Fountain codes

被引:766
|
作者
MacKay, DJC [1 ]
机构
[1] Univ Cambridge, Cavendish Lab, Cambridge CB3 0HE, England
来源
IEE PROCEEDINGS-COMMUNICATIONS | 2005年 / 152卷 / 06期
关键词
D O I
10.1049/ip-com:20050237
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Fountain codes are record-breaking sparse-graph codes for channels with erasures, such as the internet, where files are transmitted in multiple small packets, each of which is either received without error or not received. Standard file transfer protocols simply chop a file up into K packet-sized pieces, then repeatedly transmit each packet until it is successfully received. A back channel is required for the transmitter to find out which packets need retransmitting. In contrast, fountain codes make packets that are random functions of the whole file. The transmitter sprays packets at the receiver without any knowledge of which packets are received. Once the receiver has received any N packets, where N is just slightly greater than the original file size K, the whole file can be recovered. In the paper random linear fountain codes, LT codes, and raptor codes are reviewed. The computational costs of the best fountain codes are astonishingly small, scaling linearly with the file size.
引用
收藏
页码:1062 / 1068
页数:7
相关论文
共 50 条
  • [31] Capacity Bounds of Cooperative Communications with Fountain Codes
    Qin, Shuang
    Feng, Gang
    Zhang, Yide
    2010 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2010), 2010,
  • [32] Robust quaternary fountain codes in AWGN interference
    Spencer, James
    Hayajneh, Khaled F.
    Yousefi, Shahram
    IET COMMUNICATIONS, 2018, 12 (20) : 2561 - 2567
  • [33] Fountain Codes Based on Zigzag Decodable Coding
    Nozaki, Takayuki
    2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 274 - 278
  • [34] Performance Analysis and Improvement of Online Fountain Codes
    Huang, Jingxuan
    Fei, Zesong
    Cao, Congzhe
    Xiao, Ming
    Jia, Dai
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (12) : 5916 - 5926
  • [35] Cooperative relay networks using fountain codes
    Molisch, Andreas F.
    Mehta, Neelesh B.
    Yedidia, Jonathan S.
    Zhang, Jinyun
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [36] A Scheme of Data Storage Based on Fountain Codes
    Chen Haiyan
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2008, : 1128 - 1130
  • [37] An Approach of Eliminating Duplicate Associates in Fountain Codes
    Zhou, Yang
    Zhang, Lin
    Liu, Yu
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 472 - 475
  • [38] Secure Online Fountain Codes With Low Complexity
    Qin, Zijun
    Fei, Zesong
    Huang, Jingxuan
    Xiao, Ming
    IEEE COMMUNICATIONS LETTERS, 2022, 26 (07) : 1499 - 1503
  • [39] Research on fountain codes in deep space communication
    Yao, Wending
    Chen, Lijia
    Li, Hui
    Xu, Hongguang
    CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 2, PROCEEDINGS, 2008, : 219 - 224
  • [40] Online Fountain Codes With Unequal Recovery Time
    Cai, Peixiang
    Zhang, Yu
    Pan, Changyong
    Song, Jian
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (07) : 1136 - 1140