So you think you can FEC?
|
|
- Damian Hudson
- 5 years ago
- Views:
Transcription
1 So you think you can FEC? Mikhail Misha Fludkov (fludkov) Pexip R&D Erlend Earl Graff (egraff) Pexip R&D 8 th GStreamer Conference 21 October 2017 Prague, Czech Republic
2 Outline Introduction to FEC Designing a FEC decoder element FEC algorithms XOR-based FEC Reed-Solomon FEC DEMO!
3 Bird s eye view on FEC #18 #17 #16 #15 #1 #13 #12 #11 #10 #9 #8 #7 #6 #5 # #3 #2 #1 #0 RTP video or audio packets (VP8, H26, OPUS, etc) FEC packets with redundant data
4 Bird s eye view on FEC #18 #17 #16 #15 #1 #13 #12 #11 #10 #9 #8 #7 #6 #5 # #3 #2 #1 #0
5 FEC standards zoo RED - Redundant Audio Data (RFC 2198) ULPFEC based standards: ULPFEC Generic Forward Error Correction (RFC 5109) ULPFEC (WebRTC) X-ULPFECUC (Skype) FLEX FEC - Flexible Forward Error Correction
6 GStreamer element for packet recovery #6 #5 # #3 #2 #1 #0 FECDec # #3 #2 #1 #0
7 Where to hook it up? Before or after jitterbuffer? here? or here? FECDec GstRtpBin FECDec
8 Where to hook it up? #6 #5 # GstRtpBin # FECDec #3 #2 #1 #0 # Lost event with seq-num #
9 What if it works and recovers packets! Yaaay! send_rtcp_src #6 #5 #3 #2 #1 #0 FECDec GstRtpBin # lost packet was recovered and pushed here
10 Where to hook it up to? Flex FEC case recv_rtp_src_100 #1 #0 #1 #0 #1 #0 #1 #0 GstRtpBin recv_rtp_src_200 #1 #0 recv_rtp_src_300 #1 #0 audio packet with ssrc 100 video packet with ssrc 200 Flex FEC packet with ssrc 300
11 Doing it the right way recv_rtp_src_100 PexFecDec RtpStorage GstRtpBin recv_rtp_src_200 PexFecDec recv_rtp_src_300 PexFecDec # get_packets_for_recovery(ssrc300, seq_num) #6 #5 #3 #2 #0
12 Yet another what if #18 #17 #16 #15 #1 #13 #12 #11 #10 #9 #8 #7 #6 #5 # #3 #2 #1 #0
13 FEC Algorithms XOR-based FEC Reed-Solomon FEC
14 XOR-based FEC
15 XOR-based FEC D1 D2 D3 D R1 R2
16 XOR-based FEC D1 D2 D3 D R1 D1 D2 R2 D1 D2 D3 D
17 XOR-based FEC D1 D2 D3 D R1 D1 D2 R2 D1 D2 D3 D
18 XOR-based FEC D1 x D R1 D1 x R2 D1 x D
19 XOR-based FEC D1 x y D R1 D1 x R2 D1 x y D
20 XOR-based FEC D1 x y D R1 R2 D1 D1 x x y D D1 x R1 y D1 x D R2 R1
21 XOR-based FEC D1 x y D R1 D1 x x D1 R1 R2 D1 x y D y R1 D R2
22 XOR-based FEC D1 D2 D3 D R1 D1 D2 R2 D1 D2 D3 D
23 XOR-based FEC D1 D2 D3 D R1 D1 D2 R2 D1 D2 D3 D
24 XOR-based FEC D1 D2 x R1 D1 D2 R2 D1 D2 x
25 XOR-based FEC D1 D2 x y R1 D1 D2 R2 D1 D2 x y
26 Reed-Solomon codes R-S encoder k data symbols t parity symbols Irving S. Reed and Gustave Solomon R-S erasure decoder Either Detect up to t errors Detect and correct up to t Τ2 Correct up to t erasures errors k symbols (data and/or parity) k original data symbols
27 Reed-Solomon codes Data packets Redundancy packets
28 Reed-Solomon codes d c a d 3d Data packets ee c9 95 a1 9d 21 a3 b a5 aa 16 f b 70 7f b c6 bd e8 cb 02 bf 8c 5d a d7 8b 73 0f 61 5 bf bc d7 cd aa 22 d9 a f6 8 8a 1 c 0a c3 ca f d5 ff d6 a5 f3 e3 5d d3 2 3f 2 a8 1b f c8 cb d e 85 2d d6 Redundancy packets 85 9a b2 76 8f 1 c ee d3 5b fd e0 b0 d a d1 82 b2 dd 0c
29 Reed-Solomon codes 55 Data packets ee 5d 90 Redundancy packets 85
30 Reed-Solomon codes 7 Data packets c9 a 09 Redundancy packets 9a
31 Reed-Solomon codes 56 Data packets 95 d7 d6 Redundancy packets b2
32 Reed-Solomon codes d c a d 3d Data packets ee c9 95 a1 9d 21 a3 b a5 aa 16 f b 70 7f b c6 bd e8 cb 02 bf 8c 5d a d7 8b 73 0f 61 5 bf bc d7 cd aa 22 d9 a f6 8 8a 1 c 0a c3 ca f d5 ff d6 a5 f3 e3 5d d3 2 3f 2 a8 1b f c8 cb d e 85 2d d6 Redundancy packets 85 9a b2 76 8f 1 c ee d3 5b fd e0 b0 d a d1 82 b2 dd 0c
33 Reed-Solomon codes
34 Reed-Solomon codes encoding
35 Reed-Solomon codes encoding 100 Encoding coefficients
36 Reed-Solomon codes encoding 100 Encoding coefficients
37 Reed-Solomon codes encoding 100 Encoding coefficients
38 Reed-Solomon codes encoding 100 Encoding coefficients
39 Reed-Solomon codes encoding 100 Encoding coefficients
40 Reed-Solomon codes encoding 100 Encoding coefficients
41 Reed-Solomon codes encoding 100 Encoding coefficients
42 Reed-Solomon codes encoding 100 Encoding coefficients
43 Reed-Solomon codes encoding 100 Encoding coefficients
44 Reed-Solomon codes encoding 100 Encoding coefficients
45 Reed-Solomon codes decoding 100 Encoding coefficients
46 Reed-Solomon codes decoding 100 Encoding coefficients
47 Reed-Solomon codes decoding 100 Encoding coefficients x x x
48 Reed-Solomon codes decoding 100 Encoding coefficients x y x y 670 x y
49 Reed-Solomon codes decoding 100 Encoding coefficients x y x y x y x 3y x 2y 670
50 Reed-Solomon codes decoding 100 Encoding coefficients x y x y x y x 3y x 2y
51 Reed-Solomon codes decoding 100 Encoding coefficients x y x y x y x 3y x 2y
52 Reed-Solomon codes decoding 100 Encoding coefficients x y x y x y x 3y 130 5x 2y 270
53 Reed-Solomon codes decoding 100 Encoding coefficients x y x y x y x 3y 130 5x 2y 270 3x y 10
54 Reed-Solomon codes decoding 100 Encoding coefficients x y x y x y x 3y 130 5x 2y 270 y 3x 10
55 Reed-Solomon codes decoding 100 Encoding coefficients x y x y x y x 3y 130 5x 2y 270 y 3x 10 2x 3 3x x 9x x 550 x 50
56 Reed-Solomon codes summary Encoding Linear combination (matrix multiplication) Decoding Solving linear equation system (matrix inversion and multiplication)
57 But
58 Linear combinations in R R R R
59 Linear combinations not in R? ,255 0,255 0,255
60 Linear combinations not in R? ,255 0,255 0,255 0,255
61 Fields Set of elements and Given a Ϝ and b Ϝ, then a b Ϝ a b Ϝ R and Q infinite fields Finite fields
62 Fields Z 7Z 0,1,2,3,,5,6 is addition modulo 7 is multiplication modulo 7
63 Fields Multiplication table for Z Τ7Z
64 Fields Multiplication table for Z Τ7Z mod 7
65 Fields Multiplication table for Z Τ7Z mod 7
66 Fields Finite fields p q elements Solving linear equation systems works! Reed-Solomon: typically 2 q elements GF 2 8 0,255
67 Linear MDS codes over Z Τ7Z encoding 1 2 3
68 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients
69 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients
70 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients
71 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients
72 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients
73 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients
74 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients
75 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients
76 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients
77 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients
78 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients
79 Linear MDS codes over Z Τ7Z encoding 1 Encoding coefficients
80 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients
81 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients
82 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients x x x 1 5 2
83 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients x y 5 2 x y 6 x y
84 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients x y x y x y x 3y 5x 2y 6
85 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients x y x y x y x 3y 2 3 5x 2y 6 3
86 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients x y x y x y x 3y 2 3 5x 2y 6 3
87 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients x y x y x y x 3y 2 5x 2y 6 3
88 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients x y x y x y x 3y 6 5x 2y 2
89 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients x y x y x y x 3y 6 5x 2y 2 0x 5y 1
90 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients x y x y x y x 3y 6 5x 2y 2 5y 1
91 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients Multiplication table for Z Τ7Z x y x y x y x 3y 6 5x 2y 2 5y
92 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients Multiplication table for Z Τ7Z x y x y x y x 3y 6 5x 2y 2 5y
93 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients Multiplication table for Z Τ7Z x y x y x y x 3y 6 5x 2y 2 3 5y
94 Linear MDS codes over Z Τ7Z decoding 1 Encoding coefficients Multiplication table for Z Τ7Z x y x y x y x 3y 6 5x 2y 2 y
95 FEC it up! GStreamer elements RED encoder and decoder ULPFEC decoder (XOR and Reed-Solomon) RTPStorage element Reed-Solomon encoder and decoder Only GF 2 8 Matrix operations Cauchy-RS fast matrix inversion SIMD optimizations 1 1 Anvin, H. P. The mathematics of RAID
96 DEMO THYME
97 Benchmarks Reed-Solomon encoding
98 Benchmarks Reed-Solomon decoding
99 Questions? (Do you think we can FEC?)
draft-begen-fecframe-interleaved-fec-scheme-00 IETF 72 July 2008 Ali C. Begen
1-D Interleaved Parity FEC draft-begen-fecframe-interleaved-fec-scheme-00 IETF 72 July 2008 Ali C. Begen abegen@cisco.com Introduction 1-D interleaved parity code Is a systematic FEC code of decent complexity
More informationFast Erasure Coding for Data Storage: A Comprehensive Study of the Acceleration Techniques. Tianli Zhou & Chao Tian Texas A&M University
Fast Erasure Coding for Data Storage: A Comprehensive Study of the Acceleration Techniques Tianli Zhou & Chao Tian Texas A&M University 2 Contents Motivation Background and Review Evaluating Individual
More informationPerformance improvements to peer-to-peer file transfers using network coding
Performance improvements to peer-to-peer file transfers using network coding Aaron Kelley April 29, 2009 Mentor: Dr. David Sturgill Outline Introduction Network Coding Background Contributions Precomputation
More informationCIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1
Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present
More informationCSC310 Information Theory. Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes. November 22, 2006 see
CSC310 Information Theory Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes Sam Roweis Recovering From Erasures 2 How can we recover from erasures? For the BEC, we saw that low-density parity
More informationPacket-Level Forward Error Correction in Video Transmission
Packet-Level Forward Error Correction in Video Transmission Matteo Mazzotti, Enrico Paolini, Marco Chiani, Davide Dardari, and Andrea Giorgetti University of Bologna Wireless Communications Laboratory
More informationCSC310 Information Theory. Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes. November 30, 2005 see
CSC310 Information Theory Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes Sam Roweis Recovering From Erasures 2 How can we recover from erasures? For the BEC, we saw that low-density parity
More informationQuality of Service (QoS) Whitepaper
Quality of Service (QoS) Whitepaper PCS-Series Videoconferencing White Paper www.sonybiz.net/vc Introduction Currently, an estimated 5% of data packets sent over the Internet are lost. In a videoconferencing
More informationEE 6900: FAULT-TOLERANT COMPUTING SYSTEMS
EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS LECTURE 6: CODING THEORY - 2 Fall 2014 Avinash Kodi kodi@ohio.edu Acknowledgement: Daniel Sorin, Behrooz Parhami, Srinivasan Ramasubramanian Agenda Hamming Codes
More information90A John Muir Drive Buffalo, New York Tel: Fax:
Reed Solomon Coding The VOCAL implementation of Reed Solomon (RS) Forward Error Correction (FEC) algorithms is available in several forms. The forms include pure software and software with varying levels
More informationSecret Key Systems (block encoding) Encrypting a small block of text (say 64 bits) General considerations for cipher design:
Secret Key Systems (block encoding) Encrypting a small block of text (say 64 bits) General considerations for cipher design: Secret Key Systems (block encoding) Encrypting a small block of text (say 64
More informationCIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1
Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. Router A Router B Router C Router D Network Next Hop Next Hop Next Hop Next
More informationFECFRAME extension Adding convolutional FEC codes support to the FEC Framework
FECFRAME extension Adding convolutional FEC codes support to the FEC Framework Vincent Roca, Inria, France Ali Begen, Networked Media, Turkey https://datatracker.ietf.org/doc/draft-roca-tsvwg-fecframev2/
More information4. Specifications and Additional Information
4. Specifications and Additional Information AGX52004-1.0 8B/10B Code This section provides information about the data and control codes for Arria GX devices. Code Notation The 8B/10B data and control
More informationCoding theory for scalable media delivery
1 Coding theory for scalable media delivery Michael Luby RaptorQ is a product of Qualcomm Technologies, Inc. Application layer erasure coding complements traditional error coding Forward Error Correction
More informationLink Layer: Error detection and correction
Link Layer: Error detection and correction Topic Some bits will be received in error due to noise. What can we do? Detect errors with codes Correct errors with codes Retransmit lost frames Later Reliability
More informationFinite Math - J-term Homework. Section Inverse of a Square Matrix
Section.5-77, 78, 79, 80 Finite Math - J-term 017 Lecture Notes - 1/19/017 Homework Section.6-9, 1, 1, 15, 17, 18, 1, 6, 9, 3, 37, 39, 1,, 5, 6, 55 Section 5.1-9, 11, 1, 13, 1, 17, 9, 30 Section.5 - Inverse
More informationCS321: Computer Networks Error Detection and Correction
CS321: Computer Networks Error Detection and Correction Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Error Detection and Correction Objective: System must
More informationLec 19 - Error and Loss Control
ECE 5578 Multimedia Communication Lec 19 - Error and Loss Control Zhu Li Dept of CSEE, UMKC Office: FH560E, Email: lizhu@umkc.edu, Ph: x 2346. http://l.web.umkc.edu/lizhu slides created with WPS Office
More informationFORWARD ERROR CORRECTION CODING TECHNIQUES FOR RELIABLE COMMUNICATION SYSTEMS
FORWARD ERROR CORRECTION CODING TECHNIQUES FOR RELIABLE COMMUNICATION SYSTEMS Jyoti Sharma Department of ECE Sri Sai College of Engg. & Technology, Badhani, Punjab, India Priya Department of ECE Sri Sai
More informationIssues related to RID and Simulcast. draft-ietf-mmusic-sdp-simulcast-10 draft-ietf-mmusic-rid-12
Issues related to RID and Simulcast draft-ietf-mmusic-sdp-simulcast-10 draft-ietf-mmusic-rid-12 1 Outline Issues Handling in RID and Simulcast of associated payload types such as Comfort Noise and DTMF
More informationRequest for Comments: 5109 December 2007 Obsoletes: 2733, 3009 Category: Standards Track. RTP Payload Format for Generic Forward Error Correction
Network Working Group A. Li, Ed. Request for Comments: 5109 December 2007 Obsoletes: 2733, 3009 Category: Standards Track RTP Payload Format for Generic Forward Error Correction Status of This Memo This
More informationScreaming Fast Galois Field Arithmetic Using Intel SIMD Instructions. James S. Plank USENIX FAST. University of Tennessee
Screaming Fast Galois Field Arithmetic Using Intel SIMD Instructions James S. Plank University of Tennessee USENIX FAST San Jose, CA February 15, 2013. Authors Jim Plank Tennessee Kevin Greenan EMC/Data
More informationProposal for Robust and Adaptive Forward Error Correction for real-time Audio-Video streaming solutions
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 3, Issue 2 (Sep-Oct. 2012), PP 32-36 Proposal for Robust and Adaptive Forward Error Correction
More informationApplication Layer Hybrid Error Correction in Wireless IP-based DVB-Multicast
Master s Thesis Application Layer Hybrid Error Correction in Wireless IP-based DVB-Multicast Manuel Gorius Supervisor : Prof. Dr.-Ing. Th. Herfet Submitted on : 2007 Saarland University Faculty of Natural
More informationCSCI-1680 Link Layer Reliability Rodrigo Fonseca
CSCI-1680 Link Layer Reliability Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Last time Physical layer: encoding, modulation Link layer framing Today Getting
More informationOptimize Storage Efficiency & Performance with Erasure Coding Hardware Offload. Dror Goldenberg VP Software Architecture Mellanox Technologies
Optimize Storage Efficiency & Performance with Erasure Coding Hardware Offload Dror Goldenberg VP Software Architecture Mellanox Technologies SNIA Legal Notice The material contained in this tutorial is
More informationParallel Reed/Solomon Coding on Multicore Processors
/ 8 Parallel Reed/Solomon Coding on Multicore Processors Peter Sobe Institute of Computer Engineering University of Luebeck, Germany sobe@iti.uni-luebeck.de currently at Institute of Computer Science University
More informationChapter 4: Implicit Error Detection
4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup
More informationModern Erasure Codes for Distributed Storage Systems
Modern Erasure Codes for Distributed Storage Systems Srinivasan Narayanamurthy (Srini) NetApp Everything around us is changing! r The Data Deluge r Disk capacities and densities are increasing faster than
More informationENGI 8868/9877 Computer and Communications Security III. BLOCK CIPHERS. Symmetric Key Cryptography. insecure channel
(a) Introduction - recall symmetric key cipher: III. BLOCK CIPHERS k Symmetric Key Cryptography k x e k y yʹ d k xʹ insecure channel Symmetric Key Ciphers same key used for encryption and decryption two
More informationGateway Ascii Command Protocol
Gateway Ascii Command Protocol Table Of Contents Introduction....2 Ascii Commands.....3 Messages Received From The Gateway....3 Button Down Message.....3 Button Up Message....3 Button Maintain Message....4
More informationCIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1
Version 1 1. (20 Points) Given the class A network address 119.0.0.0 will be divided into a maximum of 15,900 subnets. a. (5 Points) How many bits will be necessary to address the 15,900 subnets? b. (5
More informationLatency and Loss Requirements! Receiver-side Buffering! Dealing with Loss! Loss Recovery!
Cumulative data! Latency and Loss Requirements! Fundamental characteristics of multimedia applications:! Typically delay sensitive!! live audio < 150 msec end-to-end delay is not perceptible!! 150-400
More informationModern Erasure Codes for Distributed Storage Systems
Modern Erasure Codes for Distributed Storage Systems Storage Developer Conference, SNIA, Bangalore Srinivasan Narayanamurthy Advanced Technology Group, NetApp May 27 th 2016 1 Everything around us is changing!
More informationErasure coding and AONT algorithm selection for Secure Distributed Storage. Alem Abreha Sowmya Shetty
Erasure coding and AONT algorithm selection for Secure Distributed Storage Alem Abreha Sowmya Shetty Secure Distributed Storage AONT(All-Or-Nothing Transform) unkeyed transformation φ mapping a sequence
More informationInternational Journal of Innovations in Engineering and Technology (IJIET)
RTL Design and Implementation of Erasure Code for RAID system Chethan.K 1, Dr.Srividya.P 2, Mr.Sivashanmugam Krishnan 3 1 PG Student, Department Of ECE, R. V. College Engineering, Bangalore, India. 2 Associate
More informationA Performance Evaluation of Open Source Erasure Codes for Storage Applications
A Performance Evaluation of Open Source Erasure Codes for Storage Applications James S. Plank Catherine D. Schuman (Tennessee) Jianqiang Luo Lihao Xu (Wayne State) Zooko Wilcox-O'Hearn Usenix FAST February
More informationLecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission
1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission
More informationHigh Level View. EE 122: Error detection and reliable transmission. Overview. Error Detection
High Level View EE 22: Error detection and reliable transmission Ion Stoica September 6, 22 Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise Solution
More informationCSCI-1680 Link Layer Reliability John Jannotti
CSCI-1680 Link Layer Reliability John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Roadmap Last time Physical layer: encoding, modulation Link layer framing Today
More informationCIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1
Version 1 1. (20 Points) Given the class A network address 117.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 4,000 subnets? b. (5 Points) What is
More information6.1 Combinational Circuits. George Boole ( ) Claude Shannon ( )
6. Combinational Circuits George Boole (85 864) Claude Shannon (96 2) Signals and Wires Digital signals Binary (or logical ) values: or, on or off, high or low voltage Wires. Propagate digital signals
More informationEE 122: Error detection and reliable transmission. Ion Stoica September 16, 2002
EE 22: Error detection and reliable transmission Ion Stoica September 6, 2002 High Level View Goal: transmit correct information Problem: bits can get corrupted - Electrical interference, thermal noise
More informationCIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1
Version 1 Instructions Write your name on the exam paper. Write your name and version number on the top of the yellow paper. Answer Question 1 on the exam paper. Answer Questions 2-4 on the yellow paper.
More informationFPGA Implementation of Erasure Codes in NVMe based JBOFs
FPGA Implementation of Erasure Codes in NVMe based JBOFs Manoj Roge Director, Data Center Xilinx Inc. Santa Clara, CA 1 Acknowledgement Shre Shah Data Center Architect, Xilinx Santa Clara, CA 2 Agenda
More informationCSEP 561 Error detection & correction. David Wetherall
CSEP 561 Error detection & correction David Wetherall djw@cs.washington.edu Codes for Error Detection/Correction ti ti Error detection and correction How do we detect and correct messages that are garbled
More informationBuilding High Speed Erasure Coding Libraries for ARM and x86 Processors. Per Simonsen, CEO, MemoScale May 2017
Building High Speed Erasure Coding Libraries for ARM and x86 Processors Per Simonsen, CEO, MemoScale May 2017 Agenda MemoScale company and team Erasure coding - brief intro MemoScale erasure codes Performance
More informationOne subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity.
FEAL-NX SPECIFICATIONS 1 Introduction 1.1 Outline of the FEAL-NX cipher FEAL, the Fast Data Encipherment Algorithm, is a 64-bit block cipher algorithm that enciphers 64-bit plaintexts into 64-bit ciphertexts
More informationNetworked Systems and Services, Fall 2018 Chapter 2. Jussi Kangasharju Markku Kojo Lea Kutvonen
Networked Systems and Services, Fall 2018 Chapter 2 Jussi Kangasharju Markku Kojo Lea Kutvonen Outline Physical layer reliability Low level reliability Parities and checksums Cyclic Redundancy Check (CRC)
More informationCSCI-1680 Link Layer I Rodrigo Fonseca
CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames
More information6. Specifications & Additional Information
6. Specifications & Additional Information SIIGX52004-3.1 Transceier Blocks Table 6 1 shows the transceier blocks for Stratix II GX and Stratix GX deices and compares their features. Table 6 1. Stratix
More informationOn the Speedup of Single-Disk Failure Recovery in XOR-Coded Storage Systems: Theory and Practice
On the Speedup of Single-Disk Failure Recovery in XOR-Coded Storage Systems: Theory and Practice Yunfeng Zhu, Patrick P. C. Lee, Yuchong Hu, Liping Xiang, and Yinlong Xu University of Science and Technology
More informationC1098 JPEG Module User Manual
C1098 JPEG Module User Manual General Description C1098 is VGA camera module performs as a JPEG compressed still camera that can be attached to a wireless or PDA host. Users can send out a snapshot command
More informationEC-Bench: Benchmarking Onload and Offload Erasure Coders on Modern Hardware Architectures
EC-Bench: Benchmarking Onload and Offload Erasure Coders on Modern Hardware Architectures Haiyang Shi, Xiaoyi Lu, and Dhabaleswar K. (DK) Panda {shi.876, lu.932, panda.2}@osu.edu The Ohio State University
More informationRobust Transmission of MPEG Video Streams over Lossy Packet-Switching Networks by using PET *
Robust Transmission of MPEG Video Streams over Lossy Packet-Switching Networks by using PET * Andres Albanese 1 and Giancarlo Fortino 1,2 1 International Computer Science Institute, Berkeley, CA, USA 2
More informationIntelligent RAID 6 Theory Overview and Implementation
White Paper RAID 6 Intel Storage Building Blocks Intelligent RAID 6 Theory Overview and Implementation www.intel.com/design/ storage/intelligent_raid.htm 2 Abstract RAID 5 systems are commonly deployed
More informationLecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1
Lecture 5 Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting
More informationCode-Based Cryptography Error-Correcting Codes and Cryptography
Code-Based Cryptography Error-Correcting Codes and Cryptography I. Márquez-Corbella 0 1. Error-Correcting Codes and Cryptography 1. Introduction I - Cryptography 2. Introduction II - Coding Theory 3. Encoding
More informationLecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn
Lecture 6: Reliable Transmission CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6 Overview Finishing Error Detection Cyclic Remainder Check (CRC) Handling errors Automatic Repeat
More informationFAULT TOLERANT SYSTEMS
FAULT TOLERANT SYSTEMS http://www.ecs.umass.edu/ece/koren/faulttolerantsystems Part 6 Coding I Chapter 3 Information Redundancy Part.6.1 Information Redundancy - Coding A data word with d bits is encoded
More informationFundamentals of Cryptography
Fundamentals of Cryptography Topics in Quantum-Safe Cryptography June 23, 2016 Part III Data Encryption Standard The Feistel network design m m 0 m 1 f k 1 1 m m 1 2 f k 2 2 DES uses a Feistel network
More informationECHO Process Instrumentation, Inc. Modbus RS485 Module. Operating Instructions. Version 1.0 June 2010
ECHO Process Instrumentation, Inc. Modbus RS485 Module Operating Instructions Version 1.0 June 2010 ECHO Process Instrumentation, Inc. PO Box 800 Shalimar, FL 32579 PH: 850-609-1300 FX: 850-651-4777 EM:
More informationUNH-IOL MIPI Alliance Test Program
DSI Receiver Protocol Conformance Test Report UNH-IOL 121 Technology Drive, Suite 2 Durham, NH 03824 +1-603-862-0090 mipilab@iol.unh.edu +1-603-862-0701 Engineer Name engineer@company.com Panel Company
More informationA Complete Treatment of Software Implementations of Finite Field Arithmetic for Erasure Coding Applications
A Complete Treatment of Software Implementations of Finite Field Arithmetic for Erasure Coding Applications James S. Plank Kevin M. Greenan Ethan L. Miller University of Tennessee Technical Report UT-CS-13-717
More informationCIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1
Version 1 1. (20 Points) Given the class A network address 121.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 8,100 subnets? b. (5 Points) What is
More informationCIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1
Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. NOTE: Router E should only be used for Internet traffic. Router A Router
More informationHPSS RAIT. A high performance, resilient, fault-tolerant tape data storage class. 1
HPSS RAIT A high performance, resilient, fault-tolerant tape data storage class http://www.hpss-collaboration.org 1 Why RAIT? HPSS supports striped tape without RAIT o Conceptually similar to RAID 0 o
More informationCIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1
Version 1 Instructions 1. Write your name and version number on the top of the yellow paper and the routing tables sheet. 2. Answer Question 2 on the routing tables sheet. 3. Answer Questions 1, 3, 4,
More informationClose-form and Matrix En/Decoding Evaluation on Different Erasure Codes
UNIVERSITY OF MINNESOTA-TWIN CITIES Close-form and Matrix En/Decoding Evaluation on Different Erasure Codes by Zhe Zhang A thesis submitted in partial fulfillment for the degree of Master of Science in
More informationCSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 4: Data-Link I: Framing and Errors Some portions courtesy Robin Kravets and Steve Lumetta Last time How protocols are organized & why Network layer Data-link
More informationHADOOP 3.0 is here! Dr. Sandeep Deshmukh Sadepach Labs Pvt. Ltd. - Let us grow together!
HADOOP 3.0 is here! Dr. Sandeep Deshmukh sandeep@sadepach.com Sadepach Labs Pvt. Ltd. - Let us grow together! About me BE from VNIT Nagpur, MTech+PhD from IIT Bombay Worked with Persistent Systems - Life
More informationScreaming Fast Galois Field Arithmetic Using Intel SIMD Instructions
Screaming Fast Galois Field Arithmetic Using Intel SIMD Instructions Ethan L. Miller Center for Research in Storage Systems University of California, Santa Cruz (and Pure Storage) Authors Jim Plank Univ.
More informationCommunications guide. Line Distance Protection System * F1* GE Digital Energy. Title page
Title page GE Digital Energy D90 Plus Line Distance Protection System Communications guide D90 Plus firmware revision:.9x GE publication code: 60-9070-F (GEK-3469) GE Digital Energy 650 Markland Street
More informationHD Radio Air Interface Design Description Advanced Application Services Transport Rev. G August 23, 2011
HD Radio Air Interface Design Description Advanced Application Services Transport Rev. G August 23, 2011 SY_IDD_1019s TRADEMARKS HD Radio and the HD, HD Radio, and Arc logos are proprietary trademarks
More informationCSN Telecommunications. 5: Error Coding. Data, Audio, Video and Images Prof Bill Buchanan
CSN874 Telecommunications 5: Error Coding Data, Audio, Video and Images http://asecuritysite.com/comms Prof Bill Buchanan CSN874 Telecommunications 5: Error Coding: Modulo-2 Data, Audio, Video and Images
More informationRS 232 PINOUTS. 1. We use RJ12 for all of our RS232 interfaces (Link-2-Modbus & Link-2-PC- Serial/RS232). The diagram below shows our pin out.
RS 232 PINOUTS 1. We use RJ12 for all of our RS232 interfaces (Link-2-Modbus & Link-2-PC- Serial/RS232). The diagram below shows our pin out. 2. A DB9 Female to RJ12 Female Serial/Terminal Modular Adaptor
More informationCSCI 454/554 Computer and Network Security. Topic 3.1 Secret Key Cryptography Algorithms
CSCI 454/554 Computer and Network Security Topic 3.1 Secret Key Cryptography Algorithms Outline Introductory Remarks Feistel Cipher DES AES 2 Introduction Secret Keys or Secret Algorithms? Security by
More informationAll About Erasure Codes: - Reed-Solomon Coding - LDPC Coding. James S. Plank. ICL - August 20, 2004
All About Erasure Codes: - Reed-Solomon Coding - LDPC Coding James S. Plank Logistical Computing and Internetworking Laboratory Department of Computer Science University of Tennessee ICL - August 2, 24
More informationRead this before starting!
Points missed: Student's Name: Total score: /100 points East Tennessee State University Department of Computer and Information Sciences CSCI 2150 (Tarnoff) Computer Organization TEST 3 for Fall Semester,
More informationStreaming (Multi)media
Streaming (Multi)media Overview POTS, IN SIP, H.323 Circuit Switched Networks Packet Switched Networks 1 POTS, IN SIP, H.323 Circuit Switched Networks Packet Switched Networks Circuit Switching Connection-oriented
More informationJimin Xiao, Tammam Tillo, Senior Member, IEEE, Yao Zhao, Senior Member, IEEE
Real-Time Video Streaming Using Randomized Expanding Reed-Solomon Code Jimin Xiao, Tammam Tillo, Senior Member, IEEE, Yao Zhao, Senior Member, IEEE Abstract Forward error correction (FEC) codes are widely
More informationImproving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE e networks
Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE 802.11e networks Seung-Seok Kang 1,1, Yejin Sohn 1, and Eunji Moon 1 1Department of Computer Science, Seoul Women s
More informationEnhanced Play Fair Cipher
P Enhanced Play Fair Cipher 1 1 Naveen KMP P, PDepartment of Information Technology, Velammal Engineering College, Chennai, Tamil Nadu, India. Abstract The theme of this research work is to design and
More informationAIT 682: Network and Systems Security
AIT 682: Network and Systems Security Topic 3.1 Secret Key Cryptography Algorithms Instructor: Dr. Kun Sun Outline Introductory Remarks Feistel Cipher DES AES 2 Introduction Secret Keys or Secret Algorithms?
More informationReceiver BER target for 32GFC. Adam Healey February 2013 T11/13-058v0
Receiver BER target for 32GFC Adam Healey February 2013 T11/13-058v0 Background FC-PI-5, 5.1 The FC-FS-3 protocol is defined to operate across connections having a bit error ratio (BER) detected at the
More informationMULTIPLE LAYERED REED-SOLOMON CODES IN AUDIO DISKS WITH A FEEDBACK SYSTEM SREENIVAS RAO BELAVADI SATISH THESIS
MULTIPLE LAYERED REED-SOLOMON CODES IN AUDIO DISKS WITH A FEEDBACK SYSTEM BY SREENIVAS RAO BELAVADI SATISH THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Science
More informationPending Issues. Opera,ng Systems and Networks. Network Lecture 3: Link Layer (1) Where we are in the Course. Scope of the Link Layer
Opera,ng Systems and Networks Network Lecture 3: Link Layer (1) Adrian Perrig Network Security Group ETH Zürich Pending Issues Earlier pos,ng of lecture slides Answering student ques,ons Project 1 is out
More informationE40M. Binary Numbers, Codes. M. Horowitz, J. Plummer, R. Howe 1
E40M Binary Numbers, Codes M. Horowitz, J. Plummer, R. Howe 1 Reading Chapter 5 in the reader A&L 5.6 M. Horowitz, J. Plummer, R. Howe 2 Useless Box Lab Project #2 Adding a computer to the Useless Box
More informationEE 387 course information
EE 387 course information EE 387, Notes 1, Handout #2 Instructor: John Gill, Packard 266 Textbook: Algebraic Codes for Data Transmission by Richard Blahut Weekly homework, including occasional programming
More informationA Specification for Rijndael, the AES Algorithm
A Specification for Rijndael, the AES Algorithm. Notation and Conventions. Rijndael Inputs and Outputs The input, output and cipher key for Rijndael are sequences containing 28, 6, 92, 224 or 256 bits
More informationOverview. A Survey of Packet-Loss Recovery Techniques. Outline. Overview. Mbone Loss Characteristics. IP Multicast Characteristics
A Survey of Packet-Loss Recovery Techniques Overview Colin Perkins, Orion Hodson and Vicky Hardman Department of Computer Science University College London (UCL) London, UK IEEE Network Magazine Sep/Oct,
More informationCSE Computer Architecture I Fall 2011 Homework 07 Memory Hierarchies Assigned: November 8, 2011, Due: November 22, 2011, Total Points: 100
CSE 30321 Computer Architecture I Fall 2011 Homework 07 Memory Hierarchies Assigned: November 8, 2011, Due: November 22, 2011, Total Points: 100 Problem 1: (30 points) Background: One possible organization
More informationCaterpillar RLNC (CRLNC): A Practical Finite Sliding Window RLNC Approach
Received August 14, 2017, accepted September 18, 2017, date of publication September 27, 2017, date of current version October 25, 2017. Digital Object Identifier 10.1109/ACCESS.2017.2757241 Caterpillar
More informationSolving Systems of Equations Using Matrices With the TI-83 or TI-84
Solving Systems of Equations Using Matrices With the TI-83 or TI-84 Dimensions of a matrix: The dimensions of a matrix are the number of rows by the number of columns in the matrix. rows x columns *rows
More informationError Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check.
Error Detection Two types Error Detection Codes (e.g. CRC, Parity, Checksums) Error Correction Codes (e.g. Hamming, Reed Solomon) Basic Idea Add redundant information to determine if errors have been introduced
More informationSome portions courtesy Robin Kravets and Steve Lumetta
CSE 123 Computer Networks Fall 2009 Lecture 4: Data-Link I: Framing and Errors Some portions courtesy Robin Kravets and Steve Lumetta Administrative updates I m Im out all next week no lectures, but You
More informationCSE 461: Framing, Error Detection and Correction
CSE 461: Framing, Error Detection and Correction Next Topics Framing Focus: How does a receiver know where a message begins/ends Error detection and correction Focus: How do we detect and correct messages
More information10. RS-232C communication
10. RS-232C communication PB9200(P5XMLA) Connecting the cable (1) Turn off the projector and the computer power supplies. (2) Connect the CONTROL port of the projector with a RS-232C port of the computer
More informationRepair Pipelining for Erasure-Coded Storage
Repair Pipelining for Erasure-Coded Storage Runhui Li, Xiaolu Li, Patrick P. C. Lee, Qun Huang The Chinese University of Hong Kong USENIX ATC 2017 1 Introduction Fault tolerance for distributed storage
More information