Coding with Constraints: Different Flavors
|
|
- Brenda Robertson
- 6 years ago
- Views:
Transcription
1 Coding with Constraints: Different Flavors Hoang Dau 1 University of Illinois at Urbana-Champaign hoangdau@uiuc.edu DIMACS Workshop on Network Coding: the Next 15 Years Rutgers University, NJ, 2015
2 Part I Coding with Constraints: A Quick Survey
3 Coding with Constraints: Definition c 1 x 1 c 2 k data symbols x 2 ENCODED n coded symbols x k c n CONVENTIONAL CODE c j = c j (x 1, x 2,, x k ) 3
4 Coding with Constraints: Definition c 1 x 1 c 2 k data symbols x 2 ENCODED n coded symbols x k c n CONVENTIONAL CODE c j = c j (x 1, x 2,, x k ) CODE WITH CONSTRAINTS c j = c j ({x i : i C j }), C j {1,2,, k} 4
5 Coding with Constraints: Example x 1 c 1 c 2 = c 1 (x 1, x 2 ) = c 2 (x 1, x 3 ) x 2 c 3 = c 3 (x 2 ) x 3 c 4 c 5 = c 4 (x 2, x 3 ) = c 5 (x 1, x 3 ) 5
6 Coding with Constraints: Example x 1 c 1 c 2 = c 1 (x 1, x 2 ) = c 2 (x 1, x 3 ) x 2 c 3 = c 3 (x 2 ) x 3 c 4 c 5 = c 4 (x 2, x 3 ) = c 5 (x 1, x 3 ) Linear code: c 1, c 2, c 3, c 4, c 5 = x 1, x 2, x 3 G where the generator matrix G is?? 0 0? G =? 0?? 0 0? 0?? 6
7 Coding with Constraints: Main Problem Given the constraints c j = c j ({x i : i C j }), C j {1,2,, k} how to construct codes that achieve the optimal minimum distance over small field size q poly n
8 Coding with Constraints: Main Problem Given the constraints c j = c j ({x i : i C j }), C j {1,2,, k} how to construct codes that achieve the optimal minimum distance over small field size q poly n Linear case: given G =?? 0 0?? 0?? 0 0? 0?? how to replace? -entries by elements of F q (q poly(n)) so that G generate a code with optimal distance
9 Coding with Constraints: Upper Bound Upper Bound (Halbawi-Thill-Hassibi 15, Song-Dau-Yuen 15) d d max = 1 + min ( i I R i I ) I 1,,k where R i = {j: i C j }
10 Coding with Constraints: Upper Bound Upper Bound (Halbawi-Thill-Hassibi 15, Song-Dau-Yuen 15) d d max = 1 + min ( i I R i I ) I 1,,k where R i = {j: i C j } Properties d max can be found in time poly(n) codes with d = d max always exists over fields of size n d 1
11 Coding with Constraints: Upper Bound Upper Bound (Halbawi-Thill-Hassibi 15, Song-Dau-Yuen 15) d d max = 1 + min ( i I R i I ) I 1,,k where R i = {j: i C j } Properties d max can be found in time poly(n) codes with d = d max always exists over fields of size n d 1 Question of interest: how about fields of size poly(n)?
12 Coding with Constraints: Review (Small field) MDS Case: d max = n k + 1 Optimal codes exist in a few special cases (Halbawi-Ho-Yao- Duursma 14, Dau-Song-Yuen 14, Yan-Sprintson-Zelenko 14)
13 Coding with Constraints: Review (Small field) MDS Case: d max = n k + 1 Optimal codes exist in a few special cases (Halbawi-Ho-Yao- Duursma 14, Dau-Song-Yuen 14, Yan-Sprintson-Zelenko 14) k 4 (every n)
14 Coding with Constraints: Review (Small field) MDS Case: d max = n k + 1 Optimal codes exist in a few special cases (Halbawi-Ho-Yao- Duursma 14, Dau-Song-Yuen 14, Yan-Sprintson-Zelenko 14) k 4 (every n) rows of G partitioned into 3 groups, each has same? -pattern
15 Coding with Constraints: Review (Small field) MDS Case: d max = n k + 1 Optimal codes exist in a few special cases (Halbawi-Ho-Yao- Duursma 14, Dau-Song-Yuen 14, Yan-Sprintson-Zelenko 14) k 4 (every n) rows of G partitioned into 3 groups, each has same? -pattern rows have k 1 zeros & 2 different rows share 1 common zeros
16 Coding with Constraints: Review (Small field) MDS Case: d max = n k + 1 Optimal codes exist in a few special cases (Halbawi-Ho-Yao- Duursma 14, Dau-Song-Yuen 14, Yan-Sprintson-Zelenko 14) k 4 (every n) rows of G partitioned into 3 groups, each has same? -pattern rows have k 1 zeros & 2 different rows share 1 common zeros General Case (Halbawi-Thill-Hassibi 15): d max n k + 1
17 Coding with Constraints: Review (Small field) MDS Case: d max = n k + 1 Optimal codes exist in a few special cases (Halbawi-Ho-Yao- Duursma 14, Dau-Song-Yuen 14, Yan-Sprintson-Zelenko 14) k 4 (every n) rows of G partitioned into 3 groups, each has same? -pattern rows have k 1 zeros & 2 different rows share 1 common zeros General Case (Halbawi-Thill-Hassibi 15): d max n k + 1 Optimal codes exist if there are d max 1 indices j s where C j = k
18 Coding with Constraints: Review (Small field) MDS Case: d max = n k + 1 Optimal codes exist in a few special cases (Halbawi-Ho-Yao- Duursma 14, Dau-Song-Yuen 14, Yan-Sprintson-Zelenko 14) k 4 (every n) rows of G partitioned into 3 groups, each has same? -pattern rows have k 1 zeros & 2 different rows share 1 common zeros General Case (Halbawi-Thill-Hassibi 15): d max n k + 1 Optimal codes exist if there are d max 1 indices j s where C j = k Optimal systematic codes always exists (smaller bound d sys d max )
19 Coding with Constraints: Review (Small field) MDS Case: d max = n k + 1 Optimal codes exist in a few special cases (Halbawi-Ho-Yao- Duursma 14, Dau-Song-Yuen 14, Yan-Sprintson-Zelenko 14) k 4 (every n) rows of G partitioned into 3 groups, each has same? -pattern rows have k 1 zeros & 2 different rows share 1 common zeros General Case (Halbawi-Thill-Hassibi 15): d max n k + 1 Optimal codes exist if there are d max 1 indices j s where C j = k Optimal systematic codes always exists (smaller bound d sys d max ) Common Technique: Reed-Solomon (sub-) code
20 Coding with Constraints: Review Common Technique: Reed-Solomon (sub-) code x 1 c 1 c 2 = c 1 (x 1, x 2 ) = c 2 (x 1, x 3 ) x 2 c 3 = c 3 (x 2 ) x 3 c 4 c 5 = c 4 (x 2, x 3 ) = c 5 (x 1, x 3 ) G =?? 0 0?? 0?? 0 0? 0??
21 Coding with Constraints: Review Common Technique: Reed-Solomon (sub-) code x 1 c 1 c 2 = c 1 (x 1, x 2 ) = c 2 (x 1, x 3 ) x 2 c 3 = c 3 (x 2 ) x 3 c 4 c 5 = c 4 (x 2, x 3 ) = c 5 (x 1, x 3 ) G = α 1 α 2 α 3 α 4 α 5?? 0 0?? 0?? 0 0? 0??
22 Coding with Constraints: Review Common Technique: Reed-Solomon (sub-) code x 1 c 1 c 2 = c 1 (x 1, x 2 ) = c 2 (x 1, x 3 ) x 2 c 3 = c 3 (x 2 ) x 3 c 4 c 5 = c 4 (x 2, x 3 ) = c 5 (x 1, x 3 ) G = α 1 α 2 α 3 α 4 α 5?? 0 0?? 0?? 0 0? 0?? = f 1 (α 1 ) f 1 (α 2 ) 0 0 f 1 (α 5 ) f 2 (α 1 ) 0 f 2 (α 3 ) f 2 (α 4 ) 0 0 f 3 (α 2 ) 0 f 3 (α 4 ) f 3 (α 5 )
23 Coding with Constraints: Review Common Technique: Reed-Solomon (sub-) code x 1 c 1 c 2 = c 1 (x 1, x 2 ) = c 2 (x 1, x 3 ) x 2 c 3 = c 3 (x 2 ) x 3 c 4 c 5 = c 4 (x 2, x 3 ) = c 5 (x 1, x 3 ) G = α 1 α 2 α 3 α 4 α 5?? 0 0?? 0?? 0 0? 0?? = f 1 (α 1 ) f 1 (α 2 ) 0 0 f 1 (α 5 ) f 2 (α 1 ) 0 f 2 (α 3 ) f 2 (α 4 ) 0 0 f 3 (α 2 ) 0 f 3 (α 4 ) f 3 (α 5 ) Difficulty: G may not be full rank
24 Part II: Joint Design of Different MDS Codes (joint work with H. Kiah, W. Song, and C. Yuen)
25 MDS Codes for Distributed Storage x 1 c 1 c 2 MDS: tolerate any n k node failures k data symbols x 2 Encoded n coded symbols x k c n Facebook: Reed-Solomon n = 14, k = 10 25
26 Question of Interest If two (or more) independent DSS share some common data, can we jointly design the corresponding MDS codes to get a better overall failure protection?
27 Question of Interest If two (or more) independent DSS share some common data, can we jointly design the corresponding MDS codes to get a better overall failure protection? Local Subcode 1 Tolerate 1 node failure x 1 x 2 4,3 MDS c 1 c 2 c 3 = x 1 + x 2 + x 3 = x 1 + 2x 2 + 4x 3 = x 1 + 3x 2 + 2x 3 x 3 Local distance d 1 = 2 c 4 = x 1 + 4x 2 + 2x 3 Code has minimum distance d: tolerate d 1 node failures 27
28 Question of Interest If two (or more) independent DSS share some common data, can we jointly design the corresponding MDS codes to get a better overall failure protection? Local Subcode 1 Tolerate 1 node failure x 1 x 2 4,3 MDS c 1 c 2 c 3 = x 1 + x 2 + x 3 = x 1 + 2x 2 + 4x 3 = x 1 + 3x 2 + 2x 3 x 3 Local distance d 1 = 2 c 4 = x 1 + 4x 2 + 2x 3 Local Subcode 2 c 5 = x 2 + x 3 + x 4 + x 5 x 2 c 6 = x 2 + 2x 3 + 4x 4 + x 5 Tolerate 2 node failures x 3 x 4 x 5 6,4 MDS Local distance d 2 = 3 c 7 c 8 c 9 c 10 = x 2 + 3x 3 + 2x 4 + 6x 5 = x 2 + 4x 3 + 2x 4 + x 5 = x 2 + 5x 3 + 4x 4 + 6x 5 = x 2 + 6x 3 + x 4 + 6x 5 Code has minimum distance d: tolerate d 1 node failures 28
29 Question of Interest If two (or more) independent DSS share some common data, can we jointly design the corresponding MDS codes to get a better overall failure protection? Local Subcode 1 Tolerate 3 node failures Tolerate 1 node failure Tolerate 2 node failures x 1 x 2 x 3 4,3 MDS Local distance d 1 = 2 Local Subcode 2 x 2 x 3 x 4 x 5 6,4 MDS Local distance d 2 = 3 c 1 c 2 c 3 c 4 c 5 c 6 c 7 c 8 c 9 c 10 = x 1 + x 2 + x 3 = x 1 + 2x 2 + 4x 3 = x 1 + 3x 2 + 2x 3 = x 1 + 4x 2 + 2x 3 = x 2 + x 3 + x 4 + x 5 = x 2 + 2x 3 + 4x 4 + x 5 = x 2 + 3x 3 + 2x 4 + 6x 5 = x 2 + 4x 3 + 2x 4 + x 5 = x 2 + 5x 3 + 4x 4 + 6x 5 = x 2 + 6x 3 + x 4 + 6x 5 Global minimum distance d = 4 Code has minimum distance d: tolerate d 1 node failures 29
30 Upper Bound for Global Minimum Distance For linear code where G = c 1, c 2,, c 10 = x 1, x 2,, x 6 G???? ???????????????????? ?????? ??????
31 Upper Bound for Global Minimum Distance For linear code where G = c 1, c 2,, c 10 = x 1, x 2,, x 6 G???? ???????????????????? ?????? ?????? Goal: replace? -entries with F q -elements so that
32 Upper Bound for Global Minimum Distance For linear code where [4,3]-MDS G = c 1, c 2,, c 10 = x 1, x 2,, x 6 G???? ???????????????????? ?????? ?????? [6,4]-MDS Goal: replace? -entries with F q -elements so that two local subcodes are MDS (additional requirement)
33 Upper Bound for Global Minimum Distance For linear code where [4,3]-MDS G = c 1, c 2,, c 10 = x 1, x 2,, x 6 G???? ???????????????????? ?????? ?????? [6,4]-MDS Goal: replace? -entries with F q -elements so that two local subcodes are MDS (additional requirement) the global code has optimal distance (same as coding with constraints)
34 Upper Bound for Global Minimum Distance For linear code where [4,3]-MDS G = c 1, c 2,, c 10 = x 1, x 2,, x 6 G???? ???????????????????? ?????? ?????? [6,4]-MDS Goal: replace? -entries with F q -elements so that two local subcodes are MDS (additional requirement) the global code has optimal distance (same as coding with constraints) Same cut-set bound apply & codes over large fields achieve this bound d d max = 1 + min ( i I R i I ) I 1,,k
35 Upper Bound for Global Minimum Distance: Two Local Subcodes d d max = 1 + t + min n 1 k 1, n 2 k 2 t = #{common x i }
36 Upper Bound for Global Minimum Distance: Two Local Subcodes d d max = 1 + t + min n 1 k 1, n 2 k 2 t = #{common x i } Local Subcode 1 x 1 c 1 = x 1 + x 2 + x 3 n 1 = 4, k 1 = 3 t = x 2, x 3 = 2 n 2 = 6, k 2 = 4 x 2 x 3 4,3 MDS Local distance d 1 = 2 Local Subcode 2 x 2 x 3 x 4 x 5 6,4 MDS Local distance d 2 = 3 c 2 c 3 c 4 c 5 c 6 c 7 c 8 c 9 c 10 = x 1 + 2x 2 + 4x 3 = x 1 + 3x 2 + 2x 3 = x 1 + 4x 2 + 2x 3 = x 2 + x 3 + x 4 + x 5 = x 2 + 2x 3 + 4x 4 + x 5 = x 2 + 3x 3 + 2x 4 + 6x 5 = x 2 + 4x 3 + 2x 4 + x 5 = x 2 + 5x 3 + 4x 4 + 6x 5 = x 2 + 6x 3 + x 4 + 6x 5 Global minimum distance d = 4 In this example: d min 4 3, 6 4 = 4 -> optimal code here 36
37 Generator Matrix Representation 1 st code: G 1 = = U A Local Subcode 1 x 1 x 2 4,3 MDS c 1 c 2 c 3 = x 1 + x 2 + x 3 = x 1 + 2x 2 + 4x 3 = x 1 + 3x 2 + 2x 3 x 3 Local distance d 1 = 2 c 4 = x 1 + 4x 2 + 2x 3 37
38 Generator Matrix Representation 1 st code: G 1 = 2 nd code: G 2 = = U A = B V Local Subcode 1 x 1 x 2 x 3 4,3 MDS Local distance d 1 = 2 Local Subcode 2 x 2 c 1 c 2 c 3 c 4 c 5 c 6 = x 1 + x 2 + x 3 = x 1 + 2x 2 + 4x 3 = x 1 + 3x 2 + 2x 3 = x 1 + 4x 2 + 2x 3 = x 2 + x 3 + x 4 + x 5 = x 2 + 2x 3 + 4x 4 + x 5 x 3 x 4 6,4 MDS c 7 c 8 = x 2 + 3x 3 + 2x 4 + 6x 5 = x 2 + 4x 3 + 2x 4 + x 5 x 5 Local distance d 2 = 3 c 9 c 10 = x 2 + 5x 3 + 4x 4 + 6x 5 = x 2 + 6x 3 + x 4 + 6x 5 38
39 Generator Matrix Representation 1 st code: G 1 = 2 nd code: G 2 = Global code: G = = U A U A O O B V = B V Local Subcode 1 x 1 x 2 x 3 4,3 MDS Local distance d 1 = 2 Local Subcode 2 x 2 x 3 x 4 x 5 6,4 MDS Local distance d 2 = 3 c 1 c 2 c 3 c 4 c 5 c 6 c 7 c 8 c 9 c 10 = x 1 + x 2 + x 3 = x 1 + 2x 2 + 4x 3 = x 1 + 3x 2 + 2x 3 = x 1 + 4x 2 + 2x 3 = x 2 + x 3 + x 4 + x 5 = x 2 + 2x 3 + 4x 4 + x 5 = x 2 + 3x 3 + 2x 4 + 6x 5 = x 2 + 4x 3 + 2x 4 + x 5 = x 2 + 5x 3 + 4x 4 + 6x 5 = x 2 + 6x 3 + x 4 + 6x 5 Global minimum distance d = 4 39
40 Easy Case: Two Codes Have Few Common Data - If few common data, i.e. t 1 + max n 2 k 2, n 1 k 1 using two Vandermonde matrices as G 1, G 2 : optimal minimum distance - Finite field size required: F q max{n 1, n 2 }
41 Easy Case: Two Codes Have Few Common Data - If few common data, i.e. t 1 + max n 2 k 2, n 1 k 1 using two Vandermonde matrices as G 1, G 2 : optimal minimum distance - Finite field size required: F q max{n 1, n 2 } More specifically, in this case, if G 1 = U A is a nested MDS code: G 1, U are generator matrices of MDS codes G 2 = B V is a nested MDS code: G 2, V are generator matrices of MDS codes then the global code achieves the optimal minimum distance (attains the upper bound)
42 Harder Case: Two Codes Have the Same Redundancy - If same redundancy, i.e. n 1 k 1 = n 2 k 2 we construct codes that have optimal global minimum distance - Finite field size required: q > n = n 1 + n 2 The construction uses the BCH bound 42
43 Two Codes Have the Same Redundancy: BCH Bound F q : finite field of q elements ω: primitive element of F q, i.e. F q = {0,1, ω, ω 2, ω 3, } Identify a vector c = c 1,, c n Fn q with the polynomial c x = c 1 + c 2 x + c 3 x c n x n 1 BCH Bound: If every coded vector c satisfies c ω i = 0, for every i = 0,1,, δ 1 i.e, they all have δ consecutive powers of ω as roots, then the code has minimum distance d δ
44 Two Codes Have the Same Redundancy: Construction We construct the generator matrix of the optimal code. Example: F 13 U O G = A B = O V
45 Two Codes Have the Same Redundancy: Construction We construct the generator matrix of the optimal code. Example: F 13 U O G = A B = O V n 1 = 5 k 1 = n 1 = 6 k 2 = 5
46 Two Codes Have the Same Redundancy: Construction We construct the generator matrix of the optimal code. Example: F 13 U O G = A B = O V n 1 = 5 k 1 = Rows of G 1 has root 1 = ω 0 -> distance 2= k 2 = 5 n 1 = 6
47 Two Codes Have the Same Redundancy: Construction We construct the generator matrix of the optimal code. Example: F 13 U O G = A B = O V n 1 = 5 k 1 = Rows of G 1 has root 1 = ω 0 -> distance 2= k 2 = 5 n 1 = 6 Rows of G 2 has root 1 = ω 0 -> distance 2=1+1
48 Two Codes Have the Same Redundancy: Construction We construct the generator matrix of the optimal code. Example: F 13 U O G = A B = O V n 1 = 5 Rows of G has roots ω 0, ω, ω 2 -> distance 4=3+1 k 1 = Rows of G 1 has root 1 = ω 0 -> distance 2= k 2 = 5 n 1 = 6 Rows of G 2 has root 1 = ω 0 -> distance 2=1+1
49 Two Codes Have the Same Redundancy: Construction Summary of this construction Rows: treated as polynomial having certain roots Solving systems of linear equations to determine rows BCH bound global code & local codes have desired distances
50 What we have done Conclusions Introduce a new coding problem: how to jointly design 2 (or more) MDS codes to have better overall failure tolerance Construct optimal codes for two cases There are few common data Two codes have the same amount of redundancy Open Questions Codes over small field size for 2 local codes: n 1 k 1 n 2 k 2 Codes over small field size for more than two local codes
Locally Encodable and Decodable Codes for Distributed Storage Systems
Locally Encodable and Decodable Codes for Distributed Storage Systems Son Hoang Dau, Han Mao Kiah, Wentu Song, Chau Yuen Singapore University of Technology and Design, Nanyang Technological University,
More informationDistributed Reed-Solomon Codes
Distributed Reed-Solomon Codes Farzad Parvaresh f.parvaresh@eng.ui.ac.ir University of Isfahan Institute for Network Coding CUHK, Hong Kong August 216 Research interests List-decoding of algebraic codes
More informationWeakly Secure Data Exchange with Generalized Reed Solomon Codes
Weakly Secure Data Exchange with Generalized Reed Solomon Codes Muxi Yan, Alex Sprintson, and Igor Zelenko Department of Electrical and Computer Engineering, Texas A&M University Department of Mathematics,
More informationCoding with Constraints: Minimum Distance. Bounds and Systematic Constructions
Coding with Constraints: Minimum Distance 1 Bounds and Systematic Constructions Wael Halbawi, Matthew Thill & Babak Hassibi Department of Electrical Engineering arxiv:1501.07556v2 [cs.it] 19 Feb 2015 California
More informationSolutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16
Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the
More information5.0 BCH and Reed-Solomon Codes 5.1 Introduction
5.0 BCH and Reed-Solomon Codes 5.1 Introduction A. Hocquenghem (1959), Codes correcteur d erreurs; Bose and Ray-Chaudhuri (1960), Error Correcting Binary Group Codes; First general family of algebraic
More informationThe BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes
S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding
More informationProduct-matrix Construction
IERG60 Coding for Distributed Storage Systems Lecture 0-9//06 Lecturer: Kenneth Shum Product-matrix Construction Scribe: Xishi Wang In previous lectures, we have discussed about the minimum storage regenerating
More informationCoding for loss tolerant systems
Coding for loss tolerant systems Workshop APRETAF, 22 janvier 2009 Mathieu Cunche, Vincent Roca INRIA, équipe Planète INRIA Rhône-Alpes Mathieu Cunche, Vincent Roca The erasure channel Erasure codes Reed-Solomon
More informationConstructions of Optimal Cyclic (r, δ) Locally Repairable Codes
Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes Bin Chen, Shu-Tao Xia, Jie Hao, and Fang-Wei Fu Member, IEEE 1 arxiv:160901136v1 [csit] 5 Sep 016 Abstract A code is said to be a r-local
More informationERROR CORRECTING CODES
ERROR CORRECTING CODES To send a message of 0 s and 1 s from my computer on Earth to Mr. Spock s computer on the planet Vulcan we use codes which include redundancy to correct errors. n q Definition. A
More informationOptimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction
Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi, Nihar B Shah, and P Vijay Kumar, Fellow, IEEE Abstract Regenerating codes
More informationCodes over Subfields. Chapter Basics
Chapter 7 Codes over Subfields In Chapter 6 we looked at various general methods for constructing new codes from old codes. Here we concentrate on two more specialized techniques that result from writing
More informationRegenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems
Regenerating Codes and Locally Recoverable 1 Codes for Distributed Storage Systems Yongjune Kim and Yaoqing Yang Abstract We survey the recent results on applying error control coding to distributed storage
More information1 Vandermonde matrices
ECE 771 Lecture 6 BCH and RS codes: Designer cyclic codes Objective: We will begin with a result from linear algebra regarding Vandermonde matrices This result is used to prove the BCH distance properties,
More informationWeakly Secure Regenerating Codes for Distributed Storage
Weakly Secure Regenerating Codes for Distributed Storage Swanand Kadhe and Alex Sprintson 1 arxiv:1405.2894v1 [cs.it] 12 May 2014 Abstract We consider the problem of secure distributed data storage under
More informationExplicit MBR All-Symbol Locality Codes
Explicit MBR All-Symbol Locality Codes Govinda M. Kamath, Natalia Silberstein, N. Prakash, Ankit S. Rawat, V. Lalitha, O. Ozan Koyluoglu, P. Vijay Kumar, and Sriram Vishwanath 1 Abstract arxiv:1302.0744v2
More informationIBM Research Report. Construction of PMDS and SD Codes Extending RAID 5
RJ10504 (ALM1303-010) March 15, 2013 Computer Science IBM Research Report Construction of PMDS and SD Codes Extending RAID 5 Mario Blaum IBM Research Division Almaden Research Center 650 Harry Road San
More informationDistributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient
Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Viveck R Cadambe, Syed A Jafar, Hamed Maleki Electrical Engineering and
More informationMinimum Repair Bandwidth for Exact Regeneration in Distributed Storage
1 Minimum Repair andwidth for Exact Regeneration in Distributed Storage Vivec R Cadambe, Syed A Jafar, Hamed Malei Electrical Engineering and Computer Science University of California Irvine, Irvine, California,
More informationCorrecting Bursty and Localized Deletions Using Guess & Check Codes
Correcting Bursty and Localized Deletions Using Guess & Chec Codes Serge Kas Hanna, Salim El Rouayheb ECE Department, Rutgers University serge..hanna@rutgers.edu, salim.elrouayheb@rutgers.edu Abstract
More informationCoding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014
Anna Dovzhik 1 Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Sharing data across channels, such as satellite, television, or compact disc, often
More informationA Tight Rate Bound and Matching Construction for Locally Recoverable Codes with Sequential Recovery From Any Number of Multiple Erasures
1 A Tight Rate Bound and Matching Construction for Locally Recoverable Codes with Sequential Recovery From Any Number of Multiple Erasures arxiv:181050v1 [csit] 6 Dec 018 S B Balaji, Ganesh R Kini and
More informationProgress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes
Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes Ankit Singh Rawat CS Department Carnegie Mellon University Pittsburgh, PA 523 Email: asrawat@andrewcmuedu O Ozan Koyluoglu Department
More informationBinary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction
BCH Codes Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Preface The
More informationError-correcting codes and applications
Error-correcting codes and applications November 20, 2017 Summary and notation Consider F q : a finite field (if q = 2, then F q are the binary numbers), V = V(F q,n): a vector space over F q of dimension
More informationBerlekamp-Massey decoding of RS code
IERG60 Coding for Distributed Storage Systems Lecture - 05//06 Berlekamp-Massey decoding of RS code Lecturer: Kenneth Shum Scribe: Bowen Zhang Berlekamp-Massey algorithm We recall some notations from lecture
More informationChapter 6. BCH Codes
Chapter 6 BCH Codes Description of the Codes Decoding of the BCH Codes Outline Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Weight
More informationIN this paper, we will introduce a new class of codes,
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 44, NO 5, SEPTEMBER 1998 1861 Subspace Subcodes of Reed Solomon Codes Masayuki Hattori, Member, IEEE, Robert J McEliece, Fellow, IEEE, and Gustave Solomon,
More informationProof: Let the check matrix be
Review/Outline Recall: Looking for good codes High info rate vs. high min distance Want simple description, too Linear, even cyclic, plausible Gilbert-Varshamov bound for linear codes Check matrix criterion
More informationPAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES
International Journal of Pure and Applied Mathematics Volume 85 No. 6 013, 1001-1008 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: http://dx.doi.org/10.173/ijpam.v85i6.3
More informationSection 3 Error Correcting Codes (ECC): Fundamentals
Section 3 Error Correcting Codes (ECC): Fundamentals Communication systems and channel models Definition and examples of ECCs Distance For the contents relevant to distance, Lin & Xing s book, Chapter
More informationArrangements, matroids and codes
Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde
More informationSector-Disk Codes and Partial MDS Codes with up to Three Global Parities
Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Junyu Chen Department of Information Engineering The Chinese University of Hong Kong Email: cj0@alumniiecuhkeduhk Kenneth W Shum
More informationPermutation Decoding and the Stopping Redundancy Hierarchy of Cyclic and Extended Cyclic Codes
Permutation Decoding and the Stopping Redundancy Hierarchy of Cyclic and Extended Cyclic Codes Thorsten Hehn, Olgica Milenkovic, Stefan Laendner, and Johannes B. Huber, University of Erlangen-Nuremberg,
More informationLinear Programming Bounds for Robust Locally Repairable Storage Codes
Linear Programming Bounds for Robust Locally Repairable Storage Codes M. Ali Tebbi, Terence H. Chan, Chi Wan Sung Institute for Telecommunications Research, University of South Australia Email: {ali.tebbi,
More informationSPA decoding on the Tanner graph
SPA decoding on the Tanner graph x,(i) q j,l = P(v l = x check sums A l \ {h j } at the ith iteration} x,(i) σ j,l = Σ P(s = 0 v = x,{v : t B(h )\{l}}) q {vt : t B(h j )\{l}} j l t j t B(h j )\{l} j,t
More informationReed-Muller Codes. These codes were discovered by Muller and the decoding by Reed in Code length: n = 2 m, Dimension: Minimum Distance
Reed-Muller Codes Ammar Abh-Hhdrohss Islamic University -Gaza ١ Reed-Muller Codes These codes were discovered by Muller and the decoding by Reed in 954. Code length: n = 2 m, Dimension: Minimum Distance
More informationCoding problems for memory and storage applications
.. Coding problems for memory and storage applications Alexander Barg University of Maryland January 27, 2015 A. Barg (UMD) Coding for memory and storage January 27, 2015 1 / 73 Codes with locality Introduction:
More informationPartial-MDS Codes and their Application to RAID Type of Architectures
Partial-MDS Codes and their Application to RAID Type of Architectures arxiv:12050997v2 [csit] 11 Sep 2014 Mario Blaum, James Lee Hafner and Steven Hetzler IBM Almaden Research Center San Jose, CA 95120
More informationJointly Clustering Rows and Columns of Binary Matrices: Algorithms and Trade-offs
Jointly Clustering Rows and Columns of Binary Matrices: Algorithms and Trade-offs Jiaming Xu Joint work with Rui Wu, Kai Zhu, Bruce Hajek, R. Srikant, and Lei Ying University of Illinois, Urbana-Champaign
More informationReed-Solomon codes. Chapter Linear codes over finite fields
Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime
More informationRack-Aware Regenerating Codes for Data Centers
IEEE TRANSACTIONS ON INFORMATION THEORY 1 Rack-Aware Regenerating Codes for Data Centers Hanxu Hou, Patrick P. C. Lee, Kenneth W. Shum and Yuchong Hu arxiv:1802.04031v1 [cs.it] 12 Feb 2018 Abstract Erasure
More information4F5: Advanced Communications and Coding
4F5: Advanced Communications and Coding Coding Handout 4: Reed Solomon Codes Jossy Sayir Signal Processing and Communications Lab Department of Engineering University of Cambridge jossy.sayir@eng.cam.ac.uk
More informationError-Correcting Codes for Networks, Storage and Computation
Error-Correcting Codes for Networks, Storage and Computation Thesis by Wael Halbawi In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy CALIFORNIA INSTITUTE OF TECHNOLOGY
More informationLecture 3: Error Correcting Codes
CS 880: Pseudorandomness and Derandomization 1/30/2013 Lecture 3: Error Correcting Codes Instructors: Holger Dell and Dieter van Melkebeek Scribe: Xi Wu In this lecture we review some background on error
More informationChapter 6 Lagrange Codes
Chapter 6 Lagrange Codes 6. Introduction Joseph Louis Lagrange was a famous eighteenth century Italian mathematician [] credited with minimum degree polynomial interpolation amongst his many other achievements.
More informationSecure RAID Schemes from EVENODD and STAR Codes
Secure RAID Schemes from EVENODD and STAR Codes Wentao Huang and Jehoshua Bruck California Institute of Technology, Pasadena, USA {whuang,bruck}@caltechedu Abstract We study secure RAID, ie, low-complexity
More informationUpdate-Efficient Error-Correcting. Product-Matrix Codes
Update-Efficient Error-Correcting 1 Product-Matrix Codes Yunghsiang S Han, Fellow, IEEE, Hung-Ta Pai, Senior Member IEEE, Rong Zheng, Senior Member IEEE, Pramod K Varshney, Fellow, IEEE arxiv:13014620v2
More informationAn Introduction to (Network) Coding Theory
An Introduction to (Network) Coding Theory Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland July 12th, 2018 1 Coding Theory Introduction Reed-Solomon codes 2 Introduction Coherent network
More informationThe number of message symbols encoded into a
L.R.Welch THE ORIGINAL VIEW OF REED-SOLOMON CODES THE ORIGINAL VIEW [Polynomial Codes over Certain Finite Fields, I.S.Reed and G. Solomon, Journal of SIAM, June 1960] Parameters: Let GF(2 n ) be the eld
More informationInformation Redundancy: Coding
Info Redundancy April 2, 23 Information Redundancy: Coding Often applied to Info transfer: often serial communication thru a channel Info storage Hamming distance: error detection & correction capability
More informationCommunication Efficient Secret Sharing
Communication Efficient Secret Sharing 1 Wentao Huang, Michael Langberg, senior member, IEEE, Joerg Kliewer, senior member, IEEE, and Jehoshua Bruck, Fellow, IEEE arxiv:1505.07515v2 [cs.it] 1 Apr 2016
More informationA Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes
A Piggybacing Design Framewor for Read-and Download-efficient Distributed Storage Codes K V Rashmi, Nihar B Shah, Kannan Ramchandran, Fellow, IEEE Department of Electrical Engineering and Computer Sciences
More informationImplementation of Galois Field Arithmetic. Nonbinary BCH Codes and Reed-Solomon Codes
BCH Codes Wireless Information Transmission System Lab Institute of Communications Engineering g National Sun Yat-sen University Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation
More informationChapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding
Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols
More information1 Locally computable randomized encodings
CSG399: Gems of Theoretical Computer Science Lectures 3-4 Feb 20-24, 2009 Instructor: Emanuele Viola Scribe: Eric Miles Cryptography in constant depth: II & III Locally computable randomized encodings
More informationEE 229B ERROR CONTROL CODING Spring 2005
EE 229B ERROR CONTROL CODING Spring 2005 Solutions for Homework 1 1. Is there room? Prove or disprove : There is a (12,7) binary linear code with d min = 5. If there were a (12,7) binary linear code with
More informationList Decoding of Noisy Reed-Muller-like Codes
List Decoding of Noisy Reed-Muller-like Codes Martin J. Strauss University of Michigan Joint work with A. Robert Calderbank (Princeton) Anna C. Gilbert (Michigan) Joel Lepak (Michigan) Euclidean List Decoding
More informationGuess & Check Codes for Deletions, Insertions, and Synchronization
Guess & Check Codes for Deletions, Insertions, and Synchronization Serge Kas Hanna, Salim El Rouayheb ECE Department, Rutgers University sergekhanna@rutgersedu, salimelrouayheb@rutgersedu arxiv:759569v3
More informationAll-to-All Gradecast using Coding with Byzantine Failures
All-to-All Gradecast using Coding with Byzantine Failures John Bridgman Vijay Garg Parallel and Distributed Systems Lab (PDSL) at The University of Texas at Austin email: johnfbiii@utexas.edu Presented
More informationOptimal binary linear locally repairable codes with disjoint repair groups
1 Optimal binary linear locally repairable codes with disjoint repair groups Jingxue Ma and Gennian Ge arxiv:17110718v1 [csit] 20 Nov 2017 Abstract In recent years, several classes of codes are introduced
More informationAn Introduction to (Network) Coding Theory
An to (Network) Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland April 24th, 2018 Outline 1 Reed-Solomon Codes 2 Network Gabidulin Codes 3 Summary and Outlook A little bit of history
More informationLinear Programming Bounds for Distributed Storage Codes
1 Linear Programming Bounds for Distributed Storage Codes Ali Tebbi, Terence H. Chan, Chi Wan Sung Department of Electronic Engineering, City University of Hong Kong arxiv:1710.04361v1 [cs.it] 12 Oct 2017
More informationSecurity in Locally Repairable Storage
1 Security in Locally Repairable Storage Abhishek Agarwal and Arya Mazumdar Abstract In this paper we extend the notion of locally repairable codes to secret sharing schemes. The main problem we consider
More informationCongruences for Fishburn numbers modulo prime powers
Congruences for Fishburn numbers modulo prime powers Partitions, q-series, and modular forms AMS Joint Mathematics Meetings, San Antonio January, 205 University of Illinois at Urbana Champaign ξ(3) = 5
More informationOn Secure Index Coding with Side Information
On Secure Index Coding with Side Information Son Hoang Dau Division of Mathematical Sciences School of Phys. and Math. Sciences Nanyang Technological University 21 Nanyang Link, Singapore 637371 Email:
More informationA Piggybacking Design Framework for Read- and- Download- efficient Distributed Storage Codes. K. V. Rashmi, Nihar B. Shah, Kannan Ramchandran
A Piggybacking Design Framework for Read- and- Download- efficient Distributed Storage Codes K V Rashmi, Nihar B Shah, Kannan Ramchandran Outline IntroducGon & MoGvaGon Measurements from Facebook s Warehouse
More informationCommunication Efficient Secret Sharing
1 Communication Efficient Secret Sharing Wentao Huang, Michael Langberg, Senior Member, IEEE, Joerg Kliewer, Senior Member, IEEE, and Jehoshua Bruck, Fellow, IEEE Abstract A secret sharing scheme is a
More informationExplicit Code Constructions for Distributed Storage Minimizing Repair Bandwidth
Explicit Code Constructions for Distributed Storage Minimizing Repair Bandwidth A Project Report Submitted in partial fulfilment of the requirements for the Degree of Master of Engineering in Telecommunication
More informationCover Page. The handle holds various files of this Leiden University dissertation
Cover Page The handle http://hdl.handle.net/1887/57796 holds various files of this Leiden University dissertation Author: Mirandola, Diego Title: On products of linear error correcting codes Date: 2017-12-06
More informationProbabilistic Systems Analysis Spring 2018 Lecture 6. Random Variables: Probability Mass Function and Expectation
EE 178 Probabilistic Systems Analysis Spring 2018 Lecture 6 Random Variables: Probability Mass Function and Expectation Probability Mass Function When we introduce the basic probability model in Note 1,
More informationEE512: Error Control Coding
EE51: Error Control Coding Solution for Assignment on BCH and RS Codes March, 007 1. To determine the dimension and generator polynomial of all narrow sense binary BCH codes of length n = 31, we have to
More informationStructured Low-Density Parity-Check Codes: Algebraic Constructions
Structured Low-Density Parity-Check Codes: Algebraic Constructions Shu Lin Department of Electrical and Computer Engineering University of California, Davis Davis, California 95616 Email:shulin@ece.ucdavis.edu
More informationEfficient Secret Sharing Schemes Achieving Optimal Information Rate
Efficient Secret Sharing Schemes Achieving Optimal Information Rate Yongge Wang KINDI Center for Computing Research, Qatar University, Qatar and Department of SIS, UNC Charlotte, USA Email: yonggewang@unccedu
More informationLecture 12: Reed-Solomon Codes
Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 007) Lecture 1: Reed-Solomon Codes September 8, 007 Lecturer: Atri Rudra Scribe: Michel Kulhandjian Last lecture we saw the proof
More informationConstructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach
Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Shu Lin, Shumei Song, Lan Lan, Lingqi Zeng and Ying Y Tai Department of Electrical & Computer Engineering University of California,
More informationChapter 7 Reed Solomon Codes and Binary Transmission
Chapter 7 Reed Solomon Codes and Binary Transmission 7.1 Introduction Reed Solomon codes named after Reed and Solomon [9] following their publication in 1960 have been used together with hard decision
More informationDetermining a span. λ + µ + ν = x 2λ + 2µ 10ν = y λ + 3µ 9ν = z.
Determining a span Set V = R 3 and v 1 = (1, 2, 1), v 2 := (1, 2, 3), v 3 := (1 10, 9). We want to determine the span of these vectors. In other words, given (x, y, z) R 3, when is (x, y, z) span(v 1,
More informationan author's https://oatao.univ-toulouse.fr/18723 http://dx.doi.org/10.1109/isit.2017.8006599 Detchart, Jonathan and Lacan, Jérôme Polynomial Ring Transforms for Efficient XOR-based Erasure Coding. (2017)
More informationPermutation Codes: Optimal Exact-Repair of a Single Failed Node in MDS Code Based Distributed Storage Systems
Permutation Codes: Optimal Exact-Repair of a Single Failed Node in MDS Code Based Distributed Storage Systems Viveck R Cadambe Electrical Engineering and Computer Science University of California Irvine,
More informationLecture 12: November 6, 2017
Information and Coding Theory Autumn 017 Lecturer: Madhur Tulsiani Lecture 1: November 6, 017 Recall: We were looking at codes of the form C : F k p F n p, where p is prime, k is the message length, and
More informationDistributed storage systems from combinatorial designs
Distributed storage systems from combinatorial designs Aditya Ramamoorthy November 20, 2014 Department of Electrical and Computer Engineering, Iowa State University, Joint work with Oktay Olmez (Ankara
More informationOn Encoding Symbol Degrees of Array BP-XOR Codes
On Encoding Symbol Degrees of Array BP-XOR Codes Maura B. Paterson Dept. Economics, Math. & Statistics Birkbeck University of London Email: m.paterson@bbk.ac.uk Douglas R. Stinson David R. Cheriton School
More informationDecoding Algorithm and Architecture for BCH Codes under the Lee Metric
Decoding Algorithm and Architecture for BCH Codes under the Lee Metric Yingquan Wu and Christoforos N. Hadjicostis Coordinated Science Laboratory and Department of Electrical and Computer Engineering University
More informationParallel Numerical Algorithms
Parallel Numerical Algorithms Chapter 13 Prof. Michael T. Heath Department of Computer Science University of Illinois at Urbana-Champaign CS 554 / CSE 512 Michael T. Heath Parallel Numerical Algorithms
More information6.895 PCP and Hardness of Approximation MIT, Fall Lecture 3: Coding Theory
6895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 3: Coding Theory Lecturer: Dana Moshkovitz Scribe: Michael Forbes and Dana Moshkovitz 1 Motivation In the course we will make heavy use of
More informationREED-SOLOMON CODE SYMBOL AVOIDANCE
Vol105(1) March 2014 SOUTH AFRICAN INSTITUTE OF ELECTRICAL ENGINEERS 13 REED-SOLOMON CODE SYMBOL AVOIDANCE T Shongwe and A J Han Vinck Department of Electrical and Electronic Engineering Science, University
More informationVector spaces. EE 387, Notes 8, Handout #12
Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is
More informationTowards Optimal Deterministic Coding for Interactive Communication
Towards Optimal Deterministic Coding for Interactive Communication Ran Gelles Bernhard Haeupler Gillat Kol Noga Ron-Zewi Avi Wigderson Abstract We show an efficient, deterministic interactive coding scheme
More informationOn MBR codes with replication
On MBR codes with replication M. Nikhil Krishnan and P. Vijay Kumar, Fellow, IEEE Department of Electrical Communication Engineering, Indian Institute of Science, Bangalore. Email: nikhilkrishnan.m@gmail.com,
More informationMinimum Number of Multiplications of U Hash Functions
Minimum Number of Multiplications of U Hash Functions Indian Statistical Institute, Kolkata mridul@isical.ac.in March 4, FSE-2014, London Authentication: The Popular Story 1 Alice and Bob share a secret
More informationOn Locally Recoverable (LRC) Codes
On Locally Recoverable (LRC) Codes arxiv:151206161v1 [csit] 18 Dec 2015 Mario Blaum IBM Almaden Research Center San Jose, CA 95120 Abstract We present simple constructions of optimal erasure-correcting
More informationPolynomial Codes over Certain Finite Fields
Polynomial Codes over Certain Finite Fields A paper by: Irving Reed and Gustave Solomon presented by Kim Hamilton March 31, 2000 Significance of this paper: Introduced ideas that form the core of current
More informationError Detection & Correction
Error Detection & Correction Error detection & correction noisy channels techniques in networking error detection error detection capability retransmition error correction reconstruction checksums redundancy
More informationCorrecting Localized Deletions Using Guess & Check Codes
55th Annual Allerton Conference on Communication, Control, and Computing Correcting Localized Deletions Using Guess & Check Codes Salim El Rouayheb Rutgers University Joint work with Serge Kas Hanna and
More informationAn Algorithm for a Two-Disk Fault-Tolerant Array with (Prime 1) Disks
An Algorithm for a Two-Disk Fault-Tolerant Array with (Prime 1) Disks Sanjeeb Nanda and Narsingh Deo School of Computer Science University of Central Florida Orlando, Florida 32816-2362 sanjeeb@earthlink.net,
More informationCooperative Repair of Multiple Node Failures in Distributed Storage Systems
Cooperative Repair of Multiple Node Failures in Distributed Storage Systems Kenneth W. Shum Institute of Network Coding The Chinese University of Hong Kong Junyu Chen Department of Information Engineering
More informationClass-r hypercubes and related arrays
Class-r hypercubes and related arrays David Thomson Carleton University, Ottawa ON joint work with John Ethier, Melissa Huggan Gary L. Mullen, Daniel Panario and Brett Stevens D. Thomson (Carleton) Class-r
More informationCauchy MDS Array Codes With Efficient Decoding Method
IEEE TRANSACTIONS ON COMMUNICATIONS Cauchy MDS Array Codes With Efficient Decoding Method Hanxu Hou and Yunghsiang S Han, Fellow, IEEE Abstract arxiv:609968v [csit] 30 Nov 206 Array codes have been widely
More information