Institute for Experimental Mathematics Ellernstrasse 29 45326 Essen - Germany On STORAGE Systems A.J. Han Vinck January 2011.

Slides:



Advertisements
Similar presentations
Mahdi Barhoush Mohammad Hanaysheh
Advertisements

Noise, Information Theory, and Entropy (cont.) CS414 – Spring 2007 By Karrie Karahalios, Roger Cheng, Brian Bailey.
Information theory Multi-user information theory A.J. Han Vinck Essen, 2004.
Cyclic Code.
Error Control Code.
Information and Coding Theory
2015/6/15VLC 2006 PART 1 Introduction on Video Coding StandardsVLC 2006 PART 1 Variable Length Coding  Information entropy  Huffman code vs. arithmetic.
1 Eitan Yaakobi, Laura Grupp Steven Swanson, Paul H. Siegel, and Jack K. Wolf Flash Memory Summit, August 2010 University of California San Diego Efficient.
Error detection/correction FOUR WEEK PROJECT 1 ITEMS TO BE DISCUSSED 1.0 OVERVIEW OF CODING STRENGTH (3MINS) Weight/distance of binary vectors Error detection.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany packet transmission A.J. Han Vinck January 19, 2010.
Coding for Flash Memories
Chapter 1 Data Storage. 2 Chapter 1: Data Storage 1.1 Bits and Their Storage 1.2 Main Memory 1.3 Mass Storage 1.4 Representing Information as Bit Patterns.
7/2/2015Errors1 Transmission errors are a way of life. In the digital world an error means that a bit value is flipped. An error can be isolated to a single.
2015/7/12VLC 2008 PART 1 Introduction on Video Coding StandardsVLC 2008 PART 1 Variable Length Coding  Information entropy  Huffman code vs. arithmetic.
15-853Page :Algorithms in the Real World Error Correcting Codes I – Overview – Hamming Codes – Linear Codes.
Ger man Aerospace Center Gothenburg, April, 2007 Coding Schemes for Crisscross Error Patterns Simon Plass, Gerd Richter, and A.J. Han Vinck.
exercise in the previous class (1)
Hamming Codes 11/17/04. History In the late 1940’s Richard Hamming recognized that the further evolution of computers required greater reliability, in.
MAT 1000 Mathematics in Today's World Winter 2015.
Syndrome Decoding of Linear Block Code
Linear Codes.
DIGITAL COMMUNICATION Error - Correction A.J. Han Vinck.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany DATA COMMUNICATION 2-dimensional transmission A.J. Han Vinck May 1, 2003.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany Data communication line codes and constrained sequences A.J. Han Vinck Revised.
Information and Coding Theory Linear Block Codes. Basic definitions and some examples. Juris Viksna, 2015.
Application of Finite Geometry LDPC code on the Internet Data Transport Wu Yuchun Oct 2006 Huawei Hisi Company Ltd.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany On STORAGE Systems A.J. Han Vinck June 2004.
CODING/DECODING CONCEPTS AND BLOCK CODING. ERROR DETECTION CORRECTION Increase signal power Decrease signal power Reduce Diversity Retransmission Forward.
Error Control Code. Widely used in many areas, like communications, DVD, data storage… In communications, because of noise, you can never be sure that.
Codes Codes are used for the following purposes: - to detect errors - to correct errors after detection Error Control Coding © Erhan A. Ince Types: -Linear.
COEN 180 Erasure Correcting, Error Detecting, and Error Correcting Codes.
ERROR CONTROL CODING Basic concepts Classes of codes: Block Codes
MIMO continued and Error Correction Code. 2 by 2 MIMO Now consider we have two transmitting antennas and two receiving antennas. A simple scheme called.
Chapter 1 Data Storage © 2007 Pearson Addison-Wesley. All rights reserved.
Introduction to Coding Theory. p2. Outline [1] Introduction [2] Basic assumptions [3] Correcting and detecting error patterns [4] Information rate [5]
Coding and Algorithms for Memories Lecture 5 1.
Error Control Code. Widely used in many areas, like communications, DVD, data storage… In communications, because of noise, you can never be sure that.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany Data communication signatures A.J. Han Vinck July 29, 2004.
Information theory Multi-user information theory Part 7: A special matrix application A.J. Han Vinck Essen, 2002.
Coding and Algorithms for Memories Lecture 4 1.
§6 Linear Codes § 6.1 Classification of error control system § 6.2 Channel coding conception § 6.3 The generator and parity-check matrices § 6.5 Hamming.
DIGITAL COMMUNICATIONS Linear Block Codes
ADVANTAGE of GENERATOR MATRIX:
Chapter 31 INTRODUCTION TO ALGEBRAIC CODING THEORY.
Information Theory Linear Block Codes Jalal Al Roumy.
Computer Science Division
The parity bits of linear block codes are linear combination of the message. Therefore, we can represent the encoder by a linear system described by matrices.
Perfect and Related Codes
Error Detection and Correction – Hamming Code
Some Computation Problems in Coding Theory
Error Detection and Correction
INFORMATION THEORY Pui-chor Wong.
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
Error Control Coding. Purpose To detect and correct error(s) that is introduced during transmission of digital signal.
Exercise in the previous class (1) Define (one of) (15, 11) Hamming code: construct a parity check matrix, and determine the corresponding generator matrix.
II. Linear Block Codes. © Tallal Elshabrawy 2 Digital Communication Systems Source of Information User of Information Source Encoder Channel Encoder Modulator.
Channel Coding: Part I Presentation II Irvanda Kurniadi V. ( ) Digital Communication 1.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany DATA COMMUNICATION introduction A.J. Han Vinck May 10, 2003.
Hamming Code In 1950s: invented by Richard Hamming
Coding and Algorithms for Memories Lecture 5
Introduction to Information theory
Coding and Algorithms for Memories Lecture 4
Coding and Algorithms for Memories Lecture 5
Chapter 1 Data Storage.
Block codes. encodes each message individually into a codeword n is fixed, Input/out belong to alphabet Q of cardinality q. The set of Q-ary n-tuples.
Information Redundancy Fault Tolerant Computing
Cyclic Code.
Erasure Correcting Codes for Highly Available Storage
CS 325: CS Hardware and Software Organization and Architecture
Presentation transcript:

Institute for Experimental Mathematics Ellernstrasse Essen - Germany On STORAGE Systems A.J. Han Vinck January 2011

A.J. Han Vinck, 2011 content We consider coding aspects of Write Once Memory Memory with defects Magneto-Optical memory Lesson: CODING IS MORE THAN ERROR- CORRECTION !

A.J. Han Vinck, 2011 WRITE ONCE MEMORY Example: IBM punchcardpunching a hole is destructive Obvious method: Use card only once Efficiency: 1 bit/cell hole or not More complicated method: Use card T times Efficiency:  log 2 (T+1) bits per cell WHY ?

A.J. Han Vinck, 2011 EXAMPLE: Card with 3 positions FIRST TRANSMISSION PUNCH 1 hole  log 2 3 bits SECOND TRANSMISSION PUNCH 2 bits TOGETHER: (log 2 3+2)/3 = 1.2 bits per position > 1!!

A.J. Han Vinck, 2011 Memories with known defects (ROM-type ) Problem: output fixed and cell is useless! correct stuck-at 0 stuck-at 1 Assumptions: Cell stuck-at with probability p

A.J. Han Vinck, 2011 Memories with known defects (ROM-type) WRITER knows? Yes Yes 1-p READER knows? Storage Capacity per cell WHY? Yes No 1-p defect cells are not used Additive Coding invented by: Kuznetsov/Tsybakov 4 situations No Yes 1-pdefect found as erasure probability(e) = p No No 1-h(p/2) defect is random error; probability(error) = p/2 the result is a BSC

A.J. Han Vinck, 2011 No-No and No-Yes No-No p/2 p/2 Defect agrees with prob. 1/2 No-Yes correct: no defect 0 known as 0 defect 1 Known as 1 defect 1 correct: no defect p/2 1-p p/2

A.J. Han Vinck, 2011 EXAMPLE: maximum of 1 defect in a word of length 3 STORE: for defect defect 1 defect 0 00 YES-NO

A.J. Han Vinck, 2011 STORE: In general: N-1 bits in N positions  Efficiency = 1 - defect N YES-NO

A.J. Han Vinck, 2011 General strategy for one defect Given the defect value: store word X or complement X‘ of X -X‘ or X can be stored error free In general: N-1 bits in N positions  Efficiency = N OPTIMAL!

A.J. Han Vinck, 2011 General strategy for N-1 defects Given N-1 defects in word of length N 1 position left to determine the parity of a word transmit 1:= odd parity 0:= even parity OPTIMAL! Efficiency = 1/N = 1 – (N-1)/N OPTIMAL!

A.J. Han Vinck, 2011 Complex cell with IN-OUT short caused by excessive Metal2 defect

A.J. Han Vinck, 2011 How to solve t defects in N positions the Yes-No situation

A.J. Han Vinck, 2011 SOLUTION:Construct matrix C PROPERTIES: Any t pattern is present in some row of C Rows uniquely represented by n-k first digits … n -kk CODE C

A.J. Han Vinck, 2011 RESULT: for t  n-k defects; k n n -kk X R = = 1- = 1- n-k n t n encoding Defects: d Add codeword C such that C  X agrees with d at defect position ??1?0 0????000?????? information C Any t pattern is present in some row of C: thus this is possible

A.J. Han Vinck, 2011 RESULT: for t  n-k defects; k n n -kk R = = 1- = 1- n-k n t n decoding C  XC  XPrefix deterimines C C  X  C=X information Problem left: construction of matrix C Optimal!

A.J. Han Vinck, 2011 We store 3 bits of information in 6 locations info X written as X’ (C 1,C 2,C 3,C 4,C 5,C 6 ) (0,0, 0,X 1,X 2,X 3 ) (C 1,C 2,C 3,S 4,S 5,S 6 ) add modulo-2 the code vector C(d) = STORE X’ C(d) = R(d,X) =  Example: 2 defects in 6 positions

A.J. Han Vinck, 2011 PROPERTY: The components of R(d,X) are equal to the 2 given defects at the defect location for any defect pair (condition 1 on code C, covering) DECODING: Calculate C(d) R(d,X) = C(d) C(d) X’  we obtain X (condition 2 on code, uniqueness!)

A.J. Han Vinck, C = Efficiency 1/2 < 1 - 2/6 X’ = R(d,X) = (1 1 0, 1 0 1) or ? d = 1 _ _ _ 0 _ we decide to add row 3 In GENERAL CODES CAN BE CONSTRUCTED with EFFICIENCY  1-2/n example

A.J. Han Vinck, 2011 Construction for t = 2 C consists of 1. All binary (2a-1) tuples of weight a as columns 2. Additional all-zero row Properties: 1. Any two defects present in some row 2. Every row can be specified by  log2a  bits Proof left to the reader

A.J. Han Vinck, 2011 Proof Part 1 Two columns must have the pair (1,1) –there must be overlap since a > (2a-1)/2 Columns are different: hence the combinations (0,1) and (1,0) must be present. The all zero row takes care of the combination (0,0)

A.J. Han Vinck, 2011 Proof part 2 Take the matrix of 2 log2a rows and log 2 (2a) columns Taken out any two non-zero complementary rows until 2a rows are left. The remaining columns have weight a, and each row is unique, and thus can be used as identification for a specific row of the code

A.J. Han Vinck, 2011 Bound on rate or efficiency

A.J. Han Vinck, 2011 Construction t = 2, a = 2 Code: => row index

A.J. Han Vinck, 2011 Example a = 3 2a-1 = 5  10 columns All zero row added Specifies each row uniquely Efficiency: 7/10 < 1-2/10 = 8/10

A.J. Han Vinck, 2011 THE GENERAL SOLUTION PROPERTIES: Any t pattern is present in some row of C Rows uniquely represented by n-k first digits … n -kk CODE C

A.J. Han Vinck, 2011 Bound on performance We calculate the fraction of matrices than are not good for the masking of t defects If this fraction is less than 1, there exist matrices that are masking t defects We use the general Kutznetsov method … n -kk CODE C

A.J. Han Vinck, 2011 Proof of bound … n -kk CODE 2 n-k rows u defects v = t-u defects 2 n-k-u rows can match the defect A F = # of incorrect matrices /total # of possible choises = # of wrong choises for A x # of remaining free choises / total #

A.J. Han Vinck, 2011 Proof of bound (2)

A.J. Han Vinck, 2011 Choose a random matrix Calculate the probability that there is a defect that cannot be matched Choose the bits in the matrix with probability ½ Add the systematic part

A.J. Han Vinck, 2011 Using the dual of linear block encoder G HTHT I n-k Property: For the matrix H T any d min - 1 rows are linarly independent Thus, H can be used as a code generator for the defect matching Since any pattern of t = d min - 1 defects can be generated by H

A.J. Han Vinck, 2011 Combining defects and random errors Ranndom errors can be included. We give some examples defects1 defect and 1 error2 defects and 1 error R = 3/7R = 3/7R = 1/7

A.J. Han Vinck, 2011 Principle of magneto-optical disk Magnetic material Electro magnet Magnetic spot Heated and re- magnetized +-+- High power laser beam

A.J. Han Vinck, 2011 Read and erase cycle Low power laser beam Polarization of reflected beam depends on direction of magnetization -+-+ High power laser beam readingerase

A.J. Han Vinck, 2011 MAGNETO-OPTICAL MEMORY APPLICATION: MINI DISK WRITING PROCESS: first ERASE then WRITE erase write erase write   EFFICIENCY:.5 bit per cycle/cell QUESTIONS:Can we do better? How? How much? IMPROVEMENT: CHANGE WRITING STRATEGY:

A.J. Han Vinck, 2011 Problem: change in magnetic field direction slow Simple solution with efficiency = 1/2 Start: t 0 t odd t even t odd | | | | write clean clean write Can we do better than ½ ?

A.J. Han Vinck, 2011 ONE APPROACH: S LOOK at PRESENT WORD or STATE S CHOOSEWRITE or ERASE Example: words of length N = 4, # of messages M = 7 a = b = or 0 c = or 0 d = or 0 e = or 0 f = 0 0 or 0 0 g = S S SUPPOSE S = 0 0 Check that we can write the strings STORAGE CAPACITY = bits/cell log For n  C = 0.69 bits/cell/cycle < 1 !

A.J. Han Vinck, 2011 Example:6 messages, word length N = 5 Messages present at ERASE WRITE EXAMPLE: write erase PROPERTY: From ANY word(message) at erase we may write ANY messsage(word) and vice versa Efficiency is log 2 6/5 =.517 bits/cell! (n = 11 gives.53 b/c and M=58) ANOTHER APPROACH (a challenge!)

A.J. Han Vinck, 2011 Phase Change model CD-Rewritable CD has crystalline compound spot heated up to T1  spot crystalline (cool slow) spot heated up to T2>> T1  spot amorphous (cool fast) - amorphous area reflects less than crystalline area:  0 or 1 - back to crystalline by heating up to TE: T1 < TE << T2

A.J. Han Vinck, 2011 Principle of CD-RW Phase-change technology R ecording C Erase- 200 C (for a sufficient time back to the crystalline state) [Ag-Sb-In-Te]

A.J. Han Vinck, 2011 Phase Change RecordingIn a rewritable DVD, different intensities of the laser change the bits in the phase change recording layer from a crystalline state to an amorphous state and vice versa.

A.J. Han Vinck, 2011 WOM write once memory (Rivest, 1983) WUM write unidirectional (Willems Vinck, 1986) WIM write inhibited memory (Cohen, 1998) WEM write efficient memory (Ahlswede, 1990) WAM write address fault memory (Fuja, 1995) Overview of research done