Application of LT Code Technology in Deep Space Communication

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

3URFHHGLQJVRI*OREDO&RQIHUHQFHRQ&RPPXQLFDWLRQ7HFKQRORJLHV *&&7

APPLICATION OF LT CODE TECHNOLOGY IN DEEP SPACE


COMMUNICATION

Jane Sofia J1, Dr.J Jayakumari2


1
Student, 2HOD
Department of Electronics and Communication Engineering
Noorul Islam University
1
janesofia05@gmail.com , 2hellojayakumari@rediffmail.com

Abstract- Deep space communications have characteristics Asymmetric channel [2]. The traditional channel coding technique
such as long delay, high code error rate and easily broken link can’t satisfy the future deep space communication. Comparing
etc. Easily broken links may lead to a certain degree of random with the drawbacks involved in deep space communication the
flash break of Telemetry Tracking & Command signals, which forward error control codes have greater advantages which makes
in turn will result in the inconsiderable loss of data. Reliable the simulation result close to the actuality.
downlink channel is necessary for deep space communication
due to the distance between spacecraft and ground control The fountain codes are one of the forward error control codes
station, the channel is effected by many interference factors so which are the rate less codes. Rate less indicates the receiver can
random and burst error are unavoidable. Integrity of fountain get any number of coding symbols from information block [1].
code can be considered in deep space communication. A special These codes succeed to recover the original information as long as
class of fountain code is furnished by LT code which solves the the receiver received adequate number of coding symbols. The
issue of data frames in deep space communication. Based on fountain codes improve the delivery efficiency, shortened delay
the performance concatenation of LT code and LDPC code and suitable for deep space communication. The fountain codes
provide more reliable solution for acquisition of deep space help in recovery of the symbols by encoding and decoding process
communication. but for the faster recovery, the universal fountain codes called LT
codes were developed consisting of faster encoding and decoding
Keywords- Deep space communication, LT code process.

I. INTRODUCTION II. WIRELESS COMMUNICATION IN DEEP SPACE

Exploration of space is involved by its communication The transfer of information between two or more points that
system. This system is responsible for sending scientific data and are physically not connected is wireless telecommunication. Here
providing the capability of tracking and commanding to take the distance can be short, as a few meters. A long range
certain actions. Communication systems are the most critical communication, that is impossible or impractical to implement
functions in space exploration. It also has the following functions: with the use of wires which use some form of energy to transfer
Acquire telemetry data from spacecraft, Transmit commands to information without the use of wires are some of the services
spacecraft, Gather science data and Monitor and control the which the wireless operation permits. Due to this services
performance of the network. Deep space communication channel information is transferred in this manner over both short and long
has adequate bandwidth but limited amount and size of distance. Some common examples of wireless equipment are:
equipments, the long distance transmission makes it resource Telemetry control and traffic control systems, satellite television
constrained. Deep space communication channel are regarded as a and the portable devices.
limited power and bandwidth affluent channel exchange for
reliability by efficiency [1]. The bit error is 10^7 to 10^5 and A. Wireless network
packet loss is high and the time delay, makes delivery failure.
Wireless networking plays an important role to meet
The reliable information transmission in deep space many needs such as to connect laptop users who travel from
communication guarantee by channel encoding and decoding. The location and for the mobile network connection via satellite.
deep space communication channel is a very ideal channel similar Wireless transmission leads to the change in the network location.
to memory less AWGN channel [1]. It also has the following Wireless technology is necessary: To span a distance beyond the
features: long distance and long propagation delays, Very weak capabilities of typical cabling, to provide a backup
received signal, Variational delay and intermittent connectivity and communications, to link portable or temporary workstations, to
overcome situations

‹,((( 
3URFHHGLQJVRI*OREDO&RQIHUHQFHRQ&RPPXQLFDWLRQ7HFKQRORJLHV *&&7

Connect mobile users or networks, Wireless communication via information bits with generator sequences. Convolution
radio frequency communication and microwave communication, codes are applicable in reliable data transfer, digital
infrared short range communication. Application may involve video, mobile and satellite communication. The
point to point communication, point to multipoint communication, properties of the convolution code are linear, encoding
broadcasting, cellular networks and other wireless networks. Best mapping is bijective and the state diagram involves the
examples of wireless technology are the cellular telephone, modem minimum free distance. In spite of this advantageous
and Wi-Fi. properties the decoding complexity more and the error
event happens when the enormous path is selected at the
B. Deep Space Communication decoder and depend on the modulation scheme, hard or
soft decision.
The onboard application of wireless communication is x Turbo Code: Turbo code are one of the linear block code
advantageous in space mission. The technology of wireless with large equivalent block lengths structured in such a
communication is enabled for both manned and unmanned way that decoding can split into a number of manageable
spacecraft. It enables increasing safety and science and decreasing steps. This code are finding use in 3G mobile
costs by eliminating expensive cabling. For communicating communication and satellite communication as well as
outside spacecraft wireless communication acts as the other application where designer needs reliable
fundamental. Two important challenges of wireless network for bandwidth. The error performance of the turbo decoder
space communication include: Quality and Safety. Advantages of improves with the number of iterations of the decoding
wireless network for space communication are: Harness algorithm. Here the turbo decoder is capable of
complexity reduction, Eases retrofits activities, Mass and volume approaching the Shannon theoretical limit of channel
reduction, Lowers cost of distribution, Reduced cost through capacity. But for a fixed number of iterations, the
flexible infrastructure, Ease of deployment, Conveyance, layout probability of error decreases with increasing SNR [6].
independence, flexibility, Small form factor, Adhoc networking, x Reed Solomon Code: Reed Solomon Code are block-
and fault tolerance [3]. based error correcting codes which has the great power
and utility, and are today found in many applications
In the deep space communication radio frequency from compact disc players to deep space applications.
channel are used presenting challenging environment. The Reed Solomon Code are the systematic codes are the
operation carried for deep space communication under following systematic code because the data is left unchanged and
constraint: Long distance, High signal propagation delays, High the parity symbols are appended and these codes may
data corruption rates, Disruption events, Meager, Asymmetric, be shortened by making a number of data symbols zero
Bandwidth and Complex geography environment [4]. at the encoder, not transmitting them, and then re-
inserting them at the decoder. The processing power
III. CODING TECHNIQUES required to encode and decode in Reed Solomon code is
related to the number of parity symbols per code word.
Until the establishment of internet binary erasure channel In the software implementation it doesn’t support Galois
(BEC) of communication is regarded as the theoretical channel. field arithmetic operations as this operation requires a
The data’s are transmitted in form of packets on internet and the test for 0, two log table look-ups, and module add and
packets are sequence numbered. From sender to receiver packets antilog table look –up.
are routed on network which leads to buffer overflows at the x Fountain Code: Fountain code are a class of erasure
intermediate routers, some packets may get lost and never reach codes having the property of potentially limitless
the destination. Rest of the packets may be declared as lost if the sequence in which encoded symbols are generated from
internal checksum of the packet doesn’t match. Thus internet acts the source symbols and the size of encoded symbol is
as very good real-world model of the BEC. But the transmission of equal to or slightly higher than the original symbols.
data from one server to multiple receivers, or transmission of data Hence length of the fountain codes is variable [7].
over heavily impaired channels such as poor wireless or satellite Fountain codes are flexibly applicable at a fixed code
links. The distance between sender and receiver is long and the rate or where a fixed code rate cannot be determined and
sender waits for the acknowledgement and cannot send data in the in reliable multicast scenarios in hybrid ARQ. Fountain
acknowledgement based protocols [5]. code leads to the evolution of LT code, LDPC code,
Raptor code and TORNADO code.
The solutions to this problem is based on the coding, in which
the original data is encoded using some linear erasure correcting Researches has been made on fountain code in deep space
code. If some part of data is lost during transmission, then the lost communication since this codes are the sparse graph codes taking
data can be recovered using erasure correcting algorithms [5]. In erasure channel as background. The channel in deep space
the deep space communication large distance between transmitting communication is similar to AWGN channel but not erasure
spacecraft and the receiving earth station and the limited channel. So the concatenated code is proposed in deep space
transmitting power results in a very poor signal to noise communication. The concatenated code form a class of error
ratio(SNR) at the receiver side causing large amount of correcting codes form a class of error correcting codes that are the
transmission errors. While transmission data bits are highly combination of inner code and an outer code[1]. The transmission
compressed, this is sensitive to the transmission errors [4]. requirements can be satisfied by the concatenated code and
Therefore coding technique is also one of the important resulting in good performance. It act as the solution to the problem
technologies. Various coding techniques are involved: of finding a code that has both exponentially decreasing error
probability with increasing block length and polynomial time
x Convolution Code: The information is mapped to code decoding complexity. The implementation of some concatenated
the bits sequentially by convolving a sequence of codes in deep space communication till now is stated as follows:

‹,((( 
3URFHHGLQJVRI*OREDO&RQIHUHQFHRQ&RPPXQLFDWLRQ7HFKQRORJLHV *&&7

(1) Convolution code concatenated with reed Solomon code for


MER communication and moon exploring plan of China, (2)
Concatenation of turbo code and LDPC code for design of MRO 1 2 3 4 5
data transmission [4].

IV. PROPOSED WORK


1 2 3
DATA LT LDPC PSK
ENCODER ENCODER MODULATION
XOR

AWGN
CHANNEL
t

DATA LT LDPC PSK Fig 1- Graph of LT codes encoding process


DECODER DECODER DEMODULATION
. Fig 1 show the encoding process involved in LT encoding [1].

1 0 1 0
A. Data

Mostly the data used are in the form of packets or in the


form of symbols. But here 1016 symbols have been taken for the
simulation purpose. In deep space communication bulkier amount
of data is taken. 0 1 0 0 1
B. LT code

The first practical rate less erasure codes are the Luby Fig2- LT encoding with four packets
Transform (LT) codes and this code is known as the low density
generator matrix (LDGM) codes. Encoding and decoding can be For a set of four packets and each packets having one bit the
performed with LT encoder and LT decoder. encoding is performed in fig 2[8].

a. Encoding b. Decoding

From the given set of information symbols encoding There are several algorithm involved in decoding process
symbols can be independently generated by the following such as message passing algorithm and gauss elimination
encoding process: algorithm. The purpose of the decoding is to guess the original
data, recovers the true data or gives up. For the decoding the
(1) Analyze the encoding symbol with the degree which is chosen neighbor of encoding symbols and the degree and edges between
randomly from the given load of degree distribution. encoded are known to the decoder, since they are included in the
(2) Chose the neighbors of the encoding symbols as distinct packets. The LT decoding process is performed in terms of
information uniformly at random. iteration which involves following three steps:
(3) Perform the XOR for the chosen information symbols to the
encoding symbols [7]. (1) Release: In this step all encoding symbols are connected
to one information symbol which are released to cover
The above encoding process is similar to generating the parity bits their unique neighbor.
the encoding process is represented by the bipartite graph. The (2) Cover: Unique neighbor information symbols are
bipartite graph is drawn with the help of degree. Degree of covered by released encoding symbols but not processed
encoded packet is the number of edges that goes to the particular input symbols are sent to ripple. Ripple is a set of
packet. In this distribution are adopted to decide the number of covered unprocessed information symbols gathered
source symbols through the previous iteration.
(3) Process: From the ripple one of the information symbol
is chosen for the processing and this processed
information is removed from the ripple [7].

‹,((( 
3URFHHGLQJVRI*OREDO&RQIHUHQFHRQ&RPPXQLFDWLRQ7HFKQRORJLHV *&&7

C. LDPC code

Low density parity check (LDPC) codes are a class of


1 1 0 0 1 linear block codes. The characteristics of parity check matrix
containing only a few ones comparison in comparison to the
amount of zeroes created the name of LDPC. Performance of this
code is very closer to the capacity of lot of different channels and
linear time complex algorithms for decoding. LDPC code can be
represented using a bipartite graph, also called as tanner graph.
? ? ? ? ? ? ?

Information check codes


(a)

1 1 0 0 1

? ? 1 ? ? ? 1

RIPPLE
1 1
(b)

1 0 1 0 1

? ? 1 ? ? ? 1

RIPPLE
1 1

Variable nodes

Fig 4- Tanner graph representation of parity check matrix


(c)
The parity check matrix is considered as binary is shown in fig
Fig 3- Graph of LT code decoding process: (a) Release, (b) 4[10].
Cover, (c) process.
a. Encoding
The bipartite graph explains example of decoding process of
release, cover and process in fig 3[9]. There two types of encoding in LDPC: (1) generic
encoding, (2) efficient encoding. The following property is used
Mainly the gauss elimination algorithm is used in the for the encoding:
software implementation to attain the high performance.
HXT= 0T
The performance of LT code is determined by the
decoding efficiency and depends on the following factors: the Where x is the code word, H is the parity check matrix and 0 is
encoded packets degree distribution and the mapping between the the zero vectors. Information bits and parity bits are present in the
encoded packets and the user packets, which in the original LT code word. From information bits the parity bits are computed
codes are based on random selection. [10].

‹,((( 
3URFHHGLQJVRI*OREDO&RQIHUHQFHRQ&RPPXQLFDWLRQ7HFKQRORJLHV *&&7

b. Decoding 520.Six iterations is taken during the analysis.

The main decoding algorithm is the message pass


algorithm which is also known belief propagation (BP) algorithm.
In this message passing simple decoding is done at nodes for the
iterative exchange of information. There is trade-off between
decoding performance and complexity in this BP algorithm [1].

For overcoming this drawback some improved algorithm


such as min-sum algorithm which reduces complexity and tries
hard to reduce the losses on performance at the same time.

D. Channel

The channel used in proposed work is the Additive


White Gaussian Noise (AWGN) channel. This is the basic noise
model used in the information theory with different characteristics.
The characteristics involved are:

(1) Additive: Any noise can be added which might be


intrinsic to the information system.
(2) White: This has the uniform emission of all frequency. Fig 5- Performance of the concatenated codes
(3) Gaussian: It has the average time domain of value of
zero. Fig 5 shows the performance of error rate of the concatenated
codes. The good performance of the concatenated codes is found
The AWGN channel is mostly applicable in deep space
communication VI. CONCLUSION

E. Processing In the deep space communication the concatenation of LT code


and LDPC code giving high encoding and decoding and the
a. Modulation complexity is reduced. The performance of this concatenated code
is improved by the increasing code length. By using the
Modulation is the process of facilitating the transfer of concatenation of LT codes in deep space communication we
information over a medium. In spite of many types of modulation achieve minimum bit error rate and we can receive the data's
scheme, BPSK modulation is used. One of the large classes of transmitted as it is with a minimum possibility of occurrence of
digital modulation scheme is BPSK. BPSK modulation scheme error. Thus the drawback of weak received signal is overcome.
conveys the data by changing, or modulating, the phase of the
reference signal and uses the finite number of phases; each VII. REFERENCES
assigned a unique pattern of binary digits.
[1] Wending Yao, Lijja Chen, Hui Li, Hongguang Xu. Research
b. Demodulation on fountain codes in deep space communication. Congress on
image and signal processing.2008.
In the demodulation section the recovery of the original
data, after passing through the respective channel. [2] Zhang Gengxin, Xie Zhidong, Bian Dongming, Sun Qian.
Journal of electronics. Vol 28.No.2. March 2011.
V. SIMULATION RESULT AND ANALYSIS
[3] CCSDS- The Consultative Committee for space data system.
Mainly two parameters are taken for analysis: (1) Bit error rate TM synchronization and channel coding summary of concept and
(BER), (2) Signal to noise ratio (SNR) rationale. November 2012.

x BER is the number of bit error divided by the total [4] Xia Song, Li Yunsong, Bai Baorming, Zhou Youxi. The key
number transferred bit during the studied time interval. technologies of deep space communications. China
BER is the unitless performance measure. communications . December 2006.
x SNR compares the level of desired signal to the level of
background noise. It is defined as the ratio of signal [5] Amin Shokrollahi. Raptor codes. IEEE Transaction on
power to the noise power. information theory. Vol.52.No.6. June 2006.

The analysis is performed for the decoding, encoding, [6] Simon Haykin. Communication system. Wiley publication.
modulation and demodulation. For the above process the Fourth Edition.
performance is determined in each and every step. Then the
concatenated codes of LDPC as inner code and LT code as outer [7] Gauri Joshi, Joong Bum Rhim, John Sun, Da Wang. Fountain
code and the simulation is performed. The inner code adopts the Codes. Principles of digital communication II. December 7,2010.
irregular LDPC code and the outer code adopts the LT Code with
maximum length (N) of 1016 and the number of packets (K) of

‹,((( 
3URFHHGLQJVRI*OREDO&RQIHUHQFHRQ&RPPXQLFDWLRQ7HFKQRORJLHV *&&7

[8] Xiaohan Wang, Andreas Willing and Graeme Woodward.


Improving fountain codes for short message lengths by adding
memory. IEEE ISSNIP 2013.

[9] Gauri Joshi, Joong Bum Rhim, John Sun, Da Wang. Fountain
Codes. Principles of digital communication II. December 8,2010.

[10] Sunitha Kopparthi . Flexible encoder and decoder designs for


low density parity check codes. Kansas state university. 2010

‹,((( 

You might also like