首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In this paper, we consider a two-way relaying network where two users communicate with each other with the help of multiple relays. Specifically, we first investigate the performance of a all-relay participating network with the amplify-and-forward relaying protocol. Based on the moment generating function-based method, we derive some tight bounds for the outage probability and bit-error rate performance. For comparison purpose, we then present a performance analysis for the relay selection scheme. Finally, numerical results are provided to verify our analysis.  相似文献   

2.
One-way wireless relay networks have recently received a lot of attention due to their ability to provide spatial diversity in fading wireless environment. Moreover, performing single-relay selection is a very attractive method due to its cost effective implementation and superior performance. However, one-way relay networks with the half-duplex signalling suffer from a spectral efficiency loss. To overcome such a drawback, two-way wireless relay networks have been proposed and these are also the networks considered in this paper. The paper analyzes the diversity orders of various relay selection schemes, including the best-relay selection, best-worse-channel selection, and maximum-harmonic-mean selection. The analysis is done for the amplify-and-forward protocol and under the two-step and three-step transmission procedures. In particular, it is shown that full diversity orders of R and R + 1 can be achieved in a R-relay wireless network with the two-step and three-step procedures, respectively. Numerical and simulation results are provided to verify our analysis.  相似文献   

3.
4.
刘银山  钟晓峰  王京 《电信科学》2015,31(11):30-35
认知合作中继通信可以有效提升无线通信网络的性能和频谱效率。在中继节点较多的情况下,最优中继选择是一个有待解决的问题,它是中继探测成本与合作通信的分集增益之间的一个折中。基于有限情形的最优停时理论给出了最优中继选择策略,进一步得到一个纯SNR(signal-to-noise ratio,信噪比)阈值结构的策略。数字仿真结果验证了其有效性,在待探测中继较多和每个中继探测成本较高情况下,该最优中继选择策略以最少的探测次数获得最大的收益增益。  相似文献   

5.
将中继协作技术用于认知无线电网络可有效对抗信道衰落,提高频谱利用率,然而如何选择中继协助源节点传输信息是一个亟待解决的问题。该文根据多中继协作时目的节点信噪比的一阶偏导数特征,定义了中继协作效率,设计了基于协作效率的迭代中继选择方案。考虑到认知中继网络的非集中式结构,该文将虚拟计时器引入中继节点,提出了基于迭代中继选择方案的分布式算法,通过各中继基于协作效率的虚拟倒计时及信息交互实现了分布式迭代中继选择。复杂度分析和数值仿真结果表明,该算法复杂度较低,且性能接近最优解。  相似文献   

6.
We investigate the performance of the best-worse relay selection strategy in a two way cooperative non-regenerative relay network, where the relay is selected to maximize the worst Signal to Noise Ratio (SNR) of two links. In contrast to existing work, we aim to provide a theoretical performance analysis for this scheme under the more practical Nakagami channel. Closed-form expression of the probability density function for the SNRs of both two links is derived, based on which the outage probability of the best-worse relay selection is obtained. It is shown that the best-worse relay selection scheme achieves full diversity gain. Furthermore, the asymptotic packet error ratio with SNR increasing is also analyzed through rigorous derivations. The accuracy of our derivation is validated by computer simulations.  相似文献   

7.
This paper deals with relay selection in cooperative networks with secrecy constraints. The proposed scheme enables an opportunistic selection of two relay nodes to increase security against eavesdroppers. The first relay operates as a conventional mode and assists a source to deliver its data to a destination via a decode-and-forward strategy. The second relay is used in order to create intentional interference at the eavesdropper nodes. The proposed selection technique jointly protects the primary destination against interference and eavesdropping and jams the reception of the eavesdropper. The new approach is analyzed for different complexity requirements based on instantaneous and average knowledge of the eavesdropper channels. In addition an investigation of an hybrid security scheme which switches between jamming and non-jamming protection is discussed in the paper. It is proven that an appropriate application of these two modes further improves security. The enhancements of the proposed selection techniques are demonstrated analytically and with simulation results.  相似文献   

8.
One of the main drawbacks of cooperative communication systems with half-duplex relaying is inefficient use of spectrum. Incremental relaying is an effective technique that overcomes this limitation, particularly in the high-SNR regime. In this paper, for a multi-relay cooperative network with arbitrary number of relay nodes, we propose a spectrally-efficient incremental relaying scheme that eliminates redundant relay transmissions such that an average end-to-end bit error rate (BER) constraint is satisfied. For detect-and-forward relaying, under the assumption of error propagation from the relays to the destination, we analyze the performance of the system in terms of the end-to-end BER, the average spectral efficiency and the outage probability for Rayleigh fading environment. The performance of the system depends on a single threshold employed by the relays and the destination. We optimize this threshold such that the average spectral efficiency of the system is maximized under an average end-to-end BER constraint. This optimization criterion results in a constant-BER, variable-spectral efficiency relaying scheme. The proposed scheme makes use of spectrum as efficiently as possible, while providing the required quality of service at the destination.  相似文献   

9.
Two novel best-relay selection protocols, the jointing adaptive modulation max–min (AM-MM) protocol and the jointing adaptive modulation maximum harmonic mean (AM-MHM) protocol, are proposed for two-way opportunistic relaying systems with amplify-and-forward policy (TWOR-AF). By integrating the adaptive modulation with the conventional max–min (NonAM-MM) and maximum harmonic mean protocols, the effect of the modulation schemes used at both sources is exploited perfectly in the proposed AM-MM and AM-MHM protocols. The analytical expressions to the approximate upper bounds of overall average symbol error probability (SEP) for TWOR-AF systems with these different relay selection protocols are obtained through theoretic analysis. The numerical results demonstrate that the average SEP of TWOR-AF systems can be improved greatly when the proposed jointing adaptive modulation relay selection protocols are performed. Furthermore, in certain channel realizations, the adaptive modulation non-selection protocol outperforms the conventional NonAM-MM protocol in which the adaptive modulation is not integrated.  相似文献   

10.
Cloud computing is always adopted to enhance the computing capability of mobile systems , especially when the mobile users prefer to use some computation intensive applications . Consequently, the distributed wireless relay infrastructure should be deployed to aid the traffic transmission. To further enhance the QoS provisioning goals of wireless cooperative network, this paper puts forward a multiobjective approach for distributed optimal relay selection, which takes Bit Error Rate (BER) and Secrecy Capacity (SC) into account simultaneously. Firstly, our proposal partitions the channel state into several levels according to the received signaltonoise ratio (SNR) and describes the timevarying Rayleigh fading channel characteristics by using first order finitestate Markov model. Secondly, we model the relay selection as Restless Multiarmed Bandit optimal solution problem with respect to the channel state and the state transition probability. Finally, simulation results demonstrate the efficiency of the proposed approach which outperforms the existing ones .  相似文献   

11.
In this paper, we propose and analyze the outage probability of a two-way hybrid decode-and-amplify relaying scheme with relay selection for secondary spectrum access. In this scheme, a secondary network is co-located and uses the same spectrum as the primary network. The primary network is comprised of two primary terminals that attempt to transmit signals to one another; the secondary network is comprised of M secondary transmitter-receiver pairs (ST-SR). One of the secondary transmitters chosen to cooperate with the primary network uses a hybrid decode-and-amplify forward technique in order to relay primary and secondary signals. We derive expressions for the outage probability of the primary network as well as the secondary network over a Rayleigh fading channel. Simulation results are presented to verify theoretical analyses and to compare the performance of the proposed protocol to that of a two-way direct transmission protocol.  相似文献   

12.
邓单  周雯 《电子学报》2017,45(7):1593-1600
该文研究在不可信解码转发无线中继网络中,基于用户选择的安全通信策略与性能分析.根据直接链路与中继链路的信道增益,本文提出三种不同的选择准则以提升系统的安全性;文章推导了三种选择准则下安全截断概率的闭式解析表达式及渐近表达式.根据渐近表达式和数值仿真结果可知,次优准则可以达到与最优准则几乎相同的系统安全性能.同时部分选择准则也能达到全分集增益性能.  相似文献   

13.
The outage probability and ergodic capacity analysis for decode-and-forward two-way relaying system is investigated in this paper. First, the exact expressions (or bounds) of outage probability, ergodic capacity and average bidirectional ergodic capacity (ABEC) for max–min relay selection, random relay selection and direct transmission protocols are derived through theoretic analysis, and performance comparisons among different relay selection protocols are developed. Then a novel maximum average bidirectional mutual information (MABM) relay selection protocol is proposed and analyzed. Simulation results demonstrate that the derived analytical results fit well with Monte-Carlo simulations. The proposed MABM protocol can always achieve larger ABEC than other protocols while keeping low outage probability, and the MABM and max–min protocols in this paper can always achieve better performance than the max–min selection and max-sum selection in Krikidis (IEEE Trans Veh Technol 59(9):4620–4628, 2010). In addition, outage probability, ergodic capacity and ABEC performance of the proposed protocol become worse while distance becomes larger.  相似文献   

14.
15.
多用户MIMO网络的OFDM放大转发双向中继策略   总被引:2,自引:2,他引:0  
在多用户MIMO通信网络中,该文提出一种新的放大转发双向中继策略,在第1时隙的多址传输中采用OFDMA,在第2时隙的广播传输中采用OFDM/SDMA,通过利用频率分集和空间分集提高了系统性能。针对双向中继传输的特点,采用两种方法在每个子载波上设计了中继波束形成矩阵,即信漏噪比(SLNR)准则和块对角化迫零(BDZF)准则。利用割集理论推导了该双向中继网络的容量域上界。仿真结论表明,所提出的双向中继策略在系统和速率性能上优于其他3种中继策略,并能逼近所推导的容量域上界。  相似文献   

16.
17.
In this paper, we present a design of two-way communication system with relay selection in two-way cooperative system over cascaded Nakagami- \(m\) fading channels. In the proposed scheme, in which all terminals are in motion as mobiles or vehicles, two users first broadcast their information to relays. Then, a single relay with a minimum sum symbol error rate (SER) will be selected to broadcast the received signals back to the sources. In other words, in the selection process, we investigate a simple suboptimal min-max criterion for relay selection, where a single relay that minimizes the maximum SER of two source nodes will be selected. Specifically, we have derived expressions of cumulative distribution function and moment generating function of end-to-end signal-to-noise ratio. By using these expressions, we have analyzed the performance of considered system in terms of outage probability and SER expression. Numerical and simulation results show the validity of the proposed mathematical analysis and point out the confirmation of the analytical results.  相似文献   

18.
最优停止规则算法的优点是避免主用户考察所有次用户,使主用户能在较短观测时间内挑选出满足通信服务质量的中继节点。但存在些许不足之处,如仅考虑了单次协同通信情况,没有充分利用历史中继节点选择信息。为了克服上述缺点,需要优化该算法的性能,通过引入反馈机制,提出了自适应中继节点选择算法,在每次中继节点选择结束后更新信息库中次用户中继概率,主用户从中继概率高的次用户开始观测。研究结果表明:自适应中继节点选择算法的效率要比最优停止规则算法高;该算法可进一步减少观测次数,降低系统的传输时延和观测能耗,提高主用户的平均吞吐率。  相似文献   

19.
This paper presents different relay and jammer selection schemes for one-way cooperative networks to increase the security against malicious eavesdroppers. We consider a single source-destination cooperative network with multiple intermediate nodes and one or more eavesdroppers. The selection in the proposed schemes is made with the presence of direct links and the assumption that the broadcast phase is unsecured. The proposed schemes select three intermediate nodes. The first selected node operates in the conventional relay mode and assists the source to deliver its data to the corresponding destination via a Decode-and-Forward strategy. The second and third selected nodes are used in different communication phases as jammers to create intentional interference at the eavesdroppers’ nodes. Moreover, a hybrid scheme which switches between jamming and non-jamming modes is introduced in this paper. The proposed schemes are analyzed in terms of ergodic secrecy capacity and secrecy outage probability. Extensive analysis and a set of simulation results are presented to demonstrate the effectiveness of the different schemes presented in this work. The obtained results show that the proposed schemes with jamming outperform the conventional non-jamming schemes and the hybrid switching scheme further improves the secrecy capacity. The impact of changing both the eavesdroppers and the relays location on ergodic secrecy capacity and secrecy outage probability is also discussed. Finally, the impact of the presence of multiple eavesdroppers is studied in this paper.  相似文献   

20.
Channel Estimation for OFDM Modulated Two-Way Relay Networks   总被引:1,自引:0,他引:1  
In this work, we introduce the model of employing orthogonal-frequency-division multiplexing (OFDM) for transmission over time-dispersive channels in the two-way relay network (TWRN), where two source terminals exchange their information through a relay terminal using the amplify-and-forward (AF) relaying scheme. We propose a two-phase training protocol for the channel estimation, which is compatible with the two-phase data transmission scheme. In the first phase, the two source terminals send their individual training sequences concurrently to the relay, while in the second phase the relay amplifies the received training sequences and broadcasts them to both source terminals. We propose two different types of training methods as well as develop their corresponding channel estimation algorithms at each of the two source terminals. The first type of training is block based, for which we first estimate the cascaded source-relay-source channels, and then design algorithms to recover the individual channels between sources and relay. The second type of training is pilot-tone (PT) based, for which we propose to directly estimate the individual channels between sources and relay. Moreover, the identifiability issues on the nonambiguous estimate of the channels in both types of proposed training are carefully addressed. Finally, various numerical examples are presented to corroborate our analytical results.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号