Distributed Rateless Codes with UEP Property Ali Talari, Nazanin Rahnavard 2010 IEEE ISIT(International Symposium on Information Theory) & IEEE TRANSACTIONS.

Slides:



Advertisements
Similar presentations
Scalable Video Multicast Using Expanding Window Fountain Codes Dejan Vukobratovic´,Vladimir Stankovic´, Dino Sejdinovic´, Lina Stankovic´,Zixiang Xiong.
Advertisements

Jesper H. Sørensen, Toshiaki Koike-Akino, and Philip Orlik 2012 IEEE International Symposium on Information Theory Proceedings Rateless Feedback Codes.
Degree Distribution of XORed Fountain codes
Company LOGO F OUNTAIN C ODES, LT C ODES AND R APTOR C ODES Susmita Adhikari Eduard Mustafin Gökhan Gül.
Performance analysis of LT codes with different degree distribution
José Vieira Information Theory 2010 Information Theory MAP-Tele José Vieira IEETA Departamento de Electrónica, Telecomunicações e Informática Universidade.
OFDM Modulated Cooperative Multiple-Access Channel With Network-Channel Coding.
D.J.C MacKay IEE Proceedings Communications, Vol. 152, No. 6, December 2005.
B IPARTITE I NDEX C ODING Arash Saber Tehrani Alexandros G. Dimakis Michael J. Neely Department of Electrical Engineering University of Southern California.
Effect of Maintaining Wavelength Continuity on Minimizing Network Coding Resources in Optical Long-haul Networks Ramanathan S Thinniyam.
LT-AF Codes: LT Codes with Alternating Feedback Ali Talari and Nazanin Rahnavard Oklahoma State University IEEE ISIT (International Symposium on Information.
1 Finite-Length Scaling and Error Floors Abdelaziz Amraoui Andrea Montanari Ruediger Urbanke Tom Richardson.
Date:2011/06/08 吳昕澧 BOA: The Bayesian Optimization Algorithm.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
Threshold Phenomena and Fountain Codes
Erasure Correcting Codes
Sliding-Window Digital Fountain Codes for Streaming of Multimedia Contents Matta C.O. Bogino, Pasquale Cataldi, Marco Grangetto, Enrico Magli, Gabriella.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
1 NETWORK CODING Anthony Ephremides University of Maryland - A NEW PARADIGM FOR NETWORKING - February 29, 2008 University of Minnesota.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
1 Distributed LT Codes Srinath Puducheri, Jörg Kliewer, and Thomas E. Fuja. Department of Electrical Engineering, University of Notre Dame, Notre Dame,
1 Scalable Image Transmission Using UEP Optimized LDPC Codes Charly Poulliat, Inbar Fijalkow, David Declercq International Symposium on Image/Video Communications.
10th Canadian Workshop on Information Theory June 7, 2007 Rank-Metric Codes for Priority Encoding Transmission with Network Coding Danilo Silva and Frank.
Code and Decoder Design of LDPC Codes for Gbps Systems Jeremy Thorpe Presented to: Microsoft Research
RAPTOR CODES AMIN SHOKROLLAHI DF Digital Fountain Technical Report.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Digital Fountain with Tornado Codes and LT Codes K. C. Yang.
The Role of Specialization in LDPC Codes Jeremy Thorpe Pizza Meeting Talk 2/12/03.
Analysis of Iterative Decoding
Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY /5/221.
On comparison of different approaches to the stability radius calculation Olga Karelkina Department of Mathematics University of Turku MCDM 2011.
Rateless Codes with Optimum Intermediate Performance Ali Talari and Nazanin Rahnavard Oklahoma State University, USA IEEE GLOBECOM 2009 & IEEE TRANSACTIONS.
Block-LDPC: A Practical LDPC Coding System Design Approach
Wireless Mobile Communication and Transmission Lab. Theory and Technology of Error Control Coding Chapter 7 Low Density Parity Check Codes.
Network Aware Resource Allocation in Distributed Clouds.
Rateless Coding with Feedback Andrew Hagedorn, Sachin Agarwal, David Starobinski, and Ari Trachtenberg Department of ECE, Boston University, MA, USA IEEE.
Optimal Degree Distribution for LT Codes with Small Message Length Esa Hyytiä, Tuomas Tirronen, Jorma Virtamo IEEE INFOCOM mini-symposium
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
Shifted Codes Sachin Agarwal Deutsch Telekom A.G., Laboratories Ernst-Reuter-Platz Berlin Germany Joint work with Andrew Hagedorn and Ari Trachtenberg.
An Optimal Partial Decoding Algorithm for Rateless Codes Valerio Bioglio, Rossano Gaeta, Marco Grangetto, and Matteo Sereno Dipartimento di Informatica.
Chih-Ming Chen, Student Member, IEEE, Ying-ping Chen, Member, IEEE, Tzu-Ching Shen, and John K. Zao, Senior Member, IEEE Evolutionary Computation (CEC),
X1X1 X2X2 Encoding : Bits are transmitting over 2 different independent channels.  Rn bits Correlation channel  (1-R)n bits Wireless channel Code Design:
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
Kai-Chao Yang VCLAB, NTHU 1.  Unequal Error Protection Rateless Codes for Scalable Information Delivery in Mobile Networks (INFOCOM 2007)  Rateless.
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
Space-Time and Space-Frequency Coded Orthogonal Frequency Division Multiplexing Transmitter Diversity Techniques King F. Lee.
Andrew Liau, Shahram Yousefi, Senior Member, IEEE, and Il-Min Kim Senior Member, IEEE Binary Soliton-Like Rateless Coding for the Y-Network IEEE TRANSACTIONS.
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
Stochastic Networks Conference, June 19-24, Connections between network coding and stochastic network theory Bruce Hajek Abstract: Randomly generated.
Layer-aligned Multi-priority Rateless Codes for Layered Video Streaming IEEE Transactions on Circuits and Systems for Video Technology, 2014 Hsu-Feng Hsiao.
UEP LT Codes with Intermediate Feedback Jesper H. Sørensen, Petar Popovski, and Jan Østergaard Aalborg University, Denmark IEEE COMMUNICATIONS LETTERS,
ON THE INTERMEDIATE SYMBOL RECOVERY RATE OF RATELESS CODES Ali Talari, and Nazanin Rahnavard IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 5, MAY 2012.
A Robust Luby Transform Encoding Pattern-Aware Symbol Packetization Algorithm for Video Streaming Over Wireless Network Dongju Lee and Hwangjun Song IEEE.
Multi-Edge Framework for Unequal Error Protecting LT Codes H. V. Beltr˜ao Neto, W. Henkel, V. C. da Rocha Jr. Jacobs University Bremen, Germany IEEE ITW(Information.
On Coding for Real-Time Streaming under Packet Erasures Derek Leong *#, Asma Qureshi *, and Tracey Ho * * California Institute of Technology, Pasadena,
Pei-Chuan Tsai Chih-Ming Chen Ying-ping Chen WCCI 2012 IEEE World Congress on Computational Intelligence Sparse Degrees Analysis for LT Codes Optimization.
1 Unequal Error Protection Using Fountain Codes With Applications to Video Communication Shakeel Ahmad, Raouf Hamzaoui, Marwan Al-Akaidi Faculty of Technology,
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
Sequential Soft Decision Decoding of Reed Solomon Codes Hari Palaiyanur Cornell University Prof. John Komo Clemson University 2003 SURE Program.
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
OPTIMIZATION of GENERALIZED LT CODES for PROGRESSIVE IMAGE TRANSFER Suayb S. Arslan, Pamela C. Cosman and Laurence B. Milstein Department of Electrical.
Hongjie Zhu,Chao Zhang,Jianhua Lu Designing of Fountain Codes with Short Code-Length International Workshop on Signal Design and Its Applications in Communications,
Chapter 11. Chapter Summary  Introduction to trees (11.1)  Application of trees (11.2)  Tree traversal (11.3)  Spanning trees (11.4)
1 Implementation and performance evaluation of LT and Raptor codes for multimedia applications Pasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto,
Coding for Multipath TCP: Opportunities and Challenges Øyvind Ytrehus University of Bergen and Simula Res. Lab. NNUW-2, August 29, 2014.
An improved LT encoding scheme with extended chain lengths
Shakeel Ahmad, Raouf Hamzaoui, Marwan Al-Akaidi
CRBcast: A Collaborative Rateless Scheme for Reliable and Energy-Efficient Broadcasting in Wireless Sensor/Actuator Networks Nazanin Rahnavard, Badri N.
Introduction Wireless Ad-Hoc Network
Presentation transcript:

Distributed Rateless Codes with UEP Property Ali Talari, Nazanin Rahnavard 2010 IEEE ISIT(International Symposium on Information Theory) & IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 8, AUGUST

Outline Introduction Distributed UEP rateless codes Distributed UEP rateless codes design Simulation Results Conclusions 2

Introduction Fountain codes - efficient and robust solution for data transmission over packet erasure networks Rateless codes - can adapt their rate on the fly to suit different (or unknown) channel conditions A kind of sparse graph codes; typically decoded by belief propagation algorithm (low computational complexity) Increasingly commercialized, standardized by 3GPP and DVB 3

Distributed LT codes Introduced in [2](Puducheri et al, 2007) for encoding data from multiple sources independently Common relay combines encoded packets from multiple sources Resulting bit-stream approximates that of an LT code (deconvolution of Robust Soliton) Substantial benefits in comparison with independent LT encoders and forwarding at the relay. 4 [2] S. Puducheri, J. Kliewer, and T. Fuja, “The design and performance of distributed LT codes,” IEEE Trans. Inf. Theory, vol. 53, pp. 3740–3754, Oct

5 Decomposition of LT Code Recall: S 1 : k/2 information symbols S 2 : k/2 information symbols T : k information symbols Distributed LT LT Deconvolved Soliton Distribution Robust Soliton Distribution N

6 Decomposition of LT Code Proposed scenario: – Each data set contains k/2 information symbols. – Node N only performs one of two operations: Transmits the bitwise XOR of the symbols receives from S 1 and S 2. Transmits just one of them. The resulting encoded symbol received by T : – The degree of the resulting symbol has two cases: The sum of the degrees (up to i = k ). The individual degree of one of the received symbols.

7 Decomposition of LT Code Encoding procedure: D 1 : k/2 information symbols DSD : p(·) encoded symbols: Y Robust Soliton Distribution N D 2 : k/2 information symbols S1S1 S2S2 DSD p(·) encoded symbols: X 1 encoded symbols: X 2 Node N knows the degrees and neighbors of X 1 and X 2 Y = X 1  X 2 or Y = X 1 or Y = X 2 T DLT-2 Code

DU-rateless codes In DU-rateless coding, each source performs rateless coding with a distinct degree distribution on its data block and forwards its output symbols to the relay. – For the sake of simplicity, r = 2. Consider a distributed data transmission with two sources s 1 and s 2, and data block lengths ρk and k. 0 < ρ ≤ 1. s 1 and s 2 encode their input symbols with degree distributions Ω(x) and ϕ(x) with the largest degrees B 1 and B 2, respectively, and forward them to the relay. 8

DU-rateless codes Relay R receives output symbols from two sources and performs as follows – 1) With probabilities p 1 and p 2 it relays the first and the second source’s output symbol to the destination D, respectively. – 2) With probability p 3 = 1 − p 1 − p 2 it combines two incoming symbols and forwards the combined symbol to the destination. Fig. 1. Adopted model for DU-rateless codes. s 1, s 2, R, and D represent distributed sources, relay, and destination, respectively. 9

DU-rateless codes In DU-rateless coding, the corresponding bipartite graph at the receiver has two types of variable nodes (input symbols from s 1 and s 2 ), and three types of check nodes generated by the relay Fig. 2. The bi-partite graph representing input and output symbols for r = 2. 10

DU-rateless codes The check nodes in the first group are generated based on Ω(x) and are only connected to input symbols of s 1. The check nodes in the second group are generated based on ϕ(x) and are only connected to input symbols of s 2. The check nodes in the third group are generated using input symbols from both s 1 and s 2 with a degree distribution equal to Ω(x)×ϕ(x). A check node belongs to the first, second, and third group with probabilities p 1, p 2, and p 3, respectively. (ρk, k, Ω(x), ϕ(x), p 1, p 2, p 3, γ) 11

And-Or Tree analysis Two And-Or trees [10] T l,1 and T l,2 with depth 2l. Assume that T l,1 and T l,2 have Type-X and Type-Y OR- nodes and Type-I, Type-II, and Type-III AND-nodes. For each tree, the root of the tree is at depth 0, its children are at depth 1, their children at depth 2. Each node at depth 0, 2, 4,..., 2l − 2 is an OR-node. Each node at depth 1, 3, 5,..., 2l − 1 is called an AND- node. The root of T l,1 is a Type-X OR-node, and the root of T l,2 is a Type-Y OR-node. 12 [10] M. G. Luby, M. Mitzenmacher, and M. A. Shokrollahi, “Analysis of random processes via And-Or tree evaluation,” (Philadelphia, PA, USA), pp. 364–373, Society for Industrial and Applied Mathematics, 1998.

13 Fig. 3. T l,1 And-Or tree with two types of OR-nodes and three types of AND-nodes with a Type-X OR-node root.

14 Fig. 4. T l,2 And-Or tree with two types of OR-nodes and three types of AND-nodes with a Type-Y OR-node root.

And-Or Tree analysis We assume that in both T l,1 and T l,2 – Type-X OR-nodes choose i ∈ {0,...,A 1 } and j ∈ {0,...,A 1 } children from Type-I and Type-III AND- nodes with probabilities δ i,1 and δ j,1, respectively. – Type-Y OR-nodes choose i ∈ {0,...,A 2 } and j ∈ {0,...,A 2 } children from Type-II and Type-III AND- nodes with probabilities δ i,2 and δ j,2, respectively. – Type-I AND-nodes choose i ∈ {0,...,B 1 − 1} children from Type-X OR-nodes with probability β i,1 – Type-II AND-nodes choose i ∈ {0,...,B 2 − 1} children from Type-Y OR-nodes with probability β i,2. 15

And-Or Tree analysis – Type-III AND-nodes choose j ∈ {0,...,B 1 − 1} and i ∈ {1,...,B 2 } children from Type-X and Type-Y OR-nodes with probabilities β j,1 and β i,3. – Note that Type-III AND-nodes in T l,1 should have at least one child from Type-Y OR-nodes, since otherwise it is a Type-I AND-node. In T l,2, Type-III AND-nodes can choose j ∈ {0,...,B 2 − 1} and i ∈ {1,...,B 1 } children from Type-Y and Type-X OR- nodes with probabilities β j,2 and β i,4 Similar to Type-III AND-nodes in T l,1, Type-III AND- nodes in T l,2 need to have at least one child from Type- X OR-nodes to be distinguished from Type-II AND- nodes. 16

And-Or Tree analysis We assume that in both T l,1 and T l,2 the ratio of the number of AND-nodes of Type-I, Type-II, and Type-III is p 1, p 2, and p 3 = 1− p 1 − p 2, where 0 ≤ pi ≤ 1, ∀ i. Type-X and Type-Y OR-nodes at depth 2l are independently assigned a value of 0 with probabilities y 0,1 and y 0,2. Also OR-nodes with no children are assumed to have a value 0, whereas AND-nodes with no children are assumed to have a value 1. We are interested in finding y l,1 and y l,2, the probabilities that the root nodes of T l,1 and T l,2 evaluate to 0, respectively, if we treat the trees as a Boolean circuits. 17

18

And-Or Tree analysis Let G denote the bipartite graph corresponding to a DU-rateless code at the receiver. Choose an edge (v,w) uniformly at random from all edges in G with one end among variable nodes of s 1. Call the variable node v the root of G l,1. Subgraph G l,1 is the graph induced by v and all neighbors of v within distance 2l after removing the edge (v,w). 19

And-Or Tree analysis It can be shown that G l,1 is a tree asymptotically [10]. We can map encoded symbols from s 1, encoded symbols from s 2, and combined encoded symbols in G l to Type-I, Type-II, and Type-III AND-nodes in T l,1, respectively. Variable nodes of s 1 and s 2 in G l,1 can be mapped to Type-X and Type-Y OR-nodes in T l,1. G l,2 can be mapped to T l,2 in the same way that G l,1 is mapped to T l,1. 20 [10] M. G. Luby, M. Mitzenmacher, and M. A. Shokrollahi, “Analysis of random processes via And-Or tree evaluation,” (Philadelphia, PA, USA), pp. 364–373, Society for Industrial and Applied Mathematics, 1998.

And-Or Tree analysis To complete DU-rateless codes analysis, we only need to compute the probabilities β i,1, β i,2, β i,3, β i,4, and functions δ 1 (x) and δ 2 (x) 21

Distributed UEP rateless codes design For DU-rateless coding with r = 2, two error rates BER 1 and BER 2 are defined. The values of these two error rates are dependant, i.e. improving one error rate by modifying DU-rateless code parameters may result in degrading the other error rate. Deal with two dependant error rates, as conflicting objective functions, we have a multi-objective optimization problem. 22

Distributed UEP rateless codes design More than one objective functions to minimize, we need to employ pareto optimality concept. 23 Fig. 5. Concept of pareto optimality, pareto front, and domination for a two-objective minimization problem with two decision variables, x 1 and x 2.

Distributed UEP rateless codes design Multi-objective optimization methods such as NSGA-II [3] search to find solutions that result in pareto front. We fix the parameters γ succ = 1.05 and B1 = B2 = 100, and employ the state-of-the-art multi-objective genetic algorithm NSGA-II [3] to find the optimum value for Ω(x) and ϕ(x) along with relaying parameters p 1, p 2, and p 3 that minimize BER 1 and BER 2 for various values of η = BER 2 / BER 1, and ρ ∈ {0.3, 0.5, 1}. Two objective functions, BER 1 and BER 2, with 202 independent decision variables, i.e. X = {Ω 1,Ω 2,...,Ω 100, ϕ 1, ϕ 2,..., ϕ 100, p 1, p 2 }. 24 [3] K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan, “A fast and elitist multiobjective genetic algorithm: NSGA-II,” IEEE Transactions on Evolutionary Computation, vol. 6, pp. 182–197, Apr 2002.

25

26

Simulation Results Two DU-rateless codes for η ∈ {10, 10 2 }, ρ = 1, and γ succ = η = 1 corresponds to equal error protection (EEP) case where data from s 1 and s 2 are equally protected. – A larger η shows a higher recovery rate of S 1 input symbols at D or equivalently a higher level of protection compared to S 2. γ succ is called the coding overhead and asymptotically (k →∞) approaches 1. – For practical finite values of k, γ succ may be much larger than 1. 27

Simulation Results 28

29

Simulation Results The parameters of a DU-rateless code for ρ = 1, η = 10, and γ succ = 1.05, with p 1 = , and p 2 = , which gives p 3 = We can see that to achieve an optimum distributed coding 40.05% of the generated output symbols at s 1 and s 2 should be combined at the relay. 30

31

Performance Evaluation for Finite-length 32 Fig. 3. The resulting BERs for asymptotic case and finite length case (k = 10 4 ) for DU-rateless codes optimized for γ succ = 1.05 and γ succ = 1.02 with parameters η = 10 and ρ = 1.

33 Performance Evaluation for Finite-length Fig. 3. The resulting BERs for asymptotic case and finite length case (k = 10 4 ) for DU-rateless codes optimized for γ succ = 1.05 and γ succ = 1.02 with parameters η = 10 and ρ = 1.

Performance Comparison with LT Codes 34 Fig. 4. Performance comparison of the employed DU-rateless code and the equivalent optimal separate LT codes. As shown, the overhead for achieving BER 1 = 5 × 10 −7 reduces from 1.25 to 1.15 if we employ a DU-rateless code instead of two separate LT codes.

35 Fig. 5. Performance comparison of the DU-rateless codes for designed for ρ = 1, η = 1, γ = 1.05 and the DLT codes with average output degree of for k = Performance Comparison with DLT codes DU-rateless codes are capable of providing UEP and also support sources with unequal block sizes.

Conclusions We proposed DU-rateless codes, which are distributed rateless codes with Unequal Error Protection (UEP) property for two data sources with unequal data block lengths over erasure channels. We analyzed DU-rateless codes employing And- Or tree analysis technique, and we designed several close to optimum sets of DU-rateless codes using multi-objective genetic algorithms. 36

References [2] S. Puducheri, J. Kliewer, and T. Fuja, “The design and performance of distributed LT codes,” IEEE Trans. Inf. Theory, vol. 53, pp. 3740–3754, Oct [3] K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan, “A fast and elitist multiobjective genetic algorithm: NSGA-II,” IEEE Trans. Evolutionary Comput., vol. 6, pp. 182–197, Apr [4] A. Talari and N. Rahnavard, “Distributed rateless codes with UEP property,” in Proc IEEE International Symp. Inf. Theory Proc., pp. 2453–2457. [5] D. Sejdinovic, R. Piechocki, and A. Doufexi, “AND-OR tree analysis of distributed LT codes,” in Proc IEEE Inf. Theory Workshop Netw. Inf. Theory, pp. 261–265. [6] A. Liau, S. Yousefi, and I. Kim, “Binary soliton-like rateless coding for the y-network,” IEEE Trans. Commun., vol. PP, no. 99, pp. 1–6, [7] R. Gummadi and R. Sreenivas, “Relaying a fountain code across multiple nodes,” in Proc IEEE Inf. Theory Workshop, pp. 149–153. [8] N. Rahnavard, B. Vellambi, and F. Fekri, “Rateless codes with unequal error protection property,” IEEE Trans. Inf. Theory, vol. 53, pp. 1521–1532, Apr [9] N. Rahnavard and F. Fekri, “Generalization of rateless codes for unequal error protection and recovery time: asymptotic analysis,” in Proc IEEE International Symp. Inf. Theory, pp. 523– 527. [13] N. Rahnavard and F. Fekri, “Finite-length unequal error protection rateless codes: design and analysis,” in Proc IEEE Global Telecommun. Conf., vol. 3, p