CN103532674B - The transmission coded method of a kind of file based on complex network - Google Patents
The transmission coded method of a kind of file based on complex network Download PDFInfo
- Publication number
- CN103532674B CN103532674B CN201310507723.6A CN201310507723A CN103532674B CN 103532674 B CN103532674 B CN 103532674B CN 201310507723 A CN201310507723 A CN 201310507723A CN 103532674 B CN103532674 B CN 103532674B
- Authority
- CN
- China
- Prior art keywords
- packet
- coded identification
- original
- node
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The transmission coded method of a kind of file based on complex network, relates to the reliability transmission field of wireless network data.Process is: add up file size to be transmitted, is grouped file waiting for transmission;A selected degree distribution;Multiple packet by packet basis of original to be output generate new packet, i.e. coded identification, makes original transmit in a network with the form of coded identification sequence;The present invention establishes the mapping relations between the complex network structures that the short-and-medium ring structure of LT code is corresponding, detect according to complex network structures and evade the becate structure in LT code cataloged procedure to greatest extent, improve its successfully decoded probability, construct a kind of transmission encoding scheme of file efficiently and reliably based on complex network.Transmitting particularly with the data in the wireless channel with time-varying characteristics, this invention, so that receiving terminal receives less data just can be recovered by initial data, is effectively increased the bandwidth availability ratio of channel, reduction propagation delay time.
Description
Technical field
The present invention relates to the reliability transmission field of wireless network data, based on complex network particularly to a kind of employing
Becate detects and evades the method that the LT code scheme of algorithm is transmitted file.
Background technology
Luby Transform code (being called for short LT code) is to be had without code check characteristic in the class that 2002 propose by Luby
Digital fountain code.Its coding and decoding performance directly depends on the degree distribution of its coded identification.Preferable orphan is distributed in theory can
Enough LT code coding/decoding performances realizing optimum, the coding symbol number that i.e. recovering K incoming symbol needs is K.But, due to based on
The LT code of preferable orphan's distribution does not ensures that the element number of pretreatment collection is always 1 during whole decoding, pretreatment
Collect small fluctuation and cause whole decoding procedure failure.In order to solve the problems referred to above, Luby further provides based on sane lonely
The LT code of son distribution, it makes during whole decoding, and in pretreatment, element number is stable is more than in the range of 1 at one.
The performance of the LT code being distributed based on sane orphan is better than the performance of LT code based on preferable orphan's distribution, becomes the one of current LT code
Individual standard method for designing.Existing LT code scheme is mostly changing of being made based on the LT code to be distributed based on sane orphan
Enter, such as the LT code being distributed based on secondary goodness, multiple-objection optimization LT code, the LT code etc. of employing chaology design.2012, Zhao etc.
Utilize the short average path length characteristic of scales-free network, it is proposed that a class has the LT code of uncalibrated visual servo characteristic so that LT code
Coding and decoding efficiency and successfully decoded probability had bigger improvement.And based on this, associated ideal orphan's degree of being distributed in
Advantage in terms of release probability a, it is proposed that class has the LT code of sane uncalibrated visual servo characteristic, further improves the compiling of LT code
Code performance.
The research of recent years finds that volume (translating) code performance of LT code is had by the appearance of becate and has a certain impact.For compiling
For code process, coded identification expectation obtains the information of more incoming symbol transmission, but, the existence of becate makes incoming symbol
Information repeat to pass to coded identification, cause the waste of coded identification.Zhang etc. in 2008 at " Little Cycle
Elimination of Fountain codes using Distilling Correlative Columns " literary composition proposes
Using extraction related column method to evade the becate structure in LT code, Zhou etc. is at " A cycle elimination algorithm
For construction of LT codes " literary composition PEG algorithm is used for LT code becate detection and evade in algorithm so that
Data have obtained more preferable successfully decoded probability in ideal communication channel.
Above two method all proposes just for the tetracyclic structure occurred in Tanner figure, and consideration is not more than or equal to
The impact on LT code of the becate structure of six rings.Further, since the coded identification of LT code is on-demand generation, when channel condition is poor
Time, the stochastic generation of degree will inevitably produce Fourth Ring and six ring structures, and now, both schemes change original coding symbol
Number degree distribution.The incoming symbol causing decoding equal number needs to transmit more coded identification, takies more channel strip
Wide.Therefore, the maximization becate problem of LT code remains a problem demanding prompt solution.
Summary of the invention
The deficiency existed for prior art, it is an object of the invention to provide the transmission of a kind of file based on complex network and compiles
Code method, evades Fourth Ring and six ring structures of LT code during detection, to overcome the problem maximizing becate of LT code.
The technical scheme is that and be achieved in that: the transmission coded method of a kind of file based on complex network, including
Following steps:
Step 1: add up file size to be transmitted, is grouped file waiting for transmission;
Described grouping process is: by bit order, file to be transmitted is divided into k group, and wherein, k is positive integer, and k
>103If the data volume in last packet is less than average amount, then by the remaining bits position zero padding in this packet;
Step 2: select a degree distribution according to k value;
Step 3: generate new packet, i.e. coded identification in multiple packet by packet basis of original to be output, make original
Transmit in a network with the form of coded identification sequence;
Step 3.1: generate first coded identification;
Step 3.1.1: degree distribution one value d of stochastic generation selected by step 2, randomly chooses d in former output file
Individual different packet, wherein, d is natural number;
Step 3.1.2: this d different packet carries out XOR, forms a new packet, this packet is just for generating
First coded identification;
Step 3.1.3: the coded identification generated with step 3.1.2, as start node, generates one by a node group
The network structure become;
Step 3.1.4: this coded identification is put and transmits in the channel;
Step 3.2: generate next coded identification;
Step 3.2.1: be distributed according to the degree of step 2, this degree be distributed stochastic generation another positive integer d ', at random from former
Selecting a packet in k packet of file, it is former that this be grouped into generation next coded identification selection first had selected
The packet of file, is also first the optional packet generating next coded identification.Add a new node in the network architecture.
If the packet of original selected be generate other certain or some there is a packet of coded identification, then, this
Even limit, and limit is had between the node that individual new node is the most corresponding with above-mentioned certain or some already present coded identification
Weights be select original a packet being grouped in all k originals in sequence number;If d '=1, then perform step
3.2.2;Otherwise perform step 3.2.3;
Step 3.2.2: all zero bit sequence isometric with it that be grouped of the original that step 3.2.1 selects carries out different
Or, forming a new packet, this is grouped into the next coded identification of generation, this coded identification is put and passes in the channel
Defeated, continue executing with to step 3.3;
Step 3.2.3: in all packets of original in addition to for generating the packet that next coded identification had been selected, surplus
Under packet in select another packet of original, this be grouped into generate that another of next coded identification selected point
Group;
Step 3.2.4: find out that all another packets by step 3.2.3 participate in generating exist coded identification and
Its node corresponding in the network architecture, checks that the node that the new node in step 3.2.1 is the most corresponding with these exists even limit.
If there is not even limit, showing that another packet selected does not results in the tetracyclic structure of LT code, then continuing to hold from step 3.2.5
OK;If there is even limit, then showing that this another packet will result in the tetracyclic structure of LT code, this another packet is not to generate next
The optional packet of individual coded identification.Now, if yet suffering from dividing of the original into generating the next the most selected mistake of coded identification
Group, then return to step 3.2.3 and continue executing with, otherwise arrive step 3.2.9 and continue executing with;
Step 3.2.5: find out that all another packets by step 3.2.3 participate in generating exist coded identification and
Its node corresponding in the network architecture, checks whether the node that there is even limit in the network architecture with new node is grouped with another
There is even limit in the coded identification node corresponding in the network architecture that exists participating in generating.If there is not even limit or existence even
The weights on limit and limit are grouped in the sequence number in all packets of original equal to another, then show that another packet will not
Cause six ring structures of LT code, this another be grouped into the optional packet generating next coded identification, continue to hold to step 3.2.6
OK;If there is even limit, and the weights connecting limit are not equal to another sequence number being grouped in the packet of original, then show to exist
Six ring structures, i.e. this another packet will result in six ring structures of LT code, and this another packet is not to generate next coded identification
Optional packet.Now, if yet suffering from the packet of the original of the most selected mistake, then return to step 3.2.3 and continue executing with;No
Then, continue executing with from step 3.2.9;
Step 3.2.6;Find out that all another packets by step 3.2.3 participate in generating exist coded identification and
Its node corresponding in the network architecture, adds the node of these correspondences and the company limit of new node, the power on limit in the network architecture
Value is grouped in the sequence number in all packets of original for another;
Step 3.2.7: if optional grouping number continues executing with from step 3.2.8 equal to d ', if optional grouping number
Individual less than d ', then continue executing with from step 3.2.9;
Step 3.2.8: the individual packet of this d ' carries out XOR and obtains a new packet, what this was new is grouped into next coding
Symbol.This coded identification is put and is transmitted in the channel;Perform step 3.3;
Step 3.2.9: if yet suffering from the packet of the original of the most selected mistake, then repeat step 3.2.3;If the most not
The packet of selected mistake, then arbitrarily select the packet of original beyond optional packet, until selected packet count is that d ' is
Only.The individual packet of this d ' carries out XOR and generates a new packet, i.e. next coded identification, and this coded identification is placed on channel
In be transmitted;
Step 3.3: the process of repeated execution of steps 3.2, generates remaining coded identification, until transmitting terminal receives reception
Till the feedback information that the file that end returns to the most correctly recovers.
Beneficial effects of the present invention: the present invention establishes between the complex network structures that the short-and-medium ring structure of LT code is corresponding
Mapping relations, detect according to complex network structures and evade the becate structure in LT code cataloged procedure to greatest extent, improve
Its successfully decoded probability, constructs a kind of transmission encoding scheme of file efficiently and reliably based on complex network.Particularly with
There is the data transmission in the wireless channel of time-varying characteristics, this invention so that receiving terminal to receive less data the most permissible
Initial data is recovered, is effectively increased the bandwidth availability ratio of channel, reduce propagation delay time.
Accompanying drawing explanation
Fig. 1 is that the file that bit number is N=k L is divided equally into k packet schematic diagram by embodiment of the present invention;
Fig. 2 is that the file that bit number is N=k L-δ (δ < L) is divided into k packet schematic diagram by embodiment of the present invention;
Fig. 3 is the schematic diagram that embodiment of the present invention randomly generates angle value d;
Fig. 4 is that embodiment of the present invention selects d=3 different packet schematic diagram in original;
Fig. 5 is the network G schematic diagram of embodiment of the present invention only one of which node;
Fig. 6 is the schematic network structure after embodiment of the present invention generates the 2nd coded identification;
One of the 3rd coded identification of generation is selected to be grouped into S if Fig. 7 is embodiment of the present invention2, cause tetracyclic structure
Schematic network structure;
Fig. 8 is that embodiment of the present invention selects one of the 4th coded identification of generation to be grouped into S4, cause six ring structures
Schematic network structure;
Fig. 9 is the schematic network structure constituted after embodiment of the present invention generates the 5th coded identification;
Figure 10 is that embodiment of the present invention file based on complex network transmits coded method flow chart;
Figure 11 is that embodiment of the present invention first coding generates process flow diagram flow chart;
Figure 12 is LT code and the tradition LT code comparison curves in terms of successfully decoded probability of embodiment of the present invention composition,
Wherein packet count is 104。
Detailed description of the invention
Below in conjunction with the accompanying drawings embodiment of the present invention is described in further detail.
File based on the complex network transmission coded method used in present embodiment, as shown in Figure 10.Concrete steps
As follows:
Step 1: add up file size to be transmitted, is grouped file waiting for transmission.
If data waiting for transmission are file, the most first want statistics file size, use C language in the present embodiment
Fopen () function opens file, uses fseek () function by the position of needle locating to file, passes through to know with ftell () function
The position of not last byte obtains the size of file.If data waiting for transmission are bit stream, the most directly treat transmitted bit and flow to
Row is grouped.Described grouping process is: by bit order, file to be transmitted is divided into K group, and wherein, K is positive integer,
And K > 103.Assume that file to be transmitted can be converted into the bit stream of 2KB, can use said method that this bit stream is divided into K=2000
Group, the most each packet comprises L=8 bit.As it is shown in figure 1, wherein
First packet: total 8bits, content is 01011000;
Second packet: total 8bits, content is 10110011;
……
The K=2000 packet: total 8bits, content is 11100101.
In the present embodiment, the file of 2KB (16000bit) just can be divided into the packet of 2000 8bit.But
For some file, it just can not be divided into multiple packet, i.e. the data volume of last packet after division is less than
Packeting average data volume.At this time, it may be necessary in the end zero padding that last is grouped so that last is grouped the bit number comprised
Average number of bits equal to each packet.Such as: assume the file of a 15994bit to be grouped, still by bit flow point
Becoming 2000 groups, often group comprises L=8 Bit data, then last packet is by less than 8, it would be desirable to mend 0 behind.Such as figure
Shown in 2, wherein
First packet: total 8bits, content is 01011000;
Second packet: total 8bits, content is 10110011;
……
The K=2000 packet: total 8bits, content is 11000000.Wherein last 6bit is filler.
Through said process, the file of one 2KB can be divided into 2000 groups by us.
Step 2: select a degree distribution according to the value of packet count K;
Described degree distribution can use sane orphan to be distributed, may be used without scale-free degree distribution and sane uncalibrated visual servo divides
The degree distribution of the coded identification of the existing common LT code such as cloth, user can need to select voluntarily distribution function according to oneself.
Dividing as a example by μ (d) cloth by sane orphan in present embodiment, the determination process of degree of explanation distribution is as follows:
μ (d) is defined as follows,
Wherein
And
In formula, S be decoding process each step in desired remaining degree be the coding symbol number of 1:
In formula, β ∈ (0,1) is a free variable, and δ represents when receiving terminal receives K coded identification, tolerable decoding
Error probability.
For all of K value, sane orphan is distributed needs to meet equation below:
Research finds that during δ=1.0, the LT code being distributed based on sane orphan has when parameter beta=0.1 of sane orphan distribution
Preferably performance.By β=0.1, δ=1.0, K=10000 substitutes into formula (2), can obtain S=92.10.And then when can obtain K=10000, compile
The degree distribution of code sign.
In like manner, similar method can be used, try to achieve the parameter in scale-free degree distribution and sane scale-free degree distribution, determine
It is distributed to the degree of the LT code of defining K value.
As a example by K=2000 the packet that the file of 2KB in present embodiment is divided into, by β=0.1, δ=1.0, K=2000 substitutes into
It is 33.99 that formula (2) obtains the value of S.The value of S, δ substitute into formula (1) just can obtain packet number be 2000 based on steadily and surely
The degree distribution of orphan's indexing.
Step 3: generate new packet in 2000 packet by packet basis of the original that size to be output is 2KB, i.e. encode
Symbol, makes original transmit in a network with the form of coded identification sequence;2000 packets of original are referred to as input symbol
Number.This implementation process is simple in order to describe, and introduces its part as a example by only have selected 5 incoming symbols in 2000 incoming symbols
The generation process of coded identification.These 5 groups of incoming symbols are designated as S respectively1,S2,S3,S4,S5, wherein S1=01011000, S2=
10110011, S3=11100101, S4=01011000, S5=10110010。
Step 3.1: generate first coded identification, as shown in figure 11.
Step 3.1.1: in the present embodiment, degree distribution stochastic generation one the value d selected according to step 21, work done in the manner of a certain author is
The degree of first coded identification.From S1,S2,S3,S4,S5These 5 groups of incoming symbols select d1Group is used for generating first coding
Symbol.Value d1Selection course as follows:
The degree distribution selected according to step 2, the variable d in formula (1) takes 1 respectively ..., it is 1 that K different value can be spent ..., K
Probability shared by coded identification.Because the present embodiment carries out example with the cataloged procedure of 5 groups in 2000 groups, therefore, this
Place is we assume that K=5, and limits d and take the integer between [1,5].First, 0-1.0 scope is divided into 5 according to this probability
Section;Then a random number is produced with the rand () function in C language, it is judged that this random number is which of these 5 segmentations of 0-1.0
Individual segmentation, in which segmentation, then the angle value of first coded identification selected by step 3.1.1 is just for several.As it is shown on figure 3,
Degree of hypothesis be the probability of 1 be 0.1, degree is the probability 0.4 of 2, degree be the probability of 3 be 0.3, degree be the probability of 4 be 0.15, degree is 5
Probability be 0.05.Application cumulative distribution, if the size of random number is between 0~0.1, then the angle value selected is 1;If it is random
The size of number is between 2~0.5, then the angle value selected is 2;By that analogy.
Now, it is assumed that producing a value is the random number of 0.51, as shown in Figure 3, it is known that 0.51 is more than 0.5, less than 0.8,
I.e. fall in the 3rd segmentation, therefore, plan the degree d of first coded identification1It is entered as 2.
In 5 packets of original, randomly choose 3 different packets, select the probability phase of arbitrary packet of original
With, in the present embodiment, this probability is 1/5.
Rand () function 2 randoms number of generation in employing C language in present embodiment, respectively 0.29,0.17.They
Falling in the 2nd segmentation as shown in Figure 4 and the 1st segmentation, therefore, 2 selected by this step for generating first
The packet of the original of coded identification is respectively the 1st packet and the 2nd packet.
Step 3.1.2: first packet in present embodiment is designated as C1, C1Select equal to step 3.1.1 2 of value
The XOR of different original packets.That is, C1=S1⊕S2=11101011;
Step 3.1.3: the coded identification generated with step 3.1.2, as start node, generates one by a node group
Network structure G become, as shown in Figure 5.In the present embodiment, refer to coded identification C1Corresponding node V0Generation network is tied
Structure G, this step is primarily to initialize G, and the content related to mainly includes using the malloc () function in C language
Initialize node and the limit of G.
Step 3.1.4: coded identification C1Put and transmit in the channel;
Step 3.2: in the present embodiment, generates the 2nd coded identification;
Step 3.2.1: be distributed according to the degree of step 2, this degree be distributed the degree d of random second coded identification2=1, at random
From S1, S2, S3, S4, S5These 5 packets select 1 packet, it is assumed that this is selected is grouped into S1.One is added in network structure G
New node V1, because S1It is to generate C1A packet, then, C2And C1Node V corresponding on G1,V0Between there is even limit,
And the weight on limit is S1, as shown in Figure 6.
Owing to the angle value of the 2nd coded identification is 1 and selected is uniquely grouped into S1, therefore, step 3.2 generate
Two coded identifications C2=S1=01011000.And by C2Put and be transmitted in the channel.
Step 3.3: in the present embodiment, generates the 3rd coded identification;
Step 3.3.1: randomly choose the degree of the 3rd coded identification according to the degree distribution of step 2, it is assumed that its value is d3=3,
Now we need at S1, S2, S3, S4, S5These 5 packets select to meet 3 packets of condition.Its process is as follows:
Random from S1, S2, S3, S4, S5These 5 packets select to generate the 1st packet of the 3rd coded identification, it is assumed that should
Selected it is grouped into S1.A new node V is added in network structure G2, due to S1It is to generate C1And C2An original point
Group, then increase by one in G and connect node V2With node V0Weights be S1Company limit, and one connect node V2With joint
Point V1Weights be S1Company limit.
Random from S2, S3, S4, S5The packet of these 4 originals select a packet as generating the 3rd coded identification
The 2nd select packet, it is assumed that it is S2。S2Participation generates coded identification C1, new node V simultaneously2With C1Corresponding node
V0There are weights is S1Company limit, as shown in Figure 7.Yin Yin, selects S herein2Tetracyclic structure will be caused, it be not one optional
Packet.
Random from remaining packet S3, S4, S5These 3 packets select a packet S3, Fourth Ring and six is not constituted due to it
Ring structure, so S3Can be as the optional packet generating the 3rd coded identification.Again from remaining packet S4, S5In random
Select a packet, it is assumed that for S4If find S simultaneously4It is placed in complex network structures and does not the most constitute Fourth Ring or six ring structures,
Therefore S4Also can be as the optional packet generating the 3rd coded identification.
Therefore, the 3rd coded identification C3Can there is S1, S3, S4These three coded identification XOR and obtain, i.e. C3=S1⊕S3⊕S4=
01100101, by coded identification C3Put and be transmitted in the channel.
Step 3.4: in the present embodiment, generates the 4th coded identification C4;
Step 3.4.1: randomly choose the degree of the 4th coded identification according to the degree distribution of step 2, it is assumed that its value d4=2, this
Time we need at S1, S2, S3, S4, S5These 5 packets select to meet 2 packets of condition.Process is as follows:
Random from S1, S2, S3, S4, S5These 5 packets select to generate the 1st packet of the 4th coded identification, it is assumed that should
Selected it is grouped into S2.A new node V is added in network structure G3, due to S2It is to generate coded identification C1An original text
The packet of part, therefore, adds one in G and connects node V3With node V0Weights be S2Company limit.
At random from remaining 4 packet S1, S3, S4, S5Middle selection one packet S4As generating the of the 4th coded identification
2 have been selected packet.Due in network structure G, new node V3The node V being connected0, with packet S4The existence participating in generating is compiled
Code sign C3Corresponding node V2Between there is even limit, and the weights on even limit are S1≠S4, as shown in Figure 8.So, select S herein4Meeting
Cause six ring structures, i.e. S4It not to generate C4An optional packet.
At random from remaining 3 packet S1, S3, S5Middle selection one packet, it is assumed that selected be grouped into S5, i.e. S5As life
The next one becoming the 4th coded identification has selected packet.Due to S5Tetracyclic structure and six ring structures, therefore, S will not be constituted5It is to generate
Coded identification C4Another optional packet.
By step 3.4, generate the 4th coded identification C in the present embodiment4=S2⊕S5=00000001.Coding symbol
Number C4Put into channel to be transmitted.
Step 3.5: in the present embodiment, generates the 5th coded identification C5;
Degree distribution according to step 2 randomly chooses the degree of the 5th coded identification, it is assumed that its value d5=2, now need at S1,
S2, S3, S4, S5These 5 packets select to meet 2 packets of condition.Process is as follows:
Random from S1, S2, S3, S4, S5These 5 packets select a packet as one of the 5th coded identification of generation
Optional packet, it is assumed that this is grouped into S3.A new node V is added in G4, due to S3Participation generates coded identification C3, because of
This, add one in G and connect node V2And V4Weights be S3Limit.
At random from remaining 4 packet S1, S2, S4, S5These 4 packets select 1 packet, it is assumed that for S2.Due in G with
New node V4There is the node V on even limit2With S2Participate in coded identification C generated1Node V corresponding in G0There is even limit, and limit
Weights be S1≠S2, therefore, if herein by S2Will result in six ring structures as optional packet.
At random from remaining 3 packet S1, S4, S5These 3 packets select 1 packet, it is assumed that for S1, as selecting point
Group.Due to S1Participate in coded identification C generated3Node V corresponding in G2With new node V4There are weights is S3Company limit, because of
This, S1Tetracyclic structure is will result in as optional packet.
At random from remaining 2 packet S4, S5Middle selection 1 packet, as generating coded identification C5The next one selected point
Group, it is assumed that for S4.Due to S4Participate in coded identification C generated3Node V corresponding in G2With new node V4There are weights is S3
Company limit, therefore, if S4Tetracyclic structure is will result in as optional packet.
At random from remaining 1 packet S5Middle selection 1 packet, this is grouped into S5If select S herein5I.e. do not result in four
Ring structure does not results in six ring structures yet, so, S5It is to generate coded identification C5An optional packet.Due to S5Participate in generating
Coded identification C4, so, G adds one and connects node V3And V4Weights be S5Company limit.As shown in Figure 9.
By step 3.5, generate the 5th coded identification C in the present embodiment5=S3⊕S5=01010111, C5It is placed on
Channel transmits.
Step 3.6: in the present embodiment, generates the 6th coded identification C6;
Degree distribution according to step 2 randomly chooses the degree of the 6th coded identification, it is assumed that its value d6=3.Now need at S1,
S2, S3, S4, S5These 5 packets select to meet 3 packets of condition.Process is as follows:
Random from S1, S2, S3, S4, S5In these 5 packets, selection one packet can as 1 that generates the 6th coded identification
Choosing packet, it is assumed that this is grouped into S2.A new node V is added in G5, due to S2Participation generates coded identification C1And C4, because of
This, add in G and connect V5, V0Weights be S2Company limit and connect V5, V3Weights be S2Company limit.
Random from S1, S3, S4, S5These 4 packets select 1 packet as having generated the 2nd of the 6th coded identification
Choosing packet, it is assumed that this is grouped into S1.Due in network structure G, S1Participate in coded identification C generated1Node corresponding in G
V0With new node V5There are weights is S2Company limit, therefore, if select S herein1Tetracyclic structure will be caused.
At random from remaining 3 packet S3, S4, S5Middle selection 1 packet is as generating C6The 3rd select packet, it is assumed that
This is grouped into S3.Due in G with new node V5There is the node V on even limit0With S3Participate in coded identification C generated3Correspondence in G
Node V2Between to there are the weights on even limit and even limit be S1≠S3, therefore, S herein3It it not an optional packet.
At random from remaining 2 packet S4, S5Middle selection one packet is as generating C6The 4th select packet, it is assumed that for
S4.Due in G with new node V5There is the node V on even limit0With S4Participate in coded identification C generated3Node V corresponding in G2Between
The weights on existence even limit and even limit are S1≠S4, therefore, if S herein4Six ring structures will be constituted as optional packet.
Analyze last packet S5, due to S5Participate in coded identification C generated4Node V corresponding in G3With new joint
Point V5There are weights is S2Company limit, therefore, S5Tetracyclic structure is will result in as optional packet.
In summary, if generating the 6th first selected by coded identification to be grouped into S2, then no matter select S1, S3, S4
Or S5Becate structure will be caused.Now, from except S2Outer S1, S3, S4, S5These 4 packets randomly choose 2 packets, it is assumed that
For S1, S4, as generating coded identification C6Two other optional packet.
The 6th coded identification C is obtained by step 3.66=S2⊕S1⊕S4=10110011, C6 is put and carries out in the channel
Transmission.
Generating 6 coded identifications by said process, they are all to be generated by 5 packets in original.At this
In embodiment, for comprising the original of 2000 packets, it would however also be possible to employ identical method, generate coded identification sequence.
At receiving terminal according to the value of coded identification and coded identification and the relation of multiple packets of original, original is recovered
Come.
Present invention can be directly applicable to the Volume data such as video, image transmitting in wireless channel, for
It is easy to verify feasibility and the advantage of described method, the most only from the encoding scheme of successfully decoded probability angle with tradition LT code
It is analyzed.
The present invention with 1000 groups of incoming symbol numbers for 104, block length be 1 bit there is sane uncalibrated visual servo characteristic
As a example by LT code and the LT code that is distributed based on sane orphan, effectiveness of the invention is verified, wherein participate in the LT code bag of contrast
Include;
(1) RD-SF (cycle-6priority): parameter selects P1=0.1, λ=1.9, reduce Fourth Ring and six ring structures as far as possible
The LT code with sane uncalibrated visual servo characteristic;
(2) RD-SF (cycle-4priority): parameter selects P1=0.1, λ=1.9, reduce Fourth Ring as far as possible, do not consider six
The LT code with sane uncalibrated visual servo characteristic of ring;
(3) RD-SF (random): parameter selects P1=0.1, λ=1.9, do not consider that the sane nothing that has of Fourth Ring and six rings is marked
The LT code of degree characteristic;
(4) RSD (cycle-6priority): parameter selects c=0.1, δ=1, reduces Fourth Ring and the base of six ring structures as far as possible
In the LT code that sane orphan is distributed;
(5) RSD (cycle-4priority): parameter selects c=0.1, δ=1, reduces Fourth Ring as far as possible, does not consider the base of six rings
In the LT code that sane orphan is distributed;
(6) RSD (random): parameter selects c=0.1, δ=1, does not consider being distributed based on sane orphan of Fourth Ring and six rings
LT code.
This invention does not change the degree distribution of coded identification, therefore, generates the average XOR number of times that coded identification needs
It is more or less the same with original coding scheme, but owing to Fourth Ring and six ring probabilities of occurrence reduce, recovers what identical incoming symbol needed
Coding symbol number will decrease so that the average XOR number of times of program decoding process reduces.It is different coding as shown in table 1
The relativity of redundancy factor in scheme, redundancy factor is the lowest, and the coding symbol number that showing to recover original input symbol needs is got over
Few, required decoding delay is the lowest:
The LT code of table 1 the present embodiment structure and the Performance comparision of tradition LT code
Analytical table 1 understands, and applies the average redundancy factor of LT code of six ring priority algorithms less than application Fourth Ring priority algorithm
The average redundancy factor of LT, they both less than do not carry out the average redundancy factor of the LT code of becate optimization, therefore use becate
The LT code evading algorithm recovers the coding symbol number of equal number of incoming symbol needs less than the LT code not carrying out becate optimization.
Owing to the degree of each coded identification is independent generation, and there is the LT code of sane uncalibrated visual servo characteristic and based on reason
As long as thinking that the LT code that orphan is distributed receives enough coded identifications and is to ensure that recipient can decode completely, with transmission number
According to channel condition unrelated, therefore, the most only consider to apply becate based on Complex Networks Theory to evade the LT code of algorithm resonable
Think the successfully decoded probability under channel condition.
Figure 12 be incoming symbol number be 104, construct 1000 groups of above-mentioned six kinds of LT codes respectively, obtain the successfully decoded of them
Relation between probability and redundancy factor.
Analysis Figure 12 understands, and on the premise of redundancy factor is identical, it is sane without mark that having of algorithm generation evaded by application becate
The successfully decoded probability of the LT code of degree characteristic is higher than the LT code with sane uncalibrated visual servo characteristic and additionally not considering becate structure
Three kinds of LT codes being distributed based on sane orphan.And apply becate to evade the LT code being distributed based on sane orphan that algorithm generates, connect
Receiving end receive the successfully decoded probability of equal number of coded identification N=(1+ α) K higher than do not consider becate structure based on surely
The LT code of strong orphan's distribution.
The studies above shows, the LT code of algorithm design evaded by application becate can be in the premise ensureing to compile (translating) code efficiency
Under so that successfully decoded probability is greatly improved.
Although the foregoing describing the detailed description of the invention of the present invention, but the those skilled in the art in this area should managing
Solving, these are merely illustrative of, and these embodiments can be made various changes or modifications, without departing from the principle of the present invention
And essence.The scope of the present invention is only limited by the claims that follow.
Claims (1)
1. file based on a complex network transmission coded method, it is characterised in that: comprise the following steps:
Step 1: add up file size to be transmitted, is grouped file waiting for transmission;
Described grouping process is: by bit order, file to be transmitted is divided into k group, and wherein, k is positive integer, and k >
103If the data volume in last packet is less than average amount, then by the remaining bits position zero padding in this packet;
Step 2: select a degree distribution according to k value;
Step 3: generate new packet, i.e. coded identification in multiple packet by packet basis of original to be output, makes original to compile
The form of code sign sequence is transmitted in a network;
Step 3.1: generate first coded identification;
Step 3.1.1: degree distribution one value d of stochastic generation selected by step 2, randomly chooses d not in former output file
Same packet, wherein, d is natural number;
Step 3.1.2: this d different packet carries out XOR, forms one new packet, this packet is just for the of generation
One coded identification;
Step 3.1.3: the coded identification that generated with step 3.1.2, as start node, generates one and is made up of a node
Network structure;
Step 3.1.4: this coded identification is put and transmits in the channel;
Step 3.2: generate next coded identification;
Step 3.2.1: be distributed according to the degree of step 2, this degree be distributed stochastic generation another positive integer d ', at random from original
K packet in select a packet, this is grouped into first original selected generating the selection of next coded identification
Packet, be also first the optional packet generating next coded identification;Add a new node in the network architecture, if choosing
One packet of the original selected be generate other certain or some there is a packet of coded identification, then, this is new
Even limit, and the power on limit is had between the node that node is the most corresponding with above-mentioned certain or some already present coded identification
Value is the sequence number in a packet being grouped in all k originals of the original selected;If d '=1, then perform step
3.2.2;Otherwise perform step 3.2.3;
Step 3.2.2: all zero bit sequence isometric with it that be grouped of the original that step 3.2.1 selects carries out XOR,
Forming a new packet, this is grouped into the next coded identification of generation, this coded identification is put and transmits in the channel, arrives
Step 3.3 continues executing with;
Step 3.2.3: in all packets of original in addition to for generating the packet that next coded identification had been selected, remaining
Selecting another packet of original in packet, this is grouped into another packet selected generating next coded identification;
Step 3.2.4: find out that all another packets by step 3.2.3 participate in generating exist coded identification and
Node corresponding in network structure, checks that the node that the new node in step 3.2.1 is the most corresponding with these exists even limit, if not
There is even limit, show that another packet selected does not results in the tetracyclic structure of LT code, then continue executing with from step 3.2.5;If
There is even limit, then show that this another packet will result in the tetracyclic structure of LT code, this another packet is not to generate the next one to compile
The optional packet of code sign, now, if yet suffering from the packet of the original into generating the next the most selected mistake of coded identification, then
Return to step 3.2.3 continue executing with, otherwise arrive step 3.2.9 and continue executing with;
Step 3.2.5: find out that all another packets by step 3.2.3 participate in generating exist coded identification and
Node corresponding in network structure, checks whether the node that there is even limit in the network architecture with new node participates in another packet
There is even limit in the node that there is coded identification correspondence in the network architecture of generation, if there is not even limit or existence to connect limit also
And the weights on limit are grouped in the sequence number in all packets of original equal to another, then show that another packet does not results in
Six ring structures of LT code, this another be grouped into the optional packet generating next coded identification, continue executing with to step 3.2.6;
If there is even limit, and the weights connecting limit are not equal to another sequence number being grouped in the packet of original, then show to have six
Ring structure, i.e. this another packet will result in six ring structures of LT code, and this another packet is not to generate next coded identification
Optional packet, now, if yet suffering from the packet of the original of the most selected mistake, then returns to step 3.2.3 and continues executing with;Otherwise,
Continue executing with from step 3.2.9;
Step 3.2.6: find out that all another packets by step 3.2.3 participate in generating exist coded identification and
Node corresponding in network structure, adds the node of these correspondences and the company limit of new node in the network architecture, and the weights on limit are
Another is grouped in the sequence number in all packets of original;
Step 3.2.7: if optional grouping number continues executing with from step 3.2.8, if optional grouping number is less than equal to d '
D ' is individual, then continue executing with from step 3.2.9;
Step 3.2.8: the individual packet of this d ' carries out XOR and obtains a new packet, what this was new is grouped into next coding symbol
Number, this coded identification is put and is transmitted in the channel;Perform step 3.3;
Step 3.2.9: if yet suffering from the packet of the original of the most selected mistake, then repeat step 3.2.3;If it is the most selected
The packet crossed, then arbitrarily select the packet of original beyond optional packet, until selected packet count is d ';This
The individual packet of d ' carries out XOR and generates a new packet, i.e. next coded identification, and puts to enter in the channel by this coded identification
Row transmission;
Step 3.3: the process of repeated execution of steps 3.2, generates remaining coded identification, until transmitting terminal receives receiving terminal and returns
Back to the feedback information that the most correctly recovers of file till.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310507723.6A CN103532674B (en) | 2013-10-23 | 2013-10-23 | The transmission coded method of a kind of file based on complex network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310507723.6A CN103532674B (en) | 2013-10-23 | 2013-10-23 | The transmission coded method of a kind of file based on complex network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103532674A CN103532674A (en) | 2014-01-22 |
CN103532674B true CN103532674B (en) | 2016-08-17 |
Family
ID=49934391
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310507723.6A Active CN103532674B (en) | 2013-10-23 | 2013-10-23 | The transmission coded method of a kind of file based on complex network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103532674B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103929275B (en) * | 2014-04-30 | 2017-10-03 | 电子科技大学 | Distributed SF LT code encoding methods with uncalibrated visual servo characteristic |
CN107612897A (en) * | 2017-09-07 | 2018-01-19 | 唐冬香 | A kind of data transmission method |
CN108259930B (en) * | 2018-01-16 | 2020-08-14 | 深圳市力沃信息科技有限公司 | Transmission control method and system for electronic class board |
CN108267950B (en) * | 2018-01-19 | 2021-02-12 | 东北大学 | Simple fractional order complex network external hybrid synchronization method |
CN115333673A (en) * | 2022-07-29 | 2022-11-11 | 南京信息工程大学 | Block coding transmission method based on ILT in block chain network |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011139122A2 (en) * | 2010-05-07 | 2011-11-10 | Samsung Electronics Co., Ltd. | Apparatus and method for channel coding in a communication system |
CN102324998A (en) * | 2011-05-11 | 2012-01-18 | 浙江大学 | Raptor Codes encoding/decoding method suitable for medium/short code lengths of additive white Gaussian noise channel |
CN103023937A (en) * | 2011-09-26 | 2013-04-03 | 北大方正集团有限公司 | Method and system for distributing network files |
CN103078707A (en) * | 2013-01-03 | 2013-05-01 | 北京理工大学 | File transmission method in deep space communication |
-
2013
- 2013-10-23 CN CN201310507723.6A patent/CN103532674B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011139122A2 (en) * | 2010-05-07 | 2011-11-10 | Samsung Electronics Co., Ltd. | Apparatus and method for channel coding in a communication system |
CN102324998A (en) * | 2011-05-11 | 2012-01-18 | 浙江大学 | Raptor Codes encoding/decoding method suitable for medium/short code lengths of additive white Gaussian noise channel |
CN103023937A (en) * | 2011-09-26 | 2013-04-03 | 北大方正集团有限公司 | Method and system for distributing network files |
CN103078707A (en) * | 2013-01-03 | 2013-05-01 | 北京理工大学 | File transmission method in deep space communication |
Also Published As
Publication number | Publication date |
---|---|
CN103532674A (en) | 2014-01-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103532674B (en) | The transmission coded method of a kind of file based on complex network | |
CN101821980B (en) | Method of transmitting data | |
CN102355341B (en) | Network coding method of hybrid automatic request retransmission for long-term evolution system | |
CN102131083B (en) | Method and device for transmitting scalable videos based on priorities | |
CN101432969A (en) | Forward error-correcting (FEC) coding and streaming | |
WO2017121334A1 (en) | Data-processing method and device | |
CN105991227A (en) | Data encoding method and apparatus | |
CN108880566A (en) | A kind of Polar decoding transmission method and device | |
CN106209302B (en) | Data transmission processing method and device | |
CN103346858B (en) | System LT code Compilation Method based on superposition degree | |
CN103067137A (en) | Multicast retransmission method based on network codes | |
CN108494527A (en) | A kind of data transmission and reception method based on LoRa | |
CN103944676B (en) | A kind of LT code coding/decoding methods based on deep space communication environment | |
CN103152652A (en) | Video frame data network transmission method based on Cauchy reed-solomon (RS) code | |
Larsson | Multicast multiuser ARQ | |
CN104065457A (en) | Merged decoding method and device | |
Yue et al. | The design of degree distribution for distributed fountain codes in wireless sensor networks | |
Siavoshani et al. | Noncoherent multisource network coding | |
CN107005349B (en) | A kind of data processing method, base station and terminal device | |
CN108429553A (en) | Coding method, code device and the equipment of polarization code | |
Li et al. | Improved compression of network coding vectors using erasure decoding and list decoding | |
CN103036646B (en) | For the ECC decode control method of data communication | |
CN104219032A (en) | Minimum packet loss retransmission method in multicast scene in wireless local area network | |
CN101645753A (en) | Coding method without rate codes | |
CN103346859B (en) | The encoding and decoding method of distributed unequal error protection LT code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |