Wireless Network-Level Partial Relay Cooperation Nikolaos Pappas , Jeongho Jeon , Anthony Ephremides , Apostolos Traganitis Computer Science Department, University of Crete, Greece Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH) Department of Electrical and Computer Engineering and Institute for Systems Research University of Maryland, College Park, MD 20742 Email: npapas@ics.forth.gr, {jeongho, etony}@umd.edu, tragani@ics.forth.gr Abstract—In this paper, we evaluate the benefits of using one user of a two-user random access system to relay traffic of the other user. I. I NTRODUCTION Cooperative communication helps overcome fading and at- tenuation in wireless networks. Its main purpose is to increase the communication rates across the network and to increase reliability of time-varying links. It is known that wireless communication from a source to a destination can benefit from the cooperation of nodes that overhear the transmission. The classical single relay channel [1] exemplifies this situation. Further work on the relay channel in [2] and [3] has enabled substantial performance improvement. However, there is evidence that additional gains can be achieved with “network-layer” cooperation (or packet-level cooperation), that is plain relaying without any physical layer considerations [4] and [5]. In this work, we focus on this type of cooperation. The work in [6] investigated the network-level cooperation in a network consisting of a source and a relay by considering the cases of full or no cooperation at the relay. A key difference between physical-layer and network-layer cooperation ideas is that the objective rate function that is maximized is the so-called stable throughput region which captures the bursty nature of traffic from the source. In [6], it was shown that the stability region of full cooperation under random-access does not always strictly contain the non- cooperative stability region. The main contribution in this paper is to introduce the notion of partial network-level cooperation by adding a flow controller for the traffic coming to the relay from the source. We prove that the system is always better than or at least equal to the system without the flow controller. Specifically, we provide an exact characterization of the stability region of a network consisting of a source, a relay and a destination node as shown in Fig. 1. We consider the collision channel with erasures and random access of the medium. The source and N. Pappas was supported by ”Heracleitus II - University of Crete”, NSRF (ESPA) (2007-2013) and is co-funded by the European Union and national resources. J. Jeon was partially supported by NIST-ARRA Fellowship Program. This work was supported in part by MURI grant W911NF-08-1- 0238, NSF grant CCF-0728966, and ONR grant N000141110127.This work was partially funded by the Marie Curie IAPP ”AVID-MODE” grant within the 7th European Commission Framework Programme. S 2 Regulator R 1 D 1 2 Queue 1 Queue 2 p 13 p 23 p 12 p a Fig. 1. Network model with regulator at the relay the relay node have external arrivals; furthermore, the relay is forwarding part of the source node’s traffic to the destination. Unlike the work in [6], the relay node is equipped with a flow controller that regulates the internal arrivals from the source based on the conditions in the network to ensure the stability of the queues. We characterize the stable throughput region under conditions of no cooperation at all, full cooperation, and probabilistic (opportunistic) cooperation. By probabilistic cooperation we mean that under certain conditions in the network, the relay may accept a packet from the source. The characterization of the stability regions is known to be challenging because the queues of the users are coupled (i.e., the service process of a queue depends on the status of the other queues). A tool that bypasses this difficulty is the stochastic dominance technique [7]. II. SYSTEM MODEL We consider a time-slotted system in which the nodes are randomly accessing a common receiver as shown in Fig. 1. We denote with S, R, and D the source, the relay and the destination, respectively. Packet traffic originates from S and R. Because of the wireless broadcast nature, R may receive some of the packets transmitted from S and then relay those packets to D. The packets from S which failed to be received by D but were successfully received by R are relayed by R. As we impose half-duplex constraint, R can overhear S only when it is idle. Each node has an infinite size buffer for storing incoming packets, and the transmission of each packet occupies one time slot. Node R has separate queues for the exogenous arrivals and the endogenous arrivals that are relayed through R. But, we can let R to maintain a single queue and merge all the arrivals into a single queue as the achievable stable throughput region is not affected [6]. This is because 2012 IEEE International Symposium on Information Theory Proceedings 978-1-4673-2579-0/12/$31.00 ©2012 IEEE 1127