{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T19:36:25Z","timestamp":1774726585826,"version":"3.50.1"},"reference-count":42,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T00:00:00Z","timestamp":1664236800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"The National Natural Science Foundation of China","award":["92067201"],"award-info":[{"award-number":["92067201"]}]},{"name":"The National Natural Science Foundation of China","award":["61871446"],"award-info":[{"award-number":["61871446"]}]},{"name":"The National Natural Science Foundation of China","award":["BE2020084-1"],"award-info":[{"award-number":["BE2020084-1"]}]},{"name":"The National Natural Science Foundation of China","award":["BE2020084-3"],"award-info":[{"award-number":["BE2020084-3"]}]},{"name":"The National Natural Science Foundation of China","award":["NY215031"],"award-info":[{"award-number":["NY215031"]}]},{"name":"The National Natural Science Foundation of China","award":["NY217032"],"award-info":[{"award-number":["NY217032"]}]},{"DOI":"10.13039\/501100013058","name":"The Jiangsu Provincial Key Research and Development Program","doi-asserted-by":"publisher","award":["92067201"],"award-info":[{"award-number":["92067201"]}],"id":[{"id":"10.13039\/501100013058","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013058","name":"The Jiangsu Provincial Key Research and Development Program","doi-asserted-by":"publisher","award":["61871446"],"award-info":[{"award-number":["61871446"]}],"id":[{"id":"10.13039\/501100013058","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013058","name":"The Jiangsu Provincial Key Research and Development Program","doi-asserted-by":"publisher","award":["BE2020084-1"],"award-info":[{"award-number":["BE2020084-1"]}],"id":[{"id":"10.13039\/501100013058","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013058","name":"The Jiangsu Provincial Key Research and Development Program","doi-asserted-by":"publisher","award":["BE2020084-3"],"award-info":[{"award-number":["BE2020084-3"]}],"id":[{"id":"10.13039\/501100013058","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013058","name":"The Jiangsu Provincial Key Research and Development Program","doi-asserted-by":"publisher","award":["NY215031"],"award-info":[{"award-number":["NY215031"]}],"id":[{"id":"10.13039\/501100013058","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013058","name":"The Jiangsu Provincial Key Research and Development Program","doi-asserted-by":"publisher","award":["NY217032"],"award-info":[{"award-number":["NY217032"]}],"id":[{"id":"10.13039\/501100013058","id-type":"DOI","asserted-by":"publisher"}]},{"name":"The NUPTSF","award":["92067201"],"award-info":[{"award-number":["92067201"]}]},{"name":"The NUPTSF","award":["61871446"],"award-info":[{"award-number":["61871446"]}]},{"name":"The NUPTSF","award":["BE2020084-1"],"award-info":[{"award-number":["BE2020084-1"]}]},{"name":"The NUPTSF","award":["BE2020084-3"],"award-info":[{"award-number":["BE2020084-3"]}]},{"name":"The NUPTSF","award":["NY215031"],"award-info":[{"award-number":["NY215031"]}]},{"name":"The NUPTSF","award":["NY217032"],"award-info":[{"award-number":["NY217032"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Distributed fountain coding plays an important role in rateless code research. The reliability and effectiveness of these coding schemes are increasingly challenged with the growing applications. In this paper, a novel multiple-access network with cooperative relay is presented, and a novel enhanced distributed fountain coding scheme for this network is proposed. The overall degree distributions are derived, and the asymptotic decoding performance is analyzed theoretically by employing the And-Or tree method. On this basis, a design method using joint iterative optimization algorithms is proposed to optimize the degree distributions of the sources and relays. Simulation results show that the proposed enhanced distributed fountain codes outperform the existing generalized distributed fountain codes (GDFC) and have a good performance on both lossless and lossy channels. It reveals that the proposed codes can provide unequal error protection (UEP) property for different sources by introducing the extra cooperative relay. The performance improvement is not restricted to the sources connected to the cooperative relay but applies to all sources. With the additional relay, the proposed codes are able to overcome the effects of bad channel conditions caused by terrain, obstacles, and so on, to avoid communication interruptions and improve the reliability of the network.<\/jats:p>","DOI":"10.3390\/sym14102026","type":"journal-article","created":{"date-parts":[[2022,9,29]],"date-time":"2022-09-29T01:23:16Z","timestamp":1664414596000},"page":"2026","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Analysis and Design of Enhanced Distributed Fountain Codes in Multiple Access Networks with Cooperative Relay"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6485-3692","authenticated-orcid":false,"given":"Hanqin","family":"Shao","sequence":"first","affiliation":[{"name":"Jiangsu Key Laboratory of Wireless Communications, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"},{"name":"Engineering Research Center of Health Service System Based on Ubiquitous Wireless Networks, Nanjing University of Posts and Telecommunications, Ministry of Education, Nanjing 210003, China"}]},{"given":"Hongbo","family":"Zhu","sequence":"additional","affiliation":[{"name":"Jiangsu Key Laboratory of Wireless Communications, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"},{"name":"Engineering Research Center of Health Service System Based on Ubiquitous Wireless Networks, Nanjing University of Posts and Telecommunications, Ministry of Education, Nanjing 210003, China"}]},{"given":"Junwei","family":"Bao","sequence":"additional","affiliation":[{"name":"College of Physics, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,9,27]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"3740","DOI":"10.1109\/TIT.2007.904982","article-title":"The design and performance of distributed LT codes","volume":"53","author":"Puducheri","year":"2007","journal-title":"IEEE Trans. Inform. Theory"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1109\/LCOMM.2015.2398412","article-title":"A distributed LT code design for multiple-access relay networks subject to erasures","volume":"19","author":"Yang","year":"2015","journal-title":"IEEE Commun. Lett."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2177","DOI":"10.1007\/s11276-016-1279-y","article-title":"A generalized design of distributed rateless codes with decreasing ripple size for multiple-access relay networks","volume":"23","author":"Liao","year":"2017","journal-title":"Wirel. Netw."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Sejdinovi\u0107, D., Piechocki, R.J., and Doufexi, A. (2009, January 12\u201310). AND-OR tree analysis of distributed LT codes. Proceedings of the 2009 IEEE Information Theory Workshop on Networking and Information Theory, Volos, Greece.","DOI":"10.1109\/ITWNIT.2009.5158583"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"988","DOI":"10.1109\/LCOMM.2013.040913.130187","article-title":"Asymptotic analysis and optimization for generalized distributed fountain codes","volume":"17","author":"Shao","year":"2013","journal-title":"IEEE Commun. Lett."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/LCOMM.2010.01.091541","article-title":"Decentralised distributed fountain coding: Asymptotic analysis and design","volume":"14","author":"Piechocki","year":"2010","journal-title":"IEEE Commun. Lett."},{"key":"ref_7","unstructured":"Shao, H., Zhu, H., and Bao, J. (2020, January 26\u201327). Analysis and Design of Wireless Distributed Fountain Codes with Multiplicative Network Coding. Proceedings of the 5th Machine Learning and Intelligent Communications (MLICOM 2020), Shenzhen, China."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"875","DOI":"10.1109\/TCOMM.2018.2873306","article-title":"Optimal Memory Order of Memory-Based LT Encoders for Finite Block-Length Codes over Binary Erasure Channels","volume":"67","author":"Shang","year":"2019","journal-title":"IEEE Trans. Commun."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1109\/TCOMM.2018.2879088","article-title":"Systematic Fountain Codes for Massive Storage Using the Truncated Poisson Distribution","volume":"67","author":"Okpotse","year":"2019","journal-title":"IEEE T. Commun."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"116552","DOI":"10.1109\/ACCESS.2021.3105002","article-title":"Design and Analysis of LT Codes with a Reverse Coding Framework","volume":"9","author":"Song","year":"2021","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1351","DOI":"10.1049\/iet-com.2017.1063","article-title":"Optimisation design of systematic LT codes over AWGN multiple access channel","volume":"12","author":"Deng","year":"2018","journal-title":"IET Commun."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11432-014-5130-8","article-title":"The design and analysis of unequal error protection fountain coding for multiple source networks over binary erasure channels","volume":"57","author":"Shao","year":"2014","journal-title":"Sci. China Inf. Sci."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"6688","DOI":"10.1109\/TIT.2020.3005155","article-title":"Lossless Source Coding in the Point-to-Point, Multiple Access, and Random Access Scenarios","volume":"66","author":"Chen","year":"2020","journal-title":"IEEE T. Inform. Theory"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1752","DOI":"10.1109\/LWC.2021.3078811","article-title":"Performance Analysis of Fountain Coded Non-Orthogonal Multiple Access with Finite Blocklength","volume":"10","author":"Zheng","year":"2021","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1796","DOI":"10.1109\/LCOMM.2021.3056389","article-title":"A Secrecy Study of UAV Based Networks with Fountain Codes and FD Jamming","volume":"25","author":"Monir","year":"2021","journal-title":"IEEE Commun. Lett."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Talari, A., and Rahnavard, N. (2010, January 13\u201318). Distributed rateless codes with UEP property. Proceedings of the 2010 IEEE International Symposium on Information Theory, Austin, TX, USA.","DOI":"10.1109\/ISIT.2010.5513758"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"8102","DOI":"10.1109\/ACCESS.2018.2890452","article-title":"Distributed LT codes with improved error floor performance","volume":"7","author":"He","year":"2019","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Hayajneh, K.F. (2021). Memory-based lt codes for efficient 5g networks and beyond. Electronics, 10.","DOI":"10.3390\/electronics10243169"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Han, W., Xu, S., Huang, D., and Xu, C. (2020). Analysis and design of rateless two-way relay networks based on a multiply-and-forward scheme. Appl. Sci., 10.","DOI":"10.3390\/app10072389"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"851","DOI":"10.1109\/LWC.2022.3147601","article-title":"Opportunistic Fountain Coding with Coordinative Routing","volume":"11","author":"Peng","year":"2022","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Li, Y., and Du, Q. (2021, January 13\u201316). A Cooperative Multi-RSU Caching Scheme in Vehicular Networks with Fountain Codes. Proceedings of the 2021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Helsinki, Finland.","DOI":"10.1109\/PIMRC50174.2021.9569666"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Wang, F., Jiao, J., Li, L., Zhang, K., Wu, S., and Zhang, Q. (2020). Finite Length Non-Binary Raptor Codes under Ordered Statistics Decoder. Proceedings of the 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), IEEE.","DOI":"10.1109\/VTC2020-Fall49728.2020.9348863"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1391","DOI":"10.1109\/TCOMM.2020.2965118","article-title":"Finite Block-Length Analog Fountain Codes for Ultra-Reliable Low Latency Communications","volume":"68","author":"Zhang","year":"2020","journal-title":"IEEE T Commun."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"4602","DOI":"10.1109\/TII.2019.2892866","article-title":"Maximization of Underwater Sensor Networks Lifetime via Fountain Codes","volume":"15","author":"Yildiz","year":"2019","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1395","DOI":"10.1109\/TCSVT.2014.2302533","article-title":"Layer-Aligned Multipriority Rateless Codes for Layered Video Streaming","volume":"24","author":"Hsiao","year":"2014","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Qin, S., Feng, G., and Zhang, Y. (2010, January 18\u201321). Capacity bounds of cooperative communications with fountain codes. Proceedings of the 2010 IEEE Wireless Communication and Networking Conference, Sydney, NSW, Australia.","DOI":"10.1109\/WCNC.2010.5506579"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1109\/JCN.2012.6253087","article-title":"Multi-hop cooperative transmission using fountain codes over Rayleigh fading channels","volume":"14","author":"Duy","year":"2012","journal-title":"J. Commun. Netw.-S. Kor."},{"key":"ref_28","unstructured":"Di, X., Xiong, K., Fan, P., and Qiu, Z. (2013, January 1\u20133). Cooperative multi-relay transmission for high-speed railway mobile communication system with fountain codes. Proceedings of the 2013 International Workshop on High Mobility Wireless Communications (HMWC), Shanghai, China."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Molisch, A.F., Mehta, N.B., Yedidia, J.S., and Zhang, J. (December, January 27). Cooperative relay networks using fountain codes. Proceedings of the IEEE Globecom 2006, San Francisco, CA, USA.","DOI":"10.1109\/GLOCOM.2006.858"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1109\/LCOMM.2020.2969670","article-title":"Dynamic Coded Cooperation with Incremental Redundancy: Throughput and Diversity-Multiplexing Tradeoff Analysis","volume":"24","author":"Xu","year":"2020","journal-title":"IEEE Commun. Lett."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"6550","DOI":"10.1109\/JIOT.2020.2969955","article-title":"Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT","volume":"7","author":"Jain","year":"2020","journal-title":"IEEE Internet Things. J."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"5280","DOI":"10.1109\/ACCESS.2016.2601031","article-title":"Fountain Coded Cooperative Communications for LTE-A Connected Heterogeneous M2M Network","volume":"4","author":"Nessa","year":"2016","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1109\/JSAC.2012.120220","article-title":"Decomposed LT codes for cooperative relay communications","volume":"30","author":"Cao","year":"2012","journal-title":"IEEE J. Sel. Area. Comm."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"2334","DOI":"10.1109\/COMST.2019.2902862","article-title":"A Tutorial on UAVs for Wireless Networks: Applications, Challenges, and Open Problems","volume":"21","author":"Mozaffari","year":"2019","journal-title":"IEEE Commun. Surv. Tut."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Kumar, P., Singh, P., Darshi, S., and Shailendra, S. (2019, January 12). Drone Assisted Network Coded Co-operation. Proceedings of the TENCON 2019-2019 IEEE Region 10 Conference (TENCON), Kochi, India.","DOI":"10.1109\/TENCON.2019.8929649"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"4983","DOI":"10.1109\/TCOMM.2016.2611512","article-title":"Throughput maximization for UAV-enabled mobile relaying systems","volume":"64","author":"Zeng","year":"2016","journal-title":"IEEE T. Commun."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"5784","DOI":"10.1109\/TAP.2022.3161277","article-title":"Geometry-Based Stochastic Line-of-Sight Probability Model for A2G Channels Under Urban Scenarios","volume":"70","author":"Zhu","year":"2022","journal-title":"IEEE T. Antenn. Propag."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"3865","DOI":"10.1109\/TCOMM.2018.2824817","article-title":"A Novel 3D Non-Stationary Wireless MIMO Channel Simulator and Hardware Emulator","volume":"66","author":"Zhu","year":"2018","journal-title":"IEEE T. Commun."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Du, X., Zhu, Q., Ding, G., Li, J., Wu, Q., Lan, T., Lin, Z., Zhong, W., and Han, L. (2021). UAV-assisted three-dimensional spectrum mapping driven by spectrum data and channel model. Symmetry, 13.","DOI":"10.3390\/sym13122308"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1521","DOI":"10.1109\/TIT.2007.892814","article-title":"Rateless codes with unequal error protection property","volume":"53","author":"Rahnavard","year":"2007","journal-title":"IEEE T. Inform. Theory"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Luby, M. (2002). LT Codes. Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science (FOCS), IEEE.","DOI":"10.1109\/SFCS.2002.1181950"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"2551","DOI":"10.1109\/TIT.2006.874390","article-title":"Raptor Codes","volume":"52","author":"Shokrollahi","year":"2006","journal-title":"IEEE Trans. Inform. Theory"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/10\/2026\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:40:28Z","timestamp":1760143228000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/10\/2026"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,27]]},"references-count":42,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2022,10]]}},"alternative-id":["sym14102026"],"URL":"https:\/\/doi.org\/10.3390\/sym14102026","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,27]]}}}