scholarly journals A Design of Overlapped Chunked Code over Compute-and-Forward for Multi-Source Multi-Relay Networks

Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3225
Author(s):  
Rithea Ngeth ◽  
Brian Kurkoski ◽  
Yuto Lim ◽  
Yasuo Tan

This paper investigates the design of overlapped chunked codes (OCC) for multi-source multi-relay networks where a physical-layer network coding approach, compute-and-forward (CF) based on nested lattice codes (NLC), is applied for the simultaneous transmissions from the sources to the relays. This code is called OCC/CF. In this paper, OCC is applied before NLC before transmitting for each source. Random linear network coding is applied within each chunk. A decodability condition to design OCC/CF is provided. In addition, an OCC with a contiguously overlapping, but non-rounded-end fashion is employed for the design, which is done by using the probability distributions of the number of innovative codeword combinations and the probability distribution of the participation factor of each source to the codeword combinations received for a chunk transmission. An estimation is done to select an allocation, i.e., the number of innovative blocks per chunk and the number of blocks taken from the previous chunk for all sources, that is expected to provide the desired performance. From the numerical results, the design overhead of OCC/CF is low when the probability distribution of the participation factor of each source is dense at the chunk size for each source.

2014 ◽  
Vol 998-999 ◽  
pp. 1161-1164
Author(s):  
Gui Mei Chen ◽  
Zhong Gui Ma ◽  
Sha Ban ◽  
Narwani Kamleshd

A transmission method , combining both the bit error diversity and joint network-channel coding, was proposed for multiple-user multiple-hop multiple-relay networks. In the poposed method, an interleaver was designed for the bit error diversity and a novel protocol was devised for random linear network coding. The proposed method as well as other two methods—Method I without channel code and protection and Method II only with protection, was analyzed by deriving performance expressions in terms of packet error rate (PER) and throughput. Moreover, simulations further prove the superiority of the proposed method. Numerical results show that the proposed method gains an improvement in PER compared with Method I & II and keeps highest throughput within certain range of SNR.


Sign in / Sign up

Export Citation Format

Share Document