Next Article in Journal
Biomass Calculations of Individual Trees Based on Unmanned Aerial Vehicle Multispectral Imagery and Laser Scanning Combined with Terrestrial Laser Scanning in Complex Stands
Next Article in Special Issue
Research on Co-Channel Interference Cancellation for Underwater Acoustic MIMO Communications
Previous Article in Journal
Combining Deep Semantic Edge and Object Segmentation for Large-Scale Roof-Part Polygon Extraction from Ultrahigh-Resolution Aerial Imagery
Previous Article in Special Issue
Trajectory Optimization of Autonomous Surface Vehicles with Outliers for Underwater Target Localization
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Adaptive Packet Coding for Reliable Underwater Acoustic Communications

1
School of Information and Communication Engineering, Dalian University of Technology, Dalian 116024, China
2
The State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710071, China
3
School of Marine Science and Technology, Northwestern Polytechnical University, Xi’an 710072, China
*
Author to whom correspondence should be addressed.
Remote Sens. 2022, 14(19), 4712; https://doi.org/10.3390/rs14194712
Submission received: 29 August 2022 / Revised: 17 September 2022 / Accepted: 18 September 2022 / Published: 21 September 2022
(This article belongs to the Special Issue Underwater Communication and Networking)

Abstract

:
This work investigates adaptive random linear packet coding (RLPC) for reliable underwater acoustic (UWA) communications. Our goal is to minimize the total transmission time of data blocks by adjusting the packet coding rate. We first consider the application of RLPC with the conventional automatic repeat request (ARQ) scheme. We dynamically adjust the coding rate to fit the time variations of UWA channels by choosing the optimal number of packets in each transmission. The optimal number of packets in each transmission is obtained based on a dynamic programming (DP) algorithm according to the feedback messages, which contain the number of successfully transmitted packets in the last transmission and the channel state information. Furthermore, considering the long propagation delay of UWA communications, we propose a modified juggling-like ARQ (J-ARQ) for the RLPC scheme, for which the duration of each transmission can be adjusted based on the characteristics of RLPC. A two-step DP algorithm is proposed to find out the optimal solutions for this case. Simulation results show that the proposed schemes can improve the throughput efficiency and reduce the outage probability.

Graphical Abstract

1. Introduction

Underwater communications have attracted much interest in recent years due to the rapid development of ocean exploration. Reliable data transmission among nodes is the basis of many underwater applications, such as tsunami warning, ecological monitoring, off-shore oil exploration, etc. [1]. Compared to other media, acoustic waves are the only means of achieving reliable underwater transmission over a long distance. However, underwater acoustic (UWA) communications also face some difficulties compared to their terrestrial counterparts. The characteristics of UWA channels include large delay and Doppler spread, high path attenuation, limited bandwidth, and long propagation delay, which severely reduce the reliability of underwater transmissions.
Generally speaking, redundancy and retransmission are the two main approaches to enable a robust communication link. Retransmission schemes such as automatic repeat request (ARQ) are widely used in terrestrial wireless communications. However, the long propagation delay caused by the slow speed of acoustic waves (approximately 1500 m/s) in water makes the standard ARQ scheme very inefficient in UWA communications. Thus, there have been many modified ARQ schemes proposed for UWA communications, such as the go-back N scheme, the stop-and-wait (S&W) scheme and the selective repeat (SR) scheme [2,3]. These modified ARQ schemes improve the efficiency compared to standard ARQ, but not well enough. This is because the sender always remains idle when it is waiting for the receiver’s acknowledgement (ACK) messages in these schemes. As a result, they are still quite inefficient when the propagation time is long enough. In [4,5], a juggling-like ARQ scheme (J-ARQ) is proposed to further improve the channel utilization, where the sender reserves a fixed gap for the ACK reception after each transmission. In this way, the sender still could transmit the data when it is awaiting the ACK. However, the fixed transmission and reception duration are used in the J-ARQ scheme to avoid conflict, which will lead to a decrease in transmission efficiency when the transmitter does not have an infinite amount of data waiting to be transmitted [5].
Compared to retransmission, the redundancy strategy alternatively seeks an attempt to improve the quality of each transmission. A common redundancy technique is forward error control (FEC), which can lower the bit error rate (BER) at the cost of reducing the data rate. For example, bit-level channel coding schemes, such as low-density parity codes [6] and convolutional codes [7], have been widely used in the physical layer of UWA communications. In contrast, in this paper we investigate another FEC technique, which is performed on the packet level and designed for the link layer [8,9,10,11,12,13,14,15,16,17]. Its mechanism is that the sender sends multiple coded packets which are encoded by original packets. The receiver can recover the original packets correctly if there are enough coded packets successfully received. Rateless codes [18,19,20], as a good packet-coding technology, have been used in UWA communications. These codes are so named since the sender can generate unlimited coded packets to ensure that the original packets can be fully recovered. In [12], a kind of rateless code, Raptor code, is used in UWA communications. The coding rate is optimized to maximize the throughput over UWA channels. In [13], a cross-layer FEC scheme which combines both the physical layer FEC and the packet layer FER is extended based on [12].
So far, there have been many works which combine the redundancy strategy and retransmission strategy based on the rateless codes. In [5], rateless code is used in the J-ARQ scheme. In [10], an HARQ scheme is proposed, named segmented data reliable transport (SDRT), to achieve reliable data transmission in UWA sensor networks by employing Tornado codes. In this scheme, the sender keeps sending the packets until it receives an ACK. In order to reduce the energy consumption for unnecessary transmission, a window control mechanism is further proposed to estimate the expected number of packets actually needed. With the information, the sender just transmits a pre-estimated number of encoder packets (i.e., the window size), and then slows down the transmission to wait for an ACK. In [11], an underwater hybrid ARQ (UW-HARQ) is proposed which uses an NACK to feed back the receive state. Random linear packet coding (RLPC) is used as a rateless code in [14,15,16]. In [14], the optimal number of coded packets is investigated for a half-duplex link to minimize the time (or energy) required for the transmission of a group of packets. In [15], joint power and rate control for an acoustic link employing random linear packet coding is considered to achieve a prespecified outage/reliability criterion. To this end, ref. [16] extends the work in [15] by grouped packet coding and increases its throughput efficiency based on the S&W ARQ scheme. The sender transmits a super-group packets and waits for an ACK. This could improve efficiency by packing multiple packets together.
In this paper, we propose two adaptive packet-coding schemes to achieve reliable UWA communications. We consider the time variations of UWA channels, which are ignored in most works. Since we focus on the link level performance, we model the channel state by a finite-state Markov chain (FSMC) [21]. Some works use FSMC to model the UWA channels [22,23,24,25,26,27,28]. In [22,23], Preisig used a two-state FSMC channel model with known transition probabilities to evaluate energy-efficient schedulers for underwater acoustic point-to-point links based on experimental data. As compared to existing works, our main contributors are summarized as follows:
(1)
We first propose an S&W ARQ scheme with RLPC (RLPC-ARQ). In the RLPC-ARQ scheme, the number of successfully transmitted packets in each transmission and the channel state information (CSI) are fed back to the sender in the ACK messages. The sender dynamically adjusts the coding rate based on the ACK messages to fit the time variations of UWA channels by choosing the optimal number of packets in each transmission. Meanwhile, considering the long propagation delay and the error-prone characteristic of UWA communications, we set a maximum number of retransmissions to avoid infinite retransmission. The problem is formulated as a finite horizon optimization problem. A dynamic programming (DP) algorithm is proposed to obtain the optimal number of packets in each transmission.
(2)
We also propose a modified juggling-like ARQ scheme for the RLPC system (RLPC-J-ARQ) to deal with the long propagation of UWA channels. In the RLPC-J-ARQ scheme, two data blocks are alternately transmitted at the sender; there is no need to stop and wait for the ACK. Different from the J-ARQ scheme in [5] for which the duration of each transmission is fixed, the RLPC-J-ARQ scheme adopts adjustable transmission duration by exploiting the characteristics of the rateless code. The rateless code is only used when there is not enough data to transmit to avoid idleness. In addition, we also consider the effect of channel variation. In this case, the standard DP algorithm does not work. Thus, we also propose a two-step DP algorithm to find out the optimal number of packets in each transmission.
The rest of this paper is organized as follows. Section 2 presents the basic system model. We formulate the optimization problem in Section 3. We propose the optimization solution based on the principle of DP in Section 4. Section 5 proposes the RLPC-J-ARQ scheme. Section 6 proposes a two-step DP approach to find out the optimal solution of the RLPC-J-ARQ scheme. Section 7 provides numerical results for the proposed solutions and Section 8 concludes the paper.

2. System Model

We consider a point-to-point system operating in a half-duplex manner without interference from other nodes. The sender collects W s information packets. Each packet has N b symbols and N b is a constant number during the transmission. These information packets are first divided into multiple blocks, each containing W packets. In this paper, we only consider the FEC technique in the packet level. The W original packets in each block are then encoded based on the RLPC [14,15,16] to generate sufficient coded packets. We assume that the data is delay constrained, which means the receiver should receive the data before the deadline. Otherwise, the data becomes useless.
We first consider an S&W ARQ scheme with RLPC, which is illustrated in Figure 1. The coded packets from different blocks are transmitted in sequence. Let N i ( k ) denotes the number of transmitted packets for the k-th block in the i-th transmission. Let ρ k , i ( 1 ) and ρ k , i ( 2 ) denote the beginning and ending time instants of the k-th block in the i-th transmission. Hence, the relationship between them is
ρ k , i ( 2 ) = ρ k , i ( 1 ) + T p N i ( k )
where T p = N b T s is the time duration of a coded packet, T s is the symbol duration.
Let T d denote the propagation delay. Then, the transmitted signal is received after T d duration, T d = d / c , where d is the distance between the transceiver pair, and c is the sound speed in water. Let σ k , i ( 1 ) and σ k , i ( 2 ) denote the beginning and ending time instants of the received signal at the receiver. Then, we have
σ k , i ( 1 ) = ρ k , i ( 1 ) + T d σ k , i ( 2 ) = σ k , i ( 1 ) + T p N i ( k )
When the receiver completes the receiving process, there is a guard interval, T g , for the receiver node to process the data and change the mode. Next, the receiver responds with an ACK. According to the characteristic of RLPC, the receiver can recover the original information if there are enough coded packets successfully received. Thus, we do not need to retransmit the unsuccessful packets in the following transmission. In the following transmission, the sender will send enough other coded packets. It is noted that the other coded packets are also generated from the same information packets. There is the main different from the traditional ARQ scheme. Hence, the ACK contains the number of successfully received packets s i ( k ) in the current transmission and some pilot symbols used for channel estimation at the sender.
The BER e depends on the channel coding rate, the modulation order, the channel state, and the codeword length. In this paper, these parameters are fixed except the channel state. Thus, the packet error probability (PEP) P c is only connected with the channel state.
As mentioned above, we focus on the link level performance, so we model the channel state by a finite-state Markov chain (FSMC) [22,24,25]. Assume the channel state is constant during the i-th transmission. Let h i ( k ) denote the CSI when the k-th block is transmitted at the i-th transmission, which is quantized into L levels, i.e., h i ( k ) { δ 1 , , δ L } . The state transition probabilities P h ( h i ( k ) | h i 1 ( k ) ) are assumed known.
Let P s ( s i ( k ) , h i ( k ) , N i ( k ) ) denote the probability that s i ( k ) coded packets have been successfully received when N i ( k ) coded packets are transmitted under the channel state h i ( k ) . Then,
P s ( s i ( k ) , h i ( k ) , N i ( k ) ) = s i ( k ) N i ( k ) ( 1 P c ) s i ( k ) P c ( N i ( k ) s i ( k ) )
Let σ k , i ( 3 ) and σ k , i ( 4 ) denote the beginning and ending time points for the ACK at the receiver. Then, the relationship is given as
σ k , i ( 3 ) = σ k , i ( 2 ) + T g σ k , i ( 4 ) = σ k , i ( 3 ) + T ACK
where T ACK is the time duration of ACK.
The sender will receive the corresponding ACK after T d time duration. Let ρ k , i ( 3 ) and ρ k , i ( 4 ) denote the beginning and ending time points for the received ACK at the sender. Then,
ρ k , i ( 3 ) = σ k , i ( 3 ) + T d ρ k , i ( 4 ) = ρ k , i ( 3 ) + T ACK
The sender could estimate the CSI based on the pilot symbols in the ACK and decode the feedback messages s i ( k ) . We use a low rate channel code for ACK messages to improve the reliability of feedback messages. To reduce the complexity of the problem, we assume the feedback messages are error-free.
There is also a guard interval for the sender to process the ACK and change the mode. In this way, the i-th transmission for the k-th block is done. Hence, the total time duration for the i-th transmission is given as
T i ( k ) = T p N i k + 2 T d + 2 T g + T ACK
= T p N i k + T τ .
where T τ = 2 T d + 2 T g + T ACK is fixed for each transmission.
If the receiver has received enough coded packets to recover the original information from the k-th block, the sender will send the coded packets from another block in the next transmission. Otherwise, the sender determines the number of transmitted coded packets in the ( i + 1 ) -th transmission based on the feedback ACK. Thus, the data rate of packet coding is not constant during the transmission. The sender dynamically adjusts the rate based on the current transmission result to adapt to the time variation of UWA channels.

3. Problem Formulation

Assume that the receiver has successfully demodulated q i 1 ( k ) packets from the k-th block in the previous i 1 transmissions according to the feedback messages. Then, q i ( k ) is given by
q i ( k ) = j = 1 i s j ( k ) = q i 1 ( k ) + s i ( k )
According to the characteristics of RLPC, the information packets can be recovered correctly if [15,16]
q i ( k ) W
Then, according to (8), we have
s i ( k ) W q i 1 ( k )
Let u i ( k ) = W q i 1 ( k ) denote the minimum number of packets needed to guarantee correct decoding. Thus, the probability of W information packets can be received correctly after the i-th transmission is given by
P S ( i ) = s i ( k ) = u i ( k ) N i ( k ) P s ( s i ( k ) , h i ( k ) , N i ( k ) )
It is obvious that the number of transmitted packets during the i-th transmission, N i ( k ) , cannot exceed a maximal level, denoted by B i ( k ) . Then,
0 N i ( k ) B i ( k )
Our objective is to minimize the total transmission time of data blocks for delay-constrained applications by adjusting the packet-coding rate. Since the packet error is a stochastic process, there are certainly cases where the information cannot be received correctly after many transmissions, especially for error-prone UWA channels. However, considering the significant propagation delay of UWA channels, too many retransmissions is unacceptable in a practical communications system. Thus, we should set a maximal number of retransmissions, M.
To make sure that W information packets can be received correctly after M transmissions, we add a penalty term for the M-th transmission. In this way, the transmission time of the M-th transmission is given by
T M ( k ) = T p N M ( k ) + T τ + π ( q M ( k ) )
where
π ( q M ( k ) ) = 0 , q M ( k ) W C , q M ( k ) < W
C is a large value. This setting implies that if the information cannot be recovered correctly after M transmissions, it will incur a large cost.
Then, the objective function is given by
J T = min N i ( k ) i = 1 M γ i T i ( k )
where γ is discount factor. Consider the cost of storage space and number overhead, γ > 1 .
Naturally, there is a trade-off between the coding rate and the transmission time. Generally speaking, sending more coded packets will improve the reliability of each transmission. Moreover, it will reduce the probability of retransmission and then reduce the total transmission time. However, if we send too many packets in each transmission, the sending time also increases, which also decreases efficiency. Thus, there is an optimal coding rate for each transmission to minimize the total transmission time.

4. Optimal Solution

In our problem, the state of the i-th transmission is dependent on the result of ( i 1 ) -th transmission. Meanwhile, since packet error is a stochastic process, this problem can be seen as a sequential decision-making problem. This problem can be solved by the finite-horizon DP [24,25,29] approach.
Let c i ( k ) = ( h i 1 ( k ) , q i 1 ( k ) ) denote the state of the system at the i-th transmission for the k-th block, where q i 1 ( k ) denotes the number of coded packets successfully received in the all ( i 1 ) transmissions. h i 1 ( k ) is the feedback channel state of the ( i 1 ) -th transmission for the k-th block. Let U ( c i ( k ) ) denote the feasible set of the action N i ( k ) given the current state c i ( k ) . Then,
U ( c i ( k ) ) = [ 0 , B i ( k ) ]
In this case, the upper limit of N i ( k ) is constant. Thus, we let B i ( k ) = Q .
The probability that the system state c i ( k ) will transfer to state c i + 1 ( k ) when action N i ( k ) is taken is given as
P ( c i + 1 ( k ) | c i ( k ) , N i ( k ) ) = P ( h i ( k ) , q i ( k ) | h i 1 ( k ) , q i 1 ( k ) , N i ( k ) ) = P ( q i ( k ) | h i ( k ) , q i 1 ( k ) , N i ( k ) ) P ( h i ( k ) | h i 1 ( k ) )
According to (8),
P ( q i ( k ) | h i ( k ) , q i 1 ( k ) , N i ( k ) ) = P s ( s i ( k ) , h i ( k ) , N i ( k ) ) , q i ( k ) q i 1 ( k ) 0 , q i ( k ) < q i 1 ( k )
The expected cost incurred from the M-th transmission is given by
J M ( h M 1 ( k ) , q M 1 ( k ) ) = min 0 N M ( k ) Q γ M T M ( k ) + E π ( q M ( k ) ) | ( h M 1 ( k ) , q M 1 ( k ) )
= min 0 N M ( k ) Q γ M T p N M ( k ) + γ M T τ + C s M ( k ) = 0 u M ( k ) l = 1 L P s ( s M ( k ) , h M ( k ) , N M ( k ) ) P ( h M ( k ) = δ l | h M 1 ( k ) )
The first term of (19) is the cost of the M-th transmission, the second term is the expectation of penalty term due to the incomplete transfer after M transmissions. It depends on the result of the M-th transmission according to (14).
Based on the Bellman equation [29], the optimal solution can be obtained by recursively computing J M ( c M ( k ) ) , J M 1 ( c M 1 ( k ) ) , …, J 1 ( c 1 ( k ) ) . The expected cost incurred from the i-th transmission to termination is given by
J i ( h i 1 ( k ) , q i 1 ( k ) ) = min 0 N i ( k ) Q γ i T i ( k ) + γ E J i + 1 ( h i ( k ) , i , q i ( k ) ) | q i 1 ( k ) , h i 1 ( k ) = min 0 N i ( k ) Q γ i ( T p N i ( k ) + T τ ) + γ s i ( k ) = 0 N i ( k ) l = 1 L P s ( s i ( k ) , h i ( k ) , N i ( k ) ) P ( h i ( k ) = δ l | h i 1 ( k ) ) J i + 1 ( h i ( k ) , q i ( k ) )
The first term in (21) represents the expected cost of current transmission. The second term in (21) is the expected future cost accumulated from the ( i + 1 ) -th transmission to the M-th transmission.
The DP approach includes two steps. In step 1, the sender calculates the (21) to find the optimal N i ( k ) * for each system state c i ( k ) and records it as a lookup table. In step 2, the sender chooses the optimal N i ( k ) * of the current state based on the lookup table.

5. RLPC-J-ARQ Scheme

In the RLPC-ARQ scheme, the sender idles for a round-trip time while waiting for the ACK. This is quite inefficient for UWA communications, which have a long propagation delay. Ref. [5] proposed the J-ARQ to solve this problem. However, the block size of J-ARQ is fixed, which leads to the analysis in [5]; it cannot be directly applied in this problem. Essentially, the J-ARQ scheme uses the time that the feedback information is transmitted in the channel to send the following data blocks. According to this idea, we propose a RLPC-J-ARQ in our problem.
Figure 2 illustrates the transmission style of the RLPC-J-ARQ scheme. We only consider that two blocks are transmitted simultaneously. The sender leaves a gap after sending N i ( k ) coded packets for receiving the ACK messages. Similarly, a guard interval is reserved for the node to change the mode. Next, the sender sends N i ( k + 1 ) data packets for the (k + 1)-th block. In this way, the transmitter could send more data blocks than the RLPC-ARQ scheme.
In Figure 2, ρ k + 1 , i ( j ) and σ k + 1 , i ( j ) represent the time points for the sender and receiver with the ( k + 1 ) -th block, respectively. The relationship between the time instants ρ k + 1 , i ( j ) and σ k + 1 , i ( j ) are similar to those of the k-th block. According to Figure 2, there are some constraints about the time instants to avoid the collision. At the sender, we have
ρ k + 1 , i ( 2 ) ρ k , i ( 3 ) T g ρ k , i + 1 ( 2 ) ρ k + 1 , i ( 3 ) T g ρ k + 1 , i + 1 ( 2 ) ρ k , i + 1 ( 3 ) T g ρ k , i + 2 ( 2 ) ρ k + 1 , i + 1 ( 3 ) T g
At the receiver, we have
σ k , i ( 4 ) σ k + 1 , i ( 1 ) T g σ k + 1 , i ( 4 ) σ k , i + 1 ( 1 ) T g σ k , i + 1 ( 4 ) σ k + 1 , i + 1 ( 1 ) T g σ k + 1 , i + 1 ( 4 ) σ k , i + 2 ( 1 ) T g
According to (1), (2), (4) and (5), the relationship between ρ k , i ( j ) and ρ k , i + 1 ( j ) is given as
ρ k , i + 1 ( 1 ) = ρ k , i ( 1 ) + T τ + T p N i ( k ) ρ k , i + 1 ( 2 ) = ρ k , i ( 2 ) + T τ + T p N i + 1 ( k ) ρ k , i + 1 ( 3 ) = ρ k , i ( 3 ) + T τ + T p N i + 1 ( k ) ρ k , i + 1 ( 4 ) = ρ k , i ( 4 ) + T τ + T p N i + 1 ( k )
At the receiver, there is the same relationship σ k , i ( j ) and σ k , i + 1 ( j ) . Similarly, there is the same relationship for the ( k + 1 ) -th block.
Thus, according to the relationship in (24), (22) can be rewritten as
ρ k + 1 , i ( 2 ) ρ k , i ( 3 ) T g ρ k , i + 1 ( 2 ) ρ k + 1 , i ( 3 ) T g ρ k + 1 , i ( 2 ) + N i + 1 ( k + 1 ) ρ k , i ( 3 ) T g + T p N i + 1 ( k ) ρ k , i + 1 ( 2 ) + N i + 2 ( k ) ρ k + 1 , i ( 3 ) T g + T p N i + 1 ( k + 1 )
After further straightforward deduction, we have
ρ k + 1 , i ( 2 ) ρ k , i ( 3 ) T g ρ k , i + 1 ( 2 ) ρ k + 1 , i ( 3 ) T g N i + 1 ( k + 1 ) N i + 1 ( k ) N i + 2 ( k ) N i + 1 ( k + 1 )
Similar results can be obtained for the receiver, (23) can be rewritten as
σ k , i ( 4 ) σ k + 1 , i ( 1 ) T g σ k + 1 , i ( 4 ) σ k , i + 1 ( 1 ) T g N i + 1 ( k ) N i ( k + 1 ) N i + 1 ( k + 1 ) N i + 1 ( k )
For the first transmission, i = 1 , the constraints at the sender are given by
ρ k + 1 , 1 ( 2 ) ρ k , 1 ( 3 ) T g ρ k , 1 ( 2 ) ρ k + 1 , 1 ( 3 ) T g σ k , 1 ( 4 ) σ k + 1 , 1 ( 1 ) T g σ k + 1 , 1 ( 4 ) σ k + 1 , 2 ( 1 ) T g
Let ρ k , 1 ( 1 ) = 0 ; according to (28), the constraints about the initial time instant of the ( k + 1 ) -th block are given as
ρ k + 1 , 1 ( 1 ) 2 T d + T p N 1 ( k ) T p N 1 ( k + 1 ) ρ k + 1 , 1 ( 1 ) T p N 1 ( k ) + 2 T g + T ACK
We set ρ k + 1 , 1 ( 1 ) = T p N 1 ( k ) + 2 T g + T ACK . Namely, the sender sends the packets from the ( k + 1 ) -th block immediately once it is allowed to send. Meanwhile, the number of packets from the ( k + 1 ) -th block is also restricted,
N 1 ( k + 1 ) ( 2 T d 2 T g T ACK ) / T p
To sum up, the constraints in our problem are as follows
N 1 ( k + 1 ) ( 2 T d 2 T g T ACK ) / T p N i + 1 ( k ) N i ( k + 1 ) N i + 1 ( k + 1 ) N i + 1 ( k ) 1 i M
According to (31), the number of transmitted packets for the ( k + 1 ) -th block at the i-th transmission does not exceed that of for the k-th block at the i-th transmission. The number of transmitted packets for the k-th block at the ( i + 1 ) -th transmission doe not exceed that of for the ( k + 1 ) -th block at the i-th transmission. If N i ( k ) = 0 or N i ( k + 1 ) = 0 , of course, there are no constraints about the N i ( k + 1 ) or N i + 1 ( k ) . Thus, the maximum number of transmitted packets in the ( i + 1 ) -th transmission are given by
B i + 1 ( k ) = Q , if N i ( k + 1 ) = 0 N i ( k + 1 ) , if N i ( k + 1 ) > 0
B i + 1 ( k + 1 ) = Q , if N i + 1 ( k ) = 0 N i + 1 ( k ) , if N i + 1 ( k ) > 0
There is a difference from the RLPC-ARQ scheme. In the RLPC-ARQ scheme, the sender can adjust the number of transmitted packets freely based on the feedback ACK. However, in this case, the number of transmitted packets in each transmission is monotone decreasing.
The transmission time duration for the i-th transmission is also different. For the first transmission, the transmission time duration is given by
T 1 = ρ k + 1 , 2 ( 1 ) = T p N k , 1 + 2 T g + T ACK + T p N k + 1 , 1 + T τ
For the i-th ( 1 < i < M ) transmission, if N i ( k + 1 ) > 0 , according to Figure 2, the transmission time duration for the i-th transmission is given by
T i = ρ k + 1 , i + 1 ( 1 ) ρ k + 1 , i ( 1 ) = T p N k + 1 , i + T τ
In this case, it seems that the transmission time duration for the i-th transmission has nothing to do with the number of transmitted packets from the k-th block. However, N i ( k ) still affects the transmission time duration according to the constraints in (31).
If N k , i > 0 and N k + 1 , i = 0 , the transmission time duration should be
T i = ρ k , i + 1 ( 1 ) ρ k + 1 , i ( 1 )
However, it is difficult to calculate ρ k , i + 1 ( 1 ) ρ k + 1 , i ( 1 ) since it connects with the number of transmitted packets in the first ( i 1 ) transmissions. Thus, we let ρ k , i ( 2 ) + 2 T g + T ACK approximate ρ k + 1 , i ( 1 ) ,
T i ρ k , i + 1 ( 1 ) ρ k , i ( 2 ) 2 T g T ACK = 2 T d
In the same way, for the M-th transmission, we also set the penalty term, π ( q M ( k ) ) and π ( q M ( k + 1 ) ) , where π ( q M ( k ) ) is given in (14).
The objective function is also given by
J = min N i ( k ) , N i ( k + 1 ) i = 1 M γ i T i
This problem is different from the problem in (15). There are two parameters that need to be optimized for each transmission. At the begin of the i-th transmission for the k-th block, the sender does not receive the feedback message of the ( i 1 ) -th transmission for the ( k + 1 ) -th block. Namely, the sender only knows part of the transmission result of the ( i 1 ) -th transmission. Apparently, The standard DP approach is not suitable for this case. We propose a two-step DP approach to solve this problem.

6. Proposed Two-Step DP Approach

In each transmission, we separately define the system state for the k-th block and the ( k + 1 ) -th block. For the k-th block, the system state is c i ( k ) = ( q i 1 ( k ) , h i 1 ( k ) , q i 2 ( k + 1 ) , h i 2 ( k + 1 ) , B i ( k ) ) , where B i ( k ) is the maximum number of transmitted packets for the k-th block. For the i-th transmission of the ( k + 1 ) -th block, the sender already knows the transmission result of the ( i 1 ) -th transmission. Thus, the system state is c i ( k + 1 ) = ( q i 1 ( k ) , h i 1 ( k ) , q i 1 ( k + 1 ) , h i 1 ( k + 1 ) , B i ( k + 1 ) ) .
As analyzed above, the problem for the RLPC-J-ARQ scheme is also a sequential decision-making problem. Thus, it could also be solved based on the DP approach. The main difference is that the B i ( k ) and B i ( k + 1 ) depend on the N i 1 ( k + 1 ) and N i ( k ) , as given in (32) and (33), respectively. In other words, the state of the i-th transmission is not only related to the ( i 1 ) -th transmission, but also to N i ( k ) .
Based on the idea of DP, we propose a two-step DP approach which computes the cost in two steps for each transmission. The proposed method still adopts recursive computing based on the Bellman equation. It is similar to the RLPC-ARQ scheme; we first calculate the cost of the M-th transmission, the i-th transmission and finally the first transmission. In each transmission, we first calculate the cost of the ( k + 1 ) -th block. Then, the overall cost of the current transmission is calculated.

6.1. The Cost of the M-th Transmission

At the M-th transmissions of the ( k + 1 ) -th block, the system state c M ( k + 1 ) = ( q M 1 ( k ) , h M 1 ( k ) , q M 1 ( k + 1 ) , h M 1 ( k + 1 ) , B M ( k + 1 ) ) . The expected cost of the ( k + 1 ) -th block at the M-th transmission is similar to (19), which can be computed as
J M ( c M ( k + 1 ) ) = min 0 N M ( k + 1 ) B M ( k + 1 ) γ M T M ( k + 1 ) + E π ( q M ( k + 1 ) ) | c M ( k + 1 )
where
T M ( k + 1 ) = 0 , if q M 1 ( k + 1 ) W T p N M k + 1 + T τ , if q M 1 ( k + 1 ) < W
is the transmission time duration for the ( k + 1 ) -th block. The expectation of penalty is given by
E π ( q M ( k + 1 ) ) | c M ( k + 1 ) = E π ( q M ( k + 1 ) ) | ( q M 1 ( k + 1 ) , h M 1 ( k + 1 ) ) = C s M ( k + 1 ) = 0 u M ( k + 1 ) l = 1 L P s ( s M ( k + 1 ) , h M ( k + 1 ) , N M ( k + 1 ) ) P ( h M ( k + 1 ) = δ l | h M 1 ( k + 1 ) )
Next, we consider the expected cost for the overall M-th transmission, J M ( c M ( k ) ) . At this point, the sender knows the system state c M ( k ) = ( q M 1 ( k ) , h M 1 ( k ) , q M 2 ( k + 1 ) , h M 2 ( k + 1 ) , B M ( k ) ) .
It is clear that the calculation of J M ( c M ( k ) ) highly depends on q M 1 ( k ) and q M 2 ( k + 1 ) . The state is different if q M 1 ( k ) and q M 2 ( k + 1 ) are larger or less than M. Thus, the calculation of J M ( c M ( k ) ) is different with different q M 1 ( k ) and q M 2 ( k + 1 ) . So, the analysis of different situations is as follows.
If q M 1 ( k ) W and q M 2 ( k + 1 ) W , it is obvious that
J M ( c M ( k ) ) = 0
If q M 1 ( k ) W and q M 2 ( k + 1 ) < W , the transmission of the k-th block is finished. Then, N M ( k ) = 0 . It degenerates into the problem in the RLPC-ARQ scheme. At this time, only the ( k + 1 ) -th block may need to be transmitted. It relies on the transmission result of the ( M 1 ) -th transmission for the ( k + 1 ) -th block. According to (32), N M 1 ( k + 1 ) = B M ( k ) . Thus,
J M ( c M ( k ) ) = min 0 N M ( k + 1 ) Q E [ J M ( h M 1 ( k + 1 ) , q M 1 ( k + 1 ) ) | ( h M 2 ( k + 1 ) , q M 2 ( k + 1 ) , B M ( k ) ) ] = s M 1 ( k + 1 ) = 0 B M ( k ) l = 0 L J M ( h M 1 ( k + 1 ) , q M 1 ( k + 1 ) ) P s ( s M 1 ( k + 1 ) , h M 1 ( k + 1 ) , B M ( k ) ) P ( h M 1 ( k + 1 ) = δ l | h M 2 ( k + 1 ) )
Note that q M 1 ( k + 1 ) = q M 2 ( k + 1 ) + s M 1 ( k + 1 ) .
If q M 1 ( k ) < W and q M 2 ( k + 1 ) W , then B M ( k ) = Q . This problem also degenerates into the former problem.
J M ( c M ( k ) ) = min 0 N M ( k + 1 ) Q E [ T M ( k ) | c M ( k ) ] + E π ( q M ( k ) ) = J M ( h M 1 ( k ) , q M 1 ( k ) )
If q M 1 ( k ) < W and q M 2 ( k + 1 ) < W , then the expected cost for the overall M-th transmission is given by
J M ( c M ( k ) ) = min 0 N M ( k ) B M ( k ) γ M E [ T M ( k ) | c M ( k ) ] + E π ( q M ( k ) ) | c M ( k ) + E [ J M ( c M ( k + 1 ) ) | c M ( k ) ]
The first and second term in (45) are the cost from the k-th block; the third term is from the ( k + 1 ) -th block.
As analyzed in (35), if q M 1 ( k + 1 ) < W , the number of N M ( k ) does not affect the cost. Thus, in this case,
E [ T M ( k ) | c M ( k ) ] = 0
If q M 1 ( k + 1 ) W , then N M ( k + 1 ) = 0 . According to (37), the expected additional transmission time duration for the M-th transmission of the k-th block is 2 T d . The corresponding probability is given by
P ( q M 1 ( k + 1 ) W ) = s M ( k + 1 ) = u M 1 ( k + 1 ) B M ( k ) P s ( s M 1 ( k + 1 ) , h M 1 ( k + 1 ) , B M ( k ) )
To summarize, if q M 1 ( k ) < W and q M 2 ( k + 1 ) < W , the first term of (45) is
E [ T M ( k ) | c M ( k ) ] = E [ T M ( k ) | ( q M 2 ( k + 1 ) , h M 2 ( k + 1 ) , B M ( k ) ) ] = 2 T d s M ( k + 1 ) = u M 1 ( k + 1 ) B M ( k ) l = 1 L P s ( s M 1 ( k + 1 ) , h M 1 ( k + 1 ) , B M ( k ) ) P ( h M 1 ( k + 1 ) = δ l | h M 2 ( k + 1 ) )
The second term of (45) is similar to (41). The third term of (45) is
E [ J M ( c M ( k + 1 ) ) | c M ( k ) ] = E [ J M ( c M ( k + 1 ) ) | ( q M 2 ( k + 1 ) , h M 2 ( k + 1 ) , B M ( k ) ) ] = s M 1 ( k + 1 ) = 0 B M ( k ) l = 0 L J M ( c M ( k + 1 ) ) P s ( s M 1 ( k + 1 ) , h M 1 ( k + 1 ) , B M ( k ) ) P ( h M 1 ( k + 1 ) = δ l | h M 2 ( k + 1 ) )
In summary, the cost of the M-th transmission is given as
J M ( c M ( k ) ) = ( 42 ) , if q i 1 ( k ) W , q M 2 ( k + 1 ) W ( 43 ) , if q M 1 ( k ) W , q M 2 ( k + 1 ) < W ( 44 ) , if q M 1 ( k ) < W , q M 2 ( k + 1 ) W ( 45 ) , if q M 1 ( k ) < W , q M 2 ( k + 1 ) < W

6.2. The Cost of the i-th Transmission

For the i-th transmission, the system state for the ( k + 1 ) -th block is c i ( k + 1 ) = ( q i 1 ( k ) , h i 1 ( k ) , q i 1 ( k + 1 ) , h i 1 ( k ) , B i ( k + 1 ) ) . The expected cost incurred from the i-th transmission of the ( k + 1 ) -th block to termination is given as Equation (51).
J i ( c i ( k + 1 ) ) = 0 , if q i 1 ( k ) W , q i 1 ( k + 1 ) W J i ( h i 1 ( k + 1 ) , q i 1 ( k + 1 ) ) , if q i 1 ( k ) W , q i 1 ( k + 1 ) < W E J i + 1 ( h i ( k ) , q i ( k ) ) | ( h i 1 ( k ) , q i 1 ( k ) ) , if q i 1 ( k ) < W , q i 1 ( k + 1 ) W min N i ( k + 1 ) γ i ( T i ( k + 1 ) ) + γ E J i + 1 ( c i + 1 ( k ) ) | c i ( k + 1 ) if q i 1 ( k ) < W , q i 1 ( k + 1 ) < W
The conditional expectation in (51) is given as
E J i + 1 ( c i + 1 ( k ) ) | c i ( k + 1 ) = s i ( k ) = 0 N i ( k ) l = 0 L J i + 1 ( c i + 1 ( k ) ) P s ( s i ( k ) , h i ( k ) , N i ( k ) ) P ( h i ( k ) = δ l | h i 1 ( k ) )
It is interesting that (52) does not seem to have much to do with N i ( k + 1 ) . The transition probability mainly depends on the channel state h i 1 ( k ) and the transmitted packets of N i ( k ) . However, N i ( k + 1 ) affects J i + 1 ( c i + 1 ( k ) ) by limiting the range of N i + 1 ( k ) in (52).
For the k-th block, the system state is c i ( k ) = ( q i 1 ( k ) , h i 1 ( k ) , q i 2 ( k + 1 ) , h i 2 ( k ) , B i ( k ) ) . The expected cost incurred from the i-th transmission to termination is given by (53). Similarly, we have
J i ( c i ( k ) ) = 0 , if q i 1 ( k ) W , q i 2 ( k + 1 ) W J i ( h i 1 ( k ) , q i 1 ( k ) ) , if q i 1 ( k ) < W , q i 2 ( k + 1 ) W E J i ( h i 1 ( k + 1 ) , q i 1 ( k + 1 ) ) | ( h i 2 ( k + 1 ) , q i 2 ( k + 1 ) ) , if q i 1 ( k ) W , q i 2 ( k + 1 ) < W min N i ( k ) γ i E T i ( k ) | c i ( k + 1 ) + E J i ( c i ( k ) ) | c i ( k + 1 ) if q i 1 ( k ) < W , q i 2 ( k + 1 ) < W
E J i ( c i ( k + 1 ) ) | c i ( k ) = s i 1 ( k + 1 ) = 0 N i 1 ( k + 1 ) l = 0 L J i ( c i ( k + 1 ) ) P s ( s i 1 ( k + 1 ) , h i 1 ( k + 1 ) , N i 1 ( k + 1 ) ) P ( h i 1 ( k + 1 ) = δ l | h i 2 ( k + 1 ) )
N i ( k ) also has no influence on transfer probability and affects J i ( c i ( k + 1 ) ) by limiting the range of N i ( k + 1 ) .

6.3. The Cost of the First Transmission

For i = 1 , c 1 ( k + 1 ) = ( q 0 ( k ) , h 0 ( k ) , q 0 ( k + 1 ) , h 0 ( k + 1 ) , B 1 ( k + 1 ) ) . Note that q 0 ( k ) = q 0 ( k + 1 ) = 0 and the transmitter have no feedback information about the channels. Thus, we use the steady-state probability to present the probability. Then, we have
J 1 ( c 1 ( k + 1 ) ) = min N 1 ( k + 1 ) γ ( T 1 ( k + 1 ) ) + E J 2 ( c 2 ( k ) ) | c 1 ( k + 1 )
where
E J 2 ( c 2 ( k ) ) | c 1 ( k + 1 ) = s 1 ( k ) = 0 N 1 ( k ) l = 0 L J 2 ( c 2 ( k ) ) P s ( s 1 ( k ) , h 1 ( k ) , N 1 ( k ) ) P π ( h 1 ( k ) = δ l )
Similarly, c 1 ( k ) = ( q 0 ( k ) , h 0 ( k ) , q 1 ( k + 1 ) , h 1 ( k ) , B 1 ( k ) ) ; the cost for the overall M transmissions is given as
J 1 ( c 1 ( k ) ) = min N m ( k ) γ ( T 1 ( k ) ) + E J 1 ( c 1 ( k + 1 ) ) | c 1 ( k ) = min N m ( k ) γ ( T p N 1 ( k + 1 ) + 2 T g + T ACK ) + E J 1 ( c 1 ( k + 1 ) ) | c 1 ( k )
where
E J 1 ( c 1 ( k + 1 ) ) | c 1 ( k ) = l = 0 L J 2 ( 0 , h 1 ( k ) , 0 , h 0 ( k + 1 ) , N 1 ( k ) ) P π ( h 1 ( k + 1 ) = δ l )
The two-step DP approach also first finds the optimal solution for each state and records it into a table. Then, the sender chooses the optimal N i ( k ) and N i ( k + 1 ) according to system state. The details of the proposed optimal two-step DP policy are summarized in Algorithm 1.
Algorithm 1: The proposed two-step DP algorithm.
1:
Let c M ( k + 1 ) = ( q M 1 ( k ) , h M 1 ( k ) , q M 1 ( k + 1 ) , h M 1 ( k ) , B M ( k + 1 ) ) .
2:
Calculate J M ( c M ( k + 1 ) ) , q M 1 ( k ) , h M 1 ( k ) , q M 1 ( k + 1 ) , h M 1 ( k + 1 ) , B M ( k + 1 ) , based on (39) and save in the table.
3:
Let c M ( k ) = ( q M 1 ( k ) , h M 1 ( k ) , q M 2 ( k + 1 ) , h M 2 ( k ) , B M ( k ) ) .
4:
Calculate J M ( c M ( k ) ) , q M 1 ( k ) , h M 1 ( k ) , q M 2 ( k + 1 ) , h M 2 ( k + 1 ) , B M ( k ) , based on (50) and save in the table.
5:
i = M 1 .
6:
while i > 0
7:
Let c i ( k + 1 ) = ( q i 1 ( k ) , h i 1 ( k ) , q i 1 ( k + 1 ) , h i 1 ( k ) , B i ( k + 1 ) ) .
8:
Calculate J i ( c i ( k + 1 ) ) , q i 1 ( k ) , h i 1 ( k ) , q i 1 ( k + 1 ) , h i 1 ( k ) , B i ( k + 1 ) based on (51) and save in the table
9:
Let c i ( k ) = ( q i 1 ( k ) , h i 1 ( k ) , q i 2 ( k + 1 ) , h i 2 ( k ) , B i ( k ) ) .
10:
Calculate J i ( c i ( k ) ) , q i 1 ( k ) , h i 1 ( k ) , q i 2 ( k + 1 ) , h i 2 ( k ) , B i ( k ) based on (53) and save in the table
11:
Find the optimal ( N i ( k ) , N i ( k + 1 ) ) to maximize J i ( c i ( k + 1 ) )
12:
i = i 1 ;
13:
end while
14:
for i = 1 ; i M ; i = i + 1  do
15:
Find the optimal ( N i ( k ) , N i ( k + 1 ) ) based on line 9.
16:
Update the c i ( k ) and c i ( k + 1 ) .
17:
end for

7. Simulation Results and Discussions

In this section, we analyze the performance of the proposed packet-coding scheme with the SR ARQ scheme. In the SR ARQ scheme, the transmitter sends W packets in each transmission and waits for the ACK messages. The transmitter retransmits the failed packets and the new packets to form a new group of packets in the next transmission.
Unless otherwise specified, the simulation parameters of the system are presented in Table 1. We consider BPSK modulation and the UWA channels as a Markov Chain model. The communication link often exhibits ON/OFF behaviour in UWA communications. Therefore, we could model the channels as a two-state Markov Chain model [22,24]: “Bad (0)” and “Good (1)”. The BERs under the good and the bad channel conditions are e 0 = 1 × 10 3 and e 1 = 5 × 10 4 , respectively. The transition matrix of the channel state is [24]
P h = P 00 P 01 P 10 P 11
The steady-state probabilities are given by π 0 = P 10 / ( P 10 + P 01 ) , whereas π 1 = 1 π 0 . The steady-state probabilities could be used as the probabilities of CSI at the initial transmission, which does not have the feedback messages. In addition, we define a memory parameter μ = 1 ( P 10 + P 01 ) to present the time correlation of channel states. Then, the transition matrix of the channel state can be computed by π 0 and μ . In the simulation, we set π 0 = 0.43 and μ = 0.79 according to the experiment data given in [23].
The PEP P c depends on the length of packet N b and the BER e; it can be calculated from the equilibrium distribution of the generalized Pareto renewal process [5]
P c = ( 1 θ 1 θ + e N b θ ) 1 + 1 θ
where θ is the shape parameter of the generalized Pareto distribution. In this paper, we use θ = 0.12 .
For the J-ARQ scheme, the number of transmitted groups during a round-trip time is given by
N g = 2 T d W T p + 2 T g + T ACK
We evaluate the performance based on the throughput efficiency, which is given by
η = ( 1 P E ) N b W T s T total
where P E is the probability of packet loss; T total is the total transmission time duration.
As shown in [5], the performance of the J-ARQ scheme depends on the number of source data. Thus, we first study the impact of the number of source data. Figure 3 illustrates the throughput efficiency as a function of the number of source data packets W s . From Figure 3, we find the SR-ARQ scheme has the lowest throughput efficiency in all schemes. The throughput efficiency performance of conventional J-ARQ increases with the length of source data. If the sender has enough source data, the J-ARQ scheme has the best throughput efficiency. The performance of the RLPC-ARQ scheme and RLPC-J-ARQ is independent of data length. The throughput efficiency of RLPC-J-ARQ is better than RLPC-ARQ since it takes full advantage of the transmission time. When the data length is short, the performance of J-ARQ is worse than that of the RLPC-J-ARQ scheme. In the RLPC-J-ARQ scheme, the transmission duration is adjustable. Thus, it has a better performance when W s is not big enough.
Figure 4 illustrates the throughput efficiency as a function of block size W. In this simulation, W s = 400 . The throughput efficiency of all schemes increases with the increase of W. The proposed RLPC schemes are still better than the corresponding ARQ schemes. That makes sense since a bigger W means the transmitter could send more packets during a transmission; it reduces the number of ACKs. There is a turning point for the J-ARQ scheme. This is because N g will decrease with the increase in group size W. When W = 10 , N g = 4 and it turns to N g = 3 for W = 12 . The throughput efficiency of the J-ARQ scheme decreases as N g becomes smaller since it leads to more idle time.
Figure 5 shows the impact of transmission distance on throughput efficiency. Naturally, the throughput efficiency decreases with the increase of d, since it leads to an increase in propagation delay T d . The performance of the RLPC-ARQ scheme is always better than the SR-ARQ scheme. For the J-ARQ scheme, the throughput efficiency becomes larger at d = 5000 m because N g becomes larger. The transmitter sends two group packets during a round-trip time with d = 4500 m, while it sends three groups with d = 5000 m. The same situation also occurs at d = 7000 m. For the RLPC-J-ARQ scheme, the performance continuously decreases since we only consider that two blocks are transmitted simultaneously. However, its throughput efficiency is still better than that of the J-ARQ scheme when d is less than 7000 m.
Finally, we analyze the impact of steady-state probability π 0 , which reflects the effect of UWA channels. Figure 6 illustrates the throughput efficiency as a function of steady-state probability π 0 . From Figure 6, we find the performance of all schemes will deteriorate with the increase of π 0 . A larger π 0 means the channel is more likely to be bad. The performance gain between with RLPC and without RLPC also increase as π 0 increase. This is because the RLPC schemes under the bad channel could improve the successful decode probability by increasing the transmitted packets to reduce the retransmission. However, the conventional ARQ schemes need to retransmit many times. Thus, the superiority of RLPC schemes is more reflected in the case of poor channels. After all, the conventional ARQ scheme also does not need to be retransmitted when the channel is good.
This paper proposed two ARQ schemes with RLPC for UWA communications. The limitations of the proposed method are as follows. First, the sender knows the transition matrix of the channel state in advance, which needs to do a lot of experiments. Second, the proposed methods were based on the DP algorithm. The computational complexity is very high with a large system state. Thus, it is better to solve the problem with deep learning method.

8. Conclusions

This work investigates the adaptive packet coding for reliable UWA communications. This paper proposes two schemes based on two different ARQs. The first scheme is based on the conventional S&W ARQ scheme. The sender chooses the optimal number of packets in each transmission according to the feedback transmission result about the last transmission. We also set maximum retransmission times to avoid infinite retransmission considering the error-prone characteristic of UWA channels. This problem is formulated as a finite horizon optimization and solved with the DP algorithm. To overcome the impact of long propagation delay, we propose the modified juggling-like ARQ scheme for RLPC. Compared with the standard J-ARQ scheme, the transmission duration of the proposed scheme is variant and adapts to the rateless characteristics of the random linear packet coding. A two-step DP algorithm is proposed to find out the optimal solution. Simulation results demonstrate the performance gain of the proposed schemes as well as the impact of various practical factors such as data length, group size, channel steady-state distribution and transmission distance.

Author Contributions

Conceptualization, L.J. and Y.T.; formal analysis, L.J.; methodology, L.J. and H.Y.; software, L.J. and Y.T.; validation, C.H. and H.Y.; writing—original draft, L.J.; writing—review and editing, H.Y. and C.H.; visualization, L.J. and Y.T.; supervision, H.Y.; project administration, L.J. and H.Y.; funding acquisition, L.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (61801079, 62071383, 61871418), the open research fund of State Key Laboratory of Integrated Services Networks (ISN22-15), and the Science and Technology on Underwater Information and Control Laboratory (6142218200408).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this paper are available after contacting the corresponding author.

Acknowledgments

The authors would like to thank the anonymous reviewers for their careful reading and valuable comments.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wang, K.; Gao, H.; Xu, X.; Jiang, J.; Yue, D. An energy-efficient reliable data transmission scheme for complex environmental monitoring in underwater acoustic sensor networks. IEEE Sen. J. 2016, 16, 4051–4062. [Google Scholar] [CrossRef]
  2. Stojanovic, M. Optimization of a data link protocol for an underwater acoustic channel. In Proceedings of the Europe Oceans 2005, Brest, France, 3 October 2005; Volume 1, pp. 68–73. [Google Scholar]
  3. Azad, S.; Casari, P.; Zorzi, M. The underwater selective repeat error control protocol for multiuser acoustic networks: Design and parameter optimization. IEEE Trans. Wirel. Commun. 2013, 12, 4866–4877. [Google Scholar] [CrossRef]
  4. Gao, M.; Soh, W.S.; Tao, M. A transmission scheme for continuous ARQ protocols over underwater acoustic channels. In Proceedings of the IEEE International Conference on Communications, Dresden, Germany, 11 August 2009; pp. 1–5. [Google Scholar]
  5. Chitre, M.; Soh, W.S. Reliable point-to-point underwater acoustic data transfer: To juggle or not to juggle? IEEE J. Ocean. Eng. 2015, 40, 93–103. [Google Scholar] [CrossRef]
  6. Huang, J.; Zhou, S.; Willett, P. Nonbinary LDPC coding for multicarrier underwater acoustic communication. IEEE J. Sel. Areas Commun. 2008, 26, 1684–1696. [Google Scholar] [CrossRef]
  7. Duan, W.; Tao, J.; Zheng, Y.R. Efficient adaptive turbo equalization for multiple-input multiple-output underwater acoustic communications. IEEE J. Ocean. Eng. 2018, 43, 792–804. [Google Scholar] [CrossRef]
  8. Chen, H.; Maunder, R.G.; Ma, Y.; Tafazolli, R.; Hanzo, L. Hybrid-arq-aided short fountain codes designed for block-fading channels. IEEE Trans. Veh. Technol. 2015, 64, 5701–5712. [Google Scholar] [CrossRef]
  9. Chen, Y.; Wang, Z.; Wan, L.; Zhou, H.; Zhou, S.; Xu, X. OFDM-modulated dynamic coded cooperation in underwater acoustic channels. IEEE J. Ocean. Eng. 2015, 40, 159–168. [Google Scholar] [CrossRef]
  10. Xie, P.; Zhou, Z.; Peng, Z.; Cui, J.H.; Shi, Z. SDRT: A reliable data transport protocol for underwater sensor networks. Ad Hoc Netw. 2010, 8, 708–722. [Google Scholar] [CrossRef]
  11. Mo, H.; Mingir, A.C.; Alhumyani, H.; Albayram, Y.; Cui, J.H. UW-HARQ: An underwater hybrid ARQ scheme: Design, implementation and initial test. In Proceedings of the 2012 Oceans, Hampton Roads, VA, USA, 14–19 October 2012; pp. 1–5. [Google Scholar]
  12. Cui, Y.; Qing, J.; Guan, Q.; Ji, F.; Wei, G. Stochastically optimized fountain-based transmissions over underwater acoustic channels. IEEE Trans. Veh. Technol. 2015, 64, 2108–2112. [Google Scholar]
  13. Chen, W.; Yu, H.; Guan, Q.; Ji, F.; Chen, F. Reliable and opportunistic transmissions for underwater acoustic networks. IEEE Netw. 2018, 32, 94–99. [Google Scholar] [CrossRef]
  14. Lucani, D.E.; Stojanovic, M.; Medard, M. Random linear network coding for time division duplexing: When to stop talking and start listening. In Proceedings of the IEEE INFOCOM 2009, Rio de Janeiro, Brazil, 19–25 April 2009; pp. 1800–1808. [Google Scholar]
  15. Ahmed, R.; Stojanovic, M. Joint power and rate control for packet coding over fading channels. IEEE J. Ocean. Eng. 2017, 42, 697–710. [Google Scholar] [CrossRef]
  16. Ahmed, R.; Stojanovic, M. Grouped packet coding: A method for reliable communication over fading channels with long delays. IEEE J. Ocean. Eng. 2018, 44, 1253–1263. [Google Scholar] [CrossRef]
  17. Geethu, K.S.; Babu, A.V. A hybrid ARQ scheme combining erasure codes and selective retransmissions for reliable data transfer in underwater acoustic sensor networks. EURASIP J. Wirel. Commun. Netw. 2017, 2017, 32. [Google Scholar] [CrossRef]
  18. Maymounkov, P.; Mazieres, D. Rateless codes and big downloads. Lect. Notes Comput. Sci. 2003, 2735, 247–255. [Google Scholar]
  19. Luby, M. LT codes. In Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, Vancouver, BC, Canada, 16–19 November 2002; pp. 271–280. [Google Scholar]
  20. Shokrollahi, A. Raptor codes. IEEE Trans. Inf. Theory 2006, 52, 2551–2567. [Google Scholar] [CrossRef]
  21. Pignieri, F.; De Rango, F.; Veltri, F.; Marano, S. Markovian approach to model underwater acoustic channel: Techniques comparison. In Proceedings of the MILCOM 2008-2008 IEEE Military Communications Conference, San Diego, CA, USA, 16–19 November 2008; pp. 1–7. [Google Scholar]
  22. Tomasi, B.; Preisig, J.C. Energy efficient transmission scheduling for non-stationary underwater acoustic channels. In Proceedings of the ACM WUWNet, Kaohsiung, Taiwan, 11–13 November 2013; pp. 27:1–27:2. [Google Scholar]
  23. Tomasi, B.; Preisig, J.C. Evaluating energy-efficient schedulers on underwater acoustic data. In Proceedings of the OCEANS 2019-Marseille, Marseille, France, 17–20 June 2019; pp. 1–7. [Google Scholar]
  24. Tomasi, B.; Preisig, J. Energy-efficient transmission strategies for delay constrained traffic with limited feedback. IEEE Trans. Wireless Commun. 2015, 14, 1369–1379. [Google Scholar] [CrossRef]
  25. Jing, L.; He, C.; Huang, J.; Ding, Z. Energy management and power allocation for underwater acoustic sensor network. IEEE Sensors J. 2017, 17, 6451–6462. [Google Scholar] [CrossRef]
  26. Zhang, Y.; Yu, L.; Wang, A. Underwater acoustic multi-user ofdm bit loading with markov chain based channel state information prediction. In Proceedings of the OCEANS 2018 MTS/IEEE Charleston, Charleston, SC, USA, 22–25 October 2018; pp. 1–6. [Google Scholar]
  27. Wang, P.; Zhang, X. Energy-efficient relay selection for qos provisioning in mimo-based underwater acoustic cooperative wireless sensor networks. In Proceedings of the 2013 47th Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, USA, 20–22 March 2013; pp. 1–6. [Google Scholar]
  28. Li, X.; Xu, X.; Yan, L.; Zhao, H.Z.; Zhang, T. Energy-efficient data collection using autonomous underwater glider: A reinforcement learning formulation. Sensors 2020, 20, 3758. [Google Scholar] [CrossRef] [PubMed]
  29. Bertsekas, D.P. Dynamic Programming and Optimal Control (2 Vol Set); Athena Scientific: Nashua, NH, USA, 2000. [Google Scholar]
Figure 1. The S&W ARQ scheme with RLPC.
Figure 1. The S&W ARQ scheme with RLPC.
Remotesensing 14 04712 g001
Figure 2. The proposed RLPC-J-ARQ scheme.
Figure 2. The proposed RLPC-J-ARQ scheme.
Remotesensing 14 04712 g002
Figure 3. Throughput efficiency as a function of the number of source data W s .
Figure 3. Throughput efficiency as a function of the number of source data W s .
Remotesensing 14 04712 g003
Figure 4. Throughput efficiency as a function of the number of group packets W.
Figure 4. Throughput efficiency as a function of the number of group packets W.
Remotesensing 14 04712 g004
Figure 5. Throughput efficiency as a function of transmission distance d.
Figure 5. Throughput efficiency as a function of transmission distance d.
Remotesensing 14 04712 g005
Figure 6. Throughput efficiency as a function of the steady-state probability π 0 .
Figure 6. Throughput efficiency as a function of the steady-state probability π 0 .
Remotesensing 14 04712 g006
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParameterValue
Symbol duration T s 0.2 ms
Transmission distance d5 km
The length of a packet N b 1000
Guard interval T g T s N b
Time duration of ACK T A C K T s N b
Discount factor γ 1.01
The max number of transmissions M5
Penalty term C1000
Block size W10
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Jing, L.; Tang, Y.; He, C.; Yin, H. Adaptive Packet Coding for Reliable Underwater Acoustic Communications. Remote Sens. 2022, 14, 4712. https://doi.org/10.3390/rs14194712

AMA Style

Jing L, Tang Y, He C, Yin H. Adaptive Packet Coding for Reliable Underwater Acoustic Communications. Remote Sensing. 2022; 14(19):4712. https://doi.org/10.3390/rs14194712

Chicago/Turabian Style

Jing, Lianyou, Yongqi Tang, Chengbing He, and Hongxi Yin. 2022. "Adaptive Packet Coding for Reliable Underwater Acoustic Communications" Remote Sensing 14, no. 19: 4712. https://doi.org/10.3390/rs14194712

APA Style

Jing, L., Tang, Y., He, C., & Yin, H. (2022). Adaptive Packet Coding for Reliable Underwater Acoustic Communications. Remote Sensing, 14(19), 4712. https://doi.org/10.3390/rs14194712

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop