License

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Dropped-Packets Repair and Recovery for Delay-Tolerant

Wireless Systems Using Retroactive Interference Cancellation


This paper was downloaded from TechRxiv (https://www.techrxiv.org).

LICENSE

CC BY 4.0

SUBMISSION DATE / POSTED DATE

01-06-2022 / 01-06-2022

CITATION

Ahmed, Ashfaq; Al-Dweik, Arafat; Iraqi, Youssef; Damiani, Ernesto (2022): Dropped-Packets Repair and
Recovery for Delay-Tolerant Wireless Systems Using Retroactive Interference Cancellation. TechRxiv.
Preprint. https://doi.org/10.36227/techrxiv.19948259.v1

DOI

10.36227/techrxiv.19948259.v1
1

Dropped-Packets Repair and Recovery for


Delay-Tolerant Wireless Systems Using Retroactive
Interference Cancellation
A. Ahmed, Senior Member, IEEE, A. Al-Dweik, Senior Member, IEEE,
Y. Iraqi, Senior Member, IEEE, E. Damiani, Senior Member, IEEE

Abstract—Data download and storage over wireless networks emerged as key challenges. In particular scenarios, multimedia
is a popular application for various multimedia such as images, transmission might require ultra reliable low latency commu-
audio, and video files. In such applications, the end-user may nications (URLLC) services [2]. Therefore, extensive research
listen to or watch the downloaded media in real-time, and/or
will playback the downloaded file multiple times in the future. efforts are being devoted to enabling beyond 5G (B5G) and 6th
Consequently, improving the quality of the stored multimedia will generation (6G) cellular networks to handle such challenging
be highly desirable by the end-user, even if the initial real-time requirements. An extensive list of 5th generation (5G) and 6G
version had less quality. Therefore, this work proposes a novel technologies is given in [3].
technique to improve the throughput of wireless networks that Although there are several solutions that can be used to
adopt nonorthogonal transmission and automatic repeat request
(ARQ). Unlike conventional systems, the proposed scheme stores verify and improve the data reliability over wireless networks,
the dropped data packets for further offline processing where automatic repeat request (ARQ) is widely used because it can
some packets can be recovered by applying successive interfer- provide closed-loop error correction through a hand-shaking
ence cancellation (SIC) in a retroactive manner. Consequently, process between the transmitter and receiver [4]. Therefore, it
the proposed packet repair and recovery (PRR) scheme can can be used to provide a guaranteed reliability level, which is
improve the reliability of the received data without additional
packet retransmission, which may offer a significant throughput different from forward error correction coding that provides
gain. To evaluate the effectiveness of the proposed scheme, it best-effort reliability. However, ARQ is mainly based on the
is applied to image transmission for transportation systems. repetitive transmission of packets that could not be detected
The obtained results confirm that a considerable portion of the successfully at the receiver. Consequently, ARQ may degrade
dropped packets can be successfully recovered and the visual the power and spectral efficiency of the system, and increase
quality of the received image can be improved. In particular
scenarios, the obtained results show that the proposed PRR the delay [4]. Moreover, the number of transmissions per
technique managed to reduce the packet drop rate (PDR) from packet is usually limited to avoid severe delays, time jitter,
10−1 to 10−3 , i.e., 100 fold, which implies that 99% of the packets power consumption, and throughput deterioration. Therefore,
that were initially dropped were successfully recovered. certain packets will be dropped if they are not successfully
Index Terms—Automatic repeat request (ARQ), nonorthogonal detected after a certain number of transmissions. The limitation
Multiple access (NOMA), throughput, non-Orthogonal Multi- on the number of allowed retransmissions might be also
plexing (NOM), packet drop. enforced by the application itself. For example, unmanned
aerial vehicles (UAVs) are widely used in various applica-
I. I NTRODUCTION tions, an example is depicted in Fig. 1 for an intelligent
transportation system (ITS). In such scenarios, the UAV is

M ULTIMEDIA communications currently correspond to


the major portion of traffic of wireless networks. For
example, mobile video traffic accounted for 59% of the total
expected to communicate data, images or videos while moving
[5], which makes it challenging to have a large number of
retransmissions. A similar argument can be made for low-
mobile data traffic in 2017, and is expected to reach 79% in earth orbit (LEO) satellites [6]. The impact of dropped packets
2022 as per Cisco report [1]. For multimedia communications, depends on the application in use. In certain applications, the
particularly video, reliability, spectral utilization, power con- end-user might initiate the transmission process again, or the
sumption, and high data rate transmission requirements have transmission will continue, but with a degraded quality.
In addition to reliable data transmission, spectrum scarcity is
A. Ahmed is with the Department of Electrical Engineering and Com-
puter Science, Khalifa University, 127788 Abu Dhabi, UAE (email: ash- another critical challenge for future wireless communications.
faq.ahmed@ku.ac.ae) Therefore, the design of spectrally-efficient multiple access
A. Al-Dweik is with the Center for Cyber-Physical Systems (C2PS), Khalifa schemes and signal designs is currently attracting massive
University, 127788 Abu Dhabi, UAE, and also with the Department of
Electrical and Computer Engineering, Western University, London, ON N6A attention. In terms of multiple access, non-orthogonal multiple
3K7, Canada (e-mail: dweik@fulbrightmail.org; arafat.dweik@ku.ac.ae) access (NOMA) is considered a key technology and a potential
Y. Iraqi is with the School of Computer Science, Mohammed VI Polytech- solution to the spectrum scarcity problem [7]–[17]. Similar to
nic University, Ben Guerir, Morocco (email: youssef.iraqi@um6p.ma)
E. Damiani is with the Center of Cyber-Physical Systems, Khalifa Univer- NOMA, non-orthogonal multiplexing (NOM) has the capa-
sity, Abu Dhabi 127788, UAE (e-mail: ernesto.damiani@ku.ac.ae). bility to improve the spectral efficiency for wireless systems
2

UAV to
UAV
trajectory
UAV
forwarding
performance of two users in downlink NOMA using HARQ-
receiving
pictures
pictures CC is studied in [29].
UAV relocates to
deliver pictures to
police station
B. Motivation
Multimedia communications are generally considered a
Police
time-sensitive application. For example, video streaming can-
headquarter
not tolerate large time jitter or delay because that will signifi-
Traffic cantly deteriorate the video quality. Similarly, UAVs and LEOs
monitoring
Camera have to send images and videos in a timely manner. However,
transmitting
pictures in most of these applications, the end-user will most likely
save the received data for archiving, or for replaying at a later
time. In certain applications, the multimedia files are stored
for archiving without immediate human observation, as in the
case of surveillance cameras. Therefore, it would be highly
desirable by-end users to have multimedia content stored with
high quality, even though the live version did not have the
Fig. 1: Illustrative example for image transmission applications same quality. However, in typical communications systems, if
in transportation systems. a packet is dropped during transmission, then generally there
is no point to try repairing or recovering such packets at a
later time because such packets are typically independent, and
future received packets will not have any impact on a dropped
by opportunistically exploiting good channel conditions to
packet. However, when NOMA or NOM are integrated with
multiplex several data packets in the same transmission slot
ARQ, then the scenario is significantly different where a
[18], [19]. NOMA generally needs ARQ to guarantee a certain
large number of packets can be correlated. Consequently, the
quality of service (QoS) provision [20]–[22], while NOM is
outcome detecting the ith packet may affect the detection
designed particularly for systems that incorporate ARQ.
of packets 1, 2, . . . , i − 1 and packets i + 1, i + 2, . . . , M .
Based on an extensive literature search, and to the best of the
authors’ knowledge, there is no work in the open literature
A. Related Work
that considered exploiting the packets’ correlation to repair
The combined NOMA and ARQ techniques have been and recover the dropped packet in communications systems
investigated in several literary works. In [23], it is shown that that adopt nonorthogonal transmission and ARQ.
NOMA-assisted hybrid-ARQ (HARQ) outperforms orthogonal
multiple access (OMA)-HARQ in terms of outage probability. C. Contributions
A trade-off between the allocated power levels and number The main contributions of the work can be summarized as
of transmissions in a NOMA-HARQ with chase combining follows:
(CC) is presented in [20], where it is shown that HARQ- 1) A novel packet repair and recovery technique is proposed
CC with NOMA can provide a substantial gain in terms of to revive the dropped packets in an off-line manner, and
outage probability. The performance of a cooperative network thus, improve the quality of the stored version of the
with NOMA-ARQ/HARQ error control methods is studied received data.
in [24]. A notable throughput gain is reported as compared 2) The proposed scheme is performed by exploiting the
to conventional OMA transmission. Because larger packets correlation between the received packets due to the
adversely affect reliability, the concept of short-packet com- nonorthogonal transmission. The proposed scheme does
munications has been considered. For example, the authors not require any new retransmission of any packet, and
in [25] proposed a NOMA assisted ARQ system for short- thus, it does not affect the system throughput, spectrum
packet communications to ensure ultra-reliability and increase efficiency or power efficiency. However, the cost is some
the throughput. An efficient power allocation strategy for a additional storage and computational power requirements,
HARQ-CC enabled NOMA system is proposed in [21]. An which are currently very affordable.
effective NOMA-assisted HARQ system for ultra-reliability is 3) The proposed scheme is applied to NOM and the appli-
introduced in [26], where the retransmitted packet and the new cation to NOMA is discussed.
packet share the channel resource and the received packets 4) The performance of the proposed scheme is evaluated in
are combined to improve the effective signal to noise ratio terms of the packet drop rate and buffering requirements.
(SNR). The performance of the HARQ-CC and HARQ with Moreover, the proposed scheme is tested for image trans-
incremental redundancy (IR) aided NOMA systems is studied mission applications where the performance is evaluated
in [27]. The performance is evaluated in terms of outage using the peak signal to noise ratio (PSNR) and visually
probability concerning the transmission power, i.e., diversity based on the processed images.
order. A dynamic power allocation scheme is presented in 5) The obtained results show that the proposed scheme can
a NOMA-HARQ based transmission scheme in [28], which significantly reduce the number of dropped packets and
leads to a reduced number of retransmissions. Finally, the improve the PSNR and the visual image quality.
3

D. Paper Organization A. Packet Correlation in NOM


Sec. II introduces the ARQ system model. Sec. III describes Packet correlation can be experienced in NOMA, NOM [18]
the proposed packet repair and recovery (PRR) scheme. Sec. and generalized NOM (GNOM) [19] systems. However, this
IV presents a use case for image transmission. Sec. V discusses work considers the low complexity NOM in which the number
the results, and Sec. VI draws the conclusions. of combined packets per transmission slot N = 2 ∀` [18].
Without loss of generality, we consider that all packets until
the ith packet transmission are received correctly, and hence,
II. ARQ S YSTEM M ODEL the transmitted NOM packets during the current transmission
can be expressed as
The ARQ system considered in this work consists of a q q
transmitter that needs to transmit M packets to the receiver (1) (1) (1) (1)
si = αi,1 xi,1 + αi+1,1 xi+1,1 (2)
through a wireless link, where each packet consists of B bits.
The transmitter and receiver communicate using a truncated (·) (·)
where αi,1 and αi+1,l are the powers allocated for the primary
ARQ with stop-and-wait (SW) flow control protocol with (·) (·)
and secondary packet, respectively, αi,1 + αi+1,1 = 1. Since
a maximum number of transmissions of L, including the (·)
initial transmission [4]. A packet that fails the error check the power allocated is fixed for a given configuration, αi,1 will
(·)
following its L transmissions is dropped. The channel between be referred to as α and αi+1,l = 1 − α. The first subscript in
the transmitter and receiver is modeled as a block fading the transmitted packets indicates the packet sequence number,
channel, i.e., the channel remains constant during a single and the superscript indicates the transmission counter of the
transmission session but varies randomly over consecutive primary packet, which indicates when a packet should be
transmission sessions. Therefore, the received sequence during dropped. The second subscript represents the total number
the `th transmission session of packet i can be written as, of transmissions of a packet as primary or secondary. The
q  received composite NOM packet can be expressed as,
(`) (`) (`) (`) (`) ` ∈ {1, 2, . . . , L} (`) (`) (`)
yi = hi p i x i + wi , (1) yi,l = hi si + wi (3)
i ∈ {1, 2, . . . , M }
where w is the AWGN vector whose elements are i.i.d., w ∼
where p is the transmission power, the channel frequency 2
(`) CN (0, σw I), where I is a K × K identity matrix, K is the
responses (CFRs) hi ∀{i, `} are independent and identically
(`) packet length. If binary phase shift keying (BPSK) is adopted,
distributed (i.i.d.), hi ∼ CN (0, σh2 ), w is the additive then K = B.
white Gaussian noise (AWGN) vector, w = [w1 , w2 , . . . , wB ],
(`) 2
Since NOM is generally coupled with ARQ, then the
wi ∼ CN (0, σw ) are i.i.d. ∀{i, `}. The transmitted data (`)
detection process for yi,l depends on the value of `, and
packet xi = [xi,1 , xi,2 , . . . , xi,B ] where the data symbols are generally follows the conventional detection used in NOMA
selected from a particular constellation such as phase shift systems where the packet with high power is detected first
keying (PSK) or quadrature amplitude modulation (QAM). while considering the low power packet as unknown noise.
The receiver detects the received sequence yi and checks For ` = 1,n the oprimary packet is transmitted only once, i.e.,
its transmission counter `, if ` = 1, then yi is detected (1)
x̂i = D1 yi,l . The secondary packet xi+1 is detected by
to obtain the estimated version of xi , denoted as x̂i . The
applying successive interference cancellation (SIC) and then
packet detection process is denoted as x̂i = D1 {yi }, and it
MLD of the resultant sequence,
is performed by using maximum likelihood detection (MLD)  
for each symbol in the received sequence. Finally, the receiver
q
(1) (1) (1)
x̂i+1 = D1 yi,l − hi αi,l x̂i . (4)
verifies if xi = x̂i using certain error detection schemes such
as cyclic redundancy check (CRC). If the CRC indicates that
For notational simplicity, the three operations required to
xi = x̂i , then an acknowledgment (ACK) is sent to instruct
detect xi and xi+1 , i.e., MLD of xi , SIC, and MLD of xi+1
the transmitter to send packet xi+1 . Otherwise, a negative
will be denoted as
acknowledgment (NACK) is sent to instruct the transmitter n o
(1)
to resend xi . However, if ` > 1, CC is used to combine {x̂i , x̂i+1 } = D2 yi,l . (5)
(1) (2) (`)
yi , yi , . . . , yi , and then the combined sequence is de-
(`)
tected and remaining processes are similar to the case where Due to ARQ, the received sequences yi,l might be fully or
` = 1. The CC process in this case is similar to the maximum partially correlated. Fig. 2 shows an example where x1 and x2
ratio combining (MRC). In this work, we consider Type-I are multiplexed and transmitted during the first transmission
ARQ, which implies that the same packet can be transmitted slot. However, both fail the CRC process and hence are
up to L times [4]. retransmitted. As shown in the figure, the CRC for x1 fails
again, and thus x1 is dropped because L = 2 in this example.
(1) (2)
In this context, we consider that y1,1 and y1,2 are fully
III. P ROPOSED PACKET R EPAIR AND R ECOVERY correlated because they contain the same data packets. After
This section presents a brief overview of NOM and explains dropping x1 , x2 is considered as the primary packet, and hence
(2)
the packet correlation that results when nonorthogonal trans- it is multiplexed with x3 , and then transmitted. Therefore, y1,2
(1)
mission is combined with ARQ, which is the case for NOM. and y2,3 are partially correlated because they have only one
4

(1) (2)
packet in common, which is x2 . Similarly, y2,3 and y2,4 are x̂2 6= x2 , the receiver sends a NACK to the transmitter asking
(2) (1) for retransmission of s2
fully correlated while y2,4 and y3,3 are partially correlated.
TS 4: The transmitted sends s2 for the second time which is
(2) (1) (2)
received as y2,4 . Therefore, y2,3 and y2,4 are fully correlated
B. Proposed PRR Technique and can be combined as described in (6) to produce d2 . Given
As can be noted from Fig. 2, packets x3 and x4 were suc- that the detector fails to detect x2 correctly, the receiver sends
cessfully detected in the 5th transmission slot, while packets a NACK to the transmitter to drop x2 . Moreover, the sequences
(1) (2)
x1 and x2 were dropped because they exceeded the maximum y2,3 and y2,4 and the corresponding channels information are
number of allowed transmissions. However, it can be noted stored in the drop buffer A.
(1) (1) (1)
from the figure that y3,3 is partially correlated with y2,3 and TS 5: The transmitter sends s3 which is received as y3,3 .
(2) (1)
y2,4 where x3 is a common packet between the two received Because y3,3 is partially correlated with all buffered se-
(1)
sequences. Therefore, the interference caused by x3 to y2,3 quences, then it cannot be combined with any other sequence,
(2) and hence, it is applied directly to the detector. Given that
and y2,4 can be eliminated using a simple SIC process. It is
worth noting that the SIC in this case is different from the packets x3 is detected correctly, then SIC can be applied to
conventional SIC used in NOMA because in this scenario we extract x4 . In such scenarios, the partial correlation between
(1) (2)
eliminate the weak rather than the strong interference. Once y2,3 , y2,4 and x3 can be exploited to apply the PRR process,
(1) (2) which can be described as
the interference is eliminated, the sequences y2,3 and y2,4 will
be interference-free, and hence, they can be combined and 1) Because x3 is considered as interference with respect to
(1) (2)
detected, and the probability of successful detection will be y2,3 and y2,4 , its detrimental effect can be eliminated as,
much higher than the initial detection process in the presence q
of interference. Given that x2 is successfully recovered, the (1) (1) (1) (1)
ỹ2,3 = y2,3 − α2,3 h2 x̂3 (7)
same process can be applied to cancel the interference from
(1) (2) q
y1,1 and y1,2 , and then attempt to re-detect x1 . (2) (2) (2) (2)
ỹ2,4 = y2,4 − α2,4 h2 x̂3 . (8)
The detailed processes of the PRR algorithm for the exam-
ple in Fig. 2 is depicted in Table I. The processing performed The interference cancellation (IC) in this case is de-
at each transmission session is as follows: noted as retroactive IC (RIC) because the cancellation is
(1)
TS 1: The transmitter sends s1 , which is received as y1,1 performed between symbols from different transmission
as defined in (3). Assuming that the primary packet x1 is slots. The signal to interference plus noise ratios (SINRs)
(1) (2) (1)
detected erroneously as indicated by the CRC process, then of ỹ2,3 and ỹ2,4 is expected to be better than y2,3 and
the detection process for packet x2 is not initiated, and a (2)
y2,4 due to the IC.
retransmission is requested using a NACK {0, 0}. n
(1)
o
(2)
2) Compute d̃2 = C ỹ2,3 , ỹ2,4 as described in (6). Then
TS 2: The transmitter resends s1 for the second time. The
(2)
received sequence in this case is denoted as y1,2 . In this apply d̃2 to the detector to generate x̂2 . If x̂2 = x2 , the
(1) (2)
case, the received sequences y1,1 and y1,2 are fully correlated same process is repeated by applying the RIC to eliminate
(1) (2)
and hence CC can be used to combine both sequences. The the effect of x2 from y1,1 and y1,2 , and then detect x1 .
combining process can be described as, If x̂2 6= x2 , then the PRR is terminated, x1 and x2 are
h i∗ h i∗ dropped permanently, and the drop buffer is cleared.
(1) (1) (2) (2)
n o h1 y1,1 + h1 y1,2 3) At this stage, the receiver might have managed to repair
(1) (2)
C y1,1 , y1,2 , d1 = (6) and recover only x2 , x1 and x2 , or neither. In all
(1) 2 (2) 2

h1 + h1 cases, the drop buffer will be cleared because the next
transmitted packets will be independent of the buffered
where [·]∗ denotes the complex conjugate operator. The se- sequences. Consequently, the drop buffer will be cleared.
quence d1 is then passed to the detector to recover packet x1 , TS 6: At this stage, the transmitter should send two new
which gives the detected packet x̂1 . Given that x̂1 6= x1 , then packets which are x5 , x6 .
the receiver sends a NACK to the transmitter to drop x1 since
Because NOM [18] limits the packet multiplexing to two
it has reached the maximum number of transmissions allowed.
packets, then generalizing the considered example implies that
Moreover, the receiver discards x̂1 and stores the associated
(1) (2) L is the only factor that should be considered. Consequently,
received sequences y1,1 and y1,2 , and the corresponding
(1) (2)
x1 can be transmitted L times as the primary packet, CC
channel coefficients h1 and h1 in the drop buffer A. It can be applied up to L − 1 times. For each primary packet,
is worth noting that (6) is equivalent to an MRC process at the drop buffer may save a maximum of L copies, which
the packet level, and hence, it is straightforward to extend for (1) (2) (L)
are yi,1 , yi,2 , . . . , yi,L . In the case that the transmitter has
arbitrary number of users. M packets to send, then in the worst case scenario the
TS 3: The transmitter drops x1 and generates s2 by mul- receiver might need to buffer LM −1 sequences, and the PRR
tiplexing packets x2 and x3 . The received sequence in this algorithm will operate offline and backward until all packets
(1) (1)
case is denoted as y2,3 . Because y2,3 is partially correlated are recovered, or the partial correlation link is broken when a
(1) (2) (1)
with y1,1 and y1,2 , CC cannot be applied and y2,3 will be particular packet is permanently dropped. Algorithm 1 presents
directly applied to the detector to generate x̂2 . Assuming that the generalized PRR for L ≥ 2.
5

Fig. 2: Packet correlation in NOM where L = 2.

TABLE I: Example of PRR for L = 2 and M = 4.


(`)
TS yi,l Process Output CRC Drop buffer
n o
(1) (1) (1) (1)
1 y1,1 D2 y1,1 x̂1 , x̂2 0, 0 y1,1 , h1
n o
(2) (1) (2) (1) (2) (1) (2)
2 y1,2 1) d1 = C y1,1 , y1,2 , 2) D2 {d1 } x̂1 , x̂2 0, 0 y1,1 , y1,2 , h1 , h1
n o
(1) (1) (1) (2) (1) (1) (2) (1)
3 y2,3 D2 y2,3 x̂2 , x̂3 0, 0 y1,1 , y1,2 , y2,3 , h1 , h1 , h2
n o
(2) (1) (2) (1) (2) (1) (2) (1) (2) (1) (2)
4 y2,4 1) d2 = C y2,3 , y2,4 , 2) D2 {d2 } x̂2 , x̂3 0, 0 y1,1 , y1,2 , y2,3 , y2,4 , h1 , h1 , h2 , h2
n o
(1) (1) (2) (1) (2) (1) (2) (1) (2)
1) D2 y3,3 x̂3 , x̂4 1, 1 y1,1 , y1,2 , y2,3 , y2,4 , h1 , h1 , h2 , h2
n o n o
(1) (1) (2) (1) (2) (1) (2) (1) (2)
5 y3,3 2) ỹ2,3 , ỹ2,4 , 3) d̃2 = C ỹ2,3 , ỹ2,4 , 4) D1 d̃2 x̂2 1 y1,1 , y1,2 , h1 , h1
n o n o
(1) (2) (1) (2)
5) ỹ1,1 , ỹ1,2 , 6) d̃1 = C ỹ1,1 , ỹ1,2 , 7) D1 d̃1 x̂1 1 −

Algorithm 1: Packet repair and recovery when a packet loss occurs and the receiver is unable to recover
1 Input:
(`)
yi,l ,
(`)
hi %the received sequence and channel
a certain packet, the receiver employs error concealment to
2 Output: X, %the set of recovered packets x̂ minimize artifacts caused by the missing packet in the received
3 X=∅ n o image.
(1) (`)
4 d1 = C yi,l−(`−1) , ..., yi,l Enhancing the image quality at the receiver, for example,
5 {x̂i , x̂i+1 } = D2 {d1 } can be achieved using a zero or white insertion mechanism, in
6 if x̂i fails CRC then
(`) (`) which missing packets in the received image are replaced with
7 buffer yi,l , hi
all-zero or all-white packets, respectively, for dark and bright
8 return
9 end input images. The image received following zero or white-
10 if x̂i+1 fails CRC then insertion is referred to as a concealed image. Later, a moving
11 X = X ∪ {x̂i } average filter (MAF) is applied to the concealed images in
12 else
13 X = X ∪ {x̂i , x̂i+1 } order to reconstruct the missing packets, thus improving the
14 end visual quality in terms of PSNR. Initially, all sides of the
15 while drop buffer is not empty do received images are padded with additional W pixels, where
16 extract the L received sequences from the drop buffer
(1) (L)
yi−1,j−(L−1) , ..., yi−1,j for some j
W is the size of the window in the MAF. Padding techniques
(1) (L) include replicating the boundary pixels, padding all zeros or all
17 use RIC to estimate ỹi−1,j−(L−1) , ..., ỹi−1,j as in (7) and (8)
n
(1) (L)
o white pixels, or extrapolating the boundary pixels. We replicate
18 d̃2 = C ỹi−1,l−(L−1) , ..., ỹi−1,l
n o the border pixels in this work. The window is then applied
19 x̂i−1 = D1 d̃2 to pixels with intensities less than a predefined threshold,
20 if x̂i−1 fails CRC then and the considered pixels are replaced with the mean of the
21 empty the drop buffer
22 return pixels in the window. If zero-insertion is used on the receiving
23 else image, the pre-defined threshold is usually 0. The window
24 X = X ∪ {x̂i−1 } size is critical, as a larger window size causes image blurring,
25 i=i−1
26 end whereas a small window produces visible edges. Due to higher
27 end packet loss at low SNR region, a bigger window is used to
minimize artifacts caused by zero or white-insertion and to
produce a smoother output image. A small window is used to
IV. U SE C ASE : I MAGE T RANSMISSION conceal images received under good SNR conditions.
The most often used metric for assessing the quality of re-
As an application of the proposed PRR scheme, we consider
constructed images is the PSNR, which is typically reported in
the case of image transmission of monitoring cameras in ITS
decibels. The PSNR determines the visual difference between
systems, which is a widely used application [30]–[34]. Such
two images A and B, and it is defined as
applications can tolerate some delay, which can be up to
several seconds. Moreover, some of the images can be stored
 
Max{A}
for future reuse. In conventional image transmission systems, PSNR{A, B} = 10 log10 (9)
MSE {A, B}
6

10 0 10 0

10 -1 10 -1
Packet drop rate

Packet drop rate


10 -2 10 -2

10 -3 10 -3

10 -4 10 -4
0 5 10 15 20 25 30 0 5 10 15 20 25 30
SNR (dB) SNR (dB)

10 0
10 0

10 -1
10 -1
Packet drop rate

Packet drop rate

10 -2
10 -2

10 -3
10 -3

10 -4
0 5 10 15 20 25 30 10 -4
0 5 10 15 20 25 30
SNR (dB)
SNR (dB)

Fig. 3: Packet drop rate for different L and α values, with and without PRR.

where Max{A} is the transmitted gray image’s maximum L ∈ {1, 2, 3}, and power coefficient α ∈ {0.6, 0.7, 0.8, 0.9}.
pixel intensity, which is 255 for images with 8 bits per pixel, The channel is modeled as a block Rayleigh fading and the
and the mean squared error (MSE) for an m × n pixel image information bits are modulated using BPSK. The adopted error
is given by, concealment scheme to reduce the impact of the dropped pack-
m−1 n−1
ets is based on zero-insertion and MAF. The error concealment
1 XX 2 is used only with the visualized images. The Monte Carlo
MSE {A, B} = [A(i, j) − B(i, j)] . (10)
mn i=0 j=0 simulation are generated using 216 = 65, 536 packets each
of which has 128 bits. In the proposed PRR, a packet is
considered dropped if it fails the CRC after being transmitted
V. N UMERICAL R ESULTS as a primary packet for L transmissions and the PRR technique
fails to recover it.
The section presents the performance evaluation of the pro-
posed PRR scheme in terms of packet drop rate (PDR), PSNR, Fig. 3 compares the system PDR with and without PRR
number of recovered packets, buffer occupancy, and visualized using various values of α and L. As can be noted from the
images. The results are obtained for SNR values that range figure, the PDR improves significantly for all values of α and
from 0 to 35 dB, maximum allowable transmissions per packet L. For example, with α = 0.6 and L = 3, the PDR improves
7

50 50

45 45

40 40

35 35
PSNR (dB)

PSNR (dB)
30 30

25 25

20 20

15 15

10 10

5 5
0 5 10 15 20 25 30 0 5 10 15 20 25 30
SNR (dB) SNR (dB)

50 50

45 45

40 40

35 35
PSNR (dB)

PSNR (dB)

30 30

25 25

20 20

15 15

10 10

5 5
0 5 10 15 20 25 30 0 5 10 15 20 25 30
SNR (dB) SNR (dB)

Fig. 4: PSNR between the received images and the transmitted image, with and without PRR.

by about 15 dB at PDR of 10−4 . For the case of α = 0.8, increases sharply for SNR > 8 dB and L = 3. Comparing the
which is the near-optimum power allocation to maximize the PSNR with and without PRR shows about 12 dB improvement
throughput [18], the improvement is about 6 dB. The PDR at PSNR = 40 dB. Increasing the value of α reduces the
improvement variation due to varying L is generally small impact of interference from the secondary packets, and thus
where roughly the same improvement is achieved for all the the impact of the PRR becomes less significant as compared
considered values of L. It can be also noted that the efficiency to the high interference cases, as in the case of α = 0.9. For
of the proposed PRR is more significant at low values of the near-optimum power allocation of α = 0.8, a significant
α, which is due to the fact that the interference from the gain of about 5 dB can still be achieved.
secondary packets is more severe in such scenarios. Therefore,
Fig. 5 shows the actual number of packets that were repaired
applying the RIC would cause significant SINR improvement.
and recovered after exceeding the maximum number of permit-
Fig. 4 is generated using the same parameters used to ted transmissions, and being dropped by the transmitter. The
generate Fig. 3, however it presents the PSNR. As can be presented results in the figure were obtained by considering
noted from the figure, the PSNR at low SNRs for α = 0.6 is that the total number of packet to be transmitted M = 16, 384
low and almost fixed, which implies that most of the packets packets, and the results are averaged over four realizations.
are dropped, regardless the value of L. Nevertheless, the PSNR As can be noted from the figure, the proposed PRR approach
8

600
12000

500
10000
No. of recovered packets

Buffer Occupancy
400 40
8000
30
300
6000
20

4000 200 10

0
2000 100 6 8 10 12

0
0 10 20 30 0 10 20 30 0 10 20 30 0
0 2 4 6 8 10 12
SNR (dB)
SNR (dB)
Fig. 5: Successfully recovered packets after PRR. Fig. 7: Average and maximum drop buffer occupancy for α =
0.9.
5000

4500
most packets will be dropped, and hence, the RIC process
4000
will not be applied, and most initially dropped packet will be
3500 permanently dropped. At high SNRs, the number of dropped
Buffer Occupancy

3000
100 packets is small, and thus, most initially dropped packets can
80
be recovered using the PRR. Therefore, the recovery ratio may
2500 increase to 100%.
60
2000 Figs. 6 and 7 show the buffering requirements of the
40 proposed PRR for α = 0.8 and 0.9, respectively, and for
1500 L = [1, 2, 3]. The figures show the maximum and average
20
1000 buffer occupancy. the maximum buffer occupancy can be used
0
6 8 10 12 as an indicator for the drop buffer capacity requirements,
500 and the average buffer occupancy can be used to indicate
0 the PRR average delay. As can be noted from Fig. 6, the
0 2 4 6 8 10 12 buffer occupancy at SNR = 0 dB and L = 1 is about
SNR (dB) 4, 500 packets, which is quite large. Nevertheless, no reliable
Fig. 6: Average and maximum drop buffer occupancy for α = communications can be performed at such low SNRs, and we
0.8. usually have L > 1. Therefore, the design can consider the
case of SNR ≥ 2 dB and L = 3, which implies that the
buffer size should be about 500 packets. Unlike the maximum
can effectively repair and recover a significant portion of the occupancy, the average is generally much smaller and it can
dropped of packets, particularly for low values of α and high be less than 100 packets for L = 3. The same trends can be
L values. For example, the PRR scheme managed to recover also observed in Fig. 7. However, the buffering requirements
about 12, 000 packets at SNR = 12 dB, α = 0.6, and and delay are much smaller because the primary packet has
L = 3. Given that the PDR for the considered scenario is high power and the interference is weaker. In such cases, the
about 0.9, it implies that the proposed PRR scheme managed receiver can either recover or permanently drop the buffered
to recover about 80% of the dropped packets. Decreasing the packets. Overall, although the delay is relatively high at low
value of L increases the probability that certain packets will SNRs, practical communications systems requires SNR  0
be permanently dropped due the loss of correlation at multiple dB to offer reliable performance. Moreover, the proposed PRR
positions in the buffered sequences. Increasing the value of is proposed for delay tolerant applications. Therefore, the
α reduces the interference caused by the secondary packets, system should be able to tolerate such delays.
and thus, a smaller number of packets can be recovered. For Figs. 8 and 9 are used to evaluate the visual impact of
example, for α = 0.7 and L = 3, the maximum number the PRR. The images are presented for α = 0.8 and 0.9,
of packets that was recovered is about 7, 500 at SNR of respectively, and for L = 2. In each figure four different
10 dB. By considering that P DR = 0.7 at the considered scenarios are considered: a) The image is presented without
SNR, then the PRR managed to recover about 65% of the error concealment nor PRR, b) The image is improved using
dropped packet, which is a tangible ratio. At very low SNRs, only PRR, c) Only error concealment is used, and in d) both
9

(a) Received image without post processing. (b) Received image with PRR.

(c) Received image with error concealment. (d) Received image with PRR and error concealment.
Fig. 8: Received image with and without post processing using SNR = 10 dB, α = 0.8, and L = 2.

error concealment and PRR are used. By comparing Fig. 8a VI. C ONCLUSION AND F UTURE W ORK
and Fig. 8b, it can be noted that significant improvement was In this work, we proposed and investigated a novel method
achieved for the case of PRR. Comparing Fig. 8a and Fig. 8c for reliable data transmission for NOM-based communications
shows that the error concealment has improved the received systems. The proposed PRR technique is generally designed
image, however the improvement is limited due to the large for delay-tolerant systems. The main concept of the PRR
number of dropped packets. Interestingly, Fig. 8d shows that scheme is to exploit the correlation among the received se-
the received image quality has improved substantially when quences to repair and recover the packets that were dropped by
both techniques are applied. In the first stage, the PRR repairs the transmitter and initially discarded by the receiver because
and recovers large number of packets, which enables the error they failed the detection process. Consequently, the reliability
concealment to operate effectively. The same observations of the received data can be significantly improved without
apply to Fig. 9. However, at SNR = 12 dB the received image any additional spectrum utilization or power consumption. The
was recovered nearly without any noticeable distortion. system performance was evaluated in terms of PDR, PSNR,
10

(a) Received image without post processing. (b) Received image with PRR.

(c) Received image with error concealment. (d) Received image with PRR and error concealment.
Fig. 9: Received image with and without post processing for SNR = 12 dB, α = 0.8 and L = 2.

buffer occupancy, number of recovered packets, and visualized The PRR can be also applied to conventional NOMA systems.
image quality. The obtained results show that the proposed However, the sequence correlation in such cases depends
scheme managed to recover 100% of the dropped packets, on the ACK/NACK produced by all users as well as the
and the PDR was improved by 15 dB in certain scenarios. receiver that will apply the PRR. Therefore, although the PRR
Although the proposed PRR was applied to the NOM is generally applicable to GNOM and NOMA systems, the
scheme in this work, our future work will focus on extending design has to be modified to accommodate the highlighted
the PRR to the GNOM. In the GNOM, the number of multi- differences, which requires dedicated work.
plexed packets in each transmission is much larger than two,
and it is time-varying. Therefore, the PRR should be designed R EFERENCES
to accommodate various correlation patterns. Moreover, the [1] G. Forecast et al., “Cisco visual networking index: global mobile data
length of the correlated received sequences is expected to traffic forecast update, 2017–2022,” Cisco, Tech. Rep., 2019. [Online].
be higher than the case of NOM, and thus the buffering Available: http://media.mediapost.com/uploads/CiscoForecast.pdf
requirements should be evaluated to avoid buffer overflow.
11

[2] E. Dosti, M. Shehab, H. Alves, and M. Latva-Aho, “Ultra reliable [19] H. Yahya, A. Al-Dweik, Y. Iraqi, E. Alsusa, and A. Ahmed, “A power
communication via optimum power allocation for HARQ retransmission and spectrum efficient uplink transmission scheme for QoS-constrained
schemes,” IEEE Access, vol. 8, pp. 89 768–89 781, 2020. IoT networks,” IEEE Internet of Things J. (IEEE Early Access), pp. 1–1,
[3] V. W. Wong, R. Schober, D. W. K. Ng, and L.-C. Wang, Key Technolo- Feb. 2022.
gies for 5G Wireless Systems. Cambridge University Press, 2017. [20] D. Cai, Z. Ding, P. Fan, and Z. Yang, “On the performance of NOMA
[4] A. Ahmed, A. Al-Dweik, Y. Iraqi, H. Mukhtar, M. Naeem, and with hybrid ARQ,” IEEE Trans. Veh. Technol., vol. 67, no. 10, pp.
E. Hossain, “Hybrid automatic repeat request (HARQ) in wireless 10 033–10 038, 2018.
communications systems and standards: A contemporary survey,” IEEE [21] Y. Xu, D. Cai, F. Fang, Z. Ding, C. Shen, and G. Zhu, “Outage
Commun. Surveys Tuts., vol. 23, no. 4, pp. 2711–2752, 2021. analysis and power allocation for HARQ-CC enabled NOMA downlink
[5] A. Ahmed, M. Naeem, and A. Al-Dweik, “Joint optimization of sensors transmission,” in IEEE Global Commun. Conf., 2018, pp. 1–6.
association and UAVs placement in IoT applications with practical [22] Z. Xiang, W. Yang, G. Pan, Y. Cai, Z. Ding, and Y. Zou, “An HARQ
network constraints,” IEEE Access, vol. 9, pp. 7674–7689, 2021. assisted cognitive NOMA scheme for secure transmission with imperfect
[6] Y. Su, Y. Liu, Y. Zhou, J. Yuan, H. Cao, and J. Shi, “Broadband LEO SIC,” IEEE Trans. Commun., vol. 69, no. 3, pp. 1930–1946, 2021.
satellite communications: Architectures and key technologies,” IEEE [23] J. Choi, “H-ARQ based non-orthogonal multiple access with successive
Wireless Commun., vol. 26, no. 2, pp. 55–61, 2019. interference cancellation,” in IEEE Global Commun. Conf., 2008, pp.
[7] M. Aldababsa, C. Göztepe, G. K. Kurt, and O. Kucur, “Bit error rate for 1–5.
NOMA network,” IEEE Commun. Lett., vol. 24, no. 6, pp. 1188–1191, [24] Z. Yu, C. Zhai, W. Ni, and D. Wang, “Non-orthogonal multiple access
2020. with cooperative truncated ARQ and relay selection,” IEEE Access,
[8] T. Assaf et al., “Efficient bit loading algorithm for OFDM-NOMA vol. 7, pp. 56 228–56 243, 2019.
systems with BER constraints,” IEEE Trans. Veh. Technol., pp. 1–1, [25] F. Cao, Y. Song, and Y. Yang, “ARQ assisted short-packet communi-
2021. cations for NOMA networks over Nakagami-m fading channels,” IEEE
[9] ——, “Exact bit error-rate analysis of two-user NOMA using QAM with Access, vol. 8, pp. 158 263–158 272, 2020.
arbitrary modulation orders,” IEEE Commun. Lett., vol. 24, no. 12, pp. [26] R. Kotaba, C. N. Manchon, N. M. K. Pratas, T. Balercia, and P. Popovski,
2705–2709, 2020. “Improving spectral efficiency in URLLC via NOMA-based retransmis-
[10] D. Cai, Y. Xu, F. Fang, Z. Ding, and P. Fan, “On the impact of time- sions,” in IEEE Intl. Conf. Commun., 2019, pp. 1–7.
correlated fading for downlink NOMA,” IEEE Trans. Commun., vol. 67, [27] Z. Shi, C. Zhang, Y. Fu, H. Wang, G. Yang, and S. Ma, “Achievable
no. 6, pp. 4491–4504, 2019. diversity order of HARQ-aided downlink NOMA systems,” IEEE Trans.
[11] H. Yahya, A. Al-Dweik, and E. Alsusa, “Power-tolerant NOMA using Veh. Technol., vol. 69, no. 1, pp. 471–487, 2020.
data-aware adaptive power assignment for IoT systems,” IEEE Internet [28] R. Chandran and S. R. Pal, “A novel retransmission scheme for HARQ
Things J, vol. 8, no. 19, pp. 14 896–14 907, 2021. enhancement in NOMA based LTE systems,” in IEEE Wireless Commun.
[12] B. Lyu, P. Ramezani, H. T. Dinh, and A. Jamalipour, “IRS-assisted Netw. Conf., 2019, pp. 1–5.
downlink and uplink NOMA in wireless powered communication net- [29] D. Marasinghe, N. Rajatheva, and M. Latva-Aho, “Block error perfor-
works,” IEEE Trans. Veh. Technol., pp. 1–1, 2021. mance of NOMA with HARQ-CC in finite blocklength,” in IEEE Intl.
[13] A. Al-Dweik et al., “Efficient NOMA design without channel phase Conf. Commun. Workshops, 2020, pp. 1–6.
information using amplitude-coherent detection,” IEEE Trans. Commun., [30] A. J. Al-Dweik, M. Mayhew, R. Muresan, S. M. Ali, and A. Shami,
pp. 1–1, 2021. “Using technology to make roads safer: Adaptive speed limits for an
[14] D.-T. Do, A.-T. Le, Y. Liu, and A. Jamalipour, “User grouping and intelligent transportation system,” IEEE Veh. Technol. Mag., vol. 12,
energy harvesting in UAV-NOMA system with AF/DF relaying,” IEEE no. 1, pp. 39–47, 2017.
Trans. Veh. Technol., vol. 70, no. 11, pp. 11 855–11 868, 2021. [31] L. Yang, R. Muresan, A. Al-Dweik, and L. J. Hadjileontiadis, “Image-
[15] Y. Iraqi and A. Al-Dweik, “Power allocation for reliable SIC detection based visibility estimation algorithm for intelligent transportation sys-
of rectangular QAM-based NOMA systems,” IEEE Trans. Veh. Technol., tems,” IEEE Access, vol. 6, pp. 76 728–76 740, 2018.
vol. 70, no. 8, pp. 8355–8360, 2021. [32] G. R. W. Thoms, R. Muresan, and A. Al-Dweik, “Chaotic encryption
[16] M. Wu, Q. Song, L. Guo, and A. Jamalipour, “Joint user pairing and algorithm with key controlled neural networks for intelligent transporta-
resource allocation in a SWIPT-enabled cooperative NOMA system,” tion systems,” IEEE Access, vol. 7, pp. 158 697–158 709, 2019.
IEEE Trans. Veh. Technol., vol. 70, no. 7, pp. 6826–6840, 2021. [33] V. M. Lidkea, R. Muresan, and A. Al-Dweik, “Convolutional neural
[17] H. Yahya, E. Alsusa, and A. Al-Dweik, “Exact BER analysis of NOMA network framework for encrypted image classification in cloud-based
with arbitrary number of users and modulation orders,” IEEE Trans. ITS,” IEEE Open J. Intell. Transp. Syst., vol. 1, pp. 35–50, 2020.
Commun., vol. 69, no. 9, pp. 6330–6344, 2021. [34] R. Tamanani, R. Muresan, and A. Al-Dweik, “Estimation of driver
[18] A. Al-Dweik and Y. Iraqi, “High throughput wireless links for time- vigilance status using real-time facial expression and deep learning,”
sensitive WSNs with reliable data requirements,” IEEE Sensors J., IEEE Sensors Lett., vol. 5, no. 5, pp. 1–4, 2021.
vol. 21, no. 21, pp. 24 890–24 898, 2021.

You might also like