Next Article in Journal
Memory-Driven Dynamics: A Fractional Fisher Information Approach to Economic Interdependencies
Previous Article in Journal
Upper Bounds for Chebyshev Permutation Arrays
Previous Article in Special Issue
Centralized Hierarchical Coded Caching Scheme for Two-Layer Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On Vector Random Linear Network Coding in Wireless Broadcasts

by
Rina Su
1,
Chengji Zhao
2,
Qifu Sun
2,* and
Zhongshan Zhang
3
1
School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China
2
School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China
3
School of Cyberspace Science and Technology, Beijing Institute of Technology (ZhuHai), Zhuhai 519088, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(6), 559; https://doi.org/10.3390/e27060559
Submission received: 2 May 2025 / Revised: 24 May 2025 / Accepted: 24 May 2025 / Published: 26 May 2025
(This article belongs to the Special Issue Network Information Theory and Its Applications)

Abstract

:
Compared with scalar linear network coding (LNC) formulated over the finite field GF( 2 L ), vector LNC offers enhanced flexibility in the code design by enabling linear operations over the vector space GF ( 2 ) L and demonstrates a number of advantages over scalar LNC. While random LNC (RLNC) has shown significant potential to improve the completion delay performance in wireless broadcasts, most prior studies focus on scalar RLNC. In particular, it is well known that, with increasing L, primitive scalar RLNC over GF( 2 L ) asymptotically achieves the optimal completion delay. However, the completion delay performance of primitive vector RLNC remains unexplored. This work aims to fill in this blank. We derive closed-form expressions for the probability distribution and the expected value of both the completion delay at a single receiver and the system completion delay. We further unveil a fundamental limitation that is different from scalar RLNC: even for large enough L, primitive vector RLNC over GF ( 2 ) L inherently fails to reach optimal completion delay. In spite of this, the gap between the expected completion delay at a receiver and the optimal one is shown to be a constant smaller than 0.714 , which implies that the expected completion delay normalized by the number P of original packets is asymptotically optimal with increasing P. We also validate our theoretical characterization through numerical simulations. Our theoretical characterization establishes primitive vector RLNC as a performance baseline for the future design of practical vector RLNC schemes with different design goals.

1. Introduction

Conventional scalar linear network coding (LNC) models data symbols transmitted along a network over the finite field GF ( 2 L ) and linearly combines data symbols with coding coefficients selected from GF ( 2 L ) . Vector LNC [1,2,3] is an extension of conventional scalar LNC. It models the data symbols over the L-dimensional binary vector space GF ( 2 ) L and linearly combines data packets with coding coefficients selected from L × L matrices over GF(2). Compared to scalar LNC, which provides 2 L field elements as the candidates for coding coefficient selection, a key advantage of vector LNC is that it significantly expands the number of candidates for coding coefficient selection to 2 L 2 . This expansion enhances coding flexibility. In particular, vector LNC subsumes scalar LNC in the sense that, in a single-source multicast network, every scalar LNC scheme over GF( 2 L ) can be transformed to a vector LNC scheme over GF ( 2 ) L , so that the scalar scheme achieves the network’s multicast capacity if and only if the counterpart vector scheme achieves the network’s multicast capacity (see, e.g., [2,3]). In addition, Ref. [1] constructed a classical non-multicast network whose capacity can be achieved by a simple vector LNC scheme over GF ( 2 ) L but cannot be achieved by scalar LNC schemes over any finite field. Various single-source multicast networks have also been constructed in [3,4,5,6] to demonstrate that the size of data symbols required by vector LNC to achieve the multicast capacity can be much smaller than that required by scalar LNC. Under the framework of vector LNC, a class of LNC schemes called circular-shift LNC was introduced in [7,8]. It models coding coefficients based on circulant matrices so as to attain lower coding complexity in comparison to scalar LNC.
Random LNC (RLNC) [9] is an important type of LNC schemes in which the coding coefficients are selected in a randomized manner. It has demonstrated significant potential to improve transmission efficiency and throughput in wireless broadcasts [8,10,11,12,13,14,15], which is a popular transmission scenario with various applications (e.g., vehicle-to-everything communication [16]). Despite the advantages of vector LNC reviewed in the previous paragraph, in the literature, most attention on the study of RLNC in wireless broadcasts is paid to scalar RLNC. In particular, it is well known that, with increasing L, primitive scalar RLNC over GF( 2 L ), where “primitive” means employing independently and uniformly distributed coding coefficients from GF( 2 L ), can achieve the optimal throughput performance. To the best of our knowledge, in the scenario of wireless broadcasts, existing research on vector RLNC has primarily focused on designing concrete vector RLNC schemes with low coding complexity [8,17]. However, for the most fundamental vector RLNC scheme, i.e.,, primitive vector RLNC over GF ( 2 ) L , theoretical characterization of its throughput performance remains unexplored. This work aims to fill in this theoretical blank. Similar to the consideration in [18,19,20,21,22,23,24,25], we consider systematic RLNC schemes, that is, the sender first broadcasts all original packets and then the coded packets. Following the approach in [8,19,22], we utilize completion delay as the core metric for evaluating throughput. This metric quantifies the total number of coded packets required by the sender until every receiver has successfully decoded all original packets.
The main contributions of this paper are summarized as follows.
  • For primitive vector RLNC over GF ( 2 ) L , we derive closed-form characterization for the probability distribution as well as the expected value of both the completion delay at a single receiver and the system completion delay. Numerical comparison validates our theoretical characterization, demonstrating high accuracy between theoretical and simulation results, particularly for large enough L (Say, L 4 ).
  • Unlike primitive scalar RLNC over GF( 2 L ), which is capable of asymptotically attaining optimal completion delay when L increases, we reveal that, even for large enough L, primitive vector RLNC over GF ( 2 ) L fails to reach optimal completion delay, but the gap between the expected completion delay at a receiver and the optimal one is shown to be a constant smaller than 0.714 .
  • We reveal that, for primitive vector RLNC over GF ( 2 ) L , the normalized expected completion delay per original packet asymptotically converges to its optimal value as P grows.
Our theoretical characterization on the completion delay performance of primitive vector RLNC provides a theoretical benchmark for the future design of vector RLNC schemes with different design goals.
The rest of this paper is structured as follows. Section 2 establishes the system model and reviews known results on perfect RLNC, a class of RLNC schemes that attain the optimal completion delay performance. Section 3 theoretically characterizes the probability distribution and the expected value of completion delay of primitive vector RLNC over GF ( 2 ) L . The theoretical characterization is numerically compared with simulation results in Section 4. The paper is concluded in Section 5.

2. Preliminaries

As illustrated in Figure 1, we consider a single-hop wireless broadcast network without feedback, where a single sender aims to deliver a total of P original packets to R receivers. Each packet contains M bits. During each timeslot, the sender is allowed to transmit one packet, which is received by all receivers. The communication link between the sender and every receiver is modeled as an independent memoryless erasure channel, where receiver r experiences a packet erasure probability of 1 p r . The goal for every receiver is to successfully recover all P original packets.
In this paper, all RLNC transmission strategies adopt a systematic structure, which has also been considered in [18,22]. Specifically, during the initial transmission phase, the sender sequentially broadcasts all P original packets m 1 , m 2 , , m P . Following this, in the second phase the sender transmits coded packets, each formed as a linear combination of the P original packets. This process continues until all receivers successfully recover the entire set of P original packets. The term completion delay refers to the number of coded packets sent during this second phase. As emphasized in prior studies on RLNC performance in wireless broadcast settings [8,19,22], completion delay serves as a fundamental indicator of transmission efficiency. Non-systematic codes usually incur higher completion delay than systematic codes [19]. This is due to the fact that the first P transmitted packets are not original packets, but randomly coded packets, which are not necessarily linearly independent.
The conventional scalar RLNC scheme operates over the finite field GF( 2 L ), where every packet is treated as a row vector composed of M L symbols belonging to GF( 2 L ) (To simplify the exposition, we assume L divides M. In practical systems, since M L , padding with dummy bits ensures this condition is met). In this scheme, every packet transmitted by the sender is constructed as a GF( 2 L )-linear combination of the P original packets m 1 , m 2 , , m P . In particular, during the second transmission phase, each coded packet m P + d (for d 1 ) generated by the sender can be represented as
m P + d = j = 1 P γ j m j ,
where each coding coefficient γ j is uniformly and independently drawn from GF( 2 L ).
To enable receivers to interpret how m P + d is generated from the original packets, a global encoding kernel  f P + d = [ γ 1 , , γ P ] T is appended to the packet as a header. For the P original packets, their corresponding global encoding kernels form the P × P identity matrix, i.e., [ f j ] 1 j P = I P . Once a receiver r successfully receives P packets with linearly independent global encoding kernels, it can recover the entire P original packets through decoding.
The RLNC schemes we consider in this paper are vector RLNC schemes, which are defined over GF ( 2 ) L . Each packet m j of M bits is interpreted as a row vector [ s j , 1 , s j , 2 , , s j , M L ] comprising M L symbols, where each symbol s j , j is treated as an L-bit row vector defined over GF(2). For an L × L matrix K over GF(2), the linear operation K m j is defined symbol-wise as
K m j = [ s j , 1 K , s j , 2 K , , s j , M L K ] .
Hence, for every d 1 , the coded packet m P + d that is randomly produced by the sender during the second phase can be represented as
m P + d = j = 1 P K j m j ,
where the coding coefficients K j are randomly and independently selected from L × L matrix over GF(2). We define the global encoding kernel of a packet as a P L × L matrix over GF(2). Every global encoding kernel can be viewed as a P × 1 block matrix, where each block corresponds to a coding coefficient represented by an L × L matrix over GF(2). For an original packet m j , 1 j P , its global encoding kernel F j contains the identity matrix I L in the j th block entry and L × L zero matrices in all other positions. Consequently, [ F j ] 1 j P = I P L . For a coded packet m P + d = j = 1 P K j m j , its global encoding kernel F P + d is defined as F P + d = [ K 1 T K 2 T K P T ] T . For vector codes, a receiver can decode the P original packets upon receiving any P packets whose global encoding kernels are linearly independent (i.e., their concatenation has full rank P L ).
Perfect RLNC [8,22] is a class of RLNC scheme where the encoded packets generated by the source node exhibit the strongest possible linear independence. In particular, a receiver is able to recover all P original packets upon successfully receiving arbitrary P perfect RLNC packets. Therefore, perfect RLNC is optimal in terms of completion delay, so it serves as an important benchmark scheme in the literature of RLNC in wireless broadcasts. For perfect RLNC, let D r perf and D perf = max 1 r R D r perf respectively denote the completion delay at single receiver r and the system completion delay. It is known that D r perf follows the negative binomial distribution with parameter P and p r [8]. Consequently, the distribution of D r perf follows
Pr ( D r perf d ) = I p r ( P , d + 1 ) ,
where I p r ( P , d + 1 ) is the regularized incomplete beta function and is expressed as
I p r ( P , d + 1 ) = j = 0 d P + j 1 P 1 p r P ( 1 p r ) j .
Meanwhile,
E [ D r perf ] = P p r P .
Based on Equation (4), we further have
Pr ( D perf d ) = 1 r R I p r ( P , d + 1 ) , E [ D perf ] = d 0 ( 1 1 r R I p r ( P , d + 1 ) ) .

3. Theoretical Analyses of Vector RLNC

Analogous to conventional scalar RLNC over GF( 2 L ), in which coding coefficients are independently and uniformly selected from GF( 2 L ), the most fundamental vector RLNC scheme selects coding coefficients independently and uniformly from all L × L matrices over GF(2). Unless otherwise specified, such an RLNC scheme is referred to as primitive vector RLNC over GF ( 2 ) L . To the best of our knowledge, the completion delay performance of primitive vector RLNC has not been theoretically analyzed before. This section aims to address and fill in this blank.
For primitive vector RLNC over GF ( 2 ) L , let D r and D = max 1 r R D r respectively denote the completion delay at single receiver r and the system completion delay. The analysis of D r requires the following lemma. For d 0 , let R P L × ( P + d ) L be a randomly generated matrix over GF(2), in which every entry is independently and uniformly distributed over { 0 , 1 } . Let q d represent the full rank probability of R P L × ( P + d ) L .
Lemma 1.
The full rank probability of R P L × ( P + d ) L is given by
q d = Pr { rank ( R P L × ( P + d ) L ) = P L } = l = 0 P L 1 1 2 ( ( P + d ) L l ) .
In particular, when d = 0 ,
0.2887 < q 0 1 / 2 .
Proof. 
Let r l denote the l th row of the binary matrix R P L × ( P + d ) L . Assume that we build the random matrix R P L × ( P + d ) L row by row. The probability for r 0 to be full-rank is 1 1 2 ( P + d ) L . Under the assumption that the first l rows r 0 , , r l 1 are linearly independent, as there are 2 l different GF(2)-linear combinations of r 0 , , r l 1 , the probability of the l th row r l being linearly independent of all previous l rows is 1 2 l 2 ( P + d ) L = 1 2 ( ( P + d ) L l ) . Hence,
Pr { rank ( R P L × ( P + d ) L ) = P L } = l = 0 P L 1 Pr { r l linearly independent of r 0 , , r l 1 | r 0 , , r l 1 linearly independent } = l = 0 P L 1 1 2 ( ( P + d ) L l ) .
When d = 0 , the size of matrix R P L × ( P + d ) L becomes P L × P L , and
q 0 = l = 0 P L 1 1 2 ( P L l ) = k = 1 P L 1 2 k .
When P L increases, q 0 decreases. Thus, when P L = 1 , q 0 is maximized and equal to 1 / 2 . It can also be readily checked that as P L increases, q 0 converges to 0.2887 . Thus, 0.2887 < q 0 1 / 2 . □
For scalar RLNC defined over GF( 2 L ), it has been widely recognized (see, e.g., [8]) that, as L grows, the expected completion delay asymptotically approaches the optimal value E [ D perf ] , i.e., under the assumption of perfect RLNC.
On the contrary, as a consequence of Lemma 1, it turns out that a similar conclusion cannot be drawn for primitive vector RLNC over GF ( 2 ) L regardless of the choice of L.
Proposition 1.
For primitive vector RLNC over GF ( 2 ) L , E [ D ] E [ D perf ] for any choice of L.
Proof. 
Perfect RLNC assumes that receiver r is able to recover the original P packets upon successfully receiving any P packets. If this condition holds for primitive RLNC over GF ( 2 ) L , then, for any P packets successfully received by r, the corresponding P global encoding kernels each of size P L × L , when concatenated column-wise, can form a full-rank P L × P L matrix over GF(2), say R P L × P L . Among the P received packets, it is assumed that N are coded packets. As the global encoding kernels for original packets consist of unit column vectors, the P L × P L full-rank matrix R P L × P L can be reduced to an N L × N L full-rank matrix R N L × N L , in which every entry is randomly selected from GF(2). However, according to Lemma 1, for any L there is a nonzero probability that R P L × P L is not full rank, so that a contradiction is drawn. Hence, the perfect RLNC assumption does not hold for primitive vector RLNC for any L. □
Even though primitive vector RLNC over G ( 2 ) L cannot asymptotically achieve the optimal expected completion delay with increasing L, based on the following characterization of the distribution of completion delay, we assert that primitive vector RLNC over G ( 2 ) L asymptotically achieves the optimal expected completion delay with increasing P.
Throughout our theoretical analysis, we make the assumption that L is large enough (say, L 8 ). The main reason for this is twofold. This assumption is motivated by two crucial considerations. First, it guarantees that the full-rank probability q 2 is equal to 1 for all values of P, as established in Equation (8), thereby significantly simplifying our derivation of the completion delay distribution. Second, it ensures that the probabilities q 0 and q 1 remain effectively constant across different P, which is essential for maintaining the accuracy of our analytical results. For instance, when L = 8 , q 0 = 0.2888 for P 1 and q 0 = 0.2899 for P = 1 , and q 1 = 0.9961 for all P 1 .
Theorem 1.
For primitive vector RLNC over GF ( 2 ) L , the distribution of completion delay D r at single receiver r is characterized as Pr { D r = 0 } = p r P , and for d 1 ,
Pr { D r d } = p r P + ( I p r ( P , d + 1 ) p r P ) q 0 + ( I p r ( P + 1 , d ) p r P I p r ( 1 , d ) ) ( q 1 q 0 ) + ( I p r ( P + 2 , d 1 ) p r P I p r ( 2 , d 1 ) ) ( q 2 q 1 )
Proof. 
The technical proof is given in Appendix A. □
Theorem 2.
For primitive vector RLNC over GF ( 2 ) L , the expected completion delay at a single receiver is given by
E [ D r ] = P p r P + 1 p r P p r ( 2 q 0 q 1 ) .
Proof. 
The technical proof of Equation (12) based on Equation (11) is given in Appendix B. □
In addition to the technical derivation of E [ D r ] in Appendix B, based on the distribution of D r , we can also analytically characterize E [ D r ] based on the concept of negative binomial distribution and the full rank probability of q 0 , q 1 , q 2 as follows.
First, it takes an average of P p r P transmissions until receiver r successfully receives P packets. Assume among these P successfully received packets, U ( P ) are original packets received in the first transmission phase and P U are coded packets received at the second transmission phase. Assume the case P U > 0 , which happens with probability 1 p r P . In this case, receiver r is able to utilize P U received coded packets to recover P U missing original packets with probability q 0 . Thus, with probability 1 q 0 , receiver r needs to receive at least one more coded packet, after an average of 1 / p r transmissions. Upon receiving P U + 1 coded packets, the probability of receiver r to recover P U missing original packets is q 1 . Consequently, with probability 1 q 1 , receiver r needs to receive an extra coded packet, after an average of 1 / p r transmissions. Upon receiving P U + 2 coded packets, the probability of receiver r to recover P U missing original packets is q 2 , which is equal to 1 under the assumption that L is large enough. To sum up, the expected completion delay at receiver r can be characterized as
E [ D r ] = P p r P + ( 1 p r P ) ( 1 p r ( 1 q 0 ) + 1 p r ( 1 q 1 ) ) .
It can be readily checked that Equation (13) and Equation (12) are mathematically equivalent representations of the expected completion delay E [ D r ] .
Remark 1.
Under the assumption that L is large enough, our theoretical characterization of the expected completion delay for primitive vector RLNC over GF ( 2 ) L is invariant to L. This invariance results in a fixed gap 1 p r P p r ( 2 q 0 q 1 ) in completion delay between primitive vector RLNC and perfect RLNC, even when L increases to infinity. Despite this, the next corollary asserts that the expected completion delay normalized by P asymptotically approaches the optimal value with increasing P.
Corollary 1.
For primitive vector RLNC over GF ( 2 ) L (for large enough L), E [ D r ] is upper bounded by
E [ D r ] 1 p r ( P + 0.714 ) P .
Consequently, with increasing P,
lim P E [ D r ] P = lim P E [ D r perf ] P = 1 p r 1 .
Proof. 
According to Equation (12), E [ D r ] is upper bounded by 1 p r ( P + 2 q 0 q 1 ) P . Since we assume L is large enough, q 2 = 1 , q 1 = 0.9961 , q 0 = 0.2899 . We thus have 1 p r ( P + 2 0.9961 0.2899 ) P = 1 p r ( P + 0.714 ) P , which is the upper bound of E [ D r ] for primitive vector RLNC over GF ( 2 ) L . Equation (15) is a direct consequence of (14). □
Remark 2.
The corollary above asserts that, for primitive vector RLNC over GF ( 2 ) L with large enough L, regardless of the packet erasure probability 1 p r , a receiver only needs to successfully receive P + 0.714 packets on average to recover all P original packets, where 0.714 is derived from 2 q 0 q 1 . In comparison, it has been proven that, for RLNC over GF(2) (which is equivalent to primitive vector RLNC over GF(2)), a receiver needs to successfully receive at most P + 2 packets on average to recover all P original packets [26]. This signifies that the assumption of larger L allows us to deduce a tighter upper bound on E [ D r ] .
Proposition 2.
For vector RLNC over GF ( 2 ) L , the distribution of system completion delay D is given by
Pr ( D d ) = 1 r R Pr ( D r d )
where Pr ( D r d ) is explicitly characterized in Theorem 1. Based on the distribution of D, the expected system completion delay D can be characterized as
E [ D ] = d 0 Pr ( D > d ) = d 0 1 1 r R Pr ( D r d ) .
This section theoretically analyzed the distribution as well as the expectation of completion delay for primitive vector RLNC over GF ( 2 ) L , which serves as a benchmark scheme for the future study of vector RLNC.

4. Numerical Validation

In this section, we present the numerical results of primitive vector RLNC schemes over GF ( 2 ) L , with L respectively set as 1 , 4 , 8 , 10 , and compare the simulation results to the theoretical derivations obtained in the previous section. The erasure probability at each receiver is fixed at 0.2 . The completion delay performance depicted in this section is normalized by the packet number P. In the figure legend, theoretical results are labeled as “theo” and simulation results are labeled as “simu”.
Recall that, in the previous section, the theoretical analysis is based on the assumption that L is large enough so that q 2 , defined in Equation (8), is always equal to 1 and the value of q 0 and of q 1 stays approximately the same, regardless of the choice of P. In this section, when L = 8 , 10 , we directly adopt Equation (11) in Theorem 1 to calculate the distribution of D r . When L = 1 , q 2 cannot be assumed to be 1 anymore; as a direct extension of (11), we adopt the following equation to calculate the distribution of D r to make the theoretical characterization more accurate:
Pr { D r d } = p r P + ( I p r ( P , d + 1 ) p r P ) q 0 + j 1 I p r ( P + j , d j + 1 ) p r P I p r ( j , d j + 1 ) ) ( q j q j 1 ) ,
and E [ D r ] and E [ D ] are respectively calculated based on d 0 Pr ( D r > d ) and Equation (17).
Figure 2 plots the average completion delay per packet at receiver r based on the theoretical and simulation results of primitive vector RLNC schemes over different GF ( 2 ) L . The expected completion delay 1 / p r 1 = 0.25 at receiver r of perfect RLNC is also depicted for comparison. From this figure, the following observations can be made. First, the average completion delay at receiver r of every primitive vector RLNC scheme decreases with increasing P. Second, when L = 4 , 8 , 10 , there is no visually distinguishable difference between the theoretical values of E [ D r ] characterized in Equation (12) and the numerical results. This validates the correctness of our theoretical derivation in Theorem 1 based on the assumption of large enough L. In contrast, when L = 1 and P 40 , the theoretical value of E [ D r ] in Equation (12) is higher than the actual simulation value. This is because, without the assumption that L is large enough, the theoretical value q d we adopted in Theorem 1 is smaller than the actual probability of a random R ( P U ) L × ( P U + d ) L matrix being full-rank, which leads to the distribution Pr { D r d } characterized in Equation (18) smaller than the actual one. However, with increasing P, the theoretical value coincides with the simulation one. Furthermore, Figure 2 reveals that, when L 8 , the increase of L will no longer lower the expected completion delay E [ D r ] of primitive vector RLNC over GF ( 2 ) L , while there is a noticeable gap between E [ D r ] and E [ D r perf ] = 1 p r 1 = 0.25 of perfect RLNC. This observation is in line with the discussion in Remark 1. According to Equation (12), when P continues to increase, E [ D r ] converges asymptotically to 0.25 , and thus has the asymptotical optimal completion delay performance. This finding aligns with the conclusion of (15) in Corollary 1. Last, Table 1 illustrates that, when L = 8 , the expected completion delay per packet at single receiver r is lower than the theoretical upper bound computed via Equation (14), thereby validating the accuracy of the upper bound in Equation (14).
Theoretical and simulation results for the average system completion delay of primitive vector RLNC schemes over GF ( 2 ) L are compared in Figure 3 under different parameter settings. The number of receivers is set to be 20. As observed from Figure 3, the performance gap in completion delay among primitive vector RLNC schemes with different L diminishes as P increases. Moreover, when L 8 , the increase of L will not lower the expected completion delay E [ D ] of primitive vector RLNC over GF ( 2 ) L any more. Furthermore, when P continues growing, all primitive vector RLNC schemes asymptotically approach the performance of perfect RLNC. The same as the observation of Figure 2 and Figure 3 demonstrates that, when L 4 , there is no visually distinguishable difference between the theoretical characterization of E [ D ] in Proposition 2 and the simulation results. For the case L = 1 , the theoretical characterization of E [ D ] becomes more accurate as P increases, because E [ D ] is deduced based on the distribution of D r in Equation (18), which is smaller than the actual value but converges to the actual one with increasing P.

5. Conclusions

In the context of primitive vector RLNC over GF ( 2 ) L , we present closed-form expressions for both the probability distribution and the expected value of the individual completion delay D r at receiver r, as well as the overall system completion delay D, providing exact analytical tools for throughput performance evaluation. Even for large enough L, primitive vector RLNC over GF ( 2 ) L inherently fails to reach optimal completion delay, but the gap between E [ D r ] and the optimal one is shown to be a constant smaller than 0.714 , which implies that E [ D r ] / P is asymptotically optimal with the increasing number P of original packets. Numerical simulations validate our theoretical derivations, demonstrating near-perfect alignment between theoretical and empirical results. Our findings on the completion delay performance of primitive vector RLNC provide a theoretical benchmark for the future design of practical vector RLNC schemes with different design goals.

Author Contributions

R.S. and Q.S. deduced the theoretical characterization. R.S. and C.Z. conducted the numerical analysis. R.S. wrote the paper with the help of Q.S. and Z.Z. All authors were involved in problem formulation and editing of this paper. All authors have read and agreed to the published version of the manuscript.

Funding

This work was partially supported by the China Postdoctoral Science Foundation under Grant 2024M764138 and the National Natural Science Foundation of China under Grants 62401048, 62271044.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The theoretical analysis and key numerical results are fully presented in this paper. Raw simulation data and code are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. Proof of Theorem 1

Among the P original packets sent by the sender in the first phase of transmission, let U denote the number of successfully received ones by receiver r. Let V denote the total number of packets that need to be successfully received by r in order to recover the P original packets. If U = P , then V = P , too. If U < P , then V is possibly larger than P, because the column-wise juxtaposition of the global encoding kernels for the first P successfully received packets is not necessarily full rank. However, based on the assumption of large enough L, so that q 2 = 1 , we have V P + 2 .
For a positive integer P 1 , denote by N P the negative binomial random variable with parameters P and p r .
It is obvious that Pr { D r = 0 } = Pr { U = P } = p r P . For d 1 , the event D r d occurs if and only if one of the following four disjoint cases occurs.
  • Case A: U = P and thus V = P , which has probability p r P to occur.
  • Case B: N P d , U < P , and V = P . The probability of this case to occur is analyzed as follows. First,
    Pr { N P d , U < P } = Pr { N P d } Pr { U = P } = I p r ( P , d + 1 ) p r P .
    Under the conditions N P d and U < P , the probability of V = P is equal to the probability that the column-wise juxtaposition of the global encoding kernels for the V = P successfully received packets, which is a P L × P L matrix denoted by R P L × P L over GF(2), is full rank. As the global encoding kernels for original packets consist of unit column vectors, R P L × P L can be reduced to an ( V U ) L × ( V U ) L matrix R ( V U ) L × ( V U ) L in which every entry is independently and randomly selected from GF(2), so that det ( R P L × P L ) = det ( R ( V U ) L × ( V U ) L ) . Based on the assumption that L is large enough, the probability for R ( V U ) L × ( V U ) L to be full rank is q 0 , regardless of the value of V U > 1 . Thus,
    Pr { V = P | N P d , U < P } = q 0
    and
    Pr { Case B occurs } = ( I p r ( P , d + 1 ) p r P ) q 0 .
  • Case C: N P + 1 d 1 , U < P , and V = P + 1 . First,
    Pr { N P + 1 d 1 , U < P } = Pr { N P + 1 d 1 } Pr { N P + 1 d 1 , U = P } = I p r ( P + 1 , d ) p r P I p r ( 1 , d ) ,
    where the last equality holds due to Pr { N P + 1 d 1 | U = P } = Pr { N 1 d 1 } = I p r ( 1 , d ) . In a similar argument to that in Case B, under the conditions N P + 1 d 1 and U < P , the probability of V = P + 1 is equal to the probability that a randomly generated ( V U ) L × ( V U + 1 ) L matrix R ( V U ) L × ( V U + 1 ) L has full rank, while its first ( V U ) L columns are not linearly independent. This probability is equal to q 1 q 0 . Consequently,
    Pr { Case C occurs } = ( I p r ( P + 1 , d ) p r P I p r ( 1 , d ) ) ( q 1 q 0 ) .
  • Case D: N P + 2 d 2 , U < P , and V = P + 2 . In an essentially same argument as that for Case C, we have
    Pr { Case D occurs } = ( I p r ( P + 2 , d 1 ) p r P I p r ( 2 , d 1 ) ) ( q 2 q 1 ) .
Equation (11) can now be proven to be correct by adding (A3), (A5), (A6), and Pr { Case A occurs } = p r P up.

Appendix B. Proof of Theorem 2

We first express E [ D r ] in the following way,
E [ D r ] = d 0 Pr { D r > d } = 1 p r P + d 1 ( 1 Pr { D r d } ) .
For brevity, write A d = I p r ( P , d + 1 ) p r P , B d = I p r ( P + 1 , d ) p r P I p r ( 1 , d ) , and C d = I p r ( P + 2 , d 1 ) p r P I p r ( 2 , d 1 ) , so that
Pr { D r d } = p r P + A d q 0 + B d ( q 1 q 0 ) + C d ( q 2 q 1 ) ,
and
E [ D r ] = 1 p r P + d 1 ( 1 p r P A d q 0 B d ( q 1 q 0 ) C d ( q 2 q 1 ) ) .
We next analyze d 1 A d , d 1 B d and d 1 C d , respectively. For d 1 A d , we have
d 1 A d = d 1 ( 1 I p r ( P , d + 1 ) ( 1 p r P ) ) = d 0 ( 1 I p r ( P , d + 1 ) ) ( 1 I p r ( P , 1 ) ) d 1 ( 1 p r P ) = P p r P d 0 ( 1 p r P ) ,
where the last equality holds due to I p r ( P , 1 ) = p r P and d 0 ( 1 I p r ( P , d + 1 ) ) = P p r P by (5) and (6). For d 1 B d ,
d 1 B d = d 1 ( ( 1 I p r ( P + 1 , d ) ) p r P ( 1 I p r ( 1 , d ) ) ( 1 p r P ) ) = P + 1 p r ( P + 1 ) p r P ( 1 p r 1 ) d 1 ( 1 p r P ) = P p r P + 1 p r P p r d 0 ( 1 p r P ) .
For d 1 C d ,
d 1 C d = d 1 ( ( 1 I p r ( P + 2 , d 1 ) ) p r P ( 1 I p r ( 2 , d 1 ) ) ( 1 p r P ) ) = 1 p r P + d 1 ( ( 1 I p r ( P + 2 , d ) ) p r P ( 1 I p r ( 2 , d ) ) ( 1 p r P ) ) = 1 p r P + P + 2 p r ( P + 2 ) p r P ( 2 p r 2 ) d 1 ( 1 p r P ) = P p r P + 2 ( 1 p r P ) p r d 0 ( 1 p r P ) .
where the second equality holds due to I p r ( P + 2 , 0 ) = I p r ( 2 , 0 ) = 0 by convention. By assumption, q 2 = 1 . Thus, by plugging (A10), (A11), (A12) back to (A9), we obtain
E [ D r ] = P p r P + 1 p r P p r ( q 1 q 0 ) + 2 ( 1 p r ) p r ( q 2 q 1 ) ,
which directly implies (12) under the assumption that q 2 = 1 .

References

  1. Medard, M.; Effros, M.; Karger, D.; Ho, T. On coding for non-multicast networks. In Proceedings of the 41st Allerton Annual Conference on Communication, Control and Computing, Monticello, IL, USA, 1–3 October 2003; pp. 1–9. [Google Scholar]
  2. Ebrahimi, J.; Fragouli, C. Algebraic algorithms for vector network coding. IEEE Trans. Inf. Theory 2011, 57, 996–1007. [Google Scholar] [CrossRef]
  3. Sun, Q.T.; Yang, X.; Long, K.; Yin, X.; Li, Z. On vector linear solvability of multicast networks. IEEE Trans. Commun. 2016, 64, 5096–5107. [Google Scholar] [CrossRef]
  4. Etzion, T.; Wachter-Zeh, A. Vector network coding based on subspace codes outperforms scalar linear network coding. IEEE Trans. Inf. Theory 2018, 64, 2460–2473. [Google Scholar] [CrossRef]
  5. Cai, H.; Chrisnata, J.; Etzion, T.; Schwartz, M.; Wachter-Zeh, A. Network-coding solutions for minimal combination networks and their sub-networks. IEEE Trans. Inf. Theory 2020, 66, 6786–6798. [Google Scholar] [CrossRef]
  6. Liu, H.; Wei, H.; Puchinger, S.; Wachter-Zeh, A.; Schwartz, M. On the gap between scalar and vector solutions of generalized combination networks. IEEE Trans. Inf. Theory 2021, 67, 5580–5591. [Google Scholar] [CrossRef]
  7. Tang, H.; Sun, Q.T.; Li, Z.; Yang, X.; Long, K. Circular-shift linear network coding. IEEE Trans. Inf. Theory 2019, 65, 65–80. [Google Scholar] [CrossRef]
  8. Su, R.; Sun, Q.T.; Zhang, Z. Delay-complexity trade-off of random linear network coding in wireless broadcast. IEEE Trans. Commun. 2020, 68, 5606–5618. [Google Scholar] [CrossRef]
  9. Ho, T.; Medard, M.; Koetter, R.; Karger, D.R.; Effros, M.; Shi, J. A random linear network coding approach to multicast. IEEE Trans. Inf. Theory 2006, 52, 4413–4430. [Google Scholar] [CrossRef]
  10. Tsimbalo, E.; Tassi, A.; Piechocki, R.J. Reliability of multicast under random linear network coding. IEEE Trans. Commun. 2018, 66, 2547–2559. [Google Scholar] [CrossRef]
  11. Chatzigeorgiou, I.; Tassi, A. Decoding delay performance of random linear network coding for broadcast. IEEE Trans. Veh. Technol. 2017, 66, 7050–7060. [Google Scholar] [CrossRef]
  12. Swapna, B.T.; Eryilmaz, A.; Shroff, N.B. Throughput-delay analysis of random linear network coding for wireless broadcasting. IEEE Trans. Inf. Theory 2013, 59, 6328–6341. [Google Scholar] [CrossRef]
  13. Tassi, A.; Chatzigeorgiou, I.; Lucani, D.E. Analysis and optimization of sparse random linear network coding for reliable multicast services. IEEE Trans. Commun. 2016, 64, 285–299. [Google Scholar] [CrossRef]
  14. Cohen, A.; Thiran, G.; Bracha, V.B. Adaptive causal network coding with feedback for multipath multi-hop communications. IEEE Trans. Commun. 2020, 69, 766–785. [Google Scholar]
  15. Li, Y.; Wang, J.; Bao, Z.; Wang, J. Efficient coastal communications with sparse network coding. IEEE Netw. 2018, 32, 122–128. [Google Scholar] [CrossRef]
  16. Liu, G.; Wang, Z.; Hu, J.; Ding, Z.; Fan, P. Cooperative NOMA broadcasting/multicasting for low-latency and high-reliability 5G cellular V2X communications. IEEE Internet Things J. 2019, 6, 7828–7838. [Google Scholar] [CrossRef]
  17. Tang, H.; Liu, H.; Jin, S.; Liu, W.; Sun, Q. On matrix representation of extension field GF(2L) an its application in vector linear network coding. Entropy 2024, 26, 822. [Google Scholar] [CrossRef]
  18. Arefi, A.; Khabbazian, M.; Ardakani, M.; Bansal, G. Blind instantly decodable network codes for wireless broadcast of real-time multimedia. IEEE Trans. Wirel. Commun. 2018, 17, 2276–2288. [Google Scholar] [CrossRef]
  19. Yu, M.; Sprintson, A.; Sadeghi, P. On the packet decoding delay of linear network coded wireless broadcast. Can. J. Elect. Comput. Eng. 2023, 46, 77–89. [Google Scholar]
  20. Mei, Z. Minimizing the average packet access time of the application layer for buffered instantly decodable network coding. IEEE Trans. Parallel Distrib. Syst. 2023, 34, 1035–1046. [Google Scholar] [CrossRef]
  21. Mei, Z.; Zhao, J. Buffering instantly decodable network coding for a heterogenous cellular network with dual interfaces. IEEE Trans. Veh. Technol. 2023, 72, 16208–16220. [Google Scholar] [CrossRef]
  22. Su, R.; Sun, Q.T.; Zhang, Z.; Li, Z. Completion delay of random linear network coding in full-duplex relay networks. IEEE Trans. Commun. 2022, 70, 7843–7857. [Google Scholar] [CrossRef]
  23. Yu, M.; Aboutorab, N.; Sadeghi. P. From instantly decodable to random linear network coded broadcast. IEEE Trans. Commun. 2014, 40, 3943–3955. [Google Scholar] [CrossRef]
  24. Giacaglia, G.; Shi, X.; Kim, M.; Lucani, D.E.; Medard, M. Systematic network coding with the aid of a full-duplex relay. In Proceedings of the 2013 IEEE International Conference on Communications (ICC), Budapest, Hungary, 9–13 June 2013; pp. 3312–3317. [Google Scholar]
  25. Li, Y.; Blostein, S.; Chan, W.-Y. Systematic network coding for twohop lossy transmissions. EURASIP J. Adv. Signal Process. 2015, 2015, 93. [Google Scholar] [CrossRef]
  26. Lucani, D.E.; Medard, M.; Stojanovic, M. On coding for delay—Network coding for time-division duplexing. IEEE Trans. Inf. Theory 2012, 58, 2330–2348. [Google Scholar] [CrossRef]
Figure 1. System model of a wireless broadcast network, consisting of 1 sender and R receivers.
Figure 1. System model of a wireless broadcast network, consisting of 1 sender and R receivers.
Entropy 27 00559 g001
Figure 2. Average completion delay per packet at receiver r of different primitive RLNC schemes over GF ( 2 ) L with R = 1 , p r = 0.8 , and various P.
Figure 2. Average completion delay per packet at receiver r of different primitive RLNC schemes over GF ( 2 ) L with R = 1 , p r = 0.8 , and various P.
Entropy 27 00559 g002
Figure 3. Average system completion delay per packet of different primitive RLNC schemes over GF ( 2 ) L with R = 20 , p r = 0.8 and various P.
Figure 3. Average system completion delay per packet of different primitive RLNC schemes over GF ( 2 ) L with R = 20 , p r = 0.8 and various P.
Entropy 27 00559 g003
Table 1. Comparison between simulation results and the derived upper bound Equation (14) for different values of P.
Table 1. Comparison between simulation results and the derived upper bound Equation (14) for different values of P.
P10152025303540
simu0.33020.30770.29350.28540.27990.27540.2721
Equation (14)0.33930.30950.29460.28570.27990.27550.2723
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Su, R.; Zhao, C.; Sun, Q.; Zhang, Z. On Vector Random Linear Network Coding in Wireless Broadcasts. Entropy 2025, 27, 559. https://doi.org/10.3390/e27060559

AMA Style

Su R, Zhao C, Sun Q, Zhang Z. On Vector Random Linear Network Coding in Wireless Broadcasts. Entropy. 2025; 27(6):559. https://doi.org/10.3390/e27060559

Chicago/Turabian Style

Su, Rina, Chengji Zhao, Qifu Sun, and Zhongshan Zhang. 2025. "On Vector Random Linear Network Coding in Wireless Broadcasts" Entropy 27, no. 6: 559. https://doi.org/10.3390/e27060559

APA Style

Su, R., Zhao, C., Sun, Q., & Zhang, Z. (2025). On Vector Random Linear Network Coding in Wireless Broadcasts. Entropy, 27(6), 559. https://doi.org/10.3390/e27060559

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop