On Punctured Reed-Solomon Codes at the Transport Layer of Digital Network

Size: px
Start display at page:

Download "On Punctured Reed-Solomon Codes at the Transport Layer of Digital Network"

Transcription

1 On Punctured Reed-Solomon Codes at the Transport Layer of Digital Network Shen Fei June, 2010

2 Introduction Basic Knowledge Applying Network Coding at Transport Layer Performance of Using PRS Codes

3 Introduction Problem Assume that a message consisting of k packets should be transmitted to a destination using a digital network with unreliable communication links. The goal is to deliver the message with small delay and with high reliability.

4 Network Model TCP/IP model TCP/IP provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination.

5 Network Model TCP/IP model TCP/IP provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. Transport Layer The Transport Layer s responsibilities include end-to-end message transfer capabilities independent of the underlying network, along with error control, segmentation, flow control, congestion control, and application addressing (port numbers).

6 Idea of PRS Coding at the Transport Layer Common methods for communication over the packet switching datagram networks employ a feedback channel from receiver to sender in order to control the retransmission of erased or erroneous packets.

7 Idea of PRS Coding at the Transport Layer Common methods for communication over the packet switching datagram networks employ a feedback channel from receiver to sender in order to control the retransmission of erased or erroneous packets. For example: Automatic Repeat-reQuest (ARQ) protocols

8 Idea of PRS Coding at the Transport Layer Common methods for communication over the packet switching datagram networks employ a feedback channel from receiver to sender in order to control the retransmission of erased or erroneous packets. For example: Automatic Repeat-reQuest (ARQ) protocols Disadvantage: wasteful, large redundency

9 Idea of PRS Coding at the Transport Layer Common methods for communication over the packet switching datagram networks employ a feedback channel from receiver to sender in order to control the retransmission of erased or erroneous packets. For example: Automatic Repeat-reQuest (ARQ) protocols Disadvantage: wasteful, large redundency Therefore, it is necessary to apply error correcting codes that require no feedback or almost no feedback to the transport layer of data network.

10 Introduction Basic Knowledge Applying Network Coding at Transport Layer Performance of Using PRS Codes

11 Reed-Solomon Codes Let n different elements from GF (Q) form an ordered set of locators L = {α 0,..., α n 1}.

12 Reed-Solomon Codes Let n different elements from GF (Q) form an ordered set of locators L = {α 0,..., α n 1}. Definition of RS Codes An RS code RS(Q, L; n, k) of length n = L, dimension k and minimum distance d over GF (Q) with the set of locators L GF (Q) consists of all n-words:

13 Reed-Solomon Codes Let n different elements from GF (Q) form an ordered set of locators L = {α 0,..., α n 1}. Definition of RS Codes An RS code RS(Q, L; n, k) of length n = L, dimension k and minimum distance d over GF (Q) with the set of locators L GF (Q) consists of all n-words: c = (c 0, c 1,..., c n 1) = (f (α 0),..., f (α n 1)), where f (x) = f 0 + f 1x f k 1 x k 1 are polynomials over GF (Q) with degree at most k 1.

14 Interleaved Reed-Solomon Codes Definition of IRS Codes Consider all l n matrices C over the field GF (q), where every row of C belongs to the RS code RS(q, L; n, k), L GF (q) \ 0, n = L. The set of all these matrices is called an Interleaved Reed-Solomon (IRS) code of order l.

15 Interleaved Reed-Solomon Codes Definition of IRS Codes Consider all l n matrices C over the field GF (q), where every row of C belongs to the RS code RS(q, L; n, k), L GF (q) \ 0, n = L. The set of all these matrices is called an Interleaved Reed-Solomon (IRS) code of order l. In other words, the IRS code IRS(q l, L; n, k) is IRS(q l, L; n, k) C = c (1) c (2). c (l) c(i) RS(q, L; n, k), i = 1, 2,..., l,

16 Punctured Reed-Solomon Codes Definition of PRS Codes Let GF (Q) = GF (q l ) and L GF (q) \ 0. Then RS(Q, L; n, k) is called Punctured Reed-Solomon (PRS) code. It is RS code with n = L q 1.

17 Punctured Reed-Solomon Codes Definition of PRS Codes Let GF (Q) = GF (q l ) and L GF (q) \ 0. Then RS(Q, L; n, k) is called Punctured Reed-Solomon (PRS) code. It is RS code with n = L q 1. Vector Representation of IRS Codes Represent every column of a code matrix C GF (q l n ) of an Interleaved Reed-Solomon (IRS) code as an element of GF (Q) = GF (q l ), then C c, c GF (Q n ). We obtain vector representation of the IRS code.

18 Punctured Reed-Solomon Codes Definition of PRS Codes Let GF (Q) = GF (q l ) and L GF (q) \ 0. Then RS(Q, L; n, k) is called Punctured Reed-Solomon (PRS) code. It is RS code with n = L q 1. Vector Representation of IRS Codes Represent every column of a code matrix C GF (q l n ) of an Interleaved Reed-Solomon (IRS) code as an element of GF (Q) = GF (q l ), then C c, c GF (Q n ). We obtain vector representation of the IRS code. Lemma Given a set of locators L GF (q), a PRS code RS(q l, L; n, k) is equivalent to an IRS code IRS(q l, L; n, k) in vector representation.

19 Decoding of IRS Codes An efficient decoding method (SSB-decoder, based on multi-sequence shift-register synthesis), corrects up to ε max errors in presence of η erasures, where ε max = l (n k η). l + 1

20 Decoding of IRS Codes An efficient decoding method (SSB-decoder, based on multi-sequence shift-register synthesis), corrects up to ε max errors in presence of η erasures, where ε max = l (n k η). l + 1 If there were ε ε max errors in the Q-ary symmetric channel, the SSB-decoder may fail with probability P f (ε), P f (ε) γq (l+1)(εmax ε) 1, where, γ 1.

21 Decoding of IRS Codes The probability P e of a decoding error is much smaller than P f.

22 Decoding of IRS Codes The probability P e of a decoding error is much smaller than P f. The SSB-algorithm has a computational complexity of order operations in the field GF (q). ℵ = O(ln 2 )

23 Packet Delay over Packet Switching Network Packet Switching Packet switching is a network communications method that groups all transmitted data, irrespective of content, type, or structure into suitably-sized blocks, called packets.

24 Packet Delay over Packet Switching Network Packet Switching Packet switching is a network communications method that groups all transmitted data, irrespective of content, type, or structure into suitably-sized blocks, called packets. Datagram Routing Datagram routing is packet switching in which each packet finds its own path through network according to the current information available at the nodes visited.

25 Average Packet Delay Distribution of Packet Delays Assume that the packet delays are independent random variables t i having exponential distribution with average t i (ρ) = t(ρ) = a 1 ρ, where ρ is the network load and a is a constant for the given network.

26 Delay of the ith Packet of a Message Denote the packet delays in the message in increasing order t 1:k t 2:k t k:k, where t i:k denotes the delay of the ith arriving packet in the total k packets.

27 Delay of the ith Packet of a Message Denote the packet delays in the message in increasing order t 1:k t 2:k t k:k, where t i:k denotes the delay of the ith arriving packet in the total k packets. k E[t i:k ] = t(ρ) j 1 = t(ρ)(h k H k i ), j=k i+1

28 Delay of the ith Packet of a Message Harmonic Number H k is the harmonic number for any natural number k = 1, 2,... : H n = n j 1, j=1

29 Delay of the ith Packet of a Message Harmonic Number H k is the harmonic number for any natural number k = 1, 2,... : H n = n j 1, j=1 Approximations of Harmonic Numbers H 0 = 0, and H n = ln n + γ + 1 2n 1 12n n 4 O(n 6 ), H n ln n + γ, n H n H n i ln n i, where γ is the Euler-Mascheroni constant.

30 Introduction Basic Knowledge Applying Network Coding at Transport Layer Performance of Using PRS Codes

31 Model of the Network

32 Model of the Network The goal is to deliver the message with small delay and with high reliability.

33 Sending Uncoded Message Error Probability for Uncoded Message Denote by p the probability to receive a wrong packet (undetected error, due to unreliable links). P uncoded err = 1 (1 p) k.

34 Sending Uncoded Message Error Probability for Uncoded Message Denote by p the probability to receive a wrong packet (undetected error, due to unreliable links). P uncoded err = 1 (1 p) k. Average Message Delay for Uncoded Scheme For the uncoded case we send k packets of the message and wait until all k packets are received. T uncoded = T (ρ, k, k) = t(ρ)h k a (ln k + γ), 1 ρ

35 Reed-Solomon Coded Scheme Assume that every packet consists of m bits, then a packet can be considered as an element of the field GF (2 m ). The Reed-Solomon (RS) coded scheme is suggested by Kabatiansky and Krouk. A bounded-minimum-distance (BMD) decoder is used.

36 Reed-Solomon Coded Scheme The analysis in RS coded scheme shows that the average delay can be decreased and the reliability of the delivered message can be increased using the proposed encoding if the parameters n and are selected in a proper way.

37 Punctured Reed-Solomon Coded Scheme Select RS code in a special way and to decode it using the method of SSB-decoder [Schmidt-Sidorenko-Bossert (SSB)].

38 Punctured Reed-Solomon Coded Scheme Select RS code in a special way and to decode it using the method of SSB-decoder [Schmidt-Sidorenko-Bossert (SSB)]. Gain in additional decrease of average message delay

39 Punctured Reed-Solomon Coded Scheme Select RS code in a special way and to decode it using the method of SSB-decoder [Schmidt-Sidorenko-Bossert (SSB)]. Gain in additional decrease of average message delay Increase reliability without additional decoding complexity

40 Sending Coded Message Decoding radius of PRS codes is ε max = l (n k η) = 2l l + 1 l + 1, where, η = n k 2 is the number of erasures that can be corrected by PRS decoding.

41 Sending Coded Message Decoding radius of PRS codes is ε max = l (n k η) = 2l l + 1 l + 1, where, η = n k 2 is the number of erasures that can be corrected by PRS decoding. Probability P coded err of a message decoding failure should satisfy the requirement P coded err P err where P err is the acceptable error probability of the message.

42 Sending Coded Message The SSB-decoder may fail (detected failure) with probability Pf (ε): 0 ε ; Pf (ε) = P f (ε) < ε ε max; 1 ε > ε max.

43 Sending Coded Message The SSB-decoder may fail (detected failure) with probability Pf (ε): 0 ε ; Pf (ε) = P f (ε) < ε ε max; 1 ε > ε max. Optimization of Thus, P coded err = + k+2 ε=ε max +1 ( ) k + 2 P f (ε) p ε (1 p) k+2 ε ε ( ) k + 2 p ε (1 p) k+2 ε Perr. ε ε max ε= +1 Now the task is to select to be the minimum integer, such that the equation above is satisfied.

44 Sending Coded Message Average Message Delay by Sending PRS-Coded Message Assume that all network users use the same coding method.

45 Sending Coded Message Average Message Delay by Sending PRS-Coded Message Assume that all network users use the same coding method. The new payload will be increased by 1/R.

46 Sending Coded Message Average Message Delay by Sending PRS-Coded Message Assume that all network users use the same coding method. The new payload will be increased by 1/R. Average delay for a packet will be t(ρ/r) = ar R ρ.

47 Sending Coded Message Average Message Delay by Sending PRS-Coded Message Assume that all network users use the same coding method. The new payload will be increased by 1/R. Average delay for a packet will be t(ρ/r) = Restriction for the code rate: R > ρ. ar R ρ.

48 Sending Coded Message Average Message Delay by Sending PRS-Coded Message Assume that all network users use the same coding method. The new payload will be increased by 1/R. Average delay for a packet will be t(ρ/r) = Restriction for the code rate: R > ρ. ar R ρ. Denote δ = /k, then from k + 2 n, it follows R 1/(1 + 2δ). Finally, we get ( T coded ρ ) = min T ρ<r 1/(1+2δ) R, n, k + 2 ar = min ρ<r 1/(1+2δ) R ρ (Hn H n (k+2 )), where n = k/r. Choose the code rate R in a proper way in order to minimize the mean message delay T coded.

49 Approximate Analysis Using H n H n j ln 1 1 j/n, This allows us to approximate T coded (Fine approximation) as follows T coded For real 0 x < 1 holds Then, T coded = min ρ<r 1/(1+2δ) ln min ρ<r 1/(1+2δ) ar R ρ ln 1 1 R 2δR. 1 1 x < x 1 x. ar R(1 + 2δ) R ρ 1 R(1 + 2δ).

50 Approximate Analysis Minimum T coded take place for R = 2ρ 1 + ρ(1 + 2δ). and the average message delay (Coarse approximation) for this sub-optimized R is T codded 4aρ(1 + 2δ) = [1 ρ(1 + 2δ)]. 2

51 Introduction Basic Knowledge Applying Network Coding at Transport Layer Performance of Using PRS Codes

52 Example Parameters m = 4000 bits Packet length k = 80 packets per message p = 0.03 probability to receive a wrong packet P err = requred probability of wrongly delived message ρ = 0.2 the network load (before coding)

53 Example Parameters m = 4000 bits Packet length k = 80 packets per message p = 0.03 probability to receive a wrong packet P err = requred probability of wrongly delived message ρ = 0.2 the network load (before coding) Select the symbol length s of the interleaved RS code to be s = 8. Then the order of interleaving is l = m/s = 500.

54 Example Parameters m = 4000 bits Packet length k = 80 packets per message p = 0.03 probability to receive a wrong packet P err = requred probability of wrongly delived message ρ = 0.2 the network load (before coding) Select the symbol length s of the interleaved RS code to be s = 8. Then the order of interleaving is l = m/s = 500. Table of Results Transmission method Delay T P err Code rate R ρ/r Uncoded 6.2a KK 1.99a < New 1.41a <

55 Gain in Delay versus Network Load ρ T uncoded coded /T new coded coded T /Tnew KK T uncoded coded /T KK ρ

56 Gain in Delay versus k T uncoded coded /T new coded coded T /Tnew KK T uncoded coded /T KK 4 Gain in delay k

57 Gain in Delay versus p 7 6 T uncoded coded /T new coded coded T /Tnew KK T uncoded coded /T KK p

58 Comparison between new and KK Denote new as the optimal for the PRS coded scheme, KK as the optimal for the RS coded scheme.

59 Comparison between new and KK Denote new as the optimal for the PRS coded scheme, KK as the optimal for the RS coded scheme Δ New Δ KK k

60 Comparison between new and KK Denote new as the optimal for the PRS coded scheme, KK as the optimal for the RS coded scheme Δ New Δ KK Δ New Δ KK k p

61 Approximate Results Coarse Approximation of Message Delay T codded = 4aρ(1 + 2δ) [1 ρ(1 + 2δ)] 2.

62 Approximate Results Coarse Approximation of Message Delay T codded = 4aρ(1 + 2δ) [1 ρ(1 + 2δ)] 2.

63 Approximate Results Fine Approximation of Message Delay T coded min ρ<r 1/(1+2δ) ar R ρ ln 1 1 R 2δR.

64 Approximate Results Fine Approximation of Message Delay T coded min ρ<r 1/(1+2δ) ar R ρ ln 1 1 R 2δR.

65 Reference V. Sidorenko, F. Shen, E. Krouk, M. Bossert, Punctured Reed-Solomon codes at the transport layer of digital networks, The Workshop Coding theory days in St. Petersburg, St. Petersburg, Russia, 6-10 Oct. 2008, pp

66 Additional Slides

67 Additional Slides Process of Reed-Solomon Coded Scheme Encode the k packets of the message into n packets using a RS (n, k) code over GF (2 m ).

68 Additional Slides Process of Reed-Solomon Coded Scheme Encode the k packets of the message into n packets using a RS (n, k) code over GF (2 m ). The destination node waits until k + 2 packets are received.

69 Additional Slides Process of Reed-Solomon Coded Scheme Encode the k packets of the message into n packets using a RS (n, k) code over GF (2 m ). The destination node waits until k + 2 packets are received. a bounded-minimum-distance (BMD) decoder for the RS code is used to reconstruct the message, correcting up to erroneous packets.

70 Thank you!

ELEC 691X/498X Broadcast Signal Transmission Winter 2018

ELEC 691X/498X Broadcast Signal Transmission Winter 2018 ELEC 691X/498X Broadcast Signal Transmission Winter 2018 Instructor: DR. Reza Soleymani, Office: EV 5.125, Telephone: 848 2424 ext.: 4103. Office Hours: Wednesday, Thursday, 14:00 15:00 Slide 1 In this

More information

4. Error correction and link control. Contents

4. Error correction and link control. Contents //2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.

More information

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl Ad hoc and Sensor Networks Chapter 6: Link layer protocols Holger Karl Goals of this chapter Link layer tasks in general Framing group bit sequence into packets/frames Important: format, size Error control

More information

Linear Block Codes. Allen B. MacKenzie Notes for February 4, 9, & 11, Some Definitions

Linear Block Codes. Allen B. MacKenzie Notes for February 4, 9, & 11, Some Definitions Linear Block Codes Allen B. MacKenzie Notes for February 4, 9, & 11, 2015 This handout covers our in-class study of Chapter 3 of your textbook. We ll introduce some notation and then discuss the generator

More information

Layered Network Architecture. CSC358 - Introduction to Computer Networks

Layered Network Architecture. CSC358 - Introduction to Computer Networks Layered Network Architecture Layered Network Architecture Question: How can we provide a reliable service on the top of a unreliable service? ARQ: Automatic Repeat Request Can be used in every layer TCP

More information

Wireless Sensornetworks Concepts, Protocols and Applications. Chapter 5b. Link Layer Control

Wireless Sensornetworks Concepts, Protocols and Applications. Chapter 5b. Link Layer Control Wireless Sensornetworks Concepts, Protocols and Applications 5b Link Layer Control 1 Goals of this cha Understand the issues involved in turning the radio communication between two neighboring nodes into

More information

Lecture 7: Sliding Windows. CSE 123: Computer Networks Geoff Voelker (guest lecture)

Lecture 7: Sliding Windows. CSE 123: Computer Networks Geoff Voelker (guest lecture) Lecture 7: Sliding Windows CSE 123: Computer Networks Geoff Voelker (guest lecture) Please turn in HW #1 Thank you From last class: Sequence Numbers Sender Receiver Sender Receiver Timeout Timeout Timeout

More information

Lec 19 - Error and Loss Control

Lec 19 - Error and Loss Control ECE 5578 Multimedia Communication Lec 19 - Error and Loss Control Zhu Li Dept of CSEE, UMKC Office: FH560E, Email: lizhu@umkc.edu, Ph: x 2346. http://l.web.umkc.edu/lizhu slides created with WPS Office

More information

Chapter 3. The Data Link Layer

Chapter 3. The Data Link Layer Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication

More information

Communication Systems, 5e Chapter 13: Channel Coding

Communication Systems, 5e Chapter 13: Channel Coding Communication Systems, 5e Chapter 13: Channel Coding A. Bruce Carlson Paul B. Crilly Pop Quiz 1) The sampling rate for CD audio is. a) 22.0 khz b) 44.1 khz 2) CD audio format does not allow for any form

More information

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission 1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission

More information

Application Layer Hybrid Error Correction in Wireless IP-based DVB-Multicast

Application Layer Hybrid Error Correction in Wireless IP-based DVB-Multicast Master s Thesis Application Layer Hybrid Error Correction in Wireless IP-based DVB-Multicast Manuel Gorius Supervisor : Prof. Dr.-Ing. Th. Herfet Submitted on : 2007 Saarland University Faculty of Natural

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 3: Reliable Communications. Stefan Savage. Some slides couresty David Wetherall

Communications Software. CSE 123b. CSE 123b. Spring Lecture 3: Reliable Communications. Stefan Savage. Some slides couresty David Wetherall CSE 123b CSE 123b Communications Software Spring 2002 Lecture 3: Reliable Communications Stefan Savage Some slides couresty David Wetherall Administrativa Home page is up and working http://www-cse.ucsd.edu/classes/sp02/cse123b/

More information

Packet-Level Forward Error Correction in Video Transmission

Packet-Level Forward Error Correction in Video Transmission Packet-Level Forward Error Correction in Video Transmission Matteo Mazzotti, Enrico Paolini, Marco Chiani, Davide Dardari, and Andrea Giorgetti University of Bologna Wireless Communications Laboratory

More information

Summary of Raptor Codes

Summary of Raptor Codes Summary of Raptor Codes Tracey Ho October 29, 2003 1 Introduction This summary gives an overview of Raptor Codes, the latest class of codes proposed for reliable multicast in the Digital Fountain model.

More information

CSE 123: Computer Networks Alex C. Snoeren. HW 1 due NOW!

CSE 123: Computer Networks Alex C. Snoeren. HW 1 due NOW! CSE 123: Computer Networks Alex C. Snoeren HW 1 due NOW! Automatic Repeat Request (ARQ) Acknowledgements (ACKs) and timeouts Stop-and-Wait Sliding Window Forward Error Correction 2 Link layer is lossy

More information

Quality of Service (QoS) Whitepaper

Quality of Service (QoS) Whitepaper Quality of Service (QoS) Whitepaper PCS-Series Videoconferencing White Paper www.sonybiz.net/vc Introduction Currently, an estimated 5% of data packets sent over the Internet are lost. In a videoconferencing

More information

Jimin Xiao, Tammam Tillo, Senior Member, IEEE, Yao Zhao, Senior Member, IEEE

Jimin Xiao, Tammam Tillo, Senior Member, IEEE, Yao Zhao, Senior Member, IEEE Real-Time Video Streaming Using Randomized Expanding Reed-Solomon Code Jimin Xiao, Tammam Tillo, Senior Member, IEEE, Yao Zhao, Senior Member, IEEE Abstract Forward error correction (FEC) codes are widely

More information

Purdue University Computer Science. End-to-End Transport of Real-Time Trac. Using. Kihong Park. Purdue University. West Lafayette, IN 47907

Purdue University Computer Science. End-to-End Transport of Real-Time Trac. Using. Kihong Park. Purdue University. West Lafayette, IN 47907 End-to-End Transport of Real-Time Trac Using Adaptive Forward Error Correction Kihong Park Department of Computer Sciences Purdue University West Lafayette, IN 4797 park@cs.purdue.edu Overall Goal Facilitate

More information

Kevin Buckley

Kevin Buckley Kevin Buckley - 69 ECE877 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 3 Convolutional Codes x c (a) (b) (,) (,) (,) (,)

More information

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside

More information

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 8, AUGUST 2011 5227 Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi,

More information

Cryptanalyzing the Polynomial Reconstruction based Public-Key System under Optimal Parameter Choice

Cryptanalyzing the Polynomial Reconstruction based Public-Key System under Optimal Parameter Choice Cryptanalyzing the Polynomial Reconstruction based Public-Key System under Optimal Parameter Choice Aggelos Kiayias - Moti Yung U. of Connecticut - Columbia U. (Public-Key) Cryptography intractability

More information

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

Chapter 3. The Data Link Layer. Wesam A. Hatamleh Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data

More information

Networked Systems and Services, Fall 2018 Chapter 2. Jussi Kangasharju Markku Kojo Lea Kutvonen

Networked Systems and Services, Fall 2018 Chapter 2. Jussi Kangasharju Markku Kojo Lea Kutvonen Networked Systems and Services, Fall 2018 Chapter 2 Jussi Kangasharju Markku Kojo Lea Kutvonen Outline Physical layer reliability Low level reliability Parities and checksums Cyclic Redundancy Check (CRC)

More information

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER Transport Layer The Transport layer ensures the reliable arrival of messages and provides error checking mechanisms and data

More information

CCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer

CCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer CCNA R&S: Introduction to Networks Chapter 7: The Transport Layer Frank Schneemann 7.0.1.1 Introduction 7.0.1.2 Class Activity - We Need to Talk Game 7.1.1.1 Role of the Transport Layer The primary responsibilities

More information

Chapter 10 Error Detection and Correction 10.1

Chapter 10 Error Detection and Correction 10.1 Chapter 10 Error Detection and Correction 10.1 10-1 INTRODUCTION some issues related, directly or indirectly, to error detection and correction. Topics discussed in this section: Types of Errors Redundancy

More information

Efficient Content Delivery and Low Complexity Codes. Amin Shokrollahi

Efficient Content Delivery and Low Complexity Codes. Amin Shokrollahi Efficient Content Delivery and Low Complexity Codes Amin Shokrollahi Content Goals and Problems TCP/IP, Unicast, and Multicast Solutions based on codes Applications Goal Want to transport data from a transmitter

More information

Data Link Layer. Srinidhi Varadarajan

Data Link Layer. Srinidhi Varadarajan Data Link Layer Srinidhi Varadarajan Data Link Layer: Functionality The data link layer must: Detect errors (using redundancy bits) Request retransmission if data is lost (using automatic repeat request

More information

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Data Link Technology Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Agenda Functions of the data link layer Technologies concept and design error control flow

More information

The Transmission Control Protocol (TCP)

The Transmission Control Protocol (TCP) The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, e-mail, WWW) Reliable Stream Transport (TCP) Unreliable Transport Service (UDP) Connectionless Packet Delivery Service (IP) Goals

More information

Multi-path Forward Error Correction Control Scheme with Path Interleaving

Multi-path Forward Error Correction Control Scheme with Path Interleaving Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,

More information

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks

More information

Fountain Codes Based on Zigzag Decodable Coding

Fountain Codes Based on Zigzag Decodable Coding Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes

More information

TCP/IP-2. Transmission control protocol:

TCP/IP-2. Transmission control protocol: TCP/IP-2 Transmission control protocol: TCP and IP are the workhorses in the Internet. In this section we first discuss how TCP provides reliable, connectionoriented stream service over IP. To do so, TCP

More information

The Data Link Layer Chapter 3

The Data Link Layer Chapter 3 The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 The Data

More information

The Data Link Layer. CS158a Chris Pollett Feb 26, 2007.

The Data Link Layer. CS158a Chris Pollett Feb 26, 2007. The Data Link Layer CS158a Chris Pollett Feb 26, 2007. Outline Finish up Overview of Data Link Layer Error Detecting and Correcting Codes Finish up Overview of Data Link Layer Last day we were explaining

More information

Error Control in Wireless Sensor Networks: A Cross Layer Analysis

Error Control in Wireless Sensor Networks: A Cross Layer Analysis University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Journal Articles Computer Science and Engineering, Department of 2009 Error Control in Wireless Sensor Networks: A Cross

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Transport Layer Protocols TCP

Transport Layer Protocols TCP Transport Layer Protocols TCP Gail Hopkins Introduction Features of TCP Packet loss and retransmission Adaptive retransmission Flow control Three way handshake Congestion control 1 Common Networking Issues

More information

Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery

Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery Raja Abdelmoumen CRISTAL Laboratory, Tunisia Email: Raja.Abdelmoumen@ensi.rnu.tn Chadi Barakat Projet Planète, INRIA-Sophia

More information

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Error Detection and Correction 0. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note The Hamming distance between two words is the number of differences

More information

Polar Codes for Noncoherent MIMO Signalling

Polar Codes for Noncoherent MIMO Signalling ICC Polar Codes for Noncoherent MIMO Signalling Philip R. Balogun, Ian Marsland, Ramy Gohary, and Halim Yanikomeroglu Department of Systems and Computer Engineering, Carleton University, Canada WCS IS6

More information

SMALL DISTANCE CODES FOR HEADER ERROR DETECTION IN ATM NETWORKS

SMALL DISTANCE CODES FOR HEADER ERROR DETECTION IN ATM NETWORKS SMALL DISTANCE CODES FOR HEADER ERROR DETECTION IN ATM NETWORKS Tony Antonio Universitas Pancasila, Jakarta Jl. Srengseng Sawah Jagakarsa, Jakarta 12640 tony.antonio@yahoo.com Abstrak On transmission links

More information

Lecture 4 September 17

Lecture 4 September 17 CS 559: Algorithmic Aspects of Computer Networks Fall 2007 Lecture 4 September 17 Lecturer: John Byers BOSTON UNIVERSITY Scribe: Sowmya Manjanatha In today s lecture, we discussed and characterized the

More information

Ch. 7 Error Detection and Correction

Ch. 7 Error Detection and Correction Ch. 7 Error Detection and Correction Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and corrected. 2 1. Introduction Let us

More information

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16 Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,

More information

Position of IP and other network-layer protocols in TCP/IP protocol suite

Position of IP and other network-layer protocols in TCP/IP protocol suite Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,

More information

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role

More information

MULTIPLE LAYERED REED-SOLOMON CODES IN AUDIO DISKS WITH A FEEDBACK SYSTEM SREENIVAS RAO BELAVADI SATISH THESIS

MULTIPLE LAYERED REED-SOLOMON CODES IN AUDIO DISKS WITH A FEEDBACK SYSTEM SREENIVAS RAO BELAVADI SATISH THESIS MULTIPLE LAYERED REED-SOLOMON CODES IN AUDIO DISKS WITH A FEEDBACK SYSTEM BY SREENIVAS RAO BELAVADI SATISH THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Science

More information

CS 641 Project Report Error resilient video transmission over wireless networks. December Gang Ding

CS 641 Project Report Error resilient video transmission over wireless networks. December Gang Ding CS 64 Project Report Error resilient video transmission over wireless networks December 00 Gang Ding Abstract This report proposes a general architecture for error resilient video transmission over mobile

More information

Chapter 4: Implicit Error Detection

Chapter 4: Implicit Error Detection 4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup

More information

Multimedia Data Transmission over Mobile Internet using Packet-Loss Punctured (PaLoP) Codes

Multimedia Data Transmission over Mobile Internet using Packet-Loss Punctured (PaLoP) Codes Multimedia Data Transmission over Mobile Internet using Packet-Loss Punctured PaLoP Codes Markus Kaindl and Joachim Hagenauer Institute for Communications Engineering Munich University of Technology 9

More information

CSC310 Information Theory. Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes. November 22, 2006 see

CSC310 Information Theory. Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes. November 22, 2006 see CSC310 Information Theory Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes Sam Roweis Recovering From Erasures 2 How can we recover from erasures? For the BEC, we saw that low-density parity

More information

Lecture / The Data Link Layer: Framing and Error Detection

Lecture / The Data Link Layer: Framing and Error Detection Lecture 2 6.263/16.37 The Data Link Layer: Framing and Error Detection MIT, LIDS Slide 1 Data Link Layer (DLC) Responsible for reliable transmission of packets over a link Framing: Determine the start

More information

Implementation and Evaluation of Transport Layer Protocol Executing Error Correction (ECP)

Implementation and Evaluation of Transport Layer Protocol Executing Error Correction (ECP) Communications and Network, 2014, 6, 175-185 Published Online August 2014 in SciRes. http://www.scirp.org/journal/cn http://dx.doi.org/10.4236/cn.2014.63019 Implementation and Evaluation of Transport Layer

More information

Revision of Previous Lectures

Revision of Previous Lectures Lecture 15 Overview Last Lecture Local area networking This Lecture Wide area networking 1 Source: chapters 8.1-8.3, 17.1, 18.1, 18.2 Next Lecture Wide area networking 2 Source: Chapter 20 COSC244 Lecture

More information

Network Model: Each layer has a specific function.

Network Model: Each layer has a specific function. OBJECTIVES: To discuss the OSI model and its layer architecture and to show the interface between the layers. To briefly discuss the functions of each layer in the OSI model. To introduce the TCP/IP protocol.

More information

CSE 461 Module 10. Introduction to the Transport Layer

CSE 461 Module 10. Introduction to the Transport Layer CSE 461 Module 10 Introduction to the Transport Layer Last Time We finished up the Network layer Internetworks (IP) Routing (DV/RIP, LS/OSPF, BGP) It was all about routing: how to provide end-to-end delivery

More information

A Hybrid ARQ Scheme for Resilient Packet Header Compression

A Hybrid ARQ Scheme for Resilient Packet Header Compression A Hybrid ARQ Scheme for Resilient Packet Compression Vijay A Suryavanshi and Aria Nosratinia Multimedia Communications Laboratory, The University of Texas at Dallas Richardson, TX 7083-0688, USA E-mail:

More information

EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L4 Data link (part 1)

EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L4 Data link (part 1) EITF25 Internet- - Techniques and Applica8ons Stefan Höst L4 Data link (part 1) Previously on EITF25 (or digital signal) 2 Data Link Layer Medium Access Control Access to network Logical Link Control Node-

More information

CSC310 Information Theory. Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes. November 30, 2005 see

CSC310 Information Theory. Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes. November 30, 2005 see CSC310 Information Theory Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes Sam Roweis Recovering From Erasures 2 How can we recover from erasures? For the BEC, we saw that low-density parity

More information

The Data Link Layer Chapter 3

The Data Link Layer Chapter 3 The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 & February

More information

Caterpillar RLNC (CRLNC): A Practical Finite Sliding Window RLNC Approach

Caterpillar RLNC (CRLNC): A Practical Finite Sliding Window RLNC Approach Received August 14, 2017, accepted September 18, 2017, date of publication September 27, 2017, date of current version October 25, 2017. Digital Object Identifier 10.1109/ACCESS.2017.2757241 Caterpillar

More information

Minimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions

Minimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions Minimum Delay acket-sizing for inear Multi-hop Networks with Cooperative Transmissions Ning Wen and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern University, Evanston,

More information

The Capacity of Private Information Retrieval from Byzantine and Colluding Databases

The Capacity of Private Information Retrieval from Byzantine and Colluding Databases he Capacity of Private Information Retrieval from Byzantine and Colluding Databases Karim Banawan Sennur Ulukus arxiv:1706.01442v1 [cs.i] 5 Jun 2017 Department of Electrical and Computer Engineering University

More information

Enabling Node Repair in Any Erasure Code for Distributed Storage

Enabling Node Repair in Any Erasure Code for Distributed Storage Enabling Node Repair in Any Erasure Code for Distributed Storage K. V. Rashmi, Nihar B. Shah, and P. Vijay Kumar, Fellow, IEEE Abstract Erasure codes are an efficient means of storing data across a network

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Reliable Multipath Routing with Fixed Delays in MANET Using Regenerating Nodes

Reliable Multipath Routing with Fixed Delays in MANET Using Regenerating Nodes Reliable Multipath Routing with Fixed Delays in MANET Using Regenerating Nodes Rui Ma and Jacek Ilow Dalhousie University Dept. of Electrical and Computer Eng. Halifax, NS, Canada B3J 2X4 rma2@dal.ca and

More information

Energy Efficiency Maximization for Wireless Sensor Networks

Energy Efficiency Maximization for Wireless Sensor Networks Energy Efficiency Maximization for Wireless Sensor Networks Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. Because of the remote nature

More information

Data and Computer Communications. Protocols and Architecture

Data and Computer Communications. Protocols and Architecture Data and Computer Communications Protocols and Architecture Characteristics Direct or indirect Monolithic or structured Symmetric or asymmetric Standard or nonstandard Means of Communication Direct or

More information

BATS: Achieving the Capacity of Networks with Packet Loss

BATS: Achieving the Capacity of Networks with Packet Loss BATS: Achieving the Capacity of Networks with Packet Loss Raymond W. Yeung Institute of Network Coding The Chinese University of Hong Kong Joint work with Shenghao Yang (IIIS, Tsinghua U) R.W. Yeung (INC@CUHK)

More information

Outline. Basic ARQ schemes. S Capacity enhancement methods for radio interface ARQ Schemes. Classification of error control strategies

Outline. Basic ARQ schemes. S Capacity enhancement methods for radio interface ARQ Schemes. Classification of error control strategies ARQ Schemes, March 26 24 ARQ Schemes, March 26 24 2 Outline Classification of error control strategies S-7263 Capacity enhancement methods for radio interface ARQ Schemes Markku Liinaharja March 25, 24

More information

Balancing forward and feedback error correction

Balancing forward and feedback error correction Balancing forward and feedback error correction Anant Sahai based in part on joint work with: Stark Draper, Tunc Simsek, and Paul Liu sahai@eecs.berkeley.edu Wireless Foundations Department of Electrical

More information

CSCI-131 Networking: the End-to-End Layer. Rodrigo Fonseca March 12 th, 2013

CSCI-131 Networking: the End-to-End Layer. Rodrigo Fonseca March 12 th, 2013 CSCI-131 Networking: the End-to-End Layer Rodrigo Fonseca March 12 th, 2013 Today Transport layer Provides useful abstractions for applications Uses (the fairly minimal) services provided by the network

More information

Lecture 7: Flow & Media Access Control"

Lecture 7: Flow & Media Access Control Lecture 7: Flow & Media Access Control" CSE 123: Computer Networks Alex C. Snoeren HW 2 due next Wednesday! Lecture 7 Overview" Flow control Go-back-N Sliding window Methods to share physical media: multiple

More information

IEEE Broadband Wireless Access Working Group <http://ieee802.org/16>

IEEE Broadband Wireless Access Working Group <http://ieee802.org/16> Project Title Date Submitted IEEE 802.6 Broadband Wireless Access Working Group FEC Performance of Concatenated Reed-Solomon and Convolutional Coding with Interleaving 2000-06-08

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 4. September 09 CMSC417 Set 4 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2009 Ashok Agrawala Set 4 1 The Data Link Layer 2 Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1,

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1, CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala 1 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet

More information

S Capacity enhancement methods for radio interface ARQ Schemes

S Capacity enhancement methods for radio interface ARQ Schemes ARQ Schemes, March 26 2004 1 S-72.630 Capacity enhancement methods for radio interface ARQ Schemes Markku Liinaharja March 25, 2004 ARQ Schemes, March 26 2004 2 Outline Classification of error control

More information

Efficient Synchronization of Multiple Databases over Broadcast Networks

Efficient Synchronization of Multiple Databases over Broadcast Networks Efficient Synchronization of Multiple Databases over Broadcast Networks Muhammad Muhammad, Stefan Erl, and Matteo Berioli German Aerospace Center (DLR) Institute of Communications and Navigation 82234,

More information

A New Approach of Forward Error Correction For Packet Loss Recovery

A New Approach of Forward Error Correction For Packet Loss Recovery Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

FECFRAME extension Adding convolutional FEC codes support to the FEC Framework

FECFRAME extension Adding convolutional FEC codes support to the FEC Framework FECFRAME extension Adding convolutional FEC codes support to the FEC Framework Vincent Roca, Inria, France Ali Begen, Networked Media, Turkey https://datatracker.ietf.org/doc/draft-roca-tsvwg-fecframev2/

More information

Design Single and Multiple Errors Correction Block Codes

Design Single and Multiple Errors Correction Block Codes Design Single and Multiple Errors Correction Block Codes Zahraa Raad Mayoof Hajiyat Faculty of Engineering Technology & Built Environment, Department of Electrical and Electronic Engineering, B.Eng (Hons)

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY 23.2 The transport

More information

Improved Soft-Decision Decoding of RSCC Codes

Improved Soft-Decision Decoding of RSCC Codes 2013 IEEE Wireless Communications and Networking Conference (WCNC): PHY Improved Soft-Decision Decoding of RSCC Codes Li Chen School of Information Science and Technology, Sun Yat-sen University Guangzhou,

More information

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check.

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check. Error Detection Two types Error Detection Codes (e.g. CRC, Parity, Checksums) Error Correction Codes (e.g. Hamming, Reed Solomon) Basic Idea Add redundant information to determine if errors have been introduced

More information

Multiple unconnected networks

Multiple unconnected networks TCP/IP Life in the Early 1970s Multiple unconnected networks ARPAnet Data-over-cable Packet satellite (Aloha) Packet radio ARPAnet satellite net Differences Across Packet-Switched Networks Addressing Maximum

More information

CHANNEL CODING 1. Introduction

CHANNEL CODING 1. Introduction CHANNEL CODING 1. Introduction The fundamental resources at the disposal of a communications engineer are signal power, time and bandwidth. For a given communications environment, these three resources

More information

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions 2007 IEEE Communication Theory Workshop Christian R. Berger 1, Shengli Zhou 1, Yonggang Wen 2, Peter Willett 1 and

More information

EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS

EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS LECTURE 6: CODING THEORY - 2 Fall 2014 Avinash Kodi kodi@ohio.edu Acknowledgement: Daniel Sorin, Behrooz Parhami, Srinivasan Ramasubramanian Agenda Hamming Codes

More information

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address

More information

A Model for Streaming 3D Meshes and Its Applications

A Model for Streaming 3D Meshes and Its Applications A Model for Streaming D Meshes and Its Applications ABSTRACT Ong Yuh Shin and Ooi Wei Tsang Department of Computer Science, School of Computing, National University of Singapore In this paper, we present

More information

COMPUTER NETWORKS UNIT-3

COMPUTER NETWORKS UNIT-3 COMPUTER NETWORKS UNIT-3 Syllabus: The Data Link Layer - Data Link Layer Design Issues, Services Provided to the Network Layer Framing Error Control Flow Control, Error Detection and Correction Error-Correcting

More information

Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks

Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Majid Gerami, Ming Xiao Communication Theory Lab, Royal Institute of Technology, KTH, Sweden, E-mail: {gerami, mingx@kthse arxiv:14012774v1

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

Introduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video

Introduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video Preface p. xi Acknowledgments p. xvii Introduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video Experiments p. 4 Audio

More information

A New Non-Iterative Decoding Algorithm for the Erasure Channel : Comparisons with Enhanced Iterative Methods

A New Non-Iterative Decoding Algorithm for the Erasure Channel : Comparisons with Enhanced Iterative Methods SUBMITTED TO ISIT 2005 ON 31 JANUARY 2005 1 arxiv:cs/0503006v1 [cs.it] 2 Mar 2005 A New Non-Iterative Decoding Algorithm for the Erasure Channel : Comparisons with Enhanced Iterative Methods J. Cai, C.

More information