Welcome to Journal of Beijing Institute of Technology
Volume 23Issue 4
.
Turn off MathJax
Article Contents
HUANG Gai-shi, FEI Ze-song, CAO Cong-zhe, XING Cheng-wen, KUANG Jing-ming. Feedback-based unequal error protection fountain code over device-to-device broadcast[J]. JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2014, 23(4): 534-540.
Citation: HUANG Gai-shi, FEI Ze-song, CAO Cong-zhe, XING Cheng-wen, KUANG Jing-ming. Feedback-based unequal error protection fountain code over device-to-device broadcast[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2014, 23(4): 534-540.

Feedback-based unequal error protection fountain code over device-to-device broadcast

  • Received Date:2013-04-12
  • To enhance encoding efficiency, an unequal error protection (UEP) broadcast scheme based on one additional feedback is proposed. Different from the equal probability selection for source packets in traditional fountain encoding, the proposed scheme calculates the packet loss ratio (PLR) according to the feedback results in systematic broadcast phase (SBP) and then optimizes the selection probability for source packets to guarantee higher level error protection for those source packets with larger PLRs. Thus the amount of unnecessarily redundant encoded packets during encoding broadcast phase (EBP) is decreased significantly. Numerical results show that the proposed scheme can recover 60% more packets than the traditional non-feedback broadcast scheme at the expense of tolerably only one feedback procedure.
  • loading
  • [1]
    Min H, Seo W, Lee J, et al. Reliability improvement using receive mode selection in the device-to-device uplink period underlaying cellular networks[J]. IEEE Transactions on Wireless Communications, 2011,10(2): 413-418.
    [2]
    Yu C, Tirkkonen O, Doppler K, et al. Power optimization of device-to-device communication underlaying cellular communication[C]//IEEE International Communication Conference (ICC), Dresden, Germany, 2009.
    [3]
    Byers J W, Luby M, Mitzenmacher M, et al. A digital fountain approach to asynchronous reliable multicast[J]. IEEE Journal on Selected Areas in Communications, 2002, 20(8): 1528-1540.
    [4]
    Luby M. LT codes[C]//Foundations of Computer Science, The 43rd Annual IEEE Symposium on, Vancouver, BC, Canada, 2002.
    [5]
    Shokrollahi A. Raptor codes [J]. IEEE Transactions on Information Theory,2006,52(6):2551-2567.
    [6]
    Al-Jobouri L, Fleury M, Ghanbari M , et al. Protection modes for segmented video streaming over broadband wireless[C]//Wireless and Mobile Networking Conference (WMNC), Toulouse, France, 2011.
    [7]
    Ahmad S, Hamzaoui R, Al-Akaidi M M, et al. Unequal error protection using fountain codes with applications to video communication[J]. IEEE Transactions on Multimedia, 2011, 13(1): 92-101.
    [8]
    Sorour S, Valaee S. An adaptive network coded retransmission scheme for single-hop wireless multicast broadcast services[J]. IEEE/ACM Transactions on Networking, 2011, 19(3):869-878.
    [9]
    Karp R, Luby M, Shokrollahi A, et al. Finite length analysis of LT codes[C]//Information Theory, International Symposium on, Chicago, USA, 2004.
    [10]
    Simon M K, Alouin M. Digital communication over fading channels[M]. New Jersey: John Wiley & Sons Inc, 2005: 275.
  • 加载中

Catalog

    通讯作者:陈斌, bchen63@163.com
    • 1.

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1368) PDF downloads(17) Cited by()
    Proportional views
    Related

    /

      Return
      Return
        Baidu
        map