[IEEE 2011 IEEE Vehicular Technology Conference (VTC 2011-Spring) - Budapest, Hungary...

5
Effects of Delay Constraints on Multihop Networks using Rateless Codes Ashish James , A.S. Madhukumar , Ernest Kurniawan § and Surya Dharma Tio CeMNeT, School of Computer Engineering, NTU, Singapore 639798 § Institute for Infocomm Research, A*STAR, Singapore 138632 Email: { ashi0010, ASMadhukumar, sdtio}@ntu.edu.sg and § [email protected] Abstract—When a message is forwarded through a network, a node will have multiple opportunities to reliably receive the mes- sage and cooperate in transmission. However, the transmit power of each node in a network is limited and so is the transmission range. Therefore, multihop transmission is a potential technique to deliver the data over large distances. Rateless code properties ideally suit decode and forward based relaying strategies as it improves the outage and bandwidth efficiency. In decode and forward based multihop networks, the messages are decoded and relayed over sequential point-to-point communication links. In a conventional multihop network, the intermediate nodes will have to wait indefinitely to correctly decode the information. To quantify the impact of this unknown waiting time, this paper analyses the performance of a multihop network with strict delay constraints. The average packet loss for such a network is obtained as a function of the total delay. By optimizing the total delay based on the performance across each links, the average packet loss can be minimized. I. I NTRODUCTION In ad-hoc wireless networks, the self-configured nodes are connected with each other by wireless links. The transmit power as well as the transmission range of each nodes in such networks is limited. Multihop transmission is a potential technique to reliably deliver the data over large distances. In such networks, messages are relayed over sequential point- to-point links. The intermediate nodes have multiple opportu- nities to reliably receive the packets transmitted by a source node. It then forwards the received information towards the final destination. Routing protocols determine the interme- diate nodes which are selected as the forwarding nodes in such multihop networks. Several advantages can be cited for employing multiple hop transmission, such as interference reduction, improved connectivity and allowing distant nodes to communicate with each other more efficiently [1]- [2]. Of the forwarding strategies employed at the intermediate nodes, decode and forward based relaying strategies mitigate the effect of noise amplification and thereby offer an improved performance. Rateless codes or fountain codes introduced in [3] ideally suit decode and forward based relaying strategy, where the intermediate node monitor the transmitting node virtually indefinitely until it has enough mutual information to decode. This improves the outage as well as the bandwidth efficiency. Rateless codes are erasure coding schemes where the source oblivious of the channel state information (CSI) generates as many encoding symbols as needed for correct decoding at the destination node (accumulates enough mutual information for proper decoding) [4]. However, rateless codes have been shown to offer good performance in other channels such as binary symmetric channel, additive white Gaussian noise (AWGN) and fading channels [5]- [7]. In addition, a very low encoding/decoding complexity favors the use of rateless codes. This motivates the analysis on the impact of multihop transmission with rateless codes. Rateless coding is advantageous for a network with multiple nodes, as the source data can be reconstructed from any subset of the encoded packets. Successful relays in such schemes assist the source in transmission. The performance of such schemes has been analyzed in [4] and [8]. In [9], a throughput optimal rateless coding scheme is proposed to relay Luby Transform (LT) codes across multiple nodes. However the performance of such networks depends on the worst link and it becomes the bottleneck of the entire system as it affects the reliability of information delivered across multiple hops. In addition, such nodes may cause excessive delays which are not desirable for delay sensitive communications. In this paper the analysis is performed in a delay constrained network with multiple hops which seek to deliver latency- sensitive information. Their benefits and drawbacks are clearly illustrated. For conventional multihop transmission based on rateless codes, the source node forwards the information to the neighboring nodes. Each of the intermediate nodes act as independent fountain decoder/encoder where it decodes, then re-encodes and transmits to the next neighboring node. This process continues until the message reaches the destination node. Even though such a scheme assures the reliable delivery of information, the total delay encountered is boundless. Most real-time communication systems are delay intolerant where the decoding and re-encoding needs to be completed within a given duration. In such a delay constrained multihop network all the packets cannot be received within the interval, as the packet delays for each hop are dependent on the total delay. Those packets which are received correctly within the interval are transmitted in the subsequent hops to enable real- time communication over multihop networks. The number of packets lost will be a function of the elapsed time, which in turn is a factor of the quality of service (QoS) requirement of the system. We highlight the trade-off existing between 978-1-4244-8331-0/11/$26.00 ©2011 IEEE

Transcript of [IEEE 2011 IEEE Vehicular Technology Conference (VTC 2011-Spring) - Budapest, Hungary...

Page 1: [IEEE 2011 IEEE Vehicular Technology Conference (VTC 2011-Spring) - Budapest, Hungary (2011.05.15-2011.05.18)] 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring) - Effects

Effects of Delay Constraints on Multihop Networksusing Rateless Codes

Ashish James†, A.S. Madhukumar†, Ernest Kurniawan§ and Surya Dharma Tio†

†CeMNeT, School of Computer Engineering, NTU, Singapore 639798§Institute for Infocomm Research, A*STAR, Singapore 138632

Email: {†ashi0010,†ASMadhukumar,†sdtio}@ntu.edu.sg and §[email protected]

Abstract—When a message is forwarded through a network, anode will have multiple opportunities to reliably receive the mes-sage and cooperate in transmission. However, the transmit powerof each node in a network is limited and so is the transmissionrange. Therefore, multihop transmission is a potential techniqueto deliver the data over large distances. Rateless code propertiesideally suit decode and forward based relaying strategies as itimproves the outage and bandwidth efficiency. In decode andforward based multihop networks, the messages are decoded andrelayed over sequential point-to-point communication links. Ina conventional multihop network, the intermediate nodes willhave to wait indefinitely to correctly decode the information. Toquantify the impact of this unknown waiting time, this paperanalyses the performance of a multihop network with strictdelay constraints. The average packet loss for such a network isobtained as a function of the total delay. By optimizing the totaldelay based on the performance across each links, the averagepacket loss can be minimized.

I. INTRODUCTION

In ad-hoc wireless networks, the self-configured nodes areconnected with each other by wireless links. The transmitpower as well as the transmission range of each nodes insuch networks is limited. Multihop transmission is a potentialtechnique to reliably deliver the data over large distances. Insuch networks, messages are relayed over sequential point-to-point links. The intermediate nodes have multiple opportu-nities to reliably receive the packets transmitted by a sourcenode. It then forwards the received information towards thefinal destination. Routing protocols determine the interme-diate nodes which are selected as the forwarding nodes insuch multihop networks. Several advantages can be cited foremploying multiple hop transmission, such as interferencereduction, improved connectivity and allowing distant nodesto communicate with each other more efficiently [1]- [2].

Of the forwarding strategies employed at the intermediatenodes, decode and forward based relaying strategies mitigatethe effect of noise amplification and thereby offer an improvedperformance. Rateless codes or fountain codes introduced in[3] ideally suit decode and forward based relaying strategy,where the intermediate node monitor the transmitting nodevirtually indefinitely until it has enough mutual informationto decode. This improves the outage as well as the bandwidthefficiency. Rateless codes are erasure coding schemes wherethe source oblivious of the channel state information (CSI)generates as many encoding symbols as needed for correct

decoding at the destination node (accumulates enough mutualinformation for proper decoding) [4]. However, rateless codeshave been shown to offer good performance in other channelssuch as binary symmetric channel, additive white Gaussiannoise (AWGN) and fading channels [5]- [7]. In addition, a verylow encoding/decoding complexity favors the use of ratelesscodes. This motivates the analysis on the impact of multihoptransmission with rateless codes.

Rateless coding is advantageous for a network with multiplenodes, as the source data can be reconstructed from any subsetof the encoded packets. Successful relays in such schemesassist the source in transmission. The performance of suchschemes has been analyzed in [4] and [8]. In [9], a throughputoptimal rateless coding scheme is proposed to relay LubyTransform (LT) codes across multiple nodes. However theperformance of such networks depends on the worst linkand it becomes the bottleneck of the entire system as itaffects the reliability of information delivered across multiplehops. In addition, such nodes may cause excessive delayswhich are not desirable for delay sensitive communications.In this paper the analysis is performed in a delay constrainednetwork with multiple hops which seek to deliver latency-sensitive information. Their benefits and drawbacks are clearlyillustrated.

For conventional multihop transmission based on ratelesscodes, the source node forwards the information to theneighboring nodes. Each of the intermediate nodes act asindependent fountain decoder/encoder where it decodes, thenre-encodes and transmits to the next neighboring node. Thisprocess continues until the message reaches the destinationnode. Even though such a scheme assures the reliable deliveryof information, the total delay encountered is boundless. Mostreal-time communication systems are delay intolerant wherethe decoding and re-encoding needs to be completed within agiven duration. In such a delay constrained multihop networkall the packets cannot be received within the interval, asthe packet delays for each hop are dependent on the totaldelay. Those packets which are received correctly within theinterval are transmitted in the subsequent hops to enable real-time communication over multihop networks. The number ofpackets lost will be a function of the elapsed time, which inturn is a factor of the quality of service (QoS) requirementof the system. We highlight the trade-off existing between

978-1-4244-8331-0/11/$26.00 ©2011 IEEE

Page 2: [IEEE 2011 IEEE Vehicular Technology Conference (VTC 2011-Spring) - Budapest, Hungary (2011.05.15-2011.05.18)] 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring) - Effects

average throughput and the delay.The rest of the paper is organized as follows. The system

and channel model considered for the analysis is explained inSection II. Section III analyzes the performance of the con-ventional multihop network and delay constrained multihopnetwork based on rateless codes. The numerical results arepresented in Section IV. Finally, concluding remarks and futureextensions of the current work are presented in Section V.

II. ANALYSIS MODEL

In this paper a wireless multihop network which consistsof wireless nodes connected by wireless links as shown inFig. 1 is considered. Each node is equipped with a singleantenna and the terminals are constrained to employ half-duplex transmission.

Relay

RN11

Source

SN

Destination

DN

Relay

RN21

Relay

RNi1

Relay

RNn1

.

.

.

Relay

RN12

Relay

RN1m

.

.

.

Relay

RN22

Relay

RN2m

.

.

.

Relay

RNi2

Relay

RNim

.

.

.

Relay

RNn2

Relay

RNnm

Fig. 1. Multihop relay system model

A. Received Signal & Channel Model

The network consists of a source node (SN), and a desti-nation node (DN) separated by a large distance, which makesdirect transmission ineffective. In such an ad-hoc scenario amessage is delivered to the DN by cooperating with m×n relaynodes (RN) placed in between SN and DN. The objective ofthe system is to reliably deliver bits generated at the SN toDN through n hops using rateless coding. The nodes operatein a time-division manner, i.e. only one node is allowed totransmit during a time slot. The transmitting node forwardsinformation to the m neighboring nodes. Out of the m relaysavailable during each hop, the best relay (RNi j, i ∈ {1 to n}and j ∈ {1 to m}) is selected as the forwarding node withproper coordination among the RNs.

The channel between the nodes is modeled as quasi-staticflat fading channel as in [10]. All the links are also corruptedby additive white Gaussian noise (AWGN) with zero meanand variance N0. In order to mark low reliability symbols aserasures, an erasure technique presented in [11] is considered.In this technique, a threshold value, γt is defined for the fading.The received signal at node q during time instant t is given as

yq(t) = hpq(t)xp(t)+ηq (1)

where p∈ {SN,RNi j} and q∈ {RNi j,DN}, ηq is the AWGN atnode q and xp is the transmitted symbol. Each node is assumedto transmit under equal power constraint, εs∀p and hence

E[|xp|2] = εs. If the received signal level, γq = |hpq|2εsN0

is less

than the threshold value, γt(threshold is dependent on the codeemployed and on the outage requirement), then the receivedsymbols are declared as erased. Equalization is performed onthe received signal in (1) using technique such as zero forcing(ZF). After equalization, the stream of recovered bits is fedinto the decoder.

All the nodes are assumed to make use of rateless coding,whereby they can encode and transmit as many independentfountain coded symbols as needed, constrained by the totaldelay. The data packets at SN are grouped into blocks ofk packets, each composed of b information bits. In fountaincoding, a number δ is randomly selected (generated from somedegree distribution, ρ(δ)). Each time, δ out of the k input pack-ets are randomly selected, linearly combined and transmitted.This process continues until one of the relay nodes (RNi j)in the next hop has enough mutual information to decode.This continues for several hops until the message reachesthe DN. It is not practical to attempt decoding after eachreceived block; this paper assumes the decoding is initiatedonly when the received generator matrix becomes full rank.Rateless coding can be considered as a form of continuousincremental redundancy and feedback channels are requiredonly to signal the successful decoding at the destination.

B. Multihop Transmission Schemes

The present paper analyzes the conventional multihop trans-mission using rateless coding and effects of delay constraintson multihop transmission. The routing and medium accesscontrol for these transmissions are not considered within thescope of the present work. The best relay is selected duringeach hop for transmission with proper coordination among thenodes and there is no contention.

For the conventional multihop transmission, each relaynode on the route receives the message from the node inthe previous hop. The previous node can be the SN itselfor another RN in the route. Consider the case where nodeNi j (i ∈ {0 to (n + 1)}, j ∈ {0 to (m + 1)}) communicateswith node N(i+1) j (where i = 0, j = 0 corresponds to theSN communicating with the RN across the first hop andi = (n + 1), j = (m + 1) corresponds to the RN in the nth

hop communicating with the DN). The node Ni j (SN or RNi j)forwards fountain coded packets until node N(i+1) j (RN(i+1) jor DN) is able to decode properly (the rank of the generatormatrix at node N(i+1) j is full). Then node N(i+1) j fountainencodes the decoded information and forwards to the nextnode N(i+2) j in the route. It goes on until the message isdecoded at the DN and one transmission cycle ends.

For delay constrained multihop transmission, the messageis transmitted from SN to DN via n hops with a hard delaydeadline. The goal is to optimize the number of transmissionssubject to the maximization of quality of service (QoS) withminimum delay. The total maximum delay of the system isfixed at D seconds and the maximum delay per hop is D/nseconds (delay is assumed to be uniformly distributed on theroute). Though the transmission scheme remains similar to theconventional multihop transmission, the number of encoded

Page 3: [IEEE 2011 IEEE Vehicular Technology Conference (VTC 2011-Spring) - Budapest, Hungary (2011.05.15-2011.05.18)] 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring) - Effects

packets transmitted depends on the delay. The maximumnumber of channel uses that can happen within the specifieddelay per hop is taken as L. Of the ki packets transmittedby node Ni j, node N(i+1) j is able to decode only (ki − Δi)(where Δi is the number of packets lost during ith hop) packetsbecause of strict delay constraint. Node N(i+1) j then re-encodesthe correctly decoded packets and forwards to the next nodeN(i+2) j. This goes on until the message is decoded at the DN.There will be a loss of Δ (Δ = Δ1 + Δ2 + · · ·+ Δn) packets atthe DN owing to the strict delay deadline. The average packetloss in such a scenario is derived in the next section.

III. PERFORMANCE ANALYSIS

The average number of transmissions required for conven-tional multihop transmission and the average packet loss incase of delay constrained multihop transmission are analyzedin this section. The details of the analysis is given below.

A. Conventional Multihop Transmission

When no delay constraint is imposed on the system, theforwarding node transmits fountain coded packets until theneighboring node decodes correctly. For the system config-uration in Fig. 1, the intermediate relay nodes receive theinformation from the previous node in the route. It re-encodesand transmits when decoding is successful. Throughout thesequel it is assumed that the decoding is deemed to besuccessful once the received generator matrix is full ranki.e Rank (GR) = k, where GR is the generator matrix at thereceiving node. Denoting the erasure probability across nodesp and q as Ppq

e = Pr[γq < γt ], the probability of receivingexactly k encoded packets after T transmissions can be givenas

PTk (Ppq

e ) = (1−Pe)(

T −1k−1

)(Ppq

e )T−k (1−Ppqe )(k−1) (2)

Let Tr denote the earliest number of transmissions (Tr ≥ k)when the received generator matrix is full rank. Tr basicallycaptures the time when the intermediate node is ready forforwarding the information. If the binary generator matrixis considered to be equiprobable (the same analysis can beperformed for other cases), then the probability of having agenerator matrix of rank k after receiving r unerased encodedpackets can be expressed as [12]

Pkrank(r) =

{0 r < k

∏k−1i=0

(1−2i−r

)r ≥ k

(3)

If the intermediate node decodes after Tr transmissions; thenthe probability of having a full rank generator matrix (GR)at intermediate node after Tr transmissions can be computedusing (2) as

Pr[Rank(GR) = k,Tr] =Tr

∑i=k

Pkrank(i).P

Tri (Ppq

e ) (4)

By equating (4) for a specific value of Ppqe , the average

number of transmissions required for the generator matrixat the receiving node to be full ranked for a single hop

can be found. For the case when the probability of packeterasures are uniform across all the n hops, the total numberof transmissions (Ttot) required to have a full ranked generatormatrix at DN is given as

Ttot = n×Tr (5)

This gives an estimate of the maximum total delay that canbe encountered by the information packets to reach the DN.

B. Delay Constrained Multihop Transmission

In a delay constrained scenario, the transmission at eachhop is limited to a specified value ‘L’. This will imposethe maximum delay across n hops to be D seconds. So themaximum number of transmissions can be given as

Ttot = n×L (6)

Such a scenario does not guarantee the delivery of all the kpackets across the n hops. However, in this case more priorityis given to the overall delay and thereby only a subset of kpackets, (k−Δ) packets are successfully delivered to the DN(Δ is the total packet loss across n hops). Consider ki packetsare correctly delivered across i hops from SN to node Ni j. AfterL channel uses, node N(i+1) j transmits only a subset of the ki

packets transmitted by node Ni j. This is a factor of the numberof packets decoded correctly during the ith hop. It is assumedthat node N(i+1) j is able to decode correctly the number ofpackets equal to the rank of the generator matrix receivedat node N(i+1) j (practically in a Rayleigh fading channel thenumber of packets decoded correctly will be less than or equalto the rank of the generator matrix).

In order to find the number of packets lost during the ith

hop, there are two cases to be considered. 1) Node N(i+1) j isable to decode correctly the ki packets transmitted by nodeNi j i.e the generator matrix at node N(i+1) j is full rank with(L−1) or less number of transmissions. This is given by theprobability

Pr[Rank(GN(i+1) j)= ki,ki · · ·(L−1)]=

(L−1)

∑u=ki

u

∑j=ki

Pkirank( j).Pu

j

(P

Ni jN(i+1) je

)(7)

2) For the second case, with L transmissions node N(i+1) j isable to decode only pc packets correctly, i.e.

Pr[Rank(GN(i+1) j) = pc,L)] =

L

∑j=pc

Ppcrank( j).PL

j

(P

Ni jN(i+1) je

)(8)

where pc ∈{0 to ki}. Taking the total probability theorem overall the pc disjoint sets of the sample space, the number ofpackets decoded correctly in the ith hop is given as

ki+1=ki.Pr[Rank(GN(i+1) j)=ki,ki · · ·(L−1)]+

ki

∑pc=1

pc.Pr[Rank(GN(i+1) j)=pc,L] (9)

Then the packet loss across node Ni j to node N(i+1) j is

Δi = ki − ki+1 (10)

Page 4: [IEEE 2011 IEEE Vehicular Technology Conference (VTC 2011-Spring) - Budapest, Hungary (2011.05.15-2011.05.18)] 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring) - Effects

Then the total packet loss across n hops is given as

Δ ≤n

∑i=1

Δi

= k−k1+(k−k1)−k2 +(k−k1−k2)−k3+· · ·+(k−k1−k2−·· ·−kn−1)−kn

= nk−nk1−(n−1)k2−·· ·− kn (11)

where ki is the number of packets decoded correctly at the ith

hop. The average packet loss is a function of the channel usesper hop, which depends on the overall delay permitted for thenetwork. In order to limit the packet loss to a tolerable value,the maximum number of channel uses should be determinedbased on the current channel characteristics, transmit powerand the delay tolerance of the network. This optimization canbe achieved when

Δopt = arg minL

Δ (12)

The optimum packet loss is selected based on the allowednumber of channel uses for the current propagation character-istics. It is observed that there is a trade-off existing betweenthe overall delay and the average throughput of the network.

IV. NUMERICAL RESULTS & DISCUSSION

In this section, we evaluate the performance of a conven-tional multihop network and a delay constrained multihopnetwork. The information packet generated at the SN isencoded with a 1/4 rate convolutional code before ratelessencoding. All the packets are of equal length. For computa-tional tractability, we consider a multihop network as shown inFig. 1 with n hops. Only one RN in each hop forwards the in-formation to the nodes in the next hop. As explained in sectionII, each of the wireless links are assumed to be statisticallyindependent and identically Rayleigh distributed. In order todetermine whether packets are erased, an SNR threshold isset. It is based on the maximum capacity achievable acrosseach links. If the instantaneous SNR falls below the thresholdSNR, the rateless coded packets are assumed to be erased.

A. Conventional Multihop Transmission

For a conventional multihop transmission the links alongeach hop are assumed to be uniformly distributed. The averagenumber of transmissions per hop is evaluated in such ascenario and is shown in Fig. 2. It is observed that when theSNR is low or when the links are least reliable, the number oftransmissions required is very large. Thus the weakest link in amultihop network becomes the bottleneck of the whole system.As the link reliability increases (at high SNRs) the number oftransmissions required decreases. With rateless decoding, thenumber of linear packet combinations required is only slightlylarger than k when the channel is reliable. For eg. only 14linear packet combination is required to correctly decode 12(k) packets at an SNR of 10 dB. Based on these results, theoverall performance of a multihop system employing ratelesscodes will be dragged down by the presence of a hop withpoor propagation characteristics. In other words, the weakestlink becomes the bottleneck of the whole system.

-10 -8 -6 -4 -2 0 2 4 6 8 100

10

20

30

40

50

60

70

80

90

Ave

rage

num

ber

of t

rans

mis

sion

s pe

r ho

p

SNR

Fig. 2. Variation of average number of transmissions required per hop withSNR for a packet size (k) = 12

B. Delay Constrained Multihop Transmission

For delay constrained multihop transmission, the number ofchannel uses per hop is limited to a specific value (L). Thistakes care of the infinite delay if the link is unreliable but doesnot guarantee the delivery of the entire set of k packets. Sothere is a trade-off with delay against reliability as obtainedin (11). Only those packets which are decoded correctly aretransmitted in the next hop. Figure 3 shows the variation ofpacket loss with received SNR. It is visible that the numberof packets lost decreases as the reliability of link improves(SNR increases). As only the correctly decoded packets aretransmitted during each hop, packet loss increases with numberof hops. But as the number of channel uses per hop remainsconstant across the number of hops, the code-rate effectivelydecreases with number of hops. Thereby the performancedegradation with number of hops is limited. It is visible thatthe reliability of such networks improves with the link qualityand reduces the total delay when the link is unreliable fortransmission.

Figure 4 shows the variation of packet loss with numberof channel uses per hop at an SNR of 0 dB. It is observedthat the number of packets that can be correctly decoded is afactor of the reliability of the links irrespective of the numberof channel uses. In order to constrain the overall delay forpacket reception at DN, the number of channel uses per hopis limited to a specific value. Thus as given by (12), the numberof channel uses (L) should be optimized based on the packetloss which is a function of probability of erasure along thelinks. Optimizing the number of channel uses mitigates theinfinite delay and delivers the number of packets based on thereliability of the links.

Figure 5 illustrates the variation of packet error rate (PER)with number of hops for multihop transmission based onconventional and delay constrained scenarios. Hard decisiondecoding for both rateless coding and convolutional codingis performed at the receiver. For delay constrained scenario

Page 5: [IEEE 2011 IEEE Vehicular Technology Conference (VTC 2011-Spring) - Budapest, Hungary (2011.05.15-2011.05.18)] 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring) - Effects

-10 -8 -6 -4 -2 0 2 4 6 8 100

10

20

30

40

50

60

70

80

90P

acke

t Lo

ss (

%)

SNR

No. of hops = 5No. of hops = 2No. of hops = 1

Fig. 3. Comparison of percentage of packet loss with SNR for varyingnumber of hops with a packet size (k) = 12 and number of channel uses perhop (L) = 20

15 20 25 30 35 40 45 500

5

10

15

20

25

30

35

40

Pac

kets

Los

s (%

)

Number of channel uses/hop (L)

No. of hops = 1No. of hops = 2No. of hops = 5

Fig. 4. Variation of packet loss with number of channel uses per hop for anaverage SNR of 0 dB

0 2 4 6 8 10 12 14 16 18 2010

-3

10-2

10-1

100

PE

R

SNR

NH = 1, CMTNH = 2, CMTNH = 5, CMTNH = 1, DMT, L = 20NH = 2, DMT, L = 20

Fig. 5. PER performance comparison for conventional multihop transmissionand transmission constrained by delay. NH = No. of hops, CMT = Conven-tional multihop transmission, DMT = delay constrained multihop transmissionand L = No. of channel uses/hop

CRC is performed to detect decoding errors. For conventionalmultihop transmission it is evident that there is an increase inPER with number of hops as the error propagates from one hopto the next hop till it reaches the DN. In a delay constrainedscenario, only the packets decoded correctly are transmittedin the subsequent hops. This results in better reliability withlower number of packet decoding at the DN and a lower PER.

V. CONCLUSION

In this paper, the performance of rateless codes in amultihop scenario is analyzed. In a conventional multihopnetwork, the total time for communication is dependent onthe performance of the worst link of the network. Thusthe more reliable links are not utilized, which restrict theoverall throughput of the network. The performance of real-time communications in wireless multihop networks dependson the overall allocated time and the packet lost duringtransmission across the network. The average packet loss isobtained as a function of the total number of transmissions,where the transmissions across hops are limited based on theQoS requirement of the network. Moreover, if the number oftransmissions across hops is selected appropriately, the totaldelay and the packet loss can be minimized.

REFERENCES

[1] M. Frodigh, S. Parkvall, C. Roobol, P. Johansson, and P. Larsson, “Future-generation wireless networks,” IEEE Pers. Commun., vol. 8, no. 5, pp.10-17, Oct. 2001.

[2] P. Mohapatra, J. Li, and C. Gui, “QoS in mobile ad hoc networks,” IEEEWireless Commun., vol. 10, no. 3, pp. 44- 52, June 2003.

[3] M. Luby, “LT codes,” in Proc. 43rd Annual IEEE Symposium onFoundations of Computer Science, pp. 271- 280, 2002.

[4] A. F. Molisch, N. B. Mehta, J. S. Yedidia, and J. Zhang, “Performanceof fountain codes in collaborative relay networks,” IEEE Trans. WirelessCommun., vol. 6, no. 11, pp. 4108-4119, Nov. 2007.

[5] A. Shokrollahi, “Raptor codes,” IEEE Trans. Inf. Theory, vol. 52, pp.2551-2567, June 2006.

[6] R. Palanki and J.S. Yedidia, “Rateless codes on noisy channels,” in Proc.IEEE Int. Symp. on Inform. Theory (ISIT), pp. 37, Chicago, IL, USA,June-July 2004.

[7] O. Etesami and A. Shokrollahi, “Raptor codes on binary memorylesssymmetric channels,” IEEE Trans. Inf. Theory, vol. 52 no. 5, pp. 2033 -2051, May 2006.

[8] R. Nikjah and N. C. Beaulieu, “Achievable rates and fairness in ratelesscoded relaying schemes,” IEEE Trans Wireless Commun., vol. 7, no. 11,pp. 4439-4444, Nov. 2008.

[9] R. Gummadi and R. S. Sreenivas, “Relaying a fountain code acrossmultiple nodes,” in IEEE Inf. Theory Workshop, pages 149-153, 2008.

[10] A. James, A. S. Madhukumar, T. S. Dharma, and E. Kurniawan,“Throughput Optimization in Cooperative Communications based onIncremental Relaying,” in IEEE Trans. Vehicular Technology, vol. 60,no. 1, pp. 317-323, Jan. 2011.

[11] A. Houghton, Error Coding for Engineers, Kluwer Academic Publishers,2001.

[12] E. Kurniawan, S. Sun, and K. Yen, “Transmission Strategy of FountainCode in Cooperative Networks with Multiple Relay Networks,” IEEE Int.Symp. on Pers., Indoor and Mobile Radio Commun., pp. 1108-1112, Sept.2009.