SlideShare a Scribd company logo
1 of 3
Download to read offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 7, Issue 2 (Jul. - Aug. 2013), PP 37-39
www.iosrjournals.org
www.iosrjournals.org 37 | Page
Design, Analysis and Implementation of Modified Luby
Transform Code
Anand P1
, George M Joseph2
, Arun.A. S. 3
, Dhanish Vijayan4
, Jerryl James
Abraham5
, Gopalakrishnan P N Nair6
, Bob P. George7
1
(M.Tech Student, Department of ECE, SCT College of Engineering, India)
2
(Assistant Professor, Department of ECE, SCT College of Engineering, India)
3
(M.Tech Student, Department of ECE, SCT College of Engineering, India)
4
(M.Tech Student, Department of ECE, College of Engineering, Trivandrum, India)
5,6,7
(Project Engineer, Elementz Engineers Guild Pvt. Ltd., India)
Abstract : Bit losses in erasure channels like computer networks are of great concern. The existing methods to
combat bit losses are either inefficient or time consuming due to the retransmission protocols involved. Through
this paper, we propose a Modified Luby Transform (MLT) coding scheme to efficiently transmit data over live
computer networks. The MLT code can combat bit losses as well as eliminate the need for retransmission. The
usability and reliability of the proposed MLT code is verified by testing it on a live computer network.
Keywords : Erasure channel, Fountain Codes, Luby Transform Codes , Wired Networks, Wireless Networks
I. INTRODUCTION
Channels with erasures are of great importance. Files sent over the internet or a wired / wireless LAN
network are converted to bits / packets, and each bit / packet is either received without error or not received, that
is they behave like erasure channels. Also if you take the case of a mail server, when you send a mail, the
recipient either receives the mail or does not receive it. There is no chance for the content to be received
incorrectly.
Erasure codes are codes that work on such erasure channels and combat bit losses / erasures. The
erasure channel is described by the probability of erasure of that channel. Say if the probability of erasure is 0.1,
it means that 10% of the data transmitted would be lost and the rest 90% would be received without any error.
Common methods for communicating over such channels employ a feedback channel from receiver to
sender that is used to control the retransmission of erased bits / packets. The receiver might send back messages
which enable identification of the missing packets, which are then retransmitted. Alternatively, the receiver
might send back acknowledgements for each received packet; the sender keeps track of which packets have
been acknowledged and retransmits the others until all packets have been acknowledged.
These retransmission protocols have the advantage that they will work regardless of the erasure
probability but if the erasure probability is large, the number of feedback messages sent by the first protocol will
be large. If the system uses the second protocol, it is very likely that the receiver will end up receiving multiple
redundant copies of many packets, and heavy use is made of the feedback channel [1].
Fountain codes are provided as a solution for reliable communication in lossy networks [2], [3]. They
eliminate the need of retransmission request which increases the bandwidth consumption and increases the
delay. Luby transform (LT) codes are special case of fountain codes [2]. LT encoder chooses randomly from a
set of K packets, and according to a distribution, a subset of d packets, and XOR them [2]. In practice, decoding
may be possible from a set S of such encoded packets, for S slightly larger than K.
In [4], a new method was designed to integrate the notion of network coding with the technique of
connected dominating set which represents the source independent backbone in order to improve the broadcast
process in ad hoc wireless network. When using the source independent backbone, the intermediate nodes are
either responsible for retransmitting all or none of packets. This increases network coding efficiency since
forwarder nodes use all available packets in encoding [4]. In [5], some of the nodes are chosen to retransmit
messages, independent on coding process. Decoding process is improved in [6]. Fountain codes were used in [7]
to broadcast n packets from the source. The source generates m encoded packets using LT codes, and floods
each of them into the network. Each recipient retransmits each received packet with certain fixed probability.
When a recipient has received enough data, it can decode original packets [7].
In all the above cases, LT codes are used along with retransmission protocols or relaying-based
protocols to improve the efficiency. But they do not consider the delay caused by these methods. In practical
cases, all the above methods cause delays which are inappropriate for live networks.
Through this paper, we propose a Modified Luby Transform (MLT) code which can efficiently combat
bit losses and can be efficiently used in a live network without any need for concatenating it with any
Design, Analysis and Implementation of Modified Luby Transform Code
www.iosrjournals.org 38 | Page
retransmission or relay-based protocols. Using the MLT codes, we can eliminate the use of the feedback channel
and also improve the performance of the receiver.
II. MODIFIED LUBY TRANSFORM (MLT) CODES
We propose a modified decoding algorithm for a particular LT encoding pattern. In the proposed MLT
codes, the input bits are divided into sets of four bits and each four bit input is encoded to form an eight bit
encoded packet. During encoding, the first and last bit of the encoded packet is set to be the first bit of the input.
The other bits of the encoded packet would be the XORed version of the previous bit of the encoded packet with
the next input bit. Let [ a b c d ] be the input bits and [ E1 E2 E3 E4 E5 E6 E7 E8 ] be the bits of the encoded
packet, then
E1 = a
E2 = E1 xor b = a xor b
E3 = E2 xor c = a xor b xor c
E4 = E3 xor d = a xor b xor c xor d
E5 = E4 xor a = b xor c xor d
E6 = E5 xor b = c xor d
E7 = E6 xor c = d
E8 = a
The MLT encoding process is depicted in Fig. 1 below
.
Fig. 1 Modified Luby Transform (MLT) Encoding
While transmitting through the channel, the bits of the encoded packets may get lost. So what we get
would be a punctured form of the transmitted bit. At the receiver end, we need to get back the original
information from the punctured form of received packet. Here we use a modified decoding algorithm. It is an
iterative process. During the first iteration, we make use of the normal LT decoding process in which successive
XORing of the bits of the encoded packets will result in the input bits. Since some of the bits of the packet are
lost, all the input bits cannot be correctly retrieved. Now, using the retrieved bits and the correctly received bits,
we can make further XORed combinations of the input bits. This is used in the next iteration and we look for
decoding the input bits by successive XORing of the generated bits in the previous iteration along with the
correctly received bits, say we had received „E4‟ ( b xor c xor d ) and correctly retrieved bits, „b‟ and „d‟ but we
could not retrieve „c‟; we can generate a combination „b xor d‟ from the correctly retrieved bits and then XOR
the generated bit with the „E4‟ to correctly retrieve „c‟. The iteration is continued till all input bits are retrieved
or if all bits could not be retrieved even after eight iterations levels.
The MLT decoding process is depicted in Fig. 2. below.
Fig. 2 Modified Luby Transform (MLT) Decoding
III. SIMULATION AND HARDWARE IMPLEMENTATION
The MLT codes were simulated using MATLAB R2012a on a computer with Intel i5 2.4GHz (with
turbo boost upto 3.2GHz) processor and 4GB RAM. The simulation results of MLT codes are compared with
the results obtained for LT codes and for systems with no encoding.
Design, Analysis and Implementation of Modified Luby Transform Code
www.iosrjournals.org 39 | Page
The MLT codes were implemented on a live peer to peer computer network. All data to be transmitted
from one computer to another computer were encoded using MLT codes and the data received at the receiving
end is decoded to get back the original data. Results from hardware implementation are compared with the
simulation results and are discussed in Section IV.
IV. RESULTS AND ANALYSIS
Fig. 3. Performance Analysis using Probability of Erasure vs Bit Loss Rate graph – (a) No encoding
(b) LT encoding (c) MLT encoding (Simulation Results) (d) MLT encoding (Hardware Implementation Results)
From Fig. 3, we can see that bit loss rate is considerably reduced using MLT encoding. For channels
with probability of erasure less than 0.45, we can see that the bit loss rate is almost zero. This means that we can
correctly decode all the data even if almost half of the transmitted data is lost, we can efficiently decode the
original data without any need for retransmission. Using LT codes, we can achieve lossless transmission only
for channels with probability of erasure less than 0.3. In real situations, probability of erasure would be in range
of 0.2 to 0.5 only, if it is more than 0.5, it would mean more or less break in channel or loss of channel as such.
Say we have a live network, erasure of over 0.5 occurs when the channel is non-existent or if the router resets
itself and is recreating the communication link as such. Even if retransmission is done in any of the above cases,
it is more probable that the retransmitted packet is also lost and the retransmission process becomes wasteful
and time-consuming. This can be avoided. MLT codes provide an efficient way to transfer data within computer
networks by combating bit losses and eliminating retransmission delays.
V. CONCLUSION
A Modified Luby Transform (MLT) code is designed for computer networks and the analysis is done
for channels with different probabilities of erasure. The results were compared with the results obtained by using
LT codes and those without any encoding. The comparison results show that the bit loss rate can be efficiently
reduced using MLT codes. The hardware implementation is done to ensure usability and reliability in live
computer networks without using any retransmission process. Thus, we can conclude that by using MLT codes
without any retransmission protocol, we can efficiently transmit data over wired / wireless computer networks
and avoiding time delays to a large extent.
Acknowledgements
We would like to acknowledge Elementz Engineers Guild Private Limited for providing us with the
facilities needed for simulation of the MLT codes and for allowing us to test it on live networks at their office
premises.
REFERENCES
[1] D.J.C. MacKay, Fountain codes, Capacity Approaching Codes Design and Implementation Special Section, IEEE Proceedings -
Communication Vol.152, No. 6, December 2005
[2] Luby, “LT codes,” in FOCS: IEEE Symposium on Foundations of Computer Science (FOCS), 2002.
[3] A. Shokrollahi, “Raptor codes,” IEEE Transactions on Information Theory, vol. 52, no. 6, pp. 2551–2567, 2006.
[4] Khaldoun Al Agha, Nour KADI, Ivan Stojmenovic, Fountain Codes with XOR of Encoded Packets for Broadcasting and source
independent backbone in Multi-hop Networks using Network Coding, Vehicular Technology Conference, 2009. VTC Spring 2009.
IEEE 69th
[5] E. L. Li, R. Ramjee, M. M. Buddhikot, and S. C. Miller, “Network coding-based broadcast in mobile ad-hoc networks,” in INFOCOM.
IEEE, 2007, pp. 1739–1747. [Online]. Available: http://dx.doi.org/10.1109/INFCOM.2007.203
[6] N. Kadi and K. A. Agha, “Optimized MPR-Based Flooding in Wireless Ad Hoc Network using Network Coding,” in IFIP/IEEE
Wireless days‟08. Dubai, UAE: IEEE Explorer, November 2008.
[7] R. Kumar and A. Paul and U. Ramachandran, “Fountain broadcast for wireless networks,” in IEEE Int. Workshop on Network Sensing
Systems, San Diego, USA, 2005.

More Related Content

What's hot

Ccna 3-discovery-4-0-module-7-100-
Ccna 3-discovery-4-0-module-7-100-Ccna 3-discovery-4-0-module-7-100-
Ccna 3-discovery-4-0-module-7-100-junkut3
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder IJECEIAES
 
Forward Bit Error Correction - Wireless Communications
Forward Bit Error Correction - Wireless Communications Forward Bit Error Correction - Wireless Communications
Forward Bit Error Correction - Wireless Communications Surya Chandra
 
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC CodesPerformance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codesidescitation
 
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...eSAT Journals
 
Data Link Layer Numericals
Data Link Layer NumericalsData Link Layer Numericals
Data Link Layer NumericalsManisha Keim
 
SYMMETRIC ENCRYPTION ALGORITHM IN SPEECH CODING FOR DEFENCE COMMUNICATIONS
SYMMETRIC ENCRYPTION ALGORITHM IN SPEECH CODING FOR DEFENCE COMMUNICATIONSSYMMETRIC ENCRYPTION ALGORITHM IN SPEECH CODING FOR DEFENCE COMMUNICATIONS
SYMMETRIC ENCRYPTION ALGORITHM IN SPEECH CODING FOR DEFENCE COMMUNICATIONScscpconf
 
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSMAn Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSMAssociate Professor in VSB Coimbatore
 
UNIT-3 : CHANNEL CODING
UNIT-3 : CHANNEL CODINGUNIT-3 : CHANNEL CODING
UNIT-3 : CHANNEL CODINGabhishek reddy
 
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIPPERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIPVLSICS Design
 
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...Editor IJCATR
 

What's hot (20)

Data link layer
Data link layerData link layer
Data link layer
 
Nd
NdNd
Nd
 
CN Unit 3
CN Unit 3 CN Unit 3
CN Unit 3
 
Ccna 3-discovery-4-0-module-7-100-
Ccna 3-discovery-4-0-module-7-100-Ccna 3-discovery-4-0-module-7-100-
Ccna 3-discovery-4-0-module-7-100-
 
Interprocess Message Formats
Interprocess Message FormatsInterprocess Message Formats
Interprocess Message Formats
 
Multi Process Message Formats
Multi Process Message FormatsMulti Process Message Formats
Multi Process Message Formats
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder
 
02 Network Models
02 Network Models02 Network Models
02 Network Models
 
Data link layer
Data link layerData link layer
Data link layer
 
Forward Bit Error Correction - Wireless Communications
Forward Bit Error Correction - Wireless Communications Forward Bit Error Correction - Wireless Communications
Forward Bit Error Correction - Wireless Communications
 
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC CodesPerformance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
 
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
 
Data Link Layer Numericals
Data Link Layer NumericalsData Link Layer Numericals
Data Link Layer Numericals
 
Unit 2 [autosaved]
Unit 2 [autosaved]Unit 2 [autosaved]
Unit 2 [autosaved]
 
SYMMETRIC ENCRYPTION ALGORITHM IN SPEECH CODING FOR DEFENCE COMMUNICATIONS
SYMMETRIC ENCRYPTION ALGORITHM IN SPEECH CODING FOR DEFENCE COMMUNICATIONSSYMMETRIC ENCRYPTION ALGORITHM IN SPEECH CODING FOR DEFENCE COMMUNICATIONS
SYMMETRIC ENCRYPTION ALGORITHM IN SPEECH CODING FOR DEFENCE COMMUNICATIONS
 
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSMAn Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
 
UNIT-3 : CHANNEL CODING
UNIT-3 : CHANNEL CODINGUNIT-3 : CHANNEL CODING
UNIT-3 : CHANNEL CODING
 
Data Link Layer
Data Link Layer Data Link Layer
Data Link Layer
 
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIPPERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
 
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...
 

Viewers also liked

Improving Customer Satisfaction: Implementing Decentralised Inpatient Dischar...
Improving Customer Satisfaction: Implementing Decentralised Inpatient Dischar...Improving Customer Satisfaction: Implementing Decentralised Inpatient Dischar...
Improving Customer Satisfaction: Implementing Decentralised Inpatient Dischar...IOSR Journals
 
The efficacy of strategic management processes: An empirical study of Nationa...
The efficacy of strategic management processes: An empirical study of Nationa...The efficacy of strategic management processes: An empirical study of Nationa...
The efficacy of strategic management processes: An empirical study of Nationa...IOSR Journals
 
A Learning and Improvement Model in Entrepreneurial Leadership
A Learning and Improvement Model in Entrepreneurial LeadershipA Learning and Improvement Model in Entrepreneurial Leadership
A Learning and Improvement Model in Entrepreneurial LeadershipIOSR Journals
 
Study on Coefficient of Permeability of Copper slag when admixed with Lime an...
Study on Coefficient of Permeability of Copper slag when admixed with Lime an...Study on Coefficient of Permeability of Copper slag when admixed with Lime an...
Study on Coefficient of Permeability of Copper slag when admixed with Lime an...IOSR Journals
 
Computations of the Ground State Cohesive Properties Of Alas Crystalline Stru...
Computations of the Ground State Cohesive Properties Of Alas Crystalline Stru...Computations of the Ground State Cohesive Properties Of Alas Crystalline Stru...
Computations of the Ground State Cohesive Properties Of Alas Crystalline Stru...IOSR Journals
 
Integrating ICT in Re-Branding Nigerian Youths for Constructive Empowerment a...
Integrating ICT in Re-Branding Nigerian Youths for Constructive Empowerment a...Integrating ICT in Re-Branding Nigerian Youths for Constructive Empowerment a...
Integrating ICT in Re-Branding Nigerian Youths for Constructive Empowerment a...IOSR Journals
 
A facile method to prepare CdO-Mn3O4 nanocomposite
A facile method to prepare CdO-Mn3O4 nanocompositeA facile method to prepare CdO-Mn3O4 nanocomposite
A facile method to prepare CdO-Mn3O4 nanocompositeIOSR Journals
 
Study of Mitotic Index and DNA profile when exposure to He-Ne laser and UVC r...
Study of Mitotic Index and DNA profile when exposure to He-Ne laser and UVC r...Study of Mitotic Index and DNA profile when exposure to He-Ne laser and UVC r...
Study of Mitotic Index and DNA profile when exposure to He-Ne laser and UVC r...IOSR Journals
 
Product Development, Biochemical and Organoleptic Analysis of a Sports Drink.
Product Development, Biochemical and Organoleptic Analysis of a Sports Drink.Product Development, Biochemical and Organoleptic Analysis of a Sports Drink.
Product Development, Biochemical and Organoleptic Analysis of a Sports Drink.IOSR Journals
 
Experimental & Finite Element Analysis of Left Side Lower Wishbone Arm of Ind...
Experimental & Finite Element Analysis of Left Side Lower Wishbone Arm of Ind...Experimental & Finite Element Analysis of Left Side Lower Wishbone Arm of Ind...
Experimental & Finite Element Analysis of Left Side Lower Wishbone Arm of Ind...IOSR Journals
 
Descriptive New features of high angular momentum rotational states in some r...
Descriptive New features of high angular momentum rotational states in some r...Descriptive New features of high angular momentum rotational states in some r...
Descriptive New features of high angular momentum rotational states in some r...IOSR Journals
 
Impact of Trade Associations on Entrepreneurial Traits in Nigeria’s Transport...
Impact of Trade Associations on Entrepreneurial Traits in Nigeria’s Transport...Impact of Trade Associations on Entrepreneurial Traits in Nigeria’s Transport...
Impact of Trade Associations on Entrepreneurial Traits in Nigeria’s Transport...IOSR Journals
 
On Spaces of Entire Functions Having Slow Growth Represented By Dirichlet Series
On Spaces of Entire Functions Having Slow Growth Represented By Dirichlet SeriesOn Spaces of Entire Functions Having Slow Growth Represented By Dirichlet Series
On Spaces of Entire Functions Having Slow Growth Represented By Dirichlet SeriesIOSR Journals
 
Educational Setup by a Global Repute Company of Greater Noida (Uttar Pradesh)...
Educational Setup by a Global Repute Company of Greater Noida (Uttar Pradesh)...Educational Setup by a Global Repute Company of Greater Noida (Uttar Pradesh)...
Educational Setup by a Global Repute Company of Greater Noida (Uttar Pradesh)...IOSR Journals
 
Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...
Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...
Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...IOSR Journals
 
Parametric Variation Based Analysis AND Effective Design of Rectangular Patch...
Parametric Variation Based Analysis AND Effective Design of Rectangular Patch...Parametric Variation Based Analysis AND Effective Design of Rectangular Patch...
Parametric Variation Based Analysis AND Effective Design of Rectangular Patch...IOSR Journals
 

Viewers also liked (20)

Improving Customer Satisfaction: Implementing Decentralised Inpatient Dischar...
Improving Customer Satisfaction: Implementing Decentralised Inpatient Dischar...Improving Customer Satisfaction: Implementing Decentralised Inpatient Dischar...
Improving Customer Satisfaction: Implementing Decentralised Inpatient Dischar...
 
K0526068
K0526068K0526068
K0526068
 
The efficacy of strategic management processes: An empirical study of Nationa...
The efficacy of strategic management processes: An empirical study of Nationa...The efficacy of strategic management processes: An empirical study of Nationa...
The efficacy of strategic management processes: An empirical study of Nationa...
 
A Learning and Improvement Model in Entrepreneurial Leadership
A Learning and Improvement Model in Entrepreneurial LeadershipA Learning and Improvement Model in Entrepreneurial Leadership
A Learning and Improvement Model in Entrepreneurial Leadership
 
Study on Coefficient of Permeability of Copper slag when admixed with Lime an...
Study on Coefficient of Permeability of Copper slag when admixed with Lime an...Study on Coefficient of Permeability of Copper slag when admixed with Lime an...
Study on Coefficient of Permeability of Copper slag when admixed with Lime an...
 
Computations of the Ground State Cohesive Properties Of Alas Crystalline Stru...
Computations of the Ground State Cohesive Properties Of Alas Crystalline Stru...Computations of the Ground State Cohesive Properties Of Alas Crystalline Stru...
Computations of the Ground State Cohesive Properties Of Alas Crystalline Stru...
 
Integrating ICT in Re-Branding Nigerian Youths for Constructive Empowerment a...
Integrating ICT in Re-Branding Nigerian Youths for Constructive Empowerment a...Integrating ICT in Re-Branding Nigerian Youths for Constructive Empowerment a...
Integrating ICT in Re-Branding Nigerian Youths for Constructive Empowerment a...
 
D0752129
D0752129D0752129
D0752129
 
A facile method to prepare CdO-Mn3O4 nanocomposite
A facile method to prepare CdO-Mn3O4 nanocompositeA facile method to prepare CdO-Mn3O4 nanocomposite
A facile method to prepare CdO-Mn3O4 nanocomposite
 
Study of Mitotic Index and DNA profile when exposure to He-Ne laser and UVC r...
Study of Mitotic Index and DNA profile when exposure to He-Ne laser and UVC r...Study of Mitotic Index and DNA profile when exposure to He-Ne laser and UVC r...
Study of Mitotic Index and DNA profile when exposure to He-Ne laser and UVC r...
 
G0563337
G0563337G0563337
G0563337
 
Product Development, Biochemical and Organoleptic Analysis of a Sports Drink.
Product Development, Biochemical and Organoleptic Analysis of a Sports Drink.Product Development, Biochemical and Organoleptic Analysis of a Sports Drink.
Product Development, Biochemical and Organoleptic Analysis of a Sports Drink.
 
G0742937
G0742937G0742937
G0742937
 
Experimental & Finite Element Analysis of Left Side Lower Wishbone Arm of Ind...
Experimental & Finite Element Analysis of Left Side Lower Wishbone Arm of Ind...Experimental & Finite Element Analysis of Left Side Lower Wishbone Arm of Ind...
Experimental & Finite Element Analysis of Left Side Lower Wishbone Arm of Ind...
 
Descriptive New features of high angular momentum rotational states in some r...
Descriptive New features of high angular momentum rotational states in some r...Descriptive New features of high angular momentum rotational states in some r...
Descriptive New features of high angular momentum rotational states in some r...
 
Impact of Trade Associations on Entrepreneurial Traits in Nigeria’s Transport...
Impact of Trade Associations on Entrepreneurial Traits in Nigeria’s Transport...Impact of Trade Associations on Entrepreneurial Traits in Nigeria’s Transport...
Impact of Trade Associations on Entrepreneurial Traits in Nigeria’s Transport...
 
On Spaces of Entire Functions Having Slow Growth Represented By Dirichlet Series
On Spaces of Entire Functions Having Slow Growth Represented By Dirichlet SeriesOn Spaces of Entire Functions Having Slow Growth Represented By Dirichlet Series
On Spaces of Entire Functions Having Slow Growth Represented By Dirichlet Series
 
Educational Setup by a Global Repute Company of Greater Noida (Uttar Pradesh)...
Educational Setup by a Global Repute Company of Greater Noida (Uttar Pradesh)...Educational Setup by a Global Repute Company of Greater Noida (Uttar Pradesh)...
Educational Setup by a Global Repute Company of Greater Noida (Uttar Pradesh)...
 
Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...
Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...
Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...
 
Parametric Variation Based Analysis AND Effective Design of Rectangular Patch...
Parametric Variation Based Analysis AND Effective Design of Rectangular Patch...Parametric Variation Based Analysis AND Effective Design of Rectangular Patch...
Parametric Variation Based Analysis AND Effective Design of Rectangular Patch...
 

Similar to Design, Analysis and Implementation of Modified Luby Transform Code

A Simulink model for modified fountain codes
A Simulink model for modified fountain codesA Simulink model for modified fountain codes
A Simulink model for modified fountain codesTELKOMNIKA JOURNAL
 
Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...eSAT Publishing House
 
A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...jpstudcorner
 
A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...jpstudcorner
 
A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...
A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...
A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...VLSICS Design
 
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...ijsrd.com
 
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...IJERA Editor
 
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...cscpconf
 
Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...
Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...
Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...csandit
 
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...IJECEIAES
 
Implementation of Viterbi Decoder on FPGA to Improve Design
Implementation of Viterbi Decoder on FPGA to Improve DesignImplementation of Viterbi Decoder on FPGA to Improve Design
Implementation of Viterbi Decoder on FPGA to Improve Designijsrd.com
 
Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...TELKOMNIKA JOURNAL
 
Data detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmData detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmeSAT Publishing House
 
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...IRJET Journal
 
Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514IJRAT
 

Similar to Design, Analysis and Implementation of Modified Luby Transform Code (20)

A Simulink model for modified fountain codes
A Simulink model for modified fountain codesA Simulink model for modified fountain codes
A Simulink model for modified fountain codes
 
Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...
 
A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...
 
A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...
 
5 ofdm
5 ofdm5 ofdm
5 ofdm
 
A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...
A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...
A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...
 
Lb35189919904
Lb35189919904Lb35189919904
Lb35189919904
 
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
 
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
 
D04561722
D04561722D04561722
D04561722
 
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...
 
Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...
Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...
Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...
 
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
 
Implementation of Viterbi Decoder on FPGA to Improve Design
Implementation of Viterbi Decoder on FPGA to Improve DesignImplementation of Viterbi Decoder on FPGA to Improve Design
Implementation of Viterbi Decoder on FPGA to Improve Design
 
Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...
 
Data detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmData detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdm
 
Ff34970973
Ff34970973Ff34970973
Ff34970973
 
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
 
MC-cdma
MC-cdmaMC-cdma
MC-cdma
 
Paper id 312201514
Paper id 312201514Paper id 312201514
Paper id 312201514
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 

Recently uploaded (20)

9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 

Design, Analysis and Implementation of Modified Luby Transform Code

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 7, Issue 2 (Jul. - Aug. 2013), PP 37-39 www.iosrjournals.org www.iosrjournals.org 37 | Page Design, Analysis and Implementation of Modified Luby Transform Code Anand P1 , George M Joseph2 , Arun.A. S. 3 , Dhanish Vijayan4 , Jerryl James Abraham5 , Gopalakrishnan P N Nair6 , Bob P. George7 1 (M.Tech Student, Department of ECE, SCT College of Engineering, India) 2 (Assistant Professor, Department of ECE, SCT College of Engineering, India) 3 (M.Tech Student, Department of ECE, SCT College of Engineering, India) 4 (M.Tech Student, Department of ECE, College of Engineering, Trivandrum, India) 5,6,7 (Project Engineer, Elementz Engineers Guild Pvt. Ltd., India) Abstract : Bit losses in erasure channels like computer networks are of great concern. The existing methods to combat bit losses are either inefficient or time consuming due to the retransmission protocols involved. Through this paper, we propose a Modified Luby Transform (MLT) coding scheme to efficiently transmit data over live computer networks. The MLT code can combat bit losses as well as eliminate the need for retransmission. The usability and reliability of the proposed MLT code is verified by testing it on a live computer network. Keywords : Erasure channel, Fountain Codes, Luby Transform Codes , Wired Networks, Wireless Networks I. INTRODUCTION Channels with erasures are of great importance. Files sent over the internet or a wired / wireless LAN network are converted to bits / packets, and each bit / packet is either received without error or not received, that is they behave like erasure channels. Also if you take the case of a mail server, when you send a mail, the recipient either receives the mail or does not receive it. There is no chance for the content to be received incorrectly. Erasure codes are codes that work on such erasure channels and combat bit losses / erasures. The erasure channel is described by the probability of erasure of that channel. Say if the probability of erasure is 0.1, it means that 10% of the data transmitted would be lost and the rest 90% would be received without any error. Common methods for communicating over such channels employ a feedback channel from receiver to sender that is used to control the retransmission of erased bits / packets. The receiver might send back messages which enable identification of the missing packets, which are then retransmitted. Alternatively, the receiver might send back acknowledgements for each received packet; the sender keeps track of which packets have been acknowledged and retransmits the others until all packets have been acknowledged. These retransmission protocols have the advantage that they will work regardless of the erasure probability but if the erasure probability is large, the number of feedback messages sent by the first protocol will be large. If the system uses the second protocol, it is very likely that the receiver will end up receiving multiple redundant copies of many packets, and heavy use is made of the feedback channel [1]. Fountain codes are provided as a solution for reliable communication in lossy networks [2], [3]. They eliminate the need of retransmission request which increases the bandwidth consumption and increases the delay. Luby transform (LT) codes are special case of fountain codes [2]. LT encoder chooses randomly from a set of K packets, and according to a distribution, a subset of d packets, and XOR them [2]. In practice, decoding may be possible from a set S of such encoded packets, for S slightly larger than K. In [4], a new method was designed to integrate the notion of network coding with the technique of connected dominating set which represents the source independent backbone in order to improve the broadcast process in ad hoc wireless network. When using the source independent backbone, the intermediate nodes are either responsible for retransmitting all or none of packets. This increases network coding efficiency since forwarder nodes use all available packets in encoding [4]. In [5], some of the nodes are chosen to retransmit messages, independent on coding process. Decoding process is improved in [6]. Fountain codes were used in [7] to broadcast n packets from the source. The source generates m encoded packets using LT codes, and floods each of them into the network. Each recipient retransmits each received packet with certain fixed probability. When a recipient has received enough data, it can decode original packets [7]. In all the above cases, LT codes are used along with retransmission protocols or relaying-based protocols to improve the efficiency. But they do not consider the delay caused by these methods. In practical cases, all the above methods cause delays which are inappropriate for live networks. Through this paper, we propose a Modified Luby Transform (MLT) code which can efficiently combat bit losses and can be efficiently used in a live network without any need for concatenating it with any
  • 2. Design, Analysis and Implementation of Modified Luby Transform Code www.iosrjournals.org 38 | Page retransmission or relay-based protocols. Using the MLT codes, we can eliminate the use of the feedback channel and also improve the performance of the receiver. II. MODIFIED LUBY TRANSFORM (MLT) CODES We propose a modified decoding algorithm for a particular LT encoding pattern. In the proposed MLT codes, the input bits are divided into sets of four bits and each four bit input is encoded to form an eight bit encoded packet. During encoding, the first and last bit of the encoded packet is set to be the first bit of the input. The other bits of the encoded packet would be the XORed version of the previous bit of the encoded packet with the next input bit. Let [ a b c d ] be the input bits and [ E1 E2 E3 E4 E5 E6 E7 E8 ] be the bits of the encoded packet, then E1 = a E2 = E1 xor b = a xor b E3 = E2 xor c = a xor b xor c E4 = E3 xor d = a xor b xor c xor d E5 = E4 xor a = b xor c xor d E6 = E5 xor b = c xor d E7 = E6 xor c = d E8 = a The MLT encoding process is depicted in Fig. 1 below . Fig. 1 Modified Luby Transform (MLT) Encoding While transmitting through the channel, the bits of the encoded packets may get lost. So what we get would be a punctured form of the transmitted bit. At the receiver end, we need to get back the original information from the punctured form of received packet. Here we use a modified decoding algorithm. It is an iterative process. During the first iteration, we make use of the normal LT decoding process in which successive XORing of the bits of the encoded packets will result in the input bits. Since some of the bits of the packet are lost, all the input bits cannot be correctly retrieved. Now, using the retrieved bits and the correctly received bits, we can make further XORed combinations of the input bits. This is used in the next iteration and we look for decoding the input bits by successive XORing of the generated bits in the previous iteration along with the correctly received bits, say we had received „E4‟ ( b xor c xor d ) and correctly retrieved bits, „b‟ and „d‟ but we could not retrieve „c‟; we can generate a combination „b xor d‟ from the correctly retrieved bits and then XOR the generated bit with the „E4‟ to correctly retrieve „c‟. The iteration is continued till all input bits are retrieved or if all bits could not be retrieved even after eight iterations levels. The MLT decoding process is depicted in Fig. 2. below. Fig. 2 Modified Luby Transform (MLT) Decoding III. SIMULATION AND HARDWARE IMPLEMENTATION The MLT codes were simulated using MATLAB R2012a on a computer with Intel i5 2.4GHz (with turbo boost upto 3.2GHz) processor and 4GB RAM. The simulation results of MLT codes are compared with the results obtained for LT codes and for systems with no encoding.
  • 3. Design, Analysis and Implementation of Modified Luby Transform Code www.iosrjournals.org 39 | Page The MLT codes were implemented on a live peer to peer computer network. All data to be transmitted from one computer to another computer were encoded using MLT codes and the data received at the receiving end is decoded to get back the original data. Results from hardware implementation are compared with the simulation results and are discussed in Section IV. IV. RESULTS AND ANALYSIS Fig. 3. Performance Analysis using Probability of Erasure vs Bit Loss Rate graph – (a) No encoding (b) LT encoding (c) MLT encoding (Simulation Results) (d) MLT encoding (Hardware Implementation Results) From Fig. 3, we can see that bit loss rate is considerably reduced using MLT encoding. For channels with probability of erasure less than 0.45, we can see that the bit loss rate is almost zero. This means that we can correctly decode all the data even if almost half of the transmitted data is lost, we can efficiently decode the original data without any need for retransmission. Using LT codes, we can achieve lossless transmission only for channels with probability of erasure less than 0.3. In real situations, probability of erasure would be in range of 0.2 to 0.5 only, if it is more than 0.5, it would mean more or less break in channel or loss of channel as such. Say we have a live network, erasure of over 0.5 occurs when the channel is non-existent or if the router resets itself and is recreating the communication link as such. Even if retransmission is done in any of the above cases, it is more probable that the retransmitted packet is also lost and the retransmission process becomes wasteful and time-consuming. This can be avoided. MLT codes provide an efficient way to transfer data within computer networks by combating bit losses and eliminating retransmission delays. V. CONCLUSION A Modified Luby Transform (MLT) code is designed for computer networks and the analysis is done for channels with different probabilities of erasure. The results were compared with the results obtained by using LT codes and those without any encoding. The comparison results show that the bit loss rate can be efficiently reduced using MLT codes. The hardware implementation is done to ensure usability and reliability in live computer networks without using any retransmission process. Thus, we can conclude that by using MLT codes without any retransmission protocol, we can efficiently transmit data over wired / wireless computer networks and avoiding time delays to a large extent. Acknowledgements We would like to acknowledge Elementz Engineers Guild Private Limited for providing us with the facilities needed for simulation of the MLT codes and for allowing us to test it on live networks at their office premises. REFERENCES [1] D.J.C. MacKay, Fountain codes, Capacity Approaching Codes Design and Implementation Special Section, IEEE Proceedings - Communication Vol.152, No. 6, December 2005 [2] Luby, “LT codes,” in FOCS: IEEE Symposium on Foundations of Computer Science (FOCS), 2002. [3] A. Shokrollahi, “Raptor codes,” IEEE Transactions on Information Theory, vol. 52, no. 6, pp. 2551–2567, 2006. [4] Khaldoun Al Agha, Nour KADI, Ivan Stojmenovic, Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding, Vehicular Technology Conference, 2009. VTC Spring 2009. IEEE 69th [5] E. L. Li, R. Ramjee, M. M. Buddhikot, and S. C. Miller, “Network coding-based broadcast in mobile ad-hoc networks,” in INFOCOM. IEEE, 2007, pp. 1739–1747. [Online]. Available: http://dx.doi.org/10.1109/INFCOM.2007.203 [6] N. Kadi and K. A. Agha, “Optimized MPR-Based Flooding in Wireless Ad Hoc Network using Network Coding,” in IFIP/IEEE Wireless days‟08. Dubai, UAE: IEEE Explorer, November 2008. [7] R. Kumar and A. Paul and U. Ramachandran, “Fountain broadcast for wireless networks,” in IEEE Int. Workshop on Network Sensing Systems, San Diego, USA, 2005.