By Topic

Joint Optimal Threshold-Based Relaying and ML Detection in Network-Coded Two-Way Relay Channels

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Xiang Nian Zeng ; Nokia Siemens Networks, Hangzhou, China ; Ghrayeb, A. ; Hasna, M.

In this paper, we address the problem of joint optimal threshold-based relaying and maximum likelihood (ML) detection in network-coded cooperative systems. The purpose of using threshold-based relaying is to circumvent the impact of error propagation, which could lead to degrading the system diversity. For simplicity, we consider a simple network comprising two source nodes and one relay node. The relay operates in the decode-and-forward (DF) mode and employs binary network coding. The communication between the two source nodes is bidirectional, resulting in a two-way relay channel. We assume binary phase shift keying (BPSK) signaling. For a given log-likelihood ratio (LLR)-based threshold used at the relay, we derive the ML detector at the destination assuming that the destination has full knowledge of the locations of the blocked bits at the relay. We then derive an expression for the corresponding end-to-end (E2E) bit error rate (BER) performance, which is used to find the optimal threshold. We also derive two practical discontinuous transmission detectors at the destination for the purpose of identifying whether the relay is forwarding or not. The performance of one of the detectors is similar to that when the destination knows the locations of the blocked bits, whereas the performance of the other detector suffers some performance degradation. We present several numerical examples that illustrate the efficacy of the proposed scheme as compared to existing schemes.

Published in:

Communications, IEEE Transactions on  (Volume:60 ,  Issue: 9 )