Next Article in Journal
The Effect of Heat Sink Properties on Solar Cell Cooling Systems
Previous Article in Journal
The Impact of Support Type on the Reliability of Steel Trusses Subjected to the Action of a Fire
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimizing HARQ and Relay Strategies in Limited Feedback Communication Systems †

1
Electrical and Computer Engineering, Purdue University, West Lafayette, IN 47907, USA
2
Signal Theory and Communications, Universidad Carlos III de Madrid, 28911 Leganés, Spain
*
Author to whom correspondence should be addressed.
Part of this work was presented at the 2018 IEEE WCNC Conference and at the 2019 Asilomar Signals and Systems Conference.
Appl. Sci. 2020, 10(21), 7917; https://doi.org/10.3390/app10217917
Submission received: 24 September 2020 / Revised: 24 October 2020 / Accepted: 5 November 2020 / Published: 8 November 2020

Abstract

:
One of the key challenges for future communication systems is to deal with fast changing channels due to the mobility of users. Having a robust protocol capable of handling transmission failures in unfavorable channel conditions is crucial, but the feedback capacity may be greatly limited due to strict latency requirements. This paper studies the hybrid automatic repeat request (HARQ) techniques involved in re-transmissions when decoding failures occur at the receiver and proposes a scheme that relies on codeword bundling and adaptive incremental redundancy (IR) to maximize the overall throughput in a limited feedback system. In addition to the traditional codeword extension IR bits, this paper introduces a new type of IR, bundle parity bits, obtained from an erasure code across all the codewords in a bundle. The type and number of IR bits to be sent as a response to a decoding failure is optimized through a Markov Decision Process. In addition to the single link analysis, the paper studies how the same techniques generalize to relay and multi-user broadcast systems. Simulation results show that the proposed schemes can provide a significant increase in throughput over traditional HARQ techniques.

1. Introduction

Communication systems are naturally prone to varying channel conditions. Before the recent information explosion, it was common for systems to use conservative configurations which allowed them to operate in a wide range of conditions, but this came at the expense of performance. In order to accommodate the ever-growing traffic requirements of next generation communication devices, researchers are now using adaptive schemes to maximize bandwidth efficiency and squeeze as much throughput as possible in every situation. A significant amount of work has been devoted to designing algorithms for adapting physical layer parameters such as the transmit power, modulation and coding rate based on the channel state information [1,2,3,4,5], but there is not as much literature on adaptive retransmissions when failures occur despite it has been shown that they can provide significant gains in terms of both throughput [6,7,8] and outage probability [9,10].
Traditional automatic repeat request (ARQ) forces the receiver to send an acknowledgment (ACK) back to the transmitter for every packet it successfully decodes, and a negative-acknowledgment (NACK) otherwise. If the transmitter does not receive an ACK before the timeout expires, the entire packet will be resent, assuming that it is still within the latency limit. Retransmitting the whole packet is justified when the previous one has been completely lost, but in many cases, the received packet can be partially recovered, and it still contains useful information for the decoder, even if it cannot be entirely decoded. In those cases, it is more efficient if the receiver can recover the whole packet with the help of a few additional bits sent from the transmitter, referred to as incremental redundancy (IR). This is commonly known as Type-II hybrid automatic repeat request (Type-II HARQ) [11], and it is the focus of this paper.
The achievable data rate (throughput) with Type-II HARQ has been upper-bounded under the assumption of unlimited single bit IR and perfect feedback [6,12] and several methods have been proposed to construct IR bits [13,14] or optimize their block lengths under a finite number of retransmissions [15,16]. However, most of these works have focused on extending idealized error correcting codes (ECC) in known channels with either infinite or single-bit feedback. Some works have proposed more realistic models accounting for system-level constraints [17,18,19], bundling multiple packets in one resource block [8,20] and imperfect channel information [21]. The first part of this paper takes one step further in this direction by introducing a new type of IR bits and proposing frameworks to optimize the number and type of IR bits to be sent in scenarios with imperfect ECC, limited feedback, packet bundling, and overhead costs for each round of incremental redundancy. It models the problem as a Markov decision process (MDP) which minimizes the average cost per information bit delivered, relying on a code-specific Gaussian model for the probability of decoding failure as a function of signal-to-noise ratio (SNR) and code rate. By adjusting the relative costs associated to decoding and retransmissions, this method can be used to model practical constraints such as latency and hardware.
HARQ has been included and widely deployed in recent cellular networks such as Long-Term Evolution (LTE) [22,23] and 5G NR [24], and there are studies that evaluate its performance [25]. However, most standards proposed the use of fixed-length IRs due to practical constraints. LTE generally assigns one bit feedback per transport block, equivalent to one bit per codeword. The 5G NR standard includes multiple types of operations and is a little more flexible, but does not rise to the level that we propose in this paper. It still uses ACK or NACK and pre-fixed IR lengths. This paper shows that our proposed HARQ strategies can potentially achieve higher throughput by allowing even more flexibility than 5G NR in the types and lengths of IR retransmissions. In terms of channel coding, the punctured turbo codes in LTE have been replaced with low-density parity-check (LDPC) codes in 5G NR. Among other advantages, LDPC codes provide more flexible puncturing and rate adaptation, allowing for a nearly continuous number of IR bits. The ideas on this paper can be applied to any family of channel codes, but assume the use of LDPC codes by default.
Upcoming millimeter wave (mmWave) systems are likely to deploy dense networks of access points acting as relays between a base station and the end users, requiring HARQ strategies suitable for multi-hop architectures [26,27,28]. These relay nodes have to decide between using amplify-and-forward (AF) or decode-and-forward (DF) when passing on information. AF amplifies and retransmits incoming packets as they are received, signal and noise. It is faster and less complex but noise accumulates over multiple hops until the packet can become unrecoverable. DF decodes the received signal and reencodes it before retransmission. This provides noise reduction and early detection of failures, but the required processing increases latency, complexity, and power consumption. Previous literature has shown that DF generally has higher channel capacity than AF [29] and lower frame error rate (FER) with several HARQ protocols [30]. However, some of the practical benefits of AF, such as simpler hardware and lower latency, were not considered in those studies. Hybrid schemes between AF and DF, such as transcoding [31] or compress and forward [32], have been shown to reduce the latency in modern 5G relay systems. Those schemes address how information is processed by the relay in each transmission, but do not address how to proceed when decoding failures occur. The second part of this paper shows how the MDP framework initially proposed for a single link scenario can be easily extended to account for the complexities of a relay system, including optimizing the decision between AF and DF.
Finally, the third part of this paper addresses another very relevant scenario for modern and future networks: multi-user systems where a single base station is communicating with multiple recipients. Even if each recipient is only interested in some of the information, it makes sense for the base station to bundle several packets and broadcast the bundle to all the users. If multiple users suffer a small number of decoding failures, the base station does not need to send individual IR to everyone; instead, it can broadcast one additional piece of information—for example the XOR (i.e., bitwise modulo 2 addition) of the packets in the bundle—to help multiple users decode their failed codewords. This idea, commonly known as network coded (H)ARQ, dates back to the 1980s [33], but it has recently experienced a renewed interest from the research community due to its potential uses in the Internet of Things (IoT). Its maximal achievable throughput under idealized conditions was characterized in [34], and [35] extended that work with a deeper study of the practical overheads associated with various implementations. It showed that using general linear codes requires significantly more overhead than binary codes, since the transmitter not only needs to specify which packets are included in each linear combination, but also their coefficients. Hence, this paper only considers binary XOR packet combinations. The choice of packets to include is then a special case of the well-known index coding problem [36,37], but our framework also requires optimizing the number of bits to be sent, which further complicates the problem. Still, we show that it can be formulated in a relatively simple convex form. Numerical convex optimization algorithms can then be applied to solve for a good approximation to the optimum.
The main contributions of the paper can be summarized as follows. It introduces a new type of IR bit, bundle parity bits, computed across a bundle of codewords. It proposes an MDP model for the HARQ process over a point-to-point link, optimizing the type and number of IR bits to be sent when failures occur. It then shows how such HARQ scheme can be generalized and adapted to suit a two-hop relay network, where the relay node can be optimized to choose between AF and DF based on the channel state information. Finally, it considers a multi-user broadcast scenario and shows that the optimization of the HARQ can be formulated in a convex form. Numerical simulations verify the derivations, and show that the proposed methods achieve modest improvements against traditional schemes in all three scenarios.
The rest of the paper is organized as follows. Section 2 explains the system model and some notation to be used throughout the paper. Section 3 introduces the different types of IR bits being considered and how they can help in the decoding of a given bundle of codewords. Section 4 builds a single-link decision engine optimizing the type and number of IR bits to be sent as a function of the channel SNR, coding rate, and number of failed codewords in the bundle. Section 5 derives the decision engine for the relay, which decides between AF and DF relay strategies as a function of the SNRs on the two links and the code rate on the first link. Section 6 addresses the case of multi-user systems, proposing a combinatorial optimization algorithm for deciding how the failed codewords should be grouped for the generation of IR when failures occur. Finally, Section 7 illustrates the performance of our proposed policies through numerical simulations, and Section 8 concludes the paper.

2. System Model

This section introduces the system models used throughout the paper. It first presents a single link scenario (with a direct channel between the transmitter and receiver) describing the channel, modulation, ECC, and HARQ schemes. Then it extends this scenario to the dual-hop relay system depicted in Figure 1, where the base station (BS) can only reach the end user through an intermediate relay station (RS), and to a multi-user scenario where a single transmitter (possibly the relay) is communicating with multiple recipients. All the links in the relay and multi-user scenarios follow the same model as that in the single link scenario.

2.1. Channel and Modulation

Modern communication systems estimate the channel by periodically sending pilot signals, and use those estimates to adjust the modulation and coding schemes so as to maintain a certain frame error rate (FER). However, the unpredictable nature of channels and the blind period between channel sounding cycles make it impossible to achieve optimal adaptation for all codewords.
In this paper, channels are modeled as interference-free additive white Gaussian noise (AWGN). We assume that multiple codewords or packets (For simplicity, we assume that each packet consists of a single codeword and we refer to packets or codewords indistinctly. In a scenario where each packet consists of multiple codewords, we can either acknowledge codewords independently or treat each packet as a single unit which can either succeed or fail to decode. ) are bundled together into a single block, experiencing the same (often unknown) SNR at the receiver. All the IR bits requested in the same round also experience the same SNR, but this SNR is independent from that for the bundle and for previous rounds of IR (if any). This assumption is made in light of the fact that there is typically a delay between the transmissions of the original bundle and the IR, during which channel conditions could have changed.
In order to increase throughput, the transmitter uses high-order modulations with multiple bits per symbol for all but the noisiest channel conditions. Encoding these modulation symbols directly would increase the error correction capabilities [38], but would complicate significantly the encoding and decoding. Treating the bits in a modulation symbol as independent and using binary error correcting codes is significantly simpler computationally, especially in the case of LDPC codes, but the performance is slightly worse than with non-binary error correction codes. Still, it is the most common approach in practice. Therefore, this paper assumes the use of binary encoders and decoders which operate as if the bits came from independent BPSK modulations with constant SNR throughout each codeword, even if higher order modulations are actually being used [39].

2.2. Error Correction

Several works (e.g., [15,40]) have shown that the FER of a finite length code can be well approximated by
P e ( R , S N R ) = Q μ R σ ,
where R represents the code rate (i.e., number of information bits divided by codeword length) and μ and σ are code-specific parameters that depend on the SNR. We model such dependency as
μ = a μ · S N R c μ + b μ ,
σ = a σ · S N R c σ + b σ .
The techniques proposed in this paper could be applied to any code by adjusting the parameters ( a μ , b μ , c μ , a σ , b σ , c σ ), but the numerical simulations in this paper will focus on the binary QC-LDPC code of length n = 648 and k = 432 (rate 2/3) proposed in the 3GPP standard for 802.11n [41], for illustrative purposes. Our prior work [42,43] showed that
a μ = 0.2 b μ = 0.86 c μ = 1.74
a σ = 0.12 b σ = 0.08 c σ = 0.42
provide a good fit to this code when S N R [ 0.5 , 2 ] .
Binary QC-LDPC codes offer very efficient encoding and decoding using parallel shift registers [44,45]. This has made them the preferred option in 5G NR, over turbo codes such as the ones proposed in the LTE standard. Additionally, QC-LDPC codes can be flexibly punctured and extended for nearly continuous rate adaptation. A QC-LDPC code is uniquely defined by a sparse parity check matrix H { 0 , 1 } ( n k ) × n , such that H x = 0 for all codewords x. Received channel values (i.e., matched filter outputs) are processed to obtain a log-likelihood ratio (LLR) for each individual bit b as
= LLR ( b | r ) = log p ( b = 0 | r ) p ( b = 1 | r ) ,
where p ( 0 | r ) and p ( 1 | r ) represent the conditional probability of b = 0 and b = 1 , respectively, given the received value r. It is not hard to prove that for an AWGN channel with equiprobable and symmetric inputs, the LLR values are given by
LLR ( b | r ) = 2 · S N R · r .
The decoding of LDPC codes is typically done through message-passing algorithms, which refine these LLR values iteratively until convergence or until a prefixed maximum number of iterations is reached. When the algorithm does converge, it is almost always to the right codeword. We thus assume that a codeword error occurs if and only if the LDPC decoder fails to converge.

2.3. Single Link System: Hybrid ARQ

This paper focuses on the optimization of HARQ protocols, abstracting some of the other practical complexities that are present in real world communication networks. For example, the paper assumes perfect synchronization between all the nodes and error-free, albeit limited-capacity, feedback links. Feedback links are assumed to offer no more than one bit of feedback per packet, allowing for 256 possible responses to a bundle of eight packets, for instance. However, most of the proposed HARQ strategies do not require that many feedback messages, so the required number of feedback bits can be lower.
It is also assumed that the receiver can request as many rounds of incremental redundancy as needed until the whole bundle is successfully decoded. Each round is penalized with an adjustable overhead cost of c R per link plus a decoding cost of c D for each codeword for which decoding is attempted.

2.4. Relay System: Amplify or Decode?

In the relay scenario, the intermediate node needs to decide whether to adopt an AF or DF strategy for each incoming bundle. It will base this decision on the channel SNR estimates and the code rate of the bundle. With DF, the system is equivalent to two separate links, which could be independently optimized using the same HARQ protocol as for the single link scenario. With AF, the HARQ problem is slightly more complex. When a bundle arrives, the relay will forward it without any processing, but we assume that it caches the LLR values temporarily. If the end user is successful in decoding the whole bundle, these LLR values can be discarded, but if the end user suffers any decoding failures, the relay reverts to DF. It decodes the bundle using its cached LLR values (employing HARQ if needed) and only after having succeeded it sends IR to the end user.
When employing AF, we assume unit transmit power at the base station and that the relay amplifies its received signal to invert the attenuation of the first channel. In other words, if the relay receives
y 1 = g 1 x + n 1 ,
where g 1 is the channel gain on the first link, x is the signal with E [ x 2 ] = 1 and n 1 is Gaussian noise with variance σ 1 2 , the relay amplifies y 1 by a factor 1 / g 1 before forwarding it. Then, the received signal at the end user is
y 2 = g 2 1 g 1 y 1 + n 2
= g 2 x + n 1 g 1 + n 2 g 2 ,
where g 2 is the gain over the second link. Since the noise components n 1 and n 2 are independent, the SNR at the end user with AF is
S N R A F = E [ x 2 ] Var [ n 1 g 1 + n 2 g 2 ] = ( S N R 1 1 + S N R 2 1 ) 1 ,
where E [ · ] and Var [ · ] denote expectation and variance respectively, and S N R j = g j 2 / σ j 2 ( j = 1 , 2 ) is the SNR on the j-th link. Note that S N R A F is always lower than the SNR on either link.

2.5. Multi-User Systems

The last scenario studied in this paper is that of a single transmitter communicating with multiple recipients. Each recipient is only interested in a subset of the information being transmitted, but can overhear everything. Each receiver has its own data and feedback channel, with independent SNR and decoding process. When a receiver is unable to decode its desired information, it reports the failures to the transmitter and requests IR. The transmitter compiles the failure reports from all the receivers and uses the proposed algorithm to optimize the set of IR bits that should be broadcast in order to ensure that none of them suffers a probability of error above a pre-fixed value γ . This optimization is formulated as a convex optimization problem, albeit with the number of variables increasing exponentially with the number of failures reported. In any case, if the number of failures is too large, it is usually better to re-transmit the whole bundle anyway.

3. Incremental Redundancy

This paper uses the term “Incremental Redundancy” (IR) to denote all the bits transmitted with the objective of aiding in the recovery of one or more codewords whose decoding had previously failed. Figure 2 shows three different types of IR:
  • Chase Combining [46]: the sequence of IR bits is identical to a subset of the bits previously sent. It is simple and computationally efficient, since the transmitter does not need to generate new bits and the decoder can just refine the previous LLRs using maximal ratio combining. However, some of the information transmitted might be redundant to the receiver, so it is a suboptimal approach.
  • Bundle parity bits: the sequence of IR bits consists of a bit-wise erasure code over the previously transmitted codewords [47]. This paper uses the XOR of the codewords in a bundle, unless stated otherwise.
  • Codeword parity (or extension) bits: the sequence of IR bits extends each of the previously transmitted codewords with either previously punctured bits or with completely new parity found by adding new rows and columns to the parity check matrix H.
We assume that the decoder can handle the decoding of a (possibly extended) codeword, but does not have enough memory to jointly decode all the codewords in a bundle. Each codeword is therefore decoded independently, although Chase Combining and bundle parity bits can be used to refine its LLR values.
We now study the effect that each of these types of IR bits has on the codewords. In a nutshell, Chase Combining and bundle parity bits increase the SNR for some bits in the failed codewords, and extension bits reduce the rate of the codeword. These improvements in SNR and rate can be translated into a lower probability of error using Equation (1).

3.1. Chase Combining

Let r ( 0 ) = b + n ( 0 ) and r ( 1 ) = b + n ( 1 ) be the received values corresponding to two transmissions of the same bit b with different S N R 0 and S N R 1 , respectively. With Chase Combining, the receiver can combine both values into r ( 0 ) + r ( 1 ) = 2 b + n ( 0 ) + n ( 1 ) resulting in an effective SNR of
S N R CC = 4 1 S N R 0 + 1 S N R IR ,
for the retransmitted bits. Since p ( 1 | r ( 0 ) , r ( 1 ) ) is proportional to p ( 1 | r ( 0 ) ) p ( 0 | r ( 1 ) ) (the same applies for b = 0 ), the decoder can just add the LLRs from the individual transmissions.

3.2. Bundle Parity

Similarly to Chase Combining, bundle parity bits can be used to increase the SNR for some of the bits in the failed codewords. Assume that a vector b = [ b 1 , b 2 , , b n ] of n bits from from different codewords is transmitted through an AWGN channel and that their XOR x = b 1 b n is transmitted through another AWGN channel with possibly different SNR. Denoting the received values for b and x as r and r x , respectively, the probability of a specific bit b k being 0 conditioned on these received values can be found as
p k ( 0 | r , r x ) = d { 0 , 1 } n d k = 0 j = 1 n p j ( d j | r j ) p x ( d | r x ) v { 0 , 1 } n j = 1 n p j ( v j | r j ) p x ( v | r x ) ,
where ⨁ represents the XOR operator and p x ( v | r x ) denotes the probability that x = v 1 v n given the received value r x . Equation (12) provides the exact probabilities required for the computation of the LLR values, but it is impractical to evaluate for large bundle sizes because the number of terms increases exponentially. Hence, we adopt a similar approximation to that used in Min-Sum LDPC decoders [48] and calculate the updated LLR for bit b k as
new k = k + i = 1 i k n + 1 sign ( i ) min i = 1 n + 1 i k | i | ,
where n + 1 denotes the LLR value for x = b . The effect of this update can be modelled as an increase in the SNR of the bits using Equation (7). Specifically,
S N R new = E [ new ] 2 Var [ new ] ,
where new corresponds to the LLRs conditioned on b = 0 being transmitted (The same formula would hold if b = 1 is being transmitted). The two terms in Equation (13) are independent, so the moments of new can be found by adding their corresponding moments. Characterizing the mean and variance of the minimum value among a set of Gaussians is possible, but requires tedious equations that add little value to this paper. Instead, Figure 3 illustrates the S N R new as a function of the number of failed codewords and the SNR of the original bits, assuming a SNR of 0 dB for the IR. In a practical setting, that table would be computed offline and saved in memory to be used in the optimizations described in subsequent sections.
LDPC decoders can occasionally fail to converge, but when they converge to a feasible codeword it is almost always the right one. Therefore, when the decoder fails to decode some of the codewords in a bundle, the receiver can set the LLR values for successfully decoded codewords to have infinite magnitude and update those for the failed codewords according to Equation (13) before attempting another decoding. If it succeeds in decoding any previously failed codewords, their LLRs can be scaled to have infinite magnitude and those for failed codewords can be updated again.

3.3. Codeword Extension

Finally, codeword extension bits reduce the rate of the code. The probability of a successful decoding with these extension bits is highly dependent on the specific code being used. The code specifications often characterize this probability, but only under the assumption that the original codeword and the extension bits are received with the same SNR. Unfortunately, this is generally not the case in practice.
In order to simplify our derivations, we define the effective SNR of a codeword as
S N R eff = E 1 S N R 1 ,
where the expectation is taken over the bits in the codeword. When all the bits in the codeword have the same energy E b , S N R eff is equivalent to dividing E b by the average noise power. Figure 4 illustrates the probability of decoding failure for different noise powers and distributions of signal strength within a codeword. Solid curves, which correspond to different distributions with the same S N R eff are nearly identical, while dashed curves show the effect of a 25% variation in S N R eff . We therefore assume that the probability of failure mostly depends on S N R eff , not on the SNR variance within the codeword.

4. Decision Engine for Single Link

This section considers a point-to-point link, and proposes an optimization method where the requested number and type of IR bits can be chosen to minimize a cost function. We discretize the coding rate R and the SNR into a finite set of values so that practical numerical methods can be applied to the optimization problem. Since the feedback channel has limited capacity and only offers a few bits for each IR request, we constrain the number of IR bits to be requested to a small set of pre-defined values. A Markov Decision Process (MDP) can then be established to model the HARQ protocol as follows:
  • State: s = ( f , S N R , R ) , where f denotes the number of decoding failures in the bundle, S N R their effective SNR, and R their coding rate.
  • Action: A ( s ) = ( α , β ) , where α and β respectively represent the requested number of extension bits for every codeword in the bundle and the requested number of bundle parity bits. Chase Combining bits will not be used because for typical values of SNR and code rate, their performance is inferior compared to extension bits [46].
  • Cost: C = b α + β + f c D + c R , where b denotes the bundle size (i.e., number of codewords per bundle). Assuming that transmitting one bit costs one unit, c D denotes the cost to decode a single codeword, and c R denotes the overhead cost due to each round of IR accounting for hardware complexity, increased latency, feedback bits, etc. One possible interpretation for this cost is latency. In that case, c D would be the time required to decode a codeword and c R the time between retransmissions.
The objective is to find the actions that minimize the total expected cost until all codewords in the bundle are successfully decoded, i.e.,
A ( s ) = arg min ( α , β ) E { Total cos t | s , α , β } ,
for all s. By sending IR bits, α reduces the code rate and β increases the SNR, transitioning from s 0 = ( f 0 , S N R 0 , R 0 ) to a new state s 1 = ( f 1 , S N R 1 , R 1 ) , where S N R 1 and R 1 are deterministic and f 1 f 0 follows a binomial distribution. They can be determined by the following equations:
S N R 1 = α S N R I R + β S N R new + k / R 0 β S N R 0 1 k / R 0 + α 1
R 1 = k k / R 0 + α
P ( f 1 | s 0 , α , β ) = f 0 f 1 p f 1 ( 1 p ) f 0 f 1 ,
where k denotes the number of information bits per codeword and S N R new denotes the increased SNR of the bits that participated in the bundle parity IR, as given by Equation (14) and illustrated in Figure 3. The formula for S N R 1 is obtained from Equation (15) by observing that every codeword in a bundle can be partitioned into three sections according to the SNR: the α bits of codeword extension have S N R I R , the β bits of overlapping part with bundle parity IR have S N R new after updating their LLRs, and the remaining k / R 0 β bits keep the same S N R 0 as before receiving the IR. The probability p in Equation (19) denotes the conditional probability that a codeword fails in state s 1 given that it failed in s 0 , and can be computed using Equation (1) as
p = P e ( R 1 , S N R 1 ) P e ( R 0 , S N R 0 ) .
For any state s and S N R I R , the total expected future cost V and the optimal action A can be expressed recursively as follows:
V ( s , S N R I R ) = E [ Total cos t | s , α , β ] = b α + β + f c D + c R + s P ( s | s , α , β ) V ( s , S N R I R )
A ( s , S N R I R ) = arg min ( α , β ) V ( s , S N R I R ) ,
where the summation is taken over all possible states s to which s can transition according to Equations (17)–(19) given that ( α , β ) IR bits are sent. P ( s | s , α , β ) denotes the state transition probability.
If we discretize the states and actions to take values from a finite set, the value iteration algorithm [49] can then be used to numerically find V ( s , S N R I R ) and A ( s , S N R I R ) for all s and S N R I R . Essentially, value iteration initializes V with random values, and alternates between finding the optimal actions A according to Equation (22) and updating the value V according to Equation (21), until convergence. At that point A ( s , S N R I R ) stores the optimal policy to follow when the HARQ process is at state s expecting S N R I R for the IR, while V ( s , S N R I R ) stores the total expected future cost until successfully decoding all codewords in the bundle at the receiver.
The single link scenario decision engine is specified by the policy A, and it can be readily extended to individual links in a multi-hop scenario as well. The receiver can estimate its state by computing the bundle’s relevant statistics when decoding failures occur, and it then follows A to request a combination of ( α , β ) IR bits from the transmitter.

5. Decision Engine for Relay

This section extends the framework described in Section 4 to the two-hop scenario illustrated in Figure 1. On top of optimizing the type and number of IR bits to be transmitted, the intermediate station also has to decide between using an amplify and forward (AF) or decode and forward (DF) relay strategy. In order to compare both strategies, we propose a parametric cost model for each of them and a decision engine to minimize the average cost per successfully delivered information bit. Specifically, we model the cost of AF and DF ( c A F and c D F ) as functions of the SNR on both links ( S N R 1 and S N R 2 ) and the code rate in the first link ( R 1 ). As in the single link decision engine, the decoding cost c D and the overhead cost c R are normalized by the cost of transmitting 1 bit of information over one link.

5.1. Cost of DF

With a DF relaying strategy, both links can be treated as independent. Thus, the cost of DF is decomposed as
c D F = c 1 + c 2 ,
where c j is the expected cost on the j-th link ( j = 1 , 2 ). We further decompose each c j as the sum of three terms: the number of bits sent on the j-th link, the cost of decoding the b codewords in the bundle, and the expected future cost in the case of decoding failures. Thus,
c j = b k R j + b c D + i = 1 b P B ( b , p j , i ) δ j ( i ) ,
where P B ( b , p j , i ) : = b i p j i ( 1 p j ) b i represents the probability of suffering i failures in the bundle and δ j ( i ) represents the expected future cost on the j-th link when that happens. The probability of failure p j = P e ( R j , S N R j ) is obtained from Equation (1) and
δ j ( i ) = V ( ( i , S N R j , R j ) , S N R I R , j )
is given by Equation (21) from the single link scenario. The code rate on the second link R 2 should be chosen such that c 2 is minimized. For the sake of simplicity, we assume that the IR experiences the same SNR as the original codewords in the relay scenario, hence S N R I R , j = S N R j for both links j = 1 , 2 .

5.2. Cost of AF

With an AF strategy, the relay is assumed to keep the code rate unchanged, i.e., R 2 = R 1 , so the same number of bits is sent over both links in the first transmission. Decoding the bundle at the end user costs b c D plus any cost associated to IR if failures occur. Thus, the cost of AF is decomposed as
c A F = 2 · b k R 1 + b c D + i = 1 b P B ( b , p A F , i ) δ A F ( i ) ,
where p A F = P e ( R 1 , S N R A F ) , S N R A F is taken from Equation (10), and δ A F ( i ) denotes the expected future cost when i failures are present at the end user. If decoding failures do occur, the end user will request IR from the relay. We assume that the relay always reverts back to a DF strategy in this case, decoding the cached bundle with IR from the base station if necessary. If there are j failed codewords at the relay, decoding the entire bundle will cost V ( ( j , S N R 1 , R 1 ) , S N R 1 ) . Once the relay has succeeded at decoding the whole bundle, it can generate and transmit the IR that the end user requested. This step costs another V ( ( i , S N R A F , R 2 ) , S N R 2 ) .
With AF, the noise accumulates over the two links. It is therefore very unlikely for a codeword that could not be decoded at the relay to be correctly decoded at the end user. Similarly, if a codeword was correctly decoded by the end user we assume that it will also be successfully decoded by the relay. The number of failures at the relay then follows a binomial distribution with i representing the number of failures at the end user and p R representing the conditional probability that a codeword fails at the relay conditioned on it failing at the end user. Hence,
δ A F ( i ) = b c D + V ( ( i , S N R A F , R 2 ) , S N R 2 ) + j = 1 i P B ( i , p R , j ) V ( ( j , S N R 1 , R 1 ) , S N R 1 ) ,
where
p R = P e ( R 1 , S N R 1 ) P e ( R 1 , S N R A F )
follows from Bayes’ rule.
The values of c D F and c A F can now be computed for all discretized values of S N R 1 , S N R 2 , and R 1 using Equations (23) and (26). A decision map is then generated by specifying whether AF or DF provides lower expected cost. According to this decision map, the relay can make the AF or DF decision by estimating the SNR on the two links and finding the rate of the received codeword in a practical situation.

6. Decision Engine for Multi-User Systems

This section addresses a system where a single server (or base station) uses a broadcast link to deliver content to multiple users. The channels from the base station (BS) to each user experience different and independent SNR, so when the BS broadcasts a bundle of codewords, each user is able to decode some of them but not others. If all users are interested in decoding all codewords the problem is similar to that of a single link: it makes sense to focus on the user with the most failures and broadcast the corresponding IR bits, that all other users are also able to hear and use in their own data recovery. However, we analyze the more interesting case in which each user is only interested in a subset of the codewords but can overhear and attempt to decode those meant for other users. Furthermore, we assume that users can report the specific codewords that they succeeded in decoding. In this case, the BS can leverage that information and use network coding schemes to optimize the IR [35,36,50,51]. Since not all users are interested in all codewords, extension IR bits for any given codeword would only benefit a subset of the users, possibly a single one. Bundle parity bits obtained by taking the XOR of multiple codewords, however, have the potential to help multiple users decode their desired information. This section focuses on optimizing the choice of codewords in such combinations and the number of bundle parity bits to be sent for each of them.
Consider a bundle of codewords being broadcast to multiple users, so that user i is only interested in codeword i but overhears all the others. If user i can successfully decode codeword i, then it is done and does not require any IR. Our goal is to minimize the total number of IR bits sent while ensuring a minimal probability of success for all the users who failed to do so. Let b denote the number of users that fail to decode their corresponding codewords, and consider all the possible subsets of { 1 , , b } , indexed with numbers between 0 and 2 b 1 . A simple way of doing this would be to use the binary representation of the elements included in the subset. Let Ω k { 1 , , b } represent the k-th such subset for k = 0 , , 2 b 1 , so that j Ω k if and only if k / 2 j 1 is odd. Let β k represent the number of IR bits to be sent obtained from the XOR of the codewords in Ω k . Then the problem that we are trying to solve is
minimize k = 0 2 b 1 β k
subject   to P e ( i ) γ , i = 1 , , b
β k 0 , k = 0 , , 2 b 1
where P e ( i ) represents the probability of user i failing to decode after receiving the IR, conditioned on having failed without it, and γ represents the highest such probability that we are willing to tolerate. The failure probability P e ( i ) depends on S N R 0 ( i ) , the SNR of the original codeword, and on S N R eff ( i ) , the effective SNR after IR defined in Equation (15). The latter is itself a function of β = ( β 1 , β 2 , , β 2 b 1 ) , as described below.
Let χ i { 1 , , b } represent the indices of the codewords that user i failed to decode and assume that i χ i (otherwise the user has received its information and is out of the picture). Receiving β k bits from the XOR of codewords in Ω k would help user i increase the SNR in β k of the bits from codeword i. Figure 3 provides the new SNR for those bits, denoted S N R new , as a function of S N R 0 ( i ) and the number of failed codewords in the XOR, denoted f k ( i ) = | χ i Ω k | . Assuming that the IR updates do not overlap, the effective SNR for user i after IR would be
S N R eff ( i ) ( β ) = 1 S N R 0 ( i ) + 1 n { k : i Ω k } β k 1 S N R new ( f k ( i ) , S N R 0 ( i ) ) 1 S N R 0 ( i ) 1 .
Equations (1)–(3) and (20) can be used to rewrite the error constraints in (29) as
λ i a σ z i ( β ) c σ a μ z i ( β ) c μ θ i
for i = 1 , , b , where
λ i : = Q 1 γ P e ( R , S N R 0 ( i ) ) ,
θ i : = b μ R λ i b σ ,
z i ( β ) : = S N R eff ( i ) ( β ) 1 .
In the above definitions P e ( R , S N R 0 ( i ) ) denotes the probability of error before IR and R the coding rate, assumed to be identical for all codewords for the sake of simplicity. Using the numerical values in Equations (4) and (5), problem (28) becomes
minimize k = 0 2 b 1 β k subject   to 0.2 z i ( β ) 1.74 + 0.12 λ i z i ( β ) 0.42 θ i , i = 1 , , b β k 0 , k = 0 , , 2 b 1 .
Observe that z i ( β ) is a linear function of β , as shown in Equation (31). Assuming that z i ( β ) 0.5 , since the model in Equation (1) is not valid outside of that range, the above problem is convex for γ 2.3 P e ( R , S N R 0 ) · 10 4 and can be solved by any of the many existing convex optimization methods [52]. The solution β = ( β 1 , , β 2 b 1 ) , with all values rounded to the nearest integer, provides a good approximation to the optimal combination of IR bits to be sent so as to guarantee a probability of success above 1 γ for all users.

7. Numerical Results

We now simulate the proposed methods and show numerical results to evaluate their performance. All simulations assume a bundle size of b = 8 codewords obtained from the QC-LDPC code of length n = 648 and k = 432 (rate 2/3) specified in [41]. Decoding and retransmission overhead costs are set to c D = 300 and c R = 100 .

7.1. Single Link

This subsection simulates the method described in Section 4. As a reminder, the goal was to optimize the number and type of IR bits to be sent when there is a direct link between the transmitter and the receiver. Value iteration was applied to Equations (21) and (22) to yield a policy A ( f , S N R , R , S N R I R ) specifying the number of extension bits ( α ) and bundle parity bits ( β ) to be requested as a function of the number of failed codewords remaining in the bundle f and their effective S N R . We restrict the range of α and β to be [ 0 , 216 ] and [ 0 , 648 ] respectively, so that the set of actions is finite. Figure 5 shows a slice of the policy for code rate R = 2 / 3 and the IR having the same SNR as the original bundle, ( S N R I R = S N R ). It can be seen that the sum of α and β increases as the SNR decreases. This is because more IR bits are required to recover a highly corrupted bundle. In addition, our policy suggests that bundle parity bits are preferred over extension bits when there is a small number of failed codewords. This is worth noticing, since bundle parity is equivalent to Chase Combining when there is a single failure and extension bits generally offer better performance than Chase Combining [46]. However, the feedback limitations in our system prevent the receiver from conveying to the transmitter the specific codewords that failed; if extension bits were requested, the transmitter would have to send them for every codeword in the bundle, even for those that have already been successfully decoded. The policy illustrated in Figure 5 has less than 16 possible combinations of ( α , β ) , so it suffices to use 4 feedback bits to specify the request. This translates to only 1 bit of feedback per 2 codewords, which is half as much feedback as traditional fixed-length IR schemes with individual acknowledgements.
Figure 6 compares the number of information bits delivered per unit cost for different IR schemes. Each point in the plot is the result of averaging Monte Carlo simulations for 1000 bundles and unlimited rounds of IR until success. If we interpret the cost as delay, then the number of information bits delivered divided by the cost will be the throughput. It can be observed that our HARQ policy provides modest gains over those with a fixed IR length, regardless of what this fixed number is and the SNR of the channel. These gains would be even larger in a scenario with variable SNR where, unlike fixed IR schemes, the proposed HARQ protocol would be able to adapt the IR length to each individual bundle.

7.2. Relay

This subsection simulates the method described in Section 5. As a reminder, a relay between the transmitter and receiver has to decide between AF and DF, using the same policies as in the single link scenario when failures occurred. The costs c D F and c A F , defined in Equations (23) and (26), are computed offline and compared to obtain the decision map. The relay estimates the SNR of both channels, finds the code rate of the received bundle, and looks up the decision map for whether or not to decode it. Figure 7 shows the decision map for R 1 = 2 / 3 . It can be observed that AF is preferred when both S N R 1 and S N R 2 are high enough, since the resulting S N R A F is high and so AF removes the decoding cost at the relay, offsetting the small additional risk of decoding failure at the end user. Especially when S N R 2 > 4.5 dB, AF is the better choice regardless of S N R 1 . The simulations also show that the AF region shifts to the right as the code rate R 1 increases. This makes sense because for higher code rates, the S N R must be increased correspondingly so that the risk of decoding failure is maintained at a low level for AF to prevail as discussed earlier.
Monte Carlo simulations also verify that the proposed relay HARQ strategy provides higher throughput than existing ones. Again, we could interpret the cost as delay, and so the information bits delivered per unit cost would measure the average throughput. The simulations first use an AWGN channel with deterministic gain to show that the relay decision map in Figure 7 indeed chooses the forwarding scheme with a higher throughput. We then introduce stochastic channel gains to simulate a more practical scenario. Although the relay decision engine was derived based on the assumption of AWGN channels, we show that the smart relay using our proposed policy based on the measured channel side information (CSI) is also suitable in this scenario and outperforms a fixed AF or DF relay.
In order to perform a fair comparison all relays use the same HARQ strategy described earlier when it comes to the single-link regime. Figure 8 shows the average throughput using different relay strategies as a function of S N R 2 , given a fixed S N R 1 = 4 dB and R 1 = 2 / 3 . The relay decision map in Figure 7 predicts that AF is the better choice if S N R 2 > 3 dB, and indeed we see in the figure that AF results in higher throughput than DF when S N R 1 > 3 dB. The smart relay is programmed to take the strategy with higher throughput.
Using the decision map should provide an advantage against channel variations because the relay can measure the SNR of its received signal and adopt the appropriate strategy accordingly, whereas a relay with fixed forwarding scheme will fail to adapt to the time-varying channel. The received signal is modeled as y = g x + n where we assume unit transmit power ( E [ x 2 ] = 1 ) and additive Gaussian noise n N ( 0 , σ 2 ) . The channel gain g is uniformly distributed over the range [ 0.75 , 1.25 ] , remaining constant within each bundle but changing across different bundles and links. Figure 9 shows the average throughput of the different relay strategies in the fading scenario as a function of S N R 2 for fixed S N R 1 = 4 dB and R 1 = 2 / 3 . The smart relay exhibits a noticeable gain in throughput compared to AF or DF only relays. The gain is especially prominent in the region where AF and DF have similar performance, because our proposed hybrid relay strategy combines the advantages of both when neither of them significantly dominates the other.

7.3. Multi-User Systems

This subsection simulates the method described in Section 6. As a reminder, a single transmitter is delivering content to multiple receivers using a broadcast link. Each receiver is only interested in a subset of the codewords, but can overhear the others. Our goal is to minimize the number of IR bits to be broadcast in order to guarantee a certain probability of success for all users who suffered failures in decoding their desired information.
Figure 10 compares the average number of incremental redundancy bits resulting from Equation (36) with that required if we were to send extension bits for every codeword that failed decoding at its desired receiver. Each point in the plot is the result of 100 Monte Carlo simulations with rate R = 0.5 broadcast to eight users experiencing random SNR uniformly distributed between 2 dB and 1 dB. According to Equation (1), that yields a probability of decoding failure between 0.1 and 0.9 per codeword at each user.
We used a logarithmic barrier method coupled with Newton descent to solve problem (36) and plotted the average β 1 (number of IR bits) for different values of γ (probability of error after receiving the IR). Then, we used Equation (1) to derive the number of extension bits that would be required to guarantee the same probability of error for all users. As it can be seen, our proposed method requires significantly fewer bits regardless of γ .
In most practical instances, the solution to problem (36) is not unique. There is a whole subspace of optimal values for β . In order to obtain a sparse solution, we introduced a small random perturbation in the objective, minimizing k = 0 2 b 1 ( 1 + ϵ k ) β k instead of k = 0 2 b 1 β k , where ϵ k are random noise variables distributed between 0 and 10 2 . The result was that, in most cases, the number of non-zero entries in β was lower than the number of failed codewords. This means that, on top of requiring fewer IR bits, our method is also able to group them into fewer types than a pure extension approach, reducing the amount of overhead.

8. Conclusions

This paper addresses the problem of error correction in single link, relay, and broadcast systems. Specifically, it proposes techniques for optimizing the incremental redundancy (IR) bits sent by an HARQ protocol under the assumption that the feedback channel can only support a few bits of feedback per bundle of codewords (or packets). Apart from the traditional extension IR bits, consisting of a few additional bits for each codeword, this paper also considers bundle IR, consisting of encoded IR bits which the receiver can use to refine the LLRs in multiple codewords.
The allocation of IR bits in a single link is modelled as a Markov Decision Process seeking to minimize a pre-determined cost function. The paper describes how the problem should be formulated and solved, resulting in a set of policies parameterized by the number of failures per codeword bundle, effective SNR of the received codewords, and coding rate. It then extends this single link framework to a relay scenario, where an intermediate node has to decide whether to decode (DF) or just amplify (AF) incoming bundles before forwarding them on. Finally, the paper studies a multiuser scenario where a single source broadcasts information to multiple receivers with different interests. It proposes transmitting encoded IR bits that benefit multiple receivers and formulates a convex problem to optimize their number and encoding.
Numerical simulations show that the proposed methods provide a modest increase in throughput compared to traditional HARQ schemes with fixed-length codeword extension. The proposed policy for the relay outperforms fixed forwarding strategies and the proposed strategy for broadcast systems significantly reduces the total number of IR bits needed to guarantee a given probability of success, compared to sending individual extension bits for each codeword. The increased flexibility in requesting different numbers and types of IR bits and the ability to make decisions based on the measurement of the received signals display significant advantages in limited feedback communication systems.

Author Contributions

Conceptualization, M.Z.; methodology, M.Z. and B.P.; software, M.Z., A.C. and B.P.; validation, M.Z. and B.P.; formal analysis, M.Z. and B.P.; writing—original draft preparation, M.Z., A.C. and B.P.; writing—review and editing, M.Z. and B.P.; supervision, B.P.; funding acquisition, B.P. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the CONEX-Plus Programme-Marie-Sklodowska Curie COFUND Action (H2020-MSCA-COFUND-2017- GA 801538), by AFRL and DARPA under grant 108818 and by Nokia Networks.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Tang, J.; Zhang, X. Quality-of-service driven power and rate adaptation over wireless links. IEEE Trans. Wirel. Commun. 2007, 6, 3058–3068. [Google Scholar] [CrossRef] [Green Version]
  2. Luo, J.; Rosenberg, C.; Girard, A. Engineering wireless mesh networks: Joint scheduling, routing, power control, and rate adaptation. IEEE/ACM Trans. Netw. 2010, 18, 1387–1400. [Google Scholar] [CrossRef]
  3. Peng, F.; Zhang, J.; Ryan, W.E. Adaptive modulation and coding for IEEE 802.11 n. In Proceedings of the Wireless Communications and Networking Conference, Kowloon, China, 11–15 March 2007; pp. 656–661. [Google Scholar]
  4. Castellanos, C.U.; Villa, D.L.; Rosa, C.; Pedersen, K.I.; Calabrese, F.D.; Michaelsen, P.H.; Michel, J. Performance of uplink fractional power control in UTRAN LTE. In Proceedings of the Vehicular Technology Conference, Singapore, 11–14 May 2008; pp. 2517–2521. [Google Scholar]
  5. Furht, B.; Ahson, S.A. Long Term Evolution: 3GPP LTE Radio and Cellular Technology; Crc Press: Boca Raton, FL, USA, 2016. [Google Scholar]
  6. Uhlemann, E.; Rasmussen, L.K.; Grant, A.J.; Wiberg, P.A. Optimal incremental-redundancy strategy for type-II hybrid ARQ. In Proceedings of the IEEE International Symposium on Information Theory, Pacifico Yokohama, Yokohama, Japan, 29 June–4 July 2003; p. 448. [Google Scholar]
  7. Visotsky, E.; Sun, Y.; Tripathi, V.; Honig, M.L.; Peterson, R. Reliability-based incremental redundancy with convolutional codes. IEEE Trans. Commun. 2005, 53, 987–997. [Google Scholar] [CrossRef]
  8. Szczecinski, L.; Khosravirad, S.R.; Duhamel, P.; Rahman, M. Rate allocation and adaptation for incremental redundancy truncated HARQ. IEEE Trans. Commun. 2013, 61, 2580–2590. [Google Scholar] [CrossRef]
  9. Kim, S.M.; Choi, W.; Ban, T.W.; Sung, D.K. Optimal rate adaptation for hybrid ARQ in time-correlated Rayleigh fading channels. IEEE Trans. Wirel. Commun. 2011, 10, 968–979. [Google Scholar] [CrossRef]
  10. Nguyen, K.D.; Rasmussen, L.K.; i Fàbregas, A.G.; Letzepis, N. MIMO ARQ with multibit feedback: Outage analysis. IEEE Trans. Inf. Theory 2011, 58, 765–779. [Google Scholar] [CrossRef] [Green Version]
  11. Lin, S.; Costello, D.J.; Miller, M.J. Automatic-repeat-request error-control schemes. IEEE Commun. Mag. 1984, 22, 5–17. [Google Scholar] [CrossRef]
  12. Polyanskiy, Y.; Poor, H.V.; Verdú, S. Feedback in the non-asymptotic regime. IEEE Trans. Inf. Theory 2011, 57, 4903–4925. [Google Scholar] [CrossRef] [Green Version]
  13. Zhao, M.M.; Zhang, G.; Xu, C.; Zhang, H.; Li, R.; Wang, J. An adaptive IR-HARQ scheme for polar codes by polarizing matrix extension. IEEE Commun. Lett. 2018, 22, 1306–1309. [Google Scholar] [CrossRef]
  14. Vakilinia, K.; Ranganathan, S.V.; Divsalar, D.; Wesel, R.D. Optimizing Transmission Lengths for Limited Feedback With Nonbinary LDPC Examples. IEEE Trans. Commun. 2016, 64, 2245–2257. [Google Scholar] [CrossRef] [Green Version]
  15. Vakilinia, K.; Williamson, A.R.; Ranganathan, S.V.; Divsalar, D.; Wesel, R.D. Feedback systems using non-binary LDPC codes with a limited number of transmissions. In Proceedings of the Information Theory Workshop (ITW), Hobart, TAS, Australia, 2–5 November 2014; pp. 167–171. [Google Scholar]
  16. Williamson, A.R.; Chen, T.Y.; Wesel, R.D. A rate-compatible sphere-packing analysis of feedback coding with limited retransmissions. In Proceedings of the Information Theory Proceedings (ISIT), Cambridge, MA, USA, 1–6 July 2012; pp. 2924–2928. [Google Scholar]
  17. Jabi, M.; El Hamss, A.; Szczecinski, L.; Piantanida, P. Multipacket hybrid ARQ: Closing gap to the ergodic capacity. IEEE Trans. Commun. 2015, 63, 5191–5205. [Google Scholar] [CrossRef] [Green Version]
  18. Kim, S.H.; Lee, S.J.; Sung, D.K. HARQ rate selection schemes in a multihop relay network with a delay constraint. IEEE Trans. Veh. Technol. 2014, 64, 2333–2348. [Google Scholar] [CrossRef]
  19. Wesel, R.D.; Vakilinia, K.; Ranganathan, S.V.; Divsalar, D. Resource-Aware Incremental Redundancy in Feedback and Broadcast. In International Zurich Seminar on Communications; ETH Zurich: Zürich, Switzerland, 2016; p. 63. [Google Scholar]
  20. Wang, X.; Liu, Q.; Giannakis, G.B. Analyzing and optimizing adaptive modulation coding jointly with ARQ for QoS-guaranteed traffic. IEEE Trans. Veh. Technol. 2007, 56, 710–720. [Google Scholar] [CrossRef]
  21. Szczecinski, L.; Duhamel, P.; Rahman, M. Adaptive incremental redundancy for HARQ transmission with outdated CSI. In Proceedings of the 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, Houston, TX, USA, 5–9 December 2011; pp. 1–6. [Google Scholar]
  22. European Telecommunications Standards Institute. LTE, Evolved Universal Terrestrial Radio Access (E-UTRA), Medium Access Control (MAC) Protocol Specification; Version 12.5.0 Release 12; European Telecommunications Standards Institute: Sophia Antipolis, France, 2015. [Google Scholar]
  23. European Telecommunications Standards Institute. LTE, Evolved Universal Terrestrial Radio Access (E-UTRA), Physical Layer Procedures; Version 14.2.0 Release 14; European Telecommunications Standards Institute: Sophia Antipolis, France, 2017. [Google Scholar]
  24. European Telecommunications Standards Institute. 5G, Study on New Radio (NR) Access Technology; Version 14.0.0 Release 14; European Telecommunications Standards Institute: Sophia Antipolis, France, 2017. [Google Scholar]
  25. Vangelista, L.; Centenaro, M. Performance evaluation of HARQ schemes for the internet of things. Computers 2018, 7, 48. [Google Scholar] [CrossRef] [Green Version]
  26. Ge, X.; Li, Z.; Li, S. 5G software defined vehicular networks. IEEE Commun. Mag. 2017, 55, 87–93. [Google Scholar] [CrossRef] [Green Version]
  27. Dao, N.N.; Park, M.; Kim, J.; Paek, J.; Cho, S. Resource-aware relay selection for inter-cell interference avoidance in 5G heterogeneous network for Internet of Things systems. Future Gener. Comput. Syst. 2019, 93, 877–887. [Google Scholar] [CrossRef]
  28. Shahjehan, W.; Bashir, S.; Mohammed, S.L.; Fakhri, A.B.; Adebayo Isaiah, A.; Khan, I.; Uthansakul, P. Efficient Modulation Scheme for Intermediate Relay-Aided IoT Networks. Appl. Sci. 2020, 10, 2126. [Google Scholar] [CrossRef] [Green Version]
  29. Levin, G.; Loyka, S. Amplify-and-forward versus decode-and-forward relaying: Which is better? In 22th International Zurich Seminar on Communications (IZS); Eidgenössische Technische Hochschule Zürich: Zürich, Switzerland, 2012. [Google Scholar]
  30. Pang, K.; Li, Y.; Vucetic, B. An improved hybrid ARQ scheme in cooperative wireless networks. In Proceedings of the 2008 IEEE 68th Vehicular Technology Conference, Calgary, BC, Canada, 21–24 September 2008; pp. 1–5. [Google Scholar]
  31. Wang, C.C.; Love, D.J.; Ogbe, D. Transcoding: A new strategy for relay channels. In Proceedings of the 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 3–6 October 2017; pp. 450–454. [Google Scholar]
  32. Chen, Z.; Li, T.; Fan, P.; Quek, T.Q.; Letaief, K.B. Cooperation in 5G heterogeneous networking: Relay scheme combination and resource allocation. IEEE Trans. Commun. 2016, 64, 3430–3443. [Google Scholar] [CrossRef]
  33. Metzner, J. An improved broadcast retransmission protocol. IEEE Trans. Commun. 1984, 32, 679–683. [Google Scholar] [CrossRef]
  34. Larsson, P.; Smida, B.; Koike-Akino, T.; Tarokh, V. Analysis of network coded HARQ for multiple unicast flows. IEEE Trans. Commun. 2013, 61, 722–732. [Google Scholar] [CrossRef] [Green Version]
  35. Zhu, H.; Smida, B.; Love, D.J. Optimization of Two-Way Network Coded HARQ with Overhead. IEEE Trans. Commun. 2020, 68, 3602–3613. [Google Scholar] [CrossRef]
  36. Bar-Yossef, Z.; Birk, Y.; Jayram, T.; Kol, T. Index coding with side information. IEEE Trans. Inf. Theory 2011, 57, 1479–1494. [Google Scholar] [CrossRef]
  37. Lee, N.; Dimakis, A.G.; Heath, R.W. Index coding with coded side-information. IEEE Commun. Lett. 2015, 19, 319–322. [Google Scholar] [CrossRef] [Green Version]
  38. Davey, M.C.; MacKay, D. Low-density parity check codes over GF (q). IEEE Commun. Lett. 1998, 2, 165–167. [Google Scholar] [CrossRef]
  39. Zhang, M.; Song, J.; Love, D.J.; Ogbe, D.; Ghosh, A.; Peleato, B. Increasing Throughput in Wireless Communications by Grouping Similar Quality Bits. IEEE Commun. Lett. 2020. [Google Scholar] [CrossRef]
  40. Polyanskiy, Y.; Poor, H.V.; Verdú, S. Channel coding rate in the finite blocklength regime. IEEE Trans. Inf. Theory 2010, 56, 2307–2359. [Google Scholar] [CrossRef]
  41. IEEE. IEEE 802.11n Wireless LAN Medium Access Control MAC and Physical Layer PHY Specifications; IEEE: Piscataway, NJ, USA, 2006. [Google Scholar]
  42. Zhang, M.; Peleato, B. HARQ Strategies for Relay Systems with Limited Feedback. In Proceedings of the 2019 53rd Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, 3–6 November 2019; pp. 1328–1332. [Google Scholar]
  43. Zhang, M.; Castillo, A.; Peleato, B. Optimizing HARQ feedback and incremental redundancy in wireless communications. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018; pp. 1–6. [Google Scholar]
  44. Li, Z.; Chen, L.; Zeng, L.; Lin, S.; Fong, W.H. Efficient encoding of quasi-cyclic low-density parity-check codes. IEEE Trans. Commun. 2006, 54, 71–81. [Google Scholar] [CrossRef]
  45. Wang, Z.; Cui, Z. Low-complexity high-speed decoder design for quasi-cyclic LDPC codes. IEEE Trans. Very Large Scale Integr. Syst. 2007, 15, 104–114. [Google Scholar] [CrossRef]
  46. Frenger, P.; Parkvall, S.; Dahlman, E. Performance comparison of HARQ with Chase combining and incremental redundancy for HSDPA. In Proceedings of the Vehicular Technology Conference, Atlantic City, NJ, USA, 7–11 October 2001; Volume 3, pp. 1829–1833. [Google Scholar]
  47. Courtade, T.A.; Wesel, R.D. Optimal allocation of redundancy between packet-level erasure coding and physical-layer channel coding in fading channels. IEEE Trans. Commun. 2011, 59, 2101–2109. [Google Scholar] [CrossRef] [Green Version]
  48. Richardson, T.; Urbanke, R. Modern Coding Theory; Cambridge University Press: Cambridge, UK, 2008. [Google Scholar]
  49. Bertsekas, D.P. Dynamic Programming and Optimal Control; Athena Scientific: Belmont, MA, USA, 1995; Volume 1. [Google Scholar]
  50. Maddah-Ali, M.A.; Niesen, U. Fundamental limits of caching. IEEE Trans. Inf. Theory 2014, 60, 2856–2867. [Google Scholar] [CrossRef] [Green Version]
  51. Wang, S.; Peleato, B. Coded Caching with Heterogeneous User Profiles. In Proceedings of the 2019 IEEE International Symposium on Information Theory (ISIT), Paris, France, 7–12 July 2019; pp. 2619–2623. [Google Scholar]
  52. Boyd, S.P.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
Figure 1. Relay system model.
Figure 1. Relay system model.
Applsci 10 07917 g001
Figure 2. Types of incremental redundancy.
Figure 2. Types of incremental redundancy.
Applsci 10 07917 g002
Figure 3. SNR after updating the log-likelihood ratios (LLRs) of f bits based on a transmission of their XOR with S N R I R = 0 dB.
Figure 3. SNR after updating the log-likelihood ratios (LLRs) of f bits based on a transmission of their XOR with S N R I R = 0 dB.
Applsci 10 07917 g003
Figure 4. Decoding failure probability for a signal with E b = 1 and variable noise variance. The four solid curves, which correspond to combinations with the same S N R eff , are nearly identical.
Figure 4. Decoding failure probability for a signal with E b = 1 and variable noise variance. The four solid curves, which correspond to combinations with the same S N R eff , are nearly identical.
Applsci 10 07917 g004
Figure 5. α and β decision for R = 2 / 3 and S N R I R = S N R .
Figure 5. α and β decision for R = 2 / 3 and S N R I R = S N R .
Applsci 10 07917 g005
Figure 6. Throughput of different incremental redundancy (IR) schemes for a single link.
Figure 6. Throughput of different incremental redundancy (IR) schemes for a single link.
Applsci 10 07917 g006
Figure 7. Relay decision map, shown for R 1 = 2 / 3 .
Figure 7. Relay decision map, shown for R 1 = 2 / 3 .
Applsci 10 07917 g007
Figure 8. Average throughput of different relay strategies in AWGN channel.
Figure 8. Average throughput of different relay strategies in AWGN channel.
Applsci 10 07917 g008
Figure 9. Average throughput of different relay strategies in fading channel.
Figure 9. Average throughput of different relay strategies in fading channel.
Applsci 10 07917 g009
Figure 10. Average number of IR bits required to guarantee that the probability of decoding failure after IR is below γ for all users.
Figure 10. Average number of IR bits required to guarantee that the probability of decoding failure after IR is below γ for all users.
Applsci 10 07917 g010
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhang, M.; Castillo, A.; Peleato, B. Optimizing HARQ and Relay Strategies in Limited Feedback Communication Systems. Appl. Sci. 2020, 10, 7917. https://doi.org/10.3390/app10217917

AMA Style

Zhang M, Castillo A, Peleato B. Optimizing HARQ and Relay Strategies in Limited Feedback Communication Systems. Applied Sciences. 2020; 10(21):7917. https://doi.org/10.3390/app10217917

Chicago/Turabian Style

Zhang, Mai, Andres Castillo, and Borja Peleato. 2020. "Optimizing HARQ and Relay Strategies in Limited Feedback Communication Systems" Applied Sciences 10, no. 21: 7917. https://doi.org/10.3390/app10217917

APA Style

Zhang, M., Castillo, A., & Peleato, B. (2020). Optimizing HARQ and Relay Strategies in Limited Feedback Communication Systems. Applied Sciences, 10(21), 7917. https://doi.org/10.3390/app10217917

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop