Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Similar documents
Optimized BPSK and QAM Techniques for OFDM Systems

Lecture 3: Wireless Physical Layer: Modulation Techniques. Mythili Vutukuru CS 653 Spring 2014 Jan 13, Monday

Lab/Project Error Control Coding using LDPC Codes and HARQ

Study of Performance Evaluation of Quasi Orthogonal Space Time Block Code MIMO-OFDM System in Rician Channel for Different Modulation Schemes

Chapter 2 Overview - 1 -

OFDM Systems For Different Modulation Technique

OFDM AS AN ACCESS TECHNIQUE FOR NEXT GENERATION NETWORK

Performance Evaluation of OFDM System with Rayleigh, Rician and AWGN Channels

Comparative Study of OFDM & MC-CDMA in WiMAX System

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

A Polling Based Approach For Delay Analysis of WiMAX/IEEE Systems

Performance Evaluation of Wireless Communication System Employing DWT-OFDM using Simulink Model

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014

Chapter 2 Overview - 1 -

Orthogonal Frequency Division Multiplexing (OFDM) based Uplink Multiple Access Method over AWGN and Fading Channels

WAVELET OFDM WAVELET OFDM

DESIGN, IMPLEMENTATION AND OPTIMISATION OF 4X4 MIMO-OFDM TRANSMITTER FOR

Digital Television Lecture 5

Orthogonal Frequency Division Multiplexing (OFDM)

Study of Second-Order Memory Based LT Encoders

SPARSE CHANNEL ESTIMATION BY PILOT ALLOCATION IN MIMO-OFDM SYSTEMS

Study of Turbo Coded OFDM over Fading Channel

Comparison of BER for Various Digital Modulation Schemes in OFDM System

II. OFDM SYSTEM MODEL

IJMIE Volume 2, Issue 4 ISSN:

Bit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX

Performance Analysis of OFDM System with QPSK for Wireless Communication

Improving Channel Estimation in OFDM System Using Time Domain Channel Estimation for Time Correlated Rayleigh Fading Channel Model

The throughput analysis of different IR-HARQ schemes based on fountain codes

2.

Lecture 13. Introduction to OFDM

Technical Aspects of LTE Part I: OFDM

Practical issue: Group definition. TSTE17 System Design, CDIO. Quadrature Amplitude Modulation (QAM) Components of a digital communication system

Performance Analysis of WiMAX Physical Layer Model using Various Techniques

A Research Concept on Bit Rate Detection using Carrier offset through Analysis of MC-CDMA SYSTEM

An Overview of PAPR Reduction Techniques In Concerned with OFDM

Digital Fountain Codes System Model and Performance over AWGN and Rayleigh Fading Channels

S.D.M COLLEGE OF ENGINEERING AND TECHNOLOGY

4x4 Time-Domain MIMO encoder with OFDM Scheme in WIMAX Context

TCM-coded OFDM assisted by ANN in Wireless Channels

Performance Analysis of OFDM for Different Digital Modulation Schemes using Matlab Simulation

Performance analysis of OFDM with QPSK using AWGN and Rayleigh Fading Channel

Performance Analysis of Optimal Scheduling Based Firefly algorithm in MIMO system

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

Performance analysis of MISO-OFDM & MIMO-OFDM Systems

Simulation Study and Performance Comparison of OFDM System with QPSK and BPSK

Reduced Complexity by Incorporating Sphere Decoder with MIMO STBC HARQ Systems

UNIFIED DIGITAL AUDIO AND DIGITAL VIDEO BROADCASTING SYSTEM USING ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING (OFDM) SYSTEM

Performance Evaluation of STBC-OFDM System for Wireless Communication

Comparison of MIMO OFDM System with BPSK and QPSK Modulation

Capacity-Achieving Rateless Polar Codes

CHAPTER 4. DESIGN OF ADAPTIVE MODULATION SYSTEM BY USING 1/3 RATE TURBO CODER (SNR Vs BER)

Survey on Effective OFDM Technology for 4G

Iterative Detection and Decoding with PIC Algorithm for MIMO-OFDM Systems

A Novel of Low Complexity Detection in OFDM System by Combining SLM Technique and Clipping and Scaling Method Jayamol Joseph, Subin Suresh

Vector-LDPC Codes for Mobile Broadband Communications

Improving Diversity Using Linear and Non-Linear Signal Detection techniques

BER ANALYSIS OF WiMAX IN MULTIPATH FADING CHANNELS

Error Control and performance Analysis of MIMO-OFDM Over Fading Channels

Basics of Error Correcting Codes

Channel Estimation in Multipath fading Environment using Combined Equalizer and Diversity Techniques

Implementation and Comparative analysis of Orthogonal Frequency Division Multiplexing (OFDM) Signaling Rashmi Choudhary

Key words: OFDM, FDM, BPSK, QPSK.

Orthogonal Frequency Division Multiplexing & Measurement of its Performance

1. INTRODUCTION II. SPREADING USING WALSH CODE. International Journal of Advanced Networking & Applications (IJANA) ISSN:

Implementation of Different Interleaving Techniques for Performance Evaluation of CDMA System

REVIEW OF COOPERATIVE SCHEMES BASED ON DISTRIBUTED CODING STRATEGY

Performance Analysis and Improvements for the Future Aeronautical Mobile Airport Communications System. Candidate: Paola Pulini Advisor: Marco Chiani

Multi-carrier Modulation and OFDM

Packet Permutation PAPR Reduction for OFDM Systems Based on Luby Transform Codes

Implementation of OFDM Modulated Digital Communication Using Software Defined Radio Unit For Radar Applications

Analysis of WiMAX Physical Layer Using Spatial Multiplexing

Comparison of ML and SC for ICI reduction in OFDM system

ANALYSIS OF BER AND SEP OF QPSK SIGNAL FOR MULTIPLE ANENNAS

Implementation of MIMO-OFDM System Based on MATLAB

BER Comparison of DCT-based OFDM and FFT-based OFDM using BPSK Modulation over AWGN and Multipath Rayleigh Fading Channel

Space Time Block Coding - Spatial Modulation for Multiple-Input Multiple-Output OFDM with Index Modulation System

Channel Estimation for Downlink LTE System Based on LAGRANGE Polynomial Interpolation

Evaluation of BER and PAPR by using Different Modulation Schemes in OFDM System

BER Analysis for MC-CDMA

Research Letter Throughput of Type II HARQ-OFDM/TDM Using MMSE-FDE in a Multipath Channel

Lecture #2. EE 471C / EE 381K-17 Wireless Communication Lab. Professor Robert W. Heath Jr.

IEEE C /02R1. IEEE Mobile Broadband Wireless Access <

Performance Analysis of Concatenated RS-CC Codes for WiMax System using QPSK

Channel Estimation by 2D-Enhanced DFT Interpolation Supporting High-speed Movement

Power Efficiency of LDPC Codes under Hard and Soft Decision QAM Modulated OFDM

Mobile & Wireless Networking. Lecture 2: Wireless Transmission (2/2)

Frame Synchronization Symbols for an OFDM System

Performance Analysis Of OFDM Using 4 PSK, 8 PSK And 16 PSK

MC CDMA PAPR Reduction Using Discrete Logarithmic Method

Fundamentals of Digital Communication

Presentation Outline. Advisors: Dr. In Soo Ahn Dr. Thomas L. Stewart. Team Members: Luke Vercimak Karl Weyeneth. Karl. Luke

Analysis of Interference & BER with Simulation Concept for MC-CDMA

Performance Analysis Of OFDM Using QPSK And 16 QAM

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Performance Evaluation of Nonlinear Equalizer based on Multilayer Perceptron for OFDM Power- Line Communication

TSTE17 System Design, CDIO. General project hints. Behavioral Model. General project hints, cont. Lecture 5. Required documents Modulation, cont.

Reliable Wireless Video Streaming with Digital Fountain Codes

Performance Study of MIMO-OFDM System in Rayleigh Fading Channel with QO-STB Coding Technique

Performance Improvement in OFDM System with Interleaving and Blanking over Impulse Noise Environment

Transcription:

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com ISSN: 2321 7782 (Online) Fountain Code Based Encoding Scheme for Erasure Channels Bincy M. Manuel 1 Electronics and Communication Engineering Amal Jyothi College of Engineering Kerala India K. G. Satheesh Kumar 2 Professor and Head of Department Electronics and Communication Engineering Amal Jyothi College of Engineering Kerala India Abstract: This paper proposes a novel coding scheme based on Fountain codes which are error correcting codes for channels with erasure behaviour. Files sent over the internet are chopped into packets and each packet is either received without error or not received. Common methods for communicating over such channels employ a feed-back channel from receiver to sender that is used to control the retransmission of erased packets. These simple retransmission protocols have the advantage that they will work regardless of the erasure probability, but causes increase in traffic over the network. If the erasure probability is large, the number of feedback messages sent by the protocol will be large which leads to inefficient usage of channel bandwidth. Digital fountain codes address this problem very efficiently by creating erasure-correcting codes that require no feedback. In this work, a novel coding scheme based on fountain codes is proposed, which combines the separate coding and the joint coding over all the sub-carriers of OFDM. The simulation results show the robustness of proposed system model. I. INTRODUCTION It is a challenge to communicate both reliably and at a high throughput, because the wireless channel is a hostile environment which suffers from time-varying multi-path propagation and high levels of man-made interference. To overcome the multi-path effect, Orthogonal Frequency Division Multiplexing (OFDM) has become a popular scheme for recent wireless systems which operate at a high bit rate. For the effects of the noise and interference encountered in the transmission of the signal through the wireless channel, error correction coding is used as a means of utilizing wireless channels at full capacity. Over a finite block length, coding jointly over the sub-carriers yields a smaller error probability than can be achieved by coding separately over the sub-carriers at the same rate. This theory has been applied in practical OFDM-based wireless systems. In the current Forward Error Correction (FEC) layer for OFDM systems, the source bits are encoded jointly across the sub-carriers. However, coding can also be done in a crosswise way, which combines the separate coding and the joint coding over all the sub-carriers[1]. It is unknown whether the cross coding approach performs better or worse than the joint coding scheme in OFDM systems. Hence, it is of interest to investigate the performance of the cross coding scheme for OFDM systems. The orthogonal frequency division multiplexing (OFDM) is a common technique in many practical applications. OFDM is a frequency division multiplexing scheme which uses multiple carriers with in the same single channel. The total data rate to be sent in the channel is divided between the various subcarriers. The data do not have to be divided evenly and it do not have to originate from the same information source. Orthogonal frequency division multiplexing is a special case of FDM in which the carriers are orthogonal to each other. The orthogonality of the carrier avoids the necessity of the guard bands that were necessary to allow individual demodulation of subcarriers in an FDM system. The use of orthogonal subcarriers would allow the subcarriers spectra to overlap, thus increasing the spectral efficiency. The OFDM system is implemented in practice using the discrete fourier transform (DFT). Recall from signals and systems theory that the sinusoids of the DFT forms an orthogonal basis set and a signal in the vector space of the 2014, IJARCSMS All Rights Reserved 397 P age

DFT can be represented as a linear combination of the orthogonal sinusoids. One view of the DFT is that the transform essentially correlates its input signal with each of the sinusoidal basis functions. OFDM systems are implemented using a combination of Fast Fourier Transform (FFT) and inverse Fast Fourier Transform (IFFT) blocks as shown in below figure, that are mathematically equivalent versions of the DFT and IDFT, respectively, but more efficient to implement. An OFDM system treats the source symbols (e.g. QPSK or QAM symbols that would be present in a single carrier system) at the transmitter as though they are in the frequency-domain. These symbols are used as the inputs to an IFFT block that brings the signal into the time domain. The IFFT takes in N symbols at a time where N is the number of subcarriers in the system. Each of these N input symbols has a symbol period of T seconds. The basis functions for an IFFT are N orthogonal sinusoids. These sinusoids each have a different frequency and the lowest frequency is DC. Each input symbol acts like a complex weight for the corresponding sinusoidal basis function. Since the input symbols are complex, the value of the symbol determines both the amplitude and phase of the sinusoid for that subcarrier. The IFFT output is the summation of all N sinusoids. Thus the IFFT block provides a simple way to modulate data onto N orthogonal subcarriers. Fig.1 OFDM System The block of N output samples from the IFFT make up a single OFDM symbol. The length of the OFDM symbol is NT where T is the IFFT input symbol period. After some additional processing, the time-domain signal that results from the IFFT is transmitted across the channel. At the receiver, an FFT block is used to process the received signal and bring it into the frequency domain. Ideally, the FFT output will be the original symbols that were sent to the IFFT at the transmitter. When plotted in the complex plane, the FFT output samples will form a constellation, such as 16-QAM. However, there is no notion of a constellation for the time-domain signal. When plotted on the complex plane, the time-domain signal forms a scatter plot with no regular shape. Thus, any receiver processing that uses the concept of a constellation (such as symbol slicing) must occur in the frequency domain. II. FOUNTAIN CODES The basic principle behind the use of erasure codes is that the original source data, in the form of a sequence of k packets, along with additional redundant packets, are transmitted by the sender, and the redundant data can be used to recover lost source data at the receivers. A receiver can reconstruct the original source data once it receives a sufficient number of packets. The main benefit of this approach is that different receivers can recover from different lost packets using the same redundant data. In principle, this idea can greatly reduce the number of retransmissions, as a single retransmission of redundant data can potentially benefit many receivers simultaneously. Digital Fountain Codes concept was first proposed by M. Luby in 2002 and it was also called as universal erasure code because that it can be used independently of channel lossy rate[2]. Digital fountain 2014, IJARCSMS All Rights Reserved ISSN: 2321 7782 (Online) 398 P age

codes use the concept of sparse graph codes as their core. Fountain codes are class of rateless codes designed for binary erasure channels (BEC), in which each code symbol is lost with fixed probability p intransit independent of all other symbols. Properties Regardless of the channel model, any coding scheme that potentially supports the reliable multicast transmission without feedback communication and at the sametime enables the receivers to benefit from the asynchronous data access, must satisfy two basic properties: 1. Ratelessness: encoder can create an arbitrarily large number of encoded symbols, This way, heterogeneous channel conditions can be supported. 2. Equal importance of encoded symbols: on a large scale, each encoded symbol should be an equally important description of the message as any other encoded symbol. This way, in the case of erasure channels, any pattern of loss of encoded symbols is supported and the receivers can benefit from virtually any encoded symbols they observe. Based on the above properties, we can identify the fountain coding scheme for an arbitrary channel model with a probabilistic process that assigns to the message an infinite sequence of encoded symbols, all of which are the evaluations of an independently selected function of the message. LT (Luby Transform) codes are the first class of fountain codes fully realizing the digital fountain paradigm. LT codes are rateless because the encoding algorithm can in principle produce an infinite number of message packets (i.e, the percentage of packets that must be received to decode the message can be arbitrarily small)[3]. LT Encoder Each codeword symbol C n is generated from the message bits sequence as described by the following algorithm: a) Source file is divided into k blocks denoted as m 1,m 2,m 3 upto m k. b) Randomly choose the degree d of the packet from a degree distribution (x). c) Choose uniformly at random d distinct input packets. d) Encoded bit is obtained as bitwise sum (modulo 2) of those d packets. The encoding process defines a bipartite-check graph connected the codeword symbols with original message. The encoding operation can also be described by the generator matrix as given by [C] T = [G][S] T (1) where G is the generator-matrix corresponding to the bipartite check graph, S and C is the original message bits sequence and codeword symbols sequence respectively[4]. The following matrix illustrates the generator matrix corresponds to the bipartite graph Fig. 2 Generator Matrix LT Decoder The LT decoding algorithm is given follows: a) Find a codeword c n connected to only one original message symbol s k. b) Set the value of s k equal to c n : s k= c n.. 2014, IJARCSMS All Rights Reserved ISSN: 2321 7782 (Online) 399 P age

c) Find all the code words that are connected to s k, update these code words by c ni =c n XOR s k. d) Remove the connection from generator-matrix G. e) Repeat steps above until all the message symbols are recovered. Fountain codes are used in data storage applications due to massive savings on the number of storage units for a given level of redundancy and reliability. The requirements of erasure code design for data storage, particularly for distributed storage applications, might be quite different relative to communication or data streaming scenarios. One of the requirements of coding for data storage systems is the systematic form where the original message symbols are part of the coded symbols. Systematic form enables reading off the message symbols without decoding from a storage unit. In addition, since the bandwidth and communication load between storage nodes can be a bottleneck, codes that allow minimum communication are very beneficial particularly when a node fails and a system reconstruction is needed to achieve the initial level of redundancy. In that respect, fountain codes are expected to allow efficient repair process in case of a failure. When a single encoded symbols is lost, it should not require too much communication and computation among other encoded symbols in order to resurrect the lost symbol. In fact, repair latency might sometimes be more important than storage space savings [4]. III. PROPOSED SYSTEM MODEL Fountain codes are designed for communication over Erasure Channels, which means that the encoded packet is either received error free or not received at all. However, the wireless channels are not erasure, but fading and noisy channels. In practical systems, fountain codes are used in combination with other error correction algorithms to convert the noisy channels into erasure channels, often Low-Density Parity-Check (LDPC) codes. LDPC codes together with Cyclic Redundancy Check (CRC) are employed to convert the channel[5]. Fig. 3. Proposed System Model Our FEC encoding scheme is performed in the following order: K source packets are encoded by fountain codes first. To each fountain-encoded packet, a CRC is first added and the packet is encoded by a LDPC code. So the source data is first encoded jointly over all the sub-carriers by fountain codes, then encoded separately over one sub-carrier by LDPC plus CRC codes. At the receiver, each fountain-encoded packet is first LDPC decoded when the SNR is equal to or higher than the threshold. The received packet is discarded if its energy is below the threshold. If the LDPC decoding fails, the received packet is discarded as well. If the LDPC decoding succeeds, the CRC is used to identify the undetected error from LDPC codes. If the CRC decoder fails, the receiver also assumes that the whole packet has been lost. Once the receiver has collected N surviving fountain-encoded packets, it starts to recover the source data. 2014, IJARCSMS All Rights Reserved ISSN: 2321 7782 (Online) 400 P age

IV. SIMULATION RESULTS The bit error rate Vs SNR is plotted for SNR varying from -10 db to 15 db. It is found that as SNR increases the bit error rate performance improves. The performance is further improved with the introduction of fountain codes. The performance of the system has been depicted in the below figure. Fig. 4. Bit Error Rate Vs SNR V. CONCLUSION Fountain coded system is proposed for reliable transmission with low overhead in comparison with the traditional ARQ systems. It handles error management by sending additional packets so that at the event of loss of some packets, the lost information is extracted from the additional packets sent. The fountain codes as a rateless coding scheme find its application in broadcasting environment especially when the channel introduces erasures. The effectiveness of the fountain coding scheme improves as the number of transmitted packets increases as the overhead is reduced with increase in the number of transmitted packets. References 1. Jeon, W.G.; Chang, K.H.; Cho, Y.S. (November 1999). "An equalization technique for orthogonal frequency-division multiplexing systems in timevariant multipath channels". IEEE Transactions on Communications 47 (1): 27 32 2. M. Luby(2002). "LT Codes". Proceedings of the IEEE Symposium on the Foundations of Computer Science: 271 280. 3. Byers, J., Luby, M., Mitzenmacher, M., and Rege, A.: A digital fountain approach to reliable distribution of bulk data. Proc. ACM SIGCOMM 98, 2-4 September 1998. 4. M. Asteris and A. G. Dimakis, (2012). ""Repairable Fountain Codes", In Proc. of 2012 IEEE International Symposium on Information Theory" 5. Xiaoying Shao, Cornelis H. Slump A novel cross coding scheme for OFDM systems IEEE Information Theory Workshop, 2009. AUTHOR(S) PROFILE Ms. Bincy M. Manuel, pursuing Masters Degree in Communication Engineering at Amal Jyothi College of Engineering, Kottayam, Kerala, India. She has obtained her Bachelor Degree from Mahatama Gandhi University, Kerala, India. Mr. K. G. Satheesh Kumar, is the Head of Department of Electronics and Communication Engineering at Amal Jyothi College of Engineering, Kottayam, Kerala, India. His areas of interest include Wireless Communication,VLSI, Analog Circuits and Digital Electronics. 2014, IJARCSMS All Rights Reserved ISSN: 2321 7782 (Online) 401 P age