Rateless Coding with Feedback Andrew Hagedorn, Sachin Agarwal, David Starobinski, and Ari Trachtenberg Department of ECE, Boston University, MA, USA IEEE.

Slides:



Advertisements
Similar presentations
Jesper H. Sørensen, Toshiaki Koike-Akino, and Philip Orlik 2012 IEEE International Symposium on Information Theory Proceedings Rateless Feedback Codes.
Advertisements

Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Degree Distribution of XORed Fountain codes
Company LOGO F OUNTAIN C ODES, LT C ODES AND R APTOR C ODES Susmita Adhikari Eduard Mustafin Gökhan Gül.
Performance analysis of LT codes with different degree distribution
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Digital Fountain Codes V. S
José Vieira Information Theory 2010 Information Theory MAP-Tele José Vieira IEETA Departamento de Electrónica, Telecomunicações e Informática Universidade.
D.J.C MacKay IEE Proceedings Communications, Vol. 152, No. 6, December 2005.
Network coding techniques Elena Fasolo Network coding techniques Elena Fasolo PhD Student - SIGNET Group Wireless Systems - Lecture.
LT-AF Codes: LT Codes with Alternating Feedback Ali Talari and Nazanin Rahnavard Oklahoma State University IEEE ISIT (International Symposium on Information.
Gossip Algorithms and Implementing a Cluster/Grid Information service MsSys Course Amar Lior and Barak Amnon.
Data Persistence in Sensor Networks: Towards Optimal Encoding for Data Recovery in Partial Network Failures Abhinav Kamra, Jon Feldman, Vishal Misra and.
Compressive Oversampling for Robust Data Transmission in Sensor Networks Infocom 2010.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Threshold Phenomena and Fountain Codes
Erasure Correcting Codes
Fountain Codes Amin Shokrollahi EPFL and Digital Fountain, Inc.
Sliding-Window Digital Fountain Codes for Streaming of Multimedia Contents Matta C.O. Bogino, Pasquale Cataldi, Marco Grangetto, Enrico Magli, Gabriella.
DNA Research Group 1 Growth Codes: Maximizing Sensor Network Data Persistence Abhinav Kamra, Vishal Misra, Dan Rubenstein Department of Computer Science,
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
1 NETWORK CODING Anthony Ephremides University of Maryland - A NEW PARADIGM FOR NETWORKING - February 29, 2008 University of Minnesota.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
Congestion Control and Fairness for Many-to-One Routing in Sensor Networks Cheng Tien Ee Ruzena Bajcsy Motivation Congestion Control Background Simulation.
Code and Decoder Design of LDPC Codes for Gbps Systems Jeremy Thorpe Presented to: Microsoft Research
RAPTOR CODES AMIN SHOKROLLAHI DF Digital Fountain Technical Report.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Digital Fountain with Tornado Codes and LT Codes K. C. Yang.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Anya Apavatjrut, Katia Jaffres-Runser, Claire Goursaud and Jean-Marie Gorce Combining LT codes and XOR network coding for reliable and energy efficient.
Feng Lu Chuan Heng Foh, Jianfei Cai and Liang- Tien Chia Information Theory, ISIT IEEE International Symposium on LT Codes Decoding: Design.
Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY /5/221.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Rateless Codes with Optimum Intermediate Performance Ali Talari and Nazanin Rahnavard Oklahoma State University, USA IEEE GLOBECOM 2009 & IEEE TRANSACTIONS.
Optimal Degree Distribution for LT Codes with Small Message Length Esa Hyytiä, Tuomas Tirronen, Jorma Virtamo IEEE INFOCOM mini-symposium
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
Shifted Codes Sachin Agarwal Deutsch Telekom A.G., Laboratories Ernst-Reuter-Platz Berlin Germany Joint work with Andrew Hagedorn and Ari Trachtenberg.
An Optimal Partial Decoding Algorithm for Rateless Codes Valerio Bioglio, Rossano Gaeta, Marco Grangetto, and Matteo Sereno Dipartimento di Informatica.
Chih-Ming Chen, Student Member, IEEE, Ying-ping Chen, Member, IEEE, Tzu-Ching Shen, and John K. Zao, Senior Member, IEEE Evolutionary Computation (CEC),
TRICKLE: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks Philip Levis, Neil Patel, Scott Shenker and David.
X1X1 X2X2 Encoding : Bits are transmitting over 2 different independent channels.  Rn bits Correlation channel  (1-R)n bits Wireless channel Code Design:
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
Andrew Liau, Shahram Yousefi, Senior Member, IEEE, and Il-Min Kim Senior Member, IEEE Binary Soliton-Like Rateless Coding for the Y-Network IEEE TRANSACTIONS.
Multimedia Transmission Over Cognitive Radio Networks using Decode-and-Forward Multi-Relays and Rateless Coding Abdelaali Chaoub, Elhassane Ibn-Elhaj National.
UEP LT Codes with Intermediate Feedback Jesper H. Sørensen, Petar Popovski, and Jan Østergaard Aalborg University, Denmark IEEE COMMUNICATIONS LETTERS,
1 Raptor codes for reliable multicast object delivery Michael Luby Digital Fountain.
ON THE INTERMEDIATE SYMBOL RECOVERY RATE OF RATELESS CODES Ali Talari, and Nazanin Rahnavard IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 5, MAY 2012.
A Robust Luby Transform Encoding Pattern-Aware Symbol Packetization Algorithm for Video Streaming Over Wireless Network Dongju Lee and Hwangjun Song IEEE.
Multi-Edge Framework for Unequal Error Protecting LT Codes H. V. Beltr˜ao Neto, W. Henkel, V. C. da Rocha Jr. Jacobs University Bremen, Germany IEEE ITW(Information.
Computer Science Division
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
Reliable Multi-hop Firmware Upload Protocol for mica2 motes. CSE 534 Advanced Networks Dmitri Lusnikov Fall 2004.
Distributed Rateless Codes with UEP Property Ali Talari, Nazanin Rahnavard 2010 IEEE ISIT(International Symposium on Information Theory) & IEEE TRANSACTIONS.
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
OPTIMIZATION of GENERALIZED LT CODES for PROGRESSIVE IMAGE TRANSFER Suayb S. Arslan, Pamela C. Cosman and Laurence B. Milstein Department of Electrical.
Hongjie Zhu,Chao Zhang,Jianhua Lu Designing of Fountain Codes with Short Code-Length International Workshop on Signal Design and Its Applications in Communications,
Error-Correcting Code
1 Implementation and performance evaluation of LT and Raptor codes for multimedia applications Pasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto,
Coding for Multipath TCP: Opportunities and Challenges Øyvind Ytrehus University of Bergen and Simula Res. Lab. NNUW-2, August 29, 2014.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Network coding techniques
An improved LT encoding scheme with extended chain lengths
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
CRBcast: A Collaborative Rateless Scheme for Reliable and Energy-Efficient Broadcasting in Wireless Sensor/Actuator Networks Nazanin Rahnavard, Badri N.
Presentation transcript:

Rateless Coding with Feedback Andrew Hagedorn, Sachin Agarwal, David Starobinski, and Ari Trachtenberg Department of ECE, Boston University, MA, USA IEEE INFOCOM

Outline 1.Introduction 2.Problem Definition 3.Shifted LT (SLT) Codes 4.Experimental Results 5.Conclusion 2

Partial Information Transmission Channel with Erasures Transmitter Receiver Input symbolsReceived Symbols 3

Partial Information Transmission Channel with Erasures Transmitter Receiver Input symbolsReceived Symbols 4

Partial Information Transmission Channel with Erasures Transmitter Receiver Input symbolsReceived Symbols 5

Partial Information Transmission Channel with Erasures Transmitter Receiver Input symbolsReceived Symbols 6

Partial Information Transmission Channel with Erasures Transmitter Receiver Input symbolsReceived Symbols 7

Partial Information Transmission Channel with Erasures Transmitter Receiver Input symbolsReceived Symbols 8

Partial Information Multiple Receivers may have different erasures Transmitter Receiver 1 Receiver 2 Receiver 3 Given the situation of multiple receivers having partial information, how can all of them be updated to full information efficiently, and over a broadcast channel? 9

Partial Information Multiple mobile devices may have out-dated information a.Mobile databases b.Sensor network information aggregation c.RSS updates for devices Broadcaster Mobile device 1 Mobile device 2 Mobile device 3 Latest version of information 10

Problem Definition Given an encoding host with k input symbols and a decoding host with n out of the k input symbols, the goal is to efficiently determine the remaining k-n input symbols at the decoding host. – The encoding host has no information of which k- n input symbols are missing at the decoding host – Different decoding hosts may be missing different input symbols Efficiency 1.Communication complexity – Information transmitted from the encoding host to the decoding host should be close in size to the transmission size of the missing k-n input symbols 2.Computational complexity – The algorithm must be computationally tractable 11

Contribution of this paper – Show that a small amount of feedback, whereby receivers periodically inform the broadcasting sources about the number of successfully decoded input packets, can lead to major communication, memory, and energy usage gains through a judicious modification of the encoding procedure. 12

Rateless Codes - Encoding Used for content distribution over error-prone channels Random choice of edges based on a probability density function At least k Encoded Symbols k input symbols 1 =A+B 2 =B 3 =A+B+C 4 =A+C A B C 13

Rateless Codes - Decoding Used for content distribution over error-prone channels At least k Encoded Symbols 1 =A+B 2 =B 3 =A+B+C 4 =A+C k input symbols Solve Gaussian Elimination, Belief Propagation System of Linear Equations Irrespective of which encoded symbols are lost in the communication channel, as long as sufficient encoded symbols are received, the decoding can retrieve all the k input symbols A B C 14

Decoding Using Belief Propagation Decoded k Input Symbols k+  Encoded Symbols Decoding host Redundant! Decode Input Symbols 15

Digital Fountain Codes LT Codes 1.Class of rateless erasure codes invented by Michael Luby 1 2.Computationally practical (as compared to Random Linear Codes) 3.Fast decoding algorithm based on Belief propagation instead of Gaussian Elimination 4.Form the outer code for Raptor Codes 3, which have linear decoding computational complexity 5.Designed for the case when no input symbols are available at the Decoding host initially Asymptotic Properties 2 Expected number of encoded symbols required for successful decoding Expected decoding computational complexity k: number of input symbols 2 Assuming a constant probability of failure  1 Michael Luby, “LT codes,” in The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002, pp. 271– Amin Shokrollahi, “Raptor codes,” IEEE Transactions on Information Theory, vol. 52, no. 6, 2006, pp. 2551–

Digital Fountain Codes LT Codes’ Robust Soliton Probability Distribution Robust Soliton Probability Distribution  k, Probability of an encoded symbol with degree d is  k (d) Property of releasing degree 1 symbols at a controlled, near- constant rate throughout the decoding process LT code distribution, k = 1000, c = 0.01,   =

18 Real-Time Oblivious Erasure Correcting Amos Beimel, Shlomi Dolev, and Noam Singer IEEE-Information Theory Workshop 2004, San Antonio, Texas [3] Amos Beimel, Shlomi Dolev, and Noam Singer, “Rt oblivious erasure correcting”, IEEE/ACM Trans. Netw., vol. 15, no. 6, pp. 1321–1332, 2007.

19 Traditional Erasure Codes kmessage Decoding kmessage Encoding n>ksymbols Transmission Channel Sender Receiver  kreceived XXXXXX Rate-Less Codes n can be ∞

20 Motivation Problem – Channels with high loss rate – Expensive feed-back channels – Weak receiving devices Current solutions – ARQ – Requires large feed-back – Erasure Codes – Higher Encoding/Decoding complexity, a single feedback message Our goal – Combine their benefits.

21 Real-Time Codes Complexity – Fast symbols generation – Efficient message decoding – Balanced decoding over the entire transmission Decoding rate – Rate in which symbols are decoded

22 Protocol Description Encoded Symbols Feed-back d=3 Calculate degree d Randomly pick d symbols XOR these symbols Transmit encoded symbols Check if exactly 1 symbol missing If so, decode the missing symbol Dump the encoded symbol Transmit the number of decoded symbols r r=4 d=4

23 Conclusions of RT Codes A combined approach between ARQ and Erasure Codes Low memory overhead Low feedback - O(√k) messages

Inefficiency of LT Codes for our Problem k+  Encoded Symbols Decoding host Decode Input Symbols n out of k input symbols are known a priori at the decoding host Many redundant encoded symbols 24

Inefficiency of LT Codes for our Problem The number of these redundant encoded symbols grows with the ratio of input symbols known at the decoder (n) to the total input symbols (k) If n input symbols are known a priori, then an additional LT-encoded symbol will provide no new information to the decoding host with probability …which quickly approaches 1 as n → k 25

Intuitive Fix n known input symbols serve the function of degree 1 encoded symbols, disproportionately skewing the degree distribution for LT encoding We thus propose to shift the Robust Soliton distribution to the right in order to compensate for the additional functionally degree 1 symbols Questions – 1) How? – 2) By how much? 26

Shifted Code Construction Definition The shifted robust soliton distribution is given by – k : the number of input symbols in the system – n : the number of input symbols already known at the decoder – round( ・ ) rounds to the nearest integer Intuition n known input symbols at the decoding host reduce the degree of each encoding symbols by an expected fraction 27

Shifted Code Distribution LT code distribution and proposed Shifted code distribution, with parameters k = 1000, c = 0.01,  = 0.5. The number of known input symbols at the decoding host is set to n = 900 for the Shifted code distribution. The probabilities of the occurrence of encoded symbols of some degrees is 0 with the shifted code distribution. 28

Shifted Code – Communication Complexity Lemma IV.2 A decoder that knows n of k input symbols needs encoding symbols under the shifted distribution to decode all k input symbols with probability at least 1− . Proof We have k-n input symbols comprising the encoded symbols after the n known input symbols are removed from the decoding graph. The expresson follows from Luby‘s analysis. 29

Shifted Code – Average Degree of Encoded Symbol Lemma IV.3 – The average degree of an encoding node under the  k,n distribution is given by Proof – The proof follows from the definitions, since a node with degree d in the μ k distribution will correspond to a node with degree roughly in the shifted code distribution. From Luby‘s analysis,the expresson for the average degree of an LT encoded symbol is 30

Shifted Codes – Computational Complexity Lemma IV.4 – For a fixed , the expected number of edges E removed from the decoding graph upon knowledge of n input symbols at the decoding host is given by E = O (n ln(k − n)) Theorem IV.5 – For a fixed probability of decoding failure , the number of operations needed to decode using a shifted LT code (SLT) is O (k ln(k − n)) *Proof described in: S. Agarwal, A. Hagedorn and A. Trachtenberg, “Rateless Codes Under Partial Information”, Information Theory and Applications Workshop, UCSD, San Diego,

Heuristics for practical implementation 1) Non-uniform restriction on feedback – In fact, most input symbols are decoded after n surpasses a certain value n = αk, 0 ≤ α ≤ 1. – A feedback message containing the most recent value of n is sent only when the average degree changes by a constant (since the previous feedback). – When n < n NU, the average degree of an encoding symbol increases by 32

Heuristics for practical implementation – We limit the feedback to every time the average degree changes by √ log k (from its value at the previous feedback), leading to approximately 1/2√ k feedbacks (obtained by dividing (4) by √logk). – When n ≥ n NU, the heuristic sends at most √ k feedbacks, one each time the degree changes by (at least) √ log k. – This heuristic sends O( √ k) feedbacks as n increases from 0 to k, which is equal to the RT code’s feedback. 33

Heuristics for practical implementation 2) Uniform restriction on feedback – The current value of n is communicated back to the encoder every time n increases by √k, resulting in √k feedbacks as n increases from 0 to k – This heuristic has the advantage of not congesting the feedback channel toward the end of decoding, unlike RT codes and the non-uniform restriction on feedback. 34

35 Fig. 1. Feedback strategies for uniform and non-uniform restrictions on Shifted LT and RT codes. Each circle qualitatively corresponds to a situation in which the current value of n is fed back to the encoder.

Simulation Results c = 0.9 and δ = 0.1 In each round of the simulation an encoded packet is generated and transmitted, and decoding is attempted on the received packet (as well as any stored in memory) at the decoder. If an input symbol is recovered then feedback is sent as dictated by each code. 36

Simulation Results For k=500, on average Shifted LT codes requires 59% less redundancy than RT codes and 21% less redundancy than LT codes (on average, over 100 trials). The feedback channel communication complexity for Shifted LT codes is greater than either RT codes or LT codes. While RT codes is limited by the changes in its degree and LT codes transmits no feedback, the Shifted LT code transmits feedback every time it recovers one or more input symbols. 37

Memory usage 38 Fig. 2. Memory usage at the decoder as a function of the number of transmitted symbols.

Number of encoded symbols required 39 Fig. 3. Number of encoded symbols required to disseminate all k input symbols.

Number of feedback messages sent 40 Fig. 4. The number of feedback messages sent for the different codes for increasing number of input symbols k. The “Shifted LT - no restriction” transmits too many (O(k)) feedbacks and has been left out of this figure.

Number of encoded symbols needed 41 Fig. 5. The number of encoded symbols needed to decode 100 input symbols, as a function of the feedback channel rate.

Number of encoded symbols needed 42 Fig. 6. The number of encoded symbols needed to decode 100 input symbols, as a function of the feedback channel loss rate. The forward channel loss rate is fixed at 5%.

43 Fig. 7. The number of encoded symbols needed to decode 100 input symbols at 50 receiving nodes, for various forwarded packet loss probabilities.

Computational load on the motes 44 Fig. 8. The amount of time required to decode a randomly chosen encoded packet, as a function of the number of encoded symbols already transmitted. 2 TelosB motes, one mote serves a single page (consisting of multiple packets) to the other mote.

Total number of packets transmitted 45 Fig. 9. The total number of packets transmitted on forward and feedback channels in order to disseminate a 5 page program to 10 motes using variants of the Deluge over- the-air programming protocol. 11 motes, one of which broadcast 5 pages in memory (totally 11.5K) to the 10 other motes. All feedback channels from the 10 motes to the broadcaster were set to have a 5% packet loss rate, and the forward channel loss rates were varied from 0% to 9%.

Total energy used 46 Fig. 10. Total energy used by all the motes for communication and decoding during the dissemination of a 5 page program using a variant of the Deluge over-the-air programming protocol.

Conclusion Shifted LT codes provide an easily implemented improvement over existing rateless codes, LT codes and RT codes. The corresponding improvements in communication complexity, energy usage, and, in certain cases, memory requirements are even starker within a broadcast. 47

References [3] Amos Beimel, Shlomi Dolev, and Noam Singer, “Rt oblivious erasure correcting”, IEEE/ACM Trans. Netw., vol. 15, no. 6, pp. 1321–1332, [4] J.W. Hui and D. Culler, “The dynamic behavior of a data dissemination protocol for network programming at scale.”, in SenSys’04, Baltimore, Maryland, USA, Nov [10] A. Hagedorn, D. Starobinski, and A. Trachtenberg, “Rateless deluge: Over-the-air programming of wireless sensor networks using random linear codes”, in IPSN ’08: Proceedings of the 7th International Conference on Information Processing in Sensor Networks, [11] M. Rossi, G. Zanca, L. Stabellini, R. Crepaldi, A. F. Harris, and M. Zorzi, “Synapse: A network reprogramming protocol for wireless sensor networks using fountain codes”, in SECON ’08: Proceedings of the IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks, [13] S. Kokalj-Filipovic, P. Spasojevic, E. Soljanin, and R. Yates, “Arq with doped fountain decoding”, in ISSSTA 08’: International Symposium on Spread Spectrum Techniques and Applications, [14] S. Agarwal, A. Hagedorn, and A. Trachtenberg, “Rateless codes under partial information”, in ITA ’08: Information Theory and Applications Workshop, [17] Phil Levis, “Tossim: Accurate and scalable simulation of entire tinyos applications”, in In Proceedings of the First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003), Weiyao Xiao, Sachin Agarwal, David Starobinski, Ari Trachtenberg: Reliable Wireless Broadcasting with Near-Zero Feedback. IEEE INFOCOM 2010: