SlideShare a Scribd company logo
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2347-2349 ISSN: 2249-6645
www.ijmer.com 2347 | Page
Anand P.1
, George M. Joseph2
, Arun A. S.3
, Dhanish Vijayan4
, Jerryl James Abraham5
,
Gopalakrishnan P. N. Nair6
, Bob P. George7
1
(M.Tech Student, Department of ECE, SCT College of Engineering, India)
2
(Assistant Professor, Department of ECE, SCT College of Engineering, India)
3
(M.Tech Student, Department of ECE, SCT College of Engineering, India)
4
(M.Tech Student, Department of ECE, College of Engineering, Trivandrum, India)
5, 6, 7
(Project Engineer, Elementz Engineers Guild Pvt. Ltd., India)
ABSTRACT : Erasure channels like computer networks are of great importance. Due to the large amount of packet
retransmission that takes place in the currently existing methods to combat bit losses in erasure channels, they are either
inefficient or time consuming. Through this paper, we propose a Modified Luby Transform (MLT) coding scheme to
efficiently combat bit losses on transmitted data over computer networks, while eliminating the need for retransmission. The
simulation and implementation results of the proposed MLT code confirm the efficiency of the encoding scheme. The MLT
code is tested on a live computer network and applicability of the code in real world situations is verified and confirmed.
Keywords: Erasure channel, Fountain Codes, Luby Transform Codes, Wired Networks, Wireless Networks
I. INTRODUCTION
Bit losses in erasure channels are of great concern. Files sent over the internet or a wired / wireless LAN network
are converted to bits / packets, and each bit / packet is either received without error or not received, that is they behave like
erasure channels. Also if you take the case of a mail server, when you send a mail, the recipient either receives the mail or
does not receive it. There is no chance for the content to be received incorrectly. Erasure codes are codes that work on such
erasure channels and combat bit losses / erasures. The erasure channel is described by the probability of erasure of that
channel. Say if the probability of erasure is 0.1, it means that 10% of the data transmitted would be lost and the rest 90%
would be received without any error.
Common methods for communicating over such channels employ a feedback channel from receiver to sender that is
used to control the retransmission of erased bits / packets. The receiver might send back messages which enable
identification of the missing packets, which are then retransmitted. Alternatively, the receiver might send back
acknowledgements for each received packet; the sender keeps track of which packets have been acknowledged and
retransmits the others until all packets have been acknowledged.
These retransmission protocols have the advantage that they will work regardless of the erasure probability but if
the erasure probability is large, the number of feedback messages sent by the first protocol will be large. If the system uses
the second protocol, it is very likely that the receiver will end up receiving multiple redundant copies of many packets, and
heavy use is made of the feedback channel [1]. Fountain codes are provided as a solution for reliable communication in
lossy networks [2] [3] [4]. They eliminate the need of retransmission request which increases the bandwidth consumption
and increases the delay. Luby transform (LT) codes are special case of fountain codes [2]. LT encoder chooses randomly
from a set of K packets, and according to a distribution, a subset of d packets, and XOR them [2]. In practice, decoding may
be possible from a set S of such encoded packets, for S slightly larger than K.
In [5], a new method was designed to integrate the notion of network coding with the technique of connected
dominating set which represents the source independent backbone in order to improve the broadcast process in ad hoc
wireless network. When using the source independent backbone, the intermediate nodes are either responsible for
retransmitting all or none of packets. This increases network coding efficiency since forwarder nodes use all available
packets in encoding [5]. In [6], some of the nodes are chosen to retransmit messages, independent on coding process.
Decoding process is improved in [7]. Fountain codes were used in [8] to broadcast n packets from the source. The source
generates m encoded packets using LT codes, and floods each of them into the network. Each recipient retransmits each
received packet with certain fixed probability. When a recipient has received enough data, it can decode original packets [8].
In all the above cases, LT codes are used along with retransmission protocols or relaying-based protocols to improve the
efficiency. But they do not consider the delay caused by these methods. In practical cases, all the above methods cause
delays which are inappropriate for live networks. Through this paper, we propose a Modified Luby Transform (MLT) code
which can efficiently combat bit losses and can be efficiently used in a live network without any need for concatenating it
with any retransmission or relay-based protocols. Using the MLT codes, we can eliminate the use of the feedback channel
and also improve the performance of the receiver.
II. MODIFIED LUBY TRANSFORM (MLT) CODE
We propose a modified decoding algorithm for a particular LT encoding pattern. In the proposed MLT codes, the
input bits are divided into sets of four bits and each four bit input is encoded to form an eight bit encoded packet. During
encoding, the first and last bit of the encoded packet is set to be the first bit of the input. The other bits of the encoded packet
Combating Bit Losses in Computer Networks using
Modified Luby Transform Code
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2347-2349 ISSN: 2249-6645
www.ijmer.com 2348 | Page
would be the XORed version of the previous bit of the encoded packet with the next input bit. Let [ a b c d ] be the input bits
and [ E1 E2 E3 E4 E5 E6 E7 E8 ] be the bits of the encoded packet, then
E1 = a
E2 = E1 xor b = a xor b
E3 = E2 xor c = a xor b xor c
E4 = E3 xor d = a xor b xor c xor d
E5 = E4 xor a = b xor c xor d
E6 = E5 xor b = c xor d
E7 = E6 xor c = d
E8 = a
The MLT encoding process is depicted in Fig. 1 below
.
Fig. 1 Modified Luby Transform (MLT) Encoding
While transmitting through the channel, the bits of the encoded packets may get lost. So what we get would be a
punctured form of the transmitted bit. At the receiver end, we need to get back the original information from the punctured
form of received packet. Here we use a modified decoding algorithm. It is an iterative process. During the first iteration, we
make use of the normal LT decoding process in which successive XORing of the bits of the encoded packets will result in
the input bits. Since some of the bits of the packet are lost, all the input bits cannot be correctly retrieved. Now, using the
retrieved bits and the correctly received bits, we can make further XORed combinations of the input bits. This is used in the
next iteration and we look for decoding the input bits by successive XORing of the generated bits in the previous iteration
along with the correctly received bits, say we had received „E4‟ ( b xor c xor d ) and correctly retrieved bits, „b‟ and „d‟ but
we could not retrieve „c‟; we can generate a combination „b xor d‟ from the correctly retrieved bits and then XOR the
generated bit with the „E4‟ to correctly retrieve „c‟. The iteration is continued till all input bits are retrieved or if all bits
could not be retrieved even after eight iterations levels.
The MLT decoding process is depicted in Fig. 2 below. The blank portions indicate the bits lost during data
transmission and recovery of original data is possible even though all the bits of the received packet are not received
properly at the receiver end.
Fig. 2 Modified Luby Transform (MLT) Decoding
III. SIMULATION AND HARDWARE IMPLEMENTATION
The MLT codes were simulated using MATLAB R2012a on a computer with Intel i5 2.4GHz (with turbo boost
upto 3.2GHz) processor and 4GB RAM. The simulation results of MLT codes are compared with the results obtained for LT
codes and for systems with no encoding.
The MLT codes were implemented on a live peer to peer computer network. All data to be transmitted from one
computer to another computer were encoded using MLT codes and the data received at the receiving end is decoded to get
back the original data. Results from hardware implementation are compared with the simulation results and are discussed in
Section IV.
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2347-2349 ISSN: 2249-6645
www.ijmer.com 2349 | Page
IV. RESULTS AND ANALYSIS
Fig. 3. Performance Analysis using Probability of Erasure vs Bit Loss Rate graph – (a) No encoding (b) LT encoding (c)
MLT encoding (Simulation Results) (d) MLT encoding (Hardware Implementation Results)
From Fig. 3, we can see that bit loss rate is considerably reduced using MLT encoding. For channels with
probability of erasure less than 0.45, we can see that the bit loss rate is almost zero. This means that we can correctly decode
all the data even if almost half of the transmitted data is lost, we can efficiently decode the original data without any need for
retransmission. Using LT codes, we can achieve lossless transmission only for channels with probability of erasure less than
0.3. In real situations, probability of erasure would be in range of 0.2 to 0.5 only, if it is more than 0.5, it would mean more
or less break in channel or loss of channel as such. Say we have a live network, erasure of over 0.5 occurs when the channel
is non-existent or if the router resets itself and is recreating the communication link as such. Even if retransmission is done in
any of the above cases, it is more probable that the retransmitted packet is also lost and the retransmission process becomes
wasteful and time-consuming. This can be avoided. MLT codes provide an efficient way to transfer data within computer
networks by combating bit losses and eliminating retransmission delays.
V. CONCLUSION
A Modified Luby Transform (MLT) code is designed for computer networks and the analysis is done for channels
with different probabilities of erasure. The results were compared with the results obtained by using LT codes and those
without any encoding. The comparison results show that the bit loss rate can be efficiently reduced using MLT codes. The
hardware implementation is done to ensure usability and reliability in live computer networks without using any
retransmission process. Thus, we can conclude that by using MLT codes without any retransmission protocol, we can
efficiently transmit data over wired / wireless computer networks and avoiding time delays to a large extent.
ACKNOWLEDGEMENTS
We would like to acknowledge Elementz Engineers Guild Private Limited for providing us with the facilities needed for
simulation of the MLT codes and for allowing us to test it on live networks at their office premises.
REFERENCES
[1]. D.J.C. MacKay, Fountain codes, Capacity Approaching Codes Design and Implementation Special Section, IEEE Proceedings -
Communication Vol.152, No. 6, December 2005
[2]. Luby, “LT codes,” in FOCS: IEEE Symposium on Foundations of Computer Science (FOCS), 2002.
[3]. Anand P., et al., “Design, Analysis and Implementation of Modified Luby Transform Code,” IOSR Journal of Electronics and
Communication Engineering, volume 7, issue 1, pp. 42-51, 2013.
[4]. Shokrollahi, “Raptor codes,” IEEE Transactions on Information Theory, vol. 52, no. 6, pp. 2551–2567, 2006.
[5]. Khaldoun Al Agha, Nour KADI, Ivan Stojmenovic, Fountain Codes with XOR of Encoded Packets for Broadcasting and source
independent backbone in Multi-hop Networks using Network Coding, Vehicular Technology Conference, 2009. VTC Spring 2009.
IEEE 69th
[6]. E. L. Li, R. Ramjee, M. M. Buddhikot, and S. C. Miller, “Network coding-based broadcast in mobile ad-hoc networks,” in
INFOCOM. IEEE, 2007, pp. 1739–1747. [Online]. Available: http://dx.doi.org/10.1109/INFCOM.2007.203
[7]. N. Kadi and K. A. Agha, “Optimized MPR-Based Flooding in Wireless Ad Hoc Network using Network Coding,” in IFIP/IEEE
Wireless days‟08. Dubai, UAE: IEEE Explorer, November 2008.
[8]. R. Kumar and A. Paul and U. Ramachandran, “Fountain broadcast for wireless networks,” in IEEE Int. Workshop on Network
Sensing Systems, San Diego, USA, 2005.

More Related Content

What's hot

Fpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiverFpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiveriaemedu
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder
IJECEIAES
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding Techniques
IJTET Journal
 
02 Network Models
02 Network Models02 Network Models
02 Network Models
Ahmar Hashmi
 
Chapter 20
Chapter 20Chapter 20
Chapter 20
Faisal Mehmood
 
Multi Process Message Formats
Multi Process Message FormatsMulti Process Message Formats
Multi Process Message Formats
Pathfinder Solutions
 
Interprocess Message Formats
Interprocess Message FormatsInterprocess Message Formats
Interprocess Message Formats
Pathfinder Solutions
 
Chapter 20: Internet Protocol
Chapter 20: Internet ProtocolChapter 20: Internet Protocol
Chapter 20: Internet Protocol
Shafaan Khaliq Bhatti
 
Implementation of Interleaving Methods on MELP 2.4 Coder to Reduce Packet Los...
Implementation of Interleaving Methods on MELP 2.4 Coder to Reduce Packet Los...Implementation of Interleaving Methods on MELP 2.4 Coder to Reduce Packet Los...
Implementation of Interleaving Methods on MELP 2.4 Coder to Reduce Packet Los...
IJERA Editor
 
Nd
NdNd
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
IJECEIAES
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
DhanashriNandre
 
Sample ch10 corr-maurer_netty_december03
Sample ch10 corr-maurer_netty_december03Sample ch10 corr-maurer_netty_december03
Sample ch10 corr-maurer_netty_december03
Milena Stefanova
 
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
eSAT Journals
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
Kathirvel Ayyaswamy
 
An Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH DecoderAn Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH Decoder
ijsrd.com
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
IJERA Editor
 
SYMMETRIC ENCRYPTION ALGORITHM IN SPEECH CODING FOR DEFENCE COMMUNICATIONS
SYMMETRIC ENCRYPTION ALGORITHM IN SPEECH CODING FOR DEFENCE COMMUNICATIONSSYMMETRIC ENCRYPTION ALGORITHM IN SPEECH CODING FOR DEFENCE COMMUNICATIONS
SYMMETRIC ENCRYPTION ALGORITHM IN SPEECH CODING FOR DEFENCE COMMUNICATIONS
cscpconf
 
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionBTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
Engr. Md. Jamal Uddin Rayhan
 

What's hot (20)

Fpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiverFpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiver
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder
 
Survey on Error Control Coding Techniques
Survey on Error Control Coding TechniquesSurvey on Error Control Coding Techniques
Survey on Error Control Coding Techniques
 
02 Network Models
02 Network Models02 Network Models
02 Network Models
 
Chapter 20
Chapter 20Chapter 20
Chapter 20
 
Multi Process Message Formats
Multi Process Message FormatsMulti Process Message Formats
Multi Process Message Formats
 
Interprocess Message Formats
Interprocess Message FormatsInterprocess Message Formats
Interprocess Message Formats
 
Chapter 20: Internet Protocol
Chapter 20: Internet ProtocolChapter 20: Internet Protocol
Chapter 20: Internet Protocol
 
Implementation of Interleaving Methods on MELP 2.4 Coder to Reduce Packet Los...
Implementation of Interleaving Methods on MELP 2.4 Coder to Reduce Packet Los...Implementation of Interleaving Methods on MELP 2.4 Coder to Reduce Packet Los...
Implementation of Interleaving Methods on MELP 2.4 Coder to Reduce Packet Los...
 
Nd
NdNd
Nd
 
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
 
Ch21
Ch21Ch21
Ch21
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
 
Sample ch10 corr-maurer_netty_december03
Sample ch10 corr-maurer_netty_december03Sample ch10 corr-maurer_netty_december03
Sample ch10 corr-maurer_netty_december03
 
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
An Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH DecoderAn Efficient Interpolation-Based Chase BCH Decoder
An Efficient Interpolation-Based Chase BCH Decoder
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
SYMMETRIC ENCRYPTION ALGORITHM IN SPEECH CODING FOR DEFENCE COMMUNICATIONS
SYMMETRIC ENCRYPTION ALGORITHM IN SPEECH CODING FOR DEFENCE COMMUNICATIONSSYMMETRIC ENCRYPTION ALGORITHM IN SPEECH CODING FOR DEFENCE COMMUNICATIONS
SYMMETRIC ENCRYPTION ALGORITHM IN SPEECH CODING FOR DEFENCE COMMUNICATIONS
 
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionBTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
 

Viewers also liked

Ae32626632
Ae32626632Ae32626632
Ae32626632IJMER
 
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
IJMER
 
Impact of Medical Mal-Practice in India
Impact of Medical Mal-Practice in IndiaImpact of Medical Mal-Practice in India
Impact of Medical Mal-Practice in India
IJMER
 
Acquisition of Long Pseudo Code in Dsss Signal
Acquisition of Long Pseudo Code in Dsss SignalAcquisition of Long Pseudo Code in Dsss Signal
Acquisition of Long Pseudo Code in Dsss Signal
IJMER
 
AC-DC-AC-DC Converter Using Silicon Carbide Schottky Diode
AC-DC-AC-DC Converter Using Silicon Carbide Schottky DiodeAC-DC-AC-DC Converter Using Silicon Carbide Schottky Diode
AC-DC-AC-DC Converter Using Silicon Carbide Schottky Diode
IJMER
 
C04011117
C04011117C04011117
C04011117IJMER
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud Storage
IJMER
 
Ijmer 46061528
Ijmer 46061528Ijmer 46061528
Ijmer 46061528IJMER
 
Bf32785787
Bf32785787Bf32785787
Bf32785787IJMER
 
Evaluation and Accuracy Assessment of Static GPS Technique in Monitoring of ...
Evaluation and Accuracy Assessment of Static GPS Technique in  Monitoring of ...Evaluation and Accuracy Assessment of Static GPS Technique in  Monitoring of ...
Evaluation and Accuracy Assessment of Static GPS Technique in Monitoring of ...
IJMER
 
Bm31225230
Bm31225230Bm31225230
Bm31225230IJMER
 
Dj31514517
Dj31514517Dj31514517
Dj31514517IJMER
 
Co31391395
Co31391395Co31391395
Co31391395IJMER
 
Cl32990995
Cl32990995Cl32990995
Cl32990995IJMER
 
Upgrading of Low Temperature Solar Heat with Cascade Vapor Compression and Ab...
Upgrading of Low Temperature Solar Heat with Cascade Vapor Compression and Ab...Upgrading of Low Temperature Solar Heat with Cascade Vapor Compression and Ab...
Upgrading of Low Temperature Solar Heat with Cascade Vapor Compression and Ab...
IJMER
 
Ds31568573
Ds31568573Ds31568573
Ds31568573IJMER
 
Structural Behaviour of Fibrous Concrete Using Polypropylene Fibres
Structural Behaviour of Fibrous Concrete Using Polypropylene FibresStructural Behaviour of Fibrous Concrete Using Polypropylene Fibres
Structural Behaviour of Fibrous Concrete Using Polypropylene Fibres
IJMER
 
The Method of Repeated Application of a Quadrature Formula of Trapezoids and ...
The Method of Repeated Application of a Quadrature Formula of Trapezoids and ...The Method of Repeated Application of a Quadrature Formula of Trapezoids and ...
The Method of Repeated Application of a Quadrature Formula of Trapezoids and ...
IJMER
 
Ijmer 46069196
Ijmer 46069196Ijmer 46069196
Ijmer 46069196IJMER
 
B04011 03 1318
B04011 03 1318B04011 03 1318
B04011 03 1318IJMER
 

Viewers also liked (20)

Ae32626632
Ae32626632Ae32626632
Ae32626632
 
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
 
Impact of Medical Mal-Practice in India
Impact of Medical Mal-Practice in IndiaImpact of Medical Mal-Practice in India
Impact of Medical Mal-Practice in India
 
Acquisition of Long Pseudo Code in Dsss Signal
Acquisition of Long Pseudo Code in Dsss SignalAcquisition of Long Pseudo Code in Dsss Signal
Acquisition of Long Pseudo Code in Dsss Signal
 
AC-DC-AC-DC Converter Using Silicon Carbide Schottky Diode
AC-DC-AC-DC Converter Using Silicon Carbide Schottky DiodeAC-DC-AC-DC Converter Using Silicon Carbide Schottky Diode
AC-DC-AC-DC Converter Using Silicon Carbide Schottky Diode
 
C04011117
C04011117C04011117
C04011117
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud Storage
 
Ijmer 46061528
Ijmer 46061528Ijmer 46061528
Ijmer 46061528
 
Bf32785787
Bf32785787Bf32785787
Bf32785787
 
Evaluation and Accuracy Assessment of Static GPS Technique in Monitoring of ...
Evaluation and Accuracy Assessment of Static GPS Technique in  Monitoring of ...Evaluation and Accuracy Assessment of Static GPS Technique in  Monitoring of ...
Evaluation and Accuracy Assessment of Static GPS Technique in Monitoring of ...
 
Bm31225230
Bm31225230Bm31225230
Bm31225230
 
Dj31514517
Dj31514517Dj31514517
Dj31514517
 
Co31391395
Co31391395Co31391395
Co31391395
 
Cl32990995
Cl32990995Cl32990995
Cl32990995
 
Upgrading of Low Temperature Solar Heat with Cascade Vapor Compression and Ab...
Upgrading of Low Temperature Solar Heat with Cascade Vapor Compression and Ab...Upgrading of Low Temperature Solar Heat with Cascade Vapor Compression and Ab...
Upgrading of Low Temperature Solar Heat with Cascade Vapor Compression and Ab...
 
Ds31568573
Ds31568573Ds31568573
Ds31568573
 
Structural Behaviour of Fibrous Concrete Using Polypropylene Fibres
Structural Behaviour of Fibrous Concrete Using Polypropylene FibresStructural Behaviour of Fibrous Concrete Using Polypropylene Fibres
Structural Behaviour of Fibrous Concrete Using Polypropylene Fibres
 
The Method of Repeated Application of a Quadrature Formula of Trapezoids and ...
The Method of Repeated Application of a Quadrature Formula of Trapezoids and ...The Method of Repeated Application of a Quadrature Formula of Trapezoids and ...
The Method of Repeated Application of a Quadrature Formula of Trapezoids and ...
 
Ijmer 46069196
Ijmer 46069196Ijmer 46069196
Ijmer 46069196
 
B04011 03 1318
B04011 03 1318B04011 03 1318
B04011 03 1318
 

Similar to Combating Bit Losses in Computer Networks using Modified Luby Transform Code

Lb35189919904
Lb35189919904Lb35189919904
Lb35189919904
IJERA Editor
 
A Simulink model for modified fountain codes
A Simulink model for modified fountain codesA Simulink model for modified fountain codes
A Simulink model for modified fountain codes
TELKOMNIKA JOURNAL
 
Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...
eSAT Publishing House
 
5 ofdm
5 ofdm5 ofdm
5 ofdm
Thehieu Dang
 
A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...
jpstudcorner
 
A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...
jpstudcorner
 
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
IJERA Editor
 
G364246
G364246G364246
G364246
IJERA Editor
 
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
ijsrd.com
 
Implementation of Viterbi Decoder on FPGA to Improve Design
Implementation of Viterbi Decoder on FPGA to Improve DesignImplementation of Viterbi Decoder on FPGA to Improve Design
Implementation of Viterbi Decoder on FPGA to Improve Design
ijsrd.com
 
Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...
TELKOMNIKA JOURNAL
 
Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...
IOSR Journals
 
D04561722
D04561722D04561722
D04561722
IOSR-JEN
 
A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...
A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...
A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...
VLSICS Design
 
Ff34970973
Ff34970973Ff34970973
Ff34970973
IJERA Editor
 
IRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET- Review Paper on Study of Various Interleavers and their SignificanceIRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET Journal
 
Unit 2 [autosaved]
Unit 2 [autosaved]Unit 2 [autosaved]
Unit 2 [autosaved]
logesswarisrinivasan
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layermekind
 

Similar to Combating Bit Losses in Computer Networks using Modified Luby Transform Code (20)

Lb35189919904
Lb35189919904Lb35189919904
Lb35189919904
 
A Simulink model for modified fountain codes
A Simulink model for modified fountain codesA Simulink model for modified fountain codes
A Simulink model for modified fountain codes
 
Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...
 
5 ofdm
5 ofdm5 ofdm
5 ofdm
 
20120140505006
2012014050500620120140505006
20120140505006
 
A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...
 
A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...
 
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
 
G364246
G364246G364246
G364246
 
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
 
Implementation of Viterbi Decoder on FPGA to Improve Design
Implementation of Viterbi Decoder on FPGA to Improve DesignImplementation of Viterbi Decoder on FPGA to Improve Design
Implementation of Viterbi Decoder on FPGA to Improve Design
 
Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...
 
Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...
 
D04561722
D04561722D04561722
D04561722
 
A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...
A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...
A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...
 
Ff34970973
Ff34970973Ff34970973
Ff34970973
 
IRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET- Review Paper on Study of Various Interleavers and their SignificanceIRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET- Review Paper on Study of Various Interleavers and their Significance
 
Unit 2 [autosaved]
Unit 2 [autosaved]Unit 2 [autosaved]
Unit 2 [autosaved]
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layer
 
40120140505011
4012014050501140120140505011
40120140505011
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
IJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
IJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
IJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
IJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
IJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
IJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
IJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
IJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
IJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
IJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
IJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
IJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
IJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Recently uploaded

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Combating Bit Losses in Computer Networks using Modified Luby Transform Code

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2347-2349 ISSN: 2249-6645 www.ijmer.com 2347 | Page Anand P.1 , George M. Joseph2 , Arun A. S.3 , Dhanish Vijayan4 , Jerryl James Abraham5 , Gopalakrishnan P. N. Nair6 , Bob P. George7 1 (M.Tech Student, Department of ECE, SCT College of Engineering, India) 2 (Assistant Professor, Department of ECE, SCT College of Engineering, India) 3 (M.Tech Student, Department of ECE, SCT College of Engineering, India) 4 (M.Tech Student, Department of ECE, College of Engineering, Trivandrum, India) 5, 6, 7 (Project Engineer, Elementz Engineers Guild Pvt. Ltd., India) ABSTRACT : Erasure channels like computer networks are of great importance. Due to the large amount of packet retransmission that takes place in the currently existing methods to combat bit losses in erasure channels, they are either inefficient or time consuming. Through this paper, we propose a Modified Luby Transform (MLT) coding scheme to efficiently combat bit losses on transmitted data over computer networks, while eliminating the need for retransmission. The simulation and implementation results of the proposed MLT code confirm the efficiency of the encoding scheme. The MLT code is tested on a live computer network and applicability of the code in real world situations is verified and confirmed. Keywords: Erasure channel, Fountain Codes, Luby Transform Codes, Wired Networks, Wireless Networks I. INTRODUCTION Bit losses in erasure channels are of great concern. Files sent over the internet or a wired / wireless LAN network are converted to bits / packets, and each bit / packet is either received without error or not received, that is they behave like erasure channels. Also if you take the case of a mail server, when you send a mail, the recipient either receives the mail or does not receive it. There is no chance for the content to be received incorrectly. Erasure codes are codes that work on such erasure channels and combat bit losses / erasures. The erasure channel is described by the probability of erasure of that channel. Say if the probability of erasure is 0.1, it means that 10% of the data transmitted would be lost and the rest 90% would be received without any error. Common methods for communicating over such channels employ a feedback channel from receiver to sender that is used to control the retransmission of erased bits / packets. The receiver might send back messages which enable identification of the missing packets, which are then retransmitted. Alternatively, the receiver might send back acknowledgements for each received packet; the sender keeps track of which packets have been acknowledged and retransmits the others until all packets have been acknowledged. These retransmission protocols have the advantage that they will work regardless of the erasure probability but if the erasure probability is large, the number of feedback messages sent by the first protocol will be large. If the system uses the second protocol, it is very likely that the receiver will end up receiving multiple redundant copies of many packets, and heavy use is made of the feedback channel [1]. Fountain codes are provided as a solution for reliable communication in lossy networks [2] [3] [4]. They eliminate the need of retransmission request which increases the bandwidth consumption and increases the delay. Luby transform (LT) codes are special case of fountain codes [2]. LT encoder chooses randomly from a set of K packets, and according to a distribution, a subset of d packets, and XOR them [2]. In practice, decoding may be possible from a set S of such encoded packets, for S slightly larger than K. In [5], a new method was designed to integrate the notion of network coding with the technique of connected dominating set which represents the source independent backbone in order to improve the broadcast process in ad hoc wireless network. When using the source independent backbone, the intermediate nodes are either responsible for retransmitting all or none of packets. This increases network coding efficiency since forwarder nodes use all available packets in encoding [5]. In [6], some of the nodes are chosen to retransmit messages, independent on coding process. Decoding process is improved in [7]. Fountain codes were used in [8] to broadcast n packets from the source. The source generates m encoded packets using LT codes, and floods each of them into the network. Each recipient retransmits each received packet with certain fixed probability. When a recipient has received enough data, it can decode original packets [8]. In all the above cases, LT codes are used along with retransmission protocols or relaying-based protocols to improve the efficiency. But they do not consider the delay caused by these methods. In practical cases, all the above methods cause delays which are inappropriate for live networks. Through this paper, we propose a Modified Luby Transform (MLT) code which can efficiently combat bit losses and can be efficiently used in a live network without any need for concatenating it with any retransmission or relay-based protocols. Using the MLT codes, we can eliminate the use of the feedback channel and also improve the performance of the receiver. II. MODIFIED LUBY TRANSFORM (MLT) CODE We propose a modified decoding algorithm for a particular LT encoding pattern. In the proposed MLT codes, the input bits are divided into sets of four bits and each four bit input is encoded to form an eight bit encoded packet. During encoding, the first and last bit of the encoded packet is set to be the first bit of the input. The other bits of the encoded packet Combating Bit Losses in Computer Networks using Modified Luby Transform Code
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2347-2349 ISSN: 2249-6645 www.ijmer.com 2348 | Page would be the XORed version of the previous bit of the encoded packet with the next input bit. Let [ a b c d ] be the input bits and [ E1 E2 E3 E4 E5 E6 E7 E8 ] be the bits of the encoded packet, then E1 = a E2 = E1 xor b = a xor b E3 = E2 xor c = a xor b xor c E4 = E3 xor d = a xor b xor c xor d E5 = E4 xor a = b xor c xor d E6 = E5 xor b = c xor d E7 = E6 xor c = d E8 = a The MLT encoding process is depicted in Fig. 1 below . Fig. 1 Modified Luby Transform (MLT) Encoding While transmitting through the channel, the bits of the encoded packets may get lost. So what we get would be a punctured form of the transmitted bit. At the receiver end, we need to get back the original information from the punctured form of received packet. Here we use a modified decoding algorithm. It is an iterative process. During the first iteration, we make use of the normal LT decoding process in which successive XORing of the bits of the encoded packets will result in the input bits. Since some of the bits of the packet are lost, all the input bits cannot be correctly retrieved. Now, using the retrieved bits and the correctly received bits, we can make further XORed combinations of the input bits. This is used in the next iteration and we look for decoding the input bits by successive XORing of the generated bits in the previous iteration along with the correctly received bits, say we had received „E4‟ ( b xor c xor d ) and correctly retrieved bits, „b‟ and „d‟ but we could not retrieve „c‟; we can generate a combination „b xor d‟ from the correctly retrieved bits and then XOR the generated bit with the „E4‟ to correctly retrieve „c‟. The iteration is continued till all input bits are retrieved or if all bits could not be retrieved even after eight iterations levels. The MLT decoding process is depicted in Fig. 2 below. The blank portions indicate the bits lost during data transmission and recovery of original data is possible even though all the bits of the received packet are not received properly at the receiver end. Fig. 2 Modified Luby Transform (MLT) Decoding III. SIMULATION AND HARDWARE IMPLEMENTATION The MLT codes were simulated using MATLAB R2012a on a computer with Intel i5 2.4GHz (with turbo boost upto 3.2GHz) processor and 4GB RAM. The simulation results of MLT codes are compared with the results obtained for LT codes and for systems with no encoding. The MLT codes were implemented on a live peer to peer computer network. All data to be transmitted from one computer to another computer were encoded using MLT codes and the data received at the receiving end is decoded to get back the original data. Results from hardware implementation are compared with the simulation results and are discussed in Section IV.
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2347-2349 ISSN: 2249-6645 www.ijmer.com 2349 | Page IV. RESULTS AND ANALYSIS Fig. 3. Performance Analysis using Probability of Erasure vs Bit Loss Rate graph – (a) No encoding (b) LT encoding (c) MLT encoding (Simulation Results) (d) MLT encoding (Hardware Implementation Results) From Fig. 3, we can see that bit loss rate is considerably reduced using MLT encoding. For channels with probability of erasure less than 0.45, we can see that the bit loss rate is almost zero. This means that we can correctly decode all the data even if almost half of the transmitted data is lost, we can efficiently decode the original data without any need for retransmission. Using LT codes, we can achieve lossless transmission only for channels with probability of erasure less than 0.3. In real situations, probability of erasure would be in range of 0.2 to 0.5 only, if it is more than 0.5, it would mean more or less break in channel or loss of channel as such. Say we have a live network, erasure of over 0.5 occurs when the channel is non-existent or if the router resets itself and is recreating the communication link as such. Even if retransmission is done in any of the above cases, it is more probable that the retransmitted packet is also lost and the retransmission process becomes wasteful and time-consuming. This can be avoided. MLT codes provide an efficient way to transfer data within computer networks by combating bit losses and eliminating retransmission delays. V. CONCLUSION A Modified Luby Transform (MLT) code is designed for computer networks and the analysis is done for channels with different probabilities of erasure. The results were compared with the results obtained by using LT codes and those without any encoding. The comparison results show that the bit loss rate can be efficiently reduced using MLT codes. The hardware implementation is done to ensure usability and reliability in live computer networks without using any retransmission process. Thus, we can conclude that by using MLT codes without any retransmission protocol, we can efficiently transmit data over wired / wireless computer networks and avoiding time delays to a large extent. ACKNOWLEDGEMENTS We would like to acknowledge Elementz Engineers Guild Private Limited for providing us with the facilities needed for simulation of the MLT codes and for allowing us to test it on live networks at their office premises. REFERENCES [1]. D.J.C. MacKay, Fountain codes, Capacity Approaching Codes Design and Implementation Special Section, IEEE Proceedings - Communication Vol.152, No. 6, December 2005 [2]. Luby, “LT codes,” in FOCS: IEEE Symposium on Foundations of Computer Science (FOCS), 2002. [3]. Anand P., et al., “Design, Analysis and Implementation of Modified Luby Transform Code,” IOSR Journal of Electronics and Communication Engineering, volume 7, issue 1, pp. 42-51, 2013. [4]. Shokrollahi, “Raptor codes,” IEEE Transactions on Information Theory, vol. 52, no. 6, pp. 2551–2567, 2006. [5]. Khaldoun Al Agha, Nour KADI, Ivan Stojmenovic, Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding, Vehicular Technology Conference, 2009. VTC Spring 2009. IEEE 69th [6]. E. L. Li, R. Ramjee, M. M. Buddhikot, and S. C. Miller, “Network coding-based broadcast in mobile ad-hoc networks,” in INFOCOM. IEEE, 2007, pp. 1739–1747. [Online]. Available: http://dx.doi.org/10.1109/INFCOM.2007.203 [7]. N. Kadi and K. A. Agha, “Optimized MPR-Based Flooding in Wireless Ad Hoc Network using Network Coding,” in IFIP/IEEE Wireless days‟08. Dubai, UAE: IEEE Explorer, November 2008. [8]. R. Kumar and A. Paul and U. Ramachandran, “Fountain broadcast for wireless networks,” in IEEE Int. Workshop on Network Sensing Systems, San Diego, USA, 2005.