CN103532674B - The transmission coded method of a kind of file based on complex network - Google Patents

The transmission coded method of a kind of file based on complex network Download PDF

Info

Publication number
CN103532674B
CN103532674B CN201310507723.6A CN201310507723A CN103532674B CN 103532674 B CN103532674 B CN 103532674B CN 201310507723 A CN201310507723 A CN 201310507723A CN 103532674 B CN103532674 B CN 103532674B
Authority
CN
China
Prior art keywords
packet
coded identification
original
node
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310507723.6A
Other languages
Chinese (zh)
Other versions
CN103532674A (en
Inventor
赵玉丽
于海
朱志良
周福才
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northeastern University China
Original Assignee
Northeastern University China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northeastern University China filed Critical Northeastern University China
Priority to CN201310507723.6A priority Critical patent/CN103532674B/en
Publication of CN103532674A publication Critical patent/CN103532674A/en
Application granted granted Critical
Publication of CN103532674B publication Critical patent/CN103532674B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The transmission coded method of a kind of file based on complex network, relates to the reliability transmission field of wireless network data.Process is: add up file size to be transmitted, is grouped file waiting for transmission;A selected degree distribution;Multiple packet by packet basis of original to be output generate new packet, i.e. coded identification, makes original transmit in a network with the form of coded identification sequence;The present invention establishes the mapping relations between the complex network structures that the short-and-medium ring structure of LT code is corresponding, detect according to complex network structures and evade the becate structure in LT code cataloged procedure to greatest extent, improve its successfully decoded probability, construct a kind of transmission encoding scheme of file efficiently and reliably based on complex network.Transmitting particularly with the data in the wireless channel with time-varying characteristics, this invention, so that receiving terminal receives less data just can be recovered by initial data, is effectively increased the bandwidth availability ratio of channel, reduction propagation delay time.

Description

The transmission coded method of a kind of file based on complex network
Technical field
The present invention relates to the reliability transmission field of wireless network data, based on complex network particularly to a kind of employing Becate detects and evades the method that the LT code scheme of algorithm is transmitted file.
Background technology
Luby Transform code (being called for short LT code) is to be had without code check characteristic in the class that 2002 propose by Luby Digital fountain code.Its coding and decoding performance directly depends on the degree distribution of its coded identification.Preferable orphan is distributed in theory can Enough LT code coding/decoding performances realizing optimum, the coding symbol number that i.e. recovering K incoming symbol needs is K.But, due to based on The LT code of preferable orphan's distribution does not ensures that the element number of pretreatment collection is always 1 during whole decoding, pretreatment Collect small fluctuation and cause whole decoding procedure failure.In order to solve the problems referred to above, Luby further provides based on sane lonely The LT code of son distribution, it makes during whole decoding, and in pretreatment, element number is stable is more than in the range of 1 at one. The performance of the LT code being distributed based on sane orphan is better than the performance of LT code based on preferable orphan's distribution, becomes the one of current LT code Individual standard method for designing.Existing LT code scheme is mostly changing of being made based on the LT code to be distributed based on sane orphan Enter, such as the LT code being distributed based on secondary goodness, multiple-objection optimization LT code, the LT code etc. of employing chaology design.2012, Zhao etc. Utilize the short average path length characteristic of scales-free network, it is proposed that a class has the LT code of uncalibrated visual servo characteristic so that LT code Coding and decoding efficiency and successfully decoded probability had bigger improvement.And based on this, associated ideal orphan's degree of being distributed in Advantage in terms of release probability a, it is proposed that class has the LT code of sane uncalibrated visual servo characteristic, further improves the compiling of LT code Code performance.
The research of recent years finds that volume (translating) code performance of LT code is had by the appearance of becate and has a certain impact.For compiling For code process, coded identification expectation obtains the information of more incoming symbol transmission, but, the existence of becate makes incoming symbol Information repeat to pass to coded identification, cause the waste of coded identification.Zhang etc. in 2008 at " Little Cycle Elimination of Fountain codes using Distilling Correlative Columns " literary composition proposes Using extraction related column method to evade the becate structure in LT code, Zhou etc. is at " A cycle elimination algorithm For construction of LT codes " literary composition PEG algorithm is used for LT code becate detection and evade in algorithm so that Data have obtained more preferable successfully decoded probability in ideal communication channel.
Above two method all proposes just for the tetracyclic structure occurred in Tanner figure, and consideration is not more than or equal to The impact on LT code of the becate structure of six rings.Further, since the coded identification of LT code is on-demand generation, when channel condition is poor Time, the stochastic generation of degree will inevitably produce Fourth Ring and six ring structures, and now, both schemes change original coding symbol Number degree distribution.The incoming symbol causing decoding equal number needs to transmit more coded identification, takies more channel strip Wide.Therefore, the maximization becate problem of LT code remains a problem demanding prompt solution.
Summary of the invention
The deficiency existed for prior art, it is an object of the invention to provide the transmission of a kind of file based on complex network and compiles Code method, evades Fourth Ring and six ring structures of LT code during detection, to overcome the problem maximizing becate of LT code.
The technical scheme is that and be achieved in that: the transmission coded method of a kind of file based on complex network, including Following steps:
Step 1: add up file size to be transmitted, is grouped file waiting for transmission;
Described grouping process is: by bit order, file to be transmitted is divided into k group, and wherein, k is positive integer, and k >103If the data volume in last packet is less than average amount, then by the remaining bits position zero padding in this packet;
Step 2: select a degree distribution according to k value;
Step 3: generate new packet, i.e. coded identification in multiple packet by packet basis of original to be output, make original Transmit in a network with the form of coded identification sequence;
Step 3.1: generate first coded identification;
Step 3.1.1: degree distribution one value d of stochastic generation selected by step 2, randomly chooses d in former output file Individual different packet, wherein, d is natural number;
Step 3.1.2: this d different packet carries out XOR, forms a new packet, this packet is just for generating First coded identification;
Step 3.1.3: the coded identification generated with step 3.1.2, as start node, generates one by a node group The network structure become;
Step 3.1.4: this coded identification is put and transmits in the channel;
Step 3.2: generate next coded identification;
Step 3.2.1: be distributed according to the degree of step 2, this degree be distributed stochastic generation another positive integer d ', at random from former Selecting a packet in k packet of file, it is former that this be grouped into generation next coded identification selection first had selected The packet of file, is also first the optional packet generating next coded identification.Add a new node in the network architecture. If the packet of original selected be generate other certain or some there is a packet of coded identification, then, this Even limit, and limit is had between the node that individual new node is the most corresponding with above-mentioned certain or some already present coded identification Weights be select original a packet being grouped in all k originals in sequence number;If d '=1, then perform step 3.2.2;Otherwise perform step 3.2.3;
Step 3.2.2: all zero bit sequence isometric with it that be grouped of the original that step 3.2.1 selects carries out different Or, forming a new packet, this is grouped into the next coded identification of generation, this coded identification is put and passes in the channel Defeated, continue executing with to step 3.3;
Step 3.2.3: in all packets of original in addition to for generating the packet that next coded identification had been selected, surplus Under packet in select another packet of original, this be grouped into generate that another of next coded identification selected point Group;
Step 3.2.4: find out that all another packets by step 3.2.3 participate in generating exist coded identification and Its node corresponding in the network architecture, checks that the node that the new node in step 3.2.1 is the most corresponding with these exists even limit. If there is not even limit, showing that another packet selected does not results in the tetracyclic structure of LT code, then continuing to hold from step 3.2.5 OK;If there is even limit, then showing that this another packet will result in the tetracyclic structure of LT code, this another packet is not to generate next The optional packet of individual coded identification.Now, if yet suffering from dividing of the original into generating the next the most selected mistake of coded identification Group, then return to step 3.2.3 and continue executing with, otherwise arrive step 3.2.9 and continue executing with;
Step 3.2.5: find out that all another packets by step 3.2.3 participate in generating exist coded identification and Its node corresponding in the network architecture, checks whether the node that there is even limit in the network architecture with new node is grouped with another There is even limit in the coded identification node corresponding in the network architecture that exists participating in generating.If there is not even limit or existence even The weights on limit and limit are grouped in the sequence number in all packets of original equal to another, then show that another packet will not Cause six ring structures of LT code, this another be grouped into the optional packet generating next coded identification, continue to hold to step 3.2.6 OK;If there is even limit, and the weights connecting limit are not equal to another sequence number being grouped in the packet of original, then show to exist Six ring structures, i.e. this another packet will result in six ring structures of LT code, and this another packet is not to generate next coded identification Optional packet.Now, if yet suffering from the packet of the original of the most selected mistake, then return to step 3.2.3 and continue executing with;No Then, continue executing with from step 3.2.9;
Step 3.2.6;Find out that all another packets by step 3.2.3 participate in generating exist coded identification and Its node corresponding in the network architecture, adds the node of these correspondences and the company limit of new node, the power on limit in the network architecture Value is grouped in the sequence number in all packets of original for another;
Step 3.2.7: if optional grouping number continues executing with from step 3.2.8 equal to d ', if optional grouping number Individual less than d ', then continue executing with from step 3.2.9;
Step 3.2.8: the individual packet of this d ' carries out XOR and obtains a new packet, what this was new is grouped into next coding Symbol.This coded identification is put and is transmitted in the channel;Perform step 3.3;
Step 3.2.9: if yet suffering from the packet of the original of the most selected mistake, then repeat step 3.2.3;If the most not The packet of selected mistake, then arbitrarily select the packet of original beyond optional packet, until selected packet count is that d ' is Only.The individual packet of this d ' carries out XOR and generates a new packet, i.e. next coded identification, and this coded identification is placed on channel In be transmitted;
Step 3.3: the process of repeated execution of steps 3.2, generates remaining coded identification, until transmitting terminal receives reception Till the feedback information that the file that end returns to the most correctly recovers.
Beneficial effects of the present invention: the present invention establishes between the complex network structures that the short-and-medium ring structure of LT code is corresponding Mapping relations, detect according to complex network structures and evade the becate structure in LT code cataloged procedure to greatest extent, improve Its successfully decoded probability, constructs a kind of transmission encoding scheme of file efficiently and reliably based on complex network.Particularly with There is the data transmission in the wireless channel of time-varying characteristics, this invention so that receiving terminal to receive less data the most permissible Initial data is recovered, is effectively increased the bandwidth availability ratio of channel, reduce propagation delay time.
Accompanying drawing explanation
Fig. 1 is that the file that bit number is N=k L is divided equally into k packet schematic diagram by embodiment of the present invention;
Fig. 2 is that the file that bit number is N=k L-δ (δ < L) is divided into k packet schematic diagram by embodiment of the present invention;
Fig. 3 is the schematic diagram that embodiment of the present invention randomly generates angle value d;
Fig. 4 is that embodiment of the present invention selects d=3 different packet schematic diagram in original;
Fig. 5 is the network G schematic diagram of embodiment of the present invention only one of which node;
Fig. 6 is the schematic network structure after embodiment of the present invention generates the 2nd coded identification;
One of the 3rd coded identification of generation is selected to be grouped into S if Fig. 7 is embodiment of the present invention2, cause tetracyclic structure Schematic network structure;
Fig. 8 is that embodiment of the present invention selects one of the 4th coded identification of generation to be grouped into S4, cause six ring structures Schematic network structure;
Fig. 9 is the schematic network structure constituted after embodiment of the present invention generates the 5th coded identification;
Figure 10 is that embodiment of the present invention file based on complex network transmits coded method flow chart;
Figure 11 is that embodiment of the present invention first coding generates process flow diagram flow chart;
Figure 12 is LT code and the tradition LT code comparison curves in terms of successfully decoded probability of embodiment of the present invention composition, Wherein packet count is 104
Detailed description of the invention
Below in conjunction with the accompanying drawings embodiment of the present invention is described in further detail.
File based on the complex network transmission coded method used in present embodiment, as shown in Figure 10.Concrete steps As follows:
Step 1: add up file size to be transmitted, is grouped file waiting for transmission.
If data waiting for transmission are file, the most first want statistics file size, use C language in the present embodiment Fopen () function opens file, uses fseek () function by the position of needle locating to file, passes through to know with ftell () function The position of not last byte obtains the size of file.If data waiting for transmission are bit stream, the most directly treat transmitted bit and flow to Row is grouped.Described grouping process is: by bit order, file to be transmitted is divided into K group, and wherein, K is positive integer, And K > 103.Assume that file to be transmitted can be converted into the bit stream of 2KB, can use said method that this bit stream is divided into K=2000 Group, the most each packet comprises L=8 bit.As it is shown in figure 1, wherein
First packet: total 8bits, content is 01011000;
Second packet: total 8bits, content is 10110011;
……
The K=2000 packet: total 8bits, content is 11100101.
In the present embodiment, the file of 2KB (16000bit) just can be divided into the packet of 2000 8bit.But For some file, it just can not be divided into multiple packet, i.e. the data volume of last packet after division is less than Packeting average data volume.At this time, it may be necessary in the end zero padding that last is grouped so that last is grouped the bit number comprised Average number of bits equal to each packet.Such as: assume the file of a 15994bit to be grouped, still by bit flow point Becoming 2000 groups, often group comprises L=8 Bit data, then last packet is by less than 8, it would be desirable to mend 0 behind.Such as figure Shown in 2, wherein
First packet: total 8bits, content is 01011000;
Second packet: total 8bits, content is 10110011;
……
The K=2000 packet: total 8bits, content is 11000000.Wherein last 6bit is filler.
Through said process, the file of one 2KB can be divided into 2000 groups by us.
Step 2: select a degree distribution according to the value of packet count K;
Described degree distribution can use sane orphan to be distributed, may be used without scale-free degree distribution and sane uncalibrated visual servo divides The degree distribution of the coded identification of the existing common LT code such as cloth, user can need to select voluntarily distribution function according to oneself. Dividing as a example by μ (d) cloth by sane orphan in present embodiment, the determination process of degree of explanation distribution is as follows:
μ (d) is defined as follows,
&mu; ( d ) = &rho; ( d ) + &tau; ( d ) &Sigma; i = 1 K ( &rho; ( i ) + &tau; ( i ) ) , &ForAll; d = 1,2 . . . , K - 1 , K . - - - ( 1 )
Wherein
And
&rho; ( d ) = 1 K , d = 1 1 d ( d - 1 ) , d = 2,3 , . . . , K
In formula, S be decoding process each step in desired remaining degree be the coding symbol number of 1:
S = &beta; K ln K / &delta; > 1 - - - ( 2 )
In formula, β ∈ (0,1) is a free variable, and δ represents when receiving terminal receives K coded identification, tolerable decoding Error probability.
For all of K value, sane orphan is distributed needs to meet equation below:
&Sigma; d = 1 K &mu; ( d ) = 1
Research finds that during δ=1.0, the LT code being distributed based on sane orphan has when parameter beta=0.1 of sane orphan distribution Preferably performance.By β=0.1, δ=1.0, K=10000 substitutes into formula (2), can obtain S=92.10.And then when can obtain K=10000, compile The degree distribution of code sign.
In like manner, similar method can be used, try to achieve the parameter in scale-free degree distribution and sane scale-free degree distribution, determine It is distributed to the degree of the LT code of defining K value.
As a example by K=2000 the packet that the file of 2KB in present embodiment is divided into, by β=0.1, δ=1.0, K=2000 substitutes into It is 33.99 that formula (2) obtains the value of S.The value of S, δ substitute into formula (1) just can obtain packet number be 2000 based on steadily and surely The degree distribution of orphan's indexing.
Step 3: generate new packet in 2000 packet by packet basis of the original that size to be output is 2KB, i.e. encode Symbol, makes original transmit in a network with the form of coded identification sequence;2000 packets of original are referred to as input symbol Number.This implementation process is simple in order to describe, and introduces its part as a example by only have selected 5 incoming symbols in 2000 incoming symbols The generation process of coded identification.These 5 groups of incoming symbols are designated as S respectively1,S2,S3,S4,S5, wherein S1=01011000, S2= 10110011, S3=11100101, S4=01011000, S5=10110010。
Step 3.1: generate first coded identification, as shown in figure 11.
Step 3.1.1: in the present embodiment, degree distribution stochastic generation one the value d selected according to step 21, work done in the manner of a certain author is The degree of first coded identification.From S1,S2,S3,S4,S5These 5 groups of incoming symbols select d1Group is used for generating first coding Symbol.Value d1Selection course as follows:
The degree distribution selected according to step 2, the variable d in formula (1) takes 1 respectively ..., it is 1 that K different value can be spent ..., K Probability shared by coded identification.Because the present embodiment carries out example with the cataloged procedure of 5 groups in 2000 groups, therefore, this Place is we assume that K=5, and limits d and take the integer between [1,5].First, 0-1.0 scope is divided into 5 according to this probability Section;Then a random number is produced with the rand () function in C language, it is judged that this random number is which of these 5 segmentations of 0-1.0 Individual segmentation, in which segmentation, then the angle value of first coded identification selected by step 3.1.1 is just for several.As it is shown on figure 3, Degree of hypothesis be the probability of 1 be 0.1, degree is the probability 0.4 of 2, degree be the probability of 3 be 0.3, degree be the probability of 4 be 0.15, degree is 5 Probability be 0.05.Application cumulative distribution, if the size of random number is between 0~0.1, then the angle value selected is 1;If it is random The size of number is between 2~0.5, then the angle value selected is 2;By that analogy.
Now, it is assumed that producing a value is the random number of 0.51, as shown in Figure 3, it is known that 0.51 is more than 0.5, less than 0.8, I.e. fall in the 3rd segmentation, therefore, plan the degree d of first coded identification1It is entered as 2.
In 5 packets of original, randomly choose 3 different packets, select the probability phase of arbitrary packet of original With, in the present embodiment, this probability is 1/5.
Rand () function 2 randoms number of generation in employing C language in present embodiment, respectively 0.29,0.17.They Falling in the 2nd segmentation as shown in Figure 4 and the 1st segmentation, therefore, 2 selected by this step for generating first The packet of the original of coded identification is respectively the 1st packet and the 2nd packet.
Step 3.1.2: first packet in present embodiment is designated as C1, C1Select equal to step 3.1.1 2 of value The XOR of different original packets.That is, C1=S1⊕S2=11101011;
Step 3.1.3: the coded identification generated with step 3.1.2, as start node, generates one by a node group Network structure G become, as shown in Figure 5.In the present embodiment, refer to coded identification C1Corresponding node V0Generation network is tied Structure G, this step is primarily to initialize G, and the content related to mainly includes using the malloc () function in C language Initialize node and the limit of G.
Step 3.1.4: coded identification C1Put and transmit in the channel;
Step 3.2: in the present embodiment, generates the 2nd coded identification;
Step 3.2.1: be distributed according to the degree of step 2, this degree be distributed the degree d of random second coded identification2=1, at random From S1, S2, S3, S4, S5These 5 packets select 1 packet, it is assumed that this is selected is grouped into S1.One is added in network structure G New node V1, because S1It is to generate C1A packet, then, C2And C1Node V corresponding on G1,V0Between there is even limit, And the weight on limit is S1, as shown in Figure 6.
Owing to the angle value of the 2nd coded identification is 1 and selected is uniquely grouped into S1, therefore, step 3.2 generate Two coded identifications C2=S1=01011000.And by C2Put and be transmitted in the channel.
Step 3.3: in the present embodiment, generates the 3rd coded identification;
Step 3.3.1: randomly choose the degree of the 3rd coded identification according to the degree distribution of step 2, it is assumed that its value is d3=3, Now we need at S1, S2, S3, S4, S5These 5 packets select to meet 3 packets of condition.Its process is as follows:
Random from S1, S2, S3, S4, S5These 5 packets select to generate the 1st packet of the 3rd coded identification, it is assumed that should Selected it is grouped into S1.A new node V is added in network structure G2, due to S1It is to generate C1And C2An original point Group, then increase by one in G and connect node V2With node V0Weights be S1Company limit, and one connect node V2With joint Point V1Weights be S1Company limit.
Random from S2, S3, S4, S5The packet of these 4 originals select a packet as generating the 3rd coded identification The 2nd select packet, it is assumed that it is S2。S2Participation generates coded identification C1, new node V simultaneously2With C1Corresponding node V0There are weights is S1Company limit, as shown in Figure 7.Yin Yin, selects S herein2Tetracyclic structure will be caused, it be not one optional Packet.
Random from remaining packet S3, S4, S5These 3 packets select a packet S3, Fourth Ring and six is not constituted due to it Ring structure, so S3Can be as the optional packet generating the 3rd coded identification.Again from remaining packet S4, S5In random Select a packet, it is assumed that for S4If find S simultaneously4It is placed in complex network structures and does not the most constitute Fourth Ring or six ring structures, Therefore S4Also can be as the optional packet generating the 3rd coded identification.
Therefore, the 3rd coded identification C3Can there is S1, S3, S4These three coded identification XOR and obtain, i.e. C3=S1⊕S3⊕S4= 01100101, by coded identification C3Put and be transmitted in the channel.
Step 3.4: in the present embodiment, generates the 4th coded identification C4
Step 3.4.1: randomly choose the degree of the 4th coded identification according to the degree distribution of step 2, it is assumed that its value d4=2, this Time we need at S1, S2, S3, S4, S5These 5 packets select to meet 2 packets of condition.Process is as follows:
Random from S1, S2, S3, S4, S5These 5 packets select to generate the 1st packet of the 4th coded identification, it is assumed that should Selected it is grouped into S2.A new node V is added in network structure G3, due to S2It is to generate coded identification C1An original text The packet of part, therefore, adds one in G and connects node V3With node V0Weights be S2Company limit.
At random from remaining 4 packet S1, S3, S4, S5Middle selection one packet S4As generating the of the 4th coded identification 2 have been selected packet.Due in network structure G, new node V3The node V being connected0, with packet S4The existence participating in generating is compiled Code sign C3Corresponding node V2Between there is even limit, and the weights on even limit are S1≠S4, as shown in Figure 8.So, select S herein4Meeting Cause six ring structures, i.e. S4It not to generate C4An optional packet.
At random from remaining 3 packet S1, S3, S5Middle selection one packet, it is assumed that selected be grouped into S5, i.e. S5As life The next one becoming the 4th coded identification has selected packet.Due to S5Tetracyclic structure and six ring structures, therefore, S will not be constituted5It is to generate Coded identification C4Another optional packet.
By step 3.4, generate the 4th coded identification C in the present embodiment4=S2⊕S5=00000001.Coding symbol Number C4Put into channel to be transmitted.
Step 3.5: in the present embodiment, generates the 5th coded identification C5
Degree distribution according to step 2 randomly chooses the degree of the 5th coded identification, it is assumed that its value d5=2, now need at S1, S2, S3, S4, S5These 5 packets select to meet 2 packets of condition.Process is as follows:
Random from S1, S2, S3, S4, S5These 5 packets select a packet as one of the 5th coded identification of generation Optional packet, it is assumed that this is grouped into S3.A new node V is added in G4, due to S3Participation generates coded identification C3, because of This, add one in G and connect node V2And V4Weights be S3Limit.
At random from remaining 4 packet S1, S2, S4, S5These 4 packets select 1 packet, it is assumed that for S2.Due in G with New node V4There is the node V on even limit2With S2Participate in coded identification C generated1Node V corresponding in G0There is even limit, and limit Weights be S1≠S2, therefore, if herein by S2Will result in six ring structures as optional packet.
At random from remaining 3 packet S1, S4, S5These 3 packets select 1 packet, it is assumed that for S1, as selecting point Group.Due to S1Participate in coded identification C generated3Node V corresponding in G2With new node V4There are weights is S3Company limit, because of This, S1Tetracyclic structure is will result in as optional packet.
At random from remaining 2 packet S4, S5Middle selection 1 packet, as generating coded identification C5The next one selected point Group, it is assumed that for S4.Due to S4Participate in coded identification C generated3Node V corresponding in G2With new node V4There are weights is S3 Company limit, therefore, if S4Tetracyclic structure is will result in as optional packet.
At random from remaining 1 packet S5Middle selection 1 packet, this is grouped into S5If select S herein5I.e. do not result in four Ring structure does not results in six ring structures yet, so, S5It is to generate coded identification C5An optional packet.Due to S5Participate in generating Coded identification C4, so, G adds one and connects node V3And V4Weights be S5Company limit.As shown in Figure 9.
By step 3.5, generate the 5th coded identification C in the present embodiment5=S3⊕S5=01010111, C5It is placed on Channel transmits.
Step 3.6: in the present embodiment, generates the 6th coded identification C6
Degree distribution according to step 2 randomly chooses the degree of the 6th coded identification, it is assumed that its value d6=3.Now need at S1, S2, S3, S4, S5These 5 packets select to meet 3 packets of condition.Process is as follows:
Random from S1, S2, S3, S4, S5In these 5 packets, selection one packet can as 1 that generates the 6th coded identification Choosing packet, it is assumed that this is grouped into S2.A new node V is added in G5, due to S2Participation generates coded identification C1And C4, because of This, add in G and connect V5, V0Weights be S2Company limit and connect V5, V3Weights be S2Company limit.
Random from S1, S3, S4, S5These 4 packets select 1 packet as having generated the 2nd of the 6th coded identification Choosing packet, it is assumed that this is grouped into S1.Due in network structure G, S1Participate in coded identification C generated1Node corresponding in G V0With new node V5There are weights is S2Company limit, therefore, if select S herein1Tetracyclic structure will be caused.
At random from remaining 3 packet S3, S4, S5Middle selection 1 packet is as generating C6The 3rd select packet, it is assumed that This is grouped into S3.Due in G with new node V5There is the node V on even limit0With S3Participate in coded identification C generated3Correspondence in G Node V2Between to there are the weights on even limit and even limit be S1≠S3, therefore, S herein3It it not an optional packet.
At random from remaining 2 packet S4, S5Middle selection one packet is as generating C6The 4th select packet, it is assumed that for S4.Due in G with new node V5There is the node V on even limit0With S4Participate in coded identification C generated3Node V corresponding in G2Between The weights on existence even limit and even limit are S1≠S4, therefore, if S herein4Six ring structures will be constituted as optional packet.
Analyze last packet S5, due to S5Participate in coded identification C generated4Node V corresponding in G3With new joint Point V5There are weights is S2Company limit, therefore, S5Tetracyclic structure is will result in as optional packet.
In summary, if generating the 6th first selected by coded identification to be grouped into S2, then no matter select S1, S3, S4 Or S5Becate structure will be caused.Now, from except S2Outer S1, S3, S4, S5These 4 packets randomly choose 2 packets, it is assumed that For S1, S4, as generating coded identification C6Two other optional packet.
The 6th coded identification C is obtained by step 3.66=S2⊕S1⊕S4=10110011, C6 is put and carries out in the channel Transmission.
Generating 6 coded identifications by said process, they are all to be generated by 5 packets in original.At this In embodiment, for comprising the original of 2000 packets, it would however also be possible to employ identical method, generate coded identification sequence. At receiving terminal according to the value of coded identification and coded identification and the relation of multiple packets of original, original is recovered Come.
Present invention can be directly applicable to the Volume data such as video, image transmitting in wireless channel, for It is easy to verify feasibility and the advantage of described method, the most only from the encoding scheme of successfully decoded probability angle with tradition LT code It is analyzed.
The present invention with 1000 groups of incoming symbol numbers for 104, block length be 1 bit there is sane uncalibrated visual servo characteristic As a example by LT code and the LT code that is distributed based on sane orphan, effectiveness of the invention is verified, wherein participate in the LT code bag of contrast Include;
(1) RD-SF (cycle-6priority): parameter selects P1=0.1, λ=1.9, reduce Fourth Ring and six ring structures as far as possible The LT code with sane uncalibrated visual servo characteristic;
(2) RD-SF (cycle-4priority): parameter selects P1=0.1, λ=1.9, reduce Fourth Ring as far as possible, do not consider six The LT code with sane uncalibrated visual servo characteristic of ring;
(3) RD-SF (random): parameter selects P1=0.1, λ=1.9, do not consider that the sane nothing that has of Fourth Ring and six rings is marked The LT code of degree characteristic;
(4) RSD (cycle-6priority): parameter selects c=0.1, δ=1, reduces Fourth Ring and the base of six ring structures as far as possible In the LT code that sane orphan is distributed;
(5) RSD (cycle-4priority): parameter selects c=0.1, δ=1, reduces Fourth Ring as far as possible, does not consider the base of six rings In the LT code that sane orphan is distributed;
(6) RSD (random): parameter selects c=0.1, δ=1, does not consider being distributed based on sane orphan of Fourth Ring and six rings LT code.
This invention does not change the degree distribution of coded identification, therefore, generates the average XOR number of times that coded identification needs It is more or less the same with original coding scheme, but owing to Fourth Ring and six ring probabilities of occurrence reduce, recovers what identical incoming symbol needed Coding symbol number will decrease so that the average XOR number of times of program decoding process reduces.It is different coding as shown in table 1 The relativity of redundancy factor in scheme, redundancy factor is the lowest, and the coding symbol number that showing to recover original input symbol needs is got over Few, required decoding delay is the lowest:
The LT code of table 1 the present embodiment structure and the Performance comparision of tradition LT code
Analytical table 1 understands, and applies the average redundancy factor of LT code of six ring priority algorithms less than application Fourth Ring priority algorithm The average redundancy factor of LT, they both less than do not carry out the average redundancy factor of the LT code of becate optimization, therefore use becate The LT code evading algorithm recovers the coding symbol number of equal number of incoming symbol needs less than the LT code not carrying out becate optimization.
Owing to the degree of each coded identification is independent generation, and there is the LT code of sane uncalibrated visual servo characteristic and based on reason As long as thinking that the LT code that orphan is distributed receives enough coded identifications and is to ensure that recipient can decode completely, with transmission number According to channel condition unrelated, therefore, the most only consider to apply becate based on Complex Networks Theory to evade the LT code of algorithm resonable Think the successfully decoded probability under channel condition.
Figure 12 be incoming symbol number be 104, construct 1000 groups of above-mentioned six kinds of LT codes respectively, obtain the successfully decoded of them Relation between probability and redundancy factor.
Analysis Figure 12 understands, and on the premise of redundancy factor is identical, it is sane without mark that having of algorithm generation evaded by application becate The successfully decoded probability of the LT code of degree characteristic is higher than the LT code with sane uncalibrated visual servo characteristic and additionally not considering becate structure Three kinds of LT codes being distributed based on sane orphan.And apply becate to evade the LT code being distributed based on sane orphan that algorithm generates, connect Receiving end receive the successfully decoded probability of equal number of coded identification N=(1+ α) K higher than do not consider becate structure based on surely The LT code of strong orphan's distribution.
The studies above shows, the LT code of algorithm design evaded by application becate can be in the premise ensureing to compile (translating) code efficiency Under so that successfully decoded probability is greatly improved.
Although the foregoing describing the detailed description of the invention of the present invention, but the those skilled in the art in this area should managing Solving, these are merely illustrative of, and these embodiments can be made various changes or modifications, without departing from the principle of the present invention And essence.The scope of the present invention is only limited by the claims that follow.

Claims (1)

1. file based on a complex network transmission coded method, it is characterised in that: comprise the following steps:
Step 1: add up file size to be transmitted, is grouped file waiting for transmission;
Described grouping process is: by bit order, file to be transmitted is divided into k group, and wherein, k is positive integer, and k > 103If the data volume in last packet is less than average amount, then by the remaining bits position zero padding in this packet;
Step 2: select a degree distribution according to k value;
Step 3: generate new packet, i.e. coded identification in multiple packet by packet basis of original to be output, makes original to compile The form of code sign sequence is transmitted in a network;
Step 3.1: generate first coded identification;
Step 3.1.1: degree distribution one value d of stochastic generation selected by step 2, randomly chooses d not in former output file Same packet, wherein, d is natural number;
Step 3.1.2: this d different packet carries out XOR, forms one new packet, this packet is just for the of generation One coded identification;
Step 3.1.3: the coded identification that generated with step 3.1.2, as start node, generates one and is made up of a node Network structure;
Step 3.1.4: this coded identification is put and transmits in the channel;
Step 3.2: generate next coded identification;
Step 3.2.1: be distributed according to the degree of step 2, this degree be distributed stochastic generation another positive integer d ', at random from original K packet in select a packet, this is grouped into first original selected generating the selection of next coded identification Packet, be also first the optional packet generating next coded identification;Add a new node in the network architecture, if choosing One packet of the original selected be generate other certain or some there is a packet of coded identification, then, this is new Even limit, and the power on limit is had between the node that node is the most corresponding with above-mentioned certain or some already present coded identification Value is the sequence number in a packet being grouped in all k originals of the original selected;If d '=1, then perform step 3.2.2;Otherwise perform step 3.2.3;
Step 3.2.2: all zero bit sequence isometric with it that be grouped of the original that step 3.2.1 selects carries out XOR, Forming a new packet, this is grouped into the next coded identification of generation, this coded identification is put and transmits in the channel, arrives Step 3.3 continues executing with;
Step 3.2.3: in all packets of original in addition to for generating the packet that next coded identification had been selected, remaining Selecting another packet of original in packet, this is grouped into another packet selected generating next coded identification;
Step 3.2.4: find out that all another packets by step 3.2.3 participate in generating exist coded identification and Node corresponding in network structure, checks that the node that the new node in step 3.2.1 is the most corresponding with these exists even limit, if not There is even limit, show that another packet selected does not results in the tetracyclic structure of LT code, then continue executing with from step 3.2.5;If There is even limit, then show that this another packet will result in the tetracyclic structure of LT code, this another packet is not to generate the next one to compile The optional packet of code sign, now, if yet suffering from the packet of the original into generating the next the most selected mistake of coded identification, then Return to step 3.2.3 continue executing with, otherwise arrive step 3.2.9 and continue executing with;
Step 3.2.5: find out that all another packets by step 3.2.3 participate in generating exist coded identification and Node corresponding in network structure, checks whether the node that there is even limit in the network architecture with new node participates in another packet There is even limit in the node that there is coded identification correspondence in the network architecture of generation, if there is not even limit or existence to connect limit also And the weights on limit are grouped in the sequence number in all packets of original equal to another, then show that another packet does not results in Six ring structures of LT code, this another be grouped into the optional packet generating next coded identification, continue executing with to step 3.2.6; If there is even limit, and the weights connecting limit are not equal to another sequence number being grouped in the packet of original, then show to have six Ring structure, i.e. this another packet will result in six ring structures of LT code, and this another packet is not to generate next coded identification Optional packet, now, if yet suffering from the packet of the original of the most selected mistake, then returns to step 3.2.3 and continues executing with;Otherwise, Continue executing with from step 3.2.9;
Step 3.2.6: find out that all another packets by step 3.2.3 participate in generating exist coded identification and Node corresponding in network structure, adds the node of these correspondences and the company limit of new node in the network architecture, and the weights on limit are Another is grouped in the sequence number in all packets of original;
Step 3.2.7: if optional grouping number continues executing with from step 3.2.8, if optional grouping number is less than equal to d ' D ' is individual, then continue executing with from step 3.2.9;
Step 3.2.8: the individual packet of this d ' carries out XOR and obtains a new packet, what this was new is grouped into next coding symbol Number, this coded identification is put and is transmitted in the channel;Perform step 3.3;
Step 3.2.9: if yet suffering from the packet of the original of the most selected mistake, then repeat step 3.2.3;If it is the most selected The packet crossed, then arbitrarily select the packet of original beyond optional packet, until selected packet count is d ';This The individual packet of d ' carries out XOR and generates a new packet, i.e. next coded identification, and puts to enter in the channel by this coded identification Row transmission;
Step 3.3: the process of repeated execution of steps 3.2, generates remaining coded identification, until transmitting terminal receives receiving terminal and returns Back to the feedback information that the most correctly recovers of file till.
CN201310507723.6A 2013-10-23 2013-10-23 The transmission coded method of a kind of file based on complex network Active CN103532674B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310507723.6A CN103532674B (en) 2013-10-23 2013-10-23 The transmission coded method of a kind of file based on complex network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310507723.6A CN103532674B (en) 2013-10-23 2013-10-23 The transmission coded method of a kind of file based on complex network

Publications (2)

Publication Number Publication Date
CN103532674A CN103532674A (en) 2014-01-22
CN103532674B true CN103532674B (en) 2016-08-17

Family

ID=49934391

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310507723.6A Active CN103532674B (en) 2013-10-23 2013-10-23 The transmission coded method of a kind of file based on complex network

Country Status (1)

Country Link
CN (1) CN103532674B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103929275B (en) * 2014-04-30 2017-10-03 电子科技大学 Distributed SF LT code encoding methods with uncalibrated visual servo characteristic
CN107612897A (en) * 2017-09-07 2018-01-19 唐冬香 A kind of data transmission method
CN108259930B (en) * 2018-01-16 2020-08-14 深圳市力沃信息科技有限公司 Transmission control method and system for electronic class board
CN108267950B (en) * 2018-01-19 2021-02-12 东北大学 Simple fractional order complex network external hybrid synchronization method
CN115333673A (en) * 2022-07-29 2022-11-11 南京信息工程大学 Block coding transmission method based on ILT in block chain network

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011139122A2 (en) * 2010-05-07 2011-11-10 Samsung Electronics Co., Ltd. Apparatus and method for channel coding in a communication system
CN102324998A (en) * 2011-05-11 2012-01-18 浙江大学 Raptor Codes encoding/decoding method suitable for medium/short code lengths of additive white Gaussian noise channel
CN103023937A (en) * 2011-09-26 2013-04-03 北大方正集团有限公司 Method and system for distributing network files
CN103078707A (en) * 2013-01-03 2013-05-01 北京理工大学 File transmission method in deep space communication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011139122A2 (en) * 2010-05-07 2011-11-10 Samsung Electronics Co., Ltd. Apparatus and method for channel coding in a communication system
CN102324998A (en) * 2011-05-11 2012-01-18 浙江大学 Raptor Codes encoding/decoding method suitable for medium/short code lengths of additive white Gaussian noise channel
CN103023937A (en) * 2011-09-26 2013-04-03 北大方正集团有限公司 Method and system for distributing network files
CN103078707A (en) * 2013-01-03 2013-05-01 北京理工大学 File transmission method in deep space communication

Also Published As

Publication number Publication date
CN103532674A (en) 2014-01-22

Similar Documents

Publication Publication Date Title
CN103532674B (en) The transmission coded method of a kind of file based on complex network
CN101821980B (en) Method of transmitting data
CN102355341B (en) Network coding method of hybrid automatic request retransmission for long-term evolution system
CN102131083B (en) Method and device for transmitting scalable videos based on priorities
CN101432969A (en) Forward error-correcting (FEC) coding and streaming
WO2017121334A1 (en) Data-processing method and device
CN105991227A (en) Data encoding method and apparatus
CN108880566A (en) A kind of Polar decoding transmission method and device
CN106209302B (en) Data transmission processing method and device
CN103346858B (en) System LT code Compilation Method based on superposition degree
CN103067137A (en) Multicast retransmission method based on network codes
CN108494527A (en) A kind of data transmission and reception method based on LoRa
CN103944676B (en) A kind of LT code coding/decoding methods based on deep space communication environment
CN103152652A (en) Video frame data network transmission method based on Cauchy reed-solomon (RS) code
Larsson Multicast multiuser ARQ
CN104065457A (en) Merged decoding method and device
Yue et al. The design of degree distribution for distributed fountain codes in wireless sensor networks
Siavoshani et al. Noncoherent multisource network coding
CN107005349B (en) A kind of data processing method, base station and terminal device
CN108429553A (en) Coding method, code device and the equipment of polarization code
Li et al. Improved compression of network coding vectors using erasure decoding and list decoding
CN103036646B (en) For the ECC decode control method of data communication
CN104219032A (en) Minimum packet loss retransmission method in multicast scene in wireless local area network
CN101645753A (en) Coding method without rate codes
CN103346859B (en) The encoding and decoding method of distributed unequal error protection LT code

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant