-
Peak Age of Information under Tandem of Queues
Authors:
Ashirwad Sinha,
Shubhransh Singhvi,
Praful D. Mankar,
Harpreet S. Dhillon
Abstract:
This paper considers a communication system where a source sends time-sensitive information to its destination via queues in tandem. We assume that the arrival process as well as the service process (of each server) are memoryless, and each of the servers has no buffer. For this setup, we develop a recursive framework to characterize the mean peak age of information (PAoI) under preemptive and non…
▽ More
This paper considers a communication system where a source sends time-sensitive information to its destination via queues in tandem. We assume that the arrival process as well as the service process (of each server) are memoryless, and each of the servers has no buffer. For this setup, we develop a recursive framework to characterize the mean peak age of information (PAoI) under preemptive and non-preemptive policies with $N$ servers having different service rates. For the preemptive case, the proposed framework also allows to obtain mean age of information (AoI).
△ Less
Submitted 4 May, 2024;
originally announced May 2024.
-
Permutation Recovery Problem against Deletion Errors for DNA Data Storage
Authors:
Shubhransh Singhvi,
Charchit Gupta,
Avital Boruchovsky,
Yuval Goldberg,
Han Mao Kiah,
Eitan Yaakobi
Abstract:
Owing to its immense storage density and durability, DNA has emerged as a promising storage medium. However, due to technological constraints, data can only be written onto many short DNA molecules called data blocks that are stored in an unordered way. To handle the unordered nature of DNA data storage systems, a unique address is typically prepended to each data block to form a DNA strand. Howev…
▽ More
Owing to its immense storage density and durability, DNA has emerged as a promising storage medium. However, due to technological constraints, data can only be written onto many short DNA molecules called data blocks that are stored in an unordered way. To handle the unordered nature of DNA data storage systems, a unique address is typically prepended to each data block to form a DNA strand. However, DNA storage systems are prone to errors and generate multiple noisy copies of each strand called DNA reads. Thus, we study the permutation recovery problem against deletions errors for DNA data storage.
The permutation recovery problem for DNA data storage requires one to reconstruct the addresses or in other words to uniquely identify the noisy reads. By successfully reconstructing the addresses, one can essentially determine the correct order of the data blocks, effectively solving the clustering problem.
We first show that we can almost surely identify all the noisy reads under certain mild assumptions. We then propose a permutation recovery procedure and analyze its complexity.
△ Less
Submitted 23 March, 2024;
originally announced March 2024.
-
An Optimal Sequence Reconstruction Algorithm for Reed-Solomon Codes
Authors:
Shubhransh Singhvi,
Roni Con,
Han Mao Kiah,
Eitan Yaakobi
Abstract:
The sequence reconstruction problem, introduced by Levenshtein in 2001, considers a scenario where the sender transmits a codeword from some codebook, and the receiver obtains $N$ noisy outputs of the codeword. We study the problem of efficient reconstruction using $N$ outputs that are each corrupted by at most $t$ substitutions. Specifically, for the ubiquitous Reed-Solomon codes, we adapt the Ko…
▽ More
The sequence reconstruction problem, introduced by Levenshtein in 2001, considers a scenario where the sender transmits a codeword from some codebook, and the receiver obtains $N$ noisy outputs of the codeword. We study the problem of efficient reconstruction using $N$ outputs that are each corrupted by at most $t$ substitutions. Specifically, for the ubiquitous Reed-Solomon codes, we adapt the Koetter-Vardy soft-decoding algorithm, presenting a reconstruction algorithm capable of correcting beyond Johnson radius. Furthermore, the algorithm uses $\mathcal{O}(nN)$ field operations, where $n$ is the codeword length.
△ Less
Submitted 12 March, 2024;
originally announced March 2024.
-
Data-Driven Bee Identification for DNA Strands
Authors:
Shubhransh Singhvi,
Avital Boruchovsky,
Han Mao Kiah,
Eitan Yaakobi
Abstract:
We study a data-driven approach to the bee identification problem for DNA strands. The bee-identification problem, introduced by Tandon et al. (2019), requires one to identify $M$ bees, each tagged by a unique barcode, via a set of $M$ noisy measurements. Later, Chrisnata et al. (2022) extended the model to case where one observes $N$ noisy measurements of each bee, and applied the model to addres…
▽ More
We study a data-driven approach to the bee identification problem for DNA strands. The bee-identification problem, introduced by Tandon et al. (2019), requires one to identify $M$ bees, each tagged by a unique barcode, via a set of $M$ noisy measurements. Later, Chrisnata et al. (2022) extended the model to case where one observes $N$ noisy measurements of each bee, and applied the model to address the unordered nature of DNA storage systems. In such systems, a unique address is typically prepended to each DNA data block to form a DNA strand, but the address may possibly be corrupted. While clustering is usually used to identify the address of a DNA strand, this requires $\mathcal{M}^2$ data comparisons (when $\mathcal{M}$ is the number of reads). In contrast, the approach of Chrisnata et al. (2022) avoids data comparisons completely. In this work, we study an intermediate, data-driven approach to this identification task. For the binary erasure channel, we first show that we can almost surely correctly identify all DNA strands under certain mild assumptions. Then we propose a data-driven pruning procedure and demonstrate that on average the procedure uses only a fraction of $\mathcal{M}^2$ data comparisons. Specifically, for $\mathcal{M}= 2^n$ and erasure probability $p$, the expected number of data comparisons performed by the procedure is $κ\mathcal{M}^2$, where $\left(\frac{1+2p-p^2}{2}\right)^n \leq κ\leq \left(\frac{1+p}{2}\right)^n $.
△ Less
Submitted 8 May, 2023;
originally announced May 2023.
-
Repair of Reed-Solomon Codes in the Presence of Erroneous Nodes
Authors:
Stanislav Kruglik,
Gaojun Luo,
Wilton Kim,
Shubhransh Singhvi,
Han Mao Kiah,
San Ling,
Huaxiong Wang
Abstract:
We consider the repair scheme of Guruswami-Wootters for the Reed-Solomon code and ask: can we correctly repair a failed node in the presence of erroneous nodes? Equivalently, we consider the collection of downloaded traces as a code and investigate its code-distance properties. We propose three lower bounds on its minimum distance and study methods to efficiently correct errors close to these boun…
▽ More
We consider the repair scheme of Guruswami-Wootters for the Reed-Solomon code and ask: can we correctly repair a failed node in the presence of erroneous nodes? Equivalently, we consider the collection of downloaded traces as a code and investigate its code-distance properties. We propose three lower bounds on its minimum distance and study methods to efficiently correct errors close to these bounds.
△ Less
Submitted 5 May, 2023;
originally announced May 2023.
-
Coding Gain for Age of Information in a Multi-source System with Erasure Channel
Authors:
Shubhransh Singhvi,
Praful D. Mankar
Abstract:
In our work, we study the age of information ($\AoI$) in a multi-source system where $K$ sources transmit updates of their time-varying processes via a common-aggregator node to a destination node through a channel with packet delivery errors. We analyze $\AoI$ for an $(α, β, ε_0, ε_1)$-Gilbert-Elliot ($\GE$) packet erasure channel with a round-robin scheduling policy. We employ maximum distance s…
▽ More
In our work, we study the age of information ($\AoI$) in a multi-source system where $K$ sources transmit updates of their time-varying processes via a common-aggregator node to a destination node through a channel with packet delivery errors. We analyze $\AoI$ for an $(α, β, ε_0, ε_1)$-Gilbert-Elliot ($\GE$) packet erasure channel with a round-robin scheduling policy. We employ maximum distance separable ($\MDS$) scheme at aggregator for encoding the multi-source updates. We characterize the mean $\AoI$ for the $\MDS$ coded system for the case of large blocklengths. We further show that the \emph{optimal coding rate} that achieves maximum \emph{coding gain} over the uncoded system is $n(1-\pers)-\smallO(n)$, where $\pers \triangleq \fracβ{α+β}ε_0 + \fracα{α+β}ε_1$, and this maximum coding gain is $(1+\pers)/(1+\smallO(1))$.
△ Less
Submitted 22 April, 2023; v1 submitted 22 December, 2022;
originally announced December 2022.
-
Rate-Optimal Streaming Codes Over the Three-Node Decode-And-Forward Relay Network
Authors:
Shubhransh Singhvi,
Gayathri R.,
P. Vijay Kumar
Abstract:
In this paper, we study the three-node Decode-and-Forward (D&F) relay network subject to random and burst packet erasures. The source wishes to transmit an infinite stream of packets to the destination via the relay. The three-node D&F relay network is constrained by a decoding delay of T packets, i.e., the packet transmitted by the source at time i must be decoded by the destination by time i+T.…
▽ More
In this paper, we study the three-node Decode-and-Forward (D&F) relay network subject to random and burst packet erasures. The source wishes to transmit an infinite stream of packets to the destination via the relay. The three-node D&F relay network is constrained by a decoding delay of T packets, i.e., the packet transmitted by the source at time i must be decoded by the destination by time i+T. For the individual channels from source to relay and relay to destination, we assume a delay-constrained sliding-window (DCSW) based packet-erasure model that can be viewed as a tractable approximation to the commonly-accepted Gilbert-Elliot channel model. Under the model, any time-window of width w contains either up to a random erasure or else erasure burst of length at most b (>= a). Thus the source-relay and relay-destination channels are modeled as (a_1, b_1, w_1, T_1) and (a_2, b_2, w_2, T_2) DCSW channels. We first derive an upper bound on the capacity of the three-node D&F relay network. We then show that the upper bound is tight for the parameter regime: max{b_1, b_2}|(T-b_1-b_2-max{a_1, a_2}+1), a1=a2 OR b1=b2 by constructing streaming codes achieving the bound. The code construction requires field size linear in T, and has decoding complexity equivalent to that of decoding an MDS code.
△ Less
Submitted 29 November, 2022; v1 submitted 8 July, 2022;
originally announced July 2022.
-
The Input and Output Entropies of the $k$-Deletion/Insertion Channel
Authors:
Shubhransh Singhvi,
Omer Sabary,
Daniella Bar-Lev,
Eitan Yaakobi
Abstract:
The channel output entropy of a transmitted word is the entropy of the possible channel outputs and similarly, the input entropy of a received word is the entropy of all possible transmitted words. The goal of this work is to study these entropy values for the k-deletion, k-insertion channel, where exactly k symbols are deleted, and inserted in the transmitted word, respectively. If all possible w…
▽ More
The channel output entropy of a transmitted word is the entropy of the possible channel outputs and similarly, the input entropy of a received word is the entropy of all possible transmitted words. The goal of this work is to study these entropy values for the k-deletion, k-insertion channel, where exactly k symbols are deleted, and inserted in the transmitted word, respectively. If all possible words are transmitted with the same probability then studying the input and output entropies is equivalent. For both the 1-insertion and 1-deletion channels, it is proved that among all words with a fixed number of runs, the input entropy is minimized for words with a skewed distribution of their run lengths and it is maximized for words with a balanced distribution of their run lengths. Among our results, we establish a conjecture by Atashpendar et al. which claims that for the binary 1-deletion, the input entropy is maximized for the alternating words. This conjecture is also verified for the 2-deletion channel, where it is proved that constant words with a single run minimize the input entropy.
△ Less
Submitted 15 June, 2022; v1 submitted 7 February, 2022;
originally announced February 2022.