9
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 1, JANUARY 2010 51 Performance of Iterative Decoding for Superposition Modulation-Based Cooperative Transmission Tao Yang, Student Member, IEEE, and Jinhong Yuan, Member, IEEE Abstract—In this paper, we propose a new superposition modulation-based cooperative scheme and investigate receivers with iterative detection and decoding (IDD), where we focus on an interference cancellation (IC) detector. For quasi-static fading environment, we analyze the bit-error-probability (BEP) of the proposed scheme and analytically show the optimal power allocation in the superposition modulation. It is demonstrated that the proposed scheme performs about 2-3.5 dB better than the system previously proposed in the literature and simulation results are shown to be very close to the analytical results. In addition, the receiver with IC detectors achieves the MAP detection performance in the scheme. Index Terms—Cooperative communication, iterative decoding, superposition modulation, interference cancellation. I. I NTRODUCTION U SER-COOPERATION has been widely accepted as a promising technique to introduce spatial diversity in wireless networks where a physical array is not applicable [1], [2]. Previous information-theoretic analysis in [2] has shown that orthogonal cooperative schemes achieve full diversity. In [3], a non-orthogonal AF and a dynamic DF are shown to outperform the orthogonal AF or DF. The drawback of the or- thogonal DF [2] is that using orthogonal time-slots for relaying is a suboptimal way of using the radio channels. Recently, Larsson and Vojcic proposed a bandwidth-efcient scheme based on superposition modulation [4]. In [4], for each user, the overheard information from its partner is processed and superimposed onto its own fresh information for cooperative transmission. By employing two maximum a posteriori (MAP) detectors and a MAP decoder, the destination node recovers the information of both users in a sliding-window fashion. This scheme outperforms the selective decode-and-forward (SDF) in [2] by 1.5-2 dB. In addition, the authors in [4] found by simulation that 7.5% - 20% of energy should be allocated to the superimposed information to achieve the best error-rate performance. Although the information-theoretic analysis of the scheme in [4] has been reported [5], [6], only limited works on the designing of practical schemes are found in the literature. For instance, the detection and decoding operations depicted in [4] are separated and it is suboptimal. Therefore, Manuscript received February 2, 2009; revised June 11, 2008 and August 28, 2009; accepted September 28, 2009. The associate editor coordinating the review of this letter and approving it for publication was R. J, Luo. The authors are with the School of Electrical Engineering and Telecommunications, University of New South Wales (e-mail: [email protected]; [email protected]). This work is supported by the Australian Research Council Discovery Project DP0879401 and National ICT Australia (NICTA) Research Project Award (NRPA). National ICT Australia is funded through the Australian Government’s backing Australia’s Ability initiative and in part through the Australia Research Council. Digital Object Identier 10.1109/TWC.2010.01.090159 joint detection and decoding, such as iterative detection and decoding (IDD) [7], [8], has yet to be investigated for this scheme. Moreover, no analytical result has been given with respect to the error-rate performance as well as the optimal power allocation for this user-cooperation strategy. In this paper, we investigate the superposition modulation- based cooperative diversity scheme with IDD. The proposed scheme has a number of distinct features as follows: 1) In the superimposing process at the cooperating user, random interleavers are introduced to facilitate the separation of the cooperating users at the destination [9], [10]. This enables the implementation of a low complexity linear detector. 2) At the destination receiver, the IDD is performed in a slide- window fashion. Each IDD process involves two multi-user detectors and three MAP decoders, where extrinsic informa- tion is exchanged among these components. In the proposed IDD, unlike the iterative multi-user detection (MUD) for code-division multiple-access (CDMA) and iterative MIMO detection, the extrinsic information is not only exchanged between a decoder and a detector, but is also exchanged among different coded blocks. Note that the structure of the proposed iterative receiver is different from that in [11] and our proposed iterative receiver has a smaller latency compared to that of [11]. At the heart of our method lies a number of multi-user detectors, where we focus on a low-complexity interference cancellation (IC) based detection [9], [12]. For quasi-static fading channels, we analyze the bit-error-probability (BEP) of the iterative receiver and prove that the scheme achieves a diversity order of two at high signal-to-noise ratios (SNRs). Then, we analytically show the optimal power allocation for the superposition modulation. At very high SNRs, the optimal power allocation is found to be an equal power allocation. By using Monte-Carlo simulation, we show that the proposed scheme is about 2-3.5 dB better than the benchmark scheme in [4] and it achieves the MAP detection performance. Moreover, the simulated BER is very close to the analyzed BEP for a wide range of SNRs. II. SYSTEM MODEL Let us consider a scenario where two single-antenna users, denoted by A and B, communicate with a common destination D by sending their own information and helping each other to forward their information. We consider a time-division-duplex (TDD) scheme in which A and B transmit in a succession of two time-slots. These two time-slots are referred to as a block. Let (AD) denote the link from user A to D. Other links are denoted by (AB), (BD) and (BA). In the th block, the channel coefcients for the above links are 1536-1276/10$25.00 c 2010 IEEE

Performance of iterative decoding for superposition modulation-based cooperative transmission

  • Upload
    jinhong

  • View
    212

  • Download
    0

Embed Size (px)

Citation preview

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 1, JANUARY 2010 51

Performance of Iterative Decoding forSuperposition Modulation-Based Cooperative Transmission

Tao Yang, Student Member, IEEE, and Jinhong Yuan, Member, IEEE

Abstract—In this paper, we propose a new superpositionmodulation-based cooperative scheme and investigate receiverswith iterative detection and decoding (IDD), where we focuson an interference cancellation (IC) detector. For quasi-staticfading environment, we analyze the bit-error-probability (BEP)of the proposed scheme and analytically show the optimal powerallocation in the superposition modulation. It is demonstratedthat the proposed scheme performs about 2-3.5 dB better thanthe system previously proposed in the literature and simulationresults are shown to be very close to the analytical results.In addition, the receiver with IC detectors achieves the MAPdetection performance in the scheme.

Index Terms—Cooperative communication, iterative decoding,superposition modulation, interference cancellation.

I. INTRODUCTION

USER-COOPERATION has been widely accepted as apromising technique to introduce spatial diversity in

wireless networks where a physical array is not applicable [1],[2]. Previous information-theoretic analysis in [2] has shownthat orthogonal cooperative schemes achieve full diversity. In[3], a non-orthogonal AF and a dynamic DF are shown tooutperform the orthogonal AF or DF. The drawback of the or-thogonal DF [2] is that using orthogonal time-slots for relayingis a suboptimal way of using the radio channels. Recently,Larsson and Vojcic proposed a bandwidth-efficient schemebased on superposition modulation [4]. In [4], for each user,the overheard information from its partner is processed andsuperimposed onto its own fresh information for cooperativetransmission. By employing two maximum a posteriori (MAP)detectors and a MAP decoder, the destination node recoversthe information of both users in a sliding-window fashion. Thisscheme outperforms the selective decode-and-forward (SDF)in [2] by 1.5-2 dB. In addition, the authors in [4] found bysimulation that 7.5% - 20% of energy should be allocated tothe superimposed information to achieve the best error-rateperformance. Although the information-theoretic analysis ofthe scheme in [4] has been reported [5], [6], only limitedworks on the designing of practical schemes are found in theliterature. For instance, the detection and decoding operationsdepicted in [4] are separated and it is suboptimal. Therefore,

Manuscript received February 2, 2009; revised June 11, 2008 and August28, 2009; accepted September 28, 2009. The associate editor coordinating thereview of this letter and approving it for publication was R. J, Luo.

The authors are with the School of Electrical Engineering andTelecommunications, University of New South Wales (e-mail:[email protected]; [email protected]).

This work is supported by the Australian Research Council DiscoveryProject DP0879401 and National ICT Australia (NICTA) Research ProjectAward (NRPA). National ICT Australia is funded through the AustralianGovernment’s backing Australia’s Ability initiative and in part through theAustralia Research Council.

Digital Object Identifier 10.1109/TWC.2010.01.090159

joint detection and decoding, such as iterative detection anddecoding (IDD) [7], [8], has yet to be investigated for thisscheme. Moreover, no analytical result has been given withrespect to the error-rate performance as well as the optimalpower allocation for this user-cooperation strategy.

In this paper, we investigate the superposition modulation-based cooperative diversity scheme with IDD. The proposedscheme has a number of distinct features as follows: 1) Inthe superimposing process at the cooperating user, randominterleavers are introduced to facilitate the separation of thecooperating users at the destination [9], [10]. This enablesthe implementation of a low complexity linear detector. 2)At the destination receiver, the IDD is performed in a slide-window fashion. Each IDD process involves two multi-userdetectors and three MAP decoders, where extrinsic informa-tion is exchanged among these components. In the proposedIDD, unlike the iterative multi-user detection (MUD) forcode-division multiple-access (CDMA) and iterative MIMOdetection, the extrinsic information is not only exchangedbetween a decoder and a detector, but is also exchanged amongdifferent coded blocks. Note that the structure of the proposediterative receiver is different from that in [11] and our proposediterative receiver has a smaller latency compared to that of[11].

At the heart of our method lies a number of multi-userdetectors, where we focus on a low-complexity interferencecancellation (IC) based detection [9], [12]. For quasi-staticfading channels, we analyze the bit-error-probability (BEP) ofthe iterative receiver and prove that the scheme achieves adiversity order of two at high signal-to-noise ratios (SNRs).Then, we analytically show the optimal power allocation forthe superposition modulation. At very high SNRs, the optimalpower allocation is found to be an equal power allocation.By using Monte-Carlo simulation, we show that the proposedscheme is about 2-3.5 dB better than the benchmark scheme in[4] and it achieves the MAP detection performance. Moreover,the simulated BER is very close to the analyzed BEP for awide range of SNRs.

II. SYSTEM MODEL

Let us consider a scenario where two single-antenna users,denoted by A and B, communicate with a common destinationD by sending their own information and helping each other toforward their information. We consider a time-division-duplex(TDD) scheme in which A and B transmit in a successionof two time-slots. These two time-slots are referred to as ablock. Let (A→D) denote the link from user A to D. Otherlinks are denoted by (A→B), (B→D) and (B→A). In the𝑘th block, the channel coefficients for the above links are

1536-1276/10$25.00 c⃝ 2010 IEEE

52 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 1, JANUARY 2010

Fig. 1. DF and superposition modulation operation at user B.

denoted by ℎ𝑘𝐴𝐷, ℎ𝑘

𝐴𝐵, ℎ𝑘𝐵𝐷 and ℎ𝑘

𝐵𝐴, respectively, and eachof them represents a flat fading channel realization. In thispaper, we assume that all these wireless links are subject toblock Rayleigh fading process where the channel coefficientsremain the same within each block but vary independentlyfrom block to block. The channel coefficients are mutuallyindependent and are perfectly known by the correspondingreceivers, but not known by the transmitters. Note that thissetup is based on that in [2] and no time diversity, frequencydiversity can be achieved.

Let two vectors, 𝐴𝑘 and 𝐵𝑘, 𝑘 = 1, 2, ... , 𝑁, denote thei.i.d coded sequences to be transmitted by user A and user B inthe 𝑘th block, respectively. Each vector contains 𝐿 informationbits or 𝑇 coded bits. Two random interleavers, denoted by𝜋𝐴 and 𝜋𝐵 , are employed to permute user A’s and user B’sencoded bits. The interleaved coded sequences are denoted by𝜋𝐴(𝐴𝑘) and 𝜋𝐵(𝐵𝑘), 𝑘=1, 2, ... ,𝑁 . In this paper, we employBPSK so that the elements in 𝐴𝑘 and 𝐵𝑘 belong to the set of{−1, 1} after modulation.

In the first block (𝑘=1), user A transmits itsown BPSK-modulated signal sequence x1

𝐴 =[𝑥1𝐴(1), ..., 𝑥

1𝐴(𝑡), ..., 𝑥

1𝐴(𝑇 )

]where x1

𝐴 = 𝜋𝐴(𝐴1) isthe interleaved symbol sequence and 𝑥1

𝐴(𝑡) is the transmittedsymbol at time 𝑡. While user A is transmitting, user B canoverhear A’s transmitted signal which is written as

r1𝐵 = ℎ1𝐴𝐵x

1𝐴 + n1

𝐵 (1)

where n1𝐵 is the additive white Gaussian noise (AWGN)

sequence at node B whose variance is 𝜎2𝐴𝐵 . Let the SNR

of the inter-user channel be denoted by 𝑆𝑁𝑅𝐴𝐵, we have𝜎2𝐴𝐵 = 1/𝑆𝑁𝑅𝐴𝐵 by letting the average transmitted symbol

energy be a unit. After user A’s transmission, user B attemptsto decode user A’s information. At this stage, there are twocases:

Case 1) If the decoding at B is successful, B re-encodes userA’s information, with either the same or a different codebook,yielding a re-encoded sequence 𝐴′

1. In this paper, we adoptthe same mechanism as in [4] where the same codebook isused in the re-encoding process. The re-encoded information isinterleaved and superimposed onto user B’s fresh information𝜋𝐵(𝐵1), subjected to a total power constraint. The signalsequence transmitted by user B in the second time-slot of thefirst block is

x1𝐵 =

√1− 𝛾2𝜋𝐵(𝐵1) + 𝛾𝜋𝐴(𝐴

′1), (2)

where 𝛾2 ≤ 0.5 is the fraction of power allocated to thesuperimposed signal and the process is depicted in Fig. 1.

Case 2) If the decoding at user B fails, user B ignores theover-heard information and transmits only its own information𝜋𝐵(𝐵1) with full power, that is x1

𝐵 = 𝜋𝐵(𝐵1). It is notewor-thy that the signal transmitted by user B can also be overheard

by user A. The overheard information is given by

r1𝐴 = ℎ1𝐵𝐴x

1𝐵 + n1

𝐴 (3)

Upon receiving r1𝐴, A removes the superimposed 𝛾𝜋𝐴(𝐴′1)

and try to decode B’s information. If the decoding is success-ful, A re-encodes B’s information. The re-encoded informationis interleaved and superimposed onto A’s fresh information𝜋𝐴(𝐴2). The resultant signal transmitted by user A in thesecond block is

x2𝐴 =√1− 𝛾2𝜋𝐴(𝐴2) + 𝛾𝜋𝐵(𝐵

′1), (4)

where 𝐵′1 denotes the re-encoded sequence of 𝐵. If the

decoding at A fails, on the other hand, user A ignores theoverheard information and transmits only 𝜋𝐴(𝐴2) with fullpower.

In order to decode the information, the receivers must knowwhether there is a superimposed information or not. This canbe accomplished by introducing a “flag bit” in the head ofeach packet. In the sequel, we assume that this “flag bit” isalways perfectly known by the receivers. The above processcontinues and the transmission is depicted in Fig. 2. Note thateach block consists of two time-slots. In general, in the 𝑘thblock, the signal sequence received by user A and B are

r𝑘𝐴 = ℎ𝑘𝐵𝐴x

𝑘𝐵 + n𝑘

𝐴, r𝑘𝐵 = ℎ𝑘𝐴𝐵x

𝑘𝐴 + n𝑘

𝐵, (5)

respectively, where n𝑘𝐴 and n𝑘

𝐵 are the AWGN sequences atnodes A and B, respectively and the noise variance is equalto 𝜎2

𝐴𝐵 = 1/𝑆𝑁𝑅𝐴𝐵. In the 𝑘th block, the signal sequencesreceived by the destination node are given by

y𝑘𝐴 = ℎ𝑘

𝐴𝐷x𝑘𝐴 + n𝑘

𝐴,𝐷, y𝑘𝐵 = ℎ𝑘

𝐵𝐷x𝑘𝐵 + n𝑘

𝐵,𝐷 (6)

where n𝑘𝐴,𝐷 and n𝑘

𝐵,𝐷 are the additive noise sequences atthe destination whose variances are 𝜎2=1/𝑆𝑁𝑅, where 𝑆𝑁𝑅denotes the average SNR of the user-to-destination channels.Here, we assume that the average SNRs for the two users atthe destination are the same. Generally, the average SNR ofthe inter-user channel is not necessarily equal to that of theuser-to-destination channels. In this paper, we are interestedin the cases that 𝑆𝑁𝑅𝐴𝐵 ≥ 𝑆𝑁𝑅 which applies when thedistance between two users is not greater than that between auser to the destination. In this setting, user-cooperation withDF mechanism could be of more interests.

III. ITERATIVE RECEIVERS FOR SUPERPOSITION

MODULATION-BASED USER-COOPERATION

Before presenting the iterative receiver, we briefly explainthe effects of latency requirement, given as follows: Uponcollecting y1

𝐴,...,y𝑘𝐴 and y1

𝐵,...,y𝑘𝐵 , the receiver is required to

recover user A’s information bits up to the 𝑘th block, where𝑘=1, 2,..., 𝑁 . For user B, upon collecting y2

𝐴,...,y𝑘+1𝐴 and

y1𝐵 ,...,y

𝑘𝐵 , the receiver need to recover user B’s information

bits up to the 𝑘th block. Due to this latency requirementand the block-fading constraint, coding/decoding over multiplefading blocks can not be realized and there is no time diversityin the system.

The block diagram of the iterative receiver is shown in Fig.3 where we focus on the decoding of user B’s information inthe 𝑘th block. The receiver consists of two detectors which

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 1, JANUARY 2010 53

Fig. 2. Illustration of cooperation transmission for two users (where the power allocation factor is neglected).

are assigned for y𝑘𝐵 and y𝑘+1

𝐴 . The detectors compute thelog-likelihood ratios (LLRs) for the coded bits of each user.The iterative receiver also consists of three decoders for thedecoding of 𝐴′

𝑘 , 𝐵𝑘 and 𝐴𝑘+1. The detectors and decodersare connected with appropriate interleavers/de-interleavers andextrinsic information is exchanged [13] among these compo-nents.

To illustrate the iterative receiver, for simplicity, we assumethat there is always a superimposed information in the trans-mitted signal. Let 𝑥𝑘

𝐴(𝑡) and 𝑥𝑘𝐵(𝑡) be the 𝑡-th element in the

transmitted signal sequences x𝑘𝐴 and x𝑘

𝐵 , respectively. For thedestination, let 𝑦𝑘𝐴(𝑡) and 𝑦𝑘𝐵(𝑡) be the 𝑡-th element in thereceived signal sequences y𝑘

𝐴 and y𝑘𝐵 , respectively. Since the

detection is performed in a symbol-by-symbol manner [9],[12], for the ease of presentation, we omit the index 𝑡 andjust use 𝜋𝐵(𝐵𝑘) and 𝜋𝐴(𝐴

′𝑘) to denote the 𝑡-th symbol of the

interleaved 𝐵𝑘 and 𝐴′𝑘, respectively. Then, the signals received

by the destination for the two time-slots relative to 𝐵𝑘 arewritten as

𝑦𝑘𝐵 = ℎ𝑘𝐵𝐷

[√1− 𝛾2𝜋𝐵(𝐵𝑘)+𝛾𝜋𝐴(𝐴

′𝑘)]+ 𝑛𝑘

𝐷,𝐵, (7)

𝑦𝑘+1𝐴 = ℎ𝑘+1

𝐴𝐷

[√1− 𝛾2𝜋𝐴(𝐴𝑘+1) + 𝛾𝜋𝐵(𝐵

′𝑘)]+𝑛𝑘+1

𝐷,𝐴 (8)

where 𝑛𝑘𝐷,𝐴 (or 𝑛𝑘

𝐷,𝐵) denotes the AWGN at the destinationwhile A (or B) is transmitting. To decode user B’s informationof the 𝑘th block, we consider that the decoding of user A’sinformation of the 𝑘th block has just finished and we have thea priori LLR on 𝐴′

𝑘, denoted by 𝜆𝐴(𝐴′𝑘) . Each iteration in

the IDD for this decoding stage involves the following steps:Step 1: The detectors take the signals 𝑦𝑘𝐵 and 𝑦𝑘+1

𝐴 ,the a priori information from the decoders and the a prioriknowledge on 𝐴′

𝑘 from the previous decoding stage to produceextrinsic LLRs. As shown in Fig. 3, the first detector generatethe extrinsic LLRs 𝜆(𝐴′

𝑘) and 𝜆(𝐵𝑘) w.r.t. 𝐴′𝑘 and 𝐵𝑘. The

second detector generates the LLRs 𝜆(𝐵′𝑘) and 𝜆(𝐴𝑘+1). The

details of computing these LLRs will be given later in thissection.

Step 2: The LLRs related to 𝐵𝑘 are 𝜆(𝐵𝑘) and 𝜆(𝐵′𝑘).

Since the source and relay use the same code, the optimaloperation to combine the LLR values of 𝐵𝑘 from the twodifferent detectors is to sum up the two LLRs 𝜆(𝐵𝑘) and𝜆(𝐵′

𝑘). The combined LLR is denoted by 𝜑(𝐵𝑘) and we have𝜑(𝐵𝑘) = 𝜆(𝐵𝑘)+𝜆(𝐵′

𝑘).

Step 3: The resultant combined LLR 𝜑(𝐵𝑘) is forwardedto DEC B𝑘. Then, DEC B𝑘 carries out MAP decoding [13]

Fig. 3. Iterative receiver for the cooperative scheme, where 𝑒𝐷𝐸𝐶(𝐴𝑘) standsfor the extrinsic information generated by DEC A𝑘 .

to extract extrinsic information, which is computed as

𝑒𝑐(𝐵𝑘) = 𝜆𝑐(𝐵𝑘)− 𝜆(𝐵𝑘), 𝑒𝑐(𝐵′𝑘) = 𝜆𝑐(𝐵𝑘)− 𝜆(𝐵′

𝑘) (9)

where 𝜆𝑐(𝐵𝑘) is the a posteriori LLR [13] generated by DECB𝑘 . Meanwhile, the LLRs for 𝐴′

𝑘 and 𝐴𝑘+1 are also forwardedto DEC A𝑘 and DEC A𝑘+1, respectively. Then, DEC A𝑘 andDEC A𝑘+1 updates the extrinsic information on 𝐴′

𝑘 and 𝐴𝑘+1.Step 4: The extrinsic information is fed back to the two

detectors to improve the a priori knowledge, hence improvethe detectors’ output in the next iteration. Then, the iterativereceiver goes back to Step 1.

It is noteworthy that, before Step 3, unlike the operation for𝐵𝑘 and 𝐵′

𝑘, there is no information combining for either 𝐴′𝑘

or 𝐴𝑘+1. This is due to the fact that, in this decoding stage,the decision on 𝐴𝑘 has already been made and the signalwhich includes 𝐴′

𝑘+1 has not yet been collected. At the finaliteration, the LLRs on 𝐵′

𝑘 will be reserved and used in the nextdecoding stage where A’s information of the (𝑘+1)th block isrecovered.

The MAP detector considered in [4] has two drawbacksbeing: 1) the complexity of MAP detector is exponential to thenumber of users. 2) it is difficult to analyze its performance.A linear IC detector can be used as an efficient alternativeto the MAP detector, since its complexity is linear to thenumber of users. Again, we focus on detecting B’s informationin the 𝑘th block. Considering the other user’s information asinterference, we may write the relevant received signals as

𝑦𝑘𝐵 = ℎ𝑘

𝐵𝐷

√1− 𝛾2𝜋𝐵(𝐵𝑘) + 𝜉𝑘𝐵 , 𝑦𝑘+1

𝐴 = ℎ𝑘+1𝐴𝐷 𝛾𝜋𝐵(𝐵

′𝑘) + 𝜉𝑘𝐵′ ,

(10)

54 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 1, JANUARY 2010

where𝜉𝑘𝐵 = ℎ𝑘

𝐵𝐷𝛾𝜋𝐴(𝐴′𝑘) + 𝑛𝑘

𝐷,𝐵

and𝜉𝑘𝐵′ = ℎ𝑘+1

𝐴𝐷

√1-𝛾2𝜋𝐴(𝐴𝑘+1) + 𝑛𝑘+1

𝐷,𝐴

are the interference plus noise for 𝐵𝑘 and 𝐵′𝑘. We use 𝐸

(𝜉𝑘𝐵)

and 𝐸(𝜉𝑘𝐵′)

to denote the estimated mean of the interferenceplus noise terms 𝜉𝑘𝐵 and 𝜉𝑘𝐵′ , respectively. The estimatedvariances of the interference plus noise terms are denoted by𝑉 𝑎𝑟(𝜉𝑘𝐵) and 𝑉 𝑎𝑟(𝜉𝑘𝐵′ ), respectively. Note that 𝐸(𝜉𝑘𝐵) and𝑉 𝑎𝑟(𝜉𝑘𝐵) are the estimated statistics, rather than the genuinestatistics. The genuine statistics are not known a priori. Theyare estimated from the decoders’ extrinsic outputs [9] and thedetails will be shown later, in Equations (13), (15) and (16).

By approximating 𝜉𝑘𝐵 and 𝜉𝑘𝐵′ as conditional Gaussianrandom variables, we can compute the extrinsic output ofthe IC detector for each coded bit independently. Again, weneglect the notations of interleavers in the sequel. For 𝐵𝑘, theoutput LLR from the IC detector is

𝜆(𝐵𝑘) = log𝑃 (𝐵𝑘 = 1∣𝑦𝑘

𝐵)

𝑃 (𝐵𝑘 = −1∣𝑦𝑘𝐵)

=2ℎ𝑘

𝐵𝐷

√1− 𝛾2

𝑉 𝑎𝑟(𝜉𝑘𝐵)

[𝑦𝑘𝐵 − 𝐸(𝜉𝑘𝐵)

].

(11)and we see that the estimated mean of the interference iscancelled from the received signal to compute the LLR. Themethod is referred to as interference cancellation [7], [14],[15]. Similarly, the LLR for 𝐵′

𝑘 is

𝜆(𝐵′𝑘) =

2ℎ𝑘+1𝐴𝐷 𝛾

𝑉 𝑎𝑟(𝜉𝑘𝐵′ )

[𝑦𝑘+1𝐴 − 𝐸(𝜉𝑘𝐵′ )

]. (12)

To find (11),(12), we need to find the mean and variance ofthe interference plus noise. These statistics are estimated fromthe decoder’s extrinsic output. In particular, the means of 𝜉𝑘𝐵and 𝜉𝑘𝐵′ are estimated as

𝐸(𝜉𝑘𝐵

)= ℎ𝑘

𝐵𝐷𝛾𝐸(𝐴′𝑘) ≈ ℎ𝑘

𝐵𝐷𝛾𝐸 [𝑒𝑐(𝐴𝑘′)] ,

𝐸(𝜉𝑘𝐵′)= ℎ𝑘+1

𝐴𝐷

√1-𝛾2𝐸(𝐴𝑘+1) ≈ ℎ𝑘+1

𝐴𝐷

√1-𝛾2𝐸 [𝑒𝑐(𝐴𝑘+1)]

(13)

where 𝑒𝑐(𝐴𝑘′ ) and 𝑒𝑐(𝐴𝑘+1) are the output extrinsic LLRsfrom the decoders DEC A𝑘 and DEC A𝑘+1. The approxima-tion in (13) is obtained because the mean of the interferingsignal 𝐸(𝐴′

𝑘) is estimated by 𝐸 [𝑒𝑐(𝐴𝑘′)]. Also, we have [9],[14]

𝐸 [𝑒𝑐(𝐴𝑘′ )] = tanh [𝑒𝑐(𝐴𝑘′ )/2] ,

𝐸 [𝑒𝑐(𝐴𝑘+1)] = tanh [𝑒𝑐(𝐴𝑘+1)/2] . (14)

The variances are computed as

𝑉 𝑎𝑟(𝜉𝑘𝐵)=∣∣ℎ𝑘

𝐵𝐷

∣∣2 𝛾2𝑉 𝑎𝑟(𝐴′𝑘) + 𝜎2 (15)

≈ ∣∣ℎ𝑘𝐵𝐷

∣∣2 𝛾2{1− [𝐸 (𝑒𝑐(𝐴𝑘′ ))]

2}+ 𝜎2

𝑉 𝑎𝑟(𝜉𝑘𝐵′)=∣∣ℎ𝑘+1

𝐴𝐷

∣∣2 (1 − 𝛾2)𝑉 𝑎𝑟(𝐴𝑘+1) + 𝜎2 (16)

≈ ∣∣ℎ𝑘+1𝐴𝐷

∣∣2 (1 − 𝛾2){1− [𝐸 (𝑒𝑐(𝐴𝑘+1))]

2}+ 𝜎2

where [9]

𝑉 𝑎𝑟(𝐴′𝑘) ≈ 1−[𝐸 (𝑒𝑐(𝐴𝑘′))]2 , 𝑉 𝑎𝑟(𝐴𝑘+1) ≈ 1−[𝐸 (𝑒𝑐(𝐴𝑘+1))]

2 .(17)

As the receiver iterates, the extrinsic LLRs from the de-coders are improved and the estimated statistics are updated,and this contributes to improved IC detector’s output.

IV. PERFORMANCE ANALYSIS AND POWER ALLOCATION

A. Strong Inter-user Channel

1) Conditional Pair-wise Error Probability (PEP): We firstconsider a case where each user can successfully decodeits partners information. This condition will be relaxed later.Generally, analyzing the performance of a scheme with IDDinvolves convergence analysis. Here, we just focus on derivingthe asymptotic conditional PEP of the scheme at high SNRs.Let 𝐴𝑘=𝐸 [𝑒𝑐(𝐴𝑘)] represent the decoder’s estimate on 𝐴𝑘 andsign(𝐴𝑘) represent the hard-decision of 𝐴𝑘 , where 𝐸 [𝑒𝑐(𝐴𝑘′ )]is given in (14). The variance of the residual interference afterthe soft cancellation is 𝐸(𝐴𝑘 −𝐴𝑘)

2 and that after the hard-decision cancellation is 𝐸(𝐴𝑘−sign(𝐴𝑘))

2. Before providingthe result on the asymptotic conditional PEP, we first presentan assumption.

Assumption 1: The variance of soft-cancellation is on thesame order of that of the hard-cancellation, i.e.,

𝐸(𝐴𝑘 −𝐴𝑘)2 = 𝐾 ⋅ 𝐸(𝐴𝑘 − sign(𝐴𝑘))

2, (18)

where 𝐾 is of a finite value.The physical meaning of the assumption is that, if

the variance of the hard-cancellation is finite, the vari-ance of the soft-cancellation is also finite, i.e. 𝐸(𝐴𝑘 −𝐴𝑘)

2/𝐸(𝐴𝑘−sign(𝐴𝑘))2 ∕= ∞. Here, the exact value of 𝐾

in (18) is not important. As long as K is finite, we can proveLemma 1, which will be given later. It is demonstrated thatAssumption 1 holds in the IDD for many applications [7], [9],[14]. As shown in [9], the difference between 𝐸(𝐴𝑘 − 𝐴𝑘)

2

and 𝐸(𝐴𝑘−sign(𝐴𝑘)) is tiny at a high SNR. Now, let uspresent a lemma for the conditional PEP of the schemefollowed by the proof.

Lemma 1: For sufficiently strong inter-user channel, asSNR−→ ∞ (or 𝜎2 −→ 0), the asymptotic PEP conditionedon ℎ𝑘

𝐵𝐷 and ℎ𝑘+1𝐴𝐷 for user B in the 𝑘th block approaches (19)

where 𝑄(𝑥) = 1√2𝜋

∫∞𝑥

exp(− 𝑡2

2

)𝑑𝑡 and 𝑑 is the Hamming

distance between two codewords.Proof: For the proposed scheme with IC detectors, the

signals with respect to 𝐵𝑘 are written as

𝑦𝑘𝐵 = ℎ𝑘𝐵𝐷

√1− 𝛾2𝜋𝐵(𝐵𝑘) + 𝜂1 + 𝑛𝑘

𝐷,𝐵, (20)

𝑦𝑘+1𝐴 = ℎ𝑘+1

𝐴𝐷 𝛾𝜋𝐵(𝐵′𝑘) + 𝜂2 + 𝑛𝑘+1

𝐷,𝐴, (21)

where 𝜂1=ℎ𝑘𝐵𝐷𝛾(𝐴′

𝑘-𝐴′𝑘) and 𝜂2=ℎ

𝑘+1𝐴𝐷

√1-𝛾2(𝐴𝑘+1-𝐴𝑘+1)

are the residual interference after IC, 𝐴′𝑘 and 𝐴𝑘+1 are

the decoder’s soft estimation on 𝐴′𝑘 and 𝐴𝑘+1. Since the

interference plus noise for 𝑦𝑘𝐵 and 𝑦𝑘+1𝐴 are not correlated,

these two signals can be combined with a MRC to form adecision statistic for user B. After the MRC, the SINR is given

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 1, JANUARY 2010 55

𝑃𝑃𝐸𝑃ℎ𝑘𝐵𝐷 ,ℎ𝑘+1

𝐴𝐷

(𝛾2, 𝑑)→ 𝑄

⎛⎜⎜⎝√√√⎷2𝑑

[∣∣ℎ𝑘𝐵𝐷

∣∣2 +(∣∣ℎ𝑘+1

𝐴𝐷

∣∣2 − ∣∣ℎ𝑘𝐵𝐷

∣∣2) 𝛾2]

𝜎2

⎞⎟⎟⎠ (19)

by

𝜌𝑘𝐵(𝛾)=

[∣∣ℎ𝑘𝐵𝐷

∣∣2 (1− 𝛾2)]

∣∣ℎ𝑘𝐵𝐷

∣∣2 𝛾2𝐸(𝐴′𝑘 −𝐴′

𝑘)2 + 𝜎2

(22)

+

[∣∣ℎ𝑘+1𝐴𝐷

∣∣2 𝛾2]

∣∣ℎ𝑘+1𝐴𝐷

∣∣2 (1− 𝛾2)𝐸(𝐴𝑘+1 −𝐴𝑘+1)2 + 𝜎2

Now, let us investigate the relation between the vari-ance of the residual interference and the noise variancein (22). We will show that as SNR goes to infinity,

the variances of interferences∣∣ℎ𝑘

𝐵𝐷

∣∣ 𝛾2𝐸(𝐴′

𝑘 −𝐴′𝑘

)2and∣∣ℎ𝑘+1

𝐴𝐷

∣∣2 (1− 𝛾2)𝐸(𝐴𝑘+1 −𝐴𝑘+1

)2are negligible com-

pared to the noise variance 𝜎2. Given Assumption 1, thevariances of the residual interference in (22) become

𝐸(𝐴′𝑘-𝐴′

𝑘)2 = 𝐾 ⋅𝐸[𝐴′

𝑘-sign(𝐴′𝑘)]

2 = 4𝐾 ⋅ 𝑃𝑒(𝐴′𝑘), (23)

𝐸(𝐴𝑘+1-𝐴𝑘+1)2 = 𝐾 ⋅𝐸[𝐴𝑘+1-sign(𝐴𝑘+1)]

2=4𝐾 ⋅ 𝑃𝑒(𝐴𝑘+1)

where 𝑃𝑒(𝐴′𝑘) and 𝑃𝑒(𝐴𝑘+1) are the bit error probabilities

(BEPs) of the decoder’ hard-decision output. The instanta-neous SINR in (22) becomes

𝜌𝑘𝐵(𝛾2) =

[∣∣ℎ𝑘𝐵𝐷

∣∣2 (1− 𝛾2)]

4∣∣ℎ𝑘

𝐵𝐷

∣∣2 𝛾2𝐾 ⋅ 𝑃𝑒(𝐴′𝑘) + 𝜎2

(24)

+

[∣∣ℎ𝑘+1𝐴𝐷

∣∣2 𝛾2]

4∣∣ℎ𝑘+1

𝐴𝐷

∣∣2 (1− 𝛾2)𝐾 ⋅ 𝑃𝑒(𝐴𝑘+1) + 𝜎2.

Note that the channel coefficients, power allocation 𝛾2 and 𝐾are finite. As SNR→ ∞, we can show that

lim𝜎2→0

𝑃𝑒(𝐴′𝑘)

𝜎2= 0, lim

𝜎2→0

𝑃𝑒(𝐴𝑘+1)

𝜎2= 0. (25)

Given (25), as the SNR goes to infinity, the SINR in (24)becomes

𝜌𝑘𝐵(𝛾2)=

[∣∣ℎ𝑘𝐵𝐷

∣∣2 (1-𝛾2)]

4∣∣ℎ𝑘

𝐵𝐷

∣∣2 𝛾2𝐾𝑃𝑒(𝐴′𝑘) + 𝜎2

(26)

+

[∣∣ℎ𝑘+1𝐴𝐷

∣∣2 𝛾2]

4∣∣ℎ𝑘+1

𝐴𝐷

∣∣2 (1− 𝛾2)𝐾𝑃𝑒(𝐴𝑘+1) + 𝜎2

→[∣∣ℎ𝑘

𝐵𝐷

∣∣2 (1-𝛾2)]+[∣∣ℎ𝑘+1

𝐴𝐷

∣∣2 𝛾2]

𝜎2

for any finite values∣∣ℎ𝑘

𝐵𝐷

∣∣ , ∣∣ℎ𝑘+1𝐴𝐷

∣∣2 , 𝛾2 and 𝐾 . The proof of(25) is given in Appendix. Then, (19) is obtained.

From Lemma 1, we see that the conditional PEP at highSNRs is determined by the channel coefficients, the powerallocation factor and the noise variance, but not by theinterference. This shows that when the users can cooperate,the scheme asymptotically achieves the interference-free per-formance at high SNRs.

2) Average PEP and BEP: Now, let us find the averagePEP of the scheme. For Rayleigh fading channels where ℎ𝐵𝐷

and ℎ𝐴𝐷 follow 𝐶𝑁(0, 1), the PEP is given in the followingtheorem.

Theorem 1: As the SNR−→ ∞, the PEP of the proposedscheme with an IC detectors approaches

𝑃𝑃𝐸𝑃 (𝛾2, 𝑑) −→[

3

16𝑑2(1− 𝛾2)𝛾2

]𝑆𝑁𝑅−2 (27)

provided that the inter-user channel is sufficiently strong thatthe users can cooperate.

Proof: The SINR 𝜌𝑘𝐵(𝛾2) in (26) follows a generalized

Chi-square distribution whose PDF is

𝑝[𝜌𝑘𝐵(𝛾

2) = 𝑎]=

∂𝑃{𝜌𝑘𝐵(𝛾) < 𝑎

}∂𝑎

(28)

=1

2𝛾2 − 1

[exp(− 𝑎

𝛾2)− exp(− 𝑎

1− 𝛾2)

].

By averaging the conditional PEP in (19) over the PDF ofthe SINR, the PEP is given by

𝑃𝑃𝐸𝑃 (𝛾2, 𝑑) →1

2

𝛾2

2𝛾2-1

[1-

√1

1+ 1𝑆𝑁𝑅⋅𝑑⋅𝛾2

]

− 1

2

1-𝛾2

2𝛾2-1

[1-

√1

1+ 1𝑆𝑁𝑅⋅𝑑⋅(1−𝛾2)

](29)

Using the fact that√1

1 + 𝑥= 1− 1

2𝑥+

3

8𝑥2+𝑂(

1

𝑥2), (30)

at high SNRs, we obtain (27) and that completes the proof.

From Theorem 1, we see that when the inter-user channelis sufficiently strong, the scheme achieves a diversity order oftwo. The optimal power allocation that minimizes the PEP isgiven in the following corollary.

Corollary 1: As the SNR−→ ∞, if the two users cancooperate, the minimum PEP of the scheme is achieved withan equal power allocation, that is 𝛾2 =1− 𝛾2 = 1

2 .Proof: At high SNRs, we have

𝑃𝑃𝐸𝑃 (𝛾2, 𝑑) −→[

3

16𝑑2(1− 𝛾2)𝛾2

]𝑆𝑁𝑅−2 ≥ 3

4𝑑2𝑆𝑁𝑅−2,

(31)where we use the fact that√

(1 − 𝛾2)𝛾 ≤ (1− 𝛾2) + 𝛾2

2=

1

2. (32)

The smallest value of the 𝑃𝑃𝐸𝑃 (𝛾2, 𝑑) is achieved when 𝛾2 =1− 𝛾2 = 1/2 and Corollary. 1 is proved.

The result in Corollary 1 is different from that given in [4]which shows by simulation that the best power allocation isabout 𝛾2=0.15, where iterative receiver is not employed.

56 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 1, JANUARY 2010

For block fading channels, we now derive a partial limit-before-averaging (LBA) bound [16], [17] to the BEP, whichcan be readily shown as

𝑃 𝑏𝑖𝑡(𝛾2) ≈∫ ∞

0

min

[4∑

𝑖=0

𝑒(𝑑𝑓𝑟𝑒𝑒+𝑖)𝑄

(√2𝑑𝑓𝑟𝑒𝑒+𝑖𝜌𝑘𝐵(𝛾

2)

),1

2

]⋅ 𝑝[𝜌𝑘𝐵(𝛾

2)]𝑑𝜌𝑘𝐵(𝛾

2) (33)

where the SINR 𝜌𝑘𝐵(𝛾) is given in (26). Moreover,𝑒(𝑑), 𝑑=𝑑𝑓𝑟𝑒𝑒,..., 𝑑max, is the error-weighted distance spec-trum, 𝑑𝑓𝑟𝑒𝑒 is the free-distance of the channel code and 𝑑max

is the maximum Hamming distance considered in evaluatingthe error-weighted distance spectrum. For example, in thispaper, we consider a system with a half-rate convolutionalcode and generator polynomials [23, 35]8. The free distanceis 𝑑𝑓𝑟𝑒𝑒 = 7 and the error-weighted distance spectrum can befound in [19].

B. General Cases

Now, we generalize the analysis to cases of arbitrary inter-user channel quality. If the instantaneous inter-user channel∣∣ℎ𝑘

𝐴𝐵

∣∣2 𝑆𝑁𝑅 is weak, a user may not be able to decodeits partner’s information and the cooperative scheme boilsdown to a direct transmission. Given an inter-user channelcoefficient ℎ𝐴𝐵 , the probability of unsuccessful decoding isrelated to the bit error probability (BEP) of the inter-userdecoding. Considering a block fading channel scenario with𝐿 information bits per block, the LBA bound on the BEP isgiven in (34) (see next page) where (35) (see next page).

Note that the term{1-[1-𝑃 𝑏𝑖𝑡

ℎ𝐴𝐵(𝛾2)]𝐿}

in (34) is theconditional frame error probability (FEP) of the inter-userchannel given ℎ𝐴𝐵 and a frame length of 𝐿.

Given (34), the optimal power allocation factor is given by

𝛾2𝑜𝑝𝑡 = argmin

𝛾2𝑃 𝑏𝑖𝑡(𝛾2). (36)

Unfortunately, there is no close-form solution to (36) since theBEP given in (35) is non-linear. For general cases, 𝛾2

𝑜𝑝𝑡 canonly be found numerically. However, at high SNR, we havethe following Theorem:

Theorem 2: For general cases, the PEP of the proposedcooperative scheme approaches

𝑃𝑃𝐸𝑃 (𝛾2, 𝑑) →[

3

16𝑑2(1− 𝛾2)𝛾2

]𝑆𝑁𝑅−2. (37)

Proof: As SNR approaches infinity, we obtain (38)Moreover, we can find

[1-𝑃 𝑏𝑖𝑡

ℎ𝐴𝐵(𝛾2)]𝐿 𝑆𝑁𝑅→∞−→ 1, 1-[

1-𝑃 𝑏𝑖𝑡ℎ𝐴𝐵

(𝛾2)]𝐿 𝑆𝑁𝑅→∞−→ 𝐿 ⋅ 𝑃 𝑏𝑖𝑡

ℎ𝐴𝐵(𝛾2) for a finite 𝐿. As a

result, for a very high SNR, we have (39) where the last stepderivation is due to the fact that

lim𝑆𝑁𝑅→∞

𝐿𝑃 𝑏𝑖𝑡ℎ𝐴𝐵

(𝛾2)

𝑆𝑁𝑅−1= 0

for any finite 𝐿, since 𝑃 𝑏𝑖𝑡ℎ𝐴𝐵

(𝛾2) decreases exponentially with𝑆𝑁𝑅. Theorem 2 has now been proved.

10 12 14 16 18 20 22 24 26 28 3010

−5

10−4

10−3

10−2

SNR(dB)

BE

R

Larrson & VojcicIterative receiver with MAP detectorsIterative receiver with IC detectorsPredicted performance

Fig. 4. Performance of the iterative receivers with a convolutional code,SNR𝐴𝐵=SNR.

10 12 14 16 18 20 22 24 26 28 3010

−5

10−4

10−3

10−2

SNR(dB)

BE

R

Larrson & Vojcic scheme with Convolutional codeProposed scheme with Convolutional codeGene−aided with Convolutional codeLarrson & Vojcic scheme with Turbo codeProposed scheme with a Turbo codeGene−aided with a Turbo code

Fig. 5. Performance of the iterative receivers with a convolutional code anda turbo code, SNR𝐴𝐵=SNR.

V. SIMULATIONS

In this section, we show the performance of the proposedschemes. The simulation environment is depicted as follows:The channel coefficients follow Rayleigh distribution and theyremain constant for at least one block. The average SNRsof user-to-destination channels are the same, i.e. SNR𝐴𝐷 =SNR𝐵𝐷, and they are equal to the benchmark SNR. The SNRof the inter-user channel SNR𝐴𝐵 is not necessarily the same asSNR and we are interested in the cases that SNR𝐴𝐵≥SNR, i.e.SNR𝐴𝐵(dB)=SNR(dB) or SNR𝐴𝐵(dB)=SNR(dB)+20dB.Weadopt baseband BPSK modulation and employ a rate 1/2 non-systematic convolutional code and turbo code, where there are256 information bits for each time-slot. In each IDD operation,five iterations are performed.

First of all, we consider a system with equal power alloca-tion. The scheme in [4] serves as the benchmark system, where15% of transmission energy is allocated to the superimposed

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 1, JANUARY 2010 57

𝑃 𝑏𝑖𝑡(𝛾2) ≈∫ ∞

0

{[1-𝑃 𝑏𝑖𝑡

ℎ𝐴𝐵(𝛾2)

]𝐿 ∫ ∞

0

min

[4∑

𝑖=0

𝑒(𝑑𝑓𝑟𝑒𝑒+𝑖)𝑄

(√2𝑑𝑓𝑟𝑒𝑒+𝑖𝜌𝑘𝐵(𝛾

2)

),1

2

]𝑝[𝜌𝑘𝐵(𝛾

2)]𝑑𝜌𝑘𝐵(𝛾

2) (34)

+

(1-[1-𝑃 𝑏𝑖𝑡

ℎ𝐴𝐵(𝛾2)

]𝐿)∫ ∞

0

min

⎡⎣ 4∑𝑖=0

𝑒(𝑑𝑓𝑟𝑒𝑒+𝑖)𝑄

⎛⎝√2𝑑𝑓𝑟𝑒𝑒+𝑖 ∣ℎ𝐵𝐷∣2𝜎2

⎞⎠ ,1

2

⎤⎦(𝑝 ∣ℎ𝐵𝐷∣2) 𝑑 ∣ℎ𝐵𝐷∣2⎫⎬⎭ 𝑝

(∣ℎ𝐴𝐵 ∣2) 𝑑 ∣ℎ𝐴𝐵 ∣2

𝑃 𝑏𝑖𝑡ℎ𝐴𝐵

(𝛾2) ≈ min

[4∑

𝑖=0

𝑒(𝑑𝑓𝑟𝑒𝑒+𝑖)𝑄

(√2𝑑𝑓𝑟𝑒𝑒+𝑖 ∣ℎ𝐴𝐵∣2 (1-𝛾2)

),1

2

]. (35)

𝑃 𝑏𝑖𝑡ℎ𝐴𝐵

(𝛾2)=min

⎡⎣ 4∑𝑖=0

𝑒(𝑑𝑓𝑟𝑒𝑒+𝑖)𝑄

⎛⎝√2𝑑𝑓𝑟𝑒𝑒+𝑖 ∣ℎ𝐴𝐵∣2 (1-𝛾2)

𝜎2

⎞⎠ ,1

2

⎤⎦≈

4∑𝑖=0

𝑒(𝑑𝑓𝑟𝑒𝑒+𝑖)𝑄

⎛⎝√2𝑑𝑓𝑟𝑒𝑒+𝑖 ∣ℎ𝐴𝐵∣2 (1-𝛾2)

𝜎2

⎞⎠ . (38)

𝑃𝑃𝐸𝑃 (𝛾2, 𝑑)

→∫ ∞

0

[3𝑆𝑁𝑅−2

16𝑑2(1-𝛾2)𝛾2+3𝐿𝑃 𝑏𝑖𝑡

ℎ𝐴𝐵(𝛾2)𝑆𝑁𝑅−1

4𝑑

]𝑝(∣ℎ𝐴𝐵∣2

)𝑑 ∣ℎ𝐴𝐵∣2

→[

3

16𝑑2(1− 𝛾2)𝛾2

]𝑆𝑁𝑅−2 (39)

10 12 14 16 18 20 22 24 26 28 3010

−5

10−4

10−3

10−2

SNR(dB)

BE

R

Larrson & VojcicIterative receiver with MAP detectors without interleavingIterative receiver with MAP detectorsIterative receiver with IC detectorsPredicted performance

Fig. 6. Performance of the iterative receivers with a convolutional code, 𝛾2 =0.5, SNR𝐴𝐵 (dB)=SNR(dB)+20dB.

signal1. Fig. 4 shows the BERs of the schemes versus theaverage SNR, where SNR𝐴𝐵(dB)=SNR(dB). In this figure,the BERs of the scheme in [4], our proposed scheme withMAP detectors and that with the IC detectors are plotted wherea convolutional code with generator polynomials [23, 35]8 isused. The predicted performance given in (34) is also included.

1It was found via simulations that 𝛾2 = 0.15 almost results in the smallesterror rate for the scheme in [4] without IDD.

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.910

−6

10−5

10−4

10−3

10−2

10−1

Power allocated to the superimposed information

Bit

erro

r pr

obab

ility

10 dB

15 dB

20 dB

25 dB

Fig. 7. Predicted BERs with various power allocation factors (convolutionalcode), SNR𝐴𝐵 (dB)=SNR(dB)+20dB.

At a BER of 10−5, we observe that the proposed schemeperforms about 2 dB better than the scheme in [4] and theproposed scheme with IC detectors achieves the performanceof that with the MAP detectors. Moreover, the performanceof the iterative receiver is very close to the analytical resultgiven in (34). In Fig. 5, we compare the performance ofthe schemes with both a convolutional code and a turbocode whose generator polynomials are [1/37, 1/21]8. We alsoplotted the interference-free (gene-aided) performance. It is

58 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 1, JANUARY 2010

10 15 20 2510

−5

10−4

10−3

10−2

SNR(dB)

BE

Rγ=sqrt(0.1)γ=sqrt(0.3)γ=sqrt(0.5)

Fig. 8. Performance of the iterative receivers (convolutional code) withdifferent values of 𝛾2, SNR𝐴𝐵 (dB)=SNR(dB)+20dB.

observed that, when a strong channel code is used, the pro-posed scheme still achieves the interference-free performanceand the performance improvement of the turbo code relativeto a convolutional code is about 1-1.5 dB at BER of 10−4.

Now, we consider a scenario that the inter-user channel isstronger than the user-destination channels, i.e., the distancebetween the two users are shorter than that between a user andthe destination. In the simulations for Fig. 6, we consider thatSNR𝐴𝐵(dB)=SNR(dB)+20dB. At a BER of 10−5, we observethat the performance improvement by using the proposedscheme relative to [4] is about 3.5 dB. We see that as theinter-user channel becomes stronger, a larger improvementis obtained by using the proposed scheme relative to thebench mark scheme. Moreover, for all SNR cases, the BERperformance of the schemes is very tight to the analyticalresult given in (34). At high SNRs, the BER is proportional to𝑆𝑁𝑅−2. In Fig. 6, we also plot the BERs of our scheme wherethe interleavers are not used, as denoted by the dotted curves.The gap between the schemes with and without interleaver isnot minor, and it becomes larger when the inter-user channelquality improves.

Now, we evaluate the performance of thescheme with different power allocation factors whereSNR𝐴𝐵(𝑑𝐵) =SNR(𝑑𝐵) + 20dB. The predicted errorprobabilities versus different power allocation factors 𝛾2,which is computed from (34), are plotted in Fig. 7. Eachcurve in the figure shows the predicted BER of the schemewith a variety of 𝛾2 and a fixed SNR. For a wide rangeof SNRs, we see that the best power allocation factor is𝛾2=0.5. This lines up with the result given in Theorem 2.However, it is strikingly different from that given in [4],where the authors mentioned that the best power allocationfactor is about 𝛾2=0.15 when IDD is not employed. In Fig.8, we plot the simulated BERs of the proposed scheme with𝛾2 = 0.1, 𝛾2 = 0.3 and 𝛾2 = 0.5. We observe that thescheme with 𝛾2 = 0.5 achieves the best performance. Thisresult is consistent with the analytical result given in SectionIV and Fig. 7.

Finally, let us compare the complexity of the proposed

scheme to that of [4]. Since we need to perform the detectionfor 𝐼 times and the decoding for 𝐼 times for each block,where 𝐼 is the total number of iterations, the complexity ofour scheme is exactly 𝐼 times the complexity of that in [4].Moreover, the processing delay for the proposed scheme, i.e.the number of blocks to be collected before the IDD starts, isthat same as that in [4].

VI. CONCLUSIONS

In this paper, we proposed a new transceiver for thecooperative scheme based on superposition modulation. Weinvestigated a receiver with IDD for the proposed cooperativetransmission strategy. For quasi-static fading environment, weanalyzed the BER performance of the receiver for the proposedscheme and derived the optimal power allocation for thesuperposition modulation. Simulation shows that the proposedscheme is about 2-3.5 dB better than the scheme in [4], andthe simulated BER is very close to the predicted BER for awide range of SNRs.

APPENDIX

Proof: [Proof of (25)] Let 𝑒(𝑑), 𝑑=𝑑𝑓𝑟𝑒𝑒,..., 𝑑max, denotethe error-weighted distance spectrum of the channel code [18],[19], where 𝑑𝑓𝑟𝑒𝑒 is the free-distance of the channel codeand 𝑑max is the maximum Hamming distance considered inevaluating the error-weighted distance spectrum. Let us beginwith 𝑘=1, and consider that user A transmits first. At highSNRs, the conditional bit error probability of 𝐴1 is upper-bounded by [18], [19]

𝑃𝑒(𝐴1) ≤𝑑max∑

𝑑=𝑑𝑓𝑟𝑒𝑒

𝑒(𝑑)𝑄

⎛⎝√2𝑑 ∣ℎ1𝐴𝐷∣2

𝜎2

⎞⎠ (40)

Here, the inequality holds for two reasons: 1) The right handside of the inequality is obtained by using a union bound. 2)The right hand side is computed by considering only a singletime-slot. In the cooperative scheme with IDD, the informationof 𝐴1 resides in two adjacent time-slots. By jointly consideringthese two time-slots, the BEP w.r.t 𝐴1 is not greater than thatobtained by considering only a single time-slot.

For any non-zero∣∣ℎ1

𝐴𝐷

∣∣2, since 𝑄(

√2𝑑 ∣ℎ1

𝐴𝐷∣2 /𝜎2)

decays exponentially with 1𝜎2 , we have

lim𝜎2→0

𝑄(

√2𝑑 ∣ℎ1

𝐴𝐷∣2 /𝜎2)/𝜎2=0 so that

lim𝜎2→0

𝑃𝑒(𝐴1)

𝜎2= 0. (41)

Here, (41) suggests that as 𝜎2 → 0, we have

𝐷 ⋅ 𝑃𝑒(𝐴1)𝜎2→0≤ 𝜎2 (42)

where 𝐷 is any finite constant and “𝑥 ≤𝜎2→0

𝑦 denote that as

𝜎2 → 0, 𝑥 ≤ 𝑦. Given the error probability of 𝐴1, we have

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 1, JANUARY 2010 59

𝑃𝑒(𝐵1) ≤𝑑max∑

𝑑=𝑑𝑓𝑟𝑒𝑒

𝑒(𝑑)𝑄

⎛⎝√√√⎷ 2(1-𝛾2)𝑑 ∣ℎ1

𝐵𝐷∣2𝜎2+𝛾2 ∣ℎ1

𝐵𝐷∣2 𝐸(𝐴′1 −𝐴′

1)2

⎞⎠=

𝑑max∑𝑑=𝑑𝑓𝑟𝑒𝑒

𝑒(𝑑)𝑄

⎛⎝√√√⎷ 2(1-𝛾2)𝑑 ∣ℎ1

𝐵𝐷∣2𝜎2+4𝐾𝛾2 ∣ℎ1

𝐵𝐷∣2 𝑃𝑒(𝐴′1)

⎞⎠(43)

=

𝑑max∑𝑑=𝑑𝑓𝑟𝑒𝑒

𝑒(𝑑)𝑄

⎛⎝√√√⎷ 2(1-𝛾2)𝑑 ∣ℎ1

𝐵𝐷∣2𝜎2+4𝐾𝛾2 ∣ℎ1

𝐵𝐷∣2 𝑃𝑒(𝐴1)

⎞⎠(44)

where the equality of (43) is due to (23). The equalityin (44) is because of that 𝐴1 and 𝐴′

1 are subjected to thesame codebook so that their BEPs are the same, that is𝑃𝑒(𝐴1)=𝑃𝑒(𝐴

′1). Note that 𝛾2,𝐾,

∣∣ℎ1𝐵𝐷

∣∣2 are finite. Then,considering (42), we have

𝑃𝑒(𝐵1)𝜎2→0≤

𝑑max∑𝑑=𝑑𝑓𝑟𝑒𝑒

𝑒(𝑑)𝑄

⎛⎝√2(1− 𝛾2)𝑑 ∣ℎ1𝐵𝐷∣2

𝜎2 + 𝜎2

⎞⎠ . (45)

Similar to the case of 𝐴1 in (41) and (42), we obtainlim𝜎2→0

𝑃𝑒(𝐵1)/𝜎2=0 and

𝐷 ⋅ 𝑃𝑒(𝐵1) ≤𝜎2→0

𝜎2. (46)

Given the error probability of 𝐵1, the asymptotic bit errorprobability of 𝐴2 is

𝑃𝑒(𝐴2) ≤𝑑max∑

𝑑=𝑑𝑓𝑟𝑒𝑒

𝑒(𝑑)𝑄

⎛⎝√√√⎷ 2(1− 𝛾2)𝑑 ∣ℎ2

𝐴𝐷∣2𝜎2 + 4𝐾 ⋅ 𝛾2 ∣ℎ2

𝐴𝐷∣2 𝑃𝑒(𝐵1)

⎞⎠𝜎2→0≤

𝑑max∑𝑑=𝑑𝑓𝑟𝑒𝑒

𝑒(𝑑)𝑒𝑟𝑓𝑐

⎛⎝√2(1− 𝛾2)𝑑 ∣ℎ2𝐴𝐷∣2

𝜎2 + 𝜎2

⎞⎠(47)

and that of 𝐴′1 is

𝑃𝑒(𝐴′1) ≤

𝑑max∑𝑑=𝑑𝑓𝑟𝑒𝑒

𝑒(𝑑)𝑄

(√2𝛾2𝑑 ∣ℎ1

𝐴𝐷∣2𝜎2 + 4𝐾 ⋅ (1− 𝛾2) ∣ℎ1

𝐴𝐷∣2 𝑃𝑒(𝐵1)

)

𝜎2→0≤𝑑max∑

𝑑=𝑑𝑓𝑟𝑒𝑒

𝑒(𝑑)𝑒𝑟𝑓𝑐

⎛⎝√2𝛾2𝑑 ∣ℎ1𝐴𝐷∣2

𝜎2 + 𝜎2

⎞⎠ (48)

where the inequalities hold since we have (46). Then, weobtain

lim𝜎2→0

𝑃𝑒(𝐴2)

𝜎2= 0, lim

𝜎2→0

𝑃𝑒(𝐴′1)

𝜎2= 0 (49)

Using the same method as in the above, for the 𝑘th block,itis straightforward to find (25).

REFERENCES

[1] T. M. Cover and E. Gamal, “Capacity theorems for the relay channel,"IEEE Trans. Inf. Theory, vol. 25, pp. 572-584, Sept. 1979.

[2] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversityin wireless networks: efficient protocols and outage behavior," IEEETrans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.

[3] K. Azarian, H. E. Gamal, and P. Schniter, “On the achievable diversity-multiplexing tradeoff in half-duplex cooperative channels," IEEE Trans.Inf. Theory, vol. 51, no. 12, pp. 4152-4172, Dec. 2005.

[4] E. G. Larsson and B. R. Vojcic, “Cooperative transmit diversity basedon superposition modulation," IEEE Commun. Lett., vol. 9, no. 9, Sept.2005.

[5] Z. Ding, T. Ratnarajah, and C. Cowan, “Cooperative multiple accesssystems using superposition modulation," in Proc. IEEE Inf. TheoryWorkshop (ITW 2006), Oct. 2006.

[6] Z. Ding, T. Ratnarajah, and C. Cowan, “On the diversity-multiplexingtradeoff for wireless cooperative multiple access systems," IEEE Trans.Signal Process., vol. 55, no. 9, Sept. 2007.

[7] T. Yang, J. Yuan, Z. Shi, and M. C. Reed, “Convergence behavioranalysis and detection switching for iterative receiver of MIMO-BICMsystems," IEEE Trans. Veh. Technol., vol. 57, no. 4, pp. 2642-2648, July2008.

[8] B. M. Hochwald and S. ten Brink, “Achieving near-capacity on amultiple-antenna channel," IEEE Trans. Commun., vol. 51, no. 3, pp.389-400, Mar. 2003.

[9] P. Li, L. Liu, K. Y. Wu, and W. K. Leung, “Interleave-division multiple-access," IEEE Trans. Wireless Commun., vol. 4, pp. 938-947, Apr. 2006.

[10] X. Ma and P. Li, “Power allocations for multilevel coding with sigmamapping," Electron. Lett., vol. 40, no. 10, pp. 609-611, May 2004.

[11] Y. Ueng, C. Yeh, M. Lin, and C. Wang, “Turbo coded multiple-antennasystems for near-capacity performance," IEEE J. Sel. Areas Commun.,vol. 27, no. 6, pp. 954-964, Aug. 2009.

[12] T. Yang, J. Yuan, and Z. Shi, “Jointly Gaussian approximation andmulti-stage LLR combining in the iterative receiver for MIMO-BICMsystems," IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 5250-5256,Dec. 2008.

[13] C. Berrou, A. Glavieux, and P. Thitimajshima, “Near Shannon limiterror-correcting coding and decoding: turbo-codes," in Proc. ICC 93,Geneva, Switzerland, pp. 1064-1070, May 1993.

[14] Z. Shi and C. Schlegel, “Iterative multisuser detection and error controlcode decoding in random CDMA," IEEE Trans. Signal Process., vol.54, no. 5, pp. 1886-1895, May 2006.

[15] L. Trichard, J. Evans, and I. Collings, “Large system analysis of linearmultistage parallel interference cancellation," IEEE Trans. Commun.,vol. 50, no. 11, pp. 1778-1786, Nov. 2002.

[16] T. Yang and J. Yuan, “Performance of MIMO-BICM with parallelinterference canceller on slow fading channels," IEE Electron. Lett.,pp. 1292-1293, vol. 42, no. 22, Oct. 2006.

[17] E. Malkamaki and H. Leib, “Evaluating the performance of convolu-tional codes over block fading channels," IEEE Trans. Inf. Theory, vol.45, no. 2, pp. 1643-1646, July 1999.

[18] J. Proakis, Digital Communicaitons, 2nd ed. McGraw Hill, 2001.[19] A. Burr, Modulation and Coding for Wireless Communications. Prentice

Hall, 2003.[20] Z. Zhang and T. M. Duman, “Capacity-approaching turbo coding and

iterative decoding for relay channels," IEEE Trans. Commun., vol. 53,no. 11, Nov. 2005.