Next Article in Journal
Sex Differences in Hierarchical and Modular Organization of Functional Brain Networks: Insights from Hierarchical Entropy and Modularity Analysis
Next Article in Special Issue
Updates on Information Theory and Network Coding
Previous Article in Journal
Quantum Approach for Contextual Search, Retrieval, and Ranking of Classical Information
Previous Article in Special Issue
On Matrix Representation of Extension Field GF(pL) and Its Application in Vector Linear Network Coding
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Finite-Blocklength Analysis of Coded Modulation with Retransmission

1
National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China
2
Purple Mountain Laboratories, Nanjing 211100, China
*
Author to whom correspondence should be addressed.
Entropy 2024, 26(10), 863; https://doi.org/10.3390/e26100863
Submission received: 14 September 2024 / Revised: 8 October 2024 / Accepted: 11 October 2024 / Published: 14 October 2024
(This article belongs to the Special Issue Information Theory and Network Coding II)

Abstract

:
The rapid developments of 5G and B5G networks have posed higher demands on retransmission in certain scenarios. This article reviews classical finite-length coding performance prediction formulas and proposes rate prediction formulas for coded modulation retransmission scenarios. Specifically, we demonstrate that a recently proposed model for correcting these prediction formulas also exhibits high accuracy in coded modulation retransmissions. To enhance the generality of this model, we introduce a range variable P final to unify the predictions with different SNRs. Finally, based on simulation results, the article puts forth recommendations specific to retransmission with a high spectral efficiency.

1. Introduction

New-generation mobile communication systems, 5G NR networks, are worldwide-deployed communication systems. The 5G wireless system, which is not the straightforward evolution of traditional 4G cellular networks, is developed as a multipurpose mobile network with many new service functionalities [1]. 5G networks can provide not only traditional voice and data communication but also numerous new use cases, applications for various industries, and connectivity for devices and applications across society [2,3]. Examples include vehicle-to-vehicle and vehicle-to-infrastructure communication, industrial automation, health services, smart cities, and smart homes [4,5]. Compared to 4G LTE, 5G NR and the future development of B5G systems have introduced a series of technical indicators. To meet these performance requirements, 5G systems will leverage various emerging technologies, such as heterogeneous networks (HetNets) [6,7], massive multiple-input multiple-output (mMIMO) [8], millimeter-wave (mmWave) communication [9,10], device-to-device (D2D) communication [11,12], machine-to-machine (M2M) communication [13], reconfigurable intelligent surfaces (RISs) [14], and network slicing [15], among others.
D2D and M2M communications have many different characteristics compared to the traditional communication services designed for human interaction. For instance, the communication among many sensors and controllers in closed-loop control systems of automated industries requires a maximum latency of 5 ms and a reliable packet error rate ranging from 10 2 to 10 5  [16]. In terms of traffic safety, the packet error rate cannot exceed 10 5 . These typical applications involve short data packets (code length ranges from several hundred to one thousand) and impose very high requirements on latency and reliability. For the applications targeting these machine communications, various solutions have been proposed, including fewer symbols in OFDM signal packets, reducing transmission time. The theoretical limit for the transmission of these short data packets depends on the specific transmission environments and the technologies employed.
Shannon’s limit provides the theoretical maximum performance when the encoding blocklength tends towards infinity. However, in practical situations, Shannon’s limit does not apply to the performance of moderate-length codes [17]. The finite-blocklength performance bounds in binary input additive white Gaussian noise (BIAWGN) channels have adequately addressed this issue. Recently, numerous significant advancements related to finite-blocklength analysis have emerged. Ref. [18] leverages the property of joint convexity to address a broad spectrum of use cases, thereby facilitating the efficient resolution of joint optimization problems in multi-user environments in the finite-blocklength regime. In [19], Behrooz Makki derives closed-form expressions for message-decoding probabilities, throughput, expected delay, and error probability in hybrid automatic repeat request (HARQ) configurations. Moreover, the expectation and variance of the maximum achievable rate in a mMIMO system with a finite blocklength are rigorously analyzed [20]. However, the finite-blocklength performance analysis is not suitable for higher-order modulation schemes, for which effective solutions have been proposed in the existing literature [21,22,23]. Moreover, to ensure transmission reliability while also meeting low-latency constraints, a limited number of retransmissions is typically required in practical wireless networks. Combining rate-compatible coding and incremental redundancy retransmission schemes, the performance analysis of finite-length coded retransmission with high-order modulation is an urgent issue that needs to be addressed.
In this paper, we analyze the performance of finite-length coded modulation in a retransmission scenario when rate-compatible code is modulated and transmitted using different modulation schemes in the first and second transmissions. The remaining structure of this paper is represented as follows. Firstly, we review the theoretical formulas for predicting the performance of finite-length coded modulation and provide a brief explanation of the calculation of key parameters in this formula under retransmission scenarios. Next, we revisit the model for tuning on the theoretical prediction formula and elaborate on the usage of the model. Here, we refine this method to make it more general. Finally, through simulation results, we demonstrate the good adaptability of this calibration model to retransmission scenarios. Based on the simulation results, we also offer some recommendations for the retransmission approach of coded modulation.

2. Preliminaries

2.1. Some Bounds for Finite-Blocklength Coding

Consider a code with a codebook of size M and blocklength n, where the rate R can be expressed as
R = log 2 M n .
Building upon this, [24] has proposed formulas for the upper and lower bounds on the performance of finite-length coding. For example, the upper bound like the converse bound, the lower bound like the random coding union (RCU) bound and the dependence testing (DT) bound. However, these bounds all involve a greater amount of summation and combinatorial operations, leading to a higher overall complexity and potentially imprecise results.
For a binary symmetric channel (BSC) with a crossover probability of δ , when it achieves the block error rate (BLER) ϵ , its RCU bound and DT bound can be calculated by
ϵ t = 0 n n t δ t ( 1 δ ) n t min { 1 , ( M 1 ) k = 0 t n k 2 n } ,
and
ϵ t = 0 n n t min { δ t ( 1 δ ) n t , ( M 1 ) 2 n 1 } ,
respectively. In practical coding, the blocklength n usually amounts to several hundred, or even greater than 1000. When the combinations of n k are calculated, the computation process becomes slower, and the precision of the results is certainly affected.
The converse bound of a BSC satisfies
M 1 β 1 ϵ n ,
β α n = ( 1 λ ) β L + λ β L + 1 ,
where the β l in (5) is defined as
β l = k = 0 l n k 2 n , l = L , L + 1 ,
and the integer L and variable λ ( 0 λ 1 ) should be determined by the following equation:
α = ( 1 λ ) α L + λ α L + 1 ,
with
α l = k = 0 l 1 n k ( 1 δ ) n k δ k , l = L , L + 1 .
The calculation of the converse bound (4) not only involves the combinatorial operations but also requires solving roots for two parameters in a system of binary equations, making the computation quite complicated. Therefore, a simpler and more efficient calculation method is further explored by normal approximation (NA).

2.2. Normal Approximation Combined with Coded Modulation

Given a finite blocklength n, BLER ϵ , the upper bound of the rate can be predicted by
R = C V n Q 1 ϵ + O log 2 n n ,
which is called normal approximation [24], where Q ( x ) = x + 1 2 π e 1 2 t 2 d t , C and V are the channel capacity and the channel dispersion, respectively. They are both characteristic parameters of the channel, where the physical quantities do not depend on the encoding scheme. The third-order term O log 2 n n is proven to be log 2 n 2 n in [24].
In different channels, C and V have different calculation methods. For a BSC with a crossover probability of δ and δ { 0 , 1 2 , 1 } , we have
C = 1 h ( δ )
V = δ ( 1 δ ) ( log 2 1 δ δ ) 2 ,
where h ( x ) = x log 2 x ( 1 x ) log 2 ( 1 x ) .
Meanwhile, for a binary erasure channel (BEC) with an erasure probability of δ , we have
C = 1 δ
V = δ ( 1 δ ) .
Here, for more general applications, taking a BIAWGN channel with an SNR of P into consideration, we have
C = 1 2 log 2 ( 1 + P )
V = P 2 P + 2 P + 1 2 log 2 2 e .
Although (14) and (15) can be easily calculated, specific modulation methods do not provide the correlation between C, V and constellations.
If the input m points of a constellation, such as m-QAM, follow the discrete uniform distribution, the two parameters C and V can be computed [25] by
C m ( P ) = log 2 m 1 m i = 1 m E log 2 j = 1 m e Z 2 x ( i ) + Z x ( j ) 2
V m ( P ) = 1 m i = 1 m Var log 2 j = 1 m e Z 2 x ( i ) + Z x ( j ) 2
where Z is a complex Gaussian variable with a zero mean and unit variance, and x ( i ) corresponds to a normalized constellation point of m-QAM with a given SNR of P. E [ · ] and Var [ · ] represent the calculations of the mean and variance, respectively. When the value of m is quite large, the calculations of (16) and (17) suffer a noticeable increase in complexity, but do provide the correlation between C, V and the constellation.

3. Practical Application with Retransmission

In this section, we consider the coded modulation retransmission scenario in incremental redundancy (IR) HARQ and the calculations of key parameters with the theoretical formula and a calibration model proposed by Eva C. Song and Guosen Yue [26], which are easy to use and have extremely good accuracy.
When the first segment of a rate-compatible coding scheme with a high-rate code of length n fails to be received, the transmitter then sends the redundancy version of coded bits with identical length n to the receiving end, resulting in a half-rate code of length 2 n for decoding. During retransmission, the modulation order is usually lowered according to the specific modulation and coding scheme (MCS), such as the MCS table in 5G NR, thereby better handling errors and enhancing the robustness of transmission.
In [26], the calculations of C and V for the parallel complex Gaussian channels with an m-QAM input are provided by (15) and (16), respectively. Similarly, we can consider the coded modulation in the retransmission scenario as the receiver simultaneously receiving two equal-length coded blocks from a rate-compatible coding scheme with different modulations m 1 -QAM and m 2 -QAM over the same channel.
Therefore, in this scenario, C and V in (9) are computed by
C = 1 2 ( C m 1 ( P ) + C m 2 ( P ) )
V = 1 2 ( V m 1 ( P ) + V m 2 ( P ) ) ,
where C m i ( P ) and V m i ( P ) , i = 1 , 2 can get by (16) and (17) on the constellations of m 1 -QAM and m 2 -QAM, respectively. The proof of C and V is provided in Appendix A.
In terms of practical coding, ref. [26] proposes the following models:
R ( P , n , ϵ ) = C ( P ) Δ C ( P ) α ( P ) V ( P ) n Q 1 ( ϵ ) + log 2 ( n ) 2 n ,
where C ( P ) and V ( P ) can get by (18) and (19), respectively. Δ C ( P ) refers to the gap between the theoretical capacity and the rate that practical coding can achieve when the blocklength is finite. α ( P ) 1 is the correction parameter for the channel dispersion V.
We follow the flowchart shown in Figure 1 to calculate the parameters in (20). Firstly, select a targeting BLER ϵ and a sufficiently long blocklength n inf as an approximation for infinite blocklength, where a practical rate-compatible coding scheme is employed for the necessary initial simulation, such as LTE-turbo codes and 5G-LDPC codes. Then, for each specific rate R i n inf , i = 1 , 2 , 3 , . . . , t 1 , obtain the P i n inf , i = 1 , 2 , 3 , . . . , t 1 required to achieve the BLER ϵ based on simulation. Next, select several short blocklengths n 1 , n 2 , . . . , n s for tuning. For each n k , k = 1 , . . . , s and specific rate R j n k , j = 1 , 2 , 3 , . . . , t 2 , obtain the P j n k , j = 1 , 2 , 3 , . . . , t 2 required to achieve the BLER ϵ based on simulation.
We simulate to obtain the P i n inf and P j n k variables using the following method: Given the modulation scheme, code blocklength n , n = n inf or n k , and rate R, we vary the values of SNR to obtain a set of data for different SNRs and BLERs ( P m n , ϵ m ) , m = 1 , 2 , 3 , . . . . Then, around the given BLER ϵ , we identify two different BLERs which are the nearest neighbors ϵ m 1 > ϵ > ϵ m 2 and perform linear interpolation based on their corresponding SNRs P m 1 n and P m 2 n to obtain the SNR P n corresponding to the desired BLER ϵ . The linear interpolation formula is as follows.
ϵ = ϵ m 2 ϵ m 1 P m 2 n P m 1 n ( P n P m 1 n ) + ϵ m 1 .
Let the ϵ be the desired BLER; then, we can get the SNR P n by (21).
Next, based on the P i n inf and P j n k obtained from above, determine a smallest range (or slightly larger) of P final to cover all the P i n inf and P j n k . For example, if we simulate to obtain P i n inf = 1 , 1.5 , . . . , 2.5 (dB) and P j n k = 1.2 , 1.7 , 2.2 , . . . , 2.9 (dB), then we can choose P final = [ 1 , 2.9 ] (dB). After that, use linear interpolation to connect all the R i n inf ( P i n inf ) and R j n k ( P j n k ) to get R n inf ( P f ) and R n k ( P f ) in the range P f P final . Then, calculate the theoretical channel capacity C t h ( P f ) and the theoretical channel dispersion V t h ( P f ) according to (18) and (19), respectively. Next, calculate Δ C ( P f ) = C t h ( P f ) R n inf ( P f ) and for every P f P final , find α that minimizes (22) to get α ( P f ) .
α ( P f ) = arg min α k = 1 s ( C t h ( P f ) Δ C ( P f ) α V t h ( P f ) n k Q 1 ( ϵ ) + log 2 n k 2 n k R n k ( P f ) ) 2
Finally, for any given code length n and P f P final , compute C and V according to (18) and (19), and obtain Δ C and α from the steps above. Predict R by using (20), which is shown in Algorithm 1.
Algorithm 1: Calculation algorithm of the model to predict R
 Input ϵ , n inf , R i n inf , n 1 , n 2 , . . . , n s , R j n k
 OutputR
1
Fix a BLER ϵ
2
Simulate to get P i n inf based on n inf , ϵ , R i n inf , i = i = 1 , 2 , 3 , . . . , t 1
3
Simulate to get P j n k based on n k = n 1 , n 2 , . . . , n s , ϵ , R j n k , j = 1 , 2 , 3 , . . . , t 2
4
Choose a range P final that covers all the P i n inf and P j n k
5
Use linear interpolation to connect all the R i n inf ( P i n inf ) and R j n k ( P j n k ) to get R n inf ( P f ) and R n k ( P f ) in the range P f P final
6
Calculate C t h ( P f ) , V t h ( P f ) for P f P final
7
Δ C ( P f ) = C t h ( P f ) R n inf ( P f ) for P f P final
8
For every P f P final , calculate α that minimizes (22) to get α ( P f )
9
return
R = C ( P f ) Δ C ( P f ) α ( P f ) V ( P f ) n Q 1 ( ϵ ) + log 2 ( n ) 2 n
for every P f P final
The above method incorporates some modifications to the method proposed in [26]. When using (22), the SNR required for calculating each α is the same, but the simulated SNR often varies for different selected n k and R j n k . Therefore, after obtaining the simulation data points, we select a range P final to unify the different SNRs obtained from the simulation that required in the formula.

4. Numerical Example

In this section, we demonstrate that the proposed model is also applicable to the scenario of retransmission and we analyze the results with different coded modulation combinations. In the following examples, we always use the rate-compatible coding scheme based on 5G-LDPC codes and BP decoding in the transmitter and receiver. Assume that 16-QAM and QPSK are used in two transmissions, respectively, where the coded bits in the first half and the second half of each encoding segment are modulated by 16-QAM and QPSK, respectively.
In our simulations, the rate R is computed by
R = R c × 1 2 ( log 2 ( m 1 ) + log 2 ( m 2 ) ) ,
where R c is the original code rate, log 2 ( m 1 ) and log 2 ( m 2 ) refer to the modulation orders for the two segments. In this example, an LDPC code with a code rate of R c = 1 3 , 16- QAM 1 s t log 2 ( m 1 ) = 4 , and QPSK 2 n d log 2 ( m 2 ) = 2 are employed in the two transmissions; thus, the rate here is R = 1 .
Since the number of message bits remains the same after retransmission, the code length becomes twice as long, and the highest code rate of 5G-LDPC codes is 11 12 in the first transmission. Then, after retransmission with R c = 11 24 , the highest rate here is R = 11 24 × 3 = 11 8 .
We select n inf = 7200 as an approximation for infinite code length, which approaches the maximum length 8448 of information bits in the 5G-LDPC coding scheme, with n 1 = 1 20 n inf = 360 , n 2 = 3 20 n inf = 1080 for tuning. We choose the code rates like R c = 1 3 , 7 20 , 11 30 , 5 12 , 9 20 and 11 24 to make the code with length 360 have an integer number of information bits. Then, we predict the retransmission performance of the coded modulation with n = 3600 .
With this example, let us go through the steps outlined in Algorithm 1. Choose a fixed BLER ϵ = 0.1 and then simulate to obtain Figure 2 and Figure 3a,b. In this example, P final = [ 1.4 , 4.65 ] (dB) can cover all the simulation points P i n inf and P j n k . Then, Table 1 and Table 2 calculate Δ C and α , respectively. Finally, using (20) and the previously obtained parameters, we can predict R. By repeating the steps mentioned above for ϵ = 10 2 and 10 3 , we can get the results shown in Figure 4. As shown in Figure 4, the prediction performance of this model is also very good in the retransmission scenario with a moderate blocklength and different modulations.
To more clearly distinguish between the simulation data points used before prediction and those used to validate the accuracy of the prediction afterward, we plot the simulation data points required before prediction in Figure 2 and Figure 3a,b as hollow points and the simulation data points used for validation after prediction in Figure 4, Figure 5, Figure 6 and Figure 7 as solid points, respectively. The predicted curves in Figure 4, Figure 5, Figure 6 and Figure 7 are derived from the initial simulations, Algorithm 1, as well as the analytical formulas. The simulation points on the predicted curves are obtained by selecting certain SNRs and spectral efficiencies within the interval after predicting the performance and then conducting simulations for verification. The comparisons between the simulated points and the predicted curves show very small discrepancies. When the SNR is the same, the simulation value may be a little lower than the prediction curve.
The calculation environments for simulations and predictions are the same. We use MATLAB 2023b to calculate, use MATLAB’s built-in functions ldpcEncode and ldpcDecode for encoding and decoding LDPC codes, use MATLAB’s built-in functions qammod and qamdemod for modulation and demodulation, and we use MATLAB’s built-in functions awgn to add noise.
The following examples show the prediction results of moderate-blocklength coded retransmission with other modulation schemes, like 1024- QAM 1 s t and 256- QAM 2 n d , in the first and the second transmissions. They are shown in Figure 5, Figure 6 and Figure 7, respectively.
As shown in these figures, different combinations of modulation schemes can cover different ranges of rates. In Figure 5, we can see that the combination of 64-QAM and QPSK covers the rate range from 1.33 to 1.83 in the SNR from 4.13 dB to 6.96 dB; that of 64-QAM and 16-QAM covers the rate range from 1.67 to 2.29 in the SNR from 5.82 dB to 8.52 dB; and 64-QAM combined with 64-QAM covers the rate range from 2 to 2.75 in the SNR from 7.3 dB to 10.6 dB.
The results in Figure 6 show that if 256-QAM is used for the initial transmission and if the aim for a retransmission is to achieve the rate range between 2 and 2.25, we can use QPSK or 16-QAM for the retransmission. In this case, the required SNR range is between 7.64 dB and 10.1 dB. Similarly, if 16-QAM or 64-QAM is used for the retransmission, the corresponding SNR range is between 9.09 dB and 11 dB, resulting in a rate range of 2.33 to 2.7. If 256-QAM is still used during retransmission, it will cover a rate range from 2.67 to 3.67 in the SNR from 11.1 dB to 13.7 dB.
However, we can also see in these three figures that using the same modulation scheme during retransmission as before results in poorer performance. For example, in Figure 7, to achieve the same rate like R = 4 , the combination of 1024-QAM and 1024-QAM performs about 0.34 dB poorer than that of 1024-QAM and 256-QAM.
The results above can guide us in selecting different modulation schemes based on varying data rate requirements during retransmission. For example, as illustrated in Figure 7, when using 1024-QAM for the initial transmission, if the rate is between 2.33 and 2.67, it would be better to use 16-QAM for retransmission. This is because the minimum code rate of LDPC code is 1/3, and the minimum rate of 1024-QAM combined with 64-QAM is R = 1 3 × 1 2 × ( 10 + 6 ) = 2.67 . Similarly, if the rate is between 3 and 4.12, it would be better to use 256-QAM for retransmission because the maximum code rate after retransmission is R c = 11 12 × 1 2 = 11 24 , and the maximum rate of 1024-QAM combined with 256-QAM is R = 11 24 × 1 2 × ( 10 + 8 ) = 4.12 . If the rate is greater than 4.12, we only use 1024-QAM to retransmit. Similar conclusions can be drawn for 64-QAM and 256-QAM in Figure 5 and Figure 6.

5. Efficiency Analysis

Figure 8 takes the MCS of 5G NR with the BG1 matrix as an example, where we select a set of coding parameters with blocklengths ranging from n = 360 ( Z = 18 ) to the maximum length of n = 8448 ( Z = 384 ). The ranges of code rates, respectively, cover [ 2 3 , 11 12 ] and [ 1 3 , 11 24 ] in the first transmission and retransmission with a total n R c = 11 different code rates. Increasing the value of n R c can further fine-tune the prediction accuracy. For the system-level simulations that are crucial for the design of 5G networks, it is generally required to obtain the link-level BLER performance metrics for all data points in Figure 8 through simulations. Then, for the specific link settings of code rates and blocklengths, the BLER performances can be directly obtained via linear interpolation with the nearby data points. For future mobile communication systems, with wider ranges of code rates and blocklengths and lower BLER targets, the performance evaluations for link-level simulations with multiple retransmissions will significantly increase the computational complexity. Our proposed performance prediction scheme can effectively reduce the computational load while ensuring evaluation accuracy.
In the above example of MCSs shown in Figure 8, once the m 1 -QAM, m 2 -QAM and BLER are determined before or after retransmission, we only need to simulate all the rate data for three sets of blocklengths (the blue points in three red rectangle boxes in Figure 8) to predict the rates for any other blocklength (other blue points in Figure 8). Hence, when the BLERs and SNRs for the coded modulation combinations with all the different blocklengths and code rates are required for system-level simulations, using our algorithm can significantly improve the efficiency of performance evaluations. As shown in Figure 8, assuming that a single testing of BLER ϵ evaluation for a code with n = 360 requires a time of τ , then obtaining one set of data requires a time of τ × 11 for all code rates considered before or after retransmission. As the blocklength increases, the simulation time will also increase linearly, which means that the simulation testings of performance evaluation for the codes with n = 1080 and n = 7200 require a computation time of 3 τ and 20 τ , respectively. Therefore, the total simulation time required to obtain all the data needed for the performance prediction of MCSs with m 1 -QAM and m 2 -QAM is ( τ + 3 τ + 20 τ ) × 11 = 264 τ . Since the time required for the calculations of Δ C and α is negligible compared to that of simulation tests for performance evaluations, the total computational complexity needed to complete the entire prediction can be approximately evaluated by 264 τ . Then, if we need the rate data of codes from n = 360 to 8448 according to all the lifting values of 5G-LDPC codes shown in Figure 8, the total computational complexity required for a brute-force Monte Carlo simulation should be about 3300 τ , which is clearly greater than 264 τ . Since each modulation combination for retransmission requires a separate simulation, this algorithm can significantly reduce the computational complexity when a large amount of SNR-R relationship data corresponding to various blocklengths are needed, given a specific BLER ϵ .

6. Conclusions

In this paper, we have reviewed the theoretical prediction formulas for the performance of finite-length coding and their correction models. Through simulation, we validated the good adaptability of the correction model to the retransmission scenarios. To make this model more general, we introduced a range P final to unify the different SNRs. Based on the simulation results, we can choose the modulation method for the second transmission according to different bit rate requirements. It is also evident that if the same modulation method is employed in the second transmission as before, its performance is not as effective as some methods involving a reduction in the modulation order during retransmission.

Author Contributions

Software, Y.W.; validation, M.J.; data curation, Y.W., F.D. and Q.X.; writing—original draft preparation, Y.W. and M.J.; writing—review and editing, Y.W. and M.J.; supervision, M.J. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (NSFC) under grant 62331002.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A

Random variables and its realization are denoted by capital letters X and its lower case x, respectively. The boldface letter denotes a vector. A sequence x 1 , . . . , x n is denoted by x n . A sequence x n partitioned into 2 blocks with equal blocklength n 1 = n 2 = n 2 is denoted by x n = [ x 1 , x 2 ] , where n is the blocklength of the code, and the ith element of vector x 1 , x 2 is denoted by x 1 , i , x 2 , i . The total variational distance between two distributions D and Q is denoted by D Q T V . The Radon-Nikodym derivative of D w.r.t. Q is denoted by d D d Q . Expectations and variances taken w.r.t. a distribution D are indicated by E D [ · ] and Var D [ · ] , respectively.
Let ( Q X ( x ( 1 ) ) , . . . , Q X ( x ( m ) ) ) denote an input distribution, where x ( i ) ’s are the m-QAM constellation points with average power P w . Denote by D ^ X the composition D ^ X ( x ( 1 ) ) , . . . , D ^ X ( x ( m ) ) = Q ^ X ( x ( 1 ) ) , . . . , Q ^ X ( x ( m ) ) , if n Q X ( x ) is an integer for all x, or otherwise, the type closest to the Q X in total variational distance, in which the greater probabilities are assigned first to the indices i { 1 , . . . , m } whose corresponding constellation symbols x ( i ) have individual power equal to P w (if available), then to indices whose corresponding symbols have individual power less than P w , and finally to those with corresponding individual power greater than P w .
In the retransmission scenario, the 2 segments are effectively transmitted over the same BIAWGN channel, hence:
Y k = X k + W k ,
where W k C N 0 n k , I n k σ k 2 , k = 1 , 2 , σ 1 = σ 2 = σ , and I n k is an identity matrix. Therefore, the SNR is
P = P w σ .
The proof of the channel capacity C and the channel dispersion V in the retransmission scenario is an application of Theorem 2 from [25], which is stated as follows.
Theorem A1. 
For a channel D Y n | X n ( y n | n n ) any input distribution D X n , and any output distributuion Q Y n , there exists a code with M codewords in F n and average probability of error satisfying
ϵ D X n D Y n | X n [ i ˜ ( X n ; Y n ) log 2 γ n ] + L n M D X n Q Y n [ i ˜ ( X n ; Y n ) > log 2 γ n ] + D X n [ X n F n ]
where
i ˜ ( X n ; Y n ) = log 2 D Y n | X n Y n | X n Q Y n Y n
and the coefficient L n is defined as
L n = Δ sup y n Y n d D Y n ( y n ) d Q Y n ( y n )
and γ n is an arbitary positive threshold whose optimal choice to give the highest rates is γ n = L n M .
This proof follows similar steps as the proof for the single AWGN channel in [25] with the modification of taking into account the retransmission scenario. For the 2 segments of length n k = n 2 , k = 1 , 2 , denote by D ^ X ( k ) the composition of segment k and T n k D ^ X ( k ) the corresponding type class. For the different modulation schemes m 1 -QAM and m 2 -QAM of the 2 segments. We fix
Q X x ( i ) = 1 m k , i = 1 , . . . , m k , k = 1 , 2 .
Under this construction, it can be shown that
D ^ X ( k ) Q X T V O 1 n k ,
and
E D ^ X ( k ) X 2 P w .
We choose the input distribution D X n as the following:
D X n x n = k = 1 2 x k T n k D ^ X ( k ) n k D ^ X ( k ) x ( 1 ) , . . . , n k D ^ X ( k ) x ( m k ) .
Let
F n = x n : x k 2 n k P w , k = 1 , 2 .
It can be verified that the input distribution from (A7) satisfies the maximal power constraint x k 2 n k P w . Hence,
D X n [ X n F n ] = 0 .
The output distribution induced by the input distribution D X n can be written as
D Y n ( y n ) = x n X n D X n x n D Y n | X n y n | x n = k = 1 2 x k T n k P ^ X ( k ) Γ k D Y k | X k y k | x k ,
where
Γ k = 1 n k n k D ^ X ( k ) x ( 1 ) , . . . , n k D ^ X ( k ) x ( m k )
and
D Y k | X k y k | x k = t = 1 n k D Y | X ( k ) y t | x t
and D Y | X ( k ) indicates the channel experienced by segment k , k = 1 , 2 .
Next, we choose the following auxiliary distributions:
Q Y ( k ) ( y ) = i = 1 m k Q X x ( i ) D Y | X ( k ) y | x ( i ) , k = 1 , 2
Q Y n y n = k = 1 2 t = 1 n k Q Y ( k ) y k , t
where Q X is given in (A6).
It can be shown by applying Proposition 3 of [25] to (A12) and (A16), we have
d P Y n y n d Q Y n y n L n = Δ k = 1 2 c k ( m k ) n k m k 1 2
for sufficiently large n k ’s, where c k ( m k ) ’s are positive constants that depend only on the constellation size m.
We now apply Theorem A1 to the distributions defined above. Let γ n = L n M . For the first term in (A3), it can be verified that
1 n i ˜ x n ; Y n = 1 n k = 1 2 t = 1 n k log 2 j = 1 m k Q X x ( j ) e W k , t 2 x k , t + W k , t x ( j ) 2 σ 2 .
Since { W k , t }’s are independent, we can invoke the Berry-Esseen Theorem on 1 n i ˜ x n ; Y n . Using (A7), the mean can be verified to be
E D Y n | X n = x n 1 n i ˜ x n ; Y n = 1 2 ( C m 1 ( P ) + C m 2 ( P ) ) + O 1 n = C + O 1 n .
Similarly, the variance can be verified to be
Va r D Y n | X n = x n 1 n i ˜ x n ; Y n = 1 n 1 2 ( V m 1 ( P ) + V m 2 ( P ) ) + O 1 n = V n + O 1 n .
Applying the Berry-Esseen Theorem on 1 n i ˜ x n ; Y n yields
D Y n | X n 1 n i ˜ ( x n ; Y n ) log 2 ( L n M ) n Q C log 2 ( L n M ) n V n + B 1 n ,
where B 1 is some positive constant. Consequently, by averaging over the input sequences, the first term from (A3) can be bounded by
D X n D Y n | X n 1 n i ˜ ( X n ; Y n ) log 2 L n M n Q C log 2 ( L n M ) n V n + B 1 n .
For the second term in (A3), observe that under the conditional distribution D Y n | X n = x n , 1 n i ˜ x n ; Y n is a summation of independent random variables with positive variance and finite third absolute moment. Therefore, we can apply the refined large deviation result of Lemma 47 in [24]
Q Y n i ˜ x n ; Y n > log 2 γ n = E e i ˜ x n ; Y n i ˜ x n ; Y n > log 2 L n M B 2 n L n M 1 ,
where the expectation is taken with respect to D Y n | X n = x n and B 2 is a positive constant. Therefore, the second term from (A3) can be bounded as
L n M D X n Q Y n i ˜ ( X n ; Y n ) > log 2 L n M B 2 n .
Finally, combining (A22), (A24) and (A11), yields
ϵ Q C log 2 L n M n V n + B n ,
where B = B 1 + B 2 . Rearranging (A25) and with a bit of analysis yields the result of C and V in retransmission scenario for (9).

References

  1. Panwar, N.; Sharma, S.; Singh, A.K. A survey on 5G: The next generation of mobile communication. Phys. Commun. 2016, 18, 64–84. [Google Scholar] [CrossRef]
  2. El Hattachi, R.; Erfanian, J. 5G white paper. In Next Generation Mobile Networks; White Paper; NGMN Alliance: Dusseldorf, Germany, 2015; Volume 1, p. 1. [Google Scholar]
  3. Andrews, J.G.; Buzzi, S.; Choi, W.; Hanly, S.V.; Lozano, A.; Soong, A.C.K.; Zhang, J.C. What Will 5G Be? IEEE J. Sel. Areas Commun. 2014, 32, 1065–1082. [Google Scholar] [CrossRef]
  4. Dimitrakopoulos, G.; Demestichas, P. Intelligent Transportation Systems. IEEE Veh. Technol. Mag. 2010, 5, 77–84. [Google Scholar] [CrossRef]
  5. Anttiroiko, A.V. Electronic Government: Concepts, Methodologies, Tools, and Applications: Concepts, Methodologies, Tools, and Applications; IGI Global: Hershey, PA, USA, 2008; Volume 3. [Google Scholar]
  6. Mughees, A.; Tahir, M.; Sheikh, M.A.; Amphawan, A.; Meng, Y.K.; Ahad, A.; Chamran, K. Energy-efficient joint resource allocation in 5G HetNet using Multi-Agent Parameterized Deep Reinforcement learning. Phys. Commun. 2023, 61, 102206. [Google Scholar] [CrossRef]
  7. Ghosh, J.; Vargas-Rosales, C.; Mendes, L.L.; Ra, I.H.; Nhan Vo, V.; Aimtongkham, P.; So-In, C. A Novel Transceiver and an Asynchronous Mode for the Hybrid Multiple-Access HetNet Architecture. IEEE Access 2023, 11, 135609–135625. [Google Scholar] [CrossRef]
  8. Girycki, A.; Rahman, M.A.; Vinogradov, E.; Pollin, S. Learning-Based Precoding-Aware Radio Resource Scheduling for Cell-Free mMIMO Networks. IEEE Trans. Wirel. Commun. 2024, 23, 4876–4888. [Google Scholar] [CrossRef]
  9. Zhang, J.; Xi, R.; He, Y.; Sun, Y.; Guo, X.; Wang, W.; Na, X.; Liu, Y.; Shi, Z.; Gu, T. A Survey of mmWave-Based Human Sensing: Technology, Platforms and Applications. IEEE Commun. Surv. Tutor. 2023, 25, 2052–2087. [Google Scholar] [CrossRef]
  10. Xue, Q.; Ji, C.; Ma, S.; Guo, J.; Xu, Y.; Chen, Q.; Zhang, W. A Survey of Beam Management for mmWave and THz Communications towards 6G. arXiv 2024, arXiv:2308.02135. [Google Scholar] [CrossRef]
  11. Lai, W.K.; Wang, Y.C.; Lin, H.C.; Li, J.W. Efficient Resource Allocation and Power Control for LTE-A D2D Communication with Pure D2D Model. IEEE Trans. Veh. Technol. 2020, 69, 3202–3216. [Google Scholar] [CrossRef]
  12. Gismalla, M.S.M.; Azmi, A.I.; Salim, M.R.B.; Abdullah, M.F.L.; Iqbal, F.; Mabrouk, W.A.; Othman, M.B.; Ashyap, A.Y.I.; Supa’at, A.S.M. Survey on Device to Device (D2D) Communication for 5GB/6G Networks: Concept, Applications, Challenges, and Future Directions. IEEE Access 2022, 10, 30792–30821. [Google Scholar] [CrossRef]
  13. Mazhar, M.S.; Saleem, Y.; Almogren, A.; Arshad, J.; Jaffery, M.H.; Rehman, A.U.; Shafiq, M.; Hamam, H. Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) Framework. Electronics 2022, 11, 1126. [Google Scholar] [CrossRef]
  14. Pan, C.; Zhou, G.; Zhi, K.; Hong, S.; Wu, T.; Pan, Y.; Ren, H.; Renzo, M.D.; Lee Swindlehurst, A.; Zhang, R.; et al. An Overview of Signal Processing Techniques for RIS/IRS-Aided Wireless Systems. IEEE J. Sel. Top. Signal Process 2022, 16, 883–917. [Google Scholar] [CrossRef]
  15. Wijethilaka, S.; Liyanage, M. Survey on Network Slicing for Internet of Things Realization in 5G Networks. IEEE Commun. Surv. Tutor. 2021, 23, 957–994. [Google Scholar] [CrossRef]
  16. Schiessl, S.; Gross, J.; Al-Zubaidy, H. Delay Analysis for Wireless Fading Channels with Finite Blocklength Channel Coding. In Proceedings of the MSWiM—Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM’15), Dubrovnik, Croatia, 24–28 August 2015. [Google Scholar]
  17. Mary, P.; Gorce, J.M.; Unsal, A.; Poor, H.V. Finite Blocklength Information Theory: What Is the Practical Impact on Wireless Communications? In Proceedings of the IEEE Globecom Workshops (GC Wkshps 2016), Washington, DC, USA, 4–8 December 2016; IEEE: New York, NY, USA, 2016. [Google Scholar]
  18. Zhu, Y.; Hu, Y.; Yuan, X.; Gursoy, M.C.; Poor, H.V.; Schmeink, A. Joint Convexity of Error Probability in Blocklength and Transmit Power in the Finite Blocklength Regime. IEEE Trans. Wirel. Commun. 2022, 22, 2409–2423. [Google Scholar] [CrossRef]
  19. Makki, B.; Svensson, T.; Caire, G.; Zorzi, M. Fast HARQ Over Finite Blocklength Codes: A Technique for Low-Latency Reliable Communication. IEEE Trans. Wirel. Commun. 2019, 18, 194–209. [Google Scholar] [CrossRef]
  20. You, X.; Sheng, B.; Huang, Y.; Xu, W.; Zhang, C.; Wang, D.; Zhu, P.; Ji, C. Closed-Form Approximation for Performance Bound of Finite Blocklength Massive MIMO Transmission. IEEE Trans. Commun. 2023, 71, 6939–6951. [Google Scholar] [CrossRef]
  21. Valembois, A.; Fossorier, M. Sphere-Packing Bounds Revisited for Moderate Block Lengths. IEEE Trans. Inf. Theory 2004, 50, 2998–3014. [Google Scholar] [CrossRef]
  22. Lazic, D.; Beth, T.; Egner, S. Constrained capacity of the AWGN channel. In Proceedings of the 1998 IEEE International Symposium on Information Theory (ISIT-98), Cambridge, MA, USA, 16–21 August 1998. [Google Scholar]
  23. Shi, J.; Wesel, R.D. A Study on Universal Codes With Finite Block Lengths. IEEE Trans. Inf. Theory 2007, 53, 3066–3074. [Google Scholar] [CrossRef]
  24. Polyanskiy, Y.; Poor, H.V.; Verdu, S. Channel Coding Rate in the Finite Blocklength Regime. IEEE Trans. Inf. Theory 2010, 56, 2307–2359. [Google Scholar] [CrossRef]
  25. MolavianJazi, E. A Unified Approach to Gaussian Channels with Finite Blocklength; University of Notre Dame: Notre Dame, IN, USA, 2014. [Google Scholar]
  26. Song, E.C.; Yue, G. Finite Blocklength Analysis for Coded Modulation with Applications to Link Adaptation. In Proceedings of the 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco, 15–18 April 2019. [Google Scholar]
Figure 1. Flowchart of calculation algorithm.
Figure 1. Flowchart of calculation algorithm.
Entropy 26 00863 g001
Figure 2. Calculate Δ C for HARQ using 16- QAM 1 s t in the 1 s t transmission and QPSK 2 n d in the 2 n d one with different BLERs, where the red circles, blue stars and black squares correspond to the points for ϵ = 10 1 (listed in Table 1), 10 2 and 10 3 , respectively.
Figure 2. Calculate Δ C for HARQ using 16- QAM 1 s t in the 1 s t transmission and QPSK 2 n d in the 2 n d one with different BLERs, where the red circles, blue stars and black squares correspond to the points for ϵ = 10 1 (listed in Table 1), 10 2 and 10 3 , respectively.
Entropy 26 00863 g002
Figure 3. Calculate α for HARQ using 16- QAM 1 s t in the 1 s t transmission and QPSK 2 n d in the 2 n d one with different BLERs, where the red circles, blue stars and black squares correspond to the points for ϵ = 10 1 (listed in Table 2), 10 2 and 10 3 , respectively.
Figure 3. Calculate α for HARQ using 16- QAM 1 s t in the 1 s t transmission and QPSK 2 n d in the 2 n d one with different BLERs, where the red circles, blue stars and black squares correspond to the points for ϵ = 10 1 (listed in Table 2), 10 2 and 10 3 , respectively.
Entropy 26 00863 g003aEntropy 26 00863 g003b
Figure 4. Prediction results of HARQ using 16- QAM 1 s t in the 1 s t transmission and QPSK 2 n d in the 2 n d one with different BLERs.
Figure 4. Prediction results of HARQ using 16- QAM 1 s t in the 1 s t transmission and QPSK 2 n d in the 2 n d one with different BLERs.
Entropy 26 00863 g004
Figure 5. Prediction results of HARQ using 64- QAM 1 s t in the 1 s t transmission and m 2 - QAM 2 n d in the 2 n d one.
Figure 5. Prediction results of HARQ using 64- QAM 1 s t in the 1 s t transmission and m 2 - QAM 2 n d in the 2 n d one.
Entropy 26 00863 g005
Figure 6. Prediction results of HARQ using 256- QAM 1 s t in the 1 s t transmission and m 2 - QAM 2 n d in the 2 n d one.
Figure 6. Prediction results of HARQ using 256- QAM 1 s t in the 1 s t transmission and m 2 - QAM 2 n d in the 2 n d one.
Entropy 26 00863 g006
Figure 7. Prediction results of HARQ using 1024- QAM 1 s t in the 1 s t transmission and m 2 - QAM 2 n d in the 2 n d one.
Figure 7. Prediction results of HARQ using 1024- QAM 1 s t in the 1 s t transmission and m 2 - QAM 2 n d in the 2 n d one.
Entropy 26 00863 g007
Figure 8. The link settings required for system-level simulations with different code rates and blocklengths, where m 1 -QAM and m 2 -QAM are used in the first transmission and second transmission, respectively.
Figure 8. The link settings required for system-level simulations with different code rates and blocklengths, where m 1 -QAM and m 2 -QAM are used in the first transmission and second transmission, respectively.
Entropy 26 00863 g008
Table 1. Calculate Δ C for HARQ using 16- QAM 1 s t in the 1 s t transmission and QPSK 2 n d in the 2 n d one, n inf = 7200, ϵ = 10 1 . Here, some points in P final are shown.
Table 1. Calculate Δ C for HARQ using 16- QAM 1 s t in the 1 s t transmission and QPSK 2 n d in the 2 n d one, n inf = 7200, ϵ = 10 1 . Here, some points in P final are shown.
P f P final (dB) C th R 7200 Δ C
1.451.210.2
1.7751.26 1.05 0.21
2.1451.32 1.1 0.22
2.5931.4 1.167 0.233
2.7651.43 1.2 0.23
3.0521.49 1.25 0.24
3.3551.54 1.3 0.24
3.591.58 1.35 0.23
3.71.61 1.375 0.235
Table 2. Calculate α for HARQ using 16- QAM 1 s t in the 1 s t transmission and QPSK 2 n d in the 2 n d one, n 1 = 360, n 2 = 1080, ϵ = 10 1 . Here, some points in P final are shown.
Table 2. Calculate α for HARQ using 16- QAM 1 s t in the 1 s t transmission and QPSK 2 n d in the 2 n d one, n 1 = 360, n 2 = 1080, ϵ = 10 1 . Here, some points in P final are shown.
P f P final (dB) R 360 R 1080 C th V th Δ C α
2.611.091.421.3830.231
2.751.0261.1171.4461.3750.231
2.91.0481.1411.4751.3660.231
3.051.0741.1651.5011.3560.241.1849
3.21.1021.1941.5291.3440.241.6132
3.351.131.2231.5561.3320.242.1820
3.51.1571.2511.5831.3190.2352.5282
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Jiang, M.; Wang, Y.; Ding, F.; Xu, Q. Finite-Blocklength Analysis of Coded Modulation with Retransmission. Entropy 2024, 26, 863. https://doi.org/10.3390/e26100863

AMA Style

Jiang M, Wang Y, Ding F, Xu Q. Finite-Blocklength Analysis of Coded Modulation with Retransmission. Entropy. 2024; 26(10):863. https://doi.org/10.3390/e26100863

Chicago/Turabian Style

Jiang, Ming, Yi Wang, Fan Ding, and Qiushi Xu. 2024. "Finite-Blocklength Analysis of Coded Modulation with Retransmission" Entropy 26, no. 10: 863. https://doi.org/10.3390/e26100863

APA Style

Jiang, M., Wang, Y., Ding, F., & Xu, Q. (2024). Finite-Blocklength Analysis of Coded Modulation with Retransmission. Entropy, 26(10), 863. https://doi.org/10.3390/e26100863

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop