66,493 research outputs found
Stabilizing data-link over non-FIFO channels with optimal fault-resilience
Self-stabilizing systems have the ability to converge to a correct behavior
when started in any configuration. Most of the work done so far in the
self-stabilization area assumed either communication via shared memory or via
FIFO channels. This paper is the first to lay the bases for the design of
self-stabilizing message passing algorithms over unreliable non-FIFO channels.
We propose a fault-send-deliver optimal stabilizing data-link layer that
emulates a reliable FIFO communication channel over unreliable capacity bounded
non-FIFO channels
Ortho Linear Feedback Shift Register Cryptographic System
In this article, an encryption algorithm with an error detection technique is presented for highly secured reliable data transmission over unreliable communication channels. In this algorithm, an input data is mapped into orthogonal code first. After that the code is encrypted with the help of Linear Feedback Shift Register (LFSR). The technique has been successfully verified and synthesized using Xilinx by Spartan-3E FPGA. The results show that the error detection rate has been increased to 100% by proposed encryption scheme is effective and improves bandwidth efficiency
Ortho Linear Feedback Shift Register Cryptographic System
In this article, an encryption algorithm with an error detection technique is presented for highly secured reliable data transmission over unreliable communication channels. In this algorithm, an input data is mapped into orthogonal code first. After that the code is encrypted with the help of Linear Feedback Shift Register (LFSR). The technique has been successfully verified and synthesized using Xilinx by Spartan-3E FPGA. The results show that the error detection rate has been increased to 100% by proposed encryption scheme is effective and improves bandwidth efficiency
Implementation of High Security Cryptographic System with Improved Error Correction and Detection Rate using FPGA
In this article, an encryption algorithm with an error detection technique is presented for highly secured reliable data transmission over unreliable communication channels. In this algorithm, an input data is mapped into orthogonal code first. After that the code is encrypted with the help of Linear Feedback Shift Register (LFSR). The technique has been successfully verified and synthesized using Xilinx by Spartan-3E FPGA. The results show that the error detection rate has been increased to 100% by proposed encryption scheme is effective and improves bandwidth efficiency
On Applications of Disruption Tolerant Networking to Optical Networking in Space
The integration of optical communication links into space networks via Disruption Tolerant Networking (DTN) is a largely unexplored area of research. Building on successful foundational work accomplished at JPL, we discuss a multi-hop multi-path network featuring optical links. The experimental test bed is constructed at the NASA Glenn Research Center featuring multiple Ethernet-to-fiber converters coupled with free space optical (FSO) communication channels. The test bed architecture models communication paths from deployed Mars assets to the deep space network (DSN) and finally to the mission operations center (MOC). Reliable versus unreliable communication methods are investigated and discussed; including reliable transport protocols, custody transfer, and fragmentation. Potential commercial applications may include an optical communications infrastructure deployment to support developing nations and remote areas, which are unburdened with supporting an existing heritage means of telecommunications. Narrow laser beam widths and control of polarization states offer inherent physical layer security benefits with optical communications over RF solutions. This paper explores whether or not DTN is appropriate for space-based optical networks, optimal payload sizes, reliability, and a discussion on security
Strong converse exponents for the feedback-assisted classical capacity of entanglement-breaking channels
Quantum entanglement can be used in a communication scheme to establish a
correlation between successive channel inputs that is impossible by classical
means. It is known that the classical capacity of quantum channels can be
enhanced by such entangled encoding schemes, but this is not always the case.
In this paper, we prove that a strong converse theorem holds for the classical
capacity of an entanglement-breaking channel even when it is assisted by a
classical feedback link from the receiver to the transmitter. In doing so, we
identify a bound on the strong converse exponent, which determines the
exponentially decaying rate at which the success probability tends to zero, for
a sequence of codes with communication rate exceeding capacity. Proving a
strong converse, along with an achievability theorem, shows that the classical
capacity is a sharp boundary between reliable and unreliable communication
regimes. One of the main tools in our proof is the sandwiched Renyi relative
entropy. The same method of proof is used to derive an exponential bound on the
success probability when communicating over an arbitrary quantum channel
assisted by classical feedback, provided that the transmitter does not use
entangled encoding schemes.Comment: 24 pages, 2 figures, v4: final version accepted for publication in
Problems of Information Transmissio
Iterative Soft Input Soft Output Decoding of Reed-Solomon Codes by Adapting the Parity Check Matrix
An iterative algorithm is presented for soft-input-soft-output (SISO)
decoding of Reed-Solomon (RS) codes. The proposed iterative algorithm uses the
sum product algorithm (SPA) in conjunction with a binary parity check matrix of
the RS code. The novelty is in reducing a submatrix of the binary parity check
matrix that corresponds to less reliable bits to a sparse nature before the SPA
is applied at each iteration. The proposed algorithm can be geometrically
interpreted as a two-stage gradient descent with an adaptive potential
function. This adaptive procedure is crucial to the convergence behavior of the
gradient descent algorithm and, therefore, significantly improves the
performance. Simulation results show that the proposed decoding algorithm and
its variations provide significant gain over hard decision decoding (HDD) and
compare favorably with other popular soft decision decoding methods.Comment: 10 pages, 10 figures, final version accepted by IEEE Trans. on
Information Theor
A Reinforcement Learning-Based Approach to Graph Discovery in D2D-Enabled Federated Learning
Augmenting federated learning (FL) with direct device-to-device (D2D)
communications can help improve convergence speed and reduce model bias through
rapid local information exchange. However, data privacy concerns, device trust
issues, and unreliable wireless channels each pose challenges to determining an
effective yet resource efficient D2D structure. In this paper, we develop a
decentralized reinforcement learning (RL) methodology for D2D graph discovery
that promotes communication of non-sensitive yet impactful data-points over
trusted yet reliable links. Each device functions as an RL agent, training a
policy to predict the impact of incoming links. Local (device-level) and global
rewards are coupled through message passing within and between device clusters.
Numerical experiments confirm the advantages offered by our method in terms of
convergence speed and straggler resilience across several datasets and FL
schemes
- …