Degree Distribution of XORed Fountain codes

Slides:



Advertisements
Similar presentations
TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Advertisements

Angstrom Care 培苗社 Quadratic Equation II
Unit-iv.
Using Matrices in Real Life
1 MPE and Partial Inversion in Lifted Probabilistic Variable Elimination Rodrigo de Salvo Braz University of Illinois at Urbana-Champaign with Eyal Amir.
Advanced Piloting Cruise Plot.
© 2008 Pearson Addison Wesley. All rights reserved Chapter Seven Costs.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 11 Information.
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Properties of Real Numbers CommutativeAssociativeDistributive Identity + × Inverse + ×
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 10 second questions
2010 fotografiert von Jürgen Roßberg © Fr 1 Sa 2 So 3 Mo 4 Di 5 Mi 6 Do 7 Fr 8 Sa 9 So 10 Mo 11 Di 12 Mi 13 Do 14 Fr 15 Sa 16 So 17 Mo 18 Di 19.
Algorithms for Geometric Covering and Piercing Problems Robert Fraser PhD defence Nov. 23, 2012.
Solve Multi-step Equations
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
Jesper H. Sørensen, Toshiaki Koike-Akino, and Philip Orlik 2012 IEEE International Symposium on Information Theory Proceedings Rateless Feedback Codes.
Minimum Weight Plastic Design For Steel-Frame Structures EN 131 Project By James Mahoney.
PP Test Review Sections 6-1 to 6-6
EU Market Situation for Eggs and Poultry Management Committee 21 June 2012.
1 COPYRIGHT © 2011 ALCATEL-LUCENT. ALL RIGHTS RESERVED. On the Capacity of Wireless CSMA/CA Multihop Networks Rafael Laufer and Leonard Kleinrock Bell.
VOORBLAD.
LT Codes Paper by Michael Luby FOCS ‘02 Presented by Ashish Sabharwal Feb 26, 2003 CSE 590vg.
Name Convolutional codes Tomashevich Victor. Name- 2 - Introduction Convolutional codes map information to code bits sequentially by convolving a sequence.
Copyright © 2013, 2009, 2006 Pearson Education, Inc.
Constant, Linear and Non-Linear Constant, Linear and Non-Linear
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Squares and Square Root WALK. Solve each problem REVIEW:
© 2012 National Heart Foundation of Australia. Slide 2.
Copyright © 2013, 2009, 2006 Pearson Education, Inc. 1 Section 5.4 Polynomials in Several Variables Copyright © 2013, 2009, 2006 Pearson Education, Inc.
LO: Count up to 100 objects by grouping them and counting in 5s 10s and 2s. Mrs Criddle: Westfield Middle School.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
Splines IV – B-spline Curves
Splines I – Curves and Properties
25 seconds left…...
Equal or Not. Equal or Not
Solving Systems of Linear Equations By Elimination
Januar MDMDFSSMDMDFSSS
Analyzing Genes and Genomes
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
Intracellular Compartments and Transport
PSSA Preparation.
Experimental Design and Analysis of Variance
Essential Cell Biology
Energy Generation in Mitochondria and Chlorplasts
Distributed Computing 9. Sorting - a lower bound on bit complexity Shmuel Zaks ©
Company LOGO F OUNTAIN C ODES, LT C ODES AND R APTOR C ODES Susmita Adhikari Eduard Mustafin Gökhan Gül.
D.J.C MacKay IEE Proceedings Communications, Vol. 152, No. 6, December 2005.
Anya Apavatjrut, Katia Jaffres-Runser, Claire Goursaud and Jean-Marie Gorce Combining LT codes and XOR network coding for reliable and energy efficient.
Shifted Codes Sachin Agarwal Deutsch Telekom A.G., Laboratories Ernst-Reuter-Platz Berlin Germany Joint work with Andrew Hagedorn and Ari Trachtenberg.
An Optimal Partial Decoding Algorithm for Rateless Codes Valerio Bioglio, Rossano Gaeta, Marco Grangetto, and Matteo Sereno Dipartimento di Informatica.
Chih-Ming Chen, Student Member, IEEE, Ying-ping Chen, Member, IEEE, Tzu-Ching Shen, and John K. Zao, Senior Member, IEEE Evolutionary Computation (CEC),
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
Multi-Edge Framework for Unequal Error Protecting LT Codes H. V. Beltr˜ao Neto, W. Henkel, V. C. da Rocha Jr. Jacobs University Bremen, Germany IEEE ITW(Information.
1 Implementation and performance evaluation of LT and Raptor codes for multimedia applications Pasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto,
Presentation transcript:

Degree Distribution of XORed Fountain codes Theoretical derivation and Analysis Lucie Nodin, Anya Apavatjrut, Claire Goursaud, Jean-Marie Gorce

Planning Part I : Overview Part II : Contribution Conclusion Wireless sensor network Fountain codes Network coding Part II : Contribution Theoretical analysis of the degree distribution of the XORed Fountain code Theoretical approach to preserve the degree distribution Application to LT and Raptor Codes Conclusion

Part I: Overview An approach to network coding of fountain code in a wireless sensor network Wireless Sensor Network Fountain codes Network Coding

Wireless Sensor Network Overview: A set of independent sensor nodes spatially distributed in a large area Limitation: Battery life, limited computational capability, limited resource Requirement: Energy awareness, Robustness, Reliability

Fountain Codes Characteristics: erasure block code Benefits: rateless, universal, limited feedback channel is required Limitation: overhead, additional computational complexity, redundancy Choices of fountain codes: LT, Raptor (due to its low decoding complexity of the Belief Propagation algorithm)

Fountain Codes Principle of Fountain Codes : LT Encoding Process Randomly choose the degree d of the packet from the Robust Soliton Distribution Uniformly select d distinct fragments among K and apply a bitwise sum (XOR) between these d fragments. Source packet f1 f2 f3 K = block length d = degree of the packet f1 f1 f2 f2 f1 f2 f2 f2 f2 f3 f3 f3 p1 p2 p3 p4 p5 p6 p7

Fountain Codes Principle of Fountain Codes : LT Decoding Process: Belief Propagation Find the encoded packet that have degree one. Degree one packet is considered as a decoded fragment of information. If none exists the decoding process halts at this step. Remove the combination of this decoded fragments from other un- decoded packets. Repeat these steps iteratively until all the packets are decoded successfully or until the decoding process halts due to the lack of degree one packet.

Fountain Codes Principle of Fountain Codes : LT Decoding Process: Belief Propagation good degree distribution : large-> encoded packets cover all initial fragments small-> ensure decoding capability f1 f2 p1 f2 f1 p2 f2 p3 f2 f3 p4 f3 f1 f3 p5 f2 p6 f2 f3 p7 f2 K = block length d = degree of the packet f1 f2 f3

Fountain Codes Degree Distribution Robust Soliton Distribution is the optimal distribution for the BP decoding [Luby2002] Ideal Soliton Distribution Robust Soliton Distribution where , and

Fountain Code Degree Distribution Degree distribution of Raptor code – precode+weakened LT code [Shokrollahi2006] where and is the overhead which allows to recover the initial data

Network Coding Network Coding ? Overview: processing of information at intermediate nodes Benefits: redundancy optimization, packet diversity Question : How to properly apply XOR operations among the encoded packets at relay nodes R? ? Packet 1 R Packet XORed Packet 2

Part II: Contribution Related work In this work… Decode and Reencode Successive encoding by relay nodes [Gummadi et al.2008] XORing algorithms are implemented at the relay nodes in order to preserve the target degree distribution [Apavatjrut et al.2010, Champel2009] In this work… Whereas the previous works focus on algorithm implementation, this work focuses on theoretical analysis.

Part II: Contribution Theoretical analysis of the degree distribution of the XORed Fountain code Theoretical approach to preserve the degree distribution Application to LT and Raptor Codes

XORing Fountain Codes Insight of XORing packets encoded with fountain codes Packet Header f1 f2 f3 Ex. K=3 f1 f1 f2 f2 f1 f2 f2 f2 f2 f3 f3 f3 p1 p2 p3 p4 p5 p6 p7 1 1 1

XORing Fountain Codes Insight of XORing packets encoded with fountain codes example no overlap with overlap 1 1 1 1 1 1 1 1 1 1 1 1 dR = degree of the resulting packet after a XOR operation d1 = degree of the first packet d2 = degree of the second packet o = number of degree overlap between the two packets

XORing Fountain Codes Overlap probability Assuming that d1≤d2 , the probability that o fragments overlap when XORing two packets with degree d1 and d2 can be expressed as f1 f2 f3 f4 f5 f6 f7 f k-1 fk K = block length d1 = degree of the first packet d2 = degree of the second packet O = number of degree overlap between the two packets

XORing Fountain Codes Degree probability for a packet resulting from one XOR Probability of getting resulting packet with degree by applying the total law of probabilities

XORing Fountain Codes Degree probability for a packet resulting from several XORs By XORing N+1 packets together, N XORs successive are done on two packets at each steps: Where pn is the degree distribution of the packet p1 once n XORs is done. The degree distribution are initialized as:

XORing Fountain Codes Degree probability for a packet resulting from several XORs P(d) Degree (d)

XORing Fountain Codes Degree probability for a packet resulting from several XORs When , Soliton Distribution Gaussian Distribution Randomly applying XOR operations -> decoding inefficiency

Preserving the Degree Distribution: Theoretical Approach Question How to select d1 and d2 in order to obtain the target degree dR Solution Find joint probability of picking (d1,d2) complex with 2xK unknown variables Fixing degree d1 and find probability of picking d2 K unknown variables Pchoice = probability of picking d2

Preserving the Degree Distribution: Theoretical Approach Matrix representation Such that represents the targeted resulting degree distribution represents a matrix of overlaps’ probabilities with coefficient represents the degree probability distribution of how to choose the second packets in order to obtain a specific

Preserving the Degree Distribution: Theoretical Approach How to determined ? Too difficult to be determined by matrix inversion Estimation with the least square method and

Application to LT and Raptor Codes By solving the system of equations for LT code : Pchoice can be determined as: Irregularity of Pchoice Degree Distribution Pchoice of the degrees to choose to recover Robust Soliton distribution for packets resulting from one XOR

Application to LT and Raptor Codes By solving the system of equations for Raptor code : Pchoice can be determined as: Degree Distribution Pchoice of the degrees to choose to recover weaken Robust Soliton distribution for packets resulting from one XOR

Application to LT and Raptor Codes Validation of the obtained results with simulations Examples for LT codes : d1=1 Resulting degree distribution from one XOR between LT encoded packets when d1=1 and d2 is chosen according to Pchoice distribution

Application to LT and Raptor Codes Validation of the obtained results with simulations Examples for LT codes : d1=2 Resulting degree distribution from one XOR between LT encoded packets when d1=2 and d2 is chosen according to Pchoice distribution

Application to LT and Raptor Codes Validation of the obtained results with simulations Examples for LT codes : d1=98 Resulting degree distribution from one XOR between LT encoded packets when d1=98 and d2 is chosen according to Pchoice distribution

Application to LT and Raptor Codes Validation of the obtained results with simulations Examples for LT codes : d1=99 Resulting degree distribution from one XOR between LT encoded packets when d1=99 and d2 is chosen according to Pchoice distribution

Conclusion Theoretical Analysis of the degree distribution of XORed fountain codes as well as a technique to preserve the degree has been proposed. The theoretical derivation in this work can be used as a way to recover a given degree distribution after XOR operations. This can later be applied to all the network coding-like application with fountain codes. Our theoretical and simulation results highlight that, under a certain conditions of packet selection, the target degree is reachable without the need to decode the packet entirely at the relay.

References [Luby2002] M. Luby, “LT codes,” The 43rd Annual IEEE Symposium on Foundations of Computer Science, Proceedings., pp. 271 – 280, 2002. [Shokrollahi2006] A. Shokrollahi, “Raptor codes,” IEEE Transactions on Information Theory, vol. 52, no. 6, pp. 2551 –2567, june 2006. [Gummadi et al.2008] R. Gummadi and R. Sreenivas, “Relaying a fountain code across multiple nodes,” in IEEE Information Theory Workshop, 2008, pp. 149–153. [Apavatjrut et al.2010] A. Apavatjrut, “Towards increasing diversity for the relaying of LT fountain codes in wireless sensor network”, to be published in IEEE Communications Letters. [Champel2009] M.-L. Champel, “LT network codes,” INRIA, Tech. Rep., 2009.

Thank you