-
Secure Storage using Maximally Recoverable Locally Repairable Codes
Authors:
Tim Janz,
Hedongliang Liu,
Rawad Bitar,
Frank R. Kschischang
Abstract:
This paper considers data secrecy in distributed storage systems (DSSs) using maximally recoverable locally repairable codes (MR-LRCs). Conventional MR-LRCs are in general not secure against eavesdroppers who can observe the transmitted data during a global repair operation. This work enables nonzero secrecy dimension of DSSs encoded by MR-LRCs through a new repair framework. The key idea is to as…
▽ More
This paper considers data secrecy in distributed storage systems (DSSs) using maximally recoverable locally repairable codes (MR-LRCs). Conventional MR-LRCs are in general not secure against eavesdroppers who can observe the transmitted data during a global repair operation. This work enables nonzero secrecy dimension of DSSs encoded by MR-LRCs through a new repair framework. The key idea is to associate each local group with a central processing unit (CPU), which aggregates and transmits the contribution from the intact nodes of their group to the CPU of a group needing a global repair. The aggregation is enabled by so-called local polynomials that can be generated independently in each group. Two different schemes -- direct repair and forwarded repair -- are considered, and their secrecy dimension using MR-LRCs is derived. Positive secrecy dimension is enabled for several parameter regimes.
△ Less
Submitted 9 May, 2024;
originally announced May 2024.
-
Soft-in Soft-out Decoding of Spherical Codes from Cartesian Powers of PAM Constellations
Authors:
Reza Rafie Borujeny,
Susanna E. Rumsey,
Stark C. Draper,
Frank R. Kschischang
Abstract:
For applications in concatenated coding for optical communications systems, we examine the encoding and soft-decoding of short spherical codes constructed as constant-energy shells of the Cartesian power of pulse amplitude modulation constellations. These are unions of permutation codes having the same average power. We construct a list decoder for permutation codes by adapting Murty's algorithm,…
▽ More
For applications in concatenated coding for optical communications systems, we examine the encoding and soft-decoding of short spherical codes constructed as constant-energy shells of the Cartesian power of pulse amplitude modulation constellations. These are unions of permutation codes having the same average power. We construct a list decoder for permutation codes by adapting Murty's algorithm, which is then used to determine mutual information curves for these permutation codes. In the process, we discover a straightforward expression for determining the likelihood of large subcodes of permutation codes. We refer to these subcodes, obtained by all possible sign flips of a given permutation codeword, as orbits. We introduce a simple process, which we call orbit decoding with frozen symbols, that allows us to extract soft information from noisy permutation codewords. In a sample communication system with probabilistic amplitude sha** protected by a standard low-density parity-check code that employs short permutation codes, we demonstrate that orbit decoding with frozen symbols provides a gain of about 0.3 dB in signal-to-noise ratio compared to the traditional symbol-by-symbol decoding. By using spherical codes composed of unions of permutation codes, we can increase the input entropy compared to using permutation codes alone. In one scheme, we consider a union of a small number of permutation codes. In this case, orbit decoding with frozen symbols provides about 0.2 dB gain compared to the traditional method. In another scheme, we use all possible permutations to form a spherical code that exhibits a computationally feasible trellis representation. The soft information obtained using the BCJR algorithm outperforms the traditional symbol-by-symbol method by 0.1 dB.
△ Less
Submitted 6 April, 2024;
originally announced April 2024.
-
Performance-Complexity-Latency Trade-offs of Concatenated RS-BCH Codes
Authors:
Alvin Y. Sukmadji,
Frank R. Kschischang
Abstract:
Using a generating function approach, a computationally tractable expression is derived to predict the frame error rate arising at the output of the binary symmetric channel when a number of outer Reed--Solomon codes are concatenated with a number of inner Bose--Ray-Chaudhuri--Hocquenghem codes, thereby obviating the need for time-consuming Monte Carlo simulations. Measuring (a) code performance v…
▽ More
Using a generating function approach, a computationally tractable expression is derived to predict the frame error rate arising at the output of the binary symmetric channel when a number of outer Reed--Solomon codes are concatenated with a number of inner Bose--Ray-Chaudhuri--Hocquenghem codes, thereby obviating the need for time-consuming Monte Carlo simulations. Measuring (a) code performance via the gap to the Shannon limit, (b) decoding complexity via an estimate of the number of operations per decoded bit, and (c) decoding latency by the overall frame length, a code search is performed to determine the Pareto frontier for performance-complexity-latency trade-offs.
△ Less
Submitted 18 February, 2024; v1 submitted 14 February, 2024;
originally announced February 2024.
-
Higher-Order Staircase Codes
Authors:
Mohannad Shehadeh,
Frank R. Kschischang,
Alvin Y. Sukmadji,
William Kingsford
Abstract:
We generalize staircase codes and tiled diagonal zipper codes, preserving their key properties while allowing each coded symbol to be protected by arbitrarily many component codewords rather than only two. This generalization which we term "higher-order staircase codes" arises from the marriage of two distinct combinatorial objects: difference triangle sets and finite-geometric nets, which have ty…
▽ More
We generalize staircase codes and tiled diagonal zipper codes, preserving their key properties while allowing each coded symbol to be protected by arbitrarily many component codewords rather than only two. This generalization which we term "higher-order staircase codes" arises from the marriage of two distinct combinatorial objects: difference triangle sets and finite-geometric nets, which have typically been applied separately to code design. We demonstrate one possible realization of these codes, obtaining powerful, high-rate, low-error-floor, and low-complexity coding schemes based on simple iterative syndrome-domain decoding of coupled Hamming component codes. We anticipate that the proposed codes could improve performance--complexity--latency tradeoffs in high-throughput communications applications, most notably fiber-optic, in which classical staircase codes and zipper codes have been applied. We consider the construction of difference triangle sets having minimum scope and sum-of-lengths, which lead to memory-optimal realizations of higher-order staircase codes. These results also enable memory reductions for early families of convolutional codes constructed from difference triangle sets.
△ Less
Submitted 8 July, 2024; v1 submitted 20 December, 2023;
originally announced December 2023.
-
Generalized Staircase Codes with Arbitrary Bit Degree
Authors:
Mohannad Shehadeh,
Frank R. Kschischang,
Alvin Y. Sukmadji
Abstract:
We introduce a natural generalization of staircase codes in which each bit is protected by arbitrarily many component codewords rather than two. This enables powerful energy-efficient FEC based on iterative decoding of Hamming components.
We introduce a natural generalization of staircase codes in which each bit is protected by arbitrarily many component codewords rather than two. This enables powerful energy-efficient FEC based on iterative decoding of Hamming components.
△ Less
Submitted 21 February, 2024; v1 submitted 24 October, 2023;
originally announced October 2023.
-
Generalized Spatially-Coupled Product-Like Codes Using Zipper Codes With Irregular Degree
Authors:
Alvin Y. Sukmadji,
Frank R. Kschischang,
Mohannad Shehadeh
Abstract:
Zipper codes with irregular variable degree are studied. Two new interleaver maps -- chevron and half-chevron -- are described. Simulation results with shortened double-error-correcting Bose--Chaudhuri--Hocquenghem constituent codes show that zipper codes with chevron and half-chevron interleaver maps outperform staircase codes when the rate is below 0.86 and 0.91, respectively, at $10^{-8}$ outpu…
▽ More
Zipper codes with irregular variable degree are studied. Two new interleaver maps -- chevron and half-chevron -- are described. Simulation results with shortened double-error-correcting Bose--Chaudhuri--Hocquenghem constituent codes show that zipper codes with chevron and half-chevron interleaver maps outperform staircase codes when the rate is below 0.86 and 0.91, respectively, at $10^{-8}$ output bit error rate operating point. In the miscorrection-free decoding scheme, both zipper codes with chevron and half-chevron interleaver maps outperform staircase codes. However, constituent decoder miscorrections induce additional performance gaps.
△ Less
Submitted 20 October, 2023;
originally announced October 2023.
-
Record Photon Information Efficiency with Optical Clock Transmission and Recovery of 12.5 bits/photon over an Optical Channel with 77 dB Loss
Authors:
René-Jean Essiambre,
Cheng Guo,
Sai Kanth Dacha,
Alexei Ashikhmin,
Andrea Blanco-Redondo,
Frank R. Kschischang,
Konrad Banaszek,
Matthew Weiner,
Rose Kopf,
Ian Crawley,
Mohamad H. Idjadi,
Ayed A. Sayem,
Jie Zhao,
James D. Sandoz,
Nicolas Fontaine,
Nicole Menkart,
Roland Ryf,
John Cloonan,
Michael Vasilyev,
Thomas E. Murphy,
Ellsworth C. Burrows
Abstract:
We experimentally demonstrate optical detection at 12.5~bits per incident photon, 9.4~dB higher than the theoretical limit of conventional coherent detection. A single laser transmits both data and optical clock, undergoes 77~dB of attenuation before quantum detection followed by optical clock and data recovery.
We experimentally demonstrate optical detection at 12.5~bits per incident photon, 9.4~dB higher than the theoretical limit of conventional coherent detection. A single laser transmits both data and optical clock, undergoes 77~dB of attenuation before quantum detection followed by optical clock and data recovery.
△ Less
Submitted 3 October, 2023;
originally announced October 2023.
-
External Codes for Multiple Unicast Networks via Interference Alignment
Authors:
F. R. Kschischang,
F. Manganiello,
A. Ravagnani,
K. Savary
Abstract:
We introduce a formal framework to study the multiple unicast problem for a coded network in which the network code is linear over a finite field and fixed. We show that the problem corresponds to an interference alignment problem over a finite field. In this context, we establish an outer bound for the achievable rate region and provide examples of networks where the bound is sharp. We finally gi…
▽ More
We introduce a formal framework to study the multiple unicast problem for a coded network in which the network code is linear over a finite field and fixed. We show that the problem corresponds to an interference alignment problem over a finite field. In this context, we establish an outer bound for the achievable rate region and provide examples of networks where the bound is sharp. We finally give evidence of the crucial role played by the field characteristic in the problem.
△ Less
Submitted 8 September, 2023;
originally announced September 2023.
-
A Simple Capacity-Achieving Scheme for Channels with Polarization-Dependent Loss
Authors:
Mohannad Shehadeh,
Frank R. Kschischang
Abstract:
We demonstrate, for a widely used model of channels with polarization dependent loss (PDL), that channel capacity is achieved by a simple interference cancellation scheme in conjunction with a universal precoder. Crucially, the proposed scheme is not only information-theoretically optimal, but it is also exceptionally simple and concrete. It transforms the PDL channel into separate scalar additive…
▽ More
We demonstrate, for a widely used model of channels with polarization dependent loss (PDL), that channel capacity is achieved by a simple interference cancellation scheme in conjunction with a universal precoder. Crucially, the proposed scheme is not only information-theoretically optimal, but it is also exceptionally simple and concrete. It transforms the PDL channel into separate scalar additive white Gaussian noise channels, allowing off-the-shelf coding and modulation schemes designed for such channels to approach capacity. The signal-to-noise ratio (SNR) penalty incurred under 6 dB of PDL is reduced to the information-theoretic minimum of a mere 1 dB as opposed to the 4 dB SNR penalty incurred under naive over-provisioning.
△ Less
Submitted 6 November, 2022; v1 submitted 8 August, 2022;
originally announced August 2022.
-
Practical Considerations in Direct Detection Under Tukey Signalling
Authors:
Amir Tasbihi,
Frank R. Kschischang
Abstract:
The deliberate introduction of controlled intersymbol interference (ISI) in Tukey signalling enables the recovery of signal amplitude and (in part) signal phase under direct detection, giving rise to significant data rate improvements compared to intensity modulation with direct detection (IMDD). The use of an integrate-and-dump detector makes precise waveform sha** unnecessary, thereby equippin…
▽ More
The deliberate introduction of controlled intersymbol interference (ISI) in Tukey signalling enables the recovery of signal amplitude and (in part) signal phase under direct detection, giving rise to significant data rate improvements compared to intensity modulation with direct detection (IMDD). The use of an integrate-and-dump detector makes precise waveform sha** unnecessary, thereby equip** the scheme with a high degree of robustness to nonlinear signal distortions introduced by practical modulators. Signal sequences drawn from star quadrature amplitude modulation (SQAM) formats admit an efficient trellis description that facilitates codebook design and low-complexity near maximum-likelihood sequence detection in the presence of both shot noise and thermal noise. Under the practical (though suboptimal) allocation of a 50% duty cycle between ISI-free and ISI-present signalling segments, at a symbol rate of 50 Gbaud and a launch power of -10 dBm the Tukey scheme has a maximum theoretically achievable throughput of 200 Gb/s with an (8,4)-SQAM constellation, while an IMDD scheme achieves about 145 Gb/s using PAM-8. Note that the two mentioned constellations have the same number of magnitude levels and the difference in throughput is resulting from exploiting phase information under using a complex-valued signal constellation.
△ Less
Submitted 24 February, 2023; v1 submitted 28 April, 2022;
originally announced April 2022.
-
Zipper Codes
Authors:
Alvin Y. Sukmadji,
Umberto Martínez-Peñas,
Frank R. Kschischang
Abstract:
Zipper codes are a framework for describing spatially-coupled product-like codes. Many well-known codes, such as staircase codes and braided block codes, are subsumed into this framework. New types of codes such as tiled diagonal and delayed diagonal zipper codes are introduced along with their software simulation results. Stall patterns that can arise in iterative decoding are analyzed, giving a…
▽ More
Zipper codes are a framework for describing spatially-coupled product-like codes. Many well-known codes, such as staircase codes and braided block codes, are subsumed into this framework. New types of codes such as tiled diagonal and delayed diagonal zipper codes are introduced along with their software simulation results. Stall patterns that can arise in iterative decoding are analyzed, giving a means of error floor estimation.
△ Less
Submitted 20 February, 2023; v1 submitted 18 March, 2022;
originally announced March 2022.
-
Information Density in Multi-Layer Resistive Memories
Authors:
Susanna E. Rumsey,
Stark C. Draper,
Frank R. Kschischang
Abstract:
Resistive memories store information in a crossbar arrangement of two-terminal devices that can be programmed to patterns of high or low resistance. While extremely compact, this technology suffers from the "sneak-path" problem: certain information patterns cannot be recovered, as multiple low resistances in parallel make a high resistance indistinguishable from a low resistance. In this paper, a…
▽ More
Resistive memories store information in a crossbar arrangement of two-terminal devices that can be programmed to patterns of high or low resistance. While extremely compact, this technology suffers from the "sneak-path" problem: certain information patterns cannot be recovered, as multiple low resistances in parallel make a high resistance indistinguishable from a low resistance. In this paper, a multi-layer device is considered, and the number of bits it can store is derived exactly and asymptotic bounds are developed. The information density of a series of isolated arrays with extreme aspect ratios is derived in the single- and multi-layer cases with and without peripheral selection circuitry. This density is shown to be non-zero in the limit, unlike that of the arrays with moderate aspect ratios previously considered. A simple encoding scheme that achieves capacity asymptotically is presented.
△ Less
Submitted 13 February, 2022;
originally announced February 2022.
-
Direct Detection Under Tukey Signalling
Authors:
Amir Tasbihi,
Frank R. Kschischang
Abstract:
A new direct-detection-compatible signalling scheme is proposed for fiber-optic communication over short distances. Controlled inter-symbol interference is exploited to extract phase information, thereby achieving spectral efficiencies about one bit less, per second per hertz, of those of a coherent detector.
A new direct-detection-compatible signalling scheme is proposed for fiber-optic communication over short distances. Controlled inter-symbol interference is exploited to extract phase information, thereby achieving spectral efficiencies about one bit less, per second per hertz, of those of a coherent detector.
△ Less
Submitted 9 August, 2021; v1 submitted 26 May, 2021;
originally announced May 2021.
-
Space-Time Codes from Sum-Rank Codes
Authors:
Mohannad Shehadeh,
Frank R. Kschischang
Abstract:
Just as rank-metric or Gabidulin codes may be used to construct rate-diversity tradeoff optimal space-time codes, a recently introduced generalization for the sum-rank metric -- linearized Reed-Solomon codes -- accomplishes the same in the case of multiple fading blocks. In this paper, we provide the first explicit construction of minimal delay rate-diversity optimal multiblock space-time codes as…
▽ More
Just as rank-metric or Gabidulin codes may be used to construct rate-diversity tradeoff optimal space-time codes, a recently introduced generalization for the sum-rank metric -- linearized Reed-Solomon codes -- accomplishes the same in the case of multiple fading blocks. In this paper, we provide the first explicit construction of minimal delay rate-diversity optimal multiblock space-time codes as an application of linearized Reed-Solomon codes. We also provide sequential decoders for these codes and, more generally, space-time codes constructed from finite field codes. Simulation results show that the proposed codes can outperform full diversity codes based on cyclic division algebras at low SNRs as well as utilize significantly smaller constellations.
△ Less
Submitted 8 March, 2021;
originally announced March 2021.
-
Channel Matching: An Adaptive Technique to Increase the Accuracy of Soft Decisions
Authors:
Reza Rafie Borujeny,
Frank R. Kschischang
Abstract:
Nonlinear interference is modeled by a time-varying conditionally Gaussian channel. It is shown that approximating this channel with a time-invariant channel imposes considerable loss in the performance of channel decoding. An adaptive method to maintain decoding performance is described.
Nonlinear interference is modeled by a time-varying conditionally Gaussian channel. It is shown that approximating this channel with a time-invariant channel imposes considerable loss in the performance of channel decoding. An adaptive method to maintain decoding performance is described.
△ Less
Submitted 31 January, 2021; v1 submitted 26 January, 2021;
originally announced January 2021.
-
A Signal-Space Distance Measure for Nondispersive Optical Fiber
Authors:
Reza Rafie Borujeny,
Frank R. Kschischang
Abstract:
The nondispersive per-sample channel model for the optical fiber channel is considered. Under certain smoothness assumptions, the problem of finding the minimum amount of noise energy that can render two different input points indistinguishable is formulated. This minimum noise energy is then taken as a measure of distance between the points in the input alphabet. Using the machinery of optimal co…
▽ More
The nondispersive per-sample channel model for the optical fiber channel is considered. Under certain smoothness assumptions, the problem of finding the minimum amount of noise energy that can render two different input points indistinguishable is formulated. This minimum noise energy is then taken as a measure of distance between the points in the input alphabet. Using the machinery of optimal control theory, necessary conditions that describe the minimum-energy noise trajectories are stated as a system of nonlinear differential equations. It is shown how to find the distance between two input points by solving this system of differential equations. The problem of designing signal constellations with the largest minimum distance subject to a peak power constraint is formulated as a clique-finding problem. As an example, a 16-point constellation is designed and compared with conventional quadrature amplitude modulation. A computationally efficient approximation for the proposed distance measure is provided. It is shown how to use this approximation to design large constellations with large minimum distances. Based on the control-theoretic viewpoint of this paper, a new decoding scheme for such nonlinear channels is proposed.
△ Less
Submitted 22 October, 2020; v1 submitted 23 January, 2020;
originally announced January 2020.
-
On the Capacity of Waveform Channels Under Square-Law Detection of Time-Limited Signals
Authors:
Amir Tasbihi,
Frank R. Kschischang
Abstract:
Capacity bounds for waveform channels under square-law detection of time-limited complex-valued signals are derived. The upper bound is the capacity of the channel under (complex-valued) coherent detection. The lower bound is one bit less, per dimension, than the upper bound.
Capacity bounds for waveform channels under square-law detection of time-limited complex-valued signals are derived. The upper bound is the capacity of the channel under (complex-valued) coherent detection. The lower bound is one bit less, per dimension, than the upper bound.
△ Less
Submitted 22 January, 2020;
originally announced January 2020.
-
Wireless Network Reliability Analysis for Arbitrary Network Topologies
Authors:
Semiha Tedik Basaran,
Gunes Karabulut Kurt,
Frank R. Kschischang
Abstract:
The outage performance of wireless networks with unstructured network topologies is investigated. The network reliability perspective of graph theory is used to obtain the network outage polynomial of generalized wireless networks by enumerating paths and cut-sets of its graph representation for both uncorrelated and correlated wireless channels. A relation is established between the max-flow min-…
▽ More
The outage performance of wireless networks with unstructured network topologies is investigated. The network reliability perspective of graph theory is used to obtain the network outage polynomial of generalized wireless networks by enumerating paths and cut-sets of its graph representation for both uncorrelated and correlated wireless channels. A relation is established between the max-flow min-cut theorem and key communication performance indicators. The diversity order is equal to the size of the minimum cut-set between source and destination, and the coding gain is the number of cut-sets with size equal to the minimum cut. An ergodic capacity analysis of networks with arbitrary topologies based on the network outage polynomial is also presented. Numerical results are used to illustrate the technical definitions and verify the derivations.
△ Less
Submitted 29 April, 2019;
originally announced April 2019.
-
Maximum Likelihood Detection in a Four-Dimensional Stokes-Space Receiver
Authors:
Amir Tasbihi,
Frank R. Kschischang
Abstract:
The maximum likelihood detection rule for a four-dimensional direct-detection optical front-end is derived. The four dimensions are two intensities and two differential phases. Three different signal processing algorithms, composed of symbol-by-symbol, sequence and successive detection, are discussed. To remedy dealing with special functions in the detection rules, an approximation for high signal…
▽ More
The maximum likelihood detection rule for a four-dimensional direct-detection optical front-end is derived. The four dimensions are two intensities and two differential phases. Three different signal processing algorithms, composed of symbol-by-symbol, sequence and successive detection, are discussed. To remedy dealing with special functions in the detection rules, an approximation for high signal-to-noise ratios (SNRs) is provided. Simulation results show that, despite the simpler structure of the successive algorithm, the resulting performance loss, in comparison with the other two algorithms, is negligible. For example, for an 8-ring/8-ary phase constellation, the complexity of detection reduces by a factor of 8, while the performance, in terms of the symbol error rate, degrades by 0.5 dB. It is shown that the high-SNR approximation is very accurate, even at low SNRs. The achievable rates for different constellations are computed and compared by the Monte Carlo method. For example, for a 4-ring/8-ary phase constellation, the achievable rate is 10 bits per channel use at an SNR of 25 dB, while by using an 8-ring/8-ary phase constellation and an error correcting code of rate 5/6, this rate is achieved at an SNR of 20 dB.
△ Less
Submitted 8 February, 2019;
originally announced February 2019.
-
Universal and Dynamic Locally Repairable Codes with Maximal Recoverability via Sum-Rank Codes
Authors:
Umberto Martínez-Peñas,
Frank R. Kschischang
Abstract:
Locally repairable codes (LRCs) are considered with equal or unequal localities, local distances and local field sizes. An explicit two-layer architecture with a sum-rank outer code is obtained, having disjoint local groups and achieving maximal recoverability (MR) for all families of local linear codes (MDS or not) simultaneously, up to a specified maximum locality $ r $. Furthermore, the local l…
▽ More
Locally repairable codes (LRCs) are considered with equal or unequal localities, local distances and local field sizes. An explicit two-layer architecture with a sum-rank outer code is obtained, having disjoint local groups and achieving maximal recoverability (MR) for all families of local linear codes (MDS or not) simultaneously, up to a specified maximum locality $ r $. Furthermore, the local linear codes (thus the localities, local distances and local fields) can be efficiently and dynamically modified without global recoding or changes in architecture or outer code, while preserving the MR property, easily adapting to new configurations in storage or new hot and cold data. In addition, local groups and file components can be added, removed or updated without global recoding. The construction requires global fields of size roughly $ g^r $, for $ g $ local groups and maximum or specified locality $ r $. For equal localities, these global fields are smaller than those of previous MR-LRCs when $ r \leq h $ (global parities). For unequal localities, they provide an exponential field size reduction on all previous best known MR-LRCs. For bounded localities and a large number of local groups, the global erasure-correction complexity of the given construction is comparable to that of Tamo-Barg codes or Reed-Solomon codes with local replication, while local repair is as efficient as for the Cartesian product of the local codes. Reed-Solomon codes with local replication and Cartesian products are recovered from the given construction when $ r=1 $ and $ h = 0 $, respectively. The given construction can also be adapted to provide hierarchical MR-LRCs for all types of hierarchies and parameters. Finally, subextension subcodes and sum-rank alternant codes are introduced to obtain further exponential field size reductions, at the expense of lower information rates.
△ Less
Submitted 24 April, 2019; v1 submitted 28 September, 2018;
originally announced September 2018.
-
Reliable and Secure Multishot Network Coding using Linearized Reed-Solomon Codes
Authors:
Umberto Martínez-Peñas,
Frank R. Kschischang
Abstract:
Multishot network coding is considered in a worst-case adversarial setting in which an omniscient adversary with unbounded computational resources may inject erroneous packets in up to $t$ links, erase up to $ρ$ packets, and wire-tap up to $μ$ links, all throughout $\ell$ shots of a linearly-coded network. Assuming no knowledge of the underlying linear network code (in particular, the network topo…
▽ More
Multishot network coding is considered in a worst-case adversarial setting in which an omniscient adversary with unbounded computational resources may inject erroneous packets in up to $t$ links, erase up to $ρ$ packets, and wire-tap up to $μ$ links, all throughout $\ell$ shots of a linearly-coded network. Assuming no knowledge of the underlying linear network code (in particular, the network topology and underlying linear code may be random and change with time), a coding scheme achieving zero-error communication and perfect secrecy is obtained based on linearized Reed-Solomon codes. The scheme achieves the maximum possible secret message size of $ \ell n^\prime - 2t - ρ- μ$ packets for coherent communication, where $ n^\prime $ is the number of outgoing links at the source, for any packet length $ m \geq n^\prime $ (largest possible range). By lifting this construction, coding schemes for non-coherent communication are obtained with information rates close to optimal for practical instances. The required field size is $ q^m $, where $ q > \ell $, thus $ q^m \approx \ell^{n^\prime} $, which is always smaller than that of a Gabidulin code tailored for $ \ell $ shots, which would be at least $ 2^{\ell n^\prime} $. A Welch-Berlekamp sum-rank decoding algorithm for linearized Reed-Solomon codes is provided, having quadratic complexity in the total length $n = \ell n^\prime $, and which can be adapted to handle not only errors, but also erasures, wire-tap observations and non-coherent communication. Combined with the obtained field size, the given decoding complexity is of $ \mathcal{O}(n^{\prime 4} \ell^2 \log(\ell)^2) $ operations in $ \mathbb{F}_2 $.
△ Less
Submitted 17 April, 2019; v1 submitted 9 May, 2018;
originally announced May 2018.
-
Low-Complexity Concatenated LDPC-Staircase Codes
Authors:
Masoud Barakatain,
Frank R. Kschischang
Abstract:
A low-complexity soft-decision concatenated FEC scheme, consisting of an inner LDPC code and an outer staircase code is proposed. The inner code is tasked with reducing the bit error probability below the outer-code threshold. The concatenated code is obtained by optimizing the degree distribution of the inner-code ensemble to minimize estimated data-flow, for various choices of outer staircase co…
▽ More
A low-complexity soft-decision concatenated FEC scheme, consisting of an inner LDPC code and an outer staircase code is proposed. The inner code is tasked with reducing the bit error probability below the outer-code threshold. The concatenated code is obtained by optimizing the degree distribution of the inner-code ensemble to minimize estimated data-flow, for various choices of outer staircase codes. A key feature that emerges from this optimization is that it pays to leave some inner codeword bits completely uncoded, thereby greatly reducing a significant portion of the decoding complexity. The trade-off between required SNR and decoding complexity of the designed codes is characterized by a Pareto frontier. Computer simulations of the resulting codes reveals that the net coding-gains of existing designs can be achieved with up to 71\% reduction in complexity. A hardware-friendly quasi-cyclic construction is given for the inner codes, which can realize an energy-efficient decoder implementation, and even further complexity reductions via a layered message-passing decoder schedule.
△ Less
Submitted 21 September, 2018; v1 submitted 2 March, 2018;
originally announced March 2018.
-
Evaluation and interpolation over multivariate skew polynomial rings
Authors:
Umberto Martínez-Peñas,
Frank R. Kschischang
Abstract:
The concepts of evaluation and interpolation are extended from univariate skew polynomials to multivariate skew polynomials, with coefficients over division rings. Iterated skew polynomial rings are in general not suitable for this purpose. Instead, multivariate skew polynomial rings are constructed in this work as follows: First, free multivariate skew polynomial rings are defined, where multipli…
▽ More
The concepts of evaluation and interpolation are extended from univariate skew polynomials to multivariate skew polynomials, with coefficients over division rings. Iterated skew polynomial rings are in general not suitable for this purpose. Instead, multivariate skew polynomial rings are constructed in this work as follows: First, free multivariate skew polynomial rings are defined, where multiplication is additive on degrees and restricts to concatenation for monomials. This allows to define the evaluation of any skew polynomial at any point by unique remainder division. Multivariate skew polynomial rings are then defined as the quotient of the free ring by (two-sided) ideals that vanish at every point. The main objectives and results of this work are descriptions of the sets of zeros of these multivariate skew polynomials, the families of functions that such skew polynomials define, and how to perform Lagrange interpolation with them. To obtain these descriptions, the existing concepts of P-closed sets, P-independence, P-bases (which are shown to form a matroid) and skew Vandermonde matrices are extended from the univariate case to the multivariate one.
△ Less
Submitted 1 November, 2018; v1 submitted 26 October, 2017;
originally announced October 2017.
-
Successive Four-Dimensional Stokes-Space Direct Detection
Authors:
Amir Tasbihi,
Frank R. Kschischang
Abstract:
We present a successive detection scheme for the fourth dimension in a four-dimensional Stokes-space direct detection receiver. At the expense of a small number of electrical-domain computations, the additional information rate can be substantial.
We present a successive detection scheme for the fourth dimension in a four-dimensional Stokes-space direct detection receiver. At the expense of a small number of electrical-domain computations, the additional information rate can be substantial.
△ Less
Submitted 17 October, 2017;
originally announced October 2017.
-
Adversarial Network Coding
Authors:
Alberto Ravagnani,
Frank R. Kschischang
Abstract:
A combinatorial framework for adversarial network coding is presented. Channels are described by specifying the possible actions that one or more (possibly coordinated) adversaries may take. Upper bounds on three notions of capacity (the one-shot capacity, the zero-error capacity, and the compound zero-error capacity) are obtained for point-to-point channels, and generalized to corresponding capac…
▽ More
A combinatorial framework for adversarial network coding is presented. Channels are described by specifying the possible actions that one or more (possibly coordinated) adversaries may take. Upper bounds on three notions of capacity (the one-shot capacity, the zero-error capacity, and the compound zero-error capacity) are obtained for point-to-point channels, and generalized to corresponding capacity regions appropriate for multi-source networks. A key result of this paper is a general method by which bounds on these capacities in point-to-point channels may be ported to networks. This technique is illustrated in detail for Hamming-type channels with multiple adversaries operating on specific coordinates, which correspond, in the context of networks, to multiple adversaries acting on specific network edges. Capacity-achieving coding schemes are described for some of the considered adversarial models.
△ Less
Submitted 16 June, 2017;
originally announced June 2017.
-
Matroidal Structure of Skew Polynomial Rings with Application to Network Coding
Authors:
Siyu Liu,
Felice Manganiello,
Frank R. Kschischang
Abstract:
Over a finite field $\mathbb{F}_{q^m}$, the evaluation of skew polynomials is intimately related to the evaluation of linearized polynomials. This connection allows one to relate the concept of polynomial independence defined for skew polynomials to the familiar concept of linear independence for vector spaces. This relation allows for the definition of a representable matroid called the…
▽ More
Over a finite field $\mathbb{F}_{q^m}$, the evaluation of skew polynomials is intimately related to the evaluation of linearized polynomials. This connection allows one to relate the concept of polynomial independence defined for skew polynomials to the familiar concept of linear independence for vector spaces. This relation allows for the definition of a representable matroid called the $\mathbb{F}_{q^m}[x;σ]$-matroid, with rank function that makes it a metric space. Specific submatroids of this matroid are individually bijectively isometric to the projective geometry of $\mathbb{F}_{q^m}$ equipped with the subspace metric. This isometry allows one to use the $\mathbb{F}_{q^m}[x;σ]$-matroid in a matroidal network coding application.
△ Less
Submitted 25 October, 2016;
originally announced October 2016.
-
On Scaling Rules for Energy of VLSI Polar Encoders and Decoders
Authors:
Christopher G. Blake,
Frank R. Kschischang
Abstract:
It is shown that all polar encoding schemes of rate $R>\frac{1}{2}$ of block length $N$ implemented according to the Thompson VLSI model must take energy $E\geΩ\left(N^{3/2}\right)$. This lower bound is achievable up to polylogarithmic factors using a mesh network topology defined by Thompson and the encoding algorithm defined by Arikan. A general class of circuits that compute successive cancella…
▽ More
It is shown that all polar encoding schemes of rate $R>\frac{1}{2}$ of block length $N$ implemented according to the Thompson VLSI model must take energy $E\geΩ\left(N^{3/2}\right)$. This lower bound is achievable up to polylogarithmic factors using a mesh network topology defined by Thompson and the encoding algorithm defined by Arikan. A general class of circuits that compute successive cancellation decoding adapted from Arikan's butterfly network algorithm is defined. It is shown that such decoders implemented on a rectangle grid for codes of rate $R>2/3$ must take energy $E\geΩ(N^{3/2})$, and this can also be reached up to polylogarithmic factors using a mesh network. Capacity approaching sequences of energy optimal polar encoders and decoders, as a function of reciprocal gap to capacity $χ= (1-R/C)^{-1}$, have energy that scales as $Ω\left(χ^{5.325}\right)\le E \le O\left(χ^{7.05}\log^{4}\left(χ\right)\right)$.
△ Less
Submitted 12 February, 2016;
originally announced February 2016.
-
Energy, Latency, and Reliability Tradeoffs in Coding Circuits
Authors:
Christopher G. Blake,
Frank R. Kschischang
Abstract:
It is shown that fully-parallel encoding and decoding schemes with asymptotic block error probability that scales as $O\left(f\left(n\right)\right)$ have Thompson energy that scales as $Ω\left(\sqrt{\ln f\left(n\right)}n\right)$. As well, it is shown that the number of clock cycles (denoted $T\left(n\right)$) required for any encoding or decoding scheme that reaches this bound must scale as…
▽ More
It is shown that fully-parallel encoding and decoding schemes with asymptotic block error probability that scales as $O\left(f\left(n\right)\right)$ have Thompson energy that scales as $Ω\left(\sqrt{\ln f\left(n\right)}n\right)$. As well, it is shown that the number of clock cycles (denoted $T\left(n\right)$) required for any encoding or decoding scheme that reaches this bound must scale as $T\left(n\right)\ge\sqrt{\ln f\left(n\right)}$. Similar scaling results are extended to serialized computation.
The Grover information-friction energy model is generalized to three dimensions and the optimal energy of encoding or decoding schemes with probability of block error $P_\mathrm{e}$ is shown to be at least $Ω\left(n\left(\ln P_{\mathrm{e}}\left(n\right)\right)^{\frac{1}{3}}\right)$.
△ Less
Submitted 12 February, 2016;
originally announced February 2016.
-
Upper Bound on the Capacity of a Cascade of Nonlinear and Noisy Channels
Authors:
Gerhard Kramer,
Mansoor I. Yousefi,
Frank R. Kschischang
Abstract:
An upper bound on the capacity of a cascade of nonlinear and noisy channels is presented. The cascade mimics the split-step Fourier method for computing waveform propagation governed by the stochastic generalized nonlinear Schroedinger equation. It is shown that the spectral efficiency of the cascade is at most log(1+SNR), where SNR is the receiver signal-to-noise ratio. The results may be applied…
▽ More
An upper bound on the capacity of a cascade of nonlinear and noisy channels is presented. The cascade mimics the split-step Fourier method for computing waveform propagation governed by the stochastic generalized nonlinear Schroedinger equation. It is shown that the spectral efficiency of the cascade is at most log(1+SNR), where SNR is the receiver signal-to-noise ratio. The results may be applied to optical fiber channels. However, the definition of bandwidth is subtle and leaves open interpretations of the bound. Some of these interpretations are discussed.
△ Less
Submitted 23 April, 2015; v1 submitted 26 March, 2015;
originally announced March 2015.
-
Modeling and Energy Optimization of LDPC Decoder Circuits with Timing Violations
Authors:
François Leduc-Primeau,
Frank R. Kschischang,
Warren J. Gross
Abstract:
This paper proposes a "quasi-synchronous" design approach for signal processing circuits, in which timing violations are permitted, but without the need for a hardware compensation mechanism. The case of a low-density parity-check (LDPC) decoder is studied, and a method for accurately modeling the effect of timing violations at a high level of abstraction is presented. The error-correction perform…
▽ More
This paper proposes a "quasi-synchronous" design approach for signal processing circuits, in which timing violations are permitted, but without the need for a hardware compensation mechanism. The case of a low-density parity-check (LDPC) decoder is studied, and a method for accurately modeling the effect of timing violations at a high level of abstraction is presented. The error-correction performance of code ensembles is then evaluated using density evolution while taking into account the effect of timing faults. Following this, several quasi-synchronous LDPC decoder circuits based on the offset min-sum algorithm are optimized, providing a 23%-40% reduction in energy consumption or energy-delay product, while achieving the same performance and occupying the same area as conventional synchronous circuits.
△ Less
Submitted 17 November, 2017; v1 submitted 12 March, 2015;
originally announced March 2015.
-
On the Energy Complexity of LDPC Decoder Circuits
Authors:
Christopher Blake,
Frank R. Kschischang
Abstract:
It is shown that in a sequence of randomly generated bipartite configurations with number of left nodes approaching infinity, the probability that a particular configuration in the sequence has a minimum bisection width proportional to the number of vertices in the configuration approaches $1$ so long as a sufficient condition on the node degree distribution is satisfied. This graph theory result…
▽ More
It is shown that in a sequence of randomly generated bipartite configurations with number of left nodes approaching infinity, the probability that a particular configuration in the sequence has a minimum bisection width proportional to the number of vertices in the configuration approaches $1$ so long as a sufficient condition on the node degree distribution is satisfied. This graph theory result implies an almost sure $Ω\left(n^{2}\right)$ scaling rule for the energy of capacity-approaching LDPC decoder circuits that directly instantiate their Tanner Graphs and are generated according to a uniform configuration model, where $n$ is the block length of the code. For a sequence of circuits that have a full set of check nodes but do not necessarily directly instantiate a Tanner graph, this implies an $Ω\left(n^{1.5}\right)$ scaling rule. In another theorem, it is shown that all (as opposed to almost all) capacity-approaching LDPC decoding circuits that directly implement their Tanner graphs must have energy that scales as $Ω\left(n\left(\log n\right)^{2}\right)$. These results further imply scaling rules for the energy of LDPC decoder circuits as a function of gap to capacity.
△ Less
Submitted 27 February, 2015;
originally announced February 2015.
-
Upper Bound on the Capacity of the Nonlinear Schrödinger Channel
Authors:
Mansoor I. Yousefi,
Gerhard Kramer,
Frank R. Kschischang
Abstract:
It is shown that the capacity of the channel modeled by (a discretized version of) the stochastic nonlinear Schrödinger (NLS) equation is upper-bounded by $\log(1+\text{SNR})$ with $\text{SNR}=\mathcal P_0/σ^2(z)$, where $\mathcal P_0$ is the average input signal power and $σ^2(z)$ is the total noise power up to distance $z$. The result is a consequence of the fact that the deterministic NLS equat…
▽ More
It is shown that the capacity of the channel modeled by (a discretized version of) the stochastic nonlinear Schrödinger (NLS) equation is upper-bounded by $\log(1+\text{SNR})$ with $\text{SNR}=\mathcal P_0/σ^2(z)$, where $\mathcal P_0$ is the average input signal power and $σ^2(z)$ is the total noise power up to distance $z$. The result is a consequence of the fact that the deterministic NLS equation is a Hamiltonian energy-preserving dynamical system.
△ Less
Submitted 31 March, 2015; v1 submitted 23 February, 2015;
originally announced February 2015.
-
Energy Consumption of VLSI Decoders
Authors:
Christopher Blake,
Frank R. Kschischang
Abstract:
Thompson's model of VLSI computation relates the energy of a computation to the product of the circuit area and the number of clock cycles needed to carry out the computation. It is shown that for any family of circuits implemented according to this model, using any algorithm that performs decoding of a codeword passed through a binary erasure channel, as the block length approaches infinity eithe…
▽ More
Thompson's model of VLSI computation relates the energy of a computation to the product of the circuit area and the number of clock cycles needed to carry out the computation. It is shown that for any family of circuits implemented according to this model, using any algorithm that performs decoding of a codeword passed through a binary erasure channel, as the block length approaches infinity either (a) the probability of block error is asymptotically lower bounded by 1/2 or (b) the energy of the computation scales at least as Omega(n(log n)^(1/2)), and so the energy of successful decoding, per decoded bit, must scale at least as Omega((log n)^(1/2)). This implies that the average energy per decoded bit must approach infinity for any sequence of codes that approaches capacity. The analysis techniques used are then extended to the case of serial computation, showing that if a circuit is restricted to serial computation, then as block length approaches infinity, either the block error probability is lower bounded by 1/2 or the energy scales at least as fast as Omega(n log(n)). In a very general case that allows for the number of output pins to vary with block length, it is shown that the average energy per decoded bit must scale as Omega(n(log n)^(1/5)). A simple example is provided of a class of circuits performing low-density parity-check decoding whose energy complexity scales as O(n^2 log log n).
△ Less
Submitted 12 December, 2014;
originally announced December 2014.
-
On the Per-Sample Capacity of Nondispersive Optical Fibers
Authors:
Mansoor I. Yousefi,
Frank R. Kschischang
Abstract:
The capacity of the channel defined by the stochastic nonlinear Schrödinger equation, which includes the effects of the Kerr nonlinearity and amplified spontaneous emission noise, is considered in the case of zero dispersion. In the absence of dispersion, this channel behaves as a collection of parallel per-sample channels. The conditional probability density function of the nonlinear per-sample c…
▽ More
The capacity of the channel defined by the stochastic nonlinear Schrödinger equation, which includes the effects of the Kerr nonlinearity and amplified spontaneous emission noise, is considered in the case of zero dispersion. In the absence of dispersion, this channel behaves as a collection of parallel per-sample channels. The conditional probability density function of the nonlinear per-sample channels is derived using both a sum-product and a Fokker-Planck differential equation approach. It is shown that, for a fixed noise power, the per-sample capacity grows unboundedly with input signal. The channel can be partitioned into amplitude and phase subchannels, and it is shown that the contribution to the total capacity of the phase channel declines for large input powers. It is found that a two-dimensional distribution with a half-Gaussian profile on the amplitude and uniform phase provides a lower bound for the zero-dispersion optical fiber channel, which is simple and asymptotically capacity-achieving at high signal-to-noise ratios (SNRs). A lower bound on the capacity is also derived in the medium-SNR region. The exact capacity subject to peak and average power constraints is numerically quantified using dense multiple ring modulation formats. The differential model underlying the zero-dispersion channel is reduced to an algebraic model, which is more tractable for digital communication studies, and in particular it provides a relation between the zero-dispersion optical channel and a $2 \times 2$ multiple-input multiple-output Rician fading channel. It appears that the structure of the capacity-achieving input distribution resembles that of the Rician fading channel, i.e., it is discrete in amplitude with a finite number of mass points, while continuous and uniform in phase.
△ Less
Submitted 7 October, 2014;
originally announced October 2014.
-
Communication over Finite-Chain-Ring Matrix Channels
Authors:
Chen Feng,
Roberto W. Nóbrega,
Frank R. Kschischang,
Danilo Silva
Abstract:
Though network coding is traditionally performed over finite fields, recent work on nested-lattice-based network coding suggests that, by allowing network coding over certain finite rings, more efficient physical-layer network coding schemes can be constructed. This paper considers the problem of communication over a finite-ring matrix channel $Y = AX + BE$, where $X$ is the channel input, $Y$ is…
▽ More
Though network coding is traditionally performed over finite fields, recent work on nested-lattice-based network coding suggests that, by allowing network coding over certain finite rings, more efficient physical-layer network coding schemes can be constructed. This paper considers the problem of communication over a finite-ring matrix channel $Y = AX + BE$, where $X$ is the channel input, $Y$ is the channel output, $E$ is random error, and $A$ and $B$ are random transfer matrices. Tight capacity results are obtained and simple polynomial-complexity capacity-achieving coding schemes are provided under the assumption that $A$ is uniform over all full-rank matrices and $BE$ is uniform over all rank-$t$ matrices, extending the work of Silva, Kschischang and Kötter (2010), who handled the case of finite fields. This extension is based on several new results, which may be of independent interest, that generalize concepts and methods from matrices over finite fields to matrices over finite chain rings.
△ Less
Submitted 6 June, 2014; v1 submitted 9 April, 2013;
originally announced April 2013.
-
Information Transmission using the Nonlinear Fourier Transform, Part III: Spectrum Modulation
Authors:
Mansoor I. Yousefi,
Frank R. Kschischang
Abstract:
Motivated by the looming "capacity crunch" in fiber-optic networks, information transmission over such systems is revisited. Among numerous distortions, inter-channel interference in multiuser wavelength-division multiplexing (WDM) is identified as the seemingly intractable factor limiting the achievable rate at high launch power. However, this distortion and similar ones arising from nonlinearity…
▽ More
Motivated by the looming "capacity crunch" in fiber-optic networks, information transmission over such systems is revisited. Among numerous distortions, inter-channel interference in multiuser wavelength-division multiplexing (WDM) is identified as the seemingly intractable factor limiting the achievable rate at high launch power. However, this distortion and similar ones arising from nonlinearity are primarily due to the use of methods suited for linear systems, namely WDM and linear pulse-train transmission, for the nonlinear optical channel. Exploiting the integrability of the nonlinear Schrödinger (NLS) equation, a nonlinear frequency-division multiplexing (NFDM) scheme is presented, which directly modulates non-interacting signal degrees-of-freedom under NLS propagation. The main distinction between this and previous methods is that NFDM is able to cope with the nonlinearity, and thus, as the the signal power or transmission distance is increased, the new method does not suffer from the deterministic cross-talk between signal components which has degraded the performance of previous approaches. In this paper, emphasis is placed on modulation of the discrete component of the nonlinear Fourier transform of the signal and some simple examples of achievable spectral efficiencies are provided.
△ Less
Submitted 7 October, 2014; v1 submitted 12 February, 2013;
originally announced February 2013.
-
Information Transmission using the Nonlinear Fourier Transform, Part II: Numerical Methods
Authors:
Mansoor I. Yousefi,
Frank R. Kschischang
Abstract:
In this paper, numerical methods are suggested to compute the discrete and the continuous spectrum of a signal with respect to the Zakharov-Shabat system, a Lax operator underlying numerous integrable communication channels including the nonlinear Schrödinger channel, modeling pulse propagation in optical fibers. These methods are subsequently tested and their ability to estimate the spectrum are…
▽ More
In this paper, numerical methods are suggested to compute the discrete and the continuous spectrum of a signal with respect to the Zakharov-Shabat system, a Lax operator underlying numerous integrable communication channels including the nonlinear Schrödinger channel, modeling pulse propagation in optical fibers. These methods are subsequently tested and their ability to estimate the spectrum are compared against each other. These methods are used to compute the spectrum of various signals commonly used in the optical fiber communications. It is found that the layer-peeling and the spectral methods are suitable schemes to estimate the nonlinear spectra with good accuracy. To illustrate the structure of the spectrum, the locus of the eigenvalues is determined under amplitude and phase modulation in a number of examples. It is observed that in some cases, as signal parameters vary, eigenvalues collide and change their course of motion. The real axis is typically the place from which new eigenvalues originate or are absorbed into after traveling a trajectory in the complex plane.
△ Less
Submitted 7 October, 2014; v1 submitted 3 April, 2012;
originally announced April 2012.
-
A Two-Dimensional Signal Space for Intensity-Modulated Channels
Authors:
Johnny Karout,
Gerhard Kramer,
Frank R. Kschischang,
Erik Agrell
Abstract:
A two-dimensional signal space for intensity- modulated channels is presented. Modulation formats using this signal space are designed to maximize the minimum distance between signal points while satisfying average and peak power constraints. The uncoded, high-signal-to-noise ratio, power and spectral efficiencies are compared to those of the best known formats. The new formats are simpler than ex…
▽ More
A two-dimensional signal space for intensity- modulated channels is presented. Modulation formats using this signal space are designed to maximize the minimum distance between signal points while satisfying average and peak power constraints. The uncoded, high-signal-to-noise ratio, power and spectral efficiencies are compared to those of the best known formats. The new formats are simpler than existing subcarrier formats, and are superior if the bandwidth is measured as 90% in-band power. Existing subcarrier formats are better if the bandwidth is measured as 99% in-band power.
△ Less
Submitted 7 March, 2012;
originally announced March 2012.
-
Information Transmission using the Nonlinear Fourier Transform, Part I: Mathematical Tools
Authors:
Mansoor I. Yousefi,
Frank R. Kschischang
Abstract:
The nonlinear Fourier transform (NFT), a powerful tool in soliton theory and exactly solvable models, is a method for solving integrable partial differential equations governing wave propagation in certain nonlinear media. The NFT decorrelates signal degrees-of-freedom in such models, in much the same way that the Fourier transform does for linear systems. In this three-part series of papers, this…
▽ More
The nonlinear Fourier transform (NFT), a powerful tool in soliton theory and exactly solvable models, is a method for solving integrable partial differential equations governing wave propagation in certain nonlinear media. The NFT decorrelates signal degrees-of-freedom in such models, in much the same way that the Fourier transform does for linear systems. In this three-part series of papers, this observation is exploited for data transmission over integrable channels such as optical fibers, where pulse propagation is governed by the nonlinear Schrödinger equation. In this transmission scheme, which can be viewed as a nonlinear analogue of orthogonal frequency-division multiplexing commonly used in linear channels, information is encoded in the nonlinear frequencies and their spectral amplitudes. Unlike most other fiber-optic transmission schemes, this technique deals with both dispersion and nonlinearity directly and unconditionally without the need for dispersion or nonlinearity compensation methods. This first paper explains the mathematical tools that underlie the method.
△ Less
Submitted 7 October, 2014; v1 submitted 16 February, 2012;
originally announced February 2012.
-
A Pragmatic Coded Modulation Scheme for High-Spectral-Efficiency Fiber-Optic Communications
Authors:
Benjamin P. Smith,
Frank R. Kschischang
Abstract:
A pragmatic coded modulation system is presented that incorporates signal sha** and exploits the excellent performance and efficient high-speed decoding architecture of staircase codes. Reliable communication within 0.62 bits/s/Hz of the estimated capacity (per polarization) of a system with L=2000 km is provided by the proposed system, with an error floor below 1E-20. Also, it is shown that dig…
▽ More
A pragmatic coded modulation system is presented that incorporates signal sha** and exploits the excellent performance and efficient high-speed decoding architecture of staircase codes. Reliable communication within 0.62 bits/s/Hz of the estimated capacity (per polarization) of a system with L=2000 km is provided by the proposed system, with an error floor below 1E-20. Also, it is shown that digital backpropagation increases the achievable spectral efficiencies---relative to linear equalization---by 0.55 to 0.75 bits/s/Hz per polarization.
△ Less
Submitted 19 January, 2012;
originally announced January 2012.
-
Staircase Codes: FEC for 100 Gb/s OTN
Authors:
Benjamin P. Smith,
Arash Farhood,
Andrew Hunt,
Frank R. Kschischang,
John Lodge
Abstract:
Staircase codes, a new class of forward-error-correction (FEC) codes suitable for high-speed optical communications, are introduced. An ITU-T G.709-compatible staircase code with rate R=239/255 is proposed, and FPGA-based simulation results are presented, exhibiting a net coding gain (NCG) of 9.41 dB at an output error rate of 1E-15, an improvement of 0.42 dB relative to the best code from the ITU…
▽ More
Staircase codes, a new class of forward-error-correction (FEC) codes suitable for high-speed optical communications, are introduced. An ITU-T G.709-compatible staircase code with rate R=239/255 is proposed, and FPGA-based simulation results are presented, exhibiting a net coding gain (NCG) of 9.41 dB at an output error rate of 1E-15, an improvement of 0.42 dB relative to the best code from the ITU-T G.975.1 recommendation. An error floor analysis technique is presented, and the proposed code is shown to have an error floor at 4.0E-21.
△ Less
Submitted 19 January, 2012;
originally announced January 2012.
-
A Constrained Coding Approach to Error-Free Half-Duplex Relay Networks
Authors:
Frank R. Kschischang,
Tobias Lutz
Abstract:
We show that the broadcast capacity of an infinite-depth tree-structured network of error-free half-duplex-constrained relays can be achieved using constrained coding at the source and symbol forwarding at the relays.
We show that the broadcast capacity of an infinite-depth tree-structured network of error-free half-duplex-constrained relays can be achieved using constrained coding at the source and symbol forwarding at the relays.
△ Less
Submitted 14 June, 2013; v1 submitted 13 December, 2011;
originally announced December 2011.
-
Algebraic Approach to Physical-Layer Network Coding
Authors:
Chen Feng,
Danilo Silva,
Frank R. Kschischang
Abstract:
The problem of designing physical-layer network coding (PNC) schemes via nested lattices is considered. Building on the compute-and-forward (C&F) relaying strategy of Nazer and Gastpar, who demonstrated its asymptotic gain using information-theoretic tools, an algebraic approach is taken to show its potential in practical, non-asymptotic, settings. A general framework is developed for studying nes…
▽ More
The problem of designing physical-layer network coding (PNC) schemes via nested lattices is considered. Building on the compute-and-forward (C&F) relaying strategy of Nazer and Gastpar, who demonstrated its asymptotic gain using information-theoretic tools, an algebraic approach is taken to show its potential in practical, non-asymptotic, settings. A general framework is developed for studying nested-lattice-based PNC schemes---called lattice network coding (LNC) schemes for short---by making a direct connection between C&F and module theory. In particular, a generic LNC scheme is presented that makes no assumptions on the underlying nested lattice code. C&F is re-interpreted in this framework, and several generalized constructions of LNC schemes are given. The generic LNC scheme naturally leads to a linear network coding channel over modules, based on which non-coherent network coding can be achieved. Next, performance/complexity tradeoffs of LNC schemes are studied, with a particular focus on hypercube-shaped LNC schemes. The error probability of this class of LNC schemes is largely determined by the minimum inter-coset distances of the underlying nested lattice code. Several illustrative hypercube-shaped LNC schemes are designed based on Construction A and D, showing that nominal coding gains of 3 to 7.5 dB can be obtained with reasonable decoding complexity. Finally, the possibility of decoding multiple linear combinations is considered and related to the shortest independent vectors problem. A notion of dominant solutions is developed together with a suitable lattice-reduction-based algorithm.
△ Less
Submitted 3 July, 2013; v1 submitted 8 August, 2011;
originally announced August 2011.
-
An Algebraic Approach to Physical-Layer Network Coding
Authors:
Chen Feng,
Danilo Silva,
Frank R. Kschischang
Abstract:
The problem of designing new physical-layer network coding (PNC) schemes via lattice partitions is considered. Building on a recent work by Nazer and Gastpar, who demonstrated its asymptotic gain using information-theoretic tools, we take an algebraic approach to show its potential in non-asymptotic settings. We first relate Nazer-Gastpar's approach to the fundamental theorem of finitely generated…
▽ More
The problem of designing new physical-layer network coding (PNC) schemes via lattice partitions is considered. Building on a recent work by Nazer and Gastpar, who demonstrated its asymptotic gain using information-theoretic tools, we take an algebraic approach to show its potential in non-asymptotic settings. We first relate Nazer-Gastpar's approach to the fundamental theorem of finitely generated modules over a principle ideal domain. Based on this connection, we generalize their code construction and simplify their encoding and decoding methods. This not only provides a transparent understanding of their approach, but more importantly, it opens up the opportunity to design efficient and practical PNC schemes. Finally, we apply our framework for PNC to a Gaussian relay network and demonstrate its advantage over conventional PNC schemes.
△ Less
Submitted 14 May, 2010;
originally announced May 2010.
-
Universal Secure Error-Correcting Schemes for Network Coding
Authors:
Danilo Silva,
Frank R. Kschischang
Abstract:
This paper considers the problem of securing a linear network coding system against an adversary that is both an eavesdropper and a jammer. The network is assumed to transport n packets from source to each receiver, and the adversary is allowed to eavesdrop on μarbitrarily chosen links and also to inject up to t erroneous packets into the network. The goal of the system is to achieve zero-error…
▽ More
This paper considers the problem of securing a linear network coding system against an adversary that is both an eavesdropper and a jammer. The network is assumed to transport n packets from source to each receiver, and the adversary is allowed to eavesdrop on μarbitrarily chosen links and also to inject up to t erroneous packets into the network. The goal of the system is to achieve zero-error communication that is information-theoretically secure from the adversary. Moreover, this goal must be attained in a universal fashion, i.e., regardless of the network topology or the underlying network code. An upper bound on the achievable rate under these requirements is shown to be n-μ-2t packets per transmission. A scheme is proposed that can achieve this maximum rate, for any n and any field size q, provided the packet length m is at least n symbols. The scheme is based on rank-metric codes and admits low-complexity encoding and decoding. In addition, the scheme is shown to be optimal in the sense that the required packet length is the smallest possible among all universal schemes that achieve the maximum rate.
△ Less
Submitted 19 January, 2010;
originally announced January 2010.
-
Sparse Network Coding with Overlap** Classes
Authors:
Danilo Silva,
Weifei Zeng,
Frank R. Kschischang
Abstract:
This paper presents a novel approach to network coding for distribution of large files. Instead of the usual approach of splitting packets into disjoint classes (also known as generations) we propose the use of overlap** classes. The overlap** allows the decoder to alternate between Gaussian elimination and back substitution, simultaneously boosting the performance and reducing the decoding…
▽ More
This paper presents a novel approach to network coding for distribution of large files. Instead of the usual approach of splitting packets into disjoint classes (also known as generations) we propose the use of overlap** classes. The overlap** allows the decoder to alternate between Gaussian elimination and back substitution, simultaneously boosting the performance and reducing the decoding complexity. Our approach can be seen as a combination of fountain coding and network coding. Simulation results are presented that demonstrate the promise of our approach.
△ Less
Submitted 17 May, 2009;
originally announced May 2009.
-
Projective Space Codes for the Injection Metric
Authors:
Azadeh Khaleghi,
Frank R. Kschischang
Abstract:
In the context of error control in random linear network coding, it is useful to construct codes that comprise well-separated collections of subspaces of a vector space over a finite field. In this paper, the metric used is the so-called "injection distance", introduced by Silva and Kschischang. A Gilbert-Varshamov bound for such codes is derived. Using the code-construction framework of Etzion…
▽ More
In the context of error control in random linear network coding, it is useful to construct codes that comprise well-separated collections of subspaces of a vector space over a finite field. In this paper, the metric used is the so-called "injection distance", introduced by Silva and Kschischang. A Gilbert-Varshamov bound for such codes is derived. Using the code-construction framework of Etzion and Silberstein, new non-constant-dimension codes are constructed; these codes contain more codewords than comparable codes designed for the subspace metric.
△ Less
Submitted 8 April, 2009; v1 submitted 5 April, 2009;
originally announced April 2009.
-
Fast Encoding and Decoding of Gabidulin Codes
Authors:
Danilo Silva,
Frank R. Kschischang
Abstract:
Gabidulin codes are the rank-metric analogs of Reed-Solomon codes and have a major role in practical error control for network coding. This paper presents new encoding and decoding algorithms for Gabidulin codes based on low-complexity normal bases. In addition, a new decoding algorithm is proposed based on a transform-domain approach. Together, these represent the fastest known algorithms for e…
▽ More
Gabidulin codes are the rank-metric analogs of Reed-Solomon codes and have a major role in practical error control for network coding. This paper presents new encoding and decoding algorithms for Gabidulin codes based on low-complexity normal bases. In addition, a new decoding algorithm is proposed based on a transform-domain approach. Together, these represent the fastest known algorithms for encoding and decoding Gabidulin codes.
△ Less
Submitted 5 April, 2009; v1 submitted 16 January, 2009;
originally announced January 2009.
-
Robust Network Coding in the Presence of Untrusted Nodes
Authors:
Da Wang,
Danilo Silva,
Frank R. Kschischang
Abstract:
While network coding can be an efficient means of information dissemination in networks, it is highly susceptible to "pollution attacks," as the injection of even a single erroneous packet has the potential to corrupt each and every packet received by a given destination. Even when suitable error-control coding is applied, an adversary can, in many interesting practical situations, overwhelm the e…
▽ More
While network coding can be an efficient means of information dissemination in networks, it is highly susceptible to "pollution attacks," as the injection of even a single erroneous packet has the potential to corrupt each and every packet received by a given destination. Even when suitable error-control coding is applied, an adversary can, in many interesting practical situations, overwhelm the error-correcting capability of the code. To limit the power of potential adversaries, a broadcast transformation is introduced, in which nodes are limited to just a single (broadcast) transmission per generation. Under this broadcast transformation, the multicast capacity of a network is changed (in general reduced) from the number of edge-disjoint paths between source and sink to the number of internally-disjoint paths. Exploiting this fact, we propose a family of networks whose capacity is largely unaffected by a broadcast transformation. This results in a significant achievable transmission rate for such networks, even in the presence of adversaries.
△ Less
Submitted 26 April, 2010; v1 submitted 21 November, 2008;
originally announced November 2008.
-
Universal Secure Network Coding via Rank-Metric Codes
Authors:
Danilo Silva,
Frank R. Kschischang
Abstract:
The problem of securing a network coding communication system against an eavesdropper adversary is considered. The network implements linear network coding to deliver n packets from source to each receiver, and the adversary can eavesdrop on μarbitrarily chosen links. The objective is to provide reliable communication to all receivers, while guaranteeing that the source information remains informa…
▽ More
The problem of securing a network coding communication system against an eavesdropper adversary is considered. The network implements linear network coding to deliver n packets from source to each receiver, and the adversary can eavesdrop on μarbitrarily chosen links. The objective is to provide reliable communication to all receivers, while guaranteeing that the source information remains information-theoretically secure from the adversary. A coding scheme is proposed that can achieve the maximum possible rate of n-μpackets. The scheme, which is based on rank-metric codes, has the distinctive property of being universal: it can be applied on top of any communication network without requiring knowledge of or any modifications on the underlying network code. The only requirement of the scheme is that the packet length be at least n, which is shown to be strictly necessary for universal communication at the maximum rate. A further scenario is considered where the adversary is allowed not only to eavesdrop but also to inject up to t erroneous packets into the network, and the network may suffer from a rank deficiency of at most ρ. In this case, the proposed scheme can be extended to achieve the rate of n-ρ-2t-μpackets. This rate is shown to be optimal under the assumption of zero-error communication.
△ Less
Submitted 27 April, 2010; v1 submitted 20 September, 2008;
originally announced September 2008.