- Research
- Open Access
- Published:

# Two-way DF relaying assisted D2D communication: ergodic rate and power allocation

*EURASIP Journal on Advances in Signal Processing*
**volume 2017**, Article number: 40 (2017)

## Abstract

In this paper, we investigate the ergodic rate for a device-to-device (D2D) communication system aided by a two-way decode-and-forward (DF) relay node. We first derive closed-form expressions for the ergodic rate of the D2D link under asymmetric and symmetric cases, respectively. We subsequently discuss two special scenarios including weak interference case and high signal-to-noise ratio case. Then we derive the tight approximations for each of the considered scenarios. Assuming that each transmitter only has access to its own statistical channel state information (CSI), we further derive closed-form power allocation strategy to improve the system performance according to the analytical results of the ergodic rate. Furthermore, some insights are provided for the power allocation strategy based on the analytical results. The strategies are easy to compute and require to know only the channel statistics. Numerical results show the accuracy of the analysis results under various conditions and test the availability of the power allocation strategy.

## Introduction

In recent years, a seamless increase of various innovative multi-media services has kept pushing the limits of current wireless networks, urging for higher-speed communications [1, 2]. As the smart mobile devices popularize progressively, the demand for higher wireless transmission rate will grow exponentially in the next decades and a 1000 times increase in the current system capacity is required by 2020 [3, 4]. However, the fourth generation mobile communication systems which can support a rate of 1Gbit/s hardly satisfy the demand of mobile communication in the next 10 years [5]. Therefore, the fifth generation (5G) cellular network is being considered [6]. One of the key technologies for 5G systems, which has recently attracted huge attention and can greatly enhance the spectral efficiency [7–9], is device-to-device (D2D) communication.

Generally speaking, there are two main types of radio resource sharing methods used by D2D communication in a cellular network: underlay and overlay inband communication [10]. For the overlay case, D2D communication takes part of the cellular resources and leaves the other half to the cellular user. Therefore, there is no interference between cellular link and D2D link. In contrast, for the underlay case, D2D users use the same resources with the cellular user causing interference to both the cellular link and D2D link, and the base station (BS) is required to coordinate the transmit power for both the cellular and D2D users [11–13]. Compared with the conventional cellular communication, obviously, comparing to the traditional cellular communication, D2D communication can save the resources and improve the throughput greatly, due to the fact that only half of the resources are used [14].

Although lots of advantages can be taken by D2D communication, it also faces a rigorous challenge—the inter-channel interference [15]. To reduced ICI from the D2D links, interference management and coordination is important for physical-layer designs, e.g., power control and resource allocation. Great efforts to tackle the interference problem have been made in [16–18]. For traditional D2D communication systems, many power allocation strategies have presented to improve the performance of cellular link or D2D link. For example, in [12], a joint power allocation scheme was proposed which maximizes the sum-rate of D2D link and cellular link. The authors in [13] have also given an interference-aware channel allocation scheme based on Hungarian algorithm to maximize the number of permitted D2D communication pairs. In order to effectively guarantee the cellular service, Yu et al. [16] proposed a transmit power allocation algorithm while the authors in [18] presented an optimum resource allocation and power control between the cellular and D2D link to improve the performance of D2D communication.

Equally, relay-assisted communication in cellular networks has also demonstrated great potential in enhancing the system performance [19–21]. Efforts have been firstly spent on analyzing the one-way relay-assisted systems with different relay protocols including amplify-and-forward (AF), decode-and-forward (DF), and compress-and-forward (CF) protocols, e.g., [22–24]. Relaying technologies have also been proposed for two-way communications [25, 26]. The transmission schemes over two, three, or four time slots for two-way relay protocols have been investigated in [27]. Recently, the application of relay techniques in conjunction with D2D communication has increasing interest as a means of achieving further performance improvements and coverage enhancement in cellular networks. Also, the D2D communication assisted by a relay node can alleviate the interference to the cellular link as it can reduce the transmit power of the D2D users. A comprehensive resource allocation framework for the one-way DF relay-assisted D2D communication was presented in [28]. In [29], the authors presented a joint relay selection and power allocation scheme for one-way AF relayed D2D communication. Based on the outage probability performance, Wang et al. [30] presented an interference constrained precondition for the one-way DF relay aided D2D communication. It is obvious that the combination of the D2D communication and the relay-assisted communication is a very effective method to improve the performance of the next-generation cellular system. One-way relay-assisted system has been investigated in [31–33] which presented closed-form expressions for the system performance. However, it needs four time slots to realize a complete communication with one-way relay policy while only two time slots are required for the two-way relay policy. Due to its potential to enhance the spectrum efficiency, two-way relay policy has attracted a great deal of attention. An optimal power allocation algorithm was provided to minimize the outage probability of D2D users for the two-way AF relay-assisted D2D communication system [34]. However, the interference was not considered. Sun et al. [35] proposed a security-embedded interference avoidance scheme to improve the system error performance in which the D2D user served as relays to assist the two-way transmission between two cellular users. In [36], authors proposed a new scheme in which three-phase D2D communication assisted with two-way DF relay is considered. The Pareto boundary of the region of the sum rate of D2D link versus that of the cellular link was found by optimizing the transmit power at base station and cellular user, as well as, D2D users [37].

Motivated by the interest of two-way relay-assisted system, as our major contribution, we will derive closed-form expressions of the ergodic rate for the proposed relay-assisted strategy, and investigate the effects of noise, the predetermined ratio, the received power of signals including the desired signal, and the interference. Two cases in which the relaying terminal has the same (symmetric) and different (asymmetric) received power from the two terminals exchanging information are considered. We then study the performance for the weak interference case and high signal-to-noise ratio (SNR) case. The approximations of ergodic rate for these cases are derived respectively. Based on these approximations, we present closed-form power allocation strategies which involve several key system coefficients and can be easily implemented. Numerical results confirm the accuracy of the analysis results and show the tightness of our approximate results. The improvement of the ergodic rate by using the power allocation strategy also can be found from the numerical results. To the best of our knowledge, this is the first analytical result that is applicable for D2D communication with two-way DF relaying.

## System model

We consider a D2D communication system assisted with a two-way DF relay node. We assume that the inter-channel interference between the users can be properly controlled by some efficient controlling mechanism. We focus on the interference between D2D link and cellular link, which is caused by sharing the same resources. Consider an isolated cell scenario as shown in Fig. 1 where one base station, one cellular user and a pair of D2D users are present (i.e., UEC, UED_{1} and UED_{2}). We assume the BS and all the users are equipped with single antenna. UED_{1} and UED_{2} exchange the messages with each other via UEr employing two-way DF protocol.

We denote the transmit power of terminal *i* as *P*
_{
iT
} for (*i*=1,2,*r*,*c*,*b*) which, respectively, refers to UED_{1}, UED_{2}, UEC, the BS and the relay. For fading channels, we use *h*
_{
ij
} to denote the Rayleigh fading channel coefficients of *i*−*j* link (for *j*=1,2,*r*,*c*,*b*). It is assumed that the noise *n*
_{
i
} is an independently and identically distributed complex Gaussian noise with zero mean and *N*
_{0} variance. The received power *P*
_{
ij
} at user *j* measured at *d*
_{
ij
} away from the transmitter *i* is defined as

where *α* denotes the path-loss exponent. We assume that the uplink and downlink channels are reciprocal, invariant, and formatted in two consecutive equal time slots. As shown in Fig. 2 (a), during the first time slot, UED_{1} and UED_{2} transmit messages *S*
_{1} and *S*
_{2} to UEC simultaneously. At the same time, UEC sends messages to the BS. Thus UER is effected by the noise plus the interference from cellular link. The desired signal received at the relay node can be given by

As shown in Fig. 2 (b), after the decoding process of \(y_{r}^{DF}\), UER decodes *S*
_{1} and *S*
_{2} and transmits the message *S*
_{
r
} to UED_{1} and UED_{2} in the second time slot that [38]

where the relay uses an average transmit power of *β*
*P*
_{
rT
} for the forward direction and (1−*β*)*P*
_{
rT
} for the backward direction. Besides, the BS sends the messages to UEC simultaneously. After the self-interference cancelation procedure, the received signal at the UED_{1} and UED_{2} can be written as follows, respectively,

and

Having established the signal model in (2)–(5), we now present the expressions of the signal-to-interference-plus-noise ratio (SINR) for different links. For the first phase, according to the received signals at UER in (2), we can obtain the SINR for the UED_{1}−UER link and UED_{2}−UER link which can be respectively expressed as

and

The sum-SINR at the relay node can be further expressed as [39, 40]

For the second phase, we also have the SINRs for the relay−UED_{1} and the relay−UED_{2} links as

and

## Ergodic rate analysis

In this section, new closed-form expressions for the ergodic rate of D2D link aided by two-way DF relay are derived firstly. Symmetric (where the received power at the relay from the two source users is the same) and asymmetric (where the received power is different) cases are considered. We assume channel reciprocity and that the relay node can decode *S*
_{1} and *S*
_{2} without errors. According to the definition in [26], the ergodic rate of the DF protocol is then given by

where

We are now ready to derive an analytical expression of (11).

### Exact analysis

With the above analysis, we now investigate the closed-form expression for the ergodic rate. The case of *P*
_{1r
}≠*P*
_{2r
} is referred to as the asymmetric case. For the symmetric case, since the received power at relay node from UED_{1} is equal to that from UED_{2}, we use *P*
_{
dr
} to indicate the received power at the relay node from the D2D users. The ergodic rate of the D2D link under the two cases are derived and presented in the following theorem.

###
**Theorem 1**

The ergodic rate of the D2D communication aided by a DF relay is given by

where *R*
_{1}= min(*R*
_{1r
},*R*
_{
r2}), *R*
_{2}= min(*R*
_{2r
},*R*
_{
r1}) with

and

with

and

Note that the the exponential integral of first order is defined as

###
*Proof*

See Appendix 1. □

According to *Theorem 1* in [41], we find that the function

is a monotonically increasing function with *x*. Based on this result, if *a*>*b*, it leads to

Then we have

The same result can be obtained for the case *a*<*b*. That is, the values of the expressions in (16)–(19) are always positive.

Our result in *Theorem 1*, in contrast, presents the exact closed-form expression which is applicable for arbitrary system parameters, and is given in closed-form expressions involving standard functions which can be easily evaluated using Matlab or Mathematics softwares. We note that this theorem presents an exact expression for the ergodic rate of the D2D communication aided by a DF relay node. In prior works, separate alternative expressions were only obtained for the traditional D2D communication scenarios without considering the different interference level in different time slots. Moreover, based on *Theorem 1*, we have the following observations. Since *e*
^{1/x}
*E*
_{1}(1/*x*) is a monotonically increasing function, *Theorem 1* implies that *P*
_{1r
}>*P*
_{
cr
}, *β*
*P*
_{
r2}>*P*
_{
b2}, *P*
_{2r
}>*P*
_{
cr
}, and (1−*β*)*P*
_{
r1}>*P*
_{
b1} should hold to transmit the message between different nodes reliably. These conditions also mean that the interferences from the BS and the cellular user play a negative role in the ergodic rate.

#### Weak interference case

In this subsection, we examine the scenario that the D2D communication occurs at the cell edge where the D2D users reuse the resources of the cellular user far away. Hence, the interference at D2D users is weak enough compared to the noise which means *P*
_{
cr
}→0, *P*
_{
bi
}→0, *N*
_{0}/*P*
_{
cr
}→*∞* and *N*
_{0}/*P*
_{
bi
}→*∞*. According to these, the ergodic rate of the D2D link can be described in the following corollary.

###
**Corollary 1**

When *N*
_{0}/*P*
_{
cr
}→*∞* and *N*
_{0}/*P*
_{
bi
}→*∞*, we have

where

with

and

with

and

###
*Proof*

Based on the properties of exponential integral function,we can get

For *x*→*∞*, we have

Having these results, we can easily obtain the approximations in *Corollary 1*. □

*Corollary 1* provides approximate results of ergodic rate for the weak interference scenario. Clearly, the expressions in *Corollary 1* are simpler than the ergodic rate expressions given in *Theorem 1*. Note that the ergodic rate only depends on the desired signal for the weak interference scenario. Since *h*(*x*) in (24) is a monotonically increasing function with *x*, \(R_{sum}^{WI}\) can be improved by increasing *P*
_{
ir
} and *P*
_{
ri
}. That is to say, enhancing the power of desired signals can improve the performance of D2D link when the locations of D2D users are fixed.

#### High SNR case

Here, we consider the fact that the communicating users in D2D communication systems are relatively close to each other. Here we will present new asymptotic ergodic rate expressions when the receive SNR at the D2D users goes to infinity which means *P*
_{
ir
}/*N*
_{0}→*∞* and *P*
_{
ri
}/*N*
_{0}→*∞*. This will be useful in deriving the optimal power allocation for the ergodic rate at high SNR later in this section. For this case, the ergodic rate of D2D communication aided by the relay node are given in the following corollary.

###
**Corollary 2**

When *P*
_{
ir
}/*N*
_{0}→*∞* and *P*
_{
ri
}/*N*
_{0}→*∞*, the asymptotic ergodic rate is given by

where

with

and

with

and

where *λ*≈0.577 is the Euler-Mascheroni constant.

###
*Proof*

We use the following asymptotic expansion of the exponential integral in obtaining the limiting form as SNR→*∞*,

□

For the case the relay has some statistical channel state information (CSI) about the system parameters, *β* may be chosen such that the ergodic rate is maximized. In this paper, we investigate the power allocation scheme that maximizes the ergodic rate based on the network geometry and the statistical CSI which include the second-order statistics and the interference level. For simplicity, we consider a linear network topology and assume that the relay node has only the path-loss coefficients of all the channels. We assume the transmit power at each user is *P*
_{
T
}. Since the D2D communication always occurs far from the BS and the distance between D2D users is short, we can get the approximation that *d*
_{
b1}≈*d*
_{
b2} which leads to *P*
_{
b1}≈*P*
_{
b2}≈*P*
_{
b
}.

###
**Corollary 3**

The power allocation strategy that maximizes the ergodic rate (39) is given by

where

and

with \({g_{st}} = d_{st}^{- \alpha }(s,t = 1,2,r;s \ne t)\).

###
*Proof*

See Appendix 2. □

From the power allocation scheme in (50), we find that the power allocation coefficient is determined by the location of the relay node on the D2D link when the interference from cellular link is fixed. Instead, the interference level of the cellular link leads to difference power allocation coefficient for the fixed location of relay node. Note that the power allocation strategy in (50) uses only the second-order statistics and the interference levels from the cellular link. It means that the derived power allocation strategy can be easily implemented in practice. It is interesting that there exists some region for the optimal coefficient which equals to 0.5.

## Numerical results

In this section, we present several numerical results to demonstrate all the exact and analytical results as well as asymptotic results. The performance enhancements by the power allocation schemes are also shown here. The path-loss fading coefficient is considered in an urban macro cell. We set the reference distance to be unity. The simulation parameters are shown in Table 1.

Figure 3 illustrates the ergodic rate results. In this figure, we consider that the D2D communication takes place in the middle region of the cell and is not far away from the cellular user with *d*
_{
cr
}=4, *d*
_{
b1}=5, and *d*
_{
b2}=6. For the asymmetric case, we set *d*
_{1r
}=0.3, *d*
_{2r
}=0.7 and *β*=0.6 while *d*
_{1r
}=*d*
_{2r
}=0.5 and *β*=0.5 for the symmetric case. Again, we see a precise agreement between the analytical results and the Monte-Carlo simulations, and that the analytical approximations are accurate in the high SNR regime. Compared with the asymmetric case, we see that increasing the SNR over the threshold results in a small ergodic rate for the symmetric case. This agrees with the analytic conclusions given in Section 3. It is also interesting to observe that the opposite occurs in the low SNR regime (and an improvement in system performance). In addition, it can be seen that there is a turning point in all the curves for both cases. This is explained as follows. Before this point, due to the minimization operation in (15), the ergodic rate is given by one of *R*
_{
mac
} or *R*
_{1}+*R*
_{2} which completely depends on the interference level of the BS and the cellular user. After this point, the other one determines the ergodic rate due to the large SNR.

We now assess the approximations of ergodic rate for the weak interference condition in Figs. 4 and 5. Considering the D2D communication occurring at the edge of the cell, in Fig. 4, we set *d*
_{
b1}=*d*
_{
b2}=10 and *d*
_{
cr
}=8 for the symmetric case while *d*
_{1r
}=0.4, *d*
_{2r
}=0.6, and *d*
_{
b1}=*d*
_{
b2}=*d*
_{
cr
}=14 are set for the asymmetric case. We also assume *d*
_{
cr
}=6 and SNR=10 dB for both symmetric and asymmetric cases in Fig. 5. Specially, in Fig. 5, we set *d*
_{1r
}=0.3 and *d*
_{2r
}=0.7 for the asymmetric case. It is apparent that the weak interference asymptotic expressions almost coincide with the Monte-Carlo results in the whole SNR regime. The graph in Fig. 5 shows that the approximations in *Corollary 1* remain sufficiently tight in the weak interference regime. As anticipated, the distance between BS and D2D users ceiling effect kicks in at impractical distance values (e.g., >10).

Figure 6 shows the ergodic rate results of the systems in different parameter configurations, where the parameters of the left one are (*d*
_{
cr
},*d*
_{1r
},*d*
_{2r
})=(4,0.25,0.75) while those for the right one are (*d*
_{
cr
},*d*
_{1r
},*d*
_{2r
})=(2,0.35,0.65). The results for the traditional D2D communication are also presented for comparison. The star line in the left figure represents the ergodic rate of the scenario without power allocation while the square red line demonstrates the result utilizing power allocation strategy. As we employ the power allocation scheme in the broadcast phase, the ergodic rate in this phase is improved compared with non-optimized black link. Since the DF protocol is employed in the relay node, the ergodic rate of the whole system is determined by the minimum rate during the broadcast phase and the multiple-access channel (MAC) phase as in *Theorem 1*. The ergodic rate in square red line performs better than that in star blue line for all SNRs. Similarly, in the right figure, the ergodic rate of the non-optimized system equals to that of MAC phase if the SNR is no more than 13 dB while it depends on the ergodic rate in the MAC phase if the SNR is above 13 dB. Using the power allocation strategy, the ergodic rate is the same as that in the MAC phase resulting in the distinct performance improvements when the SNR is below 13 dB. The exact optimal results in this figure test the availability of our power allocation strategy.

Finally, Fig. 7 compares the ergodic rates of the relay-assisted D2D communication strategy with and without the power allocation strategy against different relay node locations. We consider (*d*
_{
b1},*d*
_{
b2},*d*
_{
cr
})=(5,5,5), *β*=0.5 for the left subfigure and (*d*
_{
b1},*d*
_{
b2},*d*
_{
cr
})=(4,4,4), *β*=0.3 for the right one. As can be seen in the left subfigure, again, the proposed power allocation algorithm (50) outperforms the equal power allocation significantly. It can be easily found that the ergodic rate depends on the location of the relay node. It is also shown that more ergodic rate gain can be obtained comparing to the equal power allocation when the relay node is closer to the D2D users. This phenomena highlights the fact that the power allocation strategy is particularly effective when the distances between D2D users and relay node are different. From the right subfigure, since *β* is set as 0.3, the ergodic rate in the region *d*
_{1r
}>0.7 (*d*
_{2r
}<0.3) is close to the optimal results. It means the closer the relay node to the D2D user, the less power should be allocated. Again, an agreement between exact results and high SNR optimal results are shown in the figure.

## Conclusions

This paper proposed a new D2D communication strategy underlaying cellular networks which is aided by a relay node using two-way DF protocol. The outage probability and the ergodic rate of the new strategy were discussed for both the asymmetric and symmetric cases. For the new D2D communication strategy, we derive the closed-form expressions and their high SNR approximations for both outage probability and the ergodic rate. Based on these results, we showed that several major factors play a negative role for the system performance. Furthermore, closed-form power allocation solutions which minimize the outage probability or maximizes the ergodic rate were presented using the high SNR approximations. Analytical results were validated through numerical simulations.

## Appendices

## Appendix 1

### Proof of Theorem 1

In order to prove *Theorem* 1, we will consider the asymmetric and symmetric cases, respectively. Note that, in both cases, we use the following equation for the evaluation of the exact ergodic rate [42]

Here, we start from the asymmetric case. (1) The Asymmetric Case

Without loss of generality, let *S*=*P*
_{1r
}|*h*
_{1r
}|^{2}+*P*
_{2r
}|*h*
_{2r
}|^{2}, *T*=*P*
_{
cr
}|*h*
_{
cr
}|^{2}+*N*
_{0} and *U*=*S*/*T*. First, we derive the PDF of *S*. Let *X*=*P*
_{1r
}|*h*
_{1r
}|^{2}, *Y*=*P*
_{2r
}|*h*
_{2r
}|^{2} and *S*=*X*+*Y*. For the Rayleigh fading channel, we have

and

Then, we have

Since random variables *X*, *Y* are independent and *X*>0, *Y*>0, we have

The same way, we can easily derive the PDF of *T* as

Then we evaluate the PDF of *U* as

where *f*(*u*
*t*,*t*) is the joint PDF of the random variables *S* and *T*. After simple manipulation, it yields

Then we integrate (65) from *γ*
_{
thm
} to *∞* to yield

Then, we can derive the exact expression for *R*
_{
mac
} as

It can be seen that *I*
_{3} and *I*
_{4} have a similar structure. Hence, we only focus on *I*
_{3} in this proof. Then *I*
_{3} can be reexpressed as

Applying the following identity [43]:

we have

Similarly, *I*
_{4} can be obtained as

We can also get (16)–(19) by using the same approach. Utilizing the recursive relation

and then combining (67) yields the desired result. (2) The Symmetric Case

Let *S*=*P*
_{
dr
}|*h*
_{1r
}|^{2}+*P*
_{
dr
}|*h*
_{2r
}|^{2}, *T*=*P*
_{
cr
}|*h*
_{
cr
}|^{2}+*N*
_{0} and *U*=*S*/*T*. We can easily get the PDFs of *S* and *T* as

and

Then the PDF of *U* can be obtained as

To proceed further, some transformations are performed

Then we evaluate the CDF of *U* from *γ*
_{
thm
} to *∞*. With the help of [43, (3.353)], the CDF can be derived as

Based on the CDF in (77), we can evaluate the ergodic rate for *R*
_{
mac
} as

Note that *I*
_{5} and *I*
_{6} can be derived by using the same method for the derivation of *I*
_{3}. The exact expressions of *I*
_{5} and *I*
_{6} are then, respectively, given by

and

To evaluate the integral in *I*
_{7}, we note that *I*
_{7} can be expressed by using (27) in [42] as

where

Utilizing the recursive relation in (27) of [42], *I*
_{7} can be expressed as

After some subsequent manipulations, we have

Substituting (84)–(86) into (83) yields

Substituting (79), (80) and (87) into (78), we get (22). Then utilizing (16)–(19) and (22) yields the desired result.

## Appendix 2

### Proof of Corollary 3

Note that \(R_{mac}^{HS}\) in (39) is independent of *β* and therefore, we consider the following maximization instead

We assume the transmit power at each user is *P*
_{
T
}. From (42) to (45), we can get the following equation by assuming

where

Since *P*
_{
b1}≈*P*
_{
b2}≈*P*
_{
b
}, we have *θ*
_{1}≈*θ*
_{2}≈*θ*. In order to get the optimal *β*, we will consider two cases: *A*≤*B* and *B*≤*A*. (1) The *A*≤*B* Case (*G*
_{1}≤0)

In this case, *β* will fall into one of the three cases, (1) *β*≤*A*, (2) *A*≤*β*≤*B*, and (3) *B*≤*β*. We firstly consider the *β*≤*A* scenario. The problem in (88) is now reduced to

where \(R_{2r}^{HS}\) is independent of *β* and \(R_{r2}^{HS}\) is a strictly increasing function with respect to *β*. It follows that *β*
^{∗}=*A* is the optimal value.

For the *A*≤*β*≤*B* scenario, the problem in (88) can be simplified as

which is independent of *β* which implies that no optimization is needed for this interval. For this case, we have

We now consider the *B*≤*β* scenario. It is easy to simplify the problem in (88) as

Note that \(R_{r1}^{HS}\) is independent of *β* while \(R_{1r}^{HS}\) is a strictly decreasing function with respect to *β*. It therefore follows that *β*
^{∗}=*B* is the optimal value. Having the above results, we now derive the optimal results among (92), (93) and (95). By substituting *β*
^{∗}=*A* into (92), we have

Similarly, when *B*≤*β*, we have

According to the results in (94)–(97), we find the maximum values of these three cases are the same. Furthermore, we consider the possibility regions of *A* and *B* under case *A*≥*B*. Based on the expression of *A*, we have *A*>0. Since both *β*
^{∗}=*A* and *β*
^{∗}=*B* can lead to the maximum rate, when *A*<1, the value of *β*
^{∗} is taken as *β*
^{∗}=*A*. When *A*>1, since Eq. (100) is an increasing function with respect to *β*, *β*
^{∗}=1 will be the optimal results for the maximization problem in (96). In conclusion, we have

Then, we consider the another case. 2) The *B*≤*A* Case (*G*
_{1}≥0)

In this case, *β* will fall into one of the three cases, (1) *β*≤*B*, (2) *B*≤*β*≤*A*, and (3) *A*≤*β*. After operating the same procedure in Section (1), we can easily obtain the following results

When *β*≤*B*, we have

When *β*≥*A*, it yields

For the case *B*<*β*<*A*, we have

By taking the derivative of *β*, we have

Then the optimal *β* for \(R_{\max }^{B \le \beta \le A}\) is *β*
^{∗}=1/2.

Now we find the maximum result among \(R_{\max }^{\beta \le B}\), \(R_{\max }^{B \le \beta \le A}\) and \(R_{\max }^{\beta \ge A}\). For convenience, we define

substituting *β*
^{∗}=*B* into \(R_{\max }^{\beta \le B}\), we get

Similarly, we obtain

and

Now we compare \(R_{\max }^{\beta \le B,{\beta ^{*}} = B}\) and \(R_{\max }^{B < \beta < A,{\beta ^{*}} = 0.5}\). Let \(R_{\max }^{\beta \le B,{\beta ^{*}} = B} < R_{\max }^{B < \beta < A,{\beta ^{*}} = 0.5}\), after some manipulations, it leads to

We set \({G_{2}}=g_{2r}^{2}{e^{\theta }} + g_{1r}^{2}{e^{- \theta - \ln 4}} - {g_{1r}}{g_{2r}} \), then *G*
_{2} can be transformed into

Since *e*
^{θ}>0, we get *G*
_{2}≥0. That is to say, \(R_{\max }^{B < \beta < A,{\beta ^{*}} = 0.5} \ge R_{\max }^{\beta \le B,{\beta ^{*}} = B}\) always stand up. The same way, we can verify that

Next, we compare the values of \(R_{\max }^{\beta \ge A,{\beta ^{*}} = A}\) and \(R_{\max }^{\beta \le B,{\beta ^{*}} = B}\). The following results can be obtained

Finally, we consider the value ranges of *A* and *B*. Since 1−*g*
_{2r
}
*e*
^{θ}/*g*
_{1r
}, we have *B*<1. According to the analysis above, we get the following results for the case *G*
_{1}≥0

Having the above results and combining with (98), it yields the desired result.

## Change history

### 05 January 2018

Unfortunately, the original version of this article [1] contained an error. The affiliation of Yiyang Ni and Yuxi Wang was incorrect. The correct affiliation is Jiangsu Second Normal University and is presented in this correction.

## References

IEEE. Standard 802.16e-2005. part16: Air interface for fixed and mobile broadband wireless access systems amendment for physical and medium access control layers for combined fixed and mobile operation in licensed band, (2005).

3GPP, TS 36.213 v 10.5.0. Physical layer procedures (Release 10) for Evolved Universal Terrestrial Radio Access (E-UTRA) (2012).

M Baker, From LTE-Advanced to the future. IEEE Commun. Mag.

**50**(2), 116–120 (2012).T Nakamura, S Nagata, A Benjebbou, et al., Trends in small cell enhancements in LTE Advanced. IEEE Commun. Mag.

**51**(2), 98–105 (2013).3GPP, RWS-120045. Summary of 3GPP TSG-RAN workshop on Release 12 and onward (2012).

F Boccardi, RW Heath Jr, A Lozano, TL Marzetta, P Popovski, Five disruptive technology directions for 5G. IEEE Commun. Mag.

**52**(2), 74–80 (2014).YY Ni, J Shi, R Tian, KK Wong, HB Zhu, SX Shao, in

*Proc. IEEE WCNC*. Outage analysis for device-to-device communication assisted by two-way decode-and-forward relaying (Shanghai, 2013).G Fodor, E Dahlman, G Mildh, S Parkvall, N Reider, G Miklos, Z Turanyi, Design aspects of network assisted device-to-device communications. IEEE Commun. Mag.

**50**(3), 170–177 (2012).3GPP, TR 22.803 v 12.2.0. Feasibility study for Proximity Services (ProSe) (2013).

A Asadi, Q Wang, V Mancuso, A survey on device-to-device communication in cellular networks. IEEE Commun. Survey Tutor.

**16**(4), 1801–1809 (2014).K Doppler, CH Yu, CB Ribeiro, P Jaanis, in

*Proc. IEEE WCNC*. Mode selection for device-to-device communication underlaying an, LTE-advanced network (Sydney, 2010).M Jung, K Hwang, SY Choi, in

*Proc. IEEE VTC*. Joint mode selection and power allocation for power-efficient device-to-device communication (Yokohama, 2012).P Janis, V Koivunen, C Ribeiro, J Korhonen, K Doppler, K Hugl, in

*Proc. IEEE VTC*. Interference-aware resource allocation for device-to-device radio underlaying cellular networks (Barcelona, 2009).CH Yu, K Doppler, CB Ribeiro, C Wijting, K Hugl, O Tirkkonen, V Koivunen, Device-to-device communication underlaying cellular communications system. Int. J Commun. Netw. Syst. Sci.

**47**(12), 42–49 (2009).K Doppler, MP Rinne, C Wijting, Device-to-device communication as an underlay to LTE-advanced networks. IEEE Commun. Mag.

**47**(12), 29–42 (2009).CH Yu, O Tirkkonen, K Doppler, CB Ribeiro, in

*Proc. IEEE ICC*. Power optimization of device-to-device communication underlaying cellular communication (Dresden, 2009).B Wang, L Chen, X Chen, X Zhang, D Yang, in

*Proc. IEEE VTC*. Resource allocation optimization for device-to-device communication underlaying cellular networks (Budapest, 2011).CH Yu, K Doppler, CB Ribeiro, O Tirkkonen, Resource sharing optimization for device-to-device communication underlaying cellular networks. IEEE Trans. Wireless Commun.

**10**(8), 2752–2763 (2011).V der Meulen, Three-terminal communication channels. Adv. Appl. Prob.

**3:**, 120–154 (1971).JN Laneman, GW Wornell, DNC Tse, Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Trans. Info. Theory.

**50**(12), 3062–3080 (2004).H Bolcskei, RU Nabar, O Oyman, AJ Paulraj, Capacity scaling laws in MIMO relay networks. IEEE Trans. Wireless Commun.

**5**(6), 1433–1444 (2006).JN Laneman, GW Wornell, Distributed space-time-coded protocols for exploiting cooperative diversity in wireless nertworks. IEEE Trans. Info. Theory.

**49**(10), 2415–2425 (2003).A Sendonaris, E Erkip, B Aazhang, User cooperation diversity-Part I: System description. IEEE Trans. Commun.

**51**(11), 1927–1938 (2003).A Sendonaris, E Erkip, B Aazhang, User cooperation diversity-Part II: Implementation aspects and performance analysis. IEEE Trans. Commun.

**51**(11), 1939–1948 (2003).TM Cover, AE Gamal, Capacity theorems for the relay channel. IEEE Trans. Inform. Theory.

**25:**, 572–584 (1979).B Rankov, A Wittneben, Spectral efficient protocols for half duplex fading relay channels. IEEE J Sel. Areas Commun.

**25**(2), 379–389 (2007).RY Louie, YH Li, B Vucetic, Practical physical layer network coding for two-way relay channels: Performance analysis and comparison. IEEE Trans. Wireless Commun.

**9**(2), 764–777 (2010).M Hasan, E Hossain, Distributed resource allocation for relay-aided device-to-device communication: a message passing approach. IEEE Trans. Wireless Commun.

**13**(11), 6326–6341 (2014).T Kim, MM Dong, An iterative approach to joint relay selection and resource allocation for D2D communications. IEEE Wireless Commun. Lett.

**3**(6), 625–628 (2014).LF Wang, T Peng, YF Yang, WB Wang, in

*Proc. IEEE VTC*. Interference constrained D2D communication with relay underlaying cellular networks (Vegas, 2013).G Huang, Y Wang, J Coon, in

*Proc. IEEE PacRim*. Performance of multihop decode-and-forward and amplify-and-forward delay networks with channel estimation (Quanzhou, 2007).MM Molu, N Goertz, in

*Proc. ISWCS*. Amplify and forward relaying; Channel model and outage behaviour (Paris, 2012).C Zhong, S Jin, KK Wong, Dual-hop systems with noisy relay and interference-limited destination. IEEE Trans. Commun. Soc.

**58**(3), 764–768 (2010).L Wang, H Jin, XD Ji, Y Li, MG Peng, in

*Proc. IEEE MAPE*. Power allocation for cognitive D2D communication assisted by two-way relaying (Chengdu, 2013).L Sun, QH Du, PY Ren, YC Wang, Two birds with one stone: Towards secure and interference-free D2D transmission via constellation rotation. IEEE Trans. Veh. Technol.

**65**(10), 8767–8774 (2010).DS Gurjar, PK Upadhyay, in

*Proc. IEEE TENCON*. Three-phase overlay D2D communications in traffic-aware two-way cellular systems (Marina Bay Sands, 2016).YY Pei, YC Liang, Resource allocation for device-to-device communications overlaying two-way cellular networks. IEEE Trans. Wireless Commun.

**12**(7), 3611–3621 (2013).Y Wu, in

*Proc. IEEE ISIT*. Broadcasting when receivers know some message a priori (Nice, 2007).XS Liang, S Jin, XQ Gao, KK Wong, Outage performance for decode-and-forward two-way relay network with multiple interferers and noisy relay. IEEE Trans. Commun.

**61**(2), 521–531 (2013).XS Liang, S Jin, XQ Gao, KK Wong, C Sun, in

*Proc. IEEE GLOBECOM*. Outage Performance for Interference-Limited Decode-and-Forward Two-Way Relaying Networks (California, 2012), pp. 4554–4559.V Raghavan, SV Hanly, VV Veeravalli, Statistical beamforming on the grassmann manifold for the two-user broadcast channel. IEEE Trans. Inform. Theory.

**59**(10), 6464–6489 (2013).J Zhang, JG Andrews, Adaptive spatial intercell interference cancellation in multicell wireless networks. IEEE J. Select. Areas Commun.

**28**(9), 1455–1468 (2010).IS Gradshteyn, IM Ryzhik,

*Table of Integrals, Series, and Products*, 6th ed. (Academic Press, San Diego, California, 2000).

### Funding

This work was supported by the National Science Foundation (NSFC) for Distinguished Young Scholars of China with Grant 61625106 and the NSFC with Grant 61531011,61427801.

### Authors’ contributions

HZ and SJ conceived the study. YN, YW, and SJ are designed and modelled the study. YN, SJ, and K-KW are responsible for the performance analysis. YN, YW, K-KW, and HZ are responsible for the results interpretation and manuscript writing:. All authors read and approved the final manuscript.

### Competing interests

The authors declare that they have no competing interests.

### Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

## Author information

### Affiliations

### Corresponding author

## Additional information

A correction to this article is available online at https://doi.org/10.1186/s13634-017-0522-8.

## Rights and permissions

**Open Access** This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

## About this article

### Cite this article

Ni, Y., Wang, Y., Jin, S. *et al.* Two-way DF relaying assisted D2D communication: ergodic rate and power allocation.
*EURASIP J. Adv. Signal Process. * **2017, **40 (2017). https://doi.org/10.1186/s13634-017-0464-1

Received:

Accepted:

Published:

DOI: https://doi.org/10.1186/s13634-017-0464-1

### Keywords

- Device-to-device communication
- Two-way relay
- Decode-and-forward
- Ergodic rate
- Power allocation