Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2011

Open Access 01.12.2011 | Research Article

Network Coding-Based Retransmission for Relay Aided Multisource Multicast Networks

verfasst von: Quoc-Tuan Vien, Le-Nam Tran, Een-Kee Hong

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2011

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper considers the reliable transmission for wireless multicast networks where multiple sources want to distribute information to a set of destinations with assistance of a relay. Basically, the reliability of a communication link is assured via automatic repeat request (ARQ) protocols. In the context of multisource multicast networks, the challenge is how to retransmit the lost or erroneous packets efficiently. In traditional approaches, the retransmission of lost packets from a single source is treated separately, and thus it may cause a considerable delay. To solve this problem, we propose the relay detects, combines, and forwards the packets which are lost at destinations using network coding. In the proposed ARQ protocol, the relay detects packets from different sources and combines the lost packets using NC. In particular, two packet-combination algorithms are developed to guarantee that all lost packets are retransmitted with the smallest number of retransmissions. Furthermore, we analyze the transmission bandwidth and provide the numerical results to demonstrate the superior performance of the proposed ARQ protocol over some existing schemes.

1. Introduction

Recently, relay communication has been extensively investigated as a promising technique to extend the coverage of wireless networks by exploiting the spatial diversity gains [13]. Generally, the use of relays does not immediately increase the network throughput since packets traverse along the relays via store-and-forward manner. For some particular network topologies such as two-way relay channels, relay-assisted broadcast channels, and multicast channels, the network throughput can be dramatically improved by applying network coding (NC) at the relays [49]. The basic idea of NC is that the relays are allowed to perform algebraic linear operations on the received packets from multiple sources and forward the combined packet in the subsequent transmission.
In this paper, we consider the reliable transmission over multisource-multicast networks [10] with assistance of a relay, where multiple sources want to transmit their messages to a set of intended destinations. This network model is widely applicable in various scenarios, in particular wireless ad hoc networks, where a set of sources needs to transmit data to a set of destinations through relays. One way to deliver information reliably over error-prone channels is to employ automatic repeat request (ARQ) protocols [11], in which, if a packet cannot be decoded, it is discarded and retransmitted. Applying the traditional ARQ techniques to multicast or broadcast networks may cause considerable delay for two reasons: (i) the lost packets of different destinations are retransmitted individually and (ii) the retransmission will be repeated until all destinations receive all packets correctly. To reduce the number of retransmissions, ARQ schemes based on NC have been proposed in [12, 13]. The relay may XOR the disjointedly erroneous packets of different destinations and retransmit them to all the involving destinations.
The existing NC-based ARQ strategies for reliable wireless multicast networks are devised for the deployment scenario where a source distributes information to multiple intended destinations, as in [5, 14]. The problem of designing a retransmission mechanism for multisource-multicast networks that can achieve a high network throughput efficiency has received less interest. The NC-based ARQ strategies for multicast networks proposed in [12] can be reused for multisource-multicast network by viewing a multisource-multicast network as a superposition of several multicast networks. More specifically, the lost packets in the same information flow can be XORed using the NC-based ARQ strategies for multicast networks. Here, The information flow is defined as the data transmission from a source to multiple destinations. However, this traditional NC-based ARQ may result in a poor throughput efficiency since the information flows from distinct sources are treated independently.
In this paper, we propose a new NC-based ARQ protocol for multisource-multicast networks, in which the relay detects, combines, and sends the lost packets from different sources to the destinations. To achieve the best performance, multiuser detection (MUD) techniques, such as optimum detector, linear decorrelating detector, decision-feedback detector, and successive interference cancellation. [1519] are employed at the relay and destinations.
Thus, many lost packets from different sources can be combined and retransmitted. We need to develop an ARQ protocol to retransmit these lost packets in a systematic and efficient way. First, we classify lost packets into two types: Type-I includes the packets that are lost at the destinations but successfully received at the relay, and Type-II packets are lost at both destinations and the relay. Obviously, the sources must handle the retransmission of Type-II packets. The retransmission algorithm based on NC for sources can be easily designed since these packets are in the same flow, and thus it becomes the classical application of NC. The problem is how the relay efficiently retransmits Type-I packets that can come from different sources.
Dealing with that problem, we propose an algorithm at the relay to retransmit Type-I packets and an algorithm at the source to retransmit Type-II packets. Particularly, the algorithm for the retransmission at the relay is proposed based on an integration of NC and packet detection from two different sources.
Unlike the traditional NC-based ARQ, the proposed method can combine the packets from different flows and thus can improve the network throughput for multisource-multicast networks. As we show later in an example (Figure 2), with our proposed ARQ protocol, the number of retransmissions is significantly reduced, comparing with other ARQ-based protocols. As a second contribution of the paper, we compare our proposed method with other ARQ-based protocols for multisource-multicast networks by evaluating the transmission bandwidth with theoretical analysis and numerical results. In fact, three protocols are taken into account: direct transmission (DT), relaying transmission (RT), and the traditional NC-based ARQ. DT protocol denotes the case when multiple sources simultaneously transmit information to destination without relaying technique. RT protocol represents the model where relay participates in the transmission but NC is not performed at the relay (e.g., decode-and-forward relaying technique [2]).
The rest of this paper is organized as follows. In Section 2, we describe the system model of a multisource-multicast network. Different retransmission protocols are also presented in this section, and their transmission bandwidths are derived in Section 3. We provide the numerical results in Section 4 and Section 5 concludes this paper.

2. System Model and Transmission Protocols

The system model under investigation is shown in Figure 1. The data delivery from two sources https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq1_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq2_HTML.gif to two destinations https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq3_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq4_HTML.gif is assisted by a relay https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq5_HTML.gif . This is a specific case of multisource-multicast networks where the numbers of sources and destinations are 2 and 2, respectively. The generalization to cope with more than two sources and two destinations is straightforward.
In this paper, we assume that the sources send data in the form of packets (i.e., packet-based transmission) and each packet must be received correctly by all destinations after several transmissions and retransmissions. The packet loss of transmission from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq6_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq7_HTML.gif , from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq8_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq9_HTML.gif , and from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq10_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq11_HTML.gif follows Bernoulli trial with parameters https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq12_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq13_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq14_HTML.gif , respectively. We also assume that the sources and the relay are equipped with sufficient signal processing modules to be able to perform NC, that is, algebraic operation such as bitwise XOR operation.
Receiving the information data from multiple sources along with the feedback from the destinations, the relay knows what destinations are waiting for the lost packets to be retransmitted and then decides how to combine and forward the data to the intended destinations. In the following, we introduce some protocols that allow the relay to resend the lost packets to the destinations. The two fundamental DT and RT protocols are presented first, and our proposed protocol is followed.

2.1. DT Protocol

In this protocol, the sources send data directly to two destinations. The transmission is carried out with the traditional ARQ scheme and completed if two destinations receive correctly the data from two sources.

2.2. RT Protocol

This protocol is different from DT protocol in that the relay participates in the transmission. When one or two destinations do not receive the packet correctly, whereas the relay receives this packet successfully, the relay can help the source to forward the correctly received packet to the erroneously received destinations in the next time slot. The retransmission at the relay will be continued until its transmitted packet is correctly received by the intended destinations. In case that one or two destinations and the relay fail to receive the same packet from the sources, it is obvious that the sources need to resend that lost packet.

2.3. Proposed Protocol

Instead of resending the lost packet as soon as the destinations fail to receive it, the retransmission in the proposed ARQ protocol will happen after https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq15_HTML.gif packets.
The buffer of length https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq16_HTML.gif is required at two sources, whereas the buffer of length https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq17_HTML.gif is required at the relay and two destinations since they receive packets from two different sources. To improve the network throughput, the relay retransmits the packets of Type-I, and the sources deal with the retransmission of Type-II packets. What is particular in the proposed ARQ strategy is that the relay can mix the packets from different data flows.
Let us describe the proposed protocol by examining an example shown in Figure 2, where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq18_HTML.gif wishes to deliver 10 packets https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq19_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq20_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq21_HTML.gif .
The packets with a crossover sign represent the lost or erroneous packets. Without loss of generality, we assume that, for the data flow from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq22_HTML.gif , the erroneous packets received at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq23_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq24_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq25_HTML.gif are https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq26_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq27_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq28_HTML.gif , respectively. Similarly, the erroneous packets received at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq29_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq24_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq25_HTML.gif from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq32_HTML.gif are assumed to be https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq33_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq34_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq35_HTML.gif , respectively.
As shown in Figure 2, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq36_HTML.gif needs to retransmit 11 packets if applying RT protocol. The number of retransmissions can be significantly reduced with the traditional NC-based ARQ scheme where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq37_HTML.gif would transmit https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq38_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq39_HTML.gif . In this scheme, we could not combine https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq40_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq41_HTML.gif since both of them are corrupted at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq25_HTML.gif . Similarly, there is no way to combine https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq43_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq44_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq45_HTML.gif since https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq46_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq47_HTML.gif are simultaneously lost at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq25_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq49_HTML.gif is lost at both https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq24_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq25_HTML.gif . Thus, 8 retransmissions are totally required for the traditional NC-based ARQ scheme. That helps https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq52_HTML.gif save 3 retransmissions. Not stopping at that, we can further reduce the number of retransmissions with our proposed scheme if packets from different data flows are detected in parallel at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq53_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq24_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq25_HTML.gif . As in our above definition, packets https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq56_HTML.gif are Type-I packets. To improve the network throughput, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq57_HTML.gif forwards https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq58_HTML.gif in the retransmission phase. The details of this combination algorithm are presented in Algorithm 1. That means, the proposed ARQ requires 6 retransmissions and thus can save 2 further retransmissions comparing with the traditional NC-based ARQ scheme. https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq59_HTML.gif retransmits these packets until they are successfully received by both https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq24_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq25_HTML.gif .
Algorithm 1: Algorithm at relay to retransmit Type-I packets.
 (1) Let https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq62_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq63_HTML.gif denote the ordered set of correctly received packet at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq64_HTML.gif transmitted from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq22_HTML.gif
     and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq32_HTML.gif , respectively: https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq67_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq68_HTML.gif ,
     https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq69_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq70_HTML.gif .
    Define https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq71_HTML.gif and divide https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq72_HTML.gif into 3 groups:
  (i)  Group https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq73_HTML.gif includes packets that https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq74_HTML.gif receives successfully from both https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq22_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq32_HTML.gif , that is,
      https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq77_HTML.gif . In the preceding example, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq78_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq79_HTML.gif ,
      https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq80_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq81_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq82_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq83_HTML.gif belongs to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq84_HTML.gif ,
     (ii)   Group https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq85_HTML.gif includes packets that https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq86_HTML.gif receives successfully from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq22_HTML.gif but fails to receive from
       https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq32_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq89_HTML.gif . In Figure 2, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq90_HTML.gif includes https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq91_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq92_HTML.gif .
   (iii)  Group https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq93_HTML.gif includes packets that https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq94_HTML.gif receives successfully from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq32_HTML.gif but fails to receive from
      https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq22_HTML.gif : https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq97_HTML.gif . In Figure 2, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq98_HTML.gif includes https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq99_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq100_HTML.gif .
 (2) For packets in https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq101_HTML.gif , if one packet is correctly received at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq102_HTML.gif , lost at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq103_HTML.gif , while another packet is
    correctly received at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq104_HTML.gif , lost at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq105_HTML.gif , we can combine these two packets.
    Thus, there are 3 possibilities: https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq106_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq107_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq108_HTML.gif .
    Start from left to right in the group of packets in https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq109_HTML.gif , and choose the suitable combination
    (e.g., https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq110_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq111_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq112_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq113_HTML.gif in the above example)
 (3) For packets in https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq114_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq115_HTML.gif , similarly if one packet is correctly received at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq116_HTML.gif , lost at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq117_HTML.gif ,
    while another packet is correctly received at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq118_HTML.gif , lost at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq119_HTML.gif , we can combine these two packets
    in only one way https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq120_HTML.gif (for https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq121_HTML.gif ) or https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq122_HTML.gif (for https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq123_HTML.gif ). (e.g., https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq124_HTML.gif
    in the above example)
 (4) For the remaining lost packets at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq125_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq126_HTML.gif that https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq127_HTML.gif receives successfully but cannot perform
    the combination, they are normally resent without using NC (e.g., https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq128_HTML.gif in the above example)
We can see that https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq129_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq130_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq131_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq132_HTML.gif are lost at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq133_HTML.gif and also lost at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq134_HTML.gif and/or https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq135_HTML.gif . These packets are classified as Type-II packets. Obviously, the relay has no way to resend such packets, and thus the sources must resend these packets. In the example, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq136_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq137_HTML.gif retransmit the combined packets https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq138_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq139_HTML.gif , respectively. The destinations are able to recover the corrupted packets by XORing their correctly received packets with the XORed packets received from the relay or sources.
The generalization of the above example for the arbitrary buffer size is summarized in Figure 3. In this protocol, the combination algorithms at the relay and sources are presented in Algorithms 1 and 2, respectively.
Algorithm 2: Algorithm at source to retransmit Type-II packets.
 (1) Through the feedback from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq140_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq141_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq142_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq143_HTML.gif determines the number and the position of
    remaining lost packets at destinations that https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq144_HTML.gif also fails in receiving them.
 (2) Combine the packets for retransmission by NC with the condition that only one packet in
    the combined packet should be correctly received by only one destination, similar to the
    combination performed for packets in https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq145_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq146_HTML.gif explained in Algorithm 1. In the preceding
    example, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq147_HTML.gif resends https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq148_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq149_HTML.gif resends https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq150_HTML.gif .
 (3) For the remaining lost packets at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq151_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq152_HTML.gif that https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq153_HTML.gif cannot perform the combination,
    they are resent without using NC.

3. Transmission Bandwidth Analysis

In this section, we study the transmission bandwidth of different transmission protocols in multisource-multicast networks consisting of two sources, one relay, and two destinations. The transmission bandwidth is defined as the average number of transmissions that is required to successfully transmit two packets from two sources to two destinations.

3.1. DT Protocol

This protocol is the simplest in which two sources directly send packets to two destinations without relay and network coding. The transmission bandwidth is given by
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ1_HTML.gif
(1)
where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq154_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq155_HTML.gif , denotes the average number of transmissions required for https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq156_HTML.gif to send data to both https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq157_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq158_HTML.gif and is calculated as [13]
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ2_HTML.gif
(2)

3.2. RT Protocol

In this protocol, the relay helps two sources in sending data to two destinations, but no NC is applied at the relay. The transmission bandwidth required to successfully transmit two packets from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq159_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq160_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq161_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq162_HTML.gif , is given by
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ3_HTML.gif
(3)
where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq163_HTML.gif denotes the average number of transmissions to send a packet from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq164_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq165_HTML.gif with the help of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq166_HTML.gif and is found as [12]
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ4_HTML.gif
(4)
Finally, the transmission bandwidth of this protocol is
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ5_HTML.gif
(5)

3.3. Traditional NC-Based ARQ Protocol

The relay in this protocol combines the lost packets in the same flow based on NC in the retransmission phase. The transmission bandwidth is given by
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ6_HTML.gif
(6)
where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq167_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq168_HTML.gif , denotes the average number of transmissions to transmit from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq169_HTML.gif to both https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq170_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq171_HTML.gif with the help of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq172_HTML.gif in the traditional NC-based ARQ (NCA) protocol. Note that the data delivery from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq173_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq174_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq175_HTML.gif through https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq176_HTML.gif resembles the system model in [12]. However, the analysis of transmission bandwidth presented in [12] is difficult to follow. Here, we introduce a simple way to calculate the transmission bandwidth.
In this protocol, there are three steps to transmit data from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq177_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq178_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq179_HTML.gif through https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq180_HTML.gif .
Step  1.
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq181_HTML.gif transmits https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq182_HTML.gif packets.
Step  2.
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq183_HTML.gif retransmits Type-I packets.
Step  3.
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq184_HTML.gif retransmits Type-II packets.
Let https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq185_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq186_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq187_HTML.gif , denote the number of transmissions in the https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq188_HTML.gif th step of the traditional NCA protocol. The average number of transmissions to send from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq189_HTML.gif to both https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq190_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq191_HTML.gif is calculated by
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ7_HTML.gif
(7)
where the number of transmissions in Step 1 is simply given by
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ8_HTML.gif
(8)
The number of transmissions in Step 2 and in Step 3 is calculated by
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ9_HTML.gif
(9)
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ10_HTML.gif
(10)
respectively, where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq192_HTML.gif denotes the expectation, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq193_HTML.gif is the total number of subsets consisting of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq194_HTML.gif elements in a set of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq195_HTML.gif elements, and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq196_HTML.gif is a random variable representing the number of packets that https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq197_HTML.gif successfully receives in the first step.
Given that https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq198_HTML.gif packets are successfully received at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq199_HTML.gif in the first step, the number of transmissions at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq200_HTML.gif using traditional NCA protocol in the second step can be computed by
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ11_HTML.gif
(11)
where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq201_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq202_HTML.gif is the average number of transmissions required at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq203_HTML.gif to send a packet to both https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq204_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq205_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq206_HTML.gif is the average number of transmissions for a direct transmission from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq207_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq208_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq209_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq210_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq211_HTML.gif otherwise. The term https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq212_HTML.gif in (11) is derived based on the fact that there are https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq213_HTML.gif packets that the relay can combine with NC, and thus the number of transmissions is given by https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq214_HTML.gif . Then, the relay transmits the remaining https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq215_HTML.gif packets to the corresponding destination depending on the relation of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq216_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq217_HTML.gif , that is, if https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq218_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq219_HTML.gif transmits https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq220_HTML.gif packets to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq221_HTML.gif , otherwise https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq222_HTML.gif transmits https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq223_HTML.gif packets to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq224_HTML.gif . With these packets, the number of transmissions is given by https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq225_HTML.gif . Thus, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq226_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq227_HTML.gif are, respectively, given by
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ12_HTML.gif
(12)
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ13_HTML.gif
(13)
In the third step where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq228_HTML.gif fails to receive https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq229_HTML.gif packets in the first step, https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq230_HTML.gif is required to retransmit with the number of transmissions
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ14_HTML.gif
(14)
where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq231_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq232_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq233_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq234_HTML.gif otherwise. https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq235_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq236_HTML.gif are given by (5) and (12), respectively.

3.4. Proposed Protocol

The relay in the proposed protocol combines the lost packets of different flows. Since the total of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq237_HTML.gif packets is transmitted from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq238_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq239_HTML.gif , the transmission bandwidth is expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ15_HTML.gif
(15)
where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq240_HTML.gif denotes the number of transmissions in the https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq241_HTML.gif th step of the proposed protocol including the following steps.
Step  1.
Each of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq242_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq243_HTML.gif transmits https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq244_HTML.gif packets.
Step  2.
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq245_HTML.gif retransmits Type-I packets.
Step  3.
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq246_HTML.gif and/or https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq247_HTML.gif retransmit Type-II packets.
In Step  1, both https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq248_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq249_HTML.gif send https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq250_HTML.gif packets to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq251_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq252_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq253_HTML.gif , and thus
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ16_HTML.gif
(16)
The number of transmissions in Step  2 and Step  3 are given by
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ17_HTML.gif
(17)
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ18_HTML.gif
(18)
respectively, where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq254_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq255_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq256_HTML.gif are random variables representing the number of packets that https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq257_HTML.gif successfully receives from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq258_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq259_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq260_HTML.gif , respectively.
Given that https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq261_HTML.gif packets are successfully received at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq262_HTML.gif in the first group, the number of transmissions at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq263_HTML.gif based on the proposed algorithm (i.e., Algorithm 1) for the packets in https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq264_HTML.gif in the second step can be computed by
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ19_HTML.gif
(19)
where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq265_HTML.gif is given by (13), https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq266_HTML.gif is given by (12) with https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq267_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq268_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq269_HTML.gif otherwise.
For the packets in https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq270_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq271_HTML.gif in Step 2, the number of transmissions is calculated by
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ20_HTML.gif
(20)
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ21_HTML.gif
(21)
respectively, where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq272_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq273_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq274_HTML.gif otherwise.
In Step 3 where the relay fails to receive packets of the first group in the first step, the sources are required to retransmit these remaining lost packets with the number of transmissions
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ22_HTML.gif
(22)
where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq275_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq276_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq277_HTML.gif otherwise. https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq278_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq279_HTML.gif are given by (5) and (3), respectively.
For the second group and the third group in Step 3, the number of transmissions is computed by
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ23_HTML.gif
(23)
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ24_HTML.gif
(24)
respectively, where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq280_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq281_HTML.gif , is given by (4); https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq282_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq283_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq284_HTML.gif otherwise. In the above (23) and (24), https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq285_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq286_HTML.gif , denotes the number of transmissions to transmit data from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq287_HTML.gif to both https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq288_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq289_HTML.gif through https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq290_HTML.gif that can be computed by
https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_Equ25_HTML.gif
(25)
where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq291_HTML.gif is given by (13).

4. Numerical Results

In this section, we compare the transmission bandwidth of different protocols considered in our work by analytically evaluating the expressions in Section 3. In fact, the simulation and analytical results drawn in Figure 4 demonstrate a strong agreement. Consequently, it is sufficient to show the analytical results in Figures 57.
Figure 4 plots the transmission bandwidth of various ARQ protocols versus https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq305_HTML.gif , the packet error rate (PER) of the wireless link from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq306_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq307_HTML.gif . Both numerical and analytical results are included. The range of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq308_HTML.gif is from 0.04 to 0.2 to characterize a wide range of wireless applications. To study the effect of the channels from the sources to the relay on the overall performance, we assume that https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq309_HTML.gif . The value of other PERs is arbitrarily set at https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq310_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq311_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq312_HTML.gif . We can see that the proposed protocol outperforms other existing schemes since it can combine the lost packets from different flows in the retransmission phase. In particular, when https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq313_HTML.gif is small (e.g., https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq314_HTML.gif ), the proposed scheme shows a remarkable gain over the traditional ARQ method. In fact, if https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq315_HTML.gif is small, we have more Type-I packets in https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq316_HTML.gif than in https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq317_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq318_HTML.gif . For packets in https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq319_HTML.gif , our proposed scheme can save the number of retransmissions by mixing the packets from different flows. When https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq320_HTML.gif is high (i.e., the channel from sources to relay is in bad condition), the relay mostly obtains the lost packets of Type-II. Consequently, the sources should retransmit these packets. In other words, there is little benefit in applying NC at the relay in this scenario. As a result, the performance of our proposed protocol converges to that of the traditional approach. Additionally, it can be seen that the analytical results are quite matched with the simulation results, and thus, in the following, we only show the analytical results.
Figure 5 compares the transmission bandwidth of our proposed protocol with that of the traditional NC-based ARQ protocol for different values of PER of the channels from sources to destinations. The simulation setting is similar to that in Figure 4. For a given value of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq321_HTML.gif , our proposed approach always shows better performance than the traditional NC-based ARQ protocol. What is particular in Figure 5 is that the transmission bandwidth of our proposed protocol converges to a certain value at low https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq322_HTML.gif regardless of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq323_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq324_HTML.gif . That means, when https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq325_HTML.gif is small, the reliability of the channels from sources to destinations has little impact on the transmission bandwidth of the proposed protocol. In fact, a small value of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq326_HTML.gif denotes the case where https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq327_HTML.gif certainly detected the packets from https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq328_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq329_HTML.gif successfully. As a result, the lost packets at the destinations belong to Type-I. Thus, the relay handles the retransmission of these packets, and the impact of the direct channels from sources to destinations is negligible.
In Figures 6 and 7, we show the transmission bandwidth of various ARQ protocols with respect to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq330_HTML.gif . The PERs of the channels from the sources to the relay and from the relay to the destinations are fixed. The values of https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq331_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq332_HTML.gif are adjusted accordingly to https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq333_HTML.gif by the relation https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq334_HTML.gif . It is observed that the transmission bandwidth curve of the proposed protocol has the smallest slope. Thus, we conclude that the performance of our developed ARQ scheme is not sensitive to the quality of the channels from the sources to the destinations. The channels https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq335_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq336_HTML.gif are more important than the channels https://static-content.springer.com/image/art%3A10.1155%2F2011%2F643920/MediaObjects/13638_2010_Article_2130_IEq337_HTML.gif .

5. Conclusion

In this paper, we propose a new reliable transmission scheme for wireless multisource-multicast networks based on NC. For a specific case of multisource-multicast networks with two sources and two destinations, we present two packet-combination algorithms to retransmit the lost packets efficiently. The transmission bandwidth of various ARQ protocols is analyzed. Furthermore, we provide numerical results with different simulation settings to demonstrate the effectiveness of our proposed scheme in saving the transmission bandwidth. For future works, one could possibly investigate the performance of fading channels with path loss and placement of the nodes.

Acknowledgment

This paper was partly supported by the IT R&D program of MKE/KEIT (KI001814, Game Theoretic Approach for Crosslayer Design in Wireless Communications) and this work 2010-0025926 was partly supported by Mid-career Researcher Program through NRF grant funded by the MEST.
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://​creativecommons.​org/​licenses/​by/​2.​0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat Sendonaris A, Erkip E, Aazhang B: User cooperation diversity—part I: system description. IEEE Transactions on Communications 2003, 51(11):1927-1938. 10.1109/TCOMM.2003.818096CrossRef Sendonaris A, Erkip E, Aazhang B: User cooperation diversity—part I: system description. IEEE Transactions on Communications 2003, 51(11):1927-1938. 10.1109/TCOMM.2003.818096CrossRef
2.
Zurück zum Zitat Laneman JN, Tse DNC, Wornell GW: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Transactions on Information Theory 2004, 50(12):3062-3080. 10.1109/TIT.2004.838089MathSciNetCrossRefMATH Laneman JN, Tse DNC, Wornell GW: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Transactions on Information Theory 2004, 50(12):3062-3080. 10.1109/TIT.2004.838089MathSciNetCrossRefMATH
3.
Zurück zum Zitat Nazer B, Gastpar M: Compute-and-forward: harnessing interference through structured codes. Proceedings of IEEE International Symposium on Information Theory (ISIT '08), July 2008, Toronto, Ontario, Canada 772-776. Nazer B, Gastpar M: Compute-and-forward: harnessing interference through structured codes. Proceedings of IEEE International Symposium on Information Theory (ISIT '08), July 2008, Toronto, Ontario, Canada 772-776.
4.
Zurück zum Zitat Ahlswede R, Cai N, Li SYR, Yeung RW: Network information flow. IEEE Transactions on Information Theory 2000, 46(4):1204-1216. 10.1109/18.850663MathSciNetCrossRefMATH Ahlswede R, Cai N, Li SYR, Yeung RW: Network information flow. IEEE Transactions on Information Theory 2000, 46(4):1204-1216. 10.1109/18.850663MathSciNetCrossRefMATH
5.
Zurück zum Zitat Koetter R, Médard M: An algebraic approach to network coding. IEEE/ACM Transactions on Networking 2003, 11(5):782-795. 10.1109/TNET.2003.818197CrossRef Koetter R, Médard M: An algebraic approach to network coding. IEEE/ACM Transactions on Networking 2003, 11(5):782-795. 10.1109/TNET.2003.818197CrossRef
6.
Zurück zum Zitat Katti S, Katabi D, Hu W, Rahul H, Medard M: The importance of being opportunistic: practical network coding for wireless environments. Proceedings of the 43rd Annual Allerton Conference on Communication, Control and Computing (Allerton '05), September 2005, Montecillo, Ill, USA Katti S, Katabi D, Hu W, Rahul H, Medard M: The importance of being opportunistic: practical network coding for wireless environments. Proceedings of the 43rd Annual Allerton Conference on Communication, Control and Computing (Allerton '05), September 2005, Montecillo, Ill, USA
7.
Zurück zum Zitat Zhang S, Liew SC, Lam PP: Hot topic: physical-layer network coding. Proceedings of the 12th Annual International Conference on Mobile Computing and Networking (MOBICOM '06), September 2006, New York, NY, USA 358-365.CrossRef Zhang S, Liew SC, Lam PP: Hot topic: physical-layer network coding. Proceedings of the 12th Annual International Conference on Mobile Computing and Networking (MOBICOM '06), September 2006, New York, NY, USA 358-365.CrossRef
8.
Zurück zum Zitat Katti S, Gollakota S, Katabi D: Embracing wireless interference: analog network coding. Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '07), August 2007, Kyoto, Japan 397-408. Katti S, Gollakota S, Katabi D: Embracing wireless interference: analog network coding. Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '07), August 2007, Kyoto, Japan 397-408.
9.
Zurück zum Zitat Katti S, Rahul H, Hu W, Katabi D, Medard M, Crowcroft J: XORs in the air: practical wireless network coding. IEEE/ACM Transactions on Networking 2008, 16(3):497-510.CrossRef Katti S, Rahul H, Hu W, Katabi D, Medard M, Crowcroft J: XORs in the air: practical wireless network coding. IEEE/ACM Transactions on Networking 2008, 16(3):497-510.CrossRef
10.
Zurück zum Zitat Larsson P: Multicast multiuser ARQ. Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '08), March 2008, Las Vegas, Nev, USA 1985-1990. Larsson P: Multicast multiuser ARQ. Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '08), March 2008, Las Vegas, Nev, USA 1985-1990.
11.
Zurück zum Zitat Chang SSL: Theory of information feedback systems. IEEE Transactions on Information Theory 1956, 2(3):29-40. 10.1109/TIT.1956.1056807CrossRef Chang SSL: Theory of information feedback systems. IEEE Transactions on Information Theory 1956, 2(3):29-40. 10.1109/TIT.1956.1056807CrossRef
12.
Zurück zum Zitat Fan P, Zhi C, Wei C, Letaief KB: Reliable relay assisted wireless multicast using network coding. IEEE Journal on Selected Areas in Communications 2009, 27(5):749-762.CrossRef Fan P, Zhi C, Wei C, Letaief KB: Reliable relay assisted wireless multicast using network coding. IEEE Journal on Selected Areas in Communications 2009, 27(5):749-762.CrossRef
13.
Zurück zum Zitat Nguyen D, Tran T, Nguyen T, Bose B: Wireless broadcast using network coding. IEEE Transactions on Vehicular Technology 2009, 58(2):914-925.CrossRef Nguyen D, Tran T, Nguyen T, Bose B: Wireless broadcast using network coding. IEEE Transactions on Vehicular Technology 2009, 58(2):914-925.CrossRef
15.
Zurück zum Zitat Verdu S: Multiuser Detection. Cambridge University Press, Cambridge, UK; 1998.MATH Verdu S: Multiuser Detection. Cambridge University Press, Cambridge, UK; 1998.MATH
16.
Zurück zum Zitat Huang WJ, Peter Hong YW, Jay Kuo CC: Relay-assisted decorrelating multiuser detector (RAD-MUD) for cooperative CDMA networks. IEEE Journal on Selected Areas in Communications 2008, 26(3):550-560.CrossRef Huang WJ, Peter Hong YW, Jay Kuo CC: Relay-assisted decorrelating multiuser detector (RAD-MUD) for cooperative CDMA networks. IEEE Journal on Selected Areas in Communications 2008, 26(3):550-560.CrossRef
17.
Zurück zum Zitat Lupas R, Verdu S: Linear multiuser detectors for synchronous code-division multiple-access channels. IEEE Transactions on Information Theory 1989, 35(1):123-136. 10.1109/18.42183MathSciNetCrossRefMATH Lupas R, Verdu S: Linear multiuser detectors for synchronous code-division multiple-access channels. IEEE Transactions on Information Theory 1989, 35(1):123-136. 10.1109/18.42183MathSciNetCrossRefMATH
18.
Zurück zum Zitat Duel-Hallen A: Decorrelating decision-feedback multiuser detector for synchronous code-division multiple-access channel. IEEE Transactions on Communications 1993, 41(2):285-290. 10.1109/26.216499CrossRefMATH Duel-Hallen A: Decorrelating decision-feedback multiuser detector for synchronous code-division multiple-access channel. IEEE Transactions on Communications 1993, 41(2):285-290. 10.1109/26.216499CrossRefMATH
19.
Zurück zum Zitat Patel P, Holtzman J: Analysis of a simple successive interference cancellation scheme in a DS/CDMA system. IEEE Journal on Selected Areas in Communications 1994, 12(5):796-807. 10.1109/49.298053CrossRef Patel P, Holtzman J: Analysis of a simple successive interference cancellation scheme in a DS/CDMA system. IEEE Journal on Selected Areas in Communications 1994, 12(5):796-807. 10.1109/49.298053CrossRef
Metadaten
Titel
Network Coding-Based Retransmission for Relay Aided Multisource Multicast Networks
verfasst von
Quoc-Tuan Vien
Le-Nam Tran
Een-Kee Hong
Publikationsdatum
01.12.2011
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2011/643920

Weitere Artikel der Ausgabe 1/2011

EURASIP Journal on Wireless Communications and Networking 1/2011 Zur Ausgabe

Premium Partner