Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2016, Article ID 2390734, 8 pages
http://dx.doi.org/10.1155/2016/2390734
Research Article

A UEP LT Codes Design with Feedback for Underwater Communication

College of Information and Communication Engineering, Harbin Engineering University, Harbin, China

Received 25 March 2016; Accepted 1 August 2016

Academic Editor: Vincenzo Stornelli

Copyright © 2016 Danfeng Zhao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

To satisfy the performance requirement of LT codes with Unequal Erasure Protection (UEP) in underwater environment, the Weighted Expanding Window Fountain (WEWF) code is proposed in this paper. The WEWF codes can achieve strong UEP property by nonuniformly selecting input symbols within each window. To overcome the disadvantages in terms of redundancy in the lower prioritized segments, Correlation Chain Feedback (CCFB) is also introduced to help the transmitter to precisely adjust the encoding scheme. Asymptotic analysis and simulation results demonstrate that the proposed approach can achieve lower symbol error rate and less overall redundancy in the underwater acoustic sensor networks.

1. Introduction

Up to now, digital fountain codes (DFC) have become an efficient data transmission scheme for underwater acoustic sensor networks (UASNs) [13], and the most commonly used DFC are LT codes and Raptor codes. LT codes are the first realization of DFC and have the characteristic of low computation complexity [4]; at the same time, Raptor codes can achieve linear-time encoding and decoding by the concatenation of LT codes with other precoding schemes [5]. In general, LT codes are designed to provide equal erasure protection (EEP) for all input symbols. However, for some applications like underwater image transmission with MPEG or H.264 compression technique, a portion of data may need more protection than the rest. To satisfy the requirements of such applications, the codes with Unequal Erasure Protection (UEP) were proposed [6].

Choosing a degree according to a degree distribution and uniformly selecting input symbols as neighbors are two core steps of LT encoding. Existing UEP LT coding methods can be divided into two categories, the first of which is to change the selecting probability to guarantee that higher prioritized segments can get more protection, such as Weighted LT (WLT) codes [7] and Expanding Window Fountain (EWF) codes [8]. And the second, such as the duplication method proposed in [9] and Duplicating-Expanding Window Fountain (D-EWF) codes [10], is based on the idea of virtually increasing the source block size. The latter is more superior in terms of UEP performance, however, at the cost of compromising quite big transmission budget once the original source block size or repeat factors are large. Although the aforementioned methods successfully provide UEP, there still exists a significant price in terms of redundancy especially for the lower prioritized segments.

A feasible method to solve this problem is to introduce intermediate feedback into UEP LT codes [11, 12], improving the decoding performance of the lower prioritized segments [1315] dramatically. Therefore, this paper proposes an efficient solution to provide UEP for energy-restricted underwater environment with harsh channel conditions by utilizing the abovementioned method to improve the performance of the more important data and simultaneously introducing the Correlation Chain Feedback to optimize the overall redundancy.

The rest of this paper is organized as follows. Section 2 describes the design and provides an asymptotic analysis of the proposed method. Section 3 presents the simulation results, and this paper is concluded in Section 4.

2. Weighted Expanding Window Fountain Codes

In this section, we firstly propose a new method called Weighted Expanding Window Fountain (WEWF) codes; it improves the UEP performance of EWF codes by introducing weighted scheme into the lower prioritized windows. After that, the asymptotic analysis of the proposed method is given. Finally, we bring in Correlation Chain Feedback to optimize the performance of the lower prioritized segments.

2.1. Weighted Expanding Window Fountain

Suppose that a source block of symbols is partitioned into adjacent classes of size , where is the proportion of the prioritized class accounted for by the source data with . Noticeably, the important level of Si decreases with the increase of . Two parameters also are defined as and . Firstly, we divide these classes into windows , and each window can be written as the concatenation of the classes with the size of the window satisfying . A degree distribution on the set is defined as ; then, the proposed Weighted Expanding Window Fountain (WEWF) codes can be generated as follows:(1)Randomly select a window based on a probability distribution such that is the probability of the selected window .(2)Randomly select a degree according to the degree distribution .(3)Suppose that the weighted vector of the window is , where . Choose uniformly distinct input symbols as neighbors if they satisfy . Otherwise, the adjacent input symbols are determined nonuniformly at random. As for any source block , we choose distinct input symbols with , and the last neighbors are chosen from . Here, the operator means the nearest integer to .(4)Finally, the output symbols are generated by the operation of the bitwise modulo-2 sum of the neighbors.

To summarize, WEWF code denoted by is a fountain code which assigns each output symbol to the window with probability and encodes the chosen window with distribution using WLT code with weighted vector . The coding process can be illustrated well in Figure 1.

Figure 1: Flow of WEWF codes.

As shown in Figure 2, the input symbols are partitioned into two adjacent classes including a set of More Important Symbols (MIS) and a set of Less Important Symbols (LIS) , whereas these two classes of data can be divided into two windows. For example, the window includes class and the window consists of all input symbols. Suppose that the weighted vector of is , and the selected probabilities of and are and , respectively. The degree distributions for and are defined as and .

Figure 2: Process of WEWF codes including two important levels of data.
2.2. Asymptotic Analysis of WEWF Codes

Denote as the reception overhead of WEWF codes and we derive the asymptotic erasure probabilities after iterations using the iterative BP decoding algorithm for the input symbols of different classes. The original And-Or trees analysis [16] was already generalized for the weighted approach and extended for the expanding window scheme, where both different classes of OR nodes and AND nodes are introduced [17]. Similarly, we further generalize the And-Or trees construction by introducing different OR nodes selection probability within each selection window and derive the And-Or trees lemma for WEWF codes.

To the best of our knowledge, the asymptotic degree distribution of the output symbols for the class is and denotes the average degree of the output symbols. For EWF codes, the set of the input symbol degree distributions iswhere is the Poisson distribution. The average size of the class is , and is the probability that an OR node is chosen to be a child of an AND node from the class. As for WEWF codes, let denote the probability that an OR node from class is chosen to be a child of an AND node from the class; then the input symbol degree distribution of the WEWF is given by

For EWF codes, the generalized And-Or tree is constructed using different classes of both AND and OR nodes. Suppose that the root node of is an OR node of the class and the tree has a depth of . Each AND or OR node from the class has children with probabilities of or . Furthermore, an AND node from the class can only have OR node children belonging to the classes , with the associated probabilities of choosing children from the different OR classes being , and an OR node from the class can only have AND node children from classes with the associated class probabilities . Let the nodes from the class at the tree depth be initialized as 0 with probability of and 1 otherwise. We assume that OR nodes with no children have a value of 0, whereas AND nodes with no children have a value of 1. We quote the following generalized version of the And-Or trees lemma from [6].

Lemma 1. Let be the probability that the root of an And-Or tree is evaluated at ; that is,with and . Similar to the derivation in [5], is the probability that the output symbol connected with a randomly selected edge has degree given that it belongs to the class , satisfying with . Similarly, is the probability that the input symbol connected with a randomly selected edge, which belongs to class and has degree , equals , so we achieve . For the class input symbols, the probability of having class output symbol as a child, , equals . Similarly, the class output symbols have the class input symbol children, , with probability of .

Lemma 2. For a WEWF code , the probability that the input symbol of class is not recovered after iterations of BP algorithm at the reception overhead is

2.3. Correlation Chain Feedback

The performance improvement of More Important Symbols (MIS) is notable, however, at the cost of performance degradation on Less Important Symbols (LIS) compared with the EWF codes. In view of this, a feedback scheme is introduced in this section to solve this problem. Traditional feedback message contains the number of input symbols that have already been recovered while ignoring the information remaining in the updated generation matrix . So we define Correlation Chain (CC) to describe this information.

Definition 3 (correlation pair). For , a correlation pair of is defined as a sequence, , consisting of locations of the rows where the value is 1 in the column of degree 2.

As illustrated in Figure 3, for example, there are four correlation pairs of related numbers which are , , , and ; there exists a common element for , , and so that all of them make up a Correlation Chain (CC), namely, . Due to the inexistence of a common element for , it itself forms a chain of CC. In other words, two chains of CC can be attained, that is, and . Through the extraction process of CC, it is clear that once any input symbol corresponding to the elements in CC is recovered, other corresponding symbols also can be decoded.

Figure 3: The extraction process of the Correlation Chain (CC).

Therefore, this paper transfers both traditional feedback messages and CC, that is, Correlation Chain Feedback (CCFB), to the encoder when the MIS are fully recovered or the decoding process is interrupted before successfully decoding. Once the CCFB is obtained, the input symbols can be divided into the following categories, with descending priorities: (1) symbols corresponding to the first element of CC; (2) uncovered symbols of MIS; (3) other uncovered symbols; (4) symbols corresponding to other elements of the CC; (5) symbols that have been recovered. Utilizing a nonuniformly selecting scheme, the higher prioritized symbols would participate in the encoding process with higher probability.

3. Simulation Results and Analysis

The simulation is performed from two aspects: one is based on VS2010 to test and verify the performance of WEWF codes and the other is established on OPNET modeler in order to demonstrate that the proposed scheme is suitable for UASNs.

Simulations are firstly carried out by VS2010; the number of input symbols of size is partitioned into two prioritized segments, whereas the MIS block consists of the first 10% input symbols. The RSD using the degree distribution of , , and the MIS window with the selection probability of are considered for visual analysis.

Symbol Erasure Rate (SER). Figure 4 shows comparison of Symbol Erasure Rate (SER) of both MIS and LIS varied with overhead for all three kinds of UEP LT codes including the proposed WEWF codes with weighted factor , EWF codes, and WLT codes with parameter . The channel is recognized as lossless. It more clearly appears that, for MIS, WEWF codes can achieve the reception overhead at the SER of , compared to the EWF and WLT codes with 0.05 and 0.17, respectively. Besides, under the condition of , the SER of WLT codes is the lowest which equals , while the WEWF codes have a SER of followed by EWF codes with SER of . Noticeably, our method can provide better performance for MIS compared to EWF and WLT codes for the scenario of the reception overhead .

Figure 4: Comparison of SER varied with overhead.

Considering the harsh underwater communication conditions, the influence of Packet Loss Rate (PLR) on the performance of UEP LT codes cannot be ignored. Figure 5 depicts the SER performance comparison versus PLR for three investigated UEP LT codes. It is shown that their SER seem to be comparable when the PLR is below 0.3. As the PLR continues to increase, the SER of WEWF codes decline rapidly, and the SER of EWF codes start to decrease until . Though EWF codes provide better performance for the range of PLR from 0.3 to 0.6, WEWF codes show higher robustness against interference with the gradual increase of PLR. When the PLR is 0.5, the SER of for MIS WEWF codes is attainable; however, the SER of EWF codes is only . Thus, the WEWF codes can provide better protection for important information in a harsh communication environment.

Figure 5: Comparison of SER varied with Packet Loss Rate.

Decoding Success Rate (DSR). Decoding Success Rate (DSR) is the ratio of the number of successful decoding instances and the total number of simulations. This paper introduces the DSR as the performance metrics to compare the MIS and LIS performance of the three UEP LT codes under the various PLR. In the following simulations, the input symbols length of 1000 and transmission overhead of are employed for fair comparisons.

Figure 6 depicts the DSR of three kinds of UEP LT codes versus PLR. For MIS, their DSRs all approximately approach 1, once the PLR is smaller than 0.4. With the increase of PLR, the DSR of WLT codes declines rapidly. For example, the DSR of 0.038 is attainable at the 0.525 level for PLR; nevertheless, the DSRs of EWF and WEWF codes are just 0.8628 and 0.9076, respectively. Thus, our proposed method is more superior with applications to underwater communication environment.

Figure 6: Comparison of DSR varied with Packet Loss Rate.

Based on the above analysis of Figures 4, 5, and 6, a conclusion could be drawn where our method performs better in terms of UEP property than WLT and EWF codes; unfortunately, the improvement of MIS performance is at the expense of the lower prioritized segments. Therefore, the introduction of a feedback scheme to optimize our method is a promising solution for practical applications.

The Overall Redundancy Distribution. Figure 7 shows the overall redundancy distribution of WEWF codes under different feedback schemes. The overall redundancy distribution is a statistical result of the transmission overhead. WEWF codes without feedback need an average overhead of 1.7306 to achieve successful decoding, while, with the intermediate feedback scheme in [9], the required overhead reduces to 1.1199 and the proposed CCFB scheme further put overhead towards 1.0871. The above results confirm that the redundancy in lower prioritized segments can be reduced significantly by the introduction of feedback schemes.

Figure 7: Comparison of the overall redundancy varied with feedback schemes.

Aiming at further optimizing the transmission strategy using Correlation Chain Feedback, low redundancy data transmission scheme based on DFC is proposed to utilize the aforementioned modified strategies. To demonstrate this feasibility of the proposed scheme for UASNs, a comprehensive performance analysis in terms of the end-to-end delay, network throughput, average transmission redundancy, and the number of retransmissions is performed by the UASN model established on OPNET modeler. The corresponding simulation parameters are provided in Table 1.

Table 1: Simulation parameter settings.

End-to-end delay is the data transmission time from the source node to the destination node. Network throughput is used to characterize the channel utilization rate of the transmission scheme. The higher the throughput, the better the utilization rate of the channel. Let be transmission delay of the hop. Then, the network throughput is defined as

Average transmission redundancy and the number of retransmissions are particularly important parameters to characterize the encoding efficiency of the transmission scheme. The lower the efficiency and the number of retransmissions, the higher the transmission efficiency of the corresponding transmission scheme. The definitions of average transmission redundancy and the number of retransmissions are given as follows:

End-to-End Delay and Network Throughput. Figure 8 depicts end-to-end delay of all investigated transmission schemes versus PLR. Obviously, with the growth of PLR from 0.32 to 0.44, the end-to-end delay increases by 25.8% for LT codes transmission scheme; it has better channel adaption ability compared with the low redundancy data transmission scheme with the improvement of 23.8% at the same condition. The transmission delay of LT codes and WEWF codes is 836 s and 874.4 s, respectively, for the PLR of 0.32, while that of low redundancy data transmission scheme is 778.9 s which is less than LT codes by 6.8%. The end-to-end delay performance of the three schemes has a perfect agreement with the rule that the low redundancy data transmission scheme is the best, followed by the LT codes and the WEWF codes scheme. The network throughput of the three schemes is also consistent with this rule, shown in Figure 9.

Figure 8: End-to-end delay of three kinds of transmission schemes.
Figure 9: Throughput of three kinds of transmission schemes.

Although the WEWF codes can achieve the UEP property by sacrificing the performance of LIS, we set up the priority of data and did not simulate auxiliary decoding in this chapter; WEWF code will increase decoding delay of LIS when MIS is decoded firstly and it will lead to the increase of the transmission delay of all the system. The introduction of the Correlation Chain Feedback (CCFB) helps the transmitter to precisely adjust the encoding scheme in low redundancy data transmission scheme, which substantially promotes the performance of LIS so that the end-to-end delay and throughput of the whole system are also improved. Therefore, the low redundancy data transmission scheme can achieve lower delay and higher throughput and is more suitable for the harsh communication environment compared with LT codes schemes.

Average Transmission Redundancy and the Number of Retransmissions. Figure 10 shows the average transmission redundancy under various transmission schemes. Due to the significant price in terms of redundancy for the lower prioritized segments, the average transmission redundancy is very high. As is shown in Figure 10, the proposed method improves the overall transmission performance efficiently by introducing the Correlation Chain Feedback (CCFB). As the PLR continues to increase, the average transmission redundancy of the three schemes also goes up. Some small differences between LT codes scheme and lower redundancy data scheme could be observed for the quite low PLR. However, the increased rate of LT codes is particularly more outstanding than the lower redundancy data scheme. As the PLR increases further, the number of lost packets is still going up for such schemes, whereas the lower redundancy data scheme is more effective for performing decoding successfully with fewer packets. These properties make the lower redundancy data scheme helpful in presenting better transmission performance under a terrible communication channel.

Figure 10: Average transmission redundancy under different transmission schemes varied with Packet Loss Rate.

Figure 11 depicts the simulation results of the number of retransmissions under diverse transmission schemes. As seen from this figure, the retransmission time is increasing with the growth of PLR for the three considered schemes. The low redundancy data scheme with CCFB can be more targeted to receive information, while improving the successful decoding ratio and reducing the redundancy of the whole system. At the same time, the average retransmission time of low redundancy scheme is also less than those of other schemes because CCFB is more effective than UW-HARQ. For example, the number of retransmissions of low redundancy data scheme is 1.364 which is less than of LT codes scheme by 21.7% for the PLR of 0.32. Moreover, the time of the low redundancy data scheme is also even 7.65% less than of LT codes scheme when the PLR is 0.44 and a harsh communication environment is considered. Thus, encoding efficiency and transmission efficiency of the low redundancy data scheme are both better than of the LT codes scheme, which provides an opportunity for the proposed scheme with applications to complex underwater communication environment.

Figure 11: The number of retransmissions under different transmission schemes varied with Packet Loss Rate.

4. Conclusion

Aiming at the image or video transmission in underwater sensor network, this paper proposes a novel UEP scheme, constructed by the combination of WLT and EWF. The proposed scheme can improve the performance of UEP property effectively, and a feedback scheme called CCFB is also introduced to optimize the performance of the lower prioritized segments. Simulation results demonstrate that the proposed method achieves better performance than the existing schemes.

Competing Interests

The authors declare that there are no competing interests regarding the publication of this manuscript.

Acknowledgments

This paper is funded by the International Exchange Program of Harbin Engineering University for Innovation-Oriented Talents Cultivation. This paper is also supported by the National Natural Science Foundation of China (NSFC), Grant no. 61371099.

References

  1. S. Cai, Z. Gao, D. Yang, and N. Yao, “A network coding based protocol for reliable data transfer in underwater acoustic sensor,” Ad Hoc Networks, vol. 11, no. 5, pp. 1603–1609, 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. D. Zhao, M. Liang, and J. Duan, “Survey of fountain codes in underwater acoustic sensor networks,” Systems Engineering and Electronics, vol. 36, no. 9, pp. 1838–1843, 2014. View at Publisher · View at Google Scholar · View at Scopus
  3. I. F. Akyildiz, D. Pompili, and T. Melodia, “Underwater acoustic sensor networks: research challenges,” Ad Hoc Networks, vol. 3, no. 3, pp. 257–279, 2005. View at Publisher · View at Google Scholar · View at Scopus
  4. M. Luby, “LT codes,” in Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, pp. 271–280, November 2002. View at Scopus
  5. A. Shokrollahi, “Raptor codes,” IEEE Transactions on Information Theory, vol. 52, no. 6, pp. 2551–2567, 2006. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  6. F. C. Zhang, X. Y. Duan, and M. Dong, “Construction of LT codes with unequal erasure protection for rateless data transmission,” in Proceedings of the 10th IEEE and IFIP International Conference on Wireless and Optical Communications Networks (WOCN '13), pp. 1–5, Bhopal, India, July 2013. View at Publisher · View at Google Scholar · View at Scopus
  7. N. Rahnavard, B. N. Vellambi, and F. Fekri, “Rateless codes with unequal error protection property,” IEEE Transactions on Information Theory, vol. 53, no. 4, pp. 1521–1532, 2007. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  8. D. Sejdinović, D. Vukobratović, A. Doufexi, V. Šenk, and R. J. Piechocki, “Expanding window fountain codes for unequal error protection,” IEEE Transactions on Communications, vol. 57, no. 9, pp. 2510–2516, 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. S. Ahmad, R. Hamzaoui, and M. M. Al-Akaidi, “Unequal error protection using fountain codes with applications to video communication,” IEEE Transactions on Multimedia, vol. 13, no. 1, pp. 92–101, 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. C. Ni, C. Hou, and W. Xiang, “A novel UEP scheme based upon rateless codes,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '12), pp. 592–596, Shanghai, China, April 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. J. H. Sorensen, P. Popovski, and J. Ostergaard, “UEP LT codes with intermediate feedback,” IEEE Communications Letters, vol. 17, no. 8, pp. 1636–1639, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. J. H. Sorensen, P. Popovski, and J. Ostergaard, “Feedback in LT codes for prioritized and non-prioritized data,” in Proceedings of the IEEE Vehicular Technology Conference (VTC Fall '12), vol. 1, pp. 3–6, 2012.
  13. J. H. Sørensen, T. Koike-Akino, and P. Orlik, “Rateless feedback codes,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT '12), pp. 1767–1771, July 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. L. Zhang, J. Liao, J. Wang, T. Li, and Q. Qi, “Design of improved Luby transform codes with decreasing ripple size and feedback,” IET Communications, vol. 8, no. 8, pp. 1409–1416, 2014. View at Publisher · View at Google Scholar · View at Scopus
  15. T. Ying, L. Xie, and H. Chen, “A novel rateless coding scheme with gradually incremental degree under feedback,” in Proceedings of the IEEE 11th Consumer Communications and Networking Conference (CCNC '14), pp. 575–580, Las Vegas, Nev, USA, January 2014. View at Publisher · View at Google Scholar · View at Scopus
  16. M. G. Luby, M. Mitzenmacher, and M. A. Shokrollahi, “Analysis of random processes via and-Or tree evaluation,” in Proceedings of the 9th Annual ACM SIAM Symposium on Discrete Algorithms, pp. 364–373, San Francisco, Calif, USA, 1998. View at MathSciNet
  17. N. Rahnavard and F. Fekri, “Generalization of rateless codes for unequal error protection and recovery time: asymptotic analysis,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT '06), pp. 523–527, IEEE, Seattle, Wash, USA, July 2006. View at Publisher · View at Google Scholar · View at Scopus