19,650 research outputs found
Exact decoding probability under random linear network coding
In this letter, we compute the exact probability that a receiver obtains N linearly independent packets among K ≥ N received packets, when the sender/s use/s random linear network coding over a Galois Field of size q. Such condition maps to the receiver's capability to decode the original information, and its mathematical characterization helps to design the coding so to guarantee the correctness of the transmission. Our formulation represents an improvement over the current upper bound for the decoding probability, and provides theoretical grounding to simulative results in the literature.Peer ReviewedPostprint (published version
Coded Computation Against Processing Delays for Virtualized Cloud-Based Channel Decoding
The uplink of a cloud radio access network architecture is studied in which
decoding at the cloud takes place via network function virtualization on
commercial off-the-shelf servers. In order to mitigate the impact of straggling
decoders in this platform, a novel coding strategy is proposed, whereby the
cloud re-encodes the received frames via a linear code before distributing them
to the decoding processors. Transmission of a single frame is considered first,
and upper bounds on the resulting frame unavailability probability as a
function of the decoding latency are derived by assuming a binary symmetric
channel for uplink communications. Then, the analysis is extended to account
for random frame arrival times. In this case, the trade-off between average
decoding latency and the frame error rate is studied for two different queuing
policies, whereby the servers carry out per-frame decoding or continuous
decoding, respectively. Numerical examples demonstrate that the bounds are
useful tools for code design and that coding is instrumental in obtaining a
desirable compromise between decoding latency and reliability.Comment: 11 pages and 12 figures, Submitte
Collision Helps - Algebraic Collision Recovery for Wireless Erasure Networks
Current medium access control mechanisms are based on collision avoidance and
collided packets are discarded. The recent work on ZigZag decoding departs from
this approach by recovering the original packets from multiple collisions. In
this paper, we present an algebraic representation of collisions which allows
us to view each collision as a linear combination of the original packets. The
transmitted, colliding packets may themselves be a coded version of the
original packets.
We propose a new acknowledgment (ACK) mechanism for collisions based on the
idea that if a set of packets collide, the receiver can afford to ACK exactly
one of them and still decode all the packets eventually. We analytically
compare delay and throughput performance of such collision recovery schemes
with other collision avoidance approaches in the context of a single hop
wireless erasure network. In the multiple receiver case, the broadcast
constraint calls for combining collision recovery methods with network coding
across packets at the sender. From the delay perspective, our scheme, without
any coordination, outperforms not only a ALOHA-type random access mechanisms,
but also centralized scheduling. For the case of streaming arrivals, we propose
a priority-based ACK mechanism and show that its stability region coincides
with the cut-set bound of the packet erasure network
Random Linear Fountain Code with Improved Decoding Success Probability
In this paper we study the problem of increasing the decoding success
probability of random linear fountain code over GF(2) for small packet lengths
used in delay-intolerant applications such as multimedia streaming. Such code
over GF(2) are attractive as they have lower decoding complexity than codes
over larger field size, but suffer from high transmission redundancy. In our
proposed coding scheme we construct a codeword which is not a linear
combination of any codewords previously transmitted to mitigate such
transmission redundancy. We then note the observation that the probability of
receiving a linearly dependent codeword is highest when the receiver has
received k-1 linearly independent codewords. We propose using the BlockACK
frame so that the codeword received after k-1 linearly independent codeword is
always linearly independent, this reduces the expected redundancy by a factor
of three.Comment: This paper appears in: Communications (APCC), 2016 22nd Asia-Pacific
Conference o
- …