Fountain codes

被引:766
|
作者
MacKay, DJC [1 ]
机构
[1] Univ Cambridge, Cavendish Lab, Cambridge CB3 0HE, England
来源
IEE PROCEEDINGS-COMMUNICATIONS | 2005年 / 152卷 / 06期
关键词
D O I
10.1049/ip-com:20050237
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Fountain codes are record-breaking sparse-graph codes for channels with erasures, such as the internet, where files are transmitted in multiple small packets, each of which is either received without error or not received. Standard file transfer protocols simply chop a file up into K packet-sized pieces, then repeatedly transmit each packet until it is successfully received. A back channel is required for the transmitter to find out which packets need retransmitting. In contrast, fountain codes make packets that are random functions of the whole file. The transmitter sprays packets at the receiver without any knowledge of which packets are received. Once the receiver has received any N packets, where N is just slightly greater than the original file size K, the whole file can be recovered. In the paper random linear fountain codes, LT codes, and raptor codes are reviewed. The computational costs of the best fountain codes are astonishingly small, scaling linearly with the file size.
引用
收藏
页码:1062 / 1068
页数:7
相关论文
共 50 条
  • [31] Performance Analysis of Short Analog Fountain Codes
    Abbas, Rana
    Shirvanimoghaddam, Mahyar
    Huang, Tao
    Li, Yonghui
    Vucetic, Branka
    2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
  • [32] Robust quaternary fountain codes in AWGN interference
    Spencer, James
    Hayajneh, Khaled F.
    Yousefi, Shahram
    IET COMMUNICATIONS, 2018, 12 (20) : 2561 - 2567
  • [33] Fountain Codes Based on Zigzag Decodable Coding
    Nozaki, Takayuki
    2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 274 - 278
  • [34] Performance Analysis and Improvement of Online Fountain Codes
    Huang, Jingxuan
    Fei, Zesong
    Cao, Congzhe
    Xiao, Ming
    Jia, Dai
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (12) : 5916 - 5926
  • [35] A Scheme of Data Storage Based on Fountain Codes
    Chen Haiyan
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2008, : 1128 - 1130
  • [36] Cooperative relay networks using fountain codes
    Molisch, Andreas F.
    Mehta, Neelesh B.
    Yedidia, Jonathan S.
    Zhang, Jinyun
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [37] An Approach of Eliminating Duplicate Associates in Fountain Codes
    Zhou, Yang
    Zhang, Lin
    Liu, Yu
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 472 - 475
  • [38] Secure Online Fountain Codes With Low Complexity
    Qin, Zijun
    Fei, Zesong
    Huang, Jingxuan
    Xiao, Ming
    IEEE COMMUNICATIONS LETTERS, 2022, 26 (07) : 1499 - 1503
  • [39] Novel Design for Short Analog Fountain Codes
    Abbas, Rana
    Shirvanimoghaddam, Mahyar
    Huang, Tao
    Li, Yonghui
    Vucetic, Branka
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (08) : 1306 - 1309
  • [40] Research on fountain codes in deep space communication
    Yao, Wending
    Chen, Lijia
    Li, Hui
    Xu, Hongguang
    CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 2, PROCEEDINGS, 2008, : 219 - 224