Random switch-in method based on fountain coding
A fountain coding, random access technology, applied in digital transmission systems, electrical components, error prevention, etc., can solve the problems of wasting bandwidth resources and frequent conflicts later, and achieve the effect of improving system data throughput.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] User A and user B respectively send K 1 and K 2 Take a data frame of a source data packet to receiver C and receiver D as an example.
[0033] Using a random access method based on fountain coding, see figure 1 .
[0034] 1). Construct the data frame to be sent, and design to include K 1 and K 2 Data frames to be sent of source data packets ( a 0 , a 1 , · · · , a N 1 - 1 ) , ( b 0 , b 1 , · · · , b N 1 - ...
Embodiment 2
[0042] Taking cognitive radio as an example, an unlicensed user A sends a data frame containing K source data packets to a receiving end C by using a spectrum hole.
[0043] Using a random access method based on fountain coding, see figure 1 .
[0044] 1). Construct a data frame to be sent, and design a data frame to be sent that includes K source data packets (a 0 , a 1 ,...,a N-1 ), (b 0 , b 1 ,...,b N-1 ),..., (f 0 , f 1 ,..., f N-1 ).
[0045] 2). Fountain encoding is performed on the data frame to be sent, such as figure 2 Unauthorized user A sends the source data packet (a 0 , a 1 ,...,a N-1 ), (b 0 , b 1 ,...,b N-1 ),..., (f 0 , f 1 ,..., f N-1 ) reordered into packets (a 0 , b 0 ,..., f 0 ), (a 1 , b 1 ,..., f 1 ),..., (a N-1 , b N-1 ,..., f N-1 ) followed by fountain coding, such as sorting the i-th data packet (a i , b i ,..., f i ) to generate encoded data packets (A i , B i ,...,F i ,...), i=0, 1, ..., N-1; the output in columns i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 