METHOD AND DEVICE FOR FLEXIBLE, SELECTIVE SSDF RELAYING

20170331584 · 2017-11-16

    Inventors

    Cpc classification

    International classification

    Abstract

    A method and relay for relaying messages. The relay includes tests reliability relating solely to messages estimated with error and taken in their form prior to error detection in order to be able to separate messages that are reliable and messages that are not reliable. The relay also includes a shaper unit having a channel interleaver and a modulator taking account only of the messages estimated without error and of those messages estimated with error that are reliable, this shaping being performed in soft form if at least one message estimated with error successfully passes the reliability test.

    Claims

    1. A relaying method: relaying messages by a relay in a telecommunications system having M sources, L relays, and D destinations, M≧1, L≧1, D≧1, the transmissions between the sources, the relays, and the destinations taking place via a transmission channel, wherein relaying comprises the following acts performed by the relay: soft decoding code words transmitted by at least one source during a given first number of the channel uses in order to obtain vectors of soft values representing the decoded messages; detecting errors in the vectors in order to be able to separate messages estimated without error from messages estimated with error; reliability testing relating solely to the vectors of messages estimated with error in order to be able to separate messages that are reliable from messages that are not reliable; shaping, comprising channel interleaving and modulation taking account only of the messages estimated without error and of those messages estimated with error that are reliable, this shaping being performed in soft form if at least one message estimated with error successfully passes the reliability testing; and during a second given number of channel uses, transmitting a signal that is representative of the messages taken into account by the shaping.

    2. The method according to claim 1, wherein the reliability testing comprises comparing an estimate of a probability error concerning the vector of soft values of a message with a threshold value.

    3. The method according to claim 2, wherein the probability of error is estimated over all of the soft values of the vector.

    4. The method according to claim 2, wherein the code words received by the relay are transmitted after systematic coding by the sources, and wherein the probability of error is estimated solely on the soft values associated with a systematic portion of the message.

    5. The method according to claim 1, wherein the shaping further comprises binary network coding and channel coding, the binary network coding comprising using an exclusive-OR in the binary field to add together the messages estimated without error and then interleaved.

    6. The method according to claim 1, wherein if no message is detected without error, and if at least one message detected with error is reliable, then the modulation is of the soft type.

    7. The method according to claim 6, wherein the soft type modulation maps Q>2 soft values of bits constituting the reliable message onto a complex symbol that is a weighted mean value of the points of the constellation conditioned to the value of the Q soft values.

    8. The method according to claim 6, wherein the channel interleaving is performed solely on a selection of soft values in order to adjust the coding and modulation rate to the length of the second given number of channel uses.

    9. The method according to claim 1, wherein, if no message is detected without error, and if all of the messages detected with error are reliable, then the shaping in soft form comprises soft network coding the soft values before the channel interleaving and comprises soft modulation.

    10. The method according to claim 9, wherein the soft network coding is addition performed solely on a selection of the soft values in order to adjust the coding and modulation rate to the length of the second given number of channel uses.

    11. The method according to claim 1, wherein if at least one message is detected without error, and if at least one message is detected with error and is reliable, then soft values positioned at extreme quantification values corresponding to the values zero and one are associated with the messages detected without error, and the shaping in soft form comprises soft network coding of the soft values of the messages prior to channel interleaving, and comprises soft modulation.

    12. A relay for a telecommunications system having M sources, L relays, and D destinations, M≧1, L≧1, D≧1, for performing a relaying method, the relay comprising: an electronic circuit or processor configured according to instructions of a relaying program to perform acts comprising: soft decoding code words transmitted by at least one source during a given first number of the channel uses in order to obtain vectors of soft values representing the decoded messages; detecting errors in the vectors in order to separate messages estimated without error from messages estimated with error; reliability testing relating solely to the vectors of messages estimated with error in order to be able to separate messages that are reliable from messages that are not reliable; and shaping comprising: channel interleaving and modulation taking account only of the messages estimated without error and of those messages estimated with error that are reliable, this shaping being performed in soft form if at least one message estimated with error successfully passes the reliability testing; and a transmitter, which transmits during a second given number of channel uses a signal representative of the messages taken into account by the shaper unit.

    13. A system having the M sources, the L relays, and the D destinations, M≧1, L≧1, D≧1, wherein the relays are according to claim 12 and are such that the network interleavers differ between the relays.

    Description

    LIST OF FIGURES

    [0062] Other characteristics and advantages of the invention appear more clearly on reading the following description of implementations given merely as illustrative and nonlimiting examples, and from the accompanying drawings, in which:

    [0063] FIG. 1 is a diagram of a two-way multiple relay channel (TWMRC) of the prior art;

    [0064] FIG. 2 is a diagram of a multiple access multiple relay channel (MAMRC) of the prior art;

    [0065] FIG. 3 is a diagram of a broadcast multiple relay channel (BMRC) of the prior art;

    [0066] FIG. 4 shows a semi-orthogonal protocol as taken into consideration in the detailed description of the invention;

    [0067] FIG. 5 is a diagram of an embodiment of a relay r of the invention;

    [0068] FIG. 6 is a simplified flowchart of a relay method of the invention;

    [0069] FIG. 7 shows an implementation of the Θ.sub.hard,i (u.sub.i) shaping performed by the encoding and transmission unit (ETU);

    [0070] FIG. 8 shows an implementation of the Θ.sub.hard,3 (u.sub.1, u.sub.2) shaping performed by the ETU;

    [0071] FIG. 9 shows an implementation of the Θ.sub.soft,i (λ.sub.1) shaping performed by the ETU;

    [0072] FIG. 10 shows an implementation of the Θ.sub.soft,3 (λ.sub.1,λ.sub.2) shaping performed by the ETU;

    [0073] FIG. 11 shows another implementation of the Θ.sub.soft,i (λ.sub.1) shaping performed by the ETU;

    [0074] FIG. 12 shows another implementation of the Θ.sub.soft,3 (λ.sub.1, λ.sub.2) shaping performed by the ETU;

    [0075] FIG. 13 shows an implementation of the Θ.sub.hard,3 (u.sub.1, u.sub.2) shaping performed by the ETU when the relay is used with other relays in the system, i.e. L≧2;

    [0076] FIG. 14 shows a first implementation of the Θ.sub.soft,3 (λ.sub.1,λ.sub.2) shaping performed by the ETU when the relay is used with other relays in the system, i.e. L≧2;

    [0077] FIG. 15 shows a second implementation of the Θ.sub.soft,3 (λ.sub.1,λ.sub.2) shaping performed by the ETU when the relay is used with other relays in the system, i.e. L≧2.

    DETAILED DESCRIPTION OF PARTICULAR EMBODIMENTS

    [0078] The following notation is used in the application.

    [0079] All of the vectors make use of bold characters. A vector v has its k-th element written v.sub.k. F.sub.q is the q-element Galois field, custom-character is the real number field and custom-characteris the complex number field.

    [0080] Relaying of the invention is used in wireless systems in which at least two independent messages are transmitted via at least one relay on the way to their destinations. In general manner, the sources, nodes s.sub.i, iε{1, . . . , M}, broadcast their coded information sequences for the attention of relays r.sub.j, jε{1, . . . , L} and of destinations d.sub.k, kε{1, . . . , D}. Each relay decodes the signals received from the sources and jointly re-encodes the messages that result from the decoding, while adding their own redundancy so as to create a network code.

    [0081] For example, the invention may be used in so-called two-way multiple relay channel (TWMRC) systems, in so-called multiple access multiple relay channel (MAMRC) systems, or in so-called broadcast multiple relay channel (BMRC) systems.

    [0082] TWMRC systems as shown in FIG. 1 comprise two nodes s.sub.1, s.sub.2 seeking to transmit messages to each other while using L relays, L≧1. In general, there exists a direct link between the two nodes. The relays are used to increase the reliability of communication between the two nodes. Nevertheless, if the two nodes are half-duplex nodes and if they transmit simultaneously, then they cannot listen to each other. Under such circumstances, there is no direct link between the two nodes s.sub.1, s.sub.2. Whatever the circumstances, the relays may be in accordance with the invention and used effectively.

    [0083] MAMRC systems as shown in FIG. 2 comprise M sources s.sub.1, . . . , s.sub.M seeking to transmit their messages to a common destination d using the relays r.sub.1, . . . , r.sub.L. The channel model may be of the orthogonal, semi-orthogonal, or non-orthogonal type. The relays in accordance with the invention may be used to increase the reliability of transmission regardless of the type of the channel.

    [0084] BMRC systems as shown in FIG. 3 comprise a source s seeking to transmit M≧2 different messages to D≦M different destinations using a so-called “round robin” mode (one message is transmitted in each timeslot) using L≧1 relays. The relays in accordance with the invention are used to increase the reliability of transmission. Each relay may have its own timeslot (orthogonal system), or all of the relays may transmit simultaneously (non-orthogonal system). The principle of network coding is close to that of a hybrid automatic repeat request (HARQ) mode: the n-th message may be network coded at the relay with the preceding messages.

    [0085] The invention is described below in detail using the example of a TWMRC network. The two nodes s.sub.1, s.sub.2 seek to exchange their K-bit messages u.sub.1, u.sub.2εcustom-character.sub.2.sup.K, each using L relays rε{r.sub.1, . . . , r.sub.L}. In this example, the relays are half-duplex relays (they cannot receive and transmit simultaneously).

    [0086] In order to simplify the description, the system taken into consideration is semi-orthogonal: the transmissions from the nodes s.sub.1 and s.sub.2 do not interfere at the relays (orthogonal in time) but the transmissions from the relays are simultaneous on the same band and thus interfere at the nodes s.sub.1 and s.sub.2. The term “semi-orthogonal” is used herein with reference to the non-orthogonal system, which would have taken into consideration simultaneous transmission from the nodes s.sub.1 and s.sub.2 on the same band.

    [0087] This semi-orthogonal protocol is shown in FIG. 4. During the first timeslot, the node s.sub.1 transmits, while the relays and the node s.sub.2 listen. During the second timeslot, the node s.sub.2 transmits, while the relays and the node s.sub.1 listen. During the third timeslot, the relays transmit simultaneously, while the node s.sub.1 and the node s.sub.2 listen. Each transmission cycle is made up of N.sub.c uses of the channel, equally subdivided into three transmission timeslots. One channel use is the smallest granularity in the time-frequency resource as defined by the system that enables a modulated symbol to be transmitted. The number of channels uses is associated with the available frequency band and with the duration of transmission.

    [0088] In order to simplify the description, the following assumptions are made: [0089] only one relay is used, L=1, with the nodes and the relay being synchronized and each being provided with a single transmit antenna; [0090] the messages from the nodes are independent (there is no correlation between them); [0091] the links between the nodes suffer noise (additive noise) and fading (fading gain, which may be fast or slow). The description relates more particularly to slow fading, in which fading gains are constant during the Nc uses of the channel, where Nc is the number of uses of the channel for accomplishing one transmission cycle; and [0092] all of the timeslots allocated to the various nodes are of the same size in terms of number of channels uses, Nc=3N. Each transmission timeslot contains N channels uses.

    [0093] When in the presence of only one relay, the semi-orthogonal system under consideration becomes an orthogonal variant. The messages are transmitted by the nodes, which are typically user terminals seeking to reach the same base station while making use of a relay.

    [0094] A relay r of the invention is described with reference to an embodiment shown in FIG. 5. The method 1 of the invention is shown in FIG. 6.

    [0095] The data message from the source s.sub.i is written u.sub.iεF.sub.2.sup.K iε{1, 2}, it is a message of length K made up of components taking their values in the finite Galois field F.sub.2.sup.K of integer 2 order. u.sub.i is considered as including a cyclic redundancy check (CRC) that serves to verify the integrity of the message. The message u.sub.i is converted by a channel code into a P.sub.s bits code word written c.sub.iεF.sub.2.sup.P.sup.s. The sources may use any channel coding. Without loss of generality, it is considered that the channel coding used by a source is systematic, i.e. the code word c.sub.i includes in its first portion the message, and it is assumed that the same coding length P.sub.s is used among the sources. The code word c.sub.i is interleaved, with the interleavers differing among the nodes and being written π.sub.i. The interleaved code word b.sub.i feeds a memoryless modulator in order to obtain a complex code word x.sub.iεχ.sup.N such that χ⊂custom-character denotes a complex constellation of cardinality |χ=2.sup.q. It should be observed that the symbols as obtained in this way are subsequently associated with a channel use by taking account of the transmission power available to the relay (multiplexing portion, IFFT, demultiplexing, inserting the cyclic prefix, filtering, and radiofrequency portion when using OFDM).

    [0096] The relay r of the invention receives the following, in baseband, during the timeslot allocated to the node s.sub.i, iε{1, 2}:


    y.sub.r,s.sub.i=h.sub.r,s.sub.ix.sub.s.sub.i+w.sub.r,s.sub.i  (1)


    or


    y.sub.r,s.sub.i.sub.,n=h.sub.r,s.sub.ix.sub.s.sub.i.sub.,n+w.sub.r,s.sub.i.sub.,n∀n=1, . . . ,N  (2)

    in which expressions h.sub.r,s.sub.iεcustom-character represents the channel gain between the node s.sub.i and the relay r, and w.sub.r,s.sub.iεcustom-character.sup.N is an additive noise vector.

    [0097] The relay r performs detection 1 on the received signal y.sub.r,s.sub.i. When the sources transmit while using the same channel uses (a non-orthogonal system), detection is performed jointly to separate the messages from the respective sources by using a multi-user joint detector (MUD), which may optionally be iterative.

    [0098] The relay r uses a soft channel decoder dec to decode 2 each of the messages at the end of the timeslot allocated to a source. For each code word, the channel decoder generates a vector of soft values or LLR written λ.sub.iεcustom-character.sup.P representing the decoded message.

    [0099] The relay r performs error detection 3 of the vectors λ.sub.1, λ.sub.2 in order to be able to separate the messages that are estimated without error from the messages that are estimated with error.

    [0100] In an embodiment, this error detection is performed after taking a hard decision on the values of the bits. When the channel coding at the source is of systematic type, the first portion of the code word generally includes the systematic portion. This first portion is used to take a hard decision about the values of the bits (0 or 1) of the message in order to obtain an estimated message û.sub.i, in a hard form:

    [00001] u ^ i , l = { 1 if .Math. λ i , l .Math. > 0 0 if .Math. λ i , l .Math. 0 .Math. l = 1 , .Math. .Math. , K ( 3 )

    [0101] This implementation is particularly simple to perform, and more particularly when the message from the source includes integrity information such as a CRC. Error detection consists in verifying the integrity of each message by comparing the value of the CRC with the content of the message after the hard decision.

    [0102] Messages that are estimated without error are considered to be such that û.sub.i=u.sub.i. These messages are transmitted to a decision unit DU, and in the relay illustrated in FIG. 5, the switch B.sub.i,1 is closed.

    [0103] The messages estimated with error are such that û.sub.i≠u.sub.i, and they are not transmitted to the decision unit DU. In the relay illustrated in FIG. 5, the switch B.sub.i,1 remains open and the switch B.sub.i,2 is closed.

    [0104] These messages that are estimated with error are subjected to a reliability test 4 while they are in their form prior to error detection, i.e. in their soft form; the test is thus applied to the LLR vectors λ.sub.i. This test serves to separate messages that are reliable from messages that are not reliable. This reliability test uses a reliability function ƒ applied to the LLR vector. The resulting value is compared with a threshold γ.sub.tεcustom-character.

    [0105] In a first implementation, the function ƒ estimates the error bit probability of the code word c.sub.i:

    [00002] f .Math. : .Math. P s .fwdarw. .Math. : .Math. f ( λ i ) = 1 P s .Math. .Math. l = 1 P s .Math. .Math. 1 1 + exp ( .Math. λ i , l .Math. ) ( 4 )

    [0106] In a second implementation, the function ƒ estimates the error bit probability of the code word c.sub.i over a first portion corresponding to a systematic portion:

    [00003] f .Math. : .Math. K .fwdarw. .Math. : .Math. f ( L i ) = 1 K .Math. .Math. l = 1 K .Math. .Math. 1 1 + exp ( .Math. λ i , l .Math. ) .Math. .Math. L i , l = λ i , l .Math. l { 1 , .Math. .Math. , K } ( 5 )

    [0107] Depending on the implementation, the greater K or P.sub.s, the greater the accuracy of the test.

    [0108] If the value is less than or equal to the threshold: ƒ(λ.sub.i)≦γ.sub.t or ƒ(L.sub.i)≦γ.sub.t, the message is reliable. In the relay illustrated in FIG. 5, the switch B.sub.i,3 is closed and the message is transmitted to the decision unit DU.

    [0109] If the value is greater than a threshold: ƒ(λ.sub.i)>γ.sub.t or ƒ(L.sub.i)>γ.sub.t, the message is not reliable. In the relay illustrated in FIG. 5, the switch B.sub.i,3 is opened and the message is not transmitted to the decision unit DU.

    [0110] On the basis of simulations, the initial value for the threshold may be set at about 0.01. This threshold is an adjustable parameter. In particular, it is a function of the relay and of the environmental conditions in which the relay is deployed.

    [0111] The decision unit DU controls the operation of the encoding and transmission unit ETU as a function of the results of the integrity and reliability tests.

    [0112] The ETU performs shaping 5 taking account only of the messages that have been estimated without error and of the messages that have been estimated with error and that are reliable. This shaping is performed in a soft form if at least one message estimated with error successfully passes the reliability test. This shaping comprises channel interleaving and modulation x.sub.rεχ.sup.N.

    [0113] The ETU transmits 6 a signal representative of the messages after they have been shaped. Using mechanisms known to the person skilled in the art, the relay makes use of a signaling signal to inform the destination about the messages taken into account in the representative signal.

    [0114] The role of the decision unit DU and its impact on the operation of the ETU are described in detail below.

    [0115] If no message is received without error and if no received message is reliable, then the relay remains silent, which avoids propagating errors, and the ETU is not activated by the decision unit DU.

    [0116] If all the messages are received without error (so there is no message for the reliability test), then the ETU is activated in a hard mode by the decision unit DU.

    [0117] If at least one message is without error and if all the messages estimated with error are not reliable, then the ETU is activated in a hard mode by the decision unit.

    [0118] Activating the ETU in a hard mode means that the messages are taken into account by the ETU in their hard form; the shaping 5 is applied to the bits of the messages. For the example shown in FIG. 5, the shaping performed by the ETU in a hard mode may be expressed in the following form:

    [0119] x.sub.rΘ.sub.hard,i(u.sub.i) if the only message û.sub.i, i=1 or 2 is without error, and û.sub.j with j≠i is not reliable (and estimated with error) or

    [0120] x.sub.r=Θ.sub.hard,3 (u.sub.1,u.sub.2) if both messages are without error.

    [0121] FIG. 7 shows an implementation of the shaping Θ.sub.hard,i(u.sub.i). This shaping comprises a message interleaver π.sub.r,i, a channel coder, a channel interleaver π.sub.r,ch, and a modulator. The message interleaver interleaves the message u.sub.i=û.sub.i and gives an interleaved message u.sub.r. The channel coder generates the code word c.sub.r. The channel interleaver interleaves the code word in order to generate an interleaved code word b.sub.r. The modulator generates the modulated signal x.sub.rεχ.sup.N from the interleaved word b.sub.r.

    [0122] FIG. 8 shows an implementation of the shaping Θ.sub.hard,3 (u.sub.1, u.sub.2). This shaping comprises two distinct message interleavers π.sub.r,1, π.sub.r,2, a channel coder, a channel interleaver π.sub.r,ch, and a modulator. The message interleavers π.sub.r,1, π.sub.r,2 interleave the bits of the messages without error. The interleaved messages ũ.sub.i are added together by using an exclusive-OR (XOR) in the binary field in order to generate the message u.sub.r:


    u.sub.r,k.sub.1,k⊕ũ.sub.2,k∀k=1, . . . ,K  (6)

    The channel coder codes the message u.sub.r in order to give the code word c.sub.rεF.sub.2.sup.P.sup.r. The code word c.sub.r is interleaved by the channel interleaver in order to give the interleaved word b.sub.r. The modulator generates the modulated signal x.sub.rεχ.sup.N from the interleaved word b.sub.r.

    [0123] If at least one message is received with error and is reliable, then the ETU is activated in a soft mode by the decision unit DU. Under such circumstances, the shaping performed by the ETU is one of the following: [0124] x.sub.r=Θ.sub.soft,i (λ.sub.1) if û.sub.i (as estimated with error) is reliable and if û.sub.j with j≠i is neither without error nor reliable; [0125] x.sub.r=Θ.sub.soft,3 (λ.sub.1,λ.sub.2) either if both messages û.sub.1 and û.sub.2 (as estimated with error) are reliable, or one message (as estimated with error) is reliable and the other is without error.

    [0126] It should be observed that under such circumstances, during hard decision-taking the soft values (LLR) of the messages without error are positioned on extreme quantification values corresponding to the values zero and one.

    [0127] FIG. 9 shows an implementation of the shaping Θ.sub.soft (λ.sub.1). This shaping comprises a puncturing device Ω.sub.r,I, a channel interleaver π.sub.r,ch, and a soft modulator. The puncturing device selects some of the soft values (P.sub.s′) of the LLR vector λ.sub.i corresponding to the message u.sub.i and gives a punctured vector L.sub.i. The interleaver interleaves the punctured vector in order to generate an interleaved punctured vector. The soft modulator converts the interleaved punctured vector into a modulated signal x.sub.rεχ.sup.N.

    [0128] FIG. 10 shows an implementation of the shaping Θ.sub.soft,3 (λ.sub.1, λ.sub.2). This shaping comprises two puncturing devices Ω.sub.r,1, Ω.sub.r,2, a soft network coder, a channel interleaver π.sub.r,ch, and a soft modulator. Each puncturing device Ω.sub.r,1, Ω.sub.r,2 selects some of the soft values (P.sub.s′) of the LLR vectors λ.sub.1, λ.sub.2 corresponding to the messages u.sub.1, u.sub.2 and gives punctured vectors L.sub.1, L.sub.2. The soft network coder adds together the punctured vectors (of the same length adapted as a function of the number of channel uses allocated to the relay) by performing the following operation:

    [00004] λ r , l = L 1 , l .Math. .Math. L 2 , l = log .Math. e L 1 , l + e L 2 , l 1 + e L 1 , l + L 2 , l .Math. l = 1 , .Math. .Math. , P s ( 7 )

    The channel interleaver interleaves the coded vector λ.sub.r to generate an interleaved coded vector. The soft modulator converts the interleaved coded vector into a modulated signal x.sub.rεχ.sup.N.

    [0129] FIGS. 11 to 12 show other examples of shaping Θ.sub.soft,i (λ.sub.1) and Θ.sub.soft,3 (λ.sub.1,λ.sub.2). These examples of shaping are advantageously soft for coding at the relay, i.e. the shaping makes it possible to use channel coding that is different from the channel coding used by the sources.

    [0130] The shaping example Θ.sub.soft,i(λ.sub.1) shown in FIG. 11 comprises in addition to the components of the shaping shown in FIG. 9, a message interleaver π.sub.r,i, and a soft channel coder. The puncturing device selects K soft values of the LLR vector λ.sub.i corresponding to the message u.sub.i, e.g. the K values corresponding to the systematic portion, in order to give a punctured vector L.sub.iεcustom-character.sup.K. The message interleaver π.sub.r,i interleaves the punctured vector L.sub.i in order to generate an interleaved punctured vector L.sub.r. The soft channel coder codes the interleaved punctured vector L.sub.r in the form C.sub.rεcustom-character.sup.P.sup.r. The channel interleaver π.sub.r,ch interleaves the coded vector C.sub.r to generate an interleaved coded vector B.sub.r. The soft modulator converts the interleaved coded vector into a modulated signal x.sub.rεχ.sup.N.

    [0131] The shaping example Θ.sub.soft,3, (λ.sub.1,λ.sub.2) shown in FIG. 12 comprises, in addition to the components of the shaping shown in FIG. 10, two distinct message interleavers π.sub.r,1, π.sub.r,2 and a soft channel coder. Each puncturing device Ω.sub.r,1, Ω.sub.r,2 selects K soft values of the LLR vector λ.sub.1, λ.sub.2 corresponding to the message u.sub.1, u.sub.2, e.g. the K values corresponding to the systematic portion, in order to give punctured vector L.sub.1εcustom-character.sup.K, L.sub.2εcustom-character.sup.K. Each message interleaver π.sub.r,1, π.sub.r,2 interleaves the corresponding punctured vector L.sub.1, L.sub.2 to generate an interleaved punctured vector. The soft network coder adds together the interleaved punctured vectors using operation (1) to generate a vector L.sub.rεcustom-character.sup.K. The soft channel coder codes the vector L.sub.r in the form C.sub.rεcustom-character.sup.P.sup.r. The channel interleaver interleaves the coded vector C.sub.r to generate an interleaved coded vector B.sub.r. The soft modulator converts the interleaved coded vector into a modulated signal x.sub.rεχ.sup.N.

    [0132] When the embodiment of the relay makes it necessary to use LLRs on the nonsystematic bits of the messages from the sources, this embodiment can be improved when one of the messages is without error. The method regenerates the LLR vector from the bits of the message. Thus, for example, if u.sub.1=û.sub.1, then the relay can regenerate the code word c.sub.1 given that it knows the channel coding used by the source s.sub.1. Knowing the code word c.sub.1, the method regenerates the LLR vector as follows:

    [00005] λ 1 , l = { - if c 1 , l = 0 if c 1 , l = 1 .Math. l = 1 , .Math. .Math. , P s ( 8 )

    The principle of the soft modulation is explained below.

    [0133] Conventional modulation φ(b.sub.r,l.sub.1, . . . , b.sub.r,l.sub.Q)=x.sub.r,n.sup.hard causes Q consecutive bits having the value 0 or 1 (written herein as b.sub.r,l.sub.1, . . . , b.sub.r,l.sub.Q) to correspond to the symbol x.sub.r,n.sup.hard belonging to the constellation χ (x.sub.r,n.sup.hardεχ). This operation corresponds to the “modulation” boxes in FIGS. 7, 8, and 13. It is assumed that the power of the constellation is normalized to one. The associated soft modulation corresponds to the “soft mapping” boxes of FIGS. 9, 10, 11, 12, 14, and 15. Using the notation associated with FIGS. 11, 12, and 15, soft modulation consists in taking Q consecutive LLRs B.sub.r,l.sub.1, . . . , B.sub.r,l.sub.Q relating to the values of the bits b.sub.r,l.sub.1, . . . , b.sub.r,l.sub.Q of the symbol x.sub.r,n.sup.hard and in finding the function ƒ(B.sub.r,l.sub.1, . . . , B.sub.r,l.sub.Q) that minimizes the mean square error:

    [00006] σ 1 2 = min f .Math. .Math. .Math. f ( B r , l 1 , .Math. .Math. , B r , l Q ) - x r , n hard .Math. 2 ( 9 )

    where σ.sub.1.sup.2 is the minimum mean square error (MMSE). This well-known estimation problem gives:

    [00007] f ( B r , l 1 , .Math. .Math. , B r , l Q ) = .Math. { x r , n B r , l 1 , .Math. .Math. , B r , l Q } = .Math. ( b r , l 1 , .Math. .Math. .Math. b r , l Q ) .Math. 2 Q .Math. φ ( b r , l 1 , .Math. .Math. , b r , l Q ) .Math. .Math. i = 1 Q .Math. .Math. e b r , l i .Math. B r , l i ( 1 + e b r , l i .Math. B r , l i ) = x ~ r , n ( 10 )

    The resulting complex value {tilde over (x)}.sub.r,n is the weighted mean of the symbols of the constellation conditioned to the LLRs of their constituent bits. When the constellation carries less than two bits (i.e. Q≦2), an alternative consists in transmitting the LLRs directly (after power normalization) on the in-phase component and on the quadrature component. When Q>2, the soft modulation proposed above (MMSE) enables the Q LLRs to be transmitted during a single use of the channel: the LLRs are compressed by the soft modulation.

    [0134] Thus, during the n-th channel use associated with its transmission timeslot (containing N channel uses n=1, . . . , N), the relay transmits:

    [00008] x r , n = 1 σ ~ .Math. x ~ r , n ( 11 )

    in order for the power of each of the x.sub.r,n to remain equal to 1.

    [0135] On reception, the destination s.sub.i receives


    y.sub.s.sub.i.sub.,r,nh.sub.s.sub.i.sub.,rx.sub.r,n+w.sub.s.sub.i.sub.,r,n∀n=1, . . . ,N  (12)

    By construction, it follows that:


    {tilde over (x)}.sub.r,n=x.sub.r,n.sup.hard+w.sub.1  (13)

    where the estimation noise w.sub.1 has variance σ.sub.1.sup.2=1−{tilde over (σ)}.sup.2 with:

    [00009] σ ~ 2 = 1 N .Math. .Math. n = 1 N .Math. .Math. .Math. x ~ r , n .Math. .Math. .Math. ( .Math. σ ~ 2 1 ) ( 14 )

    and is correlated with x.sub.r,n (biased MMSE estimator). The uncorrelated model corresponding to the minimum mean square uncorrelated error (MMSUE) is written:


    {tilde over (x)}.sub.r,n={tilde over (σ)}.sup.2x.sub.r,n.sup.hard+w.sub.2  (15)

    where w.sub.2 is not correlated with x.sub.r,n and has variance {tilde over (σ)}.sup.2 (1−{tilde over (σ)}.sup.2). Finally, the signal received in baseband can be written:

    [00010] y s i , r , n = h s i , r .Math. x r , n + w s i , r , n = h s i , r .Math. σ ~ .Math. x r , n hard + h s i , r .Math. w 2 σ ~ + w s i , r , n = h s i , r .Math. σ ~ .Math. x r , n hard + w s i , r , n ( 16 )

    where the variance of w′.sub.s.sub.i.sub.,r,n can be written:


    |h.sub.s.sub.i.sub.,r|.sup.2(1−{tilde over (σ)}.sup.2)+σ.sup.2  (17)

    with σ.sup.2 being the variance of the noise w.sub.s.sub.i.sub.,r,n.

    [0136] It should be observed that when the bits b.sub.r,l.sub.1, . . . , b.sub.r,l.sub.Q are known (or in equivalent manner the LLRs B.sub.r,l.sub.1, . . . , B.sub.r,l.sub.Q take the values plus or minus infinity), it follows that {tilde over (σ)}.sup.2=1, i.e. φ(b.sub.r,l.sub.1, . . . , b.sub.r,l.sub.Q)=x.sub.r,n=x.sub.r,n.sup.hard.

    [0137] An alternative consists in quantifying x.sub.r,n on a determined number of bits. These bits are then transmitted by the relay using a conventional technique.

    [0138] The destination needs to know the power {tilde over (σ)}.sup.2. This information may be transmitted in a control signal between the relay and the destination. Alternatively, the destination may perform blind detection, providing it knows the state of the channel and the noise power on reception.

    [0139] The system under consideration may comprise a plurality of relays, i.e. L≧2.

    [0140] A first embodiment of a relay adapted to such a system consists in conserving the ETU as described above with the constraint that the message interleavers π.sub.r,i differ among the relays. When a relay receives more than two messages simultaneously, the network coder consists in an exclusive-OR (XOR) in hard or soft form of the messages selected by the decision unit DU.

    [0141] A second embodiment of a relay adapted to such a system consists in optimizing the network coding in order to achieve full diversity. Under such circumstances, the main change in the structure of the relay compared with the above description consists in replacing the binary network coding (XOR) with network coding that is more suitable, and in adding a network interleaver π.sub.r,net between the network coding and channel coding. The suitable network coding must guarantee the full diversity criterion (e.g. network coding in a Galois field of order greater than two).

    [0142] FIG. 13 shows an implementation of the Θ.sub.hard,3 (u.sub.1,u.sub.2) shaping performed by the ETU when L≧2. In comparison with the implementation shown in FIG. 8, the binary network coding (XOR) is replaced by network coding, and the shaping includes a network interleaver π.sub.r,net between the network coding and channel coding.

    [0143] FIGS. 14 and 15 show two implementations of the Θ.sub.soft,3 (λ.sub.1,λ.sub.2) shaping performed by the ETU when L≧2. The implementation of FIG. 14 is comparable to the implementation of FIG. 10. The implementation of FIG. 15 is comparable to the implementation of FIG. 12. In comparison with the implementation of FIG. 12, the implementation of FIG. 15 further comprises a network interleaver π.sub.r,net between the soft network coding and the soft channel coding.

    APPENDIX

    Algebraic Quantities

    1. LLR:

    [0144] The log likelihood ratio (LLR) represents the logarithm of the likelihood ratio or the ratio of probabilities relating to two symbols.

    [0145] In the binary situation, a bit u may have a value of 1 or 0. Such a ratio is given by a scalar:

    [00011] LLR = log ( P ( u = 1 ) P ( u = 0 ) )

    and uniquely defines the hard decision about the bit u by means of its sign.

    2. LAPPR:

    [0146] The log a posteriori probability ratio (LAPPR) designates a form of LLR that is “conditional” to parallel or “side” information that is typically provided by the received sequence.

    [0147] In the binary situation, the LAPPR is defined by:

    [00012] LAPPR = log ( P ( u = 1 ) y P ( u = 0 ) y ) [0148] [1] patent application WO 2013/093359 “Method of transmitting a digital signal for a semi-orthogonal MS-MARC system, and corresponding program product and relay device”. [0149] [2] patent application WO 2013/093361 “Method of transmitting a digital signal for a non-orthogonal MS-MARC system, and corresponding program product and relay device”.