Enhancing 5G Performance: Reducing Service Time and Research Directions for 6G Standards
thanks: This material is based upon a collaborative work between MIT and JMA Wireless. It is accepted for presentation at the 3rd edition of the International Conference on 6G Networking (6GNet 2024).

Laura Landon, Vipindev Adat Vasudevan, Jaeweon Kim, Junmo Sung, Jeffery Tony Masters, and Muriel Médard Massachusetts Institute of Technology (MIT), Cambridge, USA, Emails: {llandon9, vipindev, medard}@mit.edu JMA Wireless, Syracuse, USA, Emails: {jkim, jsung, tmasters}@jmawireless.com
Abstract

This paper presents several methods for minimizing packet service time in networks using 5G and beyond. We propose leveraging network coding alongside Hybrid Automatic Repeat reQuest (HARQ) to reduce service time as well as optimizing Modulation and Coding Scheme (MCS) selection based on the service time. Our network coding approach includes a method to increase the number of packets in flight, adhering to the current standard of the 16 HARQ process limit, demonstrating that these strategies can enhance throughput and reduce latency. Experimental results show that network coding reduces service times by up to 7%percent77\%7 % in low SNR regimes, with greater reduction across all SNR as the number of packets in flight increases, suggesting that future 6G standards should consider increasing the number of HARQ processes for better performance.

Index Terms:
5G NR MAC layer, HARQ processes, network coding, modulation and coding scheme (MCS), service time optimization

I Introduction

The development of 3GPP standards and research for each new generation is always heavily informed by lessons learned and innovations developed during the rollout of the previous generation. The 5G era introduced several innovations over LTE regarding reliability management. The turbo codes of LTE were largely replaced with Low-Density Parity-Check (LDPC) and polar codes. The hybrid ARQ systems of both LTE and 5G enhance reliability and throughput by combining error correction coding with retransmissions, but 5G adds a number of innovations to improve flexibility in scheduling, such as asynchronous downlink as well as uplink, and more dynamic scheduling of HARQ processes at the MAC layer [1, 2].

A key element of ensuring reliability and quality of service in 5G is the appropriate selection of modulation and coding scheme (MCS), which determines how many bits can be sent per symbol and how much redundancy is introduced to compensate for errors. Currently, MCS selection in 5G NR systems predominantly uses channel quality metrics such as signal-to-noise ratio (SNR) and predefined lookup tables to choose an MCS which will optimize data throughput [3]. However, throughput is not always the primary consideration of a system, such as in the case of ultra-reliable low latency communications (URLLC), and minimizing the throughput does not necessarily minimize the delay.

Network coding is an approach, widely discussed outside the current 3GPP standard, for ensuring reliability of packets in a network within the stringent latency requirements of 5G use cases [4]. In network coding, multiple packets are combined algebraically in groups of K𝐾Kitalic_K before being sent and additional NK𝑁𝐾N-Kitalic_N - italic_K packet combinations are added as forward erasure correction (FEC), with the result that the receiver can decode the necessary information with any combination of K𝐾Kitalic_K packets [5, 6, 7]. If the number of FEC redundant packets is sufficient to compensate for the lost packets, retransmissions are unnecessary. Thus network coding can provide a lower packet service time on average than HARQ where retransmissions are performed based on feedback after a round trip time (RTT).

As standardization bodies actively discuss the standards and innovations for 6G, significant improvements are needed to meet the URLLC requirements of future applications. Through a comprehensive analysis of current HARQ-based reliability mechanisms, we propose several approaches incorporating network coding that achieve high reliability with low latency for next-generation reliability mechanisms. By building on the current 3GPP standards [1, 2] and addressing their challenges, we ensure compatibility with 5G while paving the way for the evolution to 6G systems.

Particularly, this work discusses multiple innovations to reduce service time and a method for choosing the MCS to minimize service time. We demonstrate that replacing HARQ with network coding reduces the service time. We also showcase that the relative benefit of network coding over HARQ with respect to packet service time increases with the number of packets that can be transmitted within a single round trip time, and propose novel methods of using network coding to increase the number of packets in flight at a given time within the bounds of the 16 HARQ process restriction in the current 3GPP standards. This method reduces the wait time for all SNR values while simultaneously maintaining a similar throughput.

II Related Work

Low latency is a key concern in 5G networks, as evidenced by the introduction of URLLC, with its 99.999%percent99.99999.999\%99.999 % reliability and 1111 ms latency requirements [8]. Reliability and latency are often competing requirements, since improving reliability often introduces redundancies which increase the time required to complete transmission. Transmission time and its relation to the current reliability methods in the 3GPP standard, ARQ and HARQ, has been discussed in [9, 10, 11]. Performance of ARQ and HARQ generally improve with incorporation of techniques which adapt to the channel conditions [12, 13]. One of these techniques is adaptive modulation and coding.

Adaptive modulation and coding (AMC) is a technique used to dynamically adjust the MCS based on the current conditions of the wireless communication channel. Generally, the optimum MCS is determined according to previously defined SNR thresholds. These thresholds can be optimized for a variety of metrics. Throughput is commonly used, either with or without a maximum block error rate (BLER) constraint [3]. Some studies have looked into using AMC to reduce delay, such as [14] which found that more aggressive AMC tables reduce delay with HARQ in WiMAX. Others generated new tables for AMC by minimizing delay metrics defined in a variety of ways, such as slots needed to transmit normalized to the highest MCS in ideal conditions [3], overlap of consecutive transmissions in GPRS [15], or time needed to transmit a collection of blocks in EGPRS [16].

Network coding is a technique for ensuring reliability which has been shown to have significant benefit in delay compared with other reliability techniques [17, 18, 19]. The techniques for AMC described above explore the selection of MCS for ARQ or HARQ, generally in earlier generations of the 3GPP standard. This paper adds to this area by exploring a way to minimize service time of transport blocks in 5G, and compares the results for HARQ vs network coding.

III Methodology

In order to examine the improvement in packet service times, it is necessary to establish how we will calculate these service times. Service time corresponds to the time when a packet is first sent and a positive acknowledgment is received for the same (see Fig. 1). For different communication techniques, such as ARQ, HARQ, and network coding, this varies depending on how lost packets are compensated. In selective repeat ARQ (SR-ARQ), the lost packets are retransmitted when a negative acknowledgment is received by the sender, until the packet is successfully received [20]. HARQ follows the same approach but with additional redundancies such that a packet can be recreated intact by combining partially corrupted packets using the LDPC codes. Both these techniques require at least an additional RTT to cover for the lost packet. Network coding uses forward erasure correction technique by sending repair packets a priori to compensate for the lost packets. In the case of network coding, any new reception provides a new degree of freedom, equivalent to a new packet in the ARQ scenario. This reduces the expected wait time. Further details of the service times calculations are explained below. Throughput is defined as the number of original packets sent per second. It can also be estimated as the reciprocal of average service time in a steady state. In case of a completed data transmission, it can also be computed as the total number of packets sent per the time taken to complete the transmission, a method used in most practical simulations.

Refer to caption
Figure 1: Service times for two packets.

III-1 ARQ and HARQ

The expected service time of a queue using a straightforward ARQ-only system would be given by

E[X]𝐸delimited-[]𝑋\displaystyle E[X]italic_E [ italic_X ] =(1p)RTTabsent1𝑝𝑅𝑇𝑇\displaystyle=(1-p)\cdot RTT= ( 1 - italic_p ) ⋅ italic_R italic_T italic_T (1)
+p(1p)2×RTT𝑝1𝑝2𝑅𝑇𝑇\displaystyle+p(1-p)\cdot 2\times RTT+ italic_p ( 1 - italic_p ) ⋅ 2 × italic_R italic_T italic_T
+p2(1p)3×RTTsuperscript𝑝21𝑝3𝑅𝑇𝑇\displaystyle+p^{2}(1-p)\cdot 3\times RTT...+ italic_p start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( 1 - italic_p ) ⋅ 3 × italic_R italic_T italic_T …

where X𝑋Xitalic_X is the service time of a packet, p𝑝pitalic_p is the probability of erasure of that packet, and RTT𝑅𝑇𝑇RTTitalic_R italic_T italic_T is the round trip time between sender and receiver.

Note that we estimate the time from transmission to reception and error checking of a packet as RTT𝑅𝑇𝑇RTTitalic_R italic_T italic_T. At a bitrate of 1 Gbps or greater and an RTT of 10 ms, the propagation time of a transport block at maximum size (approximately 1 million bits) is on the order of a millisecond or less, an order of magnitude smaller than the RTT. The propagation time of a transport block only begins to approach the RTT when both the bitrate is lower than 1 Gbps and the transport block is at its maximum size. Since we are interested in the higher bitrates targeted by 6G [21], we use the assumption that the propagation time can be neglected relative to the RTT to simplify our equations.

5G NR systems use a combination of hybrid ARQ (HARQ) and ARQ to ensure reliable delivery of packets. The estimation of service time for 5G HARQ is complex because it uses a strategy of packet recombining to improve the likelihood that each subsequent transmission will result in a correctly received packet. This means that the probability of successful packet arrival increases with each retransmission, rather than remaining constant.

The probability of erasure in an ARQ-only system, p𝑝pitalic_p, is estimated by the block error rate (BLER) which can be found experimentally or through simulations. This block error rate varies with SNR and MCS, meaning that p𝑝pitalic_p can be expressed as a function of SNR and MCS, p(MCS,SNR)𝑝𝑀𝐶𝑆𝑆𝑁𝑅p(MCS,SNR)italic_p ( italic_M italic_C italic_S , italic_S italic_N italic_R ).

Estimating the improved probability of each HARQ retransmission is complicated. In HARQ, the probability of successful reception on the first transmission is unchanged from that of an ARQ-only system, i.e. p(SNR,MCS)=BLER(SNR,MCS)𝑝𝑆𝑁𝑅𝑀𝐶𝑆𝐵𝐿𝐸𝑅𝑆𝑁𝑅𝑀𝐶𝑆p(SNR,MCS)=BLER(SNR,MCS)italic_p ( italic_S italic_N italic_R , italic_M italic_C italic_S ) = italic_B italic_L italic_E italic_R ( italic_S italic_N italic_R , italic_M italic_C italic_S ). The probability of successful reception on the second transmission (first retransmission), however, is the sum of the probabilities of two different scenarios: first, that the second packet arrives perfectly intact, and second, that both the first and second packets arrive corrupted, but with sufficient information that they can be combined in HARQ to construct the correct packet. The first scenario is that of the ARQ-only scenario, and has probability p(1p)𝑝1𝑝p*(1-p)italic_p ∗ ( 1 - italic_p ). However, in the second scenario, the probability of successfully recovery of a packet depends on the possibility of recovering the bits lost in each transmission through the different redundancy information, which can only be found by an empirical study. In this discussion, we use a simplified estimate of the expected value of the service time in a system using HARQ. The estimate is related to results obtained from using maximum ratio combining to see that a system with N𝑁Nitalic_N receive antennas and a given linear SNR value s𝑠sitalic_s has the same effective signal to noise ratio as a system with only one receive antenna and a linear SNR of Ns𝑁𝑠N*sitalic_N ∗ italic_s. Now, in ARQ, each transmission of a packet is discarded if it is not received intact. In contrast, in HARQ, past transmissions of packets are saved and combined with new transmissions to reconstruct the correct packet. This process of combining transmissions received successively at a single antenna, although time-delayed, is effectively the same process as combining transmissions received simultaneously at multiple antennas.

To arrive at the derivation for our estimate of the probability of being able to decode a packet after N HARQ transmissions, we draw on concepts from estimation theory. It can be shown (see appendix) that for an AWGN channel, the variance of error on the estimate of a single transmission is

σ2=E[X2]E[N2]E[X2]+E[N2]superscript𝜎2𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑁2𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑁2\sigma^{2}=\frac{E[X^{2}]E[N^{2}]}{E[X^{2}]+E[N^{2}]}italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT = divide start_ARG italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] italic_E [ italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG start_ARG italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] + italic_E [ italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG (2)

and the variance of this error for N transmissions combined using HARQ is

σ2=E[X2]E[N2]NE[X2]+E[N2]superscript𝜎2𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑁2𝑁𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑁2\sigma^{2}=\frac{E[X^{2}]E[N^{2}]}{NE[X^{2}]+E[N^{2}]}italic_σ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT = divide start_ARG italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] italic_E [ italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG start_ARG italic_N italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] + italic_E [ italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG (3)

This is the same variance that would result from sending a single transmission with N times the power111This result is similar to the concept of maximum ratio combining (MRC)..

We can use this result to guide our estimate of the probability of packet error at each successive retransmission using HARQ. If we assume that HARQ extracts the maximum mutual information from combining the packets received, then the probability of packet failure (which using our method depends on both MCS μ𝜇\muitalic_μ and SNR s𝑠sitalic_s) is p(μ,s)𝑝𝜇𝑠p(\mu,s)italic_p ( italic_μ , italic_s ) at the first transmission, p(μ,2s)𝑝𝜇2𝑠p(\mu,2s)italic_p ( italic_μ , 2 italic_s ), at the second transmission, and p(μ,Ns)𝑝𝜇𝑁𝑠p(\mu,Ns)italic_p ( italic_μ , italic_N italic_s ) at the Nth transmission, where s𝑠sitalic_s is in linear units before being multiplied by N𝑁Nitalic_N. 222One limitation of this method is its assumption that the channel conditions (affecting both MCS and SNR) remain the same across retransmissions. Refining our estimate to account for changing channel conditions or varying the MCS schemes will be considered in future works and here we assume channel conditions remain the same for brevity.

Applying this to our equation of the expected service time, we get

E[X]=(1p(μ,s))RTT+p(μ,s)(1p(μ,2s))2×RTT+p(μ,s)p(μ,2s)(1p(μ,3s))3×RTT𝐸delimited-[]𝑋1𝑝𝜇𝑠𝑅𝑇𝑇𝑝𝜇𝑠1𝑝𝜇2𝑠2𝑅𝑇𝑇𝑝𝜇𝑠𝑝𝜇2𝑠1𝑝𝜇3𝑠3𝑅𝑇𝑇\begin{split}E[X]&=(1-p(\mu,s))\cdot RTT\\ &+p(\mu,s)(1-p(\mu,2s))\cdot 2\times RTT\\ &+p(\mu,s)p(\mu,2s)(1-p(\mu,3s))\cdot 3\times RTT...\end{split}start_ROW start_CELL italic_E [ italic_X ] end_CELL start_CELL = ( 1 - italic_p ( italic_μ , italic_s ) ) ⋅ italic_R italic_T italic_T end_CELL end_ROW start_ROW start_CELL end_CELL start_CELL + italic_p ( italic_μ , italic_s ) ( 1 - italic_p ( italic_μ , 2 italic_s ) ) ⋅ 2 × italic_R italic_T italic_T end_CELL end_ROW start_ROW start_CELL end_CELL start_CELL + italic_p ( italic_μ , italic_s ) italic_p ( italic_μ , 2 italic_s ) ( 1 - italic_p ( italic_μ , 3 italic_s ) ) ⋅ 3 × italic_R italic_T italic_T … end_CELL end_ROW (4)

Note that this represents only one possible method for estimating the probability of packet failure at each retransmission using HARQ, and our proposed methods for minimizing service time in this document are not dependent on what method is used.

III-2 Network Coding

Network coding, as applied in this paper, is the use of erasure coding by nodes in the network to improve throughput and reliability. It is a technique wherein the information contained in packets is combined together before being transmitted, with additional redundant packet combinations sent at set intervals to compensate for any lost packets. The number of such repair packets can be defined based on the predicted probability of erasure in the communication channel. In contrast with ARQ or hybrid ARQ methods, network coding relies on this use of forward erasure correction to compensate for imperfections in the channel and seeks to avoid retransmission, although it is also possible to send additional repair packets based on feedback if required [22]. Regardless of whether HARQ or network coding is used, similar levels of redundancy will be required to compensate for packet erasure, but by anticipating this redundancy with forward erasure correction, network coding reduces in-order packet delay by avoiding retransmissions and reduces the load on the network.

For those less familiar with the principles of network coding implementation, a node using the block network coding approach applied in this paper begins with a block of K𝐾Kitalic_K data packets to transmit. Rather than transmitting them directly, this node multiplies these K𝐾Kitalic_K packets by a K×N𝐾𝑁K\times Nitalic_K × italic_N matrix of coefficients chosen from a finite field. This results in N𝑁Nitalic_N coded packets, each a linear combination of the original K𝐾Kitalic_K, which are then transmitted by the node. The receiving node uses the inverse of the coefficient matrix to decode K𝐾Kitalic_K of the received packets. The key advantage here of network coding is that the receiver no longer needs to receive specific packets - any K𝐾Kitalic_K of the N𝑁Nitalic_N transmitted packets will suffice to decode the packets, because they are all a linear combination of the original packets. Thus the redundant NK𝑁𝐾N-Kitalic_N - italic_K packets can make up for the loss of any of the preceding K𝐾Kitalic_K packets. In order to optimize the level of redundancy, the value of N𝑁Nitalic_N is chosen such that (NK)/N𝑁𝐾𝑁(N-K)/N( italic_N - italic_K ) / italic_N approximates the block error rate. A more thorough discussion of network coding can be found in [23, 24].

In a system using network coding, a packet loss is not necessarily a problem unless there are more losses in a block than there are redundant FEC packets. This means that in the worst case scenario, the system must wait until all packets in a block have been transmitted before it can determine whether retransmission is required. Now we are concerned not merely with the propagation time of a single packet, but of a whole block of packets, and this needs to be factored in while calculating the E[X]𝐸delimited-[]𝑋E[X]italic_E [ italic_X ].

We will represent the propagation time of a single packet as τ𝜏\tauitalic_τ. (τ𝜏\tauitalic_τ can be estimated as nb/Rbsubscript𝑛𝑏subscript𝑅𝑏n_{b}/R_{b}italic_n start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT / italic_R start_POSTSUBSCRIPT italic_b end_POSTSUBSCRIPT.) Then the expected service time of packets in a system using network coding with K𝐾Kitalic_K original packets and NK𝑁𝐾N-Kitalic_N - italic_K redundant packets (so N𝑁Nitalic_N total) can be calculated as follows:

E[X](1p)(RTT+τ)+i=1NK(Ni)pi(1p)Ni(RTT+iτ+K+12τ)+i=NK+1N(Ni)pi(1p)Ni×(RTT+2NK+12τ+RTT+(iN+K)×τ)𝐸delimited-[]𝑋1𝑝𝑅𝑇𝑇𝜏superscriptsubscript𝑖1𝑁𝐾binomial𝑁𝑖superscript𝑝𝑖superscript1𝑝𝑁𝑖𝑅𝑇𝑇𝑖𝜏𝐾12𝜏superscriptsubscript𝑖𝑁𝐾1𝑁binomial𝑁𝑖superscript𝑝𝑖superscript1𝑝𝑁𝑖𝑅𝑇𝑇2𝑁𝐾12𝜏𝑅𝑇𝑇𝑖𝑁𝐾𝜏\begin{split}E[X]&\approx(1-p)\left(RTT+\tau\right)\\ &+\sum_{i=1}^{N-K}{N\choose i}p^{i}(1-p)^{N-i}\left(RTT+i\tau+\frac{K+1}{2}% \tau\right)\\ &+\sum_{i=N-K+1}^{N}{N\choose i}p^{i}(1-p)^{N-i}\times\\ &\hskip 14.22636pt\left(RTT+\frac{2N-K+1}{2}\tau+RTT+(i-N+K)\times\tau\right)% \end{split}start_ROW start_CELL italic_E [ italic_X ] end_CELL start_CELL ≈ ( 1 - italic_p ) ( italic_R italic_T italic_T + italic_τ ) end_CELL end_ROW start_ROW start_CELL end_CELL start_CELL + ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N - italic_K end_POSTSUPERSCRIPT ( binomial start_ARG italic_N end_ARG start_ARG italic_i end_ARG ) italic_p start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT ( 1 - italic_p ) start_POSTSUPERSCRIPT italic_N - italic_i end_POSTSUPERSCRIPT ( italic_R italic_T italic_T + italic_i italic_τ + divide start_ARG italic_K + 1 end_ARG start_ARG 2 end_ARG italic_τ ) end_CELL end_ROW start_ROW start_CELL end_CELL start_CELL + ∑ start_POSTSUBSCRIPT italic_i = italic_N - italic_K + 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT ( binomial start_ARG italic_N end_ARG start_ARG italic_i end_ARG ) italic_p start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT ( 1 - italic_p ) start_POSTSUPERSCRIPT italic_N - italic_i end_POSTSUPERSCRIPT × end_CELL end_ROW start_ROW start_CELL end_CELL start_CELL ( italic_R italic_T italic_T + divide start_ARG 2 italic_N - italic_K + 1 end_ARG start_ARG 2 end_ARG italic_τ + italic_R italic_T italic_T + ( italic_i - italic_N + italic_K ) × italic_τ ) end_CELL end_ROW (5)

The first line of the equation represents the case that a packet arrives intact. The second line represents the case that a packet is lost, but there are sufficient redundant packets from network coding to make up for its loss. The last line represents the case that a packet is lost and that network coding is not sufficient to make up for it, so the lost packets must be retransmitted.

Note that equation 5 represents a case where the maximum number of retransmissions is 1. However, with network coding, additional redundancy can also be provided by increasing number of extra coded packets included in the block to avoid the retransmissions completely. This is particularly useful if the round trip time is significantly high.

IV Methods to Minimize Service Time

This paper explores several methods to minimize service time. These include a new metric for MCS optimization and two ways of network coding MAC layer transport blocks.

IV-A MCS Optimization

The widely used approach of optimizing MCS code for throughput need not necessarily provide the lowest service time per packet. Service time per packet is an important metric to consider in mission-critical applications and in resource-constrained devices where the number of packets being kept in the service queue needs to be minimized. We propose that the average service time for a given round trip time can be used to optimize MCS for minimum service time.

IV-B Increasing Packets in Flight

As stated previously, the relative benefit of network coding over HARQ with respect to service times increases with the number of packets per round trip time. In 5G NR, the number of packets in flight is limited by the number of HARQ processes, capped at 16. Each HARQ entity will wait for feedback on the frame it sent, as shown in Fig.2.

Refer to caption
Figure 2: Limitation on number of packets due to HARQ process.

However, network coding enables increasing the number of packets in flight, without disturbing the number of HARQ processes. With network coding, because any network-coded packet in a block can be used to decode any other and only the total number of received packets is necessary to decode an entire block, feedback is only required for a block of packets rather than individual packets (in the form of the number of missing degrees of freedom). If each block of linear combinations of packets as described in section III-2 is considered to be served using a single HARQ process, it allows each process to send multiple packets before getting any feedback, this eventually provides K×16𝐾16K\times 16italic_K × 16 packets to be allowed in flight using the 16 HARQ processes, where K𝐾Kitalic_K is the size of original packets in a coded block. An example with a code where 3 original packets are included in each code block is shown in Fig. 3. Redundant packets are not explicitly shown in this figure because the key feature of this method is the use of block ACK/NACKs. Theoretically, it is also possible to implement network coding with no redundancy and it would still give the efficiency benefits of block acknowledgments. In this case the necessary number of repair packets can be sent based on the acknowledgment.

It is relevant to note that with this sending structure, the time of the coded block would be longer than the transmission time of a single packet, but this time will be negligible for the same reasons explained in the section III: propagation time vs RTT. This is because using the new model, a block of size n𝑛nitalic_n will take nτ𝑛𝜏n\tauitalic_n italic_τ sec to transmit but only one RTT must be waited before receiving feedback and moving on to the next block, whereas in the existing design, each packet will take τ𝜏\tauitalic_τ sec to transmit and an RTT before the process can move on, meaning that those same n𝑛nitalic_n blocks would take n(τ+RTT)𝑛𝜏𝑅𝑇𝑇n(\tau+RTT)italic_n ( italic_τ + italic_R italic_T italic_T ) to process. Since we already established that RTT is significantly larger than tau, this means sending blocks is significantly more efficient than sending individual packets. The only concern here would be if n𝑛nitalic_n is high enough that nτ𝑛𝜏n\tauitalic_n italic_τ begins to approach RTT, but even then, nτ+RTT<<n(τ+RTT)much-less-than𝑛𝜏𝑅𝑇𝑇𝑛𝜏𝑅𝑇𝑇n\tau+RTT<<n(\tau+RTT)italic_n italic_τ + italic_R italic_T italic_T < < italic_n ( italic_τ + italic_R italic_T italic_T ) so sending blocks would still be more efficient than sending individual packets.

Refer to caption
Figure 3: With network coding, the number of packets in flight can be increased by an order of how many original packets are included in a single code block.

Another approach to increase the number of packets is by initiating multiple streams, by introducing an intermediate network coding layer between the RLC and MAC layers in the protocol stack. This network coding layer can take packets from the RLC layer, make them into multiple streams, and then code inside each stream. Each stream can have its own HARQ processes. This provides another layer of parallelization and further increases the number of packets in flight. This approach can work along with the block-level acknowledgment, providing a cascading effect in the number of packets in flight.

Refer to caption
Figure 4: New network coding layer introduced in the 5G protocol stack.

As an aside on implementation methods, integrating network coding into a 5G system at the HARQ level requires MAC-level changes to the code on both the base station and the user equipment (UE), in order to both encode and decode packets. Commercially available base stations and UEs generally do not expose these lower levels of code for modification, but open source testbeds such as Eurecom’s Open Air Interface are designed to be a publicly available implementation of 5G and can be used to access these lower layers. While we used Matlab to simulate the delay and throughput effects of network coding vs. HARQ, an implementation in such a 5G testbed would be the next logical step in establishing confidence in these results.

V Results and Discussion

We collected simulated BLER values for each combination of MCS index and SNR value across a range of SNRs in a system with transport block retransmission disabled. We used MCS table 5.1.3.1-2 found in standard [1] and SNRs ranging from 66-6- 6 to 27272727 dB with increments of 0.10.10.10.1 dB. Then using these BLER values as the probability of error p𝑝pitalic_p, we simulated the different reliability approaches (HARQ and network coding) in MATLAB to estimate the average service time for different approaches mentioned in section IV. This simulation was performed on a slot by slot basis, where the transport block in any given slot was randomly determined to be in error or not according to a Bernoulli distribution with p=BLER𝑝𝐵𝐿𝐸𝑅p=BLERitalic_p = italic_B italic_L italic_E italic_R. The service time is calculated as the time between the first transmission of a transport block and its eventual correct reception after retransmissions and/or coding depending on the reliability approach. Optimization of MCS based on service time was also performed. We further tested the performance of both approaches for the 99thsuperscript99𝑡99^{th}99 start_POSTSUPERSCRIPT italic_t italic_h end_POSTSUPERSCRIPT percentile of service times. This is particularly interesting as it helps provide service-level performance guarantees.

V-A Optimizing MCS for service time: HARQ

When there are multiple MCS options available for a particular Eb/N0𝐸𝑏𝑁0Eb/N0italic_E italic_b / italic_N 0, the optimal MCS for minimum service time can be different than the optimal MCS for maximum throughput. This can be seen in Fig. 5, where the optimal MCS index for service time is different compared to the optimal MCS index for throughput. These different MCS indices result in different service times as well. With the current HARQ approach, the benefit of optimizing for service time is not providing significant performance gains. However, this may be important with a different coding scheme.

Refer to caption
Figure 5: Optimizing MCS index for wait time vs. throughput for HARQ.

V-B Optimizing MCS for service time: Network coding reduces delay compared to HARQ

When using service time-based optimization, it is particularly relevant to consider network coding. With sufficient and appropriate code rates, network coding provides a lower time in the queue than the current HARQ approach. The lower service time also corresponds to a higher number of packets being served, for a given arrival rate.

The effects of network coding on service time optimization can be seen in Fig. 6, in which it can be seen that network coding always results in a service time equal to or less than that of HARQ. With the limitation in 5G of 16 TBs maximum in flight over an RTT, this is particularly significant in low SNR regimes, where the erasure probability is higher.

Refer to caption
Figure 6: In the low SNR regime, network coding provides better wait times with only a small reduction in throughput.

V-C Limitation of 16 HARQ Processes

The effect of transport blocks per round trip time on the disparity between service times for network coding vs. HARQ is shown below in Fig. 7, in which the 16-process cap on HARQ is not taken into account in subfigure 7(b).

Refer to caption
(a) System in which 16 transport blocks are sent during one round-trip time.
Refer to caption
(b) System in which 160 transport blocks are sent during one round-trip time.
Figure 7: Wait time comparison of systems with 16 vs. 160 transport blocks per RTT. Note that with 160 TBs per RTT, the wait time is reduced compared to 16 TBs per RTT.

These figures demonstrate that network coding has lower wait times than HARQ for both 16 and 160 packets per RTT, but the difference is more significant in the case of 160 packets per RTT. The current 16 packets per RTT limitation imposed by 5G standards means that this improvement cannot be directly applied to the current protocol stack, but future systems may find it worth exploring the benefit of increasing the number of packets that can be in flight during an RTT using the network coding layer.

V-D Increasing Packets in Flight via Network Coding

While changes to the number of HARQ processes may be considered in future work, the method we proposed in subsection IV-B to commandeer the HARQ process to send a complete network-coded block instead of a packet enables network coding to further improve the service time in a system while still working within the current 5G standard. With this approach, the improvement is consistent even in a high SNR range, where the probability of erasures is very low, as we can now send more packets. This also improves the throughput and provides better throughput when using network coding compared to HARQ. This approach is possible only with network coding, thanks to the possibility of working with block-level feedback. Fig.8 shows the benefit of our approach with a code rate of 3/4343/43 / 4.

Refer to caption
Figure 8: At a code rate of 3/4, network coding reduces wait times with no corresponding tradeoff in throughput.

V-E Improved Service Level Agreement

The improvement in service time provided by network coding has implications for service level agreements. For the same channel conditions, network coding has a lower 99thsuperscript99th99^{\text{th}}99 start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT percentile service time than HARQ. We define the 99thsuperscript99th99^{\text{th}}99 start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT percentile service time as the maximum of the lowest 99%percent9999\%99 % of service times for all transport blocks in a system. In other words, 99%percent9999\%99 % of transport blocks will have a service time less than or equal to the 99thsuperscript99th99^{\text{th}}99 start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT percentile service time. These 99thsuperscript99th99^{\text{th}}99 start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT percentile service times can be used as a service level guarantee.

Fig. 9 compares the service level guarantees of network coding and HARQ for different channel conditions, represented by the probability of erasure.

Refer to caption
Figure 9: The 99thsuperscript99𝑡99^{th}99 start_POSTSUPERSCRIPT italic_t italic_h end_POSTSUPERSCRIPT percentile service times of HARQ are approximately double to those of NC.

VI Conclusion

In this paper, we have investigated a method for optimizing Modulation and Coding Scheme (MCS) selection in 5G networks to minimize packet service time. Our analysis demonstrated that the packet service time can be reduced up to 7%percent77\%7 % in low SNR regimes by integrating network coding with or in place of traditional HARQ mechanisms. Additionally, we proposed an innovative approach using network coding to increase the number of packets in flight within the current constraint of 16 HARQ processes, demonstrating that packet service times can be reduced for all SNRs without reducing the throughput. Future work could explore applying network coding to TDD. As network coding requires a feedback only per block, not per frame, the number of feedback slots in a TDD pattern can be reduced. This allows more packets to be sent within a time frame, another advantage of network coding that can result in increased throughput. While our methods show considerable improvements within the existing 5G framework, our findings also suggest that future wireless standards, such as 6G, could benefit from increasing the number of HARQ processes beyond the current limit. This enhancement would enable more flexible and efficient data transmission strategies, further reducing packet service times and improving overall network performance.

To arrive at the derivation for our estimate of the probability of being able to decode a packet after N HARQ transmissions, we consider tools from estimation theory. Rather than asking whether a packet was intact or corrupted, we will treat any received packet as a measured value Y𝑌Yitalic_Y of the sent packet, X𝑋Xitalic_X. We have Y=X+N𝑌𝑋𝑁Y=X+Nitalic_Y = italic_X + italic_N where N𝑁Nitalic_N represents the effects of noise.

We will represent the channel as AWGN. This means that the minimum mean-squared error (MMSE) is also the linear least square error (LLSE). Then we are seeking to minimize the squared error,

E[(X^X)2]𝐸delimited-[]superscript^𝑋𝑋2\displaystyle E[(\hat{X}-X)^{2}]italic_E [ ( over^ start_ARG italic_X end_ARG - italic_X ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] =E[(αY1X)2]absent𝐸delimited-[]superscript𝛼subscript𝑌1𝑋2\displaystyle=E[(\alpha Y_{1}-X)^{2}]= italic_E [ ( italic_α italic_Y start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT - italic_X ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] (6)
=E[(αX+αNX)2]absent𝐸delimited-[]superscript𝛼𝑋𝛼𝑁𝑋2\displaystyle=E[(\alpha X+\alpha N-X)^{2}]= italic_E [ ( italic_α italic_X + italic_α italic_N - italic_X ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ]
=E[(α1)2X2+2α(α1)XN+α2N2]absent𝐸delimited-[]superscript𝛼12superscript𝑋22𝛼𝛼1𝑋𝑁superscript𝛼2superscript𝑁2\displaystyle=E[(\alpha-1)^{2}X^{2}+2\alpha(\alpha-1)XN+\alpha^{2}N^{2}]= italic_E [ ( italic_α - 1 ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + 2 italic_α ( italic_α - 1 ) italic_X italic_N + italic_α start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ]

The middle term 2α(α1)XN2𝛼𝛼1𝑋𝑁2\alpha(\alpha-1)XN2 italic_α ( italic_α - 1 ) italic_X italic_N has an expectation of zero because the signal and noise are independent and zero mean. Since the expectation term is a linear operator, this gives

E[(X^X)2]𝐸delimited-[]superscript^𝑋𝑋2\displaystyle E[(\hat{X}-X)^{2}]italic_E [ ( over^ start_ARG italic_X end_ARG - italic_X ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] =\displaystyle== (7)
(α1)2E[X2]+α2E[N2].superscript𝛼12𝐸delimited-[]superscript𝑋2superscript𝛼2𝐸delimited-[]superscript𝑁2\displaystyle(\alpha-1)^{2}E[X^{2}]+\alpha^{2}E[N^{2}].( italic_α - 1 ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] + italic_α start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_E [ italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] .

We can take the derivative of the α𝛼\alphaitalic_α term from here to find that this error expectation is minimized at

α=E[X2]E[X2]+E[N2].𝛼𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑁2\alpha=\frac{E[X^{2}]}{E[X^{2}]+E[N^{2}]}.italic_α = divide start_ARG italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG start_ARG italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] + italic_E [ italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG . (8)

Now, consider the case of a single HARQ retransmission, so that we have received the same packet transmitted twice. In this case, we would like to combine the information we have received from these two measurements and form one single estimate. This can be represented as X^=α1Y1+α2Y2^𝑋subscript𝛼1subscript𝑌1subscript𝛼2subscript𝑌2\hat{X}=\alpha_{1}Y_{1}+\alpha_{2}Y_{2}over^ start_ARG italic_X end_ARG = italic_α start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT italic_Y start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT + italic_α start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT italic_Y start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT, where Y1subscript𝑌1Y_{1}italic_Y start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT and Y2subscript𝑌2Y_{2}italic_Y start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT are the two received transmissions and αisubscript𝛼𝑖\alpha_{i}italic_α start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT gives the corresponding weighting. Note that Yi=X+Nisubscript𝑌𝑖𝑋subscript𝑁𝑖Y_{i}=X+N_{i}italic_Y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = italic_X + italic_N start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, with X𝑋Xitalic_X the same in each case because it is the same packet being transmitted. In this case, we can repeat the process shown above to see that

E[(X^X)2]=E[(α1Y1+α2Y2X)2]=E[(α1X+α1N1+α2X+α2N2X)2]=(α1+α21)2E[X2]+α12E[N12]+α22E[N22].𝐸delimited-[]superscript^𝑋𝑋2𝐸delimited-[]superscriptsubscript𝛼1subscript𝑌1subscript𝛼2subscript𝑌2𝑋2𝐸delimited-[]superscriptsubscript𝛼1𝑋subscript𝛼1subscript𝑁1subscript𝛼2𝑋subscript𝛼2subscript𝑁2𝑋2superscriptsubscript𝛼1subscript𝛼212𝐸delimited-[]superscript𝑋2superscriptsubscript𝛼12𝐸delimited-[]superscriptsubscript𝑁12superscriptsubscript𝛼22𝐸delimited-[]superscriptsubscript𝑁22\begin{split}E[(\hat{X}-X)^{2}]&=E[(\alpha_{1}Y_{1}+\alpha_{2}Y_{2}-X)^{2}]\\ &=E[(\alpha_{1}X+\alpha_{1}N_{1}+\alpha_{2}X+\alpha_{2}N_{2}-X)^{2}]\\ &=(\alpha_{1}+\alpha_{2}-1)^{2}E[X^{2}]+\\ &\hskip 28.45274pt\alpha_{1}^{2}E[N_{1}^{2}]+\alpha_{2}^{2}E[N_{2}^{2}].\end{split}start_ROW start_CELL italic_E [ ( over^ start_ARG italic_X end_ARG - italic_X ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_CELL start_CELL = italic_E [ ( italic_α start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT italic_Y start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT + italic_α start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT italic_Y start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT - italic_X ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_CELL end_ROW start_ROW start_CELL end_CELL start_CELL = italic_E [ ( italic_α start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT italic_X + italic_α start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT italic_N start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT + italic_α start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT italic_X + italic_α start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT italic_N start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT - italic_X ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_CELL end_ROW start_ROW start_CELL end_CELL start_CELL = ( italic_α start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT + italic_α start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT - 1 ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] + end_CELL end_ROW start_ROW start_CELL end_CELL start_CELL italic_α start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_E [ italic_N start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] + italic_α start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_E [ italic_N start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] . end_CELL end_ROW (9)

We can take two partial derivatives (one with respect to α1subscript𝛼1\alpha_{1}italic_α start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT and one with respect to α2subscript𝛼2\alpha_{2}italic_α start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT) to find that this error expectation is minimized at

α1=(1α2)E[X2]E[X2]+E[N2]subscript𝛼11subscript𝛼2𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑁2\alpha_{1}=\frac{(1-\alpha_{2})E[X^{2}]}{E[X^{2}]+E[N^{2}]}italic_α start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT = divide start_ARG ( 1 - italic_α start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ) italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG start_ARG italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] + italic_E [ italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG (10)

and

α2=(1α1)E[X2]E[X2]+E[N2].subscript𝛼21subscript𝛼1𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑁2\alpha_{2}=\frac{(1-\alpha_{1})E[X^{2}]}{E[X^{2}]+E[N^{2}]}.italic_α start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT = divide start_ARG ( 1 - italic_α start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ) italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG start_ARG italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] + italic_E [ italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG . (11)

Solving for α1subscript𝛼1\alpha_{1}italic_α start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT and α2subscript𝛼2\alpha_{2}italic_α start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT will show that α1=α2subscript𝛼1subscript𝛼2\alpha_{1}=\alpha_{2}italic_α start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT = italic_α start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT, so we drop the subscripts and obtain

α=E[X2]E[X2]+E[N2]1+E[X2]E[X2]+E[N2]=E[X2]2E[X2]+E[N2].𝛼𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑁21𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑁2𝐸delimited-[]superscript𝑋22𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑁2\alpha=\frac{\frac{E[X^{2}]}{E[X^{2}]+E[N^{2}]}}{1+\frac{E[X^{2}]}{E[X^{2}]+E[% N^{2}]}}=\frac{E[X^{2}]}{2E[X^{2}]+E[N^{2}]}.italic_α = divide start_ARG divide start_ARG italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG start_ARG italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] + italic_E [ italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG end_ARG start_ARG 1 + divide start_ARG italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG start_ARG italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] + italic_E [ italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG end_ARG = divide start_ARG italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG start_ARG 2 italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] + italic_E [ italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG . (12)

Now, the variance in the case of a single transmission is

σ12=E[X2]E[N2]E[X2]+E[N2]superscriptsubscript𝜎12𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑁2𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑁2\sigma_{1}^{2}=\frac{E[X^{2}]E[N^{2}]}{E[X^{2}]+E[N^{2}]}italic_σ start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT = divide start_ARG italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] italic_E [ italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG start_ARG italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] + italic_E [ italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG (13)

and the variance in the case of two transmissions is

σ22=E[X2]E[N2]2E[X2]+E[N2].superscriptsubscript𝜎22𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑁22𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑁2\sigma_{2}^{2}=\frac{E[X^{2}]E[N^{2}]}{2E[X^{2}]+E[N^{2}]}.italic_σ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT = divide start_ARG italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] italic_E [ italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG start_ARG 2 italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] + italic_E [ italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG . (14)

It can similarly be shown that this generalizes for K𝐾Kitalic_K transmissions, such that

σK2=E[X2]E[N2]KE[X2]+E[N2],superscriptsubscript𝜎𝐾2𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑁2𝐾𝐸delimited-[]superscript𝑋2𝐸delimited-[]superscript𝑁2\sigma_{K}^{2}=\frac{E[X^{2}]E[N^{2}]}{KE[X^{2}]+E[N^{2}]},italic_σ start_POSTSUBSCRIPT italic_K end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT = divide start_ARG italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] italic_E [ italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG start_ARG italic_K italic_E [ italic_X start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] + italic_E [ italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] end_ARG , (15)

which is the same variance which is obtained through maximal ratio combining [25], a method for diversity combining which adds the signals from each channel together.

Now, the mutual information is related to the entropy by the equation I(X;(Y1,,YK))=H(X)H(X|Y1,,YK)𝐼𝑋subscript𝑌1subscript𝑌𝐾𝐻𝑋𝐻conditional𝑋subscript𝑌1subscript𝑌𝐾I(X;(Y_{1},...,Y_{K}))=H(X)-H(X|Y_{1},...,Y_{K})italic_I ( italic_X ; ( italic_Y start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_Y start_POSTSUBSCRIPT italic_K end_POSTSUBSCRIPT ) ) = italic_H ( italic_X ) - italic_H ( italic_X | italic_Y start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_Y start_POSTSUBSCRIPT italic_K end_POSTSUBSCRIPT ). Note that variance can be lower bounded as follows:

σK2=E[(X^X)2]12πe22h(X|Y1,,YK)superscriptsubscript𝜎𝐾2𝐸delimited-[]superscript^𝑋𝑋212𝜋𝑒superscript22conditional𝑋subscript𝑌1subscript𝑌𝐾\sigma_{K}^{2}=E[(\hat{X}-X)^{2}]\geq\frac{1}{2\pi e}2^{2h(X|Y_{1},...,Y_{K})}italic_σ start_POSTSUBSCRIPT italic_K end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT = italic_E [ ( over^ start_ARG italic_X end_ARG - italic_X ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ] ≥ divide start_ARG 1 end_ARG start_ARG 2 italic_π italic_e end_ARG 2 start_POSTSUPERSCRIPT 2 italic_h ( italic_X | italic_Y start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_Y start_POSTSUBSCRIPT italic_K end_POSTSUBSCRIPT ) end_POSTSUPERSCRIPT (16)

and equality holds if X𝑋Xitalic_X is Gaussian [26]. In this case we have hhitalic_h minimized as h(X|Y1,,YK)=12+12ln(2πσK2)conditional𝑋subscript𝑌1subscript𝑌𝐾12122𝜋superscriptsubscript𝜎𝐾2h(X|Y_{1},...,Y_{K})=\frac{1}{2}+\frac{1}{2}\ln\left(2\pi\sigma_{K}^{2}\right)italic_h ( italic_X | italic_Y start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_Y start_POSTSUBSCRIPT italic_K end_POSTSUBSCRIPT ) = divide start_ARG 1 end_ARG start_ARG 2 end_ARG + divide start_ARG 1 end_ARG start_ARG 2 end_ARG roman_ln ( 2 italic_π italic_σ start_POSTSUBSCRIPT italic_K end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ), which means that I(X;(Y1,,YK))𝐼𝑋subscript𝑌1subscript𝑌𝐾I(X;(Y_{1},...,Y_{K}))italic_I ( italic_X ; ( italic_Y start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_Y start_POSTSUBSCRIPT italic_K end_POSTSUBSCRIPT ) ) is maximized when we set X𝑋Xitalic_X as Gaussian. Then the maximum mutual information of the transmissions depends solely on the variance in the error estimate. Since the variance we obtain by combining the information content of successive transmissions is the same as the variance obtained using maximal ratio combining [25], we see that the maximal mutual information of the tranmissions must also be the same as that obtained using maximal ratio combining.

References

  • [1] 3GPP-TS.38.214, “Physical layer procedures for data,” 3rd Generation Partnership Project (3GPP), Technical Specification (TS) 38.214, 09 2020, version 16.3.0.
  • [2] 3GPP-TS.38.321, “Medium Access Control (MAC) protocol specification,” 3rd Generation Partnership Project (3GPP), Technical Specification (TS) 38.321, 12 2020, version 16.3.0.
  • [3] M. López-Benítez, “Performance analysis of snr threshold-setting strategies for adaptive modulation and coding under fading channels,” Physical Communication, vol. 30, pp. 154–166, 2018.
  • [4] E. Dias, D. Raposo, H. Esfahanizadeh, A. Cohen, T. Ferreira, M. Luís, S. Sargento, and M. Médard, “Sliding window network coding enables next generation urllc millimeter-wave networks,” IEEE Networking Letters, 2023.
  • [5] R. Ahlswede, N. Cai, S.-Y. Li, and R. W. Yeung, “Network information flow,” IEEE Transactions on information theory, vol. 46, no. 4, pp. 1204–1216, 2000.
  • [6] T. Ho, M. Médard, R. Koetter, D. R. Karger, M. Effros, J. Shi, and B. Leong, “A random linear network coding approach to multicast,” IEEE Transactions on information theory, vol. 52, no. 10, pp. 4413–4430, 2006.
  • [7] C. Fragouli, J.-Y. Le Boudec, and J. Widmer, “Network coding: an instant primer,” ACM SIGCOMM Computer Communication Review, vol. 36, no. 1, pp. 63–68, 2006.
  • [8] 3GPP-TS.22.862, “Feasibility study on new services and markets technology enablers for critical communications; Stage 1,” 3rd Generation Partnership Project (3GPP), Technical Specification (TS) 22.862, 10 2016, version 14.1.0.
  • [9] H. El Gamal, G. Caire, and M. Damen, “The mimo arq channel: Diversity–multiplexing–delay tradeoff,” IEEE Transactions on Information Theory, vol. 52, no. 8, pp. 3601–3621, 2006.
  • [10] S. Ahmadi, Mobile WiMAX: A systems approach to understanding IEEE 802.16 m radio access technology.   Academic Press, 2010.
  • [11] A. Chelli, E. Zedini, M.-S. Alouini, M. Pätzold, and I. Balasingham, “Throughput and delay analysis of harq with code combining over double rayleigh fading channels,” IEEE Transactions on Vehicular Technology, vol. 67, no. 5, pp. 4233–4247, 2018.
  • [12] V. Towhidlou and M. Shikh-Bahaei, “Improved cognitive networking through full duplex cooperative arq and harq,” IEEE Wireless Communications Letters, vol. 7, no. 2, pp. 218–221, 2018.
  • [13] W. Ding and M. Shikh-Bahaei, “Harq delay minimization of 5g wireless network with imperfect feedback,” in ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2023, pp. 1–5.
  • [14] I. Adhicandra, R. G. Garroppo, and S. Giordano, “Optimizing system capacity and application delays in wimax networks,” in 2009 6th International Symposium on Wireless Communication Systems, 2009, pp. 540–544.
  • [15] M. López-Benítez and J. Gozálvez, “Link adaptation algorithms for improved delivery of delay-and error-sensitive packet-data services over wireless networks,” Wireless networks, vol. 16, pp. 593–606, 2010.
  • [16] W. Luo, K. Balachandran, S. Nanda, and K. Chang, “Packet size dependent link adaptation for wireless packet data,” in Globecom ’00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137), vol. 1, 2000, pp. 53–56 vol.1.
  • [17] J. Skulic, A. Gkelias, and K. K. Leung, “Delay analysis of network coding in linear wireless sensor networks,” in 2013 IEEE Conference on Wireless Sensor (ICWISE), 2013, pp. 25–29.
  • [18] W. C. Ao, P.-Y. Chen, and K.-C. Chen, “Rate–reliability–delay tradeoff of multipath transmission using network coding,” IEEE Transactions on Vehicular Technology, vol. 61, no. 5, pp. 2336–2342, 2012.
  • [19] D. E. Lucani, M. Medard, and M. Stojanovic, “On coding for delay—network coding for time-division duplexing,” IEEE Transactions on Information Theory, vol. 58, no. 4, pp. 2330–2348, 2012.
  • [20] A. M. Cipriano, P. Gagneur, G. Vivier, and S. Sezginer, “Overview of arq and harq in beyond 3g systems,” in 2010 IEEE 21st International Symposium on Personal, Indoor and Mobile Radio Communications Workshops, 2010, pp. 424–429.
  • [21] S. Chen, Y.-C. Liang, S. Sun, S. Kang, W. Cheng, and M. Peng, “Vision, requirements, and technology trend of 6g: How to tackle the challenges of system coverage, capacity, user data-rate and movement speed,” IEEE Wireless Communications, vol. 27, no. 2, pp. 218–228, 2020.
  • [22] A. Cohen, D. Malak, V. B. Bracha, and M. Médard, “Adaptive causal network coding with feedback,” IEEE Transactions on Communications, vol. 68, no. 7, pp. 4325–4341, 2020.
  • [23] T. Ho and D. Lun, Network coding: an introduction.   Cambridge University Press, 2008.
  • [24] M. Médard and A. Sprintson, Network coding: Fundamentals and applications.   Academic Press, 2012.
  • [25] M. Medard, “Processing of wireless signals to preserve wireline network resources,” in WCNC. 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466), vol. 1, 1999, pp. 61–65 vol.1.
  • [26] S. Fang, M. Skoglund, K. H. Johansson, H. Ishii, and Q. Zhu, “Generic variance bounds on estimation and prediction errors in time series analysis: An entropy perspective,” in 2019 IEEE Information Theory Workshop (ITW), 2019, pp. 1–5.