Fountain codes and their typical application in wireless standards like edge
One of the most important technologies used in modern communication systems is channel coding. Channel coding dates back to a paper published by Shannon in 1948 [1] entitled “A Mathematical Theory of Communication”. The basic idea behind channel coding is to send redundant information (parity) toget...
Main Author: | |
---|---|
Other Authors: | |
Published: |
University of Pretoria
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/2263/25381 Grobler, TL 2008, Fountain codes and their typical application in wireless standards like edge, MEng Dissertation, University of Pretoria, Pretoria, viewed yymmdd <http://hdl.handle.net/2263/25381> http://upetd.up.ac.za/thesis/available/etd-01262009-171258/ |
id |
ndltd-netd.ac.za-oai-union.ndltd.org-up-oai-repository.up.ac.za-2263-25381 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-netd.ac.za-oai-union.ndltd.org-up-oai-repository.up.ac.za-2263-253812020-07-01T03:18:41Z Fountain codes and their typical application in wireless standards like edge Grobler, Trienko Lups Olivier, Jan Corne trienkog@gmail.com Tornado codes Belief propagation Noisy decoding Ldpc Lt Low-density parity-check codes Luby-transform codes Fountain code Incremental redundancy Factor graph Edge Enhanced data rates for gsm evolution Articulation principle Sparse graph Raptor codes UCTD One of the most important technologies used in modern communication systems is channel coding. Channel coding dates back to a paper published by Shannon in 1948 [1] entitled “A Mathematical Theory of Communication”. The basic idea behind channel coding is to send redundant information (parity) together with a message to make the transmission more error resistant. There are different types of codes that can be used to generate the parity required, including block, convolutional and concatenated codes. A special subclass of codes consisting of the codes mentioned in the previous paragraph, is sparse graph codes. The structure of sparse graph codes can be depicted via a graphical representation: the factor graph which has sparse connections between its elements. Codes belonging to this subclass include Low-Density-Parity-Check (LDPC) codes, Repeat Accumulate (RA), Turbo and fountain codes. These codes can be decoded by using the belief propagation algorithm, an iterative algorithm where probabilistic information is passed to the nodes of the graph. This dissertation focuses on noisy decoding of fountain codes using belief propagation decoding. Fountain codes were originally developed for erasure channels, but since any factor graph can be decoded using belief propagation, noisy decoding of fountain codes can easily be accomplished. Three fountain codes namely Tornado, Luby Transform (LT) and Raptor codes were investigated during this dissertation. The following results were obtained: <ol> <li>The Tornado graph structure is unsuitable for noisy decoding since the code structure protects the first layer of parity instead of the original message bits (a Tornado graph consists of more than one layer).</li> <li> The successful decoding of systematic LT codes were verified.</li> <li>A systematic Raptor code was introduced and successfully decoded. The simulation results show that the Raptor graph structure can improve on its constituent codes (a Raptor code consists of more than one code).</li></ol> Lastly an LT code was used to replace the convolutional incremental redundancy scheme used by the 2G mobile standard Enhanced Data Rates for GSM Evolution (EDGE). The results show that a fountain incremental redundancy scheme outperforms a convolutional approach if the frame lengths are long enough. For the EDGE platform the results also showed that the fountain incremental redundancy scheme outperforms the convolutional approach after the second transmission is received. Although EDGE is an older technology, it still remains a good platform for testing different incremental redundancy schemes, since it was one of the first platforms to use incremental redundancy. Dissertation (MEng)--University of Pretoria, 2008. Electrical, Electronic and Computer Engineering MEng unrestricted 2013-09-06T21:05:56Z 2009-04-09 2013-09-06T21:05:56Z 2008-09-02 2008 2009-01-26 Dissertation http://hdl.handle.net/2263/25381 Grobler, TL 2008, Fountain codes and their typical application in wireless standards like edge, MEng Dissertation, University of Pretoria, Pretoria, viewed yymmdd <http://hdl.handle.net/2263/25381> E1204/gm http://upetd.up.ac.za/thesis/available/etd-01262009-171258/ ©University of Pretoria 2008 E1204/ University of Pretoria |
collection |
NDLTD |
sources |
NDLTD |
topic |
Tornado codes Belief propagation Noisy decoding Ldpc Lt Low-density parity-check codes Luby-transform codes Fountain code Incremental redundancy Factor graph Edge Enhanced data rates for gsm evolution Articulation principle Sparse graph Raptor codes UCTD |
spellingShingle |
Tornado codes Belief propagation Noisy decoding Ldpc Lt Low-density parity-check codes Luby-transform codes Fountain code Incremental redundancy Factor graph Edge Enhanced data rates for gsm evolution Articulation principle Sparse graph Raptor codes UCTD Grobler, Trienko Lups Fountain codes and their typical application in wireless standards like edge |
description |
One of the most important technologies used in modern communication systems is channel coding. Channel coding dates back to a paper published by Shannon in 1948 [1] entitled “A Mathematical Theory of Communication”. The basic idea behind channel coding is to send redundant information (parity) together with a message to make the transmission more error resistant. There are different types of codes that can be used to generate the parity required, including block, convolutional and concatenated codes. A special subclass of codes consisting of the codes mentioned in the previous paragraph, is sparse graph codes. The structure of sparse graph codes can be depicted via a graphical representation: the factor graph which has sparse connections between its elements. Codes belonging to this subclass include Low-Density-Parity-Check (LDPC) codes, Repeat Accumulate (RA), Turbo and fountain codes. These codes can be decoded by using the belief propagation algorithm, an iterative algorithm where probabilistic information is passed to the nodes of the graph. This dissertation focuses on noisy decoding of fountain codes using belief propagation decoding. Fountain codes were originally developed for erasure channels, but since any factor graph can be decoded using belief propagation, noisy decoding of fountain codes can easily be accomplished. Three fountain codes namely Tornado, Luby Transform (LT) and Raptor codes were investigated during this dissertation. The following results were obtained: <ol> <li>The Tornado graph structure is unsuitable for noisy decoding since the code structure protects the first layer of parity instead of the original message bits (a Tornado graph consists of more than one layer).</li> <li> The successful decoding of systematic LT codes were verified.</li> <li>A systematic Raptor code was introduced and successfully decoded. The simulation results show that the Raptor graph structure can improve on its constituent codes (a Raptor code consists of more than one code).</li></ol> Lastly an LT code was used to replace the convolutional incremental redundancy scheme used by the 2G mobile standard Enhanced Data Rates for GSM Evolution (EDGE). The results show that a fountain incremental redundancy scheme outperforms a convolutional approach if the frame lengths are long enough. For the EDGE platform the results also showed that the fountain incremental redundancy scheme outperforms the convolutional approach after the second transmission is received. Although EDGE is an older technology, it still remains a good platform for testing different incremental redundancy schemes, since it was one of the first platforms to use incremental redundancy. === Dissertation (MEng)--University of Pretoria, 2008. === Electrical, Electronic and Computer Engineering === MEng === unrestricted |
author2 |
Olivier, Jan Corne |
author_facet |
Olivier, Jan Corne Grobler, Trienko Lups |
author |
Grobler, Trienko Lups |
author_sort |
Grobler, Trienko Lups |
title |
Fountain codes and their typical application in wireless standards like edge |
title_short |
Fountain codes and their typical application in wireless standards like edge |
title_full |
Fountain codes and their typical application in wireless standards like edge |
title_fullStr |
Fountain codes and their typical application in wireless standards like edge |
title_full_unstemmed |
Fountain codes and their typical application in wireless standards like edge |
title_sort |
fountain codes and their typical application in wireless standards like edge |
publisher |
University of Pretoria |
publishDate |
2013 |
url |
http://hdl.handle.net/2263/25381 Grobler, TL 2008, Fountain codes and their typical application in wireless standards like edge, MEng Dissertation, University of Pretoria, Pretoria, viewed yymmdd <http://hdl.handle.net/2263/25381> http://upetd.up.ac.za/thesis/available/etd-01262009-171258/ |
work_keys_str_mv |
AT groblertrienkolups fountaincodesandtheirtypicalapplicationinwirelessstandardslikeedge |
_version_ |
1719324460125782016 |