On Punctured Reed-Solomon Codes at the Transport Layer of Digital Network
|
|
- Evelyn Page
- 5 years ago
- Views:
Transcription
1 On Punctured Reed-Solomon Codes at the Transport Layer of Digital Network Shen Fei June, 2010
2 Introduction Basic Knowledge Applying Network Coding at Transport Layer Performance of Using PRS Codes
3 Introduction Problem Assume that a message consisting of k packets should be transmitted to a destination using a digital network with unreliable communication links. The goal is to deliver the message with small delay and with high reliability.
4 Network Model TCP/IP model TCP/IP provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination.
5 Network Model TCP/IP model TCP/IP provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. Transport Layer The Transport Layer s responsibilities include end-to-end message transfer capabilities independent of the underlying network, along with error control, segmentation, flow control, congestion control, and application addressing (port numbers).
6 Idea of PRS Coding at the Transport Layer Common methods for communication over the packet switching datagram networks employ a feedback channel from receiver to sender in order to control the retransmission of erased or erroneous packets.
7 Idea of PRS Coding at the Transport Layer Common methods for communication over the packet switching datagram networks employ a feedback channel from receiver to sender in order to control the retransmission of erased or erroneous packets. For example: Automatic Repeat-reQuest (ARQ) protocols
8 Idea of PRS Coding at the Transport Layer Common methods for communication over the packet switching datagram networks employ a feedback channel from receiver to sender in order to control the retransmission of erased or erroneous packets. For example: Automatic Repeat-reQuest (ARQ) protocols Disadvantage: wasteful, large redundency
9 Idea of PRS Coding at the Transport Layer Common methods for communication over the packet switching datagram networks employ a feedback channel from receiver to sender in order to control the retransmission of erased or erroneous packets. For example: Automatic Repeat-reQuest (ARQ) protocols Disadvantage: wasteful, large redundency Therefore, it is necessary to apply error correcting codes that require no feedback or almost no feedback to the transport layer of data network.
10 Introduction Basic Knowledge Applying Network Coding at Transport Layer Performance of Using PRS Codes
11 Reed-Solomon Codes Let n different elements from GF (Q) form an ordered set of locators L = {α 0,..., α n 1}.
12 Reed-Solomon Codes Let n different elements from GF (Q) form an ordered set of locators L = {α 0,..., α n 1}. Definition of RS Codes An RS code RS(Q, L; n, k) of length n = L, dimension k and minimum distance d over GF (Q) with the set of locators L GF (Q) consists of all n-words:
13 Reed-Solomon Codes Let n different elements from GF (Q) form an ordered set of locators L = {α 0,..., α n 1}. Definition of RS Codes An RS code RS(Q, L; n, k) of length n = L, dimension k and minimum distance d over GF (Q) with the set of locators L GF (Q) consists of all n-words: c = (c 0, c 1,..., c n 1) = (f (α 0),..., f (α n 1)), where f (x) = f 0 + f 1x f k 1 x k 1 are polynomials over GF (Q) with degree at most k 1.
14 Interleaved Reed-Solomon Codes Definition of IRS Codes Consider all l n matrices C over the field GF (q), where every row of C belongs to the RS code RS(q, L; n, k), L GF (q) \ 0, n = L. The set of all these matrices is called an Interleaved Reed-Solomon (IRS) code of order l.
15 Interleaved Reed-Solomon Codes Definition of IRS Codes Consider all l n matrices C over the field GF (q), where every row of C belongs to the RS code RS(q, L; n, k), L GF (q) \ 0, n = L. The set of all these matrices is called an Interleaved Reed-Solomon (IRS) code of order l. In other words, the IRS code IRS(q l, L; n, k) is IRS(q l, L; n, k) C = c (1) c (2). c (l) c(i) RS(q, L; n, k), i = 1, 2,..., l,
16 Punctured Reed-Solomon Codes Definition of PRS Codes Let GF (Q) = GF (q l ) and L GF (q) \ 0. Then RS(Q, L; n, k) is called Punctured Reed-Solomon (PRS) code. It is RS code with n = L q 1.
17 Punctured Reed-Solomon Codes Definition of PRS Codes Let GF (Q) = GF (q l ) and L GF (q) \ 0. Then RS(Q, L; n, k) is called Punctured Reed-Solomon (PRS) code. It is RS code with n = L q 1. Vector Representation of IRS Codes Represent every column of a code matrix C GF (q l n ) of an Interleaved Reed-Solomon (IRS) code as an element of GF (Q) = GF (q l ), then C c, c GF (Q n ). We obtain vector representation of the IRS code.
18 Punctured Reed-Solomon Codes Definition of PRS Codes Let GF (Q) = GF (q l ) and L GF (q) \ 0. Then RS(Q, L; n, k) is called Punctured Reed-Solomon (PRS) code. It is RS code with n = L q 1. Vector Representation of IRS Codes Represent every column of a code matrix C GF (q l n ) of an Interleaved Reed-Solomon (IRS) code as an element of GF (Q) = GF (q l ), then C c, c GF (Q n ). We obtain vector representation of the IRS code. Lemma Given a set of locators L GF (q), a PRS code RS(q l, L; n, k) is equivalent to an IRS code IRS(q l, L; n, k) in vector representation.
19 Decoding of IRS Codes An efficient decoding method (SSB-decoder, based on multi-sequence shift-register synthesis), corrects up to ε max errors in presence of η erasures, where ε max = l (n k η). l + 1
20 Decoding of IRS Codes An efficient decoding method (SSB-decoder, based on multi-sequence shift-register synthesis), corrects up to ε max errors in presence of η erasures, where ε max = l (n k η). l + 1 If there were ε ε max errors in the Q-ary symmetric channel, the SSB-decoder may fail with probability P f (ε), P f (ε) γq (l+1)(εmax ε) 1, where, γ 1.
21 Decoding of IRS Codes The probability P e of a decoding error is much smaller than P f.
22 Decoding of IRS Codes The probability P e of a decoding error is much smaller than P f. The SSB-algorithm has a computational complexity of order operations in the field GF (q). ℵ = O(ln 2 )
23 Packet Delay over Packet Switching Network Packet Switching Packet switching is a network communications method that groups all transmitted data, irrespective of content, type, or structure into suitably-sized blocks, called packets.
24 Packet Delay over Packet Switching Network Packet Switching Packet switching is a network communications method that groups all transmitted data, irrespective of content, type, or structure into suitably-sized blocks, called packets. Datagram Routing Datagram routing is packet switching in which each packet finds its own path through network according to the current information available at the nodes visited.
25 Average Packet Delay Distribution of Packet Delays Assume that the packet delays are independent random variables t i having exponential distribution with average t i (ρ) = t(ρ) = a 1 ρ, where ρ is the network load and a is a constant for the given network.
26 Delay of the ith Packet of a Message Denote the packet delays in the message in increasing order t 1:k t 2:k t k:k, where t i:k denotes the delay of the ith arriving packet in the total k packets.
27 Delay of the ith Packet of a Message Denote the packet delays in the message in increasing order t 1:k t 2:k t k:k, where t i:k denotes the delay of the ith arriving packet in the total k packets. k E[t i:k ] = t(ρ) j 1 = t(ρ)(h k H k i ), j=k i+1
28 Delay of the ith Packet of a Message Harmonic Number H k is the harmonic number for any natural number k = 1, 2,... : H n = n j 1, j=1
29 Delay of the ith Packet of a Message Harmonic Number H k is the harmonic number for any natural number k = 1, 2,... : H n = n j 1, j=1 Approximations of Harmonic Numbers H 0 = 0, and H n = ln n + γ + 1 2n 1 12n n 4 O(n 6 ), H n ln n + γ, n H n H n i ln n i, where γ is the Euler-Mascheroni constant.
30 Introduction Basic Knowledge Applying Network Coding at Transport Layer Performance of Using PRS Codes
31 Model of the Network
32 Model of the Network The goal is to deliver the message with small delay and with high reliability.
33 Sending Uncoded Message Error Probability for Uncoded Message Denote by p the probability to receive a wrong packet (undetected error, due to unreliable links). P uncoded err = 1 (1 p) k.
34 Sending Uncoded Message Error Probability for Uncoded Message Denote by p the probability to receive a wrong packet (undetected error, due to unreliable links). P uncoded err = 1 (1 p) k. Average Message Delay for Uncoded Scheme For the uncoded case we send k packets of the message and wait until all k packets are received. T uncoded = T (ρ, k, k) = t(ρ)h k a (ln k + γ), 1 ρ
35 Reed-Solomon Coded Scheme Assume that every packet consists of m bits, then a packet can be considered as an element of the field GF (2 m ). The Reed-Solomon (RS) coded scheme is suggested by Kabatiansky and Krouk. A bounded-minimum-distance (BMD) decoder is used.
36 Reed-Solomon Coded Scheme The analysis in RS coded scheme shows that the average delay can be decreased and the reliability of the delivered message can be increased using the proposed encoding if the parameters n and are selected in a proper way.
37 Punctured Reed-Solomon Coded Scheme Select RS code in a special way and to decode it using the method of SSB-decoder [Schmidt-Sidorenko-Bossert (SSB)].
38 Punctured Reed-Solomon Coded Scheme Select RS code in a special way and to decode it using the method of SSB-decoder [Schmidt-Sidorenko-Bossert (SSB)]. Gain in additional decrease of average message delay
39 Punctured Reed-Solomon Coded Scheme Select RS code in a special way and to decode it using the method of SSB-decoder [Schmidt-Sidorenko-Bossert (SSB)]. Gain in additional decrease of average message delay Increase reliability without additional decoding complexity
40 Sending Coded Message Decoding radius of PRS codes is ε max = l (n k η) = 2l l + 1 l + 1, where, η = n k 2 is the number of erasures that can be corrected by PRS decoding.
41 Sending Coded Message Decoding radius of PRS codes is ε max = l (n k η) = 2l l + 1 l + 1, where, η = n k 2 is the number of erasures that can be corrected by PRS decoding. Probability P coded err of a message decoding failure should satisfy the requirement P coded err P err where P err is the acceptable error probability of the message.
42 Sending Coded Message The SSB-decoder may fail (detected failure) with probability Pf (ε): 0 ε ; Pf (ε) = P f (ε) < ε ε max; 1 ε > ε max.
43 Sending Coded Message The SSB-decoder may fail (detected failure) with probability Pf (ε): 0 ε ; Pf (ε) = P f (ε) < ε ε max; 1 ε > ε max. Optimization of Thus, P coded err = + k+2 ε=ε max +1 ( ) k + 2 P f (ε) p ε (1 p) k+2 ε ε ( ) k + 2 p ε (1 p) k+2 ε Perr. ε ε max ε= +1 Now the task is to select to be the minimum integer, such that the equation above is satisfied.
44 Sending Coded Message Average Message Delay by Sending PRS-Coded Message Assume that all network users use the same coding method.
45 Sending Coded Message Average Message Delay by Sending PRS-Coded Message Assume that all network users use the same coding method. The new payload will be increased by 1/R.
46 Sending Coded Message Average Message Delay by Sending PRS-Coded Message Assume that all network users use the same coding method. The new payload will be increased by 1/R. Average delay for a packet will be t(ρ/r) = ar R ρ.
47 Sending Coded Message Average Message Delay by Sending PRS-Coded Message Assume that all network users use the same coding method. The new payload will be increased by 1/R. Average delay for a packet will be t(ρ/r) = Restriction for the code rate: R > ρ. ar R ρ.
48 Sending Coded Message Average Message Delay by Sending PRS-Coded Message Assume that all network users use the same coding method. The new payload will be increased by 1/R. Average delay for a packet will be t(ρ/r) = Restriction for the code rate: R > ρ. ar R ρ. Denote δ = /k, then from k + 2 n, it follows R 1/(1 + 2δ). Finally, we get ( T coded ρ ) = min T ρ<r 1/(1+2δ) R, n, k + 2 ar = min ρ<r 1/(1+2δ) R ρ (Hn H n (k+2 )), where n = k/r. Choose the code rate R in a proper way in order to minimize the mean message delay T coded.
49 Approximate Analysis Using H n H n j ln 1 1 j/n, This allows us to approximate T coded (Fine approximation) as follows T coded For real 0 x < 1 holds Then, T coded = min ρ<r 1/(1+2δ) ln min ρ<r 1/(1+2δ) ar R ρ ln 1 1 R 2δR. 1 1 x < x 1 x. ar R(1 + 2δ) R ρ 1 R(1 + 2δ).
50 Approximate Analysis Minimum T coded take place for R = 2ρ 1 + ρ(1 + 2δ). and the average message delay (Coarse approximation) for this sub-optimized R is T codded 4aρ(1 + 2δ) = [1 ρ(1 + 2δ)]. 2
51 Introduction Basic Knowledge Applying Network Coding at Transport Layer Performance of Using PRS Codes
52 Example Parameters m = 4000 bits Packet length k = 80 packets per message p = 0.03 probability to receive a wrong packet P err = requred probability of wrongly delived message ρ = 0.2 the network load (before coding)
53 Example Parameters m = 4000 bits Packet length k = 80 packets per message p = 0.03 probability to receive a wrong packet P err = requred probability of wrongly delived message ρ = 0.2 the network load (before coding) Select the symbol length s of the interleaved RS code to be s = 8. Then the order of interleaving is l = m/s = 500.
54 Example Parameters m = 4000 bits Packet length k = 80 packets per message p = 0.03 probability to receive a wrong packet P err = requred probability of wrongly delived message ρ = 0.2 the network load (before coding) Select the symbol length s of the interleaved RS code to be s = 8. Then the order of interleaving is l = m/s = 500. Table of Results Transmission method Delay T P err Code rate R ρ/r Uncoded 6.2a KK 1.99a < New 1.41a <
55 Gain in Delay versus Network Load ρ T uncoded coded /T new coded coded T /Tnew KK T uncoded coded /T KK ρ
56 Gain in Delay versus k T uncoded coded /T new coded coded T /Tnew KK T uncoded coded /T KK 4 Gain in delay k
57 Gain in Delay versus p 7 6 T uncoded coded /T new coded coded T /Tnew KK T uncoded coded /T KK p
58 Comparison between new and KK Denote new as the optimal for the PRS coded scheme, KK as the optimal for the RS coded scheme.
59 Comparison between new and KK Denote new as the optimal for the PRS coded scheme, KK as the optimal for the RS coded scheme Δ New Δ KK k
60 Comparison between new and KK Denote new as the optimal for the PRS coded scheme, KK as the optimal for the RS coded scheme Δ New Δ KK Δ New Δ KK k p
61 Approximate Results Coarse Approximation of Message Delay T codded = 4aρ(1 + 2δ) [1 ρ(1 + 2δ)] 2.
62 Approximate Results Coarse Approximation of Message Delay T codded = 4aρ(1 + 2δ) [1 ρ(1 + 2δ)] 2.
63 Approximate Results Fine Approximation of Message Delay T coded min ρ<r 1/(1+2δ) ar R ρ ln 1 1 R 2δR.
64 Approximate Results Fine Approximation of Message Delay T coded min ρ<r 1/(1+2δ) ar R ρ ln 1 1 R 2δR.
65 Reference V. Sidorenko, F. Shen, E. Krouk, M. Bossert, Punctured Reed-Solomon codes at the transport layer of digital networks, The Workshop Coding theory days in St. Petersburg, St. Petersburg, Russia, 6-10 Oct. 2008, pp
66 Additional Slides
67 Additional Slides Process of Reed-Solomon Coded Scheme Encode the k packets of the message into n packets using a RS (n, k) code over GF (2 m ).
68 Additional Slides Process of Reed-Solomon Coded Scheme Encode the k packets of the message into n packets using a RS (n, k) code over GF (2 m ). The destination node waits until k + 2 packets are received.
69 Additional Slides Process of Reed-Solomon Coded Scheme Encode the k packets of the message into n packets using a RS (n, k) code over GF (2 m ). The destination node waits until k + 2 packets are received. a bounded-minimum-distance (BMD) decoder for the RS code is used to reconstruct the message, correcting up to erroneous packets.
70 Thank you!
ELEC 691X/498X Broadcast Signal Transmission Winter 2018
ELEC 691X/498X Broadcast Signal Transmission Winter 2018 Instructor: DR. Reza Soleymani, Office: EV 5.125, Telephone: 848 2424 ext.: 4103. Office Hours: Wednesday, Thursday, 14:00 15:00 Slide 1 In this
More information4. Error correction and link control. Contents
//2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.
More informationAd hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl
Ad hoc and Sensor Networks Chapter 6: Link layer protocols Holger Karl Goals of this chapter Link layer tasks in general Framing group bit sequence into packets/frames Important: format, size Error control
More informationLinear Block Codes. Allen B. MacKenzie Notes for February 4, 9, & 11, Some Definitions
Linear Block Codes Allen B. MacKenzie Notes for February 4, 9, & 11, 2015 This handout covers our in-class study of Chapter 3 of your textbook. We ll introduce some notation and then discuss the generator
More informationLayered Network Architecture. CSC358 - Introduction to Computer Networks
Layered Network Architecture Layered Network Architecture Question: How can we provide a reliable service on the top of a unreliable service? ARQ: Automatic Repeat Request Can be used in every layer TCP
More informationWireless Sensornetworks Concepts, Protocols and Applications. Chapter 5b. Link Layer Control
Wireless Sensornetworks Concepts, Protocols and Applications 5b Link Layer Control 1 Goals of this cha Understand the issues involved in turning the radio communication between two neighboring nodes into
More informationLecture 7: Sliding Windows. CSE 123: Computer Networks Geoff Voelker (guest lecture)
Lecture 7: Sliding Windows CSE 123: Computer Networks Geoff Voelker (guest lecture) Please turn in HW #1 Thank you From last class: Sequence Numbers Sender Receiver Sender Receiver Timeout Timeout Timeout
More informationLec 19 - Error and Loss Control
ECE 5578 Multimedia Communication Lec 19 - Error and Loss Control Zhu Li Dept of CSEE, UMKC Office: FH560E, Email: lizhu@umkc.edu, Ph: x 2346. http://l.web.umkc.edu/lizhu slides created with WPS Office
More informationChapter 3. The Data Link Layer
Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication
More informationCommunication Systems, 5e Chapter 13: Channel Coding
Communication Systems, 5e Chapter 13: Channel Coding A. Bruce Carlson Paul B. Crilly Pop Quiz 1) The sampling rate for CD audio is. a) 22.0 khz b) 44.1 khz 2) CD audio format does not allow for any form
More informationLecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission
1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission
More informationApplication Layer Hybrid Error Correction in Wireless IP-based DVB-Multicast
Master s Thesis Application Layer Hybrid Error Correction in Wireless IP-based DVB-Multicast Manuel Gorius Supervisor : Prof. Dr.-Ing. Th. Herfet Submitted on : 2007 Saarland University Faculty of Natural
More informationCommunications Software. CSE 123b. CSE 123b. Spring Lecture 3: Reliable Communications. Stefan Savage. Some slides couresty David Wetherall
CSE 123b CSE 123b Communications Software Spring 2002 Lecture 3: Reliable Communications Stefan Savage Some slides couresty David Wetherall Administrativa Home page is up and working http://www-cse.ucsd.edu/classes/sp02/cse123b/
More informationPacket-Level Forward Error Correction in Video Transmission
Packet-Level Forward Error Correction in Video Transmission Matteo Mazzotti, Enrico Paolini, Marco Chiani, Davide Dardari, and Andrea Giorgetti University of Bologna Wireless Communications Laboratory
More informationSummary of Raptor Codes
Summary of Raptor Codes Tracey Ho October 29, 2003 1 Introduction This summary gives an overview of Raptor Codes, the latest class of codes proposed for reliable multicast in the Digital Fountain model.
More informationCSE 123: Computer Networks Alex C. Snoeren. HW 1 due NOW!
CSE 123: Computer Networks Alex C. Snoeren HW 1 due NOW! Automatic Repeat Request (ARQ) Acknowledgements (ACKs) and timeouts Stop-and-Wait Sliding Window Forward Error Correction 2 Link layer is lossy
More informationQuality of Service (QoS) Whitepaper
Quality of Service (QoS) Whitepaper PCS-Series Videoconferencing White Paper www.sonybiz.net/vc Introduction Currently, an estimated 5% of data packets sent over the Internet are lost. In a videoconferencing
More informationJimin Xiao, Tammam Tillo, Senior Member, IEEE, Yao Zhao, Senior Member, IEEE
Real-Time Video Streaming Using Randomized Expanding Reed-Solomon Code Jimin Xiao, Tammam Tillo, Senior Member, IEEE, Yao Zhao, Senior Member, IEEE Abstract Forward error correction (FEC) codes are widely
More informationPurdue University Computer Science. End-to-End Transport of Real-Time Trac. Using. Kihong Park. Purdue University. West Lafayette, IN 47907
End-to-End Transport of Real-Time Trac Using Adaptive Forward Error Correction Kihong Park Department of Computer Sciences Purdue University West Lafayette, IN 4797 park@cs.purdue.edu Overall Goal Facilitate
More informationKevin Buckley
Kevin Buckley - 69 ECE877 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 3 Convolutional Codes x c (a) (b) (,) (,) (,) (,)
More informationChapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control
Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside
More informationOptimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 8, AUGUST 2011 5227 Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi,
More informationCryptanalyzing the Polynomial Reconstruction based Public-Key System under Optimal Parameter Choice
Cryptanalyzing the Polynomial Reconstruction based Public-Key System under Optimal Parameter Choice Aggelos Kiayias - Moti Yung U. of Connecticut - Columbia U. (Public-Key) Cryptography intractability
More informationChapter 3. The Data Link Layer. Wesam A. Hatamleh
Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data
More informationNetworked Systems and Services, Fall 2018 Chapter 2. Jussi Kangasharju Markku Kojo Lea Kutvonen
Networked Systems and Services, Fall 2018 Chapter 2 Jussi Kangasharju Markku Kojo Lea Kutvonen Outline Physical layer reliability Low level reliability Parities and checksums Cyclic Redundancy Check (CRC)
More informationCN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER
CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER Transport Layer The Transport layer ensures the reliable arrival of messages and provides error checking mechanisms and data
More informationCCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer
CCNA R&S: Introduction to Networks Chapter 7: The Transport Layer Frank Schneemann 7.0.1.1 Introduction 7.0.1.2 Class Activity - We Need to Talk Game 7.1.1.1 Role of the Transport Layer The primary responsibilities
More informationChapter 10 Error Detection and Correction 10.1
Chapter 10 Error Detection and Correction 10.1 10-1 INTRODUCTION some issues related, directly or indirectly, to error detection and correction. Topics discussed in this section: Types of Errors Redundancy
More informationEfficient Content Delivery and Low Complexity Codes. Amin Shokrollahi
Efficient Content Delivery and Low Complexity Codes Amin Shokrollahi Content Goals and Problems TCP/IP, Unicast, and Multicast Solutions based on codes Applications Goal Want to transport data from a transmitter
More informationData Link Layer. Srinidhi Varadarajan
Data Link Layer Srinidhi Varadarajan Data Link Layer: Functionality The data link layer must: Detect errors (using redundancy bits) Request retransmission if data is lost (using automatic repeat request
More informationData Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science
Data Link Technology Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Agenda Functions of the data link layer Technologies concept and design error control flow
More informationThe Transmission Control Protocol (TCP)
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, e-mail, WWW) Reliable Stream Transport (TCP) Unreliable Transport Service (UDP) Connectionless Packet Delivery Service (IP) Goals
More informationMulti-path Forward Error Correction Control Scheme with Path Interleaving
Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,
More informationAdvanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science
Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks
More informationFountain Codes Based on Zigzag Decodable Coding
Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes
More informationTCP/IP-2. Transmission control protocol:
TCP/IP-2 Transmission control protocol: TCP and IP are the workhorses in the Internet. In this section we first discuss how TCP provides reliable, connectionoriented stream service over IP. To do so, TCP
More informationThe Data Link Layer Chapter 3
The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 The Data
More informationThe Data Link Layer. CS158a Chris Pollett Feb 26, 2007.
The Data Link Layer CS158a Chris Pollett Feb 26, 2007. Outline Finish up Overview of Data Link Layer Error Detecting and Correcting Codes Finish up Overview of Data Link Layer Last day we were explaining
More informationError Control in Wireless Sensor Networks: A Cross Layer Analysis
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Journal Articles Computer Science and Engineering, Department of 2009 Error Control in Wireless Sensor Networks: A Cross
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationTransport Layer Protocols TCP
Transport Layer Protocols TCP Gail Hopkins Introduction Features of TCP Packet loss and retransmission Adaptive retransmission Flow control Three way handshake Congestion control 1 Common Networking Issues
More informationAnalysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery
Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery Raja Abdelmoumen CRISTAL Laboratory, Tunisia Email: Raja.Abdelmoumen@ensi.rnu.tn Chadi Barakat Projet Planète, INRIA-Sophia
More informationChapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 10 Error Detection and Correction 0. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note The Hamming distance between two words is the number of differences
More informationPolar Codes for Noncoherent MIMO Signalling
ICC Polar Codes for Noncoherent MIMO Signalling Philip R. Balogun, Ian Marsland, Ramy Gohary, and Halim Yanikomeroglu Department of Systems and Computer Engineering, Carleton University, Canada WCS IS6
More informationSMALL DISTANCE CODES FOR HEADER ERROR DETECTION IN ATM NETWORKS
SMALL DISTANCE CODES FOR HEADER ERROR DETECTION IN ATM NETWORKS Tony Antonio Universitas Pancasila, Jakarta Jl. Srengseng Sawah Jagakarsa, Jakarta 12640 tony.antonio@yahoo.com Abstrak On transmission links
More informationLecture 4 September 17
CS 559: Algorithmic Aspects of Computer Networks Fall 2007 Lecture 4 September 17 Lecturer: John Byers BOSTON UNIVERSITY Scribe: Sowmya Manjanatha In today s lecture, we discussed and characterized the
More informationCh. 7 Error Detection and Correction
Ch. 7 Error Detection and Correction Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and corrected. 2 1. Introduction Let us
More informationGuide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16
Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,
More informationPosition of IP and other network-layer protocols in TCP/IP protocol suite
Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,
More informationOSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1
OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role
More informationMULTIPLE LAYERED REED-SOLOMON CODES IN AUDIO DISKS WITH A FEEDBACK SYSTEM SREENIVAS RAO BELAVADI SATISH THESIS
MULTIPLE LAYERED REED-SOLOMON CODES IN AUDIO DISKS WITH A FEEDBACK SYSTEM BY SREENIVAS RAO BELAVADI SATISH THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Science
More informationCS 641 Project Report Error resilient video transmission over wireless networks. December Gang Ding
CS 64 Project Report Error resilient video transmission over wireless networks December 00 Gang Ding Abstract This report proposes a general architecture for error resilient video transmission over mobile
More informationChapter 4: Implicit Error Detection
4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup
More informationMultimedia Data Transmission over Mobile Internet using Packet-Loss Punctured (PaLoP) Codes
Multimedia Data Transmission over Mobile Internet using Packet-Loss Punctured PaLoP Codes Markus Kaindl and Joachim Hagenauer Institute for Communications Engineering Munich University of Technology 9
More informationCSC310 Information Theory. Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes. November 22, 2006 see
CSC310 Information Theory Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes Sam Roweis Recovering From Erasures 2 How can we recover from erasures? For the BEC, we saw that low-density parity
More informationLecture / The Data Link Layer: Framing and Error Detection
Lecture 2 6.263/16.37 The Data Link Layer: Framing and Error Detection MIT, LIDS Slide 1 Data Link Layer (DLC) Responsible for reliable transmission of packets over a link Framing: Determine the start
More informationImplementation and Evaluation of Transport Layer Protocol Executing Error Correction (ECP)
Communications and Network, 2014, 6, 175-185 Published Online August 2014 in SciRes. http://www.scirp.org/journal/cn http://dx.doi.org/10.4236/cn.2014.63019 Implementation and Evaluation of Transport Layer
More informationRevision of Previous Lectures
Lecture 15 Overview Last Lecture Local area networking This Lecture Wide area networking 1 Source: chapters 8.1-8.3, 17.1, 18.1, 18.2 Next Lecture Wide area networking 2 Source: Chapter 20 COSC244 Lecture
More informationNetwork Model: Each layer has a specific function.
OBJECTIVES: To discuss the OSI model and its layer architecture and to show the interface between the layers. To briefly discuss the functions of each layer in the OSI model. To introduce the TCP/IP protocol.
More informationCSE 461 Module 10. Introduction to the Transport Layer
CSE 461 Module 10 Introduction to the Transport Layer Last Time We finished up the Network layer Internetworks (IP) Routing (DV/RIP, LS/OSPF, BGP) It was all about routing: how to provide end-to-end delivery
More informationA Hybrid ARQ Scheme for Resilient Packet Header Compression
A Hybrid ARQ Scheme for Resilient Packet Compression Vijay A Suryavanshi and Aria Nosratinia Multimedia Communications Laboratory, The University of Texas at Dallas Richardson, TX 7083-0688, USA E-mail:
More informationEITF25 Internet- - Techniques and Applica8ons Stefan Höst. L4 Data link (part 1)
EITF25 Internet- - Techniques and Applica8ons Stefan Höst L4 Data link (part 1) Previously on EITF25 (or digital signal) 2 Data Link Layer Medium Access Control Access to network Logical Link Control Node-
More informationCSC310 Information Theory. Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes. November 30, 2005 see
CSC310 Information Theory Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes Sam Roweis Recovering From Erasures 2 How can we recover from erasures? For the BEC, we saw that low-density parity
More informationThe Data Link Layer Chapter 3
The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 & February
More informationCaterpillar RLNC (CRLNC): A Practical Finite Sliding Window RLNC Approach
Received August 14, 2017, accepted September 18, 2017, date of publication September 27, 2017, date of current version October 25, 2017. Digital Object Identifier 10.1109/ACCESS.2017.2757241 Caterpillar
More informationMinimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions
Minimum Delay acket-sizing for inear Multi-hop Networks with Cooperative Transmissions Ning Wen and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern University, Evanston,
More informationThe Capacity of Private Information Retrieval from Byzantine and Colluding Databases
he Capacity of Private Information Retrieval from Byzantine and Colluding Databases Karim Banawan Sennur Ulukus arxiv:1706.01442v1 [cs.i] 5 Jun 2017 Department of Electrical and Computer Engineering University
More informationEnabling Node Repair in Any Erasure Code for Distributed Storage
Enabling Node Repair in Any Erasure Code for Distributed Storage K. V. Rashmi, Nihar B. Shah, and P. Vijay Kumar, Fellow, IEEE Abstract Erasure codes are an efficient means of storing data across a network
More informationCS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP
CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering
More informationReliable Multipath Routing with Fixed Delays in MANET Using Regenerating Nodes
Reliable Multipath Routing with Fixed Delays in MANET Using Regenerating Nodes Rui Ma and Jacek Ilow Dalhousie University Dept. of Electrical and Computer Eng. Halifax, NS, Canada B3J 2X4 rma2@dal.ca and
More informationEnergy Efficiency Maximization for Wireless Sensor Networks
Energy Efficiency Maximization for Wireless Sensor Networks Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. Because of the remote nature
More informationData and Computer Communications. Protocols and Architecture
Data and Computer Communications Protocols and Architecture Characteristics Direct or indirect Monolithic or structured Symmetric or asymmetric Standard or nonstandard Means of Communication Direct or
More informationBATS: Achieving the Capacity of Networks with Packet Loss
BATS: Achieving the Capacity of Networks with Packet Loss Raymond W. Yeung Institute of Network Coding The Chinese University of Hong Kong Joint work with Shenghao Yang (IIIS, Tsinghua U) R.W. Yeung (INC@CUHK)
More informationOutline. Basic ARQ schemes. S Capacity enhancement methods for radio interface ARQ Schemes. Classification of error control strategies
ARQ Schemes, March 26 24 ARQ Schemes, March 26 24 2 Outline Classification of error control strategies S-7263 Capacity enhancement methods for radio interface ARQ Schemes Markku Liinaharja March 25, 24
More informationBalancing forward and feedback error correction
Balancing forward and feedback error correction Anant Sahai based in part on joint work with: Stark Draper, Tunc Simsek, and Paul Liu sahai@eecs.berkeley.edu Wireless Foundations Department of Electrical
More informationCSCI-131 Networking: the End-to-End Layer. Rodrigo Fonseca March 12 th, 2013
CSCI-131 Networking: the End-to-End Layer Rodrigo Fonseca March 12 th, 2013 Today Transport layer Provides useful abstractions for applications Uses (the fairly minimal) services provided by the network
More informationLecture 7: Flow & Media Access Control"
Lecture 7: Flow & Media Access Control" CSE 123: Computer Networks Alex C. Snoeren HW 2 due next Wednesday! Lecture 7 Overview" Flow control Go-back-N Sliding window Methods to share physical media: multiple
More informationIEEE Broadband Wireless Access Working Group <http://ieee802.org/16>
Project Title Date Submitted IEEE 802.6 Broadband Wireless Access Working Group FEC Performance of Concatenated Reed-Solomon and Convolutional Coding with Interleaving 2000-06-08
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2009 Ashok Agrawala Set 4 1 The Data Link Layer 2 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1,
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala 1 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet
More informationS Capacity enhancement methods for radio interface ARQ Schemes
ARQ Schemes, March 26 2004 1 S-72.630 Capacity enhancement methods for radio interface ARQ Schemes Markku Liinaharja March 25, 2004 ARQ Schemes, March 26 2004 2 Outline Classification of error control
More informationEfficient Synchronization of Multiple Databases over Broadcast Networks
Efficient Synchronization of Multiple Databases over Broadcast Networks Muhammad Muhammad, Stefan Erl, and Matteo Berioli German Aerospace Center (DLR) Institute of Communications and Navigation 82234,
More informationA New Approach of Forward Error Correction For Packet Loss Recovery
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationFECFRAME extension Adding convolutional FEC codes support to the FEC Framework
FECFRAME extension Adding convolutional FEC codes support to the FEC Framework Vincent Roca, Inria, France Ali Begen, Networked Media, Turkey https://datatracker.ietf.org/doc/draft-roca-tsvwg-fecframev2/
More informationDesign Single and Multiple Errors Correction Block Codes
Design Single and Multiple Errors Correction Block Codes Zahraa Raad Mayoof Hajiyat Faculty of Engineering Technology & Built Environment, Department of Electrical and Electronic Engineering, B.Eng (Hons)
More informationData Link Control Protocols
Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,
More informationChapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1
Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY 23.2 The transport
More informationImproved Soft-Decision Decoding of RSCC Codes
2013 IEEE Wireless Communications and Networking Conference (WCNC): PHY Improved Soft-Decision Decoding of RSCC Codes Li Chen School of Information Science and Technology, Sun Yat-sen University Guangzhou,
More informationError Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check.
Error Detection Two types Error Detection Codes (e.g. CRC, Parity, Checksums) Error Correction Codes (e.g. Hamming, Reed Solomon) Basic Idea Add redundant information to determine if errors have been introduced
More informationMultiple unconnected networks
TCP/IP Life in the Early 1970s Multiple unconnected networks ARPAnet Data-over-cable Packet satellite (Aloha) Packet radio ARPAnet satellite net Differences Across Packet-Switched Networks Addressing Maximum
More informationCHANNEL CODING 1. Introduction
CHANNEL CODING 1. Introduction The fundamental resources at the disposal of a communications engineer are signal power, time and bandwidth. For a given communications environment, these three resources
More informationOptimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions
Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions 2007 IEEE Communication Theory Workshop Christian R. Berger 1, Shengli Zhou 1, Yonggang Wen 2, Peter Willett 1 and
More informationEE 6900: FAULT-TOLERANT COMPUTING SYSTEMS
EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS LECTURE 6: CODING THEORY - 2 Fall 2014 Avinash Kodi kodi@ohio.edu Acknowledgement: Daniel Sorin, Behrooz Parhami, Srinivasan Ramasubramanian Agenda Hamming Codes
More informationTransport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections
Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address
More informationA Model for Streaming 3D Meshes and Its Applications
A Model for Streaming D Meshes and Its Applications ABSTRACT Ong Yuh Shin and Ooi Wei Tsang Department of Computer Science, School of Computing, National University of Singapore In this paper, we present
More informationCOMPUTER NETWORKS UNIT-3
COMPUTER NETWORKS UNIT-3 Syllabus: The Data Link Layer - Data Link Layer Design Issues, Services Provided to the Network Layer Framing Error Control Flow Control, Error Detection and Correction Error-Correcting
More informationExact Optimized-cost Repair in Multi-hop Distributed Storage Networks
Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Majid Gerami, Ming Xiao Communication Theory Lab, Royal Institute of Technology, KTH, Sweden, E-mail: {gerami, mingx@kthse arxiv:14012774v1
More informationInternet Protocols (chapter 18)
Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol
More informationIntroduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video
Preface p. xi Acknowledgments p. xvii Introduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video Experiments p. 4 Audio
More informationA New Non-Iterative Decoding Algorithm for the Erasure Channel : Comparisons with Enhanced Iterative Methods
SUBMITTED TO ISIT 2005 ON 31 JANUARY 2005 1 arxiv:cs/0503006v1 [cs.it] 2 Mar 2005 A New Non-Iterative Decoding Algorithm for the Erasure Channel : Comparisons with Enhanced Iterative Methods J. Cai, C.
More information