Efficiently sphere-decodable physical layer transmission schemes for wireless storage networks

  • Hsiao-feng (Francis) Lu
  • Amaro Barreal
  • David Karpuk
  • Camilla Hollanti
Open Access
Research

DOI: 10.1186/s13634-016-0334-2

Cite this article as:
(Francis) Lu, H., Barreal, A., Karpuk, D. et al. EURASIP J. Adv. Signal Process. (2016) 2016: 56. doi:10.1186/s13634-016-0334-2
Part of the following topical collections:
  1. Network Coding

Abstract

Three transmission schemes over a new type of multiple-access channel (MAC) model with inter-source communication links are proposed and investigated in this paper. This new channel model is well motivated by, e.g., wireless distributed storage networks, where communication to repair a lost node takes place from helper nodes to a repairing node over a wireless channel. Since in many wireless networks nodes can come and go in an arbitrary manner, there must be an inherent capability of inter-node communication between every pair of nodes.

Assuming that communication is possible between every pair of helper nodes, the newly proposed schemes are based on various smart time-sharing and relaying strategies. In other words, certain helper nodes will be regarded as relays, thereby converting the conventional uncooperative multiple-access channel to a multiple-access relay channel (MARC). The diversity-multiplexing gain tradeoff (DMT) of the system together with efficient sphere-decodability and low structural complexity in terms of the number of antennas required at each end is used as the main design objectives. While the optimal DMT for the new channel model is fully open, it is shown that the proposed schemes outperform the DMT of the simple time-sharing protocol and, in some cases, even the optimal uncooperative MAC DMT.

While using a wireless distributed storage network as a motivating example throughout the paper, the MAC transmission techniques proposed here are completely general and as such applicable to any MAC communication with inter-source communication links.

Keywords

Distributed communications Distributed storage systems Diversity-multiplexing gain tradeoff MIMO Multiple-access channel Relay channel Sphere decoding Wireless networks 

1 Introduction

The amount of data in cloud storage systems and worldwide data traffic have reached incredible numbers. It was estimated that in 2011, 1.8·1021 bytes of data needed to be stored worldwide [1], a number that grew to an astonishing 4.4·1021 bytes in 2013, and which is further expected to grow tenfold by 2020 [2]. The availability of such an astronomical amount of data and rapid progress in (wireless) communications engineering explain the observed growth of mobile data traffic, which increased by 69 % in 2014, reaching 2.5·1018 bytes per month at the end of the year. This amount of data traffic, which is expected to increase tenfold until 2019, corresponds to nearly 30 times the size of the entire internet in 2000. In addition, about 497 million mobile devices and connections were added globally in 2014, of which smart phones account for 88 %, so that—as foreseen—the number of mobile-connected devices exceeded the number of people on earth by the end of 2014 [3].

The massive amount of available data demands that data no longer be stored on a single device, but rather distributed among several storage nodes in a network, hence usually referred to as distributed storage systems (DSSs) (see [4] for a nice introduction). One of the main advantages of storing information in a distributed manner is that the storage system can be made robust against failures by introducing some level of redundancy. Some examples of real-life distributed storage systems are Apache Cassandra [5], which is a DSS initially developed at Facebook, and Windows Azure [6], created by Microsoft.

More formally, a DSS consists of n storage nodes over which a file is stored in a redundant manner by dividing it into fragments and distributing the fragments among n nodes using, for instance, a (n,k) maximum distance separable (MDS) erasure code [7]. MDS codes satisfy the Singleton bound and have the convenient property of being able to reconstruct the file by contacting any k of the nodes. Another key feature of a DSS is the ability to repair, meaning that when a node fails (that is a device breaks down or leaves the network), the failed node can be repaired or replaced. If an (n,k) storage code further satisfies the condition that any failed node can be repaired or replaced by contacting any K of the remaining nodes, termed helpers, the code is called an (n,k,K) storage code, and the node replacing the failed one is called a repairing node, or a newcomer [8], if it is not one of the already existing nodes in the network.

Sophisticated storage protocols have been developed, always giving a tradeoff between the amount of data that needs to be stored in any of the storage nodes, and the amount of data that needs to be retrieved for repairing a lost node, also called repair bandwidth (see e.g. [8, 9]. for details), and codes lying on the storage-repair bandwidth tradeoff curve [8, 10] are called regenerating codes. Explicit, tradeoff achieving regenerating codes can be found in the literature, see [9, 11], among others.

One important aspect of future DSSs lies in the ability to communicate over wireless channels, making it possible to store or retrieve a file using a wireless connection, even if the storage cloud itself might be wired. This is a feature related to the more general concept of wireless edge [12, 13, 14, 15]. The mobility of a user has become crucial in everyday life, and wireless channels are used for data transmission for increased flexibility. However, it is well-known that communicating over a fading channel in a wireless DSS [16, 17] makes repair transmissions prone to physical layer errors.

Consider the wireless repair transmission of a DSS, that is, the case of repairing a failed/lost node and replacing it with a repairing node by contacting any K of remaining storage (helper) nodes via wireless links. We assume that both types of nodes may be equipped with multiple antennas. Then, the transmission from the K helpers to the repairing node can be regarded as wireless multiple-input multiple-output (MIMO) multiple-access communication [18, 19, 20] with an additional feature of inter-helper communication among the K helpers. To see this, note that the MIMO multiple-access channel (MAC) studied in classical information theory [21] assumes only the existence of communication links from the helpers to the repairing node, or equivalently from sources to destination. Yet in many wireless distributed storage networks1, there are often more nodes present and connected than those storing data, i.e., there are blank nodes in addition to the actual storage nodes. The total number of nodes can be dynamic even though the number of storage nodes would be fixed, see Fig. 1 for illustration. Now, the loss of a node can happen to any of the n storage nodes, and the K helpers can be any subset of the remaining storage nodes. The role of a repairing node can be taken by any of the blank nodes (also a new node entering the system will be blank in the beginning). This implies that an inherent communication link exists between the blank nodes and the storage nodes. After repair, a node that was previously blank becomes a storage node, and after this can assume the role of a helper node. Storage nodes may also erase their stored data and become blank, after which they can also assume the role of a repairing node, etc. This means that an inter-node communication capability actually exists between every pair of helper nodes, therefore calling for the design of efficient transmission schemes when the sources are further allowed to communicate with each other in a wireless MIMO-MAC.
Fig. 1

Wireless storage network. A dynamic network with a varying number of nodes, out of which a fixed number of n nodes are storing data and the rest are inactive (blank)

Yet another example to motivate such inter-helper links is as follows. Notice that each of the n wireless storage nodes in the network consists of a wireless component and a memory component. In case of the wireless component of a node failing, we simply replace it with a new wireless component, and there is no need to contact the helpers to reconstruct the data. On the other hand, if the memory component fails, the “repair” of the node (hence the name of repairing node) happens by repairing the memory component of the node with the aid of helper nodes. That is, the node is not replaced by a completely new node. In this sense, the failed node is still one of the original n storage nodes, and the repairing process is done by contacting any K of the remaining nodes. In other words, the failed node and the repairing node are the same node with the same wireless component. This justifies the requirement that the inter-helper link must exist between every pair of nodes.

When communicating over a wireless channel between terminals equipped with multiple antennas, space-time codes [22, 23, 24, 25, 26] are often employed to protect the transmitted information from adverse channel effects such as fading and noise. The asymptotic error-performance of space-time codes is commonly dictated by the diversity-multiplexing gain tradeoff (DMT) [27]. Assume each of the K helper nodes has nt transmit antennas and transmits simultaneously at the same rate of R=r log2SNR in bits per channel use to the repairing node with nr receive antennas, where SNR is the signal-to-noise power ratio, and r is commonly referred to as the multiplexing gain [27]. The optimal MIMO-MAC DMT was given by Tse et al. in [28] and characterizes the maximal diversity gain, or equivalently the smallest error probability, that can possibly be achieved by any space-time code. A general construction of MIMO-MAC DMT optimal space-time codes was proposed in [26] for any triple (nt,nr,K) and multiplexing gain r. These MIMO-MAC codes are constructed from cyclic division algebras [23, 29] and have a linear-dispersion form [30]. Therefore, they can be decoded in the maximal-likelihood (ML) sense by a sphere decoder [31]. While sphere decoding is known to be an efficient implementation of ML decoding, it is unfortunate that when Knt>nr, decoding these DMT-optimal codes requires at least partial brute-force decoding before the sphere decoder begins to function [32], or alternatively one has to allow for suboptimal decoding methods, incurring degraded performance [33]. The former approach, though achieving the optimal performance, results in an exponential increase of decoding complexity when Knt becomes large and nt remains fixed [32].

Motivated by these realistic problems in wireless DSSs, new transmission schemes based on various strategies are proposed in this paper. The DMT, together with efficient sphere-decodability and low transmitter and receiver structural complexity in terms of the number of antennas required at each end, are used as the main design objectives, thus naturally establishing a DMT-complexity tradeoff.

1.1 Contributions and related work

In most of the storage and network-coding related research the focus is on the (logical) network layer, while the physical layer functionality is usually ignored or assumed perfect. An exception is [16], where a so-called partial downloading scheme is proposed, which allows for data reconstruction with limited bandwidth by downloading only parts of the content of helper nodes. This is relevant in the fading channel scenario, and the idea can potentially be combined with the present work. In [17], optimal storage codes are constructed for the error-and-erasure scenario, but fading is not addressed. Isolated from the storage point of view, a lot of research has been carried out in physical layer wireless communications, see e.g. [34] and the references therein.

Remark1.

An obvious, but naïve attempt would be to try to simply combine an optimal storage code on the network layer and an optimal space-time code on the physical layer. The reason for avoiding this approach is both its structural (many antennas) and computational (decoding subject to partial brute-force) complexity.

In this paper2, we propose a class of transmission schemes for MIMO-MAC when communication links among the sources (helper nodes) do exist, which is generally true in many wireless storage networks. The proposed schemes allow for the design of efficiently sphere-decodable space-time codes3 with only one or two receive antennas. This is in contrast to the state-of-the-art MIMO-MAC codes [26] that have extremely good performance but require Knt receive antennas at the repairing node to enable efficient sphere decoding. This is of course unacceptable even for a relatively small value of K, since wireless networks are often heterogenous and might include nodes with only few or even just one antenna. At the moment, to the best of the authors’ knowledge, no such scheme exists for large value of K when the receiver has only 1 or 2 antennas, except for the trivial scheme of time-sharing among K helper nodes.

This paper is organized as follows. In Section 2, we will present the channel model for DSS repair transmission, which can be seen as a MIMO-MAC in the presence of communication links among helper nodes. A brief introduction on DMT will also be given therein. Section 2.2 briefly reviews the notion of complexity exponent, which was established by Jaldén and Elia [35] for measuring the minimal computational complexity required by sphere decoders in order to achieve a certain diversity performance. The complexity exponent of existing MIMO-MAC DMT optimal codes [26, 32, 36] is also given to further motivate our design objectives that are presented in Section 3 and to serve as a baseline for comparing the complexity of the first proposed scheme given in Section 4. The first scheme is based on a simple time sharing among pairs of helpers, when nt=1, nr=2 and K≥2. The resulting DMT falls between the simple time sharing DMT and optimal MIMO-MAC DMT [28].

We then present two more elaborate schemes extending the first one, achieving a higher DMT by taking advantage of the inter-helper communication links and transforming the overall DSS network into a series of relay networks, where conventional half-duplex4 cooperative-communication protocols such as the non-orthogonal amplify-and-forward (NAF) strategy [37, 38] will be used. In particular, it will be seen that these schemes can outperform the MIMO-MAC DMT at certain multiplexing gains, simply due to the use of inter-helper communications in the DSS. Moreover, our results on the DMTs for NAF-based relay networks not only improve, but also extend the ones presented in related works, such as [39, 40].

2 Transmission model and preliminaries

Consider a wireless DSS with K helper nodes, equipped with nt transmit antennas each, and a repairing node with nr receive antennas. Let \(H_{i} \in \mathbb {C}^{n_{r} \times n_{t}}\) be the channel matrix, and \(X_{i} \in \mathbb {C}^{n_{t} \times T}\) the code matrix associated with the ith helper node, where T is the number of channel uses needed for transmitting Xi. The received signal matrix at the repairing node is given by

$$ Y = \sum_{i=1}^{K} H_{i} X_{i} + W, $$
(1)

where \(W \in \mathbb {C}^{n_{r} \times T}\) is a matrix modeling complex additive white Gaussian noise (AWGN). The entries of Hi and Wi are independent and identically distributed (i.i.d.) circularly symmetric complex Gaussian random variables with zero mean and unit variance, a distribution which we henceforth denote as \(\mathbb {C}{\cal {N}}(0,1)\). The code matrices Xi are required to satisfy the average power constraint \(\mathbb {E}||{X_{i}}||^{2} \leq T \cdot \text {SNR}\). It is also assumed throughout the paper that the repairing node has a complete knowledge of channel state information {Hi:i=1,…,K}.

Due to the nature of the DSS, the helper nodes can communicate with each other, a feature not seen in classical MIMO-MAC. Focusing on the ith helper node, let \(G_{i,j} \in \mathbb {C}^{n_{t} \times n_{t}}\) be the channel matrix and \(S_{j} \in \mathbb {C}^{n_{t} \times T'}\) be the code matrix sent by the jth helper node, ji; then, the signal matrix received at the ith helper node is given by
$$ Y_{i} = \sum_{j=1 \atop j \neq i}^{K} G_{i,j} S_{j} + Z_{i}, $$
(2)
where the entries of Gi,j and Zi are again modeled as i.i.d. \(\mathbb {C}{\cal {N}}(0,1)\) random variables, and the signal matrices Sj satisfy \(\mathbb {E} ||{S_{j}}||^{2} \leq T' \cdot \text {SNR}\). A complete knowledge of {Gi,j} is assumed to be available at the ith node. Finally, it is assumed throughout the paper that all communication links are half-duplex. A pictorial description of the above channel model is given in Fig. 2.
Fig. 2

DSS repair transmission. Complete channel model for DSS repair transmission with K helper nodes, each having nt transmit antennas, and with nr receiver antennas at the repairing node

2.1 The DMT

One of the design objectives in this paper is to provide high performance transmission schemes for wireless DSS repair transmissions. The performance of each scheme will be measured by the DMT [27, 34]. In order to simplify the discussion of DMT, let us ignore the existence of the inter-helper channels for the moment and focus only on the channel input-output relation (1), where only the direct channels from the K helper nodes to the repairing node are of concern. Assuming each helper node transmits at the same multiplexing gain r to the repairing node, we say a scheme achieves diversity gain d(r) if its outage probability Pout(r), which is defined as the probability of mutual information \(I \left (X_{i_{1}}, \ldots, X_{i_{s}}; Y \vert H_{1}, \ldots, H_{K}\right)\) being strictly less than s·r log2SNR for some {i1,…,is}⊆{1,…,K}, satisfies
$$ - {\lim}_{\text{SNR} \to \infty} \frac{\log P_{\text{out}}(r)}{\log \text{SNR}} = d(r), $$
(3)
and we will write the above as
$$ P_{\text{out}}(r) \doteq \text{SNR}^{-d(r)}. $$
(4)

The outage probability Pout(r) is an asymptotic lower bound on the error probability of the scheme [27, 34] when SNR is large and the multiplexing gain r remains fixed.

For objectivity, we will compare the performance of the proposed schemes with the following optimal DMT [28] for MIMO-MAC5
$$ d^{*}_{n_{t}, n_{r}, K} (r) = \min\left\{ d^{*}_{n_{t},n_{r}}(r), d^{*}_{Kn_{t},n_{r}}(Kr)\right\}, $$
(5)

where \(d^{*}_{m,n}(r)\) is the optimal DMT for an (nt×nr) point-to-point MIMO channel and is given by the piecewise linear function connecting the points (r,(ntr)(nrr)) for r=0,1,…, min{nt,nr} [27]. We must emphasize that (5) is known to be optimal for the non-cooperative MIMO-MAC, that is, the case when the K helper nodes share no common information, meaning that the inter-helper channels (2) do not exist, and the file fragments stored at the K helper nodes are all statistically independent6. Therefore, with a properly designed scheme, it is expected that a higher DMT performance than (5) can be achieved in DSS repair transmission.

2.2 Sphere decoding complexity of state-of-the-art MIMO-MAC codes

A general construction of MIMO-MAC space-time codes was proposed in [26] and was shown to achieve the optimal DMT (5) for any triple (nt,nr,K) and multiplexing gain r. More specifically, given nt and K, the component code \({{\mathcal {C}}}_{i}\) of the ith helper node is taken from an algebraic lattice of lattice rank7\(2n_{t}{K_{o}^{2}}\) in [26], and \({{\mathcal {C}}}_{i}\) consists of (nt×T) matrices with \(|{{\mathcal {C}}_{i}}| \doteq \text {SNR}^{rT}\) and T=ntKo, where Ko is the smallest odd integer ≥K.

To estimate the complexity of decoding the overall code \({\mathcal {C}}_{1} \times \cdots \times {\mathcal {C}}_{K}\) using a joint sphere decoder, we follow [35] by using the notion of complexity exponent as a complexity measure.

Definition1 (Complexity exponent [35]).

Given the multiplexing gain r, let \({\mathcal {C}}_{r,k}\) be a lattice code consisting of (nt×T) codeword matrices with \(|{{\mathcal {C}}_{r,k}}| \doteq \text {SNR}^{rT}\), k=1,…,K. Let \({\mathcal {D}}_{r}\) be a decoder for the overall code \({\mathcal {C}}_{r} = {\mathcal {C}}_{r,1} \times \cdots \times {\mathcal {C}}_{r,K}\), subject to a computational constraint Nmax(r), in floating point operations (flops) per T channel uses, in the sense that after Nmax(r) flops, the decoder \({\mathcal {D}}_{r}\) must simply terminate, potentially prematurely and before completing the task, thus declaring an error. We then say \({\mathcal {D}}_{r}\) achieves diversity order d(r) with complexity exponent c(r) if \({\mathcal {D}}_{r}\) achieves error probability \(P_{e} \doteq \text {SNR}^{-d(r)}\) using at most \(N_{\max }(r) \doteq \text {SNR}^{c(r)}\) (cf. (3),(4)) flops of computational reserves. □

The above definition means that in order to decode the code \({\mathcal {C}}_{r}\) using a joint sphere decoder, one does not have to decode every received signal matrix, especially when the communication channel is deeply faded. Instead, one can enforce a complexity constraint (also called a halting policy) at the sphere decoder, say at most Nmax(r) flops of computational reserves. By choosing Nmax(r) large enough such that the probability of any premature termination of the sphere decoder is asymptotically no larger than \(\text {SNR}^{-d^{*}_{n_{t},n_{r},K}(r)}\), the overall error probability at most \(2 \cdot \text {SNR}^{-d^{*}_{n_{t},n_{r},K}(r)}\), thereby achieving the same diversity \(d^{*}_{n_{t},n_{r},K}(r)\).

It was shown in [32, 36] that the complexity exponent for decoding the DMT optimal code [26] is given by
$$ {\small{\begin{aligned} {c}_{n_{t},n_{r},K}(r) &= K_{o} r(Kn_{t}-n_{r}) \cdot \textbf{1}\left(Kn_{t} > n_{r}\right) \\ &\quad + \sup\limits_{\underline{\mu} \in {\mathcal{B}}(r)} K_{o} n_{t}\sum_{i=1}^{v}\left(\frac{r}{n_{t}}-(1-\mu_{i})^{+}\right)^{+}, \end{aligned}}} $$
(6)
where 1(·) is the usual indicator function, v= min{Knt,nr}, (x)+:= max{x,0} and
$$ {\begin{aligned} \mathcal{B}(r) \\ &=\left\{ \underline{\mu}=\; [\mu_{1} \ \cdots \mu_{v}]^{\top} \in {\mathbb R}^{v}: \begin{array}{l} \mu_{1} \geq \cdots \geq \mu_{v} \geq 0, \\ \sum_{i=1}^{v} \left(|{Kn_{t}-n_{r}}|+2i-1\right)\mu_{i} \leq d^{*}_{n_{t},n_{r},K}(r) \end{array} \right\}. \end{aligned}} $$
(7)
There is an intuitive explanation for the term Kor(Kntnr) in (6) when Knt>nr. Recall that the component code \({\mathcal {C}}_{i}\) is taken from a certain subset of an algebraic lattice Λi of rank \(2 {n_{t}^{2}}K_{o}\). This means that each codeword matrix Xi of \({\mathcal {C}}_{i}\) is of the form \(X_{i} = \sum _{\ell =1}^{{n_{t}^{2}} K_{o}} x_{i, \ell } C_{i,\ell }\), where \(\{ C_{i,\ell }: \ell =1, \ldots, {n_{t}^{2}} K_{o}\}\) is a basis for Λi, and the xi, are independent QAM symbols taken from a certain set \({\mathcal {A}} \subset {\mathbb Z}[\, \imath \,]\) of size \(\text {SNR}^{\frac {r}{n_{t}}}\), \(\, \imath \,=\sqrt {-1}\). Thus, we can rewrite (1) as
$$ {\small{\begin{aligned} Y = \sum_{i=1}^{K} \sum_{\ell=1}^{{n_{t}^{2}} K_{o}} H_{i} C_{i,\ell} x_{i,\ell} + W, \end{aligned}}} $$
(8)
or equivalently in a vector form
$$ \underline{y} = H \underline{x} + \underline{w}, $$
(9)
where \(\underline {x}=\left [x_{1,1}, \ldots x_{1,{n_{t}^{2}} K_{o}}, \ldots x_{K,{n_{t}^{2}} K_{o}}\right ]^{\top }\), \(\underline {y}\) is the vectorization of the matrix Y, and H is the corresponding matrix of size \(\left (n_{r} K_{o} n_{t} \times K {n_{t}^{2}} K_{o}\right)\) by (8). When decoding (9) using a sphere decoder, one first performs a QR-decomposition of the matrix H, say H=QR. If Knt>nr, the matrix R is no longer upper triangular; it is a trapezoidal matrix with
$$K {n_{t}^{2}} K_{o}-n_{r} K_{o} n_{t}+1=K_{o} n_{t} \left(K n_{t} - n_{r} \right)+1 $$
nonzero entries in the bottom row. Hence, any sphere decoder for (9) must first resolve – perhaps by brute-force – the \(|{{\mathcal {A}}}|^{K_{o} n_{t} (K n_{t} - n_{r})}=\text {SNR}^{K_{o} r(Kn_{t}-n_{r})}\) ambiguities before processing the root of the sphere decoding tree. The number of ambiguities then forms the first term in (6).

Remark2.

A different definition of complexity exponent has appeared in [41], where Damen et al. studied the number of flops required by a sphere decoder to decode a fixed-rate space-time code at various finite SNR values. In particular, they defined the complexity exponent as the logarithm to base m of the number of flops required by a sphere decoder to complete its task, where m is the length of vector \(\underline {x}\) defined in (9). Below we highlight some of the major differences between Damens’ definition of complexity exponent and the one considered in this paper (cf. Definition 1).
  • Damens’ definition focuses on a code with a fixed rate, and Definition 1 concerns more with the theoretical asymptote at high SNR regime when the rate scales linearly with log2SNR.

  • Definition 1 considers the possibility of having a halting policy, while Damens’ definition requires the sphere decoder to complete its task at all channel realizations.

Remark3.

In [42] Damen et al. proposed to decode (9) by using GDFE-MMSE preprocessing followed by the sphere decoder when Knt>nr, in hope of making the matrix R upper-triangular and avoiding the need of resolving the ambiguities. However, it can be seen from [32, 36] that at high SNR regime the matrix R – after MMSE-GDFE preprocessing – is ill-conditioned with Kont(Kntnr) number of singular values arbitrarily close to zero. This also explains the appearance of the first term in (6).

On the other hand, when the code has a fixed rate and operates in the low or moderate SNR regime, the MMSE-GDFE approach does offer a certain complexity reduction with a negligible performance loss, as the singular values of R are numerically well-behaved in general. Other approaches for further complexity reductions under such premises are also available in the literature. For instance, Barbero and Thompson [43] proposed a fixed-complexity sphere decoder, where the number of candidates to be searched at the i-th level of sphere decoding tree is at most ni, thereby yielding a constant complexity \(\prod _{i} n_{i}\). Another way to reduce complexity is through the various orderings of singular values of R. A comprehensive study in this direction can be found for example in [44]. We shall emphasize that the complexity exponents simulated in [43, 44] are both based on Damens’ definition [41] (cf. Remark 2) because of the aforementioned premises.

In Fig. 3, we plot the complexity exponents for the sphere decoding of MAC DMT optimal codes \({{\mathcal {C}}}_{r}\) [26] when nt=2, K=5, and nr= 2, 10, 100, respectively. It can be seen that these codes can be efficiently decoded by sphere decoders only when nrKnt. Such a requirement is often impossible in practice, particularly in heterogeneous storage networks, where nodes may have only a small number of antennas in use.
Fig. 3

Complexity exponent comparison. Complexity exponents for the sphere decoding of MAC-DMT optimal codes [26] when nt=2, K=5 and nr=2,10,100

Remark4.

In case of nrKnt, it has been shown [45, 46] that the DMT optimal MIMO-MAC lattice codes can be decoded with sub-exponential complexity, i.e., having a complexity exponent asymptotically equal to 0, using the Lenstra-Lenstra-Lovász-based lattice reduction aided regularized lattice decoder. The decoder is a combination of GDFE-MMSE, lattice reduction and sphere decoding, and it has a vanishing gap of performance loss to the exact ML decoding as SNR approaches infinity.

3 Objectives for the design of transmission schemes

In Section 2, we have seen that there is a fundamental difference between the channel for DSS repair transmission and the classical MIMO-MAC, in the sense that the former includes additional inter-helper communication links. Thus, the MIMO-MAC DMT (5) and the MIMO-MAC codes [26] are no longer optimal in scenarios such as DSS repair transmission. Moreover, due to these additional inter-helper channels, it is expected that the DSS repair transmission can have a higher optimal DMT than (5). This then calls for the design of new transmission schemes with good DMT performance for DSS repairing, which is the first design objective considered in this paper.

The second design objective comes from the observation of high decoding complexity of MIMO-MAC codes [26] in Fig. 3 when Knt>nr. In a DSS, it is often possible that K is large, and nr is relatively small and fixed. This then calls for the design of new transmission schemes that can yield efficiently sphere-decodable space-time codes avoiding the need to process the ambiguities by brute-force. Potentially, such an aim could be achieved by reducing the number of “active” helper nodes, i.e., reducing the effective value of K in (1), such that the average number of independent QAM symbols received by the repairing node at each channel use be no larger than nr, as observed from (6).

In the subsequent sections, we will focus on the case of nt=1 and Knr, and we will provide three transmission schemes, each for a different configuration of the wireless DSS network and for a different design objective. The first scheme is given in Section 4 for the case of two receive antennas and an arbitrary number of helper nodes, each having one transmit antenna. It is based on a simple time sharing among pairs of helpers and is aimed at having a low sphere-decoding complexity at a cost of certain DMT performance-loss due to its neglect of existing inter-helper links. The DMT for this scheme falls between the simple time sharing DMT and optimal MIMO-MAC DMT (5).

Two more elaborate schemes will be presented in Sections 5 and 6, respectively, where we aim to improve the DMT performance at the possible cost8 of higher decoding complexity. These schemes take advantage of inter-helper channels and transform the overall DSS network into a series of relay networks, where the conventional half-duplex NAF protocol [37, 38] will be used. In particular, we will see that these schemes can outperform the MIMO-MAC DMT (5) at certain multiplexing gains, simply by exploiting inter-helper communications in the DSS.

4 Scheme 1: nt=1, nr=2, and K helper nodes

We have seen in Section 2.2 that the existing state-of-the-art MIMO-MAC space-time codes [26] could incur an extremely high decoding complexity when the repairing node has only a few number of antennas. Thus, our major aim in this section is to provide a new transmission scheme that can yield space-time codes with reduced decoding complexity. In particular, we would like these potential codes to be efficiently sphere-decodable, by which we mean that the H matrix, when writing the channel input-output relation in a vector form (cf. (9)), has linearly independent columns with probability one.

Besides the desired property of being efficiently sphere-decodable, the complexity of the transmission schemes should also be considered. In other words, if we ignore the existence of inter-helper links (2), then the schemes for DSS repair transmission can be made relatively simple. These are the main objectives of Scheme 1.

Let \({{\mathcal {K}}}=\{1,2,\ldots,K\}\) denote the set of K helper nodes, and let \({{\mathcal {U}}}\) be a collection of two subsets sof \({\mathcal {K}}\), defined as below
$${\begin{aligned} \mathcal{U}:= \left\{ \begin{array}{ll} \left\{ \{1,2\}, \{3,4,\}, \ldots, \{K-1, K\} \right\}, & \text{if}\; K \;\text{even,}\\ \left\{ \{1,2\}, \ldots, \{K-2, K-1\}, \{K,1\}, \{2,3\}, \ldots, \{K-1, K\} \right\}, & \text{if}\; K \;\text{odd.} \end{array} \right. \end{aligned}} $$
With the above, the proposed scheme is the following. For each \(U=\{u_{1}, u_{2}\} \in {\mathcal {U}}\), only helper nodes u1 and u2 are allowed to transmit during the active period of U. This implies that the probability of helper node k transmitting equals \(\frac 2K\) for every \(k \in {\mathcal {K}}\). In order to achieve an average multiplexing gain r, each helper node k, when chosen according to U, i.e. kU, should actually transmit at a higher multiplexing gain \(\frac {Kr}{2}\). We summarize the above scheme below, and a pictorial description of Scheme 1 is given in Fig. 4.
Fig. 4

Channel model of Scheme 1. Channel model for Scheme 1 at the Uth step, U={u1,u2}⊂{1,2,…,K}

The following theorem is a straightforward consequence of [34].

Theorem1.

The DMT performance achieved by Scheme 1 is
$$ d_{1}(r) \ = \ \min\left\{ d^{*}_{1,2} \left(\frac{Kr}{2} \right), d^{*}_{2,2} \left(Kr\right) \right\} $$
(10)
In Fig. 5, we consider the case nt=1, nr=2 and K=10, and compare d1(r) to \(d^{*}_{1,2,10}(r)\), which is the DMT corresponding to all 10 helper nodes transmitting simultaneously. The function d0(r) is the DMT for the time-division multiple-access (TDMA)-based scheme, by which we mean that each helper node takes turns in an orthogonal manner to transmit information to the repairing node at multiplexing gain Kr. It can be seen that the first proposed scheme outperforms the TDMA scheme in terms of the DMT, and there is a considerable gap between d1(r) and \(d^{*}_{1,2,10}(r)\). However, the comparison is unfair in the sense that in order to achieve \(d^{*}_{1,2,10}(r)\) the codes in [26] would require exponentially large computational reserves, or equivalently an exponentially long time, for decoding.
Fig. 5

Scheme 1: DMT comparison. DMT performances achieved by MIMO-MAC, Scheme 1 and time-sharing scheme for K=10 helper nodes, nt=1, and nr=2

Continuing the example of nt=1, nr=2 and K=10, by modifying the two-user MIMO-MAC code given in [26] according to Scheme 1, it can be directly seen from (6) that the resulting code achieves DMT d1(r) with complexity exponent
$$ {\small{\begin{aligned} c_{1}(r) :=\ 3 \sup\limits_{\underline{\mu}\in {\mathcal{B}}_{1}(r)} \sum_{i=1}^{2} \left[ \min\left\{\frac{rK}{2}, \frac{Kr}{2}+\mu_{i} -1\right\}\right]^{+}, \end{aligned}}} $$
(11)
where
$$ {}{{\mathcal{B}}}_{1}(r) \,=\,\! \left\{ \underline{\mu}\!=\,[\mu_{1} \ \mu_{2}]^{\top} \!\!\in\! {\mathbb R}^{2}\!:\! \mu_{1} \!\geq\! \mu_{2}\! \geq\! 0, \mu_{1} \,+\, 3 \mu_{2} \!\leq\! d_{1}(r)\! \right\}\!, $$
(12)
when it is decoded using a sphere decoder with halting policies. In Fig. 6, we compare c1(r) to the complexity exponent c1,2,10(r) of the MIMO-MAC code given in [26] for the case nt=1, nr=2 and K=10. It can be clearly seen that the proposed scheme can yield a code with with a much lower decoding complexity.
Fig. 6

Complexity exponent comparison. Complexity exponents for the sphere decoding of the MIMO-MAC code given in [26] (c1,2,10(r)) and the proposed code (c1(r)) based on Scheme 1 for the case of nt=1, nr=2 and K=10

5 Scheme 2: nt=1, general nr, and K helper nodes

The aim of Scheme 1 presented in the previous section was to have a small decoding complexity, at a cost of certain DMT performance loss due to the neglect of inter-helper links in DSS repair-communication. In this section as well as the next, we will shift our focus to designing transmission schemes that take into account these inter-helper links and beat the DMT performance \(d^{*}_{n_{t}, n_{r}, K}(r)\).

Consider a DSS repair channel with K helpers, each having nt=1 transmit antenna, and a repairing node with nr receive antennas. To make good use of the inter-helper links, we interpret in Scheme 2 some of the links as links of a relay channel. More specifically, in this scheme each of the K helper nodes will take turns acting as the source in a cooperative relay network [37], while the remaining K−1 helper nodes play the role of relays helping the source to send information to the repairing node.

With the above, the proposed scheme is a modification of the NAF protocol [37, 38] for a cooperative relay network with K−1 relays. It consists of K phases, and each phase requires at least 2(K−1) channel uses. Thus, the total number of channel uses required by Scheme 2 is at least 2K(K−1).

Let \({\mathcal {K}}=\{1,2,\ldots,K\}\) denote the set of K helper nodes. Given \(k \in {\mathcal {K}}\), the scheme is at the kth phase, and helper node k acts as the source of a relay network. The remaining helper nodes \({\mathcal {R}}_{k}:= {\mathcal {K}}\setminus \{k\}=\{u_{1}, \ldots, u_{K-1}\}\) are the relays. At the tth channel use of the kth phase, t=1,2,…,2(K−1), node k broadcasts a signal xk,t, subject to the power constraint \(\mathbb {E} |{x_{k,t}}|^{2} \leq \text {SNR}\), to all nodes in \({\mathcal {R}}_{k}\) as well as to the repairing node. Due to the half-duplex assumption in Section 2, the nodes in \({\mathcal {R}}_{k}\) can either receive or transmit, but not both at the same time. Therefore, the behavior of each node \(u_{i} \in {{\mathcal {R}}}_{k}\) is set such that it receives the signal from node k when t=2i−1 and transmits to the repairing node when t=2i. More specifically, the signal received by node ui at t=2i−1 is given by
$$ r_{u_{i},2i-1} = g_{u_{i}, k} x_{k,2i-1} + z_{u_{i}, k, 2i-1}, $$
(13)
where \(g_{u_{i}, k}\) and \(z_{u_{i}, k, 2i-1}\) are i.i.d. \(\mathbb {C}{\cal {N}}(0,1)\) random variables representing the channel gain from node k to node ui and the additive noise, respectively, as defined in (2). Node ui then amplifies the signal \(r_{u_{i},2i-1}\) with an amplification factor \(a_{u_{i}, k}\) set such that
$$ {\small{\begin{aligned} \mathbb{E} |{a_{u_{i}, k} r_{u_{i},2i-1}}|^{2} \leq \text{SNR}, \end{aligned}}} $$
(14)
where the expectation is taken with respect to xk,2i−1 and \(z_{u_{i}, k, 2i-1}\), since \(g_{u_{i}, k}\) is already known to node ui. Equivalently, we have
$$ {\small{\begin{aligned} |{a_{u_{i}, k}}|^{2} \leq \frac{\text{SNR}}{1 + \text{SNR} |{g_{u_{i}, k}}|^{2}}. \end{aligned}}} $$
(15)

Then, at channel use t=2i, node ui joins node k and sends the amplified signal \(a_{u_{i}, k} r_{u_{i},2i-1}\) to the repairing node.

Since each helper node k is allowed to transmit its own message to the repairing node during the kth phase, its multiplexing gain must be increased to K·r in order to achieve the desired average multiplexing gain r. We now summarize the steps of Scheme 2 below. A pictorial description of Scheme 2 is given in Fig. 7.
Fig. 7

Channel model of Scheme 2. Channel model for Scheme 2 at kth phase

5.1 DMT achieved by Scheme 2

Note firstly that by the symmetry among the phases of Scheme 2, it suffices to analyze the DMT achieved within the first phase, i.e., for k=1, where the helper node 1 acts as the source, and the remaining helper nodes are relays. Thus, for notational convenience, we will henceforth drop the subindex k.

Set N=2(K−1), and let xt be a \(\mathbb {C}{\cal {N}}(0,\text {SNR})\) random variable, representing the signal sent by helper node 1 at time instance t for t=1,2,…,N. Then, the signal received by the repairing node at the tth channel use is
$$ {}\underline{y}_{t} =\! \left\{ \begin{array}{ll} \underline{h}_{1} x_{t} + \underline{w}_{t}, & t \; \text{odd,}\\ \underline{h}_{1} x_{t} + a_{i} \underline{h}_{i} \left(g_{i} x_{t-1} + z_{i} \right) + \underline{w}_{t}, & t \; \text{even and}\; i=\frac{t}{2} \,+\,1, \end{array} \right. $$
(19)
where gi and zi’s are i.i.d. \(\mathbb {C}{\cal {N}}(0,1)\) random variables obtained by re-indexing the corresponding variables in (16) for notational convenience. The amplification factor \(a_{i} \in \mathbb {R}^{+}\), i=2,…,K, is set such that
$$|{a_{i}}|^{2} \leq \frac{\text{SNR}}{1 + \text{SNR} |{g_{i}}|^{2}}. $$
We can equivalently reformulate the received vectors \(\underline {y}_{t}\) in (19) in matrix form, as
$$\begin{array}{@{}rcl@{}} \underline{y} &=& \left[ \begin{array}{cccc} \underline{y}_{1}&\underline{y}_{2}&\cdots&\underline{y}_{N} \end{array} \right]^{\top} \\ &=&\!\!\! \underbrace{\left[\!\!\! \begin{array}{ccccc} \underline{h}_{1} & \underline{0} & \cdots & \underline{0} & \underline{0}\\ a_{2} g_{2} \underline{h}_{2} & \underline{h}_{1} & \cdots & \underline{0} & \underline{0}\\ \vdots & \vdots & \ddots & \vdots & \vdots \\ \underline{0} & \underline{0} &\cdots & \underline{h}_{1} & \underline{0} \\ \underline{0} & \underline{0} &\cdots & a_{K}g_{K} \underline{h}_{K} & \underline{h}_{1} \end{array}\!\!\!\right]}_{H} \underbrace{\left[\!\!\! \begin{array}{c} x_{1}\\ x_{2}\\ \vdots\\ x_{N-1}\\ x_{N} \end{array} \!\!\!\!\right]}_{\underline{x}}\,+\,\!\underbrace{\left[\!\!\! \begin{array}{c} \underline{w}_{1}\\ a_{2} z_{2} \underline{h}_{2} + \underline{w}_{2}\\ \underline{w}_{3}\\ a_{3} z_{3} \underline{h}_{3} + \underline{w}_{4}\\ \vdots\\ \underline{w}_{N-1}\\ a_{K} z_{K} \underline{h}_{K} + \underline{w}_{N} \end{array}\!\! \right]}_{\underline{v}}\!.\\ \end{array} $$
(20)
Given H, the instantaneous mutual information between the transmitted signal \(\underline {x}\) and the received signal \(\underline {y}\) is
$$\begin{array}{@{}rcl@{}} I(\underline{x}; \underline{y} \mid H) &=& \log_{2} \det \left(K_{v} + \text{SNR} H H^{\dag} \right) - \log_{2} \det(K_{v}) \\ &=& \sum_{i=2}^{K} \log_{2} \det \left(I_{2} + \text{SNR} H_{i}^{\dag} K_{i}^{-1} H_{i} \right), \end{array} $$
(21)
where
$$ {\small{\begin{aligned} {}K_{v} \,=\, \mathbb{E} (\underline{v}\, \underline{v}^{\dag}), \ H_{i} \,=\, \left[\! \begin{array}{cc} \underline{h}_{1} & 0\\ a_{i} g_{i} \underline{h}_{i} & \underline{h}_{1} \end{array}\! \right], \text{and}\; K_{i} \,=\, \left[\! \begin{array}{cc} I_{n_{r}} & \\ & I_{n_{r}} + |{a_{i}}|^{2} \underline{h}_{i} \underline{h}_{i}^{\dag} \end{array}\! \right]. \end{aligned}}} $$
(22)
Thus, the outage probability for Scheme 2 is given by
$$ {\begin{aligned} \Pr \left\{ H : \sup_{|{a_{i}}|^{2} \leq \frac{\text{SNR}}{1 + \text{SNR} |{g_{i}}|^{2}} } I \left(\underline{x}; \underline{y} \mid H \right) < 2 K(K-1) r \log_{2} \text{SNR}\right\} \doteq \text{SNR}^{-d_{2}(r)}, \end{aligned}} $$
(23)
where the target information rate 2K(K−1)r log2SNR arises from the facts that
  • the scheme takes K phases to complete, and

  • each phase requires 2(K−1) channel uses.

5.2 DMT achieved by Scheme 2 when nr=1

When nr=1, it can be seen that the DMT achieved by Scheme 2 is exactly the DMT for the NAF protocol derived by Azarian et al. [38] with K−1 relays and multiplexing gain Kr. Hence, the following result is immediate from [38].

Theorem2.

The DMT achieved by Scheme 2 when nr=1 is the following
$$ d_{2}(r) \left|{\!~\!}_{n_{r}=1} = (1-Kr)^{+} + (K-1)(1-2Kr)^{+}\right.. $$
(24)
In Fig. 8, we plot the DMT performance achieved by this scheme for the case of K=10 helper nodes. We also include the base-line TDMA scheme for comparison. It can be seen that the proposed scheme has a better DMT performance than \(d^{*}_{n_{t}, n_{r}, K}(r)\) for \(r \leq \frac {1}{2K+1}=\frac {1}{21}\), due to the use of additional inter-helper links.
Fig. 8

Scheme 2: DMT comparison. DMT performances achieved by Scheme 2, MIMO-MAC and time-sharing scheme for K=10 helper nodes, nt=1, and nr=1

5.3 Upper and lower bounds on d2(r) with general nr

Analyzing the outage probability (23) turns out to be very challenging in general when the repairing node has multiple antennas, i.e., nr≥2. Almost all existing works such as [38, 47] consider only the case nr=1. In [39] Yang and Belfiore investigated the DMT for the MIMO-NAF protocol and provided a lower bound for such DMT. Their result can be modified to yield a lower bound for d2(r). We will comment more on that particular lower bound at the end of this subsection.

To provide bounds on the DMT d2(r) for general values of nr, let U be an (nr×nr) unitary matrix such that \( U \, \underline {h}_{1} =\; [\! \begin {array}{cccc} ||{\underline {h}_{1}}||&0&\cdots &0 \end {array} ]^{\top } := \underline {h}. \)

For Hi defined in (22), i=2,…,K, we get
$$ {\text{diag}}(U,U)H_{i} = \left[ \begin{array}{cc} U & \\ & U \end{array} \right] H_{i} = \left[ \begin{array}{cc} \underline{h} & \underline{0}\\ a_{i} g_{i} \underline{\ell}_{i} & \underline{h} \end{array} \right] = S_{i}, $$
(25)
where \(\underline {\ell }_{i} = U \underline {h}_{i}\) has the same probability density function as \(\underline {h}_{i}\), i=2,…,K. Let \( \Sigma _{i} := I_{n_{r}} + |{a_{i}}|^{2} \underline {h}_{i} \underline {h}_{i}^{\dag }\). Clearly, we have the following partial ordering for positive-definite matrices,
$$I_{n_{r}} \prec \Sigma_{i} \prec \left(1 + |{a_{i}}|^{2} ||{\underline{h}_{i}}||^{2} \right) I_{n_{r}} = \left(1 + |{a_{i}}|^{2} ||{\underline{\ell}_{i}}||^{2} \right) I_{n_{r}}, $$
which in turn implies \( \frac {1}{1 + |{a_{i}}|^{2} ||{\underline {\ell }_{i}}||^{2}} I_{n_{r}} \prec \Sigma _{i}^{-1} \prec I_{n_{r}} \). With the above, \(I(\underline {x};\underline {y} \mid H)\) can be upper bounded by
$$\begin{array}{*{20}l} &I(\underline{x}; \underline{y} \mid H)\\ & \leq \sum_{i=2}^{K} \log_{2} \det \left(I_{2} + \text{SNR} H_{i}^{\dag} H_{i} \right) \end{array} $$
(26)
$$\begin{array}{*{20}l} &= \sum_{i=2}^{K} \log_{2} \bigg[ \left(1 + \text{SNR} ||{\underline{h}}||^{2} \right)^{2}+ \text{SNR} |{a_{i} g_{i}}|^{2}||{\underline{\ell}_{i}}||^{2} \\ & \qquad \qquad \quad \; +\text{SNR}^{2} |{a_{i} g_{i}}|^{2}||{\underline{h}}||^{2} \sum_{j=2}^{n_{r}} |{\ell_{i,j}}|^{2} \bigg]. \end{array} $$
(27)
Similarly, set \(c_{i} = \frac {1}{1 + |{a_{i}}|^{2}||{\ell _{i}}||^{2}}\), and \(I(\underline {x}; \underline {y} \mid H)\) is lower bounded by
$$\begin{array}{*{20}l} & I(\underline{x}; \underline{y} \mid H) \\ & \geq \sum_{i=2}^{K} \log_{2} \det \left(I_{2} + \text{SNR} S_{i}^{\dag} \left[ \begin{array}{cc} I_{n_{r}} & \\ & c_{i} I_{n_{r}} \end{array} \right] S_{i} \right) \end{array} $$
(28)
$$\begin{array}{*{20}l} & = \sum_{i=2}^{K} \log_{2} \bigg[ 1 + (1+c_{i}) \text{SNR} ||{\underline{h}}||^{2} + c_{i} |{a_{i} g_{i}}|^{2} ||{\underline{\ell}_{i}}||^{2} \text{SNR} \\ & \quad+ c_{i} \text{SNR}^{2} ||{\underline{h}}||^{4} + {c_{i}^{2}} |{a_{i} g_{i}}|^{2} \text{SNR}^{2} ||{\underline{h}}||^{2} \sum_{j=2}^{n_{r}} |{\ell_{i,j}}|^{2} \bigg]. \end{array} $$
(29)

Equations (27) and (29) then yield the following theorem for bounding the DMT d2(r) for Scheme 2.

Theorem3.

The DMT d2(r)of Scheme 2 for a general number nr≥1 of receive antennas at the repairing node has the following upper bound d2,U(r) and lower bound d2,L(r) :
$$ \begin{aligned} d_{2,U}(r) &:= \inf_{g} \ \sup_{b \leq g}\ \inf_{(\alpha, \beta_{1}, \beta_{2}) \in {\mathcal{A}}_{U}(r,b,g)} n_{r} \alpha + (K-1) \beta_{1}& \\ & \qquad +(n_{r}-1) (K-1) \beta_{2} + (K-1) g \end{aligned} $$
(30)
$$ \begin{aligned} d_{2,L}(r) := \inf_{g} \sup_{b \leq g} \inf_{(\alpha, \beta_{1}, \beta_{2}) \in {\mathcal{A}}_{L}(r,b,g)} n_{r} \alpha + (K-1) \beta_{1} \\ + (n_{r}-1) (K-1) \beta_{2} + (K-1) g \end{aligned} $$
(31)
where
$$ {{\begin{aligned} &\mathcal{A}_{U}(r,b,g) \\ &=\! \left\{ \alpha, \beta_{1}, \beta_{2} \in [0,1] : \max \left\{ \begin{array}{l} 2 (1-\alpha),\\ 1+b-g-\min\left\{ \beta_{1}, \beta_{2}\right\},\\ 2+b-g-\beta_{2} \end{array}\right\} \leq 2 K r\right\} \end{aligned}}} $$
(32)
and
$$ {{\begin{aligned} &\mathcal{A}_{L}(r,b,g) \\ &=\! \left\{ \alpha, \beta_{1}, \beta_{2}\in [0,1] : \max \left\{ \begin{array}{l} 1-\alpha,\\ 2-2\alpha-(b-\beta)^{+},\\ 1-\beta+b-g-(b-\beta)^{+},\\ 2-\alpha+b-g-\beta_{2}-2(b-\beta)^{+} \end{array} \right\}\!\leq 2K r \right\}. \end{aligned}}} $$
(33)

Proof.

Note that the random variables gi’s are i.i.d., hence there is no need to distinguish them in (27) and (29) when deriving the DMT. The same holds also true for ai, \(\underline {\ell _{i}}\), and its elements i,j for i=2,…,K. Thus, we set \(|{a_{i}}|^{2} \doteq \text {SNR}^{b}\), \(|{g_{i}}|^{2} \doteq \text {SNR}^{-g}\), \(||{\underline {h}}||^{2} \doteq \text {SNR}^{-\alpha }\), \(||{\underline {\ell }_{i}}||^{2} \doteq \text {SNR}^{-\beta }\), and \(|{\ell _{i,j}}|^{2} \doteq \text {SNR}^{-\beta _{j}}\) with \(\beta = \min _{j=1,\ldots,n_{r}} \beta _{j}\). Moreover, we note that \(||{\underline {h}}||^{2}\) is a χ2 random variable with 2nr degrees of freedom, hence it contributes the term nrα to (27). Each \(\underline {\ell }_{i}\) consists of nr i.i.d. \(\mathbb {C}{\cal {N}}(0,1)\) complex random variables, and there is no need to distinguish i,j for i=2,…,K and for j=2,…,nr as can be seen from (27) and (29). Hence, we can set \(|{\ell _{i,j}}|^{2} \doteq \text {SNR}^{-\beta _{2}}\) for i=2,…,K and for j=2,…,nr. Similarly, there is no need to distinguish i,1 for i=2,…,K, hence we set \(|{\ell _{i,1}}|^{2} \doteq \text {SNR}^{-\beta _{1}}\) for i=2,…,K. Finally, note that |gi|2 and |i,j|2 are i.i.d. χ2 random variables with two degrees of freedom. Plugging the above into (27) and (29) and applying the Laplace principle as in [27] yield the desired upper and lower bounds (30) and (31).

In Fig. 9, we plot the DMT bounds d2,L(r) and d2,U(r) of Scheme 2 as well as the DMT d1,2,10(r) with K=10 helper nodes, nt=1 and nr=2. While there is a gap between bounds d2,L(r) and d2,U(r) when the multiplexing gain r is small, it can be clearly seen that Scheme 2 can offer a better DMT performance than d1,2,10(r) when r is small. Regarding the sharpness of d2,L(r) and d2,U(r), let us focus on the case when r is approaching zero from the right, i.e., when r0. Note that there are nine SISO channels from helper node 1 to the remaining helper nodes, and the channel between node 1 and the repairing node is a (1×2) SIMO channel. Therefore, the communication to the repairing node would be in outage if the nine SISO channels and the (1×2) SIMO channel are all in deep fade, thereby yielding a maximal diversity order of 9+2=11. We therefore conclude that the upper bound d2,U(r) can be further improved.
Fig. 9

Scheme 2: DMT bounds and comparison. DMT performances achieved by Scheme 2 (lower bound and the first upper bound) and MIMO-MAC for K=10 helper nodes, nt=1, and nr=2

As mentioned earlier, Yang and Belfiore ([39], Theorem 2) provided a lower bound on the DMT for MIMO-NAF protocol. Their bound can be modified to become a lower bound for d2(r) and has the following form
$$ d_{\text{2,L,YB}}(r) = n_{r} \cdot (1-Kr)^{+} + (K-1) \cdot d_{\text{RP}}(2Kr), $$
(34)

where dRP(r) is the DMT for the Rayleigh product channel \(\underline {h}_{i} \cdot g_{i}\), and an exact expression for dRP(r) can be found in ([39], Proposition 1).

In Fig. 10, we compare our lower bound d2,L(r) to the lower bound d2,L,YB(r) for the case nt=1, nr=2 and K=10. It can be clearly seen that, in this case, our bound is shaper than the bound (34).
Fig. 10

Scheme 2: DMT bounds and comparison. A comparison between Yang-Belfiore lower bound d2,L,YB(r) [39] and our lower bound d2,L(r) in (31) for the DMT achieved by Scheme 2 when nt=1, nr=2 and K=10

5.4 Another upper bound on d2(r) with general nr

To obtain another upper bound on the instantaneous mutual information \(I(\underline {x}; \underline {y} \mid H)\), we consider the situation that the repairing node has further knowledge of ri,t−1=gixt−1+zi when t=2,4,…,N and \(i=\frac t2 +1\). In this case, define
$$ \underline{y}'_{t} \ = \ \underline{h}_{1} x_{t} + w_{t}, \quad t=1,2,\ldots,N. $$
(35)
Writing \(\underline {y}_{t} = \underline {y}'_{t} + a_{i} \underline {h}_{i} r_{i,t-1}\) for t=2(i−1), it follows that
$$ {}I \left(\underline{x}; \underline{y} \mid H \right) \ \leq \ I \left(\underline{x};\ \underline{y}'_{1}, \ldots, \underline{y}'_{N}, r_{2,1}, r_{3,3}, \ldots, r_{K,N-1} \mid H \right), $$
(36)
and the upper bound has a much simpler expression than \(I \left (\underline {x}; \underline {y} \mid H\right) \). To see this, formulate the received vectors as
$$ \begin{aligned} \underline{y}_{U} := \left[ \begin{array}{c} \underline{y}'_{1}\\ \underline{y}'_{3}\\ \vdots\\ \underline{y}'_{N-1}\\ \underline{y}'_{2}\\ \vdots\\ \underline{y}'_{N}\\ r_{2,1}\\ \vdots\\ r_{K,N-1} \end{array} \right] \ = \ \underbrace{\left[ \begin{array}{ccccccc} \underline{h}_{1} & & & & & & \\ & \_{h}_{1} & & & & & \\ & & \ddots & & &&\\ & && \underline{h}_{1} &&&\\ & &&& \underline{h}_{1} & &\\ & &&&& \ddots & \\ & &&&&& \underline{h}_{1}\\ g_{2} & & & && \\ & \ddots && & &\\ && g_{K} & & &\end{array} \right]}_{H_{U}}\\ \left[\begin{array}{c} x_{1}\\ x_{3}\\ \vdots\\ x_{N-1}\\ x_{2}\\ x_{4}\\ \vdots\\ x_{N} \end{array} \right] + \left[ \begin{array}{c} \underline{w}_{1}\\ \underline{w}_{3}\\ \vdots\\ \underline{w}_{N-1}\\ \underline{w}_{2}\\ \vdots\\ \underline{w}_{N}\\ z_{2}\\ \vdots\\ z_{K} \end{array} \right]; \end{aligned} $$
(37)
then
$$ {\small{\begin{aligned} {}H_{U}^{\dag} H_{U} \ = \ \left[ \begin{array}{cccc} ||{\underline{h}_{1}}||^{2} +|{g_{2}}|^{2} && & \\ & \ddots & &\\ & & ||{\underline{h}_{1}}||^{2} +|{g_{K}}|^{2} & \\ & & & ||{\underline{h}_{1}}||^{2} I_{K-1} \end{array} \right]\,. \end{aligned}}} $$
(38)
This implies that
$$ {\small{\begin{aligned} &I \left(\underline{x}; \underline{y} \mid H \right)\\ & \leq I \left(\underline{x}; \underline{y}_{U} \mid H \right)\\ &= (K-1) \log_{2} (1+ \text{SNR} ||{\underline{h}_{1}}||^{2}) \\ &\quad+ \sum_{i=2}^{K} \log_{2} \left(1 + \text{SNR} \left(||{\underline{h}_{1}}||^{2} +|{g_{i}}|^{2}\right)\right). \end{aligned}}} $$
(39)
Hence, the outage probability for the second scheme is lower bounded by
$$\begin{array}{*{20}l} {\small{\begin{aligned} &\Pr \left\{\!H \!: \sup_{|{a_{i}}|^{2} \leq \frac{\text{SNR}}{1 + \text{SNR} |{g_{i}}|^{2}}} I \left(\underline{x}; \underline{y} \mid H \right)\! < 2 K(K-1) r \log_{2} \text{SNR}\right\}\\ & \geq \Pr \left\{ H: I \left(\underline{x}; \underline{y}_{U} \mid H \right) < 2K(K-1) r \log_{2} \text{SNR} \right\} \end{aligned}}} \end{array} $$
(40)
$$\begin{array}{*{20}l} \,\,\doteq \text{SNR}^{-d_{2,U'}(r)}. \end{array} $$
(41)

Theorem4.

The DMT d2(r)for Scheme 2 for a general number nr≥1 of receive antennas at the repairing node is upper bounded by
$$ {{\begin{aligned} {}d_{2,U'}(r) = \left\{ \begin{array}{ll} (n_{r}+K-1)(1-Kr)^{+}, & \text{if \(n_{r} \geq K-1\),}\\ 2n_{r}(1-Kr)^{+} + (K-1-n_{r}) (1-2Kr)^{+},& \text{if \(n_{r} \leq K-1\).} \end{array} \right. \end{aligned}}} $$
(42)

Proof.

Similar to the proof of Theorem 3, it is unnecessary to distinguish the random variables gi in (39) for i=2,…,K when calculating the DMT. Thus, let \(||{\underline {h}_{1}}||^{2} = \text {SNR}^{-\alpha }\) and |gi|2=SNRβ. Note \(||{\underline {h}_{1}}||^{2}\) is a χ2 random variable with 2nr degrees of freedom and |gi|2 is a χ2 random variable with 2 degrees of freedom. Plugging the above into (41) and applying the Laplace principle as in [27] gives
$$d_{2,U'} (r) = \inf_{{\mathcal{B}}(r)} n_{r} \alpha + (K-1) \beta, $$
where
$$\begin{array}{@{}rcl@{}} {\mathcal{B}}(r) &=& \left\{ \alpha, \beta \in [0,1] : 1-\alpha + \max\{1-\alpha, 1-\beta\} \ \leq 2K r \right\}\\ &=& \left\{ \alpha, \beta\in [0,1] : 2(1-\alpha) + (\alpha-\beta)^{+} \ \leq \ 2 K r \right\}. \end{array} $$

Solving the above optimization problem gives the desired result. □

In Fig. 11, we plot d2,L(r), d2,U(r), and \(\phantom {\dot {i}\!}d_{2,U'}(r)\) for the second proposed scheme with K=10 helper nodes, nt=1 and nr=2. It can be seen that \(\phantom {\dot {i}\!}d_{2,L}(r)=d_{2,U'}(r)\) for all values of r, hence we have \(\phantom {\dot {i}\!}d_{2}(r) = d_{2,L}(r)=d_{2,U'}(r)\) in this case.
Fig. 11

Scheme 2: improved DMT bounds. DMT performances achieved by Scheme 2 (two upper bounds and a lower bound) for K=10 helper nodes, nt=1, and nr=2

5.5 Remarks on the complexity exponents of Scheme 2

Determining the complexity exponents of the second scheme requires much more effort than determining the DMT. At least two major difficulties must be resolved before any identification of complexity exponents is possible. Notice that the notion of complexity exponents resides in an actual construction of space-time codes for the scheme, and that the complexity exponents can vary from one code to another. Codes with a smaller complexity exponent are more favorable in practice, provided that the codes are optimal in the DMT sense, i.e., achieve the DMT d2(r). Therefore, we have to at least identify a space-time code for Scheme 2 first. In [39], Yang and Belfiore provided a systematic construction of space-time codes that is approximately universal [48] for NAF-based cooperative relay communications. It is certainly possible to adapt their construction to the transmission using Scheme 2.

The second issue complicating the investigation of complexity exponents arises from the need of an exact characterization of eigenvalues of the matrices \(H_{i}^{\dag } K_{i}^{-1} H_{i}\) for i=2,…,K, appearing in (21). Determining these eigenvalues is particularly difficult. It is in fact the main reason preventing us from obtaining an exact expression for d2(r) in previous subsections, and we are only able to provide bounds on d2(r) in this paper.

Nevertheless, it can be seen from (20) that the equivalent channel matrix H is of size (Nnr×N) and has linearly independent columns with probability 1. This implies that when applying a sphere decoder to decode the codes—for instance, the code constructed by Yang and Belfiore [39]—transmitted using Scheme 2, the QR decomposition of the matrix H would result in an upper triangular matrix R; hence, there is no ambiguity to be resolved prior to processing the root of the sphere decoding tree. Therefore, the code must be efficiently sphere decodable.

6 Scheme 3: nt=1, nr≥2, and K helper nodes

In the previous section, we presented a powerful scheme that makes a good use of the inter-helper links to improve the DMT performance of DSS repair transmission. The scheme allows one helper node to transmit information in each phase, and the remaining helper nodes are regarded as relays. Furthermore, we have introduced a novel technique that allows us to upper-bound the DMT for the NAF protocol in a cooperative relay network with multiple antennas at the repairing node. In this section, we will present our third scheme, which can be seen as an enhancement of Schemes 1 and 2 and can provide a further improvement on the DMT performance.

The third proposed scheme concerns the case nt=1, nr≥2 and K helper nodes. It allows L helper nodes, L≤ min{nr,K−1}, to transmit simultaneously and non-cooperatively to the repairing node as well as to the remaining (KL) helper nodes, which will function as relays9 in the network. To achieve an average multiplexing gain r, each of the selected L helper nodes must transmit at a higher multiplexing gain of \(\frac {K}{L} r\). In particular, we could later seek to improve the overall DMT performance by optimizing over the choices of L. Therefore, L can actually be a function of the multiplexing gain r.

Given L, the third scheme consists of \(\binom {K}{L}\) phases, one for each possible L-subset \({{\mathcal {L}}}=\{i_{1}, \ldots, i_{L}\}\) of \({{\mathcal {K}}}\), where \({{\mathcal {K}}}=\{1,2,\ldots,K\}\) is the set of helper nodes. The helper nodes in set \({{\mathcal {L}}}\) transmit simultaneously and non-cooperatively throughout the phase, which has a duration of N=2(KL) channel uses. The remaining nodes in \({{\mathcal {K}}}\setminus {{\mathcal {L}}}=\{j_{1}, \ldots, j_{K-L}\}\) will function as relays following the NAF protocol. Details of this scheme are given as below, and a pictorial description of this scheme is given in Fig. 12.
Fig. 12

Channel model of Scheme 3. Channel model for Scheme 3 at the phase associated with \({\mathcal {L}}=\{i_{1}, \ldots, i_{L}\}\)

6.1 DMT analysis for Scheme 3

The communication channel deduced from Scheme 3 resembles the multiple-access relay channel (MARC), which was first introduced by Kramer and van Wijngaarden [49]. The DMTs for the two-user and single-relay MARC—in terms of our notation this means nt=1, nr=1, K=3 and L=2—using various protocols have been studied in the past. For instance, Azarian et al. [50] investigated the DMT for such MARC using the dynamic-decode-and-forward (DDF) strategy, and Yuksel and Erkip [51] focused on the compress-forward (CF) protocol. Furthermore, a protocol similar to Scheme 3 was proposed in [40] and was termed multiple-access amplify-and-forward (MAF), which is a variation of the NAF protocol. It was found in [40] that the MAF outperforms the DDF in the high multiplexing gain regime and the CF protocol [51] in the low multiplexing gain regime when nt=1, nr=1, K=3, and L=2. The MAF thus provides a nice balance between complexity and performance.

Scheme 3 considers a much more complicated scenario than the one in [40], with nt=1, and general values of nr, K and L≤ min{nr,K−1}. To the best of our knowledge, the DMT analysis for the MAF protocol has never been taken to such complexity level. On the other hand, our novel bounding technique employed in the proof of Theorem 4 is extremely powerful and enables us to analyze the DMT for general MARC using the MAF protocol.

To this end, for any subset \({{\mathcal {U}}}=\left \{u_{1}, \ldots, u_{k}\right \} \subseteq {{\mathcal {L}}}\) of the selected helper nodes, let \({{\mathcal {E}}}_{{\mathcal {U}}}\) denote the event that helper nodes u1,…,uk are in outage. The probability for \({{\mathcal {E}}}_{{\mathcal {U}}}\) is given by

$${} {\small{\begin{aligned} &\Pr \left\{ {{\mathcal{E}}}_{{\mathcal{U}}} \right\} \\ &=\!\Pr \Big\{\!\left\{\underline{h}_{i}\right\}_{i=1}^{K}, \left\{g_{i,j}\right\}_{i,j=1}^{K} :\! \sup_{a_{j_{s}} \atop s=1,\ldots,K-L} \!I \big(\!\! \left\{ x_{u, t} \!: \!u \in {{\mathcal{U}}} \right\}_{t=1}^{N}; \underline{y}_{1}, \ldots, \underline{y}_{N} \big| \\ &\quad \left\{ x_{u, t} : u \in {{\mathcal{L}}} \setminus {{\mathcal{U}}}\right\}_{t=1}^{N}, \left\{\underline{h}_{i}\right\}_{i=1}^{K}, \left\{g_{i,j}\right\}_{i,j=1}^{K}\! \big) \!<\! \frac{NK}{L} r k \log_{2} \text{SNR}\! \Big\}, \end{aligned}}} $$
(46)
where N=2(KL). The overall outage probability for the third proposed scheme with given L is
$$ {\small{\begin{aligned} {}P_{{\text{out}},3}(L,r) \ := \ \Pr\left\{ \bigcup_{{{\mathcal{U}}} \subseteq {{\mathcal{L}}}} {{\mathcal{E}}}_{{\mathcal{U}}} \right\} \doteq \ \max_{{{\mathcal{U}}} \subseteq {{\mathcal{L}}}} \Pr \left\{ {{\mathcal{E}}}_{{\mathcal{U}}} \right\} \ \doteq \ \text{SNR}^{-d_{3}(L,r)}. \end{aligned}}} $$
(47)

The technique introduced in Section 5.4 can be applied to yield the following upper bound on d3(L,r).

Theorem5.

The DMT d3(L,r) can be upper bounded as
$$ {\small{\begin{aligned} {}d_{3}(L,r) \leq d_{3,U}(L,r) &:= \min_{k=1,\ldots,L} \inf_{{\mathcal{A}}(L,k,r)} \sum_{i=1}^{k} [2i-1\,+\,(n_{r}-k)] \alpha_{i}\\ &\quad+ (K-L) \left[ \sum_{j=1}^{k} \beta_{j} +(n_{r}-k) \beta_{k+1} \right], \end{aligned}}} $$
(48)
where
$${} {{\begin{aligned} &\mathcal{A}(L,k,r) \\ &:= \left\{ \begin{array}{l} \alpha_{1}, \cdots \alpha_{k}, \beta_{1}, \cdots \beta_{k+1}: \\ \ \begin{array}{l} 1 \geq \alpha_{1} \geq \alpha_{2} \geq \cdots \geq \alpha_{k} \geq 0,\\ \alpha_{i} \geq \beta_{i} \geq 0, \quad i=1, 2, \ldots,k, \\ \beta_{k+1} \geq 0 \text{and } \beta_{k+1}=0 \text{if \(n_{r}=k\)},\\ \sum_{i=1}^{k} (1-\alpha_{i}) + \frac12 \max\left\{ \alpha_{1} -\beta_{1},\ldots,\alpha_{k}-\beta_{k}, \beta_{k+1} \right\} < \frac{Krk}{L} \end{array} \end{array}\! \right\}\!. \end{aligned}}} $$
(49)

Proof.

Given any \({\mathcal {U}}=\left \{u_{1}, \ldots, u_{k}\right \} \subseteq {\mathcal {L}}\) of selected helper nodes, we first reformulate the channel input-output relations (45) in matrix form. For the sake of notational convenience, we set \(\phantom {\dot {i}\!}r_{s}=r_{j_{s}, 2s-1}\), \(\phantom {\dot {i}\!}z_{s}=z_{j_{s}, 2s-1}\),
$${}\underline{x}_{t} :=\! \left[ \begin{array}{c} x_{u_{1},t}\\ \vdots\\ x_{u_{k},t} \end{array} \right], \,\,H_{\mathcal{U}} =\! \left[ \begin{array}{ccc} \underline{h}_{u_{1}} & \cdots & \underline{h}_{u_{k}} \end{array} \right], \text{and}\,\,\underline{g}_{s} = \left[ \begin{array}{c} g_{j_{s},u_{1}}\\ \vdots\\ g_{j_{s},u_{k}} \end{array} \right], $$
for \(j_{s} \in {{\mathcal {K}}}\setminus {{\mathcal {L}}}\) and s=1,…,(KL). Following the same approach as in Section 5.4, we assume the repairing node has further knowledge of rs for s=1,…,(KL); therefore, it knows \(\underline {y}'_{t} \ = \ H_{\mathcal {U}} \underline {x}_{t} + \underline {w}_{t}\) for t=1,2,…,N. We then have
$$ {\small{\begin{aligned} {}\underbrace{\left[\! \begin{array}{c} \underline{y}'_{1}\\ \underline{y}'_{3}\\ \vdots\\ \underline{y}'_{N-1}\\ \underline{y}'_{2}\\ \vdots\\ \underline{y}'_{N}\\ r_{1}\\ \vdots\\ r_{K-L} \end{array}\!\right]}_{\underline{y}_{{\mathcal{U}}}} = \underbrace{\left[\!\! \begin{array}{cccccc} H_{{\mathcal{U}}} & & & & & \\ & \ddots & &&&\\ && H_{{\mathcal{U}}} &&&\\ &&& H_{{\mathcal{U}}} & &\\ &&&& \ddots & \\ &&&&& H_{{\mathcal{U}}}\\ \underline{g}_{1}^{\top} & & & &\\ & \ddots & & &\\ && \underline{g}_{{K-L}}^{\top} & &\end{array} \!\!\!\right]}_{H_{\text{eq}}} \underbrace{\left[\!\!\begin{array}{c} \underline{x}_{1}\\ \underline{x}_{3}\\ \vdots\\ \underline{x}_{N-1}\\ \underline{x}_{2}\\ \underline{x}_{4}\\ \vdots\\ \underline{x}_{N} \end{array}\!\! \right]}_{:= \underline{x}} + \left[ \begin{array}{c} \underline{w}_{1}\\ \underline{w}_{3}\\ \vdots\\ \underline{w}_{N-1}\\ \underline{w}_{2}\\ \vdots\\ \underline{w}_{N}\\ z_{1}\\ \vdots\\ z_{{K-L}} \end{array}\!\! \right]. \end{aligned}}} $$
(50)
It follows that
$$ {{\begin{aligned} &I \left(\left. \left\{ x_{u, t} : u \in {{\mathcal{U}}} \right\}_{t=1}^{N} ; \underline{y}_{1}, \ldots, \underline{y}_{N} \right| \left\{ x_{u, t} : u \in {{\mathcal{K}} }\setminus {\mathcal{U}} \right\}_{t=1}^{N},\right.\\ &\qquad\left. \{\underline{h}_{i}\}_{i=1}^{K}, \{g_{i,j}\}_{i,j=1}^{K}\right) \\ &\leq I \left(\underline{x}; \underline{y}_{\mathcal{U}} \mid H_{\text{eq}}\right) \\ &= \frac N2 \log_{2} \det \left(I_{k} + \text{SNR} H_{\mathcal{U}}^{\dag} H_{{\mathcal{U}}} \right)\\ &\quad+ \sum_{s=1}^{\frac N2} \log_{2} \det \left(I_{k} + \text{SNR} H_{{\mathcal{U}}}^{\dag} H_{{\mathcal{U}}} + \text{SNR} \underline{g}_{s}^{*} \underline{g}_{s}^{\top} \right). \end{aligned}}} $$
(51)
Let \(H_{{\mathcal {U}}}^{\dag } H_{{\mathcal {U}}}= E \Lambda E^{\dag }\) be the eigen-decomposition of \(H_{{\mathcal {U}}}^{\dag } H_{{\mathcal {U}}}\), where E is a (k×k) unitary matrix, Λ=diag(λ1,⋯,λk), and 0<λ1≤⋯≤λk are the nonzero ordered eigenvalues of \(H_{\mathcal {U}}^{\dag } H_{\mathcal {U}}\), since \(\text {rank}(H_{{\mathcal {U}}}^{\dag } H_{{\mathcal {U}}})=k\) with probability one. The instantaneous mutual information \(I \left (\underline {x}; \underline {y}_{{\mathcal {U}}} \mid H_{\text {eq}} \right) \) can be further simplified to
$$ {\small{\begin{aligned} &I \left(\underline{x}; \underline{y}_{{\mathcal{U}}} \mid H_{\text{eq}} \right)\\ &= N \sum_{s=1}^{k} \log_{2} (1 + \text{SNR} \lambda_{s}) \\ &\quad+ \sum_{s=1}^{\frac N2} \log_{2} \left(I_{k} + \left(I_{k} + \text{SNR} \Lambda \right)^{-1} \text{SNR} E^{\dag} \underline{g}_{s}^{*} \underline{g}_{s}^{\top} E \right)\\ &= N \sum_{s=1}^{k} \log_{2} (1 + \text{SNR} \lambda_{s})\\ & \quad+\! \sum_{s=1}^{\frac N2} \log_{2}\! \left(\!\!1 \,+\, \sum_{j=1}^{k} \frac{\text{SNR}}{1 + \text{SNR} \, \lambda_{j}} |{v_{s,j}}|^{2} \,+\, \sum_{j=k+1}^{n_{r}} \text{SNR} |{v_{s,j}}|^{2} \right)\!, \end{aligned}}} $$
(52)
where we have set \(\underline {v}_{s}=E^{\dag } \underline {g}_{s}^{*}\), which is a length- nr random vector with i.i.d. \(\mathbb {C}{\cal {N}}(0,1)\) entries. It follows that
$$ {\small{\begin{aligned} {}\Pr\left\{ {{\mathcal{E}}}_{{\mathcal{U}}}\right\} \!\geq\! \Pr\left\{ I \left(\underline{x}; \underline{y}_{{\mathcal{U}}} \mid H_{\text{eq}} \!\right) \!<\! \frac{NK}{L} rk \log_{2} \text{SNR} \right\} \!\doteq \text{SNR}^{-d_{\mathcal{U}}(r)}. \end{aligned}}} $$
(53)
We set
  • \(\lambda _{s} = \text {SNR}^{-\alpha _{s}}\) for \(s=1, \ldots, \frac N2\), with each αs contributing the term (2s−1+(nrk))αs to the overall diversity order.

  • \(|{v_{s,j}}|^{2} = \text {SNR}^{-\beta _{s,j}} = \text {SNR}^{-\beta _{j}}\) for \(s=1, \ldots, \frac N2\) and j=1,…,k, since there is no need to distinguish vs,j in these cases when applying the Laplace principle to (53). Each βj, j=1,…,k, contributes the term \(\frac N2 \beta _{j}\) to the overall diversity order.

  • \(|{v_{s,j}}|^{2} = \text {SNR}^{-\beta _{s,j}} = \text {SNR}^{-\beta _{k+1}}\) for \(s=1, \ldots, \frac N2\) and j=k+1,…,nr, for the same reason. The factor βk+1 contributes the term \(\frac N2 (n_{r}-k) \beta _{k+1}\) to the overall diversity order.

It follows from the above that
$$ {\small{\begin{aligned} {}d_{{\mathcal{U}}}(r)& := \inf_{{{\mathcal{A}}}'(L,k,r)} \sum_{i=1}^{k} [2i-1+(n_{r}-k)] \alpha_{i} + (K-L) \sum_{j=1}^{k} \beta_{j} \\ &\quad+ (K-L)(n_{r}-k) \beta_{k+1}\,, \end{aligned}}} $$
(54)
where
$${} {{\begin{aligned} &\mathcal{A}'(L,k,r) :=\\ & \left\{ \begin{array}{l} \alpha_{1}, \ldots, \alpha_{k}, \beta_{1}, \ldots, \beta_{k+1} \in {\mathbb R}:\\ \qquad \begin{array}{l} \alpha_{1} \geq \alpha_{2} \geq \cdots \geq \alpha_{k} \geq 0, \ \beta_{1}, \beta_{2}, \ldots, \beta_{k+1} \geq 0,\\ \beta_{k+1}=0 \text{if} n_{r}=k,\\ \sum_{i=1}^{k} (1-\alpha_{i})^{+} + \frac12 \max\big\{ (1-\beta_{j}- (1-\alpha_{j})^{+})^{+}, \ldots,\\ \qquad\qquad(1-\beta_{k}- (1-\alpha_{k})^{+})^{+}, \beta_{k+1} \big\} < \frac{Krk}{L} \end{array} \end{array} \right\} \end{aligned}}} $$
(55)

Finally, the upper bound d3,U(L,r) is obtained after minimizing \(d_{{\mathcal {U}}}(r)\) for all possible subsets \({{\mathcal {U}}} \subseteq {{\mathcal {L}}}\) (or equivalently for all k=1,…,L) and after simplifying the constraints in (55). □

By optimizing over all possible L=1,2,…, min{nr,K−1} for d3,U(r), we obtain an upper bound on the DMT performance for the third scheme.

Corollary6.

The DMT performance for Scheme 3 is upper bounded by
$$ d_{3,U}(r) := \max_{L=1, \ldots, \min\{K-1,n_{r}\}} d_{3,U}(L,r). $$
(56)
In Fig. 13, we illustrate the overall picture for the case of nt=1, nr=2, and K=10. While we do not yet have a lower bound or a tight DMT result, we believe that Scheme 3 is indeed likely to be superior10 to all other schemes presented in this paper, namely the TDMA scheme, Schemes 1 and 2.
Fig. 13

Overall DMT comparison. DMT performances achieved by the MIMO-MAC, time-sharing scheme and Schemes 1,2, and 3, for K=10 helper nodes, nt=1, and nr=2

In particular, we note that the DMT upper bound for Scheme 3 achieves the maximal possible multiplexing gain of \(\frac {2}{10}=0.2\), which is the same as the TDMA scheme and the MIMO-MAC. Such possibility for the optimality of Scheme 3 turns out to be generally true, at least from the viewpoint of the upper bound (51). To see this, note that by (51), we have

$$\begin{array}{@{}rcl@{}} &&\mathbb{E} \left[ \frac{I \left(\underline{x}; \underline{y}_{\mathcal{L}} \vert H_{\text{eq}} \right)}{N \log_{2} \text{SNR}}\right]\\ &&\;= \frac{\mathbb{E} \frac 12 \log_{2} \det \left(I_{L} + \text{SNR} H_{\mathcal{L}}^{\dag} H_{\mathcal{L}} \right)+ \frac12 \mathbb{E} \log_{2} \det \left(I_{L} + \text{SNR} H_{\mathcal{L}}^{\dag} H_{\mathcal{L}} + \text{SNR} \underline{g}_{1}^{*} \underline{g}_{1}^{\top} \right)}{\log_{2} \text{SNR}} \\ &&\;= \frac12 \min\{L, n_{r}\} + \frac12 \min\{L, n_{r}+1\} + o(1), \end{array} $$
(57)
as SNR→, where the last equality follows from the asymptotic analysis of the degrees-of-freedom (DoF) for the MIMO channel [27, 52] and from the fact that \(H_{{\mathcal {L}}}\) is a channel matrix of size (nr×L), and \(H_{{\mathcal {L}}}^{\dag } H_{{\mathcal {L}}} + \underline {g}_{1}^{*} \underline {g}_{1}^{\top } = FF^{\dag }\) with \(F=\;[H_{{\mathcal {L}}}^{\dag }\ \underline {g}_{1}^{*}]\) is a matrix of size (L×(nr+1)). Eq. 57 shows that the channel capacity resulting from Scheme 3 equals L· log2SNR+O(log2SNR) in high SNR regime for L≤ min{nr,K−1}, and such an amount of capacity is shared by the L selected helper nodes. In other words, each selected helper node gets 1· log2SNR+O(log2SNR) bits per channel use as the maximal achievable transmission rate. Note that in Scheme 3 the selected helper node must transmit at a higher multiplexing gain \(\frac {K}{L} r\) such that the average multiplexing gain equals r. This then implies
$$ \frac{K}{L} r \log_{2} \text{SNR} \leq 1 \cdot \log_{2} \text{SNR} + o(\log_{2}\text{SNR}), $$
(58)

i.e., \(r \leq \frac LK\). Now, with L=nr<K we see that Scheme 3 achieves the maximal possible multiplexing gain of \(\frac {n_{r}}{K}\) for each helper node, same as MIMO-MAC [28], where the maximal possible multiplexing gain is given by \(\frac {\min \{Kn_{t}, n_{r}\}}{K} = \frac {n_{r}}{K}\).

7 Conclusions

The communications within a wireless storage network can be modeled as a multiple-access channel with additional inter-source communication links. Motivated by this observation, we have proposed three physical layer transmission schemes based on different time-sharing and relaying strategies that are suitable for the given channel model. In contrast to the state-of-the-art MAC DMT optimal algebraic space-time codes, our schemes are efficiently sphere-decodable with only one or two antennas. Their DMT performance reaches between the time-sharing DMT and the optimal MAC DMT—the one for conventional MIMO-MAC having no inter-source links—in the high-multiplexing gain regime. When the desired multiplexing gain is low, the schemes even outperform the optimal MAC DMT. Naturally, the schemes are also applicable to DSS file reconstruction, as well as to any MAC communications with inter-source links.

In the future, even small devices with very limited power may be equipped with several antennas thanks to massive MIMO at 60 Hz. However, implementation of a practical massive MIMO system still calls for a considerable amount of research efforts regarding pilot design, channel estimation, and code design. Before all that is realized, we believe that the proposed schemes provide a good and efficient alternative.

8 Endnotes

1 Device-to-device (D2D) communication networks provide one such example, see e.g. [53, 54].

2 Preliminary results related to this work were reported in the Global Wireless Summit 2014 GWS’14 [18] (invited abstract which is considered a preprint), 21st International Symposium on Mathematical Theory of Networks and Systems MTNS’14 [19] (short invited abstract, Scheme 1), and 2014 International Symposium on Information Theory and Its Applications (ISITA) [20] (Schemes 1–3, now combined to Scheme 2). We point out that the numbering of the schemes has been changed so that the schemes previously called 2 and 3 [20] have been combined to Scheme 2, and the new scheme is hence now called Scheme 3 and has not appeared anywhere before. This paper extends the results by additional proofs for the bounds related to Scheme 2, and with a completely new scheme, Scheme 3, that improves upon the other schemes.

3 By efficiently sphere-decodable space-time code we mean that the code can be sphere-decoded without the need of performing an exhaustive search for part of the symbols before starting processing the root of a sphere-decoding tree. See discussions in Section 2.2.

4 By half-duplex we mean each node can choose to either transmit or receive, but not both at the same time.

5 Such a comparison might not seem fair to some readers as (5) assumes no inter-helper links. However, the DMT (5) is the best DMT result that can be found in the related literature.

6 This latter condition might seem unrealistic in certain (logical) distributed storage codes. However, it would be extremely difficult to determine the mutual information between the helpers and the repairing node if one takes into account the shared information among helper nodes.

7 A lattice is a discrete abelian subgroup of a real or complex vector space, and its rank is given by its rank as a module over \({\mathbb Z}\). By an algebraic lattice we refer to one constructed from a number field extension or a division algebra, see e.g. [29].

8 It is unfortunate that measuring the exact complexity exponents for these schemes is extremely complicated, and we are unable to complete the task in this paper. Nevertheless, it can still be seen that these schemes can yield efficiently sphere-decodable space-time codes without the need of resolving ambiguities when processing the sphere-decoding tree.

9 Here we have implicitly assumed KL≥1 such that at least one helper node will function as a relay.

10 Cf. the corresponding upper bound \(\phantom {\dot {i}\!}d_{2,U'}(r)=d_{2}(r)\) for Scheme 3 that turned out to be tight.

Acknowledgements

C. Hollanti is supported by the Academy of Finland grants #276031, #282938, and #283262, and by Magnus Ehrnrooth Foundation, Finland. D. Karpuk is supported by the Academy of Finland grant #268364. The support from the European Science Foundation under the ESF COST Action IC1104 is also gratefully acknowledged. The research of H. F. Lu was funded in part by Taiwan Ministry of Science and Technology under Grants MOST 101-2923-E-009-001-MY3 and MOST 103-2221-E-009-043-MY3.

Funding information

Funder NameGrant NumberFunding Note
Suomen Akatemia (FI)
  • 276031, 282938, and 283262
Suomen Akatemia (FI)
  • 268364
Magnus Ehrnroothin Säätiö (FI)
    Ministry of Science and Technology, Taiwan (TW)
    • MOST 103-2221-E-009-043-MY3

    Copyright information

    © Lu et al. 2016

    Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

    Authors and Affiliations

    • Hsiao-feng (Francis) Lu
      • 1
    • Amaro Barreal
      • 2
    • David Karpuk
      • 2
    • Camilla Hollanti
      • 2
    1. 1.Department of Electrical and Computer EngineeringNational Chiao Tung UniversityHsinchuTaiwan
    2. 2.Department of Mathematics and Systems AnalysisAalto UniversityFI-00076 AALTO (Espoo)Finland

    Personalised recommendations