Skip to main content

Almost-Certainly Runlength-Limiting Codes

  • Conference paper
  • First Online:
Cryptography and Coding (Cryptography and Coding 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2260))

Included in the following conference series:

Abstract

Standard runlength-limiting codes — nonlinear codes defined by trellises — have the disadvantage that they disconnect the outer errorcorrecting code from the bit-by-bit likelihoods that come out of the channel. I present two methods for creating transmissions that, with probability extremely close to 1, both are runlength-limited and are codewords of an outer linear error-correcting code (or are within a very small Hamming distance of a codeword). The cost of these runlength-limiting methods, in terms of loss of rate, is significantly smaller than that of standard runlength-limiting codes. The methods can be used with any linear outer code; low-density parity-check codes are discussed as an example.

The cost of the method, in terms of additional redundancy, is very small: a reduction in rate of less than 1% is sufficient for a code with blocklength 4376 bits and maximum runlength 14.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. John Byers, Michael Luby, Michael Mitzenmacher, and Ashu Rege. A digital fountain approach to reliable distribution of bulk data. In Proceedings of ACM SIGCOMM’ 98, September 2–4, 1998, 1998.

    Google Scholar 

  2. R. H. Deng and M. A. Herro. DC-free coset codes. IEEE Trans. Inf. Th., 34:786–792, 1988.

    Article  MATH  MathSciNet  Google Scholar 

  3. R. G. Gallager. Low Density Parity Check Codes. Number 21 in Research monograph series. MIT Press, Cambridge, Mass., 1963.

    Google Scholar 

  4. K. A. S. Immink. Constructions of almost block-decodable runlength-limited codes. IEEE Transactions on Information Theory, 41(1), January 1995.

    Google Scholar 

  5. K. A. S. Immink. A practical method for approaching the channel capacity of constrained channels. IEEE Trans. Inform. Theory, 43(5):1389–1399, Sept 1997.

    Article  MATH  MathSciNet  Google Scholar 

  6. K. A. S. Immink. Weakly constrained codes. Electronics Letters, 33(23), Nov. 1997.

    Google Scholar 

  7. D. J. C. MacKay and M. C. Davey. Evaluation of Gallager codes for short block length and high rate applications. In B. Marcus and J. Rosenthal, editors, Codes, Systems and Graphical Models, volume 123 of IMA Volumes in Mathematics and its Applications, pages 113–130. Springer-Verlag, New York, 2000.

    Google Scholar 

  8. B. H. Marcus, P. H. Siegel, and J. K. Wolf. Finite-state modulation codes for data storage. IEEE Journal on Selected Areas in Communication, 10(1):5–38, January 1992.

    Article  Google Scholar 

  9. G. S. Markarian, M. Naderi, B. Honary, A. Popplewell, and J. J. O’Reilly. Maximum likelihood decoding of RLL-FEC array codes on partial response channels. Electronics Letters, 29(16):1406–1408, 1993.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

MacKay, D.J.C. (2001). Almost-Certainly Runlength-Limiting Codes. In: Honary, B. (eds) Cryptography and Coding. Cryptography and Coding 2001. Lecture Notes in Computer Science, vol 2260. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45325-3_13

Download citation

  • DOI: https://doi.org/10.1007/3-540-45325-3_13

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43026-1

  • Online ISBN: 978-3-540-45325-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics