Incremental Redundancy, Fountain Codes and Advanced Topics

نویسنده

  • Suayb S. Arslan
چکیده

The idea of writing such a technical brief goes back to our days in Quantum corporation, when we were studying efficient coding strategies for cloud storage applications. Having had a thorough review of the literature, I decided to write this document in order to establish a common base ground on which the majority of the relevant research can be analyzed and compared. As far as I am concerned, there is no unified approach that outlines and compares most of the published fountain codes in a single and self-contained framework. This attempt of mine has not only resulted in the review of theoretical fundamentals of efficient coding techniques for incremental redundancy and fountain coding, but also helpedmehave a comprehensive reference document and hopefully for many other graduate students who would like to have some background to pursue a research career regarding fountain codes and their various applications. Some background in coding, graph and probability theory is expected. Although somany different aspects and relevant research studies are deliberately left out, I still hope that this document may serve researchers’ need well. I have also included several exercises for warming the reader up for the material. There are many spots in the text that are product of my coauthors and myself, although some of which have not been published yet. Last but not least, I cannot thank enough Quantum Corporation who provided me and my colleagues “the appropriate playground" to research and leap us forward in knowledge. I cordially welcome any comments, corrections or suggestions. January 7, 2014

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Universal Decremental Redundancy Compression with Fountain Codes

A new universal noise-robust lossless compression algorithm based on a decremental redundancy approach with Fountain codes is proposed. The binary entropy code is harnessed to compress complex sources with the addition of a preprocessing system in this paper. Both the whole binary entropy range compression performance and the noise-robustness of an existing incremental redundancy Fountain code ...

متن کامل

IRWIN AND JOAN JACOBS CENTER FOR COMMUNICATION AND INFORMATION TECHNOLOGIES On-Line Fountain Codes with Low Overhead

An on-line fountain code is defined as a fountain code for which an optimal encoding strategy can be found efficiently given any instantaneous decoding state. This property is important for data distribution in practical networks. In this paper we formalize the problem of on-line fountain code construction, and propose new on-line fountain codes that outperform known ones in having factor 3-5 l...

متن کامل

Primer and Recent Developments on Fountain Codes

In this paper we survey the various erasure codes which had been proposed and patented recently, and along the survey we provide introductory tutorial on many of the essential concepts and readings in erasure and Fountain codes. Packet erasure is a fundamental characteristic inherent in data storage and data transmission system. Traditionally replication/ retransmission based techniques had bee...

متن کامل

Advanced Algorithms December 23 , 2004 Lecture 20 : LT Codes Lecturer : Amin

Random linear fountain codes were introduced in the last lecture as a sparse-graph codes for channels with erasure. It turned out that their encoding and decoding costs were quadratic and cubic in the number of packets encoded. We study Luby Transform (LT) codes in this lecture, pioneered by Michael Luby, that retains the good performance of random linear fountain code, while drastically reduci...

متن کامل

Joint error correction enhancement of the Fountain Codes concept

Fountain codes like LT or Raptor codes, also known as rateless erasure codes, allow to encode a message as some number of packets, such that any large enough subset of these packets is sufficient to fully reconstruct the message. It requires undamaged packets, while the packets which were not lost are usually damaged in real scenarios. Hence, an additional error correction layer is often requir...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1402.6016  شماره 

صفحات  -

تاریخ انتشار 2014