Next Article in Journal
RETRACTED: A Global Structural Hypergraph Convolutional Model for Bundle Recommendation
Next Article in Special Issue
Labeling-Based Recipient Identification with Low-Order Modulation
Previous Article in Journal
Enhancing LAN Failure Predictions with Decision Trees and SVMs: Methodology and Implementation
Previous Article in Special Issue
An In-Phase/Quadrature Index Modulation-Aided Spread Spectrum Communication System for Underwater Acoustic Communication
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Raptor-like Coded Broadcasting for Efficient V2X Communications

1
School of Information and Electronics, Beijing Institute of Technology (BIT), Beijing 100081, China
2
Huawei Technologies Co., Ltd., Shanghai 201206, China
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(18), 3951; https://doi.org/10.3390/electronics12183951
Submission received: 3 August 2023 / Revised: 11 September 2023 / Accepted: 16 September 2023 / Published: 19 September 2023

Abstract

:
Broadcasting is a critical feature in V2X communication, allowing for the simultaneous dissemination of safety-critical messages to all nearby vehicles. However, the requirement for low latency in information dissemination and the need for reliable and efficient data transmission pose significant challenges to broadcasting in V2X communication systems. In this paper, we present a novel raptor-like coded broadcasting (RLCB) scheme for low-latency V2X communications. Firstly, we introduce feedback into a concatenated fountain code, and adjust its precoding and coding structure to achieve effective data deliverance under a limited number of retransmissions for low-latency transmission. Then, based on the raptor-like encoding and decoding structure, we propose a mutual exclusion-based network encoding (MENC) algorithm to enable retransmission in broadcasting scenarios. We also conduct a complexity analysis on the encoding and decoding process of our proposed scheme. Numerical results demonstrate the superior performance of our proposed scheme in reducing the packet error rate (PER) and improving spectral efficiency compared to the R10 code and hybrid automatic repeat request (HARQ) scheme.

1. Introduction

The proliferation of electric vehicles and autonomous driving in the vehicle industry generated an increased interest in vehicle-to-everything (V2X) services. With the advancement of fifth generation (5G) cellular communication technology, powerful technical support is provided for V2X, leading to cellular V2X communications (C-V2X) [1,2,3]. V2X includes four types of communication: vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I or I2V), vehicle-to-pedestrian (V2P), and vehicle-to-network (V2N) [4]. V2X communication technology connects pedestrians, vehicles, infrastructure, and networks to build an integrated multi-sensing intelligent transportation system (ITS), which holds great potential for enhancing road safety and improving traffic efficiency.
In the realm of V2X (Vehicle-to-Everything) communication, there is a compelling demand for highly reliable, short, and time-critical message broadcasting, originating from infrastructure or the vehicle, directed towards multiple nearby communication units. This need is especially pronounced within the contexts of V2V and I2V communication scenarios. In I2V communication, essential infrastructure components such as roadside units (RSUs), traffic lights, and sensors employ beacon broadcasting to disseminate safety-related information to nearby vehicles [5]. In V2V communications, while multipoint-to-multipoint scenarios are more prevalent, point-to-multipoint communication instances are also prevalent. For instance, vehicles in distress transmit emergency safety information to alert nearby vehicles to potential hazards, thereby facilitating swift collision avoidance strategies [6]. V2X broadcast communication encompasses the concurrent transmission of data packets, ensuring the efficient distribution of critical messages [7]. Nevertheless, achieving efficient broadcast communication in V2X scenarios characterized by a short code length, low latency requirements, and high reliability remains a formidable challenge.
To address these challenges and improve the communication quality, various technical features have been introduced into V2X. The Automatic repeat request (ARQ) and Hybrid automatic repeat request (HARQ) are two widely known error control technologies employed to ensure reliable transmission [8]. In ARQ, the receiver first performs error checking on the received packet. If it detects an error in the packet, it directly discards the packet and requests retransmission. The HARQ protocol, on the other hand, combines the advantages of both ARQ and the forward error correction (FEC) by incorporating information from previous transmission attempts of the same packet, enhancing the efficient utilization of communication resources [9]. In [10], a blind retransmission scheme based on HARQ is proposed to enhance the channel efficiency of the sidelink channel in the V2X environments. However, HARQ encounters challenges in broadcast scenarios where packets are transmitted from one source to multiple destinations with different channel conditions. Due to the need for ensuring correct reception for every packet, HARQ requires a large number of retransmissions, leading to a high latency and low transmission efficiency [11].
Random linear network coding (RLNC) is a potent mechanism to achieve critical objectives in V2X broadcast communication with a low latency, elevated reliability, and efficient message distribution. RLNC accomplishes this by combining all original packets at the sender linearly, employing coefficients randomly selected from a finite field, thereby engendering encoded packets for transmission without necessitating feedback [12]. In [13], a novel medium access control (MAC) protocol, which integrates physical-layer network coding (PNC) with RLNC, is proposed to effectively improve the transmission efficiency and reliability of beacon broadcasting. The work in [14] proposes a distributed network coding-based medium access control protocol (NC-MAC) to support the V2V beacon broadcast, and improves the broadcast reliability by combining HARQ and network coding. In [15], RLNC is found to be able to effectively reduce latency in the multi-source single-sink V2V network with wireless broadcasting channels. However, it is essential to point out that the operations in RLNC are performed on the finite field of GF(q), which poses challenges in terms of computational complexity. Additionally, it is worth noting that RLNC does not require intricate coordination between nodes, which makes RLNC well-suited for networks with complex topologies. But, within the domain of I2V, an alternate landscape prevails, characterized by a preponderance of point-to-multipoint scenarios, in which RLNC may not perform well.
Fountain codes have emerged as an effective solution for achieving reliable transmission in broadcast scenarios [16]. The concept of digital fountain codes, initially proposed in 1998, revolutionizes information transmission by allowing the encoder to continuously generate coded symbols and the receivers can successfully decode once the number of received coded symbols slightly exceeds the number of source symbols [17]. The Luby Transform (LT) codes [18] are the first full realization of the digital fountain concept, followed by raptor codes [19]. R10 and RaptorQ codes are the two most successful and standardized raptor codes which can efficiently propagate data through a well-designed code structure combining a low-density parity-check (LDPC) and LT codes under broadcast networks [20,21]. However, in V2X scenarios, the short code length poses challenges as encoded symbols generated through random selection based on the degree distribution may not accurately meet the requirements of receivers, leading to a low transmission efficiency. An effective method to overcome these shortcomings is to combine fountain codes with feedback. By utilizing feedback to obtain receiver decoding status, the encoding strategy can be further improved. The Shift LT code in [22] dynamically adjusts the degree distribution of the encoder to adapt to its decoding state according to the number of recovered symbols, which significantly reduces the overhead. In [23], the online fountain code (OFC) that dynamically adjusts the encoding strategy based on feedback is constructed, which effectively reduces the number of encoded symbols at a lower decoding complexity. However, it is worth noting that the online fountain code scheme requires multiple feedback iterations and may have a low transmission efficiency in scenarios with limited feedback.
This paper proposes a raptor-like coded broadcasting (RLCB) scheme to facilitate effective reliable transmission with low complexity for short time-critical message broadcasting in V2X communication. In the RLCB scheme, we first propose a raptor-like encoding–decoding structure with a feedback retransmission mechanism, which can well adapt to the retransmission in broadcasting. On the basis of the raptor-like structure, we design a precoding matrix with a sufficient constraint relationship and reduced cycles, which can enhance the spectral efficiency. Then, we propose a phase-based encoding algorithm comprising systematic encoding, mutual exclusion-based network coding (MENC), and LT encoding with DRSD to effectively improve the transmission efficiency and reliability. Specifically, systematic encoding ensures our proposed RLCB is systematic. The well-designed MENC algorithm makes the encoded symbols instantly decodable, effectively spectral efficiency. The LT encoding with DRSD guarantees the reliability of the overall scheme by generating redundant symbols. Moreover, we perform the complexity analysis of the encoding and decoding process of our scheme. To validate our scheme, we conduct comprehensive numerical simulations in terms of the spectral efficiency, packet error rate (PER), and complexity, and analyze the performance gain brought by each component in the RLCB scheme. Numerical results show that the RLCB scheme outperforms R10 and HARQ in the broadcast scenario, achieving a maximum gain of 17% compared with R10 and 44% compared to HARQ in spectral efficiency. Additionally, the RLCB scheme boasts a lower PER than RaptorQ, while maintaining a comparatively lower complexity.
This paper is structured as follows. Firstly, Section 2 presents the system model of V2X broadcast communication scenarios. Next, in Section 3, we introduce the raptor-like coding structure, followed by the design of the precoding matrix and the MENC algorithm. The complexity analysis comparison of the proposed scheme and RaptorQ is provided in Section 4. In Section 5, we present the numerical results of HARQ, R10, RaptorQ, and the proposed schemes. Finally, the paper concludes with Section 6.

2. System Model

As shown in Figure 1, we consider a scenario that a roadside unit is broadcasting the same information to the vehicles in its group. We simplify the communication scenario so that a sender is transmitting K source symbols  x = [ x 1 , x 2 , , x K ]  to n receivers  R 1 , R 2 , , R n  through a binary erasure channel (BEC) in a limited number of transmissions. The receivers provide feedback information to the sender after each transmission. In the BEC channel, the receivers receive the transmitted symbols correctly or do not receive it (i.e., erased) with a probability  ϵ  and the packet loss of each transmitted symbol on different links is independent. Note that although we show a I2V scenario as an example, the proposed scheme is also suitable for the V2V scenario with a high reliability requirement and point-to-multipoint network topology.

3. Raptor-like Coded Broadcasting Scheme

3.1. Raptor-like Encoding and Decoding Structure

Figure 2 illustrates the encoding and decoding structure of the proposed scheme. The encoding process comprises padding, precoding, and phase-based encoding. During padding, the source symbols  x  of size K are padded to  x  of size  K + S + H  with  S + H  symbols set to zero, where  S + H  and H denote the number of rows of LDPC1 and LDPC2 submatrices in the precoding matrix, respectively. Note that the padded zeros represent the check result of the constraint relationships of LDPC1 and LDPC2. In the precoding operation, the padded symbols  x  go through the precoding matrix  G p  to produce the intermediate symbols  c  of size  L = K + S + H . The relationship between  x  and  c  can be expressed as
x = G p · c .
Then, the phase-based encoding is performed on intermediate symbols  c  to generate the encoded symbols  e .
The transmission process includes one initial transmission and r retransmissions. Considering the latency limitation, the maximum number of retransmissions is  r m a x . The phased-base encoding employs three main phases to generate the encoded symbols. The encoding phase is determined based on the transmission process: the initial transmission, retransmission, and last retransmission. In the initial transmission,  P h a s e I  of the phased-base encoding performs systematic encoding by sending the source symbols directly. If there is no channel erasure happening in the initial transmission, the receiver will successfully receive the source symbols. Otherwise, the receiver provides feedback to request retransmissions. In the retransmissions,  P h a s e I I  of the phased-base encoding carries out MENC based on the feedback information. The MENC in  P h a s e I I  considers the mutually exclusive relationship between symbols and receivers; thus, the generated encoded symbols are instantly decodable and will certainly promote the decoding progress of each receiver. Furthermore, if the maximum number of retransmissions is reached and the decoding process is still unsuccessful, LT encoding with DRSD is used to generate additional redundant symbols in  P h a s e I I I  [24]. The redundant symbols generated in  P h a s e I I I  can effectively cope with channel erasure and improve the reliability of the RLCB scheme.
In decoding, the received symbols  e ^  of size N undergo a padding operation to extend them to  e ^  of size  N + S + H , similar to the padding operation in the encoding process. Subsequently, the joint belief propagation-Gaussian elimination (BP-GE) decoding is performed on  e ^  based on the decoding matrix  G d  to obtain the decoded intermediate symbols  c * . After decoding, the decoding matrix is reconstructed into an upper triangular matrix (of size  L × L ). The rows in the decoding matrix represent the symbols being decoded, and the columns represent the connection of the padded source symbol in the decoding. The symbols are viewed as not decoded when the corresponding row in the decoding matrix has one on the diagonal. As shown in Figure 3, the receiver feeds back the column indices of zeros on the diagonal in the decoding matrix, which refer to the source symbols that are needed for the current decoding. Due to the improved design of the precoding matrix structure, the first K symbols of the intermediate symbols are the source symbols, so we only need to decode the intermediate symbols and extract the first K symbols as the result of the decoding.
The structure of the joint BP-GE decoding comprises three main steps: BP decoding, matrix deletion, and GE decoding. Firstly, we construct the decoding matrix combining the received symbols, and perform BP decoding on the decoding matrix. If the BP decoding is successful, the decoding process is completed. Otherwise, find the row with the degree of one in the decoding matrix. These rows representing symbols that have already undergone BP decoding. The ones in these rows can be arranged on the diagonal, so the corresponding column degree value is also one. To reduce the complexity of the subsequent GE decoding, the identified rows and columns are removed, effectively reducing the matrix size. Finally, GE decoding is performed on the reduced matrix.

3.2. Design of Precoding Matrix

Figure 4 illustrates the structure of the precoding matrix  G p . As shown in Figure 4, the precoding matrix is composed of the constraint matrix  G c  and systematic matrix  G s . The systematic matrix  G s  consists of a identity matrix  I K  and a zero matrix. According to (1), the relationship between  x  and  c  is
x = ( I K | 0 ) · c .
Thus, the structure of the systematic matrix  G s  makes the higher K intermediate symbols equal to the source symbols. The constraint matrix  G c  mainly contains two regular low density parity check matrices:  G LDPC 1  and  G LDPC 2 . The design of  G c  mainly considers two perspectives: reducing the precoding code rate and introducing more precoding constraints by modifying the degree distribution.
Before the specific design of  G LDPC 1  and  G LDPC 2 , we determine the optimal dimension of the precoding matrix. The code rate of the precoding is  K / ( K + S + H ) . To counter the channel erasure, the code rate of the precoding must satisfy  K / ( K + S + H ) > 1 ϵ . Therefore, the dimension of the precoding matrix should meet
S + H > K × ( ϵ 1 ϵ ) .
To expand the constraint relationship of the precoding matrix, the size of the zero matrix at the top right of  G p  should be minimized. Additionally, a larger precoding matrix dimension results in a higher decoding complexity. Hence, it is crucial to determine the optimal dimension of the precoding matrix, which is given by:
S , H = min S , H Z S + H = K ϵ 1 ϵ ( S H ) .
Having determined the optimal dimension of the precoding matrix, we can then obtain the optimal degree distribution of  G c  by solving the linear programming problem as described in [24]. According to (1), we define the intermediate symbols  c  as bit nodes, and the padded source symbols  x  as check nodes. By defining the check and bit nodes and specifying their degree distributions, we can construct a Tanner graph representation that efficiently captures the dependencies between the symbols [25]. Specifically, we set the degree distribution of check nodes as  ρ ( x ) = j = 2 D c m ρ j x j 1  and the degree distribution of bit nodes as  λ ( x ) = i = 2 D v m λ i x i 1 , where  D v m  and  D c m  represent the possible maximum degree value of the bit nodes and check nodes, respectively. Then, the coding rate during transmission is calculated as [26]
R = 1 j = 2 D c m ρ j j / i = 2 D v m λ i i .
As shown in (5), in order to improve the transmission efficiency, we need to minimize  j = 2 D c m ρ j / j . Hence, the optimization problem for the check node degree distribution can be formulated as
L P 1 : min j = 2 D c m ρ j j ,
s . t . D c j = 1 D c m j ρ j D v i = 1 D v m i λ i ,
ρ j 0 , j ρ j = 1 ,
λ 1 ρ 1 ε x t x t , 1 t N ,
where  D c j = 1 D c m j ρ j D v i = 1 D v m i λ i  denotes the limit on the number of connecting edges, and  λ 1 ρ 1 ε x t x t , 1 t N  represents the restriction on successful decoding under the BEC, as introduced in [27].
For the bit nodes, it is necessary to make each bit node be constrained by the check node, which implies that the degree distribution of bit nodes should be uniform. However, given the specific structure of the precoding matrix, we can only achieve uniformity for the first  K + S  bit nodes. The uniform degree value of the bit nodes in  G mat  can be obtained by
d m = D c j = 1 D c m j ρ j H / ( K + S ) .
Due to the limitation of the number of connecting edges, it may not be possible to achieve the exact uniform degree distribution for the bit nodes. Thus, we define an acceptable range for the degree value. The optimization problem for the degree distribution of bit nodes can be expressed as follows:
L P 2 : max λ d m + λ d m 1 ,
s . t . D v i = 1 D v m i λ i = D c j = 1 D c m j ρ j ,
λ 1 H / K + S + H , λ i 0 , i λ i = 1 ,
λ 1 ρ 1 ε x t x t , 1 t N ,
where  D v i = 1 D v m i λ i = D c j = 1 D c m j ρ j  is the constraint on the number of connecting edges, and  λ 1 H / K + S + H  is the constraint for the identity matrix and zero matrix on degree-one bit nodes in  G m a t . Note that both the optimization target and the constraints of the optimization problem in (6) and (8) present linear relationships. Therefore, the optimization problem in (6) and (8) are linear programming problems, and can be solved iteratively using the CVX Matlab package.
Next, we can further improve  G mat  by reducing the number of cycles with a girth of four in the tanner graph. This can be achieved by using the progressive edge-growth algorithm [25], which adds edges to the tanner graph while maintaining the girth constraint. The algorithm selects the check node farthest from the current bit node when adding edges to the tanner graph corresponding to the precoding matrix. If there is more than one check node farthest from the current bit node, the algorithm selects the check node with the lowest degree to add edges to.

3.3. Mutual Exclusion-Based Network Coding

The design of MENC takes into account two crucial components: the state feedback matrix and the mutually exclusive set. Let us discuss these components in detail.
Firstly, we define the state feedback matrix  T  as follows:
T = [ t i , j ] n × K ( i n , j K ) , t i , j = 0 , x j i s r e q u i r e d b y R i 1 , x j i s n o t r e q u i r e d b y R i .
Note that the state feedback matrix  T  shows the symbol requirements of the receivers based on the feedback information. Notably, each row and column of the state feedback matrix corresponds to a receiver and a symbol, respectively. Based on the state feedback matrix  T , the sender can obtain the decoding condition of the receivers.
In MENC, the sender selects symbols based on the state feedback matrix. The selected symbols are encoded through the XOR operation. For receivers, the received symbols may have three states for decoding: redundant, instantly decodable, and non-instantly decodable [28]. The received symbols are redundant when the source symbols involved in it are not required by the receiver. If a encoded symbol contains only one required symbol for a receiver, the receiver can decode the required symbol through the XOR operation for certain, and this encoded symbol is called immediately decodable. On the other hand, if a encoded symbol contains two or more required symbols for a receiver, the required symbols cannot be decoded directly by the receiver. Thus, the encoded symbol is called non-immediately decodable.
To avoid the appearance of non-instantly decodable symbols, the proposed scheme constructs the mutually exclusive set (MES) by investigating the mutually exclusive relationships between symbols and performs network coding based on the MES. According to the definition of non-immediately decodable symbols, there should not be two or more selected symbols in the symbol selection during encoding that are both required by a particular receiver. Therefore, for the receiver, the symbols they need are mutually exclusive. We define the receiver-perspective MES as the union of the symbols corresponding to zero in i-th row of the state feedback matrix  T , denoted by  λ i , i = 1 , 2 , , n . Further, for the required symbol, the union of the receiver-perspective MES of all receivers who require the symbol is the symbol-perspective MES, denoted by
M i = ( λ j ) , λ j x j , i = 1 , 2 , , K , j = 1 , 2 , , n .
The symbols in the symbol-perspective MES are exclusion symbols of each other. Based on the symbol-perspective MES, we can avoid potentially mutually exclusive symbol combinations during the symbol selection, making the resulting encoded symbols immediately decodable for all receivers.
The overall coding process of MENC is divided into four steps: initialization, MES construction, symbol selection, and symbol check.
(1)
Initialization
In this step, the sender obtains the decoding status of each receiver according to the feedback provided by the receivers, and constructs a state feedback matrix  T . Then, the sender constructs several symbol sets for subsequent MES construction and symbol selection. The total unrecovered symbol set  L A  of size  n a  is constructed as the union of the column indices of zero in each row (corresponding to each receiver) of the state feedback matrix  T . This set represents the symbols that have not been successfully decoded by all receivers. Additionally, the worst receiver’s unrecovered symbol set  L W  of size  n w  is constructed as the union of the column index of zero in the row that contains the maximum number of zeros in the state feedback matrix  T . The worst receiver refers to the receiver with the highest number of unrecovered symbols. Thus,  L W  represents the largest receiver-perspective MES and should be encoded first. Based on  L A  and  L W , the candidate symbol set as  C  is derived as  C = L A L W  of size  n c = n a n w .
(2)
MES construction
In this step, the sender first builds the receiver-perspective MES  λ i , i = 1 , 2 , , n  based on the state feedback matrix  T . Then, the symbol-perspective MES  M i , i = 1 , 2 , , n c  of each candidate symbol is constructed according to (10). Next, sort the symbol-perspective MES  M i  in reverse order by size. Note that the symbol with a larger MES is more likely to be mutually exclusive with other symbols, so it needs to be preferentially involved in encoding.
(3)
Symbol selection
After MES construction, the mutually exclusive relationship between symbols has been clarified, and we proceed to select symbols for encoding according to symbol-perspective MES. Firstly, the sender traverses each symbol  L i  in  L W  to initialize the encoded symbol set  S , S i = L i , i = 1 , 2 , , n w , where  S i  denotes the set of the symbol index involved in the i-th encoded symbol. Then, the sender compares  S i  with the symbols in the symbol-perspective MES of each candidate symbol in turn, and adds this candidate symbol to  S i  if  S i  is not in the symbol-perspective MES of the candidate symbol. Once the symbol selection process is complete, the sender performs an XOR operation on the symbols in  S i  to obtain the encoded symbols.
(4)
Symbol check
After the symbol selection based on the symbol-perspective MES, there may still be some candidate symbols, which are heavily mutually exclusive with other symbols and do not participate in the encoding. So in this step, we check if there are any candidate symbols that are not encoded, and if so, send them directly.
The specific process of the MENC algorithm is presented in Algorithm 1.
Algorithm 1 Mutual Exclusion-based Network Coding
Step1: Initialization
1.1. Initialize the state feedback matrix  T .
1.2. Initialize  L A  and  L W  according to the state feedback matrix  T .
1.3. Initialize the candidate symbol set  C = L A L W , n c = n a n w .
Step2: MES Construction
2.1. Construct the receiver-perspective MES  λ i  for each receiver  i , 1 i n .
2.2. Construct the symbol-perspective MES  M i  for each candidate symbol  i , 1 i n c .
2.3. Sort the symbol-perspective MES  M i  in reverse order by their size.
Step3: Symbol Selection
3.1. for  1 i n w
3.2.    Set  S i = L i ;
3.3.    for  1 j n c
3.4.       if  S i M j =
3.5.          Set  S i = S i C i ;
3.6.       end if
3.7.    end for
3.8. end for
Step4: Symbol Check
4.1. Check if there are any candidate symbols that do not participate in encoding. If so, send them directly.

4. Complexity Analysis

In this section, we analyze the computational complexity of RLCB by calculating the number of different arithmetic operations. The RLCB scheme operates on GF(2), so the counted arithmetic operations are comparison numbers and addition numbers. Note that the base of the logarithmic operations used hereinafter is e. The complexity of the RaptorQ code is also derived as a comparison, because it obtains an excellent spectral efficiency and PER performance.

4.1. Complexity Analysis of RLCB

Based on the RLCB encoding process, we analyze the computational complexity of precoding and phase-based encoding in RLCB. Note that systematic encoding proceeds by sending source symbols directly, so a complexity analysis is not performed on this part. Firstly, we investigate the complexity of the intermediate symbols generation in the precoding. The arithmetic operation in precoding is the addition operation brought by the XOR of the source symbols to generate the intermediate symbols. The number of additions required in this step is m, where m is the number of connections in precoding and the bit width in this step is one.
Then, we investigate the complexity of MENC according to Algorithm 1. For the calculation of  L A  in Algorithm 1 at step 2.1, we iterate through the symbol recovery of all receivers based on the state feedback matrix. Note that after precoding, all unrecovered symbols of all receivers are located in the last  L K  bits of the state feedback matrix. Thus, the number of necessary comparisons in this step is  n × ( L K )  and the bit width at this step is one. For the calculation of  L W  at step 2.2, we compare the number of unrecovered symbols for all receivers. The number of comparisons is n. In the given short code length scenario, where  K 64 , the unrecovered symbols of each user are less than K, so the bit width of this step is six. The receiver-perspective MES  λ i  can be derived during the calculation of  L A , so the arithmetic operations of it is not counted. For the calculation of  M i  at step 3.1, we iterate through all candidate symbols to obtain the symbol that is mutually exclusive with them. The total number of comparisons is  n c × ( L K )  and the bit width at this step is six. For the sorting of  M i  at step 3.2, the total number of comparisons is  n c · l o g n c  and the bit width at this step is six. Finally, for the symbol selection at step 3, we generate  n w  encoded symbols and iterate through each candidate symbol during the generation of each encoded symbol. The total numbers of comparisons and additions in symbol selection are  n w × n c  and  n w × d a , respectively, where  d a  denotes average degree of encoded symbols and the bit width at this step is one. In particular, MENC proceeds in each retransmission, so the overall complexity of NC encoding is the sum of the above complexity multiplied by the maximum number of retransmissions  r m a x . For LT encoding at the last retransmission, the computational complexity of the redundant symbol generation is  m + 5 δ · l o g δ , where  m  is the number of connections in the LT encoding and  δ  is the number of LT redundant symbols [18].
The computational complexity of joint BP-GE decoding mainly lies in the BP step and GE step. The complexity of BP and GE are  a l o g a  and  A 3 , where a and A denote the size of the BP submatrix and GE submatrix, respectively [29]. In sum, the complexity of the encoding and decoding of RLCB are  m + m + 5 δ · l o g δ + r m a x · [ ( n + 6 n c ) ( L K ) + 6 n + 6 n c · l o g n c + n w ( n c + d a ) ]  and  a · l o g a + A 3 .

4.2. Complexity Analysis of RaptorQ

The complexity analysis of the encoding process of RaptorQ is divided into two parts: precoding and LT encoding. Notably, RaptorQ introduces GF(256), resulting in a bit width of eight for data storage in computer and hardware implementations. Similar to precoding in MENC, the total number of additions for RatorQ precoding is  8 m * , where  m *  is the number of connections in the RaptorQ precoding matrix. In the LT encoding process, the computational complexity of the encoded symbols generation mainly lies in modular operations, and the complexity of LT encoding process of RaptorQ is  8 ( 2 d + d 1 1 ) + 64 ( d + d 1 2 ) , where d and  d 1  are RaptorQ encoding parameters [21]. In sum, the total complexity of the encoding process of RaptorQ is  8 ( m * + 2 d + d 1 1 ) + 64 ( d + d 1 2 ) .
The complexity analysis of the decoding of RaptorQ is based on the enhanced Gaussian elimination (EGE) introduced in [30]. The decoding of RaptorQ can be divided into three phases, and we analyze their complexity separately. Similarly, the bit width of decoding of RaptorQ is eight. In phase 1, the decoder attempts to perform BP decoding, including inactivation operations. The numbers of comparisons and additions are  c d g r  and  c x o r , 1 , where  c d g r  and  c x o r , 1  are the number of row selection and row XOR in phase 1. In phase 2, Gaussian elimination will be performed on a submatrix of the decoding matrix. The computational complexity of phase 2 is  P 3 , where P denotes the size of the submatrix. In phase 3, the decoder carries out XOR operations on the decoding matrix. The computational complexity of phase 3 is  c x o r , 2 , where  c x o r , 2  denotes the number of row XOR in phase 3. In sum, the total complexity of the decoding process of RaptorQ is  8 ( c d g r + c x o r , 1 + P 3 + c x o r , 2 ) . The computational complexity of RLCB and RaptorQ is shown in Table 1.

5. Numerical Results

To ensure the effectiveness and reliability of our proposed scheme, we conducted numerical simulations and present the results in this section. In the simulations, we varied the number of source symbols K to be 16, 32, and 64, and the channel erasure probability  ϵ  to be 0.1, 0.2, and 0.3. We also set the maximum number of retransmissions  r m a x  to be three to account for the low latency broadcast scenario. In the proposed scheme, we set the number of LT redundant symbols, denoted as  δ , to be four.
It is important to note that complete recovery during transmission cannot be guaranteed due to the limitation imposed by the maximum number of retransmissions. Hence, we define the total number of unrecovered symbols of all receivers and transmitted symbols as  N e  and  N s , respectively. To evaluate the proposed scheme, we measure its performance in terms of PER and spectral efficiency  η , which are expressed as:
PER = N e n × K , η = K × ( 1 PER ) N s .
We compare the performance of the proposed scheme with that of other schemes in terms of PER and spectral efficiency. The results of the numerical simulations are presented in the following subsections.

5.1. Performance Comparison among R10, RaptorQ, RLCB and HARQ

In this subsection, the spectral efficiency and PER performance of the proposed RLCB scheme are simulated. For performance comparison, we also present the spectral efficiency and PER of R10 and RaptorQ. Note that RaptorQ is abbreviated as RQ in the legend of the figures. To fairly compare the performance of RLCB, HARQ is set for comparison as a traditional transmission scheme in broadcast scenarios.
Figure 5 shows the spectral efficiency versus the number of receivers n where  K = 16 ,   ϵ = 0.2  (Figure 5a),  K = 32 ,   ϵ = 0.2  (Figure 5b), and  K = 64 ,   ϵ = 0.2  (Figure 5c). From Figure 5, we can see that the spectral efficiency of our proposed RLCB is between R10 and RaptorQ at different K and n values. Particularly, when  n = 1 , the spectral efficiency of our RLCB scheme is comparable to that of RaptorQ and achieves a maximum gain of  17 %  compared to R10. This demonstrates the efficiency of our scheme in unicast scenarios. As a traditional transmission scheme, HARQ achieves good spectral efficiency in unicast scenarios  ( n = 1 ) . However, as the number of receivers n increases, the spectral efficiency of HARQ significantly deteriorates due to the need for a large number of retransmissions to ensure correct symbol reception by multiple receivers. In contrast, our proposed RLCB scheme, leveraging the advantages of a raptor-like structure and feedback mechanisms, achieves better spectral efficiency in broadcast scenarios. The combined analysis of Figure 5a–c provides insights into how the spectral efficiency of RLCB, R10, RaptorQ, and HARQ varies with different values of K. Interestingly, the gap in spectral efficiency between fountain codes (RLCB, R10, and RaptorQ) and HARQ gradually widens with an increasing K. With longer code lengths, fountain codes can generate a larger number of unique encoded symbols and offer a larger symbol space. This increases the symbol diversity and reduces the probability that symbols are mutually exclusive, leading to better performance.
Figure 6 shows the PER comparison of RLCB, R10, RaptorQ, and HARQ versus the number of receivers n where  ϵ = 0.2 ,   K = 16  (Figure 6a),  ϵ = 0.2 ,   K = 32  (Figure 6b), and  ϵ = 0.2 ,   K = 64  (Figure 6c). HARQ achieves a PER close to zero, but this comes at the cost of a poor spectral efficiency. In contrast, our proposed RLCB scheme significantly improves spectral efficiency while maintaining a low PER below  10 4  under different conditions. Focusing on the comparison among fountain codes, we observe that RLCB outperforms R10 and RaptorQ in terms of PER for different values of K and n. As the value of K decreases, the gap in PER between RLCB and R10/RaptorQ gradually widens. For instance, when  K = 16  and  ϵ = 0.2 , the PER of RLCB is one order of magnitude lower than that of R10 and RaptorQ. This demonstrates the superior PER performance of RLCB, particularly for shorter code lengths.
Figure 7 shows the spectral efficiency comparison versus the number of receivers n when  K = 64  and  ϵ = 0.1 , 0.2 , 0.3 , respectively. It is evident from Figure 7 that the proposed RLCB scheme outperforms both R10 and HARQ in terms of the spectral efficiency across different values of  ϵ . With increasing  ϵ , the gap in spectral efficiency between fountain codes and HARQ diminishes. This can be attributed to the fact that HARQ combines and decodes packets through chase combining to obtain a time diversity gain [31]. As a result, HARQ exhibits a decreased sensitivity to the channel erasure probability. Notably, in Figure 7a, the RLCB scheme achieves a maximum gain of  44 %  compared to HARQ when  n = 15 . Figure 8 shows a corresponding PER performance under the same setting as Figure 7. It can be observed that at low channel erasure probabilities, the PER performance of the RLCB scheme is better than that of R10 and RaptorQ. Particularly in Figure 8a, the PER of RLCB is one order of magnitude lower than that of R10 and RaptorQ.
Overall, the RLCB scheme demonstrates a notable balance between spectral efficiency and PER performance. It consistently outperforms R10 in terms of both metrics. When compared to HARQ, the RLCB scheme achieves a superior spectral efficiency while maintaining a comparable PER performance in broadcast scenarios. Specially, it is worth noting that RaptorQ operates on GF(256), which brings excellent performance at the cost of complexity. Thus, RaptorQ can almost be regarded as an upper bound on the performance of fountain codes, while our proposed RLCB scheme can achieve even lower PER than RaptorQ, which is actually a very significant performance gain.

5.2. Performance Comparison of Components in RLCB

In this subsection, we further analyze the internal components of RLCB. The performance comparison of R10, RLNC, RLCB, and RLCB variant schemes at  K = 64 ϵ = 0.3  are presented in Table 2. First, we consider RLCB N o _ P r e , which refers to RLCB without the precoding. The absence of the precoding matrix significantly decreases the spectral efficiency of RLCB. The precoding matrix in RLCB provides crucial constraint relationships that concentrate the required symbol indexes in the higher part. This concentration increases overlap among the required symbols and reduces mutual exclusion in MENC, leading to an improved performance. Next, we analyze RLCB P r e _ R 10 , where we replace the improved precoding matrix with the original precoding matrix used in the R10 code [21]. Comparing RLCB with RLCB P r e _ R 10 , we observe that the proposed precoding matrix enhances the spectral efficiency of RLCB. We further evaluate RLCB N o _ L T , where no redundancy processing is performed during the last retransmission to resist channel erasure. As a result, the PER performance deteriorates significantly. In contrast, RLCB L T _ R e p e a t  involves sending the MENC encoded symbols again directly during the last retransmission. However, this scheme is heavily affected by channel erasure, resulting in a PER of only  10 2 . Furthermore, we introduce RLCB O N C M B , where we replace MENC with ONCMB (Opportunistic Network Coding based Multiple combination packets broadcast) [32]. Comparing RLCB with RLCB O N C M B , we observe that RLCB outperforms RLCB O N C M B  in both spectral efficiency and PER. This indicates that the RLCB scheme effectively addresses the mutual exclusion problem in multi-receiver encoding in broadcast scenarios. It is important to note that the RLCB scheme consistently outperforms R10 in all scenarios while the performance of variant schemes may be lower than that of R10 in certain cases. In summary, the RLCB scheme achieves a superior performance compared to R10 by leveraging LT redundant coding to enhance PER and incorporating an improved precoding matrix, cascade structure design, and mutually exclusive network coding to enhance spectral efficiency.
Furthermore, we present the simulation result of RLNC on GF(2). It can be seen that the RLNC scheme does not perform well in spectral efficiency. Specifically, the spectrum efficiency achieved by RLNC in unicast scenarios is limited to 0.579, whereas in comparison, R10 attains 0.627, and RLCB achieves 0.672. Although RLNC’s performance is relatively improved in the broadcast scenario, it still lags behind R10 and RLCB. This unsatisfactory performance of RLNC is, in fact, foreseeable, primarily due to its inherent characteristic of not relying on feedback and the simplistic nature of random encoding within the GF(2) domain, which fails to effectively meet the receivers’ requirements. In contrast, the RLCB enhances performance by incorporating feedback and implementing a well-designed encoding algorithm.

5.3. Quantitative Complexity Analysis

Table 3 presents the encoding complexity of the RLCB and RaptorQ scheme at different values of K ϵ , and n. It is evident from the table that the quantitative encoding complexity of RLCB and RaptorQ increases as K ϵ , and n increase. Note that a higher value of  ϵ  leads to more erased symbols during transmission, necessitating the generation of additional encoded symbols. When it comes to n, an increase in the number of receivers results in a larger worst receiver’s unrecovered symbol set  L W . Additionally, an increase in the number of receivers also increases the possibility of mutual exclusion between receivers, which significantly impacts the complexity of RLCB encoding. By comparing the encoding complexity of the RLCB and RaptorQ, we can see that the encoding complexity of RLCB is one order of magnitude lower than that of the RaptorQ scheme, primarily due to the introduction of GF(256) operations in RaptorQ. Moving on to decoding complexity, Table 4 compares the quantitative decoding complexity of Joint BP-GE, GE, and ID at different values of K. It is important to note that the decoding complexity has minimal dependence on the channel erasure probability  ϵ  and the number of receivers n. Similar to the encoding analysis, the ID decoding in RaptorQ is much more complex than the Joint BP-GE and GE decoding in the RLCB scheme. Moreover, it can be seen that the complexity of joint BP-GE is significantly reduced compared to GE. The complexity of the Joint BE-GE algorithm is one order of magnitude lower than GE and two orders of magnitude lower than ID decoding in RaptorQ. This is attributed to the fact that the joint BP-GE algorithm performs a large number of BP decoding, leaving only a small matrix that requires GE decoding. In summary, the RLCB scheme exhibits significantly lower encoding and decoding complexity compared to the RaptorQ scheme. Additionally, the proposed Joint BP-GE algorithm effectively reduces the decoding complexity compared to the GE algorithm.

6. Conclusions

In this paper, we proposed a coded broadcast scheme to achieve an efficient and reliable transmission in broadcast scenarios with limited feedback. In the proposed scheme, a Raptor-like encoding-decoding structure was first constructed to introduce feedback on the traditional fountain code structure. In order to further make full use of the feedback message, we designed a phase-based encoding scheme according to the transmission progress, including three phases: systematic encoding, MENC, and LT encoding. Additionally, we optimized the constraint relationship of the precoding matrix to improve its performance. Furthermore, we conducted a complexity analysis of the encoding and decoding process of our proposed scheme. Simulation results show that our proposed scheme outperforms the R10 code in terms of both PER and spectral efficiency in unicast or broadcast scenarios. For spectral efficiency, RLCB achieves a maximum gain of 17% compared with R10, and 44% compared with HARQ. In addition, the proposed scheme achieves a better PER performance than the RaptorQ code with a lower complexity.
The current solution we are researching is mainly for single-hop propagation networks in I2V scenarios. We have also found that multi-hop networks have broad applications in V2X, especially I2V and V2V. How to apply our solution to multi-hop networks will be a future focus of our research. In addition to addressing the technical intricacies of multi-hop communication, we also plan to explore collaborations with other advanced physical layer channel coding techniques, such as polar codes and LDPC codes. These synergistic efforts may help us to extend our scheme to a wider range of channels like AWGN.

Author Contributions

Methodology-encoding & decoding structure, Z.J.; methodology-precoding matrix design and complexity analysis, H.L.; writing—original draft preparation, J.H.; software-simulation, Z.T., P.D.; writing—review, X.W.; editing, Z.F. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China under Grant No. 62201044, and by the Natural Science Foundation on Frontier Leading Technology Basic Research Project of Jiangsu under Grant BK20212001.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Nabil, A.; Kaur, K.; Dietrich, C.; Marojevic, V. Performance Analysis of Sensing-Based Semi-Persistent Scheduling in C-V2X Networks. In Proceedings of the 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), Chicago, IL, USA, 27–30 August 2018; pp. 1–5. [Google Scholar]
  2. Zhu, X.; Yuan, S.; Zhao, P. Research and Application on Key Technologies of 5G and C-V2X Intelligent Converged Network Based on MEC. In Proceedings of the 2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA), Shenyang, China, 22–24 January 2021; pp. 175–179. [Google Scholar]
  3. Sabeeh, S.; Wesołowski, K. C-V2X Mode 4 Resource Allocation in High Mobility Vehicle Communication. In Proceedings of the 2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, London, UK, 31 August–3 September 2020; pp. 1–6. [Google Scholar]
  4. Sial, M.N.; Deng, Y.; Ahmed, J.; Nallanathan, A.; Dohler, M. Stochastic Geometry Modeling of Cellular V2X Communication Over Shared Channels. IEEE Trans. Veh. Technol. 2019, 68, 11873–11887. [Google Scholar] [CrossRef]
  5. Iglesias, I.; Isasi, L.; Larburu, M.; Martinez, V.; Molinete, B. I2V Communication Driving Assistance System: On-Board Traffic Light Assistant. In Proceedings of the 2008 IEEE 68th Vehicular Technology Conference, Calgary, AB, Canada, 21–24 September 2008; pp. 1–5. [Google Scholar]
  6. Molina-Galan, A.; Coll-Perales, B.; Gozalvez, J. C-V2X Assisted mmWave V2V Scheduling. In Proceedings of the 2019 IEEE 2nd Connected and Automated Vehicles Symposium (CAVS), Honolulu, HI, USA, 22–23 September 2019; pp. 1–5. [Google Scholar]
  7. Fallgren, M.; Abbas, T.; Allio, S.; Alonso-Zarate, J.; Fodor, G.; Gallo, L.; Kousaridas, A.; Li, Y.; Li, Z.; Li, Z.; et al. Multicast and Broadcast Enablers for High-Performing Cellular V2X Systems. IEEE Trans. Broadcast. 2019, 65, 454–463. [Google Scholar] [CrossRef]
  8. Ahmed, A.; Al-Dweik, A.; Iraqi, Y.; Mukhtar, H.; Naeem, M.; Hossain, E. Hybrid automatic repeat request (HARQ) in wireless communications systems and standards: A contemporary survey. IEEE Commun. Surv. Tutor. 2021, 23, 2711–2752. [Google Scholar] [CrossRef]
  9. Kleyko, D.V.; Lyamin, N.V. Modeling FEC algorithms in HARQ data transmitting systems. In Proceedings of the 2010 11th International Conference and Seminar on Micro/Nanotechnologies and Electron Devices, Novosibirsk, Russia, 30 June–4 July 2010; pp. 228–230. [Google Scholar]
  10. Kim, J.; Jo, O.; Choi, S.W. Feasibility of Index-Coded Retransmissions for Enhancing Sidelink Channel Efficiency of V2X Communications. IEEE Access 2019, 7, 6545–6552. [Google Scholar] [CrossRef]
  11. Zhang, Z.; Lv, T.; Su, X.; Gao, H. Dual XOR in the Air: A Network Coding Based Retransmission Scheme for Wireless Broadcasting. In Proceedings of the 2011 IEEE International Conference on Communications (ICC), Kyoto, Japan, 5–9 June 2011; pp. 1–6. [Google Scholar]
  12. Su, R.; Sun, Q.T.; Zhang, Z. Delay-Complexity Trade-Off of Random Linear Network Coding in Wireless Broadcast. IEEE Trans. Commun. 2020, 68, 5606–5618. [Google Scholar] [CrossRef]
  13. Zhang, M.; Ali, G.G.M.N.; Chong, P.H.J.; Seet, B.C.; Kumar, A. A Novel Hybrid MAC Protocol for Basic Safety Message Broadcasting in Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 2020, 21, 4269–4282. [Google Scholar] [CrossRef]
  14. Mosavat-Jahromi, H.; Li, Y.; Cai, L.; Lu, L. NC-MAC: Network Coding-based Distributed MAC Protocol for Reliable Beacon Broadcasting in V2X. In Proceedings of the GLOBECOM 2020—2020 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar]
  15. Zhu, T.; Li, C.; Tang, Y.; Luo, Z. On latency reductions in vehicle-to-vehicle networks by random linear network coding. China Commun. 2021, 18, 24–38. [Google Scholar] [CrossRef]
  16. Qureshi, J.; Heng Foh, C.; Cai, J. Primer and recent developments on fountain codes. Recent Adv. Commun. Netw. Technol. (Former. Recent Pat. Telecommun.) (Discontin.) 2013, 2, 2–11. [Google Scholar] [CrossRef]
  17. Byers, J.W.; Luby, M.; Mitzenmacher, M.; Rege, A. A digital fountain approach to reliable distribution of bulk data. ACM SIGCOMM Comput. Commun. Rev. 1998, 28, 56–67. [Google Scholar] [CrossRef]
  18. Luby, M. LT codes. In Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, Vancouver, BC, Canada, 16–19 November 2002; pp. 271–280. [Google Scholar]
  19. Shokrollahi, A. Raptor codes. IEEE Trans. Inf. Theory 2006, 52, 2551–2567. [Google Scholar] [CrossRef]
  20. Schulz, P.; Li, Y.; Traßl, A.; Barreto, A.N.; Fettweis, G. Efficient Reliable Wireless Communications through Raptor Codes and Rateless Codes with Feedback. In Proceedings of the ICC 2022—IEEE International Conference on Communications, Seoul, Republic of Korea, 16–20 May 2022; pp. 704–709. [Google Scholar]
  21. Luby, M.; Shokrollahi, A.; Watson, M.; Stockhammer, T.; Minder, L. RaptorQ Forward Error Correction Scheme for Object Delivery; Internet Engineering Task Force: Fremont, CA, USA, 2011. [Google Scholar]
  22. Hagedorn, A.; Agarwal, S.; Starobinski, D.; Trachtenberg, A. Rateless Coding with Feedback. In Proceedings of the IEEE INFOCOM 2009, Rio de Janeiro, Brazil, 19–25 April 2009; pp. 1791–1799. [Google Scholar]
  23. Cassuto, Y.; Shokrollahi, A. Online Fountain Codes With Low Overhead. IEEE Trans. Inf. Theory 2015, 61, 3137–3149. [Google Scholar] [CrossRef]
  24. Tavakoli, H.; Attari, M.A.; Peyghami, M.R. Optimal rate for irregular LDPC codes in binary erasure channel. In Proceedings of the 2011 IEEE Information Theory Workshop, Paraty, Brazil, 16–20 October 2011; pp. 125–129. [Google Scholar]
  25. Hu, X.Y.; Eleftheriou, E.; Arnold, D. Regular and irregular progressive edge-growth tanner graphs. IEEE Trans. Inf. Theory 2005, 51, 386–398. [Google Scholar] [CrossRef]
  26. Tavakoli, H. A fast convergence density evolution algorithm for optimal rate LDPC codes in BEC. In Proceedings of the 7’th International Symposium on Telecommunications (IST’2014), Tehran, Iran, 9–11 September 2014; pp. 574–577. [Google Scholar]
  27. Johnson, S.J. Iterative Error Correction: Turbo, Low-Density Parity-Check and Repeat-Accumulate Codes; Cambridge University Press: Cambridge, MA, USA, 2010. [Google Scholar]
  28. Douik, A.; Sorour, S.; Al-Naffouri, T.Y.; Alouini, M.S. A Lossy Graph Model for Delay Reduction in Generalized Instantly Decodable Network Coding. IEEE Wirel. Commun. Lett. 2014, 3, 281–284. [Google Scholar] [CrossRef]
  29. Niu, W.; Xiao, Z.; Huang, M.; Yu, J.; Hu, J. An algorithm with high decoding success probability based on LT codes. In Proceedings of the 9th International Symposium on Antennas, Propagation and EM Theory, Guangzhou, China, 29 November–2 December 2010; pp. 1047–1050. [Google Scholar]
  30. Mladenov, T.; Nooshabadi, S.; Kim, K. Efficient Incremental Raptor Decoding Over BEC for 3GPP MBMS and DVB IP-Datacast Services. IEEE Trans. Broadcast. 2011, 57, 313–318. [Google Scholar] [CrossRef]
  31. Kim, J.; Jin, H.; Sung, D.K.; Schober, R. Optimization of Wireless Multicast Systems Employing Hybrid-ARQ with Chase Combining. IEEE Trans. Veh. Technol. 2010, 59, 3342–3355. [Google Scholar] [CrossRef]
  32. Lu, J.; Wu, C.K.; Xiao, S.; Zhang, R. Efficient broadcast transmission algorithms based on opportunistic network coding. J. China Inst. Commun. 2012, 33, 64–70. [Google Scholar]
Figure 1. System Model.
Figure 1. System Model.
Electronics 12 03951 g001
Figure 2. Raptor-like encoding and decoding structure.
Figure 2. Raptor-like encoding and decoding structure.
Electronics 12 03951 g002
Figure 3. Feedback structure.
Figure 3. Feedback structure.
Electronics 12 03951 g003
Figure 4. Design of the precoding matrix  G p .
Figure 4. Design of the precoding matrix  G p .
Electronics 12 03951 g004
Figure 5. Spectral efficiency comparison of RLCB, R10, RaptorQ, and HARQ at different values of K and  ϵ  = 0.2.
Figure 5. Spectral efficiency comparison of RLCB, R10, RaptorQ, and HARQ at different values of K and  ϵ  = 0.2.
Electronics 12 03951 g005
Figure 6. PER comparison of RLCB, R10, RaptorQ, and HARQ at different values of K and  ϵ  = 0.2.
Figure 6. PER comparison of RLCB, R10, RaptorQ, and HARQ at different values of K and  ϵ  = 0.2.
Electronics 12 03951 g006
Figure 7. Spectral efficiency comparison of RLCB, R10, RaptorQ, and HARQ at different values of  ϵ  and K = 64.
Figure 7. Spectral efficiency comparison of RLCB, R10, RaptorQ, and HARQ at different values of  ϵ  and K = 64.
Electronics 12 03951 g007
Figure 8. PER comparison of RLCB, R10, RaptorQ, and HARQ at different values of  ϵ  and K = 64.
Figure 8. PER comparison of RLCB, R10, RaptorQ, and HARQ at different values of  ϵ  and K = 64.
Electronics 12 03951 g008
Table 1. Computational complexity of RLCB and RaptorQ.
Table 1. Computational complexity of RLCB and RaptorQ.
ProcessRLCBRaptorQ
Encode   m + m + 5 δ · l o g δ + r m a x [ ( n + 6 n c ) ( L K ) + 6 n + 6 n c · l o g n c + n w ( n c + d a ) ]   8 m * + 2 d + d 1 1 + 64 d + d 1 2
Decode   a · log a + A 3   8 ( c d g r + c x o r , 1 + P 3 + c x o r , 2 )
Table 2. Spectral efficiency∖PER comparison of R10, RLNC, RLCB, and RLCB variant schemes at  K = 64 , ϵ = 0.3 .
Table 2. Spectral efficiency∖PER comparison of R10, RLNC, RLCB, and RLCB variant schemes at  K = 64 , ϵ = 0.3 .
Schemen = 1n = 5n = 10n = 15
R100.627∖0.00350.583∖0.00130.570∖0.00090.563∖0.0007
RLNC(GF(2))0.579∖0.00460.570∖0.00240.561∖0.00150.551∖0.0008
RLCB0.672∖0.00260.606∖0.00120.583∖0.00080.571∖0.0006
RLCB N o _ P r e 0.671∖0.00280.593∖0.00100.545∖0.00070.503∖0.0008
RLCB P r e _ R 10 0.671∖0.00280.602∖0.00120.576∖0.00090.562∖0.0008
RLCB N o _ L T 0.623∖0.12420.614∖0.06190.608∖0.04590.605∖0.0386
RLCB L T _ R e p e a t 0.667∖0.00870.606∖0.01280.589∖0.01310.580∖0.0126
RLCB O N C M B 0.671∖0.00280.598∖0.00220.575∖0.00120.562∖0.0008
Table 3. Quantitative encoding complexity of RLCB and RaptorQ.
Table 3. Quantitative encoding complexity of RLCB and RaptorQ.
Complexityk = 16k = 32k = 64
  ϵ = 0.1   ϵ = 0.2   ϵ = 0.3   ϵ = 0.1   ϵ = 0.2   ϵ = 0.3   ϵ = 0.1   ϵ = 0.2   ϵ = 0.3
RLCBn = 13333343434624674879859991036
n = 59319791071109711631347164218062276
n = 10174318942138195121872688255130004375
n = 15257928363259285132494165350043336603
RaptorQn = 1925812,31614,82713,87518,69625,07724,11532,21544,306
n = 511,86115,44518,56717,15124,17832,62127,43939,15955,444
n = 1012,84916,69820,25117,80126,38334,90728,60141,69258,821
n = 1513,12617,11621,32918,68632,70736,53429,29543,93361,594
Table 4. Quantization decoding complexity of Joint BP-GE, GE, and ID.
Table 4. Quantization decoding complexity of Joint BP-GE, GE, and ID.
SchemeK = 16K = 32K = 64
Joint BP-GE (RLCB)1036257125,506
GE (RLCB)39,304132,6511,259,712
ID (RaptorQ)134,912390,280279,0328
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Jin, Z.; Li, H.; Huang, J.; Wang, X.; Tan, Z.; Dong, P.; Fei, Z. Raptor-like Coded Broadcasting for Efficient V2X Communications. Electronics 2023, 12, 3951. https://doi.org/10.3390/electronics12183951

AMA Style

Jin Z, Li H, Huang J, Wang X, Tan Z, Dong P, Fei Z. Raptor-like Coded Broadcasting for Efficient V2X Communications. Electronics. 2023; 12(18):3951. https://doi.org/10.3390/electronics12183951

Chicago/Turabian Style

Jin, Zuolin, Huan Li, Jingxuan Huang, Xinyi Wang, Zhiyuan Tan, Pengpeng Dong, and Zesong Fei. 2023. "Raptor-like Coded Broadcasting for Efficient V2X Communications" Electronics 12, no. 18: 3951. https://doi.org/10.3390/electronics12183951

APA Style

Jin, Z., Li, H., Huang, J., Wang, X., Tan, Z., Dong, P., & Fei, Z. (2023). Raptor-like Coded Broadcasting for Efficient V2X Communications. Electronics, 12(18), 3951. https://doi.org/10.3390/electronics12183951

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop