31,109 research outputs found
High-Rate Regenerating Codes Through Layering
In this paper, we provide explicit constructions for a class of exact-repair
regenerating codes that possess a layered structure. These regenerating codes
correspond to interior points on the storage-repair-bandwidth tradeoff, and
compare very well in comparison to scheme that employs space-sharing between
MSR and MBR codes. For the parameter set with , we
construct a class of codes with an auxiliary parameter , referred to as
canonical codes. With in the range , these codes operate in
the region between the MSR point and the MBR point, and perform significantly
better than the space-sharing line. They only require a field size greater than
. For the case of , canonical codes can also be shown to
achieve an interior point on the line-segment joining the MSR point and the
next point of slope-discontinuity on the storage-repair-bandwidth tradeoff.
Thus we establish the existence of exact-repair codes on a point other than the
MSR and the MBR point on the storage-repair-bandwidth tradeoff. We also
construct layered regenerating codes for general parameter set ,
which we refer to as non-canonical codes. These codes also perform
significantly better than the space-sharing line, though they require a
significantly higher field size. All the codes constructed in this paper are
high-rate, can repair multiple node-failures and do not require any computation
at the helper nodes. We also construct optimal codes with locality in which the
local codes are layered regenerating codes.Comment: 20 pages, 9 figure
Spatially Coupled Codes and Optical Fiber Communications: An Ideal Match?
In this paper, we highlight the class of spatially coupled codes and discuss
their applicability to long-haul and submarine optical communication systems.
We first demonstrate how to optimize irregular spatially coupled LDPC codes for
their use in optical communications with limited decoding hardware complexity
and then present simulation results with an FPGA-based decoder where we show
that very low error rates can be achieved and that conventional block-based
LDPC codes can be outperformed. In the second part of the paper, we focus on
the combination of spatially coupled LDPC codes with different demodulators and
detectors, important for future systems with adaptive modulation and for
varying channel characteristics. We demonstrate that SC codes can be employed
as universal, channel-agnostic coding schemes.Comment: Invited paper to be presented in the special session on "Signal
Processing, Coding, and Information Theory for Optical Communications" at
IEEE SPAWC 201
Recommended from our members
Simple network management protocol co- existence with hydrocarbon process automation communication real-time network
Hydrocarbon Process Automation Applications (HPAA) utilizes Real-time network connecting process instrumentations, controllers, and real-time logic control applications. Conventional practice is to dedicate a real-time network for process automation applications and prevent other applications from utilizing the same infrastructure. An important application that can help optimize, improve network performance, and provide rapid response time in network diagnostics and mitigation is Simple Network Management Protocol (SNMP). This paper addresses the co-existence of SNMP traffic with real-time applications. The impacts of activating this protocol with the real-time HPAA utilizing high speed Ethernet network design will be examined. Empirical data for an implemented Hydrocarbon process automation system will be used to illustrate the interdependency of application performance, traffic mix, and potential areas of improvements. The outcomes of this effort demonstrate the co-existence of SNMP with HPPA, given special considerations (i.e., bandwidth, number of applications, etc.)
Smart Grid Security: Threats, Challenges, and Solutions
The cyber-physical nature of the smart grid has rendered it vulnerable to a
multitude of attacks that can occur at its communication, networking, and
physical entry points. Such cyber-physical attacks can have detrimental effects
on the operation of the grid as exemplified by the recent attack which caused a
blackout of the Ukranian power grid. Thus, to properly secure the smart grid,
it is of utmost importance to: a) understand its underlying vulnerabilities and
associated threats, b) quantify their effects, and c) devise appropriate
security solutions. In this paper, the key threats targeting the smart grid are
first exposed while assessing their effects on the operation and stability of
the grid. Then, the challenges involved in understanding these attacks and
devising defense strategies against them are identified. Potential solution
approaches that can help mitigate these threats are then discussed. Last, a
number of mathematical tools that can help in analyzing and implementing
security solutions are introduced. As such, this paper will provide the first
comprehensive overview on smart grid security
- …