METHOD AND DEVICE FOR FLEXIBLE, SELECTIVE SSDF RELAYING
20170331584 · 2017-11-16
Inventors
- Raphael Visoz (Vanves, FR)
- Abdulaziz Mohamad (Gif Sur Yvette, FR)
- Antoine Berthet (Chatenay Malabry, FR)
Cpc classification
H04L1/0076
ELECTRICITY
H04B7/15528
ELECTRICITY
H04L1/0048
ELECTRICITY
International classification
Abstract
A method and relay for relaying messages. The relay includes tests reliability relating solely to messages estimated with error and taken in their form prior to error detection in order to be able to separate messages that are reliable and messages that are not reliable. The relay also includes a shaper unit having a channel interleaver and a modulator taking account only of the messages estimated without error and of those messages estimated with error that are reliable, this shaping being performed in soft form if at least one message estimated with error successfully passes the reliability test.
Claims
1. A relaying method: relaying messages by a relay in a telecommunications system having M sources, L relays, and D destinations, M≧1, L≧1, D≧1, the transmissions between the sources, the relays, and the destinations taking place via a transmission channel, wherein relaying comprises the following acts performed by the relay: soft decoding code words transmitted by at least one source during a given first number of the channel uses in order to obtain vectors of soft values representing the decoded messages; detecting errors in the vectors in order to be able to separate messages estimated without error from messages estimated with error; reliability testing relating solely to the vectors of messages estimated with error in order to be able to separate messages that are reliable from messages that are not reliable; shaping, comprising channel interleaving and modulation taking account only of the messages estimated without error and of those messages estimated with error that are reliable, this shaping being performed in soft form if at least one message estimated with error successfully passes the reliability testing; and during a second given number of channel uses, transmitting a signal that is representative of the messages taken into account by the shaping.
2. The method according to claim 1, wherein the reliability testing comprises comparing an estimate of a probability error concerning the vector of soft values of a message with a threshold value.
3. The method according to claim 2, wherein the probability of error is estimated over all of the soft values of the vector.
4. The method according to claim 2, wherein the code words received by the relay are transmitted after systematic coding by the sources, and wherein the probability of error is estimated solely on the soft values associated with a systematic portion of the message.
5. The method according to claim 1, wherein the shaping further comprises binary network coding and channel coding, the binary network coding comprising using an exclusive-OR in the binary field to add together the messages estimated without error and then interleaved.
6. The method according to claim 1, wherein if no message is detected without error, and if at least one message detected with error is reliable, then the modulation is of the soft type.
7. The method according to claim 6, wherein the soft type modulation maps Q>2 soft values of bits constituting the reliable message onto a complex symbol that is a weighted mean value of the points of the constellation conditioned to the value of the Q soft values.
8. The method according to claim 6, wherein the channel interleaving is performed solely on a selection of soft values in order to adjust the coding and modulation rate to the length of the second given number of channel uses.
9. The method according to claim 1, wherein, if no message is detected without error, and if all of the messages detected with error are reliable, then the shaping in soft form comprises soft network coding the soft values before the channel interleaving and comprises soft modulation.
10. The method according to claim 9, wherein the soft network coding is addition performed solely on a selection of the soft values in order to adjust the coding and modulation rate to the length of the second given number of channel uses.
11. The method according to claim 1, wherein if at least one message is detected without error, and if at least one message is detected with error and is reliable, then soft values positioned at extreme quantification values corresponding to the values zero and one are associated with the messages detected without error, and the shaping in soft form comprises soft network coding of the soft values of the messages prior to channel interleaving, and comprises soft modulation.
12. A relay for a telecommunications system having M sources, L relays, and D destinations, M≧1, L≧1, D≧1, for performing a relaying method, the relay comprising: an electronic circuit or processor configured according to instructions of a relaying program to perform acts comprising: soft decoding code words transmitted by at least one source during a given first number of the channel uses in order to obtain vectors of soft values representing the decoded messages; detecting errors in the vectors in order to separate messages estimated without error from messages estimated with error; reliability testing relating solely to the vectors of messages estimated with error in order to be able to separate messages that are reliable from messages that are not reliable; and shaping comprising: channel interleaving and modulation taking account only of the messages estimated without error and of those messages estimated with error that are reliable, this shaping being performed in soft form if at least one message estimated with error successfully passes the reliability testing; and a transmitter, which transmits during a second given number of channel uses a signal representative of the messages taken into account by the shaper unit.
13. A system having the M sources, the L relays, and the D destinations, M≧1, L≧1, D≧1, wherein the relays are according to claim 12 and are such that the network interleavers differ between the relays.
Description
LIST OF FIGURES
[0062] Other characteristics and advantages of the invention appear more clearly on reading the following description of implementations given merely as illustrative and nonlimiting examples, and from the accompanying drawings, in which:
[0063]
[0064]
[0065]
[0066]
[0067]
[0068]
[0069]
[0070]
[0071]
[0072]
[0073]
[0074]
[0075]
[0076]
[0077]
DETAILED DESCRIPTION OF PARTICULAR EMBODIMENTS
[0078] The following notation is used in the application.
[0079] All of the vectors make use of bold characters. A vector v has its k-th element written v.sub.k. F.sub.q is the q-element Galois field, is the real number field and
is the complex number field.
[0080] Relaying of the invention is used in wireless systems in which at least two independent messages are transmitted via at least one relay on the way to their destinations. In general manner, the sources, nodes s.sub.i, iε{1, . . . , M}, broadcast their coded information sequences for the attention of relays r.sub.j, jε{1, . . . , L} and of destinations d.sub.k, kε{1, . . . , D}. Each relay decodes the signals received from the sources and jointly re-encodes the messages that result from the decoding, while adding their own redundancy so as to create a network code.
[0081] For example, the invention may be used in so-called two-way multiple relay channel (TWMRC) systems, in so-called multiple access multiple relay channel (MAMRC) systems, or in so-called broadcast multiple relay channel (BMRC) systems.
[0082] TWMRC systems as shown in
[0083] MAMRC systems as shown in
[0084] BMRC systems as shown in
[0085] The invention is described below in detail using the example of a TWMRC network. The two nodes s.sub.1, s.sub.2 seek to exchange their K-bit messages u.sub.1, u.sub.2ε.sub.2.sup.K, each using L relays rε{r.sub.1, . . . , r.sub.L}. In this example, the relays are half-duplex relays (they cannot receive and transmit simultaneously).
[0086] In order to simplify the description, the system taken into consideration is semi-orthogonal: the transmissions from the nodes s.sub.1 and s.sub.2 do not interfere at the relays (orthogonal in time) but the transmissions from the relays are simultaneous on the same band and thus interfere at the nodes s.sub.1 and s.sub.2. The term “semi-orthogonal” is used herein with reference to the non-orthogonal system, which would have taken into consideration simultaneous transmission from the nodes s.sub.1 and s.sub.2 on the same band.
[0087] This semi-orthogonal protocol is shown in
[0088] In order to simplify the description, the following assumptions are made: [0089] only one relay is used, L=1, with the nodes and the relay being synchronized and each being provided with a single transmit antenna; [0090] the messages from the nodes are independent (there is no correlation between them); [0091] the links between the nodes suffer noise (additive noise) and fading (fading gain, which may be fast or slow). The description relates more particularly to slow fading, in which fading gains are constant during the Nc uses of the channel, where Nc is the number of uses of the channel for accomplishing one transmission cycle; and [0092] all of the timeslots allocated to the various nodes are of the same size in terms of number of channels uses, Nc=3N. Each transmission timeslot contains N channels uses.
[0093] When in the presence of only one relay, the semi-orthogonal system under consideration becomes an orthogonal variant. The messages are transmitted by the nodes, which are typically user terminals seeking to reach the same base station while making use of a relay.
[0094] A relay r of the invention is described with reference to an embodiment shown in
[0095] The data message from the source s.sub.i is written u.sub.iεF.sub.2.sup.K iε{1, 2}, it is a message of length K made up of components taking their values in the finite Galois field F.sub.2.sup.K of integer 2 order. u.sub.i is considered as including a cyclic redundancy check (CRC) that serves to verify the integrity of the message. The message u.sub.i is converted by a channel code into a P.sub.s bits code word written c.sub.iεF.sub.2.sup.P.sup. denotes a complex constellation of cardinality |χ=2.sup.q. It should be observed that the symbols as obtained in this way are subsequently associated with a channel use by taking account of the transmission power available to the relay (multiplexing portion, IFFT, demultiplexing, inserting the cyclic prefix, filtering, and radiofrequency portion when using OFDM).
[0096] The relay r of the invention receives the following, in baseband, during the timeslot allocated to the node s.sub.i, iε{1, 2}:
y.sub.r,s.sub.
or
y.sub.r,s.sub.
in which expressions h.sub.r,s.sub. represents the channel gain between the node s.sub.i and the relay r, and w.sub.r,s.sub.
.sup.N is an additive noise vector.
[0097] The relay r performs detection 1 on the received signal y.sub.r,s.sub.
[0098] The relay r uses a soft channel decoder dec to decode 2 each of the messages at the end of the timeslot allocated to a source. For each code word, the channel decoder generates a vector of soft values or LLR written λ.sub.iε.sup.P representing the decoded message.
[0099] The relay r performs error detection 3 of the vectors λ.sub.1, λ.sub.2 in order to be able to separate the messages that are estimated without error from the messages that are estimated with error.
[0100] In an embodiment, this error detection is performed after taking a hard decision on the values of the bits. When the channel coding at the source is of systematic type, the first portion of the code word generally includes the systematic portion. This first portion is used to take a hard decision about the values of the bits (0 or 1) of the message in order to obtain an estimated message û.sub.i, in a hard form:
[0101] This implementation is particularly simple to perform, and more particularly when the message from the source includes integrity information such as a CRC. Error detection consists in verifying the integrity of each message by comparing the value of the CRC with the content of the message after the hard decision.
[0102] Messages that are estimated without error are considered to be such that û.sub.i=u.sub.i. These messages are transmitted to a decision unit DU, and in the relay illustrated in
[0103] The messages estimated with error are such that û.sub.i≠u.sub.i, and they are not transmitted to the decision unit DU. In the relay illustrated in
[0104] These messages that are estimated with error are subjected to a reliability test 4 while they are in their form prior to error detection, i.e. in their soft form; the test is thus applied to the LLR vectors λ.sub.i. This test serves to separate messages that are reliable from messages that are not reliable. This reliability test uses a reliability function ƒ applied to the LLR vector. The resulting value is compared with a threshold γ.sub.tε.
[0105] In a first implementation, the function ƒ estimates the error bit probability of the code word c.sub.i:
[0106] In a second implementation, the function ƒ estimates the error bit probability of the code word c.sub.i over a first portion corresponding to a systematic portion:
[0107] Depending on the implementation, the greater K or P.sub.s, the greater the accuracy of the test.
[0108] If the value is less than or equal to the threshold: ƒ(λ.sub.i)≦γ.sub.t or ƒ(L.sub.i)≦γ.sub.t, the message is reliable. In the relay illustrated in
[0109] If the value is greater than a threshold: ƒ(λ.sub.i)>γ.sub.t or ƒ(L.sub.i)>γ.sub.t, the message is not reliable. In the relay illustrated in
[0110] On the basis of simulations, the initial value for the threshold may be set at about 0.01. This threshold is an adjustable parameter. In particular, it is a function of the relay and of the environmental conditions in which the relay is deployed.
[0111] The decision unit DU controls the operation of the encoding and transmission unit ETU as a function of the results of the integrity and reliability tests.
[0112] The ETU performs shaping 5 taking account only of the messages that have been estimated without error and of the messages that have been estimated with error and that are reliable. This shaping is performed in a soft form if at least one message estimated with error successfully passes the reliability test. This shaping comprises channel interleaving and modulation x.sub.rεχ.sup.N.
[0113] The ETU transmits 6 a signal representative of the messages after they have been shaped. Using mechanisms known to the person skilled in the art, the relay makes use of a signaling signal to inform the destination about the messages taken into account in the representative signal.
[0114] The role of the decision unit DU and its impact on the operation of the ETU are described in detail below.
[0115] If no message is received without error and if no received message is reliable, then the relay remains silent, which avoids propagating errors, and the ETU is not activated by the decision unit DU.
[0116] If all the messages are received without error (so there is no message for the reliability test), then the ETU is activated in a hard mode by the decision unit DU.
[0117] If at least one message is without error and if all the messages estimated with error are not reliable, then the ETU is activated in a hard mode by the decision unit.
[0118] Activating the ETU in a hard mode means that the messages are taken into account by the ETU in their hard form; the shaping 5 is applied to the bits of the messages. For the example shown in
[0119] x.sub.rΘ.sub.hard,i(u.sub.i) if the only message û.sub.i, i=1 or 2 is without error, and û.sub.j with j≠i is not reliable (and estimated with error) or
[0120] x.sub.r=Θ.sub.hard,3 (u.sub.1,u.sub.2) if both messages are without error.
[0121]
[0122]
u.sub.r,k=ũ.sub.1,k⊕ũ.sub.2,k∀k=1, . . . ,K (6)
The channel coder codes the message u.sub.r in order to give the code word c.sub.rεF.sub.2.sup.P.sup.
[0123] If at least one message is received with error and is reliable, then the ETU is activated in a soft mode by the decision unit DU. Under such circumstances, the shaping performed by the ETU is one of the following: [0124] x.sub.r=Θ.sub.soft,i (λ.sub.1) if û.sub.i (as estimated with error) is reliable and if û.sub.j with j≠i is neither without error nor reliable; [0125] x.sub.r=Θ.sub.soft,3 (λ.sub.1,λ.sub.2) either if both messages û.sub.1 and û.sub.2 (as estimated with error) are reliable, or one message (as estimated with error) is reliable and the other is without error.
[0126] It should be observed that under such circumstances, during hard decision-taking the soft values (LLR) of the messages without error are positioned on extreme quantification values corresponding to the values zero and one.
[0127]
[0128]
The channel interleaver interleaves the coded vector λ.sub.r to generate an interleaved coded vector. The soft modulator converts the interleaved coded vector into a modulated signal x.sub.rεχ.sup.N.
[0129]
[0130] The shaping example Θ.sub.soft,i(λ.sub.1) shown in .sup.K. The message interleaver π.sub.r,i interleaves the punctured vector L.sub.i in order to generate an interleaved punctured vector L.sub.r. The soft channel coder codes the interleaved punctured vector L.sub.r in the form C.sub.rε
.sup.P.sup.
[0131] The shaping example Θ.sub.soft,3, (λ.sub.1,λ.sub.2) shown in .sup.K, L.sub.2ε
.sup.K. Each message interleaver π.sub.r,1, π.sub.r,2 interleaves the corresponding punctured vector L.sub.1, L.sub.2 to generate an interleaved punctured vector. The soft network coder adds together the interleaved punctured vectors using operation (1) to generate a vector L.sub.rε
.sup.K. The soft channel coder codes the vector L.sub.r in the form C.sub.rε
.sup.P.sup.
[0132] When the embodiment of the relay makes it necessary to use LLRs on the nonsystematic bits of the messages from the sources, this embodiment can be improved when one of the messages is without error. The method regenerates the LLR vector from the bits of the message. Thus, for example, if u.sub.1=û.sub.1, then the relay can regenerate the code word c.sub.1 given that it knows the channel coding used by the source s.sub.1. Knowing the code word c.sub.1, the method regenerates the LLR vector as follows:
The principle of the soft modulation is explained below.
[0133] Conventional modulation φ(b.sub.r,l.sub.
where σ.sub.1.sup.2 is the minimum mean square error (MMSE). This well-known estimation problem gives:
The resulting complex value {tilde over (x)}.sub.r,n is the weighted mean of the symbols of the constellation conditioned to the LLRs of their constituent bits. When the constellation carries less than two bits (i.e. Q≦2), an alternative consists in transmitting the LLRs directly (after power normalization) on the in-phase component and on the quadrature component. When Q>2, the soft modulation proposed above (MMSE) enables the Q LLRs to be transmitted during a single use of the channel: the LLRs are compressed by the soft modulation.
[0134] Thus, during the n-th channel use associated with its transmission timeslot (containing N channel uses n=1, . . . , N), the relay transmits:
in order for the power of each of the x.sub.r,n to remain equal to 1.
[0135] On reception, the destination s.sub.i receives
y.sub.s.sub.
By construction, it follows that:
{tilde over (x)}.sub.r,n=x.sub.r,n.sup.hard+w.sub.1 (13)
where the estimation noise w.sub.1 has variance σ.sub.1.sup.2=1−{tilde over (σ)}.sup.2 with:
and is correlated with x.sub.r,n (biased MMSE estimator). The uncorrelated model corresponding to the minimum mean square uncorrelated error (MMSUE) is written:
{tilde over (x)}.sub.r,n={tilde over (σ)}.sup.2x.sub.r,n.sup.hard+w.sub.2 (15)
where w.sub.2 is not correlated with x.sub.r,n and has variance {tilde over (σ)}.sup.2 (1−{tilde over (σ)}.sup.2). Finally, the signal received in baseband can be written:
where the variance of w′.sub.s.sub.
|h.sub.s.sub.
with σ.sup.2 being the variance of the noise w.sub.s.sub.
[0136] It should be observed that when the bits b.sub.r,l.sub.
[0137] An alternative consists in quantifying x.sub.r,n on a determined number of bits. These bits are then transmitted by the relay using a conventional technique.
[0138] The destination needs to know the power {tilde over (σ)}.sup.2. This information may be transmitted in a control signal between the relay and the destination. Alternatively, the destination may perform blind detection, providing it knows the state of the channel and the noise power on reception.
[0139] The system under consideration may comprise a plurality of relays, i.e. L≧2.
[0140] A first embodiment of a relay adapted to such a system consists in conserving the ETU as described above with the constraint that the message interleavers π.sub.r,i differ among the relays. When a relay receives more than two messages simultaneously, the network coder consists in an exclusive-OR (XOR) in hard or soft form of the messages selected by the decision unit DU.
[0141] A second embodiment of a relay adapted to such a system consists in optimizing the network coding in order to achieve full diversity. Under such circumstances, the main change in the structure of the relay compared with the above description consists in replacing the binary network coding (XOR) with network coding that is more suitable, and in adding a network interleaver π.sub.r,net between the network coding and channel coding. The suitable network coding must guarantee the full diversity criterion (e.g. network coding in a Galois field of order greater than two).
[0142]
[0143]
APPENDIX
Algebraic Quantities
1. LLR:
[0144] The log likelihood ratio (LLR) represents the logarithm of the likelihood ratio or the ratio of probabilities relating to two symbols.
[0145] In the binary situation, a bit u may have a value of 1 or 0. Such a ratio is given by a scalar:
and uniquely defines the hard decision about the bit u by means of its sign.
2. LAPPR:
[0146] The log a posteriori probability ratio (LAPPR) designates a form of LLR that is “conditional” to parallel or “side” information that is typically provided by the received sequence.
[0147] In the binary situation, the LAPPR is defined by: