Figure 4 - uploaded by Jarek Duda
Content may be subject to copyright.
Example of encoding process for 5 bit state and 5 packets, N = 2 size bit blocks, m = 3 received packets and f [00] = 01100 , f [01] = 10010 , f [10] = 01010 , f [11] = 10110 transition function, chosen in a pseudorandom way. ⊕ denotes XOR, ” >> ” denotes cyclic shift right by 1 position of the 5 bit state. 

Example of encoding process for 5 bit state and 5 packets, N = 2 size bit blocks, m = 3 received packets and f [00] = 01100 , f [01] = 10010 , f [10] = 01010 , f [11] = 10110 transition function, chosen in a pseudorandom way. ⊕ denotes XOR, ” >> ” denotes cyclic shift right by 1 position of the 5 bit state. 

Source publication
Article
Full-text available
Fountain Codes like LT or Raptor codes, also known as rateless erasure codes, allow to encode a message as some number of packets, such that any large enough subset of these packets is sufficient to fully reconstruct the message. Beside the packet loss scenario, the transmitted packets are usually damaged. Hence, an additional error correction sche...

Contexts in source publication

Context 1
... accordingly to the currently encoded N bit block x. There is used a pseudorandomly chosen transition function f : {0, . . . , 2 N − 1} → {0, . . . , 2 64 − 1} for this purpose. The state transition is a cyclic shift of (state XOR f [x]). The encoding procedure is schematically presented as Method 1, example of its application is presented in Fig. 4. Observe that using a pseudorandom number generator (PRNG) initialized with a cryptographic key to choose the f function, we could include encryption in such ...
Context 2
... us start with the Fountain Code (FC) situation. Assume the size of the message is N l and we are receiving m packets of l bits. So among a larger set of packets, we need at least some m ≥ N (undamaged) packets to reconstruct the message. We will now allow the messages to be damaged, as depicted in Fig. 3. For simplicity there will be assumed binary symmetric channel(BSC): packet i ∈ [1 , m ] has i probability of its bits being flipped. Applying forward error correction correspondingly to each channel, the minimal requirement for reconstruction is i (1 − h ( i )) ≥ N . We will get the same bound for JRC. Let us divide the message into length N bit blocks, each block corresponds to a single bit in every packets (vertical lines in Fig. 3). Specifically, the encoding procedure has l steps. In k -th encoding step ( k ∈ { 0 , . . . , l − 1 } ) there are used { N k, ..., N ( k +1) − 1 } bits of the message (bit block x ), to produce k -th bit of every packets. There is required an internal state of encoder to connect redundancy of succeeding blocks. The current implementation uses 64 bit state for this purpose, producing k -th bit of i -th packet as i -th bit of the state . The number of produced packets is limited to 64 this way, the actually received packets correspond to some subset of these 64 bits. The internal state needs to be modified accordingly to currently encoded N bit block x . There is used a pseudorandomly chosen transition function f : { 0 , . . . , 2 N − 1 } → { 0 , . . . , 2 64 − 1 } for this purpose. The state transition is cyclic shift of ( state XOR f [ x ]). The encoding procedure is schematically presented as Algorithm 1, example of its application is presented in Fig. 4. Observe that using a Pseudorandom Number Generator initialized with a cryptographic key to choose the f function, we could include encryption in such encoding. Finally encoding procedure is: set state as some arbitrary initial state (known to receiver), then perform encoding step for blocks 0 to l − 1. The final state: f inal state would be beneficial for decoder for final verification of unidirectional decoding, or is necessary for bidirectional decoding. It can be included in the header of packet. However, unidirectional correction can be performed without it, at cost of probable damage of some last bits of the ...

Similar publications

Article
Full-text available
The design and characterization of a slow-wave series push-pull traveling wave silicon photonic modulator is presented. At 2 V and 4 V reverse bias, the measured −3 dB electro-optic bandwidth of the modulator with an active length of 4 mm are 38 GHz and 41 GHz, respectively. Open eye diagrams are observed up to bitrates of 60 Gbps without any form...
Article
Full-text available
We present an experimental study and analysis of a travelling wave series push-pull silicon photonic multi-electrode Mach-Zehnder modulator (ME-MZM) and compare its performance with a single-electrode travelling wave Mach-Zehnder modulator (TWMZM). Utilizing the functionality of the ME-MZM structure plus digital-signal-processing, we report: 1) the...
Article
Full-text available
Spatial domain of light beam is an important degree of freedom to be extensively explored. As a set of spatial domains, twisted lights have some natural properties such as orthogonality and security, providing great potentials in optical communications especially for data encoding/decoding. However, the speed of traditional spatial light modulators...
Preprint
Full-text available
In this work, a novel infinity 3D printing technique is explored to fabricate continuous multi-meter-long low-loss near-zero dispersion suspended-core polypropylene fibers for application in terahertz (THz) communications. Particular attention is paid to process parameter optimization for 3D printing with low-loss polypropylene plastic. Three micro...
Article
Full-text available
We experimentally demonstrate a high-speed air-water optical wireless communication system with both downlink and uplink transmission employing 32-quadrature amplitude modulation (QAM) orthogonal frequency division multiplexing (OFDM) and a single-mode pigtailed green-light laser diode (LD). This work is an important step towards the future study o...