Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior
Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior
additional receive hardware) wireless network protocols often                       Loosely speaking, cooperation yields highest achievable rates
ignore or discard them.                                                             when the source-relay channel quality is very high, and obser-
   In the most general case,    and     can pool their resources,                   vation yields highest achievable rates when the relay-destination
such as power and bandwidth, to cooperatively transmit their                        channel quality is very high. Various extensions to the case of
information to their respective destinations, corresponding to a                    multiple relays have appeared in the work of Schein and Gal-
wireless multiple-access channel with relaying for           , and                  lager [18], [19], Gupta and Kumar [20], [21], Gastpar et al.
to a wireless interference channel with relaying for              .                 [22]–[24], and Reznik et al. [25]. For channels with multiple
At one extreme, corresponding to a wireless relay channel, the                      information sources, Kramer and Wijngaarden [26] consider a
transmitting terminals can focus all their resources on transmit-                   multiple-access channel in which the sources communicate to a
ting the information of ; in this case,      acts as the “source”                   single destination and share a single relay.
of the information, and serves as a “relay.” Such an approach                          2) Multiple-Access Channels With Generalized Feed-
might provide diversity in a wireless setting because, even if the                  back: Work by King [27], Carleial [28], and Willems et al.
fading is severe between      and , the information might be                        [29]–[32] examines multiple-access channels with generalized
successfully transmitted through . Similarly,         and      can                  feedback. Here, the generalized feedback allows the sources
focus their resources on transmitting the information of , cor-                     to essentially act as relays for one another. This model relates
responding to another wireless relay channel.                                       most closely to the wireless channels we have in mind. The
                                                                                    constructions in [28]–[30] can be viewed as two-terminal gen-
B. Related Work                                                                     eralizations of the cooperation scheme in [5]; the construction
   Relay channels and their extensions form the basis for our                       [27] may be viewed as a two-terminal generalization of the
study of cooperative diversity. This section summarizes some                        observation scheme in [5]. Sendonaris et al. introduce multipath
of the relevant literature in this area. Because relaying and                       fading into the model of [28], [30], calling their approaches for
cooperative diversity essentially create a virtual antenna array,                   this system model user cooperation diversity [6], [33], [34]. For
work on multiple-antenna systems, or multiple-input, multiple-                      ergodic fading, they illustrate that the adapted coding scheme
output (MIMO) systems, is of course relevant, as are different                      of [30] enlarges the achievable rate region.
ways of characterizing fundamental performance limits in
wireless channels, in particular outage probability for noner-                      C. Summary of Results
godic settings. Throughout the rest of the paper, we assume
that the reader is familiar with these latter areas, and refer the                     We now highlight the results of the present paper, many of
interested reader to [2]–[4], [9], [10], and references therein, for                which were initially reported in [35], [36], and recently ex-
an introduction to the relevant concepts from multiple-antenna                      tended in [37]. This paper develops low-complexity cooperative
systems and to [11] for an introduction to outage capacity for                      diversity protocols that explicitly take into account certain im-
fading channels.                                                                    plementation constraints in the cooperating radios. Specifically,
   1) Relay Channels: The classical relay channel models a                          while previous work on relay and cooperative channels allows
class of three-terminal communication channels originally ex-                       the terminals to transmit and receive simultaneously, i.e., full-
amined by van der Meulen [12], [13]. Cover and El Gamal [5]                         duplex, we constrain them to employ half-duplex transmission.
treat certain discrete memoryless and additive white Gaussian                       Furthermore, although previous work employs channel state in-
noise relay channels, and they determine channel capacity for                       formation (CSI) at the transmitters in order to exploit coherent
the class of physically degraded1 relay channels. More gener-                       transmission, we utilize CSI at the receivers only. Finally, al-
ally, they develop lower bounds on capacity, i.e., achievable                       though previous work focuses primarily on ergodic settings and
rates, via three structurally different random coding schemes:                      characterizes performance via Shannon capacity or capacity re-
                                                                                    gions, we focus on nonergodic or delay-constrained scenarios
    • facilitation [5, Theorem 2], in which the relay does not                      and characterize performance by outage probability [11].
      actively help the source, but rather, facilitates the source                     We outline several cooperative protocols and demonstrate
      transmission by inducing as little interference as possible;                  their robustness to fairly general channel conditions. In addition
    • cooperation [5, Theorem 1], in which the relay fully de-                      to direct transmission, we examine fixed relaying protocols
      codes the source message and retransmits, jointly with the                    in which the relay either amplifies what it receives, or fully
      source, a bin index (in the sense of Slepian–Wolf coding                      decodes, re-encodes, and retransmits the source message. We
      [14], [15]) of the previous source message;                                   call these options amplify-and-forward and decode-and-for-
                                                                                    ward, respectively. Obviously, these approaches are inspired
    • observation2 [5, Theorem 6], in which the relay encodes a                     by the observation [5], [18], [28] and cooperation [5], [6],
      quantized version of its received signal, using ideas from                    [30] schemes, respectively, but we intentionally limit the com-
      source coding with side information [14], [16], [17].                         plexity of our protocols for ease of potential implementation.
  1At a high level, degradedness means that the destination receives a corrupted    Furthermore, our analysis suggests that cooperating radios may
version of what the relay receives, all conditioned on the relay transmit signal.   also employ threshold tests on the measured channel quality
While this class is mathematically convenient, none of the wireless channels        between them, to obtain adaptive protocols, called selection
found in practice are well modeled by this class.
  2The names facilitation and cooperation were introduced in [5], but Cover
                                                                                    relaying, that choose the strategy with best performance. In
and El Gamal did not give a name to their third approach. We use the name           addition, adaptive protocols based upon limited feedback from
observation throughout the paper for convenience.                                   the destination terminal, called incremental relaying, are also
3064                                                                         IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER 2004
Fig. 2. Example time-division channel allocations for (a) direct transmission with interference, (b) orthogonal direct transmission, and (c) orthogonal cooperative
diversity. We focus on orthogonal transmissions of the form (b) and (c) throughout the paper.
developed. Selection and incremental relaying protocols rep-                       case of slow fading, to capture scenarios in which delay con-
resent new directions for relay and cooperative transmission,                      straints are on the order of the channel coherence time, and mea-
building upon existing ideas.                                                      sures performance by outage probability, to isolate the benefits
   For scenarios in which CSI is unavailable to the transmitters,                  of space diversity. While our cooperative protocols can be nat-
even full-duplex cooperation cannot improve the sum capacity                       urally extended to the kinds of wide-band and highly mobile
for ergodic fading [38]. Consequently, we focus on delay-lim-                      scenarios in which frequency- and time-selective fading, respec-
ited or nonergodic scenarios, and evaluate performance of our                      tively, are encountered, the potential impact of our protocols be-
protocols in terms of outage probability [11]. We show analyt-                     comes less substantial when other forms of diversity can be ex-
ically that, except for fixed decode-and-forward, each of our                      ploited in the system.
cooperative protocols achieves full diversity, i.e., outage prob-
ability decays proportional to         , where        is signal-to-                A. Medium Access
noise ratio (SNR) of the channel, whereas it decays proportional                      As in many current wireless networks, such as cellular and
to        without cooperation. At fixed low rates, amplify-and-                    wireless LANs, we divide the available bandwidth into orthog-
forward and selection decode-and-forward are at most 1.5 dB                        onal channels and allocate these channels to the transmitting
from optimal and offer large power or energy savings over di-                      terminals, allowing our protocols to be readily integrated into
rect transmission. For sufficiently high rates, direct transmis-                   existing networks. As a convenient by-product of this choice,
sion becomes preferable to fixed and selection relaying, because                   we are able to treat the multiple-access (single receiver) and in-
these protocols repeat information all the time. Incremental re-                   terference (multiple receivers) cases described in Section I-A
laying exploits limited feedback to overcome this bandwidth in-                    simultaneously, as a pair of relay channels with signaling be-
efficiency by repeating only rarely. More broadly, the relative                    tween the transmitters. Furthermore, removing the interference
attractiveness of the various schemes can depend upon the net-                     between the terminals at the destination radio(s) substantially
work architecture and implementation considerations.                               simplifies the receiver algorithms and the outage analysis for
                                                                                   purposes of exposition.
D. Outline                                                                            For all of our cooperative protocols, transmitting terminals
                                                                                   must also process their received signals; however, current limi-
   An outline of the remainder of the paper is as follows. Sec-                    tations in radio implementation preclude the terminals from full-
tion II describes our system model for the wireless networks                       duplex operation, i.e., transmitting and receiving at the same
under consideration. Section III outlines fixed, selection, and                    time in the same frequency band. Because of severe attenuation
incremental relaying protocols at a high level. Section IV char-                   over the wireless channel, and insufficient electrical isolation
acterizes the outage behavior of the various protocols in terms                    between the transmit and receive circuitry, a terminal’s trans-
of outage events and outage probabilities, using several results                   mitted signal drowns out the signals of other terminals at its re-
for exponential random variables developed in Appendix I. Sec-                     ceiver input.3 Thus, to ensure half-duplex operation, we further
tion V compares the results from a number of perspectives, and                     divide each channel into orthogonal subchannels. Fig. 2 illus-
Section VI offers some concluding remarks.                                         trates our channel allocation for an example time-division ap-
                                                                                   proach with two terminals.
                                                                                      We expect that some level of synchronization between the ter-
                           II. SYSTEM MODEL                                        minals is required for cooperative diversity to be effective. As
   In our model for the wireless channel in Fig. 1, narrow-band                    suggested by Fig. 2 and the modeling discussion to follow, we
transmissions suffer the effects of frequency nonselective fading                     3Typically, a terminal’s transmit signal is 100–150 dB above its received
and additive noise. Our analysis in Section IV focuses on the                      signal.
LANEMAN et al.: COOPERATIVE DIVERSITY IN WIRELESS NETWORKS                                                                                            3065
consider the scenario in which the terminals are block, carrier,         complex Gaussian random variables with variances    . Fur-
and symbol synchronous. Given some form of network block                 thermore, we model      as zero-mean mutually independent,
synchronization, carrier and symbol synchronization for the net-         circularly symmetric, complex Gaussian random sequences
work can build upon the same between the individual transmit-            with variance  .
ters and receivers. Exactly how this synchronization is achieved,
and the effects of small synchronization errors on performance,          C. Parameterizations
is beyond the scope of this paper.                                          Two important parameters of the system are the SNR without
                                                                         fading and the spectral efficiency. We now define these param-
B. Equivalent Channel Models                                             eters in terms of standard parameters in the continuous-time
   Under the above orthogonality constraints, we can now                 channel. For a continuous-time channel with bandwidth
conveniently, and without loss of generality, characterize our           hertz available for transmission, the discrete-time model con-
channel models using a time-division notation; frequency-di-             tains      two-dimensional symbols per second (2D/s).
vision counterparts to this model are straightforward. Due to               If the transmitting terminals have an average power constraint
the symmetry of the channel allocations, we focus on the mes-            in the continuous-time channel model of        joules per second,
sage of the “source” terminal , which potentially employs                we see that this translates into a discrete-time power constraint
terminal     as a “relay,” in transmitting to the “destination”          of                J/2D since each terminal transmits in half of the
terminal , where                   and             . We utilize          available degrees of freedom, under both direct transmission and
a baseband-equivalent, discrete-time channel model for the               cooperative diversity. Thus, the channel model is parameterized
continuous-time channel, and we consider       consecutive uses          by the SNR random variables                , where
of the channel, where is large.
   For direct transmission, our baseline for comparison, we                                                                                           (5)
model the channel as
                                                                         is the common SNR without fading. Throughout our analysis,
                                                                  (1)    we vary       , and allow for different (relative) received SNRs
                                                                         through appropriate choice of the fading variances. As we will
for, say,                   , where        is the source transmitted
                                                                         see, increasing the source-relay SNR proportionally to increases
signal, and        is the destination received signal. The other ter-
                                                                         in the source-destination SNR leads to the full diversity benefits
minal transmits for                          as depicted in Fig. 2(b).
                                                                         of the cooperative protocols.
Thus, in the baseline system, each terminal utilizes only half of
                                                                            In addition to SNR, transmission schemes are further param-
the available degrees of freedom of the channel.
                                                                         eterized by the rate bits per second, or spectral efficiency
   For cooperative diversity, we model the channel during the
first half of the block as                                                                                           b/s/Hz                           (6)
                                                                  (2)    attempted by the transmitting terminals. Note that (6) is the rate
                                                                  (3)    normalized by the number of degrees of freedom utilized by
                                                                         each terminal, not by the total number of degrees of freedom
for, say,                  , where        is the source transmitted      in the channel.
signal and       and         are the relay and destination received         Nominally, one could parameterize the system by the pair
signals, respectively. For the second half of the block, we model                 ; however, our results lend more insight, and are sub-
the received signal as                                                   stantially more compact, when we parameterize the system by
                                                                         either of the pairs              or             , where4
                                                                  (4)
              exhibit a tradeoff between the diversity order and       by first appropriately combining the signals from the two sub-
normalized spectral efficiency of a protocol. The latter tradeoff      blocks using one of a variety of combining techniques; in the
has also been called the diversity-multiplexing tradeoff in [9],       sequel, we focus on a suitably designed matched filter, or max-
[10].                                                                  imum-ratio combiner.
  Note that, although we have parameterized the transmit                  2) Decode-and-Forward: For decode-and-forward trans-
powers and noise levels to be symmetric throughout the net-            mission, the appropriate channel model is again (2)–(4). The
work for purposes of exposition, asymmetries in average SNR            source terminal transmits its information as            , say, for
and path loss can be lumped into the fading variances              .                    . During this interval, the relay processes
Furthermore, while the tools are powerful enough to consider           by decoding an estimate         of the source transmitted signal.
general rate pairs         , we consider the equal rate point, i.e.,      Under a repetition-coded scheme, the relay transmits the
              , for purposes of exposition.                            signal
we describe incremental relaying protocols that exploit limited                    as a function of the fading coefficient          . The outage event for
feedback from the destination terminal, e.g., a single bit indi-                   spectral efficiency is given by                 and is equivalent to the
cating the success or failure of the direct transmission, that we                  event
will see can dramatically improve spectral efficiency over fixed                                                           R
and selection relaying. These incremental relaying protocols can                                                                                        (11)
be viewed as extensions of incremental redundancy, or hybrid
automatic-repeat-request (ARQ), to the relay context. In ARQ,                        For Rayleigh fading, i.e.,        exponentially distributed
the source retransmits if the destination provides a negative ac-                  with parameter    , the outage probability satisfies6
knowledgment via feedback; in incremental relaying, the relay                                                                                     R
retransmits in an attempt to exploit spatial diversity.
    As one example, consider the following protocol utilizing
feedback and amplify-and-forward transmission. We nominally                                                                    R
allocate the channels according to Fig. 2(b). First, the source
transmits its information to the destination at spectral efficiency                                                  R
  . The destination indicates success or failure by broadcasting
a single bit of feedback to the source and relay, which we as-
sume is detected reliably by at least the relay.5 If the source-des-
                                                                                   where we have utilized the result of Fact 1 in Appendix I with
tination SNR is sufficiently high, the feedback indicates success                                                       R
                                                                                             ,         , and                     .
of the direct transmission, and the relay does nothing. If the
source-destination SNR is not sufficiently high for successful                     B. Fixed Relaying
direct transmission, the feedback requests that the relay am-
                                                                                     1) Amplify-and-Forward: The amplify-and-forward pro-
plify-and-forward what it received from the source. In the latter
                                                                                   tocol produces an equivalent one-input, two-output complex
case, the destination tries to combine the two transmissions.
                                                                                   Gaussian noise channel with different noise levels in the out-
As we will see, protocols of this form make more efficient use
                                                                                   puts. As explained in detail in Appendix II, the maximum
of the degrees of freedom of the channel, because they repeat
                                                                                   average mutual information between the input and the two
only rarely. Incremental decode-and-forward is also possible;
                                                                                   outputs, achieved by i.i.d. complex Gaussian inputs, is given
however, its analysis is more involved, and its performance is
                                                                                   by
slightly worse than the above protocol.
   2) Decode-and-Forward: To analyze decode-and-forward                The         behavior in (18) indicates that fixed decode-and-
transmission, we examine a particular decoding structure at         forward does not offer diversity gains for large     , because re-
the relay. Specifically, we require the relay to fully decode the   quiring the relay to fully decode the source information limits
source message; examination of symbol-by-symbol decoding            the performance of decode-and-forward to that of direct trans-
at the relay becomes involved because it depends upon the par-      mission between the source and relay.
ticular coding and modulation choices. The maximum average
mutual information for repetition-coded decode-and-forward          C. Selection Relaying
can be readily shown to be
                                                                       To overcome the shortcomings of decode-and-forward trans-
                                                                    mission, we described selection relaying corresponding to adap-
                                                                    tive versions of amplify-and-forward and decode-and-forward,
                                                            (15)    both of which fall back to direct transmission if the relay cannot
                                                                    decode. We cannot conclude whether or not these protocols
as a function of the fading random variables. The first term in     are optimal, because the capacities of general relay and related
(15) represents the maximum rate at which the relay can reliably    channels are long-standing open problems; however, as we will
decode the source message, while the second term in (15) rep-       see, selection decode-and-forward enables the cooperating ter-
resents the maximum rate at which the destination can reliably      minals to exploit full spatial diversity and overcome the limita-
decode the source message given repeated transmissions from         tions of fixed decode-and-forward.
the source and destination. Requiring both the relay and desti-        As an example analysis, we determine the performance of
nation to decode the entire codeword without error results in the   selection decode-and-forward. Its mutual information is some-
minimum of the two mutual informations in (15). We note that        what involved to write down in general; however, in the case
such forms are typical of relay channels with full decoding at      of repetition coding at the relay, using (10) and (15), it can be
the relay [5].                                                      readily shown to be
   The outage event for spectral efficiency is given by
and is equivalent to the event
                                                R
                                                            (16)                                                                 (19)
                                                                    where                  R            . This threshold is motivated
                                                                    by our discussion of direct transmission, and is analogous to
  For Rayleigh fading, the outage probability for repetition-
                                                                    (11). The first case in (19) corresponds to the relay’s not being
coded decode-and-forward can be computed according to
                                                                    able to decode and the source’s repeating its transmission; here,
                                                                    the maximum average mutual information is that of repetition
                                                                    coding from the source to the destination, hence the extra factor
                                                                    of in the SNR. The second case in (19) corresponds to the
                                                                    relay’s ability to decode and repeat the source transmission;
                                                                    here, the maximum average mutual information is that of repe-
                                                                    tition coding from the source and relay to the destination.
                                                            (17)
                                                                        The outage event for spectral efficiency is given by
                    R                                                  and is equivalent to the event
where                          . Although we may readily com-
pute a closed-form expression for (17), for compactness we ex-
amine the large      behavior of (17) by computing the limit
(20)
and we may readily compute a closed-form expression for (21).         The outage event           is equivalent to the event
For comparison to our other protocols, we examine the large                                                       R
    behavior of (21) by computing the limit                                                                                           (25)
                                                                                                                      R
                                                                                                                                      (26)
                                                              (23)
                                                                        Clearly, (31) is minimized for                , yielding
                                                                                                          R
for, say,                   . As developed in Appendix III, an                                                                        (32)
optimal signaling strategy, in terms of minimizing outage prob-
ability in the large     regime, is to encode information using       so that i.i.d. complex Gaussian inputs again minimize outage
             i.i.d. complex Gaussian, each with power         .       probability for large      . Note that for      , (32) converges
Using this result, the maximum average mutual information as          to (26), the transmit diversity bound without orthogonality con-
a function of the fading coefficients is given by                     straints. Thus, the orthogonality constraint has little effect for
                                                                      small , but induces a loss in       proportional to
                                                              (24)
3070                                                                IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER 2004
with respect to the unconstrained transmit diversity bound for           along with their associated performance limits, is beyond the
large .                                                                  scope of this paper.
Fig. 3. SNR loss for cooperative diversity protocols (solid) and orthogonal transmit diversity bound (dashed) relative to the (unconstrained) transmit diversity
bound.
the half-duplex constraint contributes, “repetition” in the form                    3) Effects of Geometry: To isolate the effect of network ge-
of amplification or repetition coding is the major cause of SNR                  ometry on performance, we compare the high-SNR behavior
loss for high rates. By contrast, incremental amplify-and-for-                   of direct transmission (12) with that of incremental amplify-
ward overcomes these additional losses by repeating only when                    and-forward (35). Comparison with fixed and selection relaying
necessary.                                                                       is similar, except for the additional impact of SNR loss with
   2) Outage Events: It is interesting that amplify-and-forward                  increasing spectral efficiency. Using a common model for the
and selection decode-and-forward have the same high-SNR                          path-loss (fading variances), we set               , where
performance, especially considering the different shapes                         isthe distance between terminals and , and is the path-loss
of their outage events (cf. (14), (20)), which are shown                         exponent [7]. Under this model, comparing (12) with (35), as-
in the low-spectral-efficiency regime in Fig. 4. When the                        suming both approximations are good for the          of interest,
relay can fully decode the source message and repeat it,                         we prefer incremental amplify-and-forward whenever
i.e.,                       , the outage event for selection de-
code-and-forward is a strict subset of the outage event of                                                                                                (36)
amplify-and-forward, with amplify-and-forward approaching
that of selection decode-and-forward as                 . On the                 Thus, incremental amplify-and-forward is useful whenever the
other hand, when the relay cannot fully decode the source                        relay lies within a certain normalized ellipse having the source
message and the source repeats, i.e.,                       , the                and destination as its foci, with the size of the ellipse increasing
outage event of amplify-and-forward is neither a subset nor a                    in          . What is most interesting about the structure of this
superset of the outage event for selection decode-and-forward.                   “utilization region” for incremental amplify-and-forward is that
Apparently, averaging over the Rayleigh-fading coefficients                      it is symmetric with respect to the source and destination. By
eliminates the differences between amplify-and-forward and                       comparison, a certain circle about only the source gives the uti-
selection decode-and-forward, at least in the high-SNR regime.                   lization region for fixed decode-and-forward.
3072                                                                          IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER 2004
Fig. 4. Outage event boundaries for amplify-and-forward (solid) and selection decode-and-forward (dashed and dash-dotted) as functions of the realized fading
coefficientja j    between the cooperating terminals. Outage events are to the left and below the respective outage event boundaries. Successively lower solid curves
correspond to amplify-and-forward with increasing values of ja j    . The dashed curve corresponds to the outage event for selection decode-and-forward when the
relay can fully decode and the relay repeats, i.e., SNR  ja j     2, while the dash-dotted curve corresponds to the outage event of selection decode-and-forward
when the relay cannot fully decode and the source repeats, i.e., SNR       ja j <       2. Note that the dash-dotted curve also corresponds to the outage event for
direct transmission.
   Utilization regions of the form (36) may be useful in devel-                        The results in Appendix I are all general enough to allow this
oping higher layer network protocols that select between direct                     particular parameterization. To demonstrate their application,
transmission and cooperative diversity using one of a number of                     we consider amplify-and-forward. The outage event under this
potential relays. Such algorithms and their performance repre-                      alternative parameterization is given by
sent an interesting area of further research, and a key ingredient                                                                                     R
for fully incorporating cooperative diversity into wireless net-
works.
                                                                                    For                   , the outage probability is approximately
B. Symmetric Networks
   We now specialize all of our results to the case of statistically                                                                       R
symmetric networks, e.g.,                without loss of generality.                                                                   R
We develop the results, summarized in Table I, under the two
parameterizations                  and                 , respectively.              where we have utilized the results of Claim 1 in Appendix I with
   1) Results Under Different Parameterizations: Parameter-
izing the outage results from Section IV in terms of
is straightforward because remains fixed; we simply substitute                                                 R
                   R       to obtain the results listed in the second
column of Table I. Parameterizing the outage results from Sec-                      The other results listed in the third column of Table I can be
tion IV in terms of                 is a bit more involved because                  obtained in similar fashion using the appropriate results from
                            increases with       .                                  Appendix I.
LANEMAN et al.: COOPERATIVE DIVERSITY IN WIRELESS NETWORKS                                                                                          3073
                                                                TABLE I
                            SUMMARY OF OUTAGE PROBABILITY APPROXIMATIONS FOR STATISTICALLY SYMMETRIC NETWORKS
Fig. 5. Outage probabilities versus SNR           , small R regime, for statistically symmetric networks, i.e.,  = 1. The outage probability curve for
amplify-and-forward was obtained via Monte Carlo simulation, while the other curves are computed from analytical expressions. Solid curves correspond to
exact outage probabilities, while dash-dotted curves correspond to the high-SNR approximations from Table I. The dashed curve corresponds to the transmit
diversity bounds in this low spectral efficiency regime.
   2) Fixed Systems: Fig. 5 shows outage probabilities for                    ward with respective to the transmit diversity bound is also ap-
the various protocols as functions of         in the small, fixed             parent. The curves for fixed and selection relaying shift to the
  regime. Both exact and high-SNR approximations are dis-                     right by 3 dB for each additional bit/s/Hz of spectral efficiency in
played, demonstrating the wide range of SNRs over which the                   the high regime. By contrast, the performance of incremental
high-SNR approximations are useful. The diversity gains of our                amplify-and-forward is unchanged at high SNR for increasing
protocols appear as steeper slopes in Fig. 5, from a factor of                  . Note that, at outage probabilities on the order of       , coop-
    decrease in outage probability for each additional 10 dB of               erative diversity achieves large energy savings over direct trans-
SNR in the case of direct transmission, to a factor of        de-             mission—on the order of 12–15 dB.
crease in outage probability for each additional 10 dB of SNR                     3) Fixed          Families of Systems: Another way to ex-
in the case of cooperative diversity. The relative loss of 1.5                amine the high spectral efficiency regime as SNR becomes
dB for fixed amplify-and-forward and selection decode-and-for-                large is to allow to grow with increasing           . In particular,
3074                                                              IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER 2004
the choice of                                is a natural one: for      it into account, there may be additional power costs of relays op-
slower growth, the outage results essentially behave like fixed         erating instead of powering down. Despite these costs, our anal-
systems for sufficiently large      , while for faster growth, the      ysis demonstrates significant performance enhancements, par-
outage probabilities all tend to . These observations motivate          ticularly in the low-spectral-efficiency regime (up to roughly 1
our parameterization in terms of                 .                      bit/s/Hz) often found in practice. Like other forms of diversity,
   Parameterizing performance in terms of                  leads to     these performance enhancements take the form of decreased
interesting tradeoffs between the diversity order and normalized        transmit power for the same reliability, increased reliability for
spectral efficiency of a protocol. Because these tradeoffs arise        the same transmit power, or some combination of the two.
naturally in the context of multiple-antenna systems [9], [10], it          The observations in Section V-B suggest that, among other
is not surprising that they show up in the context of cooperative       issues, a key area of further research is exploring cooperative
diversity. Diversity order can be viewed as the power to which          diversity protocols in the high-spectral-efficiency regime. It re-
        is raised in our outage expressions in the third column of      mains unclear at this point whether our simple protocols are
Table I. To be precise, we can define diversity order as                close to optimal in this regime, among all possible cooperative
                                                                        diversity protocols, yet our results indicate that direct transmis-
                                                                (37)    sion eventually becomes preferable. Useful work in this area
                        SNR                                             would develop tighter lower bounds on performance, which is
                                                                        akin to developing tighter converses for the relay channel [5],
Larger                implies more robustness to fading (faster
                                                                        or demonstrating other protocols that are more efficient for high
decay in the outage probability with increasing SNR),
                                                                        spectral efficiencies. Some of our own work in this direction ap-
but               generally decreases with increasing               .
                                                                        pears in [37].
For example, the diversity order of amplify-and-forward is
                                                                            More broadly, there are a number of channel circumstances in
                                    ; thus, its maximum diversity
                                                                        addition to those considered here that warrant further investiga-
order is achieved as                      , and maximum normal-
                                                                        tion. In particular, for scenarios in which the transmitters obtain
ized spectral efficiency        is achieved as              . Fig. 6
                                                                        accurate knowledge of the channel realizations, via feedback or
compares the tradeoffs for direct transmission and cooperative
                                                                        other means, beamforming and power and bandwidth allocation
diversity. As we might expect from our previous discussion,
                                                                        become possible. These options allow the cooperating terminals
among the protocols developed in this paper, incremental am-
                                                                        to adapt to their specific channel conditions and geometry and
plify-and-forward yields the highest               for each        ;
                                                                        select appropriate coding schemes for various regimes. Again,
this curve also corresponds to the transmit diversity bound
                                                                        better understanding of the relay channel will continue to yield
in the high-SNR regime. What is most interesting about the
                                                                        insight on these problems.
results in Fig. 6 is the sharp transition at               between
                                                                            We note that we have focused on the case of a pair of terminals
our preference for amplify-and-forward (as well as selection
                                                                        cooperating; extension to more than two terminals is straightfor-
decode-and-forward) for                      and our preference for
                                                                        ward except for the fact that comparatively more options arise.
direct transmission for                 .
                                                                        For example, in the case of three cooperating terminals, one of
                                                                        the relays might amplify-and-forward the information, while the
       VI. CONCLUDING REMARKS AND FUTURE DIRECTIONS                     other relay might decode-and-forward the information, or vice
   We develop in this paper a variety of low-complexity, coop-          versa. Moreover, as the number of terminals forming a network
erative protocols that enable a pair of wireless terminals, each        grows, higher layer protocols for organizing terminals into co-
with a single antenna, to fully exploit spatial diversity in the        operating groups become increasingly important. Some prelim-
channel. These protocols blend different fixed relaying modes,          inary work in this direction is reported in [38]. Finally, because
specifically amplify-and-forward and decode-and-forward,                cooperative diversity is inherently a network problem, it could
with strategies based upon adapting to CSI between cooper-              be fruitful to take into account additional higher layer network
ating source terminals (selection relaying) as well as exploiting       issues such as queuing of bursty data, link layer retransmissions,
limited feedback from the destination terminal (incremental             and routing.
relaying). For delay-limited and nonergodic environments, we
analyze the outage probability performance, in many cases                                     APPENDIX I
exactly, and in all cases using accurate, high-SNR approxima-                        ASYMPTOTIC CDF APPROXIMATIONS
tions.                                                                     To keep the presentation in the main part of the paper concise,
   There are costs associated with our cooperative protocols. For       we collect in this appendix several results for the limiting be-
one thing, cooperation with half-duplex operation requires twice        havior of the cumulative distribution function (CDF) of certain
the bandwidth of direct transmission for a given rate, and leads        combinations of exponential random variables. All our results
to larger effective SNR losses for increasing spectral efficiency.      are of the form
Furthermore, depending upon the application, additional receive
hardware may be required in order for the sources to relay for                                                                        (38)
one another. Although this may not be the case in emerging ad
hoc or multihop cellular networks, it would be the case in the up-      where is a parameter of interest;              is the CDF of a
link of current cellular systems that employ frequency-division         certain random variable     that can, in general, depend upon
duplexing. Finally, although our analysis has not explicitly taken       ;       and      are two (continuous) functions; and     and
LANEMAN et al.: COOPERATIVE DIVERSITY IN WIRELESS NETWORKS                                                                               3075
Fig. 6. Diversity order 1(R ) in (37) versus R for direct transmission and cooperative diversity.
  are constants. Among other things, for example, (38) implies                   Claim 1: Let , , and          be independent exponential
the approximation                        is accurate for close                random variables with parameters , , and , respectively.
to .                                                                          Let                            as in (13). Let be positive, and
   Fact 1: Let be an exponential random variable with param-                  let         be continuous with            and
eter . Then, for a function      continuous about          and                as       . Then
satisfying          as
                                                                     (39)
                                                                                                                                        (43)
   Fact 2: Let           , where and are independent ex-                      Moreover, if a function       is continuous about          and
ponential random variables with parameters and , respec-                      satisfies         as        , then
tively. Then the CDF
                                                                                                                                        (44)
                                                                     (40)
                                                                              The following lemma will be useful in the proof of Claim 1.
satisfies
                                                                                Lemma 1: Let be positive, and let                  ,
                                                                     (41)     where and are independent exponential random variables
                                                                              with parameters      and  , respectively. Let       be
Moreover, if a function            is continuous about                and     continuous with          and                  as     .
satisfies         as             , then                                       Then the probability          satisfies
                                                                     (42)                                                               (45)
3076                                                          IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER 2004
(49)
which takes care of the first term of (48). To bound the second
term of (48), let     be another fixed constant, and note that
                                                                                                                           (55)
                                                                   where in the second equality we have used the change of vari-
                                                                   ables              . But by Lemma 1 with           and
                                                                                , the quantity in brackets approaches        as
                                                                         , so we expect
                                                          (50)
where the first term in the bound of (50) follows from the fact
that
                                                                                                                                (56)
                                                                   To fully verify (56), we must utilize the lower and upper bounds
is nonincreasing in , and the second term in the bound of (50)     developed in Lemma 1.
follows from the fact that                              .            Using the lower bound (47), (55) satisfies
   Now, the first term of (50) satisfies
(51)
  Using the upper bound (54), (55) satisfies                        where the last equality follows from the change of variables
                                                                                .
                                                                       To upper-bound (63), we use the identities             for
                                                                    all      and           for all     , so that (63) becomes
(58)
where the last equality results from the fact            and the
fact that
                                                                    whence
(64)
(60)
Then
(61)
(62)
(65)
                                                                      Since the bounds in (64) and (65) are equal, the claim is
                                                                    proved.
                                                                      Claim 3: Suppose               pointwise as     , and
                                                             (63)   that     is monotone increasing in for each . Let
3078                                                           IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER 2004
Thus,
                                                                                                  REFERENCES
where represents the fading coefficients and         the transmit     [1] J. G. Proakis, Digital Communications, 4th ed. New York: McGraw-
signals from the two transmit antennas, and      is a zero-mean,          Hill, Inc., 2001.
white complex Gaussian process with variance        that captures     [2] İ. E. Telatar. (1995) Capacity of Multi-Antenna Gaussian Channels,
                                                                          Tech. Rep. Bell Labs, Lucent Technologies. [Online]. Available:
the effects of noise and interference. Let                 be the         http://mars.bell-labs.com/papers/proof/proof.pdf
covariance matrix for the transmit signals. Then the power con-       [3]       , “Capacity of multi-antenna Gaussian channels,” Europ. Trans.
                                                                          Telecommun., vol. 10, pp. 585–596, Nov.-Dec. 1999.
straint on the inputs may be written in the form             .        [4] A. Narula, M. D. Trott, and G. W. Wornell, “Performance limits of coded
   We are interested in determining a distribution on the input           diversity methods for transmitter antenna arrays,” IEEE Trans. Inform.
vector , subject to the power constraint, that minimizes outage           Theory, vol. 45, pp. 2418–2433, Nov. 1999.
                                                                      [5] T. M. Cover and A. A. El Gamal, “Capacity theorems for the relay
probability, i.e.,                                                        channel,” IEEE Trans. Inform. Theory, vol. IT-25, pp. 572–584, Sept.
                                                                          1979.
                                                             (72)     [6] A. Sendonaris, E. Erkip, and B. Aazhang, “Increasing uplink capacity
                                                                          via user cooperation diversity,” in Proc. IEEE Int. Symp. Information
                                                                          Theory (ISIT), Cambridge, MA, Aug. 1998, p. 156.
As [2], [3] develops, the optimization (72) can be restricted         [7] T. S. Rappaport, Wireless Communications: Principles and Prac-
to optimization over zero-mean, circularly symmetric complex              tice. Upper Saddle River, NJ: Prentice-Hall, 1996.
Gaussian inputs, because Gaussian codebooks maximize the              [8] V. Hayes, IEEE Standard for Wireless LAN Medium Access Control
                                                                          (MAC) and Physical Layer (PHY) Specifications, 1997.
mutual information for each value of the fading coefficients .        [9] L. Zheng and D. N. C. Tse, “Diversity and freedom: A fundamental
Thus, (72) is equivalent to maximizing over the covariance ma-            tradeoff in multiple antenna channels,” in Proc. IEEE Int. Symp. Infor-
trix of the complex Gaussian inputs subject to the power con-             mation Theory (ISIT), Lausanne, Switzerland, June/July 2002, p. 476.
                                                                     [10]       , “Diversity and multiplexing: A fundamental tradeoff in multiple-
straint, i.e.,                                                            antenna channels,” IEEE Trans. Inform. Theory, vol. 49, pp. 1073–1096,
                                                                          May 2003.
                                                             (73)    [11] L. H. Ozarow, S. Shamai (Shitz), and A. D. Wyner, “Information
                                                                          theoretic considerations for cellular mobile radio,” IEEE Trans. Veh.
                                                                          Technol., vol. 43, pp. 359–378, May 1994.
   We now argue that diagonal is sufficient, even if the com-        [12] E. C. van der Meulen, Transmission of Information in a T-Terminal Dis-
                                                                          crete Memoryless Channel. Berkeley, CA: Dept. Statistics, Univ. Cal-
ponents of are independent but not identically distributed.               ifornia, , 1968.
We note that this argument is a slight extension of [2], [3], in     [13]       , “Three-terminal communication channels,” Adv. Appl. Probab.,
which i.i.d. fading coefficients are treated. Although we treat           vol. 3, pp. 120–154, 1971.
                                                                     [14] T. M. Cover and J. A. Thomas, Elements of Information Theory. New
the case of two transmit antennas, the argument extends natu-             York: Wiley, 1991.
rally to more than two antennas.                                     [15] D. S. Slepian and J. K. Wolf, “Noiseless coding of correlated information
   We write           , where is a zero-mean, i.i.d. complex              sources,” IEEE Trans. Inform. Theory, vol. IT-19, pp. 471–480, July
                                                                          1973.
Gaussian vector with unit variances and                         .    [16] A. D. Wyner, “On source coding with side information at the decoder,”
Thus, the outage probability in (73) may be written as                    IEEE Trans. Inform. Theory, vol. IT-21, pp. 294–300, May 1975.
                                                                     [17] A. D. Wyner and J. Ziv, “The rate-distortion function for source coding
                                                                          with side information at the decoder,” IEEE Trans. Inform. Theory, vol.
                                                                          IT-22, pp. 1–10, Jan. 1976.
                                                                     [18] B. Schein and R. G. Gallager, “The Gaussian parallel relay network,” in
                                                                          Proc. IEEE Int. Symp. Information Theory (ISIT), Sorrento, Italy, June
Now consider an eigendecomposition of the matrix                          2000, p. 22.
                                                                     [19] B. Schein, “Distributed coordination in network information theory,”
        , where is unitary and       is diagonal. Using the fact          Ph.D. dissertation, MIT, Cambridge, MA, 2001.
that the distribution of is rotationally invariant, i.e.,    has     [20] P. Gupta and P. R. Kumar, “Toward and information theory of large net-
                                                                          works: An achievable rate region,” in Proc. IEEE Int. Symp. Information
the same distribution as for any unitary [2], [3], we observe             Theory (ISIT), Washington, DC, June 2001, p. 150.
that the outage probability for covariance matrix         is the     [21]       , “Toward an information theory of large networks: An achievable
same as the outage probability for the diagonal matrix .                  rate region,” IEEE Trans. Inform. Theory, vol. 49, pp. 1877–1894, Aug.
                                                                          2003.
   For                   , the outage probability can be written     [22] M. Gastpar and M. Vetterli, “On the capacity of wireless networks: The
in the form                                                               relay case,” in Proc. IEEE INFOCOM, New York, June 2002.
                                         R                           [23]       , “On the asymptotic capacity of Gaussian relay networks,” in Proc.
                                                                          IEEE Int. Symp. Information Theory (ISIT), Lausanne, Switzerland, July
                                                                          2002, p. 195.
3080                                                                        IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER 2004
 [24] M. Gastpar, G. Kramer, and P. Gupta, “The multiple-relay channel:           [33] A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diver-
      Coding and antenna-clustering capacity,” in Proc. IEEE Int. Symp.                sity, Part I: System description,” IEEE Trans. Commun., vol. 51, pp.
      Information Theory (ISIT), Lausanne, Switzerland, July 2002, p. 136.             1927–1938, Nov. 2003.
 [25] A. Reznik, S. Kulkarni, and S. Verdú, “Capacity and optimal resource al-    [34]       , “User cooperation diversity, Part II: Implementation aspects and
      location in the degraded Gaussian relay channel with multiple relays,” in        performance analysis,” IEEE Trans. Commun., vol. 51, pp. 1939–1948,
      Proc. Allerton Conf. Communications, Control, and Computing, Monti-              Nov. 2003.
      cello, IL, Oct. 2002.                                                       [35] J. N. Laneman and G. W. Wornell, “Exploiting distributed spatial di-
 [26] G. Kramer and A. J. van Wijngaarden, “On the white Gaussian mul-                 versity in wireless networks,” in Proc. Allerton Conf. Communications,
      tiple-access relay channel,” in Proc. IEEE Int. Symp. Information Theory         Control, and Computing, Monticello, IL, Oct. 2000.
      (ISIT), Sorrento, Italy, June 2000, p. 40.                                  [36] J. N. Laneman, G. W. Wornell, and D. N. C. Tse, “An efficient protocol
 [27] R. C. King, “Multiple access channels with generalized feedback,” Ph.D.          for realizing cooperative diversity in wireless networks,” in Proc. IEEE
      dissertation, Stanford Univ., Palo Alto, CA, 1978.                               Int. Symp. Information Theory (ISIT), Washington, DC, June 2001, p.
 [28] A. B. Carleial, “Multiple-access channels with different generalized             294.
      feedback signals,” IEEE Trans. Inform. Theory, vol. IT-28, pp. 841–850,     [37] J. N. Laneman and G. W. Wornell, “Distributed space–time coded pro-
      Nov. 1982.                                                                       tocols for exploiting cooperative diversity in wireless networks,” IEEE
 [29] F. M. J. Willems, “Informationtheoretical results for the discrete mem-          Trans. Inform. Theory, vol. 49, pp. 2415–2525, Oct. 2003.
      oryless multiple access channel,” Ph.D. dissertation, Katholieke Univ.      [38] J. N. Laneman, “Cooperative diversity in wireless networks: algorithms
      Leuven, Leuven, Belgium, 1982.                                                   and architectures,” Ph.D. dissertation, MIT, Cambridge, MA, 2002.
 [30] F. M. J. Willems, E. C. van der Meulen, and J. P. M. Schalkwijk, “An        [39] G. D. Forney, Jr. and G. Ungerboeck, “Modulation and coding for
      achievable rate region for the multiple access channel with generalized          linear Gaussian channels,” IEEE Trans. Inform. Theory, vol. 44, pp.
      feedback,” in Proc. Allerton Conf. Communications, Control, and Com-             2384–2415, Oct. 1998.
      puting, Monticello, IL, Oct. 1983, pp. 284–292.                             [40] J. N. Laneman and G. W. Wornell, “Energy-efficient antenna sharing
 [31] F. M. J. Willems, “The discrete memoryless multiple access channel with          and relaying for wireless networks,” in Proc. IEEE Wireless Communi-
      partially cooperating encoders,” IEEE Trans. Inform. Theory, vol. IT-29,         cations and Networking Conf. (WCNC), Chicago, IL, Sept. 2000.
      pp. 441–445, May 1983.                                                      [41] M. Adams and V. Guillemin, Measure Theory and Proba-
 [32] F. M. J. Willems and E. C. van der Meulen, “The discrete memoryless              bility. Boston, MA: Birkhäuser, 1996.
      multiple-access channel with cribbing encoders,” IEEE Trans. Inform.        [42] W. Rudin, Principles of Mathematical Analysis, 2nd ed. New York:
      Theory, vol. IT-31, pp. 313–327, May 1985.                                       McGraw-Hill, 1964.