- Fountain code
In
Coding Theory andCommunication Theory , fountain codes (also known as rateless erasure codes) are a class oferasure codes with the property that a potentially limitless sequence of encoding symbols can be generated from a given set of source symbols such that the original source symbols can be recovered from any subset of the encoding symbols of size equal to or only slightly larger than the number of source symbols.A fountain code is optimal if the original "k" source symbols can be recovered from any "k" encoding symbols. Fountain codes are known that have efficient encoding and decoding algorithms and that allow the recovery of the original "k" source symbols from any "k’" of the encoding symbols with high probability, where "k’" is just slightly larger than k.
Practical considerations
In practical simulations, for relatively short , say less than , the overhead defined by
:
is non trivial. With the short , both LT and
raptor code s using the sparsebipartite graph (BP) algorithm never achieve an overhead of less than 0.10. The raptor and online codes have an advantage (over what? Most likely: pure LT code) if and only if the BP algorithm over a check matrix (or triangularization of a check matrix ) can recover most of input symbols. This is a critical drawback of fountain codes. If a raptor or online code is going to recover most of the input symbols, say more than 95%, then pre-encoding is not necessary, because transmitting a few tens of dense encoding symbols can cover up all the input symbols with an extremely high probability (called the union bound). The dense encoding symbols also contribute to the remaining matrix of having its full column rank. Thus, the unrecovered symbols can be solved byGaussian elimination over the remaining graph. The check equations of dense encoding symbols can be communicated to receivers by applying the same random degree generators of the sender.An accessible exposition of fountain codes can be found in the final chapter of David MacKay's free online textbook, " [http://www.inference.phy.cam.ac.uk/mackay/itila/book.html Information Theory, Inference, and Learning Algorithms] "
See also
*
Raptor codes
*LT codes
*Online codes References
* M. Luby, "LT Codes," In Proc. IEEE Symposium on the Foundations of Computer Science (FOCS), 2002, pp. 271-280.
* A. Shokrollahi, "Raptor Codes", IEEE Transactions on Information Theory, 52(6), pp. 2551-2567, 2006. [http://ieeexplore.ieee.org/iel5/18/34354/01638543.pdf?isnumber=34354&prod=JNL&arnumber=1638543&arSt=2551&ared=2567&arAuthor=Shokrollahi%2C+A. PDF]
* David J. C. MacKay. " [http://www.inference.phy.cam.ac.uk/mackay/itila/book.html Information Theory, Inference, and Learning Algorithms] " Cambridge: Cambridge University Press, 2003. ISBN 0-521-64298-1
Wikimedia Foundation. 2010.