1 Distributed LT Codes Srinath Puducheri, Jörg Kliewer, and Thomas E. Fuja. Department of Electrical Engineering, University of Notre Dame, Notre Dame,

Slides:



Advertisements
Similar presentations
Jesper H. Sørensen, Toshiaki Koike-Akino, and Philip Orlik 2012 IEEE International Symposium on Information Theory Proceedings Rateless Feedback Codes.
Advertisements

LT Codes Paper by Michael Luby FOCS ‘02 Presented by Ashish Sabharwal Feb 26, 2003 CSE 590vg.
Degree Distribution of XORed Fountain codes
Performance analysis of LT codes with different degree distribution
Functions and Functional Blocks
José Vieira Information Theory 2010 Information Theory MAP-Tele José Vieira IEETA Departamento de Electrónica, Telecomunicações e Informática Universidade.
D.J.C MacKay IEE Proceedings Communications, Vol. 152, No. 6, December 2005.
LT-AF Codes: LT Codes with Alternating Feedback Ali Talari and Nazanin Rahnavard Oklahoma State University IEEE ISIT (International Symposium on Information.
Bounds on Code Length Theorem: Let l ∗ 1, l ∗ 2,..., l ∗ m be optimal codeword lengths for a source distribution p and a D-ary alphabet, and let L ∗ be.
Data Persistence in Sensor Networks: Towards Optimal Encoding for Data Recovery in Partial Network Failures Abhinav Kamra, Jon Feldman, Vishal Misra and.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
1 Rateless Packet Approach for Data Gathering in Wireless Sensor Networks Dejan Vukobratovic, Cedomir Stefanovic, Vladimir Crnojevic, Francesco Chiti,
Growth Codes: Maximizing Sensor Network Data Persistence Abhinav Kamra, Vishal Misra, Dan Rubenstein Department of Computer Science, Columbia University.
Threshold Phenomena and Fountain Codes
Erasure Correcting Codes
Sliding-Window Digital Fountain Codes for Streaming of Multimedia Contents Matta C.O. Bogino, Pasquale Cataldi, Marco Grangetto, Enrico Magli, Gabriella.
DNA Research Group 1 Growth Codes: Maximizing Sensor Network Data Persistence Abhinav Kamra, Vishal Misra, Dan Rubenstein Department of Computer Science,
1 NETWORK CODING Anthony Ephremides University of Maryland - A NEW PARADIGM FOR NETWORKING - February 29, 2008 University of Minnesota.
Novel Self-Configurable Positioning Technique for Multihop Wireless Networks Authors : Hongyi Wu Chong Wang Nian-Feng Tzeng IEEE/ACM TRANSACTIONS ON NETWORKING,
RAPTOR CODES AMIN SHOKROLLAHI DF Digital Fountain Technical Report.
1 rStream: Resilient and Optimal Peer-to-Peer Streaming with Rateless Codes Chuan Wu, Baochun Li Department of Electrical and Computer Engineering University.
DNA Research Group 1 Growth Codes: Maximizing Sensor Network Data Persistence Vishal Misra Joint work with Abhinav Kamra, Jon Feldman (Google) and Dan.
Variable-Length Codes: Huffman Codes
Digital Fountain with Tornado Codes and LT Codes K. C. Yang.
1 10. Joint Moments and Joint Characteristic Functions Following section 6, in this section we shall introduce various parameters to compactly represent.
Anya Apavatjrut, Katia Jaffres-Runser, Claire Goursaud and Jean-Marie Gorce Combining LT codes and XOR network coding for reliable and energy efficient.
Feng Lu Chuan Heng Foh, Jianfei Cai and Liang- Tien Chia Information Theory, ISIT IEEE International Symposium on LT Codes Decoding: Design.
Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY /5/221.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Rateless Codes with Optimum Intermediate Performance Ali Talari and Nazanin Rahnavard Oklahoma State University, USA IEEE GLOBECOM 2009 & IEEE TRANSACTIONS.
When rate of interferer’s codebook small Does not place burden for destination to decode interference When rate of interferer’s codebook large Treating.
Optimal Degree Distribution for LT Codes with Small Message Length Esa Hyytiä, Tuomas Tirronen, Jorma Virtamo IEEE INFOCOM mini-symposium
PROBABILITY AND STATISTICS FOR ENGINEERING Hossein Sameti Department of Computer Engineering Sharif University of Technology Two Functions of Two Random.
Related Works of Data Persistence in WSN htchiu 1.
Shifted Codes Sachin Agarwal Deutsch Telekom A.G., Laboratories Ernst-Reuter-Platz Berlin Germany Joint work with Andrew Hagedorn and Ari Trachtenberg.
An Optimal Partial Decoding Algorithm for Rateless Codes Valerio Bioglio, Rossano Gaeta, Marco Grangetto, and Matteo Sereno Dipartimento di Informatica.
Module 1: Statistical Issues in Micro simulation Paul Sousa.
Chih-Ming Chen, Student Member, IEEE, Ying-ping Chen, Member, IEEE, Tzu-Ching Shen, and John K. Zao, Senior Member, IEEE Evolutionary Computation (CEC),
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
Wireless Mobile Communication and Transmission Lab. Chapter 8 Application of Error Control Coding.
Kai-Chao Yang VCLAB, NTHU 1.  Unequal Error Protection Rateless Codes for Scalable Information Delivery in Mobile Networks (INFOCOM 2007)  Rateless.
Growth Codes: Maximizing Sensor Network Data Persistence abhinav Kamra, Vishal Misra, Jon Feldman, Dan Rubenstein Columbia University, Google Inc. (SIGSOMM’06)
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
Andrew Liau, Shahram Yousefi, Senior Member, IEEE, and Il-Min Kim Senior Member, IEEE Binary Soliton-Like Rateless Coding for the Y-Network IEEE TRANSACTIONS.
Stochastic Networks Conference, June 19-24, Connections between network coding and stochastic network theory Bruce Hajek Abstract: Randomly generated.
Multimedia Transmission Over Cognitive Radio Networks using Decode-and-Forward Multi-Relays and Rateless Coding Abdelaali Chaoub, Elhassane Ibn-Elhaj National.
UEP LT Codes with Intermediate Feedback Jesper H. Sørensen, Petar Popovski, and Jan Østergaard Aalborg University, Denmark IEEE COMMUNICATIONS LETTERS,
1 Raptor codes for reliable multicast object delivery Michael Luby Digital Fountain.
1 8. One Function of Two Random Variables Given two random variables X and Y and a function g(x,y), we form a new random variable Z as Given the joint.
A Robust Luby Transform Encoding Pattern-Aware Symbol Packetization Algorithm for Video Streaming Over Wireless Network Dongju Lee and Hwangjun Song IEEE.
Multi-Edge Framework for Unequal Error Protecting LT Codes H. V. Beltr˜ao Neto, W. Henkel, V. C. da Rocha Jr. Jacobs University Bremen, Germany IEEE ITW(Information.
Computer Science Division
1 Unequal Error Protection Using Fountain Codes With Applications to Video Communication Shakeel Ahmad, Raouf Hamzaoui, Marwan Al-Akaidi Faculty of Technology,
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
Jayanth Nayak, Ertem Tuncel, Member, IEEE, and Deniz Gündüz, Member, IEEE.
Distributed Rateless Codes with UEP Property Ali Talari, Nazanin Rahnavard 2010 IEEE ISIT(International Symposium on Information Theory) & IEEE TRANSACTIONS.
User Mobility Modeling and Characterization of Mobility Patterns Mahmood M. Zonoozi and Prem Dassanayake IEEE Journal on Selected Areas in Communications.
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
OPTIMIZATION of GENERALIZED LT CODES for PROGRESSIVE IMAGE TRANSFER Suayb S. Arslan, Pamela C. Cosman and Laurence B. Milstein Department of Electrical.
Hongjie Zhu,Chao Zhang,Jianhua Lu Designing of Fountain Codes with Short Code-Length International Workshop on Signal Design and Its Applications in Communications,
March 18, 2005 Network Coding in Interference Networks Brian Smith and Sriram Vishwanath University of Texas at Austin March 18 th, 2005 Conference on.
Structure-Free Data Aggregation in Sensor Networks.
Simulation of Finite Geometry LDPC code on the Packet Erasure channel Wu Yuchun July 2007 Huawei Hisi Company Ltd.
1 Implementation and performance evaluation of LT and Raptor codes for multimedia applications Pasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto,
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
Coding for Multipath TCP: Opportunities and Challenges Øyvind Ytrehus University of Bergen and Simula Res. Lab. NNUW-2, August 29, 2014.
An improved LT encoding scheme with extended chain lengths
The Viterbi Decoding Algorithm
Effective Social Network Quarantine with Minimal Isolation Costs
Presentation transcript:

1 Distributed LT Codes Srinath Puducheri, Jörg Kliewer, and Thomas E. Fuja. Department of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556, USA IEEE International Symposium on Information Theory (ISIT), 2006.

2 Outline Introduction Description of LT Code Decomposition of LT Code Simulation Results Conclusions References

3 Introduction Consider a scenario: T : k information symbols Distributed LT LT N S 1 : k/2 information symbols S 2 : k/2 information symbols

4 Description of LT Code Luby Transform (LT) Codes: –Encoding process For the i th encoded symbol, select degree d i by Soliton distribution Choose d i source symbols Perform XOR on chosen symbols –Decoding process Decode degree-one encoded symbols Remove degree-one edges iteratively … x1x1 x2x2 x3x3 x4x4 x5x5 x6x6 y1y1 y2y2 y3y3 y4y4 y5y5 x1x3x1x3 x2x2 x2x5x2x5 x3x5x6x3x5x6 Degree 123…k probability μ1μ1 μ2μ2 μ3μ3 …μkμk x4x4

5 Description of LT Code LT process: A B D y1y1 y2y2 y4y4 A  B A B  D covered : in the ripple S processed unprocessed: L C The most likely degree of encoded symbols that get released: k/L y3y3 A  C  D

6 Description of LT Code The intuition for the degree distribution: –More small degree than large degree. Easy to be decoded. –One single degree-one encoded symbol can trigger the LT process. Ideal Soliton Distribution: k : number of total original symbols i : degree of encoded symbols

7 Description of LT Code Ideal Soliton Distribution: probability degree

8 Description of LT Code In practice: –Only one single degree-one encoded symbol is too fragile. Number of degree-one encoded symbol has to be more. A larger Ripple. –Large degree encoded symbols are necessary evils. Because of a larger Ripple. To give a better coverage of original symbols. –A modified Soliton Distribution, concerning the size of Ripple during the LT process. Robust Solition Distribution.

9 Description of LT Code LT process: C F D y5y5 C  D  E  F covered : in the ripple S processed unprocessed: L E … When L = S, we expect all the original symbols to be covered. We need the encoding symbols that get released then must cover S original symbols by degree: k/S

10 Description of LT Code Robust Soliton Distribution (RSD): –Robust Soliton Distribution μ( · ) is given by: k : number of total original symbols i : degree of encoded symbols

11 Description of LT Code ρ( · ) is a distribution over 1 ≦ i ≦ k, and for constants c > 0, 0 <δ< 1, the τ( · ) is:, where S define the size of Ripple:

12 Description of LT Code Robust Soliton Distribution K : number of total original symbols d : degree of encoded symbols τ( k/S ) probability k = 10000

13 Decomposition of LT Code Recall: S 1 : k/2 information symbols S 2 : k/2 information symbols T : k information symbols Distributed LT LT Deconvolved Soliton Distribution Robust Soliton Distribution N

14 Decomposition of LT Code Proposed scenario: –Each data set contains k/2 information symbols. –Node N only performs one of two operations: Transmits the bitwise XOR of the symbols receives from S 1 and S 2. Transmits just one of them. The resulting encoded symbol received by T : –The degree of the resulting symbol has two cases: The sum of the degrees (up to i = k ). The individual degree of one of the received symbols.

15 Decomposition of LT Code In determining p (·), we employ the “deconvolution” of the RSD μ (·). –If node N XOR s the incoming symbols, the resulting degree is the sum of the in coming symbols. –If the degrees are independently chosen according to p (·), their sum will follow the distribution p * p. ‘ * ’ denotes the discrete-time convolution operation:

16 Decomposition of LT Code However, a direct attempt at deconvolving μ(·) does not yield satisfactory results. –μ(0) = 0, it is necessary that p(0) = 0. We cannot permit a degree of zero. –It implies that the smallest degree in p * p is two. However, this does not match the RSD as μ(1) > 0. degree = 1 would have problem. ( )

17 Decomposition of LT Code Even if we neglect μ(1), and attempt to deconvolve the remaining part of μ(·) by solving for p(·) from: –owing to the fact that μ(i) has a spike at i = k/S, we obtain negative values of p(·) for some arguments. degree = k/S would have problem.

18 Decomposition of LT Code An alternative approach (1/3): : ρ : τ Prob. Deg. Deg = 1 Deg = k/S Deg = 1 μ(i) : ρ : τ Prob. Deg. μ’(i)μ’(i) : ρ : τ Prob. μ ’’ (i)

19 Decomposition of LT Code An alternative approach (2/3): –Split RSD μ(·) into two distributions – μ ’ (·) and μ’’ (·). with the normalization factor β’ given by: Deconvolving μ’(·) yields a valid probability distribution function:

20 Decomposition of LT Code An alternative approach (3/3): –Split RSD μ(·) into two distributions – μ ’ (·) and μ’’ (·). with the normalization factor β’’ given by: and:

21 Decomposition of LT Code ∵ β ’ + β ’’ = β, the RSD can be rewritten as: Hence, the RSD μ (·) can be viewed as a mixture of the distributions μ’ (·) and μ’’ (·) with mixing parameter β’ / β’’.

22 Decomposition of LT Code Then we deconvolve μ’ (·) to yield a valid probability distribution f (·). –By solving: –Using the same approach as earlier mentioned ( recall ), with p(·) replaced by f (·) and μ (·) by μ’ (·), we obtain the following set of recursive equations: recall

23 Decomposition of LT Code The Deconvolved Soliton Distribution (DSD) p(·) is given by: with the parameter, given by: p(·) can be viewed as the mixture of f (·) and μ ’’ (·) with mixing parameter λ.

24 Decomposition of LT Code Notice that: μ':μ': 12 … k/S k/2 k f :f : 12 … k/S k/2k 12 … k/S k/2 f * f : k/2 + 1 tail Deg = k/S : ρ : τ Deg. μ(i) Prob.

25 Decomposition of LT Code Encoding procedure: D 1 : k/2 information symbols DSD : p(·) encoded symbols: Y Robust Soliton Distribution N D 2 : k/2 information symbols S1S1 S2S2 DSD p(·) encoded symbols: X 1 encoded symbols: X 2 Node N knows the degrees and neighbors of X 1 and X 2 Y = X 1  X 2 or Y = X 1 or Y = X 2 T DLT-2 Code

26 Decomposition of LT Code Node N generates a symbol Y as follows: otherwise (1/2): Generates independent random variables: U 1 and U 2 uniformly on the interval (0, 1). Based on the values of U 1 and U 2, one of the following operations is performed.

27 Decomposition of LT Code otherwise (2/2):

28 Decomposition of LT Code The code obtained by combining the two DLT-2 Codes generated by S 1 and S 2 is not, strictly speaking, an LT Code.

29 Simulation Results An application of LT Code decomposition: T : k information symbols Distributed LT LT N S 1 : m information symbols S J : m information symbols … … … J ≧ 2 source nodes - k = Jm Lossy channel

30 Simulation Results Two schemes (1/2): –Let every source employ an LT code for its data, and these LT codes are multiplexed in time at N and sent to T. Works well except when source data blocks are small ( information symbols). Overhead is fairly large (about 15-20%).

31 Simulation Results Two schemes (2/2): –It would be beneficial if we could form an LT code over the entire set of k = Jm information symbols at N and send this to T. J -fold deconvolution of the RSD. –Due to the constraint that N has limited processing and storage capabilities. Code symbols from different sources are XOR ed together at N. It yields symbols that obey the RSD over the range of degrees 1 through k = Jm.

32 Simulation Results Consider the case J = 4 (1/2): –The DLT-2 code can be decomposed further into two more subcodes called DLT-4 codes. –By performing a deconvolution of the DSD p(·) similar to how the DSD was derived from the RSD: Write DSD p(·) as a mixture of two distributions p ’(·) and p ’’(·), where p ’’(·) contributes to the degrees 1 and k/S. The distribution p ’(·) is then deconvolved to get g (·) and the final degree distribution q (·) is obtained by taking the appropriate mixture of g (·) and p ’’(·).

33 Simulation Results Consider the case J = 4 (2/2): –By performing a deconvolution of the DSD p(·) similar to how the DSD was derived from the RSD: The degree distribution q (·) is used by source nodes to generate encode symbols from their data, and these code symbols constitute the DLT-4 codeword. The node N performs a selective XOR of the four DLT-4 code symbols received from four sources, and forwards the resulting code symbol to T. Node T needs to collect slightly greater than k = Jm encode symbols from N to recover all source data.

34 Simulation Results Compare two schemes (1/2): –In terms of the number of code symbols that must be received by the sink T to recover all the sources’ data, for J = 4, m = 500, k = Jm = 2000 : Scheme A : –Each source generates LT code symbols from its 500- symbol data set. –The code symbols from different sources are time-multiplexed at N and transmitted to the sink T. –The sink separately decodes each LT code to recover the data. –Let N A denote the total number of code symbols that are needed by T to recover all the data.

35 Simulation Results Compare two schemes (2/2): Scheme B : –Each source generates DLT-4 codewords from its 500- symbol data set. –At every instant, the four encode symbols generated by the sources are selectively XOR -ed at N and forwarded to the sink T. –The sink thus receives a big LT code over all the sources’ data, which is then decoded to recover all the data simultaneously. – Let N B denote the total number of code symbols that are needed by T to recover all the data.

36 Simulation Results The average values of N A and N B obtained via simulations: P.S. Probable Max Degree of RSD in Scheme A : up to 500 Probable Max Degree of RSD in Scheme B : up to 2000

37 Simulation Results

38 Conclusions Presents a novel technique that allows distributed users to encode their data by selectively XOR ed, and results in an efficient rateless code, similar to an LT Code, at a common destination. Exploits the improved efficiency for large blocklengths: by forming a single codeword at the destination representing all the distributed data sets. –A reduction in overhead compared with a system in which each data set is encoded with its own LT code having a smaller blocklength.

39 References M. Luby, “LT Codes,” Proc. of the 43rd Annual IEEE Symp. on Foundations of Comp. Sc., pp , Vancouver, Canada, November D.J.C. MacKay, “Fountain Codes”, IEE Proceedings – Commun. Vol. 152, No 6, December Ashish Khisti, “Tornado Codes and Luby Transform Codes, ” Course Lecture of “6.454: Graduate Seminar in Area I” at MIT, Fall 2003.