The Capacity of a Class of Multi-Way Relay Channels
The capacity of a class of multi-way relay channels, where users communicate via a relay (at possibly different rates), is derived for the case where the channel outputs are modular sums of the channel inputs and the receiver noise. The cut-set upper bound to the capacity is shown to be achievable. More specifically, the capacity is achieved using (i) rate splitting, (ii) functional-decode-forward, and (iii) joint source-channel coding. We note that while separate source-channel coding can achieve the common-rate capacity, joint source-channel coding is used to achieve the capacity for the general case where the users are transmitting at different rates.
The MWRC is an extension of the two-way relay channel (TWRC) where two users () exchange data via a relay (e.g., see ). The Gaussian MWRC, where the channels between the nodes are additive white Gaussian noise channels, was first investigated by Gündüz et al. . An upper bound and a few achievable rate regions, based on the coding strategies for the relay channel, were derived using: (i) complete-decode-forward (CDF) where the relay completely decodes the users’ messages and broadcasts a function of the messages back to the users, (ii) compress-forward where the relay quantizes its received signals, re-encodes and broadcasts them to the users, and (iii) amplify-forward where the relay simply scales and forwards what it receives. These coding strategies, however, fail to achieve the capacity of the MWRC.
Recently, functional-decode-forward (FDF) has been proposed for the TWRC, where the relay decodes a function of the users’ messages and broadcasts the function back to the users. FDF has been shown to achieve within bit of the capacity of the Gaussian TWRC . We later proposed FDF for the multi-way relay channel (MWRC), and showed that FDF achieves the common-rate (where all users exchange information at the same rate) capacity of the binary MWRC , where the channels are binary symmetric. Applying insights from the binary MWRC has allowed us to obtain the common-rate capacity of the the Gaussian MWRC with three or more users where all nodes transmit at the same power . The “general” capacity (i.e., where users can transmit at possibly different rates) of the MWRC is not yet known.
In this paper, we work toward this goal by deriving the “general” capacity of the finite field adder MWRC, where the channel outputs are the summation (in finite field arithmetic) of the channel inputs and the receiver noise. We show that the capacity can be achieved by combining the ideas of (i) rate splitting, (ii) our proposed FDF , and (iii) the joint source-channel coding for broadcast channels by Tuncel . This, to the best of our knowledge, is the first example of the MWRC where the capacity is found for all noise distributions/levels.
The rest of the paper is organized as follows. We define the channel model of the finite field adder MWRC in Section 2, and find a capacity upper bound in Section 3. In Section 4, we construct a linear code that is optimal for the point-to-point finite field adder channel. Using this linear code, we propose a coding strategy using the ideas of rate splitting, FDF, and joint source-channel coding to obtain the capacity of the finite field adder MWRC in Section 5. Lastly, in Section 6, we compare the capacity with two other coding strategies, namely FDF with rate splitting and separate source-channel coding and CDF, and discuss why these two strategies fall short of the capacity.
Fig. ? depicts the MWRC considered in this paper, where there is no direct user-to-user link. Nodes 1, 2, , are the users, and node is the relay. We consider full data exchange where each user is to decode the messages from all other users. We denote by node ’s input to the channel, the channel output received by node , node ’s message, and node ’s estimate of all other users’ messages.
The -user finite field adder MWRC over the finite field consists of the following:
Downlink: , for each , , , ,
where , , for some finite field , is the addition operation associated with , are statistically independent for all and all channel uses. Let be an -bit message, where is a rational number for every , and consider simultaneous uplink and downlink channel uses. User ’s transmit message at time , , can only depend on its own message and its past received signals, i.e., , for . The relay’s transmitted signal at any time can only depend on its past received signals, i.e., , for . After channel uses, user estimates the messages of all other nodes from its received signals and its own message, i.e., , where . Assume that the users’ messages are independent and each is uniformly distributed over . We say that the rate tuple is achievable if there exists some such that all users can reliably decode the messages of all other users. We say that a user can decode a message reliably if the probability that it wrongly decodes the message can be made arbitrarily small. The capacity is defined as the closure of all achievable rate tuples.
3A Capacity Upper Bound
In this section, we derive an upper bound to the capacity of the finite field adder MWRC using cut-set arguments. A cut-set upper bound to the capacity of a network is the maximum rate that information can be transferred across a cut separating two disjoint sets of nodes, assuming that all nodes on each side of the cut can fully cooperate. We define , , and . The cut-set upper bound to the capacity of the finite field adder MWRC is given in the following theorem.
Here, is the entropy.
Consider a network of nodes, in which node sends information at the rate (in bits/channel use) to node . If the set of rates are achievable, there exists some joint probability distribution such that , for all . Here , and .
First, consider the cut separating and in the MWRC, for some . An upper bound to the rate (of messages ) across the cut from to is therefore
where is because and are statistically independent, so are and .
Next, consider the cut separating and , for some . We have the following rate constraint
The rate constraints and must be satisfied for all for some . Note that choosing the independent and uniform distribution for each , for , simultaneously maximizes all the mutual information terms in the constraints. So, combining the above rate constraints, we have Theorem ?. Note that implies for all , since .
4An Optimal Linear Code for the Point-to-Point Finite Field Adder Channel
Now, we consider the following linear code that maps a length- (row vector) message to a length- (row vector) codeword :
where is the multiplication associated with , is a fixed matrix, with each element independently and uniformly chosen over , the -th row in , , is a row vector of length , and is a fixed row vector of length , with each element independently and uniformly chosen over .
We extend the results for binary linear codes  to finite field linear codes in the following two lemmas.
There are ways of selecting and . As the elements are arbitrarily chosen, each unique has a probability of of being selected. For any , there is only one that results in the given . So, there are only different that map to . Hence, .
To show independence, we need to find the probabilities and . Equivalently, we find the probabilities and , where is the additive inverse of in . Let and differ in the -th position (they may differ, additionally, in other positions). So, . For any , there is only one that results in the given . Hence, there are only different ’s that give . In addition, for any chosen , there is only one that results in the given . So, there are only unique ’s that give the desired and . So, the probability .
With the above lemmas, we have the following theorem:
From Lemma ? we know that for the code defined in , for any codeword, each codeletter is uniform and i.i.d.. From Lemma ?, we know that any pair of codewords are independent of each other. Using these two facts, we can repeat the analysis of the probability of error in the proof of the channel coding theorem  to show that the receiver can decode the message from the received signals with an arbitrarily small error probability if is sufficiently large and if , where is uniformly distributed.
5Functional-Decode-Forward with Rate Splitting and Joint Source-Channel Coding
In this section we derive an achievable rate region using the linear code derived in the previous section. Consider each user , for , sending messages (of bits each), denoted by . Consider a total of channel uses. Since we consider full data exchange, user needs to decode the messages sent by all the other users, i.e., . Define each channel uses as a block. In the -th block, for , each user sends on the uplink. In the -th block, for , the relay transmits , a function of its received signals in the -th block, on the downlink. At the end of the -th block, each user then decodes the -th message of all other users, i.e., . So, for each pair of the -th block on the uplink and the -th block on the downlink, if each user can reliably decode the -th message of all other users, then repeating the same coding scheme for all , all users can reliably decode the messages from all other users in all blocks. This means that the rate tuple is achievable. For any , , , , , we can choose a sufficiently large such that the achievable rate tuple is arbitrarily close to . In this section, we derive constraints on , , , such that the rate tuple is achievable.
Since the encoding and decoding functions for all nodes are repeated in each block, we focus on the first block on the uplink and the second block on the downlink. For simplicity, we denote by in the rest of this section.
Recall that , , and . For the uplink of the MWRC, we use the idea of FDF in  and rate splitting. Let . So, each message can be split into , where is bits long and is bits long. Let , , be the number of users whose message is strictly more than bits long. Let these users be . So, for all users , and .
The uplink channel uses are further split into sub-blocks. Each of the -th sub-blocks for consists of channel uses
In the -th sub-block for , only two users transmit, using the linear code defined in :
where each is a row vector of length , is a fixed matrix, each and is a row vector of length , and is the all-zero row vector (where “zero”, , is the additive identity of the field ). If we say that a user does not transmit, it sends . is chosen such that
so that we can define an injective (one-to-one) function that maps each (of bits) to a unique .
In the -th sub-block for , only one user, , transmits using the linear code defined in :
where is a row vector of length , is a fixed matrix, and each and is a fixed row vector of length . Similarly, is chosen such that
so we can define an injective function that maps each (of bits) to a unique .
Each element in , , , and is independently and uniformly chosen over , and is fixed for all transmissions.
In the -th sub-block for , the relay receives , where
which is also a linear codeword of the form . From Theorem ?, if is large enough and if
then the relay can reliably decode the “message” .
In the -th sub-block for , since only one user transmits, we directly apply Theorem ?. So, if
then the relay can reliably decode .
Define . On the uplink, if
we can always find sufficiently large , , and , so that , and , can be satisfied in their respective sub-blocks. Hence, the relay can reliably decode .
Assume that the relay has correctly decoded . Using the strategy of joint source-channel decoding over broadcast channels , the relay re-encodes and sends it on downlink channel uses. Each user , for , uses its side information to decode (hence joint source-channel decoding). The users do not need to use their respective in the decoding, as each conveys little information about . All users can reliably decode if 
for some . Choosing the uniform distribution for , .
Since the mapping from (a random -bit message) to is injective, . Since , , with equality iff is uniformly distributed in . From Section 5.1, can be chosen arbitrarily close to . This gives , and . Note that for all , and hence . So, if
then and can both be satisfied. Note that on the downlink, linear codes are not required.
5.3The Capacity of the Binary MWRC
If the rate constraints and are satisfied, all users are able to decode reliably. Each user then performs:
and obtains . Combining these with , each user can reliably recover the messages of all other users, i.e., .
So, all rate tuples satisfying and are achievable. Since the closure of this region coincides with the capacity upper bound given in Theorem ?, we have:
5.4A Note on the Common-Rate Capacity
If we consider only the common rate, , , we have and , . In this case, rate splitting is not required on the uplink to get . Furthermore, on the downlink, since has no correlation with any , utilizing does not help the user in decoding . On the downlink, the relay encodes , of bits, and transmits it in channel uses. Treating the downlink from the relay to each user as a point-to-point channel , if , then user can reliably decode from its received signals without needing to use its own message (separate source-channel decoding). Hence, we get . Of course, after decoding , each user needs to use its message to obtain the other users’ messages using the steps in . But as far as channel decoding is concerned, the source messages need not be used. So, if we are only interested in the common rate case, FDF without rate splitting and separate source-channel coding is optimal (capacity-achieving) for the finite field adder MWRC.
6Comparison of Coding Strategies
Now, we compare three coding strategies for the special case when and , i.e., the binary TWRC. For binary , we denote and .
6.1FDF with joint source-channel coding
From Theorem ?, FDF with rate splitting and joint source-channel coding achieves the capacity given by . The capacity of the binary TWRC was reported in .
6.2FDF with separate source-channel coding
Now, we find the achievable rate region using FDF with rate splitting but with separate source-channel coding. The coding on the uplink is the same as that in Section 5.1. Assuming , we have and . So, on the uplink, if , then the relay can reliably decode . Instead of using the joint source-channel coding for the downlink described in Section 5.2, we re-cast the downlink as a broadcast channel with degraded message sets, where the relay broadcasts a common message to both the users, and a private message to user 1, and the users do not use their own messages for decoding and (hence separate source-channel decoding). From , if , , and , for some , then both users can reliably decode and user 1 can reliably decode purely from their respective . The users then follow the steps in to obtain the other user’s message. Repeating this for the case , the achievable rate region is the convex hull of:
: all rate pairs satisfying
for some , and
: all rate pairs satisfying
for some .
Using CDF, the relay fully decodes both and on the uplink, which is a multiple-access channel. So, if , , , then the relay can reliably decode and . Note that the last inequality implies the first two. Assuming that the relay has successfully decoded and , it broadcasts on the downlink. Using a joint source-channel decoding, each user , , , can reliably decode the other user’s message from their respective received signals and their own messages if and . Combining the uplink and the downlink constraints, the achievable rate region using CDF is all satisfying:
Using CDF, the relay needs to fully decode the users’ messages on the uplink, and this restricts the sum rate to be constrained by the uplink bandwidth, c.f. . So, CDF is not uplink optimized. On the other hand, using FDF with rate splitting and separate source-channel coding, the users’ a priori knowledge about their own messages is not utilized during the channel decoding on the downlink – their own messages are used only after channel decoding. So, FDF with separate source-channel coding is not downlink optimized. These two coding strategies do not achieve the capacity of the finite field adder MWRC in general. FDF with rate splitting and joint source-channel coding overcomes these two shortcomings by having the relay decode only functions of the source messages on the uplink and having the users utilize their own messages in channel decoding on the downlink. This strategy indeed achieves the capacity of the finite field adder MWRC. This work suggests that for the general MWRC, functional decoding and joint source-channel coding should be utilized.
- This work is supported by the Australian Research Council under grants DP0877258 and DP1093114.
- Since , , and are rational numbers, there exists a (possibly large) such that and are integers.
- R. Knopp, “Two-way radio networks with a star topology,” in Proc. Int. Zurich Seminar on Commun. (IZS), Zurich, Switzerland, Feb. 22-24 2006, pp. 154–157.
- B. Rankov and A. Wittneben, “Achievable rate regions for the two-way relay channel,” in Proc. IEEE Int. Symposium on Inf. Theory (ISIT), Seattle, USA, Jul. 9-14 2006, pp. 1668–1672.
- ——, “Spectral efficient protocols for half-duplex fading relay channels,” IEEE J. Sel. Areas Commun., vol. 25, no. 2, pp. 379–389, Feb. 2007.
- D. Gündüz, A. Yener, A. Goldsmith, and H. V. Poor, “The multi-way relay channel,” in Proc. IEEE Int. Symposium on Inf. Theory (ISIT), Seoul, Korea, Jun. 28-Jul. 3 2009, pp. 339–343.
- W. Nam, S. Chung, and Y. H. Lee, “Capacity bounds for two-way relay channels,” in Proc. Int. Zurich Seminar on Commun. (IZS), Zurich, Switzerland, Mar. 12-14 2008, pp. 144–147.
- L. Ong, S. J. Johnson, and C. M. Kellett, “An optimal coding strategy for the binary multi-way relay channel,” IEEE Commun. Lett., vol. 14, no. 4, pp. 330–332, Apr. 2010.
- L. Ong, C. M. Kellett, and S. J. Johnson, “Capacity theorems for the AWGN multi-way relay channel,” in Proc. IEEE Int. Symposium on Inf. Theory (ISIT), Austin, USA, Jun. 13-18 2010, pp. 664–668.
- E. Tuncel, “Slepian-Wolf coding over broadcast channels,” IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1469–1482, Apr. 2006.
- T. M. Cover and J. A. Thomas, Elements of Information Theory, 2nd ed.1em plus 0.5em minus 0.4emWiley-Interscience, 2006.
- R. G. Gallager, Information Theory and Reliable Communication.1em plus 0.5em minus 0.4emWiley, 1968.
- R. Knopp, “Two-way wireless communication via a relay station,” in GDR-ISIS Meeting, Paris, France, Mar. 29 2007.
- J. Körner and K. Marton, “General broadcast channels with degraded message sets,” IEEE Trans. Inf. Theory, vol. IT-23, no. 1, pp. 60–64, Jan. 1977.
- R. Ahlswede, “Multi-way communication channels,” in Proc. IEEE Int. Symposium on Inf. Theory (ISIT), Tsahkadsor Armenia, USSR, Sep. 2-8 1971, pp. 23–52.
- H. Liao, “A coding theorem for multiple access communication,” in Proc. IEEE Int. Symposium on Inf. Theory (ISIT), Asilomar, USA, Jan. 1972.
- G. Kramer and S. Shamai, “Capacity for classes of broadcast channels with receiver side information,” in Proc. IEEE Inf. Theory Workshop (ITW), Lake Tahoe, USA, Sep. 2-6 2007, pp. 313–318.
- T. J. Oechtering, C. Schnurr, and H. Boche, “Broadcast capacity region of two-phase bidirectional relaying,” IEEE Trans. Inf. Theory, vol. 54, no. 1, pp. 454–458, Jan. 2008.