Conference PaperPDF Available

Coding Schemes for an Erasure Relay Channel

Authors:

Abstract and Figures

This paper considers a simple network consisting of a source, a destination, and a relay. In this model, the source-relay and relay-destination links are lossless, while the source-destination link is subject to erasures. Four coding schemes for reliably conveying k symbols from the source to the destination are described. Three of these techniques are adapted directly from well-known point-to-point coding schemes - viz., the use of maximum-distance separable (MDS) codes and Luby Transform (LT) codes. The fourth approach is a new technique using uncoded transmission from the source in conjunction with a relay that transmits a sequence with this property: When the destination subtracts the effects of the unerased symbols from the sequence, what remains is an "LT-like" code for the erased symbols - and this property holds regardless of which symbols were erased on the source-destination link. The four approaches are compared in terms of their complexity and performance.
Content may be subject to copyright.
Coding Schemes for an Erasure Relay Channel
Srinath Puducheri, J¨org Kliewer, and Thomas E. Fuja
Department of Electrical Engineering,
University of Notre Dame, Notre Dame, IN 46556, USA
Email: {spuduche, jkliewer, tfuja}@nd.edu
Abstract This paper considers a simple network consisting
of a source, a destination, and a relay. In this model, the source-
relay and relay-destination links are lossless, while the source-
destination link is subject to erasures. Four coding schemes for
reliably conveying ksymbols from the source to the destination
are described. Three of these techniques are adapted directly
from well-known point-to-point coding schemes - viz., the use of
maximum-distance separable (MDS) codes and Luby Transform
(LT) codes. The fourth approach is a new technique using
uncoded transmission from the source in conjunction with a
relay that transmits a sequence with this property: When the
destination subtracts the effects of the unerased symbols from
the sequence, what remains is an “LT-like” code for the erased
symbols - and this property holds regardless of which symbols
were erased on the source-destination link. The four approaches
are compared in terms of their complexity and performance.
I. INTRODUCTION
Wireless relay networks modelled as erasure relay channels
have been well studied in the literature. For example, in [1]
and [2], the capacities of certain relay channels are derived,
and practical coding schemes based on maximum-distance
separable (MDS) codes are given. In [3] a max-flow min-cut
capacity result is obtained for a particular class of interference-
free wireless erasure networks assuming the decoder has
perfect knowledge about the erasure pattern.
This paper considers a three-node relay network comprised
of a source s, a destination dand a relay r. (See Figure 1.) The
source-relay and source-destination links together constitute
a (physically degraded) broadcast channel, while the relay-
destination link is a point-to-point channel. We assume time-
slotted packetized transmissions (of fixed duration/size) at
both the source and relay. Moreover, the source and relay
transmissions are assumed to occur in different time slots
i.e., a time-division multiplexing (TDM) strategy is used to
control interference between the source and relay transmis-
sions. Finally, the source-relay and relay-destination links are
assumed to be lossless, while the source-destination channel
is modelled as an erasure channel in which each symbol
(or packet) is independently erased with probability ε. In
the presence of physical-layer error-correction, this is a good
higher-layer model for the case when the source-relay and
relay-destination distances are much smaller than the source-
destination distance.
The goal is to communicate kinformation symbols from
the source to the destination in no more than k·(1 + ∆) time
This work was supported in part by the Center for Applied Mathematics,
University of Notre Dame. It was also supported by NSF grant CCF 02-05310,
by German Research Foundation grant KL 1080/3-1, and by the University
of Notre Dame Faculty Research Program.
s
r
d
00
ε
C1C2
Fig. 1. A three-node erasure relay network
slots, where is close to (but necessarily larger than) ǫ. The
feasibility of this task is established in Section II. Then, in
Section III, we discuss two possible approaches one based
on MDS codes, and the other based on LT codes [4]. The
LT-based scheme requires encoding at the source, whereas
the MDS-based scheme does not i.e., the MDS scheme
is systematic. However, the complexity of the MDS scheme
suffers in comparison to that of the LT-based approach.
Motivated by this observation, we propose two systematic
schemes based on LT codes. The first approach adapts sys-
tematic LT codes as developed by Shokrollahi [5]. The second
technique encodes the symbols at the relay in such a way that
the effect of the unerased symbols can be subtracted off at the
destination and what remains resembles an LT sequence for
the erased symbols, regardless of which symbols were erased.
These new schemes are analyzed in Sections III-C and III-D,
respectively.
II. A CUT-SET BOUND
The network in Fig. 1 is a particular kind of degraded
erasure relay channel one in which the destination receives
only the source symbols that are also received by the relay. The
capacity of the general degraded relay channel was derived in
[6]. This section develops an achievable cut-set bound ([7])
for the channel under consideration. Similar bounds for more
general erasure relay channels are in [1], [2].
Let θbe the fraction of time for which the source is
transmitting. Then, across the cut C1(broadcast cut) in
Figure 1, the maximum rate of information transfer is bounded
by θsymbols/time slot. This follows from the fact that every
symbol received by the destination is also received by the
relay, and the capacity of the ideal source-relay channel, when
active, is just one symbol/time slot. Similarly, across the cut
C2(multiple-access cut), the maximum rate of information
transfer is bounded by (1θ)+θ(1ε) = 1θε. Consequently,
the maximum achievable end-to-end rate Ris bounded as
Rmax
θ{min(θ, 1θε)}(1)
=1
1 + εsymbols / time-slot (2)
The maximizing value of θoccurs when the two terms
inside min(·,·)are equal and is hence given by θ= 1/(1+ε).
This bound is achievable, and a coding scheme demonstrating
this is discussed in the next section.
Note that, without the relay, the capacity is 1ε < 1
1+ε.
Further, a capacity of 1
1+εimplies that at least k(1 + ε)time
slots are needed to convey ksymbols of information, and so
it is imperative that the value of for any scheme satisfies
ε. Finally, 1allows routing of all the information
through the relay, thus trivially solving the problem. Hence,
the range of interest for is ε<1.
III. FOUR CODING SCHEMES
Throughout this section, we assume that if nsymbols are
transmitted by the source, then exactly n(1 ε)of those
symbols are successfully received at the destination. Of course,
this is not accurate; rather, the law of large numbers can be
invoked to guarantee that the fraction of symbols successfully
received is arbitrarily close to (1ε). However, assuming that
the fraction is exactly (1 ε)does not substantively change
the coding techniques described, and it simplifies notation.
Since the source-relay and relay-destination links are loss-
less, the optimal TDM strategy is for the source to first
complete its entire transmission and thereby convey all of its
information to the relay, before the relay begins transmitting
to the sink.
Finally, we refer to a scheme in which the source transmits
uncoded information symbols as a systematic scheme.
A. MDS-based scheme
We first consider a simple coding scheme that demonstrates
the achievability of the cut-set bound. Assume that the symbols
to be transmitted are drawn from a finite field. Then the
scheme is as follows:
1) The source first transmits kuncoded information sym-
bols. The relay successfully receives all the symbols,
whereas the destination receives k(1 ε)of them.
2) The relay now encodes the kinformation symbols into
code symbols such that any set of information
symbols erased on the source-destination link can be
recovered from these code symbols. In other words, the
k× generator matrix Gused by the relay must
have the property that every set of rows are linearly
independent. This implies that GTmust be the generator
matrix of a (k, k ε)maximum-distance separable (MDS)
code - e.g., a Reed-Solomon code.
The total number of transmissions in this scheme is k(1+ε),
exactly what is indicated by the cut-set bound. Since this
scheme does not involve any encoding at the source, it is a
systematic scheme. Consequently, all this scheme’s computa-
tional complexity is localized to the relay and the destination.
To estimate complexity, we assume standard Reed-Solomon
encoder/decoder implementations. This means that encoding
requires O(k2ε)symbol operations; this is also the total com-
plexity at the relay. For decoding at the destination, the contri-
bution of the k(1 ε)known symbols is first subtracted from
the symbols sent by the relay this requires O(k2ε(1 ε))
operations; then, we have linear equations in unknowns
and these can be solved with quadratic complexity O(k2ε2)
(as these equations involve a Vandermonde matrix)1. Thus, the
total complexity at the destination is O(k2ε).
Finally, note that the overall code describing symbols sent
from both the source and the relay the code with generator
[Ik×k|G] is not necessarily MDS, i.e., it need not have
the property that every k×ksub-matrix is invertible. So this
scheme explicitly exploits the assumption that all erasures will
occur on the source-to-destination link.
B. LT-based scheme
We now consider a scheme that is non-systematic, i.e., in
which the source transmits encoded symbols.
The codes we consider here are Luby Transform (LT) codes
[4]. LT codes have the property that slightly more than k
code symbols are needed to recover kinformation symbols
unlike MDS codes which require exactly kcode symbols. The
symbols are binary strings and symbol operations consist of
bit-wise XORs. The ith code symbol is generated by XORing
dirandomly chosen information symbols. The integer di,
called the degree of the code symbol, is itself chosen randomly
according to a degree distribution the choice of which is
crucial to the performance of the code. The degree distribution
µ(i),1ik, used in [4] is the robust soliton distribution
(RSD), defined as follows:
µ(i) = ρ(i) + τ(i)
β,for 1ik, (3)
with:
β=
k
X
i=1 ρ(i) + τ(i),(4)
ρ(i) = 1/k, for i= 1,
1/(i(i1)),for 2ik, (5)
τ(i) =
S/ik, for 1ik
S1,
Slog(S/δ)/k, for i=k
S,
0,otherwise, (6)
S=cklog k
δ,(7)
for constants c > 0and δ[0,1]. It is shown in [4] that
k+O(k·log2(k/δ)) LT code symbols suffice to recover k
information symbols with probability at least 1δ. Further-
more, the average encoding complexity per code symbol is
O(log(k/δ)), and the average complexity for decoding all the
information is O(k·log(k)).
1There are asymptotically faster algorithms for this class of MDS codes;
however, in [4] and [5] it is observed that these are often in practice more
complicated to implement than the quadratic complexity schemes.
We now describe a coding scheme for our relay network
based on LT codes:
1) The source transmits ns=k+cklog2(k/δ)LT code
symbols constructed from the kinformation symbols; of
these the destination receives ns(1 ε), while the relay
receives all nssymbols.
2) From the received symbols, the relay decodes the in-
formation and re-encodes it into nr=nsεLT code
symbols, which are transmitted.
3) The destination decodes the information from the nsLT
code symbols received from both the source and relay.
The relay fails to decode with probability at most δ;
conditioned on successful decoding at the relay, the destination
fails with probability at most δ. Thus, the overall failure
probability is at most 2δδ2. Further, the average complexity
at the source is O(nslog(k/δ)) = O(klog(k/δ)). The average
complexity at the relay (decoding + encoding) is given by
O((1 + ε)·klog(k/δ)). Similarly, the average complexity at
the destination is O(klog(k)).
Another important aspect of this coding scheme is the
overhead defined as the number of transmissions required
in excess of the theoretical minimum (k(1 + ε)) indicated
by the cut-set bound. It can be verified that the overhead
of this scheme is given by c(1 + ε)klog2(k). However,
since the overhead is of the form o(k), for large k, the
normalized overhead (= overhead/k) can be made smaller than
its maximum permitted value ε.
Despite their overhead and non-zero failure probability, LT
codes may be preferred over MDS codes owing to their ease of
implementation, especially since they operate over the binary
field while the field size needs to scale as the blocklength
for Reed-Solomon codes. Also, for a given blocklength, the
complexity of encoding and decoding LT codes is significantly
lower than the standard quadratic complexity of MDS codes.
To illustrate the performance of the LT-based scheme,
Figure 2 shows the total number of source/relay transmissions
required for successful delivery of kinformation symbols.
Specifically, these results indicate that, to convey k= 2000
information symbols with a source-to-destination erasure prob-
ability of ǫ= 0.25, an average (mean) of about 2750 trans-
missions are required which results in an average overhead
of about 250 symbols.
A naive systematic scheme based on LT codes could be
implemented by transmitting uncoded symbols from the source
and then constructing the relay’s sequence as before - i.e., by
taking randomly chosen linear combinations of the data, with
the degree of each relay-transmitted symbol selected according
to the RSD. However,this approach performs quite poorly. For
the parameters considered above (k= 2000 and ǫ= 0.25),
about 3280 transmitted symbols are required (on average) to
recover all the source symbols, much worse than the 2750
required with non-systematic LT encoding. This motivates the
use of more sophisticated systematic schemes based on LT
codes, provided in the next two sections.
2500 2700 2900 3100 3300 3500
0
0.02
0.04
0.06
0.08
Total number of transmissions required
Fraction of 50,000 simulations
Fig. 2. Histogram of the number of source and relay LT symbols required
to decode. Parameters: k= 2000,ε= 0.25.
C. Systematic scheme based on LT codes and pre-processing
at the relay
We now describe a scheme based on a less naive approach
to systematic LT coding one proposed by Shokrollahi in [5].
The scheme is as follows:
1) The source transmits kuncoded symbols. Denote these
symbols by the 1×kvector u.
2) The relay performs a decode-and-reencode operation on
the received vector uas follows:
An invertible k×kbinary matrix Gis precomputed
at the relay: First, k+o(k)vectors (each of length
k) are generated by sampling the RSD k+o(k)
times and then randomly selecting from the k-
tuples of appropriate weight. With high probability,
these vectors contain a linearly independent set of
size k, which may be identified using the belief-
propagation algorithm. The identified vectors are the
columns of G.
Given the ksymbols from the source, the relay
generates a 1×kvector vsuch that u=v·G.
This can be done without inverting Gby merely
using the BP algorithm to solve for vfrom u, as
the columns of Gcan be permuted to obtain an
upper-triangular matrix [5].
The result is that the vector u“looks like” an LT
code formed from v. The relay now generates and
transmits an additional +o(k)LT code symbols
derived from v.
3) The sink receives a total of k+o(k)code symbols from
which it attempts to decode v. From v, the sink can
recover the erased symbols of u, using the relation
u=v·G.
In practice, the performance of this code can be seen in
Figure 3, a histogram of the number of relay symbols required
for successful decoding when k= 2000 and ǫ= 0.25.
Figure 3 indicates than an average of 650 relay symbols
are required under these circumstances. This translates to an
average overhead of about 150 symbols.
In terms of complexity, this scheme does not involve any
computations at the source. At the relay, the complexity lies
500 700 900 1100 1300 1500
0
0.02
0.04
0.06
0.08
0.1
0.12
Number of relay symbols needed to decode
Fraction of 50,000 simulations
Fig. 3. Histogram of the number of relay symbols required for the scheme
based on systematic LT encoding [5]; parameters: k= 2000,ε= 0.25.
in generating v(given G) and kε LT symbols and is
O(k(1+ε) log(k)). Likewise, the complexity at the destination
is O(k(1 + ε) log(k)). (The dependence on δis omitted.) The
computation of Gis a one-time operation and is hence not
considered here.
D. A new systematic scheme
This section describes a novel approach to the problem a
systematic scheme in which the relay transmits an “LT-like”
sequence that the destination uses to recover the erased sym-
bols. This approach uses a different (non-RSD) distribution to
generate the code symbol degrees at the relay, but it does so
in such a way that the “target” distribution the distribution
of the code symbol degrees over the erased symbols has
properties similar to the RSD.
Assume that the source transmits kuncoded symbols and
the relay transmits m=kcode symbols. Ideally, the m
code symbols would constitute an LT sequence for exactly the
symbols that were erased on the source-destination link,
so the destination could recover the lost symbols with high
probability for monly slightly larger than . However, this
is impossible, as the relay does not know what symbols were
erased on the source-destination channel.
An alternative is to generate mcoded symbols at the relay in
such a way that after subtracting the contribution of the known
symbols at the destination, the mcode symbols constitute an
LT code over the kε unknown symbols. Assume the relay
follows the LT encoding procedure but uses a different degree
distribution p(i),1ik. Then, ideally, we would want the
corresponding degree distribution viewed over any set of
information symbols to be the RSD.
Without loss of generality, assume that the first =
symbols transmitted on the source-destination channel are
erased. Now consider a code symbol of degree igenerated
by the relay, with ichosen according to p(i). Let the reduced
degree jbe the number of symbols in the first positions
that contribute to i. Letting Iand Jdenote the corresponding
random variables, we have:
P r(J=j|I=i) = (
j)(k
ij)
(k
i),(8)
for 0jℓ, j i(k+j). Then, the reduced degree
distribution is given by:
pr(j) = P r(J=j)(9)
=
k
X
i=1
P r(J=j|I=i)·p(i).(10)
So pr(·)is the distribution on the number of information
symbols (among the first such symbols) that contribute to a
particular code symbol. Ideally, we would like to choose p(i)
such that pr(j)is the RSD µ(j)for 1jl. However, this
is clearly impossible since pr(0) 6= 0. Instead we consider the
class of distributions p(i)such that, when pr(·)is computed
using (10), it satisfies
pr(j)1
α·µ(j),1jℓ, (11)
for some α > 1. If (11) is satisfied, then, by following
Chernoff bound-type arguments, with high probability the
number of symbols required to decode the information is at
most αtimes the number required if the RSD had been used
to select the degrees. The main challenge is to obtain a value
of αthat is as close to one as possible to minimize overhead.
For this purpose, we focus on a choice of p(i)with support
over only those degrees of the form i=j for 1j.
Using Stirling’s approximation n!nnen2πn in (8), then
P rJ=j|I=j
ε1
2πj .(12)
Hence:
pr(j)> P rJ=j|I=j
ε·pj
ε(13)
>1
2πj ·pj
ε.(14)
Note from (3)-(6) that the RSD µ(j)is of the form:
µ(j) =
1
β1
j(j1) +1
sj,2j < s,
1
β·1
j(j1) , s< j ℓ,
(15)
where βand sare constants that depend on . Specifically
the degree sis given by
s=
clog(ℓ/δ),(16)
and β>1.
The degrees 1and shave been omitted in (15) and also
in the following development; they are dealt with separately.
Consequently, if we choose p(i)to be of the form
p(i) =
1
αβ1
j(j1) +1
sj, i =j
ε,2j < s,
1
αβ·1
j(j1) , i =j
ε, s< j ℓ,
0,otherwise.(17)
500 700 900 1100 1300 1500
0
0.02
0.04
0.06
0.08
Number of relay symbols needed to decode
Fraction of 50,000 simulations
Fig. 4. Histogram of the number of relay symbols required for the new
systematic scheme; parameters: k= 2000,ε= 0.25.
where αis a normalization constant, then from (14), it is
easily seen that (11) is satisfied for all j(except 1, s) with
αα2π. (18)
We now obtain an upper bound for α. Note that
α<1
β
X
j=2
1
j(j1) +1
βs
s
X
j=2
1
j(19)
<
X
j=2
1
j(j1) +1
s
s
X
j=2
1
j(20)
since 1<1. Further, clearly 1/(j(j1)) j3/2whose
infinite sum converges. Also, note that
1
s
s
X
j=2
1
j<1
2.(21)
Summarizing, α<3, which gives α < 32π.
Recall that degrees 1and swere not included in (15)
correspondingly, the degrees 1 and s were not included
in (17). However, µ(1) and µ(s)tend to zero for large , so
incorporating symbols of these degrees in our code requires
negligible overhead. More precisely: It can be shown that
enough symbols of reduced degree one can be generated using
p(·)as given in (17). Similarly, it can be shown that symbols
of reduced degree scan be accounted for by incorporating a
small additional contribution to p(i)at i=s.
The bound α < 32πsuggests that as many as 7relay
symbols may required so that the destination can recover from
erasures. This is clearly impractical. However, the bounding
techniques are quite loose, and, in practice, far fewer symbols
are actually needed. An example is given in Figure 4.
Figure 4 suggests that, on average, the new scheme requires
about 860 relay symbols to recover from =ǫk = 500
erasures when k= 2000 and ǫ= 0.25; this is a larger average
overhead 360 symbols compared to the 250 symbols
required by the LT-based scheme (Section III-B) and the 150
symbols required by the scheme based on systematic LT codes
(Section III-C). On the positive side, there is a smaller “tail”
of large redundancy for the new scheme; this is illustrated
in Figure 5, which shows the frame erasure rate (FER) as a
0 100 200 300 400 500 600 700 800 900
10−4
10−3
10−2
10−1
100
Overhead
Frame Erasure Rate
Non−systematic LT scheme
Systematic LT code [5]
New systematic scheme
Fig. 5. Frame erasure rate as a function of overhead for k= 2000,ε= 0.25.
function of the overhead for all three schemes, when k= 2000
and ǫ= 0.25. This figure demonstrates that for frame erasure
rates less than (approximately) 102, the new scheme requires
less overhead.
Regarding asymptotic complexity: Using p(i)in (17) as the
degree distribution, the average degree per code symbol is
O(ℓ/ε)(compared to an average degree of O(log()) for
the RSD). Consequently, letting =, the average encoding
and decoding complexity scale as O(k).
IV. REGARDING AN EXTENSION TO RAPTOR CODES
This paper focused on LT codes because they are a key
component in the design of modern erasure correcting codes.
Raptor codes ([5]) consist of an outer “pre-code” and an inner
LT code. The pre-code ensures that, even with a constant
average degree per LT code symbol, good performance is
obtained. Specifically, the degree distribution may be capped
at a maximum degree independent of k. Thus in the context
of the relay network, by using a pre-code at the source, the
degree distribution in (17) could also be capped, ensuring that
the encoding complexity at the relay remains constant.
REFERENCES
[1] R. Khalili and K. Salamatian, “On the achievability of cut-set bound
for a class of erasure relay channels,” in Proc. IEEE Int. Workshop on
Wireless Ad-Hoc Networks, Oulu, Finland, May-June 2004, pp. 275–280.
[2] R. Khalili and K. Salamatian, “On the capacity of erasure relay channel:
multi-relay case, in Proc. IEEE Inform. Theory Workshop, Rotorua, New
Zealand, Aug.-Sept. 2005, pp. 103–107.
[3] A. F. Dana, R. Gowaikar, R. Palanki, B. Hassibi, and M. Effros, “Capacity
of wireless erasure networks, IEEE Trans. Inform. Theory, vol. 52, no.
3, pp. 789–804, Mar. 2006.
[4] M. Luby, “LT codes, in Proc. of the 43rd Annual IEEE Symp. on
Foundations of Comp. Sc., Vancouver, Canada, Nov. 2002, pp. 271–280.
[5] A. Shokrollahi, “Raptor codes,” IEEE Trans. Inf. Theory, vol. 52, no. 6,
pp. 2551–2567, June 2006.
[6] T. Cover and A. A. El Gamal, “Capacity theorems for the relay channel,”
IEEE Trans. Inf. Theory, vol. 25, no. 5, pp. 572–584, Sept. 1979.
[7] T. M. Cover and J. A. Thomas, Elements of Information Theory, John
Wiley & Sons, New York, 1991.
... Our simulations use specific implementations of these two concepts, described in [4] and [6], respectively, but other papers have proposed alternative implementations. More specifically, [8] approaches the " shifted " LT problem from another angle (although it doesn't use the term " shifted " LT) and proposes a different modified version of the RSD. And [9] explores an alternative implementation of a systematic LT code. ...
Conference Paper
Rateless codes are ideal for wireless communication to mobile nodes because such codes are well suited to time-varying channels. In this paper we examine the use of Luby Transform (LT) codes in a broadcast system. The goal of such a system is to deliver messages reliably from a single source node to multiple mobile destination nodes. In some instances, however, the source-destination links have high latency, which limits the efficacy of feedback from destination nodes to the source. Three approaches using LT codes to limit feedback are considered. We find that by using a combination of systematic LT and `shifted' LT codes, we are able to offload a significant amount of data transmission from the source-destination links to the destination-destination links, improving reliability while utilizing less bandwidth.
Article
Full-text available
LT-codes are a new class of codes introduced by Luby for the purpose of scalable and fault-tolerant distribution of data over computer networks. In this paper, we introduce Raptor codes, an extension of LT-codes with linear time encoding and decoding. We will exhibit a class of universal Raptor codes: for a given integer k and any real epsiv>0, Raptor codes in this class produce a potentially infinite stream of symbols such that any subset of symbols of size k(1+epsiv) is sufficient to recover the original k symbols with high probability. Each output symbol is generated using O(log(1/epsiv)) operations, and the original symbols are recovered from the collected ones with O(klog(1/epsiv)) operations. We will also introduce novel techniques for the analysis of the error probability of the decoder for finite length Raptor codes. Moreover, we will introduce and analyze systematic versions of Raptor codes, i.e., versions in which the first output elements of the coding system coincide with the original k elements
Conference Paper
Full-text available
We determine the capacity of a certain class of wireless erasure relay networks. We first find a suitable definition for the "cut-capacity" of erasure networks with broadcast at transmission and no interference at reception. With this definition, a maxflow mincut capacity result holds for the capacity of these networks.
Conference Paper
Full-text available
LT codes are the first realization of a class of erasure codes called universal erasure codes. LT codes are universal in the sense that they are simultaneously near optimal for every erasure channel and they are very efficient as the data length grows. The key to the design and analysis of the LT codes is the introduction and analysis of the LT process. A full analysis of the behavior of the LT process using first principles of probability theory precisely captures the behavior of the data recovery process.
Conference Paper
Full-text available
We consider here a single sender-destination multi-relay channel. The links connecting the nodes are supposed to be erasure where symbols are received correctly without any error, or lost. We consider that the nodes are not able to use any interference cancellation mechanism. The interference might be suppressed through using separated physical channel or thought a time-sharing mechanism. This model is realistic for many practical scenarios in the context of wireless networks. In previous works, the capacity region of broadcast erasure channels as well as the capacity of the single-sender relay channel (under degraded and non-degraded hypothesis) has been derived. This paper extends the previous results to the more general case of multi-relay channels. We derive the cut-set bound for a general (stationary ergodic) multi-relay erasure channel, and we show that it can be reached through a practical linear coding scheme based on MDS codes.
Conference Paper
Full-text available
We consider an erasure relay network sender send an information flow that can be received by a receiver and a relay. The relay forward some part of the information and we assume that relay and sender transmission do not interfere with each other, however the receiver is able to receive in parallel information that are sent from sender and relay on different channels. The interferences between sender and relay transmission might be suppressed by using different sender to receiver and relay to receiver physical channels. This model is realistic for many practical scenarios in the context of wireless networks. As an example, we can give wireless mesh router networks where the relay nodes are IEEE 802.11 access points that acts as routers that route packets between different WIFI channels. The scenario is also applicable to many ad-hoc wireless networks. It is noteworthy that wireless networks appear from the viewpoint of higher layer as erasure channels; packets arrive at destination without errors or they are erased by link layer error-detection mechanisms. This important property is sometime overlooked in the information theoretical literature and it enables a lot of simplification in the analysis. We derive here a capacity region for the described channel where relay and sender activities do not interfere with each other's and the involved channels are erasure channels. The capacity is derived by defining a cut-set type bound and showing it is achievable. This bound does not make any assumption about the relay channel being degraded and use in place the entropy characterization problem solution. Moreover, a practical coding scheme is presented that could be easily implemented in real networks.
Article
Full-text available
In this paper, a special class of wireless networks, called wireless erasure networks, is considered. In these networks, each node is connected to a set of nodes by possibly correlated erasure channels. The network model incorporates the broadcast nature of the wireless environment by requiring each node to send the same signal on all outgoing channels. However, we assume there is no interference in reception. Such models are therefore appropriate for wireless networks where all information transmission is packetized and where some mechanism for interference avoidance is already built in. This paper looks at multicast problems over these networks. The capacity under the assumption that erasure locations on all the links of the network are provided to the destinations is obtained. It turns out that the capacity region has a nice max-flow min-cut interpretation. The definition of cut-capacity in these networks incorporates the broadcast property of the wireless medium. It is further shown that linear coding at nodes in the network suffices to achieve the capacity region. Finally, the performance of different coding schemes in these networks when no side information is available to the destinations is analyzed
Chapter
Consider the following seemingly simple discrete memoryless relay channel: Here Y 1, Y 2 are conditionally independent and conditionally identically distributed given X, that is, \(p(y_1,\, y_2\, |\, x) = p(y_1\, |\, x) p(y_2\, |\, x)\). Also, the channel from Y 1 to Y 2 does not interfere with Y 2. A (2nR, n) code for this channel is a map \(x : 2^{nR} \rightarrow X^n\), a relay function \(r :Y_1^{n}\rightarrow 2^{nC_{0}}\), and a decoding function \(g : 2^{nC_{0}} \times Y_2^{n} \rightarrow 2^{nR}\). The probability of error is given by $$ P_e^{(n)} = P \{\,g(r(y_1),y_2) \ne W\}$$, where W is uniformly distributed over 2nR and $$ p(w, y_1, y_2) = 2^{-nR}\,\, \underset {i=1}{\overset {n}{\Pi}} p(y_{1i}\, |\, x_i(w)) \,\,\underset {i=1}{\overset {n}{\Pi}}\,\, p(y_{2i}\, |\, x_i(w))
Chapter
Information theory answers two fundamental questions in communication theory: what is the ultimate data compression (answer: the entropy H), and what is the ultimate transmission rate of communication (answer: the channel capacity C). For this reason some consider information theory to be a subset of communication theory. We will argue that it is much more. Indeed, it has fundamental contributions to make in statistical physics (thermodynamics), computer science (Kolmogorov complexity or algorithmic complexity), statistical inference (Occam's Razor: “The simplest explanation is best”) and to probability and statistics (error rates for optimal hypothesis testing and estimation). The relationship of information theory to other fields is discussed. Information theory intersects physics (statistical mechanics), mathematics (probability theory), electrical engineering (communication theory) and computer science (algorithmic complexity). We describe these areas of intersection in detail.