Abstract
Distributed fountain coding plays an important role in rateless code research. The reliability and effectiveness of these coding schemes are increasingly challenged with the growing applications. In this paper, a novel multiple-access network with cooperative relay is presented, and a novel enhanced distributed fountain coding scheme for this network is proposed. The overall degree distributions are derived, and the asymptotic decoding performance is analyzed theoretically by employing the And-Or tree method. On this basis, a design method using joint iterative optimization algorithms is proposed to optimize the degree distributions of the sources and relays. Simulation results show that the proposed enhanced distributed fountain codes outperform the existing generalized distributed fountain codes (GDFC) and have a good performance on both lossless and lossy channels. It reveals that the proposed codes can provide unequal error protection (UEP) property for different sources by introducing the extra cooperative relay. The performance improvement is not restricted to the sources connected to the cooperative relay but applies to all sources. With the additional relay, the proposed codes are able to overcome the effects of bad channel conditions caused by terrain, obstacles, and so on, to avoid communication interruptions and improve the reliability of the network.
1. Introduction
Multi-access single-relay networks are typical access networks frequently used in multi-user communications. They generally consist of multiple source nodes, a single relay node, and a single destination node, also known as distributed networks [1,2,3]. Each source node connects to a common relay node and communicates with the destination node through it. Fountain coding for distributed networks can be represented by two-layer concatenated fountain codes. Firstly, each source node performs the first-layer fountain coding on its original information symbols according to the degree distribution, and then sends them to the relay node. Secondly, the relay node performs the second-layer fountain coding by using the network coding method and sends the encoded symbols to the destination node, rather than simply amplifying and forwarding. Finally, at the destination node, the overall degree distribution of the received symbols can be considered a composite function of the degree distributions of the two-layer fountain codes [4,5]. With a carefully designed overall degree distribution, the destination node is guaranteed to be able to decode efficiently using a belief propagation (BP) decoder [6,7].
Distributed fountain coding is an important area in fountain code research. Many researchers have focused on the coding methods [8,9], performance analysis [4,10], and degree distribution design [10,11,12] of distributed fountain codes, aiming to improve the performance and apply them to more network types [13,14,15]. In [1], a distributed fountain coding scheme named DLT (distributed Luby transform) codes was proposed for multiple source networks. By using the deconvolution of robust soliton distribution (RSD) at each source, the resulting bit stream has a degree distribution approximating that of an LT code and has good performance on erasure channels. In [6,16], two novel distributed rateless coding schemes and the corresponding analysis methods were proposed, respectively. Both of them can provide the unequal error protection (UEP) property. A novel generic fountain coding scheme named generalized distributed fountain codes (GDFC) for multiple access networks was proposed and developed in [5,12], which can be applied to several instances and provide strong UEP property across sources. The authors in [17] proposed a new relay combining scheme for DLT codes, which improves the error floor performance of DLT codes over additive white Gaussian noise (AWGN) channels. In [18], the authors proposed an efficient fountain coding scheme with a memory-based strategy to enhance the performance of the Y-network topology in 5G and 6G networks, which can achieve better performance than regular LT codes. A rateless two-way multiply-and-forward relaying system on Rayleigh fading channels was proposed in [19], which outperforms the amplify-and-forward relay scheme with optimized degree distributions. In [20], the authors proposed an opportunistic decoding and recoding mechanism with a coordinative routing algorithm for fountain codes in multi-hop wireless sensor networks, which is superior to the existing opportunistic routing-based fountain coding schemes. The authors in [21] proposed an edge caching scheme in vehicular networks using fountain codes, which can improve the transmission efficiency and successful acquisition rate.
Rateless codes have attracted much attention for their good channel adaptability and have been increasingly used in various communication systems. For example, in [22,23], rateless codes were used in 5G networks and can meet the requirement of ultra-reliable low-latency communications (uRLLC); in [24], a fountain-code-based forward error correction (FEC) technique was used in wireless sensor networks and can extend the network lifetime while decreasing the energy consumption and frame error rates as compared to the automatic repeat request (ARQ) technique; in [25], a rateless-code-based layer-aligned overlapping structure was proposed to transmit video streaming and was verified for good performance on streaming layered videos. In recent years, cooperative relay communications with rateless coding have attracted more and more attention since they can enhance communication reliability and increase the capacity of networks [26,27,28]. The authors in [29] investigated a cooperative communications scheme in multiple-relay networks using fountain codes, which can reduce transmission time and energy consumption. In [30], a dynamic rateless coded cooperation scheme with incremental redundancy was proposed, and the strict carrier synchronization limitation can be relaxed. In [31], a secure transmission strategy by employing rateless codes at the physical layer in a cooperative system was proposed for Industrialist Internet-of-Things (IIoT) applications, which can provide significant benefits relative to fixed-rate codes in terms of achieving secrecy. The authors in [32] developed a fountain-coded cooperative scheme and proposed a rateless-coded-incremental-relay selection algorithm in clustered machine-to-machine networks. The proposed scheme can significantly improve the end-to-end performance than that of non-cooperative direct transmissions. A hybrid-DLT-assisted cooperative relay communication scheme was designed and analyzed in [33], which can significantly reduce transmission latency and energy consumption.
In a typical multiple-access relay network, multiple source nodes transmit information to a destination node via a common relay node. It requires that all source nodes are connected to the same relay node. However, when there are obstacles blocking the links between the relay and some of the sources, or when an emergency event destroys the connections of some source-relay links, the channel conditions will deteriorate dramatically, and connection interruptions may even occur. In this situation, traditional distributed networks can no longer provide reliable and efficient information transmission. Recently, in some literature, unmanned aerial vehicles (UAVs) have been employed as mobile relays to improve the flexibility and reliability of networks [34,35,36]. In these UAV-assisted relay networks, the line-of-sight (LoS) path is important for air-to-ground (A2G) communications [37]. However, it is difficult to predict the existence of LoS paths because of the random appearance of obstacles. A feasible approach is to model and simulate the channel [38] in order to obtain the channel characteristics for the adjustment and optimization of the transmission scheme, such as symmetry-based spectrum mapping methods and ray tracing methods [39]. Another promising approach is using rateless codes on erasure channel models for higher application layers since rateless codes can adapt to varying channel conditions. Considering that conventional distributed fountain coding in poor channels requires more coded symbols to be sent, which results in high overhead and unacceptable latency, this paper proposes a novel enhanced distributed fountain coding scheme employing a cooperative relay. The main contributions of this paper are summarized as follows:
- (1)
- A novel multiple-access network with a cooperative relay is proposed. By introducing an enhanced cooperative relay in a distributed network, the coverage of the relays can be extended, and the transmission efficiency and reliability of the network can be improved. Based on this network model, a novel enhanced distributed fountain coding scheme is proposed.
- (2)
- An improved analysis method is developed to analyze the asymptotic performance of the proposed codes. The expressions of degree distributions are derived and proven. It is shown that there are two kinds of overall degree distributions, corresponding to two source types, respectively. Furthermore, the decoding performance is analyzed theoretically using the And-Or tree method.
- (3)
- A design method of degree distributions using joint iterative optimization algorithms is proposed. Based on the results of the asymptotic performance analysis, the degree distributions of the sources and relays can be optimized in an iterative way.
- (4)
- The effectiveness of the proposed enhanced distributed fountain codes is verified by a series of simulations. The degree distributions are validated to be consistent with the analysis and derivation, and the effectiveness of the optimization method is verified. The proposed codes are validated to have a good performance on both lossless and lossy channels through simulations with different parameter settings.
The proposed coding scheme is able to overcome the effects of bad channel conditions caused by terrain, obstacles, and so on to avoid communication interruptions and improve the reliability of the network. With engineering optimization and design, it can be implemented and effectively used in various scenarios such as wireless sensor networks.
The remainder of this paper is organized as follows. Section 2 proposes a novel multiple-access relay network with a cooperative relay. Section 3 proposes a novel enhanced distributed fountain coding scheme. Section 4 develops an analysis method for the asymptotic performance of the proposed coding scheme. Section 5 proposes an optimization design method for degree distributions. The simulation results are provided in Section 6 to validate the performance of the proposed codes. Discussions and comparisons are given in Section 7. Finally, the conclusions are drawn in Section 8.
2. System Model of Multiple-Access Relay Networks with Cooperative Relay
We consider a communication system based on multiple-access relay networks, as shown in Figure 1. Multiple users transmit information to destination via a common relay . We assume that the channel conditions of the source-relay links between and sources deteriorate dramatically due to obstacles blocking or unexpected damage to the links. In this situation, traditional distributed networks can no longer provide reliable and efficient transmissions. We propose a novel multiple-access multiple-relay network by introducing an additional relay node in a distributed network. The additional relay can be regarded as a cooperative relay to provide enhanced access to certain sources with poor channel conditions. As can be seen from Figure 1, the additional relay is a mobile relay in contrast to a traditional static fixed relay, which can be implemented using drones. It can move to the appropriate locations where the sources with poor link conditions to ensure all sources can be accessed. By making use of a drone as a cooperative relay, this network can provide an additional degree of freedom in terms of movement. As a result, the coverage of the relays can be extended, and the transmission efficiency and reliability of the network can be improved.
Figure 1.
Communication system based on multiple-access multiple-relay networks.
Figure 2 shows the multiple-access relay network model with a cooperative relay for the proposed communication system. The proposed network consists of source nodes , a destination node , and two relay nodes and . We assume that all sources transmit information to destination through relay . The links between and may be in poor channel conditions, so we assume that sources transmit information to the destination via relay additionally.
Figure 2.
Multiple-access relay network model with cooperative relay.
3. Enhanced Distributed Fountain Coding for Multiple-Access Relay Networks with Cooperative Relay
Figure 3 depicts the proposed fountain coding scheme for multiple-access relay networks with cooperative relay shown in Figure 2, named enhanced distributed fountain codes (EDFC). We assume that each source includes independent information symbols. Source performs LT encoding on information symbols with degree distribution . The encoded symbols of each source are forwarded to relay and re-encoded according to degree distribution , which means that chooses encoded symbols from sources with probability according to the probability distribution . Moreover, we assume that sources may be in poor channel conditions, and the encoded symbols from these sources are forwarded to relay additionally. Then performs re-encoding on incoming symbols with degree distribution . The re-encoded symbols from and are sent to destination , which starts to decode using the BP algorithm when it successfully receives sufficient symbols. The entire encoding process can be regarded as a two-layer concatenated fountain code.
Figure 3.
Encoding process for the proposed enhanced distributed fountain codes.
We assume that each source generates the same number of encoded symbols, denoted by . Assuming that the code overhead of source is , we have
where is the overall coding overhead. We divide the transmission of the coded symbols between the source and relay into a number of time slots. In each time slot, each source independently generates a coded symbol and sends it to the relay at the same time. In order to ensure that the relays can receive the coded symbols sent by each source at the same time, each symbol will be stored in buffers of each source-relay link unless it is erased on the erasure channels. The size of each buffer is set to . At the destination, symbols from both relays are received alternately. We assume that half of the symbols received by the destination come from relay and the other half from relay . Similarly, the relay-sink links are set up with similar buffers. In summary, the above coding scheme can be denoted as .
4. Asymptotic Analysis of Proposed Enhanced Distributed Fountain Codes
4.1. Description of Degree Distributions
The degree distribution is an important parameter in determining the performance of fountain codes. In this section, we will discuss the degree distributions of the proposed EDFC and derive the expressions of the asymptotic performance. We assume that the output node-perspective and edge-perspective degree distribution of source are and , respectively. Similarly, we denote and as the output node-perspective and edge-perspective degree distribution of relay , respectively. We assume that the input node-perspective and edge-perspective degree distribution of source are and , respectively.
In the Tanner graph, the connections between an input symbol and encoded symbols are determined after encoding at the source. The re-encoding at the relay will change the connections of the output symbols in the Tanner graph but will not affect the connections of the input symbols. In other words, the re-encoding of the relay will change the output degree distribution of each source but will have no effect on the input degree distribution of each source. Therefore, the input degree distribution still follows a binomial distribution [4,40]. As goes to infinity, the input degree distribution approaches a Poisson distribution asymptotically as follows
where is the average input degree of source .
In point-to-point communication systems, the degree distribution of an LT code is usually a unary function. This is because all the input (or output) nodes follow only one degree distribution, and their degree distribution characteristics can be completely described by a unary function. In the multiple-access relay network with cooperative relay shown in Figure 2 and Figure 3, there are differences among the sources. The number of information symbols can be different for each source, and different degree distributions can be chosen for encoding. Therefore, the resulting degree distribution seen at the destination cannot be represented by a univariate function. In this case, we can introduce multivariate functions and use multivariate degree distributions to describe the overall degree distributions.
Lemma 1.
Let source perform LT encoding with output degree distribution , relay and perform re-encoding with output degree distribution and , respectively. The overall output degree distribution of source for EDFC is as follows:
Proof.
As shown in Figure 2, the multiple-access relay network with a cooperative relay can be regarded as consisting of two distributed networks: One is with sources , relay , and destination ; the other one is with sources , relay , and destination . According to [5], the resulting output node-perspective degree distribution of a distributed network is a composition of the degree distributions of sources and relays. Therefore, the overall output degree distribution of these two networks is and , respectively.
Since only part of the sources are connected to , the overall degree distribution of these sources is different from that of the sources only connected to , so we discuss the overall degree distribution in two cases:
- Case 1: Sources are connected to relay only. Obviously, the overall degree distribution of these sources is .
- Case 2: Sources are connected to relay and simultaneously. The encoded symbols from both relays are received alternately at the destination. We assume that half of these received symbols are from relay and the other half from relay . Then, the overall degree distribution of these sources can be expressed as . □
4.2. Asymptotic Analysis of Decoding Performance
In the proposed EDFC shown in Figure 3, the destination starts decoding when it receives enough symbols and recovers the source information. The destination can treat the two-layer fountain coding process of the sources and relays as equivalent to a single-layer fountain code and performs decoding using the BP algorithm. The asymptotic performance of EDFC can also be analyzed theoretically using the And-Or tree method [4,16]. We can obtain the following lemma.
Lemma 2.
For EDFC with a BP decoder used at destination, the unrecovered rate of source converges to as , where is expressed as follows:
when,
when,
whereis the number of decoding iterations.
Proof.
The destination can regard the two-layer fountain coding process of the sources and relays as a single-layer fountain code. According to [4], the unrecovered rate of source can be represented by
which can be regarded as the unrecovered rate of a single-layer fountain code. By substituting the overall degree distribution in Lemma 1 into (6), we can derive the asymptotic performance of in the following two cases.
- Case 1: The source is connected to relay only. The partial derivative of can be calculated asThe average output degree is the partial derivative of at as followsThe average input degree can be represented byThus, the edge-perspective degree distribution of can be expressed asBy substituting (7) into (6), we can obtain the expression of asymptotic performance in (4).
- Case 2: The source is connected to relay and simultaneously. From Lemma 1, the partial derivative of can be calculated as followsThe average output degree is the partial derivative of at asThe average input degree can be calculated asThe edge-perspective degree distribution can be expressed asFinally, by substituting (11) into (6), we can obtain the expression of asymptotic performance in (5). □
5. Optimization Design of Degree Distributions for Proposed Enhanced Distributed Fountain Codes
The performance of the proposed EDFC is determined by its degree distributions. By using well-designed degree distributions at the sources and relays, the symbols received by the destination can be made to follow a Soliton-like distribution while maintaining a low coding complexity. In this section, a joint optimization method based on Lemma 2 will be presented to optimize the degree distributions and .
According to Lemma 2, for source , the decoding process must be convergent to ensure successful decoding. That is, the decoding failure probability when the iteration number , where . This requires that the decoding failure probability must decrease as the number of decoding iterations increases, i.e., . This is an important basis for the optimization of degree distributions and can be used as an inequality constraint for the optimization equations.
5.1. Optimization of the Relays
We assume that a robust soliton distribution can be used as an initial degree distribution of source , where represents the data block length, is a constant, and is the allowable failure probability.
For relay and , the objective of the optimization is to achieve the desired decoding failure probability while minimizing the overall overhead . By substituting (13) into (1), we can obtain the code overhead as follows
which can be regarded as the objective function. By substituting (5) into the decoding convergence condition , we can obtain
Let be the maximum value of the allowable decoding failure probability and , then we have . To calculate the inequality condition in (16), we can divide the interval into equally spaced subintervals. are equidistant points on , and satisfy the condition . The inequality in (16) must be satisfied on each equidistant point, that is
which can be regarded as an inequality constraint. Therefore, the optimization equation of relay can be expressed as follows
5.2. Optimization of the Sources
Similar to the analysis of degree distribution and asymptotic performance, the optimization of the sources will be discussed in the following two cases.
- Case 1: When , the source is connected to relay only. For source , the objective of the optimization is to achieve the desired decoding failure probability while minimizing the overall overhead . By substituting (9) into (1), we can obtain the code overhead as followswhich can be used as the objective function. By substituting (4) into , we can obtainThe inequality in (20) must be satisfied on all equidistant points , that isThe optimization equation of source () can be expressed as follows
- Case 2: When , the source is connected to relay and simultaneously. Similar to the analysis of Case 1, the optimization equation of source () can be expressed as follows
5.3. Joint Iterative Optimization of Degree Distributions
The above optimization of sources and relays can be performed in a joint and iterative way. The detailed joint iterative optimization process is as follows:
- Choose a robust soliton distribution as the initial value of degree distribution of source ;
- Fix the degree distribution of each source, and optimize degree distributions and of the relays with (18);
- Fix the degree distributions and obtained from step 2, then optimize degree distribution of source () with (22) and optimize degree distribution of source () with (23);
- Repeat steps 2 and 3 until the degree distributions meet the specified requirements.
6. Simulation Results
In this section, simulations will be evaluated to validate the performance on both lossless and lossy channels and verify the asymptotic analysis of the proposed EDFC. The comparison between EDFC and the existing distributed fountain coding scheme GDFC in [5] will also be performed.
6.1. Degree Distributions
For a two-source network with and , we assume that each source uses as its degree distribution with the same parameters , , and . The degree distributions of relays are set up as and . Figure 4a,b compare the theoretical overall degree distributions and the actual overall degree distributions obtained from the simulations, and Figure 4c depicts the absolute values of errors between them. Since the values of degree distribution are mainly located at small degrees, we only depict the distributions for degrees below 50. As shown in Figure 4, the actual overall degree distributions are basically the same as the theoretical ones. The errors between them are less than 3 × 10−4, and the mean square errors of and are 3.67 × 10−7 and 2.28 × 10−7, respectively. It reveals that the simulated overall degree distributions are consistent with the theoretical ones, which verifies the analysis and derivation in Section 4.1.
Figure 4.
(a) The comparison of theoretical values and simulated values of the overall degree distribution ; (b) the comparison of theoretical values and simulated values of the overall degree distribution ; (c) the absolute values of errors between theoretical and simulated overall degree distributions.
Setting , , and initial degree distribution RSD(100, 0.9, 0.5) for each source, Table 1 shows the optimized degree distributions for different values of source number n by using the joint iterative optimization method in Section 5 with only one iteration. Note that when source number , and , when . For simplicity, we only give the values greater than 0.005 in Table 1.
Table 1.
The optimized degree distributions when source number n is 2, 3, and 4.
6.2. Performance on Lossless Source-Relay and Relay-Destination Links
We now consider the simple case where no symbols are erased on each source-relay and relay-destination link. Figure 5 shows the theoretical asymptotic bit error rate (BER) performance before and after the optimization when the source number . Note that the theoretical BER of source and are identical since they have the same connection and the same degree distribution. As shown in Figure 5, it indicates that after the optimization, the BER performance is improved significantly, which verifies the effectiveness of the optimization. For example, when the overall overhead , the BER of is approximately 1/3 of that before optimization and the BER of and is approximately 1/20 of that before optimization. Furthermore, we compare the theoretical BER with the simulated finite-length BER of using optimized degree distributions for in Table 1. It reveals that the simulated BER is consistent with asymptotic BER as the code overhead increases, which verifies the correctness of the optimization method in Section 5. In addition, Figure 5 shows that the BER performance of sources connected to the cooperative relay is improved, whereby the UEP property is obtained by EDFC.
Figure 5.
The comparison of BER performance before and after optimization for EDFC in a three-source network.
Figure 6 and Figure 7 compare the performance of EDFC with GDFC [5] in two-source and four-source networks, respectively. The optimized degree distributions in Table 1 are both used for simulations of these two coding schemes. In a four-source network, source and have similar performances, as do and . Therefore, for simplicity, we only plot the simulated BER curves for and in Figure 7. It reveals that EDFC outperforms GDFC both in two-source and four-source networks, and the performance benefit is not restricted to the sources connected to the cooperative relay but applies to all sources in the network. For example, in Figure 6, when the overall overhead , the BER of for EDFC is approximately 1/25 of that for GDFC, and the BER of for EDFC is approximately 1/150 of that for GDFC. The reason is that EDFC has an additional cooperative relay, which enhances the performance of the source connected to it. Moreover, as a result of the involvement of the cooperative relay, the number of output symbols with degree 1 grows in the Tanner graph, which can increase the decoding success rate of the Tanner graph. Thus, an improvement of the overall performance is obtained.
Figure 6.
BER performance comparison of EDFC and GDFC for two-source networks.
Figure 7.
BER performance comparison of EDFC and GDFC for four-source networks.
6.3. Performance on Lossy Source-Relay and Relay-Destination Links
In this subsection, we consider the lossy channels, in which both source-relay and relay-destination links have erasures. We assume that each source-relay link has the same erasure probability , and each relay-destination link has the same erasure probability . Setting , , , and using the optimized degree distributions in Table 1, Figure 8 shows the BER performance of EDFC versus the relay-destination erasure rate for different source-relay erasure probabilities . It reveals that EDFC suffers performance degradation with the increase in and . The BER performance is similar to the lossless case for and the small erasure rate . Due to the involvement of the extra cooperative relay, it is still possible for EDFC to provide good performance for each source at a moderate erasure probability such as . For example, when and , the BER of can still be as low as . The simulation results reveal that EDFC can reduce the impact of obstacles blocking or burst errors of the channels and provide enhanced protection for lossy channels. It also can provide the UEP property for different sources and improve the overall performance.
Figure 8.
BER performance versus relay-destination erasure rate for EDFC with two sources.
7. Results and Discussions
The complexity of the encoder and decoder of the proposed EDFC is analyzed in this section. For the simplicity of analysis, we assume that each source has the same block length . The complexity of the encoder mainly depends on the average degree of the distribution. According to [41,42], the encoding and BP decoding complexity of point-to-point LT codes are and , respectively. For EDFC with sources, the encoding complexity of sources, relay , and relay are , , and , respectively. The complexity of the BP decoder at the destination can be represented by .
In Table 2, we briefly compare the advantages and disadvantages of the proposed EDFC with three existing methods: Decode-and-forward (DF), DLT, and GDFC. In contrast to the existing methods, EDFC innovatively introduces an extra cooperative relay in a distributed network to solve the problem of connection interruptions. Simulation results show that EDFC has better BER performance on both lossless and lossy channels. It is able to provide an enhanced UEP property and improve the reliability of the networks. The disadvantages of EDFC are the hardware costs due to the additional relay and the increased complexity due to optimization.
Table 2.
Comparison of decode-and-forward, DLT, GDFC, and EDFC.
The novel multiple-access network with a cooperative relay proposed in this paper is suitable to be used in wireless sensor networks. When some of the source-relay channels are in poor conditions and the sensor data cannot be collected, a drone can be used as a mobile cooperative relay and flies to a specified location to collect sensor data. Since both sensors and drones are energy-restricted devices that cannot perform high-complexity computational tasks for long periods of time, it is necessary to study how to reduce the complexity of EDFC in the future.
8. Conclusions
In this paper, we presented a novel multiple-access network with a cooperative relay and proposed a novel enhanced distributed fountain coding scheme based on it. Moreover, we derived the overall degree distributions and analyzed the decoding performance of the proposed EDFC asymptotically by employing the And-Or tree method. Furthermore, we proposed a design method of degree distributions using joint iterative optimization algorithms. Simulation results show that the proposed EDFC obtains better BER performance than the existing GDFC on lossless channels. Moreover, EDFC is able to obtain a good performance at a moderate erasure probability, such as when and . It reveals that the introduction of an extra cooperative relay will not only improve the performance of the sources connected to this cooperative relay but will also enhance the overall performance for all sources and provide a UEP property for different sources. With the additional cooperative relay, EDFC is able to overcome the effects of bad channel conditions caused by terrain, obstacles, and so on to avoid communication interruptions and improve the reliability of the network. In the future, we will study the application of EDFC in wireless sensor networks and consider dynamic network models where cooperative relays are movable and investigate feasible fountain coding schemes.
Author Contributions
Conceptualization, H.S. and H.Z.; methodology, H.S. and J.B.; software, H.S. and J.B.; investigation, H.S. and H.Z.; writing—original draft preparation, H.S.; writing—review and editing, H.S.; funding acquisition, H.S. and H.Z. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded in part by the National Natural Science Foundation of China (Grants No. 92067201, 61871446), in part by the Jiangsu Provincial Key Research and Development Program (Grants No. BE2020084-1, BE2020084-3), and in part by the NUPTSF (Grants No. NY215031, NY217032).
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Acknowledgments
The authors are thankful to anonymous reviewers for their instructive reviewing of the manuscript.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Puducheri, S.; Kliewer, J.; Fuja, T.E. The design and performance of distributed LT codes. IEEE Trans. Inform. Theory 2007, 53, 3740–3754. [Google Scholar] [CrossRef]
- Yang, H.; Jiang, M.; Shen, H.; Zhao, C. A distributed LT code design for multiple-access relay networks subject to erasures. IEEE Commun. Lett. 2015, 19, 509–512. [Google Scholar] [CrossRef]
- Liao, J.; Zhang, L.; Li, T.; Wang, J.; Qi, Q. A generalized design of distributed rateless codes with decreasing ripple size for multiple-access relay networks. Wirel. Netw. 2017, 23, 2177–2188. [Google Scholar] [CrossRef]
- Sejdinović, D.; Piechocki, R.J.; Doufexi, A. AND-OR tree analysis of distributed LT codes. In Proceedings of the 2009 IEEE Information Theory Workshop on Networking and Information Theory, Volos, Greece, 12–10 June 2009; pp. 261–265. [Google Scholar]
- Shao, H.; Xu, D.; Zhang, X. Asymptotic analysis and optimization for generalized distributed fountain codes. IEEE Commun. Lett. 2013, 17, 988–991. [Google Scholar] [CrossRef]
- Sejdinović, D.; Piechocki, R.; Doufexi, A.; Ismail, M. Decentralised distributed fountain coding: Asymptotic analysis and design. IEEE Commun. Lett. 2010, 14, 42–44. [Google Scholar] [CrossRef]
- Shao, H.; Zhu, H.; Bao, J. Analysis and Design of Wireless Distributed Fountain Codes with Multiplicative Network Coding. In Proceedings of the 5th Machine Learning and Intelligent Communications (MLICOM 2020), Shenzhen, China, 26–27 September 2020; pp. 250–264. [Google Scholar]
- Shang, L.; Perrins, E. Optimal Memory Order of Memory-Based LT Encoders for Finite Block-Length Codes over Binary Erasure Channels. IEEE Trans. Commun. 2019, 67, 875–889. [Google Scholar] [CrossRef]
- Okpotse, T.; Yousefi, S. Systematic Fountain Codes for Massive Storage Using the Truncated Poisson Distribution. IEEE T. Commun. 2019, 67, 943–954. [Google Scholar] [CrossRef]
- Song, X.; Cheng, N.; Liao, Y.; Ni, S.; Lei, T. Design and Analysis of LT Codes with a Reverse Coding Framework. IEEE Access 2021, 9, 116552–116563. [Google Scholar] [CrossRef]
- Deng, D.; Xu, D.; Xu, S. Optimisation design of systematic LT codes over AWGN multiple access channel. IET Commun. 2018, 12, 1351–1358. [Google Scholar] [CrossRef]
- Shao, H.; Xu, D.; Zhang, X. The design and analysis of unequal error protection fountain coding for multiple source networks over binary erasure channels. Sci. China Inf. Sci. 2014, 57, 1–9. [Google Scholar] [CrossRef]
- Chen, S.; Effros, M.; Kostina, V. Lossless Source Coding in the Point-to-Point, Multiple Access, and Random Access Scenarios. IEEE T. Inform. Theory 2020, 66, 6688–6722. [Google Scholar] [CrossRef]
- Zheng, Z.; Yuan, L.; Fang, F. Performance Analysis of Fountain Coded Non-Orthogonal Multiple Access with Finite Blocklength. IEEE Wirel. Commun. Lett. 2021, 10, 1752–1756. [Google Scholar] [CrossRef]
- Monir, A.; Mazen, O.H. A Secrecy Study of UAV Based Networks with Fountain Codes and FD Jamming. IEEE Commun. Lett. 2021, 25, 1796–1800. [Google Scholar]
- Talari, A.; Rahnavard, N. Distributed rateless codes with UEP property. In Proceedings of the 2010 IEEE International Symposium on Information Theory, Austin, TX, USA, 13–18 June 2010; pp. 2453–2457. [Google Scholar]
- He, J.; Hussain, I.; Li, Y.; Juntti, M.; Matsumoto, T. Distributed LT codes with improved error floor performance. IEEE Access 2019, 7, 8102–8110. [Google Scholar] [CrossRef]
- Hayajneh, K.F. Memory-based lt codes for efficient 5g networks and beyond. Electronics 2021, 10, 3169. [Google Scholar] [CrossRef]
- Han, W.; Xu, S.; Huang, D.; Xu, C. Analysis and design of rateless two-way relay networks based on a multiply-and-forward scheme. Appl. Sci. 2020, 10, 2389. [Google Scholar] [CrossRef]
- Peng, T.; Lambotharan, S.; Zheng, G.; Shikh-Bahaei, M. Opportunistic Fountain Coding with Coordinative Routing. IEEE Wirel. Commun. Lett. 2022, 11, 851–855. [Google Scholar] [CrossRef]
- Li, Y.; Du, Q. A Cooperative Multi-RSU Caching Scheme in Vehicular Networks with Fountain Codes. In Proceedings of the 2021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Helsinki, Finland, 13–16 September 2021; pp. 1445–1450. [Google Scholar]
- Wang, F.; Jiao, J.; Li, L.; Zhang, K.; Wu, S.; Zhang, Q. Finite Length Non-Binary Raptor Codes under Ordered Statistics Decoder. In Proceedings of the 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall); IEEE: Victoria, BC, Canada, 2020; pp. 1–5. [Google Scholar]
- Zhang, K.; Jiao, J.; Huang, Z.; Wu, S.; Zhang, Q. Finite Block-Length Analog Fountain Codes for Ultra-Reliable Low Latency Communications. IEEE T Commun. 2020, 68, 1391–1404. [Google Scholar] [CrossRef]
- Yildiz, H.U. Maximization of Underwater Sensor Networks Lifetime via Fountain Codes. IEEE Trans. Ind. Inf. 2019, 15, 4602–4613. [Google Scholar] [CrossRef]
- Hsiao, H.F.; Ciou, Y.J. Layer-Aligned Multipriority Rateless Codes for Layered Video Streaming. IEEE Trans. Circuits Syst. Video Technol. 2014, 24, 1395–1404. [Google Scholar] [CrossRef]
- Qin, S.; Feng, G.; Zhang, Y. Capacity bounds of cooperative communications with fountain codes. In Proceedings of the 2010 IEEE Wireless Communication and Networking Conference, Sydney, NSW, Australia, 18–21 April 2010; pp. 1–4. [Google Scholar]
- Duy, T.T.; Anpalagan, A.; Kong, H. Multi-hop cooperative transmission using fountain codes over Rayleigh fading channels. J. Commun. Netw.-S. Kor. 2012, 14, 267–272. [Google Scholar] [CrossRef]
- Di, X.; Xiong, K.; Fan, P.; Qiu, Z. Cooperative multi-relay transmission for high-speed railway mobile communication system with fountain codes. In Proceedings of the 2013 International Workshop on High Mobility Wireless Communications (HMWC), Shanghai, China, 1–3 November 2013; pp. 63–68. [Google Scholar]
- Molisch, A.F.; Mehta, N.B.; Yedidia, J.S.; Zhang, J. Cooperative relay networks using fountain codes. In Proceedings of the IEEE Globecom 2006, San Francisco, CA, USA, 27 November–1 December 2006; pp. 1–6. [Google Scholar]
- Xu, K.; Du, Z.; Jiang, B. Dynamic Coded Cooperation with Incremental Redundancy: Throughput and Diversity-Multiplexing Tradeoff Analysis. IEEE Commun. Lett. 2020, 24, 506–509. [Google Scholar] [CrossRef]
- Jain, S.; Bose, R. Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT. IEEE Internet Things. J. 2020, 7, 6550–6565. [Google Scholar] [CrossRef]
- Nessa, A.; Kadoch, M.; Rong, B. Fountain Coded Cooperative Communications for LTE-A Connected Heterogeneous M2M Network. IEEE Access 2016, 4, 5280–5292. [Google Scholar] [CrossRef]
- Cao, R.; Yang, L. Decomposed LT codes for cooperative relay communications. IEEE J. Sel. Area. Comm. 2012, 30, 407–414. [Google Scholar] [CrossRef]
- Mozaffari, M.; Saad, W.; Bennis, M.; Nam, Y.H.; Debbah, M. A Tutorial on UAVs for Wireless Networks: Applications, Challenges, and Open Problems. IEEE Commun. Surv. Tut. 2019, 21, 2334–2360. [Google Scholar] [CrossRef]
- Kumar, P.; Singh, P.; Darshi, S.; Shailendra, S. Drone Assisted Network Coded Co-operation. In Proceedings of the TENCON 2019-2019 IEEE Region 10 Conference (TENCON), Kochi, India, 12 December 2019; pp. 1174–1179. [Google Scholar]
- Zeng, Y.; Zhang, R.; Lim, T.J. Throughput maximization for UAV-enabled mobile relaying systems. IEEE T. Commun. 2016, 64, 4983–4996. [Google Scholar] [CrossRef]
- Zhu, Q.; Bai, F.; Pang, M.; Li, J.; Zhong, W.; Chen, X.; Mao, K. Geometry-Based Stochastic Line-of-Sight Probability Model for A2G Channels Under Urban Scenarios. IEEE T. Antenn. Propag. 2022, 70, 5784–5794. [Google Scholar] [CrossRef]
- Zhu, Q.; Li, H.; Fu, Y.; Wang, C.; Tan, Y.; Chen, X.; Wu, Q. A Novel 3D Non-Stationary Wireless MIMO Channel Simulator and Hardware Emulator. IEEE T. Commun. 2018, 66, 3865–3878. [Google Scholar] [CrossRef]
- Du, X.; Zhu, Q.; Ding, G.; Li, J.; Wu, Q.; Lan, T.; Lin, Z.; Zhong, W.; Han, L. UAV-assisted three-dimensional spectrum mapping driven by spectrum data and channel model. Symmetry 2021, 13, 2308. [Google Scholar] [CrossRef]
- Rahnavard, N.; Vellambi, B.N.; Fekri, F. Rateless codes with unequal error protection property. IEEE T. Inform. Theory 2007, 53, 1521–1532. [Google Scholar] [CrossRef]
- Luby, M. LT Codes. In Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science (FOCS); IEEE: Vancouver, BC, Canada, 2002; pp. 271–280. [Google Scholar]
- Shokrollahi, A. Raptor Codes. IEEE Trans. Inform. Theory 2006, 52, 2551–2567. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).