6060 ieee transactions on information …ma3189/ashraphijuo_twoway_it.pdfcapacity regions within...

31
6060 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015 On the Capacity Regions of Two-Way Diamond Channels Mehdi Ashraphijuo, Vaneet Aggarwal, Member, IEEE, and Xiaodong Wang, Fellow, IEEE Abstract—In this paper, we study the capacity regions of two-way diamond channels. We show that for a linear determin- istic model the capacity of the diamond channel in each direction can be simultaneously achieved for all values of channel parame- ters, where the forward and backward channel parameters are not necessarily the same. We divide the achievability scheme into three cases, depending on the forward and backward channel parameters. For the first case, we use a reverse amplify-and- forward strategy in the relays. For the second case, we use four relay strategies based on the reverse amplify-and-forward with some modifications in terms of replacement and repetition of some stream levels. For the third case, we use two relay strategies based on performing two rounds of repetitions in a relay. The proposed schemes for deterministic channels are used to find the capacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First, for the general Gaussian two-way relay channel, the capacity within a constant gap is achieved with a simpler coding scheme as compared with the prior works. Then, a special symmetric Gaussian two-way diamond model is considered and the capacity region is achieved within four bits. Index Terms— Two-way diamond channel, reverse amplify- and-forward, cut-set bound, linear deterministic channel, Gaussian channel, two-way relay channel, rate region with constant gap. I. I NTRODUCTION T WO-WAY communication between two nodes was first studied by Shannon [1]. There have been many attempts recently to demonstrate two-way communications experimen- tally [2]–[8]. The two-way relay channel where two nodes communicate to each other in the presence of a single relay, has been widely studied [9]–[26]. In this paper, we will consider the two-way diamond channel, where two nodes communicate to each other in the presence of two relays. Some achievable rate regions for the two-way relay channel are based on strategies like decode-and-forward, compress-and-forward, and amplify-and-forward [23]–[29]. The capacity region of the two-way half-duplex relay channel, Manuscript received October 15, 2014; revised May 19, 2015; accepted August 15, 2015. Date of publication September 14, 2015; date of current version October 16, 2015. This work was supported in part by the U.S. National Science Foundation under Grant CIF1064575 and in part by the Office of Naval Research under Grant N000141210043. This paper was presented in part at the 2015 International Symposium on Information Theory. M. Ashraphijuo and X. Wang are with the Electrical Engineering Department, Columbia University, New York, NY 10027 USA (e-mail: [email protected]; [email protected]). V. Aggarwal is with the School of Industrial Engineering, Purdue University, West Lafayette, IN 47907 USA (e-mail: [email protected]). Communicated by S.-Y. Chung, Associate Editor for Shannon Theory. Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TIT.2015.2478461 where the relay decodes the message is characterized in [30]. Network coding type techniques have been proposed [31]–[33] in order to improve the transmission rate. While inferior to traditional routing at low signal-to-noise-ratios (SNR), it was shown that network coding achieves twice the rate of routing at high SNR [34]. The authors of [14] considered the half-duplex two-way relay channel with unit channel gains, and found that a combination of a decode-and-forward strategy using lattice codes and a joint decoding strategy is asymptotically optimal at high SNR. The authors of [23] and [35] studied the capacity of the full-duplex two-way relay channel with two users and one relay, and found that a rate within three bits for each user to the capacity can be simultaneously achieved by both users. The result was further extended in [13] and [36], where lattice codes were used to bring the gap down from three bits to one bit for some special case of channel gains. The diamond channel was first introduced in [37], and consists of one transmitter, two relays and a receiver. In this paper, we study the capacity of the full-duplex two-way diamond channel. In [38], several techniques, i.e., amplify-and-forward, hybrid decode-amplify-and-forward with linear combination, hybrid decode-amplify-and-forward with multiplexed coding, decode-and-forward, and partial decode-and-forward, have been considered for achievability in a Gaussian diamond reciprocal channel with half-duplex nodes, and it is shown that these techniques achieve DoF of at most 1, 0.25, 0.25, 0.25, and 0.75, respectively. The two-way half-duplex K -relay channel has been studied using the amplify-and-forward strategy at the relays [39]–[42]. The design of relay beamformers based on minimizing the transmit power subject to the received signal-to-noise ratio constraints was considered in [42]. Furthermore, achievability schemes using time-sharing are investigated in [43] for a sym- metric reciprocal diamond channel with half-duplex nodes and the inner and outer bounds are compared using simulations. However, we show that the achievability scheme in [43] has an unbounded gap from the capacity. We note that, to the best of our knowledge, none of the prior works gave a capacity achieving strategy for a two-way diamond channel. In this paper, we consider a linear deterministic model which was proposed in [44], and has been shown to lead to approximate capacity results for Gaussian channels in [23] and [45]–[53]. We study the capacity region of a two-way linear deterministic diamond channel where the forward and the backward channel gains are not necessarily the same. We find that the capacity in each direction can be simultaneously achieved. Thus, each user can transmit at a 0018-9448 © 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Upload: others

Post on 14-Mar-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

6060 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015

On the Capacity Regions ofTwo-Way Diamond Channels

Mehdi Ashraphijuo, Vaneet Aggarwal, Member, IEEE, and Xiaodong Wang, Fellow, IEEE

Abstract— In this paper, we study the capacity regions oftwo-way diamond channels. We show that for a linear determin-istic model the capacity of the diamond channel in each directioncan be simultaneously achieved for all values of channel parame-ters, where the forward and backward channel parameters arenot necessarily the same. We divide the achievability scheme intothree cases, depending on the forward and backward channelparameters. For the first case, we use a reverse amplify-and-forward strategy in the relays. For the second case, we use fourrelay strategies based on the reverse amplify-and-forward withsome modifications in terms of replacement and repetition ofsome stream levels. For the third case, we use two relay strategiesbased on performing two rounds of repetitions in a relay. Theproposed schemes for deterministic channels are used to find thecapacity regions within constant gaps for two special cases ofthe Gaussian two-way diamond channel. First, for the generalGaussian two-way relay channel, the capacity within a constantgap is achieved with a simpler coding scheme as compared withthe prior works. Then, a special symmetric Gaussian two-waydiamond model is considered and the capacity region is achievedwithin four bits.

Index Terms— Two-way diamond channel, reverse amplify-and-forward, cut-set bound, linear deterministic channel,Gaussian channel, two-way relay channel, rate region withconstant gap.

I. INTRODUCTION

TWO-WAY communication between two nodes was firststudied by Shannon [1]. There have been many attempts

recently to demonstrate two-way communications experimen-tally [2]–[8]. The two-way relay channel where two nodescommunicate to each other in the presence of a single relay,has been widely studied [9]–[26]. In this paper, we willconsider the two-way diamond channel, where two nodescommunicate to each other in the presence of two relays.

Some achievable rate regions for the two-way relaychannel are based on strategies like decode-and-forward,compress-and-forward, and amplify-and-forward [23]–[29].The capacity region of the two-way half-duplex relay channel,

Manuscript received October 15, 2014; revised May 19, 2015; acceptedAugust 15, 2015. Date of publication September 14, 2015; date of currentversion October 16, 2015. This work was supported in part by the U.S.National Science Foundation under Grant CIF1064575 and in part by theOffice of Naval Research under Grant N000141210043. This paper waspresented in part at the 2015 International Symposium on Information Theory.

M. Ashraphijuo and X. Wang are with the Electrical EngineeringDepartment, Columbia University, New York, NY 10027 USA (e-mail:[email protected]; [email protected]).

V. Aggarwal is with the School of Industrial Engineering, Purdue University,West Lafayette, IN 47907 USA (e-mail: [email protected]).

Communicated by S.-Y. Chung, Associate Editor for Shannon Theory.Color versions of one or more of the figures in this paper are available

online at http://ieeexplore.ieee.org.Digital Object Identifier 10.1109/TIT.2015.2478461

where the relay decodes the message is characterized in [30].Network coding type techniques have been proposed [31]–[33]in order to improve the transmission rate. While inferior totraditional routing at low signal-to-noise-ratios (SNR), it wasshown that network coding achieves twice the rate of routing athigh SNR [34]. The authors of [14] considered the half-duplextwo-way relay channel with unit channel gains, and found thata combination of a decode-and-forward strategy using latticecodes and a joint decoding strategy is asymptotically optimalat high SNR. The authors of [23] and [35] studied the capacityof the full-duplex two-way relay channel with two users andone relay, and found that a rate within three bits for each userto the capacity can be simultaneously achieved by both users.The result was further extended in [13] and [36], where latticecodes were used to bring the gap down from three bits to onebit for some special case of channel gains.

The diamond channel was first introduced in [37], andconsists of one transmitter, two relays and a receiver.In this paper, we study the capacity of the full-duplextwo-way diamond channel. In [38], several techniques, i.e.,amplify-and-forward, hybrid decode-amplify-and-forwardwith linear combination, hybrid decode-amplify-and-forwardwith multiplexed coding, decode-and-forward, and partialdecode-and-forward, have been considered for achievabilityin a Gaussian diamond reciprocal channel with half-duplexnodes, and it is shown that these techniques achieve DoFof at most 1, 0.25, 0.25, 0.25, and 0.75, respectively. Thetwo-way half-duplex K -relay channel has been studied usingthe amplify-and-forward strategy at the relays [39]–[42].

The design of relay beamformers based on minimizing thetransmit power subject to the received signal-to-noise ratioconstraints was considered in [42]. Furthermore, achievabilityschemes using time-sharing are investigated in [43] for a sym-metric reciprocal diamond channel with half-duplex nodes andthe inner and outer bounds are compared using simulations.However, we show that the achievability scheme in [43] hasan unbounded gap from the capacity. We note that, to the bestof our knowledge, none of the prior works gave a capacityachieving strategy for a two-way diamond channel.

In this paper, we consider a linear deterministic modelwhich was proposed in [44], and has been shown to leadto approximate capacity results for Gaussian channelsin [23] and [45]–[53]. We study the capacity region of atwo-way linear deterministic diamond channel where theforward and the backward channel gains are not necessarilythe same. We find that the capacity in each direction can besimultaneously achieved. Thus, each user can transmit at a

0018-9448 © 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Page 2: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

ASHRAPHIJUO et al.: ON THE CAPACITY REGIONS OF TWO-WAY DIAMOND CHANNELS 6061

rate which is not affected by the fact that the relays receivethe superposition of the signals.

In order to achieve the capacity in each direction separately,we develop new transmission strategies by the transmittersand the relays. The random coding approach in [44] needsmultiple rounds of transmission to the relay before the relaydecides on the transmit signals, and is optimal as the numberof transmission rounds goes to infinity. However, the proposeddeterministic strategy only need one shot of reception at therelays before their transmission. The deterministic strategyis constructive and give more intuitions as compared to arandom coding strategy which is nonconstructive. We alsonote that for one-way relay networks, deterministic strategieslike compress-forward, decode-forward have been shown toachieve better constant gap results for Gaussian channel ascompared to random coding schemes [54], [55]. For the specialcase when the diamond channel reduces to a two-way relaychannel (channel gains to and from one of the relays arezeros), our proposed strategy reduces to a reverse amplify-and-forward strategy, where the relay reverses the order of thereceived signals to form the transmitted signal. The proposedstrategy in this case is different from the one in [23] fortwo-way relay channels, since the relay strategy in [23]depends on the channel parameters, while ours simply reversesthe order of the input. On the other hand, the transmissionstrategy at the source nodes in our approach is dependent onthe channel parameters unlike that in [23]. Thus, the proposedstrategy in this paper makes the relay strategy simpler bycompensating in the transmission strategy at the source nodes.This proposed simple relay strategy leads to a novel strategyfor Gaussian channels. Thus, we extend the achievabilityscheme to Gaussian channels, and obtain a simpler approachto achieving capacity for a two-way relay channel comparedwith that in [13] and [36].

The authors of [56] found the capacity of a one-hoptwo-way communication channel. However, the presence ofrelays bring in new challenges since relay receives the super-position of incoming signals and the optimal transmissionstrategy has to be designed. As a matter of fact, there arealso many efforts of combining the random and lattice codesfor two-way channels and relay networks, for example, thecoding schemes in [57] and [58].

For a general two-way diamond channel, we give differentstrategies based on the parameters of both the forward andbackward channels. Depending on the forward and backwardchannel gains we consider four cases; these cases are furthersubdivided. Two special cases are Cases 3.1.2 and 4.1.2.Our first main result is that if neither the forward, nor thebackward channel is of one of these two cases, then ourproposed reverse amplify-and-forward strategy at the relaysis optimal.

We next consider the case that exactly one of the forwardand backward channels is of Case 3.1.2 or 4.1.2. Without lossof generality, we assume that the forward channel is of oneof the two mentioned cases. For each of these two cases, wegive four new strategies at the relay which involve variousmodifications to the reverse amplify-and-forward strategy,such as repeating some of the streams on multiple levels or

changing the order of transmission at some levels at one of therelays. Furthermore, the transmission strategy for the forwarddirection is rather straightforward by simply sending on thethe least significant bits. We show that all these modifiedstrategies achieve the capacity in the forward direction. Thechoice of the strategies then depends on the parameters inthe backward direction. We show that for each case of thebackward channel, at least one of the four proposed strategiesachieves the capacity for the backward direction. Finally, thecase when both the forward and backward channels are ofCase 3.1.2 or 4.1.2 is considered. Here, a modified form of therelay strategies proposed above is used to achieve the capacityin both directions.

As an extension to the Gaussian model, first we consider thegeneral Gaussian two-way relay channel and show that the pro-posed achievability scheme leads to a smaller gap to the cut-setouter bound compared to the previous works [23]. Noting thatthe treatment for linear deterministic model involves manycases, extending all of the cases of deterministic channel tothe Gaussian channel model is challenging. Thus, we considera special case where the forward and backward channels areGaussian versions of Case 1 in the linear deterministic model.We take the symmetric case where channel gains from thenodes to each relay are equal and also channel gains from eachrelay to the nodes are equal. For this special case, under certainconditions, we obtain the achievable rate of each directionthat is within four bits of the capacity. The achievabilityscheme employs lattice codes, and is the first leading to anapproximate capacity result for two-way diamond channels.

The remainder of this paper is organized as follows.Section II introduces the model of a two-way lineardeterministic diamond channel and presents the main capacityresult that shows the capacity for each direction can beachieved. Sections III, IV and V present the proofs for variouscases of the channel parameters. Sections VI introduces themodel of a two-way Gaussian diamond channel and describesour results on the capacity regions. The results includeachieving the capacity within one bit for each direction in thetwo-way relay channel (if the upper-bound for two directionsare equal) and otherwise achieving the capacity within one bitfor the direction with the lower upper-bound and withintwo bits for the other direction. The results also includeachieving the capacity within four bits for each direction inthe special case of two-way diamond channel. Section VIIconcludes the paper. The detailed proofs of various results inSections III and IV are given in Appendices A-C.

II. CAPACITY REGION OF DETERMINISTIC

TWO-WAY DIAMOND CHANNEL

A. Deterministic Two-Way Diamond Channel Model

The linear deterministic channel model was proposed in [44]to focus on signal interactions instead of the additive noise,and to obtain insights for the Gaussian channel. As shownin Figure 1, a two-way diamond channel consists of two nodes(denoted by A and B) who wish to communicate to each otherthrough two relays (denoted by R1 and R2). We use non-negative integers n Ak , nBk , nk A , and nk B , to represent the

Page 3: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

6062 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015

Fig. 1. A deterministic two-way diamond channel.

channel gains from node A to Rk , node B to Rk , Rk to node A,and Rk to node B , respectively, for k ∈ {1, 2}. In this paper,the links in the direction from A to B are said to be in theforward direction and those from B to A are in the backwarddirection. We assume that all the nodes know the channel gainsof all the links.

Let us define qAR � maxk{n Ak}, qR B � maxk{nk B },qB R � maxk{nBk}, qR A � maxk{nk A}, q I

k � max{n Ak , nBk},and q O

k � max{nk A, nk B } for k ∈ {1, 2}. Furthermore, denotethe channel input at transmitter u, for u ∈ {A, B}, at time ias Xu,i = [Xqu R

u,i , · · · , X2u,i , X1

u,i ]T ∈ F2qu R , such that X1

u,iand Xqu R

u,i represent the least and the most significant bits ofthe transmitted signal, respectively. Also, we define X R

uk,i =[Xqu R

u,i , · · · , Xqu R−nuk+2u,i , Xqu R−nuk+1

u,i , 0, ..., 0︸ ︷︷ ︸

q Ik −nuk

]T , for k ∈ {1, 2}.

At each time i , the received signal at Rk is given by

Yk,i = Dq I

k −n Ak

q Ik

X RAk,i + D

q Ik −nBk

q Ik

X RBk,i mod 2, (1)

where Dq Ik

is a q Ik × q I

k shift matrix as [44, eq. (9)]. Also

if we have Yk,i = [Y q Ik

k,i , · · · , Y 2k,i , Y 1

k,i ]T , define Vk,i =[0, · · · , 0, Y

min(q Ik ,q O

k )

k,i , · · · , Y 2k,i , Y 1

k,i ]T , for k ∈ {1, 2}, wherethe first (q O

k − q Ik )+ elements of Vk,i are zero.

Furthermore, define Tk,i � fk,i (Vk,1, ..., Vk,i−1) where

fk,i :(

Rq Ok

)i−1 → Rq Ok is a function at Rk which converts

Vk,1, ..., Vk,i−1 to the output signal at time i . We represent

Tk,i ’s elements as Tk,i =[

T 1k,i , T 2

k,i , · · · , Tq O

kk,i

]T

. Also, we

define T ′ku,i = [T 1

k,i , T 2k,i , · · · , T nku

k,i , 0, ..., 0︸ ︷︷ ︸

qRu−nku

]T for u ∈ {A, B}.

At each time i , the received signal at the receivers u ∈ {A, B}is given by

Yu,i =2

k=1

DqRu−nkuqRu T ′

ku,i mod 2. (2)

Source u picks a message Wu that it wishes to communi-cate to u (u, u ∈ {A, B}, u �= u), and transmits signal

at each time i which is a function of Wu and Y i−1u =

{Yu,i−1, Yu,i−2, ..., Yu,1}. Each destination u uses a decoder,which is a mapping gu : Rm × |Wu | → {1, ..., |Wu |} fromthe m received signals and the message at the receiver tothe source message indices (|Wu | is the number of messagesof node u that can be chosen). We say that the rate pair(RA � log |WA|

m , RB � log |WB |m ) is achievable if the probability

of error in decoding both messages by their correspondingdestinations can be made arbitrarily close to 0 as m → ∞.The capacity region is the convex hull of all the achievablerate pairs (RA, RB).

B. Capacity of Two-Way Linear DeterministicDiamond Channel

In this subsection, we state the main result that the cut-set bound for the diamond channel in each direction can besimultaneously achieved, thus giving the capacity region forthe two-way linear deterministic diamond channel. It can beseen from Figure 1 that max{n A1, n A2} and max{n1B, n2B}are cut-set bounds on the transmissions from A and to B ,respectively. Moreover, n A1 + n2B and n A2 + n1B are cut-set bounds on the sum of the two paths for the transmissionfrom A to B . The same observation can be made for the otherdirection.

Theorem 1: For the two-way linear deterministic diamondchannel, the capacity region is given as follows:

RA ≤ CAB � min{max{n A1, n A2}, max{n1B, n2B},n A1 + n2B , n A2 + n1B}, (3)

RB ≤ CB A � min{max{nB1, nB2}, max{n1A, n2A},nB1 + n2A, nB2 + n1A}. (4)

We note that the outer-bound is the cut-set bound, and thusthe proof is straightforward. We will prove the achievabilityof the rate pair (CAB , CB A).

We consider four main cases and several subcases depend-ing on the forward channel parameters as follows.

Case 1: CAB = n A2 + n1B .Case 2: CAB = n A1 + n2B .Case 3: CAB = max{n A1, n A2}. We call it Type 1, if

max{n A1, n A2} = n A1, and Type 2 otherwise. For Type i,where i, j ∈ {1, 2}, i �= j , we have:

Case 3.1: ni B < CAB . We divide it into two sub-cases:Case 3.1.1: n j B ≥ n Aj + ni B .Case 3.1.2: n j B < n Aj + ni B .

Case 3.2: ni B ≥ CAB .Case 4: CAB = max{n1B, n2B} We call it Type 1, if

max{n1B, n2B} = n1B , and Type 2 otherwise. For Type i,where i, j ∈ {1, 2}, i �= j , we have:

Case 4.1: n Ai < CAB . We divide it into two sub-cases:Case 4.1.1: n Aj ≥ n j B + n Ai .Case 4.1.2: n Aj < n j B + n Ai .

Case 4.2: n Ai ≥ CAB .Similarly we divide the backward channel into four main

cases and several subcases where the case definition isobtained by interchanging A and B in the forward directioncases. For instance, Case 1 in the backward direction isCB A = nB2 + n1A.

Page 4: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

ASHRAPHIJUO et al.: ON THE CAPACITY REGIONS OF TWO-WAY DIAMOND CHANNELS 6063

Fig. 2. Reverse amplify-and-forward as a two-way relay function.

We divide the proof into three parts, depending on the casesin which forward and backward channel gain parameters lie.The first part is when neither the forward channel nor thebackward channel is of Case 3.1.2 or 4.1.2 (Section III). Thesecond part is when exactly one of the forward and backwardchannels is of Case 3.1.2 or 4.1.2 (Section IV). And finallythe third part is when both the forward and backward channelsare of Case 3.1.2 or 4.1.2 (Section V).

III. NEITHER THE FORWARD CHANNEL NOR BACKWARD

CHANNEL IS OF CASE 3.1.2 OR 4.1.2

In this scenario, we use a reverse amplify-and-forwardstrategy at the relays to achieve the rate pair (CAB , CB A).Assume a particular relay (say Ri ) gets n Ai levels from node Aand nBi levels from node B and transmits q O

i levels, as shownin Figure 2 for n Ai = 3, nBi = 6, and q O

i = 7. It receives

YA1 = [

an Ai , ..., a1]T from node A and YB1 = [

bnBi , ..., b1]T

from node B . Then it sends out the following signal tonodes A and B

X Ri =

a1...

amin(n Ai , q Oi )

0(q Oi −n Ai )+

+

b1...

bmin(nBi , q Oi )

0(q Oi −nBi )+

mod 2. (5)

We call this relay strategy “Relay Strategy 0” (also calledreverse amplify-and-forward). We will keep the strategy at therelays the same, and use different strategies for different casesfor transmission at nodes A and B . Since we need to show thatthe rate pair (CAB , CB A) is achievable, it is enough to showthat there is a transmission strategy for node A such that withthe above relay strategy, node B is able to decode the data in aone-way diamond channel because any interference by node Bon the received signal can be canceled by node B whichknows the interfering signal (Showing it for one direction isenough since the same arguments hold for the other). Thus,we only consider one-way diamond channel for this case.We further consider the case when n A1, n A2, n1B , n2B > 0since otherwise the diamond channel reduces to a relay chan-nel or no connection between the nodes A and B , and in bothcases it is easy to see that node A sending CAB bits on thelowest levels achieves this rate in the forward direction.

Appendix A proves that there is a transmission strategy foreach of the cases (except for Case 3.1.2 or 4.1.2) such that theabove relay strategy achieves the capacity of one-way diamondchannel.

Example 1: Consider the case (n A1, n A2, n1B , n2B , nB1,nB2, n1A, n2A) = (6, 2, 3, 7, 6, 3, 4, 8). With these parameters,the forward channel is of Case 1, and the backward channelis of Case 3.1.1 Type 1. We use the transmission strategiescorresponding to these cases given in Appendix A, and shownin Figure 3 that the desired messages can be decoded by bothnodes A and B.

Remark 1: It can be seen that performing a reverse amplify-and-forward for Cases 3.1.2 and 4.1.2 does not simply givean optimal strategy, and thus we separate these cases tofind optimal strategies when at least one of the forward orbackward channels is of Cases 3.1.2 or 4.1.2.

IV. EXACTLY ONE OF THE FORWARD AND BACKWARD

CHANNELS IS OF CASE 3.1.2 OR 4.1.2

We assume that the forward channel is of Case 3.1.2 or 4.1.2without loss of generality. The other case where the backwardchannel is of Case 3.1.2 or 4.1.2 can be proven symmetrically.Since we need to show that the rate pair (CAB , CB A) is achiev-able, we will describe a few relay strategies for which the sametransmission strategy is used at node A such that node Bis able to decode the corresponding message. Furthermore,we will show that at least one of these strategies is optimalfor the backward channel for each case of the backwardchannel parameters. As before we consider the case whenn A1, n A2, n1B , n2B > 0. In the remainder of this section, weassume that the forward channel is of Case 3.1.2. The case thatthe forward channel is of Case 4.1.2 is treated in Appendix C.

When the forward channel is of Case 3.1.2, node A uses thesame transmission strategy as Case 3.1.1 in Appendix A, i.e.,

it transmits [aCAB , ..., a1]T . Also, the transmission strategy fornode B depends on the channel gains in the backward directionof the channel, and is the same as that used in Appendix Afor each set of parameters.

For the relay strategy, we will choose one of the four strate-gies explained in the following depending on the backward

Page 5: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

6064 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015

Fig. 3. Example for (n A1, n A2, n1B , n2B , nB1, nB2, n1A, n2A) = (6, 2, 3, 7, 6, 3, 4, 8). (a) Transmission to relays. (b) Reception from relays.

Fig. 4. An example that Relay Strategy 0 does not work.

channel parameters. We will prove that all of these strategiesare optimal for the forward channel for any set of parameters.

The parameters associated with each relay strategy proposedhere are only based on the forward channel gains, and we willshow that at least one of the proposed strategies is optimalfor each choice of the backward channel parameters. Notethat using Relay Strategy 0 in both relays, node B cannotnecessarily decode the message if the forward channel is ofCase 3.1.2 or 4.1.2, when the above transmission strategy isused by node A. An example is illustrated in Figure 4 whenthe forward channel is of Case 3.1.2 and the parameters aren A1 = 4, n A2 = 3, n1B = 3 and n2B = 5.

Remark 2: All relay strategies in this subsection and inAppendix C are defined with respect to the forward channelparameters (and in favor of the forward channel direction)1

because we assumed that the forward channel is either ofCase 3.1.2 or 4.1.2 and the backward channel is not of thesecases. We note that Relay Strategy 0 is symmetric and is notdependent on the channel gains in any direction. In Section V,we will generalize some of these strategies to be based on theparameters of both the forward and the backward channels.

A. Relay Strategy 1

Assume that the forward channel is of Case 3.1.2 Type i ,Relay Strategy 0 is used at Ri , and Relay Strategy 1 is used

1In the sense that the strategies are designed so that the forward communi-cation achieves the capacity.

Fig. 5. Relay Strategy 1 at R2.

at Ri , where i, i ∈ {1, 2}, i �= i . Here, we define RelayStrategy 1 at R2 (forward channel of Case 3.1.2 Type 1), whilethat for R1 can be obtained by interchanging roles of relaysR1 and R2 (interchanging 1 and 2 and forward channel ofCase 3.1.2 Type 2). As shown in Figure 5, if R2 receives ablock of n A2 bits, first it adds n2B − n A2 zero bits aheadof the n A2 bits, and then reverses the whole n2B bits asin Relay Strategy 0 and then changes the order of the firstn1B − (n A1 − n A2) streams2 with the next n A1 − n1B streams.We assume that [kmax{n Ai ,nBi }, . . . , k1] are the received signalsat relay i which is a superposition of the signals from thetwo transmitters with appropriate shifts.

Node A transmits [aCAB , ..., a1]T . The received signals canbe seen in Figure 6. We use (Ri , B j ) to denote block number jfrom Ri . Bits that are not delivered to node B from R1using Relay Strategy 0, (an1B+1, ..., an A1 ), are all sent at thehighest levels from R2 to node B and thus are decodedwith no interference (block (R2, B1)). The remaining bits canbe decoded by starting from the lowest level of receptionin B (an1B in block (R1, B4)) and removing the effect of thedecoded bits and going up.

Also, in case that n A1 = n A2 = n2B , since there are similartransmissions from the relays, R1 does not transmit anythingto avoid signal cancellation.

2In the following relay strategies, we divide the streams into multiplesub-streams. The number of streams in each sub-stream is a non-negativenumber when the forward channel is of Case 3.1.2 Type 1.

Page 6: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

ASHRAPHIJUO et al.: ON THE CAPACITY REGIONS OF TWO-WAY DIAMOND CHANNELS 6065

Fig. 6. Received signals by using Relay Strategy 1 when the forward channel is of Case 3.1.2 Type 1.

Fig. 7. Example for (n A1, n A2, n1B , n2B , nB1, nB2, n1A, n2A) = (6, 4, 5, 7, 6, 5, 1, 7) using Relay Strategy 1. (a) Transmission to relays. (b) Receptionfrom relays.

Example 2: Consider the case (n A1, n A2, n1B, n2B , nB1,nB2, n1A, n2A) = (6, 4, 5, 7, 6, 5, 1, 7). With these parame-ters, the forward channel is of Case 3.1.2 Type 1, and thebackward channel is of Case 3.1.1 Type 1. For the backwardchannel, we use the transmission strategy corresponding toCase 3.1.1 given in Appendix A (transmit [bCB A , · · · , b1]T )and for the forward channel, we transmit [aCAB , ..., a1]T ,as explained at the beginning of this section. Also, R1 usesRelay Strategy 0, and R2 uses Relay Strategy 1. Figure 7illustrates that the desired messages can be decoded by bothnodes A and B.

B. Relay Strategy 2

Assume that the forward channel is of Case 3.1.2 Type i ,Relay Strategy 0 is used at Ri , and Relay Strategy 2 is

used at Ri , where i, i ∈ {1, 2}, i �= i . Here, we defineRelay Strategy 2 at R2 (forward channel of Case 3.1.2 Type 1),while that for R1 can be obtained by interchanging rolesof R1 and R2 (interchanging 1 and 2 and forward channel ofCase 3.1.2 Type 2). It is similar to Relay Strategy 0 with theonly difference that R2 repeats a part of the top n A2 streamsafter reverse-amplify-and-forward, as explained below innine separate scenarios, based on the parameters of the forwardchannel. We note that the repetition of streams is based onthe received signal at the relay. However, we describe belowonly the forward direction to show that the messages can bedecoded.

As shown in Figure 8, we define the partition of thefour-dimensional space (n A1, n A2, n1B, n2B) into nine partsthat lead to different received signal structures in node B ,

Page 7: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

6066 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015

Fig. 8. Dividing the 4-dimensional space consisting of (n A1, n A2, n1B , n2B )into nine subspaces.

as shown in Figures 9-34, respectively. Specifically,

{u1, u2} = {n2B + (n A1 − n A2) ≤ n A2 + n1B, n A2

+ n1B < n2B + (n A1 − n A2)} (6)

{v1, v2, v3, v4}= {n1B ≤ (n A1 − n A2) + (n2B − n1B), n1B

− (n A1 − n A2) ≤ (n A1 − n A2)

+ (n2B − n1B) < n1B, n A2 − (n2B − n1B)

≤ (n A1 − n A2) + (n2B − n1B) < n1B

−(n A1 − n A2), (n A1 − n A2) + (n2B − n1B)

< n A2 − (n2B − n1B)} (7)

{w1, w2} = {n1B − (n A1 − n A2) ≤ n2B − n1B, n1B

−(n A1 − n A2) > n2B − n1B} (8)

{r1, r2} = {2(2(n1B − n2B + n A2) − n A1) + n2B − n A1

≤ 2n A2 − n A1 + n1B − n2B,

2(2(n1B − n2B + n A2) − n A1) + n2B − n A1

> 2n A2 − n A1 + n1B − n2B} (9)

{s1, s2, s3} = {n A1−n A2 ≥ n1B − 2(n A1−n A2 + n2B − n1B),

n2B − n A2 ≥n1B −2(n A1−n A2+ n2B −n1B)

> n A1 − n A2, n1B − 2(n A1 − n A2+n2B − n1B)

> n2B − n A2}. (10)

We present the first case from Figure 8 here and leave therest to Appendix B.

(u1, v1): Figure 9 depicts the received signal at node B(ignoring the effect of transmitted signal from B) assumingthat both relays use Relay Strategy 0. The repetitions will bedescribed below to show that messages can be decoded withthe proposed strategies.

Fig. 9. The received signals at node B (ignoring the effect of transmittedsignal from B) assuming that both relays use Relay Strategy 0 for channelparameters of case (u1, v1).

R2 repeats the streams in block (R2, B2) on block (R2, B4).Using this strategy, block (R2, B1) will be decoded fromthe top levels of the received signal from R2 since thereis no interference from the other relay. Then, subtractthe corresponding signals (blocks (R1, B3) and (R1, B4)).Furthermore, block (R2, B4) can be decoded from repetitionsbecause their interference is already decoded. Then, subtractthe corresponding signals (block (R2, B2)). Consequently,block (R1, B2) are decoded because their interference(block (R2, B2)) was decoded earlier. Finally, block (R2, B3)can be decoded because all its interference signals have beendecoded.

Remark 3: In all cases above, we can see that for every Vstreams that we want to repeat, there are V + (n2B − n A1)empty spots available, which makes it flexible to placethe V streams.

Example 3: Consider the case (n A1, n A2, n1B , n2B , nB1,nB2, n1A, n2A) = (6, 4, 5, 7, 6, 3, 6, 4). With these parameters,the forward channel is of Case 3.1.2 Type 1, and the backwardchannel is of Case 1. We use the transmission strategy fornode B for Case 1 given in Appendix A for the backwardchannel and transmit [aCAB , ..., a1]T for the forward channel.Also, R1 uses Relay Strategy 0, and R2 uses Relay Strategy 2.The desired messages can be decoded by both nodes A and B,as illustrated in Figure 10.

Remark 4: For (u1, v3) and (u1, v4, r2, s2) Relay Strategy 2is equivalent to Relay Strategy 0. An example is depictedin Figure 11 where (n A1, n A2, n1B , n2B) = (10, 8, 7, 10)(Case 3.1.2 Type 1, (u1, v3)).

C. Relay Strategy 3

Assume that the forward channel is of Case 3.1.2 Type i ,Relay Strategy 0 is used at Ri , and Relay Strategy 3 is used

Page 8: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

ASHRAPHIJUO et al.: ON THE CAPACITY REGIONS OF TWO-WAY DIAMOND CHANNELS 6067

Fig. 10. Example for (n A1, n A2, n1B , n2B , nB1, nB2, n1A, n2A) = (6, 4, 5, 7, 6, 3, 6, 4) using Relay Strategy 2. (a) Transmission to relays. (b) Receptionfrom relays.

Fig. 11. An example of the Case 3.1.2 that can be decoded by using RelayStrategy 0 at both relays.

at Ri , where i, i ∈ {1, 2}, i �= i . Here, we define RelayStrategy 3 at R2 (forward channel of Case 3.1.2 Type 1), whilethat for R1 can be obtained by interchanging roles of relaysR1 and R2 (interchanging 1 and 2 and forward channel ofCase 3.1.2 Type 2). As shown in Figure 12, if R2 receivesa block of n2B bits, first it will reverse them as in RelayStrategy 0 and then changes the order of the n A2 −(n2B −n1B)streams right after the first n2B − n1B streams, with thefollowing n2B − n A2 streams.

Node A transmits [aCAB , ..., a1]T . The received signals canbe seen in Figure 13. The block (R2, B1) will be decodedfrom the top levels of the received signal from R2 withoutany interference from R1. We then subtract the correspondingsignals in blocks (R1, B3) and (R1, B4). Also, bits that werenot delivered to node B from R2 using Relay Strategy 0,(a1, ..., an A1−n A2 ), are decoded from block (R1, B2) withoutany interference. The remaining bits can be decoded by start-ing from the highest remaining level (a(n A1−n A2)+(n2B−n1B )+1in block (R2, B4)) and removing the effect of the decoded bits.

Example 4: Consider the case (n A1, n A2, n1B, n2B , nB1,nB2, n1A, n2A) = (6, 4, 6, 5, 5, 7, 6, 7). With these parameters,the forward channel is of Case 3.1.2 Type 1, and the backward

Fig. 12. Relay Strategy 3 at R2.

channel is of Case 3.2 Type 1. We use the transmissionstrategy for the backward channel corresponding to this casegiven in Appendix A (transmit [bCB A , · · · , b1]T ) and trans-mit [aCAB , ..., a1]T for the forward channel. Also, R1 usesRelay Strategy 0, and R2 uses Relay Strategy 3. Figure 14illustrates that the desired messages can be decoded by bothnodes A and B.

D. Relay Strategy 4

Assume that the forward channel is of Case 3.1.2 Type i ,Relay Strategy 0 is used at Ri , where i, i ∈ {1, 2}, i �= i ,and Relay Strategy 4 is used at Ri . Here, we define RelayStrategy 4 at R1 (forward channel of Case 3.1.2 Type 1),while that for R2 can be obtained by interchanging roles ofR1 and R2 (interchanging 1 and 2 and forward channel ofCase 3.1.2 Type 2). As shown in Figure 15, if R1 receivesa block of n1B bits, first it will reverse them as in RelayStrategy 0 and then changes the order of the first n A1 − n A2streams with the next n1B − (n A1 − n A2) streams.

Node A transmits [aCAB , ..., a1]T . The received signals canbe seen in Figure 16. Bits that are not delivered to node Bfrom R2 using Relay Strategy 0 in the block (R1, B4) aredecoded without any interference. The remaining bits can bedecoded by starting from the highest level (an A1−n A2+1 inblock (R2, B1)) and removing the effect of the decoded bits.

Page 9: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

6068 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015

Fig. 13. Received signals by using Relay Strategy 3 when the forward channel is of Case 3.1.2 Type 1.

Fig. 14. Example for (n A1, n A2, n1B , n2B , nB1, nB2, n1A, n2A) = (6, 4, 6, 5, 5, 7, 6, 7) using Relay Strategy 3. (a) Transmission to relays. (b) Receptionfrom relays.

Fig. 15. Relay Strategy 4 at R1.

Example 5: Consider the case (n A1, n A2, n1B, n2B , nB1,nB2, n1A, n2A) = (6, 4, 6, 5, 5, 7, 6, 7). With these parameters,the forward channel is of Case 3.1.2 Type 1, and the backwardchannel is of Case 4.2 Type 1. We use the transmissionstrategy for the backward channel corresponding to this casegiven in Appendix A and transmit [aCAB , ..., a1]T for the

forward channel. Also, R2 uses Relay Strategy 0, and R1 usesRelay Strategy 4. Figure 17 illustrates that the desiredmessages can be decoded by both nodes A and B.

E. Achieving the Optimum Rate

Now we explain how the above mentioned strategies achievethe optimal rate for any set of parameters on the backwardchannel.

1. Backward channel is of Case 1:• Forward channel is of Case 3.1.2 Type 1: If n A2 > nB2,

we use Relay Strategy 2 at R2 and Relay Strategy 0at R1. Otherwise use Relay Strategy 1 at R2 andRelay Strategy 0 at R1. Figure 18 shows the backwardchannel when the forward channel is of Case 3.1.2Type 1. If n A2 > nB2, R2 repeats from the streamsthat are already decoded from the highest levels

Page 10: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

ASHRAPHIJUO et al.: ON THE CAPACITY REGIONS OF TWO-WAY DIAMOND CHANNELS 6069

Fig. 16. Received signals by using Relay Strategy 4 when the forward channel is of Case 3.1.2 Type 1.

Fig. 17. Example for (n A1, n A2, n1B , n2B , nB1, nB2, n1A, n2A) = (6, 4, 5, 7, 7, 2, 6, 4) using Relay Strategy 4. (a) Transmission to relays. (b) Receptionfrom relays.

received in A, ((bn1A+1, ..., bn1A+nB2 ) in green inFigure 18) on the lower levels, and otherwise it justchanges the order of some of the equations at thehighest levels received in A, ((bn1A+1, ..., bn1A+nB2)in green in Figure 18), which does not affect thedecoding.

• Forward channel is of Case 3.1.2 Type 2: If n A1 > n1A,we use Relay Strategy 2 at R1 and Relay Strategy 0 at R2.Otherwise use Relay Strategy 1 at R1 and RelayStrategy 0 at R2. If n A1 > n1A, R1 repeats from thestreams (b1, ..., bn1A ) received below the noise levelin A, and otherwise it just changes the order of some ofthe equations (b1, ..., bn1A ).

2. Backward channel is of Case 2:• Forward channel is of Case 3.1.2 Type 1: If n A2 > n2A,

we use Relay Strategy 1 at R2 and Relay Strategy 0 at R1.

Otherwise use Relay Strategy 2 at R2 and Relay Strat-egy 0 at R1. If n A2 > n2A, R2 repeats from thestreams (b1, ..., bn2A ) received below the noise level in A,and otherwise it just changes the order of some of theequations (b1, ..., bn2A ).

• Forward channel is of Case 3.1.2 Type 2: If n A1 > nB1,we use Relay Strategy 2 at R1 and Relay Strategy 0 at R2.Otherwise use Relay Strategy 1 at R1 and Relay Strat-egy 0 at R2. If n A1 > nB1, R1 repeats from the streamsthat are already decoded from the highest levels receivedin A, (bn2A+1, ..., bn2A+nB1 ), on the lower levels, and oth-erwise it just changes the order of some of the equationsat the highest levels received in A, (bn2A+1, ..., bn2A+nB1 ).

3. Backward channel is of Case 3.1.1: We assume thatthe backward channel is Type 1. For Type 2 the argumentis similar.

Page 11: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

6070 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015

Fig. 18. Backward channel (Case 1) when forward channel is of Case 3.1.2 Type 1.

• Forward channel is of Case 3.1.2 Type 1: If n A2 > nB2,we use Relay Strategy 2 at R2 and Relay Strategy 0at R1. Otherwise use Relay Strategy 1 at R2 and RelayStrategy 0 at R1. If n A2 > nB2, R2 repeats fromthe streams that are already decoded from the highestlevels received in A, (bnB1−nB2+1, ..., bnB1 ), on the lowerlevels, and otherwise it just changes the order of someof the equations at the highest levels received in A,(bnB1−nB2+1, ..., bnB1 ).

• Forward channel is of Case 3.1.2 Type 2: If n A1 > nB1,we use Relay Strategy 2 at R1 and Relay Strategy 0 at R2.Otherwise use Relay Strategy 1 at R1 and RelayStrategy 0 at R2. If n A1 > nB1, R1 repeats from thestreams (b1, ..., bn1A ) received below the noise level in A,and otherwise it just changes the order of some of theequations (b1, ..., bn1A ).

4. Backward channel is of Case 4.1.1: We assume thatthe backward channel is Type 1. For Type 2 the argumentis similar.

• Forward channel is of Case 3.1.2 Type 1: If n A2 > n2A,we use Relay Strategy 2 at R2 and Relay Strategy 0 at R1.Otherwise use Relay Strategy 1 at R2 and RelayStrategy 0 at R1. If n A2 > n2A , R2 repeats from thestreams (b1, ..., bn2A ) received below the noise level in A,and otherwise it just changes the order of some of theequations (b1, ..., bn2A ).

• Forward channel is of Case 3.1.2 Type 2: If n A1 >n1A − n2A, we use Relay Strategy 2 at R1 and RelayStrategy 0 at R2. Otherwise use Relay Strategy 1 atR1 and Relay Strategy 0 at R2. If n A1 > n1A − n2A,

R1 repeats from the streams that are already decoded fromthe highest levels received in A, (bn2A+1, ..., bn1A ), on thelower levels, and otherwise it just changes the order ofsome of the equations at the highest levels received in A,(bn2A+1, ..., bn1A ).

5. Backward channel is of Case 3.2: We assume that thebackward channel is Type 1. For Type 2 the argument issimilar.

• Forward channel is of Case 3.1.2 Type 1: We use RelayStrategy 1 at R2 and Relay Strategy 0 at R1 orRelay Strategy 2 at R2 and Relay Strategy 0 at R1 orRelay Strategy 3 at R2 and Relay Strategy 0 at R1.

• Forward channel is of Case 3.1.2 Type 2: We use RelayStrategy 4 at R2 and Relay Strategy 0 at R1.

6. Backward channel is of Case 4.2: We assume that thebackward channel is Type 1. For Type 2 the argument issimilar.

• Forward channel is of Case 3.1.2 Type 1: We use RelayStrategy 1 at R2 and Relay Strategy 0 at R1 or RelayStrategy 2 at R2 and Relay Strategy 0 at R1 orRelay Strategy 3 at R2 and Relay Strategy 0 at R1.

• Forward channel is of Case 3.1.2 Type 2: We use RelayStrategy 4 at R2 and Relay Strategy 0 at R1.

For the case that forward channel is of Case 4.1.2, the proofis given in Appendix C. An essential difference compared toCase 3.1.2 includes the freedom in transmission strategy (thereare more transmission streams at A than the capacity) and nofreedom at the receiver side (number of the reception streamsat B is equal to the capacity) for the forward channel.

Page 12: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

ASHRAPHIJUO et al.: ON THE CAPACITY REGIONS OF TWO-WAY DIAMOND CHANNELS 6071

V. BOTH THE FORWARD AND BACKWARD CHANNELS

ARE EITHER OF CASE 3.1.2 OR 4.1.2

In Section IV and Appendix C, we used Relay Strategy 2 orRelay Strategy 6 as one of the achievability strategies whenthe forward channel is of Case 3.1.2 or 4.1.2, respectively.In this section, we will show that using a modified combi-nation of these strategies achieve the optimal capacity regionwhen both the forward and backward channels are either ofCase 3.1.2 or 4.1.2.

We will define Relay Strategy (mi , ni ) at Ri for i ∈ {1, 2},mi , ni ∈ {0, 2, 6}. If the forward channel is ofCase 3.1.2, at R1, we use m1 = 0 when the forward channelis Type 1 and m1 = 2 otherwise. At R2, we use m2 = 2when the forward channel is Type 1 and m2 = 0 otherwise.If the forward channel is of Case 4.1.2, at R1, we use m1 = 6when the forward channel is Type 1 and m1 = 0 otherwise.At R2, we use m2 = 0 when the forward channel is Type 1and m2 = 6 otherwise. The value of ni is determined the sameway based on the backward channel parameters.

Relay Strategy (mi , 0) at Ri uses Relay Strategy mi at Ri

based on the forward channel parameters, and Relay Strategy(0, ni ) at Ri uses Relay Strategy ni based on the backwardchannel parameters. For the remaining strategies (mi , ni ) ∈{(2, 2), (2, 6), (6, 2), (6, 6)} at Ri , we use the combination ofthe repetitions suggested by Relay Strategies mi based on theforward channel parameters, and ni based on the backwardchannel parameters. If two repetitions that are imposed byRelay Strategies 2 and 6 happen to be at the same level inthe relay, sum of them will be transmitted from the relay(modulo 2). However, there are some modifications to accountfor repetitions adding to zero modulo 2, or multiple repetitionsdue to different strategies at the relays. The modifications aredescribed as follows.

1) If the repetitions happen in the same relay,i.e., m1 = n1 = 0 or m2 = n2 = 0: In case therepetition of a particular signal by both the forward andbackward strategies is suggested at the same level, therelay transmits the repeated signals that are imposedby Relay Strategies 2 and 6, only once. If differentrepeated signals are suggested at a particular level, ittransmits the sum of these two signals modulo two.

2) If the repetitions happen in different relays,i.e., m1 = n2 = 0 or m2 = n1 = 0:

a) In case that the repetitions of some streams fromtwo relays are from the same level and are repeatedon the same level at node B (ignoring the back-ward signal component) Ri skips repetitions at thecorresponding levels if the forward channel is ofCase 4.1.2 Type i and Ri skips repetitions at thecorresponding levels if the forward channel is ofCase 3.1.2 Type i .

b) In case that the repetitions of some streams fromtwo relays are from the same level and are repeatedon the same level at node A (ignoring the forwardsignal component) Ri skips repetitions at the cor-responding levels if the backward channel is ofCase 4.1.2 Type i and Ri skips repetitions at the

corresponding levels if the backward channel is ofCase 3.1.2 Type i .

We use the same transmission strategy as in Section IVfor channel of both Cases 3.1.2 and 4.1.2. When theforward channel is of Case 3.1.2, node A transmits[aCAB , ..., a1]T for the forward channel and when theforward channel is of Case 4.1.2, node A transmits[ 0, ..., 0

︸ ︷︷ ︸

n A1−(n1B−n2B )

, an1B , ..., an2B+1, 0, ..., 0︸ ︷︷ ︸

n A2−(n A1+n2B )

, an2B , ..., a1]T for

the forward channel. Also, similarly, when thebackward channel is of Case 3.1.2, node B transmits[bCB A, ..., b1]T for the backward channel and when thebackward channel is of Case 4.1.2, node B transmits[ 0, ..., 0

︸ ︷︷ ︸

nB1−(n1A−n2A)

, bn1A , ..., bn2A+1, 0, ..., 0︸ ︷︷ ︸

nB2−(nB1+n2A)

, bn2A , ..., b1]T for

the backward channel.For Case 3.1.2 Type 1, all the messages can be decoded

with the same order of decoding similar to the one in RelayStrategy 2 in Section IV based on the partitioning of theparameter space into nine parts as shown in Figure 8. Also forCase 4.1.2 Type 2, all the messages can be decoded with thesame order of decoding similar to the one in Relay Strategy 6in Appendix C based on the partitioning of the parameter spaceinto seven parts as shown in Figure 37. Type 2 cases can beexplained similarly. Here we only discuss one case and omitthe others for brevity.

Case 3.1.2 Type 1 and (u1, v1) in Figure 8: Figure 9depicts the received signal at node B (ignoring the effect oftransmitted signal from B) assuming that both relays use RelayStrategy (0,0).

First, consider the case when two repetitions (imposedby Relay Strategies 2 and 6) happen at different relays,i.e., m1 = n2 = 0. In this case, R2 repeats in favor of theforward channel (uses Relay Strategy (2, 0)) and R1 repeatsin favor of the backward channel (uses Relay Strategy (0, 2)or (0, 6)). Repeating an A1−n A2+1, ..., an1B by R1 in favor ofthe backward channel does not affect the achievability ofthe forward channel because these signals are decoded fromblock (R2, B1). Also, repeating the a1, ..., an A1−n A2 by R1within the top n A1−n A2 streams (i.e., on block (R1, B2)) doesnot affect the decoding since the signals can be decoded fromtop and their effect can be cancelled. Repeating any of thesesignals on the next 2n A2 −n A1 +n1B −n2B lower levels by R1(i.e., on block (R1, B3)) does not affect the decoding becausewe can decode those upper n A1 − n A2 levels (i.e., on block(R1, B2)) first and cancel the effect of the repeated signals.If a1, ..., an A1−n A2 is repeated by R1 on the next lowern2B − n A2 levels (i.e., on block (R1, B4)), in case that therepetitions of some streams from two relays are from the samelevel and are repeated on the same level, R2 does not repeat forthose levels as was explained in the definition of the strategies,so there is no problem in decoding the forward channel. If anyof them is repeated in any lower level by R1 (i.e. below block 4in Figure 9), these are out of range and does not have effecton decoding the forward channel.

Now, take the case that the repetitions in favor of theforward and backward channels both happen in R2, i.e.,(m1, n1) = (0, 0). In this case, R2 repeats in favor

Page 13: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

6072 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015

Fig. 19. Example for (n A1, n A2, n1B , n2B , nB1, nB2, n1A, n2A) = (6, 4, 5, 7, 6, 8, 7, 5). The red part in the transmission from R1 is due to the repeatstrategy for backward channel (b1) and the red part in the transmission from R2 is due to the repeat strategy for forward channel (a2). (a) Transmission torelays. (b) Reception from relays.

of both directions ((m2, n2) ∈ {(2, 2), (2, 6)}) and R1uses Relay Strategy (0, 0), i.e., Relay Strategy 0. Repeat-ing an A1−n A2+1, ..., an A1−n A2+n2B−n1B in favor of the back-ward channel does not affect the achievability of theforward channel because these signals are decoded fromthe top levels of the received signal from the samerelay (i.e., on block (R2, B1)). Also, repeating the signalsan A1−n A2+n2B−n1B+1, ..., a2n A1−2n A2+n2B −n1B within the nexttop n A1 − n A2 streams (i.e., on block (R2, B2)) does notaffect the decoding since the signals can be decoded fromtop and their effect can be cancelled. Repeating any of themon the next 2n A2 − n A1 + n1B − n2B lower levels (i.e.,on block (R2, B3)) does not affect the decoding becausenode B can decode the upper n A1 − n A2 levels (i.e., on block(R2, B2)) first and cancel the effect of the repeated signals.If an A1−n A2+n2B−n1B+1, ..., a2n A1−2n A2+n2B −n1B is repeated onthe next lower n2B − n A2 levels (i.e., on block (R2, B4)),it does not affect the decoding because as it was explained inthe definition of the strategies, in case that the repetitions ofsome streams from two relays are from the same levels and aresupposed to be repeated on the same level, R2 does not repeatfor those levels and repeats those streams only one time. If anyof a2n A1−2n A2+n2B−n1B+1, ..., an A1 is repeated on the next lowern2B −n A2 levels (i.e., on block (R2, B4)), it does not affect thedecoding since the signals can be decoded from top and theireffect can be cancelled. If any of them is repeated in any lowerlevel by R2 (i.e. below block 4 in Figure 9), it is out of rangeand does not have effect on decoding of forward channel.

Example 6: Consider the case (n A1, n A2, n1B ,n2B , nB1, nB2, n1A, n2A) = (6, 4, 5, 7, 6, 8, 7, 5). Withthese parameters, the forward channel is of Case 3.1.2Type 1, and the backward channel is of Case 4.1.2Type 1. A transmits [aCAB , ..., a1]T and B transmits[ 0, ..., 0

︸ ︷︷ ︸

max{nB1,nB2}−CB A

, bCB A , ..., b1]T . Relay R2 uses Relay

Strategy (2,0) and R1 uses Relay Strategy (0,6). See inFigure 19 that the messages can be decoded by bothnodes A and B.

VI. GAUSSIAN DIAMOND CHANNELS

In this section we first present the Gaussian diamondchannel model. Then, we present our results on the capacity

of the two-way Gaussian relay channel and a special case ofthe two-way Gaussian diamond channel.

A. System Model

A two-way Gaussian diamond channel consists oftwo nodes A and B who wish to communicate to each otherthrough two relays R1 and R2. We assume there is no directlink between A and B and between R1 and R2. The channelsare assumed time-invariant and known to all nodes, the channelgains from node i to the R j is denoted by hi j and the channelgain from the R j to node i to is denoted by h j i for i ∈ {A, B}and j ∈ {1, 2}. The channel parameters hi j ∈ C. We assumethat all the nodes know the channel gains of all the links. Thereceived signals at the relays are given by:

Y1(t) = h A1 X A(t) + h B1 X B(t) + Z1(t), (11)

Y2(t) = h A2 X A(t) + h B2 X B(t) + Z2(t), (12)

where X A(t), X B(t) ∈ C are the transmitted signals fromnodes A and B , respectively. Z1(t), Z2(t) ∼ CN(0, 1) arei.i.d. Gaussian noise at the relays. The received signals at thenodes are given by:

YA(t) = h A1 X1(t) + h A2 X2(t) + Z A(t), (13)

YB(t) = h B2 X2(t) + h B1 X1(t) + Z B(t). (14)

where X j (t) ∈ C, j ∈ {1, 2} is the transmitted signalfrom R j . Z A(t), Z B(t) ∼ CN(0, 1) are i.i.d. Gaussian noiseat nodes A and B , respectively. We have the following powerconstraints:

E(

|Xi (t)|2)

≤ 1, (15)

for i ∈ {A, B, 1, 2}. Let RA and RB be the data rates of nodesA and B , respectively. In a period consisting of N channelsymbols, node A wants to send one of the 2N RA codewordsto node B , and node B wants to send one of the 2N RB

codewords to node A. A (2N RA , 2N RB , N) code for thetwo-way Gaussian diamond channel consists of two messagesets MA = {1, 2, ..., 2N RA } and MB = {1, 2, ..., 2N RB }, twoencoding functions at each time t as

fit : (Mi , Y t−1i ) → C

N , i ∈ A, B, (16)

Page 14: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

ASHRAPHIJUO et al.: ON THE CAPACITY REGIONS OF TWO-WAY DIAMOND CHANNELS 6073

two relay functions at each time t as

φ j t : CN → C

N , j ∈ 1, 2, (17)

and two decoding functions

gA : CN × MA → MB , gB : C

N × MB → MA. (18)

For i = A, B , node i transmits the codeword fi (mi ), wheremi is the message to be transmitted. For j = 1, 2, relay japplies the function φ j to its received signal and transmits theresulting signal. Let the received signals at the nodes A and Bbe Y N

A and Y NB , respectively, where the superscript N denotes

a sequence of length N . We note that the decoding func-tion gi uses the message from node i as input as well.We say that a decoding error occurs if gA(Y N

A , m A) �= m B

or gB(Y NB , m B) �= m A. The average probability of error is

P Ne = 1

|MA ||MB | × ∑

(m A,m B )∈MA×MBPr{gA(Y N

A , m A) �= m B ,

or gB(Y NB , m B) �= m A|(m A, m B) is sent}.

A rate pair (RA, RB) is said to be achievable if thereexists a sequence of (2N RA , 2N RB , N) codes, satisfying thepower constraints in (15) with P N

e → 0 as N → ∞.The capacity region is the convex hull of all achiev-able rate pairs (RA, RB). The two-way Gaussian diamondchannel is characterized by the set of channel parameters(h A1, h A2, h1B, h2B , h B1, h B2, h1A, h2A).

B. Results for Two-Way Gaussian Relay Channel

In a diamond channel, if channel gains to and from one relayare zero, we have a two-way relay channel. There are severalworks on two-way Gaussian relay channels. In [27] and [59],a deterministic approach was used to achieve the informationtheoretic cut-set bound [60] within 3 bits for each user. Later,in [13], the achievable rate region is within 1 bit from thecapacity region for each user for the general Gaussian two-wayrelay channel. The achievability scheme in [13] is composedof nested lattice codes for the uplink and structured binning forthe downlink. Their codes utilize two different shaping latticesfor source nodes based on a three-stage lattice partition chainto satisfy their different transmit power constraints. Here wepropose a simpler achievability scheme for a general two-wayGaussian relay channel compared to [13] and [27]. Defineh AB � min{|h A1|, |h1B |} and h B A � min{|h B1|, |h1A|}.By symmetry we can assume |h B A| ≤ |h AB |. WA and WB

are the messages of nodes A and B , respectively, that theywant to convey to the other node. We divide the messagefrom A to B to two parts, as WA = (WA1, WA2).

Theorem 2: For the two-way Gaussian relay channel withthe parameters of (h A1, h B1, h1A, h1B), the capacity region isouter-bounded by the following region

RAB ≤ min{log(1+|h A1|2),log(1+|h1B|2)}= log(1 + h AB2),

RB A ≤ min{log(1+|h B1|2), log(1+|h1A|2)}= log(1+h B A2).

(19)

Furthermore, if h AB = h B A, this region is achievable within1 bit for each user and otherwise assuming h AB < h B A, thenthis region is achievable within 1 bit for the A → B directionand within 2 bits for the B → A direction.

Proof: The above outer-bound results from the cut-setbound. In order to encode WA1 and WB , we use the commonlattice code � = � f ∩ νc.3 Let sA be the lattice codewordto which WA1 is mapped and sB be the lattice codeword towhich WB is mapped, and define X L = sA + sB . We use the

signal X (2)A to encode WA2 which is Gaussian with unit power.

Once the encoding process is performed, the signal trans-mitted by A is formed as X A = √

α1cA +√1 − α1 X (2)

A where0 ≤ α1 ≤ 1 and cA = [sA −dA] mod �c with unit power, anddA is a random dither uniformly distributed over νc, and sharedbetween both transceivers and both relays. Also, transceiver Bsends the signal |h B A |

|h B1| cB where cB = [sB − dB] mod �c,and dB is a random dither uniformly distributed over νc, andshared between both transceivers and both relays. We alsochoose α1 = |h B A |2

|h A1 |2 so that cA and cB arrive at the relay withthe same power and add together as a lattice code. Messagesfrom sA and sB are being sent with rate Ru and messages

from X (2)A is being sent with rate Rv . So, RAB = Ru + Rv and

RB A = Ru .The relay receives YR = |h B A|(cA + cB) +

(|h A1|2 − |h B A|2)X (2)A + Z R . The signal X (2)

A (whichis Gaussian) can be decoded by treating the rest (cA and cB)as noise provided that:

Rv ≤ log

⎝1 +(

1 − |h B A |2|h A1|2

)

|h A1|21 + 2|h B A|2

⎠. (20)

Recall that X L = [sA+sB mod �c] = [cA+cB +(dA+dB)mod �c] ∈ �. So it can be decoded from the received signalafter subtracting the signal X (2)

A , provided that

Ru ≤ log(

|h B A|2)

. (21)

Then, we use a structured binning for the transmissionfrom the relay to nodes A and B . We generate 2nRu length-nsequences with each element i.i.d. according to CN(0, 1).These sequences form a codebook �R . We assume one-to-onecorrespondence between each t ∈ �A and a codewordX R ∈ �R . To make this correspondence explicit, we usethe notation X R(t). After the relay decodes X L , it transmitsX R(X L) at the next block to nodes A and B . X L is uni-form over �A, and, thus, X R(X L) is also uniformly chosenfrom �R . Then, relay sends out

√α2 X R + √

1 − α2 X (2)A ,

0 ≤ α2 ≤ 1.

3We use a nested lattice code [61] which is generated using a quantizationlattice for shaping and a channel coding lattice. We have T -dimensional nestedlattices �c ⊆ � f , where �c is a quantization lattice with σ 2(�c) = 1 andG(�c) ≈ 1/2πe, and � f is a good channel coding lattice. We constructa codebook � = � f ∩ νc , where νc is the Voronoi cell of the lattice �c.We will use the following properties of lattice codes [47]:

1) Codebook � is a closed set with respect to summation under the“mod �c” operation, i.e., if x1, x2 ∈ � are two codewords, then(x1 + x2) mod �c ∈ � is also a codeword.

2) Lattice code � can be used to reliably transmit up to rate R =log(SNR) over a Gaussian channel modeled by Y = √

SNRX + Zwith E[Z2] = 1, while a more sophisticated scheme can achieve rateR = log(1 + SNR).

For more detail refer to [57], [62], and [63].

Page 15: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

6074 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015

Node B can decode X L taking X (2)A as noise (while we send

them both as Gaussian signals this time) if:

Ru ≤ log

(

1 + α2|h1B |21 + (1 − α2)|h1B |2

)

. (22)

Then, B can decode X (2)A after decoding X L if:

Rv ≤ log(

1 + (1 − α2)|h1B |2)

. (23)

Also, A can decode X L taking X (2)A as noise if:

Ru ≤ log

(

1 + α2|h1A|21 + (1 − α2)|h1A|2

)

. (24)

Now, we show that we can achieve the capacity within 1 bitfor B → A direction and within 2 bits for A → B direction,by showing Ropt

u ≥ log(1 + |h B A|2) − 1 and Roptu + Ropt

v ≥log(1 + |h AB |2) − 2. In other words, it is enough to show thatRopt

u ≥ log(1 + |h B A|2) − 1 and Roptv ≥ log(1 + |h AB |2) −

log(1 + |h B A|2) − 1. We also assume that all the links have|hi j | ≥ 1 otherwise we take it as zero and that direction doesnot send. We only need to prove that the above equationssatisfy the claimed gap. For all the equations in (20)-(24),we need to show that the RHS for those ones with Ru ,is ≥ log(1 + |h B A|2) − 1 and RHS for those ones with Rv , is≥ log(1 + |h AB |2) − log(1 + |h B A|2) − 1. Thus, we need toshow the following.

RHS of (20): log

⎝1 +(

1 − |h B A |2|h A1 |2

)

|h A1|21 + 2|h B A|2

≥ log(1 + |h AB |2) − log(1 + |h B A|2) − 1, (25)

RHS of (21): log(

|h B A|2)

≥ log(1 + |h B A|2) − 1, (26)

RHS of (22): log

(

1 + α2|h1B |21 + (1 − α2)|h1B |2

)

≥ log(1 + |h B A|2) − 1, (27)

RHS of (23): log(

1 + (1 − α2)|h1B |2)

≥ log(1 + |h AB |2) − log(1 + |h B A|2) − 1. (28)

RHS of (24): log

(

1 + α2|h1A|21 + (1 − α2)|h1A|2

)

≥ log(1 + |h B A|2) − 1, (29)

where Eqs. (25) and (26) trivially hold. (27), (29) and (28)are, respectively, equivalent to:

α2 ≥ (1 + |h1B |2)(−1 + |h B A|2)(|h1B |2)(1 + |h B A|2) , (30)

α2 ≥ (1 + |h1A|2)(−1 + |h B A|2)(|h1A|2)(1 + |h B A|2) , (31)

α2 ≤ 2(1 + |h1B |2)(1 + |h B A|2) − (1 + |h AB |2)2(|h1B|2)(1 + |h B A|2) . (32)

If we name h1 = min{|h1A|, |h1B |}, and f (x) =(1+x2)(−1+|h B A|2)

(x2)(1+|h B A|2) , we can see that 1 ≥ f (h1) ≥

Fig. 20. The investigated reciprocal two-way Gaussian diamond channel.

f (|h1A|), f (|h1A|). So, α2 = f (h1) satisfies (30) and (31).Also, α2 = f (h1) satisfies (32). This completes the proof ofthe Theorem. �

Corollary 1: For a Gaussian diamond relay channel thefollowing sum-rate is achievable by using only the strongestpath in each direction

RAB + RB A

= maxi∈{1,2}{min{log(1 + |h Ai |2), log(1 + |hi B |2)}}+ max

j∈{1,2}{min{log(1 + |h B j |2), log(1 + |h j A|2)}} − 3.

(33)Proof: It follows from Theorem 2. �

Remark 5: We used a strategy similar to Relay Strategy 0which was introduced for the deterministic channelin Section III. The transmitter of the direction with higherrate divides its power for two signals. It sends a signal thatcombined with the signal received from the other transmitterforms a lattice code at the relay, and the rest of the poweris allocated to the other signal. Then the relay performs areverse amplify and sends the lattice code on a higher powerwhich will be decoded by both receivers and the other signalon a lower power which will be decoded only by one of thereceivers.

C. Results for Two-Way Gaussian Diamond Model

In this subsection, we will give an achievability scheme fora symmetric case of two-way Gaussian diamond channel withparameters (h A1, h A2, h1B, h2B) = (h B1, h B2, h1A, h2A) =(a, b, c, d) (Figure 20) that satisfy log(1 + |a|2) ≥log(1+|c|2)+ log(1+|b|2) and log(1+|d|2) ≥ log(1+|c|2)+log(1 + |b|2), which achieves the capacity region within aconstant number of bits in each direction as in the followingtheorem.

Theorem 3: For the two-way symmetric Gaussian diamondchannel in Figure 20 that satisfy log(1+|a|2) ≥ log(1+|c|2)+log(1 +|b|2) and log(1 +|d|2) ≥ log(1 +|c|2)+ log(1 +|b|2),the capacity region is outer-bounded by the followingregion

RAB , RB A ≤ min{log(1 + |a|2 + |b|2), log(1 + |c|2 + |d|2),log(1 + |c|2) + log(1 + |b|2), log(1 + |d|2)+ log(1 + |a|2)}

= log(1 + |c|2) + log(1 + |b|2). (34)

Further, this region is achievable within 4 bits in eachdirection.

Page 16: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

ASHRAPHIJUO et al.: ON THE CAPACITY REGIONS OF TWO-WAY DIAMOND CHANNELS 6075

Proof: The above outer-bound results from the cut-set bound. Take WA and WB as the messages of thenodes A and B , respectively, that they want to convey tothe other node. We divide the messages WA and WB intotwo parts, as WA = (WA1, WA2) and WB = (WB1, WB2).

In order to encode WAi and WBi , where i ∈ {1, 2}, we usethe common lattice code �i defined in the last subsection.Let sAi be the lattice codeword to which WAi is mapped andsBi be the lattice codeword to which WBi is mapped, anddefine X Li = sAi + sBi .

Once the encoding process is performed, the signal trans-mitted by u is formed as Xu = √

α2cu1 + √1 − α2cu2 where

0 ≤ α2 ≤ 1 and cui = [sui −dui ] mod �c, and dui is a randomdither uniformly distributed over νc, and shared between allthe terminals in the network for u ∈ {A, B}. We also setα2 = |b|√

1+|h A2 |2 which is equivalent to |b| = α2√1−α2

. The

rate of sA1 and sB1 is being shown by Ru and the rate of sA2

and sB2 is being shown by Rv . So, RAB = RB A = Ru + Rv .We can decode both sA1 and sA2 in B and sB1 and sB2 in Awith the following strategy.

Recall that X Li = [sAi + sBi mod �c] = [cAi +cBi + (dAi + dBi ) mod �c] ∈ �i . R1 can decode X L1

and X L2 by successive interference cancellation if (35)-(36)holds.

Ru ≤ log

(

α2|a|22(1 − α2)|a|2 + 1

)

, (35)

Rv ≤ log(

(1 − α2)|a|2)

, (36)

Also, R2 decodes X L1 considering X L2 as noise, as longas (37) holds.

Ru ≤ log

(

α2|b|2(1 − α2)|b|2 + 1

)

, (37)

Then, we use a structured binning for the transmission fromthe relays to the nodes A and B . We generate 2nRi n-sequenceswith each element i.i.d. according to CN(0, 1), for i ∈ {u, v}.These sequences form a codebook �i

R . We assume one-to-onecorrespondence between each t ∈ �Ai and a codewordX R j ∈ �i

R . To make this correspondence explicit, we usethe notation X R j (t) for the R j .

After R1 decodes X L1 and X L2 , and R2 decodes X L1 ,for i, j ∈ {1, 2}, i �= j , R j transmits X R j (X Li ) at the nextblock to nodes A and B . X Li is uniform over �Ai , and, thus,X R j (X Li ) is also uniformly chosen from �i

R . Then, R j sendsout X R j .

The node B decodes X L1 with low probability of erroras long as (38) holds by considering X L2 as noise. Then itdecodes X L2 with low probability of error as long as (39)holds.

Ru ≤ log

(

1 + |d|2|c|2

)

, (38)

Rv ≤ log(

1 + |c|2)

. (39)

Now, we show all the bounds (35)-(39) satisfy the four bitgap to the outer bounds as in the statement of the theorem.

RHS of (35): log

(

α2|a|22(1 − α2)|a|2 + 1

)

(a)≥ log

(

α2|a|23(1 − α2)|a|2

)

= log

(

α2|a|2(1 − α2)|a|2

)

− log 3

= log(

|b|2)

− log 3

≥ log(

1 + |b|2)

− 1 − log 3. (40)

RHS of (36): log(

(1 − α2)|a|2)

≥ log

(

1

1 + |b|2 |a|2)

= log(

|a|2)

− log(

1 + |b|2)

≥ log(

1 + |a|2)

− log(

1 + |b|2)

− 1

≥ log(

1 + |c|2)

− 1. (41)

RHS of (37): log

(

α2|b|2(1 − α2)|b|2 + 1

)

≥ log

(

α2|b|22

)

= log(

α2|b|2)

− 1

= log

( |b|4|b|2 + 1

)

− 1

= 2 log(

|b|2)

− log(

|b|2 + 1)

− 1

≥ log(

|b|2 + 1)

− 3. (42)

RHS of (38): log

(

1 + |d|2|c|2

)

≥ log(

1 + |d|2)

− log(

|c|2)

≥ log(

1 + |c|2)

+ log(

1 + |b|2)

− log(

|c|2)

≥ log(

1 + |b|2)

, (43)

where (a) follows from

|a|2(1 − |α|2)≥

(

(|b|2 + 1)(|c|2 + 1) − 1)

(1 − |α|2)=

(

(|b|2 + 1)(|c|2 + 1) − 1) 1

1 + |b|2= |c|2 + 1 − 1

1 + |b|2

= 1 + |c|2(1 + |b|2) − 1

1 + |b|2(b)≥ 1, (44)

where (b) follows from the fact that |b|, |c| ≥ 1.

Page 17: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

6076 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015

Fig. 21. An comparison of our results and [43] for |h A2 | = |h2A| = |h B2| =|h2B | = 50 and |h A1| = |h1A| = |h B1| = |h1B | = 5000.

This shows that RAB can be achieved within 4 bits of theouter bound for the forward channel by symmetry. It can bealso seen that we can achieve RB A within 4 bits of the outerbound for the backward channel. �

Remark 6: Due to the fact that this model corresponds to aspecial case of Case 1 (for both directions) we used a strategysimilar to Relay Strategy 0, by using reverse amplify-and-forward.

Remark 7: The authors of [43] considered a reciprocaltwo-way diamond channel, and gave an achievable rate region.For the case of hi = |h Ai | = |hi A| = |h Bi | = |hi B |,for i ∈ {1, 2}, with two relay nodes, the achievable sum-ratein [43] is given by RAB + RB A = log( 1

2 + h21) + log( 1

2 + h22)

which is not within a finite gap from the upper bound2 log(1 + h2

1 + h22). However, our achievable region in

Corollary 1 with one relay node can achieve within 5 bitsof the cut-set upper bound

2 log(1 + max{h21, h2

2}) − 3 = 2 log(2 + 2 max{h21, h2

2}) − 5

≥ 2 log(1 + h21 + h2

2) − 5. (45)For the case of |h A2| = |h2A| = |h B2| = |h2B | = 50

and |h A1| = |h1A| = |h B1| = |h1B | = 5000, we can see acomparison of our achievable sum-rate in Corollary 1 and theachievable sum-rate RAB + RB A = log( 1

2 + h21) + log( 1

2 + h22)

given in [43], in Figure 21.Remark 8: For general two-way Gaussian diamond

channels, an achievability scheme idea is inspired fromthe deterministic channel results. Each set of streams indeterministic scheme that is being transmitted together withsimilar interfering properties can be considered as a group.For example, for (n A1, n A2, n1B, n2B , nB1, nB2, n1A, n2A) =(n, q, p, m, n, q, p, m) where m, n ≥ p, q we canmake A2 = [ap, ..., a1]T , A1 = [ap+q, ..., ap+1]T ,

B2 = [bp, ..., b1]T and B1 = [bp+q, ..., bp+1]T eachone as a group. R1 receives [AT

1 + BT1 , AT

2 + BT2 ]T

and R2 receives [AT1 + BT

1 ]T . In deterministic model,

we simply send them in the reverse direction but in Gaussianmodel it is necessary to decode the sums of the groups ofreceived signals as lattice codes in the descending order.One difference of the deterministic model as compared tothe Gaussian model is that we may need to set a distancebetween the groups of streams but there is not such a thingin the Gaussian model. There are some complexities dueto which the general Gaussian model seems intractable.The main one is that in Gaussian case, each equivalentgroup of streams correspondent from deterministic model,is translated into a unique message and there is a powerallocation for each one that should be optimized based onthe the resulting bounds. For any set of channel parameters(h A1, h A2, h1B , h2B , h B1, h B2, h1A, h2A), we can use thecorresponding achievability scheme in deterministic channelwith parameters (n A1, n A2, n1B , n2B , nB1, nB2, n1A, n2A)by a corresponding relationship from (log(1 + |h A1|2),log(1 + |h A2|2), log(1 + |h1B |2), log(1 + |h2B |2),log(1 + |h B1|2), log(1 + |h B2|2), log(1 + |h1A|2), log(1 +|h2A|2)) and decode the sum of each d received signals asa d-dimensional nested lattice code [61] (instead of simplyadding them), which at most causes one bit of decrease inthe rate of each of the messages included in the lattice codes.

Exploring the gap for the general two-way Gaussiandiamond channel is a case by case analysis, and we leavethat as an important next step.

VII. CONCLUSIONS

In this paper, we studied the capacity of the bidirectional(or two-way) diamond channel with two nodes and two relays.We used the deterministic approach to capture the essence ofthe problem and to determine capacity-achieving transmissionand relay strategies. Depending on the forward and backwardchannel gains, we used either a reverse amplify-and-forwardor a particular modified strategy involving repetitions, andreversing order of some streams at the relays. The proposedscheme is used to find the capacity region within a constantgap in two special cases of the Gaussian diamond channel.First, for the general two-way Gaussian relay channel a smallergap is achieved compared to the prior works. Then, a specialsymmetric case of the Gaussian diamond model is consideredand capacity region is achieved within 4 bits.

APPENDIX ATRANSMISSION STRATEGIES WHEN DIAMOND CHANNEL

IS NEITHER CASE 3.1.2 NOR 4.1.2

We consider the transmission strategy for different cases asfollows.

Case 1 (CAB = n A2 + n1B): Since we have CAB =n A2 + n1B , (3) shows that n A1, n2B ≥ CAB . We send thedata from A as [aCAB , ..., an1B+1, 0, ..., 0

︸ ︷︷ ︸

n A1−(n A2+n1B )

, an1B , ..., a1]T .

Node B can decode all CAB streams as illustrated in Figure 22.Case 2 (CAB = n A1 + n2B): We send the data

from A as [aCAB , ..., an2B+1, 0, ..., 0, an2B , ..., a1]T withn A2 − (n A1 + n2B) zeros in it. The proof is similar to Case 1,obtained by interchanging R1 and R2 and is thus omitted.

Page 18: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

ASHRAPHIJUO et al.: ON THE CAPACITY REGIONS OF TWO-WAY DIAMOND CHANNELS 6077

Fig. 22. Achievability scheme for Case 1 by using Relay Strategy 0.

Fig. 23. Achievability scheme for Case 3.1.1 by using Relay Strategy 0.

Case 3 (CAB = max{n A1, n A2}): We assume that thechannel is of Type 1. For Type 2 the proof is similar. We haveCAB = max{n A1, n A2} = n A1.

Case 3.1.1 (n1B < CAB , n2B ≥ n A2 + n1B): SinceCAB = max{n A1, n A2} = n A1 and n1B < CAB , (3) showsthat n2B ≥ CAB . Since A can transmit CAB bits that

Page 19: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

6078 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015

Fig. 24. Achievability scheme for Case 3.2 by using Relay Strategy 0.

Fig. 25. Achievability scheme for Case 4.1.1 by using Relay Strategy 0.

can be heard by at least one relay, it transmits thesebits, and Figure 23 illustrates that node B can decode thedata.

Case 3.2 (n1B ≥ CAB ): As in Subcase 3.1.1, A can onlysend CAB streams, and Figure 24 illustrates that node B isable to decode the data. For decoding, if an A1−n A2+1 received

Page 20: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

ASHRAPHIJUO et al.: ON THE CAPACITY REGIONS OF TWO-WAY DIAMOND CHANNELS 6079

Fig. 26. Achievability scheme for Case 4.2 by using Relay Strategy 0.

from R2 is below all levels of the other relay received atnode B , i.e., below an A1 from R1, we decode the streams fromR1 without interference. Otherwise, while a stream, av , is theone being added from R1 to an A1−n A2+1 received from R2,if v > n A1 − n A2 + 1 we decode the streams starting from thehighest level a1 and then subtract them from the signal beforedecoding the next lower stream, and if v < n A1 − n A2 + 1 wedecode the streams starting from the lowest level, an A1 , andthen subtract them from the signal before decoding the nextupper stream.

Case 4 (CAB = max{n1B, n2B}): We assume that thechannel is of Type 1. For Type 2 the proof is similar. We haveCAB = max{n1B, n2B} = n1B .

Case 4.1.1 (n A1 < CAB , n A2 ≥ n2B + n A1): SinceCAB = max{n1B, n2B} and n A1 < CAB , (3) shows thatn A2 ≥ CAB . Node A transmits CAB streams as follows.It sends nothing on the highest n A1 − (n1B − n2B) levels,an1B ,...,an2B+1 on the next levels, again nothing on the nextn A2 − (n A1 + n2B) levels and an2B ,...,a1 on the next levels.B can decode all CAB bits as illustrated in Figure 25. Allthe required streams reach R2 since the number of levels isn1B+n A2−n A1−n2B which is less than or equal to the numberof the received stream levels, n A2. Also [an1B , ..., an2B+1]T arethe lowest levels at R1 because there are n A1 − (n1B − n2B)zeros above them and they together are the highest n A1 levelsof the transmission from A.

Case 4.2: (n A1 ≥ CAB): In this case, node A transmitsCAB bits on the lowest levels, and Figure 26 illustrates thatnode B can decode the data. For decoding, while a stream, av ,is the one being added from R1 to amin{n1B ,n A1−n A2 }+1 received

from R2, if v > min{n1B, n A1 − n A2} + 1 we decode thestreams starting from the highest level a1 and then subtractthem from the signal before decoding the next lower stream,and if v < min{n1B, n A1 − n A2} + 1 we decode the streamsstarting from the lowest level an1B and then subtract them fromthe signal before decoding the next upper stream.

APPENDIX BRELAY STRATEGY 2

1) (u1, v1): It is given in Section IV.2) (u1, v2): As shown in Figure 27, R2 repeats block

(R2, B3) on block (R2, B5). The decoding order is

decode & subtract (R2, B1)

→ subtract (R1, B4)&(R1, B5)

→ decode & subtract (R1, B6)

→ decode & subtract (R2, B5)

→ subtract (R2, B3)

→ decode & subtract (R1, B3)

→ subtract (R2, B2)

→ decode & subtract (R1, B2).

3) (u1, v3): As shown in Figure 28, this case does not needrepetition. The decoding order is

decode & subtract (R2, B1)

→ subtract (R1, B3)&(R1, B4)&(R1, B5)

→ decode & subtract (R2, B3)&(R2, B4)

→ decode & subtract (R1, B6)

→ subtract (R2, B2)

→ decode & subtract (R1, B2).

Page 21: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

6080 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015

Fig. 27. The received signals at node B (ignoring the effect of transmittedsignal from B) assuming that both relays use Relay Strategy 0 for channelparameters of case (u1, v2).

Fig. 28. The received signals at node B (ignoring the effect of transmittedsignal from B) assuming that both relays use Relay Strategy 0 for channelparameters of case (u1, v3).

4) (u1, v4, r1): As shown in Figure 29, R2 repeats block(R2, B2) on block (R2, B8). The decoding order is

decode & subtract (R2, B1)

→ subtract (R1, B4)&(R1, B5)

→ decode & subtract (R2, B4)&(R2, B5)

→ decode & subtract (R1, B8)

→ decode & subtract (R2, B8)

Fig. 29. The received signals at node B (ignoring the effect of transmittedsignal from B) assuming that both relays use Relay Strategy 0 for channelparameters of case (u1, v4, r1).

→ subtract (R2, B2)&(R1, B7)

→ decode & subtract (R2, B6)

→ decode & subtract (R1, B7)

→ subtract (R2, B3)

→ decode & subtract (R1, B2)&(R1, B3).

5) (u1, v4, r2, s1): As shown in Figure 30, R2 repeats block(R2, B3) on block (R2, B8). The decoding order is

decode & subtract (R2, B1)

→ subtract (R1, B4)

→ decode & subtract (R2, B4)

→ decode & subtract (R1, B7)&(R1, B8)

→ decode & subtract (R1, B9)

→ subtract (R2, B5)

→ decode & subtract (R2, B8)

→ subtract (R2, B3)&(R1, B6)

→ decode & subtract (R1, B5)

→ subtract (R2, B2)

→ decode & subtract (R2, B6)&(R2, B7).

6) (u1, v4, r2, s2): As shown in Figure 31, this case doesnot need repetition. The decoding order is

decode & subtract (R2, B1)

→ subtract (R1, B3)

→ decode & subtract (R2, B3)&(R1, B7)&(R1, B8)

Page 22: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

ASHRAPHIJUO et al.: ON THE CAPACITY REGIONS OF TWO-WAY DIAMOND CHANNELS 6081

Fig. 30. The received signals at node B (ignoring the effect of transmittedsignal from B) assuming that both relays use Relay Strategy 0 for channelparameters of case (u1, v4, r2, s1).

→ subtract (R1, B5)&(R1, B6)&(R2, B4)

→ decode & subtract (R2, B5)&(R2, B6)

→ decode & subtract (R1, B7)

→ subtract (R2, B2)

→ decode & subtract (R1, B2).

7) (u1, v4, r2, s3): As shown in Figure 32, R2 repeats block(R2, B4) on block (R2, B8). The decoding order is

decode & subtract (R2, B1)

→ subtract (R1, B3)

→ decode & subtract (R2, B3)

→ subtract (R1, B5)&(R1, B6)

→ decode & subtract (R2, B5)&(R2, B6)

→ decode & subtract (R2, B8)

→ subtract (R1, B7)&(R1, B8)&(R2, B4)

→ decode & subtract (R2, B7)

→ decode & subtract (R1, B4)

→ subtract (R2, B2)

→ decode & subtract (R1, B2).

8) (u2, w1): As shown in Figure 33, R2 repeats block(R2, B2) on block (R2, B4). The decoding order is

decode & subtract (R2, B1)

→ subtract (R1, B4)

→ decode & subtract (R2, B4)

→ subtract (R1, B2)

→ decode & subtract (R1, B2)

→ decode & subtract (R1, B3).

Fig. 31. The received signals at node B (ignoring the effect of transmittedsignal from B) assuming that both relays use Relay Strategy 0 for channelparameters of case (u1, v4, r2, s2).

9) (u2, w2): As shown in Figure 34, R2 repeats block(R2, B3) on block (R2, B5). The decoding order is

decode & subtract (R2, B1)

→ subtract (R1, B5)

→ decode & subtract (R2, B5)

→ subtract (R2, B3)

→ decode & subtract (R1, B3)

→ decode & subtract (R1, B6)

→ subtract (R2, B2)

→ decode & subtract (R1, B2)

→ decode & subtract (R1, B4).

APPENDIX CFORWARD CHANNEL IS OF CASE 4.1.2

In this scenario, node A uses the same transmission strategyas Case 4.1.1 Section III and Appendix A, i.e., it transmits[ 0, ..., 0

︸ ︷︷ ︸

n A1−(n1B−n2B )

, an1B, ..., an2B+1, 0, ..., 0︸ ︷︷ ︸

n A2−(n A1+n2B )

, an2B , ..., a1]T for

the forward channel. Also, node B uses the same strategy as inthe corresponding case in Appendix A. For the relay strategy,we will choose one of the four strategies below depending onthe channel parameters and prove that all of these strategiesare optimal for each set of parameters for the forward channeland then we will explain that at least one of these strategies isoptimal for each set of parameters for the backward channel.

Page 23: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

6082 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015

Fig. 32. The received signals at node B (ignoring the effect of transmittedsignal from B) assuming that both relays use Relay Strategy 0 for channelparameters of case (u1, v4, r2, s3).

Fig. 33. The received signals at node B (ignoring the effect of transmittedsignal from B) assuming that both relays use Relay Strategy 0 for channelparameters of case (u2, w1).

A. Relay Strategy 5

Assume that the forward channel is of Case 4.1.2 Type i ,Relay Strategy 0 is used at Ri , where i, i ∈ {1, 2}, i �= i ,and Relay Strategy 5 is used at Ri . Here, we define RelayStrategy 5 at R1 (forward channel of Case 4.1.2 Type 1),

Fig. 34. The received signals at node B (ignoring the effect of transmittedsignal from B) assuming that both relays use Relay Strategy 0 for channelparameters of case (u2, w2).

Fig. 35. Relay Strategy 5 at R1.

while that for R2 can be obtained by interchanging roles ofR1 and R2 (interchanging 1 and 2 and forward channel ofCase 4.1.2 Type 2). As shown in Figure 35, if R1 receivesa block of n1B bits, first it will reverse them as inRelay Strategy 0 and then change the order of the firstn2B + n A1 − n A2 streams with the next n1B − n2B streams.

Node A transmits [0, ..., 0︸ ︷︷ ︸

n A2−n1B

, an1B , ..., a1]T . The received

signals can be seen in Figure 36. The bits that were notdelivered to node B from R2 (an2B+1, ..., an1B ), are all sent inblock (R1, B1) to B and thus are decoded with no interference.The remaining bits can be decoded by starting from the lowestlevel (an2B in block (R2, B4)) and removing the effect of thedecoded bits.

B. Relay Strategy 6

Assume that the forward channel is of Case 4.1.2 Type i ,Relay Strategy 0 is used at Ri , where i, i ∈ {1, 2}, i �= i ,

Page 24: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

ASHRAPHIJUO et al.: ON THE CAPACITY REGIONS OF TWO-WAY DIAMOND CHANNELS 6083

Fig. 36. Received signals by using Relay Strategy 5 when the forward channel is of Case 4.1.2 Type 1.

Fig. 37. Dividing the 4-dimensional space consisting of (n A1, n A2,n1B , n2B ) into seven subspaces.

and Relay Strategy 6 is used at Ri . Here, we define RelayStrategy 6 at R1 (forward channel of Case 4.1.2 Type 1),while that for R2 can be obtained by interchanging roles ofrelays R1 and R2 (interchanging 1 and 2 and forward channelof Case 4.1.2 Type 2). Relays work similar to Relay Strategy 0with the only difference that R1 repeats a part of the topn1B −n A2 +n A1 streams later too, as explained below in sevenscenarios, based on the parameters of the forward channel.

As shown in Figure 37, we define the partition of thefour-dimensional space (n A1, n A2, n1B, n2B) into seven partsthat lead to different received signal structures in node B ,

Fig. 38. The received signals at node B (ignoring the effect of transmittedsignal from B) assuming that both relays use Relay Strategy 0 for channelparameters of case (u1, v1).

shown in Figures 38-44, respectively. Specifically,

{u1, u2} = {n A2 − n A1 ≤ 2(n A1 + n2B − n A2), n A2 − n A1

> 2(n A1 + n2B − n A2)}, (46)

{v1, v2} = {n1B > n A1 − n A2 + 2n2B , n1B

≤ n A1 − n A2 + 2n2B}, (47)

Page 25: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

6084 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015

Fig. 39. The received signals at node B (ignoring the effect of transmittedsignal from B) assuming that both relays use Relay Strategy 0 for channelparameters of case (u1, v2, r1).

Fig. 40. The received signals at node B (ignoring the effect of transmittedsignal from B) assuming that both relays use Relay Strategy 0 for channelparameters of case (u1, v2, r2, s1, q1).

{w1, w2} = {n2B + n A1 − n A2 ≤ n1B − n2B ,

n2B + n A1 − n A2 > n1B − n2B}, (48)

{r1, r2} = {n1B ≥ 2(n A1 + n2B − n A2), n1B

< 2(n A1 + n2B − n A2)}, (49)

{s1, s2} = {n A2 − n A1 + n1B − n2B ≤ n A1 − n A2

+ 2n2B − n1B, n A2 − n A1 + n1B − n2B > n A1

− n A2 + 2n2B − n1B}, (50)

Fig. 41. The received signals at node B (ignoring the effect of transmittedsignal from B) assuming that both relays use Relay Strategy 0 for channelparameters of case (u1, v2, r2, s1, q2).

Fig. 42. The received signals at node B (ignoring the effect of transmittedsignal from B) assuming that both relays use Relay Strategy 0 for channelparameters of case (u1, v2, r2, s2).

{q1, q2} = {2(n2B + n A1 − n A2) − n1B ≥ n A2 − n A1,

2(n2B + n A1 − n A2) − n1B < n A2 − n A1}.(51)

1) (u1, v1): Figure 38 depicts the received signal at node B(ignoring the effect of transmitted signal from B)assuming that both relays use Relay Strategy 0.

Page 26: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

ASHRAPHIJUO et al.: ON THE CAPACITY REGIONS OF TWO-WAY DIAMOND CHANNELS 6085

Fig. 43. The received signals at node B (ignoring the effect of transmittedsignal from B) assuming that both relays use Relay Strategy 0 for channelparameters of case (u2, w1).

Fig. 44. The received signals at node B (ignoring the effect of transmittedsignal from B) assuming that both relays use Relay Strategy 0 for channelparameters of case (u2, w2).

R1 repeats block (R1, B3) on block (R1, B5). Thedecoding order is

decode & subtract (R1, B1)&(R1, B1)

→ subtract (R2, B4)&(R2, B5)

→ decode & subtract (R1, B5)

→ subtract (R1, B3)

→ decode & subtract (R2, B3)

→ decode & subtract (R1, B4).

2) (u1, v2, r1): As shown in Figure 39, R1 repeats block(R1, B3) on block (R1, B5). The decoding order is

decode & subtract (R1, B1)

→ subtract (R2, B4)&(R2, B5)

→ decode & subtract (R1, B5)

→ subtract (R1, B3)

→ decode & subtract (R2, B6)

→ subtract (R1, B2)

→ decode & subtract (R2, B2)&(R2, B3)

→ decode & subtract (R1, B4).

3) (u1, v2, r2, s1, q1): As shown in Figure 40, R1 repeatsblock (R1, B4) on block (R1, B8). The decodingorder is

decode & subtract (R1, B1)

→ subtract (R2, B3)

→ decode & subtract (R1, B3)

→ subtract (R2, B5)&(R2, B6)

→ decode & subtract (R1, B5)&(R1, B6)

→ decode & subtract (R1, B8)

→ subtract (R2, B7)&(R2, B8)

→ decode & subtract (R1, B7)

→ subtract (R1, B4)

→ decode & subtract (R2, B4)

→ subtract (R1, B2)

→ decode & subtract (R2, B2).

4) (u1, v2, r2, s1, q2): As shown in Figure 41, R1 repeatsblock (R1, B3) on block (R1, B8). The decodingorder is

decode & subtract (R1, B1)

→ subtract (R2, B4)

→ decode & subtract (R1, B4)

→ subtract (R2, B7)&(R2, B8)

→ decode & subtract (R1, B7)&(R1, B8)

→ subtract (R1, B3)&(R2, B6)

→ decode & subtract (R2, B9)

→ subtract (R1, B5)

→ decode & subtract (R2, B5)

→ subtract (R1, B2)

→ decode & subtract (R2, B2)&(R2, B3)

→ decode & subtract (R1, B6).

5) (u1, v2, r2, s2): As shown in Figure 42, R1 repeats block(R1, B2) on block (R1, B8). The decoding order is

decode & subtract (R1, B1)

→ subtract (R2, B4)&(R2, B5)

→ decode & subtract (R1, B4)&(R1, B5)

→ subtract (R2, B8)

→ decode & subtract (R1, B8)

→ subtract (R1, B2)&(R2, B6)

→ decode & subtract (R2, B7)

→ subtract (R1, B3)

→ decode & subtract (R2, B2)&(R2, B3)&(R1, B6).

Page 27: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

6086 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015

Fig. 45. Relay Strategy 7 at R1.

6) (u2, w1): As shown in Figure 43, R1 repeats block(R1, B2) on block (R1, B4). The decoding order is

decode & subtract (R1, B1)

→ subtract (R2, B4)

→ decode & subtract (R1, B4)

→ subtract (R1, B2)

→ decode & subtract (R2, B2)

→ decode & subtract (R2, B3).

7) (u2, w2): As shown in Figure 44, R1 repeats block(R1, B3) on block (R1, B5). The decoding order is

decode & subtract (R1, B1)

→ subtract (R2, B5)

→ decode & subtract (R1, B5)

→ subtract (R1, B3)

→ decode & subtract (R2, B6)

→ subtract (R1, B2)

→ decode & subtract (R2, B2)&(R2, B3)&(R2, B4).

C. Relay Strategy 7

Assume that the forward channel is of Case 4.1.2 Type i ,Relay Strategy 0 is used at Ri , where i, i ∈ {1, 2}, i �= i ,and Relay Strategy 7 is used at Ri . Here, we define RelayStrategy 7 at R1 (forward channel of Case 4.1.2 Type 1), whilethat for Relay R2 can be obtained by interchanging roles ofR1 and the R1 (interchanging 1 and 2 and forward channel ofCase 4.1.2 Type 2). As shown in Figure 45, if R1 receives ablock of n1B , first it will reverse them as in Relay Strategy 0and then changes the order of the n2B−n A2+n A1 streams rightafter the first n1B −n2B streams, with the following n A2 −n A1streams.

Node A transmits [0, ..., 0︸ ︷︷ ︸

n A2−n1B

, an1B , ..., a1]T . The received

signals can be seen in Figure 46. The bits that are not deliveredto node B from R1 (a1, ..., an A2−n A1 ), are delivered fromR2 to node B (block (R2, B2)) with no interference. Theremaining bits can be decoded by starting from the highestlevel (an A2−n A1+1 in block (R1, B1)) and removing the effectof the decoded bits.

D. Relay Strategy 8

Assume that the forward channel is of Case 4.1.2 Typei , Relay Strategy 0 is used at Ri , and Relay Strategy 8 is

used at Ri , where i, i ∈ {1, 2}, i �= i . Here, we define RelayStrategy 8 at R2 (forward channel of Case 4.1.2 Type 1),while that for R1 can be obtained by interchanging roles ofrelays R1 and R2 (interchanging 1 and 2 and forward channelof Case 4.1.2 Type 2). As shown in Figure 47, if R2 receivesa block of n2B streams, first of all it will reverse them asin Relay Strategy 0 and then changes the order of the firstn A2 − n A1 streams with the next n2B − (n A2 − n A1) streams.

Node A transmits [0, ..., 0︸ ︷︷ ︸

n A2−n1B

, an1B , ..., a1]T . The received

signals can be seen in Figure 48. The bits that are not deliveredto node B from R1 (a1, ..., an A2−n A1 ), are all sent on thelowest levels from R2 to node B (in block (R1, B1)) and thusare decoded with no interference. The remaining bits can bedecoded by starting from the highest level (an A2−n A1+1) andremoving the effect of the decoded bits.

E. Achieving the Optimum Rate

Now we explain how the above mentioned strategies achievethe optimum rate. Take the case that the forward channel is ofCase 4.1.2 and backward channel is neither of Case 3.1.2 norof Case 4.1.2. If the forward channel is neither of Case 3.1.2nor of Case 4.1.2 and the backward channel is of Case 4.1.2everything is similar except exchanging all A and B’s together.The first one (which we consider here) includes the followingsituations:

1. Backward channel is of Case 1:• Forward channel is of Case 4.1.2 Type 1: If n1B + n A1 −

n A2 > n1A, we use Relay Strategy 6 at R1 and RelayStrategy 0 at R2. Otherwise use Relay Strategy 5 at R1and Relay Strategy 0 at R2. If n1B + n A1 − n A2 > n1A,R1 repeats from the streams (b1, ..., bn1A ) received belowthe noise level in A, and otherwise some of the equations(b1, ..., bn1A ) are relocated.

• Forward channel is of Case 4.1.2 Type 2: If n2B + n A2 −n A1 > nB2, we use Relay Strategy 6 at R2 and RelayStrategy 0 at R1. Otherwise use Relay Strategy 5 at R2and Relay Strategy 0 at R1. If n2B + n A2 − n A1 > nB2,R2 repeats from the streams that are already decoded fromthe highest levels received in A, (bn1A+1, ..., bn1A+nB2 ),on the lower levels, and otherwise some of the equationsat the highest levels received in A, (bn1A+1, ..., bn1A+nB2 )are relocated.

2. Backward channel is of Case 2:• Forward channel is of Case 4.1.2 Type 1: If n1B + n A1 −

n A2 > nB1, we use Relay Strategy 6 at R1 and RelayStrategy 0 at R2. Otherwise use Relay Strategy 5 at R1and Relay Strategy 0 at R2. If n1B + n A1 − n A2 > nB1,R1 repeats from the streams that are already decoded fromthe highest levels received in A, (bn2A+1, ..., bn2A+nB1 ),on the lower levels, and otherwise we only exchangethe place of some of the equations at the highest levelsreceived in A, (bn2A+1, ..., bn2A+nB1 ).

• Forward channel is of Case 4.1.2 Type 2: If n2B + n A2 −n A1 > n2A, we use Relay Strategy 6 at R2 and RelayStrategy 0 at R1. Otherwise use Relay Strategy 5 at R2and Relay Strategy 0 at R1. If n2B + n A2 − n A1 > n2A,

Page 28: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

ASHRAPHIJUO et al.: ON THE CAPACITY REGIONS OF TWO-WAY DIAMOND CHANNELS 6087

Fig. 46. Received signals by using Relay Strategy 7 when the forward channel is of Case 4.1.2 Type 1.

Fig. 47. Relay Strategy 8 at R2.

R2 repeats from the streams (b1, ..., bn2A ) received belowthe noise levels in A, and otherwise some of the equations(b1, ..., bn2A ) are relocated.

3. Backward channel is of Case 3.1.1: We assume that thebackward channel is Type 1. For Type 2 the proof is similar.

• Forward channel is of Case 4.1.2 Type 1: If n1B + n A1 −n A2 > nB1, we use Relay Strategy 6 at R1 and RelayStrategy 0 at R2. Otherwise use Relay Strategy 5 at R1and Relay Strategy 0 at R2. If n1B + n A1 − n A2 > nB1,R1 repeats from the streams (b1, ..., bn1A ) received belowthe noise level in A, and otherwise some of the equations(b1, ..., bn1A ) are relocated.

• Forward channel is of Case 4.1.2 Type 2: If n2B + n A2 −n A1 > nB2, we use Relay Strategy 6 at R2 and RelayStrategy 0 at R1. Otherwise use Relay Strategy 5 at R2and Relay Strategy 0 at R1. If n2B + n A2 − n A1 > nB2,R2 repeats from the streams that are already decoded fromthe highest levels received in A, (bnB1−nB2+1, ..., bnB1 ),on the lower levels, and otherwise some of the equations

at the highest levels received in A, (bnB1−nB2+1, ..., bnB1 )are relocated.

4. Backward channel is Case 4.1.1: We assume that thebackward channel is Type 1. For Type 2 the proof is similar.

• Forward channel is of Case 4.1.2 Type 1: If n1B + n A1 −n A2 > n1B − n2B , we use Relay Strategy 6 at R1 andRelay Strategy 0 at R2. Otherwise use Relay Strategy 5at R1 and Relay Strategy 0 at R2. If n1B + n A1 − n A2 >n1B − n2B , R1 repeats from the streams that arealready decoded from the highest levels received in A,(bn2A+1, ..., bn1A ), on the lower levels, and otherwisesome of the equations at the highest levels received in A,(bn2A+1, ..., bn1A ) are relocated.

• Forward channel is of Case 4.1.2 Type 2: If n1B + n A1 −n A2 > n1B , we use Relay Strategy 6 at R2 and RelayStrategy 0 at R1. Otherwise use Relay Strategy 5 at R2and Relay Strategy 0 at R1. If n1B + n A1 − n A2 > n1B ,R2 repeats from the streams (b1, ..., bn2A ) received belowthe noise level in A, and otherwise some of the equations(b1, ..., bn2A ) are relocated.

5. Backward channel is of Case 3.2: We assume that thebackward channel is Type 1. For Type 2 the proof is similar.

• Forward channel is of Case 4.1.2 Type 1: We use RelayStrategy 5 at R1 and Relay Strategy 0 at R2 orRelay Strategy 6 at R1 and Relay Strategy 0 at R2 orRelay Strategy 7 at R1 and Relay Strategy 0 at R2.

• Forward channel is of Case 4.1.2 Type 2: We use RelayStrategy 8 at R1 and Relay Strategy 0 at R2.

6. Backward channel is of Case 4.2: We assume thatthe backward channel is Type 1. For Type 2 the proof issimilar.

Page 29: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

6088 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015

Fig. 48. Received signals by using Relay Strategy 8 when the forward channel is of Case 4.1.2 Type 1.

• Forward channel is of Case 4.1.2 Type 1: We use RelayStrategy 5 at R1 and Relay Strategy 0 at R2 or RelayStrategy 6 at R1 and Relay Strategy 0 at R2 orRelay Strategy 7 at R1 and Relay Strategy 0 at R2.

• Forward channel is of Case 4.1.2 Type 2: We use RelayStrategy 8 at R1 and Relay Strategy 0 at R2.

ACKNOWLEDGEMENT

The authors are very grateful to Srikrishna Bhashyam fromthe Indian Institute of Technology, Madras for numerousdiscussions and comments on the drafts that helped the papersignificantly. They would also grateful to the anonymousreferees and the Associate Editor for their valuable comments,which have helped us improve the presentation of this papersubstantially.

REFERENCES

[1] C. E. Shannon, “Two-way communication channels,” in Proc. 4thBerkeley Symp. Math. Statist. Probab., 1961, pp. 611–644.

[2] S. Chen, M. A. Beach, and J. P. McGeehan, “Division-free duplexfor wireless applications,” Electron. Lett., vol. 34, no. 2, pp. 147–148,Jan. 1998.

[3] A. K. Khandani, “Methods for spatial multiplexing of wireless two-waychannels,” U.S. Patent 7 817 641 B1, Oct. 19, 2010.

[4] D. W. Bliss, P. A. Parker, and A. R. Margetts, “Simultaneous trans-mission and reception for improved wireless network performance,”in Proc. IEEE/SP 14th Workshop Statist. Signal Process., Aug. 2007,pp. 478–482.

[5] B. Radunovic, D. Gunawardena, P. Key, A. P. N. Singh, V. Balan, andG. Dejean, “Rethinking indoor wireless: Low power, low frequency, fullduplex,” in Proc. 5th IEEE Workshop Wireless Mesh Netw., 2010, pp. 1–6.

[6] E. Aryafar, M. A. Khojastepour, K. Sundaresan, S. Rangarajan, andM. Chiang, “MIDU: Enabling MIMO full duplex,” in Proc. ACMMobicom, 2012, pp. 257–268.

[7] M. Duarte et al., “Design and characterization of a full-duplex multi-antenna system for WiFi networks,” IEEE Trans. Veh. Technol., vol. 63,no. 3, pp. 1160–1177, Mar. 2014.

[8] D. Bharadia, E. McMilin, and S. Katti, “Full duplex radios,” in Proc.ACM SIGCOMM, Oct. 2013, pp. 375–386.

[9] T. J. Oechtering, C. Schnurr, I. Bjelakovic, and H. Boche, “Broadcastcapacity region of two-phase bidirectional relaying,” IEEE Trans. Inf.Theory, vol. 54, no. 1, pp. 454–458, Jan. 2008.

[10] G. Kramer and S. Shamai, “Capacity for classes of broadcast chan-nels with receiver side information,” in Proc. IEEE Inf. TheoryWorkshop (ITW), Sep. 2007, pp. 313–318.

[11] S. J. Kim, P. Mitran, and V. Tarokh, “Performance bounds for bidirec-tional coded cooperation protocols,” IEEE Trans. Inf. Theory, vol. 54,no. 11, pp. 5235–5241, Nov. 2008.

[12] S. Kim, N. Devroye, P. Mitran, and V. Tarokh, “Achievable rate regionsand performance comparison of half duplex bi-directional relayingprotocols,” IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6405–6418,Oct. 2011.

[13] W. Nam, S.-Y. Chung, and Y. H. Lee, “Capacity of the Gaussian two-way relay channel to within 1

2 bit,” IEEE Trans. Inf. Theory, vol. 56,no. 11, pp. 5488–5494, Nov. 2010.

[14] M. P. Wilson, K. Narayanan, H. D. Pfister, and A. Sprintson, “Jointphysical layer coding and network coding for bidirectional relaying,”IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5641–5654, Nov. 2010.

[15] B. Nazer and M. Gastpar, “Compute-and-forward: Harnessing interfer-ence through structured codes,” IEEE Trans. Inf. Theory, vol. 57, no. 10,pp. 6463–6486, Oct. 2011.

[16] B. Rankov and A. Wittneben, “Achievable rate regions for the two-wayrelay channel,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2006,pp. 1668–1672.

[17] S. Ghasemi-Goojani and H. Behroozi. (Jan. 2013). “Nested latticecodes for Gaussian two-way relay channels.” [Online]. Available:http://arxiv.org/abs/1301.6291

[18] V. Havary-Nassab, S. Shahbazpanahi, and A. Grami, “Optimal distrib-uted beamforming for two-way relay networks,” IEEE Trans. SignalProcess., vol. 58, no. 3, pp. 1238–1250, Mar. 2010.

[19] B. Jiang, F. Gao, X. Gao, and A. Nallanathan, “Channel estimation andtraining design for two-way relay networks with power allocation,” IEEETrans. Wireless Commun., vol. 9, no. 6, pp. 2022–2032, Jun. 2010.

[20] I. K. Ashar, P. Prathyusha, S. Bhashyam, and A. Thangaraj, “Outerbounds for the capacity region of a Gaussian two-way relay channel,”in Proc. Annu. Allerton Conf. Commun., Control, Comput., Oct. 2012,pp. 1645–1652.

[21] Y. Song, N. Devroye, H.-R. Shao, and C. Ngo. (Dec. 2012). “Lat-tice coding for the two-way two-relay channel.” [Online]. Available:http://arxiv.org/abs/1212.1198

Page 30: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

ASHRAPHIJUO et al.: ON THE CAPACITY REGIONS OF TWO-WAY DIAMOND CHANNELS 6089

[22] H. J. Yang, J. Chun, and A. Paulraj, “Asymptotic capacity of theseparated MIMO two-way relay channel,” IEEE Trans. Inf. Theory,vol. 57, no. 11, pp. 7542–7554, Nov. 2011.

[23] A. S. Avestimehr, A. Sezgin, and D. N. C. Tse, “Capacity of the two-wayrelay channel within a constant gap,” Eur. Trans. Telecommun., vol. 21,no. 4, pp. 363–374, Jun. 2010.

[24] D. Gunduz, E. Tuncel, and J. Nayak, “Rate regions for the separated two-way relay channel,” in Proc. Annu. Allerton Conf. Commun., Control,Comput., Sep. 2008, pp. 1333–1340.

[25] E. Yilmaz and R. Knopp, “Hash-and-forward relaying for two-way relaychannel,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jul./Aug. 2011,pp. 1357–1361.

[26] L. Ong and S. J. Johnson, “The capacity region of the restricted two-way relay channel with any deterministic uplink,” IEEE Commun. Lett.,vol. 16, no. 3, pp. 396–399, Mar. 2012.

[27] A. Sezgin, M. A. Khajehnejad, A. S. Avestimehr, and B. Hassibi,“Approximate capacity region of the two-pair bidirectional Gaussianrelay network,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2009,pp. 2018–2022.

[28] S. L. Fong, L. Ping, and C. W. Sung, “Amplify-and-modulo for Gaussiantwo-way relay channel,” in Proc. IEEE Int. Symp. Pers. Indoor MobileRadio Commun. (PIMRC), Sep. 2012, pp. 83–88.

[29] X. Cheng, B. Yu, X. Cheng, and L. Yang, “Two-way full-duplexamplify-and-forward relaying,” in Proc. IEEE Military Commun. Conf.(MILCOM), Nov. 2013, pp. 1–6.

[30] T. Oechtering and A. Sezgin, “A new cooperative transmission schemeusing the space-time delay code,” in Proc. ITG Workshop Smart Anten-nas, Mar. 2004, pp. 41–48.

[31] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Médard, and J. Crowcroft,“XORs in the air: Practical wireless network coding,” in Proc. ACMSIGCOMM, Sep. 2006, pp. 497–510.

[32] C. Hausl and J. Hagenauer, “Iterative network and channel decod-ing for the two-way relay channel,” in Proc. IEEE ICC, Jun. 2006,pp. 1568–1573.

[33] I.-J. Baik and S.-Y. Chung, “Network coding for two-way relay channelsusing lattices,” in Proc. IEEE ICC, May 2007, pp. 3898–3902.

[34] S. Katti, S. Gollakota, and D. Katabi, “Embracing wireless interfer-ence: Analog network coding,” in Proc. ACM SIGCOMM, Aug. 2007,pp. 397–408.

[35] A. S. Avestimehr, A. Sezgin, and D. N. C. Tse, “Approximate capacityof the two-way relay channel: A deterministic approach,” in Proc. Annu.Allerton Conf. Commun., Control, Comput., Sep. 2008, pp. 1582–1589.

[36] W. Nam, S.-Y. Chung, and Y. H. Lee, “Capacity bounds for two-wayrelay channels,” in Proc. IEEE Int. Zurich Seminar Commun., Mar. 2008,pp. 144–147.

[37] B. E. Schein, “Distributed coordination in network information theory,”Ph.D. dissertation, Dept. Electr. Eng. Comput. Sci., MassachusettsInstitute of Technology, Cambridge, MA, USA, 2001.

[38] P. Hu, C. W. Sung, and K. W. Shum, “Joint channel-network codingfor the Gaussian two-way two-relay network,” EURASIP J. WirelessCommun. Netw., May 2010, pp. 1–5.

[39] R. Vaze and R. Heath, Jr., “Optimal amplify and forward strategy fortwo-way relay channel with multiple relays,” in Proc. IEEE Inf. TheoryWorkshop (ITW), Jun. 2009, pp. 181–185.

[40] R. Vaze and R. Heath, Jr., “On the capacity and diversity-multiplexingtradeoff of the two-way relay channel,” IEEE Trans. Inf. Theory, vol. 57,no. 7, pp. 4219–4234, Jul. 2011.

[41] D. W. K. Ng and R. Schober, “Cross-layer scheduling design forOFDMA two-way amplify-and-forward relay networks,” in Proc. IEEEWireless Commun. Netw. Conf. (WCNC), Apr. 2010, pp. 1–6.

[42] T. Mirfakhraie, “Optimal three-time slot distributed beamformingfor two-way relaying,” M.S. thesis, Dept. Elect. Comput. Eng.,Univ. Ontario Inst. Technol., Oshawa, ON, Canada, 2010.

[43] V. Prathyusha, S. Bhashyam, and A. Thangaraj, “The Gaussian two-waydiamond channel,” in Proc. Annu. Allerton Conf. Commun., Control,Comput., Oct. 2013, pp. 1292–1299.

[44] A. S. Avestimehr, S. N. Diggavi, and D. N. C. Tse, “Wireless networkinformation flow: A deterministic approach,” IEEE Trans. Inf. Theory,vol. 57, no. 4, pp. 1872–1905, Apr. 2011.

[45] G. Bresler, A. Parekh, and D. N. C. Tse, “The approximate capacityof the many-to-one and one-to-many Gaussian interference channels,”IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4566–4592, Sep. 2010.

[46] C. Suh and D. N. C. Tse, “Feedback capacity of the Gaussian interfer-ence channel to within 2 bits,” IEEE Trans. Inf. Theory, vol. 57, no. 5,pp. 2667–2685, May 2011.

[47] S. Mohajer, R. Tandon, and H. V. Poor, “On the feedback capacity of thefully connected K-user interference channel,” IEEE Trans. Inf. Theory,vol. 59, no. 5, pp. 2863–2881, May 2013.

[48] M. Ashraphijuo, V. Aggarwal, and X. Wang. (Mar. 2014). “Onthe symmetric K-user interference channels with limited feedback,”IEEE Trans. Inf. Theory, to be published. [Online]. Available:http://arxiv.org/abs/1403.0957

[49] A. Sezgin, A. S. Avestimehr, M. A. Khajehnejad, and B. Hassibi,“Divide-and-conquer: Approaching the capacity of the two-pair bidirec-tional Gaussian relay network,” IEEE Trans. Inf. Theory, vol. 58, no. 4,pp. 2434–2454, Apr. 2012.

[50] V. Cadambe, S. A. Jafar, and S. Shamai, “Interference alignment onthe deterministic channel and application to fully connected AWGNinterference networks,” in Proc. IEEE Inf. Theory Workshop (ITW),May 2008, pp. 41–45.

[51] A. Vahid, C. Suh, and A. S. Avestimehr, “Interference channelswith rate-limited feedback,” IEEE Trans. Inf. Theory, vol. 58, no. 5,pp. 2788–2812, May 2012.

[52] M. Ashraphijuo, V. Aggarwal, and X. Wang, “On the capacity region andthe generalized degrees of freedom region for the MIMO interferencechannel with feedback,” IEEE Trans. Inf. Theory, vol. 59, no. 12,pp. 8357–8376, Dec. 2013.

[53] M. Ashraphijuo, V. Aggarwal, and X. Wang, “On the capacity anddegrees of freedom regions of two-user MIMO interference channelswith limited receiver cooperation,” IEEE Trans. Inf. Theory, vol. 60,no. 7, pp. 4170–4196, Jul. 2014.

[54] T. Ho et al., “A random linear network coding approach to multicast,”IEEE Trans. Inf. Theory, vol. 52, no. 10, pp. 4413–4430, Oct. 2006.

[55] R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, “Network informa-tion flow,” IEEE Trans. Inf. Theory, vol. IT-46, no. 4, pp. 1204–1216,Jul. 2000.

[56] Z. Cheng and N. Devroye, “Two-way networks: When adaptation isuseless,” IEEE Trans. Inf. Theory, vol. 60, no. 3, pp. 1793–1813,Mar. 2014.

[57] U. Erez and R. Zamir, “Achieving 1/2 log (1+SNR) on the AWGNchannel with lattice encoding and decoding,” IEEE Trans. Inf. Theory,vol. 50, no. 10, pp. 2293–2314, Jan. 2004.

[58] R. Knopp, “Two-way wireless communication via a relay station,” inProc. GDR-ISIS Meeting, Mar. 2007, pp. 1–21.

[59] A. S. Avestimehr, M. A. Khajehnejad, A. Sezgin, and B. Hassibi,“Capacity region of the deterministic multi-pair bi-directional relaynetwork,” in Proc. IEEE Inf. Theory Workshop (ITW), Jun. 2009,pp. 57–61.

[60] T. M. Cover and J. A. Thomas, Elements of Information Theory.New York, NY, USA: Wiley, 1991.

[61] R. Zamir, S. Shamai, and U. Erez, “Nested linear/lattice codes forstructured multiterminal binning,” IEEE Trans. Inf. Theory, vol. 48,no. 6, pp. 1250–1276, Jun. 2002.

[62] R. Urbanke and B. Rimoldi, “Lattice codes can achieve capacity on theAWGN channel,” IEEE Trans. Inf. Theory, vol. 44, no. 1, pp. 273–278,Jan. 1998.

[63] U. Erez, S. Litsyn, and R. Zamir, “Lattices which are good for (almost)everything,” IEEE Trans. Inf. Theory, vol. 51, no. 10, pp. 3401–3416,Oct. 2005.

Mehdi Ashraphijuo received the B.Sc. and M.Sc. degrees in electricalengineering from Sharif University of Technology, Tehran, Iran, in 2010 and2012, respectively. He is currently working towards the Ph.D. degree in theDepartment of Electrical Engineering, Columbia University, New York, NY.He was the winner of Qualcomm Innovation Fellowship in 2014. His researchinterests lie in the general areas of network information theory and statisticalsignal processing with applications in wireless communication.

He has worked in the areas of digital communications, underwater sensornetworks, and applications of the queuing theory in wireless sensor networks.His current research focuses primarily on developing fundamental principlesfor communication network design, with emphasis on developing interferencemanagement and understanding the role of feedback and cooperation.

Page 31: 6060 IEEE TRANSACTIONS ON INFORMATION …ma3189/Ashraphijuo_TwoWay_IT.pdfcapacity regions within constant gaps for two special cases of the Gaussian two-way diamond channel. First,

6090 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015

Vaneet Aggarwal (S’08–M’11) received the B.Tech. degree in 2005 from theIndian Institute of Technology, Kanpur, India, and the M.A. and Ph.D. degreesin 2007 and 2010, respectively from Princeton University, Princeton, NJ, USA,all in Electrical Engineering.

He is currently an Assistant Professor at Purdue University, West Lafayette,IN. Prior to this, he was a Senior Member of Technical Staff Research atAT&T Labs-Research, NJ, and an Adjunct Assistant Professor at ColumbiaUniversity, NY. His research interests are in applications of informationand coding theory to wireless systems and distributed storage systems.Dr. Aggarwal was the recipient of Princeton University’s Porter OgdenJacobus Honorific Fellowship in 2009.

Xiaodong Wang (S’98–M’98–SM’04–F’08) received the Ph.D degree inElectrical Engineering from Princeton University. He is a Professor ofElectrical Engineering at Columbia University in New York. Dr. Wang’sresearch interests fall in the general areas of computing, signal processingand communications, and has published extensively in these areas. Among hispublications is a book entitled “Wireless Communication Systems: AdvancedTechniques for Signal Reception”, published by Prentice Hall in 2003. Hiscurrent research interests include wireless communications, statistical signalprocessing, and genomic signal processing. Dr. Wang received the 1999 NSFCAREER Award, the 2001 IEEE Communications Society and InformationTheory Society Joint Paper Award, and the 2011 IEEE CommunicationSociety Award for Outstanding Paper on New Communication Topics. He hasserved as an Associate Editor for the IEEE TRANSACTIONS ON COMMUNI-CATIONS, the IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, theIEEE TRANSACTIONS ON SIGNAL PROCESSING, and the IEEE TRANSAC-TIONS ON INFORMATION THEORY. He is a Fellow of the IEEE and listed asan ISI Highly-cited Author.