Role of a Relay in Bursty Multiple Access Channels
Abstract
We investigate the role of a relay in multiple access channels (MACs) with bursty user traffic, where intermittent data traffic restricts the users to bursty transmissions. As our main result, we characterize the degrees of freedom (DoF) region of a user bursty multiinput multioutput (MIMO) Gaussian MAC with a relay, where Bernoulli random states are introduced to govern bursty user transmissions. To that end, we extend the noisy network coding scheme to achieve the cutset bound. Our main contribution is in exploring the role of a relay from various perspectives. First, we show that a relay can provide a DoF gain in bursty channels, unlike in conventional nonbursty channels. Interestingly, we find that the relaying gain can scale with additional antennas at the relay to some extent. Moreover, observing that a relay can help achieve collisionfree performances, we establish the necessary and sufficient condition for attaining collisionfree DoF. Lastly, we consider scenarios in which some physical perturbation shared around the users may generate data traffic simultaneously, causing transmission patterns across them to be correlated. We demonstrate that for most cases in such scenarios, the relaying gain is greater when the users’ transmission patterns are more correlated, hence when more severe collisions take place. Our results have practical implications in various scenarios of wireless networks such as devicetodevice systems and random media access control protocols.
I Introduction
Relays have been considered unable to provide degreesoffreedom (DoF) gains in standard informationtheoretic channels in which transmitters are assumed to send signals at all times [1]. From these results, it may seem reasonable to think of relays as not playing much of a role in improving the performance of most channels. The purpose of this work is to show that it is yet premature to conclude so. In practice, transmitters in most wireless networks do not send signals all the time, unlike in the standard informationtheoretic models. Rather, they exhibit bursty natures. Intermittent data traffic makes the availability of data for transmission limited at transmitters, as opposed to the conventional assumption in the standard models. This leads to bursty signal transmissions. Investigating such practical networks, which we call bursty networks hereby, a recent study has found that a relay can offer a DoF gain in bursty interference channels (ICs) and also help achieving interferencefree DoF performances [2]. Likewise, subsequently in this work, we demonstrate that a relay in bursty multiple access channels (MACs) can also provide much benefits playing interesting roles.
Ia Example and Key Idea
Let us first study a simple example to see how employing a relay can be beneficial in bursty MACs.
Example 1
Consider a twouser singleantenna setting in which each transmitter becomes active independently with probability . Fig. 1 illustrates how the presence of a relay can help resolving a collision that occurs when both transmitters are active at the same time:

Time 1: Both transmitters are active. The receiver gets a linear sum of two symbols. It cannot decode any of them. Meanwhile, the relay gets another linear sum of the symbols.

Time 2: Both transmitters are inactive. The relay forwards its past received linear sum. With the two linear sums, the receiver now can decode the two symbols, resolving the past collision.
We see one simple idea at play: The relay can exploit idle moments of the transmitters. It receives symbols that can be useful for the receiver while both transmitters are active, and forwards the symbols to the receiver while they are inactive. This helps resolving collisions. One can verify that the scheme achieves the sum DoF of extending the idea, and also prove its optimality using the cutset bound. Fig. 2 compares the sum DoF with a relay and that without a relay. We can observe a DoF gain at all levels of bursty data traffic (). More interestingly, we can see that both transmitters achieve the individual DoF of , which is in effect a collisionfree DoF performance in low data traffic regimes (). This result in the twouser singleantenna setting makes us wonder what potential benefits a relay will be able to offer in more general settings: With more users involved, how will the gains from the assistance of a relay vary? With additional antennas installed at the relay, will the gains also increase? In this work, we set out to answer these questions.
IB Main Contribution
As our main result, extending the key idea shown in Example 1 that a relay can exploit bursty natures of the transmitters, we characterize the DoF region of a user bursty multiinput multioutput (MIMO) Gaussian MAC with a relay. Our main contribution in this work is exploring the role of a relay in the bursty network of our interest in depth from a practical standpoint, which we anticipate to hold true in other bursty networks as well. To highlight some of the notable findings, first, we demonstrate that a relay can offer a DoF gain in bursty MACs. Given that relays have been known unable to offer a DoF gain in the conventional nonbursty channels, this finding calls for further research on the role of relays in practical wireless networks where transmitters may behave in a bursty fashion. Also, we establish the necessary and sufficient condition for attaining collisionfree DoF. Exploring scalability aspects, we find that to some extent the relaying gain can scale as additional antennas are installed at the relay. Moreover, focusing on the scalability with the number of users, we discover that the relaying gain can grow (and soon converge) as the number of involved users increases. Lastly, we examine relaying gains in scenarios where some physical perturbation shared around the users may generate data traffic for them simultaneously, and cause correlated transmission patterns among them. We demonstrate that in most cases the relaying gain is greater when the users exhibit more correlated transmission patterns. This shows that employing a relay can be more beneficial when collisions among the users are likely to be more severe.
IC Practical Implications
Our results well emphasize advantages of employing a relay in practical wireless systems where multiple sources deliver data to a single destination in a bursty manner. One advantage is to improve performance in emerging networks, such as a devicetodevice system in which mobile devices directly exchange data with little help of base stations. When multiple devices convey bursts of data to a device in such systems, what our results suggest is that, the assistance of a relay can be useful to achieve higher data throughput since the relay can provide DoF gains scalable with additional relay antennas, and even better, enable collisionfree communication. Another advantage is to simplify random access protocols to reduce control signaling overhead. When multiple users wish to deliver data to a common destination, some protocols are needed to manage signal collisions for reliable data delivery. According to our results, a relay can take a burden off the users when it comes to coping with such collisions. As Example 1 illustrates, the relay can resolve collisions on behalf of the users. Hence, the users are allowed to send signals at random intervals without making extra effort such as retransmissions of collided signals. We discuss more on the practical implications in Section VI.
ID Related Work
Extensive research has been done on relay networks since the introduction of the relay channel (RC), in which one source wishes to deliver a message to one destination with the help of a relay, by van der Meulen [3]. In their seminal paper [4], Cover and El Gamal laid the foundations for studying relay networks by developing most general coding strategies for the RC, such as decodeandforward, partial decodeandforward and compressandforward. Among subsequent works that extended the coding schemes to seek capacity for variants of the RC, the most related to our interest is the work due to KramerGastparGupta [5] in which a multiple access relay channel (MARC) is investigated. They developed an achievable scheme by extending decodeandforward strategies for the RC to a MARC where two sources wish to deliver independent messages to one destination with a relay’s aid, and evaluated achievable rates of the scheme in wireless channels with fading. The works due to Lim et al. [6] and AvestimehrDiggaviTse [7], which independently developed coding schemes for noisy relay networks, are most relevant to our results in this paper. We extended the noisy network coding scheme for multimessage multicast networks developed in [6] to characterize the DoF region of the channel of our interest.
In terms of relaying operations, the aforementioned works mainly consider fullduplex and strictly causal relays. Most of the theories developed for fullduplex relays were shown extendable to cases where relays are halfduplex through discussions in [8] which model halfduplex relays by imposing constraints such as fractions of time allowed for relays to be in either reception or transmission mode. Also, causal relaying strategies including instantaneous relaying as well as noncausal relaying strategies have been explored in [9].
As we noted earlier, our results have practical implications in random access protocols such as wellknown ALOHA [10], CSMA [11], and their extensions. In all such protocols, when users share a common communication medium, they should take part in avoiding and/or recovering from collisions. Our results imply that introducing relays can be effective ways of taking a burden off the users in coping with such collisions, hence simplifying random access protocols.
Some work has been done on bursty interference networks [12, 13, 14, 15, 2]. KhudePrabhakaranViswanath first studied a twouser bursty IC and characterized the capacity region of a deterministic model [12]. WangDiggavi examined a twouser bursty IC with and without feedback and characterized the capacity region of a bursty Gaussian IC to within a bounded gap [13]. Extending the results in [13], KimWangSuh investigated a bursty IC with feedback in the presence of a relay and partially established the necessary and sufficient condition for attaining interferencefree DoF [2].
To the best of our knowledge, there has been little work done on multiuser networks where correlations across the users’ transmission patterns are taken into account. Such correlations across bursty user transmissions have been out of question, as almost all related past works have considered conventional nonbursty channels where transmitters send signals at all times.
Ii Problem Formulation
Fig. 3 describes the user bursty MIMO Gaussian MAC with a relay. Transmitter has antennas, , and the receiver and the relay have and antennas respectively. Transmitter wishes to reliably deliver a message to the receiver.
Let be transmitter ’s encoded signal and be the relay’s encoded signal at time . The encoded signals are powerconstrained: and . Traffic states are assumed to follow to govern bursty transmissions over time. Joint distribution^{1}^{1}1We let joint distributions capture the users’ transmission patterns that stem from correlations across the data availabilities, while for simplicity we assume marginal distributions to be identical. captures the bursty transmission patterns of the users. Unlike the transmitters, the relay is not subject to bursty transmissions.
It is worthwhile to note the rationale behind our modeling of bursty transmissions. This work is motivated by sensor networks in which transmitters are simple devices, thus it is natural to consider them to be less capable; they can neither have a large buffer to store ample data for later use, nor employ advanced scheduling schemes. Hence, intermittent data traffic forces the users to send signals whenever they have available data to deliver, leading to bursty transmissions. In contrast, a relay can be equipped with richer capabilities such as a large buffer and channel state sensing; it can store sufficient past received signals and use them later according to channel states for better assistance. Hence, unlike the transmitters, the relay can send signals at all times. Also, as we consider intermittent data availabilities to be a primary cause of bursty transmissions, it might be more practically relevant to model such burstiness in higher layers of the communication protocol stack. However, to greatly simplify the model while capturing the bursty nature to some extent, we incorporate multiplicative random states into the physical channel.
Additive noise terms at the receiver and at the relay are assumed to be independent of each other and of transmit signals, distributed according to and , and i.i.d. over time. Let be the received signal at the receiver and be the received signal at the relay at time . Then,
The matrices and describe the timeinvariant channels from transmitter to the receiver and to the relay, respectively. The matrix describes the timeinvariant channel from the relay to the receiver. All channel matrices are assumed to be full rank.
We assume current traffic states are available at the receiver and the relay. Each transmitter knows its own current traffic state, as it has access to the availability of its own data for transmission.
Transmitter encodes its signal at time based on its own message and its own current traffic state; we assume uncoordinated traffic states across all transmitters, which means each transmitter has access to its own traffic state only. The relay encodes its signal at time based on its past received signals, and both past and current traffic states of all transmitters. Then,
For notational convenience, we let and stand for the sequence up to .
Finally, we define the DoF region , where is the capacity region with power constraint and is the data rate of transmitter .
Iii Main Results
As our main result, we characterize the DoF region of the user bursty MIMO Gaussian MAC with a relay.
Theorem 1
The DoF region of the user bursty MIMO Gaussian MAC with a relay is characterized as follows.
(1) 
where , is a set that indicates which transmitters are active, and is a joint distribution that describes the probabilities of the transmitters indicated by being active.
Proof:
Here we provide an outline of the proof. See Appendix A for the details. To obtain an outer bound, we directly follow the standard cutset arguments [16]. To obtain a matching inner bound, we extend noisy network coding for multimessage multicast networks [6]. Introducing traffic states information is the key to the extension. We let the transmitters and the relay not make use of any traffic states information although they have access to (part of) it, whereas we let the receiver do so. This is equivalent to the case where information of traffic states is available only at the receiver. Hence, we treat the received signal and the traffic states (i.e., ) as the output of the channel at time . Also, we apply amplifyandforward strategies without compression at the relay. Then, we evaluate the extended achievable scheme using independent Gaussian input distributions, to get an achievable DoF region that matches with the cutset bound. \qed
For ease of presentation, in this paper we mainly consider a symmetric user bursty MAC with a relay in which all transmitters have the same number of antennas: . Thus, we state the following corollary.
Corollary 1
The DoF region of the symmetric user bursty MIMO Gaussian MAC with a relay in which all transmitters have the same number of antennas is characterized as follows.
(2) 
Proof:
Setting in Theorem 1 completes the proof. \qed
To investigate the number of additional DoF attained with the assistance of a relay, we focus on additive sum DoF gains: the difference between the sum DoF with a relay and that without a relay.
Corollary 2
The additive sum DoF gain attained by employing a relay in the symmetric user bursty MIMO Gaussian MAC is expressed as follows.
(3) 
where is the set that includes all subsets of .
Proof:
Although it might be a comprehensive approach to explore how the gains attained from employing a relay change with varying levels of correlations across the users’ data availabilities (equivalently, their transmission patterns), we consider two extreme ends of the spectrum for simplicity. On the one end, the users’ data are available in a fully dependent manner, thus all transmitters are either active or inactive at the same time. On the other end, the users’ data are available in an independent manner, thus a transmitter becomes active regardless of the others.
Corollary 3
The additive sum DoF gain attained by employing a relay in the symmetric user bursty MIMO Gaussian MAC with fully dependent and independent transmissions are expressed as follows.
(4)  
(5) 
where .
Proof:
See Appendix B. \qed
Iv Collisionfree DoF and Gain Scalabilities
We now begin indepth discussions on a variety of topics: collisionfree DoF performances and scalability aspects of the relaying gains.
Iva Collisionfree DoF Performances
Collisionfree communication may be the most desirable benefit one hopes to get from the assistance of a relay. No user needs to step back for the sake of others. As we can see in Example 1, in low data traffic regimes, the aid of a relay can help achieving collisionfree DoF performances. When the data traffic level is low, idle moments of the transmitters take place more often than collisions occur. During the idle moments, the relay can send useful symbols to the receiver that help resolving the collisions, leading to the desirable performances. When the data traffic level is high, on the other hand, the relay finds fewer opportunities to send and the number of decodable symbols flowing into the receiver is limited. Hence, saturated DoF performances are achieved instead.
In this section, we establish the necessary and sufficient condition for attaining collisionfree DoF. For simplicity, we consider the case where the users send bursty signals in an independent manner. The proof of necessity is in Appendix C. The proof of sufficiency follows by Corollary 1.
Corollary 4
The necessary and sufficient condition for attaining collisionfree DoF for , where^{2}^{2}2We assume throughout this paper. Otherwise, there is no point in discussing relaying gains, as the receiver is able to decode all transmit symbols instantaneously. , in the user bursty MIMO Gaussian MAC with a relay is expressed as
(6) 
Condition (6) includes an obvious case in which the number of receive antennas is greater than or equal to the total number of transmit antennas (). In this case, the receiver can decode all transmit symbols instantaneously without any help of a relay, even when all transmitters are active at the same time. We can achieve the collisionfree DoF of without a relay, and hence it is of no use.
In the other case (), condition (6) says that we need a relay to achieve collisionfree DoF performances and that the relay should have at least antennas. This is a condition that intuitively comes to mind. When all transmitters are active at the same time, the number of linear combinations of the transmit symbols the relay gets should be at least as large as the receiver additionally needs for successful decoding of all transmit symbols.
What remains is to determine what operation of the relay makes it possible to achieve collisionfree DoF performances. In proving sufficiency of (6), for attaining collisionfree DoF, we extend the noisy network coding scheme [6]. When extending the scheme, we let the relay receiveandforward without compression. Fig. 4 illustrates the relay operation in a simple network of : when only a few transmitters (or none) are active, the relay fills in unused antennas of the receiver with useful symbols, i.e., the symbols that help resolving past collisions. Again apparent is the motivating key idea of this work: a relay exploiting idle moments of the transmitters. In low data traffic regimes, it is more likely that only a few transmitters are active. Then, compared to the rate of occurrence at which collisions take place, the relay more frequently finds opportunities to deliver symbols to the receiver that are intended for resolving past collisions. This leads to collisionfree DoF performances.
Remark: There is an interesting difference to note between the relay operations in bursty MACs and bursty ICs. A recent study on a twouser bursty MIMO Gaussian IC with a relay, focusing on interferencefree DoF performances, develops a scheme in which the relay cooperates with active transmitters [2]. From this cooperation, they neutralize interference in the air, which coincides with the idea in [17]. This suggests that more sophisticated operations of the relay may be required to achieve optimality in other multiuser bursty networks.
IvB Scalability with the Number of Users
In this section, we aim to investigate how the DoF gain attained from employing a relay varies as the number of users grows. In doing so, we consider scenarios in which dependencies across the users’ intermittent data availabilities may cause correlated transmission patterns of the users. We explore two representative cases: one concerns fully dependent transmission patterns and the other concerns independent ones. That is, we focus on the additive sum DoF gains and given in Corollary 3, and their scalability in terms of the number of users involved.
As in Section IVA, we continue to assume the bestcase scenario in which sufficiently many antennas are installed at the relay (more precisely ), so that we can examine the case where the relay can help achieving the maximum (collisionfree) DoF. Considering a motivating example of devicetodevice systems, which consists of mostly mobile users with limited antenna availabilities, we assume . To simplify matters further, making the number of users the only variable, we focus on one specific point in low data traffic regimes: . A rationale behind this choice is that at this level of data traffic, both and have their peak values (See Appendix E), which we denote by and respectively, and formally define as follows:
It means that each peak value represents the maximal relaying gain for each case of user transmission patterns, given a fixed number of users.
We obtain the following peak relaying gains as a function of from Corollary 3 under the assumptions (See Appendix E):
One can easily verify that both peak gains grow as increases, and converge to 1 and , respectively. This finding shows that the beneficial role of a relay does not deteriorate as the number of users increases. To the contrary, the presence of a relay is more advantageous with more users regardless of dependencies across the users’ data availabilities. Interestingly, comparing the two peak gains, we can see that the difference between both peak gains () grows as increases (See Appendix E). This finding shows that the difference in the amounts of additional DoF obtained with the assistance of a relay expands as the number of users increases.
Based on the discussion above, one may conclude that in the bestcase scenario we consider, employing a relay in bursty MACs is (1) more advantageous when more users are involved, and (2) more beneficial with dependencies across the users’ data availabilities. In Section V, we compare the relaying gains for the two cases of distinct user transmission patterns in further detail to see if the conclusion still holds true for other scenarios as well.
IvC Scalability with the Number of Relay Antennas
So far, we have optimistically assumed sufficiently many relay antennas for the sake of exploring the bestcase scenario in which employing a relay can be most beneficial. Now, let us limit the number of relay antennas. Having an economic perspective in mind, it is natural for one to weigh the benefit that comes from installing one extra relay antenna in comparison with the associated cost, thus to be interested in incremental relaying gains. When one intends to employ a relay into realworld wireless systems and wishes to benefit from it, what is designable with a certain extent of freedom would be the number of relay antennas; the number of users involved in the systems and the antenna configuration of the users would be given within a plausible range. Hence, exploring another scalability aspect of the DoF gains in this section, we pay attention to incremental relaying gains in terms of the number of relay antennas, for a fixed number of users.
As in Section IVB, we assume . Also, we consider the case where there are four users, i.e., . As before, we consider two representative cases: one concerns fully dependent transmission patterns and the other concerns independent ones. In high traffic regimes, there is little scalability to observe due to saturated DoF at the receiving users. Thus, we mainly focus on low traffic regimes.
Fig. 6(a) illustrates how the DoF gain in the presence of a relay varies as the number of relay antennas changes, when the users show fully dependent transmission patterns: v.s. . We can observe a constant incremental gain to some extent, namely until which is equal to . Once the number of relay antennas exceeds it, the relaying gain vanishes. This shows that, when the users exhibit fully dependent transmission patterns, the first few relay antennas are helpful, each with equal worth, and soon an extra at the relay does not help at all. Hence, from an economic perspective, it is best to install antennas at the relay as many as .
Fig. 7(a) illustrates how the DoF gain in the presence of a relay varies as the number of relay antennas changes, when the users show independent transmission patterns: v.s. . We can observe a diminishing incremental gain to some extent, namely until which is equal to . Once the number of relay antennas exceeds it, the relaying gain vanishes. This shows that, when the users exhibit independent transmission patterns, the first few antennas are helpful, each with decreasing worth, and soon an extra at the relay does not help at all. Hence, from an economic perspective, if the cost of installing an extra antenna at the relay is big, so the benefit of it should be properly weighed, it is better to install a small number of them, since more will not result in much bigger benefits.
Figs. 6(b) and 7(b) illustrate that in high traffic regimes the presence of a relay still helps. However, due to saturated DoF at the receiving users, at high traffic levels, the value of an extra relay antenna decreases much faster; one is worth the same as two or more in this example (particularly in Fig. 7(b), one relay antenna gives almost the same benefit, so we barely notice the difference), hence little scalability is observed.
Fig. 8 compares the scalabilities of both and with respect to . One thing we can infer from this figure is that in realistic scenarios where the users’ transmission patterns are uncorrelated or moderately correlated (not fully), an extra relay antenna will be worth the most when it is the first to be installed, due to the diminishing incremental gain. A few other antennas to be installed will be worth less. Another thing to note is that as Section VC pointed out that a relay could provide a greater gain with uncorrelated user transmissions in low traffic regimes with antenna configurations , we can observe that the relaying gain with uncorrelated user transmissions is (slightly) greater than that with correlated ones when , confirming the point. In the other cases when , we see greater relaying gains with correlated user transmissions.
Remark: The limited scalability can be explained with an analogy. In bursty MACs, there is one receiver to which all transmitters wish to deliver their message; they are sharing one pie. One transmitter sending at higher rates necessarily means the other transmitters sending at lower rates. Employing a relay is shown to be beneficial, but not significantly. The relay may help the transmitters consume the pie better, but after all, it cannot increase the size of the pie no matter how well it operates.
In bursty interference channels (ICs), however, there is a different story to tell. Recently, it is shown that a relay can offer a DoF gain in bursty ICs that can scale linearly with additional relay antennas [2]. In the IC case, in contrast with the MAC case, each transmitter wishes to deliver their message to its own intended receiver; they are not sharing one pie. One transmitter sending at higher rates could mean the other transmitters sending at lower rates, but it does not result from exclusively consuming the pies of the others. Rather, it results from hindering the others from having theirs. The relay can help the transmitters consume their own pie only, so that each consumes its own, not hindered by the others.
V Relaying Gains: When Transmission Patterns Across Users May Be Correlated
Consider a sensor network in which multiple sensors gather temperature measurements and convey them to a central hub which performs some control task. Alternatively, consider a safety network in which nearby vehicles equipped with sensors to detect a possible risk share information to prevent accidents from happening. In both example networks, some physical perturbation around objects in close proximity may cause the objects to collect and exchange bursts of data simultaneously. Such dependencies across the users’ intermittent data availabilities may cause correlated transmission patterns across the users to take place.
In this section, we set out to investigate how the DoF gains in the presence of a relay vary according to correlations across the users’ transmission patterns. We consider the two representative cases as in the previous sections: the case of fully dependent user transmissions and the case of independent user transmissions. We compare the relaying gains in the two cases for various antenna configurations, as the role of a relay and its functionality in networks may vary depending on them.
Va : Relays with enough antennas
The condition implies that the relay is able to get additional signals that the receiver needs to resolve the worstcase collisions that occur when all transmitters are active, and also able to forward the maximum number of signals that the receiver can get at a time. For this case, the relay can help achieving the maximum DoF for a given bursty MAC: , that is collisionfree DoF in the low traffic regime and saturated DoF in the high traffic regime. Intuitively, the relay receives additional signals when too many transmitters are active, and later forwards them when only a few are active, to achieve the maximum DoF.
We find that the gain obtained from the assistance of a relay is greater with dependent data availabilities than that with independent data availabilities. This finding is illustrated in Fig. 9, and in mathematical terms,
(7) 
See Appendix D for the proof. For this case, in the presence of a relay, the same sum DoF can be achieved regardless of dependencies across the users’ data availabilities. Let us see what happens in its absence. With dependent data availabilities, too many symbols are sent simultaneously compared to the number of symbols that the receiver can get at a time. Without a relay, there would be a big DoF loss due to the severe collisions. With independent data availabilities, however, such severe collisions occur less often given the same level of data traffic. Hence, there would be a relatively smaller DoF loss. The absence of a relay costs bursty MACs with dependent data availabilities more, that is, its presence is more beneficial, offering greater DoF gains.
We note that this finding is valid for the case where the relay has sufficiently many antennas to help achieving the maximum DoF. In the rest of this section, we examine other cases where the relay does not have enough number of antennas to help achieving the maximum DoF, and hence offers limited DoF gains.
VB
A relay offers DoF gains operating in two different modes. It receives additional symbols in reception mode, and forwards them in transmission mode. For this case, particularly when , the relay may reveal its drawback in transmission mode. In this mode, the relay forwards additional symbols to the receiver, to provide DoF gains by utilizing the receive antennas otherwise unused. In that sense, indicates its limited capability to utilize all receive antennas.
The limitation stands out with dependent data availabilities, and makes the relay less beneficial with such dependencies. With dependent data availabilities, all transmitters are either active or inactive. When they are inactive, the relay operates in transmission mode to provide a DoF gain. However, the relay can utilize a very small fraction of receive antennas due to its drawback , leaving a large fraction of them wasted (Fig. 10(a)). With independent data availabilities, on the other hand, these undesired incidents do not occur as often, given the same data traffic level (Fig. 10(b)).
Fig. 12(a) illustrates the relay providing greater DoF gains with independent data availabilities in high regimes only. This is because in those regimes, the relay is guaranteed to receive enough additional symbols from the transmitters, hence the number of additional symbols it can forward in transmission mode is what determines the amount of DoF gain it offers. In short, the limitation in transmission mode (), which appears only in high regimes, affects the relay’s capability more adversely with dependent data availabilities, hence makes the relay less beneficial with correlated user transmissions.
VC
For this case, particularly when , the relay may reveal its drawback in reception mode. In this mode, the relay receives and reserves the additional symbols from active transmitters otherwise lost, to provide DoF gains by forwarding them later to the receiver. In that sense, indicates its limited capability to reserve all surplus symbols.
The limitation stands out with dependent data availabilities, and makes the relay less beneficial with such dependencies. With dependent data availabilities, when all transmitters are active, the relay operates in reception mode to provide a DoF gain. However, the relay can reserve a very small fraction of surplus symbols due to its drawback , leaving a large fraction of them lost (Fig. 11(a)). With independent data availabilities, on the other hand, these undesired incidents do not occur as often, given the same data traffic level (Fig. 11(b)).
Fig. 12(b) illustrates the relay providing greater DoF gains with independent data availabilities in low regimes only. This is because in those regimes, the relay is guaranteed to find enough idle moments of the transmitters to forward additional symbols to the receiver, hence the number of additional symbols it can receive in reception mode is what determines the amount of DoF gain it offers. In short, the limitation in reception mode (), which appears only in low regimes, affects the relay’s capability more adversely with dependent data availabilities, hence makes the relay less beneficial with correlated user transmissions.
We have not examined the case . The condition implies that the relay’s limited capabilities may be revealed in either reception or transmission mode, leading to its worse performance with dependent data availabilities. Regimes in which it underperforms depend on the antenna settings: if then it has limitations in transmission mode hence underperforms in high regimes, and if then in low regimes.
Vi Practical Implications
The bursty model in this work can be naturally translated into many practical wireless systems. In this section, we discuss implications of our results in such systems with some examples.
Via Connection with Devicetodevice Systems
As mobile communication capabilities have continued to be improved, devicetodevice systems are receiving attention. As introduced in the beginning of this paper, bursty MACs can be a suitable model that constitute the systems. A simple example of devicetodevice systems can be a sensor network consisting of a central hub with multiple sensors that computes the average room temperature: the sensors located at various places deliver measurements to the hub, and the hub computes the average. Another can be a safety network consisting of vehicles with sensors in which when the vehicles spot one vehicle facing a possible risk, they provide the vehicle in danger the information to prevent the accident in advance.
Emerging devicetodevice systems in their initial deployment stage are less likely to comprise of objects with many antennas installed. The objects, which previously would have been deficient of communication capabilities, will share bursts of small amounts of data with elementary communication to carry out a task that is better done with collective data from many sources. In that sense, it is reasonable to assume that the number of users is large, the numbers of transmit and receive antennas and are small, and the level of data traffic is low. This scenario well fits with the bursty MACs we have investigated, and here we can ask a natural question: if we were to employ a relay to help all objects deliver data at their best (optimistically, without any collisions among them), how many antennas should we install at the relay and how should the relay operate?
Our results say that by employing a relay with at least antennas that performs a simple receiveandforward operation, we can make all objects trying to deliver bursts of data to a common destination convey their data effectively without collisions. Not only does the relay increase overall data throughput, it also has practical benefits in reducing control signaling overhead. When data traffic is sufficiently low, the relay eases the need of the devices to coordinate their transmissions to avoid possible performance degradation. It also eases the need of exchanging acknowledge signals among them to let each other know the receptions of previously sent signals.
ViB Connection with Random Media Access Control Protocols
When we formulated our problem, we considered intermittent data traffic as a primary source of bursty transmissions. They can, however, result from a random media access control protocol with which multiple transmitters sharing a common medium comply. Now, the transmitters may send signals in a bursty manner, not because data to transfer is intermittently available, but because they intend to avoid collisions. Although the source of burstiness is different, our bursty model captures this scenario well.
Let us consider a wireless system with a simple protocol. transmitters with transmit antennas wish to send signals to a receiver with receive antennas. There is a relay with enough antennas from which this wireless system can benefit. We assume as the receiver may have more antennas than the multiple transmitters that are connected to it, and as it may have not so many to accommodate all transmitters at once. To avoid collisions that possibly degrade overall performance, each transmitter sends signals according to a protocol: sending signals with probability and making such decisions independently over time. In this case, probability no longer represents bursty data traffic as in our original model. Rather, it is now a design parameter of the system. A natural question to ask is: how do we choose to achieve the best performance?
Our results say that by choosing , we can achieve the best performance, with no one transmitter lowering its performance for the sake of the others. This threshold probability makes sense, since the relay schedules bursty transmissions of all transmitters and lets them equally share the receiver. The scheduling role of the relay relaxes the complication of the protocol. There is no need of feeding back some information from the receiver to the transmitters to manage collisions.
Vii Conclusion
We characterized the DoF region of the user bursty MIMO Gaussian MAC with a relay. To that end, we extended the noisy network coding scheme to achieve the DoF cutset bound. From the characterization, we found that a relay can provide a DoF gain in bursty MACs, and also established the necessary and sufficient condition for attaining collisionfree DoF. Interestingly, we demonstrated that the relaying gain can scale with additional relay antennas to some extent. Examining the gain in further detail, we showed that the relaying gain is in most cases greater when the users exhibit more correlated transmissions across each other and when more users are involved, except for some cases in which the relay is equipped with a very small number of antennas. Our results have practical implications of employing a relay into wireless systems where multiple sources wish to deliver data to a single destination in a bursty manner, in terms of better performance and media access control protocols design.
Appendix A Proof of Theorem 1
First, we state an outer bound on the capacity region, which directly follows by the standard cutset arguments, omitting the proof:
Lemma 1
Any achievable rate region of the user bursty MIMO Gaussian MAC with a relay must satisfy the inequalities such that
for all distributions such that and , where and .
To get the DoF outer bound that matches the claimed DoF region (1), we evaluate the above cutset bound with Gaussian distributions with power constraint that maximize the mutual information terms [16]. And we take the limit of after dividing the evaluated cutset bound by . Then, we get the DoF outer bound that matches the claimed DoF region (1).
Next, we state an inner bound on the capacity region, which we will prove shortly by extending the noisy network coding scheme [6]:
Lemma 2
An achievable rate region of the user bursty MIMO Gaussian MAC with a relay includes the set of such that (without timesharing)
for some distribution such that and .
To get the DoF inner bound that matches the claimed DoF region (1), we evaluate the achievable rate region with the independent Gaussian distributions with power constraint . And we take the limit of after dividing the evaluated achievable rate region by . Then, the rate penalty term, the subtracted mutual information term, vanishes for some choice of in the limit of as it does not scale with (we will show this shortly), and we get the DoF inner bound that matches the claimed DoF region (1). Note the similarities of Lemmas 1 and 2.
Now we begin to prove Lemma 2. For simplicity, we provide a detailed proof for the twouser setting. It is straightforward to extend the proof for the user setting. By directly applying the noisy network coding scheme [6], we can get an inner bound. We assume that the transmitters and the relay do not make use of any information of traffic states, although they have access to (part of) it. Hence, transmitter encodes its signal at time based on its message: . The relay encodes its signal at time based on its past received signals: . On the other hand, the receiver makes use of information of traffic states. Thus, we treat as the output of the channel at time . We get the following inner bound (without timesharing):
for some distribution such that , , and .
The traffic states are independent of the messages and the noise at the relay . Also, they are i.i.d. over time. Since and , the traffic states are independent of . Therefore, , where . Using the chain rule and this equality, we calculate the mutual information terms and get the following inner bound:
for some distribution such that , , and .
We compute the rate penalty term using almost the same method in [16]. We set , where and is independent of . We get the following rate penalty:
where follows by the chain rule; follows by the fact that conditioning reduces differential entropy; follows by the fact that is independent of ; follows by the fact that and are independent.
Again note the similarities of Lemmas 1 and 2. Setting aside the rate penalty terms, the mutual information terms are almost identical except for and . We are mainly concerned with regimes where is very large. That is, the rate penalty terms, which are shown above not to scale with , will vanish in taking the limit . Also, the noise term that differentiates and (i.e., ) will be negligible as its power does not scale with either. Therefore, we will get the matching DoF inner and outer bounds, and as a result characterize the DoF region of the twouser bursty MIMO Gaussian MAC with a relay. It is straightforward to extend the proof to the user setting. The exact same line of reasoning presented above holds.
Appendix B Proof of Corollary 3
To get , we set the distribution in Corollary 2 as if and if . By some computation, for we get , and for we get
To get , we set the distribution in Corollary 2 as . For notational convenience, we let . By some computation, we get the claimed gain:
Appendix C Proof of Corollary 4
We examine if for a certain class of antenna configurations, an upper bound on the sum DoF is strictly less than times the individual DoF for all , as it means the corresponding class is not a necessary condition for attaining collisionfree DoF.
If for a certain class of antenna configurations, times the individual DoF is less than or equal to the sum DoF for where , then it means the corresponding class is the necessary and sufficient condition for attaining collisionfree DoF, since the individual DoF and the sum DoF are achievable from Theorem 1.
Ca and
From , . From and , . Thus, we get the individual DoF of . Using the fact that , we get an upper bound on the sum DoF: .
where the last equality is the expectation of a binomial random variable with parameters and .
In summary, the upper bound on the sum DoF is strictly less than times the individual DoF for all . This class of antenna configurations is not a necessary condition for attaining collisionfree DoF.
CB , , and
From and , we get the individual DoF of . Using the fact that and , we get an upper bound on the sum DoF: . Let . Since and for all , for all .
In summary, the upper bound on the sum DoF is strictly less than times the individual DoF for all . This class of antenna configurations is not a necessary condition for attaining collisionfree DoF.
CC , , and
From , . From , . Thus, we get the individual DoF of . Let .
For , the individual DoF is . Using the fact that , we get an upper bound on the sum DoF: . Using the same method in the earlier case, we can verify that the upper bound on the sum DoF is strictly less than times the individual DoF for .
For , the individual DoF is . Using the fact that , we get an upper bound on the sum DoF: . For , is strictly less than and so is than . In other words, the upper bound on the sum DoF is strictly less than times the individual DoF for .
In summary, the upper bounds on the sum DoF are strictly less than times the individual DoF for all . This class of antenna configurations is not a necessary condition for attaining collisionfree DoF.
CD , , and
From , .From , . Thus, we get the individual DoF of . When is active, by using the same method in Appendix CA, when is active, by using the same method in Appendix CC, we can verify that an upper bound on the sum DoF is strictly less than times the individual DoF for all . This class of antenna configurations is not a necessary condition for attaining collisionfree DoF.
CE
From , we get the individual DoF of . From , and for all integers . Thus, we get the sum DoF of . This class of antenna configurations is the necessary and sufficient condition for attaining collisionfree DoF for all .
CF and
From , . Thus, we get the following individual DoF:
When , is active for all . Let . This function is continuous. When , since and , by the intermediate value theorem, there always exists such that . Thus, for , is active.
From , for all integers . Thus, we get the following sum DoF.
Let . This function is continuous. Since and , by the intermediate value theorem, there always exists such that . Thus, for , is active. One can readily verify that when , and when .
Suppose . Then, for , times the individual DoF of is strictly less than the sum DoF of . This is a contradiction, since both the individual DoF and the sum DoF are achievable. Thus, .
When , for , times the individual DoF of is less than or equal to the sum DoF of . For , the sum DoF of is strictly less than times the individual DoF of .
When , for , times the individual DoF of is less than or equal to the sum DoF of . For , the sum DoF of is strictly less than times the individual DoF of . For , the sum DoF of is strictly less than times the individual DoF of .
In summary, this class of antenna configurations is the necessary and sufficient condition for attaining collisionfree DoF for , where when and when .
In conclusion, is the necessary and sufficient condition for attaining collisionfree DoF for , where if , if and , and if and .
Appendix D Proof of (7):
In this appendix, we perform some mathematical analysis that provides more insight into the discussions in Section V on relaying gains for two representative scenarios: fully dependent and independent user traffic. From the analysis, we prove that when .
As explained in Section V, the terms in (4) and in (5) quantify the DoF gains that stem from the relay’s reception capability for the fully dependent case and independent case, respectively. Also, the terms in (4) and in (5) quantify the DoF gains that stem from the relay’s transmission capability for the respective two cases. We will show that is a convex function with respect to that intersects at when . Similarly, we will show that is a convex function with respect to that intersects at when . From the analysis, we can plot Fig. 13, and prove that when .
Before we proceed, we obtain the derivative of