61 research outputs found
Capacity Achieving Code Constructions for Two Classes of (d,k) Constraints
In this paper, we present two low complexity algorithms that achieve capacity
for the noiseless (d,k) constrained channel when k=2d+1, or when k-d+1 is not
prime. The first algorithm, called symbol sliding, is a generalized version of
the bit flipping algorithm introduced by Aviran et al. [1]. In addition to
achieving capacity for (d,2d+1) constraints, it comes close to capacity in
other cases. The second algorithm is based on interleaving, and is a
generalized version of the bit stuffing algorithm introduced by Bender and Wolf
[2]. This method uses fewer than k-d biased bit streams to achieve capacity for
(d,k) constraints with k-d+1 not prime. In particular, the encoder for
(d,d+2^m-1) constraints, 1\le m<\infty, requires only m biased bit streams.Comment: 16 pages, submitted to the IEEE Transactions on Information Theor
Achieving SK Capacity in the Source Model: When Must All Terminals Talk?
In this paper, we address the problem of characterizing the instances of the
multiterminal source model of Csisz\'ar and Narayan in which communication from
all terminals is needed for establishing a secret key of maximum rate. We give
an information-theoretic sufficient condition for identifying such instances.
We believe that our sufficient condition is in fact an exact characterization,
but we are only able to prove this in the case of the three-terminal source
model. We also give a relatively simple criterion for determining whether or
not our condition holds for a given multiterminal source model.Comment: A 5-page version of this paper was submitted to the 2014 IEEE
International Symposium on Information Theory (ISIT 2014
On the Public Communication Needed to Achieve SK Capacity in the Multiterminal Source Model
The focus of this paper is on the public communication required for
generating a maximal-rate secret key (SK) within the multiterminal source model
of Csisz{\'a}r and Narayan. Building on the prior work of Tyagi for the
two-terminal scenario, we derive a lower bound on the communication complexity,
, defined to be the minimum rate of public communication needed
to generate a maximal-rate SK. It is well known that the minimum rate of
communication for omniscience, denoted by , is an upper bound on
. For the class of pairwise independent network (PIN) models
defined on uniform hypergraphs, we show that a certain "Type "
condition, which is verifiable in polynomial time, guarantees that our lower
bound on meets the upper bound. Thus, PIN
models satisfying our condition are -maximal, meaning that the
upper bound holds with equality. This allows
us to explicitly evaluate for such PIN models. We also give
several examples of PIN models that satisfy our Type condition.
Finally, we prove that for an arbitrary multiterminal source model, a stricter
version of our Type condition implies that communication from
\emph{all} terminals ("omnivocality") is needed for establishing a SK of
maximum rate. For three-terminal source models, the converse is also true:
omnivocality is needed for generating a maximal-rate SK only if the strict Type
condition is satisfied. Counterexamples exist that show that the
converse is not true in general for source models with four or more terminals.Comment: Submitted to the IEEE Transactions on Information Theory. arXiv admin
note: text overlap with arXiv:1504.0062
New Capacity-Approaching Codes for Run-Length-Limited Channels
Run-Length-Limited (RLL) channels are found in digital recording systems like the Hard Disk Drive (HDD), Compact Disc (CD), and Digital Versatile Disc (DVD). This thesis presents novel encoding algorithms for RLL channels based on a simple technique called bit stuffing. First, two new capacity-achieving variable-rate code constructions are proposed for (d,k) constraints. The variable-rate encoding ideas are then extended to (0,G/I) and other RLL constraints. Since variable-rate codes are of limited practical value, the second half of this thesis focuses on fixed-rate codes. The fixed-rate bit stuff (FRB) algorithm is proposed for the design of simple, high-rate (0,k) codes. The key to achieving high encoding rates with the FRB algorithm lies in a novel, iterative pre-processing of the fixed-length input sequence prior to bit stuffing. Detailed rate analysis for the proposed FRB algorithm is presented, and upper and lower bounds on the asymptotic (in input block length) encoding rate are derived. Several system-level issues of the proposed FRB codes are addressed, and FRB code parameters required to design rate 100/101 and rate 200/201 (0,k) codes are tabulated. Finally, the proposed fixed-rate encoding is extended to (0,G/I) constraints.Ph.D.Committee Chair: McLaughlin, Steven; Committee Member: Barnwell, Thomas; Committee Member: Barry, John; Committee Member: Fekri, Faramarz; Committee Member: Tetali, Prasa
ESRT: Event-to-sink reliable transport in wireless sensor networks
Wireless sensor networks (WSN) are event based systems that rely on the collective effort of several microsensor nodes. Reliable event detection at the sink is based on collective information provided by source nodes and not on any individual report. Hence, conventional end-to-end reliability definitions and solutions are inapplicable in the WSN regime and would only lead to a waste of scarce sensor resources. However, the absence of reliable transport altogether can seriously impair event detection. Hence, the WSN paradigm necessitates a collective event-to-sink reliability notion rather than the traditional end-to-end notion. To the best of our knowledge, reliable transport in WSN has not been studied from this perspective before. In order to address this need, a new reliable transport scheme for WSN, the event-to-sink reliable transport (ESRT) protocol, is presented in this paper. ESRT is a novel transport solution developed to achieve reliable event detection in WSN with minimum energy expenditure. It includes a congestion control component that serves the dual purpose of achieving reliability and conserving energy. Importantly, the algorithms of ESRT mainly run on the sink, with minimal functionality required at resource constrained sensor nodes. ESRT protocol operation is determined by the current network state based on the reliability achieved and congestion condition in the network. If the event-to-sink reliability is lower than required, ESRT adjusts the reporting frequency of source nodes aggressively in order to reach the target reliability level as soon as possible. If the reliability is higher than required, then ESRT reduces the reporting frequency conservatively in order to conserve energy while still maintaining reliability. This self-configuring nature of ESRT makes it robust to random, dynamic topology in WSN. Analytical performance evaluation and simulation results show that ESRT converges to the desired reliability with minimum energy expenditure, starting from any initial network state
Channel design for probe/mems-based storage
Issued as final reportSeagate Technology Corporatio
- …