+ All Categories
Home > Documents > Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R....

Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R....

Date post: 15-Jan-2016
Category:
View: 213 times
Download: 0 times
Share this document with a friend
56
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami
Transcript
Page 1: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Threshold Phenomena and Fountain Codes

Amin Shokrollahi

EPFL

Parts are joint work with M. Luby, R. Karp, O. Etesami

Page 2: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

BEC(p1)

BEC(p2)

BEC(p3)

BEC(p4)

BEC(p5)

BEC(p6)

Communication on Multiple Unknown Channels

Page 3: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Example: Popular Download

Page 4: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Example: Peer-to-Peer

Page 5: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Example: Satellite

Page 6: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

The erasure probabilities are unknown.

Want to come arbitrarily close to capacity on each of the erasure channels, with minimum amount of feedback.

Traditional codes don’t work in this setting since their rate is fixed.

Need codes that can adapt automatically to the erasure rate of the channel.

Page 7: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Originalcontent

Encoded packetsUsers reconstruct Original content as soon as they receive enough packets

Encoding

Engine

Transmission

Reconstruction time should depend only on size of content

What we Really Want

Page 8: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Content

Enc

Digital buckets

Page 9: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Applications: Multi-site downloads

Server 1 Server 2

Content

Reception from multiple servers

Page 10: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Applications: Path Diversity

Page 11: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Sender 1 Sender 2 Sender 3

Rec 1 Rec2 Rec 3

Applications: Peer-2-Peer

Page 12: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Fountain Codes

Sender sends a potentially limitless stream of encoded bits.

Receivers collect bits until they are reasonably sure that they can recover the content from the received bits, and send STOP feedback to sender.

Automatic adaptation: Receivers with larger loss rate need longer to receive the required information.

Want that each receiver is able to recover from the minimum possible amount of received data, and do this efficiently.

Page 13: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Fountain Codes

Fix distribution on , where is number of input symbols.

For every output symbol sample independently from and add input symbols corresponding to sampled subset.

Page 14: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Distribution on

Fountain Codes

Page 15: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Universality and Efficiency

[Universality] Want sequences of Fountain Codes for which the overhead is arbitrarily small

[Efficiency] Want per-symbol-encoding to run in close to constant time, and decoding to run in time linear in number of output symbols.

Page 16: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Parameters

• Overhead is the fraction of extra symbols needed by the receiver as compared to the number of input symbols (i.e. if k(1+ε) is needed , overhead =ε) – want to be arbitrarily small

• Cost of encoding and decoding – linear in k• Ratelessness – the number of output symbols is not

determined apriori• Space considerations (less important)

Page 17: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

LT-Codes

• Invented by Michael Luby in 1998.

• First class of universal and almost efficient Fountain Codes

• Output distribution has a very simple form

• Encoding and decoding are very simple

Page 18: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

LT-Codes

LT-codes use a restricted distribution on :

Fix distribution on

Distribution is given by

where is the Hamming weight of

Parameters of the code are

Page 19: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

2

Insert header, and send

XOR Choose weight

Choose 2Random originalsymbols

Input symbols

Weight Prob

1 0.055

0.0004

0.32

0.13

0.084

100000

Weight table

The LT Coding Process

Page 20: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Decoding

Page 21: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Decoding

Page 22: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Decoding

Page 23: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Decoding

Page 24: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Decoding

Page 25: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Decoding

Page 26: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Decoding

Page 27: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Decoding

Page 28: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Decoding

Page 29: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Average Degree of Distribution should be

Page 30: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Average Degree of Distribution should be

Not covered

Prob. Non-coverageProb. Decoding error

Ω’(1) = average output node degree

Page 31: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Average Degree of Distribution should be

Not covered

Luby has designed universal LT-codes with average degree around and overhead

i.e. the number of symbols needed is ))/)(log1(( 2 kkkO

Page 32: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

So:

Average degree constant means error probability constant

How can we achieve constant workload per output symbol, and still guarantee vanishing error probability?

Raptor codes achieve this!

Page 33: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Raptor Codes

• Use 2 phases: – pre-code encodes k input symbols into intermediate code

– Apply LT to encode the intermediate code and transmit

• The LT-decoder only needs to recover (1-δ)n of the intermediate

code w.h.p. This only requires constant degree!

Page 34: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

LT-light

Traditional pre-code

Input symbols

– fraction erasures

Raptor Codes

Output symbols

Page 35: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Redundant

Checks

Not covered

Raptor Codes

If pre-code is chosen properly, then the LT-distribution canhave constant average degree, leading to linear time encoding.

Raptor Code is specified by the input length , precode and output distribution .

How do we choose and ?

X

Page 36: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Special Raptor Codes: LT-Codes

LT-Codes are Raptor Codes with trivial pre-code: Need average degree

LT-Codes compensate for the lack of the pre-code with a rather intricate output distribution.

Page 37: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

LT-lite

• Max degree • Degree distribution:

• Average Degree: • W.h.p can decode

/)1(4 D

))1/((1)(

))1()1/((1)(

)1/()1(

DDP

iiiP

P

Diifor 1:

2)2/()2/( where

)1/()(1 DH

)1/()4/()1( wheresymbolsn

Page 38: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

What about pre-code?

• Can use regular LDPC codes such as Tornado, right-regular code, etc.

• But they have high average degree distributions…

Page 39: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Key Point

• An LDPC code can be systematic (I.e. input symbols appear in the set of the output symbols)

• Code rate (k/n) is arbitrarily close to 1, so most intermediate symbols have degree 1

Page 40: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Conclusions

• Encoding and Decoding can be done in time linear in k (or constant time per input symbol)

• The overhead is arbitrarily small as in regular LT codes

• Storage requirement is just the stretch factor n/k and k is arbitrarily close to n

Page 41: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Progressive Giant Component Analysis

A different method for the analysis of the decoder:

Want enough nodes of degree 2 so there exists a giant component in the induced (random) graph on input symbols.

Page 42: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Progressive Giant Component Analysis

First giant component removes -fraction of input symbols.

Residual distribution:

Fraction of residual nodes of degree 2:

Average degree of new induced graph:

Condition:

“Ideal distribution:”

Page 43: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Progressive Giant Component Analysis

Analysis does not use “tree-assumption”, but only properties of induced graph.

Analysis can be used to obtain error bounds for the decoding algorithm.

It can also be used to obtain capacity-achieving distributions on the erasure channel.

A modified version can be used to obtain for capacity-achieving distributions for other symmetric channels.

Page 44: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Nodes of Degree 2

Page 45: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

New output node of degree 2

Information Loss!

Nodes of Degree 2

Page 46: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Fraction of Nodes of Degree 2

If there exists component of linear size (i.e., a giant component), then next output node of degree 2 has constant probability of being useless.

Therefore, graph should not have giant component.

This means that for capacity achieving degree distributions we must have:

On the other hand, if then algorithm cannot start successfully.

So, for capacity-achieving codes:

Page 47: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

The -ary symmetric channel (large )

Double verification decoding (Luby-Mitzenmacher):

If and are correct, then they verify . Remove all of them from graph and continue.

Can be shown that number of correct output symbols needs to be at least

Times number of input symbols.

Page 48: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

The -ary symmetric channel (large )

More sophisticated algorithms: induced graph!

If two input symbols are connected by a correct output symbol, and each of them is connected to a correct output symbol of degree one, then the input symbols are verified. Remove from them from graph.

Page 49: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

The -ary symmetric channel (large )

More sophisticated algorithms: induced graph!

More generally: if there is a path consisting of correct edges, and the two terminal nodes are connected to correct output symbols of degree one, then the input symbols get verified. (More complex algorithms.)

Page 50: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

The -ary symmetric channel (large )

Limiting case: Giant component consisting of correct edges, two correct output symbols of degree one “poke” the component. So, ideal distribution “achieves” capacity.

Page 51: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Binary Memoryless Symmetric Channels

What is the fraction of nodes of degree 2 for capacity-achieving Raptor Codes?

where, in general

and is the LLR of the channel.

Page 52: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.
Page 53: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

General Symmetric Channels: Mimic Proof

Proof is information theoretic: if fraction of nodes of degree 2 is larger by a constant, then :

• Expectation of the hyperbolic tangent of messages passed from input to output symbols at given round of BP is larger than a constant.

• This shows that

• So code cannot achieve capacity.

Page 54: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

General Symmetric Channels: Mimic Proof

Fraction of nodes of degree one for capacity-achieving Raptor Codes:

Therefore, if , and if denote output nodes of degree one, then

Noisy observations of

So

Page 55: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Sequences Designed for the BEC

0.067 0.135 0.194 0.267 0.331 0.391 0.459 0.522 0.584 0.6500.000Normalized SNREb/N0

Bes

t des

igns

(s

o fa

r)

Page 56: Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Parts are joint work with M. Luby, R. Karp, O. Etesami.

Conclusions

• For LT- and Raptor codes, some decoding algorithms can be phrased directly in terms of subgraphs of graphs induced by output symbols of degree 2.

• This leads to a simpler analysis without the use the tree assumption.

• For the BEC, and for the q-ary symmetric channel (large q) we obtain essentially the same limiting capacity-achieving degree distribution, using the giant component analysis.

• An information theoretic analysis gives the optimal fraction of output nodes of degree 2 for general memoryless symmetric channels.

• A graph analysis reveals very good degree distributions, which perform very well experimentally.


Recommended