Arya Mazumdar Joint work with Alexander Barg , University of - - PowerPoint PPT Presentation

arya mazumdar
SMART_READER_LITE
LIVE PREVIEW

Arya Mazumdar Joint work with Alexander Barg , University of - - PowerPoint PPT Presentation

Codes on Permutations: Rank Modulation Arya Mazumdar Joint work with Alexander Barg , University of Maryland- College Park Flash memory Array of Floating Gate Memory Cells. In abundant use for short-term storage and limited number of


slide-1
SLIDE 1

Codes on Permutations: Rank Modulation

Arya Mazumdar

Joint work with Alexander Barg, University of Maryland- College Park

slide-2
SLIDE 2

Flash memory

  • Array of Floating Gate Memory Cells.
  • In abundant use for short-term storage and limited number of writes.
  • Can they be used as caches?
  • What is the best model for the errors in Flash

memory?

  • How to increase the longevity of the flash

devices?

  • What will be the architecture of a high-

performance error-resilient Flash controller?

A USB Flash Drive. The chip on the left is the flash

  • memory. The controller is
  • n the right (Wikipedia).
slide-3
SLIDE 3

Reliability of data in Flash memory and rank modulation scheme

Drift of charge from cells: Reliability of data stored. q q-1 . . . . . . 3 2 1 1 2 3 4 . . n Information is written in blocks of n cells with q charge levels in each cells.

slide-4
SLIDE 4

Memory Cells

q q-1 . . . . . . 3 2 1 1 2 3 4 . . n

  • Conventional q-ary codes can be used for protection of data.
  • The error process is non-conventional!
slide-5
SLIDE 5

Error caused by drift of charge

q q-1 . . . . . . 3 2 1 1 2 3 4 . . n

  • Due to charge leakage, after some time (aging of device) all cells will contain

erroneous values.

  • Moreover the rate of leakage in different cells may vary.
  • Error correction schemes designed for q-ary writing will FAIL.
slide-6
SLIDE 6

Storing data in Flash memory

1 2 3 4 5 6 7 4 6 7 1 5 3 2

  • Rank Modulation Scheme (ISIT’08 Jiang/Schwartz/Bruck).
  • Store information as the relative values of the charge levels.
  • σ = (4, 7, 6, 1, 5, 2, 3)
  • Levels can take continuous values.
slide-7
SLIDE 7

Storing data in Flash memory

1 2 3 4 5 6 7 4 6 7 5 3 1 2

slide-8
SLIDE 8

Storing data in Flash memory

1 2 3 4 5 6 7 4 6 7 2 5 3 1

slide-9
SLIDE 9

Codes in permutations

  • Sn= Group of permutations on n symbols
  • Vector representation:  = ((1), (2), … (n),)
  • Identity: (1, 2, 3, … ,n)
  • Multiplication: Composition (1, 3, 2, 4)(2, 4, 1, 3)=(2, 1, 4, 3)
  • Inverse: (3, 4, 2, 1)(4, 3, 1, 2) = (1, 2, 3, 4)
  • Transposition: (1,3, 5, 4, 6, 2)  (1, 3, 5, 2, 6, 4)
slide-10
SLIDE 10

Codes in permutations

slide-11
SLIDE 11

Codes in permutations with Kendall metric

slide-12
SLIDE 12

Rank modulation codes

slide-13
SLIDE 13

Coding for the Kendall distance

slide-14
SLIDE 14

Coding for the Kendall distance

slide-15
SLIDE 15

Bounds on the size of codes

slide-16
SLIDE 16

Capacity of rank modulation Scheme

slide-17
SLIDE 17

To prove: basic arguments

slide-18
SLIDE 18

To prove: basics of permutation

1 1 2 2 1 xσ  2 1 6 4 3 7 5 9 8

slide-19
SLIDE 19

Direct attempt to find the volume

  • f the sphere
slide-20
SLIDE 20

Direct attempt to find the volume

  • f the sphere
slide-21
SLIDE 21

Direct attempt to find the volume

  • f the sphere
slide-22
SLIDE 22

Isometric embeddings

slide-23
SLIDE 23

Isometric embeddings

slide-24
SLIDE 24

Codes that correct t-errors

slide-25
SLIDE 25

Existence of good codes: proof idea

slide-26
SLIDE 26

Existence of good codes: proof idea

slide-27
SLIDE 27

Existence of good codes: main tool

slide-28
SLIDE 28

Existence of good codes: final step

slide-29
SLIDE 29

Explicit constructions

Permutation Polynomials: Polynomials that give bijective maps from a finite field to itself. Main Idea: Evaluations of permutation polynomials of bounded degree forms a subset of Reed-Solomon code. Problem 1: Identifying permutation polynomials calls for extensive search. Consider special classes, such as, Linearized polynomials, Dickson polynomials, monomials. Problem 2: Connecting Kendall Distance with Hamming distance is

  • difficult. We use certain accumulator-

type transformation that does the job for small distances. Construction from good codes of the Hamming space: We find a distance preserving Gray Map (and its variations) for the space of inversion vectors and the Hamming space of comparable size. Remember we seek an additive error correcting code in the space of inversion vectors. We obtain family of ‘good’ codes, efficiently encodable and decodable, that corrects up to O(n 1+ε) number of errors, for 0≤ε≤1.

slide-30
SLIDE 30

To summarize: