Error Correction Code (1)

Slides:



Advertisements
Similar presentations
1 A triple erasure Reed-Solomon code, and fast rebuilding Mark Manasse, Chandu Thekkath Microsoft Research - Silicon Valley Alice Silverberg Ohio State.
Advertisements

BCH Codes Hsin-Lung Wu NTPU.
Cyclic Code.
Error Control Code.
296.3Page :Algorithms in the Real World Error Correcting Codes II – Cyclic Codes – Reed-Solomon Codes.
L. J. Wang 1 Introduction to Reed-Solomon Coding ( Part I )
Efficient Soft-Decision Decoding of Reed- Solomon Codes Clemson University Center for Wireless Communications SURE 2006 Presented By: Sierra Williams Claflin.
15-853:Algorithms in the Real World
Information and Coding Theory
2015/4/28System Arch 2008 (Fire Tom Wada) 1 Error Correction Code (1) Fire Tom Wada Professor, Information Engineering, Univ. of the Ryukyus.
CHANNEL CODING REED SOLOMON CODES.
DIGITAL COMMUNICATION Coding
Forward Error Correction Steven Marx CSC45712/04/2001.
Chapter 2 : Direct Link Networks (Continued). So far... Modulation and Encoding Link layer protocols Error Detection -- Parity Check.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PART III: DATA LINK LAYER ERROR DETECTION AND CORRECTION 7.1 Chapter 10.
Data link layer: services
M. Khalily Dermany Islamic Azad University.  finite number of element  important in number theory, algebraic geometry, Galois theory, cryptography,
1 S Advanced Digital Communication (4 cr) Cyclic Codes.
Channel Coding Part 1: Block Coding
Part.7.1 Copyright 2007 Koren & Krishna, Morgan-Kaufman FAULT TOLERANT SYSTEMS Part 7 - Coding.
1 Channel Coding (II) Cyclic Codes and Convolutional Codes.
1 SNS COLLEGE OF ENGINEERING Department of Electronics and Communication Engineering Subject: Digital communication Sem: V Cyclic Codes.
Data Security and Encryption (CSE348) 1. Lecture # 12 2.
COEN 180 Erasure Correcting, Error Detecting, and Error Correcting Codes.
MIMO continued and Error Correction Code. 2 by 2 MIMO Now consider we have two transmitting antennas and two receiving antennas. A simple scheme called.
Linear Feedback Shift Register. 2 Linear Feedback Shift Registers (LFSRs) These are n-bit counters exhibiting pseudo-random behavior. Built from simple.
Computer Communication & Networks Lecture 9 Datalink Layer: Error Detection Waleed Ejaz
CSCI 465 D ata Communications and Networks Lecture 9 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Error Correction Code (2)
Error Detection and Correction
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PART III: DATA LINK LAYER ERROR DETECTION AND CORRECTION 7.1 Chapter 10.
2016/2/14 1 Error Correction Code (1) Fire Tom Wada Professor, Information Engineering, Univ. of the Ryukyus.
Hamming Distance & Hamming Code
Error Control Coding. Purpose To detect and correct error(s) that is introduced during transmission of digital signal.
Part III: Data Link Layer Error Detection and Correction
CHAPTER 8 CHANNEL CODING: PART 3 Sajina Pradhan
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Error Correction/Detection.
Classical Coding for Forward Error Correction Prof JA Ritcey Univ of Washington.
Class Report 林格名 : Reed Solomon Encoder. Reed-Solomom Error Correction When a codeword is decoded, there are three possible outcomes –If 2s + r < 2t (s.
Channel Coding and Error Control 1. Outline Introduction Linear Block Codes Cyclic Codes Cyclic Redundancy Check (CRC) Convolutional Codes Turbo Codes.
V. Non-Binary Codes: Introduction to Reed Solomon Codes
Dr. Clincy Professor of CS
Modulo-2 Digital coding uses modulo-2 arithmetic where addition becomes the following operations: 0+0= =0 0+1= =1 It performs the.
Error Detection & Correction
Computer Architecture and Assembly Language
Error Detection and Correction
Subject Name: COMPUTER NETWORKS-1
15-853:Algorithms in the Real World
FIRST REVIEW.
Communication Networks: Technology & Protocols
DATA COMMUNICATION AND NETWORKINGS
Dr. Clincy Professor of CS
Advanced Computer Networks
Error control coding for wireless communication technologies
ECE 4450:427/527 - Computer Networks Spring 2017
EEC4113 Data Communication & Multimedia System Chapter 5: Error Control by Muhazam Mustapha, August 2010.
Error Correction Code (2)
Error Correction Code (2)
DIGITAL COMMUNICATION Coding
Cyclic Code.
Coding and Error Control
I. Finite Field Algebra.
Erasure Correcting Codes for Highly Available Storage
Computer Architecture and Assembly Language
Error Correction Code (1)
Error Correction Code (2)
Types of Errors Data transmission suffers unpredictable changes because of interference The interference can change the shape of the signal Single-bit.
عنوان درس نام استاد
296.3:Algorithms in the Real World
Chapter 10 Error Detection and Correction
Presentation transcript:

Error Correction Code (1) Fire Tom Wada Professor, Information Engineering, Univ. of the Ryukyus 2019/2/24 System Arch 2007 (Fire Tom Wada)

System Arch 2007 (Fire Tom Wada) Introduction Digital data storage Digital data transmission Data might change by some Noise, Fading, etc. Such data change have to be corrected! Forward-Error-Correction (FEC) is need. Digital Video (DVD), Compact Disc (CD) Digital communication Digital Phone Wireless LAN Digital Broadcasting 2019/2/24 System Arch 2007 (Fire Tom Wada)

Two major FEC technologies Reed Solomon code Convolution code Serially concatenated code Interleaving Reed Solomon Code Convolution Code ConcatenatedCoded Source Information Concatenated Goes to Storage, Transmission 2019/2/24 System Arch 2007 (Fire Tom Wada)

System Arch 2007 (Fire Tom Wada) Reed Solomon Code Can correct Burst Error. Famous application is Compact Disc. Code theory based on Galois Field For 8 bit = Byte information Galois Field of 28 is used We will start from Galois Field in following slide. 2019/2/24 System Arch 2007 (Fire Tom Wada)

System Arch 2007 (Fire Tom Wada) Galois Field “Field” is the set in which +, -, x, / operations are possible. e.g. Real numbers is Field. -2.1, 0, 3, 4.5, 6, 3/2, …. Number of Element is infinite (∞). Instead, 8 bit digital signal can represents 28=256 elements only. Galois Field is Number of element is finite. e.g. 28=256. +, -, x, / operations are possible. GF(q) means q elements Galois Fields. q must be a prime number (p) or pn . 2019/2/24 System Arch 2007 (Fire Tom Wada)

System Arch 2007 (Fire Tom Wada) Example 1. GF(q=2) GF(2) Only two elements {0,1} Add and Multiply : do operation and mod 2 Subtract : for all a = {0,1}, -a exists. Division : for all a excluding {0}, a-1 exists. + 1 a -a 1 X 1 a a-1 - 1 Same as XOR operation - operation is same as + Same as AND operation 2019/2/24 System Arch 2007 (Fire Tom Wada)

System Arch 2007 (Fire Tom Wada) Example 2. GF(5) Elements = {0,1,2,3,4} Use mod 5 operation + 1 2 3 4 a -a 1 4 2 3 X 1 2 3 4 a a-1 - 1 2 3 4 So far q=2, 5 are prime numbers. 2019/2/24 System Arch 2007 (Fire Tom Wada)

System Arch 2007 (Fire Tom Wada) Example 3. GF(4) Here 4 is NOT a prime number. Use mod 4 2-1 does NOT exists. X 1 2 3 a a-1 - 1 2 3 GF(4) with integer elements does NOT exists! The elements can be polynomial. 2019/2/24 System Arch 2007 (Fire Tom Wada)

GF with polynomial elements Polynomial such as aX2+bX1+c Those coefficient a, b, c =GF(2)={0,1} Can be added Can be subtracted Can be multiplied Can be divided And Can be modulo by other polynomial GF with polynomial elements is possible GF(4)={0X+0, 0X+1, X+0, X+1} Use mod(X2+X+1) 2019/2/24 System Arch 2007 (Fire Tom Wada)

Example 4. GF(22) with polynomial (1) Elements={0,1, x, x+1} Use Modulo(x2+x+1) Each coefficient is GF(2) + 1 x x+1 2=0 x+2=x 2x=0 2x+1=1 2x+2=0 a -a - 1 x x+1 2019/2/24 System Arch 2007 (Fire Tom Wada)

Example 4. GF(22) with polynomial (2) Use Modulo(x2+x+1) mod(x2+x+1) is equivalent to use x2=x+1 assignment X 1 x x+1 x2=x+1 x2+x= 2x+1=1 x2+2x+1= x2+1= x+2=x a a-1 1 x x+1 2019/2/24 System Arch 2007 (Fire Tom Wada)

Let’s calculate (x2+x)mod(x2+x+1) 2019/2/24 System Arch 2007 (Fire Tom Wada)

System Arch 2007 (Fire Tom Wada) (x2+x+1)mod(x2+x+1)=0 Then x2+x+1=0 Now consider the root of x2+x+1=0 is α Then α 2+ α +1=0 α 2=α +1 2019/2/24 System Arch 2007 (Fire Tom Wada)

Example 5. GF(22) with polynomial α is the root of x2+x+1=0 1 α α2 a -a 1 α α2 X 1 α α2 a a-1 - 1 α α2 2019/2/24 System Arch 2007 (Fire Tom Wada)

System Arch 2007 (Fire Tom Wada) Previous page’s GF is made by polynomial x2+x+1=0 This polynomial is generation polynomial for GF. Bit representation Polynomial representation Root index 00 α-∞ 01 1 α0=1 10 α α1 11 α+1 α2 α3= α2Xα=(α+1) α= α2 + α=1 2019/2/24 System Arch 2007 (Fire Tom Wada)

Example 6. GF(23) with polynomial α is the root of x3+x+1=0 Bit representation Polynomial representation Root index 000 α-∞ 001 1 α0=1 010 α α1 100 α2 011 α+1 α3 110 α2 + α α4 111 α2 + α+1 α5 101 α2 +1 α6 α7= α3Xα3Xα=(α+1) (α+1) α= α3 + α=1 2019/2/24 System Arch 2007 (Fire Tom Wada)

System Arch 2007 (Fire Tom Wada) + 1 α α2 1+α α2 + α α2 + α+1 α2 +1 α+1 α2+1 2019/2/24 System Arch 2007 (Fire Tom Wada)

Example 7. Simple Block Code 4bit information : 1011 (also shown as x3+x+1) Make a simple block code as follows Shift 2 bit left 101100 (x5+x3+x2) Calculate modulo by primitive polynomial x2+x+1 Ans=1 Add the modulo to 1. 101101 (x5+x3+x2+1) Now this code modulo(x2+x+1)=0 Send the 3. instead of 4bit information If received code’s modulo(x2+x+1) is 0, It is thought that No ERROR HAPPENED! In this example, the coefficient of the polynomial is 0 or 1, But, Reed Solomon code can handle more bits! 2019/2/24 System Arch 2007 (Fire Tom Wada)

Example 7. Simple Block Code Information primitive polynomial 1011 101101 Code Information parity Transmission If the received code can be divided by G(x), It is thought that No Error Happed. 2019/2/24 System Arch 2007 (Fire Tom Wada)

Example 8. RS(5,3) code with GF(23) Remember GF(23) has 8 elements in Example 6. One element can handle 3bits. Reed Solomon (5,3) code has 3 information symbol + 2 parity symbol. 3x3= 9bit information + 2x3=6bit parity Assume Information = (1, α、α2)=(001 010 100) I(x)=x2+αx+α2 G(x)=x2+α3x+α -> x2=α3x+α R(x)=(x2I(x))moduloG(x)=(x4+αx3+α2x2) moduloG(x) =α4x+1 W(x)=x2I(x)+R(x)= x4+αx3+α2x2 +α4x+1 RS(5,3) code = (1, α, α2 , α4 , 1)=(001 010 100 110 001) 2019/2/24 System Arch 2007 (Fire Tom Wada)

System Arch 2007 (Fire Tom Wada) Calculation of R(x) 2019/2/24 System Arch 2007 (Fire Tom Wada)

System Arch 2007 (Fire Tom Wada) RS code parameters Code length n ; n≦q-1, q=number of elements Information symbol length k : k≦n-2t Parity symbol length c≦q-1-n+2t Correctable symbol length = t Then, q=23 =8 Max n=7, when t=3, k=1, c=6 R(5,3) case n=5, q=8, k=3, Then max t = 1 only one symbol error correctable. 2019/2/24 System Arch 2007 (Fire Tom Wada)

RS code error correction Error correction Decoding is more tough! Decoding is not covered in this lecture. 2019/2/24 System Arch 2007 (Fire Tom Wada)

System Arch 2007 (Fire Tom Wada) HW-4 According to the example 8, What is the RS(5,3) code for information= (α,α2 ,1 ) 2019/2/24 System Arch 2007 (Fire Tom Wada)