Coding with Constraints: Different Flavors

Size: px
Start display at page:

Download "Coding with Constraints: Different Flavors"

Transcription

1 Coding with Constraints: Different Flavors Hoang Dau 1 University of Illinois at Urbana-Champaign hoangdau@uiuc.edu DIMACS Workshop on Network Coding: the Next 15 Years Rutgers University, NJ, 2015

2 Part I Coding with Constraints: A Quick Survey

3 Coding with Constraints: Definition c 1 x 1 c 2 k data symbols x 2 ENCODED n coded symbols x k c n CONVENTIONAL CODE c j = c j (x 1, x 2,, x k ) 3

4 Coding with Constraints: Definition c 1 x 1 c 2 k data symbols x 2 ENCODED n coded symbols x k c n CONVENTIONAL CODE c j = c j (x 1, x 2,, x k ) CODE WITH CONSTRAINTS c j = c j ({x i : i C j }), C j {1,2,, k} 4

5 Coding with Constraints: Example x 1 c 1 c 2 = c 1 (x 1, x 2 ) = c 2 (x 1, x 3 ) x 2 c 3 = c 3 (x 2 ) x 3 c 4 c 5 = c 4 (x 2, x 3 ) = c 5 (x 1, x 3 ) 5

6 Coding with Constraints: Example x 1 c 1 c 2 = c 1 (x 1, x 2 ) = c 2 (x 1, x 3 ) x 2 c 3 = c 3 (x 2 ) x 3 c 4 c 5 = c 4 (x 2, x 3 ) = c 5 (x 1, x 3 ) Linear code: c 1, c 2, c 3, c 4, c 5 = x 1, x 2, x 3 G where the generator matrix G is?? 0 0? G =? 0?? 0 0? 0?? 6

7 Coding with Constraints: Main Problem Given the constraints c j = c j ({x i : i C j }), C j {1,2,, k} how to construct codes that achieve the optimal minimum distance over small field size q poly n

8 Coding with Constraints: Main Problem Given the constraints c j = c j ({x i : i C j }), C j {1,2,, k} how to construct codes that achieve the optimal minimum distance over small field size q poly n Linear case: given G =?? 0 0?? 0?? 0 0? 0?? how to replace? -entries by elements of F q (q poly(n)) so that G generate a code with optimal distance

9 Coding with Constraints: Upper Bound Upper Bound (Halbawi-Thill-Hassibi 15, Song-Dau-Yuen 15) d d max = 1 + min ( i I R i I ) I 1,,k where R i = {j: i C j }

10 Coding with Constraints: Upper Bound Upper Bound (Halbawi-Thill-Hassibi 15, Song-Dau-Yuen 15) d d max = 1 + min ( i I R i I ) I 1,,k where R i = {j: i C j } Properties d max can be found in time poly(n) codes with d = d max always exists over fields of size n d 1

11 Coding with Constraints: Upper Bound Upper Bound (Halbawi-Thill-Hassibi 15, Song-Dau-Yuen 15) d d max = 1 + min ( i I R i I ) I 1,,k where R i = {j: i C j } Properties d max can be found in time poly(n) codes with d = d max always exists over fields of size n d 1 Question of interest: how about fields of size poly(n)?

12 Coding with Constraints: Review (Small field) MDS Case: d max = n k + 1 Optimal codes exist in a few special cases (Halbawi-Ho-Yao- Duursma 14, Dau-Song-Yuen 14, Yan-Sprintson-Zelenko 14)

13 Coding with Constraints: Review (Small field) MDS Case: d max = n k + 1 Optimal codes exist in a few special cases (Halbawi-Ho-Yao- Duursma 14, Dau-Song-Yuen 14, Yan-Sprintson-Zelenko 14) k 4 (every n)

14 Coding with Constraints: Review (Small field) MDS Case: d max = n k + 1 Optimal codes exist in a few special cases (Halbawi-Ho-Yao- Duursma 14, Dau-Song-Yuen 14, Yan-Sprintson-Zelenko 14) k 4 (every n) rows of G partitioned into 3 groups, each has same? -pattern

15 Coding with Constraints: Review (Small field) MDS Case: d max = n k + 1 Optimal codes exist in a few special cases (Halbawi-Ho-Yao- Duursma 14, Dau-Song-Yuen 14, Yan-Sprintson-Zelenko 14) k 4 (every n) rows of G partitioned into 3 groups, each has same? -pattern rows have k 1 zeros & 2 different rows share 1 common zeros

16 Coding with Constraints: Review (Small field) MDS Case: d max = n k + 1 Optimal codes exist in a few special cases (Halbawi-Ho-Yao- Duursma 14, Dau-Song-Yuen 14, Yan-Sprintson-Zelenko 14) k 4 (every n) rows of G partitioned into 3 groups, each has same? -pattern rows have k 1 zeros & 2 different rows share 1 common zeros General Case (Halbawi-Thill-Hassibi 15): d max n k + 1

17 Coding with Constraints: Review (Small field) MDS Case: d max = n k + 1 Optimal codes exist in a few special cases (Halbawi-Ho-Yao- Duursma 14, Dau-Song-Yuen 14, Yan-Sprintson-Zelenko 14) k 4 (every n) rows of G partitioned into 3 groups, each has same? -pattern rows have k 1 zeros & 2 different rows share 1 common zeros General Case (Halbawi-Thill-Hassibi 15): d max n k + 1 Optimal codes exist if there are d max 1 indices j s where C j = k

18 Coding with Constraints: Review (Small field) MDS Case: d max = n k + 1 Optimal codes exist in a few special cases (Halbawi-Ho-Yao- Duursma 14, Dau-Song-Yuen 14, Yan-Sprintson-Zelenko 14) k 4 (every n) rows of G partitioned into 3 groups, each has same? -pattern rows have k 1 zeros & 2 different rows share 1 common zeros General Case (Halbawi-Thill-Hassibi 15): d max n k + 1 Optimal codes exist if there are d max 1 indices j s where C j = k Optimal systematic codes always exists (smaller bound d sys d max )

19 Coding with Constraints: Review (Small field) MDS Case: d max = n k + 1 Optimal codes exist in a few special cases (Halbawi-Ho-Yao- Duursma 14, Dau-Song-Yuen 14, Yan-Sprintson-Zelenko 14) k 4 (every n) rows of G partitioned into 3 groups, each has same? -pattern rows have k 1 zeros & 2 different rows share 1 common zeros General Case (Halbawi-Thill-Hassibi 15): d max n k + 1 Optimal codes exist if there are d max 1 indices j s where C j = k Optimal systematic codes always exists (smaller bound d sys d max ) Common Technique: Reed-Solomon (sub-) code

20 Coding with Constraints: Review Common Technique: Reed-Solomon (sub-) code x 1 c 1 c 2 = c 1 (x 1, x 2 ) = c 2 (x 1, x 3 ) x 2 c 3 = c 3 (x 2 ) x 3 c 4 c 5 = c 4 (x 2, x 3 ) = c 5 (x 1, x 3 ) G =?? 0 0?? 0?? 0 0? 0??

21 Coding with Constraints: Review Common Technique: Reed-Solomon (sub-) code x 1 c 1 c 2 = c 1 (x 1, x 2 ) = c 2 (x 1, x 3 ) x 2 c 3 = c 3 (x 2 ) x 3 c 4 c 5 = c 4 (x 2, x 3 ) = c 5 (x 1, x 3 ) G = α 1 α 2 α 3 α 4 α 5?? 0 0?? 0?? 0 0? 0??

22 Coding with Constraints: Review Common Technique: Reed-Solomon (sub-) code x 1 c 1 c 2 = c 1 (x 1, x 2 ) = c 2 (x 1, x 3 ) x 2 c 3 = c 3 (x 2 ) x 3 c 4 c 5 = c 4 (x 2, x 3 ) = c 5 (x 1, x 3 ) G = α 1 α 2 α 3 α 4 α 5?? 0 0?? 0?? 0 0? 0?? = f 1 (α 1 ) f 1 (α 2 ) 0 0 f 1 (α 5 ) f 2 (α 1 ) 0 f 2 (α 3 ) f 2 (α 4 ) 0 0 f 3 (α 2 ) 0 f 3 (α 4 ) f 3 (α 5 )

23 Coding with Constraints: Review Common Technique: Reed-Solomon (sub-) code x 1 c 1 c 2 = c 1 (x 1, x 2 ) = c 2 (x 1, x 3 ) x 2 c 3 = c 3 (x 2 ) x 3 c 4 c 5 = c 4 (x 2, x 3 ) = c 5 (x 1, x 3 ) G = α 1 α 2 α 3 α 4 α 5?? 0 0?? 0?? 0 0? 0?? = f 1 (α 1 ) f 1 (α 2 ) 0 0 f 1 (α 5 ) f 2 (α 1 ) 0 f 2 (α 3 ) f 2 (α 4 ) 0 0 f 3 (α 2 ) 0 f 3 (α 4 ) f 3 (α 5 ) Difficulty: G may not be full rank

24 Part II: Joint Design of Different MDS Codes (joint work with H. Kiah, W. Song, and C. Yuen)

25 MDS Codes for Distributed Storage x 1 c 1 c 2 MDS: tolerate any n k node failures k data symbols x 2 Encoded n coded symbols x k c n Facebook: Reed-Solomon n = 14, k = 10 25

26 Question of Interest If two (or more) independent DSS share some common data, can we jointly design the corresponding MDS codes to get a better overall failure protection?

27 Question of Interest If two (or more) independent DSS share some common data, can we jointly design the corresponding MDS codes to get a better overall failure protection? Local Subcode 1 Tolerate 1 node failure x 1 x 2 4,3 MDS c 1 c 2 c 3 = x 1 + x 2 + x 3 = x 1 + 2x 2 + 4x 3 = x 1 + 3x 2 + 2x 3 x 3 Local distance d 1 = 2 c 4 = x 1 + 4x 2 + 2x 3 Code has minimum distance d: tolerate d 1 node failures 27

28 Question of Interest If two (or more) independent DSS share some common data, can we jointly design the corresponding MDS codes to get a better overall failure protection? Local Subcode 1 Tolerate 1 node failure x 1 x 2 4,3 MDS c 1 c 2 c 3 = x 1 + x 2 + x 3 = x 1 + 2x 2 + 4x 3 = x 1 + 3x 2 + 2x 3 x 3 Local distance d 1 = 2 c 4 = x 1 + 4x 2 + 2x 3 Local Subcode 2 c 5 = x 2 + x 3 + x 4 + x 5 x 2 c 6 = x 2 + 2x 3 + 4x 4 + x 5 Tolerate 2 node failures x 3 x 4 x 5 6,4 MDS Local distance d 2 = 3 c 7 c 8 c 9 c 10 = x 2 + 3x 3 + 2x 4 + 6x 5 = x 2 + 4x 3 + 2x 4 + x 5 = x 2 + 5x 3 + 4x 4 + 6x 5 = x 2 + 6x 3 + x 4 + 6x 5 Code has minimum distance d: tolerate d 1 node failures 28

29 Question of Interest If two (or more) independent DSS share some common data, can we jointly design the corresponding MDS codes to get a better overall failure protection? Local Subcode 1 Tolerate 3 node failures Tolerate 1 node failure Tolerate 2 node failures x 1 x 2 x 3 4,3 MDS Local distance d 1 = 2 Local Subcode 2 x 2 x 3 x 4 x 5 6,4 MDS Local distance d 2 = 3 c 1 c 2 c 3 c 4 c 5 c 6 c 7 c 8 c 9 c 10 = x 1 + x 2 + x 3 = x 1 + 2x 2 + 4x 3 = x 1 + 3x 2 + 2x 3 = x 1 + 4x 2 + 2x 3 = x 2 + x 3 + x 4 + x 5 = x 2 + 2x 3 + 4x 4 + x 5 = x 2 + 3x 3 + 2x 4 + 6x 5 = x 2 + 4x 3 + 2x 4 + x 5 = x 2 + 5x 3 + 4x 4 + 6x 5 = x 2 + 6x 3 + x 4 + 6x 5 Global minimum distance d = 4 Code has minimum distance d: tolerate d 1 node failures 29

30 Upper Bound for Global Minimum Distance For linear code where G = c 1, c 2,, c 10 = x 1, x 2,, x 6 G???? ???????????????????? ?????? ??????

31 Upper Bound for Global Minimum Distance For linear code where G = c 1, c 2,, c 10 = x 1, x 2,, x 6 G???? ???????????????????? ?????? ?????? Goal: replace? -entries with F q -elements so that

32 Upper Bound for Global Minimum Distance For linear code where [4,3]-MDS G = c 1, c 2,, c 10 = x 1, x 2,, x 6 G???? ???????????????????? ?????? ?????? [6,4]-MDS Goal: replace? -entries with F q -elements so that two local subcodes are MDS (additional requirement)

33 Upper Bound for Global Minimum Distance For linear code where [4,3]-MDS G = c 1, c 2,, c 10 = x 1, x 2,, x 6 G???? ???????????????????? ?????? ?????? [6,4]-MDS Goal: replace? -entries with F q -elements so that two local subcodes are MDS (additional requirement) the global code has optimal distance (same as coding with constraints)

34 Upper Bound for Global Minimum Distance For linear code where [4,3]-MDS G = c 1, c 2,, c 10 = x 1, x 2,, x 6 G???? ???????????????????? ?????? ?????? [6,4]-MDS Goal: replace? -entries with F q -elements so that two local subcodes are MDS (additional requirement) the global code has optimal distance (same as coding with constraints) Same cut-set bound apply & codes over large fields achieve this bound d d max = 1 + min ( i I R i I ) I 1,,k

35 Upper Bound for Global Minimum Distance: Two Local Subcodes d d max = 1 + t + min n 1 k 1, n 2 k 2 t = #{common x i }

36 Upper Bound for Global Minimum Distance: Two Local Subcodes d d max = 1 + t + min n 1 k 1, n 2 k 2 t = #{common x i } Local Subcode 1 x 1 c 1 = x 1 + x 2 + x 3 n 1 = 4, k 1 = 3 t = x 2, x 3 = 2 n 2 = 6, k 2 = 4 x 2 x 3 4,3 MDS Local distance d 1 = 2 Local Subcode 2 x 2 x 3 x 4 x 5 6,4 MDS Local distance d 2 = 3 c 2 c 3 c 4 c 5 c 6 c 7 c 8 c 9 c 10 = x 1 + 2x 2 + 4x 3 = x 1 + 3x 2 + 2x 3 = x 1 + 4x 2 + 2x 3 = x 2 + x 3 + x 4 + x 5 = x 2 + 2x 3 + 4x 4 + x 5 = x 2 + 3x 3 + 2x 4 + 6x 5 = x 2 + 4x 3 + 2x 4 + x 5 = x 2 + 5x 3 + 4x 4 + 6x 5 = x 2 + 6x 3 + x 4 + 6x 5 Global minimum distance d = 4 In this example: d min 4 3, 6 4 = 4 -> optimal code here 36

37 Generator Matrix Representation 1 st code: G 1 = = U A Local Subcode 1 x 1 x 2 4,3 MDS c 1 c 2 c 3 = x 1 + x 2 + x 3 = x 1 + 2x 2 + 4x 3 = x 1 + 3x 2 + 2x 3 x 3 Local distance d 1 = 2 c 4 = x 1 + 4x 2 + 2x 3 37

38 Generator Matrix Representation 1 st code: G 1 = 2 nd code: G 2 = = U A = B V Local Subcode 1 x 1 x 2 x 3 4,3 MDS Local distance d 1 = 2 Local Subcode 2 x 2 c 1 c 2 c 3 c 4 c 5 c 6 = x 1 + x 2 + x 3 = x 1 + 2x 2 + 4x 3 = x 1 + 3x 2 + 2x 3 = x 1 + 4x 2 + 2x 3 = x 2 + x 3 + x 4 + x 5 = x 2 + 2x 3 + 4x 4 + x 5 x 3 x 4 6,4 MDS c 7 c 8 = x 2 + 3x 3 + 2x 4 + 6x 5 = x 2 + 4x 3 + 2x 4 + x 5 x 5 Local distance d 2 = 3 c 9 c 10 = x 2 + 5x 3 + 4x 4 + 6x 5 = x 2 + 6x 3 + x 4 + 6x 5 38

39 Generator Matrix Representation 1 st code: G 1 = 2 nd code: G 2 = Global code: G = = U A U A O O B V = B V Local Subcode 1 x 1 x 2 x 3 4,3 MDS Local distance d 1 = 2 Local Subcode 2 x 2 x 3 x 4 x 5 6,4 MDS Local distance d 2 = 3 c 1 c 2 c 3 c 4 c 5 c 6 c 7 c 8 c 9 c 10 = x 1 + x 2 + x 3 = x 1 + 2x 2 + 4x 3 = x 1 + 3x 2 + 2x 3 = x 1 + 4x 2 + 2x 3 = x 2 + x 3 + x 4 + x 5 = x 2 + 2x 3 + 4x 4 + x 5 = x 2 + 3x 3 + 2x 4 + 6x 5 = x 2 + 4x 3 + 2x 4 + x 5 = x 2 + 5x 3 + 4x 4 + 6x 5 = x 2 + 6x 3 + x 4 + 6x 5 Global minimum distance d = 4 39

40 Easy Case: Two Codes Have Few Common Data - If few common data, i.e. t 1 + max n 2 k 2, n 1 k 1 using two Vandermonde matrices as G 1, G 2 : optimal minimum distance - Finite field size required: F q max{n 1, n 2 }

41 Easy Case: Two Codes Have Few Common Data - If few common data, i.e. t 1 + max n 2 k 2, n 1 k 1 using two Vandermonde matrices as G 1, G 2 : optimal minimum distance - Finite field size required: F q max{n 1, n 2 } More specifically, in this case, if G 1 = U A is a nested MDS code: G 1, U are generator matrices of MDS codes G 2 = B V is a nested MDS code: G 2, V are generator matrices of MDS codes then the global code achieves the optimal minimum distance (attains the upper bound)

42 Harder Case: Two Codes Have the Same Redundancy - If same redundancy, i.e. n 1 k 1 = n 2 k 2 we construct codes that have optimal global minimum distance - Finite field size required: q > n = n 1 + n 2 The construction uses the BCH bound 42

43 Two Codes Have the Same Redundancy: BCH Bound F q : finite field of q elements ω: primitive element of F q, i.e. F q = {0,1, ω, ω 2, ω 3, } Identify a vector c = c 1,, c n Fn q with the polynomial c x = c 1 + c 2 x + c 3 x c n x n 1 BCH Bound: If every coded vector c satisfies c ω i = 0, for every i = 0,1,, δ 1 i.e, they all have δ consecutive powers of ω as roots, then the code has minimum distance d δ

44 Two Codes Have the Same Redundancy: Construction We construct the generator matrix of the optimal code. Example: F 13 U O G = A B = O V

45 Two Codes Have the Same Redundancy: Construction We construct the generator matrix of the optimal code. Example: F 13 U O G = A B = O V n 1 = 5 k 1 = n 1 = 6 k 2 = 5

46 Two Codes Have the Same Redundancy: Construction We construct the generator matrix of the optimal code. Example: F 13 U O G = A B = O V n 1 = 5 k 1 = Rows of G 1 has root 1 = ω 0 -> distance 2= k 2 = 5 n 1 = 6

47 Two Codes Have the Same Redundancy: Construction We construct the generator matrix of the optimal code. Example: F 13 U O G = A B = O V n 1 = 5 k 1 = Rows of G 1 has root 1 = ω 0 -> distance 2= k 2 = 5 n 1 = 6 Rows of G 2 has root 1 = ω 0 -> distance 2=1+1

48 Two Codes Have the Same Redundancy: Construction We construct the generator matrix of the optimal code. Example: F 13 U O G = A B = O V n 1 = 5 Rows of G has roots ω 0, ω, ω 2 -> distance 4=3+1 k 1 = Rows of G 1 has root 1 = ω 0 -> distance 2= k 2 = 5 n 1 = 6 Rows of G 2 has root 1 = ω 0 -> distance 2=1+1

49 Two Codes Have the Same Redundancy: Construction Summary of this construction Rows: treated as polynomial having certain roots Solving systems of linear equations to determine rows BCH bound global code & local codes have desired distances

50 What we have done Conclusions Introduce a new coding problem: how to jointly design 2 (or more) MDS codes to have better overall failure tolerance Construct optimal codes for two cases There are few common data Two codes have the same amount of redundancy Open Questions Codes over small field size for 2 local codes: n 1 k 1 n 2 k 2 Codes over small field size for more than two local codes

Locally Encodable and Decodable Codes for Distributed Storage Systems

Locally Encodable and Decodable Codes for Distributed Storage Systems Locally Encodable and Decodable Codes for Distributed Storage Systems Son Hoang Dau, Han Mao Kiah, Wentu Song, Chau Yuen Singapore University of Technology and Design, Nanyang Technological University,

More information

Distributed Reed-Solomon Codes

Distributed Reed-Solomon Codes Distributed Reed-Solomon Codes Farzad Parvaresh f.parvaresh@eng.ui.ac.ir University of Isfahan Institute for Network Coding CUHK, Hong Kong August 216 Research interests List-decoding of algebraic codes

More information

Weakly Secure Data Exchange with Generalized Reed Solomon Codes

Weakly Secure Data Exchange with Generalized Reed Solomon Codes Weakly Secure Data Exchange with Generalized Reed Solomon Codes Muxi Yan, Alex Sprintson, and Igor Zelenko Department of Electrical and Computer Engineering, Texas A&M University Department of Mathematics,

More information

Coding with Constraints: Minimum Distance. Bounds and Systematic Constructions

Coding with Constraints: Minimum Distance. Bounds and Systematic Constructions Coding with Constraints: Minimum Distance 1 Bounds and Systematic Constructions Wael Halbawi, Matthew Thill & Babak Hassibi Department of Electrical Engineering arxiv:1501.07556v2 [cs.it] 19 Feb 2015 California

More information

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16 Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the

More information

5.0 BCH and Reed-Solomon Codes 5.1 Introduction

5.0 BCH and Reed-Solomon Codes 5.1 Introduction 5.0 BCH and Reed-Solomon Codes 5.1 Introduction A. Hocquenghem (1959), Codes correcteur d erreurs; Bose and Ray-Chaudhuri (1960), Error Correcting Binary Group Codes; First general family of algebraic

More information

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

Product-matrix Construction

Product-matrix Construction IERG60 Coding for Distributed Storage Systems Lecture 0-9//06 Lecturer: Kenneth Shum Product-matrix Construction Scribe: Xishi Wang In previous lectures, we have discussed about the minimum storage regenerating

More information

Coding for loss tolerant systems

Coding for loss tolerant systems Coding for loss tolerant systems Workshop APRETAF, 22 janvier 2009 Mathieu Cunche, Vincent Roca INRIA, équipe Planète INRIA Rhône-Alpes Mathieu Cunche, Vincent Roca The erasure channel Erasure codes Reed-Solomon

More information

Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes

Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes Bin Chen, Shu-Tao Xia, Jie Hao, and Fang-Wei Fu Member, IEEE 1 arxiv:160901136v1 [csit] 5 Sep 016 Abstract A code is said to be a r-local

More information

ERROR CORRECTING CODES

ERROR CORRECTING CODES ERROR CORRECTING CODES To send a message of 0 s and 1 s from my computer on Earth to Mr. Spock s computer on the planet Vulcan we use codes which include redundancy to correct errors. n q Definition. A

More information

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi, Nihar B Shah, and P Vijay Kumar, Fellow, IEEE Abstract Regenerating codes

More information

Codes over Subfields. Chapter Basics

Codes over Subfields. Chapter Basics Chapter 7 Codes over Subfields In Chapter 6 we looked at various general methods for constructing new codes from old codes. Here we concentrate on two more specialized techniques that result from writing

More information

Regenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems

Regenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems Regenerating Codes and Locally Recoverable 1 Codes for Distributed Storage Systems Yongjune Kim and Yaoqing Yang Abstract We survey the recent results on applying error control coding to distributed storage

More information

1 Vandermonde matrices

1 Vandermonde matrices ECE 771 Lecture 6 BCH and RS codes: Designer cyclic codes Objective: We will begin with a result from linear algebra regarding Vandermonde matrices This result is used to prove the BCH distance properties,

More information

Weakly Secure Regenerating Codes for Distributed Storage

Weakly Secure Regenerating Codes for Distributed Storage Weakly Secure Regenerating Codes for Distributed Storage Swanand Kadhe and Alex Sprintson 1 arxiv:1405.2894v1 [cs.it] 12 May 2014 Abstract We consider the problem of secure distributed data storage under

More information

Explicit MBR All-Symbol Locality Codes

Explicit MBR All-Symbol Locality Codes Explicit MBR All-Symbol Locality Codes Govinda M. Kamath, Natalia Silberstein, N. Prakash, Ankit S. Rawat, V. Lalitha, O. Ozan Koyluoglu, P. Vijay Kumar, and Sriram Vishwanath 1 Abstract arxiv:1302.0744v2

More information

IBM Research Report. Construction of PMDS and SD Codes Extending RAID 5

IBM Research Report. Construction of PMDS and SD Codes Extending RAID 5 RJ10504 (ALM1303-010) March 15, 2013 Computer Science IBM Research Report Construction of PMDS and SD Codes Extending RAID 5 Mario Blaum IBM Research Division Almaden Research Center 650 Harry Road San

More information

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Viveck R Cadambe, Syed A Jafar, Hamed Maleki Electrical Engineering and

More information

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage 1 Minimum Repair andwidth for Exact Regeneration in Distributed Storage Vivec R Cadambe, Syed A Jafar, Hamed Malei Electrical Engineering and Computer Science University of California Irvine, Irvine, California,

More information

Correcting Bursty and Localized Deletions Using Guess & Check Codes

Correcting Bursty and Localized Deletions Using Guess & Check Codes Correcting Bursty and Localized Deletions Using Guess & Chec Codes Serge Kas Hanna, Salim El Rouayheb ECE Department, Rutgers University serge..hanna@rutgers.edu, salim.elrouayheb@rutgers.edu Abstract

More information

Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014

Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Anna Dovzhik 1 Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Sharing data across channels, such as satellite, television, or compact disc, often

More information

A Tight Rate Bound and Matching Construction for Locally Recoverable Codes with Sequential Recovery From Any Number of Multiple Erasures

A Tight Rate Bound and Matching Construction for Locally Recoverable Codes with Sequential Recovery From Any Number of Multiple Erasures 1 A Tight Rate Bound and Matching Construction for Locally Recoverable Codes with Sequential Recovery From Any Number of Multiple Erasures arxiv:181050v1 [csit] 6 Dec 018 S B Balaji, Ganesh R Kini and

More information

Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes

Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes Ankit Singh Rawat CS Department Carnegie Mellon University Pittsburgh, PA 523 Email: asrawat@andrewcmuedu O Ozan Koyluoglu Department

More information

Binary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction

Binary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction BCH Codes Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Preface The

More information

Error-correcting codes and applications

Error-correcting codes and applications Error-correcting codes and applications November 20, 2017 Summary and notation Consider F q : a finite field (if q = 2, then F q are the binary numbers), V = V(F q,n): a vector space over F q of dimension

More information

Berlekamp-Massey decoding of RS code

Berlekamp-Massey decoding of RS code IERG60 Coding for Distributed Storage Systems Lecture - 05//06 Berlekamp-Massey decoding of RS code Lecturer: Kenneth Shum Scribe: Bowen Zhang Berlekamp-Massey algorithm We recall some notations from lecture

More information

Chapter 6. BCH Codes

Chapter 6. BCH Codes Chapter 6 BCH Codes Description of the Codes Decoding of the BCH Codes Outline Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Weight

More information

IN this paper, we will introduce a new class of codes,

IN this paper, we will introduce a new class of codes, IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 44, NO 5, SEPTEMBER 1998 1861 Subspace Subcodes of Reed Solomon Codes Masayuki Hattori, Member, IEEE, Robert J McEliece, Fellow, IEEE, and Gustave Solomon,

More information

Proof: Let the check matrix be

Proof: Let the check matrix be Review/Outline Recall: Looking for good codes High info rate vs. high min distance Want simple description, too Linear, even cyclic, plausible Gilbert-Varshamov bound for linear codes Check matrix criterion

More information

PAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES

PAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES International Journal of Pure and Applied Mathematics Volume 85 No. 6 013, 1001-1008 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: http://dx.doi.org/10.173/ijpam.v85i6.3

More information

Section 3 Error Correcting Codes (ECC): Fundamentals

Section 3 Error Correcting Codes (ECC): Fundamentals Section 3 Error Correcting Codes (ECC): Fundamentals Communication systems and channel models Definition and examples of ECCs Distance For the contents relevant to distance, Lin & Xing s book, Chapter

More information

Arrangements, matroids and codes

Arrangements, matroids and codes Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde

More information

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Junyu Chen Department of Information Engineering The Chinese University of Hong Kong Email: cj0@alumniiecuhkeduhk Kenneth W Shum

More information

Permutation Decoding and the Stopping Redundancy Hierarchy of Cyclic and Extended Cyclic Codes

Permutation Decoding and the Stopping Redundancy Hierarchy of Cyclic and Extended Cyclic Codes Permutation Decoding and the Stopping Redundancy Hierarchy of Cyclic and Extended Cyclic Codes Thorsten Hehn, Olgica Milenkovic, Stefan Laendner, and Johannes B. Huber, University of Erlangen-Nuremberg,

More information

Linear Programming Bounds for Robust Locally Repairable Storage Codes

Linear Programming Bounds for Robust Locally Repairable Storage Codes Linear Programming Bounds for Robust Locally Repairable Storage Codes M. Ali Tebbi, Terence H. Chan, Chi Wan Sung Institute for Telecommunications Research, University of South Australia Email: {ali.tebbi,

More information

SPA decoding on the Tanner graph

SPA decoding on the Tanner graph SPA decoding on the Tanner graph x,(i) q j,l = P(v l = x check sums A l \ {h j } at the ith iteration} x,(i) σ j,l = Σ P(s = 0 v = x,{v : t B(h )\{l}}) q {vt : t B(h j )\{l}} j l t j t B(h j )\{l} j,t

More information

Reed-Muller Codes. These codes were discovered by Muller and the decoding by Reed in Code length: n = 2 m, Dimension: Minimum Distance

Reed-Muller Codes. These codes were discovered by Muller and the decoding by Reed in Code length: n = 2 m, Dimension: Minimum Distance Reed-Muller Codes Ammar Abh-Hhdrohss Islamic University -Gaza ١ Reed-Muller Codes These codes were discovered by Muller and the decoding by Reed in 954. Code length: n = 2 m, Dimension: Minimum Distance

More information

Coding problems for memory and storage applications

Coding problems for memory and storage applications .. Coding problems for memory and storage applications Alexander Barg University of Maryland January 27, 2015 A. Barg (UMD) Coding for memory and storage January 27, 2015 1 / 73 Codes with locality Introduction:

More information

Partial-MDS Codes and their Application to RAID Type of Architectures

Partial-MDS Codes and their Application to RAID Type of Architectures Partial-MDS Codes and their Application to RAID Type of Architectures arxiv:12050997v2 [csit] 11 Sep 2014 Mario Blaum, James Lee Hafner and Steven Hetzler IBM Almaden Research Center San Jose, CA 95120

More information

Jointly Clustering Rows and Columns of Binary Matrices: Algorithms and Trade-offs

Jointly Clustering Rows and Columns of Binary Matrices: Algorithms and Trade-offs Jointly Clustering Rows and Columns of Binary Matrices: Algorithms and Trade-offs Jiaming Xu Joint work with Rui Wu, Kai Zhu, Bruce Hajek, R. Srikant, and Lei Ying University of Illinois, Urbana-Champaign

More information

Reed-Solomon codes. Chapter Linear codes over finite fields

Reed-Solomon codes. Chapter Linear codes over finite fields Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime

More information

Rack-Aware Regenerating Codes for Data Centers

Rack-Aware Regenerating Codes for Data Centers IEEE TRANSACTIONS ON INFORMATION THEORY 1 Rack-Aware Regenerating Codes for Data Centers Hanxu Hou, Patrick P. C. Lee, Kenneth W. Shum and Yuchong Hu arxiv:1802.04031v1 [cs.it] 12 Feb 2018 Abstract Erasure

More information

4F5: Advanced Communications and Coding

4F5: Advanced Communications and Coding 4F5: Advanced Communications and Coding Coding Handout 4: Reed Solomon Codes Jossy Sayir Signal Processing and Communications Lab Department of Engineering University of Cambridge jossy.sayir@eng.cam.ac.uk

More information

Error-Correcting Codes for Networks, Storage and Computation

Error-Correcting Codes for Networks, Storage and Computation Error-Correcting Codes for Networks, Storage and Computation Thesis by Wael Halbawi In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy CALIFORNIA INSTITUTE OF TECHNOLOGY

More information

Lecture 3: Error Correcting Codes

Lecture 3: Error Correcting Codes CS 880: Pseudorandomness and Derandomization 1/30/2013 Lecture 3: Error Correcting Codes Instructors: Holger Dell and Dieter van Melkebeek Scribe: Xi Wu In this lecture we review some background on error

More information

Chapter 6 Lagrange Codes

Chapter 6 Lagrange Codes Chapter 6 Lagrange Codes 6. Introduction Joseph Louis Lagrange was a famous eighteenth century Italian mathematician [] credited with minimum degree polynomial interpolation amongst his many other achievements.

More information

Secure RAID Schemes from EVENODD and STAR Codes

Secure RAID Schemes from EVENODD and STAR Codes Secure RAID Schemes from EVENODD and STAR Codes Wentao Huang and Jehoshua Bruck California Institute of Technology, Pasadena, USA {whuang,bruck}@caltechedu Abstract We study secure RAID, ie, low-complexity

More information

Update-Efficient Error-Correcting. Product-Matrix Codes

Update-Efficient Error-Correcting. Product-Matrix Codes Update-Efficient Error-Correcting 1 Product-Matrix Codes Yunghsiang S Han, Fellow, IEEE, Hung-Ta Pai, Senior Member IEEE, Rong Zheng, Senior Member IEEE, Pramod K Varshney, Fellow, IEEE arxiv:13014620v2

More information

An Introduction to (Network) Coding Theory

An Introduction to (Network) Coding Theory An Introduction to (Network) Coding Theory Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland July 12th, 2018 1 Coding Theory Introduction Reed-Solomon codes 2 Introduction Coherent network

More information

The number of message symbols encoded into a

The number of message symbols encoded into a L.R.Welch THE ORIGINAL VIEW OF REED-SOLOMON CODES THE ORIGINAL VIEW [Polynomial Codes over Certain Finite Fields, I.S.Reed and G. Solomon, Journal of SIAM, June 1960] Parameters: Let GF(2 n ) be the eld

More information

Information Redundancy: Coding

Information Redundancy: Coding Info Redundancy April 2, 23 Information Redundancy: Coding Often applied to Info transfer: often serial communication thru a channel Info storage Hamming distance: error detection & correction capability

More information

Communication Efficient Secret Sharing

Communication Efficient Secret Sharing Communication Efficient Secret Sharing 1 Wentao Huang, Michael Langberg, senior member, IEEE, Joerg Kliewer, senior member, IEEE, and Jehoshua Bruck, Fellow, IEEE arxiv:1505.07515v2 [cs.it] 1 Apr 2016

More information

A Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes

A Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes A Piggybacing Design Framewor for Read-and Download-efficient Distributed Storage Codes K V Rashmi, Nihar B Shah, Kannan Ramchandran, Fellow, IEEE Department of Electrical Engineering and Computer Sciences

More information

Implementation of Galois Field Arithmetic. Nonbinary BCH Codes and Reed-Solomon Codes

Implementation of Galois Field Arithmetic. Nonbinary BCH Codes and Reed-Solomon Codes BCH Codes Wireless Information Transmission System Lab Institute of Communications Engineering g National Sun Yat-sen University Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation

More information

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols

More information

1 Locally computable randomized encodings

1 Locally computable randomized encodings CSG399: Gems of Theoretical Computer Science Lectures 3-4 Feb 20-24, 2009 Instructor: Emanuele Viola Scribe: Eric Miles Cryptography in constant depth: II & III Locally computable randomized encodings

More information

EE 229B ERROR CONTROL CODING Spring 2005

EE 229B ERROR CONTROL CODING Spring 2005 EE 229B ERROR CONTROL CODING Spring 2005 Solutions for Homework 1 1. Is there room? Prove or disprove : There is a (12,7) binary linear code with d min = 5. If there were a (12,7) binary linear code with

More information

List Decoding of Noisy Reed-Muller-like Codes

List Decoding of Noisy Reed-Muller-like Codes List Decoding of Noisy Reed-Muller-like Codes Martin J. Strauss University of Michigan Joint work with A. Robert Calderbank (Princeton) Anna C. Gilbert (Michigan) Joel Lepak (Michigan) Euclidean List Decoding

More information

Guess & Check Codes for Deletions, Insertions, and Synchronization

Guess & Check Codes for Deletions, Insertions, and Synchronization Guess & Check Codes for Deletions, Insertions, and Synchronization Serge Kas Hanna, Salim El Rouayheb ECE Department, Rutgers University sergekhanna@rutgersedu, salimelrouayheb@rutgersedu arxiv:759569v3

More information

All-to-All Gradecast using Coding with Byzantine Failures

All-to-All Gradecast using Coding with Byzantine Failures All-to-All Gradecast using Coding with Byzantine Failures John Bridgman Vijay Garg Parallel and Distributed Systems Lab (PDSL) at The University of Texas at Austin email: johnfbiii@utexas.edu Presented

More information

Optimal binary linear locally repairable codes with disjoint repair groups

Optimal binary linear locally repairable codes with disjoint repair groups 1 Optimal binary linear locally repairable codes with disjoint repair groups Jingxue Ma and Gennian Ge arxiv:17110718v1 [csit] 20 Nov 2017 Abstract In recent years, several classes of codes are introduced

More information

An Introduction to (Network) Coding Theory

An Introduction to (Network) Coding Theory An to (Network) Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland April 24th, 2018 Outline 1 Reed-Solomon Codes 2 Network Gabidulin Codes 3 Summary and Outlook A little bit of history

More information

Linear Programming Bounds for Distributed Storage Codes

Linear Programming Bounds for Distributed Storage Codes 1 Linear Programming Bounds for Distributed Storage Codes Ali Tebbi, Terence H. Chan, Chi Wan Sung Department of Electronic Engineering, City University of Hong Kong arxiv:1710.04361v1 [cs.it] 12 Oct 2017

More information

Security in Locally Repairable Storage

Security in Locally Repairable Storage 1 Security in Locally Repairable Storage Abhishek Agarwal and Arya Mazumdar Abstract In this paper we extend the notion of locally repairable codes to secret sharing schemes. The main problem we consider

More information

Congruences for Fishburn numbers modulo prime powers

Congruences for Fishburn numbers modulo prime powers Congruences for Fishburn numbers modulo prime powers Partitions, q-series, and modular forms AMS Joint Mathematics Meetings, San Antonio January, 205 University of Illinois at Urbana Champaign ξ(3) = 5

More information

On Secure Index Coding with Side Information

On Secure Index Coding with Side Information On Secure Index Coding with Side Information Son Hoang Dau Division of Mathematical Sciences School of Phys. and Math. Sciences Nanyang Technological University 21 Nanyang Link, Singapore 637371 Email:

More information

A Piggybacking Design Framework for Read- and- Download- efficient Distributed Storage Codes. K. V. Rashmi, Nihar B. Shah, Kannan Ramchandran

A Piggybacking Design Framework for Read- and- Download- efficient Distributed Storage Codes. K. V. Rashmi, Nihar B. Shah, Kannan Ramchandran A Piggybacking Design Framework for Read- and- Download- efficient Distributed Storage Codes K V Rashmi, Nihar B Shah, Kannan Ramchandran Outline IntroducGon & MoGvaGon Measurements from Facebook s Warehouse

More information

Communication Efficient Secret Sharing

Communication Efficient Secret Sharing 1 Communication Efficient Secret Sharing Wentao Huang, Michael Langberg, Senior Member, IEEE, Joerg Kliewer, Senior Member, IEEE, and Jehoshua Bruck, Fellow, IEEE Abstract A secret sharing scheme is a

More information

Explicit Code Constructions for Distributed Storage Minimizing Repair Bandwidth

Explicit Code Constructions for Distributed Storage Minimizing Repair Bandwidth Explicit Code Constructions for Distributed Storage Minimizing Repair Bandwidth A Project Report Submitted in partial fulfilment of the requirements for the Degree of Master of Engineering in Telecommunication

More information

Cover Page. The handle holds various files of this Leiden University dissertation

Cover Page. The handle   holds various files of this Leiden University dissertation Cover Page The handle http://hdl.handle.net/1887/57796 holds various files of this Leiden University dissertation Author: Mirandola, Diego Title: On products of linear error correcting codes Date: 2017-12-06

More information

Probabilistic Systems Analysis Spring 2018 Lecture 6. Random Variables: Probability Mass Function and Expectation

Probabilistic Systems Analysis Spring 2018 Lecture 6. Random Variables: Probability Mass Function and Expectation EE 178 Probabilistic Systems Analysis Spring 2018 Lecture 6 Random Variables: Probability Mass Function and Expectation Probability Mass Function When we introduce the basic probability model in Note 1,

More information

EE512: Error Control Coding

EE512: Error Control Coding EE51: Error Control Coding Solution for Assignment on BCH and RS Codes March, 007 1. To determine the dimension and generator polynomial of all narrow sense binary BCH codes of length n = 31, we have to

More information

Structured Low-Density Parity-Check Codes: Algebraic Constructions

Structured Low-Density Parity-Check Codes: Algebraic Constructions Structured Low-Density Parity-Check Codes: Algebraic Constructions Shu Lin Department of Electrical and Computer Engineering University of California, Davis Davis, California 95616 Email:shulin@ece.ucdavis.edu

More information

Efficient Secret Sharing Schemes Achieving Optimal Information Rate

Efficient Secret Sharing Schemes Achieving Optimal Information Rate Efficient Secret Sharing Schemes Achieving Optimal Information Rate Yongge Wang KINDI Center for Computing Research, Qatar University, Qatar and Department of SIS, UNC Charlotte, USA Email: yonggewang@unccedu

More information

Lecture 12: Reed-Solomon Codes

Lecture 12: Reed-Solomon Codes Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 007) Lecture 1: Reed-Solomon Codes September 8, 007 Lecturer: Atri Rudra Scribe: Michel Kulhandjian Last lecture we saw the proof

More information

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Shu Lin, Shumei Song, Lan Lan, Lingqi Zeng and Ying Y Tai Department of Electrical & Computer Engineering University of California,

More information

Chapter 7 Reed Solomon Codes and Binary Transmission

Chapter 7 Reed Solomon Codes and Binary Transmission Chapter 7 Reed Solomon Codes and Binary Transmission 7.1 Introduction Reed Solomon codes named after Reed and Solomon [9] following their publication in 1960 have been used together with hard decision

More information

Determining a span. λ + µ + ν = x 2λ + 2µ 10ν = y λ + 3µ 9ν = z.

Determining a span. λ + µ + ν = x 2λ + 2µ 10ν = y λ + 3µ 9ν = z. Determining a span Set V = R 3 and v 1 = (1, 2, 1), v 2 := (1, 2, 3), v 3 := (1 10, 9). We want to determine the span of these vectors. In other words, given (x, y, z) R 3, when is (x, y, z) span(v 1,

More information

an author's https://oatao.univ-toulouse.fr/18723 http://dx.doi.org/10.1109/isit.2017.8006599 Detchart, Jonathan and Lacan, Jérôme Polynomial Ring Transforms for Efficient XOR-based Erasure Coding. (2017)

More information

Permutation Codes: Optimal Exact-Repair of a Single Failed Node in MDS Code Based Distributed Storage Systems

Permutation Codes: Optimal Exact-Repair of a Single Failed Node in MDS Code Based Distributed Storage Systems Permutation Codes: Optimal Exact-Repair of a Single Failed Node in MDS Code Based Distributed Storage Systems Viveck R Cadambe Electrical Engineering and Computer Science University of California Irvine,

More information

Lecture 12: November 6, 2017

Lecture 12: November 6, 2017 Information and Coding Theory Autumn 017 Lecturer: Madhur Tulsiani Lecture 1: November 6, 017 Recall: We were looking at codes of the form C : F k p F n p, where p is prime, k is the message length, and

More information

Distributed storage systems from combinatorial designs

Distributed storage systems from combinatorial designs Distributed storage systems from combinatorial designs Aditya Ramamoorthy November 20, 2014 Department of Electrical and Computer Engineering, Iowa State University, Joint work with Oktay Olmez (Ankara

More information

On Encoding Symbol Degrees of Array BP-XOR Codes

On Encoding Symbol Degrees of Array BP-XOR Codes On Encoding Symbol Degrees of Array BP-XOR Codes Maura B. Paterson Dept. Economics, Math. & Statistics Birkbeck University of London Email: m.paterson@bbk.ac.uk Douglas R. Stinson David R. Cheriton School

More information

Decoding Algorithm and Architecture for BCH Codes under the Lee Metric

Decoding Algorithm and Architecture for BCH Codes under the Lee Metric Decoding Algorithm and Architecture for BCH Codes under the Lee Metric Yingquan Wu and Christoforos N. Hadjicostis Coordinated Science Laboratory and Department of Electrical and Computer Engineering University

More information

Parallel Numerical Algorithms

Parallel Numerical Algorithms Parallel Numerical Algorithms Chapter 13 Prof. Michael T. Heath Department of Computer Science University of Illinois at Urbana-Champaign CS 554 / CSE 512 Michael T. Heath Parallel Numerical Algorithms

More information

6.895 PCP and Hardness of Approximation MIT, Fall Lecture 3: Coding Theory

6.895 PCP and Hardness of Approximation MIT, Fall Lecture 3: Coding Theory 6895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 3: Coding Theory Lecturer: Dana Moshkovitz Scribe: Michael Forbes and Dana Moshkovitz 1 Motivation In the course we will make heavy use of

More information

REED-SOLOMON CODE SYMBOL AVOIDANCE

REED-SOLOMON CODE SYMBOL AVOIDANCE Vol105(1) March 2014 SOUTH AFRICAN INSTITUTE OF ELECTRICAL ENGINEERS 13 REED-SOLOMON CODE SYMBOL AVOIDANCE T Shongwe and A J Han Vinck Department of Electrical and Electronic Engineering Science, University

More information

Vector spaces. EE 387, Notes 8, Handout #12

Vector spaces. EE 387, Notes 8, Handout #12 Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is

More information

Towards Optimal Deterministic Coding for Interactive Communication

Towards Optimal Deterministic Coding for Interactive Communication Towards Optimal Deterministic Coding for Interactive Communication Ran Gelles Bernhard Haeupler Gillat Kol Noga Ron-Zewi Avi Wigderson Abstract We show an efficient, deterministic interactive coding scheme

More information

On MBR codes with replication

On MBR codes with replication On MBR codes with replication M. Nikhil Krishnan and P. Vijay Kumar, Fellow, IEEE Department of Electrical Communication Engineering, Indian Institute of Science, Bangalore. Email: nikhilkrishnan.m@gmail.com,

More information

Minimum Number of Multiplications of U Hash Functions

Minimum Number of Multiplications of U Hash Functions Minimum Number of Multiplications of U Hash Functions Indian Statistical Institute, Kolkata mridul@isical.ac.in March 4, FSE-2014, London Authentication: The Popular Story 1 Alice and Bob share a secret

More information

On Locally Recoverable (LRC) Codes

On Locally Recoverable (LRC) Codes On Locally Recoverable (LRC) Codes arxiv:151206161v1 [csit] 18 Dec 2015 Mario Blaum IBM Almaden Research Center San Jose, CA 95120 Abstract We present simple constructions of optimal erasure-correcting

More information

Polynomial Codes over Certain Finite Fields

Polynomial Codes over Certain Finite Fields Polynomial Codes over Certain Finite Fields A paper by: Irving Reed and Gustave Solomon presented by Kim Hamilton March 31, 2000 Significance of this paper: Introduced ideas that form the core of current

More information

Error Detection & Correction

Error Detection & Correction Error Detection & Correction Error detection & correction noisy channels techniques in networking error detection error detection capability retransmition error correction reconstruction checksums redundancy

More information

Correcting Localized Deletions Using Guess & Check Codes

Correcting Localized Deletions Using Guess & Check Codes 55th Annual Allerton Conference on Communication, Control, and Computing Correcting Localized Deletions Using Guess & Check Codes Salim El Rouayheb Rutgers University Joint work with Serge Kas Hanna and

More information

An Algorithm for a Two-Disk Fault-Tolerant Array with (Prime 1) Disks

An Algorithm for a Two-Disk Fault-Tolerant Array with (Prime 1) Disks An Algorithm for a Two-Disk Fault-Tolerant Array with (Prime 1) Disks Sanjeeb Nanda and Narsingh Deo School of Computer Science University of Central Florida Orlando, Florida 32816-2362 sanjeeb@earthlink.net,

More information

Cooperative Repair of Multiple Node Failures in Distributed Storage Systems

Cooperative Repair of Multiple Node Failures in Distributed Storage Systems Cooperative Repair of Multiple Node Failures in Distributed Storage Systems Kenneth W. Shum Institute of Network Coding The Chinese University of Hong Kong Junyu Chen Department of Information Engineering

More information

Class-r hypercubes and related arrays

Class-r hypercubes and related arrays Class-r hypercubes and related arrays David Thomson Carleton University, Ottawa ON joint work with John Ethier, Melissa Huggan Gary L. Mullen, Daniel Panario and Brett Stevens D. Thomson (Carleton) Class-r

More information

Cauchy MDS Array Codes With Efficient Decoding Method

Cauchy MDS Array Codes With Efficient Decoding Method IEEE TRANSACTIONS ON COMMUNICATIONS Cauchy MDS Array Codes With Efficient Decoding Method Hanxu Hou and Yunghsiang S Han, Fellow, IEEE Abstract arxiv:609968v [csit] 30 Nov 206 Array codes have been widely

More information