• 沒有找到結果。

PERFORMANCE ANALYSIS OF EFFICIENT CONCATENATED CODING SCHEME FOR ARQ PROTOCOLS

N/A
N/A
Protected

Academic year: 2021

Share "PERFORMANCE ANALYSIS OF EFFICIENT CONCATENATED CODING SCHEME FOR ARQ PROTOCOLS"

Copied!
5
0
0

加載中.... (立即查看全文)

全文

(1)

Performance analysis of efficient concatenated

coding scheme for ARQ protocols

T.-H. Lee

lndexing terms: Codes and decoding, Communication, Data transmission

Abstract: Benelli investigated the performance of two concatenated coding schemes for ARQ proto- cols. The two schemes differ in their strategies of retransmission. It was shown that the two schemes proposed by Benelli provide a significant improve- ment in throughput efficiency of ARQ protocols with respect to other similar schemes. The analysis presented by Benelli is complicated. An alternative analysis is provided. Some implementation prob- lems of the Benelli's schemes are also discussed. An efficient retransmission strategy which avoids unnecessary retransmissions and maintains a fixed decoding complexity is proposed.

1 Introduction

Forward error correction (FEC) and automatic repeat request (ARQ) are common techniques used to handle transmission errors when data are transmitted over noisy channels. In practical applications where feedback is pos- sible, ARQ techniques are often more preferable than FEC schemes because error detection requires much simpler decoding equipment and achieves a higher relia- bility than does error correction. When the channel is very noisy, the system throughput is smaller for ARQ techniques than FEC schemes because, in this situation, retransmissions will be requested too frequently. Con- catenated coding schemes, which combine the concepts of

FEC and ARQ [6,7] can provide a high system through-

put and maintain a high system reliability for communi- cations over quite noisy channels.

Fig. 1 shows the structure of a communication system using a concatenated coding scheme. Two linear block

outer code inner code ( n 2 , k2) ("1, kl) source

t

feedback I outer inner decoder decoder user

Fig. 1 Communication system using concatenated coding scheme

Paper 79881 (E7, E8), first received 7th April 1990 and in revised form

11th February 1991

The author is with the Department of Communication Engineering and Centre for Telecommunications Research, National Chiao Tung Uni- versity, 1001 Ta Hsueh Road, Hsinchu, Taiwan 30050, Republic of China

codes, denoted by C , and C , , are used in the concate- nated coding scheme. The inner code C, is of the type (n,, k , ) which can correct t errors and detect 1 2 t errors. The outer code C, is of the type (n,, k,) which is used only for error detection. It is assumed that n2 = mk,, where m is an integer. A message of k , bits is first encoded into a codeword of n, bits by code C , . This codeword is divided into m sub-blocks of k , bits. Each sub-block is then encoded by code C, into a codeword of n, bits, called a frame. Fig. 2 illustrates the format of a block obtained from the concatenated coding scheme.

-frame

L

k l J n l - k l l

Fig. 2 Block format of concatenated codeword

Benelli proposed and analysed two concatenated coding schemes for ARQ protocols [8]. These two schemes differ in their strategies of retransmission. It was shown that the throughput efficiencies of the stop-and- wait (SW), the go-back-N (GBN) and the selective-repeat (SR) ARQ protocols can be significantly improved using the Benelli's schemes with respect to other similar schemes. The analysis provided in Reference 8 is rather complicated. The expression of the probability that a frame is decoded with an undetected error pattern given in Reference 8 (which was denoted as Pud) is correct only when the inner code C, is used for error detection only. The results presented in Reference 8 should be modified if the code C, is used for both error detection and correc- tion. Some implementation problems of Benelli's schemes will be discussed.

This paper provides an alternative analysis for the scheme 1 proposed by Benelli and proposes and analyses IEE PROCEEDINGS-I, Vol. 138, No. 3, J U N E 1991 148

(2)

an efficient retransmission strategy which avoids unneces- sary retransmissions and maintains a fixed decoding complexity. The proposed retransmission strategy is described, followed by the analysis. Numerical results and discussions are presented, and some conclusions are finally drawn.

2 Proposed scheme

The proposed concatenated coding scheme is a modifi- cation of scheme 1 proposed by Benelli

[SI.

Benelli's schemes are first reviewed. The receiver is assumed to contain a buffer for block storage and a register R capable of storing m bits. The m bits of R are initially set to zero. When a block is received for the first time, frames are analysed using the inner code C,. If frame i does not contain a detectable error pattern, then this frame is stored in buffer and the ith bit of R is set to one. After all the m frames are analysed, a retransmission of the block is requested as long as there exist some bits of R whose contents are zeros. The retransmission strategies of scheme 1 and scheme 2 are different.

In scheme 1, the whole data block is retransmitted if the receiver requests a retransmission. The receiver analyses the pth frame only if the pth bit of R is zero. If the pth frame of the currently received block does not contain a detectable error pattern, then this frame is stored in buffer and the pth bit of R is set to one. After all the m frames are examined, another retransmission is again asked if there are still some bits of R equal zero. If all the m bits of R equal one, then the outer code C, is used to check whether or not the decoded block contains any error. The block is discarded if it is detected with error using code C,

.

Otherwise, it is delivered to the user. A block is requested to be retransmitted all over again if it is discarded. In scheme 2, only the negatively acknowl- edged frames are retransmitted. These erroneous frames are repeated to maintain a constant block length. Fig. 3

frame frame

Notice that, in scheme 2, the feedback from the receiver should include the number and the positions of the frames to be retransmitted.

There are problems in the Benelli's schemes. For example, in scheme 1, retransmission of frames which will not be analysed simply means a waste of bandwidth. It is also possible that some decoded frame, say frame 1, con- tains an undetected error in the first transmission when the block is asked to be retransmitted. In this case frame 1 is temporarily saved and successive retransmitted ver- sions will not be analysed. Since frame 1 is erroneous, the block will eventually be discarded and asked to be retransmitted all over again. Obviously, if successive retransmitted versions are analysed, then the block may not be discarded and the throughput performance can thus be improved. The decoding process becomes much

more complicated if every retransmitted frame is

analysed because it is then possible that multiple copies of the same frame have to be stored and the outer code C, has to be used to check multiple combinations. Another situation which causes the same problem may occur in each retransmission using scheme

2.

Suppose frame 1 is retransmitted with two copies which are decoded into different codewords by code C,. If only one copy is selected, then the block may be finally discarded because the receiver has a nonzero probability to choose an erroneous copy. This problem cannot be neglected in practice unless the probability that a decoded frame con- tains an undetected error, i.e. Pud, is extremely small for the inner code C,.

To avoid wasting bandwidth and maintain a simple decoding process, it is proposed that only the frames decoded with detectable errors are retransmitted, each with one copy. Such a retransmission strategy clearly results in variable block length and when it is used in the

GBN or the SR protocols, ACK or NAK of a block may

arrive at the transmitter when it is transmitting another block. Assume that the transmission is stopped as soon as a NAK is received if the GBN protocol is adopted. The transmission is continued until the whole block is finished if the SR protocol is adopted. The investigated SR protocol is also assumed to be ideal, i.e. the receiver has a baffer and a register for each data block. The ideal SR protocol is studied because it sets an upper bound on the throughput performance of various ARQ protocols. When real implementation is considered where only finite buffers are available, the operation and performance of the SR protocol needs to be modified. To evaluate the performance of the proposed scheme, it is assumed that the communication channel is a memoryless binary sym- metric channel (MBSC).

I I I I

0 b

Fig. 3

frame with detectable errors

0 frame without detectable errors a First transmission format

b Second transmission format

Example of retransmission using Benelli's scheme 2

shows an example of the retransmission strategy of scheme 2. The receiver analyses the copies of each retransmitted frame using code C,. If a copy of the pth frame contains no error or a correctable error, then this copy is stored and the pth bit of R is set to one. Code C, is again used for error checking as soon as all the bits of R equal one. The block is delivered to the user if it is decoded without error by code C,. Otherwise, it is dis- carded and requested to be retransmitted all over again. 1EE PROCEEDINGS-1, Vol. 138, N o . 3, J U N E 1991

3 System performance on MBSC

An alternative analysis of the throughput efficiencies of the SW, the GBN and the SR protocols is provided using scheme 1 proposed by Benelli. As in Reference 8, it is assumed that the outer code C, is a perfect error detect- ing code for simplicity. Let P , and P,, denote the prob- abilities that a decoded frame contains no error and an undetected error using code C,, respectively. Then the value of P , can be computed by [ 13

where p is the bit error probability. As mentioned before, the expression of P,, presented in Reference 8 is correct 149

(3)

only when the inner code C, is used solely for error detection. The enumeration of P,d when code C, is used for both error detection and correction can be found in Reference 7. The result is

i = 1

where { A i , 0

<

i

<

n,} is the weight distribution of code C , and Pf(i) represents the probability that a decoded frame contains a specific undetectable error pattern of weight i

(3)

Consider the transmission of a particular data block. Let X i , i = 1, 2,

...,

m, denote the number of transmissions until frame i is stored in buffer. It is not hard to see that the probability density function of X i is given by

pi-j+k(l - p ) n i - i + j - k

(4) where Pd = 1 - P, - P,d represents the probability that a frame is decoded with detectable errors. To evaluate the throughput efficiencies of the three basic ARQ protocols using the concatenated coding scheme, it is necessary to compute the value n,, which is the average number of transmissions until a block is correctly retrieved. Let Y = max (XI, X , ,

...,

X,,,) represent the number of transmissions until the block is retrieved, i.e. the outer code C, is used for error checking. It can then be shown that for the memoryless binary symmetric channel

m

F,(y) = P(Y

<

y ) =

n

P(Xi

<

y ) = (1 - Pi)” ( 5 ) As a result, the average number of transmissions until the block is retrieved is equal to

i = 1

m m

Y

=

c

P ( Y 2 y ) =

1

[l - (1 - P:-’)”] (6)

y = 1 y = 1

which can be shown to be finite for 0 < P, < 1.

Let P,, denote the probability that the block contains no error when it is retrieved. Then, since the errors in frames are independent, it can easily be seen that

Pcr = [Pc/(Pc

+

PuJI”’ (7)

Consequently, the average number of retrievals until the block is correctly received is equal to l/Pcr. The value n, can be computed by

n, = P/PCr (8)

Assuming the round trip delay N is a multiple of block transmission time, the throughput efficiencies of the SW, the GBN and the SR protocols using the concatenated coding scheme are

k 2

T,, = ~

nlmn, N (9)

The performance of the proposed scheme is evaluated. Let Y have the same meaning as defined previously and 150

Z = X ,

+

X ,

+

.

. .

+

X , denote the total number of frames transmitted until the block is retrieved. It can be shown that

2

= E(Z) = m/(P,

+

Pud). Since the proposed scheme results in variable block length, the transmission time of a frame, called a slot, is selected as the time unit.

When the proposed scheme is used in the GBN or the SR

protocols, ACK or NAK of a block may arrive at the transmitter when it is transmitting another block. It is assumed that on the receipt of a NAK the transmission is immediately stopped if the GBN protocol is adopted. The transmission is continued until the whole block is transmitted if the SR protocol is adopted.

Let N’ = m ( N - 1) represent the number of slots

between the end of a transmission and the receipt of its response. Let W denote the total number of slots spent until the result of a retrieval, i.e. ACK or NAK, is received by the transmitter. The expectation of W condi- tioning on Y = y is then equal to

E ( W I Y = y ) = E ( y N ’ + Z I Y = y )

= N ’ y

+

E(ZI Y = y ) (12) (13)

The throughput efficiencies of the three basic ARQ pro- tocols using the proposed scheme can therefore be com- puted by Unconditioning Y

w

= E ( W ) = N ’ Y +

z

where w/Pcr

sw

( w / P c r ) - N’ GBN ZIPcr SR

represents the average number of slots spent for a data block to be correctly received. Notice that the value of P,, appeared in the above equation is given in eqn. 7.

4 Numerical results

All the results presented assume an outer code of n, = 1023 and k , = 993. This outer code is assumed to be a perfect error detecting code. The Hamming codes (8, 4) and (16, 11) and the Golay code (24, 12) are used as the inner code. Whenever n, is not a multiple of k , , the value of m is chosen to be [ n J k , ] , the least integer which is greater than n,/k,. Schemes S1, S 2 , and S3 represent the scheme 1 proposed by Benelli, the proposed scheme, and the scheme presented in Reference 6.

Fig. 4 shows the throughput efficiency of the SW pro- tocol using scheme S1 against the bit error probability p for N = 20. Similar results are shown in Figs. 5 and 6 for the GBN and the SR protocols. It can be seen that the throughput efficiencies of the three basic ARQ protocols can be significantly improved using scheme S1 with respect to other similar schemes.

Fig. 7 shows the comparison of the throughput effi- ciency of the GBN protocol using schemes S1 and S2 for different inner codes with t = 0. Notice that t = 0 means the inner code is used for error detection only and thus requires a simpler implementation than the case when t # 0. It can be seen from this Figure that, compared with the classic GBN protocol, scheme S1 still provides a significant improvement for large values of bit error probability p . The proposed scheme is shown to be con- sistently better than scheme S1.

(4)

Figs. 8 and 9 show similar comparisons for the GBN

and the SR protocols, respectively, for different inner codes with t # 0. The proposed scheme is consistently better than scheme S1 in system throughput, significantly

so

in Fig. 9. The tradeoff is clearly higher implementation complexity because the feedback in the proposed scheme must include the positions of negatively acknowledged frames.

100-

10-1

+

10-2

Notice that, compared with scheme 1 studied in Refer- ence 8, the proposed scheme does not reduce the number of retransmissions of any data block. It only saves the unnecessary retransmissions of frames which had been successfully decoded (either correctly or incorrectly) during previous transmissions. The improvement for the

SW and the GBN protocols is therefore not as significant as the improvement for the SR protocol because of the

a,c - - I I I I 10-4 10-3 10-2 10-1

+I

16' P

Throughput of SW protocol against bit error probability Fig. 4 Scheme SI ~ classical a: (8,4); t = 1 s3 b: (16, 11); t = 1 ~-~~ s1 C: (24, 12); t = 2 + 16' 10-3 I I I I 10-2 10-1 P

Throughput of GBN protocol against bit error probability Fig. 5 Scheme SI ~ classical a : (8, 4); t = I s3 b: (16, 11); t = 1 -~~~ s1 C : (24, 12); t = 1 b .- --

---

a,c

-

10-3

I

I 1 I 10-2 10-1 P

Throughput of SR protocol against bit error probability Fig. 6 Scheme SI classical a: (8, 4); t = 1 -~ s3 b : ( l 6 , 1 l ) ; t = l s1 C : (24, 12); t = 3 ~~~~

IEE PROCEEDINGS-I, Vol. 138, NO. 3, J U N E 1991

10-31 1 I I 10-4 10-2 10-1 P Fig. 7 Scheme S2 classical ~ SI s 2

Throughput of GBN protocol against bit error probability a: (8,4); t = 0 b: (16, 11); t = 0 C: (24, 12); t = 0 _ _ _ ~ - b cI,c I I I I I '

,

1 0 - ~ 10-3 10-2 10-1 P

Throughput o f S R protocol against bit error probability Fig. 9 Scheme S2 ~ SI b: (16, 1 1 ) ; t = I s 2 C : (24, 12); I = 1 a : (8,4); t = 1 ~~~~~ 151

(5)

cost of a large round-trip delay when a retransmission is requested (in our examples, N = 20). The number of retransmissions has to be reduced to significantly

enhance the performance of the SW and the GBN proto-

cols. An approach to achieve this is to transmit multiple copies of each frame or block contiguously to the receiver [SI. In scheme 2 proposed in Reference 8, multiple copies of frames which had not been successfully decoded are transmitted at each retransmission. This scheme is expected to reduce the number of retransmissions and achieve a better performance for the SW and the GBN protocols for channels having a high error rate and/or a large round-trip delay. Unfortunately, for high error rate channels, P,, is large. The outer code may therefore have to be used to check multiple combinations to achieve the high performance. As a consequence, the decoding pro- cedure and buffer management become so complicated as to make this scheme impractical for real applications.

5 Conclusions

An alternative approach to evaluate the throughput effi- ciencies of the SW, the GBN and the SR ARQ protocols using the concatenated coding scheme 1 proposed by Benelli was provided. Some implementation problems of Benelli’s schemes were also discussed. An efficient

retransmission strategy which avoids unnecessary

retransmissions and maintains a fixed decoding complex- ity was proposed. The throughput efficiencies of the SW, the GBN and the SR protocols using the proposed scheme were shown to be consistently better than those using scheme 1 suggested in Reference 8. The improve- ment is significant for the SR protocols. An interesting

topic which can be further studied is to evaluate the per- formance of ARQ protocols using various concatenated coding schemes for communications over burst-error channels.

6 Acknowledgment

The author wishes to thank the anonymous referees for their helpful comments and valuable suggestions in improving the presentation of this paper.

7 References

1 LIN, S., and COSTELLO, D. Jr. : ‘Error control coding: fundamen- tals and applications’ (Prentice-Hall, Englewood Cliffs, 1983)

2 LIN, S., COSTELLO, D. Jr., and MILLER, M.J.: ‘Automatic repeat

request error-control schemes’, IEEE Commun. Mag., December

1984,22, pp. 5-17

3 SASTRY, A.R.K.: ‘Performance of hybrid error control schemes on

satellite channels’, IEEE Trans., 1975, COM-23, pp. 689494

4 KRISHNA, H., and MORGERA, S.D.: ‘A new error control scheme

for hybrid ARQ schemes’, IEEE Trans., 1987, COM-35, pp.

5 BENELLI, G.: ‘A go-back-N ARQ scheme with buffer at the recei-

ver’, I E E Proc. F, 1986,133, pp. 271-276

6 KASAMI, T., FUJIWARA, T., and LIN, S.: ‘A concatenated coding

scheme for error control’, IEEE Trans., 1986, COM-34, pp. 481-488

7 DENG, R.H., and COSTELLO, D.J.: ‘Reliability and throughput

analysis of a concatenated coding scheme’, IEEE Trans., 1987,

8 BENELLI, G.: ‘Two concatenated coding schemes for ARQ proto-

cols’, IEE Proc. I, 1989,136, (3), pp. 213-219

9 BRUNEEL, H., and MOENECLAEY, M.: ‘On the throughput per- formance of some continuous ARQ strategies with repeated trans- missions’, IEEE Trans., 1986, COM-34, pp. 244-249

981-990

COM-35, pp. 698-705

10 FORNEY, G.D. Jr.: ‘Concatenated codes’ (MIT, Cambridge, 1966)

數據

Fig.  1  shows the structure  of  a communication system  using  a  concatenated  coding  scheme

參考文獻

相關文件

and the value they assign to these texts and creative work more generally practical tasks such as colour-coding, chunking and segmenting the text, using audio recordings of

Other than exploring the feasibility of introducing a salary scale for KG teachers, we also reviewed the implementation of the Scheme in different areas including funding

This is to inform kindergartens and primary schools of the “Library Cards for All School Children” scheme and the arrangement of bulk application for library cards of the

volume suppressed mass: (TeV) 2 /M P ∼ 10 −4 eV → mm range can be experimentally tested for any number of extra dimensions - Light U(1) gauge bosons: no derivative couplings. =&gt;

Courtesy: Ned Wright’s Cosmology Page Burles, Nolette &amp; Turner, 1999?. Total Mass Density

incapable to extract any quantities from QCD, nor to tackle the most interesting physics, namely, the spontaneously chiral symmetry breaking and the color confinement.. 

• Formation of massive primordial stars as origin of objects in the early universe. • Supernova explosions might be visible to the most

This kind of algorithm has also been a powerful tool for solving many other optimization problems, including symmetric cone complementarity problems [15, 16, 20–22], symmetric