📄 rsencode.1
字号:
.TH RSENCODE 1 "QCCPACK" "".SH NAMErsencode \- Reed-Solomon coding.SH SYNOPSIS.B rsencode.RB "[\|" \-k.IR k "\|]".RB "[\|" \-n.IR n "\|]".I infile.I outfile.SH OPTIONS.TP.BI \-k " k"Integer. The number of message symbols per coded block.Default = 10..TP.BI \-n " n"Integer. The total number of symbols per coded block.Default = 15..SH DESCRIPTION.LP.B rsencodeimplements Reed-Solomon forward-error-correction (FEC) codingof a file..I infileis the filename of the file to be FEC protected;.I outfileis the resulting FEC-protected file.It is assumed that symbols stored in.I infileare single-character bytes; i.e., it is a text file..LPReed-Solomon coding is a.RI ( n ", " k )FEC code; that is,.IR n " - " kFEC symbols are concatenated to.I kmessage symbolsto produce an.IR n -symbolblock. The .IR n " - " kFEC symbols are redundant information that aids in the recoveryof the.I kmessage symbols should some of these symbols be lost or corruptedduring transmission of the coded file.In particular, Reed-Solomon coding has the property that if up to.IR n " - " ksymbols out of the .I nsymbols in the coded block are lost, the original.I kmessage symbols can be recovered exactly..LP.B rsencodereads.I ksymbols (i.e., single-byte characters) from.IR infile ,calculates the corresponding.IR n " - " kFEC symbols for these.I kmessage symbols, and thenwrites the corresponding .RI length- ncoded block to.IR outfile .When the end of file of.I infileis encountered, zeros are added as needed to fill out the last blockto .I ksymbols before calculating the FEC symbols.Thus the length of.I outfileis.RI ceil( N / k )* n ,where .I Nis the length of.IR infile ..SH NOTESReed-Solomon codes were introduced in 1960 by Reed and Solomon. Theimplementation found in QccPack follows that by Rizzo..SH "SEE ALSO".BR QccECCReedSolomonEncode (3),.BR QccECCReedSolomonDecode (3),.BR QccPackECC (3),.BR QccPack (3)I. S. Reed and G. Solomon,"Polynomial Codes Over Certain Finite Fields,".IR "J. Soc. Ind. Appl. Math." ,vol. 8, pp. 300-304, 1960. L. Rizzo, "Effective Erasure Codes for Reliable Computer CommunicationProtocols,".IR "ACM Computer Communication Review" ,vol. 27, no. 2, pp. 24-36, April 1997..SH AUTHORCopyright (C) 1997-2005 James E. Fowler.\" The programs herein are free software; you can redistribute them and/or.\" modify them under the terms of the GNU General Public License.\" as published by the Free Software Foundation; either version 2.\" of the License, or (at your option) any later version..\" .\" These programs are distributed in the hope that they will be useful,.\" but WITHOUT ANY WARRANTY; without even the implied warranty of.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the.\" GNU General Public License for more details..\" .\" You should have received a copy of the GNU General Public License.\" along with these programs; if not, write to the Free Software.\" Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -