13 research outputs found

    Irregular polar coding for complexity-constrained lightwave systems

    Get PDF
    Next-generation fiber-optic communications call for ultra-reliable forward error correction codes that are capable of low-power and low-latency decoding. In this paper, we propose a new class of polar codes, whose polarization units are irregularly pruned to reduce computational complexity and decoding latency without sacrificing error correction performance. We then experimentally demonstrate that the proposed irregular polar codes can outperform state-of-the-art low-density parity-check (LDPC) codes, while decoding complexity and latency can be reduced by at least 30% and 70%, respectively, versus regular polar codes, while also obtaining a marginal performance improvement

    Coding for Cryptographic Security Enhancement using Stopping Sets

    Full text link
    In this paper we discuss the ability of channel codes to enhance cryptographic secrecy. Toward that end, we present the secrecy metric of degrees of freedom in an attacker's knowledge of the cryptogram, which is similar to equivocation. Using this notion of secrecy, we show how a specific practical channel coding system can be used to hide information about the ciphertext, thus increasing the difficulty of cryptographic attacks. The system setup is the wiretap channel model where transmitted data traverse through independent packet erasure channels with public feedback for authenticated ARQ (Automatic Repeat reQuest). The code design relies on puncturing nonsystematic low-density parity-check codes with the intent of inflicting an eavesdropper with stopping sets in the decoder. Furthermore, the design amplifies errors when stopping sets occur such that a receiver must guess all the channel-erased bits correctly to avoid an expected error rate of one half in the ciphertext. We extend previous results on the coding scheme by giving design criteria that reduces the effectiveness of a maximum-likelihood attack to that of a message-passing attack. We further extend security analysis to models with multiple receivers and collaborative attackers. Cryptographic security is enhanced in all these cases by exploiting properties of the physical-layer. The enhancement is accurately presented as a function of the degrees of freedom in the eavesdropper's knowledge of the ciphertext, and is even shown to be present when eavesdroppers have better channel quality than legitimate receivers.Comment: 13 pages, 8 figure

    Polar codes for distributed source coding

    Get PDF
    Ankara : The Department of Electrical and Electronics Engineering and The Graduate School of Engineering and Science of Bilkent Univesity, 2014.Thesis (Ph. D.) -- Bilkent University, 2014.Includes bibliographical references leaves 164-170.Polar codes were invented by Arıkan as the first “capacity achieving” codes for binary-input discrete memoryless symmetric channels with low encoding and decoding complexity. The “polarization phenomenon”, which is the underlying principle of polar codes, can be applied to different source and channel coding problems both in single-user and multi-user settings. In this work, polar coding methods for multi-user distributed source coding problems are investigated. First, a restricted version of lossless distributed source coding problem, which is also referred to as the Slepian-Wolf problem, is considered. The restriction is on the distribution of correlated sources. It is shown that if the sources are “binary symmetric” then single-user polar codes can be used to achieve full capacity region without time sharing. Then, a method for two-user polar coding is considered which is used to solve the Slepian-Wolf problem with arbitrary source distributions. This method is also extended to cover multiple-access channel problem which is the dual of Slepian-Wolf problem. Next, two lossy source coding problems in distributed settings are investigated. The first problem is the distributed lossy source coding which is the lossy version of the Slepian-Wolf problem. Although the capacity region of this problem is not known in general, there is a good inner bound called the Berger-Tung inner bound. A polar coding method that can achieve the whole dominant face of the Berger-Tung region is devised. The second problem considered is the multiple description coding problem. The capacity region for this problem is also not known in general. El Gamal-Cover inner bound is the best known bound for this problem. A polar coding method that can achieve any point on the dominant face of El Gamal-Cover region is devised.Önay, SaygunPh.D

    Partially Coupled Codes for TB-based Transmission

    Full text link
    In this thesis, we mainly investigate the design of partially coupled codes for transport block (TB) based transmission protocol adopted in 4G/5G mobile network standards. In this protocol, an information sequence in a TB is segmented into multiple code blocks (CBs) and each CB is protected by a channel codeword independently. It is inefficient in terms of transmit power and spectrum efficiency because any erroneous CB in a TB leads to the retransmission of the whole TB. An important research problem related to this TB-based transmission is how to improve the TB error rate (TBER) performance so that the number of retransmissions reduces. To tackle this challenge, we present a class of spatial coupling techniques called partial coupling in the TB encoding operation, which has two subclasses: partial information coupled (PIC) and partial parity coupling (PPC). To be specific, the coupling is performed such that a fraction of the information/parity sequence of one component code at the current CB is used as the input of the component encoder at the next CB, leading to improved TBER performance. One of the appealing features of partial coupling (both PIC and PPC) is that the coupling can be applied to any component codes without changing their encoding and decoding architectures, making them compatible with the TB-based transmission protocol. The main body of this thesis consists of two parts. In the first part, we apply both PIC and PPC to turbo codes. We investigate various coupling designs and analysis the performance of the partially coupled turbo codes over the binary erasure channel via density evolution (DE). Both simulation results and DE analysis show that such a class of codes can approach channel capacity with a large blocklength. In the second part, we construct PIC-polar codes. We show that PIC can effectively improve the error performance of finite-length polar codes by utilizing the channel polarization phenomenon. The DE-based performance analysis is also conducted. For both turbo codes and polar codes, we have shown that the partially coupled codes have significant performance gain over their uncoupled counterpart, demonstrating the effectiveness of the partial coupling

    Introduction to Forward-Error-Correcting Coding

    Get PDF
    This reference publication introduces forward error correcting (FEC) and stresses definitions and basic calculations for use by engineers. The seven chapters include 41 example problems, worked in detail to illustrate points. A glossary of terms is included, as well as an appendix on the Q function. Block and convolutional codes are covered

    The deep space network

    Get PDF
    Network engineering, hardware and software development, and tracking station operations for support of deep space unmanned flight projects are summarized

    NASA Tech Briefs, April 1992

    Get PDF
    Topics covered include: New Product Ideas; Electronic Components and Circuits; Electronic Systems; Physical Sciences; Materials; Computer Programs; Mechanics; Machinery; Fabrication Technology; Mathematics and Information Sciences

    TDRSS telecommunications study. Phase 1: Final report

    Get PDF
    A parametric analysis of the telecommunications support capability of the Tracking and Data Relay Satellite System (TDRSS) was performed. Emphasis was placed on maximizing support capability provided to the user while minimizing impact on the user spacecraft. This study evaluates the present TDRSS configuration as presented in the TDRSS Definition Phase Study Report, December 1973 to determine potential changes for improving the overall performance. In addition, it provides specifications of the user transponder equipment to be used in the TDRSS
    corecore