So you think you can FEC?

Size: px
Start display at page:

Download "So you think you can FEC?"

Transcription

1 So you think you can FEC? Mikhail Misha Fludkov (fludkov) Pexip R&D Erlend Earl Graff (egraff) Pexip R&D 8 th GStreamer Conference 21 October 2017 Prague, Czech Republic

2 Outline Introduction to FEC Designing a FEC decoder element FEC algorithms XOR-based FEC Reed-Solomon FEC DEMO!

3 Bird s eye view on FEC #18 #17 #16 #15 #1 #13 #12 #11 #10 #9 #8 #7 #6 #5 # #3 #2 #1 #0 RTP video or audio packets (VP8, H26, OPUS, etc) FEC packets with redundant data

4 Bird s eye view on FEC #18 #17 #16 #15 #1 #13 #12 #11 #10 #9 #8 #7 #6 #5 # #3 #2 #1 #0

5 FEC standards zoo RED - Redundant Audio Data (RFC 2198) ULPFEC based standards: ULPFEC Generic Forward Error Correction (RFC 5109) ULPFEC (WebRTC) X-ULPFECUC (Skype) FLEX FEC - Flexible Forward Error Correction

6 GStreamer element for packet recovery #6 #5 # #3 #2 #1 #0 FECDec # #3 #2 #1 #0

7 Where to hook it up? Before or after jitterbuffer? here? or here? FECDec GstRtpBin FECDec

8 Where to hook it up? #6 #5 # GstRtpBin # FECDec #3 #2 #1 #0 # Lost event with seq-num #

9 What if it works and recovers packets! Yaaay! send_rtcp_src #6 #5 #3 #2 #1 #0 FECDec GstRtpBin # lost packet was recovered and pushed here

10 Where to hook it up to? Flex FEC case recv_rtp_src_100 #1 #0 #1 #0 #1 #0 #1 #0 GstRtpBin recv_rtp_src_200 #1 #0 recv_rtp_src_300 #1 #0 audio packet with ssrc 100 video packet with ssrc 200 Flex FEC packet with ssrc 300

11 Doing it the right way recv_rtp_src_100 PexFecDec RtpStorage GstRtpBin recv_rtp_src_200 PexFecDec recv_rtp_src_300 PexFecDec # get_packets_for_recovery(ssrc300, seq_num) #6 #5 #3 #2 #0

12 Yet another what if #18 #17 #16 #15 #1 #13 #12 #11 #10 #9 #8 #7 #6 #5 # #3 #2 #1 #0

13 FEC Algorithms XOR-based FEC Reed-Solomon FEC

14 XOR-based FEC

15 XOR-based FEC D1 D2 D3 D R1 R2

16 XOR-based FEC D1 D2 D3 D R1 D1 D2 R2 D1 D2 D3 D

17 XOR-based FEC D1 D2 D3 D R1 D1 D2 R2 D1 D2 D3 D

18 XOR-based FEC D1 x D R1 D1 x R2 D1 x D

19 XOR-based FEC D1 x y D R1 D1 x R2 D1 x y D

20 XOR-based FEC D1 x y D R1 R2 D1 D1 x x y D D1 x R1 y D1 x D R2 R1

21 XOR-based FEC D1 x y D R1 D1 x x D1 R1 R2 D1 x y D y R1 D R2

22 XOR-based FEC D1 D2 D3 D R1 D1 D2 R2 D1 D2 D3 D

23 XOR-based FEC D1 D2 D3 D R1 D1 D2 R2 D1 D2 D3 D

24 XOR-based FEC D1 D2 x R1 D1 D2 R2 D1 D2 x

25 XOR-based FEC D1 D2 x y R1 D1 D2 R2 D1 D2 x y

26 Reed-Solomon codes R-S encoder k data symbols t parity symbols Irving S. Reed and Gustave Solomon R-S erasure decoder Either Detect up to t errors Detect and correct up to t Τ2 Correct up to t erasures errors k symbols (data and/or parity) k original data symbols

27 Reed-Solomon codes Data packets Redundancy packets

28 Reed-Solomon codes d c a d 3d Data packets ee c9 95 a1 9d 21 a3 b a5 aa 16 f b 70 7f b c6 bd e8 cb 02 bf 8c 5d a d7 8b 73 0f 61 5 bf bc d7 cd aa 22 d9 a f6 8 8a 1 c 0a c3 ca f d5 ff d6 a5 f3 e3 5d d3 2 3f 2 a8 1b f c8 cb d e 85 2d d6 Redundancy packets 85 9a b2 76 8f 1 c ee d3 5b fd e0 b0 d a d1 82 b2 dd 0c

29 Reed-Solomon codes 55 Data packets ee 5d 90 Redundancy packets 85

30 Reed-Solomon codes 7 Data packets c9 a 09 Redundancy packets 9a

31 Reed-Solomon codes 56 Data packets 95 d7 d6 Redundancy packets b2

32 Reed-Solomon codes d c a d 3d Data packets ee c9 95 a1 9d 21 a3 b a5 aa 16 f b 70 7f b c6 bd e8 cb 02 bf 8c 5d a d7 8b 73 0f 61 5 bf bc d7 cd aa 22 d9 a f6 8 8a 1 c 0a c3 ca f d5 ff d6 a5 f3 e3 5d d3 2 3f 2 a8 1b f c8 cb d e 85 2d d6 Redundancy packets 85 9a b2 76 8f 1 c ee d3 5b fd e0 b0 d a d1 82 b2 dd 0c

33 Reed-Solomon codes

34 Reed-Solomon codes encoding

35 Reed-Solomon codes encoding 100 Encoding coefficients

36 Reed-Solomon codes encoding 100 Encoding coefficients

37 Reed-Solomon codes encoding 100 Encoding coefficients

38 Reed-Solomon codes encoding 100 Encoding coefficients

39 Reed-Solomon codes encoding 100 Encoding coefficients

40 Reed-Solomon codes encoding 100 Encoding coefficients

41 Reed-Solomon codes encoding 100 Encoding coefficients

42 Reed-Solomon codes encoding 100 Encoding coefficients

43 Reed-Solomon codes encoding 100 Encoding coefficients

44 Reed-Solomon codes encoding 100 Encoding coefficients

45 Reed-Solomon codes decoding 100 Encoding coefficients

46 Reed-Solomon codes decoding 100 Encoding coefficients

47 Reed-Solomon codes decoding 100 Encoding coefficients x x x

48 Reed-Solomon codes decoding 100 Encoding coefficients x y x y 670 x y

49 Reed-Solomon codes decoding 100 Encoding coefficients x y x y x y x 3y x 2y 670

50 Reed-Solomon codes decoding 100 Encoding coefficients x y x y x y x 3y x 2y

51 Reed-Solomon codes decoding 100 Encoding coefficients x y x y x y x 3y x 2y

52 Reed-Solomon codes decoding 100 Encoding coefficients x y x y x y x 3y 130 5x 2y 270

53 Reed-Solomon codes decoding 100 Encoding coefficients x y x y x y x 3y 130 5x 2y 270 3x y 10

54 Reed-Solomon codes decoding 100 Encoding coefficients x y x y x y x 3y 130 5x 2y 270 y 3x 10

55 Reed-Solomon codes decoding 100 Encoding coefficients x y x y x y x 3y 130 5x 2y 270 y 3x 10 2x 3 3x x 9x x 550 x 50

56 Reed-Solomon codes summary Encoding Linear combination (matrix multiplication) Decoding Solving linear equation system (matrix inversion and multiplication)

57 But

58 Linear combinations in R R R R

59 Linear combinations not in R? ,255 0,255 0,255

60 Linear combinations not in R? ,255 0,255 0,255 0,255

61 Fields Set of elements and Given a Ϝ and b Ϝ, then a b Ϝ a b Ϝ R and Q infinite fields Finite fields

62 Fields Z 7Z 0,1,2,3,,5,6 is addition modulo 7 is multiplication modulo 7

63 Fields Multiplication table for Z Τ7Z

64 Fields Multiplication table for Z Τ7Z mod 7

65 Fields Multiplication table for Z Τ7Z mod 7

66 Fields Finite fields p q elements Solving linear equation systems works! Reed-Solomon: typically 2 q elements GF 2 8 0,255

67 Linear MDS codes over Z Τ7Z encoding 1 2 3

68 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients

69 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients

70 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients

71 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients

72 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients

73 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients

74 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients

75 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients

76 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients

77 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients

78 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients

79 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients

80 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients

81 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients

82 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients x x x 1 5 2

83 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients x y 5 2 x y 6 x y

84 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients x y x y x y x 3y 5x 2y 6

85 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients x y x y x y x 3y 2 3 5x 2y 6 3

86 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients x y x y x y x 3y 2 3 5x 2y 6 3

87 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients x y x y x y x 3y 2 5x 2y 6 3

88 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients x y x y x y x 3y 6 5x 2y 2

89 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients x y x y x y x 3y 6 5x 2y 2 0x 5y 1

90 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients x y x y x y x 3y 6 5x 2y 2 5y 1

91 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients Multiplication table for Z Τ7Z x y x y x y x 3y 6 5x 2y 2 5y

92 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients Multiplication table for Z Τ7Z x y x y x y x 3y 6 5x 2y 2 5y

93 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients Multiplication table for Z Τ7Z x y x y x y x 3y 6 5x 2y 2 3 5y

94 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients Multiplication table for Z Τ7Z x y x y x y x 3y 6 5x 2y 2 y

95 FEC it up! GStreamer elements RED encoder and decoder ULPFEC decoder (XOR and Reed-Solomon) RTPStorage element Reed-Solomon encoder and decoder Only GF 2 8 Matrix operations Cauchy-RS fast matrix inversion SIMD optimizations 1 1 Anvin, H. P. The mathematics of RAID

96 DEMO THYME

97 Benchmarks Reed-Solomon encoding

98 Benchmarks Reed-Solomon decoding

99 Questions? (Do you think we can FEC?)

draft-begen-fecframe-interleaved-fec-scheme-00 IETF 72 July 2008 Ali C. Begen

draft-begen-fecframe-interleaved-fec-scheme-00 IETF 72 July 2008 Ali C. Begen 1-D Interleaved Parity FEC draft-begen-fecframe-interleaved-fec-scheme-00 IETF 72 July 2008 Ali C. Begen abegen@cisco.com Introduction 1-D interleaved parity code Is a systematic FEC code of decent complexity

More information

Fast Erasure Coding for Data Storage: A Comprehensive Study of the Acceleration Techniques. Tianli Zhou & Chao Tian Texas A&M University

Fast Erasure Coding for Data Storage: A Comprehensive Study of the Acceleration Techniques. Tianli Zhou & Chao Tian Texas A&M University Fast Erasure Coding for Data Storage: A Comprehensive Study of the Acceleration Techniques Tianli Zhou & Chao Tian Texas A&M University 2 Contents Motivation Background and Review Evaluating Individual

More information

Performance improvements to peer-to-peer file transfers using network coding

Performance improvements to peer-to-peer file transfers using network coding Performance improvements to peer-to-peer file transfers using network coding Aaron Kelley April 29, 2009 Mentor: Dr. David Sturgill Outline Introduction Network Coding Background Contributions Precomputation

More information

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

CSC310 Information Theory. Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes. November 22, 2006 see

CSC310 Information Theory. Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes. November 22, 2006 see CSC310 Information Theory Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes Sam Roweis Recovering From Erasures 2 How can we recover from erasures? For the BEC, we saw that low-density parity

More information

Packet-Level Forward Error Correction in Video Transmission

Packet-Level Forward Error Correction in Video Transmission Packet-Level Forward Error Correction in Video Transmission Matteo Mazzotti, Enrico Paolini, Marco Chiani, Davide Dardari, and Andrea Giorgetti University of Bologna Wireless Communications Laboratory

More information

CSC310 Information Theory. Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes. November 30, 2005 see

CSC310 Information Theory. Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes. November 30, 2005 see CSC310 Information Theory Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes Sam Roweis Recovering From Erasures 2 How can we recover from erasures? For the BEC, we saw that low-density parity

More information

Quality of Service (QoS) Whitepaper

Quality of Service (QoS) Whitepaper Quality of Service (QoS) Whitepaper PCS-Series Videoconferencing White Paper www.sonybiz.net/vc Introduction Currently, an estimated 5% of data packets sent over the Internet are lost. In a videoconferencing

More information

EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS

EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS LECTURE 6: CODING THEORY - 2 Fall 2014 Avinash Kodi kodi@ohio.edu Acknowledgement: Daniel Sorin, Behrooz Parhami, Srinivasan Ramasubramanian Agenda Hamming Codes

More information

90A John Muir Drive Buffalo, New York Tel: Fax:

90A John Muir Drive   Buffalo, New York Tel: Fax: Reed Solomon Coding The VOCAL implementation of Reed Solomon (RS) Forward Error Correction (FEC) algorithms is available in several forms. The forms include pure software and software with varying levels

More information

Secret Key Systems (block encoding) Encrypting a small block of text (say 64 bits) General considerations for cipher design:

Secret Key Systems (block encoding) Encrypting a small block of text (say 64 bits) General considerations for cipher design: Secret Key Systems (block encoding) Encrypting a small block of text (say 64 bits) General considerations for cipher design: Secret Key Systems (block encoding) Encrypting a small block of text (say 64

More information

CIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1 Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. Router A Router B Router C Router D Network Next Hop Next Hop Next Hop Next

More information

FECFRAME extension Adding convolutional FEC codes support to the FEC Framework

FECFRAME extension Adding convolutional FEC codes support to the FEC Framework FECFRAME extension Adding convolutional FEC codes support to the FEC Framework Vincent Roca, Inria, France Ali Begen, Networked Media, Turkey https://datatracker.ietf.org/doc/draft-roca-tsvwg-fecframev2/

More information

4. Specifications and Additional Information

4. Specifications and Additional Information 4. Specifications and Additional Information AGX52004-1.0 8B/10B Code This section provides information about the data and control codes for Arria GX devices. Code Notation The 8B/10B data and control

More information

Coding theory for scalable media delivery

Coding theory for scalable media delivery 1 Coding theory for scalable media delivery Michael Luby RaptorQ is a product of Qualcomm Technologies, Inc. Application layer erasure coding complements traditional error coding Forward Error Correction

More information

Link Layer: Error detection and correction

Link Layer: Error detection and correction Link Layer: Error detection and correction Topic Some bits will be received in error due to noise. What can we do? Detect errors with codes Correct errors with codes Retransmit lost frames Later Reliability

More information

Finite Math - J-term Homework. Section Inverse of a Square Matrix

Finite Math - J-term Homework. Section Inverse of a Square Matrix Section.5-77, 78, 79, 80 Finite Math - J-term 017 Lecture Notes - 1/19/017 Homework Section.6-9, 1, 1, 15, 17, 18, 1, 6, 9, 3, 37, 39, 1,, 5, 6, 55 Section 5.1-9, 11, 1, 13, 1, 17, 9, 30 Section.5 - Inverse

More information

CS321: Computer Networks Error Detection and Correction

CS321: Computer Networks Error Detection and Correction CS321: Computer Networks Error Detection and Correction Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Error Detection and Correction Objective: System must

More information

Lec 19 - Error and Loss Control

Lec 19 - Error and Loss Control ECE 5578 Multimedia Communication Lec 19 - Error and Loss Control Zhu Li Dept of CSEE, UMKC Office: FH560E, Email: lizhu@umkc.edu, Ph: x 2346. http://l.web.umkc.edu/lizhu slides created with WPS Office

More information

FORWARD ERROR CORRECTION CODING TECHNIQUES FOR RELIABLE COMMUNICATION SYSTEMS

FORWARD ERROR CORRECTION CODING TECHNIQUES FOR RELIABLE COMMUNICATION SYSTEMS FORWARD ERROR CORRECTION CODING TECHNIQUES FOR RELIABLE COMMUNICATION SYSTEMS Jyoti Sharma Department of ECE Sri Sai College of Engg. & Technology, Badhani, Punjab, India Priya Department of ECE Sri Sai

More information

Issues related to RID and Simulcast. draft-ietf-mmusic-sdp-simulcast-10 draft-ietf-mmusic-rid-12

Issues related to RID and Simulcast. draft-ietf-mmusic-sdp-simulcast-10 draft-ietf-mmusic-rid-12 Issues related to RID and Simulcast draft-ietf-mmusic-sdp-simulcast-10 draft-ietf-mmusic-rid-12 1 Outline Issues Handling in RID and Simulcast of associated payload types such as Comfort Noise and DTMF

More information

Request for Comments: 5109 December 2007 Obsoletes: 2733, 3009 Category: Standards Track. RTP Payload Format for Generic Forward Error Correction

Request for Comments: 5109 December 2007 Obsoletes: 2733, 3009 Category: Standards Track. RTP Payload Format for Generic Forward Error Correction Network Working Group A. Li, Ed. Request for Comments: 5109 December 2007 Obsoletes: 2733, 3009 Category: Standards Track RTP Payload Format for Generic Forward Error Correction Status of This Memo This

More information

Screaming Fast Galois Field Arithmetic Using Intel SIMD Instructions. James S. Plank USENIX FAST. University of Tennessee

Screaming Fast Galois Field Arithmetic Using Intel SIMD Instructions. James S. Plank USENIX FAST. University of Tennessee Screaming Fast Galois Field Arithmetic Using Intel SIMD Instructions James S. Plank University of Tennessee USENIX FAST San Jose, CA February 15, 2013. Authors Jim Plank Tennessee Kevin Greenan EMC/Data

More information

Proposal for Robust and Adaptive Forward Error Correction for real-time Audio-Video streaming solutions

Proposal for Robust and Adaptive Forward Error Correction for real-time Audio-Video streaming solutions IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 3, Issue 2 (Sep-Oct. 2012), PP 32-36 Proposal for Robust and Adaptive Forward Error Correction

More information

Application Layer Hybrid Error Correction in Wireless IP-based DVB-Multicast

Application Layer Hybrid Error Correction in Wireless IP-based DVB-Multicast Master s Thesis Application Layer Hybrid Error Correction in Wireless IP-based DVB-Multicast Manuel Gorius Supervisor : Prof. Dr.-Ing. Th. Herfet Submitted on : 2007 Saarland University Faculty of Natural

More information

CSCI-1680 Link Layer Reliability Rodrigo Fonseca

CSCI-1680 Link Layer Reliability Rodrigo Fonseca CSCI-1680 Link Layer Reliability Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Last time Physical layer: encoding, modulation Link layer framing Today Getting

More information

Optimize Storage Efficiency & Performance with Erasure Coding Hardware Offload. Dror Goldenberg VP Software Architecture Mellanox Technologies

Optimize Storage Efficiency & Performance with Erasure Coding Hardware Offload. Dror Goldenberg VP Software Architecture Mellanox Technologies Optimize Storage Efficiency & Performance with Erasure Coding Hardware Offload Dror Goldenberg VP Software Architecture Mellanox Technologies SNIA Legal Notice The material contained in this tutorial is

More information

Parallel Reed/Solomon Coding on Multicore Processors

Parallel Reed/Solomon Coding on Multicore Processors / 8 Parallel Reed/Solomon Coding on Multicore Processors Peter Sobe Institute of Computer Engineering University of Luebeck, Germany sobe@iti.uni-luebeck.de currently at Institute of Computer Science University

More information

Chapter 4: Implicit Error Detection

Chapter 4: Implicit Error Detection 4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup

More information

Modern Erasure Codes for Distributed Storage Systems

Modern Erasure Codes for Distributed Storage Systems Modern Erasure Codes for Distributed Storage Systems Srinivasan Narayanamurthy (Srini) NetApp Everything around us is changing! r The Data Deluge r Disk capacities and densities are increasing faster than

More information

ENGI 8868/9877 Computer and Communications Security III. BLOCK CIPHERS. Symmetric Key Cryptography. insecure channel

ENGI 8868/9877 Computer and Communications Security III. BLOCK CIPHERS. Symmetric Key Cryptography. insecure channel (a) Introduction - recall symmetric key cipher: III. BLOCK CIPHERS k Symmetric Key Cryptography k x e k y yʹ d k xʹ insecure channel Symmetric Key Ciphers same key used for encryption and decryption two

More information

Gateway Ascii Command Protocol

Gateway Ascii Command Protocol Gateway Ascii Command Protocol Table Of Contents Introduction....2 Ascii Commands.....3 Messages Received From The Gateway....3 Button Down Message.....3 Button Up Message....3 Button Maintain Message....4

More information

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1 Version 1 1. (20 Points) Given the class A network address 119.0.0.0 will be divided into a maximum of 15,900 subnets. a. (5 Points) How many bits will be necessary to address the 15,900 subnets? b. (5

More information

Latency and Loss Requirements! Receiver-side Buffering! Dealing with Loss! Loss Recovery!

Latency and Loss Requirements! Receiver-side Buffering! Dealing with Loss! Loss Recovery! Cumulative data! Latency and Loss Requirements! Fundamental characteristics of multimedia applications:! Typically delay sensitive!! live audio < 150 msec end-to-end delay is not perceptible!! 150-400

More information

Modern Erasure Codes for Distributed Storage Systems

Modern Erasure Codes for Distributed Storage Systems Modern Erasure Codes for Distributed Storage Systems Storage Developer Conference, SNIA, Bangalore Srinivasan Narayanamurthy Advanced Technology Group, NetApp May 27 th 2016 1 Everything around us is changing!

More information

Erasure coding and AONT algorithm selection for Secure Distributed Storage. Alem Abreha Sowmya Shetty

Erasure coding and AONT algorithm selection for Secure Distributed Storage. Alem Abreha Sowmya Shetty Erasure coding and AONT algorithm selection for Secure Distributed Storage Alem Abreha Sowmya Shetty Secure Distributed Storage AONT(All-Or-Nothing Transform) unkeyed transformation φ mapping a sequence

More information

International Journal of Innovations in Engineering and Technology (IJIET)

International Journal of Innovations in Engineering and Technology (IJIET) RTL Design and Implementation of Erasure Code for RAID system Chethan.K 1, Dr.Srividya.P 2, Mr.Sivashanmugam Krishnan 3 1 PG Student, Department Of ECE, R. V. College Engineering, Bangalore, India. 2 Associate

More information

A Performance Evaluation of Open Source Erasure Codes for Storage Applications

A Performance Evaluation of Open Source Erasure Codes for Storage Applications A Performance Evaluation of Open Source Erasure Codes for Storage Applications James S. Plank Catherine D. Schuman (Tennessee) Jianqiang Luo Lihao Xu (Wayne State) Zooko Wilcox-O'Hearn Usenix FAST February

More information

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission 1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission

More information

High Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection

High Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection High Level View EE 22: Error detection and reliable transmission Ion Stoica September 6, 22 Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise Solution

More information

CSCI-1680 Link Layer Reliability John Jannotti

CSCI-1680 Link Layer Reliability John Jannotti CSCI-1680 Link Layer Reliability John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Roadmap Last time Physical layer: encoding, modulation Link layer framing Today

More information

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1 Version 1 1. (20 Points) Given the class A network address 117.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 4,000 subnets? b. (5 Points) What is

More information

6.1 Combinational Circuits. George Boole ( ) Claude Shannon ( )

6.1 Combinational Circuits. George Boole ( ) Claude Shannon ( ) 6. Combinational Circuits George Boole (85 864) Claude Shannon (96 2) Signals and Wires Digital signals Binary (or logical ) values: or, on or off, high or low voltage Wires. Propagate digital signals

More information

EE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002

EE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002 EE 22: Error detection and reliable transmission Ion Stoica September 6, 2002 High Level View Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise

More information

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1 Version 1 Instructions Write your name on the exam paper. Write your name and version number on the top of the yellow paper. Answer Question 1 on the exam paper. Answer Questions 2-4 on the yellow paper.

More information

FPGA Implementation of Erasure Codes in NVMe based JBOFs

FPGA Implementation of Erasure Codes in NVMe based JBOFs FPGA Implementation of Erasure Codes in NVMe based JBOFs Manoj Roge Director, Data Center Xilinx Inc. Santa Clara, CA 1 Acknowledgement Shre Shah Data Center Architect, Xilinx Santa Clara, CA 2 Agenda

More information

CSEP 561 Error detection & correction. David Wetherall

CSEP 561 Error detection & correction. David Wetherall CSEP 561 Error detection & correction David Wetherall djw@cs.washington.edu Codes for Error Detection/Correction ti ti Error detection and correction How do we detect and correct messages that are garbled

More information

Building High Speed Erasure Coding Libraries for ARM and x86 Processors. Per Simonsen, CEO, MemoScale May 2017

Building High Speed Erasure Coding Libraries for ARM and x86 Processors. Per Simonsen, CEO, MemoScale May 2017 Building High Speed Erasure Coding Libraries for ARM and x86 Processors Per Simonsen, CEO, MemoScale May 2017 Agenda MemoScale company and team Erasure coding - brief intro MemoScale erasure codes Performance

More information

One subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity.

One subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity. FEAL-NX SPECIFICATIONS 1 Introduction 1.1 Outline of the FEAL-NX cipher FEAL, the Fast Data Encipherment Algorithm, is a 64-bit block cipher algorithm that enciphers 64-bit plaintexts into 64-bit ciphertexts

More information

Networked Systems and Services, Fall 2018 Chapter 2. Jussi Kangasharju Markku Kojo Lea Kutvonen

Networked Systems and Services, Fall 2018 Chapter 2. Jussi Kangasharju Markku Kojo Lea Kutvonen Networked Systems and Services, Fall 2018 Chapter 2 Jussi Kangasharju Markku Kojo Lea Kutvonen Outline Physical layer reliability Low level reliability Parities and checksums Cyclic Redundancy Check (CRC)

More information

CSCI-1680 Link Layer I Rodrigo Fonseca

CSCI-1680 Link Layer I Rodrigo Fonseca CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames

More information

6. Specifications & Additional Information

6. Specifications & Additional Information 6. Specifications & Additional Information SIIGX52004-3.1 Transceier Blocks Table 6 1 shows the transceier blocks for Stratix II GX and Stratix GX deices and compares their features. Table 6 1. Stratix

More information

On the Speedup of Single-Disk Failure Recovery in XOR-Coded Storage Systems: Theory and Practice

On the Speedup of Single-Disk Failure Recovery in XOR-Coded Storage Systems: Theory and Practice On the Speedup of Single-Disk Failure Recovery in XOR-Coded Storage Systems: Theory and Practice Yunfeng Zhu, Patrick P. C. Lee, Yuchong Hu, Liping Xiang, and Yinlong Xu University of Science and Technology

More information

C1098 JPEG Module User Manual

C1098 JPEG Module User Manual C1098 JPEG Module User Manual General Description C1098 is VGA camera module performs as a JPEG compressed still camera that can be attached to a wireless or PDA host. Users can send out a snapshot command

More information

EC-Bench: Benchmarking Onload and Offload Erasure Coders on Modern Hardware Architectures

EC-Bench: Benchmarking Onload and Offload Erasure Coders on Modern Hardware Architectures EC-Bench: Benchmarking Onload and Offload Erasure Coders on Modern Hardware Architectures Haiyang Shi, Xiaoyi Lu, and Dhabaleswar K. (DK) Panda {shi.876, lu.932, panda.2}@osu.edu The Ohio State University

More information

Robust Transmission of MPEG Video Streams over Lossy Packet-Switching Networks by using PET *

Robust Transmission of MPEG Video Streams over Lossy Packet-Switching Networks by using PET * Robust Transmission of MPEG Video Streams over Lossy Packet-Switching Networks by using PET * Andres Albanese 1 and Giancarlo Fortino 1,2 1 International Computer Science Institute, Berkeley, CA, USA 2

More information

Intelligent RAID 6 Theory Overview and Implementation

Intelligent RAID 6 Theory Overview and Implementation White Paper RAID 6 Intel Storage Building Blocks Intelligent RAID 6 Theory Overview and Implementation www.intel.com/design/ storage/intelligent_raid.htm 2 Abstract RAID 5 systems are commonly deployed

More information

Lecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1

Lecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1 Lecture 5 Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting

More information

Code-Based Cryptography Error-Correcting Codes and Cryptography

Code-Based Cryptography Error-Correcting Codes and Cryptography Code-Based Cryptography Error-Correcting Codes and Cryptography I. Márquez-Corbella 0 1. Error-Correcting Codes and Cryptography 1. Introduction I - Cryptography 2. Introduction II - Coding Theory 3. Encoding

More information

Lecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn

Lecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6: Reliable Transmission CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6 Overview Finishing Error Detection Cyclic Remainder Check (CRC) Handling errors Automatic Repeat

More information

FAULT TOLERANT SYSTEMS

FAULT TOLERANT SYSTEMS FAULT TOLERANT SYSTEMS http://www.ecs.umass.edu/ece/koren/faulttolerantsystems Part 6 Coding I Chapter 3 Information Redundancy Part.6.1 Information Redundancy - Coding A data word with d bits is encoded

More information

Fundamentals of Cryptography

Fundamentals of Cryptography Fundamentals of Cryptography Topics in Quantum-Safe Cryptography June 23, 2016 Part III Data Encryption Standard The Feistel network design m m 0 m 1 f k 1 1 m m 1 2 f k 2 2 DES uses a Feistel network

More information

ECHO Process Instrumentation, Inc. Modbus RS485 Module. Operating Instructions. Version 1.0 June 2010

ECHO Process Instrumentation, Inc. Modbus RS485 Module. Operating Instructions. Version 1.0 June 2010 ECHO Process Instrumentation, Inc. Modbus RS485 Module Operating Instructions Version 1.0 June 2010 ECHO Process Instrumentation, Inc. PO Box 800 Shalimar, FL 32579 PH: 850-609-1300 FX: 850-651-4777 EM:

More information

UNH-IOL MIPI Alliance Test Program

UNH-IOL MIPI Alliance Test Program DSI Receiver Protocol Conformance Test Report UNH-IOL 121 Technology Drive, Suite 2 Durham, NH 03824 +1-603-862-0090 mipilab@iol.unh.edu +1-603-862-0701 Engineer Name engineer@company.com Panel Company

More information

A Complete Treatment of Software Implementations of Finite Field Arithmetic for Erasure Coding Applications

A Complete Treatment of Software Implementations of Finite Field Arithmetic for Erasure Coding Applications A Complete Treatment of Software Implementations of Finite Field Arithmetic for Erasure Coding Applications James S. Plank Kevin M. Greenan Ethan L. Miller University of Tennessee Technical Report UT-CS-13-717

More information

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1 Version 1 1. (20 Points) Given the class A network address 121.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 8,100 subnets? b. (5 Points) What is

More information

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1 Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. NOTE: Router E should only be used for Internet traffic. Router A Router

More information

HPSS RAIT. A high performance, resilient, fault-tolerant tape data storage class. 1

HPSS RAIT. A high performance, resilient, fault-tolerant tape data storage class.   1 HPSS RAIT A high performance, resilient, fault-tolerant tape data storage class http://www.hpss-collaboration.org 1 Why RAIT? HPSS supports striped tape without RAIT o Conceptually similar to RAID 0 o

More information

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1 Version 1 Instructions 1. Write your name and version number on the top of the yellow paper and the routing tables sheet. 2. Answer Question 2 on the routing tables sheet. 3. Answer Questions 1, 3, 4,

More information

Close-form and Matrix En/Decoding Evaluation on Different Erasure Codes

Close-form and Matrix En/Decoding Evaluation on Different Erasure Codes UNIVERSITY OF MINNESOTA-TWIN CITIES Close-form and Matrix En/Decoding Evaluation on Different Erasure Codes by Zhe Zhang A thesis submitted in partial fulfillment for the degree of Master of Science in

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 4: Data-Link I: Framing and Errors Some portions courtesy Robin Kravets and Steve Lumetta Last time How protocols are organized & why Network layer Data-link

More information

HADOOP 3.0 is here! Dr. Sandeep Deshmukh Sadepach Labs Pvt. Ltd. - Let us grow together!

HADOOP 3.0 is here! Dr. Sandeep Deshmukh Sadepach Labs Pvt. Ltd. - Let us grow together! HADOOP 3.0 is here! Dr. Sandeep Deshmukh sandeep@sadepach.com Sadepach Labs Pvt. Ltd. - Let us grow together! About me BE from VNIT Nagpur, MTech+PhD from IIT Bombay Worked with Persistent Systems - Life

More information

Screaming Fast Galois Field Arithmetic Using Intel SIMD Instructions

Screaming Fast Galois Field Arithmetic Using Intel SIMD Instructions Screaming Fast Galois Field Arithmetic Using Intel SIMD Instructions Ethan L. Miller Center for Research in Storage Systems University of California, Santa Cruz (and Pure Storage) Authors Jim Plank Univ.

More information

Communications guide. Line Distance Protection System * F1* GE Digital Energy. Title page

Communications guide. Line Distance Protection System * F1* GE Digital Energy. Title page Title page GE Digital Energy D90 Plus Line Distance Protection System Communications guide D90 Plus firmware revision:.9x GE publication code: 60-9070-F (GEK-3469) GE Digital Energy 650 Markland Street

More information

HD Radio Air Interface Design Description Advanced Application Services Transport Rev. G August 23, 2011

HD Radio Air Interface Design Description Advanced Application Services Transport Rev. G August 23, 2011 HD Radio Air Interface Design Description Advanced Application Services Transport Rev. G August 23, 2011 SY_IDD_1019s TRADEMARKS HD Radio and the HD, HD Radio, and Arc logos are proprietary trademarks

More information

CSN Telecommunications. 5: Error Coding. Data, Audio, Video and Images Prof Bill Buchanan

CSN Telecommunications. 5: Error Coding. Data, Audio, Video and Images  Prof Bill Buchanan CSN874 Telecommunications 5: Error Coding Data, Audio, Video and Images http://asecuritysite.com/comms Prof Bill Buchanan CSN874 Telecommunications 5: Error Coding: Modulo-2 Data, Audio, Video and Images

More information

RS 232 PINOUTS. 1. We use RJ12 for all of our RS232 interfaces (Link-2-Modbus & Link-2-PC- Serial/RS232). The diagram below shows our pin out.

RS 232 PINOUTS. 1. We use RJ12 for all of our RS232 interfaces (Link-2-Modbus & Link-2-PC- Serial/RS232). The diagram below shows our pin out. RS 232 PINOUTS 1. We use RJ12 for all of our RS232 interfaces (Link-2-Modbus & Link-2-PC- Serial/RS232). The diagram below shows our pin out. 2. A DB9 Female to RJ12 Female Serial/Terminal Modular Adaptor

More information

CSCI 454/554 Computer and Network Security. Topic 3.1 Secret Key Cryptography Algorithms

CSCI 454/554 Computer and Network Security. Topic 3.1 Secret Key Cryptography Algorithms CSCI 454/554 Computer and Network Security Topic 3.1 Secret Key Cryptography Algorithms Outline Introductory Remarks Feistel Cipher DES AES 2 Introduction Secret Keys or Secret Algorithms? Security by

More information

All About Erasure Codes: - Reed-Solomon Coding - LDPC Coding. James S. Plank. ICL - August 20, 2004

All About Erasure Codes: - Reed-Solomon Coding - LDPC Coding. James S. Plank. ICL - August 20, 2004 All About Erasure Codes: - Reed-Solomon Coding - LDPC Coding James S. Plank Logistical Computing and Internetworking Laboratory Department of Computer Science University of Tennessee ICL - August 2, 24

More information

Read this before starting!

Read this before starting! Points missed: Student's Name: Total score: /100 points East Tennessee State University Department of Computer and Information Sciences CSCI 2150 (Tarnoff) Computer Organization TEST 3 for Fall Semester,

More information

Streaming (Multi)media

Streaming (Multi)media Streaming (Multi)media Overview POTS, IN SIP, H.323 Circuit Switched Networks Packet Switched Networks 1 POTS, IN SIP, H.323 Circuit Switched Networks Packet Switched Networks Circuit Switching Connection-oriented

More information

Jimin Xiao, Tammam Tillo, Senior Member, IEEE, Yao Zhao, Senior Member, IEEE

Jimin Xiao, Tammam Tillo, Senior Member, IEEE, Yao Zhao, Senior Member, IEEE Real-Time Video Streaming Using Randomized Expanding Reed-Solomon Code Jimin Xiao, Tammam Tillo, Senior Member, IEEE, Yao Zhao, Senior Member, IEEE Abstract Forward error correction (FEC) codes are widely

More information

Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE e networks

Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE e networks Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE 802.11e networks Seung-Seok Kang 1,1, Yejin Sohn 1, and Eunji Moon 1 1Department of Computer Science, Seoul Women s

More information

Enhanced Play Fair Cipher

Enhanced Play Fair Cipher P Enhanced Play Fair Cipher 1 1 Naveen KMP P, PDepartment of Information Technology, Velammal Engineering College, Chennai, Tamil Nadu, India. Abstract The theme of this research work is to design and

More information

AIT 682: Network and Systems Security

AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 3.1 Secret Key Cryptography Algorithms Instructor: Dr. Kun Sun Outline Introductory Remarks Feistel Cipher DES AES 2 Introduction Secret Keys or Secret Algorithms?

More information

Receiver BER target for 32GFC. Adam Healey February 2013 T11/13-058v0

Receiver BER target for 32GFC. Adam Healey February 2013 T11/13-058v0 Receiver BER target for 32GFC Adam Healey February 2013 T11/13-058v0 Background FC-PI-5, 5.1 The FC-FS-3 protocol is defined to operate across connections having a bit error ratio (BER) detected at the

More information

MULTIPLE LAYERED REED-SOLOMON CODES IN AUDIO DISKS WITH A FEEDBACK SYSTEM SREENIVAS RAO BELAVADI SATISH THESIS

MULTIPLE LAYERED REED-SOLOMON CODES IN AUDIO DISKS WITH A FEEDBACK SYSTEM SREENIVAS RAO BELAVADI SATISH THESIS MULTIPLE LAYERED REED-SOLOMON CODES IN AUDIO DISKS WITH A FEEDBACK SYSTEM BY SREENIVAS RAO BELAVADI SATISH THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Science

More information

Pending Issues. Opera,ng Systems and Networks. Network Lecture 3: Link Layer (1) Where we are in the Course. Scope of the Link Layer

Pending Issues. Opera,ng Systems and Networks. Network Lecture 3: Link Layer (1) Where we are in the Course. Scope of the Link Layer Opera,ng Systems and Networks Network Lecture 3: Link Layer (1) Adrian Perrig Network Security Group ETH Zürich Pending Issues Earlier pos,ng of lecture slides Answering student ques,ons Project 1 is out

More information

E40M. Binary Numbers, Codes. M. Horowitz, J. Plummer, R. Howe 1

E40M. Binary Numbers, Codes. M. Horowitz, J. Plummer, R. Howe 1 E40M Binary Numbers, Codes M. Horowitz, J. Plummer, R. Howe 1 Reading Chapter 5 in the reader A&L 5.6 M. Horowitz, J. Plummer, R. Howe 2 Useless Box Lab Project #2 Adding a computer to the Useless Box

More information

EE 387 course information

EE 387 course information EE 387 course information EE 387, Notes 1, Handout #2 Instructor: John Gill, Packard 266 Textbook: Algebraic Codes for Data Transmission by Richard Blahut Weekly homework, including occasional programming

More information

A Specification for Rijndael, the AES Algorithm

A Specification for Rijndael, the AES Algorithm A Specification for Rijndael, the AES Algorithm. Notation and Conventions. Rijndael Inputs and Outputs The input, output and cipher key for Rijndael are sequences containing 28, 6, 92, 224 or 256 bits

More information

Overview. A Survey of Packet-Loss Recovery Techniques. Outline. Overview. Mbone Loss Characteristics. IP Multicast Characteristics

Overview. A Survey of Packet-Loss Recovery Techniques. Outline. Overview. Mbone Loss Characteristics. IP Multicast Characteristics A Survey of Packet-Loss Recovery Techniques Overview Colin Perkins, Orion Hodson and Vicky Hardman Department of Computer Science University College London (UCL) London, UK IEEE Network Magazine Sep/Oct,

More information

CSE Computer Architecture I Fall 2011 Homework 07 Memory Hierarchies Assigned: November 8, 2011, Due: November 22, 2011, Total Points: 100

CSE Computer Architecture I Fall 2011 Homework 07 Memory Hierarchies Assigned: November 8, 2011, Due: November 22, 2011, Total Points: 100 CSE 30321 Computer Architecture I Fall 2011 Homework 07 Memory Hierarchies Assigned: November 8, 2011, Due: November 22, 2011, Total Points: 100 Problem 1: (30 points) Background: One possible organization

More information

Caterpillar RLNC (CRLNC): A Practical Finite Sliding Window RLNC Approach

Caterpillar RLNC (CRLNC): A Practical Finite Sliding Window RLNC Approach Received August 14, 2017, accepted September 18, 2017, date of publication September 27, 2017, date of current version October 25, 2017. Digital Object Identifier 10.1109/ACCESS.2017.2757241 Caterpillar

More information

Solving Systems of Equations Using Matrices With the TI-83 or TI-84

Solving Systems of Equations Using Matrices With the TI-83 or TI-84 Solving Systems of Equations Using Matrices With the TI-83 or TI-84 Dimensions of a matrix: The dimensions of a matrix are the number of rows by the number of columns in the matrix. rows x columns *rows

More information

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check.

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check. Error Detection Two types Error Detection Codes (e.g. CRC, Parity, Checksums) Error Correction Codes (e.g. Hamming, Reed Solomon) Basic Idea Add redundant information to determine if errors have been introduced

More information

Some portions courtesy Robin Kravets and Steve Lumetta

Some portions courtesy Robin Kravets and Steve Lumetta CSE 123 Computer Networks Fall 2009 Lecture 4: Data-Link I: Framing and Errors Some portions courtesy Robin Kravets and Steve Lumetta Administrative updates I m Im out all next week no lectures, but You

More information

CSE 461: Framing, Error Detection and Correction

CSE 461: Framing, Error Detection and Correction CSE 461: Framing, Error Detection and Correction Next Topics Framing Focus: How does a receiver know where a message begins/ends Error detection and correction Focus: How do we detect and correct messages

More information

10. RS-232C communication

10. RS-232C communication 10. RS-232C communication PB9200(P5XMLA) Connecting the cable (1) Turn off the projector and the computer power supplies. (2) Connect the CONTROL port of the projector with a RS-232C port of the computer

More information

Repair Pipelining for Erasure-Coded Storage

Repair Pipelining for Erasure-Coded Storage Repair Pipelining for Erasure-Coded Storage Runhui Li, Xiaolu Li, Patrick P. C. Lee, Qun Huang The Chinese University of Hong Kong USENIX ATC 2017 1 Introduction Fault tolerance for distributed storage

More information