The throughput analysis of different IR-HARQ schemes based on fountain codes

D Sejdinovic, V Ponnampalam, RJ Piechocki, A Doufexi

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)
420 Downloads (Pure)

Abstract

In this contribution, we construct two novel IR-HARQ (automatic repeat request) schemes based on fountain codes, which combine the punctured and rateless IR-HARQ schemes, in order to attain the advantageous properties of both: nearly optimal performance of the former at the high signal-to-noise ratio (SNR) region and ratelessness of the latter. The preliminary simulation results indicate that these schemes are particularly suitable for scenarios where the transmission is originally assumed to occur at the very high SNR region, but resilience to severe deterioration of channel conditions is required
Translated title of the contributionThe throughput analysis of different IR-HARQ schemes based on fountain codes
Original languageEnglish
Title of host publicationIEEE Wireless Communications and Networking Conference 2008, Las Vegas
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages267 - 272
Number of pages6
ISBN (Print)9781424419968
DOIs
Publication statusPublished - Apr 2008
EventIEEE Wireless Communications and Networking Conference, 2008 (WCNC 2008) - Las Vegas, United States
Duration: 1 Apr 2008 → …

Publication series

Name
ISSN (Print)15253511

Conference

ConferenceIEEE Wireless Communications and Networking Conference, 2008 (WCNC 2008)
CountryUnited States
CityLas Vegas
Period1/04/08 → …

Bibliographical note

Name and Venue of Event: IEEE Wireless Communications and Networking Conference 2008, Las Vegas
Conference Organiser: IEEE
Rose publication type: Conference contribution

Additional information: With accompanying conference presentation

Sponsorship: The authors would like to acknowledge the generous support of Toshiba Research Europe Ltd Telecommunications Research Laboratory in Bristol

Terms of use: Copyright © 2008 IEEE. Reprinted from IEEE Wireless Communications and Networking Conference 2008 (WCNC08).

This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Bristol's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org.

By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Fingerprint Dive into the research topics of 'The throughput analysis of different IR-HARQ schemes based on fountain codes'. Together they form a unique fingerprint.

Cite this