OMAMRC transmission method and system with slow link adaptation

11418252 · 2022-08-16

Assignee

Inventors

Cpc classification

International classification

Abstract

A method for transmitting successive messages forming a frame in a telecommunication system with M sources (s.sub.1, . . . , s.sub.M), L relays and a destination, M>1, L≥1 according to an orthogonal multiple-access scheme of the channel between the M sources and the L relays with a maximum number of M+T.sub.max time slots per transmitted frame including M slots and T.sub.max cooperative transmission slots. The method includes: a slow type link adaptation determining an initial rate for each source by destination based on an average SNR of each link and transmitting to each source the initial rate; and for each frame out of several, successively transmitting the messages of the M sources during the M slots phase with, respectively, modulation and coding schemes determined from the initial rates. The link adaptation maximizes the aggregate rate of all the sources subject to the constraint of a target average BLER ε.sub.com after T.sub.max≥X≥1 cooperative transmissions.

Claims

1. A transmission method comprising: transmitting successive messages forming a frame in a telecommunication system with M sources (s.sub.1, . . . , s.sub.M), L relays (r.sub.1, . . . , r.sub.L) and a destination (d), M >1, L ≥1 according to an orthogonal multiple-access scheme of the transmission channel between the M sources and the L relays with a maximum number M+T.sub.max time slots per transmitted frame including M slots allocated during a first phase to the successive transmission of the M sources, and T.sub.max cooperative transmission slots allocated during a second phase to one or more nodes taken from among the sources and the relays according to a determined selection, wherein the transmitting comprises: an initial phase of link adaptation comprising determining an initial rate for each source by the destination on the basis of an average Signal to Noise Ratio (SNR) of each of the links of the system and transmitting to each source the initial rate, for each frame out of several frames, successively transmitting the messages of the M sources during the M slots of the first phase with, respectively, modulation and coding schemes determined from the initial rates, wherein the link adaptation comprises maximizing an aggregation of rates transmitted between the sources and the destination subject to a constraint of a target average Block Error Rate (BLER) after X ≥1 cooperative transmissions, and wherein the selection at a slot t of a node (a.sub.t) out of the nodes having correctly decoded at the slot t−1 at least one source (s) that the destination has not correctly decoded at this slot t−1, is determined by the destination by taking account of the gains (h=[h.sub.s.sub.1.sub.,d, . . . , h.sub.s.sub.M.sub., d, h.sub.r.sub.1.sub.,d, . . . , h.sub.r.sub.L.sub.,d]) of the channels between the nodes and the destination.

2. The transmission method as claimed in claim 1, wherein the maximization of the aggregation of rates comprises a maximization of an individual rate of each source by considering the messages from other sources known subject to the constraint of a target individual average BLER after the X cooperative transmissions.

3. The transmission method as claimed in claim 2, wherein, after maximization, the M individual rates taken together are increased or reduced simultaneously.

4. The transmission method as claimed in claim 1, wherein the selected node (α.sub.t) is that for which the channel with the destination exhibits the best gain.

5. The transmission method as claimed in claim 1, wherein the X cooperative transmissions occur according to a selection known by the destination and the relays in advance.

6. The transmission method as claimed in claim 1, wherein the selection is determined by the destination according to an Incremental Redundancy Hybrid-Automatic Repeat Request (IR-HARQ), cooperative strategy for all the cooperative transmissions.

7. The transmission method as claimed in claim 6, wherein, for any cooperative transmission, the destination selects the node which maximizes the number of sources decoded correctly after the cooperative transmission by this node, the number of sources correctly decoded being derived from a prediction by the destination.

8. The transmission method as claimed in claim 1, wherein the maximization of the aggregation of rates comprises a maximization of an individual rate of each source by considering the messages from other sources known and the relaying nodes selected randomly subject to the constraint of a target individual average BLER after the X cooperative transmissions.

9. A transmission method comprising: transmitting successive messages forming a frame in a telecommunication system with M sources (s.sub.1 . . . , s.sub.M), L relays (r.sub.1 . . . , r.sub.L) and a destination (d), M>1, L≥1 according to an orthogonal multiple-access scheme of the transmission channel between the M sources and the L relays with a maximum number M+T.sub.max time slots per transmitted frame including M slots allocated during a first phase to the successive transmission of the M sources, and T.sub.max cooperative transmission slots allocated during a second phase to one or more nodes taken from among the sources and the relays according to a determined selection, wherein the transmitting comprises: an initial phase of link adaptation comprising determining an initial rate for each source by the destination on the basis of an average Signal to Noise Ratio (SNR) of each of the links of the system and transmitting to each source the initial rate, for each frame out of several frames, successively transmitting the messages of the M sources during the M slots of the first phase with, respectively, modulation and coding schemes determined from the initial rates, wherein the link adaptation comprises maximizing an aggregation of rates transmitted between the sources and the destination subject to a constraint of a target average Block Error Rate (BLER) after X≥1 cooperative transmissions and wherein the method further comprises, during the second phase after the X cooperative transmissions: a cooperative transmission of one or more nodes taken from among the sources and the relays according to a selection according to an Incremental Redundancy Hybrid-Automatic Repeat Request (IR-HARQ) cooperative strategy.

10. The transmission method as claimed in claim 9, wherein, for any selection after the X cooperative transmissions, the destination selects the node which maximizes the number of sources decoded correctly after cooperative transmission by this node, the number of sources correctly decoded being derived from a prediction by the destination.

11. A telecommunication system comprising: M sources (s.sub.1, s.sub.M), half-duplex; L relays (r.sub.1, r.sub.L), half-duplex; and a destination (d), M>1, L≥1, with link adaptation, wherein the destination comprises a processor configured to: receive successive messages forming a frame transmitted in the telecommunication system according to an orthogonal multiple-access scheme of the transmission channel between the M sources and the L relays with a maximum number M+T.sub.max time slots per transmitted frame including M slots allocated during a first phase to the successive transmission of the M sources, and T.sub.max cooperative transmission slots allocated during a second phase to one or more nodes taken from among the sources and the relays according to a determined selection, wherein the receiving comprises: an initial phase of link adaptation comprising determining an initial rate for each source by the destination on the basis of an average Signal to Noise Ratio (SNR) of each of the links of the system and transmitting to each source the initial rate, for each frame out of several frames, successively receiving the messages of the M sources during the M slots of the first phase with, respectively, modulation and coding schemes determined from the initial rates, and wherein the link adaptation comprises maximizing an aggregation of rates transmitted between the sources and the destination subject to a constraint of a target average Block Error Rate (BLER) after X≥1 cooperative transmissions, and wherein the selection at a slot t of a node (α.sub.t, out of the nodes having correctly decoded at the slot t−1 at least one source (s) that the destination has not correctly decoded at this slot t−1, is determined by the destination by taking account of the gains (h=[h.sub.s.sub.1.sub.,d, . . . , h.sub.s.sub.M.sub., d, h.sub.r.sub.1.sub.,d, . . . , h.sub.r.sub.L.sub.,d]) of the channels between the nodes and the destination.

12. A destination device in a telecommunication system comprising M sources (s.sub.1, . . . , s.sub.M), half-duplex; L relays (r.sub.1, . . . , r.sub.L), half-duplex; and the destination device, M>1, L≥1, wherein the destination comprises: a processor configured to: receive successive messages forming a frame transmitted in the telecommunication system according to an orthogonal multiple-access scheme of the transmission channel between the M sources and the L relays with a maximum number M+T.sub.max time slots per transmitted frame including M slots allocated during a first phase to the successive transmission of the M sources, and T.sub.max cooperative transmission slots allocated during a second phase to one or more nodes taken from among the sources and the relays according to a determined selection, wherein the receiving comprises: an initial phase of link adaptation comprising determining an initial rate for each source by the destination on the basis of an average Signal to Noise Ratio (SNR) of each of the links of the system and transmitting to each source the initial rate, for each frame out of several frames, successively receiving the messages of the M sources during the M slots of the first phase with, respectively, modulation and coding schemes determined from the initial rates, wherein the link adaptation comprises maximizing an aggregation of rates transmitted between the sources and the destination subject to a constraint of a target average Block Error Rate (BLER) after X≥1 cooperative transmissions and wherein the selection at a slot t of a node (α.sub.t), out of the nodes having correctly decoded at the slot t−1, at least one source (s) that the destination has not correctly decoded at this slot t−1, is determined by the destination by taking account of the gains (h=[h.sub.s.sub.1.sub.,d, . . . , h.sub.s.sub.M.sub., d, h.sub.r.sub.1.sub.,d, . . . , h.sub.r.sub.L.sub.,d]) of the channels between the nodes and the destination.

13. A destination device in a telecommunication system comprising M sources (s.sub.1, . . . ,s.sub.M), half-duplex; L relays (r.sub.1, . . . , r.sub.L), half-duplex; and the destination device, M>1, L≥1, wherein the destination comprises: a processor configured to: receive successive messages forming a frame transmitted in the telecommunication system according to an orthogonal multiple-access scheme of the transmission channel between the M sources and the L relays with a maximum number M+T.sub.max time slots per transmitted frame including M slots allocated during a first phase to the successive transmission of the M sources, and T.sub.max cooperative transmission slots allocated during a second phase to one or more nodes taken from among the sources and the relays according to a determined selection, wherein the receiving comprises: an initial phase of link adaptation comprising determining an initial rate for each source by the destination on the basis of an average Signal to Noise Ratio (SNR) of each of the links of the system and transmitting to each source the initial rate, for each frame out of several frames, successively receiving the messages of the M sources during the M slots of the first phase with, respectively, modulation and coding schemes determined from the initial rates, wherein the link adaptation comprises maximizing an aggregation of rates transmitted between the sources and the destination subject to a constraint of a target average Block Error Rate (BLER) after X≥1 cooperative transmissions, and wherein the method further comprises, during the second phase after the X cooperative transmissions: a cooperative transmission of one or more nodes taken from among the sources and the relays according to a selection according to an Incremental Redundancy Hybrid-Automatic Repeat Request (IR-HARQ), cooperative strategy.

Description

BRIEF DESCRIPTION OF THE DRAWINGS

(1) Other features and advantages of the invention will become more clearly apparent on reading the following description of embodiments, given as simple illustrative and nonlimiting examples, and the attached drawings, in which:

(2) FIG. 1 is a diagram of a so-called OMAMRC (Orthogonal Multiple-Access Multiple-Relay Channel) system according to the invention,

(3) FIG. 2 is a diagram of a transmission cycle of a frame which can be preceded by an initialization step according to the invention,

(4) FIG. 3 is a diagram of the OMAMRC system of FIG. 1 for which all the sources except the source s.sub.1 are considered to be correctly decoded.

DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS

(5) A use of the channel is the smallest granularity in terms of time-frequency resource defined by the system which allows the transmission of a modulated symbol. The number of uses of the channel is linked to the available frequency band and to the transmission duration.

(6) In the “slow fading” case prioritized in the description, the fading gains are constant during the M+T.sub.max time slots in which M+T.sub.max is the maximum number of time slots to accomplish a transmission cycle.

(7) The invention is described in the context of an OMAMRC system illustrated by FIG. 1. This system comprises M sources {s.sub.1, . . . , s.sub.M}, L relays {r.sub.1, . . . , r.sub.L} and a destination d.

(8) To simplify the description, the following assumptions are made hereinbelow on the OMAMRC system: the sources, the relays are equipped with a single transmission antenna; the sources, the relays and the destination are equipped with a single reception antenna; the sources, the relays and the destination are perfectly synchronized; the sources are statistically independent (there is no correlation between them), they form the set custom character={s.sub.1, . . . , s.sub.M}; use is made of a CRC code assumed to be included in the K.sub.Si information bits of each source s.sub.l to determine whether a message is correctly decoded or not; the links between the different nodes suffer from additive noise and from fading. The fading gains are fixed during the transmission of a frame performed during a maximum duration of M+T.sub.max time slots, but can change from one frame to another. T.sub.max≥2 is a parameter of the system; the quality of the direct channel in reception (CSIR, Channel State Information at Receiver) is available to the destination, to the sources and to the relays; the feedbacks are without error (no error on the control signals); the duration of the time slots is variable.

(9) The relay nodes comprise the relays and the sources which can behave as a relay when they are not transmitting.

(10) The M sources and the L relay nodes access the transmission channel according to an orthogonal multiple-access scheme which allows them to listen without interference to the transmissions from the other sources and from the other relay nodes.

(11) The destination knows the gains (CSI, Channel State Information) of the direct links h={h.sub.S.sub.1.sub.,D, . . . , h.sub.S.sub.M.sub.,D, h.sub.R.sub.1.sub.,D, . . . , h.sub.R.sub.L.sub.,D}, that is to say of the source-to-destination and relay-to-destination links and can therefore deduce therefrom the average SNRs. The sources and the relays transmit to the destination an estimation of the average quality (average SNR) respectively of the links between sources and of the source-to-relay links before the transmission of one or more frames. The destination thus knows all the average SNRs of the system.

(12) During an initial phase which precedes the transmission of multiple frames, the destination returns, for each source, an initial rate or an initial modulation and coding scheme (MCS) determined on the basis of an average SNR of each of the links of the system.

(13) The statistic of the channel of each link is assumed to follow centered circular complex Gaussian distribution and the statistics are independent between the links. It is consequently sufficient to consider only the average SNR as the measure of the statistic of a link.

(14) Each of the initial rates unambiguously determine an initial modulation and coding scheme MCS or, conversely, each initial MCS determines an initial rate.

(15) For example, the set of the MCSs comprises a modulation of BPSK or M-QAM type with {M=4, 16, 64}. For a BPSK modulation, M=2.

(16) The choice of the MCS for the source s.sub.i is such that the modulation makes it possible to map:

(17) q.sub.i=log.sub.2 M bits/symbol (modulation efficiency).

(18) The MCS set further comprises different coding rates, for example from ⅓ to 8/9. The MCS (r.sub.i, q.sub.i) chosen for the source s.sub.i comprises the coding rate r.sub.i and the efficiency q.sub.i of the modulation.

(19) If the band available for the transmission for the chosen MCS is W.sub.i then the transmitted symbol rate cannot exceed W.sub.i×[symbols/s] to avoid inter symbol interferences, s is the abbreviation for second.

(20) With each transmitted symbol representing q.sub.i bits, then the data rate cannot exceed W.sub.iq.sub.i=W.sub.i log.sub.2M×[bits/s]. Given the use of a forward error correction (FEC), only a portion of the r.sub.i bits is useful, i.e. the information bits. Thus, for a given MCS q.sub.i) the data rate is determined by: r.sub.i=W.sub.iq.sub.ir.sub.i×[bits/s].

(21) For simplification, it is considered hereinbelow that the band allocated for each source is the same and equal to 1 Hz. This means that the data rate for the source s.sub.i is: R.sub.i=q.sub.ir.sub.i.

(22) For example, the choice of the modulation of the source s.sub.i is 16-QAM and the coding rate is r.sub.i=½. Consequently,

(23) q i = log 2 16 = 4 [ bits symbol ]
and the data rate of the source s.sub.i is

(24) R i = q i r i = 2 [ bits s ] ( W i = 1 Hz ) .

(25) Each source transmits its data in frame format to the destination using the other sources and relays.

(26) A frame occupies time slots in the transmission of the M messages from the respectively M sources. The maximum duration of a frame is M+T.sub.max time slots. Within one and the same frame, the transmission is divided into two phases.

(27) The first phase comprises M time slots during which the sources s.sub.i each transmit in turn their message to the recipient d. Each time slot has a duration of N.sub.1 channel uses.

(28) During this first phase, each source s.sub.i∈custom character={s.sub.1, . . . , s.sub.m} transmits, after coding, a message u.sub.s.sub.i comprising K.sub.s.sub.i information bits, u.sub.s.sub.icustom character.sub.2.sup.K.sub.s.sub.i, i∈{1, . . . , M}, custom character.sub.2 being the two-element Galois field. The message u.sub.s.sub.i comprises a code of CRC type which makes it possible to check the integrity of the message u.sub.s.sub.i. The message u.sub.s.sub.i is coded according to the initial MCS. Given that the initial MCSs can be different between the sources, the lengths of the coded messages can be different between the sources. The coding uses an incremental redundancy code. The code word obtained is segmented into redundancy blocks. The incremental redundancy code can be of systematic type, the information bits are then included in the first block. Whether or not the incremental redundancy code is of systematic type, it is such that the first block can be decoded independently of the other blocks. The incremental redundancy code can be created for example by means of a finite family of rate-compatible punctured linear codes or of codes without rate modified to operate with finite lengths: raptor code (RC), rate-compatible punctured turbo code (RCPTC), rate-compatible punctured convolutional code (RCPCC), rate-compatible low-density parity check code (RCLDPC).

(29) Since each message transmitted corresponds to a source s.sub.1, . . . , s.sub.m, a correctly decoded message is comparable to the corresponding source through a misuse of notation. When a source transmits, the other sources, the relays and the destination listen and try to decode the messages received at the end of each slot. The signal transmitted by the node a∈custom character is received by the node b∈custom charactercustom character∪{d}. The success of the decoding is decided by using the CRC.

(30) The second phase comprises at most T.sub.max time slots called rounds. Each round t∈{1, . . . , T.sub.max} has a duration N.sub.2 channel uses. The T.sub.max slots are broken down into X and Y cooperative transmissions: T.sub.max=X+Y, X≥1,Y≥1.

(31) During the second phase, a relay node transmits, i.e. it cooperates by transmitting the words or a portion of the words that it has correctly decoded.

(32) By convention, the set of messages (or sources) correctly decoded by the node b∈custom charactercustom character∪{d} at the end of the slot t (round t), t∈{0, . . . , T.sub.max} is denoted custom character.sub.b,t.Math.custom character. The end of the round t=0 corresponds to the end of the first phase.

(33) The X cooperative transmissions can proceed according to a so-called random mode or according to a so-called selection mode. The Y cooperative transmissions proceed according to the so-called selection mode.

(34) According to the so-called random mode, the relay nodes transmit according to a deterministic order determined for example in random form. This mode has the advantage of very greatly limiting the control signals. The selection takes place in the same way in each relay node by using a pseudo-random generator supplied with the same random number between the relay nodes. According to this mode, a source which cooperates during a round can assist either other sources, or itself, or all the sources by transmitting a joint code word.

(35) According to the so-called selection mode, a relay node transmits only if it is solicited by the destination. The destination therefore decides on the number of rounds and consequently on the duration of the second phase. A source selected during this phase therefore acts as a relay. A control signal broadcast by the node a∈custom charactercustom character at the start of the round t identifies the set custom character.sub.a,t−1.Math.{s.sub.1, . . . , s.sub.M}, 1≤t≤T.sub.max, of the messages (or sources) correctly decoded by this node at the end of the round t−1. At the end of the first phase, the set of the messages (or sources) correctly decoded by the node a∈custom charactercustom character∪{d} is denoted custom character.sub.a,0. The set custom character.sub.a,0 for a∈custom characteru custom character is identified in a control signal transmitted by the node a∈custom charactercustom character broadcast at the start of the round t=1. According to this selection mode, the destination d selects the node â.sub.t∈custom charactercustom character which transmits in the round t in order to correctly decode a maximum of messages from the sources.

(36) The selection performed by the destination in the current slot (round) t takes account of its knowledge of the gains h=[h.sub.s.sub.1.sub.,d, . . . , h.sub.s.sub.M.sub., d, h.sub.r.sub.1.sub.,d, . . . , h.sub.r.sub.L.sub.,d], and, in addition, of the knowledge set of its past selections {â.sub.1, . . . , â.sub.t−1} and of the sets of messages decoded correctly by the nodes previously selected (through a misuse of notation comparable to the corresponding sources) {custom character.sub.a.sub.1.sub.,0, . . . custom character.sub.a.sub.t−1.sub., t−2}, of the sets of messages custom character.sub.a,t−1 decoded correctly by the nodes a∈custom charactercustom character and transmitted by the latest control signals received and of the sets of messages custom character.sub.d,t−1 decoded correctly by the destination: custom character.sub.t−1={(â.sub.1, custom character.sub.a.sub.1.sub.,0), . . . , (â.sub.t−1, custom character.sub.a.sub.t−1.sub.,t−2)}∪{custom character.sub.a,t−1, ∀a∈custom charactercustom character∪{d}}. By convention, the knowledge set custom character.sub.0 gathers together only {custom character.sub.a,0, ∀a∈custom charactercustom character∪{d}}, that is to say its knowledge of the sets of messages decoded correctly by the sources and the relays at the end of the first phase and its knowledge of the set of messages that it has decoded correctly at the end of the first phase on the basis only of the signals transmitted by the sources.

(37) Let E.sub.t(a.sub.t, custom character.sub.a.sub.d.sub.,t−1|h, custom character.sub.t−1) be the event at the destination conditioned on the knowledge of h and of custom character.sub.t−1 indicating that at least one source is not decoded correctly by the destination at the end of the slot (round) t during which the node a.sub.t is the active node. custom character.sub.a.sub.t.sub.,t−1 is the set of the sources assisted by the node a.sub.t∈custom charactercustom character. E.sub.t(a.sub.t, custom character.sub.a.sub.t.sub.,t−1|h, custom character.sub.t−1) is called the common probability of incorrect detection (or common outage probability) after the slot (round) t.

(38) Similarly, let O.sub.s,t(a.sub.t, custom character.sub.a,t−1|h, custom character.sub.t−1) be the event at the destination conditioned on the knowledge of h and of custom character.sub.t−1 indicating that the source s∈custom character is not decoded correctly by the destination at the end of the slot (round) t during which the node a.sub.t is the active node. custom character.sub.a.sub.t.sub.,t−1 is the set of the sources assisted by the node a.sub.t∈custom charactercustom character. (a.sub.t, custom character.sub.a.sub.t.sub.,t−1|h, custom character.sub.t−1) is called the individual probability of incorrect detection (or individual outage probability) after the slot (round) t.

(39) On each event A.sub.t(a.sub.t, custom character.sub.a.sub.t.sub.,t−1|h, custom character.sub.t−1), A.sub.t being either E.sub.t or O.sub.s,t, there is associated the probability Pr{A.sub.t} which can formally be defined as custom character(custom character) with custom character(.) being the expected value and with custom character=1 if A.sub.t(â.sub.t, custom character.sub.a.sub.t.sub.,t−1|h, custom character.sub.t−1) is true and equal to zero if not. The probability Pr{A.sub.t} depends on the selection rules.

(40) The transmission rate R.sub.i achieved in the long term by each source s.sub.i, i.e. the number of bits transmitted during the channel uses for a duration which tends toward infinity, can be expressed in the form:

(41) R _ i = R i M + α𝔼 ( T ) ( 1 )

(42) with α=N.sub.2/N.sub.1 and custom character(T) being the average number of cooperative transmissions, custom character(T)=Σ.sub.t=1.sup.T.sup.maxtPr{T=t}, T is the number of slots (rounds) conditional on h and on the selection rules. This average number is generally different between the sources since the transmission rates R.sub.i are different between the sources.

(43) The radio rate is generally defined as the rate of the messages transmitted successfully by a transmission channel.

(44) Thus, if the individual outage probability of the source s.sub.i after the maximum number T.sub.max of slots (rounds) is equal to Pr{O.sub.s.sub.i,T.sub.max}, then the fraction (1−Pr{O.sub.s.sub.i, T.sub.max}) of messages must be correctly decoded.

(45) Consequently, the radio rate of the source s.sub.i is equal to:
η.sub.i=R.sub.i(1−Pr{O.sub.s.sub.i,T.sub.max})

(46) The long-term aggregate radio rate can be defined as the sum of all the individual radio rates:
η=custom characterR.sub.i(1−Pr{O.sub.s.sub.i,T.sub.max})  (2)

(47) The spectral efficiency is obtained by dividing the radio rate by the band used W.sub.i, this band is taken to be equal to 1 Hz by simplification.

(48) The selection rules therefore consist in maximizing the aggregate rate defined by the equation (2).

(49) According to the so-called random mode, there is no selection by the destination during the duration X. The selection is performed deterministically by using, in the same way for each relay node, a random generator. The destination comprises the same random generator to know the sequence of the selections. Indeed, there is no control signal from the relay nodes to the destination to indicate to it which node to select. If a signal of ACK/NACK type is returned by the destination in the form of a feedback bit (custom character) then the cooperative transmissions are stopped as soon as the bit has the value 1, i.e. corresponds to a common ACK.

(50) According to the so-called selection mode, the destination indicates in feedback the correct decoding of the messages from the sources via the limited control channels. Each source and each relay informs the destination of its set of messages correctly decoded via the forward coordination channels. The destination orders one or more cooperative transmissions as long as the maximum number is not reached to minimize the common outage probability of the system while seeking to maximize the aggregate rate. The selected relay node cooperates by transmitting an item of information taking account of its set of messages correctly decoded.

(51) Two types of relay node are considered hereinbelow to illustrate the common outage probability.

(52) The first type is called DCC/JDCD, distributed channel coding/joint distributed channel decoding. The second type is called JNCC/JNCD, joint network channel coding/joint network channel decoding.

(53) The instantaneous mutual item of information between the node a∈custom charactercustom character which is transmitting and the node b∈custom charactercustom character∪{d} which is receiving is denoted I.sub.a,b. This mutual item of information depends on the gain of the channel h.sub.a,b, on the SNR of the link between the nodes a and b and on the assumption of modulation at the channel input. Hereinbelow, h and on custom character.sub.t−1 are omitted in the expressions of E.sub.t and of O.sub.s,t to lighten the presentation.

(54) For the DCC/JDCD type, there is no network code, the representative signal transmitted by the selected relay node â.sub.t is a concatenation of messages decoded correctly and which each correspond to a correctly decoded source.

(55) The common outage event E.sub.t(a.sub.t,custom character.sub.a,t−1) at the end of the slot (round) t for a selection of a cooperative node a.sub.t can be expressed in the form:

(56) E t ( a t , 𝒮 a , t - 1 ) = U s 𝒮 _ d , t - 1 { R s > I t s ( a t , 𝒮 a t , t - 1 ) } ( 3 ) with I t s ( a t , 𝒮 a t , t - 1 ) = I s , d + .Math. l = 1 t - 1 α .Math. 𝒮 ^ a l , l - 1 .Math. I a ^ l , d 1 { s 𝒮 ^ a l , l - 1 } + α .Math. 𝒮 a t , t - 1 .Math. I a t , d 1 { s 𝒮 a t , t - 1 } ( 4 )

(57) and with custom character.sub.d,t−1=custom character\custom character.sub.d,t−1 the complement of custom character.sub.d,t−1 in the set of the sources.

(58) The individual outage event O.sub.s,t(a.sub.t, custom character.sub.a,t−1) can be expressed likewise in the form:
O.sub.s,t(a.sub.t, custom character.sub.a,t−1)={R.sub.s>l.sub.t.sup.s(a.sub.t, custom character.sub.a.sub.l.sub.,t−1)}  (5)

(59) In the expression (4), I.sub.s,d represents the mutual item of information between the source s and the destination d that occurs in the transmission during the first phase. I.sub.â.sub.l.sub.,d represents the mutual item of information between the node â.sub.t selected in the slot (round) l∈{1, . . . , t−1} of the second phase and the destination d. This mutual item of information is taken into account only if the source s is successfully decoded by the node â.sub.l, hence the origin of the function custom character. a.sub.t represents the node which will be chosen in the slot (round) t. The division by |custom character.sub.a.sub.l.sub.,l-1| stems intrinsically from the distributed coding whereby all the available slots of the channel are divided into equal portions and allocated to the individual code words of the distributed code (for example if the distributed code consists of five different code words (|custom character.sub.a.sub.l.sub.,l-1|=5) then each of the code words uses ⅕ of the available channel uses). The multiplication by a is used to normalize before being able to add two mutual items of information generated during two different phases (the transmission takes place during N.sub.1 channel uses during the first phase and during N.sub.2 channel uses during the second phase).

(60) For a given selection of the cooperative relay node a.sub.t and of the set custom character.sub.a.sub.t.sub.,t−1 of the sources with which it cooperates, the individual outage event at the end of the slot (round) t according to the expression (5) means that this event occurs when the rate from the source s is greater than the accumulated mutual information. This mutual information increases after each possible transmission during the second phase (the mutual information at the time t is that at the time t−1 plus the contribution of the cooperative node in the slot (round) t). If this event occurs then this means that the source s cannot be decoded without error.

(61) For the given choice of the cooperative node a.sub.t and of the set custom character.sub.a.sub.t.sub.,t−1 of the sources with which it cooperates, the common outage event at the end of the slot (round) t according to the expression (3) occurs if, for at least one source s of the set of the sources decoded without success custom character.sub.d,t−1 by the destination at the end of the slot (round) t−1, the accumulated mutual information I.sub.t.sup.s(a.sub.t, custom character.sub.a.sub.t.sub.,t−1) from this source s is smaller than its transmission rate R.sub.x. This event therefore occurs as soon as a source s cannot be decoded without error.

(62) For the JNCC/JNCD type, the sequence transmitted by the selected relay node â.sub.l and the messages transmitted by the sources corresponding to the set Ŝ.sub.a.sub.l,.sub.l-1 of the selected sources with which it cooperates form a joined codeword for the messages from the sources Ŝ.sub.a.sub.l,.sub.l-1, l∈{1, . . . ,t−1}. The same applies for the candidate relay node a.sub.t and the set custom character.sub.a.sub.t.sub.,t−1 of the selected sources with which it cooperates for the round t.

(63) In this case, there is a declaration of a common outage if the transmission rates vector (R.sub.1, R.sub.2, . . . , R.sub.M) is in a region external to the region of capacity.

(64) For a backward transmission to M-users, the region of capacity is described by 2.sup.m−1 inequalities, each corresponding to a subset of the M users. For example, in the case of a backward channel AWGN, these inequalities are:

(65) .Math. κ W R k < log ( 1 + .Math. κ W P k N 0 ) W .Math. { 1 , .Math. , M }

(66) with P.sub.k the power received by the user k.

(67) The common outage event E.sub.t(a.sub.t, custom character.sub.a,t−1) at the end of the slot (round) t for a selection of a cooperative node a.sub.t is defined in the form of a union of custom character.sub.d,t−1 indicative functions such that this union has the value one if one of the functions is equal to one:
E.sub.t(a.sub.t, custom character.sub.a.sub.t.sub.,t−1)=custom charactercustom character(custom character),  (6)

(68) in which:

(69) d , 𝒮 _ d , t - 1 ( 𝒰 ) = { .Math. s 𝒰 R s > .Math. s 𝒰 I s , d + .Math. l = 1 t - 1 α I α ^ l , d 1 { 𝒰 .Math. 𝒮 ^ a l , l - 1 } + α I a t , d 1 { 𝒰 .Math. 𝒮 a t , t - 1 } } ( 7 )

(70) I.sub.s,d, I.sub.{circumflex over (d)}.sub.l.sub.,d, I.sub.a.sub.t.sub.,d have the same definition as in the equation (4).

(71) The objective of the arguments of the indicative functions custom characterand custom character is to check whether the selected node has succeeded in decoding at least one source of the set custom character.

(72) The individual outage event O.sub.s,t(a.sub.t, custom character.sub.a,t−1) at the end of the slot (round) t for a selection of a cooperative node a.sub.t can be expressed likewise in the form:
O.sub.s,t(a.sub.t, custom character.sub.a.sub.t.sub.,t−)=custom charactercustom character{custom characterR.sub.s>custom characterI.sub.s,d+Σ.sub.t=1.sup.t−αI.sub.â.sub.l.sub.,d1.sub.{Ĉ.sub.l,s.sub.}+aI.sub.a.sub.t.sub.,d1.sub.{C.sub.t,s.sub.}}  (8)

(73) in which the sources belonging to custom character are considered as interferences, custom character=custom character.sub.d,t−1\custom character

(74) and
Ĉ.sub.l,s={{s ∈custom charactercustom character.sub.a.sub.l.sub.,l-1}custom character{custom character.sub.a.sub.l.sub.,l-1∩custom character=∅}}
C.sub.t,s={{s ∈custom charactercustom character.sub.a.sub.t.sub.,t-1}custom character{custom character.sub.a.sub.t.sub.,t-1∩custom character=∅}}

(75) The maximization of the aggregate rates subject to the constraint of the target common outage probability ε.sub.com can thus be expressed in the form:

(76) max custom characterR.sub.i subject to the constraint that:

(77) Pr { .Math. 𝒰 .Math. 𝒮 { .Math. s 𝒰 R S > .Math. s 𝒰 I s , d + .Math. l = 1 X α I a ^ l , d 1 { 𝒰 .Math. 𝒮 ^ a l , l - 1 ϕ } } } .Math. com ( 9 )

(78) According to one embodiment of the method, the initialization step is based on the assumption that all the sources {s.sub.1, s.sub.2, . . . , s.sub.i−1, s.sub.i+1, . . . , s.sub.m} except the source s.sub.i for which there is a desire to initialize the rate are considered to be correctly decoded. The corresponding system is illustrated by the diagram of FIG. 3 when s.sub.i=s.sub.1. All the sources {s.sub.1, s.sub.2, . . . , s.sub.i−1, s.sub.i+1, . . . , s.sub.m} other than s.sub.l act as relays denoted {r.sub.L+1, . . . , r.sub.L+M−1}. For the source s.sub.i considered, the network is a multiple-relay network denoted (1, L+M−1,1) and no longer a multiple-relay and multiple-user network.

(79) Furthermore, according to this mode, the relay nodes are selected randomly during the X cooperative transmissions.

(80) According to this mode, only the individual outage probabilities are to be considered. The common outage probability can be deduced therefrom directly since the transmissions of the sources are independent, i.e. ε.sub.com=1−(1−ε.sub.ind).sup.M≈Mε.sub.ind.

(81) The target BLER ε.sub.com is declined into M target BLER. For the source for which there is a desire to initialize the rate, the target BLER is assumed less than or equal to ε.sub.com/M.

(82) According to this mode, the maximization of the aggregate rates amounts to successively maximizing the rate from each source s.sub.i by considering that the messages from all the other sources have been decoded correctly and that these sources behave only as relays:

(83) max R i { [ R i > I s i , d + .Math. l = 1 X α I a ^ l , d 1 { s i 𝒮 ^ a l , l - 1 } ] P ( H ) dH .Math. com M } ( 10 )

(84) By performing random draws according to a so-called Monte-Carlo method to randomly select the different relay nodes activated during the X cooperative transmissions, it is possible to determine the average value of the integral of the inequality (10) for the candidate rate R.sub.g. Thus, to determine the maximum rate that the source s.sub.i can use, the procedure can be as follows: 1. sequentially select the first candidate rate R.sub.g possible which has not yet been considered in the set {R.sub.1, . . . , R.sub.n.sub.MCS}. If all the rates have been considered go to step 10. 2. initialize the counter cnt of the current realization of a Monte-Carlo simulation: cnt=0. Initialization of the counter out of the Monte-Carlo realizations (of matrix of channels H and of X relay nodes) which lead to an outage: out=0. 3. increment the counter cnt by one. If cnt≤max_cnt with max_cnt the maximum number of Monte-Carlo realizations, for example max_cnt=1000, then: a. randomly determine X relay nodes out of the set {r.sub.1, . . . , r.sub.L+M−1} of relay nodes and denote the r′.sub.x, x={1, . . . ,X}, b. determine H on the basis of P(H) the joint probability of the realizations of the channels of all the links h.sub.a,b. If no (cnt>max_cnt) go to step 9. 4. calculate I.sub.s.sub.i.sub.,d and determine the decoding set of the destination as follows: a. if R.sub.i≤I.sub.s.sub.i.sub.,d then custom character.sub.d,0={s.sub.i}, return to step 3 (no change of the value of the counter out). b. if no (R.sub.i>I.sub.s.sub.i.sub.,d) then custom character.sub.d,0=0. 5. Initialize the counter of the current round x=1 6. calculate I.sub.s.sub.i.sub.,r′.sub.x. If x>1, calculate I.sub.r′.sub.j.sub.,r′.sub.x between each of the relays chosen in the preceding round and the relay r′.sub.x, ∀j∈{1, . . . , x−1}, (by taking into account the decoding set after the round j−1 for the relay r′.sub.j). 7. determine the decoding set of the relay r′.sub.x after the round x−1 as follows: a. if

(85) R i ( I s i r x + .Math. j = 1 x - 1 α I r j , r x 1 { s i 𝒮 r j , j - 1 } ) then 𝒮 r x , x - 1 = { s i } . b. if no, then custom character.sub.r′.sub.x.sub.x−1=Ø. 8. determine the decoding set of the destination after the round x as follows: a. if

(86) 0 R i ( I s i , d + .Math. j = 1 x α I r j , d 1 { s i 𝒮 r j , j - 1 } )
then custom character.sub.d,x={s.sub.i}, return to the step 3. b. if no, no source is decoded by the destination: custom character.sub.d,x=Ø. If the maximum number of retransmissions is not reached: x<X then increment x by one and return to step 6. If no (x=X) then out=out+1, return to step 3. 9. determine the average outage probability of the source s.sub.i for the rate R.sub.g as being (by solving the integral of the inequality (10) by using the Monte-Carlo simulations):

(87) P s i , R g out = out max_cnt return to step 1. 10. choose the maximum rate R.sub.i that the source s.sub.i can use:

(88) R i = max R g such that P s i , R g out < .Math. com M

(89) The steps from 1 to 10 are repeated for each of the other sources s.sub.i to determine each of the rates R.sub.i.

(90) The M rates taken together can then be reduced or increased simultaneously by using a Newton method. Thus, if the determination of the left-hand member of the inequality (9) leads to a result greater than or less than the target common outage probability ε.sub.com it is possible to respectively reduce or increase all the rates simultaneously to the rates respectively just below or just above in the case of a finite number of MCSs available. This reduction or increase is repeated until it leads to a result less than the target common outage probability ε.sub.com such that the increasing of the rates leads to a common outage probability greater than ε.sub.com.

(91) In the end, the sum of the rates has been maximized subject to the constraint of the target common outage probability ε.sub.com.

(92) The common outage probability ε.sub.com can also possibly be refined to tend toward an optimal solution.

(93) The rates having been initialized, for example according to the mode described previously, the sources s.sub.i, during the 1.sup.st phase, each in turn transmit their message with their initial rate to the recipient. On reception, the destination tries to decode the messages received. Generally, not all the messages are decoded correctly by the destination at the end of the first phase, hence the benefit of the 2.sup.nd phase.

(94) During the 2.sup.nd phase, there is a cooperative transmission by one or more devices taken from among the sources and the relays. A source can thus cooperate with itself but also with one or more sources.

(95) According to a so-called high signaling load embodiment, the maximization of the rate defined by the equation (1) is obtained by minimizing the common outage probability Pr{E.sub.t} at each round t by selecting the appropriate relay node knowing the channel h and conditional on P.sub.t−1. Given that, for any source s∈S Pr{O.sub.s,T.sub.max}≤Pr{E.sub.T.sub.max} and that Pr{E.sub.t}≤Pr{E.sub.t−1}, then this node should lead to an improvement in the long-term aggregate radio rate given by (2).

(96) According to this mode, if the destination correctly decodes all the messages, it transmits a common ACK message. The transmission of a new frame begins on reception of this ACK. If the destination does not correctly decode all the messages, it transmits a common NACK message in the form for example of a bit at the start of each round t∈{1, . . . , T.sub.max}. In response, the relay nodes transmit to the destination an update of their set of messages correctly decoded in the form for example of M+L bits. Each relay node can cooperate with its own set of correctly decoded messages. The destination then transmits ┌log.sub.2(M+L)┐ bits for a selection of a cooperative relay node. The selected relay node is the one which minimizes the common outage probability and which, generally, leads to the smallest number of rounds used in this phase. In this way, the long-term transmission rate of each source is increased and consequently the long-term aggregate radio rate is itself also increased. Given the relationships (6) and (7), the selected relay node is the one which minimizes the probability Pr{E.sub.t} of the event E.sub.t (a.sub.t, custom character.sub.a.sub.t.sub.,t−1). Which is equivalent to selecting the node which simultaneously maximizes the (custom character−1) quantities of mutual information of the right hand part of the relationship (7). Since the implementation of the selection can be complex, several simple embodiments are described.

(97) A first embodiment considers a common ACK/NACK message and a selection of a relay node based on the mutual item of information.

(98) According to this embodiment, only one subset custom character is considered in the equation (6). This subset is that which comprises all the sources of the set of the sources not correctly decoded by the destination, i.e. custom character′=custom character.sub.d,t−1. Thus, at the start of the round t, the destination chooses the cooperative node a.sub.t E a.sub.t∈custom charactercustom character which maximizes.

(99) a ^ t = { .Math. s 𝒮 _ d , t - 1 I s , d + .Math. l = 1 t - 1 α I a ^ l , d 1 { 𝒮 _ d , t - 1 .Math. 𝒮 ^ a l , l - 1 ϕ } + α I a t , d 1 { 𝒮 _ d , t - 1 .Math. 𝒮 a t , t - 1 ϕ } } = { I a t , d 1 { 𝒮 _ d , t - 1 .Math. 𝒮 a t , t - 1 ϕ } } ( 11 )

(100) Given that the choice of a.sub.t does not influence the first two terms of the right hand part of the inequality (7), then the problem of maximization can be transformed into a maximization of the third term:

(101) α I a t , d 1 { 𝒰 .Math. 𝒮 a t , t - 1 ϕ } .
Such a choice of custom character′ amounts to performing a selection of the node with the item of information I.sub.a.sub.t.sub.,d that is the greatest out of all the nodes which are capable of decoding at least one source out of the set of the sources not decoded correctly by the destination. This choice guarantees that, in all the inequalities in which custom charactercustom character.sub.a.sub.t.sub.,t−1≠Ø (for all custom character other than custom character′), the selected node is also the best.

(102) A second embodiment considers a common ACK/NACK message and a selection of a relay node based on the product of mutual information and on the cardinality of the decoding set.

(103) According to this embodiment, the selection concerns the node with the greatest product I.sub.a.sub.t.sub.,d×|custom character.sub.a.sub.d.sub.,t−1|. The product is a good joint indicator of the mutual item of information I.sub.a.sub.d.sub., d and of the cardinality of the decoding set |custom character.sub.a.sub.t.sub.,t−1|.

(104) A third embodiment considers a common ACK/NACK message and a selection of a relay node based on a prediction of the decoded sources.

(105) According to this embodiment, on each round, the destination sequentially examines the sources from s.sub.1 to s.sub.M and then the relays from r.sub.1 to r.sub.L. For each node a.sub.t out of these nodes and on condition that custom character.sub.d,t−1∩custom character.sub.a.sub.d.sub.,t−1≠Ø the destination tries to determine how many more sources it could decode of the preceding round if this node were selected.

(106) To this end, for each of these nodes a.sub.t, the destination checks for each source s.sub.i∈custom character.sub.d,t−1 whether the individual outage event O.sub.s,t(a.sub.t, custom character.sub.a.sub.t.sub.,t−1) after the round t is true or not. Next, the destination counts the number of the individual outage events equal to zero (i.e. false) to obtain the number of sources that can be newly correctly decoded. The destination then chooses the node a.sub.t which leads to the greatest number of newly decoded sources. If several nodes lead to the same number, the destination chooses one of them randomly.

(107) According to an alternative that is less costly in terms of number of operations, the destination checks the common outage events of the subset of the decoding set custom character.sub.d,t−1.

(108) For a set of sources to be the decoding set custom character.sub.d of the destination, the following must apply: (i) the channel access of the |custom character.sub.d|—users by considering the sources of custom character\custom character.sub.d as interferences must not be in common outage mode and (ii) for all the subsets custom character′.sub.d which include custom character.sub.d (custom character.sub.d⊂custom character′.sub.d), the channel access by the |custom character′.sub.d|—users must be in outage mode. custom character.sub.j.sup.(i) is the j.sup.th subset of custom character.sub.d,t−1 of cardinality i with

(109) j { 1 , .Math. , ( .Math. 𝒮 _ d , t - 1 .Math. i ) }
(there is a total of

(110) ( .Math. 𝒮 _ d , t - 1 .Math. i )
subsets of cardinality i in the set custom character.sub.d,t−1).

(111) According to this alternative, the destination starts from the greatest subset of the decoding set custom character.sub.a,t−1 denoted custom character. Then it checks whether the common outage event after the round t is true or not. If it is false, this means that this subset is the decoding set: custom character=custom character.sub.d,t−1 i.e. the number of sources newly decoded by choosing the node a.sub.t is: v(a.sub.t)=|custom character.sub.d,t−1|. If the common outage event is true, the observed set custom character reduced by one source, starting from the source s.sub.1, and the destination checks whether the same event for the new subset custom character=custom character.sub.d,t−1\s.sub.1 is true or not. As long as the event is true, the check is performed for another subset custom character=custom character.sub.d,t−1\s.sub.j with j∈{2, . . . , |custom character.sub.d,t−1|}.

(112) If there is at least one subset custom character, j∈{1, . . . , |custom character.sub.d,t−1|} for which the common outage event is false, then v(a.sub.t)=|custom character.sub.d,t−1|−1. If not, then observed set custom character is reduced by two sources or the subset custom character reduced sequentially by one source of the set custom character.sub.d,t−1 to obtain the subsets custom character,

(113) j { 1 , .Math. , ( .Math. 𝒮 _ d , t - 1 .Math. 2 ) } .
If there is at least one subset custom character for which the common outage event is false, then v(a.sub.t)=|custom character.sub.d,t−1|−2. If not, the observed set is reduced by three sources and the common outage event is checked and so on for the observed subsets of cardinality custom character.sub.d,t−1|−n, n=4, 5, . . . . In the worst case, the cardinality of the observed subsets custom character j∈{1, . . . , |custom character.sub.d,t−1|} is one and v(a.sub.t)=1 or 0.

(114) Checking (ii) whether the common outage event is true for the subsets custom character of the set custom character.sub.d,t−1 (∀custom character.Math.custom character.sub.d,t−1) of the sources not decoded by destination is equivalent to checking whether the rate vector of this subset is located outside of the region of capacity of the backward link of the |custom character|-users. The consideration of the region of capacity of the |custom character|-users accessing, by a multiple access to the channel (|custom character|-user MAC), entails considering other sources of interference. The set of interference sources is denoted custom character=custom character.sub.d,t−1\custom character. A multiple access to the channel with the subset custom character of sources by considering the other sources as interferences is hereinafter denoted |custom character|-user reduced MAC. The expressions (6) and (7) cannot be used to calculate the common outage event of the subset custom character since no set of interfering sources is considered here. Indeed, the expressions (6) and (7) relate to the region of capacity of the complete set custom character.sub.d,t−1, i.e. |custom character.sub.d,t−1|-users in multiple channel access mode (|custom character.sub.d,t−1|user MAC). The expression to be taken into account for the common outage event of the subset custom character is as follows:

(115) E t , ( a t 𝒮 a t , t - 1 ) = .Math. 𝒰 .Math. d , ( 𝒰 ) , d , ( 𝒰 ) = { .Math. s 𝒰 R s > .Math. s 𝒰 I s , d + .Math. l = 1 t - 1 α I a ^ l , d 1 { C ^ l , s } + α I a t , d 1 { C t , s } } with ( 12 ) C ^ l , s = { { s 𝒮 ^ a l , l - 1 .Math. 𝒰 } .Math. { 𝒮 ^ a l , l - 1 .Math. = ϕ } } C t , s = { { s 𝒮 a t , t - 1 .Math. 𝒰 } .Math. { 𝒮 a t , t - 1 .Math. = ϕ } } ( 13 )

(116) In other words, according to this alternative, the destination performs the following operations: 1. initialization of a variable i denoting the cardinality of the observed set custom character at: i=|custom character.sub.d,t−1|. For each relay node a′.sub.t∈{s.sub.1, . . . , s.sub.M, r.sub.1, . . . , r.sub.L} initialize v(a′.sub.t)=0. 2. sequentially, take the next potential candidate cooperating node α.sub.t not yet considered of the set {s.sub.1, . . . , s.sub.m, r.sub.1, . . . , r.sub.L} and for which custom character.sub.d,t−1∩custom character.sub.a.sub.t.sub.,t−1≈Ø. If the node r.sub.L has been considered, then go to the step 5. If not, go to the next step. 3. at the round i calculate the function custom character(a.sub.t, custom character.sub.a.sub.t.sub.,t−1) for each

(117) j { 1 , .Math. , ( .Math. 𝒮 _ d , t - 1 .Math. i ) }
by using the relationships (14) and (15). 4. if custom character(a.sub.t, custom character.sub.a.sub.t.sub.,t−1)=1 for each

(118) 0 j { 1 , .Math. , ( .Math. 𝒮 _ d , t - 1 .Math. i ) }
then: a. if i>1 decrease i and return to step 3. b. if i=1 return to step 2 (v(α.sub.t) remains equal zero). If not, if custom character(a.sub.t, custom character.sub.a.sub.t.sub.,t−1)=0 for at least one value of j declare that v(a.sub.t)=i and return to step 2. 5. all the candidate nodes a.sub.t having been considered, take the one a*.sub.t which maximizes the number of sources newly decoded by the destination compared to the preceding round:

(119) a t * = argmax a t { s 1 , .Math. , s M , r 1 , .Math. , r L } v ( a t ) If there is more than one node at which maximizes the function, then randomly choose a node from among these nodes.

(120) For each of the three high signaling load embodiments, the number of signaling bit (feedback) per round for the common ACK/NACK message and the node selection message is at most: c.sub.1=┌log.sub.2(M+L)┐+1.

(121) According to a so-called low signaling load embodiment, the selection of the nodes for the X first rounds is determined randomly in advance. Each of the nodes of the network uses a random generator with one and the same random number. Thus, there is no feedback signaling conveying node selection information from the destination to the cooperative nodes which makes it possible to reduce the bandwidth occupied by the signaling, in particular by comparison to the mode with high signaling load. Two simple implementations are described.

(122) A first implementation with random selection considers that there is no common ACK/NACK message at the end of each of the X rounds. Thus, whether or not the destination has decoded the sources before the end of a round, there is cooperation of the randomly selected relay node. In a 1−ε.sub.com percentage of cases, there is no signaling interchange during the 2.sup.nd phase.

(123) A second implementation with random selection takes account of a common ACK/NACK message at the end of each of the X rounds to stop the cooperation in case of ACK and switch over to a new frame. According to this implementation, a correct decoding of all the sources by the destination can therefore make it possible to stop the cooperative transmissions at the cost of one signaling bit per round.

REFERENCES

(124) [1] A. Mohamad, R. Visoz and A. O. Berthet, “Cooperative Incremental Redundancy Hybrid Automatic Repeat Request Strategies for Multi-Source Multi-Relay Wireless Networks,” in IEEE Communications Letters, vol. 20, no. 9, pp. 1808-1811, September 2016

(125) Although the present disclosure has been described with reference to one or more examples, workers skilled in the art will recognize that changes may be made in form and detail without departing from the scope of the disclosure and/or the appended claims.