7,433 research outputs found

    Expanding window fountain codes for unequal error protection

    Get PDF
    A novel approach to provide unequal error protection (UEP) using rateless codes over erasure channels, named Expanding Window Fountain (EWF) codes, is developed and discussed. EWF codes use a windowing technique rather than a weighted (non-uniform) selection of input symbols to achieve UEP property. The windowing approach introduces additional parameters in the UEP rateless code design, making it more general and flexible than the weighted approach. Furthermore, the windowing approach provides better performance of UEP scheme, which is confirmed both theoretically and experimentally

    Expanding window fountain codes for unequal error protection

    Get PDF
    A novel approach to provide unequal error protection (UEP) using rateless codes over erasure channels, named Expanding Window Fountain (EWF) codes, is developed and discussed. EWF codes use a windowing technique rather than a weighted (non-uniform) selection of input symbols to achieve UEP property. The windowing approach introduces additional parameters in the UEP rateless code design, making it more general and flexible than the weighted approach. Furthermore, the windowing approach provides better performance of UEP scheme, which is confirmed both theoretically and experimentally. © 2009 IEEE

    Expanding window fountain codes for unequal error protection

    Get PDF
    A novel approach to provide unequal error protection (UEP) using rateless codes over erasure channels, named Expanding Window Fountain (EWF) codes, is developed and discussed. EWF codes use a windowing technique rather than a weighted (non-uniform) selection of input symbols to achieve UEP property. The windowing approach introduces additional parameters in the UEP rateless code design, making it more general and flexible than the weighted approach. Furthermore, the windowing approach provides better performance of UEP scheme, which is confirmed both theoretically and experimentally. © 2009 IEEE

    Enhancing multi-source content delivery in content-centric networks with fountain coding

    Get PDF
    Fountain coding has been considered as especially suitable for lossy environments, such as wireless networks, as it provides redundancy while reducing coordination overheads between sender(s) and receiver(s). As such it presents beneficial properties for multi-source and/or multicast communication. In this paper we investigate enhancing/increasing multi-source content delivery efficiency in the context of Content-Centric Networking (CCN) with the usage of fountain codes. In particular, we examine whether the combination of fountain coding with the in-network caching capabilities of CCN can further improve performance. We also present an enhancement of CCN's Interest forwarding mechanism that aims at minimizing duplicate transmissions that may occur in a multi-source transmission scenario, where all available content providers and caches with matching (cached) content transmit data packets simultaneously. Our simulations indicate that the use of fountain coding in CCN is a valid approach that further increases network performance compared to traditional schemes

    Serially Concatenated Luby Transform Coding and Bit-Interleaved Coded Modulation Using Iterative Decoding for the Wireless Internet

    No full text
    In Bit-Interleaved Coded Modulation (BICM) the coding and modulation schemes were jointly optimized for the sake of attaining the best possible performance when communicating over fading wireless communication channels. The iterative decoding scheme of BICM (BICM-ID) invoking an appropriate bit-to-symbol mapping strategy enhances its achievable performance in both AWGN and Rayleigh channels. BICM-ID may be conveniently combined with Luby Transform (LT) codes, which were designed for handling packetized wireless Internet data traffic in erasure channels without retransmitting the corrupted packets. By jointly designing a serially concatenated LT-BICM-ID code, an infinitesimally low Bit Error Rate (BER) is achieved for Signal to Noise Ratios (SNR) in excess of 7.5dB over wireless Internet type erasure channels contaminated by AWGN

    LT Code Design for Inactivation Decoding

    Get PDF
    We present a simple model of inactivation decoding for LT codes which can be used to estimate the decoding complexity as a function of the LT code degree distribution. The model is shown to be accurate in variety of settings of practical importance. The proposed method allows to perform a numerical optimization on the degree distribution of a LT code aiming at minimizing the number of inactivations required for decoding.Comment: 6 pages, 7 figure
    • …
    corecore