A Model for the Performance Evaluation of Packet Transmissions Using Type-II Hybrid ARQ over a Correlated Error Channel

Size: px
Start display at page:

Download "A Model for the Performance Evaluation of Packet Transmissions Using Type-II Hybrid ARQ over a Correlated Error Channel"

Transcription

1 A Model for the Performance Evaluation of Packet Transmissions Using Type-II Hybrid ARQ over a Correlated Error Channel Rami Mukhtar, Stephen Hanly, Moshe Zukerman and Fraser Cameron ARC Special research Centre for Ultra-Broadband Information Networks (CUBIN) Department of Electrical and Electronic Engineering University of Melbourne, Victoria 300, Australia {r.mukhtar, s.hanly, m.zukerman}@ee.mu.oz.au Abstract Type-II Hybrid-ARQ (Type-II HARQ) has been shown, under certain circumstances, to increase the efficiency and reduce loss of data transmissions over a wireless channel. However, it is difficult to predict how it will perform when transmission symbol errors are correlated. We present a computationally efficient approach to the performance evaluation of packet transmissions over a wireless link employing Type-II HARQ error mitigation when the physical channel is subject to correlated transmission symbol errors. This provides a tool for static or the online optimization of system parameters. We present numerical results for a wide range of channel statistics, illustrating the effect of bit error correlation, bit error rate, and block size on packet latency and loss rate. I. INTRODUCTION In this paper we present a numerical model for the design and performance evaluation of wireless packet data networks that employ Type-II Hybrid-ARQ (Type-II HARQ) []. The model takes account of physical layer issues, such as bit error correlation and coding, MAC layer issues, such as frame errors and frame retransmissions, and network layer issues, such as packet latency and throughput. Interactions between layers make it difficult to gauge the impact of different parameter choices, or of changing channel conditions. Our approach is to provide a fast and computationally efficient numerical method that enables us to obtain the key performance metrics of each layer. Specific applications of the model include: design and evaluation of end-to-end transport layer flow control algorithms operating over a wireless link, base station router buffer dimensioning, determining quality of service constraints, and dynamic optimisation of link layer parameters. It can be used to rapidly simulate wireless packet data networks, facilitating on-line computation of link throughput and packet delay based on any given channel model. Previous work [2 4] has provided bounds on the throughput of Type-II HARQ assuming that channel errors are independently and identically distributed. Some work has examined the performance of ARQ protocols under correlated errors [5,6], however these models have been limited to modelling the correlation in successful block transmissions, as opposed to explicitly modelling the correlation of bit errors. For simple ARQ schemes that fix the coding rate for all blocks, the two techniques are equivalent, and it is sufficient to model the correlation in successful block transmissions for performance analyses. However, in order to analyse the performance of ARQ schemes that alter the coderate with each successive block transmission (such as Type-II HARQ), it is necessary to explicitly account for correlations in bit errors. A recent contribution [7], which analyses the performance of Type-II HARQ, does account for correlated fading. However, it assumes that the state of the channel is constant over a frame transmission period and independent from the This work was supported by the Australian Research Council. Moshe Zukerman is visiting the Department of Electronic Engineering, City University of Hong Kong, between November 2002 and July 2003

2 2 Fig.. Packet, Frame, Block and Bit hierarchy ordering. state in the previous period. These assumptions limit any investigation of how the performance is affected by varying the size of transmission frames. One of the contributions of the present paper is to model Type-II HARQ explicitly, taking into account the correlation in bit errors. Futhermore, little is understood about how correlated errors affect the statistics of the packet transmission time. This information is essential to design and verify efficient wireless packet data networks. As illustrated in Figure, a packet is made up of several link layer frames, all of which must be correctly received. Due to the varying quality of the channel, several transmission blocks may be required to correctly transmit each frame. The number of transmission blocks required is ultimately determined by the state of the underlying channel. Hence, in order to facilitate the performance evaluation of a packet transmission, it is necessary to analyse the lower layers in the hierarchy shown in Figure, from the bottom-up. The contributions of this paper are as follows. It provides an exact method for calculating the throughput for a Type-II HARQ scheme operating over a binary channel suffering correlated bit errors that can be sufficiently described by a two state Markov Chain, extending the work presented in [4,8]. We then investigate how bit error correlation affects both link layer frame and packet transmission latency over a link employing Type-II HARQ. Finally, for a range of channel conditions, we analyse the effect on packet latency as the number of link layer frames per packet is varied. This paper is an extended version of [9]. The analysis has been extended to incorporate a more general channel error model. We have also included analysis of a modified Type-II HARQ scheme that limits the number of frame retransmissions. The remainder of this paper is organised as follows. A brief summary of Type-II HARQ is presented in Section II, followed by a description of the specific Type-II HARQ algorithm under consideration in Section III. Sections III VII model each of the components in Figure, from the bottom-up as follows. In Section IV, we present a binary channel model that suffers from correlated errors. Section V defines the probabilities of bit errors in a transmission block. These probabilities are then used in Section VI, where we develop a model of a Type-II HARQ frame transmission, and provide a numerical solution to calculate the distribution of frame transmission times. Then, in Section VII, we introduce packets, as collections of frames, extending the frame transmission model to calculate packet transmission times. In Section VIII, we limit the number of block retransmission attempts. Finally, in Section IX, we present numerical results and comment on how block size selection effects system performance. II. TYPE-II HARQ Type-II HARQ [], is a special case of code combining [0], and an extension of automatic repeat request (ARQ). The fundamental principle was first proposed in [], where it was suggested that Reed Solomon codes [2] could be used to code a message of m symbols and c cyclic redundancy check (CRC) bits, producing a codeword containing r + c redundancy bits, of length k = m + c + r. The codeword could then be punctured before transmission, removing up to r redundancy bits. If the receiver is unable to decode the received word without error, as verified by the CRC, then it retains the word and sends a negative acknowledgment (NACK). In response to a NACK, the sender sends an additional block of redundancy bits,

3 3 which the receiver recombines with the retained word and then reattempts to decode the combined word. This process is repeated until the word is correctly decoded, in which case, a new frame is transmitted, or all of the redundancy bits are transmitted and the word is not successfully decoded, in which case, the process is re-initiated. The Maximum Distance Separable (MDS) code family, which includes Reed Solomon codes, are well suited to Type-II HARQ schemes [4]. MDS codes have the property that the minimum distance, denoted d min, between code words of length m + c and dimension k is exactly (k (m + c) + ). As shown by Wicker [4], punctured MDS codes are also MDS. Hence, removing up to r parity bits from the original code word reduces its minimum distance by exactly r. Using this property, an MDS code can be easily segmented into three blocks. The first block can be decoded independently, with increased decoding ability achieved by concatenating the second and third block as required. The model we present is abstracted from the underlying coding scheme, i.e. the code word length, and the minimum distance of the code word and each of the punctured versions are the only parameters required by the model. For illustration purposes, we use a particular MDS coding scheme as described in Section III. III. THE TYPE-II HARQ MODEL We consider a Type-II HARQ scheme based on coding the message and CRC bits with code rate of (m + c)/k. Although MDS codes provide the ability to detect up to d min errors [4], the system does not rely on this feature. The robustness of the system is increased by appending a length c CRC code to the original message, reducing the probability of an undetected error to 2 c [3]. The codeword is then punctured leaving an information block, I, of length n = m + c, and two blocks of redundancy bits, R and R 2 of length n 2 and n 3 respectively, yielding a codeword of length n + n 2 + n 3. Transmission of I results in a codeword of code-rate m/(m + c). If the transmission of the I block is error free, the codeword can correctly be decoded and there is no need to transmit R and R 2. Otherwise, subsequent transmissions of R and R 2 redundancy blocks will result in effective code rates of m/(n + n 2 ) and m/(n + n 2 + n 3 ) respectively. If the receiver is still unable to correctly decode the received word after receiving R 2, then the process is re-initiated, and I is resent. Blocks are sent consecutively until the receiver is able to correctly decode the received word. After transmission of each block, the transmitter halts until either an ACK or NACK is received one round trip time of γ bit periods later, which includes the time for the receiver to process the block, and signal the sender as to whether the decoding was successful. We assume terrestrial transmissions, hence γ is small relative to a block transmission time. For the remainder of the present paper, we assume γ to be fixed. For simplicity, we also assume that the reverse channel is error free. As illustrated in Figure 2, a transmission attempt refers to sending either I, or if need be, I, R or I, R, R 2. If the transmission attempts fails (which implies I, R, R 2 was sent), then another attempt is made. A cycle refers to the total time required for the correct reception of a message frame. One or more block transmissions (where the number depends on the channel quality) is required to send a link layer frame. The scheme presented in this paper slightly deviates from the Type-II HARQ schemes presented in [4,8]. However, the fundamental technique of increasing the amount of redundancy in each block retransmission remains. We assume a block-coding scheme is used and that the error correcting ability of the code does not depend on the location of bit errors within the transmission attempt but only on the number of bit errors. Our methods can be extended to convolutional codes, where bit interleaving is then required to satisfy our assumption that the error correcting ability of the code is independent of position of the symbol errors. Bits are not interleaved across transmission attempts or code words, hence correlated errors will result in some blocks bearing a greater proportion of the errors. A key feature of our model is that it explicitly models the correlation of channel bit errors, and does not place any restriction on the relationship between the channel statistics and block size. Accordingly, the Type-II HARQ scheme can correct zero errors after receiving I, up to T B errors after receiving I and R, and up to T C errors after receiving I, R and R 2. In the case of MDS codes, T B and T C are lower bounded by n 2 and (n 2 + n 3 ) respectively. For the remainder of this paper

4 4 Fig. 2. A typical Type-II HARQ transmission sequence we shall consider a scheme that employs a rate /3 code, and all block transmissions are of equal length, i.e. n = n 2 = n 3 = n. Finally, we assume that the CRC is long enough such that the probability of not detecting an error in the message is insignificant. Figure 2 illustrates the Type-II HARQ scheme under consideration. Starting from the bottom level, the next four sections address each of the levels of the hierarchy shown in Figure. IV. THE CHANNEL MODEL A generalised version of the Gilbert [4] channel model is used to capture the effect of burst channel errors [5]. Assuming a continuous stream of binary symbols to be transmitted over the channel, we allow the physical channel to be in one of two states: good (g) or bad (b). A binary symbol is inverted with probability P G or P B if it is transmitted whilst the channel is in the good or bad state respectively. The channel remains in the good state with probability q, and in the bad state with probability u. Transitions between the good to bad or bad to good states occur with probability ( q) and ( u) respectively. All transitions occur on symbol boundaries. Let H be the transition probability matrix of the channel state process. It is therefore given by: H = State g b g q q. () b u u The Bit Error Rate (BER) is thus given by: BER = P G( u) + P B ( q). (2) 2 q u Solving for q we obtain: q = P G( u) + P B + uber 2BER. (3) P B BER V. BLOCK ERROR ANALYSIS Having established the channel model, in this section we will construct a model that leads to the statistical characterization of the number of bit errors (after demodulation, but before decoding) that occur within a transmission attempt conditional on past block transmissions. Let B ij, i =, 2, 3; j =, 2,... denote the ith block of the jth transmission attempt, and C ij denote the state of the channel during the first bit period of that block. Let E denote the number of errors in block B j, E 2 the total number of errors in both B j and B 2j, and E 3 to total number of errors in B j, B 2j and B 3j. We use the notation [e, e 2, e 3, c 4, c 3, c 2, c ] to describe a single frame transmission event, where C j = c, C 2j = c 2, C 3j = c 3 C (j+) = c 4, E = e, E 2 = e 2, and E 3 = e 3. Note that the letter e is used to denote the total number of accumulated errors at each stage of the frame transmission, and the letter c is used to denote the channel state at the start of each block transmission. The ordering of each symbol determines which block is being referred to, the subscripts are simply labels. With a slight abuse of notation, we can write an abbreviate form to describe a partial frame transmission attempt, which has not yet been completed. For example, [e 7, e, c 9, c, c 6 ] denotes C 3j = c 9, C 2j = c, C j = c 6, E = e 7, and E 2 = e. Note that we have picked random subscripts in this example to demonstrate that the subscripts can be used freely as labels.

5 5 Using this notation, we define some probabilities that will be of interest. P[e, c 2 c ] = P{(E = e ) and (C 2j = c 2 ) given (C j = c )}, P[, e 2, c 3 E > 0, c 2, c ] = P{(E 2 = e 2 ) and (C 3j = c 3 ) and given (E > 0) and (C 2j = c 2 ) and (C j = c )}, P[,, e 3, c 4 E 2 > T B, E > 0, c 3, c 2, c ] = P{(E 3 = e 3 ) and (C 3(j+) = c 4 ) given (E 2 > T B ) and (E > 0) and (C 3j = c 3 ) and (C 2j = c 2 ) and (C j = c )}. Note that the above defined three probabilities are independent of j, since the channel is described by a stationary two state Markov chain, and we condition on the channel state at the beginning of the transmission attempt, namely C j. We take advantage of this conditional independence property to construct a manageable finite Markov chain to model Type-II HARQ. Now, let P (n) [e, c c] denote the probability of having e errors in block a of n consecutive bits and ending in the channel state c, given that we started the block of bit transmissions in the channel state c. For all valid values of c, c, e and n, this probability can be obtained by the following recursion [5]: P (n) [e, g g] = P (n )[e, g g]q( P G ) + P (n ) [e, b g]( u)( P B ) +P (n ) [e, g g]qp G + P (n ) [e, b g]( u)p B (4) P (n) [e, b g] = P (n )[e, g g]( q)p G + P (n ) [e, b g]up B +P (n ) [e, g g]( q)( P G ) + P (n ) [e, b g]u( P B ) (5) P (n) [e, g b] = P (n )[e, g b]q( P G ) + P (n ) [e, b b]( u)( P B ) +P (n ) [e, g b]qp G + P (n ) [e, b b]( u)p B (6) P (n) [e, b b] = P (n )[e, b b]up B + P (n ) [e, g b]( q)p G +P (n ) [e, b b]u( P B ) + P (n ) [e, g b]( q)( P G ) with the conditions: P (0) [0, b b] =, P (0) [0, g b] = 0, P (0) [0, g g] =, P (0) [0, b g] = 0, and P n [e, c 2 c ] = 0, e > n. In the above recursion, any probabilities that include invalid arguments are zero, only values of e and n that satisfy e, n 0 are valid. Using (4) (7), we obtain P[e, c 2 c ] for all valid values of e, c, c 2, and γ using: [ ] [ ] P[e, g g] P[e, b g] Pn [e =, g g] P n [e, b g] H P[e, g b] P[e, b b] P n [e, g b] P n [e, b b] γ. (8) In order to facilitate the construction of a Markov chain that describes the Type-II HARQ process, we must first compute the following conditional probabilities. Conditional on c and c 2, the number of errors made in the first block, E is independent of c 3. Note that by definition E i 0 i. Similarly, conditional on c 2 and c 3, the number of errors made in the second block transmission is independent of c and E. Hence, it can be shown that the probability of making a total of e 2n errors in two block transmissions conditional on an error in the first block transmission is given by: P[, e, c 3 E > 0, c 2, c ] = = P[e c 2, c ] P[E e,e :e >0,e > 0 c 2, c ] P[e, (e + e ), c 3 e, c 2, ] (9) +e =e ( ) P[e, c 2 c ] (P[e, (e + e ), c 3 e, c 2, ]) P[c 2 c ]P[E > 0 c 2, c ] n+, where e is the number of errors in the second block transmission, and denotes the convolution of two vectors, which are a list of conditional probabilities of length n and (n + ) respectively. However, it then follows that: ( P[, e, c 3 E > 0, c 2, c ] = P[e, c 2 c ] P[c 2 c ]P[E > 0 c 2, c ] n ) n (7) (P[e, c 2 c ]) n+. (0)

6 6 Fig. 3. State transitions between phases S, S2, S3 and S4 Note that P[c 2 c ] is given by (H n+γ ) c,c 2, i.e. the (c, c 2 )th element of the matrix H n+γ. By noting that conditional on c 3 the number of errors made in the third block is independent of c, c 2, E and E 2, we can compute the probability of making e 3n errors in three block transmissions given that E > 0 and E 2 > T B : P[,, e, c 4 E 2 > T B, E > 0, c 3, c 2, c ] = [ P[, e 2 E > 0, c 3, c 2, c ] e 2,e :e 2 >T B e 2 +e =e P[E 2 > T B E > 0, c 3, c 2, c ] ] () P [, e 2, (e 2 + e ), c 4 e 2, c 3,, ] = ( P[, e 2, c 3 E > 0, c 2, c ] ) P[c 3 c 2 ]P[E 2 > T B E > 0, c 3, c 2, c ] (P [, e 2, (e 2 + e ), c 4 e 2, c 3,, ]) n+, 2n T B where e denotes the number of errors in the third block transmission, and is the convolution between two vectors, which are a list of conditional probabilities of length 2n T B and n + respectively. It follows that: P[,, e, c 4 E 2 > T B, E > 0, c 3, c 2, c ] = ( ) P[, e 2, c 3 E > 0, c 2, c ] P[c 3 c 2 ]P[E 2 > T B E > 0, c 3, c 2, c ] 2n T B (2) (P[e, c 2 c ]) n+. By noting that P[e c 2, c ] = P[e, c 2 c ]/P[c 2 c ], P[e, e 2, c 3 c 2, c ] = P[e, e 2 c 3, c 2, c ]/P[c 3 c 2 ], all of these probabilities can be computed directly from (8) and (). VI. FRAME TRANSMISSION MODEL We employ a discrete time Markov chain to model a link layer frame transmission over a Gilbert channel [6], where the unit of time is equal to a block transmission period, and then apply matrix geometric techniques to compute the probability distribution of frame transmission times [7]. The process has 6 states that correspond to one of the four phases of transmission (S, S2, S3, S4) as marked in Figure 3. The start of a transmission of a new frame is marked by the phase S. The phases S2 and S3 represent the transmission of the first and second redundancy block respectively. The phase S4 represents a retransmission of the original information block. Figure 3 shows all possible transitions between phases. Unfortunately, it is not sufficient to construct a Markov chain from these four phases, as explained below. The channel can be in one of two states at the start of phase S, good or bad, hence we devote two states to this phase labelled (S, g) and (S, b) respectively. On arrival at phase S2 we know that the number of errors in the first block transmission, B j was greater than zero. Furthermore, the system has already accumulated a significant amount of channel memory as a result of transmission of the previous block over the channel. In order to capture the range of possible bit error patterns, 2 n states would be required for each phase, where

7 7 n is the number of symbols attributed to that phase. However, based on the assumption made in Section III, only the number of errors within each block, as opposed to the relative position of errors, is important. Due to the Markovian nature of the channel, the number of errors in each block is solely determined by the state of the channel at the start of the block. This observation enables us to keep the number of states (6) independent of the block size, n, instead of increasing exponentially with n. It follows that the states that correspond to phase S2 must contain information about the current channel state as well as what the channel state was at the start of S. Accordingly, we devote four states to phase S2 : (S2, gg), (S2, gb), (S2, bg) and (S2, bb). The notation (S2, c, c 2 ) denotes the state of being in phase S2, having started phase S2 in channel state c 2 (i.e. C 2j = c 2 ), and the previous phase (being S or S4) having started in the channel state c (i.e. C j = c ). Note that reaching the state S3 signifies that we made more than a total of T B errors in the first two block transmissions and at least one error was made in the first block transmission, i.e. E 2 > T B and E > 0. Similar to the previous case, the states representing phase S3 will require eight states: (S3, ggg), (S3, ggb), (S3, gbg), (S3, gbb), (S3, bgg), (S3, bgb), (S3, bbg), (S3, bbb). We use the notation (S3, c, c 2, c 3 ) to denote the state of being in phase S3 and having started that phase in channel state c 3 (i.e. C 3j = c 3 ), and the previous phase (S2) having started in the channel state c 2, and the phase previous to that (S or S4) having started in channel state c. However reaching phase S4 signifies the re-initiation of the Type-II HARQ process, the receiver discarding previous blocks, and the sender retransmitting the original block I. Accordingly, we only need to devote two states to this phase, (S4, g) and (S4, b), corresponding to being at phase S4 and starting phase S4 in the good or bad state. The transition matrix, denoted T, is shown in Table I. Given specific channel parameters, u, q, P G and P B, we construct the transition matrix T of the Markov chain. Let π be the vector of steady state probabilities, i.e. the probability of being in state i is given by π(i). The vector π is obtained by π = πt. The proportion of the time spent in phase S is given by the sum of the elements π(s, g) and π(s, b). If we assume a consecutive train of frame transmissions, then the probability of starting a frame transmission in state g or b will be given by π(s, g) and π(s, b), respectively. We refer to (S, g) and (S, b), as terminating states, since transitioning into either of these states marks a frame transmission. Hence, the number of transitions required to return to a terminating state determines a frame transmission time. Let the random variable Q describe the frame transmission time in block intervals. In order to facilitate the computation of the distribution of Q, we construct the following matrices from T. Let A (i,j) be the (i, j)th entry of the matrix A. The matrix T is a 6 by 6 matrix with entries: { T(i,j) T(i,j) j (S, g), (S, b) =. (3) 0 otherwise Hence, the entries of the matrix T k (the kth power of the matrix T ) is the k step transition probability matrix between non-terminating states, i.e. (T ) k i,j = P{terminating in state j after k transitions and not visiting a terminating state given starting in state i}. Notice that since T does not include transitions into terminating states, its rows sum to less than one. The row vector τ has the 6 elements τ i = P{starting a new frame transmission in state i}. Assuming consecutive frame transmissions, τ = [π(s, g) π(s, b) ]. The column vector f is of length 6, with entries f i = P{transitioning into a terminating state from state i}. Hence, f = T The distribution of Q is phase type [8], and can be calculated using: P[Q = 0] = 0

8 8 S, c 4 S2, c 4 c 5 S3, c 4 c 5 c 6 S4, c 4 n P[e, c 5 c ] e= S, c P[0, c 4 c ] if c = c otherwise 2n P[, e 2, c 6 E > 0, c, c 2 ] TB e2=tb+ S2, c c 2 P[, e 2, c 4 E > 0, c 2, c ] 0 if c = c 4 &c 2 = c 5 0 e2= 0 otherwise TC S3, c c 2 c 3 P[,, e 3, c 4 E 2 > T B, E > 0, c 3, c 2, c ] 0 0 P[,, e 3, c 4 E 2 > T B, E > 0, c 3, c 2, c ] e3=tb+ e3=tc+ n P[e, c 5 c 4 ] e= S4, c P[0, c 4 c ] if c = c otherwise TABLE I TRANSITION MATRIX FOR THE TYPE-II HARQ SYSTEM OVER A CORRELATED ERROR CHANNEL MODEL P[Q = k] = τt k f. (4) VII. PACKET TRANSMISSION MODEL As shown in Figure, a single packet is made up of several link layer frames. Let z denote the number of frames per packet. All of a packet s component frames need to be successfully received, or otherwise, the packet will be discarded by the network layer. Hence, a packet transmission is simply a train of successful frame transmission cycles. We use this fact to construct a Markov chain that models a packet transmission. Let U be the transition matrix of a Markov chain that describes a packet transmission. The chain described by U is a concatenation of z chains, as specified by the transition matrix T. We construct U directly from T as follows. Consider the Markov chain described by T : a transition into states (S, g) or (S, b) marks the completion of a successful frame transmission cycle. Let t be a 6 by 6 matrix, the first and second columns containing the transition probabilities of transitioning into states (S, g) and (S, b) respectively, all other elements are set to zero. Thus, t = T T. Finally, let t be a column vector described by t = t, where is a column vector with all elements equal to one. We now construct the transition matrix, U, of the Markov chain that represents the successful transmission of a packet containing z frames: U = T t T t t T. (5) The chain represents the sequential transmission of z frames, each frame requiring 6 states, with an additional absorbing state (the st state) marking the successful transmission of the zth frame of the packet. We assume that each packet transmission is separated by a random delay long enough such that the channel will be in its steady state at the initiation of a new packet transmission. Let the discrete random variable, X, represent a successful packet transmission time, expressed in block intervals. The distribution of X is phase type [8], and can be directly calculated from U. By partitioning the matrix U according to the lines

9 9 of division in (5), we can express it in the following form: [ 0 U ω V ], (6) where ω is a 6z column vector, and V is a 6z by 6z matrix. The distribution of X is given by [8]: P[X = 0] = 0 P[X = k] = θv k ω, (7) where θ is a row vector that specifies the probability of starting the packet transmission in a particular state, i.e. θ = [P (g) P (b) ]. Note that we can easily extend the model to account for packet transmissions of random length by using θ of the form: θ = [ 2 3 6(z 2) + 6 6(z ) + 6(z ) + 2 6(z ) + 3 6z θ zg θ zb 0 0 θ g θ b 0 0 where θ is denotes P{a packet has i frames given that it starts in channel state s }. VIII. TRUNCATED TYPE-II HARQ We now consider a modified Type-II HARQ scheme, which limits the maximum number of retransmission attempts of each frame to F. If a frame fails to be successfully delivered after F attempts (refer to Section II), the erroneous frame is passed, as is, to higher layers of the network protocol stack. The net effect is that packets passed to higher layers can contain errors. Some network protocols will employ a checksum to detect these errors, and subsequently discard the erroneous packet. Random packet losses affect performance of flow control protocols, which use packet loss as an indicator of congestion within the network. This motivates us to relate the channel statistics to the probability of packet loss when a truncated Type-II HARQ scheme is employed. By definition, a packet is correctly delivered only if z consecutive frames are received. A frame is successfully received if it is transmitted within three block intervals. The probability of this event is given by: P[Q 3F ] = 3F k= τt k f ], (8) = τt 3F. (9) Since packet successes or failures are assumed to be independent events (unlike frames), the probability of a packet error, i.e. less than z consecutive successful frame transmissions, is given by: P[Packet Error] = (P[Q 3F ]) z. Hence, the probability that an erroneous packet is received is given by: P[Packet Error] = ( τt 3F ) z. (20) IX. PERFORMANCE RESULTS AND DISCUSSION Type-II HARQ is a scheme for automatic adaptive rate coding. The performance of the scheme is a non-trivial function that depends on both the characteristics of the physical channel and the parameters of the system. Due to the complexity of cross-layer interactions, it is not straight forward to gain analytical insight into how system parameters should be chosen. This is indeed a motivation for having developed a

10 0 numerical model. The model facilitates the performance evaluation of the scheme under specific channel conditions. This provides us with an opportunity to optimise the system parameters statically, based on channel modelling, or dynamically, by making on-line measurements of the channel characteristics. Dynamic optimisation of Type-II HARQ is an attractive application of the model, and is a topic of future research. It is not the intention of this section to consider the system performance in every possible situation, but rather to highlight some interesting scenarios that demonstrate how the relationship between channel characteristics and the system parameters affect the systems performance. We will investigate three aspects of system performance for a range of system parameters and channel conditions. Firstly, we fix the system parameters and study how the average throughput of frame transmissions is affected by the channel characteristics. Secondly, we study how packet transmission times are affected by the block size parameter, for a range of channel conditions. Finally, we investigate how the F system parameter (the maximum permissable number of frame retransmissions) affects the packet loss probability. The aim of this section is to compare how the predicted performance of the Type-II HARQ algorithm is affected by various system parameters and channel conditions. For the purpose of illustration, the results in this section will use the following specific set of parameters: P G = 0 5, P B = 0.5, τ = 3 (bit periods), c = 2 (bits), T B = n/2, (bits) T C = n (bits), where all block transmissions are n bits in length. A. System Throughput In order to compare the performance of Type-II HARQ for various channel conditions, we devise a simple figure of merit, the average throughput, P av, which is simply the proportion of time spent sending new information bits (initial I block transmissions). Accounting for the wasted time due to the feedback delay, τ, P av is given by ( ) m + c P av = (π(s, g) + π(s, b)) m + c + τ Given a fixed block size, the average throughput for a range of BER (uncoded) and bit error correlations is shown in Figure 4. As expected, neither of the curves cross, indicating that the average throughput decreases monotonically as BER increases. However, the relationship between throughput and bit error correlation is more complex. In order to gain further insight into this complex relationship we need to explain how Type-II HARQ responds to varying channel conditions. The system throughout is directly proportional to the average coding rate. An increase in the average number of redundancy blocks required for correct reception decreases the average coding rate. Recall that for each frame transmission, the receiver is unable to correct any errors after receiving the first block transmission. For this reason, sparsely distributed errors will increase the likelihood that the second or third (redundancy) block will be required to correctly decode the received word, decreasing the average coding rate. In contrast, as the channel correlation increases, channel errors become more tightly grouped together, and are likely to be contained in a minority of block transmissions, leaving other blocks error free, increasing the average code rate. This is true in general for all BER, and reflects the results in Figure 4. For a high BER (BER = 0.2) we see a departure from this trend for u = 0. to 0.95, this does not contradict our previous argument, it is simply a result of the third redundancy block transmission being activated. At high bit error rates the probability of having to transmit the second block is very high. As the error correlation increases for fixed BER, the probability of failing to decode the received word after two block transmissions initially increases, increasing the probability of a third (redundancy) block transmission, causing a decrease in the average throughput. B. Frame Size and Packet Latency We now examine the effect of block size selection on packet latency. Packet latency is inversely proportional to the system throughout. The adaptive nature of Type-II HARQ makes it difficult to make precise

11 Throughput BER = 0.00 BER = 0.0 BER = 0. BER = u (Bit Error Correlation) Fig. 4. Throughput vs. Correlation of bit errors, block size = 80 message bits. statements about the effect of block size on system throughput. There are a number of possibly conflicting effects that need to be considered: ) By increasing the block size, we make the adaptive granularity of the system increasingly coarse. For some system parameter choices and channel characteristics, this can mean that decreasing the block size will lead to an increase in throughput. To illustrate this point, consider the possible inefficiency of transmitting a large block of redundancy bits when perhaps only a few more were needed; this will obviously lead to an unnecessary decrease in throughput. 2) If we condition on a fixed number of redundancy block transmissions (i.e. a fixed rate coding scheme), the probability of making a decoding error is a decreasing function of the block size, as is well known in information theory. This result indicates that increasing the block size could potentially improve the system throughput. 3) The overhead of the fixed size CRC reduces the transmission efficiency. As the block size is reduced, the overhead of the CRC is increased. The degree to which each of these effects influences the system performance will be highly dependent on the relationship between the channel characteristics and the system parameters, in particular the block size. To illustrate this by example, we have numerically evaluated the model for a range of channel conditions and block sizes. All of the results in Figure 5 confirm that the 3rd effect is most pronounced for small block sizes. Figure 5(a) indicates that for low BER the st effect dominates for low correlation, whilst the 2nd effect dominates at high correlation. In contrast, Figure 5(b) indicates that the st effect dominates for high correlation, whilst the 2nd effect dominates for low correlation. These results clearly demonstrate that optimal selection of system parameters is highly dependent on the channel characteristics. This further motivates the model and its possible application to a dynamic algorithm that optimally sets system parameters from on-line measurements of channel conditions. C. Packet Loss Probability As expected, Figure 6 demonstrates the negative relationship between channel correlation and packet loss rate when a truncated scheme is employed. Notice that the curves for different values of F (the maximum number of transmission attempts) grow further apart with increasing u; demonstrating the substantial advantage of increasing F for high error correlation. Also note the significant reduction in packet loss probability when F is increased from two to three. X. CONCLUSION In this paper we have modelled a complex adaptive link layer transmission protocol with a relatively simple, finite state Markov chain. By applying matrix geometric techniques to this model, with have derived

12 u = 0.99 u = u = 0.99 u = 0.5 Mean Transmission Time (bit periods) Mean Transmission Time (bit periods) Frame Size (bits) Frame Size (bits) (a) BER = 0 4. (b) BER = 0.. Transmission Time Variance (bit periods) 2.5 x u = 0.99 u = 0.5 Transmission Time Variance (bit periods) 4 x u = 0.99 u = 0.5 Fig Frame Size (bits) Frame Size (bits) (c) BER = 0 4. (d) BER = 0.. Mean and variance of packet transmissions vs. frame size, Packet Size = 2400 bits a computationally efficient method to predict system throughput, link layer frame transmission latencies, and network layer packet transmission latencies and loss rates. This provides a tool for characterizing the effect of correlated transmission symbol errors on every layer of the network protocol stack. Numerical analysis conducted for a range of specific system parameters indicates that the performance of packet data transmissions over Type-II HARQ is a complex function of both the channel characteristics, and the system parameters. This confirms that the model developed is an essential tool for gaining insight into the behaviour of the system performance. REFERENCES [] S. Lin and P. S. Yu, A hybrid ARQ scheme with parity retransmission for error control of satellite channels, IEEE Trans. Commun., vol. COM-30, no. 7, pp , 982. [2] J. Hagenauer, Rate-compatible punctured convolutional codes (RCPC Codes) and their applications, IEEE Trans. Commun., vol. 36, no. 4, pp , 988. [3] S. Kallel, Complementary punctured convolutional (CPC) codes and their applications, IEEE Trans. Commun., vol. 43, no. 6, pp , 995. [4] S. B. Wicker and M. J. Bartz, Type-II Hybrid-ARQ protocols using punctured MDS codes, IEEE Trans. Commun., vol. 42, no. 2/3/4, pp , 994. [5] Y. J. Cho and C. K. Un, Performance analysis of ARQ error controls under markovian block error pattern, IEEE Trans. Commun., vol. 42, no. 2/3/4, pp , 994. [6] D. L. Lu and J. F. Chang, Performance of ARQ protocols in nonindependent channel errors, IEEE Trans. Commun., vol. 4, no. 5, pp , 993. [7] E. Malkamki and H. Leib, Performance of truncated Type-II hybrid ARQ schemes with noise feedback over block fading channels, IEEE Transactions on Communications, vol. 48, no. 9, September [8] Q. Zhang, T. F. Wong, and J. S. Lehnert, Performance of a Type-II hybrid ARQ protocol is slotted DS-SSMA packet radio systems, IEEE Trans. Commun., vol. 47, no. 2, pp , 999. [9] R. Mukhtar, M. Zukerman, and F. Cameron, Packet latency for type-ii hybrid arq transmissions over a correlated error channel, in In Proc. European Wireless 2002, Next Generation Wireless Networks: Technologies, Protocols, Services and Applications, Florence, Italy, February 2002, vol. of EW2002, pp

13 F = 2 F = 3 F = 4 F = 5 Probability of Packet Error u Fig. 6. Probability of packet error for the case; BER = 0.3, z = 50, frame size = 80 message bits [0] D. Chase, Code combining - a maximum-likelihood decoding approach for combining an arbitrary number of noisy packets, IEEE Trans. Commun., vol. COM-33, no. 5, pp , 985. [] D. M. Mandelbaum, An adaptive-feedback coding scheme using incremental redundancy, IEEE Trans. Inform. Theory, pp , 974. [2] D. M. Mandelbaum, On decoding of reed-solomon codes, IEEE Trans. Inform. Theory, vol. IT-7, no. 6, pp , 97. [3] K. A. Witzke and C. Leaung, A comparison of some error detecting CRC code standards, IEEE Trans. Commun., vol. COM-33, no. 9, pp , 985. [4] E. N. Gilbert, Capacity of a burst noise channel, Bell Systems Technical Journal, pp , September 960. [5] J. R. Yee and E. J. Weldon, Evaluation of the performance of error-correcting codes on a gilbert channel, IEEE Trans. Commun., vol. 43, no. 8, pp , August 995. [6] W. Turin, Digital Transmission Systems: performance analysis and Medeling, McGraw-Hill, New York, st edition, 998. [7] R. Mukhtar and S. Hanly, A model for tcp behaviour over cellular radio channels with link layer error recovery, in Proc. IEEE Globecom 200, San Antonio, TX, 200, pp [8] G. Latouche and V. Ramaswami, Introduction to Matrix Analytic Methods in Stochastic Modeling, ASA-SIAM series on statistics and applied probability. SIAM, Philadelphia, st edition, 999.

Introduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved. Introduction to Wireless & Mobile Systems Chapter 4 Channel Coding and Error Control 1 Outline Introduction Block Codes Cyclic Codes CRC (Cyclic Redundancy Check) Convolutional Codes Interleaving Information

More information

Modeling and Simulation NETW 707

Modeling and Simulation NETW 707 Modeling and Simulation NETW 707 Lecture 6 ARQ Modeling: Modeling Error/Flow Control Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Data Link Layer Data Link Layer provides

More information

CSE 123: Computer Networks

CSE 123: Computer Networks CSE 123: Computer Networks Total points: 40 Homework 1 - Solutions Out: 10/4, Due: 10/11 Solutions 1. Two-dimensional parity Given below is a series of 7 7-bit items of data, with an additional bit each

More information

On the Channel Statistics in Hybrid ARQ Systems for Correlated Channels

On the Channel Statistics in Hybrid ARQ Systems for Correlated Channels On the Channel Statistics in Hybrid ARQ Systems for Correlated Channels Marco Levorato, Leonardo Badia, Michele Zorzi Department of Information Engineering, University of Padova, Via Gradenigo 6/B, 35131

More information

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Cooperative HARQ with Poisson Interference and Opportunistic Routing Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline

More information

Rate-Compatible Low Density Parity Check Codes for Capacity-Approaching ARQ Schemes in Packet Data Communications

Rate-Compatible Low Density Parity Check Codes for Capacity-Approaching ARQ Schemes in Packet Data Communications Rate-Compatible Low Density Parity Check Codes for Capacity-Approaching ARQ Schemes in Packet Data Communications Jing Li (Tiffany) Electrical Engineering Dept, Texas A&M University College Station, TX

More information

Multimedia Systems WS 2010/2011

Multimedia Systems WS 2010/2011 Multimedia Systems WS 2010/2011 15.11.2010 M. Rahamatullah Khondoker (Room # 36/410 ) University of Kaiserslautern Department of Computer Science Integrated Communication Systems ICSY http://www.icsy.de

More information

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a

More information

Turbo Compression. Andrej Rikovsky, Advisor: Pavol Hanus

Turbo Compression. Andrej Rikovsky, Advisor: Pavol Hanus Turbo Compression Andrej Rikovsky, Advisor: Pavol Hanus Abstract Turbo codes which performs very close to channel capacity in channel coding can be also used to obtain very efficient source coding schemes.

More information

FEEDBACK does not increase the capacity of a discrete

FEEDBACK does not increase the capacity of a discrete 1 Sequential Differential Optimization of Incremental Redundancy Transmission Lengths: An Example with Tail-Biting Convolutional Codes Nathan Wong, Kasra Vailinia, Haobo Wang, Sudarsan V. S. Ranganathan,

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.2: Error Detection & Correction Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

CSCI 2570 Introduction to Nanocomputing

CSCI 2570 Introduction to Nanocomputing CSCI 2570 Introduction to Nanocomputing Information Theory John E Savage What is Information Theory Introduced by Claude Shannon. See Wikipedia Two foci: a) data compression and b) reliable communication

More information

An Improved Channel Quantization Method for Performance Evaluation of Incremental Redundancy HARQ Based on Reliable Channel Regions

An Improved Channel Quantization Method for Performance Evaluation of Incremental Redundancy HARQ Based on Reliable Channel Regions An Improved Channel Quantization Method for Performance Evaluation of Incremental Redundancy HARQ Based on Reliable Channel Regions Leonardo Badia, Marco Levorato, Michele Zorzi IMT Lucca Institute for

More information

P e = 0.1. P e = 0.01

P e = 0.1. P e = 0.01 23 10 0 10-2 P e = 0.1 Deadline Failure Probability 10-4 10-6 10-8 P e = 0.01 10-10 P e = 0.001 10-12 10 11 12 13 14 15 16 Number of Slots in a Frame Fig. 10. The deadline failure probability as a function

More information

Practical Polar Code Construction Using Generalised Generator Matrices

Practical Polar Code Construction Using Generalised Generator Matrices Practical Polar Code Construction Using Generalised Generator Matrices Berksan Serbetci and Ali E. Pusane Department of Electrical and Electronics Engineering Bogazici University Istanbul, Turkey E-mail:

More information

Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel

Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel Brian M. Kurkoski, Paul H. Siegel, and Jack K. Wolf Department of Electrical and Computer Engineering

More information

Analysis of Scalable TCP in the presence of Markovian Losses

Analysis of Scalable TCP in the presence of Markovian Losses Analysis of Scalable TCP in the presence of Markovian Losses E Altman K E Avrachenkov A A Kherani BJ Prabhu INRIA Sophia Antipolis 06902 Sophia Antipolis, France Email:altman,kavratchenkov,alam,bprabhu}@sophiainriafr

More information

Multiple Description Transform Coding of Images

Multiple Description Transform Coding of Images Multiple Description Transform Coding of Images Vivek K Goyal Jelena Kovačević Ramon Arean Martin Vetterli U. of California, Berkeley Bell Laboratories École Poly. Féd. de Lausanne École Poly. Féd. de

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Cyclic Historical Redundancy Development Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify

More information

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005 Chapter 7 Error Control Coding Mikael Olofsson 2005 We have seen in Chapters 4 through 6 how digital modulation can be used to control error probabilities. This gives us a digital channel that in each

More information

Assume that the follow string of bits constitutes one of the segments we which to transmit.

Assume that the follow string of bits constitutes one of the segments we which to transmit. Cyclic Redundancy Checks( CRC) Cyclic Redundancy Checks fall into a class of codes called Algebraic Codes; more specifically, CRC codes are Polynomial Codes. These are error-detecting codes, not error-correcting

More information

Error Correction Methods

Error Correction Methods Technologies and Services on igital Broadcasting (7) Error Correction Methods "Technologies and Services of igital Broadcasting" (in Japanese, ISBN4-339-06-) is published by CORONA publishing co., Ltd.

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

TCP over Cognitive Radio Channels

TCP over Cognitive Radio Channels 1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done

More information

CS6304 / Analog and Digital Communication UNIT IV - SOURCE AND ERROR CONTROL CODING PART A 1. What is the use of error control coding? The main use of error control coding is to reduce the overall probability

More information

Optimization of the Hamming Code for Error Prone Media

Optimization of the Hamming Code for Error Prone Media Optimization of the Hamming Code for Error Prone Media Eltayeb Abuelyaman and Abdul-Aziz Al-Sehibani College of Computer and Information Sciences Prince Sultan University Abuelyaman@psu.edu.sa Summery

More information

Fast-Decodable MIMO HARQ Systems

Fast-Decodable MIMO HARQ Systems 1 Fast-Decodable MIMO HARQ Systems Seyyed Saleh Hosseini, Student Member, IEEE, Jamshid Abouei, Senior Member, IEEE, and Murat Uysal, Senior Member, IEEE Abstract This paper presents a comprehensive study

More information

Optimization of the Hamming Code for Error Prone Media

Optimization of the Hamming Code for Error Prone Media 278 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.3, March 2008 Optimization of the Hamming Code for Error Prone Media Eltayeb S. Abuelyaman and Abdul-Aziz S. Al-Sehibani

More information

Error Detection & Correction

Error Detection & Correction Error Detection & Correction Error detection & correction noisy channels techniques in networking error detection error detection capability retransmition error correction reconstruction checksums redundancy

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

Simplified Analysis of HARQ Cooperative Networks Using Finite-State Markov Chains

Simplified Analysis of HARQ Cooperative Networks Using Finite-State Markov Chains Simplified Analysis of HARQ Cooperative Networks Using Finite-State Markov Chains Faton Maliqi, Francesca Bassi, Pierre Duhamel, Ilir Limani L2S CNRS-CentraleSupelec-Université Paris-Sud, Gif-sur-Yvette,

More information

2012 IEEE International Symposium on Information Theory Proceedings

2012 IEEE International Symposium on Information Theory Proceedings Decoding of Cyclic Codes over Symbol-Pair Read Channels Eitan Yaakobi, Jehoshua Bruck, and Paul H Siegel Electrical Engineering Department, California Institute of Technology, Pasadena, CA 9115, USA Electrical

More information

Multiaccess Communication

Multiaccess Communication Information Networks p. 1 Multiaccess Communication Satellite systems, radio networks (WLAN), Ethernet segment The received signal is the sum of attenuated transmitted signals from a set of other nodes,

More information

Coding versus ARQ in Fading Channels: How reliable should the PHY be?

Coding versus ARQ in Fading Channels: How reliable should the PHY be? Coding versus ARQ in Fading Channels: How reliable should the PHY be? Peng Wu and Nihar Jindal University of Minnesota, Minneapolis, MN 55455 Email: {pengwu,nihar}@umn.edu Abstract This paper studies the

More information

STUDY OF PERMUTATION MATRICES BASED LDPC CODE CONSTRUCTION

STUDY OF PERMUTATION MATRICES BASED LDPC CODE CONSTRUCTION EE229B PROJECT REPORT STUDY OF PERMUTATION MATRICES BASED LDPC CODE CONSTRUCTION Zhengya Zhang SID: 16827455 zyzhang@eecs.berkeley.edu 1 MOTIVATION Permutation matrices refer to the square matrices with

More information

Outline. EECS Components and Design Techniques for Digital Systems. Lec 18 Error Coding. In the real world. Our beautiful digital world.

Outline. EECS Components and Design Techniques for Digital Systems. Lec 18 Error Coding. In the real world. Our beautiful digital world. Outline EECS 150 - Components and esign Techniques for igital Systems Lec 18 Error Coding Errors and error models Parity and Hamming Codes (SECE) Errors in Communications LFSRs Cyclic Redundancy Check

More information

IEEE Working Group on Mobile Broadband Wireless Access. <http://grouper.ieee.org/groups/802/20/>

IEEE Working Group on Mobile Broadband Wireless Access. <http://grouper.ieee.org/groups/802/20/> C802.20-07/35 Project IEEE 802.20 Working Group on Mobile Broadband Wireless Access Title Date Submitted Practice letter ballot 2 comment LDPC harmonized text from

More information

Markovian Decision Process (MDP): theory and applications to wireless networks

Markovian Decision Process (MDP): theory and applications to wireless networks Markovian Decision Process (MDP): theory and applications to wireless networks Philippe Ciblat Joint work with I. Fawaz, N. Ksairi, C. Le Martret, M. Sarkiss Outline Examples MDP Applications A few examples

More information

Large Deviations for Channels with Memory

Large Deviations for Channels with Memory Large Deviations for Channels with Memory Santhosh Kumar Jean-Francois Chamberland Henry Pfister Electrical and Computer Engineering Texas A&M University September 30, 2011 1/ 1 Digital Landscape Delay

More information

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels Jie Luo, Anthony Ephremides ECE Dept. Univ. of Maryland College Park, MD 20742

More information

ECE 3511: Communications Networks Theory and Analysis. Fall Quarter Instructor: Prof. A. Bruce McDonald. Lecture Topic

ECE 3511: Communications Networks Theory and Analysis. Fall Quarter Instructor: Prof. A. Bruce McDonald. Lecture Topic ECE 3511: Communications Networks Theory and Analysis Fall Quarter 2002 Instructor: Prof. A. Bruce McDonald Lecture Topic Introductory Analysis of M/G/1 Queueing Systems Module Number One Steady-State

More information

Wireless Internet Exercises

Wireless Internet Exercises Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC

More information

Turbo Codes for xdsl modems

Turbo Codes for xdsl modems Turbo Codes for xdsl modems Juan Alberto Torres, Ph. D. VOCAL Technologies, Ltd. (http://www.vocal.com) John James Audubon Parkway Buffalo, NY 14228, USA Phone: +1 716 688 4675 Fax: +1 716 639 0713 Email:

More information

Low-Density Parity-Check Code Design Techniques to Simplify Encoding

Low-Density Parity-Check Code Design Techniques to Simplify Encoding IPN Progress Report 42-171 November 15, 27 Low-Density Parity-Check Code Design Techniques to Simplify Encoding J. M. Perez 1 and K. Andrews 2 This work describes a method for encoding low-density parity-check

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

MATH3302. Coding and Cryptography. Coding Theory

MATH3302. Coding and Cryptography. Coding Theory MATH3302 Coding and Cryptography Coding Theory 2010 Contents 1 Introduction to coding theory 2 1.1 Introduction.......................................... 2 1.2 Basic definitions and assumptions..............................

More information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information 204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener

More information

Markov Chain Model for ALOHA protocol

Markov Chain Model for ALOHA protocol Markov Chain Model for ALOHA protocol Laila Daniel and Krishnan Narayanan April 22, 2012 Outline of the talk A Markov chain (MC) model for Slotted ALOHA Basic properties of Discrete-time Markov Chain Stability

More information

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps 2012 IEEE International Symposium on Information Theory Proceedings Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps Yeow Meng Chee and Punarbasu Purkayastha Division of Mathematical

More information

Guess & Check Codes for Deletions, Insertions, and Synchronization

Guess & Check Codes for Deletions, Insertions, and Synchronization Guess & Check Codes for Deletions, Insertions, and Synchronization Serge Kas Hanna, Salim El Rouayheb ECE Department, Rutgers University sergekhanna@rutgersedu, salimelrouayheb@rutgersedu arxiv:759569v3

More information

Fairness comparison of FAST TCP and TCP Vegas

Fairness comparison of FAST TCP and TCP Vegas Fairness comparison of FAST TCP and TCP Vegas Lachlan L. H. Andrew, Liansheng Tan, Tony Cui, and Moshe Zukerman ARC Special Research Centre for Ultra-Broadband Information Networks (CUBIN), an affiliated

More information

EECS Components and Design Techniques for Digital Systems. Lec 26 CRCs, LFSRs (and a little power)

EECS Components and Design Techniques for Digital Systems. Lec 26 CRCs, LFSRs (and a little power) EECS 150 - Components and esign Techniques for igital Systems Lec 26 CRCs, LFSRs (and a little power) avid Culler Electrical Engineering and Computer Sciences University of California, Berkeley http://www.eecs.berkeley.edu/~culler

More information

Error Correction and Trellis Coding

Error Correction and Trellis Coding Advanced Signal Processing Winter Term 2001/2002 Digital Subscriber Lines (xdsl): Broadband Communication over Twisted Wire Pairs Error Correction and Trellis Coding Thomas Brandtner brandt@sbox.tugraz.at

More information

A new analytic approach to evaluation of Packet Error Rate in Wireless Networks

A new analytic approach to evaluation of Packet Error Rate in Wireless Networks A new analytic approach to evaluation of Packet Error Rate in Wireless Networks Ramin Khalili Université Pierre et Marie Curie LIP6-CNRS, Paris, France ramin.khalili@lip6.fr Kavé Salamatian Université

More information

communication networks

communication networks Positive matrices associated with synchronised communication networks Abraham Berman Department of Mathematics Robert Shorten Hamilton Institute Douglas Leith Hamilton Instiute The Technion NUI Maynooth

More information

Mapper & De-Mapper System Document

Mapper & De-Mapper System Document Mapper & De-Mapper System Document Mapper / De-Mapper Table of Contents. High Level System and Function Block. Mapper description 2. Demodulator Function block 2. Decoder block 2.. De-Mapper 2..2 Implementation

More information

How long before I regain my signal?

How long before I regain my signal? How long before I regain my signal? Tingting Lu, Pei Liu and Shivendra S. Panwar Polytechnic School of Engineering New York University Brooklyn, New York Email: tl984@nyu.edu, peiliu@gmail.com, panwar@catt.poly.edu

More information

Physical Layer and Coding

Physical Layer and Coding Physical Layer and Coding Muriel Médard Professor EECS Overview A variety of physical media: copper, free space, optical fiber Unified way of addressing signals at the input and the output of these media:

More information

Channel Coding and Interleaving

Channel Coding and Interleaving Lecture 6 Channel Coding and Interleaving 1 LORA: Future by Lund www.futurebylund.se The network will be free for those who want to try their products, services and solutions in a precommercial stage.

More information

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,

More information

Optical Storage Technology. Error Correction

Optical Storage Technology. Error Correction Optical Storage Technology Error Correction Introduction With analog audio, there is no opportunity for error correction. With digital audio, the nature of binary data lends itself to recovery in the event

More information

EVALUATION OF PACKET ERROR RATE IN WIRELESS NETWORKS

EVALUATION OF PACKET ERROR RATE IN WIRELESS NETWORKS EVALUATION OF PACKET ERROR RATE IN WIRELESS NETWORKS Ramin Khalili, Kavé Salamatian LIP6-CNRS, Université Pierre et Marie Curie. Paris, France. Ramin.khalili, kave.salamatian@lip6.fr Abstract Bit Error

More information

Uplink HARQ for Cloud RAN via Separation of Control and Data Planes

Uplink HARQ for Cloud RAN via Separation of Control and Data Planes 1 Uplink HARQ for Cloud RAN via Separation of Control and Data Planes Shahrouz Khalili, Student Member, IEEE and Osvaldo Simeone, Fellow, IEEE arxiv:158.657v5 [cs.it] 5 Sep 16 Abstract The implementation

More information

AN increasing number of multimedia applications require. Streaming Codes with Partial Recovery over Channels with Burst and Isolated Erasures

AN increasing number of multimedia applications require. Streaming Codes with Partial Recovery over Channels with Burst and Isolated Erasures 1 Streaming Codes with Partial Recovery over Channels with Burst and Isolated Erasures Ahmed Badr, Student Member, IEEE, Ashish Khisti, Member, IEEE, Wai-Tian Tan, Member IEEE and John Apostolopoulos,

More information

A Novel Modification of Cyclic Redundancy Check for Message Length Detection

A Novel Modification of Cyclic Redundancy Check for Message Length Detection International Symposium on Information Theory and its Applications, ISITA2004 Parma, Italy, October 10 13, 2004 A Novel Modification of Cyclic Redundancy Check for Message Length Detection Shin-Lin Shieh,

More information

Optimum Soft Decision Decoding of Linear Block Codes

Optimum Soft Decision Decoding of Linear Block Codes Optimum Soft Decision Decoding of Linear Block Codes {m i } Channel encoder C=(C n-1,,c 0 ) BPSK S(t) (n,k,d) linear modulator block code Optimal receiver AWGN Assume that [n,k,d] linear block code C is

More information

The impact of varying channel capacity on the quality of advanced data services in PCS networks

The impact of varying channel capacity on the quality of advanced data services in PCS networks The impact of varying channel capacity on the quality of advanced data services in PCS networks Markus Fiedler Dept. of Telecommunications and Signal Processing, University of Karlskrona/Ronneby, S-371

More information

Energy State Amplification in an Energy Harvesting Communication System

Energy State Amplification in an Energy Harvesting Communication System Energy State Amplification in an Energy Harvesting Communication System Omur Ozel Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 20742 omur@umd.edu

More information

VHDL Implementation of Reed Solomon Improved Encoding Algorithm

VHDL Implementation of Reed Solomon Improved Encoding Algorithm VHDL Implementation of Reed Solomon Improved Encoding Algorithm P.Ravi Tej 1, Smt.K.Jhansi Rani 2 1 Project Associate, Department of ECE, UCEK, JNTUK, Kakinada A.P. 2 Assistant Professor, Department of

More information

Performance of Multi Binary Turbo-Codes on Nakagami Flat Fading Channels

Performance of Multi Binary Turbo-Codes on Nakagami Flat Fading Channels Buletinul Ştiinţific al Universităţii "Politehnica" din Timişoara Seria ELECTRONICĂ şi TELECOMUNICAŢII TRANSACTIONS on ELECTRONICS and COMMUNICATIONS Tom 5(65), Fascicola -2, 26 Performance of Multi Binary

More information

Cyclic Redundancy Check Codes

Cyclic Redundancy Check Codes Cyclic Redundancy Check Codes Lectures No. 17 and 18 Dr. Aoife Moloney School of Electronics and Communications Dublin Institute of Technology Overview These lectures will look at the following: Cyclic

More information

Communications and Signal Processing Spring 2017 MSE Exam

Communications and Signal Processing Spring 2017 MSE Exam Communications and Signal Processing Spring 2017 MSE Exam Please obtain your Test ID from the following table. You must write your Test ID and name on each of the pages of this exam. A page with missing

More information

ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes

ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes Kevin Buckley - 2010 109 ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes m GF(2 ) adder m GF(2 ) multiplier

More information

Graph-based codes for flash memory

Graph-based codes for flash memory 1/28 Graph-based codes for flash memory Discrete Mathematics Seminar September 3, 2013 Katie Haymaker Joint work with Professor Christine Kelley University of Nebraska-Lincoln 2/28 Outline 1 Background

More information

Coding theory: Applications

Coding theory: Applications INF 244 a) Textbook: Lin and Costello b) Lectures (Tu+Th 12.15-14) covering roughly Chapters 1,9-12, and 14-18 c) Weekly exercises: For your convenience d) Mandatory problem: Programming project (counts

More information

Low-Complexity Puncturing and Shortening of Polar Codes

Low-Complexity Puncturing and Shortening of Polar Codes Low-Complexity Puncturing and Shortening of Polar Codes Valerio Bioglio, Frédéric Gabry, Ingmar Land Mathematical and Algorithmic Sciences Lab France Research Center, Huawei Technologies Co. Ltd. Email:

More information

Performance of Round Robin Policies for Dynamic Multichannel Access

Performance of Round Robin Policies for Dynamic Multichannel Access Performance of Round Robin Policies for Dynamic Multichannel Access Changmian Wang, Bhaskar Krishnamachari, Qing Zhao and Geir E. Øien Norwegian University of Science and Technology, Norway, {changmia,

More information

PACKET-BASED MARKOV MODELING OF REED-SOLOMON BLOCK CODED CORRELATED FADING CHANNELS

PACKET-BASED MARKOV MODELING OF REED-SOLOMON BLOCK CODED CORRELATED FADING CHANNELS PACKET-BASED MARKOV MODELING OF REED-SOLOMON BLOCK CODED CORRELATED FADING CHANNELS Cecilio Pimentel Department of Electronics and Systems Federal University of Pernambuco Recife, PE, 50711-970, Brazil

More information

Discrete Random Variables

Discrete Random Variables CPSC 53 Systems Modeling and Simulation Discrete Random Variables Dr. Anirban Mahanti Department of Computer Science University of Calgary mahanti@cpsc.ucalgary.ca Random Variables A random variable is

More information

Delay Analysis of Go-Back-N ARQ for Correlated Error Channels

Delay Analysis of Go-Back-N ARQ for Correlated Error Channels Delay Analysis of Go-Back-N ARQ for Correlated Error Channels Koen De Turck and Sabine Wittevrongel SMACS Research Group Department of Telecommunications and Information Processing Ghent University, Sint-Pietersnieuwstraat

More information

Code design: Computer search

Code design: Computer search Code design: Computer search Low rate codes Represent the code by its generator matrix Find one representative for each equivalence class of codes Permutation equivalences? Do NOT try several generator

More information

Average Age of Information with Hybrid ARQ under a Resource Constraint

Average Age of Information with Hybrid ARQ under a Resource Constraint 1 Average Age of Information with Hybrid ARQ under a Resource Constraint arxiv:1710.04971v3 [cs.it] 5 Dec 2018 Elif Tuğçe Ceran, Deniz Gündüz, and András György Department of Electrical and Electronic

More information

Random Access Protocols ALOHA

Random Access Protocols ALOHA Random Access Protocols ALOHA 1 ALOHA Invented by N. Abramson in 1970-Pure ALOHA Uncontrolled users (no coordination among users) Same packet (frame) size Instant feedback Large (~ infinite) population

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols

More information

Convolutional Coding LECTURE Overview

Convolutional Coding LECTURE Overview MIT 6.02 DRAFT Lecture Notes Spring 2010 (Last update: March 6, 2010) Comments, questions or bug reports? Please contact 6.02-staff@mit.edu LECTURE 8 Convolutional Coding This lecture introduces a powerful

More information

Structured Low-Density Parity-Check Codes: Algebraic Constructions

Structured Low-Density Parity-Check Codes: Algebraic Constructions Structured Low-Density Parity-Check Codes: Algebraic Constructions Shu Lin Department of Electrical and Computer Engineering University of California, Davis Davis, California 95616 Email:shulin@ece.ucdavis.edu

More information

On the exact bit error probability for Viterbi decoding of convolutional codes

On the exact bit error probability for Viterbi decoding of convolutional codes On the exact bit error probability for Viterbi decoding of convolutional codes Irina E. Bocharova, Florian Hug, Rolf Johannesson, and Boris D. Kudryashov Dept. of Information Systems Dept. of Electrical

More information

Expectation propagation for signal detection in flat-fading channels

Expectation propagation for signal detection in flat-fading channels Expectation propagation for signal detection in flat-fading channels Yuan Qi MIT Media Lab Cambridge, MA, 02139 USA yuanqi@media.mit.edu Thomas Minka CMU Statistics Department Pittsburgh, PA 15213 USA

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

THIS paper is aimed at designing efficient decoding algorithms

THIS paper is aimed at designing efficient decoding algorithms IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 7, NOVEMBER 1999 2333 Sort-and-Match Algorithm for Soft-Decision Decoding Ilya Dumer, Member, IEEE Abstract Let a q-ary linear (n; k)-code C be used

More information

Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC. August 2011 Ravi Motwani, Zion Kwok, Scott Nelson

Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC. August 2011 Ravi Motwani, Zion Kwok, Scott Nelson Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC August 2011 Ravi Motwani, Zion Kwok, Scott Nelson Agenda NAND ECC History Soft Information What is soft information How do we obtain

More information

Impacts of Channel Variability on Link-Level Throughput in Wireless Networks

Impacts of Channel Variability on Link-Level Throughput in Wireless Networks Impacts of Channel Variability on Link-Level Throughput in Wireless Networks Can Emre Koksal, Kyle Jamieson, Emre Telatar, and Patrick Thiran Department of Communication and Computer Sciences, EPFL 5 Lausanne,

More information

IN this paper, we consider the capacity of sticky channels, a

IN this paper, we consider the capacity of sticky channels, a 72 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 1, JANUARY 2008 Capacity Bounds for Sticky Channels Michael Mitzenmacher, Member, IEEE Abstract The capacity of sticky channels, a subclass of insertion

More information

Exact Distribution of Access Delay in IEEE DCF MAC

Exact Distribution of Access Delay in IEEE DCF MAC Exact Distribution of Access Delay in IEEE 8.11 DCF MAC Teerawat Issariyakul, Dusit Niyato, Ekram Hossain, and Attahiru Sule Alfa University of Manitoba and TRLabs Winnipeg, MB, Canada. Email: teerawat,

More information

MATHEMATICAL MODEL AND CALCULATION OF SS7 RELIABILITY

MATHEMATICAL MODEL AND CALCULATION OF SS7 RELIABILITY MATHEMATICAL MODEL AND CALCULATION OF 7 RELIABILITY THUNEIBAT. A. Asstt rof., Department of Electrical Engineering, BAU, Jordan Thuneibat@hotmail.com ABTRACT In this paper, a mathematical model of signaling

More information

Introduction to Convolutional Codes, Part 1

Introduction to Convolutional Codes, Part 1 Introduction to Convolutional Codes, Part 1 Frans M.J. Willems, Eindhoven University of Technology September 29, 2009 Elias, Father of Coding Theory Textbook Encoder Encoder Properties Systematic Codes

More information

Joint Source-Channel Coding Optimized On Endto-End Distortion for Multimedia Source

Joint Source-Channel Coding Optimized On Endto-End Distortion for Multimedia Source Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 8-2016 Joint Source-Channel Coding Optimized On Endto-End Distortion for Multimedia Source Ebrahim Jarvis ej7414@rit.edu

More information

Information Theory - Entropy. Figure 3

Information Theory - Entropy. Figure 3 Concept of Information Information Theory - Entropy Figure 3 A typical binary coded digital communication system is shown in Figure 3. What is involved in the transmission of information? - The system

More information