132,821 research outputs found
Interference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions
Regenerating codes are a class of recently developed codes for distributed
storage that, like Reed-Solomon codes, permit data recovery from any arbitrary
k of n nodes. However regenerating codes possess in addition, the ability to
repair a failed node by connecting to any arbitrary d nodes and downloading an
amount of data that is typically far less than the size of the data file. This
amount of download is termed the repair bandwidth. Minimum storage regenerating
(MSR) codes are a subclass of regenerating codes that require the least amount
of network storage; every such code is a maximum distance separable (MDS) code.
Further, when a replacement node stores data identical to that in the failed
node, the repair is termed as exact.
The four principal results of the paper are (a) the explicit construction of
a class of MDS codes for d = n-1 >= 2k-1 termed the MISER code, that achieves
the cut-set bound on the repair bandwidth for the exact-repair of systematic
nodes, (b) proof of the necessity of interference alignment in exact-repair MSR
codes, (c) a proof showing the impossibility of constructing linear,
exact-repair MSR codes for d < 2k-3 in the absence of symbol extension, and (d)
the construction, also explicit, of MSR codes for d = k+1. Interference
alignment (IA) is a theme that runs throughout the paper: the MISER code is
built on the principles of IA and IA is also a crucial component to the
non-existence proof for d < 2k-3. To the best of our knowledge, the
constructions presented in this paper are the first, explicit constructions of
regenerating codes that achieve the cut-set bound.Comment: 38 pages, 12 figures, submitted to the IEEE Transactions on
Information Theory;v3 - The title has been modified to better reflect the
contributions of the submission. The paper is extensively revised with
several carefully constructed figures and example
Systematic Transmission With Fountain Parity Checks for Erasure Channels With Stop Feedback
In this paper, we present new achievability bounds on the maximal achievable
rate of variable-length stop-feedback (VLSF) codes operating over a binary
erasure channel (BEC) at a fixed message size . We provide new bounds
for VLSF codes with zero error, infinite decoding times and with nonzero error,
finite decoding times. Both new achievability bounds are proved by constructing
a new VLSF code that employs systematic transmission of the first bits
followed by random linear fountain parity bits decoded with a rank decoder. For
VLSF codes with infinite decoding times, our new bound outperforms the
state-of-the-art result for BEC by Devassy \emph{et al.} in 2016. We also give
a negative answer to the open question Devassy \emph{et al.} put forward on
whether the backoff to capacity at is fundamental. For VLSF
codes with finite decoding times, numerical evaluations show that the
achievable rate for VLSF codes with a moderate number of decoding times closely
approaches that for VLSF codes with infinite decoding times.Comment: 7 pages, double column, 4 figures; comments are welcome! changes in
v2: corrected 2 typos in v1. arXiv admin note: substantial text overlap with
arXiv:2205.1539
Code design based on metric-spectrum and applications
We introduced nested search methods to design (n, k) block codes for arbitrary channels by optimizing an appropriate metric spectrum in each iteration. For a given k, the methods start with a good high rate code, say k/(k + 1), and successively design lower rate codes up to rate k/2^k corresponding to a Hadamard code. Using a full search for small binary codes we found that optimal or near-optimal codes of increasing length can be obtained in a nested manner by utilizing Hadamard matrix columns. The codes can be linear if the Hadamard matrix is linear and non-linear otherwise. The design methodology was extended to the generic complex codes by utilizing columns of newly derived or existing unitary codes. The inherent nested nature of the codes make them ideal for progressive transmission.
Extensive comparisons to metric bounds and to previously designed codes show the optimality or near-optimality of the new codes, designed for the fading and the additive white Gaussian noise channel (AWGN). It was also shown that linear codes can be optimal or at least meeting the metric bounds; one example is the systematic pilot-based code of rate k/(k + 1) which was proved to meet the lower bound on the maximum cross-correlation. Further, the method was generalized such that good codes for arbitrary channels can be designed given the corresponding metric or the pairwise error probability.
In synchronous multiple-access schemes it is common to use unitary block codes to transmit the multiple users information, especially in the downlink. In this work we suggest the use of newly designed non-unitary block codes, resulting in increased throughput efficiency, while the performance is shown not to be substantially sacrificed. The non-unitary codes are again developed through suitable nested searches. In addition, new multiple-access codes are introduced that optimize certain criteria, such as the sum-rate capacity.
Finally, the introduction of the asymptotically optimum convolutional codes for a given constraint length, reduces dramatically the search size for good convolutional codes of a certain asymptotic performance, and the consequences to coded code-division multiple access (CDMA) system design are highlighted
On the Existence of Optimal Exact-Repair MDS Codes for Distributed Storage
The high repair cost of (n,k) Maximum Distance Separable (MDS) erasure codes
has recently motivated a new class of codes, called Regenerating Codes, that
optimally trade off storage cost for repair bandwidth. In this paper, we
address bandwidth-optimal (n,k,d) Exact-Repair MDS codes, which allow for any
failed node to be repaired exactly with access to arbitrary d survivor nodes,
where k<=d<=n-1. We show the existence of Exact-Repair MDS codes that achieve
minimum repair bandwidth (matching the cutset lower bound) for arbitrary
admissible (n,k,d), i.e., k<n and k<=d<=n-1. Our approach is based on
interference alignment techniques and uses vector linear codes which allow to
split symbols into arbitrarily small subsymbols.Comment: 20 pages, 6 figure
Coding with Constraints: Minimum Distance Bounds and Systematic Constructions
We examine an error-correcting coding framework in which each coded symbol is
constrained to be a function of a fixed subset of the message symbols. With an
eye toward distributed storage applications, we seek to design systematic codes
with good minimum distance that can be decoded efficiently. On this note, we
provide theoretical bounds on the minimum distance of such a code based on the
coded symbol constraints. We refine these bounds in the case where we demand a
systematic linear code. Finally, we provide conditions under which each of
these bounds can be achieved by choosing our code to be a subcode of a
Reed-Solomon code, allowing for efficient decoding. This problem has been
considered in multisource multicast network error correction. The problem setup
is also reminiscent of locally repairable codes.Comment: Submitted to ISIT 201
Constructions of Batch Codes via Finite Geometry
A primitive -batch code encodes a string of length into string
of length , such that each multiset of symbols from has mutually
disjoint recovering sets from . We develop new explicit and random coding
constructions of linear primitive batch codes based on finite geometry. In some
parameter regimes, our proposed codes have lower redundancy than previously
known batch codes.Comment: 7 pages, 1 figure, 1 tabl
Optimal Locally Repairable and Secure Codes for Distributed Storage Systems
This paper aims to go beyond resilience into the study of security and
local-repairability for distributed storage systems (DSS). Security and
local-repairability are both important as features of an efficient storage
system, and this paper aims to understand the trade-offs between resilience,
security, and local-repairability in these systems. In particular, this paper
first investigates security in the presence of colluding eavesdroppers, where
eavesdroppers are assumed to work together in decoding stored information.
Second, the paper focuses on coding schemes that enable optimal local repairs.
It further brings these two concepts together, to develop locally repairable
coding schemes for DSS that are secure against eavesdroppers.
The main results of this paper include: a. An improved bound on the secrecy
capacity for minimum storage regenerating codes, b. secure coding schemes that
achieve the bound for some special cases, c. a new bound on minimum distance
for locally repairable codes, d. code construction for locally repairable codes
that attain the minimum distance bound, and e. repair-bandwidth-efficient
locally repairable codes with and without security constraints.Comment: Submitted to IEEE Transactions on Information Theor
- …