Coding teaser: source coding

From Microlab Classes
Jump to navigation Jump to search
Make sure to read the Wiki page about the basics of a channel. Several discussions and interpretations are important for this chapter 😊.

Complete Channel Model

Previously, we showed a simple channel model that consists of the source, channel, and receiver. In modern communication systems, we also add an encoder after the source and a decoder before the receiver. Figure 1 shows the complete channel model. The encoder is used to transform the source symbols into a code that suitable for the channel. The receiver decodes the received message coming out of the channel.

Figure 1: Complete channel model with the encoder added after the source and the decoder added before the receiver.

Let's bring back Bob and Alice into the scene again. This time let's use the complete channel model. Since most of our communication systems use binary representations, Bob needs to encode his data into binary digits before he sends it over the channel.

Bob sending an encoded message to Alice.

Let's look at a few examples. Suppose our source alphabet has the symbols of all combinations of flipping three fair coins. Then our symbols would be . Bob needs to map each symbol into a binary representation such that . This is the encoding process. Let's add new definitions:

  • The binary set are the code symbols.
  • The encoded patterns are called the codewords. For example, is the codeword for the symbol . is the codeword for . In practice, we let some random variable whose outcomes are codewords associated with probabilities . For example, is the codeword for . Moreover, from our example, the source symbols are equiprobable and we have a direct mapping from source symbol to codeword (i.e., ) then it follows that the codewords are equiprobable too: . The probability distribution of can change depending on the encoding scheme.
  • We usually tabulate the encoding or mapping. We call this table the codebook. It's a simple look-up-table (LUT). Let's call the table below as codebook-1.
Source Symbol Codeword
TTT 000
TTH 001
THT 010
THH 011
HTT 100
HTH 101
HHT 110
HHH 111

The encoder looks at this table and endcodes message before it gets into the channel. For example, suppose we want to send the message . The encoder uses codebook-1 to translate the source message into an encoded message: . Receivers should also know the same codebook-1 so that they can decode the message. For example, if the encoded message is , then we can decode the message as . Choosing the encoding where the and is simple. This encoding is arbitrary and it seems convenient for our needs. However, nothing stops us from encoding the source symbols with a different representation. For example, we can choose an encoding where and . We can go for more complex ones like codebook-2 as shown below:

Source Symbol Codeword
TTT 01
TTH 001
THT 0001
THH 00001
HTT 000001
HTH 0000001
HHT 00000001
HHH 000000001

Where a source message translates into . Codebook-2 can also decode an encoded message. For example, when we receive we get . The choice of the encoding process is purely arbitrary. However, we are interested if the encoding efficient. One metric is the average code length defined as:

 

 

 

 

(1)

Where is the code length of the codeword . For example, the average code length of codebook-1 is:

The average code length of codebook-2 is:

Clearly, codebook-1 has a shorter codelength than codebook-2. Let's introduce another metric called the coding efficiency. Coding efficiency is defined as:

 

 

 

 

(2)

Where is the source entropy. The coding efficiency has a range of . If you recall our "go-to" interpretation of entropy, given some entropy means we can represent outcomes. Essentially, is the minimum number of bits we can use to represent all outcomes of a source regardless of its distribution. Of course, a smaller coding length is desirable if we want to compress representations. For our simple coin flip example, . The efficiency of codebook-1 is . Codebook-1 is said to be maximally efficient because it matches the minimum number of bits to represent the source symbols. The efficiency of codebook-2 is .

should never be lower than . Otherwise, that doesn't make sense. How can you represent with ? Something's wrong with your codebook if this happens.

Channel Rates and Channel Capacity

Let's bring back Bob and Alice into the scene again. When Bob sends his file to Alice, it takes a while before she gets the entire message because the channel has limited bandwidth. Bandwidth is the data rate that the channel supports. Let's define as the maximum channel capacity in units of bits per second (bits/s). We'll provide a quantitative approach later. Channels have different rates because of their physical limitations and noise. For example, an ethernet bandwidth can achieve a bandwidth of 10 Gbps (gigabits per second), while Wifi can only achieve at a maximum of 6.9 Gbps. It really is slower to communicate wirelessly. It is possible to transmit data to the channel at a much slower rate such that we are not utilizing the full capacity of the channel. We'd like to encode our source symbols into some codewords that utilizes the full capacity of a channel. Shannon's source coding theorem says:


"Let a source have entropy (bits per symbol) and a channel have a capacity (bits per second). Then it is possible to encode the output of the source in such a way as to transmit at the average rate symbols per second over the channel where is arbitrarily small. It is not possible to transmit at an average rate greater than ." [1]


Take note that, in Shannon's statement is not the noise probability that we know. It's just a term that is used to indicate a small margin of error. In a nutshell, Shannon's source coding theorem says that we can calculate a maximum symbol rate (symbols/s) that utilizes the maximum channel rate while knowing the source entropy . This maximum symbol rate is given by:

 

 

 

 

(3)

Let's look at a few examples to appreciate this.

Channel Rate Example 1: Three Coin Flips

Let's re-use the three coin flips example again. Suppose we want to send the three coin flip symbols over some channel that has a channel capacity bits/s. We also know (from the above example) that we need a minimum of bits per symbol to represent each outcome. This translates to:

If we are to utilize the maximum capacity of the channel, we need to encode the source symbols to its binary representation such that each binary digit in each codeword provides 1 bit of information [2]. Luckily, codebook-1 does this because we have a coding efficiency of which means that every binary digit of the codeword provides at least 1-bit of information. We are maximally efficient with this encoding. If you think about it, if we send 1 symbol/s to the channel and our encoding has 1 symbol (e.g., TTT) is 3 bits long then essentially we are able to send 3 bits/s to the channel. Since bits/s, then we utilized the entire maximum channel capacity.

From the above example, can we actually go beyond symbols/s? NO. Shannon explicitly said that "It is not possible to transmit at an average rate greater than ." This is the maximum symbol rate already.

Channel Rate Example 2: A 6-sided Die

This time, suppose we want to send the symbols of a fair 6-sided die on a channel that only has bits/s. Such that has outcomes . Of course, all outcomes are equiprobable with . From here, we can determined bits/symbol. Therefore:

Again, Shannon says that with the given and we can only transmit at a maximum symbol rate of symbols/s. Now, let's think of an encoding scheme that suits our needs. For convenience, to represent 6 unique outcomes, we can use 3 bits to represent each outcome. Let's say we have codebook-3:

Source Symbol Codeword
1 000
2 001
3 010
4 011
5 100
6 101

The coding efficiency for codebook-3 and for the 6-die example is:

This is not that efficient but it will suffice for now. Here, let's introduce the effective symbol rate due to the new encoding:

 

 

 

 

(4)

Our encoding scheme affects how much data we're putting into the channel. If our coding efficiency isn't optimal then we are only utilizing a fraction of the maximum capacity . Hence we needed the effective channel transmission rate incorporated into our effective symbol rate . Calculating for the encoding in codebook-3 would give:

symbols/s.

Observe that . We are not even close to the maximum rate. Can we find a better encoding? How about this, suppose we create a composite symbol that consists of the three 6-sided die symbols. For example, we can let be one symbol, or we can let be another symbol. If we do so, then we have around unique possible outcomes for the new set of symbols. To represent 216 outcomes we need a minimum of 8 bits of codeword length (because ). So we can have codebook-4 as:

Source Symbol Codeword
111 0000_0000
112 0000_0001
113 0000_0010
... ...
665 1101_0110
666 1101_0111

The underscores are just there to separate the 4 bits for clarity. Codebook-4 looks really long but in practice, that's still small. So what changes? Since we have 8 bits per 3 symbols, we effectively have . Take note that all outcomes are equiprobable so dividing the 8 bits by 3 symbols is enough. This results in a coding efficiency of:

Cool! We're much closer to being maximally efficient. Now, let's compute the new for codebook-4:

symbols/s.

Superb! The new is close to the maximum rate of . The key trick was to create a composite symbols that consists of 3 of the original source symbols, then represent them with 8 binary digits of codewords.

In all of the discussions, we've only used different measures of information and channel rates. None of the discussions talked about a methodology of finding the best encoding scheme. This is because information theory does not tell us how to find the best encoder. It's just a measure. Keep that in mind!

Maximum Channel Capacity

Figure 2: of a BSC with varying and parametrizing .

This time, let's look into how we can quantitatively determine the maximum channel capacity. In the last module, we comprehensively investigated the measures of , , and on a BSC. Recall that:



If you think about it, is a measure of channel quality. It tells us how much we can estimate the input from an observed output. is a measure of the received information contained in the source information. Ideally if there is no noise, then resulting in . We want this because this means all the information from the source gets to the receiver! When noise is present , it degrades the quality of our and the information about the receiver contained in the source is now being shared with noise. This only means one thing: we want to be at maximum. From the previous discussion, we presented how varies with while parametrizing the noise probability . Figure 2 shows this plot. We can visualize like a pipe while the noise parameter limits the flow of information. Figure 3 GIF shows the pipe visualization.

Figure 3: Pipe visualization for

In communication theory, is a metric for transmission rate. So the units are in bits/second. Interchanging between bits or bits/second might be confusing but for now, when we talk about channels (and also ), let's use bits/s. We can define the maximum channel capacity as:


 

 

 

 

(5)


We can re-write this as:


 

 

 

 

(5)


Here, is in units of bits/s. It tells us the maximum number of data that we can transmit per unit of time. Both and are affected by noise parameter . In a way, noise limits . For example, a certain can only provide a certain maximum . Looking at figure 2, when (or ) we can get a maximum bits/s provided that the probability distribution of the symbols that get into the channel is . When (or ) we can also get a maximum bits/s when . Let's determine of a BSC given some and . Since we know follows the Bernoulli entropy where . Then we can write:



bits when . Since is fixed depending on a channel, we can manipulate the input probability of the symbols that get into the channel such that we can force and achieve the maximum .



Interestingly, to achieve we simply need to set for any . The exception is when because that results in an absolute and will be undefined (i.e., ). This result shows that for any we can achieve maximum entropy for that given channel as long as we encode our source symbols to have before it gets into the channel! We can continue our derivation by writing as:



Leading to:


 

 

 

 

(6)


In equation 6, we can assume because we know we can achieve maximum entropy when we set . Equation 6 shows how the maximum capacity is limited by the noise . It describes the pipe visualization in figure 3. When , and our BSC has bits/s. When , , the noise entropy is at maximum and our channel has bits/s. Clearly, we can't transmit data this way. Lastly, when , then again and we're back to having bits/s.


The most important concept in determining maximum channel capacity is to use equation 5 for any channel model. Moreover, from our simple BSC derivation, we can see that in order to maximize the effective channel capacity, we need to encode our source symbols into codewords such that before it gets sent over the channel. This is the essence of the concept source coding where we encode the source to achieve maximum entropy. This is related to equation 4 where tells us the effective channel rate assuming we have not encoded our source symbols to achieve . If we have successfully achieved for the encoded codewords, then on average we utilize the maximum capacity (i.e., ).

Don't get mad but despite having rigorous discussions about channels and noise, data compression we assumes a noiseless channel. Phew! So much for going through the hard efforts.

Huffman Coding

The first two examples of encoding looked into source symbols that are equiprobable. First, we've shown that if , we can fully utilize the channel capacity. We've seen this in our three flips of a fair coin example. When , we had to duplicate the source symbols to so that the effective code efficiency and we can get closer to the fully utilizing the channel. We're seeing a pattern that the closer our coding efficiency is to 1, we get closer to maximizing the channel capacity. However, what happens when the source symbols are not equiprobable?

Let's say we want to communicate the sum of two fair 6-sided die rolls. Our source alphabet contains symbols . The source probability distribution is shown in the table below:

Source Symbol Frequency Probability
2 1
3 2
4 3
5 4
6 5
7 6
8 5
9 4
10 3
11 2
12 1

What would be the best encoding for this source? The source entropy bits. Let's say codebook-5 is a simple binary representation. Since there are outcomes, then using 4 bits for each codeword might suffice. Codebook-5 is shown below:


Codebook-5

Source Symbol Codeword
2 0000
3 0001
4 0010
5 0011
6 0100
7 0101
8 0110
9 0111
10 1000
11 1001
12 1010

Codebook-5 has and therefore the coding efficiency . Clearly this won't maximize the channel. Oh no! What should we do then? This is where we introduce one of the well-known compression methods: The Huffman Coding.


The Huffman coding is a lossless compression. The encoding has this interesting property where frequent symbols map to short codewords, while rare symbols map to long codewords. In fact, Huffman codes say:


" Given a discrete variable with entropy , there exists a symbol code in which the expected codeword length of each codeword is greater than or equal to and is less than . Such that: " [3]


So indeed if we can have an average code length of that's within a unit of then that means we'll have .

Huffman Coding Example 1

Let's consider another example before we show you the magic of the Huffman coding on our two-die roll scenario. Suppose we have a source alphabet with outcomes and probability distribution:

Source Symbol Probability
a 0.05
b 0.25
c 0.37
d 0.22
e 0.11

Huffman coding has the following steps:

1. Arrange all symbols in ascending order of their probability (or frequency). Let each symbol be a single leaf node.

2. Consider the bottom two nodes.

  • Combine these two nodes to form a composite node.
  • The probability of the composite node is the sum of its components.
  • Make sure that the lower probability component is on the left of the composite node, while the higher probability component is on the right.
  • If the components have the same probability, you can select either to be on the left or right.

3. Repeat step 1 and 2 with the new composite node as part of the list. Do this until we are left with 1 node.

  • When you reach step 2 and a composite node has the same probability with another node (probably a composite node too), the node with the longer path needs takes the left side.

4. Write the Huffman codes starting from the top of the tree down to the root of the symbol.

  • The top is the MSB (most-significant bit)
  • The root of the tree are the LSB (least-significant bit)

Figure 4 shows a step-by-step process of reconstructing the tree of our example.

Figure 4: Huffman coding step-by-step process for example 1.

Just to explicitly explain the Huffman coding process:

1. We re-arranged elements to in ascending order of probabilities.

2. We combined the lowest two ( and ) to form the composite node whose probability is . We don't need to re-arrange because the elements are still in ascending order even with the composite node .

3. We combined with to get composite node with . We need to re-arrange the nodes in ascending order.

4. We combined and to get composite node with . We need to re-arrange the nodes in ascending order.

5. We reached the last tree so we just combined the composite nodes and . We should get if we did the Huffman code correctly. All left arrows are tagged with 0s while all right arrows are tagged with 1s. We can get the Huffman codes for all symbols from this tree.


The top of the tree will be the MSB (left-most bit) while the bottom of the tree will be the LSB (right-most bit). For example, to get the Huffman code of we have (from the top of the tree) . To get we have . Simple right? We can generate a new codebook for our example.


Codebook for Huffman coding example 1

Source Symbol Codeword
a 000
b 10
c 11
d 01
e 001

The cool part about Huffman coding is that codewords are uniquely decodable. This means that for every codeword, we can immediately tell what symbol it's pertaining to. We'll get back to this in the next module. For example, if the we received an encoded message we can decode it as . We can calculate the average code length for this one. Recall that:



Therefore we have:



If we were to send these encoded symbols across a channel according to the probability distribution of each symbol, we would have . The entropy is:


bits


Therefore the coding efficiency for this example would be which is really close to being maximally efficient. Cool right? If we blindly represented each outcome with 3 binary digits (because there are 5 outcomes so we need ), then and the coding efficiency for a straight-forward binary coding would be . Huffman coding rules!


Huffman Coding Example 2

Just to make sure you have sufficient practice, let's try a different probability distribution for the same symbols:

Source Symbol Probability
a 0.1
b 0.3
c 0.4
d 0.1
e 0.1

Figure 5 shows the Huffman coding process and steps.

Figure 5: Huffman coding for example 2.

1. We still re-arrange the symbols according to probability. In case the probabilities are the same, we can re-arrange them in any other way. However, sometimes it's more convenient to re-arrange them in alphabetical order of the symbol names. Or sometimes the symbol indices. It's entirely up to you.

2. Combine the lowest two: and to get with . Then re-arrange.

3. Combine the lowest two: and to get with . If a composite node has the same probability with other composite or base nodes, make sure the composite node with the highest depth stays on the left.

4. Combine with to get with . Re-arrange for the last node.

5. Last node should add up to 1. From here we tag all left arrows with 0s and all right arrows with 1s. We can construct our new codebook.


Codebook for Huffman coding example 2

Source Symbol Codeword
a 100
b 11
c 0
d 1011
e 1010

The codebook for this example gives us an average codelength of:



While the source entropy would be:



Resulting in a coding efficiency of:



Still a much better coding efficiency that using a direct 3-bit binary representation because .

References

  1. ↑ Shannon, C. E., & Weaver, W. (1949). The mathematical theory of communication. Urbana: University of Illinois Press.
  2. ↑ Stone, J.V. , Information Theory: A Tutorial Introduction, Sebtel Press, 2015.
  3. ↑ MacKay, D. , Information Theory, Inference, and Learning Algorithms, Cambridge University Press, 2003.