UEP LT Codes with Intermediate Feedback Jesper H. Sørensen, Petar Popovski, and Jan Østergaard Aalborg University, Denmark IEEE COMMUNICATIONS LETTERS,

Slides:



Advertisements
Similar presentations
Scalable Video Multicast Using Expanding Window Fountain Codes Dejan Vukobratovic´,Vladimir Stankovic´, Dino Sejdinovic´, Lina Stankovic´,Zixiang Xiong.
Advertisements

Jesper H. Sørensen, Toshiaki Koike-Akino, and Philip Orlik 2012 IEEE International Symposium on Information Theory Proceedings Rateless Feedback Codes.
Performance analysis of LT codes with different degree distribution
José Vieira Information Theory 2010 Information Theory MAP-Tele José Vieira IEETA Departamento de Electrónica, Telecomunicações e Informática Universidade.
D.J.C MacKay IEE Proceedings Communications, Vol. 152, No. 6, December 2005.
LT-AF Codes: LT Codes with Alternating Feedback Ali Talari and Nazanin Rahnavard Oklahoma State University IEEE ISIT (International Symposium on Information.
Enhancing Secrecy With Channel Knowledge
Data Persistence in Sensor Networks: Towards Optimal Encoding for Data Recovery in Partial Network Failures Abhinav Kamra, Jon Feldman, Vishal Misra and.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
Threshold Phenomena and Fountain Codes
Erasure Correcting Codes
Fountain Codes Amin Shokrollahi EPFL and Digital Fountain, Inc.
2001/10/25Sheng-Feng Ho1 Efficient and Scalable On- Demand Data Streaming Using UEP Codes Lihao Xu Washington University in St. Louis ACM Multimedia 2001.
Sliding-Window Digital Fountain Codes for Streaming of Multimedia Contents Matta C.O. Bogino, Pasquale Cataldi, Marco Grangetto, Enrico Magli, Gabriella.
1 Distributed LT Codes Srinath Puducheri, Jörg Kliewer, and Thomas E. Fuja. Department of Electrical Engineering, University of Notre Dame, Notre Dame,
1 Scalable Image Transmission Using UEP Optimized LDPC Codes Charly Poulliat, Inbar Fijalkow, David Declercq International Symposium on Image/Video Communications.
Introduction to Cognitive radios Part two HY 539 Presented by: George Fortetsanakis.
RAPTOR CODES AMIN SHOKROLLAHI DF Digital Fountain Technical Report.
Feng Lu Chuan Heng Foh, Jianfei Cai and Liang- Tien Chia Information Theory, ISIT IEEE International Symposium on LT Codes Decoding: Design.
On the Coded Complex Field Network Coding Scheme for Multiuser Cooperative Communications with Regenerative Relays Caixi Key Lab of Information.
Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY /5/221.
Rateless Codes with Optimum Intermediate Performance Ali Talari and Nazanin Rahnavard Oklahoma State University, USA IEEE GLOBECOM 2009 & IEEE TRANSACTIONS.
Optimal Degree Distribution for LT Codes with Small Message Length Esa Hyytiä, Tuomas Tirronen, Jorma Virtamo IEEE INFOCOM mini-symposium
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
Shifted Codes Sachin Agarwal Deutsch Telekom A.G., Laboratories Ernst-Reuter-Platz Berlin Germany Joint work with Andrew Hagedorn and Ari Trachtenberg.
An Optimal Partial Decoding Algorithm for Rateless Codes Valerio Bioglio, Rossano Gaeta, Marco Grangetto, and Matteo Sereno Dipartimento di Informatica.
Basic Concepts of Encoding Codes, their efficiency and redundancy 1.
Chih-Ming Chen, Student Member, IEEE, Ying-ping Chen, Member, IEEE, Tzu-Ching Shen, and John K. Zao, Senior Member, IEEE Evolutionary Computation (CEC),
X1X1 X2X2 Encoding : Bits are transmitting over 2 different independent channels.  Rn bits Correlation channel  (1-R)n bits Wireless channel Code Design:
Channel Capacity.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
Wireless Mobile Communication and Transmission Lab. Chapter 8 Application of Error Control Coding.
Kai-Chao Yang VCLAB, NTHU 1.  Unequal Error Protection Rateless Codes for Scalable Information Delivery in Mobile Networks (INFOCOM 2007)  Rateless.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
Andrew Liau, Shahram Yousefi, Senior Member, IEEE, and Il-Min Kim Senior Member, IEEE Binary Soliton-Like Rateless Coding for the Y-Network IEEE TRANSACTIONS.
Multicast and Unicast Real-Time Video Streaming Over Wireless LANS April. 27 th, 2005 Presented by, Kang Eui Lee.
Stochastic Networks Conference, June 19-24, Connections between network coding and stochastic network theory Bruce Hajek Abstract: Randomly generated.
Communication System A communication system can be represented as in Figure. A message W, drawn from the index set {1, 2,..., M}, results in the signal.
Multimedia Transmission Over Cognitive Radio Networks using Decode-and-Forward Multi-Relays and Rateless Coding Abdelaali Chaoub, Elhassane Ibn-Elhaj National.
Layer-aligned Multi-priority Rateless Codes for Layered Video Streaming IEEE Transactions on Circuits and Systems for Video Technology, 2014 Hsu-Feng Hsiao.
ON THE INTERMEDIATE SYMBOL RECOVERY RATE OF RATELESS CODES Ali Talari, and Nazanin Rahnavard IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 5, MAY 2012.
A Robust Luby Transform Encoding Pattern-Aware Symbol Packetization Algorithm for Video Streaming Over Wireless Network Dongju Lee and Hwangjun Song IEEE.
Multi-Edge Framework for Unequal Error Protecting LT Codes H. V. Beltr˜ao Neto, W. Henkel, V. C. da Rocha Jr. Jacobs University Bremen, Germany IEEE ITW(Information.
Network Coding Data Collecting Mechanism based on Prioritized Degree Distribution in Wireless Sensor Network Wei Zhang, Xianghua Xu, Qinchao Zhang, Jian.
Pei-Chuan Tsai Chih-Ming Chen Ying-ping Chen WCCI 2012 IEEE World Congress on Computational Intelligence Sparse Degrees Analysis for LT Codes Optimization.
1 Unequal Error Protection Using Fountain Codes With Applications to Video Communication Shakeel Ahmad, Raouf Hamzaoui, Marwan Al-Akaidi Faculty of Technology,
Basic Concepts of Encoding Codes and Error Correction 1.
Codes on Random Geometric Graphs Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with D. Bajović, D. Jakovetić,
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
Prioritized Distributed Video Delivery With Randomized Network Coding IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 13, NO. 4, AUGUST 2011 Nikolaos Thomos Jacob.
Jayanth Nayak, Ertem Tuncel, Member, IEEE, and Deniz Gündüz, Member, IEEE.
A Mechanism for Communication- Efficient Broadcast Encryption over Wireless Ad Hoc Networks Johns Hopkins University Department of Computer Science Reza.
Distributed Rateless Codes with UEP Property Ali Talari, Nazanin Rahnavard 2010 IEEE ISIT(International Symposium on Information Theory) & IEEE TRANSACTIONS.
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
OPTIMIZATION of GENERALIZED LT CODES for PROGRESSIVE IMAGE TRANSFER Suayb S. Arslan, Pamela C. Cosman and Laurence B. Milstein Department of Electrical.
Rate Distortion Theory. Introduction The description of an arbitrary real number requires an infinite number of bits, so a finite representation of a.
Hongjie Zhu,Chao Zhang,Jianhua Lu Designing of Fountain Codes with Short Code-Length International Workshop on Signal Design and Its Applications in Communications,
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
Error Control Coding. Purpose To detect and correct error(s) that is introduced during transmission of digital signal.
1 Implementation and performance evaluation of LT and Raptor codes for multimedia applications Pasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto,
Coding for Multipath TCP: Opportunities and Challenges Øyvind Ytrehus University of Bergen and Simula Res. Lab. NNUW-2, August 29, 2014.
An improved LT encoding scheme with extended chain lengths
Random Testing: Theoretical Results and Practical Implications IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2012 Andrea Arcuri, Member, IEEE, Muhammad.
Distributed MIMO Patrick Maechler April 2, 2008.
Introduction King Saud University
Shakeel Ahmad, Raouf Hamzaoui, Marwan Al-Akaidi
CRBcast: A Collaborative Rateless Scheme for Reliable and Energy-Efficient Broadcasting in Wireless Sensor/Actuator Networks Nazanin Rahnavard, Badri N.
Introduction 1st semester King Saud University
Presentation transcript:

UEP LT Codes with Intermediate Feedback Jesper H. Sørensen, Petar Popovski, and Jan Østergaard Aalborg University, Denmark IEEE COMMUNICATIONS LETTERS, VOL. 17, NO. 8, AUGUST

Outlines Introduction UEP LT Codes with Feedback Simulation Results Conclusion 2

Introduction Conventional rateless codes treat all data as equally important. Unequal Error Protection (UEP), different data segments have different error probabilities – Ex. video streaming The purpose [8] is to quantify the redundancy of these codes, when recovery of all data segments is desired. Improving the decoding performance of the more important data can significantly degrade the decoding performance of the less important data. 3 [8] J. Sørensen, P. Popovski, and J. Østergaard, “Feedback in LT codes for prioritized and non-prioritized data,” in Proc IEEE Vehicular Technology Conference – Fall, pp. 1–5.

Introduction Successful decoding of a data segment is reported to the transmitter through a feedback channel. It is very beneficial to add such a single intermediate feedback. We consider point-to-point communication, where it is justified to use the feedback. Since the intermediate feedback is limited to only a single bit per k input symbols, the scheme may find applicability in broadcast scenarios, where many low rate feedback messages come from different users. 4

Encoder The encoding process of an LT code can be broken down into three steps: – 1) Randomly choose a degree i by sampling π(i). – 2) Choose uniformly at random i of the k input symbols. The uniform distribution used for selection of input symbols is replaced by one which favors more important symbols Non-uniform random selection of symbols is performed. – 3) Perform bitwise XOR of the i chosen input symbols. This solution to UEP has no impact on the decoder. 5 [6] N. Rahnavard, B. Vellambi, and F. Fekri, “Rateless codes with unequal error protection property,” IEEE Trans. Inf. Theory., vol. 53, pp. 1521–1532, Apr

Notation X i is the i’th element of X The sum of all elements is denoted and the zero vector is denoted 0 The probability mass function of X is denoted f X (x) The k input symbols are divided into N subsets s 1, s 2,..., s N, each of size α 1 k, α 2 k,..., α N k, where We refer to these subsets as layers 6

7 [6] N. Rahnavard, B. Vellambi, and F. Fekri, “Rateless codes with unequal error protection property,” IEEE Trans. Inf. Theory., vol. 53, pp. 1521–1532, Apr

Notation α = [α 1, α 2,..., α N ] The probability of selecting input symbols from s j is p j (k)α j k, such that Assume that p i (k) ≥ p j (k) if i < j. If then all data are treated equally, as in the standard single layer LT code. We define the vector, β, with 8

Notation The N-dimensional degree is denoted j j n : the number of neighbors belonging to the n’th layer We refer to i’ as the reduced degree, where i’ n denotes the reduced number of neighbors belonging to the n’th layer. L = [L 1, L 2,..., L N ], where L n is the number of unprocessed input symbols from the n’th layer R = [R 1,R 2,..., R N ], where R n is the number of symbols in the ripple belonging to the n’th layer 9

Notation We denote the set of j which satisfy j n ≥ i’ n, n = 1, 2,...,N, and ˆj = i The number of encoded symbols collected by the receiver is denoted Δ Initially, all degree-1 output symbols are identified, which makes it possible to recover their neighboring input symbols. These are moved to a storage called the ripple. Symbols in the ripple are processed one by one, which means they are XOR’ed with all their neighbors and removed from the ripple. 10

Definition Definition 1. (Decoder State) A decoder state, D, is defined by the number of unprocessed symbols, L = [L 1, L 2,..., L N ] and the ripple, R = [R 1,R 2,..., R N ]. Hence, D = [L,R]. Whenever a symbol is processed, ˆL will decrease by one. We call this a decoding step, which can only be performed if the ripple is not empty. If the ripple is empty, decoding stops, and we are left with what we call a terminal state. 11

Definition Definition 2. (Terminal State) A terminal state, D X = [L X,R X ], is defined as a state in which R = 0. The probability of ending in a particular terminal state, d X, after having collected Δ symbols, is denoted f D X (d X |Δ) The number of symbols collected while in terminal state d X is denoted Δ d X The maximum value of Δ is denoted Δ max 12

13 The receiver collects a number of encoded symbols, denoted Δ, prior to decoding. We define the vector Ω = [Ω 1,..., Ω i,..., Ω k ], where, Ω i denotes the number of symbols with original degree i among the Δ collected symbols. After having identified all Ω 1 degree-1 symbols and created the initial ripple, we have what we refer to as an initial state, whose distribution function is defined in Definition 2. [9] J. Sørensen, P. Popovski, and J. Østergaard, “Analysis of LT codes with unequal recovery time,” technical note, Apr. 2012, arXiv: [cs.IT].

Example Consider the case of k = 10, N = 2, α 1 k = 6 and α 2 k = 4. Decoding is attempted at Δ = 10 and the received output symbols have the following degrees respectively: 2, 3, 2, 4, 7, 1, 2, 1, 4, 1. Hence, Ω = [3, 3, 1, 2, 0, 0, 1, 0, 0, 0]. The three degree-1 symbols constitute the initial ripple and two of them belong to layer 1. In this case the initial state will be as follows: L I = [6 4], R I = [2 1], C I = [ ]. 14 [9] J. Sørensen, P. Popovski, and J. Østergaard, “Analysis of LT codes with unequal recovery time,” technical note, Apr. 2012, arXiv: [cs.IT].

Example 15 [9] J. Sørensen, P. Popovski, and J. Østergaard, “Analysis of LT codes with unequal recovery time,” technical note, Apr. 2012, arXiv: [cs.IT].

Example 16 [9] J. Sørensen, P. Popovski, and J. Østergaard, “Analysis of LT codes with unequal recovery time,” technical note, Apr. 2012, arXiv: [cs.IT].

Example 17 Fig. 2. An example of a decoder state evolution with two terminal states before successful decoding. [9] J. Sørensen, P. Popovski, and J. Østergaard, “Analysis of LT codes with unequal recovery time,” technical note, Apr. 2012, arXiv: [cs.IT].

Reduced Degree Distribution Theorem 1. (N-Layer Reduced Degree Distribution [8]) In an N- layer UEP LT code using any π(i) and with parameters, α and β, where l n symbols remain unprocessed from n’th layer, 18 [8] J. Sørensen, P. Popovski, and J. Østergaard, “Feedback in LT codes for prioritized and non-prioritized data,” in Proc IEEE Vehicular Technology Conference – Fall, pp. 1–5.

Reduced Degree Distribution N = 2 – Base layer (n = 1) – Refinement layer (n = 2) L X B : the number of undecoded symbols from the base layer L X R : the number of undecoded symbols from the refinement layer α B =0.5, α R = 1 - α B =1-0.5=0.5, β=P B /P R =9 19

20

UEP LT Codes without Feedback The Δ’th symbol is received in state d X, if the decoding of the first Δ − 1 symbols resulted in the terminal state d X. The expected number of symbols, E[Δ d x (Δ max )], received while being in state d X, equals the expected number of times decoding fails in that state. It is easy to obtain E[kε 0 (Δ max )] by multiplying by π’ β (0, l X ) and summing over all d X, for which l X ≠ 0. 21

UEP LT Codes without Feedback 22

UEP LT Codes with Feedback We can divide the transmission into two phases; – Before feedback (phase 1) – After feedback (phase 2) The number of symbols collected in phase 1 is denoted Δ 1 The total number of symbols collected in both phases is denoted Δ 2 In phase 2 the encoder only considers refinement layer symbols, which is the equivalent of β = 0, thus entailing the reduced degree distribution π 0 ’(0,l x ) Phase 1 continues as long as l X B = 0 and phase 2 continues as long as l X R ≠ 0. 23

24

Simulation Results Settings – k = 100 – α = 0.5 – RSD with c = 0.1 and δ = 1 – E[Δ d x (Δ max )] through Monte Carlo simulations with 1000 iterations 25

26

No Feedback 27

With Feedback

Converged redundancy 29 Note that the redundancy converges for increasing β in the scheme applying intermediate feedback.

Conclusion We analyze LT codes with unequal error protection (UEP). We propose a modification with a single intermediate feedback message. 30

References [4] S. Karande, K. Misra, S. Soltani, and H. Radha, “Design and analysis of generalized lt-codes using colored ripples,” in Proc IEEE International Symposium on Information Theory, pp. 2071–2075. [5] D. Sejdinovi´c, D. Vukobratovi´c, A. Doufexi, V. ˇSenk, and R. Piechocki, “Expanding window fountain codes for unequal error protection,” IEEE Trans. Commun., vol. 57, pp. 2510–2516, Sept [6] N. Rahnavard, B. Vellambi, and F. Fekri, “Rateless codes with unequal error protection property,” IEEE Trans. Inf. Theory., vol. 53, pp. 1521–1532, Apr [7] P. Cataldi, M. Grangetto, T. Tillo, E. Ma gli, and G. Olmo, “Sliding window raptor codes for efficient scalable wireless video broadcasting with unequal loss protection,” IEEE Trans. Image Process., vol. 19, pp. 1491–1503, June [8] J. Sørensen, P. Popovski, and J. Østergaard, “Feedback in LT codes for prioritized and non-prioritized data,” in Proc IEEE Vehicular Technology Conference – Fall, pp. 1–5. [9] J. Sørensen, P. Popovski, and J. Østergaard, “Analysis of LT codes with unequal recovery time,” technical note, Apr. 2012, arXiv: [cs.IT]. 31

32 Fig. 1. The relative number of undecoded input symbols as a function of the amount of received symbols for the simulated schemes.

33 Fig. 3. The relative number of undecoded input symbols from the individual layers as a function of the amount of received symbols.

34 Fig. 4. Average distortion as a function of the symbol error rate.