Pooling, Splitting, and Restituting Information to Overcome Total Failure of Some Channels of Communication

C. Asmuth, G. Blakley
{"title":"Pooling, Splitting, and Restituting Information to Overcome Total Failure of Some Channels of Communication","authors":"C. Asmuth, G. Blakley","doi":"10.1109/SP.1982.10019","DOIUrl":null,"url":null,"abstract":"This paper solves an analog of the problem which gave rise to the theory of error control codes by methods, of miniscule computational complexity, taken from the theory of TIPS (also called key safeguarding schemes, threshold schemes, secret sharing, key sharing, and IPS). The problem solved herein is the following. Information is flowing through several parallel channels from a sending node S to a receiving node R. The possibility exists that one or more channels will be rendered inoperative, but it is deemed essential that all the information get through. Suppose that the organization responsible for the information flow wants to protect Itself against ths breakdown of some of the total number d of available channels. It thus wants to be able to use \"coding\" and \"decoding\" processes, which are quick to implement on cheap microprocessors, for blending all the information H due to leave S into a slurry which can be poured into the d channels in such a way that whatever comes out of any b channels at R is enough to reconstruct H completely. It wants more than a high speed implementation of this process on cheap hardware. It wants to send as few bits as possible. Suppose, for example, that it has 100 bits to send and that it requires assurance that they will all get through even if 3 channels fail. It cannot predict which 3 channels might fail and it knows, of course, that it cannot reconstruct the 100 bits to be sent from S unless 100 bits get through the channels which continue to function (total bit cost: 100 plus the number of bits sent on channels which fail). Each of the following solutions to its problem is therefore optimal from an information theoretic viewpoint: 1. A way to reconstruct H from l-bit transmissionson any 100 of 103 channels (involves 3 wasted bits); 2. A way to reconstruct H from 10-bit transmissions on any 10 of 13 channels (involves 30 wasted bits); 3. A way to reconstruct H from 25-bit transmissions on any 4 of 7 channels (involves 75 wasted bits); 4. A way to reconstruct H from 100-bit transmissions on any 1 of 4 (involves 300 wasted bits). Common sense is inclined to reject at least the first (too many channels used) and last (too many bits sent) of the \"optimal\" solutions above. This paper shows how to produce cheap high speed processes which come within a hair of being optimal (in the sense just described) solutions to the problem in question. It describes parameter settings in which the problem cannot be solved satisfactorilyby at leastsome approaches. It discusses ways to decide on which \"optimal\" solution to the problem is preferable. The idea behind the theory presented here was originally to provide insurance against lose of information due to long-term outage of several channels of communication. The insurance turned out to be cheap (involving only general-purpose processor and memory chips) and compatible with communications in the megabit per second range. But the process involved conferred an unlooked-for additional benefit. It provided a novel way to multiplex digital communications and, in so doing, led to the invention of a variety of mathematically natural \"stepup information transformers\" (devices for taking several streams of data being produced at various low bit per second rates and merging them to yield transmitted data streams at higher bit rates on a number of channels which can, in some circumstances, be smaller than the number of source streams of data) and \"stepdown information transformers\" (devices which take the output of several high bit per second rate data sources and transmit them, on a number of channels exceeding the number of sources, at lower bit per second transmission rates in such a way that the high rate streams reemerge separately at the receiver). Thus devices which provide reliability can sometimes also confer economies on communications systems. It became evident that there is a natural way to cascade the processes described below. This cascading operation makes possible the use of two or three microprocessors to overcome an inherent limitation of a single microprocessor. A single 32-bit micro cannot cope with two bit streams when one has more than 30 times the bit rate of the other. But a two chip cascade can deal with bit streams whose bit rates differ by a factor of hundreds. Three chip cascades can process still more disparate bit streams. Finally, it appeared that the same theory can be ueed to provide low cost reliability in packet-switching networks where packeta can be destroyed in collisions, and can be employed in chip design to provide fault tolerance.","PeriodicalId":195978,"journal":{"name":"1982 IEEE Symposium on Security and Privacy","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1982-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"24","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"1982 IEEE Symposium on Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SP.1982.10019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 24

Abstract

This paper solves an analog of the problem which gave rise to the theory of error control codes by methods, of miniscule computational complexity, taken from the theory of TIPS (also called key safeguarding schemes, threshold schemes, secret sharing, key sharing, and IPS). The problem solved herein is the following. Information is flowing through several parallel channels from a sending node S to a receiving node R. The possibility exists that one or more channels will be rendered inoperative, but it is deemed essential that all the information get through. Suppose that the organization responsible for the information flow wants to protect Itself against ths breakdown of some of the total number d of available channels. It thus wants to be able to use "coding" and "decoding" processes, which are quick to implement on cheap microprocessors, for blending all the information H due to leave S into a slurry which can be poured into the d channels in such a way that whatever comes out of any b channels at R is enough to reconstruct H completely. It wants more than a high speed implementation of this process on cheap hardware. It wants to send as few bits as possible. Suppose, for example, that it has 100 bits to send and that it requires assurance that they will all get through even if 3 channels fail. It cannot predict which 3 channels might fail and it knows, of course, that it cannot reconstruct the 100 bits to be sent from S unless 100 bits get through the channels which continue to function (total bit cost: 100 plus the number of bits sent on channels which fail). Each of the following solutions to its problem is therefore optimal from an information theoretic viewpoint: 1. A way to reconstruct H from l-bit transmissionson any 100 of 103 channels (involves 3 wasted bits); 2. A way to reconstruct H from 10-bit transmissions on any 10 of 13 channels (involves 30 wasted bits); 3. A way to reconstruct H from 25-bit transmissions on any 4 of 7 channels (involves 75 wasted bits); 4. A way to reconstruct H from 100-bit transmissions on any 1 of 4 (involves 300 wasted bits). Common sense is inclined to reject at least the first (too many channels used) and last (too many bits sent) of the "optimal" solutions above. This paper shows how to produce cheap high speed processes which come within a hair of being optimal (in the sense just described) solutions to the problem in question. It describes parameter settings in which the problem cannot be solved satisfactorilyby at leastsome approaches. It discusses ways to decide on which "optimal" solution to the problem is preferable. The idea behind the theory presented here was originally to provide insurance against lose of information due to long-term outage of several channels of communication. The insurance turned out to be cheap (involving only general-purpose processor and memory chips) and compatible with communications in the megabit per second range. But the process involved conferred an unlooked-for additional benefit. It provided a novel way to multiplex digital communications and, in so doing, led to the invention of a variety of mathematically natural "stepup information transformers" (devices for taking several streams of data being produced at various low bit per second rates and merging them to yield transmitted data streams at higher bit rates on a number of channels which can, in some circumstances, be smaller than the number of source streams of data) and "stepdown information transformers" (devices which take the output of several high bit per second rate data sources and transmit them, on a number of channels exceeding the number of sources, at lower bit per second transmission rates in such a way that the high rate streams reemerge separately at the receiver). Thus devices which provide reliability can sometimes also confer economies on communications systems. It became evident that there is a natural way to cascade the processes described below. This cascading operation makes possible the use of two or three microprocessors to overcome an inherent limitation of a single microprocessor. A single 32-bit micro cannot cope with two bit streams when one has more than 30 times the bit rate of the other. But a two chip cascade can deal with bit streams whose bit rates differ by a factor of hundreds. Three chip cascades can process still more disparate bit streams. Finally, it appeared that the same theory can be ueed to provide low cost reliability in packet-switching networks where packeta can be destroyed in collisions, and can be employed in chip design to provide fault tolerance.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
池化、分裂和恢复信息以克服某些通信渠道的完全失败
本文从TIPS(也称为密钥保护方案、阈值方案、秘密共享、密钥共享和IPS)理论出发,采用计算复杂度极小的方法,模拟了错误控制码理论的产生。这里解决的问题如下。信息通过几个并行通道从发送节点S流向接收节点r。存在一个或多个通道失效的可能性,但所有信息都必须通过。假设负责信息流的组织希望保护自己不受可用通道总数d中的某些故障的影响。因此,它希望能够使用“编码”和“解码”过程,这些过程可以在廉价的微处理器上快速实现,用于混合由于离开S而产生的所有信息H,这些信息H可以倒入d通道中,以这样的方式,无论从R的任何b通道中产生什么都足以完全重建H。它想要的不仅仅是在廉价硬件上高速实现这个过程。它想要发送尽可能少的比特。例如,假设它有100位要发送,并且它需要确保即使3个通道失败也能全部通过。它无法预测哪3个通道可能会失败,当然,它知道它无法重建从S发送的100位,除非100位通过继续工作的通道(总比特成本:100加上在失败的通道上发送的比特数)。因此,从信息论的观点来看,以下每一种解决方案都是最优的:一种在103个通道中的任意100个通道中从l位传输重构H的方法(涉及3个浪费位);2. 一种从13个信道中的任意10个信道的10位传输中重构H的方法(涉及30个浪费的比特);3.。一种在7个信道中的任意4个信道上从25位传输重构H的方法(涉及75个浪费的比特);4. 一种从100位传输中重构H的方法(涉及300个浪费的比特)。常识倾向于至少拒绝上述“最佳”解决方案的第一个(使用了太多通道)和最后一个(发送了太多比特)。本文展示了如何生产廉价的高速工艺,这是最优(在刚刚描述的意义上)解决问题的方法。它描述了至少通过某些方法不能令人满意地解决问题的参数设置。它讨论了决定问题的“最优”解决方案是可取的方法。这里提出的理论背后的想法最初是为了提供保险,防止由于几个通信渠道的长期中断而导致的信息丢失。事实证明,这种保险很便宜(只涉及通用处理器和存储芯片),并且与每秒兆位的通信兼容。但这个过程带来了意想不到的额外好处。它为多路数字通信提供了一种新颖的方式,并在这样做的过程中,导致了各种数学上自然的“步进信息转换器”的发明(用于以各种低每秒比特率产生的几个数据流并将它们合并以产生在许多信道上以更高比特率传输的数据流的设备,在某些情况下,小于源数据流的数量)和“降压信息转换器”(在超过源数量的多个通道上,以较低的每秒比特传输速率传输几个每秒高比特率数据源的设备,从而使高速率流在接收器单独出现)。因此,提供可靠性的设备有时也能给通信系统带来经济效益。很明显,有一种自然的方法可以级联下面描述的过程。这种级联操作使得使用两个或三个微处理器来克服单个微处理器的固有限制成为可能。当一个比特率是另一个比特率的30倍以上时,单个32位微处理器无法处理两个比特流。但是双芯片级联可以处理比特率相差数百倍的比特流。三个芯片级联可以处理更多不同的比特流。最后,同样的理论似乎可以用于在分组交换网络中提供低成本可靠性,其中分组可能在碰撞中被破坏,并且可以用于芯片设计以提供容错性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Privacy Protection in the 1980s Pooling, Splitting, and Restituting Information to Overcome Total Failure of Some Channels of Communication Forward Search as a Cryptanalytic Tool Against a Public Key Memoryless Inference Controls for Statistical Databases Protection in the OSKAR Opereting System: Goals, Concepts, Conseqeuences
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1