Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Performance Study on the Suitability of Reed Solomon Codes in Communication Systems

Author : Rabindra Nath Shaw 1

Date of Publication :25th January 2017

Abstract: This paper examines a coding which uses Reed-Solomon (RS) codes. Communication has got many applications such as telephonic conversations in which the messages are encoded into the communication channel and then decoding it at the receiver end. During the transfer of message, the data might get corrupted due to lots of disturbances in the communication channel. Reed Solomon codes are type of burst error detecting codes which has got many applications due to its burst error detection and correction nature. Reed-Solomon is designed for applications such as digital wrapper, Digital video and Digital Audio. The module will encode the incoming data blocks of 239, 8 bits at a time and output the original data set with the appended redundancy data of 16 bits. Reed Solomon codes is a member of the family of non binary Bose-Choudhuri-Hocquenqhen (BCH) codes. The fading identity of the wireless channel, errors normally take place in busty form.

Reference :

    1. D. Kythe and P. Kythe, “Reed-Solomon Codes,” in Algebraic and Stochastic Coding Theory, 2017.
    2. S. B. Wicker and V. K. Bhargava, ReedSolomon Codes and Their Applications. 2010.
    3. V. Guruswami and M. Wootters, “Repairing Reed-Solomon Codes,” IEEE Trans. Inf. Theory, 2017, doi: 10.1109/TIT.2017.2702660. 
    4. M. Dailey, “Cryptology,” in Information Security Fundamentals, Second Edition, 2013.
    5. K. V Rashmi, P. Nakkiran, J. Wang, N. B. Shah, and S. Clara, “Boosting QuasiAsynchronous I/O for Better Responsiveness in Mobile Devices,” 13th USENIX Conf. File Storage Technol. (FAST ’15), 2015.
    6. O. Khan, R. Burns, J. Plank, and W. Pierce, “Rethinking Erasure Codes for Cloud File Systems : Minimizing I / O for Recovery and Degraded Reads,” Fast, 2012.
    7. R. Shadmehr, M. A. Smith, and J. W. Krakauer, “Error Correction, Sensory Prediction, and Adaptation in Motor Control,” Annu. Rev. Neurosci., 2010, doi: 10.1146/annurev-neuro-060909-153135.
    8. M. Hizlan, “Spread Spectrum,” in Handbook of Computer Networks, 2011.
    9. R. Skaug and J. F. Hjelmstad, “Introduction to spread spectrum communications,” in Spread Spectrum in Communication, 2011.
    10. K. V. (U. B. Rashmi, P. B. Nakkiran, J. B. Wang, N. B. (U. B. Shah, and K. B. Ramchandran, “Having Your Cake and Eating It Too: Jointly Optimal Erasure Codes for I/O, Storage, and Network-bandwidth,” FAST, 2015.
    11. K.Deepika, P.Andrew, R.Santhya, S.Balamurugan, S.Charanyaa, "A Survey on Approaches Developed for Data Anonymization", International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 4, December 2014.
    12. K.Deepika, P.Andrew, R.Santhya, S.Balamurugan, S.Charanyaa, "Investigations on Methods Evolved for Protecting Sensitive Data", International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 4, Decermber 2014.
    13. S.Jeevitha, R.Santhya, Prof.S.Balamurugan, S.Charanyaa, " Privacy Preserving Personal Health Care Data in Cloud" International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 2, October 2014.
    14. Vishal Jain, Dr. Mayank Singh, “Ontology Based Information Retrieval in Semantic Web: A Survey”, International Journal of Information Technology and Computer Science (IJITCS), Hongkong, Vol. 5, No. 10, September 2013, page no. 62-69, having ISSN No. 2074-9015, DOI: 10.5815/ijitcs.2013.10.06.
    15. Vishal Jain, Dr. Mayank Singh, “Ontology Based Pivoted Normalization using Vector – Based Approach for Information Retrieval”, IEEE Co-Sponsored 7th International Conference on Advanced Computing and Communication Technologies (ICACCT), In association with INDERSCIENCE Publishers, UK, IETE and Technically Cosponsored by Computer Society Chapter IEEE Delhi Section, held on 16th November, 2013, organized by Asia Pacific Institute of Information Technology SD India, Panipat, India.
    16. Vishal Jain, Dr. Mayank Singh, “Ontology Based Web Crawler to Search Documents in the Semantic Web”, “Wilkes100 - Second International Conference on Computing Sciences”, in association with International Neural Network Society and Advanced Computing Research Society, held on 15th and 16th November, 2013 organized by Lovely Professional University, Phagwara, Punjab, India and proceeding published by Elsevier Science.

    1. D. Kythe and P. Kythe, “Reed-Solomon Codes,” in Algebraic and Stochastic Coding Theory, 2017.
    2. S. B. Wicker and V. K. Bhargava, ReedSolomon Codes and Their Applications. 2010.
    3. M. Dailey, “Cryptology,” in Information Security Fundamentals, Second Edition, 2013.
    4. K. V Rashmi, P. Nakkiran, J. Wang, N. B. Shah, and S. Clara, “Boosting QuasiAsynchronous I/O for Better Responsiveness in Mobile Devices,” 13th USENIX Conf. File Storage Technol. (FAST ’15), 2015.
    5. O. Khan, R. Burns, J. Plank, and W. Pierce, “Rethinking Erasure Codes for Cloud File Systems : Minimizing I / O for Recovery and Degraded Reads,” Fast, 2012
    6. R. Shadmehr, M. A. Smith, and J. W. Krakauer, “Error Correction, Sensory Prediction, and Adaptation in Motor Control,” Annu. Rev. Neurosci., 2010, doi: 10.1146/annurev-neuro-060909-153135.
    7. M. Hizlan, “Spread Spectrum,” in Handbook of Computer Networks, 2011.
    8. R. Skaug and J. F. Hjelmstad, “Introduction to spread spectrum communications,” in Spread Spectrum in Communication, 2011.
    9. K. V. (U. B. Rashmi, P. B. Nakkiran, J. B. Wang, N. B. (U. B. Shah, and K. B. Ramchandran, “Having Your Cake and Eating It Too: Jointly Optimal Erasure Codes for I/O, Storage, and Network-bandwidth,” FAST, 2015
    10. K.Deepika, P.Andrew, R.Santhya, S.Balamurugan, S.Charanyaa, "A Survey on Approaches Developed for Data Anonymization", International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 4, December 2014.
    11. K.Deepika, P.Andrew, R.Santhya, S.Balamurugan, S.Charanyaa, "Investigations on Methods Evolved for Protecting Sensitive Data", International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 4, Decermber 2014.
    12. S.Jeevitha, R.Santhya, Prof.S.Balamurugan, S.Charanyaa, " Privacy Preserving Personal Health Care Data in Cloud" International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 2, October 2014.
    13. Vishal Jain, Dr. Mayank Singh, “Ontology Based Information Retrieval in Semantic Web: A Survey”, International Journal of Information Technology and Computer Science (IJITCS), Hongkong, Vol. 5, No. 10, September 2013, page no. 62-69, having ISSN No. 2074-9015, DOI: 10.5815/ijitcs.2013.10.06.
    14. Vishal Jain, Dr. Mayank Singh, “Ontology Based Pivoted Normalization using Vector – Based Approach for Information Retrieval”, IEEE Co-Sponsored 7th International Conference on Advanced Computing and Communication Technologies (ICACCT), In association with INDERSCIENCE Publishers, UK, IETE and Technically Cosponsored by Computer Society Chapter IEEE Delhi Section, held on 16th November, 2013, organized by Asia Pacific Institute of Information Technology SD India, Panipat, India.
    15. Vishal Jain, Dr. Mayank Singh, “Ontology Based Web Crawler to Search Documents in the Semantic Web”, “Wilkes100 - Second International Conference on Computing Sciences”, in association with International Neural Network Society and Advanced Computing Research Society, held on 15th and 16th November, 2013 organized by Lovely Professional University, Phagwara, Punjab, India and proceeding published by Elsevier Science.

Recent Article