Resource Allocation Frameworks for Network-coded Layered Multimedia Multicast Services
The explosive growth of content-on-the-move, such as video streaming to mobile devices, has propelled research on multimedia broadcast and multicast schemes. Multi-rate transmission strategies have been proposed as a means of delivering layered services to users experiencing different downlink channel conditions. In this paper, we consider Point-to-Multipoint layered service delivery across a generic cellular system and improve it by applying different random linear network coding approaches. We derive packet error probability expressions and use them as performance metrics in the formulation of resource allocation frameworks. The aim of these frameworks is both the optimization of the transmission scheme and the minimization of the number of broadcast packets on each downlink channel, while offering service guarantees to a predetermined fraction of users. As a case of study, our proposed frameworks are then adapted to the LTE-A standard and the eMBMS technology. We focus on the delivery of a video service based on the H.264/SVC standard and demonstrate the advantages of layered network coding over multi-rate transmission. Furthermore, we establish that the choice of both the network coding technique and resource allocation method play a critical role on the network footprint, and the quality of each received video layer.
Multimedia multicast services will soon become a challenging issue to network service providers due to the increasing volume of multimedia traffic. Video content delivery represented % of the global mobile Internet traffic in 2013 and is expected to rise to % by 2018 [CVI]. Considering the recent developments in fourth generation (4G) communication networks, a notable fraction of multimedia services is anticipated to be delivered over cellular networks. As the number of users increases, Point-to-Multipoint (PtM) transmission of a multimedia service is the natural choice over multiple and independent Point-to-Point (PtP) sessions. For this reason, 4G cellular networks have native support for broadcasting and multicasting services . Recent work proposes to exploit this attractive inherent feature of 4G networks for broadcasting next generation Digital Television (DTV) services . Furthermore, service multicasting over 4G infrastructures could also be used to deliver extra content in event locations, such as instant replays in sport venues .
When a multicast service is transmitted by means of a single PtM data stream, the transmitting node sends the same data stream to all users. Given that users most likely experience heterogeneous propagation conditions, the transmission rate cannot be optimized for each user. Multirate Transmission (MrT) strategies overcome this issue by allowing users to recover different versions of the same PtM service . This paper focuses on MrT strategies that are suitable for layered services . A layered service consists of a base layer and multiple enhancement layers. The base layer allows each user to achieve a basic service quality, which is improved by using information conveyed by the enhancement layers. The -th enhancement layer can be used to improve the service quality of a user only if both the base and the first enhancement layers have been successfully received by that user. In that context, a MrT strategy adapts the rate of each service layer by taking into account the heterogeneous propagation conditions between the transmitting node and the users.
The main goal of the considered family of MrT strategies is the maximization of the service level experienced by each user . Most proposals divide users into multiple subgroups based on the user propagation conditions; each subgroup will eventually recover a different number of enhancement layers, in addition to the base layer. For example, [4917957, 5452675] propose MrT strategies which achieve the aforementioned goal by maximizing the sum of service layers recovered by each user. However, little attention has been paid to the definition of MrT strategies which can ensure that specific subsets of layers will be recovered by predetermined fractions of users.
Our work relies on the MrT principle but proposes resource allocation frameworks that differ from those in the literature in terms of the achieved goal. In particular, we have restated the MrT resource allocation problem from the point of view of the network service provider; we have chosen as the optimization goal the minimization of the total amount of required radio resources to deliver a PtM layered service. Furthermore, owing to the idea of a service-level agreement between the service provider and the cell users, the constraint sets of the proposed optimization frameworks ensure that at least a predetermined fraction of users shall recover a given number of service layers with a target probability. A key point in the proposed MrT frameworks is that reliability of PtM communications is improved by means of the Random Linear Network Coding (RLNC) principle [Medard]. In particular, the resource allocation goal is fulfilled by jointly optimizing both the transmission parameters and the employed RLNC scheme.
I-a Related Works and Paper Contributions
In our system model, each service layer forming a PtM service is delivered over multiple orthogonal broadcast erasure subchannels. Even though Automatic Repeat-reQuest (ARQ)  and Hybrid ARQ error control protocols [KiJiKSSc10] are suitable for broadcast erasure channels, the required amount of user feedback becomes intractable as the number of users grows. In order to mitigate this issue, reliability of multicast communications can be improved by means of Application Level-Forward Error Correction (AL-FEC) techniques, for example schemes based on Luby transform or low-density parity-check codes . Unfortunately, as noted by E. Magli et al. , this family of codes is designed to be applied over long source messages and, consequently, it introduces delay which is often undesirable in multimedia communications. In order to tackle this problem, several works propose the adoption of RLNC over one-hop broadcast networks [Ghaderi, MedardCap9, ITA]. A key point of RLNC implementations is that short source messages are preferred in order to reduce the decoding complexity and subsequently reduce the communication delay. Furthermore, various RLNC schemes for smartphones and low-end devices have been recently proposed, demonstrating that RLNC strategies are also affordable from the computational complexity point of view [6774596, 6691231]. For these reasons, our work adopts the RLNC principle to address the reliability issues of PtM layered service transmissions.
Since each layer of a service has a different importance level, Unequal Error Protection (UEP) can be used to link the level of importance that a service layer has to the required level of protection. The UEP concept has been frequently applied to FEC schemes, see for example Reed-Solomon or low-density parity-check codes [6714525, 4560155], but was later adapted for RLNC codes . This paper deals with two different UEP RLNC schemes : the Non-Overlapping Window (NOW-RLNC) and the Expanding Window RLNC (EW-RLNC). Coded packets associated with a service layer are generated from source packets of layer only in the case of NOW-RLNC or from source packets of the first layers in the case of EW-RLNC.
Various resource allocation strategies have been proposed to support the transmission of network-coded multimedia flows over unreliable networks [R2, R5, R3, R4]. In particular, [R2] considers a system model where several single-layer multimedia flows are broadcast to users forming a wireless mesh network. Each user linearly combines those incoming flows that can be decoded by other neighbouring users. Similarly to [R2], the system model presented in [R5] is also concerned with a mesh network disseminating multimedia flows. However [R5] considers layered multimedia streams whose reliability is improved by optimizing a distributed UEP RLNC implementation. In that case, each node realizes the UEP principle such that flows with high importance are more likely to be involved in linear combination operations. Differently to [R2, R5], a two-hop content delivery network is studied in [R3]. The source node applies network coding to combine packets that form a layered multimedia service. The coded packets are then stored into several intermediate nodes. Subsequently, a single destination node retrieves the coded packets by connecting to the intermediate nodes via independent PtP sessions. According to the proposed UEP RLNC strategy in [R3], which is valid for binary finite fields only, network-coded packets related to low-importance layers may depend on high-importance layers. Contrary to [R2, R5, R3], [R4] refers to a cellular network model, where the source node is in charge of generating and transmitting network coded packets to a single user. The user acknowledges successfully received packets to the source node. If the acknowledged message is not received, either the same or a new coded packet is transmitted. The core idea of [R4] is that of optimizing the encoding process to minimize the total number of transmissions in a single PtP multimedia session.
In contrast to [R2, R5, R3], our work refers to a typical cellular network topology, where the network coding operations are performed by the source node. Furthermore, this paper aims to jointly optimize the network coding process and the transmission parameters. In this way, we can view the RLNC implementation as a component which is fully integrated into the link adaptation framework of our communication system. Our proposal differs from [R4] both in terms of the considered RLNC strategies and the nature of the delivered data streams. More specifically, [R4] does not consider layered video services and, hence, does not investigate UEP RLNC strategies. Furthermore, the fact that the proposed scheme in [R4] has not been integrated into a more generic link adaptation framework hinders its extensibility to the case of PtM services.
Our analysis refers to a generic cellular network model, in a purely standard-independent fashion. However, in order to demonstrate the practical value of the proposed resource allocation frameworks, we present a case study, which refers to the 3GPP Long Term Evolution-Advanced (LTE-A) standard. The proposed implementation shows how our resource allocation frameworks can be adopted for the delivery of multimedia multicast services over the existing and, by following the same implementation guidelines, how can be also extended to next-generation networks.
LTE-A integrates the evolved Multimedia Broadcast Multicast Service (eMBMS) framework, which enables it to handle multicast and broadcast services [sesia2011lte]. In the proposed implementation, we refer to multimedia multicast services that make use of the widely used H.264 video encoding standard and its scalable extension, known as Scalable Video Coding (H.264/SVC), which is gaining popularity [h264]. In line with our considered layered message structure, the H.264/SVC encoder transforms a raw video stream into a layered service, such that enhancement layers improve the resolution of a base video layer of a stream . In order to make the considered network-coded service delivery suitable for multicasting over an LTE-A network, we have adopted the proposal of integrating a RLNC encoder into the LTE-A protocol stack, as described in . In its original version, the proposed integration refers to a system model according to which a PtP data stream is transmitted by a base station to a single user, either directly or via a relay node. The system design proposed in  was later enhanced in [TVTTassi] in order to broadcast H.264/SVC video streams as eMBMS flows. Concerning the optimization frameworks that will be presented, this work builds on and extends the idea presented in [TVTTassi]. In particular, [TVTTassi] provides a resource allocation model minimizing the total number of transmission attempts needed to broadcast a H.264/SVC video stream. Even though we aim at fulfilling the same objective, this paper significantly differs to [TVTTassi] in terms of the considered radio resource model. We refer to a generic system model where coded packets are transmitted over a set of orthogonal subchannels. Unlike [TVTTassi], we develop resource allocation frameworks which allow coded packets associated with different video layers to be mixed within the same subchannel to enhance user performance, both in the case of NOW- and EW-RLNC. For any of the proposed resource allocation models, we provide efficient heuristic strategies capable of finding a good quality resource allocation solution in a finite number of steps.
With regards to the coding schemes that we will refer to, unlike  and [TVTTassi], this work focuses on NOW- and EW-RLNC schemes suitable for layered service transmissions. In addition, the authors of [6353397, TVTTassi] did not optimize the bit length of source packets used to represent the transmitted layered service; the source packet bit length is given a priori. This paper proposes a model for optimizing the source packet bit length to fit the transmission constraints of the communication standard in use. Since the bit length of source packets is constrained to be smaller than or equal to a maximum target value, the number of source packets representing a layered service can be upper-bounded. Hence, this work can represent the same layered service with a smaller number of source packets, compared to what proposed in [TVTTassi]. We remark that the number of source packets has a significant impact on the computation complexity of the RLNC decoding phase [Medard].
The remaining part of the paper is organized as follows. In Section II, we present the considered standard-independent system model and derive the necessary theoretical foundations needed to assess the performance of NOW- and EW-RLNC. Section III builds upon the aforementioned system model the proposed resource allocation models suitable for optimizing layered multicast communications. Section IV shows, as a case study, how the proposed modelling and resource allocation frameworks can be implemented in a practical communication system, such as LTE-A. Analytical results are discussed in Section V, whereas Section VI summarizes the main findings of the paper.
Ii System Parameters and Performance Analysis
|Maximum number of coded packets that can be transmitted over|
|Modulation and Coding Scheme (MCS) adopted by subchannel|
|Packet Error Rate (PER) of user when MCS with index is|
|The reception of a coded packet is acceptable if|
|Defined in (3) and approximated by (28)|
|The greatest value of for which|
|Source/coded packet bit length|
|Layered source message that consists of equal-length source|
|Set of source packets composing the -th layer|
|Set of source packets belonging to the first service layers|
|Number of coded packets related to layer layer and transmitted|
|Vector , where is defined by (2)|
|Vector , where is defined by (8)|
|Probability that user will recover the first service layers, in|
|the case of the NOW-RLNC|
|Probability of user recovering the -th window, in the case of|
|Probability of user recovering the -th window, when the MrT|
|strategy is in use|
We consider an one-hop wireless communication system composed of one source node and users. Each transmitted data stream is delivered to users through orthogonal broadcast erasure subchannels. In our system model we have that all the data streams are conveyed to the users according to the RLNC principle. As a consequence, each subchannel delivers streams of network-coded packets (henceforth referred to as coded packets for brevity) that may be associated with one or more data streams. Furthermore, we impose that the maximum length of a stream, in terms of the number of coded packets that can be transmitted over the -th subchannel during a given time interval, for , is fixed and equal to . In particular, we assume that indexes are assigned to subchannels so that the relation holds. For clarity, Table I summarizes the symbols commonly used in the paper.
Each element of a coded packet stream is delivered by means of a specific Modulation and Coding Scheme (MCS), which is identified by nonnegative integer . We denote by the Packet Error Rate (PER) that a user experiences when is the index of the adopted MCS. If and are indexes identifying two different MCSs and , then the MCS described by either uses a higher modulation order or reduced error-correcting capability than the MCS represented by . Naturally, for the same channel conditions, it follows that also holds. In general, we regard reception of a coded packet as being acceptable if is equal to or smaller than a predetermined threshold . To this end, if user can choose from a range of MCSs, we define as the greatest value of for which , that is
In the system model presented in this paper, we also impose that coded packets transmitted through the -th subchannel shall use the same MCS, characterized by index . As will become evident in the rest of the paper, the determination of the optimal MCS for each subchannel, , is part of the proposed resource allocation strategies.
Let be a layered source message that consists of equal-length source packets, classified into service layers. For simplicity and without loss of generality, we assume that packets in the source message are arranged in order of decreasing importance. In other words, the first service layer appears at the beginning of the source message and is followed by progressively less important layers, until the last and least important -th service layer. If the -th layer consists of data packets, we observe that . Throughout this paper, we define the Quality-of-Service (QoS) level experienced by a user as the number of consecutive source message layers that can be recovered, starting from the first layer.
In the remainder of this section, we present the layered RLNC strategies under consideration. In addition we provide accurate models to evaluate the probability that a source message transmitted by means of NOW-RLNC and EW-RLNC is correctly received by a user. Theoretical results discussed in the rest of this section are general and apply to any cellular system model, where: (i) data flows can be delivered by using different MCSs, and (ii) each source message layer is broadcast through independent communication subchannels.
Ii-a Performance of Non-Overlapping Window RLNC
We first consider the case where the source node uses the RLNC principle on each individual layer of the source message. Let us define as . The source node will linearly combine the data packets composing the -th layer and will generate a stream of coded packets , where . Coefficient is uniformly selected at random over a finite field of size . We refer to this encoding strategy as NOW-RLNC throughout this paper.
A stream of coded packets associated with a service layer can be broadcast to the users over a single subchannel or multiple subchannels. Let signify the number of coded packets that are related to the -th layer and are transmitted over the -th subchannel. We expect that some or all of these coded packets will be received by user , if the predetermined PER requirement is met, i.e. . Otherwise, user will not recover any of the coded packets. We can express the maximum number of coded packets associated with the -th layer that user can collect from the subchannels as
where is an indicator function where if its input argument is true, otherwise .
To simplify our analysis, we introduce as the maximum PER value experienced by user across all subchannels that offer acceptable reception and convey at least one coded packet (namely, ), that is
Based on , we can infer that if coded packets are transmitted over those subchannels such that , user will recover the -th layer with probability
represents the probability that out coded packets are successfully received by user , when the PER is given by (3). In addition, the term
is the probability that out of received coded packets are linearly independent, i.e., is the probability that the source packets forming can be recovered . The joint probability that user will recover the first service layers, i.e. , is simply the product of the individual probabilities, which can be written as
Ii-B Performance of Expanding Window RLNC
We will now shift our focus onto a different RLNC approach known as the expanding window principle, which was presented in . To this end, we consider the same layered source message as before, and define the -th window as the set of source packets belonging to the first service layers. As depicted in Fig. 1, a window spanning over the first layers can be expressed as or, equivalently, . In the case of EW-RLNC, the source node (i) linearly combines data packets belonging to the same window, (ii) repeats this process for all windows, and (iii) broadcasts each stream of coded packets associated with each window over one or more subchannels.
In a similar fashion to the NOW case, we define as the number of coded packets that are associated with the -th window and are transmitted over the -th subchannel. The maximum number of coded packets related to the -th window that user can collect through the subchannels is
Using (8), we can obtain vector , which describes the maximum number of transmitted coded packets, related to each window, that can be collected by user . The objective of this section is to derive a closed-form expression for , which denotes the probability of user recovering the -th window and thus retrieving the first layers. To do that, we shall first consider vector , which describes the number of successfully received coded packets associated with each window, and study the requirements for which .
For a given set of received coded packets , we define the minimum number of coded packets associated with the -th expanding window, denoted as , which shall be successfully received such that the probability of recovering , by considering just coded packets associated with the first expanding windows, is non-zero. Clearly, for , we have that . Indeed, as per the properties of random network coding, the first window () is likely to be decoded () only if: (i) the number of received coded packets pertaining to the first window is at least equal to the number of source packets comprising that window , or (ii) the probability of recovering a larger window is greater than zero.
Consider Fig. 1, which provides a graphical interpretation of and . In the reported example, given that , we note that is less than . Hence, the set of source packets cannot be recovered because the number of linearly independent coded packets associated with the first two windows cannot be equal to . However, in this case, the value of is such that is equal to . This means that the probability of having linearly independent coded packets and recovering is greater than zero. We also note that, in the considered example, the value of is the smallest one such that holds. Hence, . In general, the remaining values of , for , can be computed using the following recursion:
which asserts that the probability of decoding the first layers is non-zero if the number of received coded packets related to the -th window is at least equal to the size difference between windows and , complemented by a possible packet deficit carried over from window .
Having derived an expression for , for , the probability of user recovering the first layers, , can be written as the probability of successfully receiving coded packets and recovering the -th window, summed over all valid values of . In other words, we can write
considers all possible combinations of receiving coded packets out of packets, multiplied by the probability of successfully decoding the source message . Similarly to (6), represents the probability of having linearly independent coded packets out of the received ones.
Owing to the lack of an accurate expression for , we approximated it by using (6). Let be a vector of elements, where if , otherwise . It is straightforward to note that the relation holds. In addition, from (6), we understand that is equal to . For these reasons, we decide to approximate as follows:
In order to inspect the quality of the considered approximation, we compared probabilities obtained by using (10) with those obtained by computer simulations, for different values of or and finite field sizes or . In particular, Fig. 2 compares both the approximated and the simulated value of , where , for and . We consider , and . Note that the maximum performance gap between the approximated and the simulated results occurs for and it is smaller than for , and for . The performance gap between approximated and simulated results becomes negligible for an increasing value of .
Iii Proposed Multi-Channel Resource Allocation Models and Heuristic Strategies
In this section, we propose strategies that can be used to allocate coded packets over the set of communication subchannels. All the proposed optimization models jointly optimize the MCSs associated with each subchannel and the number of coded packet transmissions. The objective of the proposed models aim at minimizing the total number of coded packet transmissions needed to deliver service layers. This minimization is constrained by the fact that (at least) a predetermined fraction of users shall be able to recover a given set of service layers with (at least) a target probability. For each proposed optimization model, efficient heuristic strategies are provided.
Before going into the details of the proposed resource allocation models, we consider the following allocation patterns:
Separated Allocation (SA) pattern (Fig. (a)a), where a stream of coded packets associated with a service layer or expanding window shall be mapped on one subchannel only. This means that coded packets belonging to different layers or windows cannot be mixed within the same subchannel.
Mixed Allocation (MA) pattern (Fig. (b)b), where coded packets belonging to different service layers or windows can be delivered through the same subchannel.
In this section we refer to the generic system model described in Section II. Hence, the resource allocation frameworks that will be presented are also generic and standard-independent.
Iii-a Non-Overlapping Window Resource Allocation Strategies
Consider a system where the source node delivers the layered service by means of the NOW-RLNC principle. From (7), we define the indication variable as follows:
In other words, , if can recover the first layers with a probability value that is equal to or greater than a target value , otherwise . Equivalently, we can say that if , achieves the QoS level with at least a probability of .
The resource allocation model that we propose for the case of NOW-RLNC employing SA (NOW-SA) can be formulated as follows:
where the objective function (15) represents the overall number of coded packet transmissions needed to deliver all the service layers. Furthermore, constraint (16) ensures that the fraction of users that can recover the first service layers is equal to or greater than a desired value . In order to let the model exploit user heterogeneity, constraint (17) avoids the situation in which two subchannels are transmitted using the same MCS. Constraint (18) ensures that the number of coded packets delivered by any subchannel does not exceed . Constraint (19) avoids that coded packets associated with different service layers are mixed within the same subchannel. Hence, in this case, has to be equal to or greater than .
Considering the case of a MA pattern, the service delivery based on the NOW-RLNC approach can be optimized by means of a new optimization model which we shall refer to as NOW-MA. This new optimization model has the same definition of the NOW-SA but, in this case, we remove constraint (19). In this way, coded packets associated with different service layers can be delivered by means of the same subchannel and can be different from .
Unfortunately, both the NOW-SA and NOW-MA are hard integer optimization problems because of constraints (16) and (18) that introduce strong coupling relations among delivered service layers. To this end, we propose a couple of two-step heuristic strategies suitable for deriving, in a finite number of iterations, good quality solutions for both aforementioned problems. In particular, the idea underlying each heuristic approach is that of separating the optimization of MCS (associated with each subchannel) from the number of coded packets (related to each service layer) to be delivered.
Considering the SA pattern, the first step of the proposed heuristic strategy aims at optimizing variables , for . In this case, the value of has to be equal to because of the nature of the considered allocation pattern. Furthermore, without loss of generality, we assume that the coded packet stream associated with layer is delivered by means of the -th subchannel111To this end, in the case of the SA pattern we reference both subchannels and service layers with the same index .. Let be a set of users such that if . The first step of the heuristic aims at selecting the value of such that the cardinality of , denoted as , is equal to or greater than . In particular, this heuristic step, reported in Procedure 1, can be summarized as follows:
Starting from the maximum MCS index and , we select the greatest MCS index such that the number of users in is equal to or greater than .
Then, the index is decreased and the previous step is repeated by considering the MCS index range which goes from to the minimum MCS index .
The procedure iterates while .
The second step of the heuristic strategy aims at optimizing the variables (for ). In particular, let be the value of provided by the heuristic, where . That optimization is summarized as follows:
For any value of , is set equal to while , for , is set to zero. Then the value of is progressively increased until does not hold and .
The procedure iterates while .
It is straightforward to note that the aforementioned heuristic step requires a number of iterations which is equal to or less than .
Moving on to the MA pattern, to simplify our analysis, we impose that the number of subchannels has to be equal to the number of service layers, hence, . However, the heuristic strategy we propose does not impose that all the subchannels have to be used to deliver coded packets. This means that some subchannels could remain unassigned at the end of the allocation process. Concerning the first step of the heuristic strategy, we refer to the same procedure proposed for the SA pattern. For the second heuristic step, in this case, we refer to Procedure 2, which behaves as follows:
We define , for and , as the value of provided by the heuristic step. At the end of each iteration of the for-loop (lines 4-15), a set of values are derived, for every service layer. In particular, within the iteration associated with layer , the value of is incremented (lines 5-11) as long as the probability of recovering the first layers is smaller than and . If the -th subchannel cannot hold more packets, the procedure switches to the next subchannel (lines 8-10).
It is straightforward to note that Procedure 2 requires at most iterations.
Consider the second heuristic step of both SA and MA cases; both procedures generate the same optimized number of coded packets associated to each service layer. The only difference between the two allocation patterns is that, in the second case, coded packets associated to the same service layer may be transmitted over multiple subchannels.
Iii-B Expanding Window Resource Allocation Strategy
Similar to the NOW-RLNC case, we propose an optimization model suitable for the EW-based service delivery. Due to space limitations, we just focus on the MA allocation pattern.
Before giving the definition of the proposed EW-MA allocation model, it is worth recalling that, from the definition of the EW principle (see Section II-B), we know that user can recover the first service layers if the -th window is recovered, or any window , for , is recovered. Hence, we understand that user will recover the first service layers at least with probability if any of the windows are recovered (at least) with probability . For brevity, from (10), we define the following indicator variable222In this paper, we refer to the logic expression as , where are logic statements.
In other words, is equal to one, if achieve a QoS level equal to or greater than with at least a probability of .
The resource allocation model we propose, called EW-MA, can be expressed as follows:
Also in this case, the objective function (21) expresses the overall number of coded packet transmissions. Furthermore, constraint (22) imposes that the first service layers are recovered at least with probability by a fraction of users which shall not be smaller than . Similarly to the NOW-SA and NOW-MA models, constraints (23) and (24) allow the model to exploit the heterogeneity of users.
Unfortunately, the EW-MA model is also a complex integer optimization problem, whose complexity is caused by the coupling constraints among optimization variables given by (22) and (24). To this end, once again, we resort to a two-step heuristic strategy to find a good quality solution of EW-MA, in a finite number of steps.
Once more, for the first step, we refer to the same procedure adopted for the NOW-based allocation models. Let us define as the value of provided by the heuristic step and , where . Starting from Procedure 2, the second heuristic step has been defined as follows:
For and , is set to one, while , for and . The value of is gradually increased until does not hold and . If the subchannel cannot hold more coded packets, coded packets will be gradually allocated on the next subchannel and the index is set equal to .
The value of the index is increased and the previous steps are repeated. The procedure iterates while and .
Finally, likewise to Procedure 2, the aforementioned heuristic step iterates for at most times.
Iv H.264/SVC Service Delivery over LTE-Advanced eMBMS Networks
In order to give an overview of a possible practical implementation of the proposed standard-independent modelling and resource allocation strategies, we refer to the LTE-A standard. Since the first release of LTE-A, PtM communications are managed by means of the eMBMS framework .
In the remaining part of the paper, we concentrate on a particular way of delivering PtM services, known as Single Cell-eMBMS (SC-eMBMS) transmission mode [sesia2011lte]. More precisely, we consider a network scenario formed by a base station, henceforth referred to as target base station, which delivers a layered video service to a set of users forming a Multicast Group (MG), hereafter called target MG. We also assume that all the multicast users are associated to the target base station. In addition, the target base station is surrounded by several interfering base stations, which impair service transmissions to the target MG.
Iv-a Network-coded Video Transmission over eMBMS Networks
In our network scenario, the PtM multimedia service multicast by the target base station is a H.264/SVC video stream formed by different layers. In particular, the first layer, called base layer, provides a basic reconstruction quality, which is gradually improved by the remaining layers, called enhancement layers. In agreement with the layered message structure presented in Section II, the level of the user QoS improves as the number of consecutive layers (starting from the base layer) that can be successfully recovered increases.
We assume that each video layer is provided as an independent input of the LTE-A stack. More specifically, the data stream of each layer passes through the Packet Data Conversion Protocol and Radio Link Control layers then, it is forwarded to the Media Access Control (MAC) layer. Since each video layer has to be delivered by means of the NOW- or EW- RLNC approaches (see Section II-A and II-B), we refer to a modified MAC layer, similar to that proposed in , which is in charge of all the network coding operations.
The layered video service produced by a H.264/SVC encoder can be modeled as a stream of Group of Pictures (GoPs) [h264]. Each GoP is characterized by fixed number of frames and has a fixed time duration . In particular, the value of can be easily obtained by dividing the number of frames of a GoP with the video frame rate. Since the next GoP should be recovered (with a certain QoS) at least by the end of the currently reproduced one, the transmission time of each GoP shall not exceed .
Given that the decoding process of a H.264/SVC service is performed on a GoP-by-GoP basis, a GoP in our system model represents a layered source message to be delivered according to the network coding principle. We recall from Section II-A that is the number of source packets forming the -th layer of the source message. Consider Fig. (a)a, the MAC layer segments the data stream, forwarded by the higher protocol layers and associated with the -th video layer of a GoP, into source packets with the same bit length . Let be the bitrate associated with the -th video layer observed at the MAC layer. The term can be defined as .
For each GoP, the MAC layer produces streams of coded packets, each of which has the same size of a source packet. In particular, in the case of the NOW-RLNC, the MAC layer produces one stream of coded packets per video layer. On the other hand, in the case of the EW-RLNC case, one stream per window is generated. We assume that the selection process of coding coefficients is initialized by random number generator (RNG) seeds that are delivered to the multicast user as part of LTE-A signalling data. Delivered RNG seeds are used to re-generate coding coefficients .
Each coded packet is forwarded to the physical layer and mapped onto one Transport Block (TB). A TB is a frequency-time structure characterized by a fixed transmission time duration equal to one Transmission Time Interval (TTI). Each TB may consist of one or more “resource block pairs”, which are frequency-time resource units that span a bandwidth of and have the same transmission time duration of a TB. In other words, the TB bandwidth is an integer multiple of . Furthermore, a TB is transmitted with a certain MCS [sesia2011lte].
We remark that the actual number of bits (referred to as bit capacity, in this paper) that a resource block pair can hold depends on the MCS in use. Assuming that a TB can hold just one coded packet, both the number of resource block pairs per TB and the source/coded packet size have to be selected in order to fit, as tightly as possible, the bit capacity of a TB. To this end, let and be the number of resource block pairs forming a TB and the bit capacity of a resource block pair, for the -th MCS, respectively. In this paper, and values have been obtained by solving the following min-max problem:
where the objective function (25) minimizes the maximum unused bit capacity per TB, for all the possible MCSs. Constraint (26) ensures that the TB bit capacity is at least equal to , for any MCSs. In addition, constraint (27) imposes that the number of resource block pairs per TB does not exceed a maximum value equal to . Note that (25)-(27) is an integer optimization problem but it has a modest complexity and can be solved by means of a basic branch-and-bound strategy [Couenne].
Iv-B MAC Layer Augmented Resource Allocation Capabilities
Even though the eMBMS framework enables LTE-A to manage PtM service transmission, the standard delegates the definition and implementation of all the resource allocation operations to the manufactures. However, the standard imposes that the MAC layer is in charge of all the scheduling and resource allocation tasks [TR_36_321]. For these reasons, we assume that the considered network coding-capable MAC layer is also in charge of allocating resources according to the resource allocation strategies presented in Section III. To this end, we update the subchannel definition given in Section II.
Consider Fig. (b)b, which shows the structure of one LTE-A radio frame. One frame is composed of subframes, each subframe has a transmission time duration equal to TTI. At most out of subframes of a radio frame can be used to deliver eMBMS traffic [sesia2011lte], while the remaining subframes are dedicated to PtP traffic. Consider subchannel , we remark that the maximum number of coded packets that can be transmitted over it, during a given time interval, is fixed. Since a TB can hold just one coded packet, we define the subchannel , as shown in Fig. (b)b, as a group of TBs, transmitted over eMBMS-capable subframes. In particular, we impose that just one TB per-subchannel can be delivered during a TTI.
For simplicity, in the considered LTE-A scenario, we assumed that (for ), and that the considered fraction of eMBMS-capable subframes per radio frame is , i.e., out of subframes. Due to the fact that each GoP shall be delivered before transmission of the next GoP begins, the value of shall not be greater than TTIs.
In LTE-A systems, the reception of TB, which adopts a given MCS, is acceptable as long as the TB error rate experienced by a user is equal to or smaller than [sesia2011lte]. The standard allows users to provide Channel Quality Indicator (CQI) feedback to the base station about their propagation conditions. In particular, the CQI feedback provided by a user indicates the greatest MCS index (see Table 7.2.3-1 [TR_36_213]) such that the TB error probability of is equal to or smaller than [sesia2011lte]. To this end, we set in (1). Obviously, the actual PER experienced by each user of the target MG is unknown to the target base station. However, as reported in Fig. (a)a, the LTE-A standard imposes that CQI feedback are directly forwarded to the MAC layer. Hence, it is reasonable to assume that the proposed resource allocation strategies can easily access the CQI information. Owing to the lack of knowledge of the user PER, the target base station approximates the user PER as if , otherwise . As a consequence, the definition of , provided by (3), is updated as follows:
where is equal to the MCS index reported in the CQI feedback provided by user . For the sake of clarity, we note that the approximation of , given in (28), is considered only by the target base station during the resource allocation operations. On the other hand, all the analytical results and performance assessment, presented in the following sections, will refer to the user PER expression provided in (3).
Consider again Fig. (a)a, all the resource allocation operations can be ideally modelled as a functional block of the MAC layer. In the case of the proposed resource allocation strategies, the resource allocation module provides the optimized or , for and , to the network coding encoder. In addition, the optimized MCS values , associated to each subchannel, are forwarded to the physical layer, which is in charge of transmitting each TB.
Even though this section considered the LTE-A standard, we point out what follows: (i) The generic modelling of Sections II and III can be easily adapted to any OFDMA-based system able to manage PtM communications and hence also future LTE-A releases, (ii) The considered RLNC schemes and the proposed resource allocation strategies should be plugged into the protocol stack layer in charge of allocating radio resources and, (iii) Our practical implementation proposal can be easily adapted to any kind of multimedia layered service.
V Analytical Results
We investigate the performance of the proposed resource allocation strategies by considering an LTE-A network formed by a macro-base stations. In particular, we assume that the cell controlled by the target base station (hereafter called target cell) is surrounded by interfering macro-base stations, organized in two concentric rings. Each base station manages three hexagonal sectors per cell. Concerning the physical layer and transmission parameters, we referred to the 3GPP’s benchmark simulation scenario, called Case 1 scenario [TR_36_814], where base stations are characterized by an inter-site-distance of . Furthermore, we assumed that users forming the target MG are placed outdoors. Hence, all the physical layer parameters have been set by following the guidelines provided in Tables A.2.1.1-2 and A.188.8.131.52-3 of [TR_36_814]. The first part of Table II summarizes all the remaining system parameters we considered.
In order to provide an effective user QoS assessment, we considered a user distribution characterized by a high heterogeneity from the point of view of the experienced propagation conditions. This means that each user is characterized by a different Signal to Interference plus Noise Ratio (SINR) and hence, a different PER. In particular, we refer to a target MG of users that are placed along the radial line representing the symmetry axis of one sector of the target cell. The first user is placed at a distance of from the target base station and the distance between two consecutive users is .
|Physical Layer||Inter-Site-Distance||500 m|
|System Bandwidth||20 MHz|
|Carrier Frequency||2 GHz|
|Transmission Power||46 dBm per sector|
|Base Station and User Antenna Gains||see Table A.2.1.1-2 [TR_36_814]|
|Pathloss and Penetration Loss||see Table A.184.108.40.206-3 [TR_36_814]|
|Channel Model||ITU-T PedA [Access2013]|
|resource block pairs|
|, for||see Table 10.1 [sesia2011lte]|
|, for||TB transmissions|
In this performance investigation, we refer to two different video streams encoded using the H.264/SVC Coarse Grain Scalability (CGS) principle. Each layer of a CGS stream successively increases the fidelity of any video frame. In order to do so, H.264/SVC CGS adopts those forms of spatial scalability such that the combination of one or more consecutive layers gives the same spatial frame resolution . Both video streams belong to the video trace database, provided as a companion of , and developed for network performance evaluation purposes. The first stream is the News CIF () video sequence [NewsCIF] composed by layers, with GoPs of size frames and video frame rate of frame-per-second (fps). The second stream is the Blue Planet () video sequence [BluePlanet] that consists of layers, GoPs of size frames and video frame rate of fps.
It is worth noting that the bit rate of the video stream obtained by combining all the layers of Blue Planet is -times greater than that of News CIF video stream. In addition to the main characteristics of the considered video streams, Table III gives the maximum bitrate per-video layer, for each stream. Furthermore, as a performance metric of the video fidelity, Table III provides also the average Peak Signal-to-Noise Ratio (PSNR) achieved after successfully recovering the first video layers, for .
In order to inspect the impact of different resource allocation models on the target MG, we developed a system level MATLAB simulator. In particular, we refer to the simulation framework proposed in . Hence, given the physical layer parameters of Table II and Eq. (1) of , we evaluated the average SINR value associated to each user in the target MG. Consider (3), in order to assess the user performance, we need the PER value associated to the user and MCS . Unlike , we relied on the LTE-A downlink link level simulator presented in [Access2013] to obtain the value of , as a function of the average user SINR. In particular, for any average SINR value, is set equal to the PER value obtained from the LTE-A downlink link level simulator and averaged over simulation runs. Since we are concerned with stationary and low-mobility users, link level simulations have been performed by considering the ITU-T PedA channel model [Access2013]. Hence, by using (1), it is straightforward to emulate the CQI feedback that users provide to the target base station (see Section IV-B).
We remark that the MCS index advertised by CQI feedback may span the interval . Since the bitrates ensured by MCSs - are too small333For a TB formed by one resource block pair, MCS index ensures a bitrate smaller than kbps, at net of all the signalling information. compared to bitrates of the considered video streams, users providing CQI feedback with MCS indexes less than are excluded from the optimization process. For this reason, we set equal to , while is kept equal to .
|Stream||No. Frames||Frame Rate|
Each video layer of a video stream is delivered by the target base station over subchannels, as described in Sections II and III. As noted in Section IV, the number of resource block pairs forming a TB depends on the MCS index used to transmit it. Assuming that each TB cannot consists of more than , the solution to problem (25)-(27) is reported in Table II. We remark also that the source/coded packet bit size is part of the aforementioned solution.
Consider the remaining MAC layer simulation parameters of Table II, they are related to the resource allocation strategies (see Section III). In particular, we assumed that consecutive video layers, starting from the base layer, shall be recovered with at least a probability of . Furthermore, we imposed that at least % and % of the users forming the target MG shall experience the basic or the maximum QoS, respectively. For simplicity we assume that any subchannel consists of the same number of TBs. Having in mind that the transmission time duration of any layer of a GoP shall not be greater than we set equal to , as a case of study.
V-a Performance Metrics and Benchmark
Performance has been evaluated in terms of the total number of TB transmissions needed to deliver all video layers of a GoP. In the remaining part of the paper, we will refer to as the resource footprint. From the expressions of the objective functions (15) and (21), can be defined as follows:
where the values of and have been optimized by the resource allocation strategies presented in Section III. From (7) or (10) we also evaluated user performance in terms of the probability that a user recovers the first video layers. Furthermore, we considered, as a third performance metric, the maximum PSNR that user can achieve, defined as:
Since the users of the target MG are regularly placed on the symmetry axis of the cell-sector, the value of can be equivalently expressed in terms of the distance between the user and the target base station. In a similar way, parameter can be interpreted as the minimum distance, from the centre of the target cell, where a user shall recover the first video layers with a probability of at least .
We provide performance comparisons among solutions of NOW-SA, NOW-MA and EW-MA, obtained by the proposed heuristic strategies and by directly solving the aforementioned problems using a genetic strategy (we refer to this kind of solutions as direct solutions) [Deep2009505]. Even though, the direct solution can be considered as a good approximation of the optimal solution of the proposed problems, it is worth noting that a genetic strategy cannot be considered a viable alternative to solve the proposed optimization models in a practical scenario because of its computational complexity [goldberg2013genetic].
Both the direct and the heuristic solutions of the proposed resource allocation strategies have been compared with a MrT transmission strategy that relies on a standard LTE-A protocol stack. In other words, we referred to a protocol stack which does not adopt RLNC-based service multicasting and does not rely on any AL-FEC strategy. For the implementation of the considered MrT strategy, we refer to the resource allocation strategy proposed in [4917957, 5452675] which aims at maximizing the sum of the video quality experienced by each user. In particular, this goal is achieved by optimizing the MCS index used to deliver the TB stream holding data associated with the -th video layer, for .
It is worth noting that both  and  implicitly refer to a concept that is similar to the SA pattern. Specifically, data streams associated to different video layers are independently transmitted to the target MG. Assume that the -th video layer is delivered with the MCS with index . We understand that, in the case that the target base station relies on the standard LTE-A protocol stack, the uncoded transmission of TBs associated to video stream is equivalent to the transmission of all the TBs defining the -th layer of a GoP. In order to make fair comparisons, we referred here to the same values of reported in Table II. For these reasons, the probability that user recovers the first layers can be expressed as where, . In this case, the maximum PSNR that can achieve is . Hence, we expressed the considered MrT strategy as follows:
As well as in the case of the proposed resource allocation strategies, the exact value of is unknown at the target base station side. Hence, during the resource allocation based on MrT, the PER expression is approximated as if , otherwise .
V-B Assessment of the Heuristic Solutions
Let us start our performance investigation from Fig. 5, it compares the number of TB transmissions, represented by , which are associated with the direct (“Dir.”) and heuristic (“Heu.”) solutions, of all the proposed resource allocation strategies, as a function of the finite field size over which all the RLNC-related operations are performed. The figure shows results for both News CIF and Blue Planet streams. Due to the fact that represents the value of the objective functions of the proposed optimization models, it allows us to inspect the performance gap between each proposed heuristic strategy and the corresponding direct solution. We remark that the number of TB transmissions associated with a direct solution is unlikely to be greater than that associated with a heuristic solution [Deep2009505]. As clearly shown in Fig. 5, the performance gap between the heuristic and the direct solutions is negligible. In particular, the gap is at most equal to , and TBs for the NOW-SA, NOW-MA and EW-MA models, respectively. For this reason, in the rest of this section, we refer only to the heuristic solutions of the proposed resource allocation models.
We also observe in Fig. 5 that the value of , of any resource allocation model, decreases as the the value of increases. We understand that, for an increasing value of , the probability of receiving coded packets that are linearly dependent with the previous ones decreases. As a consequence, the resource footprint of each allocation strategy decreases, as the finite field size increases. However, for small finite field sizes, there is a remarkable gap between any solution based on a NOW-RLNC strategy and the direct/heuristic EW-MA solution. In particular, for , the gap between the heuristic solution of EW-MA and, either NOW-SA or NOW-MA, is equal to TBs.
V-C Performance Evaluation of the Proposed Frameworks
Focusing on a finite field with , Fig. 6 shows both the maximum PSNR , and the probability of recovering the first video layers as a function of the distance from the centre of the cell. We recall that the MrT strategy does not rely on any AL-FEC or RLNC-based strategy. In addition, due to the fact that the MrT aims at maximizing the sum of the video quality achieved by all the users, its performance in terms of coverage diverges from both that of the proposed strategies and the target performace. In particular, we note that the base video layer can be received at least with a probability of up to a distance of from the centre of the cell. The MrT performance confirms the idea underlying the proposed optimization strategies; that is defining allocation models where the constraint set ensures that a target coverage and objective function minimizes the amount of resources needed to deliver the multicast service.
We see also in Fig. 6 that, even though all the proposed allocation models meet the coverage constraints, strategies based on the MA pattern provide better coverage than that associated with the SA pattern. In particular, due to the fact that MA pattern can exploit the user heterogeneity better than the SA one, both NOW-MA and EW-MA can successfully deliver all the video layers up to a distance of . On the other hand, the NOW-SA model ensures the maximum service quality only up to . Furthermore, from Fig. 6, we understand that the value of the heuristic EW-MA strategy is % smaller than that of the NOW-MA and NOW-SA heuristic solutions. In particular, we can argue that both the NOW-MA and EW-MA strategies achieve almost the same coverage performance but the second one requires a smaller resource footprint. Finally, as expected (see Section III), both the heuristic NOW-SA and NOW-MA models are characterised by the same values of .
Fig. 7 compares the same performance metrics considered in Fig. 6 (for ), associated with the stream Blue Planet. We remark, the overall bitrate of stream Blue Planet is greater than that of the stream News CIF. Also in this case, we note that all the proposed resource allocation solutions meet the target service constraints. As shown by Fig. 5, the value associated with the heuristic EW-MA strategy is % smaller than that of the heuristic NOW-SA/NOW-MA solution. Furthermore, the EW-MA strategy provides a resource allocation solution such that all the video layers can be successfully recovered up to a distance of , which is greater by than that ensured by NOW-MA. In accordance with stream News CIF, we observe that the heuristic NOW-SA provides allocation solutions such that all the video layers can be recovered up to a distance that is () smaller, respectively, than that associated with the heuristic NOW-MA (EW-MA). Finally, also in this case, the performance of MrT diverges from the performance of the proposed strategies.
Fig. 8 shows the value of associated with the streams News CIF and Blue Planet, as a function of distance from the centre of the cell, for . For the sake of comparison, we also report the performance of MrT even if it does not depend on the value of . We recall from Fig. 5 that the performance gap, in terms of the value of , between the heuristic NOW-SA/NOW-MA and EW-MA solutions is small ( TBs). As expected, the heuristic NOW-MA solution provides a service coverage that overlaps with that given by the heuristic EW-MA, in the case of both video streams. We can thus conclude that NOW-MA and EW-MA strategies perform similarly both in terms of resource footprint and service coverage, for large value of . Furthermore, even though the NOW-SA approach is characterized by the same resource footprint of NOW-MA, the achieved service coverage still diverges from that of NOW-MA and EW-MA. Once more, this performance gap is caused by the fact that the NOW-SA approach cannot exploit user heterogeneity. Finally, we remark that, also in this case, all the proposed allocation models meet the required coverage constraints.
We demonstrated that the proposed resource allocation frameworks fulfil the desired goals set in Section I, namely (i) to ensure the desired QoS levels to at least a target fraction of users, and (ii) to minimize the required number of TB transmissions. In particular, we established that each proposed framework ensures a service coverage, which not only meets the target performance but also outperforms the service coverage provided by the considered MrT strategy. A fact that should be kept in mind is that the increased service coverage factor depends on the user propagation conditions and the bitrate of each service layer. However, if the transmitted multicast services have similar bitrates, the increased service coverage can be directly translated into an enlargement of the inter-site-distance or a better placement of the base stations.
Vi Conclusions and Future Research Directions
In this paper, we studied a general system model in which a source node uses point-to-multipoint (PtM) transmission to multicast a layered message to a group of users. The number of consecutive layers recovered by a user determines the QoS level of that user. In order to improve communication reliability, we considered Random Linear Network Coding (RLNC) and we investigated two different implementations, which are suitable for layered source messages: the Non-Overlapping Window (NOW-RLNC) and the Expanding Window (EW-RLNC) schemes. We derived accurate closed-form expressions for the probability of recovering a predetermined set of consecutive message layers for both NOW-RLNC and EW-RLNC and we used these expressions to assess the user QoS. To maintain the generality of the system model and facilitate its extendibility to 4G and next-generation standards, we assumed that a layered source message can be transmitted over multiple orthogonal communication subchannels.
Based on this assumption, we developed resource allocation frameworks which aim to minimize the overall number of coded packet transmissions. The proposed frameworks allocate coded packets of the same layer or the same expanding window either to a single or to multiple subchannels; we called the former pattern Separated Allocation (SA) while the latter pattern Mixed Allocation (MA). A key point in the formulation of the resource allocation problems is that the derived solutions ensure that predetermined fractions of users can achieve the desired QoS with at least a target probability. We explained that both SA and MA are computationally complex integer problems but we proposed heuristic strategies which are capable of obtaining good-quality solutions in a finite number of steps.
As a case study, we presented a possible integration of the RLNC-based schemes into the standard LTE-A Media Access Control (MAC) layer and the adaptation of the developed resource allocation frameworks to LTE-A systems. In addition, we described how the resulting modified MAC layer can be used to efficiently deliver a layered multimedia stream compliant with the H.264/SVC standard over an LTE-A network that operates in the Single-Cell eMBMS mode.
In order to investigate the performance of the proposed schemes, we referred to an LTE-A network scenario defined by 3GPP to benchmark urban cellular network deployments. Furthermore, we considered two video traces – one of low bitrate and the other of high bitrate – both of which are publicly available for network performance evaluation. The first part of our investigation compared heuristic solutions to solutions obtained by directly solving the optimization problems and established that our proposed heuristic strategies indeed produce good-quality solutions. In the second part of our analysis, we demonstrated that both NOW and EW schemes can offer the same quality of service, in terms of PSNR, as conventional multi-rate transmission (MrT) but over a much longer distance. For a % probability of recovering the base video layer, we showed that the proposed strategies can achieve a coverage that is greater than that of a conventional MrT strategy by a factor of at least . Furthermore, we unveiled that EW-MA can achieve similar coverage to that of NOW-SA and NOW-MA but at a notable resource advantage when binary network coding is used. More specifically, EW-MA can reduce packet transmissions by % and % for the case of the considered low and high bitrate streams, respectively. Nevertheless, we clarified that as the field size of network coding increases, the NOW and EW schemes perform similarly.
Future research directions involve the optimization of the sparsity of RLNC as well as the definition of different optimization objectives. In this paper, we employed the classic implementation of RLNC, where coding coefficients are randomly selected over a finite field. It is well known from the literature that the coding coefficient selection can be biased in order to increase the probability of selecting a zero coefficient. We understand that, as the sparsity of a coding vector increases, the RLNC decoding complexity decreases. However, the more zero coefficients a coding vector has, the higher the probability is that a user receives linearly dependent coded packets. Owing to the lack of a theoretical characterization of the tradeoff between sparsity and decoding complexity, we will strive to reinterpret both the NOW-RLNC and EW-RLNC approaches. The resulting theoretical characterization will allow us to jointly optimize transmission parameters and the sparsity of RLNC.