Professional Documents
Culture Documents
TECHNOLOGY (IJCET)
ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 5, Issue 3, March (2014), pp. 54-63 IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com
IJCET
IAEME
PERFORMANCE OF COMBINED FOUNTAIN CODE WITH NETWORK CODING OVER WIRELESS CHANNELS
Zainab A. Abduljabbar&Dr.Abdulkareem A. Kadhim
1 2
College of Information Eng. /Al-Nahrain University, Iraq. College of Information Eng. /Al-Nahrain University, Iraq.
ABSTRACT Recent advances in sparse graph codes have led to the proposal of fountain coding (FC). It becomes as an error correction coding scheme of choice for many multicasting and broadcasting systems. Network coding (NC) is used in modern wireless communication networks in order to gain throughput and some other advantages. In this paper, NC is used in conjunction with FC in order to obtain advantages of both techniques. A simple packet based network coding for butterfly network topology with FC is modelled and simulated. The system is tested over different wireless fading channel models and with different FC-NC arrangements.The results of the tests have shown that combined FC and NC techniques improve throughput over the original system without FC by more than (70%) at relatively low signal-to-noise power ratios for the considered models of wireless channels. An optimum bit error rate performance (zero error) is achieved using the combined FC with NC over the original system (i.e using NC without FC) under different channel conditions. Keywords: Fountain Coding, Luby Transform, Network coding, Throughput, Butterfly network. 1. INTRODUCTION 1.1Fountain Code Concepts Practical networks transmission systems are characterized by packet erasure, which traditionally dealt with by retransmission based techniques. However, the tremendous growth that happened recently in data traffic, had led to great interest in erasure codes to overcome the usual problems encountered with the retransmission of the erased packets. Fountain codes (FC) are currently the dominant class of erasure codes [1]. Fountain coding principles are introduced by Byers et al. [2] in 1998. FC can be seen as a code that simulates the action of water falling from a spring into a container [3, 4]. In FC, the transmitter generates a potentially infinite amount of transmitted packets from the source node and the receiver can recover the message from any set of these packets [5]. From this point of view, the rate of a fountain codetends to zero, since the transmission is seen as time unlimited [6]. Thus the
54
International Journal of Computer Engineering and Technology (IJCET), ISSN 097 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 IAEME
fountain codes are rateless codes. Luby Transform T (LT) codes, originally invented by Luby [2], are a class of fountain ountain codes which are universally capacity-achieving capacity achieving for erasure channels. LT code can be decoded with message-passing passing algorithms such as Belief Propagation ropagation (BP) with decoding graph grows incrementally with time as a new packet is received at the destination node node, and a new decoding attempt is made after the arrival of each new packet pa [4]. 1.2 Network Coding NC is an approach used to improve transmission throughput of wireless networks in addition to some other advantages. NC has been suggested to combat the limitations on networks devices and channels in classical networks [7]. With network coding, the router will combine the packets instead of only store-and-forward forward the output messages by routing, thus maximizing the the overall system performance [8]. ]. In its simplest form, NC relies on intermediate nodes to combine (using a linear coding scheme) the incoming packets from different source nodes and then to forward the linearly encoded packets to all destination nodes in a single transmission. Network coding can improve throughput, robustness, complexity, ity, reliability and security [9,10]. [ In wireless networks further improvement in resources such as energy efficiency, delay, wireless bandwidth and interference also can be obtained [8,9]. Each coding node serves as a relay node that combines the incoming packets, from different source nodes, in one encoded packet to be transmitted transmitted to all destination nodes [11]. [ Fig.1 1 shows an example of simple network, where nodes A and B want to exchange their packets via a router. The classical network in Fig. Fig.1(a) needs 4 transmissions to perform complete omplete receptions of packets generated by source nodes A & B via the relay node (R) to their their intended destination nodes. On the other hand and with network coding defined by linear encoding of the incoming packets from source nodes, 3 transmissions are sufficient ufficient as in Fig.1(b) Fig [12].
Figure-1 Fig two node network. 1.3 Research Background The present research is an attempt to combine fountain coding with network coding so that the possible advantages from both th techniques can be exploited. The authors in [13 13] investigated the block error rate (BLER) performance in cooperative communication, through combining fountain code with network coding (NC). Based on this, the error error-tolerant tolerant coding scheme was proposed by means of integrating fountain code with NC in cooperative communication. They showed by simulation results that the proposed scheme can obtain lower BLER compared with detect and forward scheme. In [14] the authors proposed a transmission strategy of FCs over cooperative relay networks. They proved ed that by applying NC to fountain fountain-coded coded packets, the required number of transmissions was reduced over erasure channels and hence the effective throughput was increased. They demonstrated the role of analogue NC and optimal weight selection by applying an and analyzing it over wireless with Rayleigh fading and AWGN channels. In [15] batched sparse (BATS) codes were proposed for transmitting a collection of packets through communication networks employing linear NC which generalized FCs and preserved the properties properties such as ratelessness and low encoding/decoding complexity. They verified theoretically for certain cases and demonstrated numerically for the general cases that BATS codes achieved rates very close to the capacity of linear operator channels. The author in [16 16] ] proposed a series of new encoding and decoding algorithms
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 IAEME
that had the ability to diminish the complexity of Random NC and Rateless Codes, while they approached the optimality bound. After a theoretical analysis of the proposed techniques, they analyzed in various applications for content distribution in peer-to-peer networks, distributed storage systems and network management and monitoring. In the present work, the research is concerned with the performance evaluation and analysis of fountain coding with network coding over wireless networks. The main intension here is to discover the likely advantages of fountain coding when combined with network coding. The remaining parts of the paper are organized as follows: In the next section LT encoder and decoder are described. The model of the network used is to be described in the third section. The topology of network and other main assumptions are given in this section. The fourth section shows the simulation tests results in the form of error probability and the increase in throughput versus channel SNR. The last section deals with the main concluding remarks of the work. 2. LUBY TRANSFORM CODE 2.1 Encoder Operation Each encoded packet is produced from the source packets ; ; ;; as follows [17]: - Randomly choosing a degree of the source packets from a degree distribution (d); the appropriate choice of depends on the source file size K (where the degree distribution will be described in paragraph c). - Choose, uniformly at random, distinct input packets, and set equal to the bitwise sum, modulo-2 addition of those packets. This sum can be done by successively modulo-2 addition of the packets together. This encoding operation defines a sparse-graph connecting encoded packets to source packets.It isassumed that, both the encoder and the decoder have synchronized clocks (to choose identical random degrees and set of connections). So that the degree of each received packet, and to which source packets is connected in the graph are known at the decoder side. 2.2 Decoding Algorithm The decoder's task is to recover S from y =S G , where G is the degree distribution matrix associated with the graph [16]. According to the erasure channel and the BP decoding algorithm used, all messages are either completely uncertain messages or completely certain messages. Uncertain messages assert that a message packet S could have any value, with equal probability, certain messages assert that S has a particular value, with probability one. This simplicity of the messages allows a simple description of the decoding process. The following are the main steps used in decoding of LT code [18]: - Find the node y that is connected to only one S packet. If there is no such y node, this decoding algorithm halts at this point, and fails to recover all the source packets. - Set S =y . - Add S to all y that are connected to S : (1) y = y + S For all n such that G = 1. - Remove all edges connected to the S packet. - Repeat the above until all S are determined.
The above LT decoding process is illustrated in Fig.2, where each packet is just one bit. There are three source packets (shown by the upper circles) and four received packets (shown by the lower rectangles), which have the values; [y ;y ;y ;y ] = [1011] at the start of the algorithm [3, 17]. At the first iteration, the only y node that is connected to a sole source bit is the first y node (panela). Source bit S is then set accordingly as in panel-b. Now, the y node is discarded followed by adding the value of S (i.e. 1) to the all y nodes to which it is connected as in panel-c.
56
S is then disconnected from the graph. At the start of the second iteration (panel-c), the fourth y node is connected to a sole source bitS . S is then set to y (0, in panel-d), and add S to the two y it is connected to (panel-e). Finally, as panel-e shows, two y nodes are both connected to S , and they agree about the value of S , which is restored as in (panel-f).
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 IAEME
Figure-2 decoding example for LT code with K=3 andN=4 [3, 17] 2.3 Robust Soliton Distribution The possibility of always finding new degree-one rows during the process is importantto the BP algorithm. The degree distribution of LT codes is designed to keep the expected number of degreeone rows equal to 1 at each iteration. It is theoretically approved that, the best distribution is the Ideal Soliton Distribution (ISD) defined by the following probability distribution [4]: d=
1/K
for d 1 for d 2, 3, , K
(2)
Using these parameters, the positive function ( ) is calculated: 1, 2, , 1 = log 0 Finally, the RSD (d) is given by [4]: d=
It has been shown in [4] that, this distribution performs poorly in practice because of the large variance for the probability of finding degree-one rows during the BP decoding process. To solve this problem, Luby proposes Robust Soliton Distribution (RSD), originated by ISD with two parameters added. RSD relies on using two parameters c and , in order to ensure that the expected number of the degree-one received nodes during the BP decoding process is about [4]: (3) m = c log K/ K (4)
(5)
57
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 IAEME
...(6)
3. SYSTEMMODEL The network considered in the present work is a wireless network that is interconnected by wireless links. Fig.3 illustrates the basic model used here. S1 and S2 are source nodes, while D1 and D2 are destination nodes. The aim here is to deliver all packets generated from different source nodes to its destination ones with least number of transmissions to increase the overall throughput of the network. S1 and D2 (also S2 and D1) are out of each other's communication range, thus they have a data to be exchanged through the relay node V. The network coding process is applied at packet level (in the network layer) to improve throughput.The relay node creates queues for the arrived packets from each different source. The queue is used here to make the packets ready to be encoded with NC if such opportunity is met. Finally, the relay node sends the network coded packets to the destination nodes in First in First out (FIFO) principle.
Figure-3 network model. Each wireless link together with the required operation at each pair of connected nodes can be represented by the transmission model of Fig.4. This represents a general case for all nodes shown in Fig.3. The source output is either FC-NC coded packets if the source node is a relay node with network coding opportunity, or else FC coded packets without NC (network coding block is not used) that transmit directly from source nodes (S1 and S2) to their corresponding destination nodes (D1 and D2). Also, there is a possibility that source node is a relay node without network coding opportunity. This latter case occurs when there are no packets in the queue of one of the sources at the relay node. In either case, when coding is involved at the relay node, the jth coded packet at the relay node r is given by: (7) where and are the generated packets at source nodes S1and S2, respectively, and denote mod-2 addition.Whether NC is used or not, the contents of the transmitted packets are encoded with FC code (as described in section 2.1) and dealt with as bit stream at the physical layer. The bit stream is then modulated using Binary Phase Shift Keying (BPSK) modulation.
58
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 IAEME
Figure-4 the system model. LT code which is a class of FC is used in this paper. Therefore at the receiving nodes (whether NC is used or not) the received packets are decoded using LT decoder (as in section 2.2). Following the reconstruction of the received packets at the receiving node in the network considered here, it is either passed to the higher layer, if the packets are network uncoded, or else decoded if the intended destination node has sufficient information to do so. At each destination node, the received network coded packet from the relay node is used with the aid of the packet received by direct transmission (network uncoded packets) from its intended source. This means that destination node D1, for example, which already received the packet, can decode the packet as shown below: a r a a b b (8)
Similarly, the packet is decoded at the destination node D2. For more details about the complete algorithm steps for NC and LT code of the intended network can be found in [19]. 4. SIMULATION RESULTS&ASSESSMENT Simulation tests were performed to evaluate the performance of systems considered here with and without network coding. The performance measure covers both the evaluation of Bit Error Rate (BER) and the equivalent normalized throughput. These are determined for different SNR's. The SNR is taken here as the ratio of the average energy per information bit to AWGN noise power spectral density (Eb/No). The BER rate is taken as the ratio average number of errors in receiving the data at all destination nodes to the total number of data bits transmitted by the source nodes [20].Three different channels are considered here, the ideal AWGN channel, flat fading channel and multipath fading channel with three paths. The characteristics of the latter are given by; delays for the paths are 0, 0.4, and 0.9 s, while their gains are 0, -5, and -10 dB, respectively. The multipath fading channel is known in the literature as SUI-3 and widely used to model wireless networks. Details of the actual channel modelling and complete system simulation can be found elsewhere [20].Four different systems are considered in this work, these are:System#1 neither FCnor NCis used, System#2without FC but NC is used, System#3 FC is used but without NC,System#4bothFC& NC are used. The performances of the systems are presented in Fig.5& 6. The BER performance is only shown for the cases were FC is not used (i.e only for System#1 & System#2), since the error will be vanished with fountain coding. This is based on the assumption that FCdecoders (for System#3& System#4) at the destination nodes and the relay node have enough encoded packets. Thus it will produce zero errors for the range of SNR considered in the tests. ThereforeFig.5 shows the BER performances for the systems without FCs. Fig.5 (a) shows the BER performance for the systems without FC code over AWGN channel. This figure shows that both systems (with and without NC)
59
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 IAEME
have the same BER performance at high SNR, with slight difference in favour of NC based system (System#2) at low SNR.This is due to the fact that AWGN channel dose not introduce any distortion. It is clear from Fig.5 (b) and (c) that for both fading channels the improvement of NC at high SNR is relatively large. With fading, more SNR is required to achieve the same BER rate as compared with the case of AWGN channel as expected. Summarizing the BER performance for the channels tested in Fig.5 one can say that the use of FC improves the error performance (no error) on the expense of the overhead in transmitting packets. There is animprovement in systemsthat use NC over fading channels whether FC is used or not.
a) AWGN channel.
c) SUI-3 channel. Figure-5 BER performancesfor system#1 & system#2 Combining FC with NC should improve the throughput in addition to BER performance. Thus Fig.6 provides the performances of different systems, in the form of the resultant throughput, against SNR. In most literature the general definition of the throughput is given by the average rate of data that transmitted successfully from a given source node to its intended destination in a specifiedamount of time. Therefore, the throughput (Th) measure considered here is calculated as
60
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 IAEME
the percentage of all correctly received packets from source nodes (or relay node) to their intended destination nodes in a specified amount of time multiplied by the nominal bit rate. Thus; . (9) Th = . The bit rate considered in the work is 10 Mbps. The three channel models are also considered in the throughput tests. As expected the measured throughput is directly proportional to SNR in general. Further, the improvement in throughput also depends on the topology of the network considered [11]. Fig-6shows that there is always an increase in throughput for the network coded systems over that achieved with uncoded counterparts. Further, the throughputs for FC coded systems (system#3& System#4) at relatively low SNRs are greater than those systems without FC (system#1& System#2).This is due to the fact that FC code always provides the least BER, thus allow more correct packets to be delivered to the destination nodes whether NC is used or not. The advantage of NC is vital, whether the system uses FC code or not, where the throughput performance is improved over all ranges of SNRs. The throughput in either case will reach a steady state value at very high SNR. This is determined by the network topology and the type of coding used. The percentage increase in throughput could be used to compare different systems tested here. For the system using both FC& NC (System#4)this percentage is about 35% as compared to NC without FCsystem (System#2) over AWGN channel at very low SNR ( Eb/No = 0 dB).
a) AWGN channel.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 IAEME
The corresponding percentages over single path fading channel and SUI-3 channel are at least 70%. While the percentageincrease in throughput of the combined FC and NC (System#4) compared to that using FC without NC (System#3) is more than33%, 34%, and 31%over AWGN, single path fading, and SUI-3 channels, respectively. This is valid for SNR greater than 10 dB as shown in the Fig.6.Apart from the better BER performance provided by FC code, it is clear that combining FC with NC will provide improvement in throughput at relatively low SNRs. 5. CONCLUSION A combination of fountain coding (FC) and network coding (NC) arrangementwas studied here aiming to improve system performance.The simulation results have shown that the packet loss in NC can be reduced further with the use of FC. Further improvement in throughput can be achieved also by combining FC with NC especially at low SNRs. The percentage improvements in throughput become clear when models of fading channels are used. As much as 70% increase in throughput can be obtained at relatively low SNRs when FC-NC system is used over the considered models of wireless channels.Finally,the results reveals that FC-NC system reserves the advantages of both Fountain Coding(low BER) andNetwork Coding (throughput improvement) at all ranges of SNRs over wireless fading channels. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] J. Qureshi, C. Foh, & J. Cai, "Primer and Recent Developments on Fountain Codes", Cornell University Library, arXiv: 1305.0918v1 [cs.IT], May 2013. J. Byers, M. Luby, M. Mitzenmacher, & A. Rege, A Digital Fountain Approach to Reliable Distribution of Bulk Data, SIGCOMM, pp. 5667, September 1998. D. MacKay, " Fountain Codes", IEE Proc. Com., UK, Vol. 152, No. 6, pp. 1062-1068, December 2005. M. Luby, "LT Codes", Proc. 43rd, IEEE, Foundations of Computer Science, pp. 271282, 16 19 November 2002. J. Maria, J. Cordeiro, & B. Shishkov, "Software and Data Technologies", 6th International Conference, ICSOFT 2001, Seville, Spain, July 18-21 2011. J. Moreira & P. Farrell, "Essentials of Error-Control Coding", J. Wiley & S. Ltd, England, 2006. G. Kramer, Lecture on Network Coding and Information Theory, Alcatel Lucent, Sep. 2007. R. Ahlswedeet al., "Network information flow," IEEE Transactions on Information Theory, Vol. 46, No. 4, pp. 1204-1216, July 2000. S. Katti, Network Coded Wireless Architecture, Ph.D. Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Aug. 2008. C. Fragouli& E. Soljanin, Network Coding Fundamentals, Foundations and Trends in Networking, Boston, Vol. 2, Issue 1, 2007. T. Ho& D. Lun, Network Coding: An Introduction, Cambridge University Press, New York, 2008. I. Qazi& P. Gandhi, Performance Evaluation of Wireless Network Coding under Practical Settings, Tech. Report TR-07-150, University of Pittsburgh, 2007. M. Yang, J. An, X. Li & L. Yuan, "Combined Fountain Code with Network Coding in Cooperative Communication", IEEE Networks Security Wireless Communications and Trusted Computing (NSWCTC), Vol. 2, pp. 24-27, China, April 2010. E. Kurniawan, S. Sun, K. Yen, & K. Chong, "Network Coded Transmission of Fountain Codes over Cooperative Relay Networks", Institute for Infocomm Research, Connexis, Singapore, May 2010.
62
[14]
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 3, March (2014), pp. 54-63 IAEME
[15] S. Yang & R. Yeung, "Coding for a Network Coded Fountain", IEEE International Symposium on Information Theory Proceedings, pp. 2647-2651, The Chinese University of Hong Kong, Hong Kong SAR, China, 2011. [16] V. Bioglio, "Data Dissemination in Distributed Systems Using Rateless Codes", Ph.D. Dissertation, Univerisita' DegliStudi di Torino, Dipartimento di Informatica, Torino, Italy, 2011. [17] D. MacKay, "Information Theory, Inference, and Learning Algorithms," 1st Ed., Cambridge University Press, Cambridge, UK, 2005. [18] I. Reed and G. Solomon, "Polynomial Codes Over Certain Finite Fields," Journal of the Society of Industrial and Applied Mathematics, Vol. 8, No. 2, pp. 300-304, June 1960. [19] Z. Abduljabbar, "Performance Evaluation of Fountain Codes Based Network Coding," M.Sc. Thesis, Al-Nahrain University, Iraq, February, 2014. [20] A. Mahmood, "Combined Multi Input Multi Output and Network Coding for Wireless Networks", M.Sc. Thesis, Al-Nahrain University, Iraq, June 2012. [21] B. Sklar, Digital Communications: Fundamentals and Applications, 2nd Ed.,Prentice Hall, 2001. [22] Kalpana Chikatwar, Ramesh D and Satish Kannale, Design of ARQ And Hybrid ARQ Protocols For Wireless Channels Using Bch Codes International Journal of Advanced Research in Engineering & Technology (IJARET), Volume 4, Issue 3, 2013, pp. 49 - 54, ISSN Print: 0976-6480, ISSN Online: 0976-6499. [23] S.R.Shankar and Dr.G.Kalivarathan, Feasibility Studies Of Wireless Sensor Network and Its Implications International Journal of Electrical Engineering & Technology (IJEET), Volume 4, Issue 2, 2012, pp. 105 - 111, ISSN Print: 0976-6545, ISSN Online: 0976-6553. [24] S.R.Shankar and Dr.G.Kalivarat han, Prediction of A Reliable Code For Wireless Communication Systems International Journal of Electrical Engineering & Technology (IJEET), Volume 4, Issue 1, 2013, pp. 19 - 26, ISSN Print: 0976-6545, ISSN Online: 09766553.
63