Company LOGO F OUNTAIN C ODES, LT C ODES AND R APTOR C ODES Susmita Adhikari Eduard Mustafin Gökhan Gül.

Slides:



Advertisements
Similar presentations
GSA Pizza Talk - EPFL - Capillary routing with FEC by E. Gabrielyan 1 Capillary Multi-Path Routing for reliable Real-Time Streaming with FEC.
Advertisements

Adders Used to perform addition, subtraction, multiplication, and division (sometimes) Half-adder adds rightmost (least significant) bit Full-adder.
Using Matrices in Real Life
© Negnevitsky, Pearson Education, Lecture 12 Hybrid intelligent systems: Evolutionary neural networks and fuzzy evolutionary systems Introduction.
Analysis of Computer Algorithms
Generating Random Spanning Trees Sourav Chatterji Sumit Gulwani EECS Department University of California, Berkeley.
Iterative Equalization and Decoding
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
1 Haitao Zheng and Jill Boyce IEEE Transaction on Multimedia Leif 9/10/01 An Improved UDP Protocol for Video Transmission Over Internet-to-Wireless Networks.
Jesper H. Sørensen, Toshiaki Koike-Akino, and Philip Orlik 2012 IEEE International Symposium on Information Theory Proceedings Rateless Feedback Codes.
1 Mobility-Based Predictive Call Admission Control and Bandwidth Reservation in Wireless Cellular Networks Fei Yu and Victor C.M. Leung INFOCOM 2001.
ABC Technology Project
Hash Tables.
Cache and Virtual Memory Replacement Algorithms
A Survey of Web Cache Replacement Strategies Stefan Podlipnig, Laszlo Boszormenyl University Klagenfurt ACM Computing Surveys, December 2003 Presenter:
نیمسال اوّل افشین همّت یار دانشکده مهندسی کامپیوتر مخابرات سیّار (626-40) ظرفیت انتقال اطلاعات.
LT Codes Paper by Michael Luby FOCS ‘02 Presented by Ashish Sabharwal Feb 26, 2003 CSE 590vg.
Name Convolutional codes Tomashevich Victor. Name- 2 - Introduction Convolutional codes map information to code bits sequentially by convolving a sequence.
Degree Distribution of XORed Fountain codes
Squares and Square Root WALK. Solve each problem REVIEW:
On Construction of Rate-Compatible Low-Density Parity-Check (RC-LDPC) Codes by Mohammadreza Yazdani and Amir H. Banihashemi Department of Systems and Computer.
Scalable and Dynamic Quorum Systems Moni Naor & Udi Wieder The Weizmann Institute of Science.
Chapter 5 Test Review Sections 5-1 through 5-4.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
Addition 1’s to 20.
1 S Digital Communication Systems Advanced Modulation and Random Access Techniques.
25 seconds left…...
Take out the homework from last night then do, Warm up #1
Week 1.
We will resume in: 25 Minutes.
Network Operations & administration CS 4592 Lecture 15 Instructor: Ibrahim Tariq.
and M-ary Quadrature Amplitude Modulation (M-QAM)
Epp, section 10.? CS 202 Aaron Bloomfield
Digital Fountain Codes V. S
José Vieira Information Theory 2010 Information Theory MAP-Tele José Vieira IEETA Departamento de Electrónica, Telecomunicações e Informática Universidade.
D.J.C MacKay IEE Proceedings Communications, Vol. 152, No. 6, December 2005.
Cooperative Multiple Input Multiple Output Communication in Wireless Sensor Network: An Error Correcting Code approach using LDPC Code Goutham Kumar Kandukuri.
Threshold Phenomena and Fountain Codes
Erasure Correcting Codes
Fountain Codes Amin Shokrollahi EPFL and Digital Fountain, Inc.
1 NETWORK CODING Anthony Ephremides University of Maryland - A NEW PARADIGM FOR NETWORKING - February 29, 2008 University of Minnesota.
Code and Decoder Design of LDPC Codes for Gbps Systems Jeremy Thorpe Presented to: Microsoft Research
RAPTOR CODES AMIN SHOKROLLAHI DF Digital Fountain Technical Report.
1 Verification Codes Michael Luby, Digital Fountain, Inc. Michael Mitzenmacher Harvard University and Digital Fountain, Inc.
Analysis of Iterative Decoding
Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY /5/221.
Networks lab, RPI1 Recent Advances in Error/Erasure Correcting and Coding Vijay Subramanian.
Application of Finite Geometry LDPC code on the Internet Data Transport Wu Yuchun Oct 2006 Huawei Hisi Company Ltd.
Shifted Codes Sachin Agarwal Deutsch Telekom A.G., Laboratories Ernst-Reuter-Platz Berlin Germany Joint work with Andrew Hagedorn and Ari Trachtenberg.
An Optimal Partial Decoding Algorithm for Rateless Codes Valerio Bioglio, Rossano Gaeta, Marco Grangetto, and Matteo Sereno Dipartimento di Informatica.
Chih-Ming Chen, Student Member, IEEE, Ying-ping Chen, Member, IEEE, Tzu-Ching Shen, and John K. Zao, Senior Member, IEEE Evolutionary Computation (CEC),
X1X1 X2X2 Encoding : Bits are transmitting over 2 different independent channels.  Rn bits Correlation channel  (1-R)n bits Wireless channel Code Design:
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
Kai-Chao Yang VCLAB, NTHU 1.  Unequal Error Protection Rateless Codes for Scalable Information Delivery in Mobile Networks (INFOCOM 2007)  Rateless.
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
Stochastic Networks Conference, June 19-24, Connections between network coding and stochastic network theory Bruce Hajek Abstract: Randomly generated.
Layer-aligned Multi-priority Rateless Codes for Layered Video Streaming IEEE Transactions on Circuits and Systems for Video Technology, 2014 Hsu-Feng Hsiao.
1 Raptor codes for reliable multicast object delivery Michael Luby Digital Fountain.
Multi-Edge Framework for Unequal Error Protecting LT Codes H. V. Beltr˜ao Neto, W. Henkel, V. C. da Rocha Jr. Jacobs University Bremen, Germany IEEE ITW(Information.
Part 1: Overview of Low Density Parity Check(LDPC) codes.
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
II. Linear Block Codes. © Tallal Elshabrawy 2 Digital Communication Systems Source of Information User of Information Source Encoder Channel Encoder Modulator.
1 Implementation and performance evaluation of LT and Raptor codes for multimedia applications Pasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto,
Coding for Multipath TCP: Opportunities and Challenges Øyvind Ytrehus University of Bergen and Simula Res. Lab. NNUW-2, August 29, 2014.
CRBcast: A Collaborative Rateless Scheme for Reliable and Energy-Efficient Broadcasting in Wireless Sensor/Actuator Networks Nazanin Rahnavard, Badri N.
Presentation transcript:

Company LOGO F OUNTAIN C ODES, LT C ODES AND R APTOR C ODES Susmita Adhikari Eduard Mustafin Gökhan Gül

O UTLINE 2. Fountain Codes 4. LT Codes 5. Raptor Codes 7. Conclusion 1. Motivation 3. Degree Distribution 2Kiel, February 2008

 Binary Erasure Channel M OTIVATION p p 1-p e Capacity = (1 - p) 3Kiel, February 2008

 Automatic Repeat Request (ARQ)  Wasteful usage of bandwidth, network overloads and intolerable delays.  Forward Error Correcting (FEC) codes  Reed-Solomon codes, LDPC codes, Tornado codes.  Rate should be determined in compliance with the erasure probability p.  High computational cost of overall encoding and decoding. M OTIVATION 4Kiel, February 2008

FOUNTAIN CODES  Rateless: Number of code symbols, which can be generated from input info symbols is potentially unlimited.  Capacity achieving: Decoder can recover info symbols from any set of code symbols, which is only slightly longer than input message length.  Universal: Fountain Codes are near optimal for any BEC. 5Kiel, February 2008

F OUNTAIN C ODES  Encoding: Example: 6Kiel, February 2008 For info symbols s 1, s 2 …s K, code symbols t 1, t 2 … and random generator matrix G,

FOUNTAIN CODES  Decoding: For info symbols s 1, s 2 …s K, code symbols t 1, t 2 … and random generator matrix G, Example: Easier to calculate using Tanner Graph 7Kiel, February 2008

F OUNTAIN C ODES... ?? ? 1 [ [ ] ] Kiel, February 2008

 Encoding complexity of and decoding complexity of, which makes them impractical. F OUNTAIN C ODES... 9Kiel, February 2008

D EGREE D ISTRIBUTION  Degree is the number of edges connecting an encoded symbol to the input symbols.  Degree distribution is the probability density function of all degrees used for encoding.  Average degree of the encoded symbols should be at least for a realiable decoding.  Degree distribution affects the encoding and decoding costs. Kiel, February

LT C ODES  First practical implementation of Fountain Codes, proposed by Michael Luby.  LT codes are rateless and universal.  Computational complexity of both the encoding and the decoding process increase logarithmically with the increase of the data length.  Therefore, compared to Fountain Codes, LT codes provide a considerably reduced computational cost while achieving the capacity. 11Kiel, February 2008

LT C ODES - “Encoding”  Encoding Algorithm  Divide the message M into equi-length parts of k bits resulting in K number of symbols. M k Kiel, February 2008

LT C ODES - “Encoding” d=3  Encoding Algorithm  Randomly choose the degree d of the encoding symbol from a degree distribution. 13Kiel, February 2008

LT C ODES - “Encoding”  Encoding Algorithm  Choose randomly distinct input symbols as the edges of the encoding symbol in the tanner graph. 14Kiel, February 2008 d=

LT C ODES - “Encoding”  Encoding Algorithm  Determine the encoding symbol as bitwise modulo 2 sum of the edge symbols. 15Kiel, February 2008 d=

LT C ODES - “Encoding” d d v v 2 2 (1,3) 2 2 (1,2) 2 2 (5,6) 2 2 (4,6) 1 1 (2) 1 1 (5) 3 3 (1,4,6) 1 1 (3) (4) Kiel, February 2008

LT C ODES - “Decoding”  Decoding Algorithm  Find a check node with degree one and assign its value to the corresponding input symbol. If there is no such a node halt the decoding and report the failure of decoding.  Add this value to all check nodes connected to this input symbol.  Remove all edges from the graph, which are connected to the related input symbol.  Repeat the first three steps until all input symbols are recovered. 17Kiel, February 2008

d d v v 2 2 (1,3) 2 2 (1,2) 2 2 (4,6) 1 1 (5) 3 3 (1,4,6) 1 1 (3) LT C ODES - “Decoding”.... Decoding Failure! 18Kiel, February 2008

d d v v 2 2 (1,3) 2 2 (1,2) 2 2 (4,6) 1 1 (5) 3 3 (1,4,6) 1 1 (3) 1 1 (4)... LT C ODES - “Decoding” Decoding Successful! 19Kiel, February 2008

R APTOR C ODES  An extension of LT codes, introduced by Shokrollahi.  Core idea - “To relax the condition of recovering all input symbols and to require only a constant fraction of input symbols be recoverable.”  Idea achieved by concatenation of an LT code and a precode.  LT code recovers a large proportion of input symbols.  Precode recovers the fraction unrecovered by LT code.  Encoding and decoding complexity increases linearly with K. 20Kiel, February 2008

R APTOR C ODES “Encoding” 21Kiel, February 2008

22 Received Symbols Erased Symbol Recovered Message Symbols Decoding Successful! Unrecovered Symbols R APTOR C ODES “Decoding”

 Raptor Codes can efficiently be used over noisy channels with the same encoding scheme that we have previously described and BP algorithm using soft inputs.  AWGN Channel with E s /N 0 =-2.83 dB and K=9500 info- bits, N av =20737 code-bits, Cap=0.5bit/symbol, R av =0.458bit/symbol.  Tends to approach the capacity with the increase of message length on both AWGN and the fading channel with Rayleight distribution. 23Kiel, February 2008 RAPTOR CODES on Noisy Channels

 Capacity achieving Raptor Codes haven’t been proven yet for other symetric channels. However, it is proven that Raptor Codes are not universal for all rates for symetric channels other than BEC.  Generalized Raptor Codes outperform ordinary Raptor Codes using rate-compatible distribution arrangement on BSM and AWGN channels. RAPTOR CODES on Noisy Channels 24Kiel, February 2008

C ONCLUSION  Fountain Codes  Advantage: Rateless, universal and capacity achieving.  Disadvantage: Higher encoding and decoding complexity.  LT Codes  Advantage: Lower complexity than Fountain Codes.  Disadvantage: Complexity increases logarithmically with the message length.  Raptor Codes  Advantage: The lowest complexity achievable  Can be applied to arbitrary channels efficiently. 25Kiel, February 2008

Company LOGO T HANK YOU !