Skip to content

Commit 27cf1a2

Browse files
paragraph fix
1 parent ba3d863 commit 27cf1a2

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

content/posts/information_chaining_part_1.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ Erasure codes work by transforming an original message of $n$ symbols into a lon
167167

168168
## Designing a Bloom filter–based erasure encoder
169169

170-
Now imagine applying this logic to network packets. If we could transform $n$ packets into $z$ packets (where $z > n$) and transmit them using a connectionless protocol, the receiver could reconstruct the original data from any subset of those $z$ packets, even if some were lost along the way. Here’s where Information Chaining re-enters the picture. Our Bloom filter–based prototype can be adapted into an erasure code in multiple ways:
170+
Now imagine applying this logic to network packets. If we could transform $n$ source packets into $m$ encoded packets (where $m > n$) and transmit them using a connectionless protocol, the receiver could reconstruct the original data from any subset of those $m$ packets, even if some were lost along the way. Here’s where Information Chaining re-enters the picture. Our Bloom filter–based prototype can be adapted into an erasure code in multiple ways:
171171

172172
- Use many small Bloom filters (with higher false positive rates) and compress them, for instance, using [Golomb Coded Sets](https://web.archive.org/web/20220620080435/https://giovanni.bajo.it/post/47119962313/golomb-coded-sets-smaller-than-bloom-filters). Or
173173
- Use a single large Bloom filter and later packetize it.

0 commit comments

Comments
 (0)