1
Performance of Hybrid ARQ Using Trellis Coded Modulation over Rayleigh Fading Channel Qian Huang, Sammy Chan, Li Ping and King-Tim Ko
Abstract— Trellis coded modulation has been shown as an attractive coding scheme for broadband wireless networks due to its bandwidth efficiency. Various hybrid automatic repeat request (ARQ) schemes using trellis-coded modulation (TCM) as underlying forward error control (FEC) have been proposed in the literature. In this paper, we study the performance of the hybrid ARQ with concatenated two-state trellis-coded modulation (CT-TCM) over Rayleigh fading channels. The throughput of the CT-TCM hybrid ARQ scheme over a quasi-static Rayleigh fading channel is evaluated by both analysis and simulation. Besides, the performance of the CT-TCM hybrid ARQ over fully interleaved Rayleigh fading channels is evaluated by simulation and compared with other existing TCM-based hybrid ARQ schemes. The numerical results demonstrate that the CT-TCM hybrid ARQ achieves improved coding gain and throughput. Index Terms— Hybrid ARQ, trellis-coded modulation (TCM).
symbol interleaver
Coded modulation techniques, such as trellis coded modulation (TCM) [1]–[4], have been studied for the physical layer design to improve bandwidth efficiency in broadband wireless networks. As an important application of TCM codes for error control, various hybrid ARQs using TCM as the underlying FEC scheme have been investigated [5]–[12]. A simple approach is to use the copies of a TCM code in all further retransmissions, as the schemes in [5]–[7], [9]. However, it results in a repetition coding and is not efficient as far as coding gain is concerned. The schemes of [10]–[12] improve the coding gain by combining different TCM codes used for retransmissions. In the scheme of [10], two different TCM codes are alternatively used in further retransmissions. However, this approach becomes a repetition coding after two transmission attempts. An alternative solution is to employ more component codes and retransmit a different component code at a time. However, the design of the component codes used in such a TCM-based scheme is still an open problem. In [12], we have proposed a novel hybrid ARQ scheme that uses the concatenated two-state TCM (CT-TCM) codes presented in [4]. The notable feature of the CT-TCM codes is that they offer a low-cost but comparable performance to some existing Turbo-type coded-modulation schemes [2], [3]. The CT-TCM encoder comprises multiple component encoders concatenated in parallel by symbol-based interleavers as shown in Fig. 1, where the number of component encoder This work was supported by a grant from City University of Hong Kong (Project No. 7002017). The authors are with the Department of Electronic Engineering, City University of Hong Kong, Hong Kong SAR, China. (e-mail: {eeqhuang, eeschan, eeliping, eektko}@cityu.edu.hk)
encoder- 0
puncturer
input
d
{ k}
symbol interleaver
transmit
component
z(m)
encoder-
symbol interleaver
m
component
z(M-1)
encoder- (
binary 2-state
{ck(m)}
trellis encoder
M
-1)
signal
{xk(m)}
channel
mapper
receive
output
M
DEC-(
-1)
[z m)]-1 (
I. I NTRODUCTION
component
z(0)
DEC-
L(m)
m
DEC-0
Lc(m) APP
La(m) -
Le(m)
T
-
z(m)
Fig. 1. The structure of CT-TCM encoder and decoder with M components.
is M . The symbol-based interleaver for component encoder (m) m (0 ≤ m < M ) is specified as z(m) = {zk }, of which the (m) kth element (k ≥ 0), denoted as zk , is an integer randomly (m) generated but follows the rule: zk mod M = k mod M . With the interleaver, the kth symbol dk (with binary n-tuple) of an input information sequence {dk }, k ≥ 0, is moved to a new (m) position specified by zk in the sequence after interleaving. The sequences of interleaved information symbols are encoded by each component encoder with a binary two-state trellis encoder followed by a multi-ary signal mapper. The coded (m) symbols from each component encoder, {ck }, are then mapped to a signal constellation of size 2n+1 , producing a (m) sequence of modulated symbols, e.g., {xk } from component encoder m. We refer to the sequence of modulated symbols from each component encoder as a CT-TCM component code. The CT-TCM code is finally generated by heavily puncturing the symbols of each component code under a given puncture pattern before they are transmitted for spectral efficiency. At the receiver, the received codes from the initial transmission and the retransmissions are jointly decoded based on the turbo decoding principle as shown in Fig. 1. The CT-TCM decoder comprises M local a posteriori probability (APP) decoders, one for each CT-TCM component code. The M local APP decoders operate successively. For the mth decoder, T
2
is for delay of one iteration, z(m) is the symbol interleaver, and the other variables are the log-likelihood (LL) values and defined as follows. (m) represents the a posteriori LL values for all infor• L mation symbols after decoding the mth component code. (m) • Lc represents the LL values {log p(yk |xk )} based on individual channel observations of the mth component code, where xk is the kth modulated symbol and yk (m) denotes the kth received symbol; its elements {Lc,k } are calculated as ½ log p(yk |xk ), for unpunctured symbols (m) Lc,k = 0, for punctured symbols. •
•
(m)
La represents the a priori LL values for all information symbols for the mth component code. It is initialized to zeroes, implying no a priori information. (m) Le represents the extrinsic information produced by the mth component code, defined by L(m) = L(m) − L(m) e a .
The performance of the CT-TCM hybrid ARQ (CT-TCMHARQ) scheme in an additive white Gaussian noise (AWGN) channel has been investigated by simulation in [12]. In this paper, we focus on the performance analysis of this scheme over Rayleigh fading channels. We first provide a brief review of the CT-TCM-HARQ in Section II, which is followed by a throughput analysis of the scheme over a quasi-static Rayleigh fading channel in Section III. Numerical results and performance comparisons between the CT-TCM-HARQ and other TCM-based hybrid ARQs are presented in Section IV. Finally, our conclusions are provided in Section V. II. H YBRID ARQ S CHEME U SING CT-TCM C ODES In terms of the aforementioned CT-TCM principle, for a given input data block, a set of CT-TCM codes can be generated by only changing the puncture patterns used at the sender. It is reasonable to use the resulted CT-TCM codes in the initial transmission and further retransmissions of the data block. Therefore, the key issue for designing a hybrid ARQ using the CT-TCM codes is the assignment of puncture patterns in each transmission attempt of a data block. Based on the CTTCM code principle [4], the puncture pattern for generating a CT-TCM code first satisfies the following constraints: (1) At any time k ≥ 0, one and only one modulated symbol, from the component encoders, carrying the same information dk , is selected and transmitted. That is, for any k, only (m) one symbol of {xk , 0 ≤ m < M } is transmitted and the other modulated symbols are punctured under the given puncturer. (2) The punctured modulated symbols are uniformly distributed in each component code. In terms of the above constraints, a qualified puncturer forms a pattern of a binary M × M indication matrix that contains only one non-zero entry per column. Assume Γ a qualified puncture pattern with Γ(l, m) = 1 (0 ≤ l, m < M ) the non-zero entry in row l, column m. Under this puncturer, all modulated symbols of the mth component code are punctured except those at the positions {k|k mod M = l}. Table I presents four examples
TABLE I E XAMPLES OF PUNCTURE PATTERNS FOR CT-TCM WITH M = 4.
Γ0 1 0 0 0
0 1 0 0
Γ1 0 0 1 0
0 0 0 1
0 0 1 0
0 0 0 1
Γ2 1 0 0 0
0 1 0 0
0 0 0 1
1 0 0 0
Γ3 0 1 0 0
0 0 1 0
0 1 0 0
0 0 1 0
0 0 0 1
of puncture patterns, Γi (0 ≤ i ≤ 3), which satisfy the above constraints for a CT-TCM system with M = 4 and 8PSK modulation. If Γ1 is used by the CT-TCM encoder, the transmitted sequence only contains the following modulated (2) (3) (0) (1) (2) (3) (0) symbols xk , xk+1 , xk+2 , xk+3 , xk+4 , xk+5 , xk+6 , . . .. Additionally, considering the combined decoding of successively received packets in retransmissions for optimal coding gain, it generally requires that the received information symbols of a data block are evenly distributed in the combined CT-TCM codes. Based on this condition, the puncture patterns used in two consecutive transmission attempts of a data block can be selected from the qualified puncture patterns whose combination also satisfies constraint (2). That is, if the combined puncture pattern is used as the puncturer at the CT-TCM sender, the modulated symbols that have not been punctured are still uniformly distributed in each CTTCM component code. For example, in the CT-TCM HARQ with M = 4, if we use puncture pattern Γ0 in Table I for the initial transmission of a data block. With respect to the above selection rule, the puncture pattern used for the second transmission of the data block is preferred to be Γ1 in Table I. At the receiver, the combination of the received sequences with puncture patterns Γ0 and Γ1 is equivalent to a sequence generated by using puncture pattern 1 0 1 0 0 1 0 1 1 0 1 0 0 1 0 1 at the sender, which provides evenly puncturing on each CTTCM component code. The similar method is used to determine the puncture patterns for the following retransmissions. Denote {γi }, 1 ≤ i ≤ M , a set of puncture patterns satisfying all above selection rules for a CT-TCM encoder with M component encoders. Based on the above considerations, the hybrid ARQ with the CT-TCM codes performs as follows: (i) Encoding and transmitting: the information sequence is sent to the CT-TCM encoder. Puncture pattern γ1 is used to puncture the generated component codes. However, the punctured modulated symbols of each component code are not dropped. Instead they are stored in a buffer at the sender for further use. A packet containing the modulated symbols selected by puncture pattern γ1 is transmitted to the receiver. (ii) Decoding: the received sequence together with the sequences from the initial transmission and previous retransmissions are jointly decoded based on the turbo decoding principle. If there is no error detected in decoding, an ACK is returned to the sender. Otherwise, the received sequence is stored in the buffer at the receiver, and a negative acknowledgement (NAK) is returned to the sender.
1 0 0 0
3
(1)
(1)
(1)
(1)
(1)
(1)
Tr = P (S1 ) + 2 · P (D1 , S2 ) + 2 · P (D1 , D2 , V2
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
) + 3 · P (D1 , D2 , F2 , S3 ) + 3 · P (D1 , D2 , F2 , D3 , V3
) + ...
M XX ∞
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
+M · P (D1 , D2 , F2 , . . . , DM −1 , FM −1 , SM ) + M · P (D1 , D2 , F2 , . . . , DM −1 , FM −1 , DM , VM ) +
n
(1)
(1)
(1)
(1)
(1)
(j−1)
P (D1 , D2 , F2 , . . . , DM , FM , . . . , D1 (1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(j−1)
, D2
(j−1)
+ P (D1 , D2 , F2 , . . . , DM , FM , . . . , D1 =
[(j − 1)M + i] · j=2 i=1
(j−1)
, D2
(1)
(j−1)
, F2
(j−1)
, F2
(1)
(j−1)
, . . . , DM
(j−1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(2)
(1)
(1)
(1)
, FM
(j)
(j)
(j)
(j)
(j)
(j)
, D1 , D2 , F2 , . . . , Di−1 , Fi−1 , Si )
(j−1)
, . . . , DM
1 + P (D1 ) + P (D1 , D2 , F2 ) + · · · + P (D1 , D2 , F2 , . . . , Di , Fi (1)
(j−1)
, FM
(j)
(j)
(j)
(j)
(j)
(j)
(j)
, D1 , D2 , F2 , . . . , Di−1 , Fi−1 , Di , Vi (1)
(1)
(1)
(1)
o )
(1)
) + · · · + P (D1 , D2 , F2 , . . . , DM , FM )
(1)
(1)
(1)
(1)
(2)
(2)
(j−1)
, D1 , D2 , F2 , . . . , Di , Fi
(2)
+P (D1 , D2 , F2 , . . . , DM , FM , D1 ) + · · · + P (D1 , D2 , F2 , . . . , DM , FM , D1 , D2 , F2 ) (1)
(j−1)
+ . . . + P (D1 , D2 , F2 , . . . , DM , FM , . . . , D1
, . . . , FM
(iii) Retransmitting: once the sender receives an NAK, another puncture pattern γi , 2 ≤ i ≤ M , is performed over the stored component codes. A new modulated sequence out of the stored component codes is selected by γi and transmitted. i is increased by one after each retransmission. Then, the scheme repeats procedures (ii)–(iii). If M transmissions are reached, the receiver buffer is cleared, and the scheme repeats (i)–(iii). One of the advantages of the CT-TCM-HARQ is that the generation of retransmitted packets involves no complex computation or procedures. Another advantage, as we have demonstrated in [12], is that significantly improved coding gain is achieved in comparison to the repetition method.
(j)
(j)
(j)
(j)
(1)
(1)
(j)
(1)
For a general hybrid ARQ scheme, provided that the bit error rate (BER) performance in each transmission attempt is known, the average number of transmissions per data block by the hybrid ARQ scheme can be derived as a function of the BER performance [13], [14]. Similar method is also applicable in the throughput analysis for the CT-TCM-HARQ scheme. Let the events of success and failure in decoding the received CT-TCM code generated by puncture pattern γi (1 ≤ i ≤ (j) M ) that is used the jth (j ≥ 1) time be denoted as Si (j) (j) (j) and Di , respectively. Let P (Si ) and P (Di ) represent the (j) probabilities that each event occurs, respectively. Let P (Vi ) (j) and P (Fi ), represent the probabilities of success and failure in decoding the combination of all received CT-TCM codes for a data block that are generated by the puncture patterns γ1 , γ2 , . . . , γi by j times, respectively. We assume that the probability of the undetected errors contained in any decoded (j) (j) data block is negligible, we have P (Si ) + P (Di ) ≈ 1 and (j) (j) P (Vi )+P (Fi ) ≈ 1. The average number of transmissions per data block by the CT-TCM-HARQ, denoted Tr , is derived (1) (1) (1) (1) (1) by Eq. (1). Here, the term P (D1 , D2 , F2 , . . ., DM , FM , (j−1) (j−1) (j) (j) (j) (j) (j) . . ., D1 , . . ., FM , D1 , D2 , F2 , . . ., Di , Fi ) in Eq. (1) can be expressed as (1)
(1)
(1)
(1)
(j−1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(1)
P (F2 |D1 , D2 ) · P (D2 |D1 ). (j)
(1)
(2) (1)
(1)
(1)
In Eq. (2), the term P (Di |D1 , D2 , F2 , . . ., FM , (j−1) (j−1) (j) (j) (j) (j) (j) . . ., D1 , . . ., FM , D1 , D2 , F2 , . . ., Di−1 , Fi−1 ) represents the probability that failure in decoding the received CT-TCM code for the data block generated by γi that is used the jth time, conditional on all the previously received CTTCM codes failed in decoding. Denote such conditional event as E. Since it is definitely that no successful transmission occurs before using γi j times, we have (j)
P (Di ) = P (Di |E)P (E).
III. T HROUGHPUT A NALYSIS
(1)
(1)
· · · P (DM |D1 , D2 , F2 , . . . , DM −1 , FM −1 ) · · ·
(j)
P (D1 , D2 , F2 , . . . , DM , FM , . . . , D1
) + ··· .
(j−1)
, . . . , FM
,
(j) (j) (j) (j) (j) (j) (1) (1) D1 , D2 , F2 , . . . , Di , Fi ) = P (Fi |D1 , D2 , (1) (1) (j−1) (j−1) (j) (j) . . . , DM , F M , . . . , D1 , . . . , FM , D1 , D2 , (j) (j) (j) (1) (1) (1) (1) F2 , . . . , Di ) · P (Di |D1 , D2 , F2 . . . , FM , . . . , (j−1) (j−1) (j) (j) (j) (j) (j) D1 , . . . , FM , D1 , D2 , F2 , . . . , Di−1 , Fi−1 )
(3)
Due to the fact that is P (E) ≤ 1, we obtain (j)
(j)
P (Di |E) ≥ P (Di ). (j)
(4)
(j)
Similarly, we have P (Fi |E) ≥ P (Fi ) for the term of (j) (1) (1) (1) (1) (1) (j−1) P (Fi |D1 , D2 , F2 , . . ., DM , FM , . . ., D1 , . . ., (j−1) (j) (j) (j) (j) FM , D1 , D2 , F2 , . . ., Di ) in Eq. (2). Hence, Eq. (2) can be re-written as follows, (1)
(1)
(1)
(1)
(1)
(j−1)
P (D1 , D2 , F2 , . . . , DM , FM , . . . , D1
(j−1)
, . . . , FM
,
(1) (j) (j) (1) (j) (j) (j) D1 , D2 , F2 , . . . , Di , Fi ) ≥ P (D1 )P (D2 ) · (1) (1) (1) (j−1) (j−1) P (F2 ) · · · P (DM )P (FM ) · · · P (D1 ) · · · P (FM ) (j) (j) (j) (j) (j) ·P (D1 )P (D2 )P (F2 ) · · · P (Di )P (Fi ). (5)
Substituting Eq. (5) into Eq. (1), we obtain ∞ X (j 0 ) (j 0 ) M M Tr ≥ 1 + Πj−1 j 0 =1 Πi1 =1 P (Di1 )Πi2 =2 P (Fi2 ) j=1 ) M X (j) (j) i i Πi1 =1 P (Di1 )Πi2 =2 P (Fi2 ) . (6) i=1
On the other hand, the following relationships also hold: (1)
(1)
(1)
(1)
(1)
(j−1)
P (D1 , D2 , F2 , . . . , DM , FM , . . . , D1 (j) (j) (j) (j) (j) D1 , D2 , F2 , . . . , Di , Fi ) (1)
(1)
(1)
(1)
(1)
≤
(j) P (Fi ) (j−1)
P (D1 , D2 , F2 , . . . , DM , FM , . . . , D1 (j) (j) (j) (j+1) D1 , . . . , DM , FM , D1 )
≤
(j−1)
, . . . , FM (7)
(j−1)
, . . . , FM
(j+1) P (D1 ).
,
(8)
,
4
Substituting Eq. (7) and Eq. (8) into Eq. (1), we can obtain +
(j) P (Fi ).
1 − 2 β 2σ Eb /N0 e , 2σ 2 Eb /N0
simulation of CT−TCM−HARQ analysis of CT−TCM−HARQ simulation of Type−I ARQ using the CT−TCM code
1.8
(9)
i=2
Combining Eqs. (6) and (9), we derive the bounds of the average number of transmissions Tr per data block by the CT-TCM-HARQ. Using Tr , the throughput efficiency of the CT-TCM-HARQ can be calculated by (1/Tr ) × the number of information bits per transmitted symbol. For the CT-TCM scheme based on 8PSK modulation and rate 2/3 CT-TCM codes, the maximum achievable throughput efficiency (with ideal channel) is 2 bits/symbol. The throughput efficiency of the CT-TCM-HARQ based on such CT-TCM codes is thus given by 2/Tr . From [12], the BER in each transmission attempt for the CT-TCM-HARQ over an AWGN channel has been obtained. Based on the BER values and the bounds of Tr presented in Eqs. (6) and (9), we can obtain the throughput bounds of the CT-TCM-HARQ scheme over the AWGN channel. Then, the throughput of the CT-TCM-HARQ scheme in the quasistatic Rayleigh fading channel can be derived by averaging the throughput in the AWGN channel over the probability density function (pdf) of the signal-to-noise-ratio (SNR) in Rayleigh fading. Let α denote the Rayleigh-distributed fading envelope. Let Eb /N0 denote the ratio of bit energy to noise power spectral density. The SNR in the quasi-static Rayleigh fading channel is written as β = α2 Eb /N0 . The pdf of the Rayleigh-distributed fading envelope α is 2 2 α f (α) = 2 e−α /2σ . (10) σ Thus, the pdf of β is derived from the pdf of α as follows: f (β) =
2
Throughput efficiency (bits/symbol)
j=1
(j) P (D1 )
M X
1.6 1.4 1.2 1 0.8 0.6 0.4 0.2 over quasi−static Rayleigh fading channel 0 2
3
4
5
6
7
8
9
10
11
12
13
14
15
SNR (dB)
Fig. 2. Throughput of CT-TCM-HARQ over a quasi-static Rayleigh fading channel.
0
10
Type−I ARQ using the CT−TCM code
−1
Frame error rate
Tr ≤ 1 +
∞ X
10
CT−TCM−HARQ
−2
10
(11)
where 2σ 2 is the second moment of α, i.e., E[α2 ] = 2σ 2 . For simplicity, we choose E[α2 ] = 1. Let f (RAW GN |β) denote the throughput of the CT-TCM-HARQ scheme over the AWGN channel conditional on a certain value of SNR β. Then, the throughput in the quasi-static Rayleigh fading channel, denoted by R, can be obtained by numerical integration of the throughput in the AWGN channel as follows: Z ∞ R= f (RAW GN |β)f (β)dβ. (12) 0
IV. P ERFORMANCE E VALUATIONS We evaluate the performance of the CT-TCM-HARQ over a quasi-static Rayleigh fading channel in terms of the following parameters for the CT-TCM-HARQ. Without loss of generality, we choose M =4, 8PSK modulation for each information packet containing 1024 symbols (2048 bits), and a maximum of four transmissions per information packet. Additionally, for revealing the essential performance of the CT-TCM-HARQ, it is reasonable to assume that a stop-andwait ARQ protocol is used as the ARQ strategy and that the feedback messages (ACKs and NAKs) returned by the receiver are always correctly received by the sender.
over quasi−static Rayleigh fading channel −3
10
2
3
4
5
6
7
8
9
10
11
SNR (dB)
Fig. 3. FER of CT-TCM-HARQ over a quasi-static Rayleigh fading channel.
We first verify the throughput analysis of the CT-TCMHARQ scheme in the quasi-static Rayleigh fading channel by simulation. Based on the BER values obtained in [12], we have calculated the upper and lower throughput bounds of the CT-TCM-HARQ over the AWGN channel. The results show that the bounds are very tight and hard to be distinguished when they are plotted. Thus, from either upper or lower bounds for the AWGN channel, we then calculate the approximate throughput of the CT-TCM-HARQ over the quasi-static Rayleigh fading channel by the aforementioned numerical integration method. We present in Fig. 2 the throughput obtained by analysis and simulation in the quasi-static Rayleigh fading channel. The results demonstrate the simulation results match the analytical results very well. For further performance evaluation over the quasi-static Rayleigh fading channel, in Figs. 2 and 3, we compare the throughput and the residual
5
V. C ONCLUSION In this paper, we investigated the performance of a novel hybrid ARQ using the CT-TCM code in both slow and fast Rayleigh fading channels. The numerical results have demonstrated that such a method of using CT-TCM codes in hybrid ARQ outperforms an existing hybrid ARQ using Turbotype TCM codes over the fully interleaved Rayleigh channels. R EFERENCES [1] S. L. Goff, A. Glavieux, and C. Berrou, “Turbo-codes and high spectral efficiency modulation,” Proc. ICC’94, New Orleans, LA, May 1994, pp. 645–649. [2] P. Robertson and T. Worz, “Bandwidth-efficient turbo trellis-coded modulation using punctured component codes,” IEEE J. Select. Areas Commun., vol. 16, pp. 206–218, Feb. 1998.
0
10
−1
10
−2
Bit error rate
10
Scheme T−IB of [9] CT−TCM−HARQ −3
10
Scheme T−II of [9]
−4
10
−5
10
−6
10
over fully interleaved Raleigh fading channel
−2
0
2
4 Es/N0 (dB)
6
8
10
Fig. 4. BER of our scheme and the TTCM hybrid ARQ schemes of [9] over a fully interleaved Rayleigh fading channel.
2 over fully interleaved Rayleigh fading channel 1.8
Throughput efficiency (bits/symbol)
frame error rate (FER) obtained by the CT-TCM-HARQ with the results obtained by a Type-I ARQ which uses the CTTCM code as the underlying FEC scheme, respectively. In this Type-I ARQ, the same CT-TCM code generated by puncture pattern Γ0 in Table I is used for the initial transmission and all further retransmissions. It is observed that compared with the Type-I ARQ scheme with the repetition coding of the CTTCM code, the CT-TCM-HARQ save about one dB SNR for a given FER value or a given throughput. This demonstrates that by using different punctured parts in different retransmissions, significantly improved coding gain can be achieved in the CTTCM-HARQ over the quasi-static Rayleigh fading channel. In Fig. 4 and Fig. 5, we compare the BER and throughput performances over a fully interleaved Rayleigh fading channel, between the CT-TCM-HARQ and the hybrid ARQ schemes of [9] which use the Turbo-based TCM (TTCM) proposed in [1] with 8PSK modulation as the underlying FEC scheme, and also set the length of information packet to be 1024 symbols. Here, we compare with the following two TTCM hybrid ARQ schemes from [9]: • Scheme T-IB : a Type-I hybrid ARQ, which uses the same TTCM code based on a rate 2/3 Turbo code in each retransmission of an information packet. For decoding, the receiver uses equal diversity combining to combine all copies of the received packet into a single packet of the same block size by adding the demodulated loglikelihood values of each packet. • Scheme T-II : a Type-II hybrid ARQ with incremental redundancy, which uses a rate 1/3 as the mother code mapped to 8PSK constellation, and sends the information bits in the first transmission and then incrementally sends the parity-check bits in retransmissions. Fig. 4 demonstrates that improved coding gain is achieved by CT-TCM-HARQ than the TTCM based Type-I and Type-II hybrid ARQs. For throughput performance, we only consider a comparison between our CT-TCM-HARQ scheme and Scheme T-IB of [9] in Fig. 5, because both of them achieve a maximum throughput efficiency of 2 bits/symbol. It is observed from Fig. 5 that the CT-TCM-HARQ scheme provides higher throughput than Scheme T-IB of [9], particularly in the low SNR range.
1.6 1.4 1.2 1 CT−TCM−HARQ 0.8 0.6 Scheme of T−IB of [9] 0.4 0.2 0 −2
0
2
4
6
8
10
12
14
Es/N0 (dB)
Fig. 5. Throughput of our scheme and the TTCM hybrid ARQ scheme of [9] over a fully interleaved Rayleigh fading channel.
[3] C. Fragouli and R. D. Wesel, “Turbo-encoder design for symbolinterleaved parallel concatenated trellis-coded modulation,” IEEE Trans. Commun., vol. 49, pp. 425–435, Mar. 2001. [4] P. Li, B. Bai, and X.M. Wang, “Low complexity concatenated two-state TCM schemes with near capacity performance,” IEEE Trans. Inform. Theory, vol.49, no.12, pp. 3225–3234, Dec. 2003. [5] L. K. Rasmussen and S. B. Wicker, “The performance of type-I trellis coded hybrid-ARQ protocols over AWGN and slowly fading channels,” IEEE Trans. Inform. Theory, vol. 40, no. 2, pp. 418–428, Mar. 1994. [6] L. K. Rasmussen and S. B. Wicker, “Trellis-coded, type-I hybrid-ARQ protocols based on CRC eror-detecting codes,” IEEE Trans. Commun., vol. 43, no. 10, pp. 2569–2575, Oct. 1995. [7] M. P. Schmitt, “Hybrid ARQ scheme employing TCM and packet combining,” IEE Electron. Lett., vol. 34, no. 18, pp. 1725–1726, Sep. 1998. [8] M. P. Schmitt, “Improved retransmission strategy for hybrid ARQ schemes employing TCM,” in Proc. WCNC’99, New Orleans, LA, USA, Sep. 1999, pp. 1226–1228. [9] A. Banerjee, D. J. Costello Jr., and T. E. Fuja, “Performance of hybrid ARQ schemes using turbo trellis coded modulation for wireless channels,” in Proc. WCNC’00, vol. 3, Chicago, IL, USA, Sep. 2000, pp.
6
1025–1029. [10] J. X. Yu, Y. Li, H. Murata, and S. Yoshida, “Hybrid-ARQ scheme using different TCM for retransmission,” IEEE Trans. Commun., vol. 48, no. 10, pp. 1609–1613, Oct. 2000. [11] T. Koike, H. Murata, and S. Yoshida, “Hybrid ARQ scheme suitable for coded MIMO transmission,” in Proc. ICC 2004, Paris, France, Jun. 2004, pp. 2912–2923. [12] Q. Huang, S. Chan, P. Li, K. T. Ko, and M. Zukerman,“A Hybrid ARQ Scheme Based on CT-TCM Codes,” IEEE Commun. Lett., vol. 9, no. 7, pp. 664–666, 2005. [13] S. Kallel, “Analysis of a type II hybrid ARQ scheme with code combining,” IEEE Trans. Commun., vol. 38, no. 8, pp. 1133-1137, Aug. 1990. [14] E. Malkam¨aki and H. Leib, “Performance of truncated type-II hybrid ARQ schemes with noisy feedback over block fading channels,” IEEE Trans. Commun., vol. 48, no. 9, pp. 1477–1487, Sep. 2000.