CN105356968B - The method and system of network code based on cyclic permutation matrices - Google Patents

The method and system of network code based on cyclic permutation matrices Download PDF

Info

Publication number
CN105356968B
CN105356968B CN201510354829.6A CN201510354829A CN105356968B CN 105356968 B CN105356968 B CN 105356968B CN 201510354829 A CN201510354829 A CN 201510354829A CN 105356968 B CN105356968 B CN 105356968B
Authority
CN
China
Prior art keywords
coding
matrix
cyclic permutation
permutation matrices
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510354829.6A
Other languages
Chinese (zh)
Other versions
CN105356968A (en
Inventor
代明军
卢泽鑫
沈丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN HOUSLEY TECHNOLOGY Co.,Ltd.
Original Assignee
Shenzhen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen University filed Critical Shenzhen University
Priority to CN201510354829.6A priority Critical patent/CN105356968B/en
Publication of CN105356968A publication Critical patent/CN105356968A/en
Application granted granted Critical
Publication of CN105356968B publication Critical patent/CN105356968B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0076Distributed coding, e.g. network coding, involving channel coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0023Systems modifying transmission characteristics according to link quality, e.g. power backoff characterised by the signalling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/18Automatic repetition systems, e.g. Van Duuren systems
    • H04L1/1812Hybrid protocols; Hybrid automatic repeat request [HARQ]
    • H04L1/1816Hybrid protocols; Hybrid automatic repeat request [HARQ] with retransmission of the same, encoded, message

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides a kind of method and system of network code based on cyclic permutation matrices, design ZD-MDS (n, the k) code in binary field, that is, have MDS property and decoded using zigzag(ZD)Technology.Cataloged procedure includes:Original message is divided into k isometric data packets by the first step;Second step takes systematic code frame ..., is k original non-coding packets, contains all origination messages.The beneficial effects of the invention are as follows:By cyclic permutation matrices T, message element is encoded in binary field, it is made to meet MDS(n,k)Property;Make zigzag by XOR operation after ingenious displacement(Zigzag)Decoding, reduces decoding complex degree;In addition, in an encoding process, the additional redundancy expense of check code packet is all bit, memory space is not only saved, but also the overhead of each memory node is made to keep symmetrical.

Description

The method and system of network code based on cyclic permutation matrices
Technical field
The present invention relates to field of computer technology, more particularly to the network code based on cyclic permutation matrices method and be System.
Background technique
With the rapid development of cloud computing, application of the network code in distributed memory system causes extensive pass Note.Network code can save memory space, reduce the network congestion of data reparation.In recent years, MDS property widely adopt by network code With and reliable and stable data storage and confrontation hard disk corruptions can be provided.
In order to which maximum capacity tolerates failure memory node quantity, the code with MDS property is widely used.Maximum distance can divide (MDS) property is that the former data that k is grouped are mapped to n (n >=k) packet data, and wherein any k is a in this n data all may be used To rebuild former n packet data completely.I.e. original information stream is split into k isometric data packets and is encoded into n data It wraps, any k in this n data packet can restore raw information.The meaning between the lines, as long as remaining intact node number is many It can restore original in k
Suo Luomen (RS) code is a kind of code with MDS property, is widely used in the distributed storage system of network code In system.The defect of RS code is that its coding-decoding operation applies the coding and decoding technology that complexity is needed in high system finite field, Need decoding time long, energy consumption is high.The decoding complex degree in high system domain is high, therefore existing extensive work all concentrates on binary network Coding and sawtooth (zigzag) decoding.
Zigzag decoding:Zigzag decodes in binary field, and the cube operation in decoding is become linear operation, Reduce computational complexity.Zigzag decode (ZD) code is decoded using the zigzag in binary field, but according to theirs Decoding method haves the defects that as follows:(1) more memory spaces are needed, data are longer, the memory space that encoding block needs More, the additional storage space needed if it is (n, k) code is (n-k) (k-1), if storing data is enough big, needs to consume Additional storage space is big;(2) for different memory nodes, memory space is asymmetrical, so that the designer of cloud storage is very Hardly possible distributes memory space to store customer data.
Summary of the invention
In order to solve the problems in the prior art, the present invention provides a kind of network codes based on cyclic permutation matrices Method.
A method of the network code based on cyclic permutation matrices, cataloged procedure include the following steps:
Original message is divided into k isometric data packets, uses C respectively by the first step1, C2..., CkIt indicates, each data packet Length is L, wherein CiIn data element Si,j∈ { 0,1 } indicates CiIn jth position, i ∈ { 1,2,3 ..., k }, j ∈ 0,1, 2,...,L-1};
Second step takes systematic code frame C1,C2..., CkFor k original non-coding packets, all original disappear is contained Breath, it is the basis of rear n-k check code packet;
Third step, coding checkout code block, rear n-k are known as check code packet, use Ck+1,Ck+2,...,CnIt indicates, by preceding k The code word that exclusive or generates by turn after a non-coding packet displacement is constituted.
As a further improvement of the present invention, in order to guarantee zigzag decoding and MDS property, using cyclic permutation matrices T, Each of non-coding packet element is all moved to right into specific bit by matrix row vector, it is then that the element after moving to right is different by turn by arranging Or.
As a further improvement of the present invention, the specific bit such as cyclic permutation that each non-coding element is moved to right by row vector Matrix T indicates that (i, j) a element representation wraps C to coding in matrixi+kIn jth row element move to right specific bit, pass through this advise Then complete to Ci+kCoding, i ∈ { 1,2,3 ..., n-k }, j ∈ { 1,2,3 ..., k }.
As a further improvement of the present invention, in cyclic permutation matrices T, any row or column is all without identical number Word;In cyclic permutation matrices T, the element that the difference of any two column is included is different from.
As a further improvement of the present invention, cyclic permutation matrices T following k*k matrix when n is maximum value 2k;When n is small When 2k, the n-k row in k row is arbitrarily taken, composition matrix is (n-k) * k matrix.K*k matrix T is:
The present invention also provides a kind of systems of network code based on cyclic permutation matrices, including:
Divide module, original message is divided into k isometric data packets, uses C respectively1, C2..., CkIt indicates, each data Packet length is L, wherein CiIn data element Si,j∈ { 0,1 } indicates CiIn jth position, i ∈ { 1,2,3 ..., k }, j ∈ 0, 1,2,...,L-1};
Processing module takes systematic code frame, C for taking systematic code frame1,C2..., CkFor k original non-codings Packet, contains all origination messages, it is the basis of rear n-k check code packet;
Generation module is used for coding checkout code block, and rear n-k are known as check code packet, uses Ck+1,Ck+2,...,CnIt indicates, By the code word that exclusive or generates by turn after the displacement of preceding k non-coding packet.
As a further improvement of the present invention, in order to guarantee zigzag decoding and MDS property, using cyclic permutation matrices T, Each of non-coding packet element is all moved to right into specific bit by matrix row vector, it is then that the element after moving to right is different by turn by arranging Or.
As a further improvement of the present invention, the specific bit such as cyclic permutation that each non-coding element is moved to right by row vector Matrix T indicates that (i, j) a element representation wraps C to coding in matrixi+kIn jth row element move to right specific bit, pass through this advise Then complete to Ci+kCoding, i ∈ { 1,2,3 ..., n-k }, j ∈ { 1,2,3 ..., k }.
As a further improvement of the present invention, in cyclic permutation matrices T, any row or column is all without identical number Word;In cyclic permutation matrices T, the element that the difference of any two column is included is different from.
As a further improvement of the present invention, cyclic permutation matrices T following k*k matrix when n is maximum value 2k;When n is small When 2k, the n-k row in k row is arbitrarily taken, composition matrix is (n-k) * k matrix.K*k matrix T is:
The beneficial effects of the invention are as follows:In the present invention, by cyclic permutation matrices T, to message element in binary field Element is encoded, it is made to meet MDS (n, k) property;By XOR operation after ingenious displacement make can zigzag decoding, reduce Decoding complex degree;In addition, in an encoding process, the additional redundancy expense of check code packet is allBit is both saved and is deposited Space is stored up, and the overhead of each memory node is made to keep symmetrical.
Detailed description of the invention
Fig. 1 is ZD-MDS of the invention (10,5) code code pattern.
Fig. 2 is ZD- of the invention (10,5) code coding/decoding method figure.
Fig. 3 is zigzag decoding principle schematic diagram.
Specific embodiment
The invention discloses a kind of method and system of network code based on cyclic permutation matrices, in the method, if Count ZD-MDS (n, k) (k>4, k≤n≤2k) code, cataloged procedure includes the following steps:
Original message is divided into k isometric data packets, uses C respectively by the first step1, C2..., CkIt indicates, each data packet Length is L, wherein CiIn data element Si,j∈ { 0,1 } indicates CiIn jth position, i ∈ { 1,2,3 ..., k }, j ∈ 0,1, 2,...,L-1};
Second step takes systematic code frame C1,C2..., CkFor k original non-coding packets, all original disappear is contained Breath, it is the basis of rear n-k check code packet;
Third step, coding checkout code block, rear n-k are known as check code packet, use Ck+1,Ck+2,...,CnIt indicates, by preceding k The code word that exclusive or generates by turn after a non-coding packet displacement is constituted.
Detailed code construction:
This part, will be described in detail ZD-MDS (n, k) (k>4, k≤n≤2k) code code construction, be discussed in detail how Use C1, C2..., CkThis k non-coding packet constitutes Ck+1,Ck+2,...,CnThe detailed process of this n-k check code packet.
In order to guarantee zigzag decoding and MDS property, using cyclic permutation matrices T, by each of non-coding packet member Element all moves to right specific bit by matrix row vector, then by the element after moving to right by column exclusive or by turn.
Each non-coding element is indicated by the specific bit such as cyclic permutation matrices T that row vector moves to right, in matrix (i, j) A element representation wraps C to codingi+kIn jth row element move to right specific bit, by this rule complete to Ci+kCoding, i ∈ 1, 2,3 ..., n-k }, j ∈ { 1,2,3 ..., k }.
T in cyclic permutation matrices, the first row (0,1,3,6,10 ...,) indicate check code packet Ck+1In structure Elements C1To Ck0,1,3,6,10 is moved to right respectively ...,Position, it can be seen that the element of every a line and each column is all in accordance with this Corresponding element carries out circulation change in matrix, therefore our this matrix is referred to as cyclic permutation matrices.Coding as shown in Figure 1 The result is that n take 10, k take 5 special case, i.e. ZD-MDS (10,5) code.It is every after encoding when node stores check code packet One column store result after carrying out exclusive or by turn.
In cyclic permutation matrices, every a line is all the digit ring shift right institute by the first row other than the first row ?.
In cyclic permutation matrices, the first row is known as to the base vector of matrix T, by base vector it can be seen that the first two component It is formed by 0,1, it is big between translocation distance ratio m and the m-1 between m and m+1 component.
In cyclic permutation matrices, data packet more storage overheads additionally on the basis of former non-coding packet are verified, All k verification packet overhead digits be fixed forPosition saves one compared in zigzag decode (ZD) code Half, the expense in zigzag decode (ZD) code is (n-k) (k-1)
In cyclic permutation matrices, we obtain a vector as difference to any two column, wherein without identical element, using this Cyclic permutation matrices are encoded, and the pattern of coding is sawtooth pattern, and when decoding can be decoded using zigzag, in addition, the code has There is MDS property, is not in un-decodable situation.If two column make difference after vector element have it is identical, illustrate two column place Row relative shift of code word in coding is identical, then cannot be guaranteed sawtooth pattern in decoding, will have k node cannot decode Occur the case where prime information out
A kind of system of network code based on cyclic permutation matrices is also disclosed, including:
Divide module, for original message to be divided into k isometric data packets, uses C respectively1, C2..., CkIt indicates, it is each Data packet length is L, wherein CiIn data element Si,j∈ { 0,1 } indicates CiIn jth position, i ∈ { 1,2,3 ..., k }, j ∈ {0,1,2,...,L-1};
Processing module, for taking systematic code frame, C1,C2..., CkFor k original non-coding packets, contain all Origination message, it is the basis of rear n-k check code packet;
Generation module, coding checkout code block, rear n-k are known as check code packet, use Ck+1,Ck+2,...,CnIt indicates, by preceding The code word that exclusive or generates by turn after k non-coding packet displacement is constituted.
Within the system, in order to guarantee zigzag decoding and MDS property will be in non-coding packet using cyclic permutation matrices T Each element move to right specific bit by matrix row vector, then by the element after moving to right by column exclusive or by turn.
Within the system, each non-coding element is indicated by the specific bit such as cyclic permutation matrices T that row vector moves to right, square (i, j) a element representation wraps C to coding in battle arrayi+kIn jth row element move to right specific bit, by this rule complete to Ci+k's Coding, i ∈ { 1,2,3 ..., n-k }, j ∈ { 1,2,3 ..., k }.
Within the system, in cyclic permutation matrices T, any row or column is all without identical number;In cyclic permutation In matrix T, the element that the difference of any two column is included is different from.
Within the system, cyclic permutation matrices T following k*k matrix when n is maximum value 2k;When n is less than 2k, arbitrarily The n-k row in k row is taken, composition matrix is (n-k) * k matrix.K*k matrix T is:
In the present invention, with ZD-MDS (10,5) for example, including the following steps with cataloged procedure:
Raw information is divided into 5 isometric packets, uses C respectively by the first step1、C2、C3、C4、C5It indicates, the length of each packet For L;
Second step takes systematic code frame, C1、C2、C3、C4、C5For 5 original non-coding data packets, it is 5 after coding The basis of check code word;
5 test code packets of third step, generation use C respectively6、C7、C8、C9、C10It indicates, this 5 packets are check code Packet, by C1、C2、C3、C4、C5It is constituted for 5 non-coding packets.
In the present invention, C1、C2、C3、C4、C5Referred to as non-coding packet, C6、C7、C8、C9、C10Referred to as check code packet.
Zigzag decoding is sawtooth pattern decoding.
The zigzag decoding (ZD-MDS) with MDS property is described below:
Decoding technique in this construction code of the invention still continues to use zigzag decoding, and decoding order is all from the left side It successively decodes to the right.As soon as then this position subtracts in verification is wrapped when can decode in former data packet comes.Its Decoding process is illustrated according to (10,5) code.
MDS the and zigzag property of ZD-MDS (10,5) code:Known arbitrary 5 data packets, can recover all Data packet.Assuming that original encoding packet is C1To C5, check code packet is C6To C10.If known five data packets are:C3、C5、C6、 C7、C9, because of C3、C5It is known that so C6、C7、C9In component s3,jAnd s5,jIt deletes, it is only necessary to decode C1、C2、C4In group Code can be solved out by part.Specific coding/decoding method and sequence are according to shown in Fig. 2:
As known C6、C7、C9, binary system exclusive or between component, by 0,1 composition, S1,1For C6In first C6,1, such as Fruit C6It is known that then first can decode first come, be marked with runic 1;S2,1For C7In first, C7It is known that then S2,1 It can decode and, be marked with runic 2;Similarly decode S4,1, it is labeled as 3;S1,2With S2,1Result after exclusive or is C6,2, C6? Know, then C6,2It is known that s2,1It decodes and in order, then s1,2It can calculate, be labeled as 4 with runic.From left to right successively It can decode and if only one is unknown for exclusive or item according to the superposition exclusive or decoding of each list.Final decoding from a left side to Right sequence is according to shown in Fig. 2.
Zigzag decoding technique is described below:
As liner code, decoding process is equivalent to solution system of linear equations.It mainly include two processes:Step 1, according to first Coefficient matrix is converted into simplifying stepped matrix by equal rows operation;Step 2 retreats substitution and successively finds out according to stepped matrix Known bits position.Step 1 elapsed time is more, therefore our being encoded to of designing is steps, and without step 1, if energy Enough to decode prime information according to retrogressing substitution method, then this coding/decoding method is known as zigzag decoding (ZD).
We illustrate zigzag decoding process with example below, if Fig. 3 is the decoding process of (4,2) code.Firstly, by former The information of beginning is divided into the data packet of two a length of L, i.e. C1And C2。CiElement S in coding packeti,j∈ { 0,1 } indicates CiIn Jth position, i ∈ { 1,2 }.The two data packets contain the bit of prime information, referred to as non-coding packet.In this example, I L be assumed to be 4.C3And C4It is for calculating non-coding packet, by constituting the displacement of non-coding packet and binary addition, referred to as Coding packet.C3It is by C1And C20 is moved to right respectively, then again by column data exclusive or by turn.C4It is by non-coding packet C1And C2Respectively 0 and 1 are moved to right, then again by column data exclusive or by turn.The C of generation3And C4Data length be respectively L=4, L=5.
Assuming that we want from C3And C4Original information is decoded in coding packet, that is, decodes C1And C2It needs as shown in the figure Zigzag decoding technique.The decoded sequence of digital representation inside bracket, it is known that C4, because of C4First with other letter No add operation is ceased, so decoding S first1,1,S1,1Bracketed indications be 1;The S that will be decoded1,1It is updated to C3In One, S1,1It is known that then XOR operation can decode S2,1Therefore S2,1Labeled as 2;S1,2It can be from C4In decode come, will S1,2Labeled as 3;Then S2,2Labeled as 4;Raw information is successively recovered according to this coding/decoding method.
In the present invention, by cyclic permutation matrices T, message element is encoded in binary field, makes its satisfaction MDS (n, k) property;By XOR operation after ingenious displacement make can zigzag decoding, reduce decoding complex degree;In addition, In cataloged procedure, the additional redundancy expense of check code packet is allBit not only saves memory space, but also makes each deposit The overhead for storing up node keeps symmetrical.
The above content is a further detailed description of the present invention in conjunction with specific preferred embodiments, and it cannot be said that Specific implementation of the invention is only limited to these instructions.For those of ordinary skill in the art to which the present invention belongs, exist Under the premise of not departing from present inventive concept, a number of simple deductions or replacements can also be made, all shall be regarded as belonging to of the invention Protection scope.

Claims (4)

1. a kind of method of the network code based on cyclic permutation matrices, which is characterized in that cataloged procedure includes the following steps:
Original message is divided into k isometric data packets, uses C respectively by the first step1, C2..., CkIt indicates, each data packet length For L, wherein CiIn data element Si,j∈ { 0,1 } indicates CiIn jth position, i ∈ { 1,2,3 ..., k }, j ∈ 0,1, 2,...,L-1};
Second step takes systematic code frame C1,C2..., CkFor k original non-coding packets, all origination messages are contained, it It is the basis of rear n-k check code packet;
Third step, coding checkout code block, rear n-k are known as check code packet, use Ck+1,Ck+2,...,CnIt indicates, by preceding k non-volumes The code word that exclusive or generates by turn after code packet displacement is constituted;
In order to guarantee zigzag decoding and MDS property, using cyclic permutation matrices T, all by each of non-coding packet element Specific bit is moved to right by matrix row vector, then by the element after moving to right by column exclusive or by turn;
The specific bit such as cyclic permutation matrices T that each non-coding element is moved to right by row vector indicates, (i, j) a member in matrix Element indicates to wrap C to codingi+kIn jth row element dextroposition digit, by this rule complete to Ci+kCoding, i ∈ 1,2, 3 ..., n-k }, j ∈ { 1,2,3 ..., k };
In cyclic permutation matrices T, any row or column is all without identical number;In cyclic permutation matrices T, any two column The difference element that is included be different from.
2. the method according to claim 1, wherein cyclic permutation matrices T following k*k when n is maximum value 2k Matrix;When n is less than 2k, it can also verify and wrap according to this matrix coder, arbitrarily take the n-k row in k row, composition matrix is (n- K) * k matrix, k*k matrix T are:
3. a kind of system of the network code based on cyclic permutation matrices, which is characterized in that including:
Divide module, for original message to be divided into k isometric data packets, uses C respectively1, C2..., CkIt indicates, each data Packet length is L, wherein CiIn data element Si,j∈ { 0,1 } indicates CiIn jth position, i ∈ { 1,2,3 ..., k }, j ∈ 0, 1,2,...,L-1};
Processing module, for taking systematic code frame, C1,C2..., CkFor k original non-coding packets, contain all original Message, it is the basis of rear n-k check code packet;
Generation module, coding checkout code block, rear n-k are known as check code packet, use Ck+1,Ck+2,...,CnIt indicates, it is non-by preceding k The code word that exclusive or generates by turn after coding packet displacement is constituted;
In order to guarantee zigzag decoding and MDS property, using cyclic permutation matrices T, all by each of non-coding packet element Specific bit is moved to right by matrix row vector, then by the element after moving to right by column exclusive or by turn;
The specific bit such as cyclic permutation matrices T that each non-coding element is moved to right by row vector indicates, (i, j) a member in matrix Element indicates to wrap C to codingi+kIn jth row element dextroposition digit, by this rule complete to Ci+kCoding, i ∈ 1,2, 3 ..., n-k }, j ∈ { 1,2,3 ..., k };
In cyclic permutation matrices T, any row or column is all without identical number;In cyclic permutation matrices T, any two column The element that difference is included is different from.
4. system according to claim 3, it is characterised in that:Cyclic permutation matrices T following k*k when n is maximum value 2k Matrix;When n is less than 2k, the n-k row in k row is arbitrarily taken, composition matrix is (n-k) * k matrix, and k*k matrix T is:
CN201510354829.6A 2015-06-24 2015-06-24 The method and system of network code based on cyclic permutation matrices Active CN105356968B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510354829.6A CN105356968B (en) 2015-06-24 2015-06-24 The method and system of network code based on cyclic permutation matrices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510354829.6A CN105356968B (en) 2015-06-24 2015-06-24 The method and system of network code based on cyclic permutation matrices

Publications (2)

Publication Number Publication Date
CN105356968A CN105356968A (en) 2016-02-24
CN105356968B true CN105356968B (en) 2018-11-16

Family

ID=55332856

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510354829.6A Active CN105356968B (en) 2015-06-24 2015-06-24 The method and system of network code based on cyclic permutation matrices

Country Status (1)

Country Link
CN (1) CN105356968B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105703782B (en) * 2016-03-11 2019-08-06 深圳大学 A kind of network coding method and system based on incremental shift matrix
CN105871508B (en) * 2016-03-25 2020-01-07 深圳大学 Network coding and decoding method and system
CN106877976B (en) * 2016-12-30 2020-04-10 深圳大学 High system throughput design method for sawtooth decoding in distributed multiple access network
CN108712230A (en) * 2018-04-08 2018-10-26 罗建平 Fault data restorative procedure
CN109525368B (en) * 2018-11-26 2021-12-10 广东中兴新支点技术有限公司 Hybrid transmission method based on linear network coding, electronic device and storage medium
CN113114276B (en) * 2021-04-22 2022-08-05 深圳大学 Network coding and decoding method and device based on cyclic shift and related components
CN115549848A (en) * 2021-06-29 2022-12-30 华为技术有限公司 Data transmission method and communication device
CN113641531A (en) * 2021-07-27 2021-11-12 东莞理工学院 STAR code encoding method and decoding method thereof

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101340193A (en) * 2008-08-12 2009-01-07 普天信息技术研究院有限公司 Constructing method, encoder and decoder of low density check code
CN101604977A (en) * 2008-06-13 2009-12-16 联发科技股份有限公司 Utilize low-density parity check (LDPC) matrix to carry out the method and the encoder of digital data coding
CN102088294A (en) * 2010-09-29 2011-06-08 西安空间无线电技术研究所 QC-LDPC (quasi-cyclic low-density parity-check codes) coder and coding method
CN102130694A (en) * 2011-02-28 2011-07-20 浙江大学 Circuit for parallelly encoding quasi-cyclic low-density parity check code
US8225173B2 (en) * 2004-06-25 2012-07-17 Runcom Technologies Ltd Multi-rate LDPC code system and method
US8762809B1 (en) * 2005-12-05 2014-06-24 Marvell International Ltd. LDPC codes and expansion method
CN104488196A (en) * 2012-11-05 2015-04-01 三菱电机株式会社 Error-correction coding method and error-correction coding device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8225173B2 (en) * 2004-06-25 2012-07-17 Runcom Technologies Ltd Multi-rate LDPC code system and method
US8762809B1 (en) * 2005-12-05 2014-06-24 Marvell International Ltd. LDPC codes and expansion method
CN101604977A (en) * 2008-06-13 2009-12-16 联发科技股份有限公司 Utilize low-density parity check (LDPC) matrix to carry out the method and the encoder of digital data coding
CN101340193A (en) * 2008-08-12 2009-01-07 普天信息技术研究院有限公司 Constructing method, encoder and decoder of low density check code
CN102088294A (en) * 2010-09-29 2011-06-08 西安空间无线电技术研究所 QC-LDPC (quasi-cyclic low-density parity-check codes) coder and coding method
CN102130694A (en) * 2011-02-28 2011-07-20 浙江大学 Circuit for parallelly encoding quasi-cyclic low-density parity check code
CN104488196A (en) * 2012-11-05 2015-04-01 三菱电机株式会社 Error-correction coding method and error-correction coding device

Also Published As

Publication number Publication date
CN105356968A (en) 2016-02-24

Similar Documents

Publication Publication Date Title
CN105356968B (en) The method and system of network code based on cyclic permutation matrices
US10146618B2 (en) Distributed data storage with reduced storage overhead using reduced-dependency erasure codes
CN105356892B (en) The method and system of network code
CN105703782B (en) A kind of network coding method and system based on incremental shift matrix
CN105684316B (en) Polar code encoding method and device
Gad et al. Repair-optimal MDS array codes over GF (2)
Sung et al. A ZigZag-decodable code with the MDS property for distributed storage systems
WO2018072294A1 (en) Method for constructing check matrix and method for constructing horizontal array erasure code
CN108132854B (en) Erasure code decoding method capable of simultaneously recovering data elements and redundant elements
Shahabinejad et al. A class of binary locally repairable codes
CN103746774A (en) Error resilient coding method for high-efficiency data reading
Elyasi et al. Determinant codes with helper-independent repair for single and multiple failures
US20150227425A1 (en) Method for encoding, data-restructuring and repairing projective self-repairing codes
US10187084B2 (en) Method of encoding data and data storage system
WO2017041232A1 (en) Encoding and decoding framework for binary cyclic code
WO2020029418A1 (en) Method for constructing repair binary code generator matrix and repair method
CN107665152B (en) Decoding method of erasure code
CN108614749A (en) A kind of data processing method and device
CN108628697B (en) Binary-based node repairing method and system
CN109257049B (en) Construction method for repairing binary array code check matrix and repairing method
TW201029337A (en) Method for decoding LDPC code and the circuit thereof
CN108199720B (en) Node repairing method and system for reducing storage overhead and improving repairing efficiency
CN109521955B (en) Heterogeneous part repeated code construction and conversion method based on hierarchical cross design
Chen et al. A new Zigzag MDS code with optimal encoding and efficient decoding
CN109245775B (en) Decoder and method for realizing decoding

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201221

Address after: 230000 No.32 Chunjiang Road, Qingshui street, Jiujiang District, Wuhu City, Anhui Province

Patentee after: Tang Yuanzhou

Address before: 518000 No. 3688 Nanhai Road, Shenzhen, Guangdong, Nanshan District

Patentee before: SHENZHEN University

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220309

Address after: 518052 room 703, T1 office building, Qianhai Kerry business center, Qianwan 1st Road, Nanshan street, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong

Patentee after: SHENZHEN HOUSLEY TECHNOLOGY Co.,Ltd.

Address before: 230000 No.32 Chunjiang Road, Qingshui street, Jiujiang District, Wuhu City, Anhui Province

Patentee before: Tang Yuanzhou