ieee transactions on mobile computing, …wicl.cnu.ac.kr › wordpress › db ›...

13
Opportunistic Network Decoupling with Virtual Full-Duplex Operation in Multi-Source Interfering Relay Networks Won-Yong Shin, Senior Member, IEEE, Vien V. Mai, Bang Chul Jung, Senior Member, IEEE, and Hyun Jong Yang, Member, IEEE Abstract—We introduce a new achievability scheme, termed opportunistic network decoupling (OND), operating in virtual full-duplex mode. In the scheme, a novel relay scheduling strategy is utilized in the K N K channel with interfering relays, consisting of K source-destination pairs and N half-duplex relays in-between them. A subset of relays using alternate relaying is opportunistically selected in terms of producing the minimum total interference level, thereby resulting in network decoupling. As our main result, it is shown that under a certain relay scaling condition, the OND protocol achieves K degrees of freedom even in the presence of interfering links among relays. Numerical evaluation is also shown to validate the performance of the proposed OND. Our protocol basically operates in a fully distributed fashion along with local channel state information, thereby resulting in relatively easy implementation. Index Terms—Degrees of freedom (DoF), half-duplex, interference, K N K channel, opportunistic network decoupling (OND), relay, virtual full-duplex (FD) Ç 1 INTRODUCTION 1.1 Previous Work I NTERFERENCE between wireless links has been taken into account as a critical problem in wireless communication systems. Recently, interference alignment (IA) was pro- posed for fundamentally solving the interference problem when there are two communication pairs [1]. It was shown in [2] that the IA scheme can achieve the optimal degrees of freedom (DoF), which is equal to K=2, in the K-user inter- ference channel with time-varying channel coefficients. Since then, interference management schemes based on IA have been further developed and analyzed in various wire- less network environments: multiple-input multiple-output (MIMO) interference networks [3], [4], X networks [5], and cellular networks [6], [7], [8], [9]. On the one hand, following up on these successes for sin- gle-hop networks, more recent and emerging work has stud- ied multihop networks with multiple source-destination (S-D) pairs. For the two-user two-hop network with two relays (referred to as the 2 2 2 interference channel), it was shown in [10] that interference neutralization combining with symbol extension achieves the optimal DoF. A more challenging network model is to consider K-user two-hop relay-aided interference channels, consisting of K source-des- tination (S-D) pairs and N helping relay nodes located in the path between S-D pairs, so-called the K N K channel. Several achievability schemes have been known for the net- work, but more detailed understanding is still in progress. By applying the result from [11] to the K N K channel, one can show that K=2 DoF is achieved by using orthogonalize- and-forward relaying, which completely neutralizes interfer- ence at all destinations if N is greater than or equal to KðK 1Þþ 1. Another achievable scheme, called aligned net- work diagonalization, was introduced in [12] and was shown to achieve the optimal DoF in the K N K channel while tightening the required number of relays. The scheme in [12] is based on the real interference alignment framework [7]. In [10], [12], however, the system model under consideration assumes that there is no interfering signal between relays and the relays are full-duplex. Moreover, in [13], the 2 2 2 interference channel with full-duplex relays interfering with each other was characterized and its DoF achievability was shown using aligned interference neutralization. 1 On the other hand, there are lots of results on the useful- ness of fading in the literature, where one can obtain the multiuser diversity gain in broadcast channels: opportunis- tic scheduling [15], opportunistic beamforming [16], and random beamforming [17]. Such opportunism can also be fully utilized in multi-cell uplink or downlink networks by using opportunistic interference alignment strategies [9], W.-Y. Shin is with the Department of Computer Science and Engineering, Dankook University, Yongin 448-701, Republic of Korea. E-mail: [email protected]. V.V. Mai is with the Department of Automatic Control, KTH Royal Institute of Technology, Stockholm SE-100 44, Sweden. E-mail: [email protected]. B.C. Jung is with the Department of Electronics Engineering, Chungnam National University, Daejeon 305-764, Republic of Korea. E-mail: [email protected]. H.J. Yang is with the School of Electrical and Computer Engineering, UNIST, Ulsan 689-798, Republic of Korea. E-mail: [email protected]. Manuscript received 11 Feb. 2016; revised 12 Sept. 2016; accepted 22 Sept. 2016. Date of publication 4 Oct. 2016; date of current version 27 June 2017. For information on obtaining reprints of this article, please send e-mail to: [email protected], and reference the Digital Object Identifier below. Digital Object Identifier no. 10.1109/TMC.2016.2614979 1. The idea in [13] was later extended to the two-user three-hop net- work with four relays, i.e., the 2 2 2 2 interference channel [14]. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 16, NO. 8, AUGUST 2017 2321 1536-1233 ß 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Upload: others

Post on 05-Jul-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IEEE TRANSACTIONS ON MOBILE COMPUTING, …wicl.cnu.ac.kr › wordpress › DB › International_Journal › 2017_08...networks by applying an opportunistic two-hop relaying protocol

Opportunistic Network Decoupling with VirtualFull-Duplex Operation in Multi-Source

Interfering Relay NetworksWon-Yong Shin, Senior Member, IEEE, Vien V. Mai, Bang Chul Jung, Senior Member, IEEE,

and Hyun Jong Yang,Member, IEEE

Abstract—We introduce a new achievability scheme, termed opportunistic network decoupling (OND), operating in virtual full-duplex

mode. In the scheme, a novel relay scheduling strategy is utilized in theK �N �K channel with interfering relays, consisting ofK

source-destination pairs andN half-duplex relays in-between them. A subset of relays using alternate relaying is opportunistically

selected in terms of producing the minimum total interference level, thereby resulting in network decoupling. As our main result, it is

shown that under a certain relay scaling condition, the OND protocol achievesK degrees of freedom even in the presence of interfering

links among relays. Numerical evaluation is also shown to validate the performance of the proposed OND. Our protocol basically

operates in a fully distributed fashion along with local channel state information, thereby resulting in relatively easy implementation.

Index Terms—Degrees of freedom (DoF), half-duplex, interference,K �N �K channel, opportunistic network decoupling (OND), relay,

virtual full-duplex (FD)

Ç

1 INTRODUCTION

1.1 Previous Work

INTERFERENCE between wireless links has been taken intoaccount as a critical problem in wireless communication

systems. Recently, interference alignment (IA) was pro-posed for fundamentally solving the interference problemwhen there are two communication pairs [1]. It was shownin [2] that the IA scheme can achieve the optimal degrees offreedom (DoF), which is equal to K=2, in the K-user inter-ference channel with time-varying channel coefficients.Since then, interference management schemes based on IAhave been further developed and analyzed in various wire-less network environments: multiple-input multiple-output(MIMO) interference networks [3], [4], X networks [5], andcellular networks [6], [7], [8], [9].

On the one hand, following up on these successes for sin-gle-hop networks, more recent and emerging work has stud-ied multihop networks with multiple source-destination(S-D) pairs. For the two-user two-hop network with two

relays (referred to as the 2� 2� 2 interference channel), itwas shown in [10] that interference neutralization combiningwith symbol extension achieves the optimal DoF. A morechallenging network model is to consider K-user two-hoprelay-aided interference channels, consisting ofK source-des-tination (S-D) pairs and N helping relay nodes located in thepath between S-D pairs, so-called the K �N �K channel.Several achievability schemes have been known for the net-work, but more detailed understanding is still in progress. Byapplying the result from [11] to the K �N �K channel, onecan show that K=2 DoF is achieved by using orthogonalize-and-forward relaying, which completely neutralizes interfer-ence at all destinations if N is greater than or equal toKðK � 1Þ þ 1. Another achievable scheme, called aligned net-work diagonalization, was introduced in [12] and was shownto achieve the optimal DoF in the K �N �K channel whiletightening the required number of relays. The scheme in [12]is based on the real interference alignment framework [7].In [10], [12], however, the system model under considerationassumes that there is no interfering signal between relays andthe relays are full-duplex. Moreover, in [13], the 2� 2� 2interference channel with full-duplex relays interfering witheach other was characterized and its DoF achievability wasshown using aligned interference neutralization.1

On the other hand, there are lots of results on the useful-ness of fading in the literature, where one can obtain themultiuser diversity gain in broadcast channels: opportunis-tic scheduling [15], opportunistic beamforming [16], andrandom beamforming [17]. Such opportunism can also befully utilized in multi-cell uplink or downlink networks byusing opportunistic interference alignment strategies [9],

� W.-Y. Shin is with the Department of Computer Science and Engineering,Dankook University, Yongin 448-701, Republic of Korea.E-mail: [email protected].

� V.V. Mai is with the Department of Automatic Control, KTH RoyalInstitute of Technology, Stockholm SE-100 44, Sweden.E-mail: [email protected].

� B.C. Jung is with the Department of Electronics Engineering, ChungnamNational University, Daejeon 305-764, Republic of Korea.E-mail: [email protected].

� H.J. Yang is with the School of Electrical and Computer Engineering,UNIST, Ulsan 689-798, Republic of Korea. E-mail: [email protected].

Manuscript received 11 Feb. 2016; revised 12 Sept. 2016; accepted 22 Sept.2016. Date of publication 4 Oct. 2016; date of current version 27 June 2017.For information on obtaining reprints of this article, please send e-mail to:[email protected], and reference the Digital Object Identifier below.Digital Object Identifier no. 10.1109/TMC.2016.2614979

1. The idea in [13] was later extended to the two-user three-hop net-work with four relays, i.e., the 2� 2� 2� 2 interference channel [14].

IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 16, NO. 8, AUGUST 2017 2321

1536-1233� 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Page 2: IEEE TRANSACTIONS ON MOBILE COMPUTING, …wicl.cnu.ac.kr › wordpress › DB › International_Journal › 2017_08...networks by applying an opportunistic two-hop relaying protocol

[18], [19], [20]. Various scenarios exploiting the multiuserdiversity gain have been studied not only in cooperativenetworks by applying an opportunistic two-hop relayingprotocol [21], an opportunistic routing [22], and an opportu-nistic two-way relay selection [23], but also in cognitiveradio networks with opportunistic scheduling [24], [25]. Inaddition, recent results [26], [27] have shown how to utilizethe opportunistic gain when there are a large number ofchannel realizations. More specifically, to amplify signalsand cancel interference, the idea of opportunistically pairingcomplementary channel instances has been studied in inter-ference networks [26] and multi-hop relay networks [27]. Incognitive radio environments [28], opportunistic spectrumsharing was introduced by allowing secondary users toshare the radio spectrum originally allocated to primaryusers via transmit adaptation in space, time, or frequency.

1.2 Main Contributions

In this paper, we study theK �N �K channel with interferingrelays, which can be taken into account as one of practicalmulti-source interfering relay networks and be regarded as afundamentally different channelmodel from the conventionalK �N �K channel in [12]. Then, we introduce an opportunis-tic network decoupling (OND) protocol that achieves full DoFwith comparatively easy implementation under the channelmodel. This work focuses on the K �N �K channel withone additional assumption that N half-duplex (HD) relaysinterfere with each other, which is a more feasible scenario.The scheme adopts the notion of the multiuser diversity gainfor performing interference management over two hops.More precisely, in our scheme, a scheduling strategy is pre-sented in time-division duplexing (TDD) two-hop environ-ments with time-invariant channel coefficients, where asubset of relays is opportunistically selected in terms of pro-ducing the minimum total interference level. To improve thespectral efficiency, the alternate relaying protocol in [29], [30],[31] is employed with a modification, which eventually ena-bles our system to operate in virtual full-duplex mode. As ourmain result, it turns out that in a high signal-to-noise ratio(SNR) regime, the OND protocol asymptotically achieves themin-cut upper bound ofK DoF even in the presence of inter-relay interference and under the half-duplex assumption,provided theat the number of relays, N , scales faster than

snr3K�2, which is the minimum number of relays required toguarantee our achievability result. Numerical evaluation alsoindicates that the OND protocol has higher sum-rates thanthose of other relaying methods under realistic network con-ditions (e.g., finite N and SNR) since the inter-relay interfer-ence is significantly reduced owing to the opportunistic gain.For comparison, the OND scheme without alternate relayingand the max-min SNR scheme are also shown as baselineschemes. Note that our protocol basically operates with localchannel state information (CSI) at the transmitter and thus issuitable for distributed/decentralized networks.

Our main contributions are fourfold as follows:

� In the K �N �K channel with interfering relays,we introduce a new achievability scheme, termedONDwith virtual full-duplex operation.

� Under the channel model, we completely analyze theoptimal DoF, the required relay scaling condition,and the decaying rate of the interference level, where

the OND scheme is shown to approach the min-cutupper bound on the DoF.

� Our achievability result (i.e., the derived DoF andrelay scaling law) is validated via numericalevaluation.

� We perform extensive computer simulations withother baseline schemes.

1.3 Organization

The rest of this paper is organized as follows. In Section 2,we describe the system and channel models. In Section 3,the proposed OND scheme is specified and its lower boundon the DoF is analyzed. Section 4 shows an upper bound onthe DoF. Numerical results of the proposed OND schemeare provided in Section 5. Finally, we summarize the paperwith some concluding remarks in Section 6.

1.4 Notations

Throughout this paper, C, E½��, and �d e indicate the field ofcomplex numbers, the statistical expectation, and the ceilingoperation, respectively. Unless otherwise stated, all loga-rithms are assumed to be to the base 2.

Moreover, Table 1 summarizes the notations usedthroughout this paper. Some notations will be more pre-cisely defined in the following sections when we introduceour channel model and achievability results.

2 SYSTEM AND CHANNEL MODELS

As one of two-hop cooperative scenarios, we consider theK �N �K channel model with interfering relays, which fitsinto the case where each S-D pair is geographically far apartand/or experiences strong shadowing (thus requiring theresponse to a huge challenge for achieving the target spectralefficiency). In the channel model, it is thus assumed that eachsource transmits its ownmessage to the corresponding desti-nation only through one of N relays, and thus there is no

TABLE 1Summary of Notations

Notation Description

Sk kth sourceDk kth destinationRk kth relay

hð1Þik

channel coefficient from Sk toRi

hð2Þki

channel coefficient fromRi to Dk

hðrÞik

channel coefficient betweenRi andRk

xð1Þk ðlÞ lth transmitted symbol of kth source

psðkÞ ðs ¼ 1; 2Þ indices of two relayshelping kth S-D pair

xð1Þk ðlÞ lth transmit symbol of Sk

xð2ÞpsðkÞðlÞ lth transmit symbol ofRpsðkÞ

Ps ðs ¼ 1; 2Þ two selected relay sets~Li;k scheduling metric in Step 1

LP2i;k

scheduling metric in Step 2

DoFtotal total number of DoF

sinrð1ÞpsðkÞ

SINR atRpsðkÞ

sinrð2Þk;psðkÞ

SINR at Dk (fromRpsðkÞ)

2322 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 16, NO. 8, AUGUST 2017

Page 3: IEEE TRANSACTIONS ON MOBILE COMPUTING, …wicl.cnu.ac.kr › wordpress › DB › International_Journal › 2017_08...networks by applying an opportunistic two-hop relaying protocol

direct path between an S-D pair. Note that unlike the conven-tionalK �N �K channel, relay nodes are assumed to inter-fere with each other in our model. There are K S-D pairs,where each receiver is the destination of exactly one sourcenode and is interested only in traffic demands of the source.As in the typical cooperative relaying setup, N relay nodesare located in the path between S-D pairs so as to help toreduce path-loss attenuations.

Suppose that each node is equipped with a single trans-mit antenna. Each relay node is assumed to operate in half-duplex mode and to fully decode, re-encode, and retransmitthe source message, i.e., decode-and-forward protocol istaken into account. We assume that each node (either asource or a relay) has an average transmit power constraintP . Unlike the work in [10], [12], N relays are assumed tointerfere with each other.2 To improve the spectral effi-ciency, the alternate relaying protocol in [29], [30], [31] isemployed with a modification. With alternate relaying, eachselected relay node toggles between the transmit and listenmodes for alternate time slots of message transmission ofthe sources. If N is sufficiently large, then it is possible toexploit the channel randomness for each hop and thus toobtain the opportunistic gain in multiuser environments. Inthis work, we do not assume the use of any sophisticatedmultiuser detection schemes at each receiver (either a relayor a destination node), thereby resulting in an easierimplementation.

Now, let us turn to channel modeling. Let Sk, Dk, and Ri

denote the kth source, the corresponding kth destination,and the ith relay node, respectively, where k 2 f1; . . . ; Kgand i 2 f1; . . . ; Ng. The terms h

ð1Þik ; h

ð2Þki 2 C denote the chan-

nel coefficients from Sk to Ri and from Ri to Dk, corre-sponding to the first and second hops, respectively. The

term hðrÞin 2 C indicates the channel coefficient between two

relays Ri and Rn. All the channels are assumed to be Ray-leigh, having zero-mean and unit variance, and to be inde-pendent across different i, k, n, and hop index r. We assumethe block-fading model, i.e., the channels are constant dur-ing one block (e.g., frame), consisting of one schedulingtime slot and L data transmission time slots, and changes toa new independent value for every block.

3 ACHIEVABILITY RESULTS

In this section, we describe the OND protocol, operating invirtual full-duplex mode, in the K �N �K channel withinterfering relays. Then, its performance is analyzed interms of achievable DoF along with a certain relay scalingcondition. The decaying rate of the interference level is alsoanalyzed. In addition, the OND protocol with no alternaterelaying and its achievability result are shown forcomparison.

3.1 OND in theK �N �K Channel with InterferingRelays

In this section, we introduce an OND protocol as the achiev-able scheme to guarantee the optimal DoF of theK �N �K

channel with inter-relay interference, where 2K relay nodesamong N candidates are opportunistically selected for dataforwarding in the sense of producing a sufficiently smallamount of interference level. The proposed scheme is basi-cally performed by utilizing the channel reciprocity of TDDsystems.

Suppose that p1ðkÞ and p2ðkÞ denote the indices of tworelays communicating with the kth S-D pair fork 2 f1; . . . ; Kg. In this case, without loss of generality,assuming that the number of data transmission time slots,L, is an odd number, the specific steps of each node duringone block are described as follows:

� Time slot 1: Sources S1; . . . ;SK transmit their first

encoded symbols xð1Þ1 ð1Þ; . . . ; xð1Þ

K ð1Þ, where xð1Þk ðlÞ

represents the lth transmit symbol of the kth sourcenode.3 A set of K selected relay nodes,P1 ¼ fp1ð1Þ; . . . ;p1ðKÞg, operating in receive mode

at each odd time slot, listens to xð1Þ1 ð1Þ; . . . ; xð1Þ

K ð1Þ(note that a relay selection strategy will be specifiedlater). Other N �K relay nodes and destinationsD1; . . . ;DK remain idle.

� Time slot 2: The K sources transmit their encoded

symbols xð1Þ1 ð2Þ; . . . ; xð1ÞK ð2Þ. The K selected relays in

the set P1 forward their first re-encoded symbols

xð2Þp1ð1Þð1Þ; . . . ; x

ð2Þp1ðKÞð1Þ to the corresponding K desti-

nations. If the relays in P1 successfully decode the

corresponding symbols, then xð2Þp1ðkÞð1Þ is the same as

xð1Þk ð1Þ. Another set of K selected relay nodes,

P2 ¼ fp2ð1Þ; . . . ;p2ðKÞg, operating in receive modeat each even time slot, listens to and decodes

xð1Þ1 ð2Þ; . . . ; xð1Þ

K ð2Þ while being interfered with byRp1ð1Þ; . . . ;Rp1ðKÞ. The K destinations receive and

decode xð2Þp1ð1Þð1Þ; . . . ; x

ð2Þp1ðKÞð1Þ fromRp1ð1Þ; . . . ;Rp1ðKÞ.

The remainingN � 2K relays keep idle.� Time slot 3: The K sources transmit their encoded

symbols xð1Þ1 ð3Þ; . . . ; xð1Þ

K ð3Þ. The K relays p2ð1Þ;. . . ;p2ðKÞ forward their re-encoded symbols

xð2Þp2ð1Þð2Þ; . . . ; x

ð2Þp2ðKÞð2Þ to the corresponding K desti-

nations. Another K relays in P1 receive and decode

xð2Þ1 ð3Þ; . . . ; xð2Þ

K ð3Þ while being interfered with byRp2ð1Þ; . . . ;Rp2ðKÞ. The K destinations receive and

decode xð2Þp2ð1Þð2Þ; . . . ; x

ð2Þp2ðKÞð2Þ fromRp2ð1Þ; . . . ;Rp2ðKÞ.

The remainingN � 2K relays keep idle.� The processes in time slots 2 and 3 are repeated to

the ðL� 1Þth time slot.� Time slot L: The K relays in P2 forward their

re-encoded symbols xð2Þp2ð1ÞðL� 1Þ; . . . ;xð2Þ

p2ðKÞðL� 1Þto the corresponding K destinations. The K sourcesand the other N �K relays remain idle.

At each odd time slot l (i.e., l ¼ 1; 3; . . . ; L), let us considerthe received signal at each selected relay for the first hop

2. If we can cancel the interfering signals among multiple relays,then the existing achievable scheme of the K �N �K channel can alsobe applied here.

3. For notational convenience, we use scalar notation instead of vec-tor notation for each coding block from source nodes, but the size ofeach symbol is assumed to be sufficiently long to achieve the Shannon-theoretic channel capacity.

SHIN ETAL.: OPPORTUNISTIC NETWORK DECOUPLINGWITH VIRTUAL FULL-DUPLEXOPERATION IN MULTI-SOURCE INTERFERING... 2323

Page 4: IEEE TRANSACTIONS ON MOBILE COMPUTING, …wicl.cnu.ac.kr › wordpress › DB › International_Journal › 2017_08...networks by applying an opportunistic two-hop relaying protocol

and the received signal at each destination for the secondhop, respectively.

For the first hop (Phase 1), the received signal yð1Þp1ðiÞðlÞ 2 C

atRp1ðiÞ is given by

yð1Þp1ðiÞðlÞ ¼

XKk¼1

hð1Þp1ðiÞkx

ð1Þk ðlÞ þ

XKn¼1

hðrÞp1ðiÞp2ðnÞx

ð2Þp2ðnÞðl� 1Þ

þ zð1Þp1ðiÞðlÞ;

(1)

where xð1Þk ðlÞ and x

ð2Þp2ðnÞðl� 1Þ are the lth transmit symbol of

Sk and the ðl� 1Þth transmit symbol of Rp2ðnÞ, respectively.As addressed earlier, if relayRp2ðkÞ successfully decodes the

received symbol, then it follows that xð2Þp2ðkÞðl� 1Þ ¼

xð1Þk ðl� 1Þ. The received signal y

ð1Þp1ðiÞðlÞ at Rp1ðiÞ is corrupted

by the independent and identically distributed (i.i.d.) andcircularly symmetric complex additive white Gaussian

noise (AWGN) zð1Þp1ðiÞðlÞ having zero-mean and variance N0.

Note that the second term in the right-hand side (RHS) of(1) indicates the inter-relay interference, which occurs whenthe K relays in the set P1, operating in receive mode, listento the sources, the relays are interfered with by the other setP2, operating in transmit mode. Note that when l ¼ 1, relayshave no symbols to transmit, and the second term in theRHS of (1) becomes zero. Similarly when l ¼ L, sources donot transmit symbols, and the first term in the RHS of (1)becomes zero.

For the second hop (Phase 2), assuming that the Kselected relay nodes transmit their data packets simulta-

neously, the received signal yð2Þk ðlÞ 2 C at Dk is given by

yð2Þk ðlÞ ¼

XKn¼1

hð2Þkp2ðnÞx

ð2Þp2ðnÞðl� 1Þ þ z

ð2Þk ðlÞ; (2)

where zð2Þk ðlÞ is the i.i.d. AWGN having zero-mean and vari-

ance N0. We also note that when l ¼ 1, there are no signalsfrom relays.

Likewise, at each even time slot (i.e., l ¼ 2; 4; . . . ; L� 1),the received signals at Rp2ðiÞ and Dk (i.e., the first and sec-

ond hops) are given by

yð1Þp2ðiÞðlÞ ¼

XKk¼1

hð1Þp2ðiÞkx

ð1Þk ðlÞ þ

XKn¼1

hðrÞp2ðiÞp1ðnÞx

ð2Þp1ðnÞðl� 1Þ

þ zð1Þp2ðiÞðlÞ

and

yð2Þk ðlÞ ¼

XKn¼1

hð2Þkp1ðnÞx

ð2Þp1ðnÞðl� 1Þ þ z

ð2Þk ðlÞ;

respectively. The illustration of the aforementioned ONDprotocol is geographically shown in Fig. 1 (two terms~Lp1ðkÞ;k and LP2

p2ðkÞ;k are specified later in the following relay

selection steps).Now, let us describe how to choose two types of relay

sets, P1 and P2, among N relay nodes, where N is suffi-ciently large (the minimum N required to guarantee theDoF optimality will be analyzed in Section 3.2).

3.1.1 Step 1 (The First Relay Set Selection)

Let us first focus on selecting the set P1 ¼ fRp1ð1Þ; . . . ;Rp1ðKÞg, operating in receive and transmit modes in odd

and even time slots, respectively. For every schedulingperiod, it is possible for relay Ri to obtain all the channel

coefficients hð1Þik and h

ð2Þki by using a pilot signaling sent from

all of the source and destination nodes due to the channelreciprocity before data transmission, where i 2 f1; . . . ; Ngand k 2 f1; . . . ; Kg (note that this is our local CSI assump-tion). WhenRi is assumed to serve the kth S-D pair ðSk;DkÞ,it then examines both i) how much interference is receivedfrom the other sources and ii) how much interference is gen-erated by itself to the other destinations, by computing the

following scheduling metric ~Li;k:

~Li;k ¼XKm¼1m6¼k

hð1Þim

��� ���2þ hð2Þmi

��� ���2� �; (3)

where i 2 f1; . . . ; Ng and k 2 f1; . . . ; Kg. We remark that

the first termPK

m¼1;m 6¼k hð1Þim

��� ���2 in (3) denotes the sum of

interference power received at Ri for the first hop (i.e.,Phase 1). On the other hand, the second termPK

m¼1;m6¼k hð2Þmi

��� ���2 indicates the sum of interference power

generating at Ri, which can be interpreted as the leakageof interference to the K � 1 receivers expect for the corre-sponding destination, for the second hop (i.e., Phase 2)under the same assumption.

Suppose that a short duration Clear to Send (CTS) mes-sage is transmitted by the destination who finds itsdesired relay node (or the master destination). Thenaccording to the computed metrics ~Li;k in (3), a timer-based method can be used for the relay selection similarly

Fig. 1. The overall procedure of our OND scheme in the K �N �Kchannel with interfering relays.

2324 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 16, NO. 8, AUGUST 2017

Page 5: IEEE TRANSACTIONS ON MOBILE COMPUTING, …wicl.cnu.ac.kr › wordpress › DB › International_Journal › 2017_08...networks by applying an opportunistic two-hop relaying protocol

as in [32].4 Note that the method based on the timer isconsiderably suitable in distributed systems in the sensethat information exchange among all the relay nodes canbe minimized. At the beginning of every schedulingperiod, the relay Ri computes the set of K scheduling

metrics, f ~Li;1; . . . ; ~Li;Kg, and then starts its own timer withK initial values, which can be set to be proportional tothe K metrics.5 Thus, there exist NK metrics over thewhole relay nodes, and we need to compare them so as todetermine who will be selected. The timer of the relay

Rp1ðk̂Þ with the least one ~Lp1ðk̂Þ;k̂ among NK metrics will

expire first, where p1ðk̂Þ 2 f1; . . . ; Ng and k̂ 2 f1; . . . ; Kg.The relay then transmits a short duration RTS message,signaling its presence, to the other N � 1 relays, whereeach RTS message is composed of log2 Kd e bits to indicatewhich S-D pair the relay wants to serve. Thereafter, the

relay Rp1ðk̂Þ is first selected to forward the k̂th S-D pair’s

packet. All the other relays are in listen mode while wait-ing for their timer to be set to zero (i.e., to expire). At thestage of deciding who will send the second RTS message,it is assumed that the other relays are not allowed to com-

municate with the k̂th S-D pair, and thus the associated

metrics f ~L1;k̂; . . . ;~Lp1ðk̂Þ�1;k̂;

~Lp1ðk̂Þþ1;k̂; . . . ;~LN;k̂g are dis-

carded with respect to timer operation. If another relayhas an opportunity to send the second RTS message oflog2ðK � 1Þd e bits in order to declare its presence, then itis selected to communicate with the corresponding S-Dpair. When such K RTS messages, consisting of at mostK log2 Kd e bits, are sent out in consecutive order, i.e., theset of K relays, P1 ¼ fRp1ð1Þ; . . . ;Rp1ðKÞg, is chosen, the

timer-based algorithm for the first relay set selection ter-minates, yielding no RTS collision with high probability.We remark that when K ¼ 1 (i.e., the single S-D paircase), K relay nodes are arbitrarily chosen as the first relayset P1 since there is no interference in this step.

3.1.2 Step 2 (The Second Relay Set Selection)

Now let us turn to choosing the set ofK relay nodes (amongN �K candidates), P2 ¼ fp2ð1Þ; . . . ;p2ðKÞg, operating inreceive and transmit modes in even and odd time slots,respectively. UsingK RTSmessages broadcasted from theKrelay nodes in the set P1, it is possible for relay nodeRi 2 f1; . . . ; Ng nP1 to compute the sum of inter-relay inter-ference power generated from the relays in P1, denoted byPK

k¼1 hðrÞip1ðkÞ

��� ���2. When Ri is again assumed to serve the kth S-

D pair ðSk;DkÞ, it examines both i) how much interference isreceived from the undesired sources and the selected relaysin the setP1 for the first hop and ii) howmuch interference isgenerated by itself to the other destinations by computing

the followingmetricLP2i;k , termed total interference level (TIL):

LP2i;k ¼ ~Li;k þ

XKk¼1

hðrÞip1ðkÞ

��� ���2

¼XKm¼1m6¼k

hð1Þim

��� ���2þ hð2Þmi

��� ���2� �þXKk¼1

hðrÞip1ðkÞ

��� ���2; (4)

where i 2 f1; . . . ; Ng and k 2 f1; . . . ; Kg. We note that Steps1 and 2 cannot be exchangeable due to the fact that the inter-

relay interference termPK

k¼1 hðrÞip1ðkÞ

��� ���2 ismeasured after deter-

mining the first relay setP1. If the relay set selection order isswitched, then themetric TIL in (4) will not be available.

According to the computed TIL LP2i;k , we also apply the

timer-based method used in Step 1 for the second relay setselection. The relay Ri 2 f1; . . . ; Ng nP1 computes the set

of K TILs, fLP2i;1 ; . . . ; L

P2i;Kg, and then starts its timer with K

initial values, proportional to the K TILs. Thus, we need tocompare ðN �KÞK TIL metrics over the relay nodes in theset f1; . . . ; Ng nP1 in order to determine who will beselected as the second relay set. The rest of the relay setselection protocol (i.e., RTS message exchange among relaynodes) almost follows the same line as that of Step 1. Thetimer-based algorithm for the second relay set selection ter-minates when K RTS messages are sent out in consecutiveorder. Then, K relay nodes having a sufficiently small

amount of TIL LP2i;k are selected as the second relay set P2.

Remark 1. Owing to the channel reciprocity of TDD sys-tems, the sum of inter-relay interference power received

at any relay Ri 2 P1,PK

k¼1 hðrÞip2ðkÞ

��� ���2, also turns out to be

sufficiently small when N is large. That is, it is alsoguaranteed thatK selected relays in the set P1 have a suf-ficiently small amount of TIL.

Remark 2. The overhead of each scheduling time slot (i.e.,the total number of bits required for exchanging RTS mes-sages among the relay nodes) can be made arbitrarilysmall, compared to one transmission block. From the factthat K RTS messages, consisting of at most K log2 Kd ebits, are sent out in each relay set selection step, only2K log2 Kd e bit transmission could suffice.

3.1.3 Step 3 (Data Transmission)

The 2K selected relays request data transmission to theirdesired source nodes. Each source (Sk) then starts to transmitdata to the corresponding destination (Dk) via one of its tworelay nodes alternately (Rp1ðkÞ or Rp2ðkÞ), which was specified

earlier. If the TILs of the selected relays are arbitrarily small,then i) the associated undesired source-relay and relay-destina-tion channel links and ii) the inter-relay channel links are all indeep fade. In Section 3.2, we will show that it is possible tochoose such relayswith the help of themultiuser diversity gain.

At the receiver side, each relay or destination detects thesignal sent from its desired transmitter, while simply

4. The reception of a CTS message, which is transmitted from a cer-tain destination, triggers the initial timing process at each relay. There-fore, no explicit timing synchronization protocol is required among therelays [32], [33]. Moreover, it is worth noting that the overhead of relayselection is a small fraction of one transmission block with small colli-sion probability [32]. Since our relay selection procedure is performedsequentially over all of the S-D pairs and the already selected relays fora certain S-D pair are not allowed to take part in the selection processfor another S-D pair, the collision probability is thus at most 2K timesthat of the single S-D pair case [32].

5. To avoid a situation such that a malicious relay deliberately setsits timer to a smaller value so as to win the chance, prior to the relayselection process, a secret key may be shared among legitimate nodesincluding relays. If a malicious relay who did not share the key wantsto participate in communication, then one can neglect his/her message(e.g., Request to Send (RTS) message).

SHIN ETAL.: OPPORTUNISTIC NETWORK DECOUPLINGWITH VIRTUAL FULL-DUPLEXOPERATION IN MULTI-SOURCE INTERFERING... 2325

Page 6: IEEE TRANSACTIONS ON MOBILE COMPUTING, …wicl.cnu.ac.kr › wordpress › DB › International_Journal › 2017_08...networks by applying an opportunistic two-hop relaying protocol

treating interference as Gaussian noise. Thus, no multiuserdetection is performed at each receiver, thereby resulting inan easier implementation.

3.2 Analysis of a Lower Bound on the DoF

In this section, using the scaling argument bridgingbetween the number of relays, N , and the received SNR(refer to [9], [18], [19], [20] for the details), we shallshow 1) the lower bound on the DoF of the K �N �Kchannel with interfering relays as N increases and 2) theminimum N required to guarantee the achievabilityresult. The total number of DoF, denoted by DoFtotal, isdefined as [2]

DoFtotal ¼XKk¼1

limsnr!1

TkðsnrÞlog snr

� �;

where TkðsnrÞ denotes the transmission rate of source Sk.Using the OND framework in the K �N �K channel withinterfering relays where L transmission slots per block areused, the achievable DoFtotal is lower-bounded by

DoFtotal � L� 1

L

XKk¼1

X2s¼1

limsnr!1

12 log 1þmin sinr

ð1ÞpsðkÞ; sinr

ð2Þk;psðkÞ

n o� �log snr

0@

1A;

(5)

where sinrð1ÞpsðkÞ denotes the received signal-to-interference-

and-noise ratio (SINR) at the relay RpsðkÞ and sinrð2Þk;psðkÞ

denotes the received SINR at the destination Dk when therelay RpsðkÞ transmits the desired signal (s ¼ 1; 2 and

k 2 f1; . . . ; Kg). More specifically, the above SINRs can beformally expressed as6

sinrð1ÞpsðiÞ ¼

P hð1ÞpsðiÞi

��� ���2N0 þ P

PKk¼1k6¼i

hð1ÞpsðiÞk

��� ���2þPPK

k¼1 hðrÞpsðiÞ;p~sðkÞ

��� ���2

sinrð2Þi;psðiÞ ¼

P hð2ÞipsðiÞ

��� ���21þ P

PKk¼1k6¼i

hð2ÞipsðkÞ

��� ���2 ;

where the second term in the denominator of sinrð1ÞpsðiÞ indi-

cates the interference power at relay psðiÞ received from thesources while the third term indicates the inter-relay inter-

ference, and the second term in the denominator of sinrð2Þi;psðiÞ

indicates the interference power at the destination Di

received from the active relays. Here, ~s ¼ 3� s, i.e., ~s ¼ 2 ifs ¼ 1, and vice versa.

We focus on the first relay set P1’s perspective to exam-ine the received SINR values according to each time slot.

Let us first denote LP1p1ðiÞ;i , ~Lp1ðiÞ;i þ

PKk¼1 h

ðrÞp1ðiÞ;p2ðkÞ

��� ���2 for

i 2 f1; . . . ; Kg. For the first hop, at time slot 2t� 1 (i.e., each

odd time slot), t 2 1; 2; . . . ; L�12

� �, the received sinr

ð1Þp1ðiÞ at

Rð1Þp1ðiÞ is lower-bounded by

sinrð1Þp1ðiÞ

�snr h

ð1Þp1ðiÞi

��� ���21þsnrPK

k¼1k 6¼i

hð1Þp1ðiÞk

��� ���2þ hð2Þkp1ðiÞ

��� ���2� �þsnrPK

k¼1 hðrÞp1ðiÞ;p2ðkÞ

��� ���2

¼snr h

ð1Þp1ðiÞi

��� ���21þ snr ~Lp1ðiÞ;i þ

PKk¼1 h

ðrÞp1ðiÞ;p2ðkÞ

��� ���2� �

¼snr h

ð1Þp1ðiÞi

��� ���21þ snrL

P1p1ðiÞ;i

�snr h

ð1Þp1ðiÞi

��� ���21þ snr

PKi¼1 L

P1p1ðiÞ;i

;

(6)

where ~Lp1ðiÞ;i indicates the schedulingmetric in (3) whenRp1ðiÞis assumed to serve the ith S-D pair (Si, Di). For the second

hop, at time slot 2t (i.e., each even time slot), t 2 1; 2; . . . ; L�12

� �,

the received sinrð2Þi;p1ðiÞ atDi is lower-bounded by

sinrð2Þi;p1ðiÞ �

snr hð2Þip1ðiÞ

��� ���21þ snr

PKi¼1

PKk¼1k6¼i

hð2Þip1ðkÞ

��� ���2

�snr h

ð2Þip1ðiÞ

��� ���21þ snr

PKi¼1

PKk¼1k6¼i

hð1Þp1ðiÞk

��� ���2þ hð2Þkp1ðiÞ

��� ���2� �

¼snr h

ð2Þip1ðiÞ

��� ���21þ snr

PKi¼1

~Lp1ðiÞ;i

�snr h

ð2Þip1ðiÞ

��� ���21þ snr

PKi¼1 L

P1p1ðiÞ;i

;

(7)

where the second inequality holds due to the channel reci-

procity. The termPK

i¼1 LP1p1ðiÞ;i in the denominator of (6) and

(7) needs to scale as snr�1, i.e.,PK

i¼1 LP1p1ðiÞ;i ¼ Oðsnr�1Þ, so

that both sinrð1Þp1ðkÞ and sinr

ð2Þk;p1ðkÞ scale as VðsnrÞ with increas-

ing SNR, which eventually enables to achieve the DoF of L�1L

per S-D pair from (5).7 Even if such a bounding technique in(6) and (7) leads to a loose lower bound on the SINR, it issufficient to prove our achievability result in terms of DoFand relay scaling law.

Now, let us turn to the second relay setP2. Similarly as in

(6), for the first hop, at time slot 2t, t 2 1; 2; . . . ; L�12

� �, the

received sinrð1Þp2ðiÞ atR

ð1Þp2ðiÞ is lower-bounded by

6. Note that at the first time slot for the relays fp1ðiÞgKi¼1, the third

term in the denominator of sinrð1Þp1ðiÞ (i.e., the inter-relay interference

term) becomes zero.

7. We use the following notation: i) fðxÞ ¼ OðgðxÞÞ means that thereexist constant C and c such that fðxÞ � CgðxÞ for all x > c.ii) fðxÞ ¼ VðgðxÞÞ if gðxÞ ¼ OðfðxÞÞ. iii) fðxÞ ¼ vðgðxÞÞ means that

limx!1gðxÞfðxÞ ¼ 0 [34].

2326 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 16, NO. 8, AUGUST 2017

Page 7: IEEE TRANSACTIONS ON MOBILE COMPUTING, …wicl.cnu.ac.kr › wordpress › DB › International_Journal › 2017_08...networks by applying an opportunistic two-hop relaying protocol

sinrð1Þp2ðiÞ �

snr hð1Þp2ðiÞi

��� ���21þ snr

PKi¼1 L

P2p2ðiÞ;i

; (8)

where LP2p2ðiÞ;i indicates the TIL in (4) whenRp2ðiÞ is assumed

to serve the ith S-D pair (Si, Di). For the second hop, at time

slot 2tþ 1, t 2 1; 2; . . . ; L�12

� �, the received sinr

ð2Þi;p2ðiÞ at Di can

also be lower-bounded by

sinrð2Þi;p2ðiÞ �

snr hð2Þip2ðiÞ

��� ���21þ snr

PKi¼1 L

P2p2ðiÞ;i

: (9)

The next step is thus to characterize the three metrics ~Li;k,

LP1i;k , and L

P2i;k (i 2 f1; . . . ; Ng and k 2 f1; . . . ; Kg) and their

cumulative density functions (CDFs) in the K �N �Kchannel with interfering relays, which is used to analyze thelower bound on the DoF and the required relay scaling lawin the model under consideration. Since it is obvious to

show that the CDF of LP1i;k is identical to that of LP2

i;k , we focus

only on the characterization of LP2i;k . The scheduling metric

~Li;k follows the chi-square distribution with 2ð2K � 2Þdegrees of freedom since it represents the sum of i.i.d.2K � 2 chi-square random variables with 2 degrees of free-

dom. Similarly, the TIL LP2i;k follows the chi-square distribu-

tion with 2ð3K � 2Þ degrees of freedom. The CDFs of the

two metrics ~Li;k and LP2i;k are given by

F ~L ‘ð Þ ¼ gð2K � 2; ‘=2ÞGð2K � 2Þ (10)

FL ‘ð Þ ¼ gð3K � 2; ‘=2ÞGð3K � 2Þ ; (11)

respectively, where GðzÞ ¼ R10 tz�1e�tdt is the Gamma func-

tion and gðz; xÞ ¼ R x0 tz�1e�tdt is the lower incomplete

Gamma function [35, eqn. (8.310.1)]. We start from the fol-lowing lemma.

Lemma 1. For any 0 < ‘ � 2, the CDFs of the random variables~Li;k and L

P2i;k in (10) and (11) are lower-bounded by

F ~L ‘ð Þ � C1‘2K�2 and FL ‘ð Þ � C2‘

3K�2, respectively, where

C1 ¼ e�12�ð2K�2Þ

Gð2K � 1Þ (12)

C2 ¼ e�12�ð3K�2Þ

Gð3K � 1Þ ; (13)

and GðzÞ is the Gamma function.

Proof. The detailed proof of this argument is omitted heresince it essentially follows the similar line to the proofof [9, Lemma 1] with a slight modification. tuIn the following theorem, we establish our first main

result by deriving the lower bound on the total DoF in theK �N �K channel with interfering relays.

Theorem 1. Suppose that the OND scheme with alternate relay-ing is used for the K �N �K channel with interfering relays.Then, for L data transmission time slots,

DoFtotal � ðL� 1ÞKL

is achievable if N ¼ v snr3K�2

.

Proof. From (5),(6), (7), (8), and (9), the OND schemeachieves DoFtotal � L�1

L K provided that the two values

snrPK

i¼1 LP1p1ðiÞ;i and snr

PKi¼1 L

P2p2ðiÞ;i are less than or equal

to some constant �0 > 0, independent of SNR, for all S-Dpairs. Then, a lower bound on the achievable DoFtotal isgiven by

DoFtotal � PONDðL� 1ÞK

L;

which indicates that L�1L K DoF is achievable for a frac-

tion POND of the time for actual transmission, where

POND

¼ limsnr!1Pr snr

XKi¼1

LP1p1ðiÞ;i � �0 and snr

XKi¼1

LP2p2ðiÞ;i � �0

( ):

(14)

We now examine the relay scaling condition such thatPOND converges to one with high probability. For the sim-plicity of the proof, suppose that the first and the secondrelay setsP1 andP2 are selected out of twomutually exclu-sive relaying candidate sets N 1 and N 2, respectively, i.e.,N 1;N 2 f1; . . . ; Ng, N 1 \ N 2 ¼ ;, N 1 [N 2 ¼ f1; . . . ;Ng, P1 N 1, and P2 N 2. Then, we are interested inhow jN 1j and jN 2j scale with SNR in order to guaranteethat POND tends to one, where jN sj denotes the cardinalityofN s for s ¼ 1; 2. From (14), we further have

POND ¼ limsnr!1

Pr snr

XKi¼1

LP1p1ðiÞ;i � �0

( )

� Pr snrXKi¼1

LP2p2ðiÞ;i � �0

( )!:

(15)

Let Bm , N 2 n fp2ð‘Þgm�1‘¼1 with fp2ð‘Þg0‘¼1 ¼ ; and

Bmj j be the candidate set associated with the second relayset and the mth S-D pair and its cardinality, respectively.For a constant �0 > 0, we can bound the second term in(15) as follows:

PrXKi¼1

LP2p2ðiÞ;i �

�0snr

( )

� Pr max1�i�KLP2p2ðiÞ;i �

�0Ksnr

n o�ðaÞ

1� Pr 9i : LP2p2ðiÞ;i �

�0Ksnr

n o

�ðbÞ

1�XKi¼1

Pr LP2p2ðiÞ;i �

�0Ksnr

n o

�ðcÞ

1�KPr minj2N 2LP2j;i � �0

Ksnr

n o�ðdÞ

1�K 1� FL�0

Ksnr

� �� � Bij j

�ðeÞ

1�K 1� C2�0

Ksnr

� �3K�2� � N 2j j�Kþ1

;

(16)

SHIN ETAL.: OPPORTUNISTIC NETWORK DECOUPLINGWITH VIRTUAL FULL-DUPLEXOPERATION IN MULTI-SOURCE INTERFERING... 2327

Page 8: IEEE TRANSACTIONS ON MOBILE COMPUTING, …wicl.cnu.ac.kr › wordpress › DB › International_Journal › 2017_08...networks by applying an opportunistic two-hop relaying protocol

where the inequality ðaÞ holds from the De Morgan’slaw; ðbÞ follows from the union bound; ðcÞ follows since

LP2p2ðiÞ;i ¼ minj2N 2

LP2j;i ; ðdÞ follows since L

P2j;i are the i.i.d.

random variables 8j 2 N 2 for a given i, owning to thefact that the channels are i.i.d. variables; and ðeÞ follows

from Lemma 1 with C2 ¼ e�12�ð3K�2ÞGð3K�1Þ since 0 < �0

snr � 2 as

snr ! 1 and from the fact that Bij j � N 2j j �K þ 1.We now pay our attention to the first term in (15),

which can be bounded by

PrXKi¼1

LP1p1ðiÞ;i �

�0snr

( )� Pr max1�i�KL

P1p1ðiÞ;i �

�0Ksnr

n o

¼ Pr LP1p1ðiÞ;i �

�0Ksnr

n o� �K;

(17)

where the equality follows from the fact that LP1p1ðiÞ;i and

LP1p1ðjÞ;j for i 6¼ j are the functions of different random var-

iables and thus are independent of each other. By letting

Ki ¼PK

k¼1 hðrÞp1ðiÞ;p2ðkÞ

��� ���2, by the definition of LP1p1ðiÞ;i, we

have

Pr LP1p1ðiÞ;i �

�0Ksnr

n o¼ 1� Pr ~Lp1ðiÞ;i þKi � �0

Ksnr

n o� 1� Pr ~Lp1ðiÞ;i �

�02Ksnr

n o� Pr Ki � �0

2Ksnr

n o;

(18)

where the inequality follows from the fact that for anyrandom variables X and Y , Pr X þ Y � �f g � Pr

X � �2

� �þ Pr Y � �2

� �[38]. In the same manner, let

Am , N 1 n fp1ð‘Þgm�1‘¼1 with fp1ð‘Þgm�1

‘¼1 ¼ ; and Amj j bethe candidate set associated with the first relay set andthe mth S-D pair and its cardinality, respectively. Then,we can bound the first two terms in the RHS of (18) asfollows:

1� Pr ~Lp1ðiÞ;i ��0

2K snr

n o¼ 1� Pr minj2N 1

~Lj;i � �02K snr

n o¼ 1� 1�F ~L

�02K snr

� �� � Aij j

� 1� 1� C1�0

2K snr

� �2K�2� � N 1j j�Kþ1

;

(19)

where the last inequality follows from Lemma 1 with

C1 ¼ e�12�ð2K�2ÞGð2K�1Þ . Finally, from (16), it follows that

Pr Ki � �02Ksnr

� �tends to zero as N 2j j grows large by not-

ing that LP2p2ðiÞ;i ¼ ~Lp2ðiÞ;i þKi due to the reciprocal prop-

erty of TDD systems. From (16), (18), and (19), it is

obvious that if N 1j j and N 2j j scale faster than snr2K�2

and snr3K�2, respectively, then

limsnr!1 1� C1

�02Ksnr

� �2K�2� � N 1j j�Kþ1

¼ 0 (20)

limsnr!1 1� C2

�0Ksnr

� �3K�2� � N 2j j�Kþ1

¼ 0: (21)

Therefore, POND asymptotically approaches one,

which means that the DoF of ðL�1ÞKL is achievable with

high probability if N ¼ N 1j j þ N 2j j ¼ v snr3K�2

. This

completes the proof of the theorem. tuNote that the lower bound on the DoF asymptotically

approaches K for large L, which implies that our systemoperates in virtual full-duplex mode. The parameter Nrequired to obtain full DoF (i.e., K DoF) needs to increaseexponentially with the number of S-D pairs, K, in order tomake the sum of 3K � 2 interference terms in the TIL metric(4) non-increase with increasing SNR at each relay.8 Here,from the perspective of each relay in P2, the SNR exponent3K � 2 indicates the total number of interference links andstems from the following three factors: the sum of interfer-ence power received from other sources, the sum of interfer-ence power generated to other destinations, and the sum ofinter-relay interference power generated from the relays inP1. From Theorem 1, let us provide the following interest-ing discussions regarding the DoF achievability.

Remark 3. K DoF can be achieved by using the proposedOND scheme in the K �N �K channel with interferinglinks among relay nodes, if the number of relay nodes, N ,

scales faster than snr3K�2 and the number of transmissionslots in one block, L, is sufficiently large. In this case, allthe interference signals are almost nulled out at eachselected relay by exploiting the multiuser diversity gain.In other words, by applying the OND scheme to the inter-ference-limited K �N �K channel such that the channellinks are inherently coupled with each other, the linksamong each S-D path via one relay can be completelydecoupled, thus enabling us to achieve the same DoF asin the interference-free channel case.

Remark 4. It is not difficult to show that the centralizedrelay selection method that maximizes the received SINR(at either the relay or the destination) using global CSI atthe transmitter, which is a combinatorial problem withexponential complexity, gives the same relay scalingresult N ¼ v snr3K�2

along with full DoF. However,

even with our OND scheme using a decentralized relayselection based only on local CSI, the same achievabilityresult is obtained, thus resulting in a much easierimplementation.

3.3 The TIL Decaying Rate

In this section, we analyze the TIL decaying rate under theOND scheme with alternate relaying, which is meaningfulsince the desired relay scaling law is closely related to theTIL decaying rate with respect to N for given SNR.

Let LKth�min denote the Kth smallest TIL among the onesthat N selected relay nodes compute. Since the K relaysyielding the TIL values up to the Kth smallest one areselected, the Kth smallest TIL is the largest among the TILs

8. Since snr2K�2 scales slower than snr3K�2, it does not affect the per-formance in terms of DoF and relay scaling laws.

2328 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 16, NO. 8, AUGUST 2017

Page 9: IEEE TRANSACTIONS ON MOBILE COMPUTING, …wicl.cnu.ac.kr › wordpress › DB › International_Journal › 2017_08...networks by applying an opportunistic two-hop relaying protocol

that the selected relays compute. Similarly as in [36], byMarkov’s inequality, a lower bound on the average decay-

ing rate of LKth�min with respect to N , E 1LKth�min

h i, is given

by

E1

LKth�min

� �� 1

�PrðLKth�min � �Þ; (22)

where the inequality always holds for � > 0. We denotePKð�Þ as the probability that there are only K relays satisfy-ing TIL � �, which is expressed as

PKð�Þ ¼ N

K

� �FLð�ÞKð1� FLð�ÞÞN�K; (23)

where FLð�Þ is the CDF of the TIL. Since PrðLKth�min � �Þ islower-bounded by PrðLKth�min � �Þ � PKð�Þ, a lower boundon the average TIL decaying rate is given by

E1

LKth�min

� �� 1

�PKð�Þ: (24)

The next step is to find the parameter �̂ that maximizesPKð�Þ in terms of � in order to provide the tightest lowerbound.

Lemma 2. When a constant �̂ satisfies the conditionFLð�̂Þ ¼ K=N , PKð�̂Þ in (23) is maximized for a givenN .

Proof. To find the parameter �̂ that maximizes PKð�Þ, wetake the first derivative with respect to �, resulting in

@PKð�Þ@�

¼ @F T ð�Þ@�

N

K

� �F T ð�ÞK�1 1�F T ð�Þð ÞN�K�1 K �NF T ð�Þð Þ;

which is zero when

�̂ ¼ F�1T

K

N

� �: (25)

The parameter �̂ is the unique value that maximizesPKð�Þ since

@PKð�Þ@�

�����

> 0 if 0 < � < �̂

@PKð�Þ@�

�����

> 0 if � � �̂;

which completes the proof of the lemma. tuNow, we establish our second main theorem, which

shows a lower bound on the TIL decaying rate with respectto N .

Theorem 2. Suppose that the OND scheme with alternate relay-ing is used for the K �N �K channel with interfering relays.Then, the decaying rate of TIL is lower-bounded by

E1

LKth�min

� �� Q N

13K�2

� �: (26)

Proof. As shown in (24), the TIL decaying rate is lower-bounded by the maximum of 1

�PKð�Þ over �. By Lemma 2,

Pð�̂Þ is maximized when �̂ ¼ F�1L

KN

. Thus, we have

E1

LKth�min

� �� 1

F�1L ðK=NÞ

N

K

� �K

N

� �K

1�K

N

� �N�K

� 1

F�1L ðK=NÞ

N �K þ 1

N

� �K

1�K

N

� �N�K

� 1

F�1L ðK=NÞ

1

K

� �K

e�K

� Q N1

3K�2

� �;

where the second and third inequalities hold sinceNK

� N�Kþ1K

Kand 1� K

N

N�K� 1� KN

N� e�K ,

respectively. By Lemma 1, it follows that 1F�1L

ðK=NÞ �C1NK

� � 13K�2

, where C1 is given by (12). Hence, the last

inequality also holds, which completes the proof of thetheorem. tuFrom Theorem 2, the following valuable insight is pro-

vided: the smaller SNR exponent of the relay scaling law,the faster TIL decaying rate with respect to N . This asymp-totic result will be verified in a finite N regime via numeri-cal evaluation in Section 5.

3.4 OND Without Alternate Relaying

For comparison, the OND scheme without alternate relay-ing is also explained in this section.

It is worth noting that there exists a trade-off between thelower bound on the DoF and the minimum number ofrelays required to guarantee our achievability result byadditionally introducing the OND protocol without alter-nate relaying. In the scheme, the first relay set P1 only par-ticipates in data forwarding. That is, the second relay set P2

does not need to be selected for the OND protocol withoutalternate relaying. Specifically, the steps of each node dur-ing one block are then described as follows:

� Time slot 1: Sources S1; . . . ;SK transmit their first

encoded symbols xð1Þ1 ð1Þ; . . . ; xð1Þ

K ð1Þ, where xð1Þk ðlÞ

represents the lth transmitted symbol of the kthsource node. A set of K selected relay nodes,P1 ¼ fp1ð1Þ; . . . ;p1ðKÞg, operating in receive mode

at each odd time slot, listens to xð1Þ1 ð1Þ; . . . ; xð1Þ

K ð1Þ.Other N �K relay nodes and destinations D1; . . . ;DK remain idle.

� Time slot 2: The K relays in the set P1 forward their

first re-encoded symbols xð2Þp1ð1Þð1Þ; . . . ; x

ð2Þp1ðKÞð1Þ to

the corresponding K destinations. The K destina-tions receive from Rp1ð1Þ; . . . ;Rp1ðKÞ and decode

xð2Þp1ð1Þð1Þ; . . . ; x

ð2Þp1ðKÞð1Þ. The remaining N �K relays

keep idle.� The processes in time slots 1 and 2 are repeated to

the ðL� 1Þth time slot.� Time slot L: The K relays in P1 forward their re-

encoded symbols xð2Þp1ð1ÞðL� 1Þ; . . . ;xð2Þ

p1ðKÞðL� 1Þ to

SHIN ETAL.: OPPORTUNISTIC NETWORK DECOUPLINGWITH VIRTUAL FULL-DUPLEXOPERATION IN MULTI-SOURCE INTERFERING... 2329

Page 10: IEEE TRANSACTIONS ON MOBILE COMPUTING, …wicl.cnu.ac.kr › wordpress › DB › International_Journal › 2017_08...networks by applying an opportunistic two-hop relaying protocol

the corresponding K destinations. The K sourcesand the other N �K relays remain idle.

When Ri is assumed to serve the kth S-D pair ðSk;DkÞ(i 2 f1; . . . ; Ng and k 2 f1; . . . ; Kg), it computes the schedul-

ing metric ~Li;k in (3). According to the computed ~Li;k, atimer based method is used for relay selection as in Section3.1.1. Because there is no inter-relay interference for theOND scheme without alternate relaying, it is expected thatthe minimum required N to achieve the optimal DoF is sig-nificantly reduced. Our third main theorem is established asfollows.

Theorem 3. Suppose that the OND scheme without alternaterelaying is used for the K �N �K channel. Then, for L datatransmission time slots,

DoFtotal � K

2

is achievable if N ¼ v snr2K�2

.

Proof. The detailed proof of this argument is omitted heresince it basically follows the same line as the proof ofTheorem 1. tuIn Section 5, it will be also seen that in a finite N regime,

there exists the case even where the OND without alternaterelaying outperforms that of the OND with alternate relay-ing in terms of achievable sum-rates via computersimulations.

4 UPPER BOUND FOR DOF

In this section, to show the optimality of the proposed ONDscheme in the K �N �K channel with interfering relays,which consists of K S-D pairs and N relay nodes, we derivean upper bound on the DoF using the cut-set bound [37] asa counterpart of the lower bound on the total DoF in Section

3.2. Suppose that ~N relay nodes are active, i.e., receive pack-ets and retransmit their re-encoded ones, simultaneously,

where ~N 2 f1; . . . ; Ng. This is a generalized version of ourtransmission since it is not characterized how many relaysneed to be activated simultaneously to obtain the optimalDoF. We consider the two cuts L1 and L2 dividing our net-work into two parts in a different manner. Let SLi

and DLi

denote the sets of sources and destinations, respectively, forthe cut Li in the network (i ¼ 1; 2). For theK �N �K chan-nel model with interfering relays, we now use the fact thatthere is no direct path between an S-D pair. Then, it followsthat under L1, K transmit nodes in SL1

are on the left of the

network, while ~N active relay nodes and K (final) destina-tion nodes in DL2

are on the right and act as receivers. In

this case, we can create the K � ð ~N þKÞ multiple-inputmultiple-output channel between the two sets of nodes sep-

arated by the cut. Similarly, the ð ~N þKÞ �K MIMO chan-nel are obtained under the cut L2. It is obvious to show thatDoF for the two MIMO channels is upper-bounded by K.Hence, it turns out that even with the half-duplex assump-tion, our lower bound on the DoF based on the OND withalternate relaying asymptotically approaches this upperbound on the DoF for large L.

Note that this upper bound is generally derived regard-less of whether the number of relays, N , tends to infinity or

not, whereas the scaling condition N ¼ v snr3K�2

is

included in the achievability proof.

5 NUMERICAL EVALUATION

In this section, we perform computer simulations to validatethe achivability result of the proposed OND scheme in Sec-tion 3 for finite parameters N and SNR in the K �N �Kchannel model with interfering relays. In our simulation,

the channel coefficients in (1) and (2) are generated 1� 105

times for each system parameter.Fig. 2 shows the achievable sum-rates of the K �N �K

channel for the OND schemes with and without alternaterelaying according to snr in dB scale when K ¼ 2. Note thatN is set to a different scalable value according to snr, i.e.,

N ¼ snr3K�2 for the OND with alternate relaying and

N ¼ snr2K�2 for the OND without alternate relaying,respectively, to see whether the slope of each curve followsthe DoF in Theorems 1 and 2. In the figure, the dotted greenlines are also plotted to indicate the first order approxima-tion of the achievable rates with a proper bias, where theslopes are given by K and K=2 for the OND schemes withand without alternate relaying, respectively.

In Fig. 3, the log-log plot of the average TIL of the ONDwith alternate relaying versus N is shown for theK �N �K channel when K ¼ 2; 3.9 It can be seen that theTIL tends to decrease linearly with N . It is further seen howmany relays are required with the OND scheme with alter-nate relaying to guarantee that the TIL is less than a smallconstant for a given parameter K. In this figure, the dashedlines are also plotted from theoretical results in Theorem 2with a proper bias to check the slope of the TIL. We can seethat the TIL decaying rates are consistent with the relay scal-ing law condition in Theorem 1. More specifically, the TIL is

Fig. 2. The achievable sum-rates as a function of snr when K ¼ 2 andN ¼ snr4 in the K �N �K channel. It is assumed that N ¼ snr4 andN ¼ snr2 are used for the OND schemes with and without alternaterelaying, respectively.

9. Even if it seems unrealistic to have a great number of relays incooperative relay networks, the range for parameter N is taken intoaccount to precisely see some trends of curves varying withN .

2330 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 16, NO. 8, AUGUST 2017

Page 11: IEEE TRANSACTIONS ON MOBILE COMPUTING, …wicl.cnu.ac.kr › wordpress › DB › International_Journal › 2017_08...networks by applying an opportunistic two-hop relaying protocol

reduced as N increases with the slope of 0.25 for K ¼ 2 and0.143 forK ¼ 3, respectively.

Fig. 4 illustrates the achievable sum-rates of theK �N �K channel for the OND schemes with and withoutalternate relaying versus snr (in dB scale) when K ¼ 2 andN ¼ 50; 100; 200. We can see that in a finite N regime, thereexists the case where the OND without alternate relayingoutperforms that of the OND with alternate relaying. This isbecause for finite N , the achievable sum-rates for the alter-nate relaying case tend to approach a floor with increasingSNR faster than no alternate relaying case due to moreresidual interference in each dimension. We can also seethat the crossing points slightly move to the right as Nincreases; this is due to the fact that our OND scheme withalternate relaying always benefits from having more relaysfor selection, thus resulting in more multiuser diversitygain. This highly motivates us to operate our system in aswitched fashion when the relay selection scheme is chosen

between the OND schemes with and without alternaterelaying depending on the operating regime of our system.

To further ascertain the efficacy of our scheme, a perfor-mance comparison is performed with a baseline scheduling.Specifically, in the max-min SNR scheme, each S-D pairselects one relay Ri (i 2 f1; . . . ; Ng) such that the minimumout of the desired channel gains of two communication links(either from Sk to Ri or from Ri to Dk) becomes the maxi-mum among the associated minimum channel gains overall the unselected relays. This max-min SNR scheme is well-suited for relay-aided systems if interfering links are absent.The achievable sum-rates are illustrated in Fig. 5 accordingto snr (in dB scale) when K ¼ 2 and N ¼ 100; 200. We cansee that our OND scheme with alternate relaying outper-forms this baseline scheme beyond a certain low SNR point.We also see that the rate gaps increase when N increases inthe high SNR regime. On the other hand, for fixed N , thesum-rates of the max-min scheme are slightly changed withrespect to snr due to more residual interference in eachdimension.

6 CONCLUDING REMARKS

An efficient distributed OND protocol operating in virtualfull-duplex mode was proposed for the K �N �K channelwith interfering relays, referred to as one of multi-sourceinterfering relay networks. A novel relay scheduling strat-egy with alternate half-duplex relaying was presented intwo-hop environments, where a subset of relays is opportu-nistically selected in terms of producing the minimum totalinterference level, thereby resulting in network decoupling.It was shown that the OND protocol asymptoticallyachieves full DoF even in the presence of inter-relay inter-ference and half-duplex assumption, provided that the

number of relays, N , scales faster than snr3K�2. Numericalevaluation was also shown to verify that our scheme outper-forms the other relay selection methods under realistic net-work conditions (e.g., finite N and SNR) with respect tosum-rates.

Fig. 3. The average TIL versus N when K ¼ 2; 3 in the K �N �Kchannel.

Fig. 4. The achievable sum-rates versus snr when K ¼ 2 andN ¼ 100; 200 in the K �N �K channel. Both OND schemes with andwithout alternate relaying are compared.

Fig. 5. The achievable sum-rates versus snr when K ¼ 2 andN ¼ 100; 200 in the K �N �K channel. The OND scheme with alter-nate relaying and the max-min SNR scheme are compared.

SHIN ETAL.: OPPORTUNISTIC NETWORK DECOUPLINGWITH VIRTUAL FULL-DUPLEXOPERATION IN MULTI-SOURCE INTERFERING... 2331

Page 12: IEEE TRANSACTIONS ON MOBILE COMPUTING, …wicl.cnu.ac.kr › wordpress › DB › International_Journal › 2017_08...networks by applying an opportunistic two-hop relaying protocol

Suggestions for future research in this area include theextension to the MIMOK �N �K channel and the optimaldesign of joint beamforming and scheduling under theMIMOmodel.

ACKNOWLEDGMENTS

This work was supported by the Basic Science ResearchProgram through the National Research Foundation ofKorea (NRF) funded by the Ministry of Education(2014R1A1A2054577) and by the Ministry of Science, ICT &Future Planning (MSIP) (2015R1A2A1A15054248). Thematerial in this paper was presented in part at the IEEEInternational Conference on Communications, Sydney,Australia, June 2014 [39]. Hyun Jong Yang is the corre-sponding author. This research was conducted whileV.V. Mai was with Dankook University, Yongin 448-701,Republic of Korea.

REFERENCES

[1] M. A. Maddah-Ali, A. S. Motahari, and A. K. Khandani,“Communication over MIMO X channels: Interference alignment,decomposition, and performance analysis,” IEEE Trans. Inf. The-ory, vol. 54, no. 8, pp. 3457–3470, Aug. 2008.

[2] V. R. Cadambe and S. A. Jafar, “Interference alignment anddegrees of freedom of the K-user interference channel,” IEEETrans. Inf. Theory, vol. 54, no. 8, pp. 3425–3441, Aug. 2008.

[3] K. Gomadam, V. R. Cadambe, and S. A. Jafar, “A distributednumerical approach to interference alignment and applications towireless interference networks,” IEEE Trans. Inf. Theory, vol. 57,no. 6, pp. 3309–3322, Jun. 2011.

[4] T. Gou and S. A. Jafar, “Degrees of freedom of the K-user M �NMIMO interference channel,” IEEE Trans. Inf. Theory, vol. 56,no. 12, pp. 6040–6057, Dec. 2010.

[5] S. A. Jafar and S. Shamai(Shitz), “Degrees of freedom region of theMIMO X channel,” IEEE Trans. Inf. Theory, vol. 54, no. 1, pp. 151–170, Jan. 2008.

[6] C. Suh and D. Tse, “Interference alignment for celluar networks,”in Proc. 46th Annu. Allerton Conf. Commun. Control Comput.,Sep. 2008, pp. 1037–1044.

[7] A. S.Motahari, O. Gharan,M.-A.Maddah-Ali, andA. K. Khandani,“Real interference alignment: Exploiting the potential of singleantenna systems,” IEEE Trans. Inf. Theory, vol. 60, no. 8, pp. 4799–4810, Aug. 2014.

[8] B. C. Jung and W.-Y. Shin, “Opportunistic interference alignmentfor interference-limited cellular TDD uplink,” IEEE Commun. Lett.,vol. 15, no. 2, pp. 148–150, Feb. 2011.

[9] B. C. Jung, D. Park, and W.-Y. Shin, “Opportunistic interferencemitigation achieves optimal degrees-of-freedom in wireless multi-cell uplink networks,” IEEE Trans. Commun., vol. 60, no. 7,pp. 1935–1944, Jul. 2012.

[10] T. Gou, S. A. Jafar, C. Wang, S.-W. Jeon, and S.-Y. Chung,“Aligned interference neutralization and the degrees of freedomof the 2� 2� 2 interference channel,” IEEE Trans. Inf. Theory,vol. 58, no. 7, pp. 4381–4395, Jul. 2012.

[11] B. Rankov and A. Wittneben, “Spectral efficient protocols for half-duplex fading relay channels,” IEEE J. Sel. Areas Commun., vol. 25,no. 2, pp. 379–389, Feb. 2007.

[12] I. Shomorony and A. S. Avestimehr, “Degrees of freedom of two-hop wireless networks: “Everyone gets the entire cake”,” in Proc.50th Annu. Allerton Conf. Commun. Control Comput., Oct. 2012,pp. 1935–1942.

[13] T. Gou, C. Wang, and S. A. Jafar, “Aligned interference neutraliza-tion and the degrees of freedom of the 2� 2� 2 interference chan-nel with interfering relays,” in Proc. 49th Annu. Allerton Conf.Commun. Control Comput., Sep. 2011, pp. 1041–1047.

[14] T. Gou, C. Wang, and S. A. Jafar, “Degrees of freedom of a class ofnon-layered two unicast wireless networks,” in Proc. 45th AsilomarConf. Signals Syst. Comput., Nov. 2011, pp. 1707–1711.

[15] R. Knopp and P. Humblet, “Information capacity and power con-trol in single cell multiuser communications,” in Proc. IEEE Int.Conf. Commun., Jun. 1995, pp. 331–335.

[16] P. Viswanath, D. N. C. Tse, and R. Laroia, “Opportunistic beam-forming using dumb antennas,” IEEE Trans. Inf. Theory, vol. 48,no. 6, pp. 1277–1294, Aug. 2002.

[17] M. Sharif and B. Hassibi, “On the capacity of MIMO broadcastchannels with partial side information,” IEEE Trans. Inf. Theory,vol. 51, no. 2, pp. 506–522, Feb. 2005.

[18] H. J. Yang, W.-Y. Shin, B. C. Jung, and A. Paulraj, “Opportunisticinterference alignment for MIMO interfering multiple accesschannels,” IEEE Trans. Wireless Commun., vol. 12, no. 5, pp. 2180–2192, May 2013.

[19] H. J. Yang, B. C. Jung, W.-Y. Shin, and A. Paulraj, “Codebook-based opportunistic interference alignment,” IEEE Trans. SignalProcess., vol. 62, no. 11, pp. 2922–2937, Jun. 2014.

[20] H. J. Yang, W.-Y. Shin, B. C. Jung, C. Suh, and A. Paulraj,“Opportunistic downlink interference alignment,” in Proc. IEEEInt. Symp. Inf. Theory, Jun./Jul. 2014, pp. 1588–1592.

[21] S. Cui, A. M. Haimovich, O. Somekh, and H. V. Poor,“Opportunistic relaying in wireless networks,” IEEE Trans. Inf.Theory, vol. 55, no. 11, pp. 5121–5137, Nov. 2009.

[22] W.-Y. Shin, S.-Y. Chung, and Y. H. Lee, “Parallel opportunisticrouting in wireless networks,” IEEE Trans. Inf. Theory, vol. 59,no. 10, pp. 6290–6300, Oct. 2013.

[23] H. J. Yang, W.-Y. Shin, and B. C. Jung, “On the degrees of freedomof the large-scale interfering two-way relay network,” IEEE Trans.Veh. Technol., vol. 65, no. 11, pp. 9442–9450, Nov. 2016.

[24] C. Shen and M. P. Fitz, “Opportunistic spatial orthogonalizationand its application to fading cognitive radio networks,” IEEE J.Sel. Topics Signal Process., vol. 5, no. 1, pp. 182–189, Feb. 2011.

[25] T. W. Ban, W. Choi, B. C. Jung, and D. K. Sung, “Multi-user diver-sity in a spectrum sharing system,” IEEE Trans. Wireless Commun.,vol. 8, no. 1, pp. 102–106, Jan. 2009.

[26] B. Nazer, M. Gastpar, S. A. Jafar, and P. Viswanath, “Ergodicinterference alignment,” in Proc. IEEE Int. Symp. Inf. Theory, Jun./Jul. 2009, pp. 1769–1773.

[27] S.-W. Jeon and S.-Y. Chung, “Capacity of a class of linear binaryfield multisource relay networks,” IEEE Trans. Inf. Theory, vol. 59,no. 10, pp. 6405–6420, Oct. 2013.

[28] R. Zhang and Y. C. Liang, “Exploiting multi-antennas for oppor-tunistic spectrum sharing in cognitive radio networks,” IEEE J.Sel. Topics Signal Process., vol. 2, no. 1, pp. 88–102, Feb. 2008.

[29] Y. Fan, C. Wang, J. Thompson, and H. V. Poor, “Recovering multi-plexing loss through successive relaying using repetition coding,”IEEE Trans. Wireless Commun., vol. 6, no. 12, pp. 4484–4493, Dec.2007.

[30] F. Xue and S. Sandhu, “Cooperation in a half-duplex Gaussiandiamond relay channel,” IEEE Trans. Inf. Theory, vol. 53, no. 10,pp. 3806–3814, Oct. 2007.

[31] R. Zhang, “Characterizing achievable rates for two-path digitalrelaying,” in Proc. IEEE Int. Conf. Commun., May 2008, pp. 1113–1117.

[32] A. Bletsas, A. Khisti, D. P. Reed, and A. Lippman, “A simple coop-erative diversity method based on network path selection,” IEEEJ. Sel. Areas Commun., vol. 24, no. 3, pp. 659–672, Mar. 2006.

[33] A. Bletsas, H. Shin, and M. Z. Win, “Cooperative communicationswith outage-optimal opportunistic relaying,” IEEE Trans. WirelessCommun., vol. 6, no. 9, pp. 3450–3460, Sep. 2007.

[34] D. E. Knuth, “Big Omicron and big Omega and big Theta,” ACMSIGACT News, vol. 8, pp. 18–24, Apr.–Jun. 1976.

[35] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, andProducts, 6th ed. San Diego, CA, USA: Academic, 2000.

[36] J. Jose, S. Subramanian, X. Wu, and J. Li, “Opportunistic interfer-ence alignment in cellular downlink,” in Proc. 50th Annu. AllertonConf. Commun. Control Comput., Oct. 2012, pp. 1529–1534.

[37] T. M. Cover and J. A. Thomas, Elements of Information Theory, NewYork, NY, USA: Wiley, 1991.

[38] Z. Lin and Z. Bai, Probability Inequalities, New York, NY, USA:Springer, 2011.

[39] W.-Y. Shin, H. J. Yang, and B. C. Jung, “Opportunistic networkdecoupling in multi-source interfering relay networks,” in Proc.IEEE Conf. Commun., Jun. 2014, pp. 2671–2676.

2332 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 16, NO. 8, AUGUST 2017

Page 13: IEEE TRANSACTIONS ON MOBILE COMPUTING, …wicl.cnu.ac.kr › wordpress › DB › International_Journal › 2017_08...networks by applying an opportunistic two-hop relaying protocol

Won-Yong Shin (S’02-M’08-SM’16) received theBS degree in electrical engineering from YonseiUniversity, Seoul, Korea, in 2002, and the MSand PhD degrees in electrical engineering andcomputer science from the Korea Advanced Insti-tute of Science and Technology (KAIST), Dae-jeon, Korea, in 2004 and 2008, respectively. FromFebruary 2008 to April 2008, he was a visitingscholar in the School of Engineering and AppliedSciences, Harvard University, Cambridge, Mas-sachusetts. From September 2008 to April 2009,

he was in the Brain Korea Institute and CHiPS, KAIST, as a postdoctoralfellow. From August 2008 to April 2009, he was with Lumicomm Inc.,Daejeon, Korea, as a visiting researcher. In May 2009, he joined HarvardUniversity as a postdoctoral fellow and was promoted to a researchassociate in October 2011. Since March 2012, he has been in theDepartment of Computer Science and Engineering, Dankook University,Yongin, Korea, where he is currently an assistant professor (early ten-ured). His research interests include the areas of information theory,communications, signal processing, mobile computing, big data analyt-ics, and online social networks analysis. He has served as an associateeditor of the IEICE Transactions on Fundamentals of Electronics, Com-munications, Computer Sciences, the IEIE Transactions on Smart Proc-essing & Computing, and the Journal of Korea Information andCommunications Society. He also served as an organizing committeemember of the 2015 IEEE Information Theory Workshop. He receivedthe Bronze Prize of Samsung Humantech Paper Contest (2008) and theKICS Haedong Young Scholar Award (2016). He is a senior member ofthe IEEE.

Vien V. Mai received the BE degree in electronicand telecommunication from the Posts & Tele-communications Institute of Technology, Ho ChiMinh, Viet Nam, in 2013, and the MS degree inelectronics and radio engineering from KyungHee University, Yongin, Korea, in 2015. He is cur-rently working toward the PhD degree at the KTHRoyal Institute of Technology, Stockholm, Swe-den. From September 2015 to July 2016, he wasin the Communications and Networking Labora-tory, Dankook University, Yongin, Korea, as a

researcher. Since August 2016, he has been with the KTH Royal Instituteof Technology, Stockholm, Sweden. His research interests include wire-less communication, information theory, massive MIMO, distributeddetection and estimation, and energy harvesting.

Bang Chul Jung (S’02-M’08-SM’14) received theBS degree in electronics engineering from AjouUniversity, Suwon, Korea, in 2002, and the MSand PhD degrees in electrical & computer engi-neering from KAIST, Daejeon, Korea, in 2004 and2008, respectively. He was a senior researcher/research professor with the KAIST Institute forInformation Technology Convergence, Daejeon,Korea, from January 2009 to February 2010.From March 2010 to August 2015, he was a fac-ulty of Gyeongsang National University, Ton-

gyeong, Korea. He is currently an associate professor in the Departmentof Electronics Engineering, Chungnam National University, Daejeon,Korea. His research interests include 5Gmobile communication systems,statistical signal processing, opportunistic communications, compressedsensing, interference management, interference alignment, randomaccess, relaying techniques, device-to-device networks, in-network com-putation, and network coding. He received the 5th IEEE CommunicationSociety Asia-Pacific Outstanding Young Researcher Award in 2011. Healso received the Bronze Prize of Intel Student Paper Contest in 2005, theFirst Prize of KAIST’s Invention Idea Contest in 2008, the Bronze Prize ofSamsung Humantech Paper Contest in 2009, the Outstanding ResearchAward of Institute of Marine Industry in Gyeongsang National Universityin 2013, the Gaechuck Award for Excellence in Teaching of GyeongsangNational University in 2014, and the Outstanding Paper Award in SpringConference of the Korea Institute of Information and CommunicationEngineering in 2015. He is a senior member of the IEEE.

Hyun Jong Yang (M’12) received the BS degreein electrical engineering from the KoreaAdvanced Institute of Science and Technology(KAIST), Daejeon, Korea, in 2004, and the MSand PhD degrees in electrical engineering fromKAIST, in 2006 and 2010, respectively. From Aug.2010 to Aug. 2011, he was a research fellow withthe Korea Institute Ocean Science Technology,Daejeon, Korea. From Oct. 2011 to Oct. 2012, heworked as a post-doctoral researcher in the Elec-trical Engineering Department, Stanford Univer-

sity, Stanford, California. From Oct. 2012 to Aug. 2013, he was a Staff IIsystems design engineer with Broadcom Corporation, Sunnyvale, Cali-fornia, where he developed physical-layer algorithms for LTE-A MIMOreceivers. In addition, he was a delegate of Broadcom in 3GPP standardmeetings for RAN1 Rel-12 technologies. Since Aug. 2013, he has beenan assistant professor in the School of Electrical and Computer Engi-neering, UNIST, Ulsan, Korea. His fields of interests include algorithmsand theory for wireless communication and their applications and imple-mentation. He is a member of the IEEE.

" For more information on this or any other computing topic,please visit our Digital Library at www.computer.org/publications/dlib.

SHIN ETAL.: OPPORTUNISTIC NETWORK DECOUPLINGWITH VIRTUAL FULL-DUPLEXOPERATION IN MULTI-SOURCE INTERFERING... 2333