IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 9, SEPTEMBER 2012 2377
Transactions Letters
On Raptor Code Design for Inactivation Decoding
Kaveh Mahdaviani, Student Member, IEEE, Masoud Ardakani, Senior Member, IEEE,
and Chintha Tellambura, Fellow, IEEE
Abstract—Based on a new vision of the inactivation decoding
process, we set a new degree distribution design criterion for
the LT part of Raptor codes. Under an infinite block length
assumption, a family of degree distributions that satisfy the
new design criterion is analytically derived. The finite length
performance of this family is investigated by using computer
simulations and is shown to outperform the conventional design.
Index Terms—Finite length Raptor codes, inactivation decod-
ing, Soliton distribution.
I. I NTRODUCTION
L
UBY transform (LT) codes were originally introduced
as the first practical fountain codes in [1]. As such, LT
codes are designed to transmit a theoretically endless stream
of symbols until the receiver has enough symbols to decode
all the information bits. Raptor codes [2], an extension of
LT codes, employ an outer code to enable the receiver to
recover the whole information stream from any sufficiently
large subset of recovered intermediate symbols. This idea
significantly improves the performance of LT codes, as the
recovery of the last few percentages of the information bits,
which could be very slow, is now done by using the outer
code.
Raptor codes are able to asymptotically achieve the chan-
nel capacity on any binary erasure channel (BEC) with-
out any channel state information at the transmitter or the
receiver. This universal capacity-achieving property enables
optimal performance even in time-varying channels. Ac-
cordingly, these codes are the natural choice for broadcast-
ing/multicasting to a group of receivers with different and
even unknown channel qualities. As a result Raptor codes have
been adopted by the 3rd Generation Group Partnership Project
(3GPP) to be used in multimedia broadcast/multicast services
(MBMS) for forward error correction [3] and digital video
broadcast-handheld (DVB-H) [4]. The desirable properties of
Raptor codes have motivated many researchers to study their
performance and design for other channels [5], [6]. Decoder
design for Raptor codes has also been an active research area
[7]–[9].
In this work, we study the design of Raptor codes for the
BEC when inactivation decoding (ID) [9] is used. An ID
Paper approved by T. M. Duman, the Editor for Coding Theory and
Applications of the IEEE Communications Society. Manuscript received July
5, 2011; revised January 17 and April 18, 2012.
The authors are with the Dept. of Elec. and Comp. Eng., University of
Alberta (e-mail: {kmahdavi, ardakani, chintha}@ece.ualberta.ca).
Digital Object Identifier 10.1109/TCOMM.2012.072612.110143
decoder is essentially a maximum likelihood decoder with
controlled complexity, which can accomplish the decoding
with a smaller number of received symbols than any other
decoder requires. Hence, ID is incorporated in 3GPP as a
practical decoder [3]. Despite the rich literature on code design
for the conventional edge deletion decoding (e.g., [2], [10],
[11]), code design for ID has not yet received much attention.
In the remainder of this article, we first briefly review the
encoding and decoding of Raptor codes, focusing on ID. In
Section III, we introduce our code design, by proposing a new
design criterion, and then we use this criterion for an analytical
design. The numerical comparisons between the code used by
the 3GPP and our proposed code are presented in Section IV.
II. ENCODING AND DECODING OF RAPTOR CODES
Encoding of the Raptor codes is done in two separate steps.
In the first step, k information bits are coded to n = k/R
intermediate bits by using an outer code of rate R. In the
second step, the LT encoder first uses a probability distribution
to choose an integer m ∈{1, ··· ,D}, D ≤ n, and then
uniformly at random chooses m intermediate bits whose XOR
forms an output symbol for transmission. The probability
distribution of m is characterized by a generating polynomial
Ω(x)=
∑
D
i=1
Ω
i
x
i
. Here, m = i occurs with probability Ω
i
.
Decoding is similarly performed in two separate steps. First
the LT code is decoded, and then the outer code is decoded in
the second step. Assuming that the outer code can recover the
whole information block from any subset of n(R + σ),σ> 0
recovered intermediate bits, we focus our discussion on the
LT decoder.
For LT decoding, a decoding graph [2] is formed based on
the set of received symbols. The decoding graph is a bipartite
graph with one vertex set corresponding to the set of all
intermediate bits, and the other set corresponding to the output
bits (output nodes). Initially, each output node is adjacent to
the group of intermediate nodes forming the corresponding
received bits.
Various decoding solutions can be used. Gaussian elimi-
nation, although optimal, is typically too complex. A modi-
fied version of the belief propagation algorithm, called edge
deletion decoding (EDD) [1], is an efficient alternative when
an appropriate design of Ω(x) is performed. EDD requires
a small overhead in the number of received symbols for
successful decoding [12]. This algorithm uses degree-one
output nodes in the decoding graph to deduce the value
of their neighbouring intermediate nodes, and then removes
0090-6778/12$31.00 c 2012 IEEE
"©2012 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or p romotional purposes or for creating new
collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE."