-
EBP-GEXIT Charts for M-ary AWGN Channel for Generalized LDPC and Turbo Codes
Authors:
Arti Yardi,
Tarik Benaddi,
Charly Poulliat,
Iryna Andriyanova
Abstract:
This work proposes a tractable estimation of the maximum a posteriori (MAP) threshold of various families of sparse-graph code ensembles, by using an approximation for the extended belief propagation generalized extrinsic information transfer (EBP-GEXIT) function, first proposed by Measson et al. We consider the transmission over non-binary complex-input additive white Gaussian noise channel and e…
▽ More
This work proposes a tractable estimation of the maximum a posteriori (MAP) threshold of various families of sparse-graph code ensembles, by using an approximation for the extended belief propagation generalized extrinsic information transfer (EBP-GEXIT) function, first proposed by Measson et al. We consider the transmission over non-binary complex-input additive white Gaussian noise channel and extend the existing results to obtain an expression for the GEXIT function. We estimate the MAP threshold by applying the Maxwell construction to the obtained approximate EBP-GEXIT charts for various families of low-density parity-check (LDPC), generalized LDPC, doubly generalized LDPC, and serially concatenated turbo codes (SC-TC). When codewords of SC-TC are modulated using Gray map**, we also explore where the spatially-coupled belief propagation (BP) threshold is located with respect to the previously computed MAP threshold. Numerical results indicate that the BP threshold of the spatially-coupled SC-TC does saturate to the MAP threshold obtained via EBP-GEXIT chart.
△ Less
Submitted 10 March, 2021;
originally announced March 2021.
-
Dynamic Coded Caching in Wireless Networks
Authors:
Jesper Pedersen,
Alexandre Graell i Amat,
Jasper Goseling,
Fredrik Brännström,
Iryna Andriyanova,
Eirik Rosnes
Abstract:
We consider distributed and dynamic caching of coded content at small base stations (SBSs) in an area served by a macro base station (MBS). Specifically, content is encoded using a maximum distance separable code and cached according to a time-to-live (TTL) cache eviction policy, which allows coded packets to be removed from the caches at periodic times. Mobile users requesting a particular conten…
▽ More
We consider distributed and dynamic caching of coded content at small base stations (SBSs) in an area served by a macro base station (MBS). Specifically, content is encoded using a maximum distance separable code and cached according to a time-to-live (TTL) cache eviction policy, which allows coded packets to be removed from the caches at periodic times. Mobile users requesting a particular content download coded packets from SBSs within communication range. If additional packets are required to decode the file, these are downloaded from the MBS. We formulate an optimization problem that is efficiently solved numerically, providing TTL caching policies minimizing the overall network load. We demonstrate that distributed coded caching using TTL caching policies can offer significant reductions in terms of network load when request arrivals are bursty. We show how the distributed coded caching problem utilizing TTL caching policies can be analyzed as a specific single cache, convex optimization problem. Our problem encompasses static caching and the single cache as special cases. We prove that, interestingly, static caching is optimal under a Poisson request process, and that for a single cache the optimization problem has a surprisingly simple solution.
△ Less
Submitted 22 December, 2020; v1 submitted 19 February, 2020;
originally announced February 2020.
-
Routing and Network Coding over a Cyclic Network for Online Video Gaming
Authors:
Marwa Dammak,
Iryna Andriyanova,
Yassine Boujelben,
Noura Sellami
Abstract:
Online video games are getting more popular, attracting a continuously growing number of players. The main performance metrics of this application on the network level are packet ordering, communication throughput and transmission latency. Nowadays there is an interest in cyclic logical network topologies for online gaming, due to the easiness to preserve the packet order over cycles.Unfortunately…
▽ More
Online video games are getting more popular, attracting a continuously growing number of players. The main performance metrics of this application on the network level are packet ordering, communication throughput and transmission latency. Nowadays there is an interest in cyclic logical network topologies for online gaming, due to the easiness to preserve the packet order over cycles.Unfortunately, this approach increases the end-to-end transmission delays. In our paper, two main contributions are therefore presented. Firstly, it is shown that one can improve the latency of a gaming protocol over a single-cycle topology by the network coding (NC) approach. The corresponding NC-based routing protocol has been designed and analysed; it outperforms the best routing protocol without NC. Secondly, from the NC viewpoint, the example of online gaming is not a trivial one, given that the corresponding communication protocol is not multicast. Therefore, it is shown that there exists a NC gain (namely, up to 14% in transmission latency) even in case of a mixed communication protocol with broadcast and unicast transmission flows.
△ Less
Submitted 29 March, 2018;
originally announced March 2018.
-
Code Constructions for Distributed Storage With Low Repair Bandwidth and Low Repair Complexity
Authors:
Siddhartha Kumar,
Alexandre Graell i Amat,
Iryna Andriyanova,
Fredrik Brännström,
Eirik Rosnes
Abstract:
We present the construction of a family of erasure correcting codes for distributed storage that achieve low repair bandwidth and complexity at the expense of a lower fault tolerance. The construction is based on two classes of codes, where the primary goal of the first class of codes is to provide fault tolerance, while the second class aims at reducing the repair bandwidth and repair complexity.…
▽ More
We present the construction of a family of erasure correcting codes for distributed storage that achieve low repair bandwidth and complexity at the expense of a lower fault tolerance. The construction is based on two classes of codes, where the primary goal of the first class of codes is to provide fault tolerance, while the second class aims at reducing the repair bandwidth and repair complexity. The repair procedure is a two- step procedure where parts of the failed node are repaired in the first step using the first code. The downloaded symbols during the first step are cached in the memory and used to repair the remaining erased data symbols at minimal additional read cost during the second step. The first class of codes is based on MDS codes modified using piggybacks, while the second class is designed to reduce the number of additional symbols that need to be downloaded to repair the remaining erased symbols. We numerically show that the proposed codes achieve better repair bandwidth compared to MDS codes, codes constructed using piggybacks, and local reconstruction/Pyramid codes, while a better repair complexity is achieved when compared to MDS, Zigzag, Pyramid codes, and codes constructed using piggybacks.
△ Less
Submitted 31 August, 2018; v1 submitted 18 January, 2018;
originally announced January 2018.
-
Optimizing MDS Coded Caching in Wireless Networks with Device-to-Device Communication
Authors:
Jesper Pedersen,
Alexandre Graell i Amat,
Iryna Andriyanova,
Fredrik Brännström
Abstract:
We consider the caching of content in the mobile devices in a dense wireless network using maximum distance separable (MDS) codes. We focus on an area, served by a base station (BS), where mobile devices move around according to a random mobility model. Users requesting a particular file download coded packets from caching devices within a communication range, using device-to-device communication.…
▽ More
We consider the caching of content in the mobile devices in a dense wireless network using maximum distance separable (MDS) codes. We focus on an area, served by a base station (BS), where mobile devices move around according to a random mobility model. Users requesting a particular file download coded packets from caching devices within a communication range, using device-to-device communication. If additional packets are required to decode the file, these are downloaded from the BS. We analyze the device mobility and derive a good approximation of the distribution of caching devices within the communication range of mobile devices at any given time. We then optimize the MDS codes to minimize the network load under a cache size constraint and show that using optimized MDS codes results in significantly lower network load compared to when caching the most popular files. We further show numerically that caching coded packets of each file on all mobile devices, i.e., maximal spreading, is optimal.
△ Less
Submitted 30 October, 2018; v1 submitted 23 January, 2017;
originally announced January 2017.
-
Distributed Storage in Mobile Wireless Networks with Device-to-Device Communication
Authors:
Jesper Pedersen,
Alexandre Graell i Amat,
Iryna Andriyanova,
Fredrik Brännström
Abstract:
We consider the use of distributed storage (DS) to reduce the communication cost of content delivery in wireless networks. Content is stored (cached) in a number of mobile devices using an erasure correcting code. Users retrieve content from other devices using device-to-device communication or from the base station (BS), at the expense of higher communication cost. We address the repair problem w…
▽ More
We consider the use of distributed storage (DS) to reduce the communication cost of content delivery in wireless networks. Content is stored (cached) in a number of mobile devices using an erasure correcting code. Users retrieve content from other devices using device-to-device communication or from the base station (BS), at the expense of higher communication cost. We address the repair problem when a device storing data leaves the cell. We introduce a repair scheduling where repair is performed periodically and derive analytical expressions for the overall communication cost of content download and data repair as a function of the repair interval. The derived expressions are then used to evaluate the communication cost entailed by DS using several erasure correcting codes. Our results show that DS can reduce the communication cost with respect to the case where content is downloaded only from the BS, provided that repairs are performed frequently enough. If devices storing content arrive to the cell, the communication cost using DS is further reduced and, for large enough arrival rate, it is always beneficial. Interestingly, we show that MDS codes, which do not perform well for classical DS, can yield a low overall communication cost in wireless DS.
△ Less
Submitted 27 September, 2016; v1 submitted 4 January, 2016;
originally announced January 2016.
-
A Family of Erasure Correcting Codes with Low Repair Bandwidth and Low Repair Complexity
Authors:
Siddhartha Kumar,
Alexandre Graell i Amat,
Iryna Andriyanova,
Fredrik Brännström
Abstract:
We present the construction of a new family of erasure correcting codes for distributed storage that yield low repair bandwidth and low repair complexity. The construction is based on two classes of parity symbols. The primary goal of the first class of symbols is to provide good erasure correcting capability, while the second class facilitates node repair, reducing the repair bandwidth and the re…
▽ More
We present the construction of a new family of erasure correcting codes for distributed storage that yield low repair bandwidth and low repair complexity. The construction is based on two classes of parity symbols. The primary goal of the first class of symbols is to provide good erasure correcting capability, while the second class facilitates node repair, reducing the repair bandwidth and the repair complexity. We compare the proposed codes with other codes proposed in the literature.
△ Less
Submitted 27 August, 2015; v1 submitted 13 May, 2015;
originally announced May 2015.
-
Repair Scheduling in Wireless Distributed Storage with D2D Communication
Authors:
Jesper Pedersen,
Alexandre Graell i Amat,
Iryna Andriyanova,
Fredrik Brännström
Abstract:
We consider distributed storage (DS) for a wireless network where mobile devices arrive and depart according to a Poisson random process. Content is stored in a number of mobile devices, using an erasure correcting code. When requesting a piece of content, a user retrieves the content from the mobile devices using device-to-device communication or, if not possible, from the base station (BS), at t…
▽ More
We consider distributed storage (DS) for a wireless network where mobile devices arrive and depart according to a Poisson random process. Content is stored in a number of mobile devices, using an erasure correcting code. When requesting a piece of content, a user retrieves the content from the mobile devices using device-to-device communication or, if not possible, from the base station (BS), at the expense of a higher communication cost. We consider the repair problem when a device that stores data leaves the network. In particular, we introduce a repair scheduling where repair is performed (from storage devices or the BS) periodically. We derive analytical expressions for the overall communication cost of repair and download as a function of the repair interval. We illustrate the analysis by giving results for maximum distance separable codes and regenerating codes. Our results indicate that DS can reduce the overall communication cost with respect to the case where content is only downloaded from the BS, provided that repairs are performed frequently enough. The required repair frequency depends on the code used for storage and the network parameters. In particular, minimum bandwidth regenerating codes require very frequent repairs, while maximum distance separable codes give better performance if repair is performed less frequently. We also show that instantaneous repair is not always optimal.
△ Less
Submitted 7 August, 2015; v1 submitted 23 April, 2015;
originally announced April 2015.
-
On Distributed Storage Allocations for Memory-Limited Systems
Authors:
Iryna Andriyanova,
Pablo M. Olmos
Abstract:
In this paper we consider distributed allocation problems with memory constraint limits. Firstly, we propose a tractable relaxation to the problem of optimal symmetric allocations from [1]. The approximated problem is based on the Q-error function, and its solution approaches the solution of the initial problem, as the number of storage nodes in the network grows. Secondly, exploiting this relaxat…
▽ More
In this paper we consider distributed allocation problems with memory constraint limits. Firstly, we propose a tractable relaxation to the problem of optimal symmetric allocations from [1]. The approximated problem is based on the Q-error function, and its solution approaches the solution of the initial problem, as the number of storage nodes in the network grows. Secondly, exploiting this relaxation, we are able to formulate and to solve the problem for storage allocations for memory-limited DSS storing and arbitrary memory profiles. Finally, we discuss the extension to the case of multiple data objects, stored in the DSS.
△ Less
Submitted 16 April, 2015;
originally announced April 2015.
-
Proving Threshold Saturation for Nonbinary SC-LDPC Codes on the Binary Erasure Channel
Authors:
Alexandre Graell i Amat,
Iryna Andriyanova,
Amina Piemontese
Abstract:
We analyze nonbinary spatially-coupled low-density parity-check (SC-LDPC) codes built on the general linear group for transmission over the binary erasure channel. We prove threshold saturation of the belief propagation decoding to the potential threshold, by generalizing the proof technique based on potential functions recently introduced by Yedla et al.. The existence of the potential function i…
▽ More
We analyze nonbinary spatially-coupled low-density parity-check (SC-LDPC) codes built on the general linear group for transmission over the binary erasure channel. We prove threshold saturation of the belief propagation decoding to the potential threshold, by generalizing the proof technique based on potential functions recently introduced by Yedla et al.. The existence of the potential function is also discussed for a vector sparse system in the general case, and some existence conditions are developed. We finally give density evolution and simulation results for several nonbinary SC-LDPC code ensembles.
△ Less
Submitted 22 July, 2014;
originally announced July 2014.
-
Threshold Saturation for Nonbinary SC-LDPC Codes on the Binary Erasure Channel
Authors:
Iryna Andriyanova,
Alexandre Graell i Amat
Abstract:
We analyze the asymptotic performance of nonbinary spatially-coupled low-density parity-check (SC-LDPC) code ensembles defined over the general linear group on the binary erasure channel. In particular, we prove threshold saturation of belief propagation decoding to the so called potential threshold, using the proof technique based on potential functions introduced by Yedla \textit{et al.}, assumi…
▽ More
We analyze the asymptotic performance of nonbinary spatially-coupled low-density parity-check (SC-LDPC) code ensembles defined over the general linear group on the binary erasure channel. In particular, we prove threshold saturation of belief propagation decoding to the so called potential threshold, using the proof technique based on potential functions introduced by Yedla \textit{et al.}, assuming that the potential function exists. We rewrite the density evolution of nonbinary SC-LDPC codes in an equivalent vector recursion form which is suited for the use of the potential function. We then discuss the existence of the potential function for the general case of vector recursions defined by multivariate polynomials, and give a method to construct it. We define a potential function in a slightly more general form than one by Yedla \textit{et al.}, in order to make the technique based on potential functions applicable to the case of nonbinary LDPC codes. We show that the potential function exists if a solution to a carefully designed system of linear equations exists. Furthermore, we show numerically the existence of a solution to the system of linear equations for a large number of nonbinary LDPC code ensembles, which allows us to define their potential function and thus prove threshold saturation.
△ Less
Submitted 4 April, 2016; v1 submitted 8 November, 2013;
originally announced November 2013.
-
New constructions of CSS codes obtained by moving to higher alphabets
Authors:
Iryna Andriyanova,
Denise Maurice,
Jean-Pierre Tillich
Abstract:
We generalize a construction of non-binary quantum LDPC codes over $\F_{2^m}$ due to \cite{KHIS11a} and apply it in particular to toric codes. We obtain in this way not only codes with better rates than toric codes but also improve dramatically the performance of standard iterative decoding. Moreover, the new codes obtained in this fashion inherit the distance properties of the underlying toric co…
▽ More
We generalize a construction of non-binary quantum LDPC codes over $\F_{2^m}$ due to \cite{KHIS11a} and apply it in particular to toric codes. We obtain in this way not only codes with better rates than toric codes but also improve dramatically the performance of standard iterative decoding. Moreover, the new codes obtained in this fashion inherit the distance properties of the underlying toric codes and have therefore a minimum distance which grows as the square root of the length of the code for fixed $m$.
△ Less
Submitted 15 February, 2012;
originally announced February 2012.
-
On a Low-Rate TLDPC Code Ensemble and the Necessary Condition on the Linear Minimum Distance for Sparse-Graph Codes
Authors:
Iryna Andriyanova,
Jean-Pierre Tillich
Abstract:
This paper addresses the issue of design of low-rate sparse-graph codes with linear minimum distance in the blocklength. First, we define a necessary condition which needs to be satisfied when the linear minimum distance is to be ensured. The condition is formulated in terms of degree-1 and degree-2 variable nodes and of low-weight codewords of the underlying code, and it generalizies results know…
▽ More
This paper addresses the issue of design of low-rate sparse-graph codes with linear minimum distance in the blocklength. First, we define a necessary condition which needs to be satisfied when the linear minimum distance is to be ensured. The condition is formulated in terms of degree-1 and degree-2 variable nodes and of low-weight codewords of the underlying code, and it generalizies results known for turbo codes [8] and LDPC codes. Then, we present a new ensemble of low-rate codes, which itself is a subclass of TLDPC codes [4], [5], and which is designed under this necessary condition. The asymptotic analysis of the ensemble shows that its iterative threshold is situated close to the Shannon limit. In addition to the linear minimum distance property, it has a simple structure and enjoys a low decoding complexity and a fast convergence.
△ Less
Submitted 10 October, 2010;
originally announced October 2010.
-
Optimized IR-HARQ Schemes Based on Punctured LDPC Codes over the BEC
Authors:
Iryna Andriyanova,
Emina Soljanin
Abstract:
We study incremental redundancy hybrid ARQ (IR-HARQ) schemes based on punctured, finite-length, LDPC codes. The transmission is assumed to take place over time varying binary erasure channels, such as mobile wireless channels at the applications layer. We analyze and optimize the throughput and delay performance of these IR-HARQ protocols under iterative, message-passing decoding. We derive bounds…
▽ More
We study incremental redundancy hybrid ARQ (IR-HARQ) schemes based on punctured, finite-length, LDPC codes. The transmission is assumed to take place over time varying binary erasure channels, such as mobile wireless channels at the applications layer. We analyze and optimize the throughput and delay performance of these IR-HARQ protocols under iterative, message-passing decoding. We derive bounds on the performance that are achievable by such schemes, and show that, with a simple extension, the iteratively decoded, punctured LDPC code based IR-HARQ protocol can be made rateless, and operating close to the general theoretical optimum for a wide range of channel erasure rates.
△ Less
Submitted 28 May, 2012; v1 submitted 13 September, 2010;
originally announced September 2010.