The present invention relates to the field of digital communications. In this field, the invention relates more particularly to the transmission of coded data between at least two sources and a destination with relaying by at least two nodes that can be relays or sources.
It is understood that a relay does not have a message to transmit. A relay is a node dedicated to the relaying of the messages from the sources while the source has its own message to transmit and can also in some cases relay the messages from the other sources, i.e. the source is in this case called cooperative.
There are many relaying techniques known as: “amplify and forward”, “decode and forward”, “compress-and-forward”, “non-orthogonal amplify and forward”, “dynamic decode and forward”, etc.
The invention applies notably, but not exclusively, to the transmission of data via mobile networks, for example for real-time applications, or via, for example, networks of sensors.
Such a network of sensors is a multiuser network, composed of several sources, several relays and a recipient using a time-orthogonal multiple access scheme for the transmission channel between the relays and the destination, denoted OMAMRC (“Orthogonal Multiple-Access Multiple-Relay Channel”).
An OMAMRC transmission system implementing a slow link adaptation is known from the application WO 2019/162592 published on Aug. 29, 2019. The content of this application is included by reference.
An OMAMRC telecommunication system has M sources, possibly L relays and a destination, M≥2, L≥0 and a time-orthogonal multiple access scheme for the transmission channel which is applied between the nodes taken from among the M sources and the L relays. The maximum number of time slots per frame transmitted is M+Tmax with M slots allocated during a first phase to the successive transmission from the M sources and Tused≤Tmax slots for one or more cooperative transmissions allocated during a second phase to one or more nodes selected by the destination according to a selection strategy.
The OMAMRC transmission system considered comprises at least two sources, each of these sources being able to operate at different instants either as a source or as a relaying node. The system can possibly further comprise relays. The term node covers both a relay and a source acting as a relaying node or as a source. The system considered is such that the nodes can themselves be relays. A relay is distinguished from a source in that it does not have a message to transmit which is specific to it, i.e. it simply retransmits messages originating from other nodes.
The links between the different nodes of the system are subject to slow fading and to Gaussian white noise. The knowledge of all the links of the system (CSI: Channel State Information) by the destination is not available. Indeed, the links between the sources, between the relays, between the relays and the sources cannot directly be observed by the destination and the knowledge thereof by the destination would entail an excessive exchange of information between the sources, the relays and the destination. To limit the overhead of the return channel (feedback overhead), only information on the distribution/statistics of the channels (CDI: Channel Distribution Information) of all the links, e.g. average quality (for example average SNR, average SINR) of all the links, is assumed to be known by the destination in order to determine the bit rates allocated to the sources.
The link adaptation is of slow type, that is to say that, before any transmission, the destination allocates initial bit rates to the sources knowing the distribution of all the channels (CDI: Channel Distribution Information). In general, it is possible to work out the CDI distribution on the basis of the knowledge of the average SNR or SINR of each link of the system.
The transmissions of the messages from the sources are divided into frames during which the CSIs of the links are assumed constant (assuming slow fading). The bit rate allocation is assumed not to change during several hundreds of frames, it changes only with changes of CDI.
The method distinguishes three phases, an initial phase and, for each frame to be transmitted, a first phase and a second phase. The transmission of a frame proceeds in two phases which are possibly preceded by an additional phase, called initial phase.
During the initialization phase, the destination determines an initial bit rate for each source by taking into account the average quality (for example SNR) of each of the links of the system.
The destination estimates the quality (for example SNR) of the direct links source to destination and relay to destination according to known techniques based on the use of reference signals. The quality of the source-source, relay-relay and source-relay links is estimated by the sources and the relays by, for example, using the reference signals. The sources and the relays transmit to the destination the average qualities of the links This transmission takes place before the initialization phase. Only the average value of the quality of a link is taken into account, so the refreshing thereof takes place on a long timescale, that is to say over a time which makes it possible to average the rapid variations (fast fading) of the channel. This time is of the order of the time needed to cover several tens of wavelength of the frequency of the signal transmitted for a given speed. The initialization phase takes place for example every 200 to 1000 frames. The destination uploads to the sources, via a return channel, the initial bit rates that it has determined. The initial bit rates remain constant between two occurrences of the initialization phase.
During the first phase, the M sources successively transmit their message during the M time slots by respectively using modulation and coding schemes determined on the basis of the initial bit rates.
During this phase, the number N1 of channel uses (i.e. resource element according to the 3GPP terminology) is fixed and identical for each of the sources.
During the second phase, the messages from the sources are transmitted cooperatively by the relays and/or by the sources. This phase lasts at most Tmax time slots. During this phase, the number N2 of channel uses is fixed and identical for each of the sources.
The mutually independent sources, during the first phase, broadcast their sequences of coded information in the form of messages for the attention of a single recipient. Each source broadcasts its messages with the initial bit rate. The destination communicates to each source its initial bit rate via control channels with very limited bit rate. Thus, during the first phase, the sources transmit, each in turn, their respective message during time slots each dedicated to a source.
The sources other than that which transmits, and possibly the relays, of “Half Duplex” type, receive the successive messages from the sources, decode them and, if they are selected, generate a message solely from the messages from the sources decoded without error.
The selected nodes then access the channel in a mutually time-orthogonal manner during the second phase to transmit their generated message to the destination.
The destination can choose the node that must transmit at a given instant.
The method implements a strategy to maximize the average metric efficiency (utility metric) in the system considered subject to the constraint of observing an individual quality of service (QoS) per source, i.e. an average individual BLER per source:
in which
The QoS constraint on the individual BLER given by the source is written: BLERi≤BLERQoS,i, ∀i∈{1, . . . , M}. An algorithm based on an approach without interference, or “Genie Aided” approach, is used to resolve the problem of optimization of multidimensional bit rate allocation. This approach consists in independently determining each initial bit rate of a source by assuming that all the messages from the other sources are known to the destination and the relays then in iteratively determining the bit rates by initializing their value with the values determined according to the “Genie Aided” approach. The utility metric which consists of a spectral efficiency is conditioned on the node selection strategy which takes place during the second phase.
The subject of the present invention is a transmission method with slow link adaptation for an OMAMRC telecommunication system according to which the number of channel uses is determined by the destination for each source, i.e. per time slot, on the basis of a knowledge of the statistical distribution of all the channels (Channel Distribution Information).
By introducing a variable number of channel uses, with slow adaptation controlled by the destination, unlike the known method for which this number is fixed, the present invention substantially enhances the performance levels of the method.
To simplify the method, only the number of channel uses for the first phase is variable, the number N2 of channel uses for the second phase is fixed.
The number N1,1 of channel uses by a source for the first phase can thus be adapted by taking account of the distribution of the channels CDI.
The distribution of the channels CDI can be based for example on the knowledge of an average SNR (or SINR, or equivalent indicator) of each of the channels, provided that all the links are considered to be mutually independent and that the fast fading follows a Gaussian distribution, i.e. a so-called Rayleigh fading. Based on the knowledge of the average SNRs, the destination aims to optimize the ratio αi=N2/N1,i jointly with the transmission bit rate Ri=K1/N1,i by the source i during the first phase i.
During the second phase, the destination selects, on each time slot t ∈{1, . . . , Tuned} the node from among the sources and the relays which will transmit by using the N2 channel uses.
The slow link adaptation implemented by the destination tends to maximize the average utility metric modified by the introduction of the ratio αi=N2/N1,i. This metric is thus a function with multiple variables which depends on the current value taken by the bit rate variables R1, . . . , RM and by the variables of the ratio α1, . . . , αM between the number N2 of channel uses during the second phase and the number N1,i of channel uses during the first phase:
According to one embodiment, since the channel uses consist of time and/or frequency resources, a variation of the number of channel uses consists of a variation of the number of resources allocated to each source which takes account of the average qualities of the channels.
According to one embodiment, the average utility metric takes into account M ratios at which are considered to be discrete values belonging to a finite set of possible values.
According to one embodiment, the values of a channel use ratio between the two phases determined for each source belong to a finite set of discrete values, preferably {1, 0.5, 2}. The method performs a maximization of the average utility metric with an initialization of the ratio for each source with the discrete value closest to an average of the values of the ratio denoted aGA and by implementing a “Genie Aided” approach.
The “Genie Aided” approach, which consists in independently determining each bit rate of a source, assuming that all the messages from the other sources are known to the destination and assuming a ratio
for each source, leads to initial bit rate values for each source which are not sufficiently precise.
According to one embodiment, an iterative calculation of the initial bit rates by the destination makes it possible to correct these initial bit rate values by taking into account the selection strategy which takes place during the second phase, something that the “Genie Aided” approach, which assumes that the active node for each time slot for the second phase is chosen randomly from among the nodes, cannot intrinsically do on its own. This mode is advantageous in that it makes it possible to use a “Genie Aided” approach for the initialization of the iterative algorithm.
According to one embodiment, the cooperative transmission of a node during the second phase is reflected in the transmission of a redundancy based on an incremental coding to the sources.
According to one embodiment, the node selection strategy that takes place during the second phase follows a sequence known in advance to all the nodes.
According to one embodiment, the iterative calculation of the initial bit rates takes into account a node selection strategy (strategy with random selection, strategy with cyclic selection, etc.).
According to one embodiment, the node selection strategy that takes place during the second phase takes into account information originating from the nodes indicating their set of sources correctly decoded.
According to one embodiment, the node selection strategy that takes place during the second phase corresponds, on each time slot, to the selection of the node which has correctly decoded at least one source that the destination has not correctly decoded at the end of the preceding time slot and which benefits from the best instantaneous quality out of the instantaneous qualities of all the links between the nodes and the destination.
According to one embodiment of the invention, the message transmission method results from a software application subdivided into several specific software applications stored in the sources, in the destination and possibly in the relays. The destination can for example be the receiver of a base station. The execution of these specific software applications is suited to the implementation of the transmission method.
Also a subject of the invention is a system comprising M sources, possibly L relays, and a destination, M>1, L≥0, for an implementation of a transmission method according to the preceding subject. Also subjects of the invention are each of the specific software applications on one or more information media, said applications comprising program instructions suitable for implementing the transmission method when these applications are executed by processors.
Also subjects of the invention are the configured memories comprising instruction codes corresponding respectively to each of the specific applications.
The memory can be incorporated in any entity or device capable of storing the program. The memory can be of ROM type, for example a CD ROM or a microelectronic circuit ROM, or even of magnetic type, for example a USB key or a hard disk.
Also, each specific application according to the invention can be downloaded from a server accessible over a network of Internet type.
The optional features presented above in the context of the transmission method can possibly be applied to the software application and to the memory described above.
Other features and advantages of the invention will emerge more clearly on reading the following description of embodiments, given as simple illustrative and nonlimiting examples, and the attached drawings, in which:
A channel use is the smallest granularity in terms of time-frequency resource defined by the system which allows the transmission of a modulated symbol. The number of channel uses is linked to the available frequency band and to the transmission time.
In the “slow fading” case prioritized in the description, the fading gains are constant during the M+Tmax time slots in which M+Tmax is the maximum number of time slots to accomplish a transmission cycle.
An embodiment of the invention is described in the context of an OMAMRC system illustrated by
This system comprises M sources which belong to the set of sources ={s1, . . . , sM} in which, by convention to simplify the notations, si=i ∀i ∈{1, . . . , M}, L relays which belong to the set of relays
={r1, . . . , rL} and a destination d.
Each source of the set communicates with the single destination using the other sources (user cooperation) and the relays which cooperate.
In order to simplify the description, the following hypotheses are made hereinbelow on the OMAMRC system:
The nodes comprise the relays and the sources which can behave as a relay when they do not transmit their own message.
The nodes, M sources and L relays, access the transmission channel according to a time-orthogonal multiple access scheme which allows them to listen without interference to the transmissions from the other nodes. The nodes operate according to a half-duplex mode.
The following notations are used:
The signal received at the node b ∈∪
∪{d}\{a} corresponding to the signal transmitted by the node a ∈
∪
can be written:
y
a,b,k
=h
a,b
x
a,k
+n
a,b,k (1)
During the first phase of M time slots, each source s ∈ transmits its code words during N1,s channel uses, k ∈{1, . . . , N1,3}, the number N1,s of channel uses depending on the source s.
During the second phase of Tused, Tused≤Tmax, time slots, each selected node transmits information representative of the messages from the sources decoded without error by this node during N2 channel uses, k ∈{1, . . . , N2}, the number N2 of channel uses being, for simplification for the method, identical between the sources s ∈.
By using reference signals (pilot symbols, 3GPP LTE SRS signals, etc), the destination can determine the gains (CSI Channel State Information) of the direct links hdir={hs
By contrast, the gains of the links between sources, of the links between relays and of the links between sources and relays are not known to the destination. Only the sources and the relays can estimate a metric of these links by using reference signals in a way similar to that used for the direct links. Given that the statistics of the channels are assumed to be constant between two initialization phases, the transmission to the destination of the metrics by the sources and the relays can take place only at the same rate as the initialization phase. The statistics of the channel of each link are assumed to follow a centered circular complex Gaussian distribution and the statistics are independent between the links. It is consequently sufficient to consider only the average SNR as a measure of the statistics of a link.
The sources and the relays therefore report to the destination metrics representative of the average SNRs of the links that they can observe.
The destination thus knows the average SNR of each of the links.
During an initial link adaptation phase which precedes the transmission of several frames, the destination transmits, for each source s, a representative value (index, MCS, bit rate, etc.) of an initial bit rate
Each of the initial bit rates unambiguously determines an initial modulation and coding scheme (MCS) or, conversely, each initial MCS determines an initial bit rate.
The reporting of the initial bit rates
These initial bit rates are determined by the destination so as to maximize an average utility metric, e.g. an average spectral efficiency, conditioned on the node selection strategy that takes place during the second phase and subject to the constraint of an average individual BLER for each source, this metric being modified by the introduction of the ratio αi=N2/N1,i, its expression is given by the equation (21).
This metric (21) is thus a function with multiple variables which depends on the current value taken by the bit rate variables R1, . . . , RM and by the variables of the ratio α1, . . . , αM between the number N2 of channel uses during the second phase and the number N1,i of channel uses during the first phase:
According to one embodiment, the average utility metric takes into account M ratios αi which are considered to be discrete values belonging to a finite set of possible values.
Each source transmits to the destination its data placed in a frame using the other sources and relays. A frame occupies time slots during the transmission of the M messages from the respectively M sources. The transmission of a frame (which defines a transmission cycle) proceeds during M+Tused time slots: M slots for the first phase of respective channel use capacities N1,i for each source i, Tused slots for the second phase.
During the first phase, each source s ∈ transmits after coding a message us comprising Ks information bits, us ∈
2K
2 being the two-element Galois body. The message us comprises a code of CRC type which makes it possible to check the integrity of the message us. The message us is coded according to the initial MCS. Given that the initial MSCs can be different between the sources, the lengths of the coded messages can be different between the sources. The coding uses a code with incremental redundancy. The code word obtained is segmented into redundancy blocks. The code with incremental redundancy can be of systematic type, the information bits are then included in the first block. Whether or not the code with incremental redundancy is of systematic type, it is such that the first block can be decoded independently of the other blocks. The code with incremental redundancy can be produced for example by means of a finite family of rate-compatible punctured linear codes or of rateless codes modified to operate with finite lengths: raptor code (RC), rate-compatible punctured turbo code (RCPTC), rate-compatible punctured convolutional code (RCPCC), rate-compatible LDPC (RCLDPC rate compatible low-density parity check code).
Thus, during the first phase, the M sources successively transmit their message during the M slots with, respectively, modulation and coding schemes determined on the basis of the values of the initial bit rates.
Since each transmitted message corresponds to a source s ∈, a message that is correctly decoded is, through an abuse of notation, compared to the corresponding source.
When a source transmits, the other sources and the relays listen and try to decode the messages received at the end of each time slot. Success in the decoding is decided by using the CRC.
During the second phase, the selected node, source or relay, acts as a relay by cooperating with the sources to assist the destination in correctly decoding the messages from all the sources. The selected node transmits, i.e. it cooperates by transmitting the words or a part of the words that it has correctly decoded. The second phase comprises at most Tmax time slots called rounds. Each round t ∈{1, . . . , Tmax} has a capacity of N2 channel uses.
During this phase, the destination follows a certain strategy to decide on the node which transmits on each time slot (round). The destination informs the nodes by using a control channel with limited bit rate (limited feedback) to transmit a return message. This return message is based on its result in decoding the messages received. The destination thus controls the transmission of the nodes by using these return messages which makes it possible to improve the spectral efficiency and the reliability by increasing the probability of decoding of all of the sources by the destination.
If the decoding of all the sources is correct, the return is a message of ACK type. In this case, the cycle of transmission of a new frame begins with the deletion from the memories of the relays and of the destination and with the transmission by the sources of new messages.
If the decoding of at least one source is errored, the return message is typically a NACK. Each node a ∈∪
transmits its set of sources correctly decoded at the end of the preceding time slot (round) denoted
a,t−1. By convention,
b,t⊆
is used to denote the set of the messages (or sources) correctly decoded by the node b ∈
∪
∪{d} at the end of the time slot t (round t), t ∈{0, . . . , Tmax} The end of the time slot (round) t=0 corresponds to the end of the first phase. The number of time slots used during the second phase Tused={1, . . . , Tmax} depends on the decoding success at the destination.
The selected node transmits parities determined on the basis of the messages from its set of sources correctly decoded by using a joint network and channel coding (Joint Network Channel Coding). This transmission takes place during a time slot of N2 channel uses. The other nodes and the destination can improve their own decoding by using the transmission of the selected node and consequently update their set of sources correctly decoded.
The initial transmission bit rate of a source s is Rs=Ks/N1,s in bits per complex dimension (b.c.u). The bit rate over the long term {tilde over (R)}s of a source is defined as the number of bits transmitted with respect to the total number of channel uses for a number of frames transmitted which tends toward infinity:
with (T)=Σt=1T
The spectral efficiency ηsla can be defined as the sum of individual spectral efficiencies:
ηsla=Σs=1M{tilde over (R)}s(1−Pr{s,T
with s,T
Generally, the individual outage event of the source s ∈ at the end of the time slot (round) t,
s,t(at,
a
t−1) depends on the selected node at ∈
=
∪
and on the associated set of decoded sources
a
t−1.
t−1 is the set comprising all the nodes âi which have been selected in the time slots (rounds) l ∈{1, . . . , t−1} preceding the time slot (round) t and their associated decoding set
â
d,t−1.
The common outage event at the end of the time slot (round) t, εt(at, a
t−1), is defined as being the event that at least one source is not correctly decoded by the destination at the end of the time slot (round) t.
The probability of the individual outage event of the source s at the end of the time slot (round) t for a candidate node at can be expressed in the form: (
)}) with
(.) the expectation operator and such that the 1{
} takes the value 1 if the event
is true and the value 0 otherwise.
The probability of the common outage event can be defined in the same way. Hereinafter, the dependency on the knowledge of hdir and of −1 is omitted in the interests of simplification of the notations.
The common outage event of a set of sources occurs when the vector of their bit rate is outside of the corresponding MAC capacity region.
For some subsets of sources ⊆
d,t−1 with
d,t−1=
d,t−1 the set of sources not correctly decoded by the destination at the end of the time slot (round) t−1, the common outage event can be expressed in the form:
(at,
a
(4)
such that the sources which belong to =
d,l−1\
are considered as interference.
reflects the non-observance of the MAC inequality associated with the sum bit rate of the sources contained in
:
In which
Ia,b the mutual information between the nodes a and b and âl, l=1 at t−1 a node already selected. The factor 1/αs makes it possible to normalize before addition the two terms associated respectively with the two phases for which the time slots have respective channel use durations N1,s and N2.
The individual outage event of the source s at the end of the time slot (round) t can be written:
In which =
d,t−1\
and
â
a
According to the invention, the destination implements a link adaptation of slow type. This adaptation consists in maximizing the average utility metric (21), comprising the ratio αi=N2/N1,i, after a number Tused≤Tmax of retransmissions (cooperative transmissions) occurring during the second phase subject to the constraint of an average individual BLER for each source.
The utility metric is an average spectral efficiency conditioned on the node selection strategy that takes place during this second phase.
According to a first class of strategies, the selection of the nodes taken from among the sources and the relays depends on the sets of the sources correctly decoded by the nodes. An example considered, called preferred strategy, is based on a selection of IR-HARQ type which aims to maximize the spectral efficiency. According to this preferred strategy, in the time slot (round) t of the second phase, the destination chooses the node with the best instantaneous quality of the link between itself and that node (for example the greatest mutual information between it and that node) taken from among all the nodes which have been able to correctly decode at least one source of the set d,t−1, these nodes being called eligible. This strategy makes it possible to achieve a good trade-off between computation complexity and performance level but with the detriment of a significant number of control signals. According to a second class of strategies, the selection of the nodes taken from among the sources and the relays does not depend on the sets of the sources correctly decoded by the nodes. According to this class, the selection is determined and known to all the nodes. One example considered is such that the selection sequence is cyclical and such that the selected node is selected only from among the relays. According to this example, each relay benefits from at least one dedicated time slot (round) during the second phase to transmit. So as not to give preference to one relay over another, the sequence changes on each frame. According to this example, only one return bit from the destination is sufficient to report a common ACK/NACK message.
During the first phase, each source s transmits with the initial bit rate Rs.
Let BLERs,T
In a point-to-point transmission, the individual bit rate (throughput) of the source is given by:
Rs(1−BLERs,T
And, to optimize this bit rate, the usual method consists in finding the optimal pair (Rs, BLERs,T
Such a usual method is not usable for a system with M sources, possibly L relays, and a destination with an orthogonal multiple access scheme for the transmission channel since the BLERs,T
In order not to overload the notations, we distinguish {circumflex over (R)}s, the bit rate of the source s after optimization, from
The method according to the invention is a solution to the following optimization problem:
subject to the constraint that Pr{s,T
.
In the relationship (7), Tused is a random variable which represents the number of time slots (rounds) used during the second phase Tused≤Tmax. The distribution of Tused depends on (R1, . . . , RM), on (α1, . . . , αM) and on Pr{s,T
According to one embodiment, the method according to the invention follows a so-called “Genie Aided (GA)” approach which consists in making the hypothesis during the initialization step that all the sources s except the source si for which the bit rate is to be initialized are considered to be correctly decoded, s ∈\si={s1, s2, . . . , si−1, si+1, . . . sM}. All the sources {s1, s2, . . . , si−1, si+1, . . . , sM} other than si act as relays denoted {rL+1, . . . , rL+M−1}.For the source si considered, the network is a network with multiple relays denoted (1, L+M−1,1) and no longer a network with multiple relays and multiple users. The corresponding system is illustrated by the diagram of
The search for the optimal pair ({circumflex over (R)}s, {circumflex over (α)}s) for the source s under the “Genie Aided (GA)” hypothesis is confronted with an additional difficulty over the state of the art in which N1,i=N1∪i. In fact, the equation (2) shows that the choice of the bit rate of the source s depends, even under the GA hypothesis, on the ratios αi ∪i ∈. Thus, by making another hypothesis called GA1, a same value αGA of the ratio αi is set for all the sources as follows:
αGA=argminα∈A|α−αavg|, in which
Finally, the search for the optimal pair ({circumflex over (R)}sGA, αsGA) the source s under the hypotheses GA and GA1 can be written in the form of a single dimensional optimization conditioned on αsGA=αGA:
in which {circumflex over (R)}sGA is the bit rate of the source s after optimization, Rs is the bit rate variable and in which P(H) is the joint probability of the realizations of the channels of all the links of the network. It is clear that the bit rate Rs depends on the selected node âl and therefore on the selection strategy applied by the destination.
A third hypothesis GA2, consisting in considering a strategy of equiprobable random selection of the active node at the time l=1, . . . , Tmax can be adopted, in which Tmax is the maximum number of retransmissions.
The approximation according to (8) with the hypotheses GA, GA1, GA2 can be calculated by implementing a Monte Carlo process. One mode of implementation is detailed by the algorithm 1 (in the appendix) for the source s, and its principle is as follows.
First of all, the ratios αi ∪i ∈ are all set at αGA. Then, each bit rate value of the set of possible bit rates {
s,T
the out variable of the algorithm 1 corresponding to:
The conjunction of the hypotheses GA, GA1 and GA2 makes it possible to obtain a first approximation according to (8) of the initial bit rates and of the ratios αi of the sources ({circumflex over (R)}sGA, {circumflex over (α)}sGA=αGA) ∪s ∈ which can constitute the initial starting point (iteration 0) of an iterative optimization algorithm known as “Best Response Dynamics” an implementation of which corresponds to the algorithm 2 (in the appendix).
The algorithm 2 is based on a calculation by Monte Carlo simulations of the spectral efficiency
using the outage events given by the equation (6).
(Tused) and Pr(
s,T
must be evaluated in the Monte Carlo loop as a function of the active node selection strategy by the destination and of the statistics P(H) in a way similar to the algorithm 1.
The calculation of the spectral efficiency
can follow the process given by the algorithm 3.
The method calculates the BLERi of the source i and the expectation of the number of retransmissions (Tused). According to this embodiment, the method considers that the probability of individual outage is a good approximation of the individual BLER BLERi of the source i. The probability of the individual outage is the average of the individual outage event given by the equation (6) on the statistics of the links P(H) of the MAMRC system. For a given rate of channel profiles of the MAMRC system and a set of ratios {R1, . . . , RM, α1, . . . , αM} conditioned on a selection strategy given by the destination, the method is based on the evaluation of the outage events of the equations (5) and (6) to determine the decoding set at the destination node and the relay nodes. All the sources which are not in the decoding set of the destination after Tmax retransmissions are declared in outage, that is to say that their error counter is increased by 1.
The algorithm 3 comprises a main part and two subroutines.
The first subroutine is the check_outage(t, Ilist, activated_nodes_list, ) function which takes into account the current time slot t of retransmission and the subset for which the common outage must be calculated for
. This function expresses the event of the equation (4) having for inputs the list of the mutual information between the nodes Ilist and the selected nodes {circumflex over (α)}i and their set of sources decoded without error
{circumflex over (α)}
of the subset
should be searched to obtain a result of a decoding set for the subset B. These events are reviewed in the first loop of this function. This function also contains two other loops, one to calculate the sum bit rate of the current subset
and the mutual information included, and another loop to calculate the additional mutual information included as a function of the nodes activated in the retransmission phase.
The second subroutine is the get_decoding_set(t, Ilist, activated_nodes_list) function which determines the decoding set at a certain time slot t by taking into account the preceding parameters Ilist and activated_nodes_list set being determined. The principle of this function is to find the subsets of maximum cardinality Cardmax which leads to a common outage event equal to zero. In fact,
The main part comprises four loops. As for the algorithm 1, there is the Monte-Carlo loop such that each of its iterations leads to an individual outage event and an expected retransmission time for the second phase. The functions defined previously are used to check the outage event.
If there is no outage, then the method goes onto a new iteration and the counters of the individual outage events and the expected retransmission time counter do not change.
If there is an outage, then the process starts a second loop, by taking into account the retransmission phase and a certain allocation strategy according to which a certain node is selected to retransmit and is added to the set of the activated nodes. Once an outage event is reached during the time slot of the retransmission phase, the expected retransmission time is updated. Finally, if the number Tmax of retransmission time slots is reached, the method checks if there is or is not an outage and updates the individual outage event counter of each user accordingly. After the end of the Monte-Carlo loop, the individual BLERs and the expected retransmission time slot time are calculated by means of an average.
The spectral efficiency is then calculated according to the equation (3).
d,0 =
), for all the links
≤ Is,d, then
d,0 = d,0U(s),
≤ C2 then
:
.
indicates data missing or illegible when filed
(counter of the number of iterations)
and
are initialized subject to the hypotheses GA+GA1+GA2:
(initialization of the while loop)
or
for a given i from among
at M do (for each source choose the best
knowing all the other couples
(which satisfies the constraint)
indicates data missing or illegible when filed
,
number of rounds aggregated in the 2nd phase over NB_MC channel
on the basis of
the joint probability of the realizations of the
for all the links
is an element of
for the link between the nodes
=
by the destination by applying a selection strategy:
and of
associated set of decoded sources to the activated_nodes_list list
then
then
(verification of the outage event corresponding to the equation
of
)
and
(initialization of the current mutual
then
is the node selected in round 1)
and
then
then
which
at 1 (loop on all the subsets of cardinality card)
, in which
indicates data missing or illegible when filed
Number | Date | Country | Kind |
---|---|---|---|
2004643 | May 2020 | FR | national |
This Application is a Section 371 National Stage Application of International Application No. PCT/FR2021/050823, filed May 11, 2021, which is incorporated by reference in its entirety and published as WO 2021/229183 A1 on Nov. 18, 2021, not in English.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/FR2021/050823 | 5/11/2021 | WO |