehn V, Kammeyer KD: Soft information relaying for wireless networks with error prone sourcerelay link, in the 7th International ITG Conference on Source and Channel Coding (SCC). Ulm, 14–16 January 2008
Sneesens HH, Vandendorpe L: Soft decode and forward improves cooperative communications, in the 1st IEEE International Workshop on Computational Advances in MultiSensor Adaptive Processing. Puerto Vallarta, 13–15 December, 2005
Habian AlG, Ghrayeb A, Hasna M: Controlling error propagation in networkcoded cooperative wireless systems, in the IEEE International Conference on Communications, ICC '09..
Sinh Le Hong N, Ghrayeb A, Habian AlG, Hasna M: Mitigating error propagation in twoway relay channels with network coding. Wireless Commun. IEEE Trans 2010, 9(11):33803390.
Bletsas A, Khisti A, Reed DP, Lippman A: A simple cooperative diversity method based on network path selection. IEEE J. Select Areas Commun 2006, 24(3):659672.
Ming X, Aulin T: Optimal decoding and performance analysis of a noisy channel network with network coding. Commun, IEEE Trans 2009, 57(5):14021412.
Sneessens HH, Louveaux J, Vandendorpe L: Turbocoded decodeandforward strategy resilient to relay errors, in the IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2008. Las Vegas, 30 March  4 April 2008
Lee K, Hanzo L: MIMOassisted hard versus soft decodingandforwarding for network coding aided relaying systems. Wireless Commun. IEEE Trans 2009, 8: 376385.
Yune T, Kim D, Im G: Opportunistic networkcoded cooperative transmission with demodulateandforward protocol in wireless channels. Commun, IEEE Trans 2011, PP(99):15.
Kim TT, Caire G, Skoglund M: Decodeandforward relaying with quantized channel state feedback: an outage exponent analysis. Inform. Theory, IEEE Trans 2008, 54(10):45484564.
Zhiguo D, Leung KK: Impact of imperfect channel state information on bidirectional communications with relay selection. Signal Process IEEE Trans 2011, 59(11):56575662.
Nazer B, Gastpar M: Computeandforward: Harnessing interference with structured codes, in IEEE International Symposium on Information Theory, 2008. ISIT 2008. Toronto, 6–11 July 2008
Knopp R, Humblet PA: On coding for block fading channels. Inform. Theory IEEE Trans 2000, 46: 189205. 10.1109/18.817517
Cavers JK: An analysis of pilot symbol assisted modulation for Rayleigh fading channels [mobile radio]. Vehicular Technol. IEEE Trans 1991, 40(4):686693. 10.1109/25.108378
Lang T, Sadler BM, Dong M: Pilotassisted wireless transmissions: general model, design criteria, and signal processing. Signal Process Mag. IEEE 2004, 21(6):1225. 10.1109/MSP.2004.1359139
Bahl L, Cocke J, Jelinek F, Raviv J: Optimal decoding of linear codes for minimizing symbol error rate (Corresp.). Inform. Theory IEEE Trans 1974, 20(2):284287.
Vu XT, Di Renzo M, Duhamel P: Optimal and lowcomplexity iterative joint network/channel decoding for the multipleaccess relay channel. in the 2011 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP 2011). Prague, 22–27 May 2011
Proakis JG: Digit Communications. McGrawHill series in electrical and computer engineering, 4th edition (McGrawHill, Boston, 2001). [00025305 John G. Proakis. ill.]
Glavieux A: Channel Coding in Communication Networks: From Theory to Turbo Codes. (Wiley, New York, 2007)
Ren Z, Wang G, Chen Q, Li H: Modelling and simulation of Rayleigh fading, path loss, and shadowing fading for wireless mobile networks. Simulation Modell. Pract. Theory 2011, 19(2):626637. 10.1016/j.simpat.2010.10.001
Acknowledgements
The research work is supported in part by the European Commission under the auspices of the FP7PEOPLE MITNCROSS FIRE project (Grant 317126) and in part by the European Commission in the framework of the FP7 Network of Excellence in Wireless COMmunications NEWCOM# (Grant agreement no. 318306).
Author information
Authors and Affiliations
Corresponding author
Additional information
Competing interests
The authors declare that they have no competing interests.
Authors’ original submitted files for images
Below are the links to the authors’ original submitted files for images.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
About this article
Cite this article
Vu, XT., Renzo, M.D. & Duhamel, P. Multipleaccess relaying with network coding: iterative network/channel decoding with imperfect CSI. EURASIP J. Adv. Signal Process. 2013, 170 (2013). https://doi.org/10.1186/168761802013170
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/168761802013170