Error Control for Real-Time Streaming Applications

Size: px
Start display at page:

Download "Error Control for Real-Time Streaming Applications"

Transcription

1 Error Control for Real-Time Streaming Applications Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Joint work with: Ahmed Badr (Toronto), Wai-Tian Tan (Cisco), Xiaoqing Zhu (Cisco), John Apostolopoulos (Cisco)

2 Multimedia Streaming - Overview Source Stream Latency Receiver Interrup;on Network Receiver 2 Latency Interrup;on Streaming Server Receiver 3 Applications Application Bit-Rate (Mbps) MSDU (B) Delay (ms) PLR Video Conf. 2 Mbps ms 10 4 Interactive Gaming 1 Mbps ms 10 4 Video Streaming 4 Mbps s / 35

3 Streaming Audio time(ms) s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 3/ 35

4 Streaming Audio 0Source Stream time(ms) s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 Playback Stream T=100ms s 0 s 1 s 2 3/ 35

5 Streaming Audio 0 Source Stream time(ms) s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 Playback Stream T=100ms s 0 s 1 s 2 3/ 35

6 Streaming Audio Source Stream s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 Encoded Stream 0 Source s time(ms) 0 Stream s 1 s 2 s 3 s 4 s 5 s 6 s ps 0 p s 1 p s 2 p s 3 p s 4 p s 5 p s 6 p s 7 s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 Playback Stream Playback Stream s 0 s 1 s 2 s 0 s 1 s 2 T=100ms T=100ms (n, k) Streaming Code Source Packet: s i F k q, Parity Packet: p i F n k q ( ) si Channel Packet: x i = F n q Rate R = k n. p i 3/ 35

7 Block Length and Error Correction Source Stream s 0 s 1 s 2 s 3 s 4 s 5 (3,2) FEC s 0 s 1 p 1 s 2 s 3 p 2 s 4 s 5 p 3 s 6 s 7 p 4 (6,4) FEC s 0 s 1 s 2 s 3 p 1 p 2 s 4 s 5 s 6 s 7 p 3 p 4 Smaller Block Length = Smaller Delay Longer Block Length = Better Error Correction Channel Dynamics affect Delay 4/ 35

8 Block Length and Error Correction Source Stream Source Stream s 0 s 0 1 s 1 2 s 2 3 s 3 4 s (3,2) FEC (3,2) FEC s 0 s 1 p 1 s 2 s 3 p 2 s 4 s 0 s 1 p 1 s 2 s 3 p 2 s 4 s (6,4) FEC 0 s 3 (6,4) FEC s 0 s 0 1 s 1 2 s p p 1 2 s s 5 s 5 p 3 p 3 s 6 s 6 s 7 s 7 p 4 p 4 s 5 5 s 6 6 s 7 7 p 3 3 p 4 4 s 0 s 3 Smaller Block Length = Smaller Delay Longer Block Length = Better Error Correction Channel Dynamics affect Delay 4/ 35

9 Block Length and Error Correction Source Stream Source Stream s 0 s 0 1 s 1 2 s 2 3 s 3 4 s (3,2) FEC (3,2) FEC s 0 s 1 p 1 s 2 s 3 p 2 s 4 s 0 s 1 p 1 s 2 s 3 p 2 s 4 s?? 0 s 3 (6,4) FEC (6,4) FEC s 0 s 0 1 s 1 2 s 2 3 p 3 1 p 1 2 s s 5 s 5 p 3 p 3 s 6 s 6 s 7 s 7 p 4 p 4 s 5 5 s 6 6 s 7 7 p 3 3 p 4 4 s 0 s 31 Smaller Block Length = Smaller Delay Longer Block Length = Better Error Correction Channel Dynamics affect Delay 4/ 35

10 Non-Block Codes Block Codes Convolutional/Streaming Codes 5/ 35

11 Real-Time Communication System 6/ 35

12 Real-Time Communication System 6/ 35

13 Real-Time Communication System 6/ 35

14 Real-Time Communication System 6/ 35

15 Real-Time Communication System 6/ 35

16 Real-Time Communication System 6/ 35

17 Real-Time Communication System 6/ 35

18 Real-Time Communication System 6/ 35

19 Real-Time Communication System 6/ 35

20 Real-Time Communication System 6/ 35

21 Real-Time Communication System 6/ 35

22 Real-Time Communication System 6/ 35

23 Proposed Channel Model 1- Good Bad 1- Bad State Good State Bad State Gilbert-Elliott Model Practical Channels introduce both burst and isolated losses. Gilbert-Elliott Channel Models Our Contribution: Error Control Codes for Real-Time Streaming over Channels with Burst and Isolated Erasures. 7/ 35

24 Baseline Approach: Random Linear Codes k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i 1 H s i M H M, Erasure Codes: H i F k n k q Random Linear Codes Convolutional-MDS Codes (Gabidulin 88, G.-Luerssen 06 ) p 4 H 4 H 3 H 2 H 1 s 0 p 5 p 6 = H 5 H 4 H 3 H 2 s 1 0 H 5 H 4 H 3 s 2 p H 5 H 4 s 3 }{{} full rank 8/ 35

25 Baseline Approach: Random Linear Codes k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i 1 H s i M H M, Erasure Codes: H i F k n k q Random Linear Codes Convolutional-MDS Codes (Gabidulin 88, G.-Luerssen 06 ) p 4 H 4 H 3 H 2 H 1 s 0 p 5 p 6 = H 5 H 4 H 3 H 2 s 1 0 H 5 H 4 H 3 s 2 p H 5 H 4 s 3 }{{} full rank 8/ 35

26 Baseline Approach: Random Linear Codes k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i 1 H s i M H M, Erasure Codes: H i F k n k q Random Linear Codes Convolutional-MDS Codes (Gabidulin 88, G.-Luerssen 06 ) p 4 H 4 H 3 H 2 H 1 s 0 p 5 p 6 = H 5 H 4 H 3 H 2 s 1 0 H 5 H 4 H 3 s 2 p H 5 H 4 s 3 }{{} full rank 8/ 35

27 Baseline Approach: Random Linear Codes k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i 1 H s i M H M, Erasure Codes: H i F k n k q Random Linear Codes Convolutional-MDS Codes (Gabidulin 88, G.-Luerssen 06 ) p 4 H 4 H 3 H 2 H 1 s 0 p 5 p 6 = H 5 H 4 H 3 H 2 s 1 0 H 5 H 4 H 3 s 2 p H 5 H 4 s 3 }{{} full rank 8/ 35

28 Baseline Approach: Random Linear Codes k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i 1 H s i M H M, Erasure Codes: H i F k n k q Random Linear Codes Convolutional-MDS Codes (Gabidulin 88, G.-Luerssen 06 ) p 4 H 4 H 3 H 2 H 1 s 0 p 5 p 6 = H 5 H 4 H 3 H 2 s 1 0 H 5 H 4 H 3 s 2 p H 5 H 4 s 3 }{{} full rank 8/ 35

29 Baseline Approach: Random Linear Codes k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i 1 H s i M H M, Erasure Codes: H i F k n k q Random Linear Codes Convolutional-MDS Codes (Gabidulin 88, G.-Luerssen 06 ) p 4 H 4 H 3 H 2 H 1 s 0 p 5 p 6 = H 5 H 4 H 3 H 2 s 1 0 H 5 H 4 H 3 s 2 p H 5 H 4 s 3 }{{} full rank 8/ 35

30 Baseline Approach: Random Linear Codes k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i 1 H s i M H M, Erasure Codes: Recover s 0, s 1, s 2, s 3 H i F k n k q Random Linear Codes Convolutional-MDS Codes (Gabidulin 88, G.-Luerssen 06 ) p 4 H 4 H 3 H 2 H 1 s 0 p 5 p 6 = H 5 H 4 H 3 H 2 s 1 0 H 5 H 4 H 3 s 2 p H 5 H 4 s 3 }{{} full rank 8/ 35

31 Baseline Approach: Random Linear Codes k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 Take Away Points: Recover s 0, s 1, s 2, s 3 Recovery Condition: # of erased symbols < # of received parity equations. Adaptive to Erasure Pattern Weak Burst Correction (R=1/2 =, T 2B) 8/ 35

32 Layered Coding Scheme B = 4, T = 8, R = T T +B = 2 3 Rate 1/2 Baseline Erasure Codes, T = 7 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 v 8 v 9 v 10 v 11 p 8 p 9 p 10 p 11 x i v 0,v 1,v 2,v 3 9/ 35

33 Layered Coding Scheme B = 4, T = 8, R = T T +B = 2 3 Rate 1/2 Baseline Erasure Codes, T = 7 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 v 8 v 9 v 10 v 11 p 8 p 9 p 10 p 11 x i Rate 1/2 Repetition Code, T = 8 v 0,v 1,v 2,v 3 u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u -8 u -7 u -6 u -5 u -4 u -3 u -2 u -1 u 8 u 9 u 10 u 11 u 0 u 1 u 2 u 3 x i u 0 u 1 u 2 u 3 9/ 35

34 Layered Coding Scheme B = 4, T = 8, R = T T +B = 2 3 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 v u u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 u -8 u -7 u -6 u -5 u -4 u -3 u -2 u -1 u 0 u 1 u 2 u 3 u u 10/ 35

35 Layered Coding Scheme B = 4, T = 8, R = T T +B = 2 3 u 0 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 u -8 u 1 u -7 u 2 u -6 u 3 u -5 u 4 u -4 u 5 u -3 u 6 u -2 u 7 u -1 u 8 u 0 u 9 u 1 u 10 u 2 u 11 p 11 u 3 u v u u R= u+v 3u+v = / 35

36 Layered Coding Scheme B = 4, T = 8, R = T T +B = 2 3 s i u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 +u -8 +u -7 +u -6 +u -5 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 +u -4 u v u x i R= u+v 2 u+v = / 35

37 Layered Coding Scheme B = 4, T = 8, R = T T +B = 2 3 s i u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 +u -8 +u -7 +u -6 +u -5 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 +u -4 u v u x i R= u v 2 u v Encoding: 1 Source Splitting: s i = (u i, v i ), u i F B q, v i F T B q 2 Erasure Code on v i : Generate v i (v i, p i ) where p i F B q is obtained from a RLC. 3 Repetition Code on u i : Repeat the u i symbols with a shift of T 4 Merging: Combine the repeated u i s with the p i s 5 Rate: R = T T +B 10/ 35

38 Layered Coding Scheme B = 4, T = 8, R = T T +B = 2 3 s i u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 +u -8 +u -7 +u -6 +u -5 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 +u -4 u v u x i R= u+v 2 u+v = 2 3 v 0,v 1,v 2,v 3 Encoding: 1 Source Splitting: s i = (u i, v i ), u i F B q, v i F T B q 2 Erasure Code on v i : Generate v i (v i, p i ) where p i F B q is obtained from a RLC. 3 Repetition Code on u i : Repeat the u i symbols with a shift of T 4 Merging: Combine the repeated u i s with the p i s 5 Rate: R = T T +B 10/ 35

39 Layered Coding Scheme B = 4, T = 8, R = T T +B = 2 3 s i u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 +u -8 +u -7 +u -6 +u -5 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 +u -4 u v u x i R= u v 2 u v v 0,v 1,v 2,v 3 u 0 u 1 u 2 u 3 Encoding: 1 Source Splitting: s i = (u i, v i ), u i F B q, v i F T B q 2 Erasure Code on v i : Generate v i (v i, p i ) where p i F B q is obtained from a RLC. 3 Repetition Code on u i : Repeat the u i symbols with a shift of T 4 Merging: Combine the repeated u i s with the p i s 5 Rate: R = T T +B 10/ 35

40 Layered Coding Scheme B = 4, T = 8, R = T T +B = 2 3 s i u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 +u -8 +u -7 +u -6 +u -5 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 +u -4 u v u x i R= u+v 2 u+v = 2 3 v 0,v 1,v 2,v 3 u 0 u 1 u 2 u 3 Encoding: s 0 s 1 s 2 s 3 1 Source Splitting: s i = (u i, v i ), u i F B q, v i F T B q 2 Erasure Code on v i : Generate v i (v i, p i ) where p i F B q is obtained from a RLC. 3 Repetition Code on u i : Repeat the u i symbols with a shift of T 4 Merging: Combine the repeated u i s with the p i s 5 Rate: R = T T +B 10/ 35

41 Layered Coding Scheme B = 4, T = 8, R = s i T T +B = 2 3 v u 0 p v 0 v u 1 p v 1 v u 2 p v 2 v u 3 p v 3 v u 4 p v 4 v u 5 p v 5 v u 6 p v 6 v u 7 7 p v 7 7 v u 8 p v 8 v u 9 p v 9 v u 10 p v 10 v u 11 p v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 +u -8 +u -7 +u -6 +u -5 +u -4 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 u -8 u -7 u -6 u -5 +u u -4-4 u -3 u 0 u 1 R= u u+v u v 2 u 3 u 4 u 5 u 6 u u+v 1 2 v u v 0,v 1,v 2,v 3 u 0 u 1 u 2 u 2 = u -8 u -7 u -6 u -5 u -4 u -3 u -2 u -1 u 0 u 1 u 2 Encoding: u -2 u -1 u 0 u 1 u 2 u 3 u 3 s 0 s 1 s 2 s 3 uv vu u u u u x i 1 Source Splitting: s i = (u i, v i ), u i F B q, v i F T B q 2 Erasure Code on v i : Generate v i (v i, p i ) where p i F B q is obtained from a RLC. 3 Repetition Code on u i : Repeat the u i symbols with a shift of T 4 Merging: Combine the repeated u i s with the p i s 5 Rate: R = T T +B 10/ 35

42 Convolutional Codes s i =(s i,1,...,s i,k ) Source Symbol: s i (n,k,m) Convolu-onal Code x i =(x i,1,...,x i,n ) Channel Symbol: x i x i = s i G 0 + s i 1 G s i m G m, G j F k n q Column Distance: d T : G 0 G 1... G T [ ] 0 G 0... G T 1 d T = min ŵt s0... s T [s 0,...,s T ]..... s G 0 ŵt( ): Hamming weight (Packet Level). 11/ 35

43 Convolutional Codes Column-Distance (Costello 1969): Trellis Path with the following properties: Diverges from the all-zero state at t = 0 Min. Weight in the interval [0, T ] States Column Distance in [0,3] 11/ 35

44 Strongly-MDS Convolutional Codes H. Gluesing-Luerssen, J. Rosenthal and R. Smarandache (IT-2006) States Column Distance in [0,3] Generalized Singleton Bound: d T (1 R)(T + 1) + 1. Counterpart of MDS Block Codes Systematic Codes: x i = (s i, p i ), where p i F n k q 12/ 35

45 Column Distance & Error Correction - Packet Erasures Sliding Window Erasure Channel of Type I: C I (N, W ) In any sliding window of length W there are no more than N erasures (N,W) = (3,6) A Convolutional Code with column distance d T recovers every source packet with delay of T if: W T + 1 d T N / 35

46 Column Distance & Error Correction - Packet Erasures Sliding Window Erasure Channel of Type I: C I (N, W ) In any sliding window of length W there are no more than N erasures (N,W) = (3,6) W = 6 N = 2 A Convolutional Code with column distance d T recovers every source packet with delay of T if: W T + 1 d T N / 35

47 Column Distance & Error Correction - Packet Erasures Sliding Window Erasure Channel of Type I: C I (N, W ) In any sliding window of length W there are no more than N erasures (N,W) = (3,6) W = W 6= 6 N = N 2= 2 A Convolutional Code with column distance d T recovers every source packet with delay of T if: W T + 1 d T N / 35

48 Column Distance & Error Correction - Packet Erasures Sliding Window Erasure Channel of Type I: C I (N, W ) In any sliding window of length W there are no more than N erasures (N,W) = (3,6) W = W 6= W 6= 6 N = N 2= N 2= 2 A Convolutional Code with column distance d T recovers every source packet with delay of T if: W T + 1 d T N / 35

49 Column Distance & Error Correction - Packet Erasures Sliding Window Erasure Channel of Type I: C I (N, W ) In any sliding window of length W there are no more than N erasures (N,W) = (3,6) W = W 6= W 6= W 6= 6 N = N 2= N 2= N 2= 3 A Convolutional Code with column distance d T recovers every source packet with delay of T if: W T + 1 d T N / 35

50 (Packet-Level) Distance and Span Properties Packet Level Column Distance: d T G 0 G 1... G T [ ] 0 G 0... G T 1 d T = min wt s0... s T [s 0,...,s T ]..... s G 0 Packet-Level Column Span: c T G 0 G 1... G T [ ] 0 G 0... G T 1 c T = min span s0... s T [s 0,...,s T ]..... s G 0 14/ 35

51 Column-Span c T = min [s 0,...,s T ] s 0 0 G 0 G 1... G T [ ] 0 G 0... G T 1 span s0... s T G 0 x[0] x[1] x[2] x[3] x[4] x[5] } {{ } j + 1 = 6 c j = c 5 = 6... x [0,T ] = [ x[0], x[1],..., x[t ] ] Column-Span: c T d T c T min {span(x [0:T ] s[0] 0} x C ( min 1, 1 R ) T + 1 R 15/ 35

52 Column Span & Error Correction - Packet Erasures Sliding Window Erasure Channel of Type II: C II (B, W ) In any sliding window of length W there is a single erasure burst of length B (B,W) = (3,5) B 1 =2 W-1 B 2 =3 W-1 B 3 =1 A Convolutional Code with column distance c T recovers every source packet with delay of T if: W T + 1 c T B / 35

53 Column-Distance & Column-Span Tradeoff Badr-Patil-Khisti-Tan-Apostolopoulos (T-IT 2017) Theorem Consider a C(N, B, W ) channel with delay T and W T + 1. A streaming code is feasible over this channel if and only if it satisfies: d T N + 1 and c T B + 1 (N,B,W) = (2,3,6) W = 6 N = 2 17/ 35

54 Column-Distance & Column-Span Tradeoff Badr-Patil-Khisti-Tan-Apostolopoulos (T-IT 2017) Theorem Consider a C(N, B, W ) channel with delay T and W T + 1. A streaming code is feasible over this channel if and only if it satisfies: d T N + 1 and c T B + 1 (N,B,W) = (2,3,6) W = W 6= 6 N = N 2= 2 17/ 35

55 Column-Distance & Column-Span Tradeoff Badr-Patil-Khisti-Tan-Apostolopoulos (T-IT 2017) Theorem Consider a C(N, B, W ) channel with delay T and W T + 1. A streaming code is feasible over this channel if and only if it satisfies: d T N + 1 and c T B + 1 (N,B,W) = (2,3,6) W = W 6= W 6= 6 N = N 2= N 2= 2 17/ 35

56 Column-Distance & Column-Span Tradeoff Badr-Patil-Khisti-Tan-Apostolopoulos (T-IT 2017) Theorem Consider a C(N, B, W ) channel with delay T and W T + 1. A streaming code is feasible over this channel if and only if it satisfies: d T N + 1 and c T B + 1 (N,B,W) = (2,3,6) W = W 6= W 6= W 6= 6 N = N 2= N 2= B 2= 3 17/ 35

57 Column-Distance & Column-Span Tradeoff Badr-Patil-Khisti-Tan-Apostolopoulos (T-IT 2017) Theorem Consider a C(N, B, W ) channel with delay T and W T + 1. A streaming code is feasible over this channel if and only if it satisfies: d T N + 1 and c T B + 1 (N,B,W) = (2,3,6) W = W 6= W 6= W 6= W 6= 6 N = N 2= N 2= B 2= B 3= 3 17/ 35

58 Column-Distance & Column-Span Tradeoff Badr-Patil-Khisti-Tan-Apostolopoulos (T-IT 2017) Theorem Consider a C(N, B, W ) channel with delay T and W T + 1. A streaming code is feasible over this channel if and only if it satisfies: d T N + 1 and c T B + 1 Theorem For any rate R convolutional code and any T 0 the Column-Distance d T and Column-Span c T satisfy the following: ( R 1 R ) c T + d T T R Any (c T, d T ) pair with c T d T is achievable over a sufficiently large field provided that: ( ) R c T + d T T R 1 R 18/ 35

59 MiDAS Construction Layered Code Design u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 u +u -8 +u -7 +u -6 +u -5 +u -4 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 q 1 q 2 q 3 q 4 q 5 q 6 q 7 q 8 q 9 q 10 q 11 l q 0 u v x i Burst-Erasure Streaming Code: (u i, v i, p i + u i T ) Erasure Code: q i = M t=1 u i t H u t, q i F l q Concatenation: (u i, v i, p i + u i T, q i ) Attains the lower bound R = T T + B + l 19/ 35

60 Simulation Results Gilbert-Elliott Channel (α, β) = (5 10 4, 0.5), T = 12 and R 0.5 Gilbert Elliott Channel Good State: Pr(loss) = ε Bad State: Pr(loss) = 1 1- Good Bad Gilbert Elliott Channel - (α,β,n,ǫb) = (0.0005,0.4,2,1) Probability of Occurence Burst Length 20/ 35

61 Simulation Results Gilbert-Elliott Channel (α, β) = (5 10 4, 0.5), T = 12 and R Gilbert Elliott Channel (, ) = (5E 4,0.5), T = Loss Probability x 10 3 Code N B Code N B RLC 6 6 MiDAS 2 9 Burst-Erasure / 35

62 Multicast Streaming Codes Badr-Khisti-Martinian (JSAC 2011) Badr-Khisti-Lui (IT Trans. 2015) Burst Erasure Broadcast Channel Src. Stream Encoder X[i] B 1 Decoder 1 Delay = T 1 B 2 Decoder 2 Delay = T 2 Motivation Common Source Stream, Multiple Receivers B 1 < B 2 Receiver 1 : Good Channel State Receiver 2: Weaker Channel State Delay adapts to Channel State 21/ 35

63 Multicast Streaming Codes Badr-Khisti-Martinian (JSAC 2011) Badr-Khisti-Lui (IT Trans. 2015) Burst Erasure Broadcast Channel Src. Stream Encoder X[i] B 1 Decoder 1 Delay = T 1 B 2 Decoder 2 Delay = T 2 Column-Span A streaming code is feasible on the (B 1, T 1, B 2, T 2 ) multicast channel if and only if: c T1 B c T2 B / 35

64 Diversity Embedded Streaming Codes: DE-SCo Badr-Khisti-Martinian (JSAC, March 2011) Burst Erasure Broadcast Channel Src. Stream Encoder X[i] B 1 Decoder 1 Delay = T 1 B 2 Decoder 2 Delay = T 2 Theorem There exists a {(B 1, T 1 ), (B 2, T 2 )} multicast streaming code of rate R = T 1 T 1 +B 1 provided T 2 T 2 B 2 B 1 T 1 +B 1. T 2 is the minimum such threshold. 22/ 35

65 Multicast Streaming Capacity Badr-Khisti-Lui (IT Trans. 2015) Assume w.l.o.g. B 2 B 1 T 2 B T = T1 B1 B1 Region A Capacity T2 T + B 2 2 B C B 1 + B 2 E (B 1, B 2 ) DE-SCo B 2 D T 2 =T 1 +B 1 T 2 =T 1 SCo A T 1 B C D E T1 T + B 2 1 T1 T + B 1 1 Partial Characterization 1 T2 B1 T B + B / 35

66 Multiple Multiplexed Streams Badr-Lui-Khisti-Tan-Zhu-Apostolopoulos (T-IT (Submitted), Netcod 2016) Encoder Burst Erasure Channel Decoder 1 Decoder 2 Source Streams: s 1 [t] F k 1 q s 2 [t] F k 2 q Encoder: x[t] = f t (s 1 [0], s 2 [0],..., s 1 [t], s 2 [t]) F n q R 1 = k 1 /n and R 2 = k 2 /n Burst Erasure Channel (B): x[t] y[t] Stream 1: ŝ 1 [t] = γ 1,t (y[0],..., y[t + T 1 ]) Stream 2: ŝ 2 [t] = γ 2,t (y[0],..., y[t + T 2 ]) Assume T 2 > T 1 (wlog) 24/ 35

67 Multiple Multiplexed Streams Badr-Lui-Khisti-Tan-Zhu-Apostolopoulos (T-IT (Submitted), Netcod 2016) Encoder Burst Erasure Channel Decoder 1 Decoder 2 Capacity Region A rate pair (R 1, R 2 ) is achievable if there is a streaming code with R 1 = k 1 /n and R 2 = k 2 /n over some F q such that: Each source packet in stream 1 is recovered with a delay of T 1 Each source packet in stream 2 is recovered with a delay of T 2 The union of all achievable rate pairs (R 1, R 2 ) is the capacity region. 24/ 35

68 Capacity Region T 2 T 1 + 2B R 1 T 1 T 1 +B T 1 T 2 +B 0 T 2 T 1 T 2 +B T 2 T 2 +B R 2 R 1 + R 2 T 2 T 2 + B, (T 1 + B)R 1 + T 1 R 2 T 1 25/ 35

69 Network Streaming Mahmood-Badr-Khisti (IT-Trans 2016) Channel Input: x t (F q M ) n (Extension Field) Channel Matrix: A t F n n q (Base Field) Chanel Output y t = x t A t Delay constraint T ŝ t = f t (y 0,..., y t+t ) 26/ 35

70 Network Streaming Mahmood-Badr-Khisti (IT-Trans 2016) Column Sum Rank: Theorem d R (T, C) = min (x 0,...,x T ) C s 0 0 T rank φ(x t ) Within the interval [0, T ] the source symbol s 0 is recoverable at time t = T if and only if t=0 T rankdef A j < d R (T, C) j=0 Construction of Maximum-Sum-Rank (MSR) convolutional codes. 27/ 35

71 Other Extensions Field Size Constraints: Diagonally Interleaved Codes (Badr-Khisti-Tan-Apostolopoulos 2014) Mismatched Streaming Codes (Patil-Badr-Khisti-Tan Asilomar 2013) Partial Recovery Streaming Codes (Badr-Khisti-Tan-Apostolopoulos JSTSP 2014) Multiple Erasure Bursts (Li-Khisti-Girod Asilomar 2011) - Interleaved Low-Delay Codes Multiple Links (Lui-Badr-Khisti CWIT 2011) - Layered coding for burst erasure channels Other Works Martinian and Sundberg (2004) Leong-Ho (ISIT 2012), Leong-Qureshi-Ho (ISIT 2013), N. Adler and Y. Cassuto (ISIT 2015) 28/ 35

72 Dual-Delay Streaming Codes Badr-Khisti-Zhu-Tan-Apostopolous (Infocom 2017) Short-Memory RLC Code Repetition Code with longer Memory Source Stream s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 s 8 s 9 s 10 s 11 s 12 Encoded Stream s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 s 8 s 9 s 10 s 11 s 12 q 0 q 1 q 2 q 3 q 4 q 5 q 6 q 7 q 8 q 9 q 10 q 11 q 12 q i = s i 1 + s i 2 + s i 10 29/ 35

73 Dual-Delay Streaming Codes Badr-Khisti-Zhu-Tan-Apostopolous (Infocom 2017) Short-Memory RLC Code Repetition Code with longer Memory Source Stream s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 s 8 s 9 s 10 s 11 s 12 Encoded Stream s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 s 8 s 9 s 10 s 11 s 12 q 0 q 1 q 2 q 3 q 4 q 5 q 6 q 7 q 8 q 9 q 10 q 11 q 12 q i = s i 1 + s i 2 + s i 10 29/ 35

74 Dual-Delay Streaming Codes Badr-Khisti-Zhu-Tan-Apostopolous (Infocom 2017) Short-Memory RLC Code Repetition Code with longer Memory Source Stream s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 s 8 s 9 s 10 s 11 s 12 Encoded Stream s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 s 8 s 9 s 10 s 11 s 12 q 0 q 1 q 2 q 3 q 4 q 5 q 6 q 7 q 8 q 9 q 10 q 11 q 12 Ignored Parity s 0 s 1 s 2 q 10 = s 8 + s }{{} 9 +s 0 not erased 29/ 35

75 Dual-Delay Streaming Codes Badr-Khisti-Zhu-Tan-Apostopolous (Infocom 2017) Short-Memory RLC Code Repetition Code with longer Memory Source Stream s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 s 8 s 9 s 10 s 11 s 12 Encoded Stream s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 s 8 s 9 s 10 s 11 s 12 q 0 q 1 q 2 q 3 q 4 q 5 q 6 q 7 q 8 q 9 q 10 q 11 q 12 Ignored Parity s 0 s 1 s 2 Short Bursts B = 1, 2, delay T = 2B, like RLC Longer Bursts B [3, 8], delay T = 10, Like Repetition Code B > 8, partial recovery with T > 10 RLC Threshold B = 5 29/ 35

76 Gilbert Elliott Channel Model Erasure Sequence 1- Good Bad 1- Delay (Pkts) Bad State Good State Gilbert-Elliott Model Tb Tg Excess Delay in Bad State time Chanel-Adaptive Delay Good State: T g = 3 packets Bad State: T b = 12 packets Comparisons Baseline (RLC) Codes Non-Adaptive Streaming Codes Adaptive (Dual-Delay) Streaming Codes 30/ 35

77 Simulation Result Gilbert-Elliott Channel (α, β) = (5 10 4, 0.4) and R 0.5 Gilbert Elliott Channel Good State: Pr(loss) = ε Bad State: Pr(loss) = 1 1- Good Bad Gilbert Elliott Channel - (α,β,n,ǫb) = (0.0005,0.4,2,1) Probability of Occurence Burst Length 31/ 35

78 Simulation Result Gilbert-Elliott Channel (α, β) = (5 10 4, 0.4) and R Gilbert Channel - (α,β) = (0.0005,0.4) 10-2 Uncoded mmds Code MS Code Horizon Code Packet Loss Rate (Tg = 3,Tb = 12) Erasure Probability in Good State (ǫ) Black Line: Random Linear Codes Red Line: Non-Adaptive Burst Erasure Codes Blue Line: Proposed Codes 31/ 35

79 Real-World Traces These are million packets We divide them into windows of 5 minutes (15000 packets) total of 1,250 windows. Delay T = 5. B 3 B [4, 20] PLR 1% PLR > 1% windows with very long bursts were not considered. 32/ 35

80 Real-World Traces-II 33/ 35

81 Demo 34/ 35

82 Conclusions Error Control Coding for Multimedia Streaming Real-Time Communication over Channels with Burst and Isolated Erasures Other Directions: Sequential Recovery Baseline Schemes are not ideal New Coding Schemes and Performance Gains Channel Dispersion in Streaming Setup (joint work with S. Lee and V. Tan) Source Coding in a streaming setup 35/ 35

(Structured) Coding for Real-Time Streaming Communication

(Structured) Coding for Real-Time Streaming Communication (Structured) Coding for Real-Time Streaming Communication Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Joint work with: Ahmed Badr (Toronto), Farrokh Etezadi (Toronto),

More information

Layered Error-Correction Codes for Real-Time Streaming over Erasure Channels

Layered Error-Correction Codes for Real-Time Streaming over Erasure Channels Layered Error-Correction Codes for Real-Time Streaming over Erasure Channels Ashish Khisti University of Toronto Joint Work: Ahmed Badr (Toronto), Wai-Tian Tan (Cisco), John Apostolopoulos (Cisco). Sequential

More information

AN increasing number of multimedia applications require. Streaming Codes with Partial Recovery over Channels with Burst and Isolated Erasures

AN increasing number of multimedia applications require. Streaming Codes with Partial Recovery over Channels with Burst and Isolated Erasures 1 Streaming Codes with Partial Recovery over Channels with Burst and Isolated Erasures Ahmed Badr, Student Member, IEEE, Ashish Khisti, Member, IEEE, Wai-Tian Tan, Member IEEE and John Apostolopoulos,

More information

Convolutional Codes with Maximum Column Sum Rank for Network Streaming

Convolutional Codes with Maximum Column Sum Rank for Network Streaming 1 Convolutional Codes with Maximum Column Sum Rank for Network Streaming Rafid Mahmood, Ahmed Badr, and Ashish Khisti School of Electrical and Computer Engineering University of Toronto Toronto, ON, M5S

More information

Streaming-Codes for Multicast over Burst Erasure Channels

Streaming-Codes for Multicast over Burst Erasure Channels 1 Streaming-Codes for Multicast over Burst Erasure Channels Ahmed Badr, Devin Lui and Ashish Khisti School of Electrical and Computer Engineering University of Toronto Toronto, ON, M5S 3G4, Canada Email:

More information

MANY multimedia applications such as interactive audio/video conferencing, mobile gaming and cloud-computing require

MANY multimedia applications such as interactive audio/video conferencing, mobile gaming and cloud-computing require Layered Constructions for Low-Delay Streaming Codes Ahmed Badr, Student Member, IEEE, Pratik Patil, Ashish Khisti, Member, IEEE, Wai-Tian Tan, Member, IEEE and John Apostolopoulos, Fellow, IEEE 1 arxiv:1308.3827v1

More information

A Truncated Prediction Framework for Streaming over Erasure Channels

A Truncated Prediction Framework for Streaming over Erasure Channels A Truncated Prediction Framework for Streaming over Erasure Channels Farrokh Etezadi, Ashish Khisti, Jun Chen Abstract We propose a new coding technique for sequential transmission of a stream of Gauss-Markov

More information

Section 3 Error Correcting Codes (ECC): Fundamentals

Section 3 Error Correcting Codes (ECC): Fundamentals Section 3 Error Correcting Codes (ECC): Fundamentals Communication systems and channel models Definition and examples of ECCs Distance For the contents relevant to distance, Lin & Xing s book, Chapter

More information

Iterative Quantization. Using Codes On Graphs

Iterative Quantization. Using Codes On Graphs Iterative Quantization Using Codes On Graphs Emin Martinian and Jonathan S. Yedidia 2 Massachusetts Institute of Technology 2 Mitsubishi Electric Research Labs Lossy Data Compression: Encoding: Map source

More information

Turbo Codes for xdsl modems

Turbo Codes for xdsl modems Turbo Codes for xdsl modems Juan Alberto Torres, Ph. D. VOCAL Technologies, Ltd. (http://www.vocal.com) John James Audubon Parkway Buffalo, NY 14228, USA Phone: +1 716 688 4675 Fax: +1 716 639 0713 Email:

More information

ANALYSIS OF CONTROL PROPERTIES OF CONCATENATED CONVOLUTIONAL CODES

ANALYSIS OF CONTROL PROPERTIES OF CONCATENATED CONVOLUTIONAL CODES CYBERNETICS AND PHYSICS, VOL 1, NO 4, 2012, 252 257 ANALYSIS OF CONTROL PROPERTIES OF CONCATENATED CONVOLUTIONAL CODES M I García-Planas Matemàtica Aplicada I Universitat Politècnica de Catalunya Spain

More information

EPOC Upstream Mapping Part 2

EPOC Upstream Mapping Part 2 EPOC Upstream Mapping Part 2 Ed Boyd, Broadcom Burst Anatomy UPSTREAM BURST MARKERS EPON Review The EPON OLT locks to the upstream without information from the MAC. The is able to determine 1G or 10G EPON

More information

Physical Layer and Coding

Physical Layer and Coding Physical Layer and Coding Muriel Médard Professor EECS Overview A variety of physical media: copper, free space, optical fiber Unified way of addressing signals at the input and the output of these media:

More information

Raptor Codes: From a Math Idea to LTE embms. BIRS, October 2015

Raptor Codes: From a Math Idea to LTE embms. BIRS, October 2015 Raptor Codes: From a Math Idea to LTE embms BIRS, October 2015 The plan is to... 1 introduce LT codes and Raptor codes 2 provide insights into their design 3 address some common misconceptions 2 / 31 The

More information

Channel Coding and Interleaving

Channel Coding and Interleaving Lecture 6 Channel Coding and Interleaving 1 LORA: Future by Lund www.futurebylund.se The network will be free for those who want to try their products, services and solutions in a precommercial stage.

More information

Distributed Decoding of Convolutional Network Error Correction Codes

Distributed Decoding of Convolutional Network Error Correction Codes 1 Distributed Decoding of Convolutional Network Error Correction Codes Hengjie Yang and Wangmei Guo arxiv:1701.06283v2 [cs.it] 18 Feb 2017 Abstract A Viterbi-like decoding algorithm is proposed in this

More information

On Weight Enumerators and MacWilliams Identity for Convolutional Codes

On Weight Enumerators and MacWilliams Identity for Convolutional Codes On Weight Enumerators and MacWilliams Identity for Convolutional Codes Irina E Bocharova 1, Florian Hug, Rolf Johannesson, and Boris D Kudryashov 1 1 Dept of Information Systems St Petersburg Univ of Information

More information

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land Ingmar Land, SIPCom8-1: Information Theory and Coding (2005 Spring) p.1 Overview Basic Concepts of Channel Coding Block Codes I:

More information

16.36 Communication Systems Engineering

16.36 Communication Systems Engineering MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication

More information

Regenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems

Regenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems Regenerating Codes and Locally Recoverable 1 Codes for Distributed Storage Systems Yongjune Kim and Yaoqing Yang Abstract We survey the recent results on applying error control coding to distributed storage

More information

Staircase Codes. for High-Speed Optical Communications

Staircase Codes. for High-Speed Optical Communications Staircase Codes for High-Speed Optical Communications Frank R. Kschischang Dept. of Electrical & Computer Engineering University of Toronto (Joint work with Lei Zhang, Benjamin Smith, Arash Farhood, Andrew

More information

The E8 Lattice and Error Correction in Multi-Level Flash Memory

The E8 Lattice and Error Correction in Multi-Level Flash Memory The E8 Lattice and Error Correction in Multi-Level Flash Memory Brian M Kurkoski University of Electro-Communications Tokyo, Japan kurkoski@iceuecacjp Abstract A construction using the E8 lattice and Reed-Solomon

More information

Introduction to Convolutional Codes, Part 1

Introduction to Convolutional Codes, Part 1 Introduction to Convolutional Codes, Part 1 Frans M.J. Willems, Eindhoven University of Technology September 29, 2009 Elias, Father of Coding Theory Textbook Encoder Encoder Properties Systematic Codes

More information

Coding for loss tolerant systems

Coding for loss tolerant systems Coding for loss tolerant systems Workshop APRETAF, 22 janvier 2009 Mathieu Cunche, Vincent Roca INRIA, équipe Planète INRIA Rhône-Alpes Mathieu Cunche, Vincent Roca The erasure channel Erasure codes Reed-Solomon

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

PAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES

PAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES International Journal of Pure and Applied Mathematics Volume 85 No. 6 013, 1001-1008 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: http://dx.doi.org/10.173/ijpam.v85i6.3

More information

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210

More information

1 1 0, g Exercise 1. Generator polynomials of a convolutional code, given in binary form, are g

1 1 0, g Exercise 1. Generator polynomials of a convolutional code, given in binary form, are g Exercise Generator polynomials of a convolutional code, given in binary form, are g 0, g 2 0 ja g 3. a) Sketch the encoding circuit. b) Sketch the state diagram. c) Find the transfer function TD. d) What

More information

On queueing in coded networks queue size follows degrees of freedom

On queueing in coded networks queue size follows degrees of freedom On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,

More information

Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel

Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel Wang, ISIT 2011 p. 1/15 Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel Chih-Chun Wang, Jaemin Han Center of Wireless Systems and Applications (CWSA) School

More information

Error Correction Methods

Error Correction Methods Technologies and Services on igital Broadcasting (7) Error Correction Methods "Technologies and Services of igital Broadcasting" (in Japanese, ISBN4-339-06-) is published by CORONA publishing co., Ltd.

More information

CS6304 / Analog and Digital Communication UNIT IV - SOURCE AND ERROR CONTROL CODING PART A 1. What is the use of error control coding? The main use of error control coding is to reduce the overall probability

More information

Communication Theory II

Communication Theory II Communication Theory II Lecture 24: Error Correction Techniques Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt May 14 th, 2015 1 Error Correction Techniques olinear Block Code Cyclic

More information

Advances in Error Control Strategies for 5G

Advances in Error Control Strategies for 5G Advances in Error Control Strategies for 5G Jörg Kliewer The Elisha Yegal Bar-Ness Center For Wireless Communications And Signal Processing Research 5G Requirements [Nokia Networks: Looking ahead to 5G.

More information

Introduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved. Introduction to Wireless & Mobile Systems Chapter 4 Channel Coding and Error Control 1 Outline Introduction Block Codes Cyclic Codes CRC (Cyclic Redundancy Check) Convolutional Codes Interleaving Information

More information

Decoding of Convolutional Codes over the Erasure Channel

Decoding of Convolutional Codes over the Erasure Channel 1 Decoding of Convolutional Codes over the Erasure Channel Virtudes Tomás, Joachim Rosenthal, Senior Member, IEEE, and Roxana Smarandache, Member, IEEE arxiv:10063156v3 [csit] 31 Aug 2011 Abstract In this

More information

Capacity Region of the Permutation Channel

Capacity Region of the Permutation Channel Capacity Region of the Permutation Channel John MacLaren Walsh and Steven Weber Abstract We discuss the capacity region of a degraded broadcast channel (DBC) formed from a channel that randomly permutes

More information

Energy State Amplification in an Energy Harvesting Communication System

Energy State Amplification in an Energy Harvesting Communication System Energy State Amplification in an Energy Harvesting Communication System Omur Ozel Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 20742 omur@umd.edu

More information

Roll No. :... Invigilator's Signature :.. CS/B.TECH(ECE)/SEM-7/EC-703/ CODING & INFORMATION THEORY. Time Allotted : 3 Hours Full Marks : 70

Roll No. :... Invigilator's Signature :.. CS/B.TECH(ECE)/SEM-7/EC-703/ CODING & INFORMATION THEORY. Time Allotted : 3 Hours Full Marks : 70 Name : Roll No. :.... Invigilator's Signature :.. CS/B.TECH(ECE)/SEM-7/EC-703/2011-12 2011 CODING & INFORMATION THEORY Time Allotted : 3 Hours Full Marks : 70 The figures in the margin indicate full marks

More information

Coding problems for memory and storage applications

Coding problems for memory and storage applications .. Coding problems for memory and storage applications Alexander Barg University of Maryland January 27, 2015 A. Barg (UMD) Coding for memory and storage January 27, 2015 1 / 73 Codes with locality Introduction:

More information

Large Deviations for Channels with Memory

Large Deviations for Channels with Memory Large Deviations for Channels with Memory Santhosh Kumar Jean-Francois Chamberland Henry Pfister Electrical and Computer Engineering Texas A&M University September 30, 2011 1/ 1 Digital Landscape Delay

More information

Correcting Localized Deletions Using Guess & Check Codes

Correcting Localized Deletions Using Guess & Check Codes 55th Annual Allerton Conference on Communication, Control, and Computing Correcting Localized Deletions Using Guess & Check Codes Salim El Rouayheb Rutgers University Joint work with Serge Kas Hanna and

More information

On the Existence of Optimal Exact-Repair MDS Codes for Distributed Storage

On the Existence of Optimal Exact-Repair MDS Codes for Distributed Storage On the Existence of Optimal Exact-Repair MDS Codes for Distributed Storage Changho Suh Kannan Ramchandran Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report

More information

An Introduction to Algorithmic Coding Theory

An Introduction to Algorithmic Coding Theory An Introduction to Algorithmic Coding Theory M. Amin Shokrollahi Bell Laboratories Part : Codes - A puzzle What do the following problems have in common? 2 Problem : Information Transmission MESSAGE G

More information

Rate-adaptive turbo-syndrome scheme for Slepian-Wolf Coding

Rate-adaptive turbo-syndrome scheme for Slepian-Wolf Coding Rate-adaptive turbo-syndrome scheme for Slepian-Wolf Coding Aline Roumy, Khaled Lajnef, Christine Guillemot 1 INRIA- Rennes, Campus de Beaulieu, 35042 Rennes Cedex, France Email: aroumy@irisa.fr Abstract

More information

Explicit MBR All-Symbol Locality Codes

Explicit MBR All-Symbol Locality Codes Explicit MBR All-Symbol Locality Codes Govinda M. Kamath, Natalia Silberstein, N. Prakash, Ankit S. Rawat, V. Lalitha, O. Ozan Koyluoglu, P. Vijay Kumar, and Sriram Vishwanath 1 Abstract arxiv:1302.0744v2

More information

Distributed Arithmetic Coding

Distributed Arithmetic Coding Distributed Arithmetic Coding Marco Grangetto, Member, IEEE, Enrico Magli, Member, IEEE, Gabriella Olmo, Senior Member, IEEE Abstract We propose a distributed binary arithmetic coder for Slepian-Wolf coding

More information

Practical Polar Code Construction Using Generalised Generator Matrices

Practical Polar Code Construction Using Generalised Generator Matrices Practical Polar Code Construction Using Generalised Generator Matrices Berksan Serbetci and Ali E. Pusane Department of Electrical and Electronics Engineering Bogazici University Istanbul, Turkey E-mail:

More information

Nonlinear Turbo Codes for the broadcast Z Channel

Nonlinear Turbo Codes for the broadcast Z Channel UCLA Electrical Engineering Department Communication Systems Lab. Nonlinear Turbo Codes for the broadcast Z Channel Richard Wesel Miguel Griot Bike ie Andres Vila Casado Communication Systems Laboratory,

More information

Distributed storage systems from combinatorial designs

Distributed storage systems from combinatorial designs Distributed storage systems from combinatorial designs Aditya Ramamoorthy November 20, 2014 Department of Electrical and Computer Engineering, Iowa State University, Joint work with Oktay Olmez (Ankara

More information

Channel Coding I. Exercises SS 2017

Channel Coding I. Exercises SS 2017 Channel Coding I Exercises SS 2017 Lecturer: Dirk Wübben Tutor: Shayan Hassanpour NW1, Room N 2420, Tel.: 0421/218-62387 E-mail: {wuebben, hassanpour}@ant.uni-bremen.de Universität Bremen, FB1 Institut

More information

Capacity of a channel Shannon s second theorem. Information Theory 1/33

Capacity of a channel Shannon s second theorem. Information Theory 1/33 Capacity of a channel Shannon s second theorem Information Theory 1/33 Outline 1. Memoryless channels, examples ; 2. Capacity ; 3. Symmetric channels ; 4. Channel Coding ; 5. Shannon s second theorem,

More information

Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel

Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel Brian M. Kurkoski, Paul H. Siegel, and Jack K. Wolf Department of Electrical and Computer Engineering

More information

An Introduction to Low Density Parity Check (LDPC) Codes

An Introduction to Low Density Parity Check (LDPC) Codes An Introduction to Low Density Parity Check (LDPC) Codes Jian Sun jian@csee.wvu.edu Wireless Communication Research Laboratory Lane Dept. of Comp. Sci. and Elec. Engr. West Virginia University June 3,

More information

Binary Convolutional Codes

Binary Convolutional Codes Binary Convolutional Codes A convolutional code has memory over a short block length. This memory results in encoded output symbols that depend not only on the present input, but also on past inputs. An

More information

Timing Recovery at Low SNR Cramer-Rao bound, and outperforming the PLL

Timing Recovery at Low SNR Cramer-Rao bound, and outperforming the PLL T F T I G E O R G A I N S T I T U T E O H E O F E A L P R O G R ESS S A N D 1 8 8 5 S E R V L O G Y I C E E C H N O Timing Recovery at Low SNR Cramer-Rao bound, and outperforming the PLL Aravind R. Nayak

More information

THE seminal paper of Gallager [1, p. 48] suggested to evaluate

THE seminal paper of Gallager [1, p. 48] suggested to evaluate IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 11, NOVEMBER 2004 2657 Extrinsic Information Transfer Functions: Model and Erasure Channel Properties Alexei Ashikhmin, Member, IEEE, Gerhard Kramer,

More information

Distributed Reed-Solomon Codes

Distributed Reed-Solomon Codes Distributed Reed-Solomon Codes Farzad Parvaresh f.parvaresh@eng.ui.ac.ir University of Isfahan Institute for Network Coding CUHK, Hong Kong August 216 Research interests List-decoding of algebraic codes

More information

Codes on Graphs, Normal Realizations, and Partition Functions

Codes on Graphs, Normal Realizations, and Partition Functions Codes on Graphs, Normal Realizations, and Partition Functions G. David Forney, Jr. 1 Workshop on Counting, Inference and Optimization Princeton, NJ November 3, 2011 1 Joint work with: Heide Gluesing-Luerssen,

More information

LECTURE 15. Last time: Feedback channel: setting up the problem. Lecture outline. Joint source and channel coding theorem

LECTURE 15. Last time: Feedback channel: setting up the problem. Lecture outline. Joint source and channel coding theorem LECTURE 15 Last time: Feedback channel: setting up the problem Perfect feedback Feedback capacity Data compression Lecture outline Joint source and channel coding theorem Converse Robustness Brain teaser

More information

Erasure Codes with a Banded Structure for Hybrid Iterative-ML Decoding

Erasure Codes with a Banded Structure for Hybrid Iterative-ML Decoding Erasure Codes with a Banded Structure for Hybrid Iterative-ML Decoding Alexandre Soro 1, Mathieu Cunche 2, Jérôme Lacan 1 and Vincent Roca 2 1 Univ of Toulouse, ISAE/DMIA, 10 avenue Edouard Belin, BP 54032-31055

More information

Optimal Locally Repairable and Secure Codes for Distributed Storage Systems

Optimal Locally Repairable and Secure Codes for Distributed Storage Systems Optimal Locally Repairable and Secure Codes for Distributed Storage Systems Ankit Singh Rawat, O. Ozan Koyluoglu, Natalia Silberstein, and Sriram Vishwanath arxiv:0.6954v [cs.it] 6 Aug 03 Abstract This

More information

Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach

Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach Silas Fong (Joint work with Vincent Tan) Department of Electrical & Computer Engineering National University

More information

Research Collection. The fractality of polar codes. Conference Paper. ETH Library. Author(s): Geiger, Bernhard C. Publication Date: 2016

Research Collection. The fractality of polar codes. Conference Paper. ETH Library. Author(s): Geiger, Bernhard C. Publication Date: 2016 Research Collection Conference Paper The fractality of polar codes Authors: Geiger, ernhard C. Publication Date: 016 Permanent Link: https://doi.org/10.399/ethz-a-01064591 Rights / License: In Copyright

More information

Weakly Secure Data Exchange with Generalized Reed Solomon Codes

Weakly Secure Data Exchange with Generalized Reed Solomon Codes Weakly Secure Data Exchange with Generalized Reed Solomon Codes Muxi Yan, Alex Sprintson, and Igor Zelenko Department of Electrical and Computer Engineering, Texas A&M University Department of Mathematics,

More information

Turbo Codes for Deep-Space Communications

Turbo Codes for Deep-Space Communications TDA Progress Report 42-120 February 15, 1995 Turbo Codes for Deep-Space Communications D. Divsalar and F. Pollara Communications Systems Research Section Turbo codes were recently proposed by Berrou, Glavieux,

More information

Superregular Hankel Matrices Over Finite Fields: An Upper Bound of the Matrix Size and a Construction Algorithm

Superregular Hankel Matrices Over Finite Fields: An Upper Bound of the Matrix Size and a Construction Algorithm University of Zurich Institute of Mathematics Master s Thesis Superregular Hankel Matrices Over Finite Fields: An Upper Bound of the Matrix Size and a Construction Algorithm Author: Isabelle Raemy Supervisor:

More information

Optical Storage Technology. Error Correction

Optical Storage Technology. Error Correction Optical Storage Technology Error Correction Introduction With analog audio, there is no opportunity for error correction. With digital audio, the nature of binary data lends itself to recovery in the event

More information

On ARQ for Packet Erasure Channels with Bernoulli Arrivals

On ARQ for Packet Erasure Channels with Bernoulli Arrivals On ARQ for Packet Erasure Channels with Bernoulli Arrivals Dinkar Vasudevan, Vijay G. Subramanian and Douglas J. Leith Hamilton Institute, National University of Ireland, Maynooth Abstract We study packet

More information

Turbo Compression. Andrej Rikovsky, Advisor: Pavol Hanus

Turbo Compression. Andrej Rikovsky, Advisor: Pavol Hanus Turbo Compression Andrej Rikovsky, Advisor: Pavol Hanus Abstract Turbo codes which performs very close to channel capacity in channel coding can be also used to obtain very efficient source coding schemes.

More information

Modern Coding Theory. Daniel J. Costello, Jr School of Information Theory Northwestern University August 10, 2009

Modern Coding Theory. Daniel J. Costello, Jr School of Information Theory Northwestern University August 10, 2009 Modern Coding Theory Daniel J. Costello, Jr. Coding Research Group Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556 2009 School of Information Theory Northwestern University

More information

encoding without prediction) (Server) Quantization: Initial Data 0, 1, 2, Quantized Data 0, 1, 2, 3, 4, 8, 16, 32, 64, 128, 256

encoding without prediction) (Server) Quantization: Initial Data 0, 1, 2, Quantized Data 0, 1, 2, 3, 4, 8, 16, 32, 64, 128, 256 General Models for Compression / Decompression -they apply to symbols data, text, and to image but not video 1. Simplest model (Lossless ( encoding without prediction) (server) Signal Encode Transmit (client)

More information

Punctured Convolutional Codes Revisited: the Exact State Diagram and Its Implications

Punctured Convolutional Codes Revisited: the Exact State Diagram and Its Implications Punctured Convolutional Codes Revisited: the Exact State iagram and Its Implications Jing Li Tiffany) Erozan Kurtas epartment of Electrical and Computer Engineering Seagate Research Lehigh University Bethlehem

More information

Tackling Intracell Variability in TLC Flash Through Tensor Product Codes

Tackling Intracell Variability in TLC Flash Through Tensor Product Codes Tackling Intracell Variability in TLC Flash Through Tensor Product Codes Ryan Gabrys, Eitan Yaakobi, Laura Grupp, Steven Swanson, Lara Dolecek University of California, Los Angeles University of California,

More information

Chapter 7: Channel coding:convolutional codes

Chapter 7: Channel coding:convolutional codes Chapter 7: : Convolutional codes University of Limoges meghdadi@ensil.unilim.fr Reference : Digital communications by John Proakis; Wireless communication by Andreas Goldsmith Encoder representation Communication

More information

Coding with Constraints: Minimum Distance. Bounds and Systematic Constructions

Coding with Constraints: Minimum Distance. Bounds and Systematic Constructions Coding with Constraints: Minimum Distance 1 Bounds and Systematic Constructions Wael Halbawi, Matthew Thill & Babak Hassibi Department of Electrical Engineering arxiv:1501.07556v2 [cs.it] 19 Feb 2015 California

More information

The Concept of Soft Channel Encoding and its Applications in Wireless Relay Networks

The Concept of Soft Channel Encoding and its Applications in Wireless Relay Networks The Concept of Soft Channel Encoding and its Applications in Wireless Relay Networks Gerald Matz Institute of Telecommunications Vienna University of Technology institute of telecommunications Acknowledgements

More information

Midterm Exam Information Theory Fall Midterm Exam. Time: 09:10 12:10 11/23, 2016

Midterm Exam Information Theory Fall Midterm Exam. Time: 09:10 12:10 11/23, 2016 Midterm Exam Time: 09:10 12:10 11/23, 2016 Name: Student ID: Policy: (Read before You Start to Work) The exam is closed book. However, you are allowed to bring TWO A4-size cheat sheet (single-sheet, two-sided).

More information

UNIT MEMORY CONVOLUTIONAL CODES WITH MAXIMUM DISTANCE

UNIT MEMORY CONVOLUTIONAL CODES WITH MAXIMUM DISTANCE UNIT MEMORY CONVOLUTIONAL CODES WITH MAXIMUM DISTANCE ROXANA SMARANDACHE Abstract. Unit memory codes and in particular, partial unit memory codes are reviewed. Conditions for the optimality of partial

More information

Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems

Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User

More information

Binary Rate Distortion With Side Information: The Asymmetric Correlation Channel Case

Binary Rate Distortion With Side Information: The Asymmetric Correlation Channel Case Binary Rate Distortion With Side Information: The Asymmetric Correlation Channel Case Andrei Sechelea*, Samuel Cheng, Adrian Munteanu*, and Nikos Deligiannis* *Department of Electronics and Informatics,

More information

An Introduction to (Network) Coding Theory

An Introduction to (Network) Coding Theory An to (Network) Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland April 24th, 2018 Outline 1 Reed-Solomon Codes 2 Network Gabidulin Codes 3 Summary and Outlook A little bit of history

More information

Spatially Coupled LDPC Codes

Spatially Coupled LDPC Codes Spatially Coupled LDPC Codes Kenta Kasai Tokyo Institute of Technology 30 Aug, 2013 We already have very good codes. Efficiently-decodable asymptotically capacity-approaching codes Irregular LDPC Codes

More information

Network Control: A Rate-Distortion Perspective

Network Control: A Rate-Distortion Perspective Network Control: A Rate-Distortion Perspective Jubin Jose and Sriram Vishwanath Dept. of Electrical and Computer Engineering The University of Texas at Austin {jubin, sriram}@austin.utexas.edu arxiv:8.44v2

More information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information 204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener

More information

Trellis Representations for Linear Block Codes

Trellis Representations for Linear Block Codes Trellis Representations for Linear Block Codes Heide Gluesing-Luerssen Department of Mathematics University of Kentucky ALCOMA10 April 2010 What is a Trellis Representation? C = im ( ) 1 1 1 0 1 0 F 6

More information

Reed-Solomon codes. Chapter Linear codes over finite fields

Reed-Solomon codes. Chapter Linear codes over finite fields Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime

More information

Lecture 4 Noisy Channel Coding

Lecture 4 Noisy Channel Coding Lecture 4 Noisy Channel Coding I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw October 9, 2015 1 / 56 I-Hsiang Wang IT Lecture 4 The Channel Coding Problem

More information

Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems

Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User

More information

Linear time list recovery via expander codes

Linear time list recovery via expander codes Linear time list recovery via expander codes Brett Hemenway and Mary Wootters June 7 26 Outline Introduction List recovery Expander codes List recovery of expander codes Conclusion Our Results One slide

More information

홀로그램저장재료. National Creative Research Center for Active Plasmonics Applications Systems

홀로그램저장재료. National Creative Research Center for Active Plasmonics Applications Systems 홀로그램저장재료 Holographic materials Material Reusable Processing Type of Exposure Spectral Resol. Max. diff. hologram (J/m2) sensitivity (lim./mm) efficiency Photographic emulsion Dichromated gelatin Photoresists

More information

Codes for Partially Stuck-at Memory Cells

Codes for Partially Stuck-at Memory Cells 1 Codes for Partially Stuck-at Memory Cells Antonia Wachter-Zeh and Eitan Yaakobi Department of Computer Science Technion Israel Institute of Technology, Haifa, Israel Email: {antonia, yaakobi@cs.technion.ac.il

More information

Channel Coding for Secure Transmissions

Channel Coding for Secure Transmissions Channel Coding for Secure Transmissions March 27, 2017 1 / 51 McEliece Cryptosystem Coding Approach: Noiseless Main Channel Coding Approach: Noisy Main Channel 2 / 51 Outline We present an overiew of linear

More information

Strongly-MDS Convolutional Codes

Strongly-MDS Convolutional Codes Strongly-MDS Convolutional Codes Heide Gluesing-Luerssen Department of Mathematics University of Groningen P.O. Box 800 9700 AV Groningen, The Netherlands e-mail: gluesing@math.rug.nl Joachim Rosenthal

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

Optimum Soft Decision Decoding of Linear Block Codes

Optimum Soft Decision Decoding of Linear Block Codes Optimum Soft Decision Decoding of Linear Block Codes {m i } Channel encoder C=(C n-1,,c 0 ) BPSK S(t) (n,k,d) linear modulator block code Optimal receiver AWGN Assume that [n,k,d] linear block code C is

More information

Hyper-Trellis Decoding of Pixel-Domain Wyner-Ziv Video Coding

Hyper-Trellis Decoding of Pixel-Domain Wyner-Ziv Video Coding 1 Hyper-Trellis Decoding of Pixel-Domain Wyner-Ziv Video Coding Arun Avudainayagam, John M. Shea, and Dapeng Wu Wireless Information Networking Group (WING) Department of Electrical and Computer Engineering

More information

Linear Programming Bounds for Distributed Storage Codes

Linear Programming Bounds for Distributed Storage Codes 1 Linear Programming Bounds for Distributed Storage Codes Ali Tebbi, Terence H. Chan, Chi Wan Sung Department of Electronic Engineering, City University of Hong Kong arxiv:1710.04361v1 [cs.it] 12 Oct 2017

More information

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi, Nihar B Shah, and P Vijay Kumar, Fellow, IEEE Abstract Regenerating codes

More information

Dr. Cathy Liu Dr. Michael Steinberger. A Brief Tour of FEC for Serial Link Systems

Dr. Cathy Liu Dr. Michael Steinberger. A Brief Tour of FEC for Serial Link Systems Prof. Shu Lin Dr. Cathy Liu Dr. Michael Steinberger U.C.Davis Avago SiSoft A Brief Tour of FEC for Serial Link Systems Outline Introduction Finite Fields and Vector Spaces Linear Block Codes Cyclic Codes

More information