Rateless Codes with Optimum Intermediate Performance Ali Talari and Nazanin Rahnavard Oklahoma State University, USA IEEE GLOBECOM 2009 & IEEE TRANSACTIONS.

Slides:



Advertisements
Similar presentations
Jesper H. Sørensen, Toshiaki Koike-Akino, and Philip Orlik 2012 IEEE International Symposium on Information Theory Proceedings Rateless Feedback Codes.
Advertisements

Hadi Goudarzi and Massoud Pedram
Performance analysis of LT codes with different degree distribution
D.J.C MacKay IEE Proceedings Communications, Vol. 152, No. 6, December 2005.
LT-AF Codes: LT Codes with Alternating Feedback Ali Talari and Nazanin Rahnavard Oklahoma State University IEEE ISIT (International Symposium on Information.
1 Rateless codes and random walks for P2P resource discovery in Grids IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, NOV Valerio Bioglio.
Data Persistence in Sensor Networks: Towards Optimal Encoding for Data Recovery in Partial Network Failures Abhinav Kamra, Jon Feldman, Vishal Misra and.
Network Correlated Data Gathering With Explicit Communication: NP- Completeness and Algorithms R˘azvan Cristescu, Member, IEEE, Baltasar Beferull-Lozano,
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
1 Rateless Packet Approach for Data Gathering in Wireless Sensor Networks Dejan Vukobratovic, Cedomir Stefanovic, Vladimir Crnojevic, Francesco Chiti,
Growth Codes: Maximizing Sensor Network Data Persistence Abhinav Kamra, Vishal Misra, Dan Rubenstein Department of Computer Science, Columbia University.
Sliding-Window Digital Fountain Codes for Streaming of Multimedia Contents Matta C.O. Bogino, Pasquale Cataldi, Marco Grangetto, Enrico Magli, Gabriella.
DNA Research Group 1 Growth Codes: Maximizing Sensor Network Data Persistence Abhinav Kamra, Vishal Misra, Dan Rubenstein Department of Computer Science,
1 Distributed LT Codes Srinath Puducheri, Jörg Kliewer, and Thomas E. Fuja. Department of Electrical Engineering, University of Notre Dame, Notre Dame,
10th Canadian Workshop on Information Theory June 7, 2007 Rank-Metric Codes for Priority Encoding Transmission with Network Coding Danilo Silva and Frank.
Efficient Fine Granularity Scalability Using Adaptive Leaky Factor Yunlong Gao and Lap-Pui Chau, Senior Member, IEEE IEEE TRANSACTIONS ON BROADCASTING,
RAPTOR CODES AMIN SHOKROLLAHI DF Digital Fountain Technical Report.
1 rStream: Resilient and Optimal Peer-to-Peer Streaming with Rateless Codes Chuan Wu, Baochun Li Department of Electrical and Computer Engineering University.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
DNA Research Group 1 Growth Codes: Maximizing Sensor Network Data Persistence Vishal Misra Joint work with Abhinav Kamra, Jon Feldman (Google) and Dan.
1 BitTorrent and fountain codes: friends or foes? Salvatore Spoto, Rossano Gaeta, Marco Grangetto, Matteo Sereno Department of Computer Science, University.
Digital Fountain with Tornado Codes and LT Codes K. C. Yang.
Feng Lu Chuan Heng Foh, Jianfei Cai and Liang- Tien Chia Information Theory, ISIT IEEE International Symposium on LT Codes Decoding: Design.
An Adaptive Probability Broadcast- based Data Preservation Protocol in Wireless Sensor Networks Liang, Jun-Bin ; Wang, Jianxin; Zhang, X.; Chen, Jianer.
On the Coded Complex Field Network Coding Scheme for Multiuser Cooperative Communications with Regenerative Relays Caixi Key Lab of Information.
Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY /5/221.
On comparison of different approaches to the stability radius calculation Olga Karelkina Department of Mathematics University of Turku MCDM 2011.
Optimal Degree Distribution for LT Codes with Small Message Length Esa Hyytiä, Tuomas Tirronen, Jorma Virtamo IEEE INFOCOM mini-symposium
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
Related Works of Data Persistence in WSN htchiu 1.
Message-Passing for Wireless Scheduling: an Experimental Study Paolo Giaccone (Politecnico di Torino) Devavrat Shah (MIT) ICCCN 2010 – Zurich August 2.
Shifted Codes Sachin Agarwal Deutsch Telekom A.G., Laboratories Ernst-Reuter-Platz Berlin Germany Joint work with Andrew Hagedorn and Ari Trachtenberg.
An Optimal Partial Decoding Algorithm for Rateless Codes Valerio Bioglio, Rossano Gaeta, Marco Grangetto, and Matteo Sereno Dipartimento di Informatica.
Chih-Ming Chen, Student Member, IEEE, Ying-ping Chen, Member, IEEE, Tzu-Ching Shen, and John K. Zao, Senior Member, IEEE Evolutionary Computation (CEC),
X1X1 X2X2 Encoding : Bits are transmitting over 2 different independent channels.  Rn bits Correlation channel  (1-R)n bits Wireless channel Code Design:
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Optimization of the ESRF upgrade lattice lifetime and dynamic aperture using genetic algorithms Nicola Carmignani 11/03/2015.
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
Kai-Chao Yang VCLAB, NTHU 1.  Unequal Error Protection Rateless Codes for Scalable Information Delivery in Mobile Networks (INFOCOM 2007)  Rateless.
BitTorrent and fountain codes: friends or foes? Salvatore Spoto, Rossano Gaeta, Marco Grangetto, Matteo Sereno Dipartimento di informatica Università di.
Growth Codes: Maximizing Sensor Network Data Persistence abhinav Kamra, Vishal Misra, Jon Feldman, Dan Rubenstein Columbia University, Google Inc. (SIGSOMM’06)
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
Andrew Liau, Shahram Yousefi, Senior Member, IEEE, and Il-Min Kim Senior Member, IEEE Binary Soliton-Like Rateless Coding for the Y-Network IEEE TRANSACTIONS.
Stochastic Networks Conference, June 19-24, Connections between network coding and stochastic network theory Bruce Hajek Abstract: Randomly generated.
Multimedia Transmission Over Cognitive Radio Networks using Decode-and-Forward Multi-Relays and Rateless Coding Abdelaali Chaoub, Elhassane Ibn-Elhaj National.
Layer-aligned Multi-priority Rateless Codes for Layered Video Streaming IEEE Transactions on Circuits and Systems for Video Technology, 2014 Hsu-Feng Hsiao.
Bounded relay hop mobile data gathering in wireless sensor networks
UEP LT Codes with Intermediate Feedback Jesper H. Sørensen, Petar Popovski, and Jan Østergaard Aalborg University, Denmark IEEE COMMUNICATIONS LETTERS,
P2P streaming with LT codes: a prototype experimentation
ON THE INTERMEDIATE SYMBOL RECOVERY RATE OF RATELESS CODES Ali Talari, and Nazanin Rahnavard IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 5, MAY 2012.
A Robust Luby Transform Encoding Pattern-Aware Symbol Packetization Algorithm for Video Streaming Over Wireless Network Dongju Lee and Hwangjun Song IEEE.
Multi-Edge Framework for Unequal Error Protecting LT Codes H. V. Beltr˜ao Neto, W. Henkel, V. C. da Rocha Jr. Jacobs University Bremen, Germany IEEE ITW(Information.
On Coding for Real-Time Streaming under Packet Erasures Derek Leong *#, Asma Qureshi *, and Tracey Ho * * California Institute of Technology, Pasadena,
1 Unequal Error Protection Using Fountain Codes With Applications to Video Communication Shakeel Ahmad, Raouf Hamzaoui, Marwan Al-Akaidi Faculty of Technology,
 Tree in Sensor Network Patrick Y.H. Cheung, and Nicholas F. Maxemchuk, Fellow, IEEE 3 rd New York Metro Area Networking Workshop (NYMAN 2003)
Codes on Random Geometric Graphs Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with D. Bajović, D. Jakovetić,
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
Distributed Rateless Codes with UEP Property Ali Talari, Nazanin Rahnavard 2010 IEEE ISIT(International Symposium on Information Theory) & IEEE TRANSACTIONS.
OPTIMIZATION of GENERALIZED LT CODES for PROGRESSIVE IMAGE TRANSFER Suayb S. Arslan, Pamela C. Cosman and Laurence B. Milstein Department of Electrical.
1 Using Network Coding for Dependent Data Broadcasting in a Mobile Environment Chung-Hua Chu, De-Nian Yang and Ming-Syan Chen IEEE GLOBECOM 2007 Reporter.
1 Along & across algorithm for routing events and queries in wireless sensor networks Tat Wing Chim Department of Electrical and Electronic Engineering.
1 Implementation and performance evaluation of LT and Raptor codes for multimedia applications Pasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto,
Coding for Multipath TCP: Opportunities and Challenges Øyvind Ytrehus University of Bergen and Simula Res. Lab. NNUW-2, August 29, 2014.
An improved LT encoding scheme with extended chain lengths
Shakeel Ahmad, Raouf Hamzaoui, Marwan Al-Akaidi
CRBcast: A Collaborative Rateless Scheme for Reliable and Energy-Efficient Broadcasting in Wireless Sensor/Actuator Networks Nazanin Rahnavard, Badri N.
Unequal Error Protection for Video Transmission over Wireless Channels
A Block Based MAP Segmentation for Image Compression
Presentation transcript:

Rateless Codes with Optimum Intermediate Performance Ali Talari and Nazanin Rahnavard Oklahoma State University, USA IEEE GLOBECOM 2009 & IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 5, MAY

Outlines Introduction Rateless codes design Evaluation results Conclusion 2

Introduction Intermediate recovery rate is important in video or voice transmission applications where partial recovery of the source packets from received encoded packets is beneficial. This motivates the design of forward error correction (FEC) codes with high intermediate performance. In rateless coding, the employed degree distribution significantly affects the packet recovery rate. 3

Intermediate Performance of Rateless Codes Sujay Sanghavi LIDS, MIT IEEE ITW(Information Theory Workshop)

5

Introduction Sanghavi in [4] – z ∈ [0, ½] the optimum degree distribution has degree one packets only, – the optimum degree distribution has degree two packets only, 6 [4] S. Sanghavi, “Intermediate performance of rateless codes,” IEEE Information Theory Workshop (ITW), pp. 478–482, Sept

Introduction – For an integer m, where It is shown that the optimum degree distribution in this region is given by 7

8

9

Introduction The number of source packets : k Number of received coded packets : n Received overhead by γ, where γ = n / k The ratio of number of recovered packets at the receiver to k by z Finding degree distributions with maximal packet recovery rates in intermediate range, 0 < γ < 1. We define packet recovery rates at 3 values of γ as our conflicting objective functions and employ NSGA-II multi- objective genetic algorithms optimization method to find several degree distributions with optimum packet recovery rates. 10

11

Growth Codes Degree of a codeword “grows” with time At each timepoint codeword of a specific degree has the most utility for a decoder (on average) This “most useful” degree grows monotonically with time R : Number of decoded symbols sink has R1R1 R3R3 R2R2 R4R4 d=1 d=2d=3d=4 Time -> [6] A. Kamra, V. Misra, J. Feldman, and D. Rubenstein, “Growth codes: Maximizing sensor network data persistence,” SIGCOMM Computer Communication Rev., vol. 36, no. 4, pp. 255–266, 2006.

Ideas of Proposed Method Method: – Growth Codes: Been designed for sensor networks in catastrophic or emergency scenarios. To make new received encoded packet useful. – Can be decoded immediately. To avoid new received encoded packet useless. – Cannot be decoded.

Ideas of Proposed Method Growth Codes: – A received encoded packet is immediately useful: if d - 1 of the data used to form this encoded packet are already decoded/known. y4y4 x3x5x6x3x5x6 already decoded data:new received packets: x1x1 x2x2 x3x3 x5x5 x3x3 x5x5   y4y4 x6x6 d = 3 d – 1 data are already decoded.

Ideas of Proposed Method Growth Codes: – A received encoded packet is useless: if all d data used to form a encoded packet are already known. y1y1 x1x3x1x3 already decoded data:new received packets: x1x1 x2x2 x3x3 x5x5 d = 2 d data are already decoded. new received packet is useless.

Ideas of Proposed Method Consider the degree of an encoded packet: – Decoder has decoded r original data. – The probability that new received encoded packet is immediately decodable to the decoder: Number of decoded original data: r Importance of Immediately Decodable Packet : Low Degree : High Degree

Rateless codes design We propose a novel approach that finds degree distributions for high recovery rates throughout intermediate range We select one γ from each region, i.e. γ ∈ {0.5, 0.75, 1}, and define 3 objective functions to be the packet recovery rates at these γ ’s 2 approaches – 1)We consider the infinite asymptotic case similar to existing studies. We formulate packet recovery rates using a technique called And-Or tree analysis [1, 7-9] – 2)We consider finite-length rateless codes with k = 100 and k = 1000 and show how degree distributions vary with k 17 [8] N. Rahnavard and F. Fekri, “Generalization of rateless codes for unequal error protection and recovery time: Asymptotic analysis,” IEEE International Symposium on Information Theory, 2006, pp. 523–527, July [9] N. Rahnavard, B. Vellambi, and F. Fekri, “Rateless codes with unequal error protection property,” IEEE Transactions on Information Theory, vol. 53, pp. 1521–1532, April 2007.

Rateless codes design In And-Or tree analysis technique [1, 7–9] the error rate of iterative decoding of rateless codes is probabilistically formulated for k = ∞ Consider a rateless code with parameters Ω(x) and γ. Let y l be the probability that a packet is not recovered after l decoding iterations 18 [1] P. Maymounkov, “Online codes,” NYU Technical Report TR , [7] M. G. Luby, M. Mitzenmacher, and M. A. Shokrollahi, “Analysis of random processes via And-Or tree evaluation,” (Philadelphia, PA, USA), pp. 364–373, Society for Industrial and Applied Mathematics, 1998.

Rateless codes design Let F denote the corresponding fixed point This fixed point is the final packet error rate of a rateless code with parameters Ω(x) and γ We define 3 objective functions given as fixed points of (2) for γ = 0.5, γ = 0.75, and γ = 1 19

20

21

Evaluation Results The upper bound on rateless codes recovery rates at γ = 0.5, γ = 0.75, and γ = 1 are , and 1 We define F(Ω(x)) as where are the weights assigned to each objective function 22

23

24 Fig. 4. Comparison of the performance of the rateless codes employing designed degree distributions for asymptotic case with the upper bound on rateless codes intermediate performance.

25 The designed degree distributions show a high performance and perform close to upper bound. These degree distributions are optimum in intermediate performance. According to the selected weights the resulting codes have the highest recovery rate at the γ with the highest weight.

26

27 When k = 100, decoder requires larger fraction of degree one packets and lower degree packets are preferred. Degree two packets constitute a high percentage of encoded packets compared to packets of other degrees.

28

29 Fig. 5. Comparison of the performance of the rateless codes employing designed degree distributions for k = 100 with the upper bound on rateless codes intermediate performance. K=100

30 Fig. 5. Comparison of the performance of the rateless codes employing designed degree distributions for k = 1000 with the upper bound on rateless codes intermediate performance. K=1000

31

Conclusions In this paper, we studied the intermediate performance of rateless codes and proposed to employ multi-objective genetic algorithms to find several optimum degree distributions in intermediate range. We used the state-of-the-art optimization algorithm NSGA-II to find the set of optimum degree distributions which are called pareto optimal. 32

References [1] P. Maymounkov, “Online codes,” NYU Technical Report TR , [4] S. Sanghavi, “Intermediate performance of rateless codes,” Information Theory Workshop, ITW ’07. IEEE, pp. 478–482, Sept [5] K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan, “A fast and elitist multiobjective genetic algorithm: NSGA-II,” IEEE Transactions on Evolutionary Computation, vol. 6, pp. 182–197, Apr [6] A. Kamra, V. Misra, J. Feldman, and D. Rubenstein, “Growth codes: Maximizing sensor network data persistence,” SIGCOMM Computer Communication Rev., vol. 36, no. 4, pp. 255– 266, [7] M. G. Luby, M. Mitzenmacher, and M. A. Shokrollahi, “Analysis of random processes via And-Or tree evaluation,” (Philadelphia, PA, USA), pp. 364–373, Society for Industrial and Applied Mathematics, [8] N. Rahnavard and F. Fekri, “Generalization of rateless codes for unequal error protection and recovery time: Asymptotic analysis,” IEEE International Symposium on Information Theory, 2006, pp. 523–527, July [9] N. Rahnavard, B. Vellambi, and F. Fekri, “Rateless codes with unequal error protection property,” IEEE Transactions on Information Theory, vol. 53, pp. 1521–1532, April [10] S. Kim and S. Lee, “Improved intermediate performance of rateless codes,” ICACT 2009, vol. 3, pp. 1682–1686, Feb Valerio Bioglio, Marco Grangetto, Rossano Gaeta, Matteo Sereno: An optimal partial decoding algorithm for rateless codes. IEEE ISIT 2011,pp

An Optimal Partial Decoding Algorithm for Rateless Codes V. Bioglio, M. Grangetto, R. Gaeta, M. Sereno Dipartimento di Informatica Universit`a di Torino IEEE ISIT(International Symposium on Information Theory)

35 Fig. 2. Partial decoding performance of LT codes.

36 Fig. 3. Algorithm complexity vs. k.