Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (49)

Search Parameters:
Keywords = retransmission scenario

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
17 pages, 372 KiB  
Article
Layered HARQ Design for LDPC-Based Multi-Level Coded Modulation
by Yuejun Wei, Yue Chen, Chunqi Chen, Bin Xia and Liandong Wang
Entropy 2025, 27(6), 629; https://doi.org/10.3390/e27060629 - 13 Jun 2025
Viewed by 531
Abstract
Multi-level coded modulation (MLCM) enhances data transmission by allocating error correction more effectively to bits with higher error probabilities, thus optimizing redundancy and improving performance. Despite MLCM’s advantages over traditional bit-interleaved coded modulation (BICM) systems in certain scenarios, its integration with hybrid automatic [...] Read more.
Multi-level coded modulation (MLCM) enhances data transmission by allocating error correction more effectively to bits with higher error probabilities, thus optimizing redundancy and improving performance. Despite MLCM’s advantages over traditional bit-interleaved coded modulation (BICM) systems in certain scenarios, its integration with hybrid automatic repeat request (HARQ) systems remains underexplored. HARQ, which combines the benefits of forward error correction (FEC) and automatic repeat request (ARQ), significantly increases resilience to interference and fading, enhancing overall system reliability. This paper bridges the gap by integrating HARQ techniques into the MLCM framework, which was specifically adapted to the layered nature of MLCM. We present tailored hybrid retransmission strategies for each layer of MLCM, demonstrating substantial gains in retransmission efficiency and overall transmission performance. Full article
(This article belongs to the Special Issue LDPC Codes for Communication Systems)
Show Figures

Figure 1

23 pages, 5845 KiB  
Article
Ad-BBR: Enhancing Round-Trip Time Fairness and Transmission Stability in TCP-BBR
by Mingjun Wang, Xuezhi Zhang, Feng Jing and Mei Gao
Future Internet 2025, 17(5), 189; https://doi.org/10.3390/fi17050189 - 22 Apr 2025
Viewed by 679
Abstract
The rapid development of wireless network technology and the continuous evolution of network service demands have raised higher requirements for congestion control algorithms. In 2016, Google proposed the Bottleneck Bandwidth and Round-trip propagation time (BBR) congestion control algorithm based on the Transmission Control [...] Read more.
The rapid development of wireless network technology and the continuous evolution of network service demands have raised higher requirements for congestion control algorithms. In 2016, Google proposed the Bottleneck Bandwidth and Round-trip propagation time (BBR) congestion control algorithm based on the Transmission Control Protocol (TCP) protocol. While BBR offers lower latency and higher throughput compared to traditional congestion control algorithms, it still faces challenges. These include the periodic triggering of the ProbeRTT phase, which impairs data transmission efficiency, data over-injection caused by the congestion window (CWND) value-setting policy, and the difficulty of coordinating resource allocation across multiple concurrent flows. These limitations make BBR less effective in multi-stream competition scenarios in high-speed wireless networks. This paper analyzes the design limitations of the BBR algorithm from a theoretical perspective and proposes the Adaptive-BBR (Ad-BBR) algorithm. The Ad-BBR algorithm incorporates real-time RTT and link queue-state information, introduces a new RTprop determination mechanism, and implements a finer-grained, RTT-based adaptive transmission rate adjustment mechanism to reduce data over-injection and improve RTT fairness. Additionally, the ProbeRTT phase-triggering mechanism is updated to ensure more stable and smoother data transmission. In the NS3, 5G, and Wi-Fi simulation experiments, Ad-BBR outperformed all comparison algorithms by effectively mitigating data over-injection and minimizing unnecessary entries into the ProbeRTT phase. Compared to the BBRv1 algorithm, Ad-BBR achieved a 17% increase in throughput and a 30% improvement in RTT fairness, along with a 13% reduction in the retransmission rate and an approximate 20% decrease in latency. Full article
Show Figures

Figure 1

31 pages, 9117 KiB  
Article
Intelligent Omni-Surface-Assisted Cooperative Hybrid Non-Orthogonal Multiple Access: Enhancing Spectral Efficiency Under Imperfect Successive Interference Cancellation and Hardware Distortions
by Helen Sheeba John Kennedy and Vinoth Babu Kumaravelu
Sensors 2025, 25(7), 2283; https://doi.org/10.3390/s25072283 - 3 Apr 2025
Cited by 1 | Viewed by 460
Abstract
Non-orthogonal multiple access (NOMA) has emerged as a key enabler of massive connectivity in next-generation wireless networks. However, conventional NOMA studies predominantly focus on two-user scenarios, limiting their scalability in practical multi-user environments. A critical challenge in these systems is error propagation in [...] Read more.
Non-orthogonal multiple access (NOMA) has emerged as a key enabler of massive connectivity in next-generation wireless networks. However, conventional NOMA studies predominantly focus on two-user scenarios, limiting their scalability in practical multi-user environments. A critical challenge in these systems is error propagation in successive interference cancellation (SIC), which is further exacerbated by hardware distortions (HWDs). Hybrid NOMA (HNOMA) mitigates SIC errors and reduces system complexity, yet cell-edge users (CEUs) continue to experience degraded sum spectral efficiency (SSE) and throughput. Cooperative NOMA (C-NOMA) enhances CEU performance through retransmissions but incurs higher energy consumption. To address these limitations, this study integrates intelligent omni-surfaces (IOSs) into a cooperative hybrid NOMA (C-HNOMA) framework to enhance retransmission efficiency and extend network coverage. The closed-form expressions for average outage probability and throughput are derived, and a power allocation (PA) optimization framework is proposed to maximize SSE, with validation through Monte Carlo simulations. The introduction of a novel strong–weak strong–weak (SW-SW) user pairing strategy capitalizes on channel diversity, achieving an SSE improvement of ∼0.48% to ∼3.81% over conventional pairing schemes. Moreover, the proposed system demonstrates significant performance gains as the number of IOS elements increases, even under imperfect SIC (iSIC) and HWD conditions. By optimizing PA values, SSE is further enhanced by at least 2.24%, even with an SIC error of 0.01 and an HWD level of 8%. These results underscore the potential of an IOS-assisted C-HNOMA system with SW-SW pairing as a viable solution for improving multi-user connectivity, SSE, and system robustness in future wireless communication networks. Full article
(This article belongs to the Special Issue Performance Analysis of Wireless Communication Systems)
Show Figures

Graphical abstract

32 pages, 2784 KiB  
Article
Adaptive Jamming Mitigation for Clustered Energy-Efficient LoRa-BLE Hybrid Wireless Sensor Networks
by Carolina Del-Valle-Soto, Leonardo J. Valdivia, Ramiro Velázquez, José A. Del-Puerto-Flores, José Varela-Aldás and Paolo Visconti
Sensors 2025, 25(6), 1931; https://doi.org/10.3390/s25061931 - 20 Mar 2025
Viewed by 1030
Abstract
Wireless sensor networks (WSNs) are fundamental for modern IoT applications, yet they remain highly vulnerable to jamming attacks, which significantly degrade communication reliability and energy efficiency. This paper proposes a novel adaptive cluster-based jamming mitigation algorithm designed for heterogeneous WSNs that integrate LoRa [...] Read more.
Wireless sensor networks (WSNs) are fundamental for modern IoT applications, yet they remain highly vulnerable to jamming attacks, which significantly degrade communication reliability and energy efficiency. This paper proposes a novel adaptive cluster-based jamming mitigation algorithm designed for heterogeneous WSNs that integrate LoRa and Bluetooth Low Energy (BLE) technologies. The proposed strategy dynamically switches between communication protocols, optimizes energy consumption, and reduces retransmissions under interference conditions by leveraging real-time network topology adjustments and adaptive transmission power control. Through extensive experimental validation, we demonstrate that our mitigation mechanism reduces energy consumption by up to 38% and lowers packet retransmission rates by 47% compared to single-protocol networks under jamming conditions. Additionally, our results indicate that the hybrid LoRa-BLE approach outperforms standalone LoRa and BLE configurations in terms of network resilience, adaptability, and sustained data transmission under attack scenarios. This work advances the state-of-the-art by introducing a multi-protocol interference-resilient communication strategy, paving the way for more robust, energy-efficient, and secure WSN deployments in smart cities, industrial IoT, and critical infrastructure monitoring. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

20 pages, 8921 KiB  
Article
A Survey of IEEE 802.11ax WLAN Temporal Duty Cycle for the Assessment of RF Electromagnetic Exposure
by Yizhen Yang, Günter Vermeeren, Leen Verloock, Mònica Guxens and Wout Joseph
Appl. Sci. 2025, 15(5), 2858; https://doi.org/10.3390/app15052858 - 6 Mar 2025
Viewed by 1248
Abstract
The increasing deployment of IEEE 802.11ax (Wi-Fi 6) networks necessitates an accurate assessment of radiofrequency electromagnetic field (RF-EMF) exposure under realistic usage scenarios. This study investigates the duty cycle (DC) and corresponding exposure levels of Wi-Fi 6 in controlled laboratory conditions, focusing on [...] Read more.
The increasing deployment of IEEE 802.11ax (Wi-Fi 6) networks necessitates an accurate assessment of radiofrequency electromagnetic field (RF-EMF) exposure under realistic usage scenarios. This study investigates the duty cycle (DC) and corresponding exposure levels of Wi-Fi 6 in controlled laboratory conditions, focusing on bandwidth variations, multi-user scenarios, and application types. DC measurements reveal significant variability across internet services, with FTP upload exhibiting the highest mean DC (94.3%) under 20 MHz bandwidth, while YouTube 4K video streaming showed bursts with a maximum DC of 89.2%. Under poor radio conditions, DC increased by up to 5× for certain applications, emphasizing the influence of degraded signal-to-noise ratio (SNR) on retransmissions and modulation. Weighted exposure results indicate a reduction in average electric-field strength by up to 10× when incorporating DC, with maximum weighted exposure at 4.2 V/m (6.9% of ICNIRP limits) during multi-user scenarios. These findings highlight the critical role of realistic DC assessments in refining exposure evaluations, ensuring regulatory compliance, and advancing the understanding of Wi-Fi 6’s EMF exposure implications. Full article
(This article belongs to the Special Issue Electromagnetic Radiation and Human Environment)
Show Figures

Figure 1

22 pages, 3029 KiB  
Article
FaCoCo-RED: A Fast Response Congestion Control Mechanism for Constrained Application Protocol
by Chanwit Suwannapong, Sarutte Atsawaraungsuk, Kritsanapong Somsuk and Pitsanu Chaichitwanidchakol
Electronics 2025, 14(1), 28; https://doi.org/10.3390/electronics14010028 - 25 Dec 2024
Viewed by 771
Abstract
The rapid growth of the Internet of Things (IoT) has contributed to significant challenges in dealing with congestion within IoT communications due to high packet error rates, latency, and interference in networks. With an emphasis on the Constrained Application Protocol (CoAP), the present [...] Read more.
The rapid growth of the Internet of Things (IoT) has contributed to significant challenges in dealing with congestion within IoT communications due to high packet error rates, latency, and interference in networks. With an emphasis on the Constrained Application Protocol (CoAP), the present study aims to propose the design and development of a novel congestion control mechanism, namely, Fast Response Congestion Control—Random Early Detection, abbreviated as FaCoCo-RED, along with performance analysis and comparison of congestion management efficacy between FaCoCo-RED and Default CoAP Congestion Control (Default CoAP CC) under a Cooja simulator on the Contiki OS platform. The findings from both experiment and performance analysis, which were based on statistical testing, showed that, under medium-scale to large-scale node networks across all traffic scenarios in this study, FaCoCo-RED significantly outperformed Default CoAP CC. The improvement can be seen in such metrics as average throughput, packet loss, response time, settling time, and retransmission timeout values (RTOs). The experimental findings also showed that FaCoCo-RED can perform effectively within the IoT networks, thus potentially enhancing the reliability and scalability of CoAP for large-scale and more complex IoT applications in the future. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

17 pages, 1320 KiB  
Article
Finite-Blocklength Analysis of Coded Modulation with Retransmission
by Ming Jiang, Yi Wang, Fan Ding and Qiushi Xu
Entropy 2024, 26(10), 863; https://doi.org/10.3390/e26100863 - 14 Oct 2024
Viewed by 1005
Abstract
The rapid developments of 5G and B5G networks have posed higher demands on retransmission in certain scenarios. This article reviews classical finite-length coding performance prediction formulas and proposes rate prediction formulas for coded modulation retransmission scenarios. Specifically, we demonstrate that a recently proposed [...] Read more.
The rapid developments of 5G and B5G networks have posed higher demands on retransmission in certain scenarios. This article reviews classical finite-length coding performance prediction formulas and proposes rate prediction formulas for coded modulation retransmission scenarios. Specifically, we demonstrate that a recently proposed model for correcting these prediction formulas also exhibits high accuracy in coded modulation retransmissions. To enhance the generality of this model, we introduce a range variable Pfinal to unify the predictions with different SNRs. Finally, based on simulation results, the article puts forth recommendations specific to retransmission with a high spectral efficiency. Full article
(This article belongs to the Special Issue Information Theory and Network Coding II)
Show Figures

Figure 1

19 pages, 728 KiB  
Article
On the Interplay between Deadline-Constrained Traffic and the Number of Allowed Retransmissions in Random Access Networks
by Nikolaos Nomikos, Themistoklis Charalambous, Risto Wichman, Yvonne-Anne Pignolet and Nikolaos Pappas
Entropy 2024, 26(8), 655; https://doi.org/10.3390/e26080655 - 30 Jul 2024
Viewed by 1411
Abstract
In this paper, a network comprising wireless devices equipped with buffers transmitting deadline-constrained data packets over a slotted-ALOHA random-access channel is studied. Although communication protocols facilitating retransmissions increase reliability, a packet awaiting transmission from the queue experiences delays. Thus, packets with time constraints [...] Read more.
In this paper, a network comprising wireless devices equipped with buffers transmitting deadline-constrained data packets over a slotted-ALOHA random-access channel is studied. Although communication protocols facilitating retransmissions increase reliability, a packet awaiting transmission from the queue experiences delays. Thus, packets with time constraints might be dropped before being successfully transmitted, while at the same time causing the queue size of the buffer to increase. To understand the trade-off between reliability and delays that might lead to packet drops due to deadline-constrained bursty traffic with retransmissions, the scenario of a wireless network utilizing a slotted-ALOHA random-access channel is investigated. The main focus is to reveal the trade-off between the number of retransmissions and the packet deadline as a function of the arrival rate. Towards this end, analysis of the system is performed by means of discrete-time Markov chains. Two scenarios are studied: (i) the collision channel model (in which a receiver can decode only when a single packet is transmitted), and (ii) the case for which receivers have multi-packet reception capabilities. A performance evaluation for a user with different transmit probabilities and number of retransmissions is conducted. We are able to determine numerically the optimal probability of transmissions and the number of retransmissions, given the packet arrival rate and the packet deadline. Furthermore, we highlight the impact of transmit probability and the number of retransmissions on the average drop rate and throughput. Full article
(This article belongs to the Special Issue Information Theory and Coding for Wireless Communications II)
Show Figures

Figure 1

32 pages, 5572 KiB  
Article
Performance Evaluation of Mobile RPL-Based IoT Networks under Hello Flood Attack
by Amal Hkiri, Sami Alqurashi, Omar Ben Bahri, Mouna Karmani, Hamzah Faraj and Mohsen Machhout
Electronics 2024, 13(11), 2226; https://doi.org/10.3390/electronics13112226 - 6 Jun 2024
Cited by 6 | Viewed by 2083
Abstract
The RPL protocol is essential for efficient communication within the Internet of Things (IoT) ecosystem, yet it remains vulnerable to various attacks, particularly in dense and mobile environments where it shows certain limitations and susceptibilities. This paper presents a comprehensive simulation-based analysis of [...] Read more.
The RPL protocol is essential for efficient communication within the Internet of Things (IoT) ecosystem, yet it remains vulnerable to various attacks, particularly in dense and mobile environments where it shows certain limitations and susceptibilities. This paper presents a comprehensive simulation-based analysis of the RPL protocol’s vulnerability to the Hello Flood attack in mobile environments. Using four different group mobility models—the Column Mobility Model (CMM), Reference Point Group Mobility Model (RPGM), Nomadic Community Mobility Model (NCM), and Pursue Mobility Model (PMM)—within the Cooja simulator, this study uniquely investigates the Hello Flood attack in mobile settings, an area previously overlooked. Our systematic evaluation focuses on critical performance metrics, including the Packet Delivery Ratio (PDR), End-to-End Delay (E2ED), throughput, Expected Transmission Count (ETX), and Average Power Consumption (APC). The findings reveal several key insights: PDR decreases significantly, indicating increased packet loss or delivery failures; ETX values rise, necessitating more packet retransmissions and routing hops; E2ED increases, introducing delays in routing decisions and data transmission times; throughput declines as the attack disrupts data flow; and APC escalates due to higher energy usage on packet transmissions, especially over extended paths. These results underscore the urgent need for robust security measures to protect RPL-based IoT networks in mobile environments. Furthermore, our work emphasizes the exacerbated impact of the attack in mobile scenarios, highlighting the evolving security requirements of IoT networks. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

20 pages, 19884 KiB  
Article
An Attention-Guided Complex-Valued Transformer for Intra-Pulse Retransmission Interference Suppression
by Yifan Wang, Yibing Li, Zitao Zhou, Gang Yu and Yingsong Li
Remote Sens. 2024, 16(11), 1989; https://doi.org/10.3390/rs16111989 - 31 May 2024
Cited by 2 | Viewed by 1130
Abstract
With the maturation of digital radio frequency memory (DRFM) technology, various intra-pulse retransmission interference methods have emerged. These flexible and changeable retransmission interference methods pose significant challenges to radar detection tasks, particularly in modern battlefields. This paper proposes an attention-guided complex-valued transformer (AGCT) [...] Read more.
With the maturation of digital radio frequency memory (DRFM) technology, various intra-pulse retransmission interference methods have emerged. These flexible and changeable retransmission interference methods pose significant challenges to radar detection tasks, particularly in modern battlefields. This paper proposes an attention-guided complex-valued transformer (AGCT) as a solution. First, the encoder maps the received signal contaminated by interference and noise into a high-dimensional space. Then, the dilated convolution block (DCB) group and attention block (AB) group in the mask estimator extract the delicate multi-scale features and large-scale features of the interference, respectively, to obtain a multidimensional space mask. Finally, the decoder restores interference to the time domain and outputs the estimated target echo using residual learning. Considering the characteristics of intra-pulse interference, we introduced the energy attention block (EAB) at the end of the DCBs and the ABs within our network. This addition ensures a heightened focus on extracting interference features. Furthermore, we implemented a curriculum learning strategy during the network training. This approach gradually acclimates the network to fit different types of retransmission interference, starting from simpler to more complex scenarios. Our extensive experiments, conducted under various conditions, have provided compelling evidence of the AGCT’s superior performance. Compared to the comparative network, the AGCT’s advantages are particularly pronounced under more harsh conditions, demonstrating its robustness and effectiveness. Full article
Show Figures

Graphical abstract

22 pages, 2186 KiB  
Article
Autonomous Scheduling for Reliable Transmissions in Industrial Wireless Sensor Networks
by Armaghan Darbandi and Myung-Kyun Kim
Energies 2023, 16(20), 7039; https://doi.org/10.3390/en16207039 - 11 Oct 2023
Cited by 2 | Viewed by 1395
Abstract
Deploying Internet of Things (IoT) on low-power lossy wireless sensor/actuator networks (LLN) in harsh industrial environments presents challenges such as dynamic link qualities due to noise, signal attenuations and spurious interferences. However, the critical demand for industrial applications is reliability of data delivery [...] Read more.
Deploying Internet of Things (IoT) on low-power lossy wireless sensor/actuator networks (LLN) in harsh industrial environments presents challenges such as dynamic link qualities due to noise, signal attenuations and spurious interferences. However, the critical demand for industrial applications is reliability of data delivery on low-cost low-power sensor/actuator devices. To address these issues, this paper proposes a fully autonomous scheduling approach, called Auto-Sched, which ensures reliability of data delivery for both downlink and uplink traffic scheduling and enhances network robustness against node/link failures. To ensure reliability, Auto-Sched assigns retransmission time slots based on the reliability constraints of the communication link. To avoid collision issues, Auto-Sched creates an upward pipeline-like communication schedule for uplink end-to-end data delivery, and a downward pipeline-like communication schedule for downlink scheduling. For enhancing network robustness, we propose a simple algorithm for real-time autonomous schedule reconstruction, when node or link failures occur, with minimal influence on communication overhead. Performance evaluations quantified the performance of our proposed approaches under a variety of scenarios comparing them with existing approaches. Full article
Show Figures

Figure 1

19 pages, 13148 KiB  
Article
An Adaptive Hybrid Automatic Repeat Request (A-HARQ) Scheme Based on Reinforcement Learning
by Shih-Yang Lin, Miao-Hui Yang and Shuo Jia
Electronics 2023, 12(19), 4127; https://doi.org/10.3390/electronics12194127 - 3 Oct 2023
Cited by 2 | Viewed by 3316
Abstract
V2X communication is susceptible to attenuation and fading caused by external interference. This interference often leads to bit error and poor quality and stability of the wireless link, and it can easily disrupt packet transmission. In order to enhance communication reliability, the 3rd [...] Read more.
V2X communication is susceptible to attenuation and fading caused by external interference. This interference often leads to bit error and poor quality and stability of the wireless link, and it can easily disrupt packet transmission. In order to enhance communication reliability, the 3rd Generation Partnership Project (3GPP) introduced the Hybrid Automatic Repeat Request (HARQ) technology for both 4G and 5G systems. Nevertheless, it can be improved for poor communication conditions (e.g., heavy traffic flow, long-distance transmission), especially in advanced or cooperative driving scenarios. In this paper, we propose an Adaptive Hybrid Automatic Repeat Request (A-HARQ) scheme that can reduce the average block error rate, the average number of retransmissions, and the round-trip time (RTT). It adapts the Q-learning model to select the timing and frequency of retransmission to enhance the transmission reliability. We also design some transmission schemes—K-repetition, T-delay and [T, K]-overlap—which are used to shorten latency and avoid packet collision. Compared with the conventional 5G HARQ, our simulation results show that the proposed A-HARQ scheme decreases the system’s average BLER, the number of retransmissions, and the RTT to 5.55%, 1.55 ms, and 0.97 ms, respectively. Full article
(This article belongs to the Special Issue Artificial Intelligence for Wireless Networks)
Show Figures

Figure 1

20 pages, 3232 KiB  
Article
Asynchronous Pattern-Designed Channel Access Protocol in Underwater Acoustic Wireless Sensor Networks
by Jie Ren, Yanbo Wu and Min Zhu
J. Mar. Sci. Eng. 2023, 11(10), 1899; https://doi.org/10.3390/jmse11101899 - 29 Sep 2023
Cited by 1 | Viewed by 1378
Abstract
Due to the significant propagation delay in underwater sensor networks, conflict retransmission in channel access protocols comes at a high cost. This poses a challenge in scenarios where multiple sensor nodes generate data frames with strong temporal correlations, such as in disaster warning [...] Read more.
Due to the significant propagation delay in underwater sensor networks, conflict retransmission in channel access protocols comes at a high cost. This poses a challenge in scenarios where multiple sensor nodes generate data frames with strong temporal correlations, such as in disaster warning applications. Traditional channel allocation and timeout-based retransmission mechanisms lead to considerable access delays, making it difficult to meet the requirements. To tackle this issue, we propose the asynchronous pattern-designed random access (APDRA) protocol. This protocol enhances the access probability by designing retransmission time intervals for data frames based on pattern design. Additionally, we introduce a successive interference cancellation (SIC) mechanism at the receiver for decoding. This mechanism facilitates the transformation of the conventional method of discarding conflicted data frames into iterative decoding, thereby enhancing transmission efficiency. Via the utilization of simulations, we compare the APDRA protocol conventional underwater medium access control (MAC) protocols and existing retransmission mechanisms. The results demonstrate that the APDRA protocol has the ability to improve both the transmission success ratio (TSR) and reduces the access delay to some extent. Full article
(This article belongs to the Special Issue Underwater Acoustic Communication and Network)
Show Figures

Figure 1

17 pages, 723 KiB  
Article
Raptor-like Coded Broadcasting for Efficient V2X Communications
by Zuolin Jin, Huan Li, Jingxuan Huang, Xinyi Wang, Zhiyuan Tan, Pengpeng Dong and Zesong Fei
Electronics 2023, 12(18), 3951; https://doi.org/10.3390/electronics12183951 - 19 Sep 2023
Cited by 1 | Viewed by 1487
Abstract
Broadcasting is a critical feature in V2X communication, allowing for the simultaneous dissemination of safety-critical messages to all nearby vehicles. However, the requirement for low latency in information dissemination and the need for reliable and efficient data transmission pose significant challenges to broadcasting [...] Read more.
Broadcasting is a critical feature in V2X communication, allowing for the simultaneous dissemination of safety-critical messages to all nearby vehicles. However, the requirement for low latency in information dissemination and the need for reliable and efficient data transmission pose significant challenges to broadcasting in V2X communication systems. In this paper, we present a novel raptor-like coded broadcasting (RLCB) scheme for low-latency V2X communications. Firstly, we introduce feedback into a concatenated fountain code, and adjust its precoding and coding structure to achieve effective data deliverance under a limited number of retransmissions for low-latency transmission. Then, based on the raptor-like encoding and decoding structure, we propose a mutual exclusion-based network encoding (MENC) algorithm to enable retransmission in broadcasting scenarios. We also conduct a complexity analysis on the encoding and decoding process of our proposed scheme. Numerical results demonstrate the superior performance of our proposed scheme in reducing the packet error rate (PER) and improving spectral efficiency compared to the R10 code and hybrid automatic repeat request (HARQ) scheme. Full article
Show Figures

Figure 1

23 pages, 1601 KiB  
Article
Multi-Connectivity-Based Adaptive Fractional Packet Duplication in Cellular Networks
by Rahul Arun Paropkari and Cory Beard
Signals 2023, 4(1), 251-273; https://doi.org/10.3390/signals4010014 - 22 Mar 2023
Cited by 4 | Viewed by 2426
Abstract
Mobile networks of the fifth generation have stringent requirements for data throughput, latency and reliability. Dual or multi-connectivity is implemented to meet the mobility requirements for certain essential 5G use cases, and this ensures the user’s connection to one or more radio links. [...] Read more.
Mobile networks of the fifth generation have stringent requirements for data throughput, latency and reliability. Dual or multi-connectivity is implemented to meet the mobility requirements for certain essential 5G use cases, and this ensures the user’s connection to one or more radio links. Packet duplication (PD) over multi-connectivity is a method of compensating for lost packets by reducing re-transmissions on the same erroneous wireless channel. Utilizing two or more uncorrelated links, a high degree of availability can be attained with this strategy. However, complete packet duplication is inefficient and frequently unnecessary. The wireless channel conditions can change frequently and not allow for a PD. We provide a novel adaptive fractional packet duplication (A-FPD) mechanism for enabling and disabling packet duplication based on a variety of parameters. The signal-to-interference-plus-noise ratio (SINR) and fade duration outage probability (FDOP) are important performance indicators for wireless networks and are used to evaluate and contrast several packet duplication scenarios. Using ns-3 and MATLAB, we present our simulation results for the multi-connectivity and proposed A-FPD schemes. Our technique merely duplicates enough packets across multiple connections to meet the outage criteria. Full article
(This article belongs to the Special Issue B5G/6G Networks: Directions and Advances)
Show Figures

Figure 1

Back to TopTop